text
stringlengths 144
682k
|
|---|
Information Security
23 Mar 2015
The requirements of information security with in an organization have undergone major changes in the past and present times. In the earlier times physical means is used to provide security to data. With the advent of computers in every field, the need for software tools for protecting files and other information stored on the computer became important. The important tool designed to protect data and thwart illegal users is computer security.
With the introduction and revolution in communications, one more change that affected security is the introduction of distributed systems which requires carrying of data between terminal user and among a set of computers. Network security measures are needed to protect data during their transmission. The mechanisms used to meet the requirements like authentication and confidentiality are observed to be quite complex. One must always consider potential counter measures while developing a particular mechanism. It is also important to identify implementations to adopt these mechanisms. Security mechanisms usually involve more than a particular algorithm or protocol. It means that participants be in possession of some secret information, which raises doubts about their creation, distribution and protection of that secret information. Thus a model has to be developed within which security services and mechanisms can be viewed.
To identify the security needs of an organization at its effective level, the manager needs a systematic way. One approach is to consider three aspects of information security that is Security attack, Security mechanism and Security services. Security attack identifies different modes by which intruder tries to get unauthorized information and the services are intended to counter security attacks, and they make use of one or more security mechanisms to provide the service.
As information systems become ever more active and important to the conduct of activities, electronic information takes on many of the roles earlier being done on papers. Few information integrity functions that the security mechanism has to support are security and confidentiality of the data to be transmitted and authentication of users.
There is no single mechanism that will provide all the services specified. But we can see that one particular element that specifies most of the security mechanisms in use: cryptographic techniques. Encryption or encryption like transformations of information is the most common means of providing security. A model for much of what we will be discussing is captured in general terms.
Encryption Model
This general model shows that there are four basic tasks in designing a particular security service.
1. Design an algorithm for performing encryption & decryption process.
2. Generate the secret information with the help of algorithm of step 1.
3. Identify methods for the distribution and sharing of secret information.
4. Identify rules to be used by both the participating parties that makes use of security algorithm and the secret information to achieve a particular security service.
A crypto system is an algorithm, plus all possible plain texts, cipher texts and keys. There are two general types of key based algorithms: symmetric and public key. With most symmetric algorithms, the same key is used for both encryption and decryption.
Symmetric-key encryption
Execution of symmetric-key encryption can be highly useful, so that users do not experience any significant time delay because of the encryption and decryption. Symmetric-key encryption also provides a degree of authentication, since information encrypted with one symmetric key cannot be decrypted with any other symmetric key. Thus, as long as the symmetric key is kept secret by the two parties using it to encrypt communications, each party can be sure that it is communicating with the other as long as the decrypted messages specify a meaningful sense.
Symmetric-key encryption will be successful only if the symmetric key is kept secured by the two parties involved. If anyone else discovers the key, it affects both confidentiality and authentication. The success of a symmetric algorithm rests in the key, divulging the key means that any one could encrypt and decrypt messages. As long as the communication needs to remain secure, the key must be protected between the participating parties.
Encryption and decryption with a symmetric algorithm are denoted by
E K (M) = C
D K (M) = P
Symmetric algorithms can be divided into two categories. Some operate on the plain text a single bit or byte at a time, these are called stream algorithms or stream ciphers. Others operate on group of bits or characters. Such algorithms are called block algorithms.
Public algorithms are designed so that the key used for encryption is different from the key used for decryption. The algorithms are called public key because the encryption key be made public. It involves a pair of keys--a public key and a private key--associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data. Further more the decryption key cannot be calculated from the encryption key. Each public key is published, and the corresponding private key is kept secret. Data encrypted with ones public key can be decrypted only with his private key. shows a simplified view of the way public-key encryption works.
Public-key encryption
Compared with symmetric-key encryption, public-key encryption requires more computation and is therefore not always appropriate for large amounts of data. However, it's possible to use public-key encryption to send a symmetric key, which can then be used to encrypt additional data. This is the approach used by the SSL protocol. This provides Authentication, Integrity & Confidentiality of Information at low computing power. Nevertheless, private-key encryption is useful, because it means you can use your private key to sign data with your digital signature--an important requirement for electronic commerce and other commercial applications of cryptography. Encryption and decryption can be represented in a public key scheme is
E Kpu(M) = C
D Kpr(C) = M
Where Kpu is the public key and Kpr is the private key.
In public key encryption there is always a possibility of some information being leaked out. A crypto analyst tries to get some information based on ones public key. Not a whole of information is to be gained here, but there are potential problems with allowing a crypto analyst to encrypt random messages with public key. Some information is leaked out every time to the crypto analyst, he encrypts a message. In probabilistic Encryption, multiple cipher texts are generated for one plain text, a cryptanalyst can not generate any information by chosen plain text and chosen cipher text attacks.
Probabilistic encryption
Security Analysis of algorithms: Different algorithms offers different degrees of security, it depends on how hard they are to break. If the cost required to break an algorithm is greater than the value of the encrypted data, then we are probably safe. If the time required to break an algorithm is longer than the time that the encrypted data must remain secret, then we are probably safe. If the amount of data encrypted with a single key is less than the amount of data necessary to break the algorithm, then we are probably safe.
An algorithm is unconditionally secure if, no matter how much cipher text a crypto analyst has, there is not enough information to recover the plain text. In point of fact, only a one time pad is unbreakable in a cipher text only attack, simply by trying every possible key one by one and by checking whether the resulting plain text is meaningful. This is called a brute force attack. Cryptography is more concerned with crypto systems that are computationally infeasible to break. Any algorithm is considered computationally secure if it cannot be broken with available resources.
The complexity of an attack can be measured as Data Complexity, the amount of data needed as input to the attack, Processing complexity, the time needed to perform the attack and storage requirements which are the amount of memory needed to do the attack which is space complexity.
As a thumb rule, the complexity of an attack is taken to be minimum of these three factors. Another classification of complexities is by complexity of the algorithm by its construction and complexity of the algorithm by its strength. By its construction, the time complexity of the algorithm can be calculated by executing through the steps of the algorithm, which will be referred as O(n). Complexities can also be expressed as orders of magnitude. If the length of the key is k, then the processing complexity is given by 2k . It means that 2 k operations are required to break the algorithm. Then the complexity of the algorithm is said to be exponential in nature.
A desirable property of any encryption algorithm is that a small change in plain text or the key should produce significant change in cipher text. Such an effect is known as avalanche effect. The more the avalanche affects of the algorithm, the better the security. Crypto analysis is the study of recovering the plain text with out access to the key. It may also find weakness in a crypto system that eventually leads to previous results.
An attempted crypto analysis is called an attack. There are five types of attack. Each of them assumes that the crypto analyst has complete knowledge of the encryption algorithm used.
1. Cipher text only attack: Here the crypto is in hold of cipher text only. The crypto analyst has cipher text of several messages, all of which have been encrypted using the same encryption algorithm. The crypto analyst's job is to recover the plain text of as many messages as possible, or better yet to deduce the key used to encrypt the messages, in order to decrypt other messages encrypted with the same keys.
2. Known Plaintext attack: The crypto analyst is in hold of not only to the cipher text of several messages, but also to the plain text of those messages. His job is to get the key used to encrypt the messages or an algorithm to decrypt any messages encrypted with the same key.
3. Chosen Plaintext Attack (CPA): Here the crypto analyst is in hold of not only cipher text but also parts of chosen plain text. If the analyst is able to insert into the system a message chosen by the analyst, then such an attack is known as chosen plain text attack. Differential crypto analysis is an example of this mode.
4. Chosen cipher text attack (CCA): Under the CCA model, an adversary has access to an encryption and a decryption machine and must perform the same task of distinguishing encryptions of two messages of its choice. First, the adversary is allowed to interact with the encryption and decryption services and choose the pair of messages. After it has chosen the messages, however, it only has access to an encryption machine.
5. Chosen text: In this model, the analyst posses the encryption algorithm, Cipher text to be decoded, plain text message chosen by the crypto analyst and purported cipher text chosen by the crypto analyst.
Present work:
In this work an attempt has been made to generate a set of algorithms which provides security to data transmitted. The first algorithm considers a random matrix key which on execution by a series of steps generates a sequence. This sequence is used a sub key to build three different encryption models. Each model can be used for encryption of data. The second algorithm considers not only the key but also initialization vector and a time stamp to generate sub keys which are used for encryption process. And also a mechanism has been discussed which identifies any garbled key while transmitted from the Key Distribution Centre.
In this work both the algorithms are discussed in terms of computational security, computational complexity and computational overhead. Both the algorithms are studied for their strengths and limitations. A crypto analytical study of the algorithms with emphasis on probabilistic encryption is also considered in this study.
The encryption algorithms are compared with standard algorithms like RC4 and DES. The algorithms are also discussed in terms of its applications and also about their advantages and limitations in network security environment.
Get in Touch With us
|
Q: Is 25 a Composite Number?
A: Yes, 25 is a composite number.
Why is 25 a composite number?
The number 25 can be evenly divided by 1 5 and 25, with no remainder.
Since 25 cannot be divided by just 1 and 25, it is a composite number.
More Examples
Number 23242627
Composite? noyesyesyes
Explore more about the number 25:
Ask a Question
|
The State of Cybersecurity in India (2021)
Cyber Security is the act of safeguarding data, networks, electronic systems, mobile devices, servers, and computers from noxious attacks. It’s otherwise called electronic information security or information technology security. The term applies in an assortment of settings, from enterprise to mobile computing, and can be separated into a couple of normal classifications.
1. Network security
2. End-user education
3. Disaster recovery and business continuity
4. Information security
5. Application security
6. Operational security
Cyber attacks have been happening with expanding recurrence. For instance, leak of individual data of 3.2 million debit cards in the year 2016 and the data theft at Petya Ransomware (2017), WannaCry Ransomware (2017), Zomato (2017), and so on.
Cyber Security in India is a more extensive significance, and Cyber Security is a specific field in Information Technology that is viewed as a sub-stream in Computer Science. The Cyber Security course intends to furnish students with the skills and knowledge needed to safeguard the computer OS, data, and networks from cyber-attacks.
Cyber Security in India needs to be updated
India was one of the initial not many nations to propound a modern NCSS or National Cyber Security Policy 2013. In any case, since its appropriation, very little has changed as far as an organized cyber methodology. The current cyber threat presents critical difficulties because of quick, innovative headways like 5G, AI or Artificial Intelligence, Cloud Computing, and so on.
The Government of India is planning NCSS 2020 for a very long time, i.e., 2020-25. This technique is to guarantee a vibrant, resilient, trusted, secure and safe cyberspace for our Nation’s flourishing.
India’s digital economy involves 14 to 15% of its all-out economy and is relied upon to ascend to 20% by the year 2024. Along these lines, there is a critical requirement for India to overhaul its cybersecurity technique.
Cyber Security challenges in India
1. Lack of cybersecurity workforce
2. Phishing
3. Dependency on foreign players
4. Ransomware evolution
5. Overlapping regulatory bodies
6. Blockchain revolution
7. Lack of active cyber defence
8. AI expansion
9. External challenges
10. Server less apps vulnerability
11. IoT threats
12. Lack of separation
13. Supply chain inter-connection
14. Lack of national-level architecture for cybersecurity
15. Digital data threat
16. Lack of uniformity in devices used for internet access
17. Hacking
18. Lack of awareness
Cyber Security companies or Cyber Security experts in India
1. AVG India
2. Valency Networks
3. Cyberops Infosec LLP
4. Skylark Information Technologies Private Limited
5. Hicube Infosec Private Limited
6. NetrikaConsulting & Investigation
7. MindSam Solutions LLP
8. Alten Calsoft Labs
9. eSec Forte Technologies
10. Cyberops Lab
What kind of the scope of Cyber Security in India?
Cyber Security experts in India transformed into a hotbed. As indicated by a new report by, Cyber Security’s scope in India has turned more competitive. There are more occupation post snaps in India when contrasted with the UK and US. According to the business details, most recruiting is going on for the below jobs:
1. Chief Information Security Officer
2. Security Architect
3. Network Security Engineer
4. Cyber Security Manager
5. Cyber Security Analyst
In the Cyber security course of the most recent few years, the normal pay of Cyber Security in India has been performing 9% better than some other IT experts. Consequently, the scope of Cyber Security in India is better than anyone might have expected.
Each topography has an alternate kind of range of abilities necessity. The greater part of the Cyber Security jobs in India for freshers is searching for resources capable in:
1. Windows Server
2. IoT
3. Cryptography
4. Virtualization Network Services and Security
5. Python
6. Android
7. Linux
Choosing a Career in Cyber Security in India
Cyber Security experts are needed in each association due to their significance in data security. The interest for Cyber Security experts is high, and India gives a more extensive chance contrasted with other Asia-Pacific nations.
The accessibility of talented experts who can handle the Cyber Security issue is essentially less in India, subsequently opening numerous new entryways for youthful Indians for a Cyber Security career. Having a higher education is the correct method of beginning a Career in Cyber Security in India.
Cyber Security Degree in India
1. Sc. (Bachelor of Science)
2. Sc. (Master of Science)
3. C.A. (Bachelor of Computer Applications)
4. Post Graduate Diploma
5. C.A. (Master of Computer Applications)
6. Tech (Master of Technology)
7. Diploma
8. Certificate
Cyber Security certification is an unquestionable requirement to turn into a Cyber Security specialist?
There is an exceptional measure of data that is being processed, stored, and constantly generated by the medical, financial, military, government, corporate, and scientific associations, a critical of which is extremely delicate and requires consistent security. For sufficient protection against cyber-attacks, each association needs to represent every one of the accompanying components:
1. Database and Infrastructure Security
2. Cloud Security
3. Application Security
4. Data Security
5. Business Continuity and so on.
The best Cyber Security certification course are:
1. CEH
2. CISM
3. CompTIA Security
4. CISSP
5. GSEC and so on.
Cyberspace encroachment is a fight that we battle on a regular premise. Cyber Security in India needs severe policy and laws set up to battle these issues.
Please enter your comment!
Please enter your name here
|
5 Indian traditions and the science behind them
Share with your friends
Every culture has their unique traditions and rituals, Indian traditions are some of the most oldest which are still followed by millions. Our ancestors decided and created certain traditions which were good and some were to be avoided as they brought bad luck. Many people follow these traditions with their heart, but a lot of folks also believe them to be just superstitions. Thankfully, science has backed up a lot of Indian traditions, which really improve our lifestyle. Here are 5 Indian traditions and the science behind them:
1. Greeting people with a ‘namaskar’ by joining their palm together is a tradition to show respect to other person. But, it not only shows respect but also prevents spread of contagious disease, a perfect example is Corona pandemic where namaste is far safer than a normal hand shake.
2. It is also recommended that you take a bath after visiting a funeral, this is because a lot of germs start to populate in a dead body which can also be dangerous.
3. Finishing food with a sweet dish is an Indian tradition everyone loves. Tryptophan, an amino acid, gets produced when we eat sweets, which in turn increases the serotonin level in the body. Serotonin is responsible for feeling satisfied and content, which makes us feel good after finishing a meal with a sweet dish. It also curbs over-eating.
4. Girls are often prohibited from entering the kitchen during their menstruation, this is because their body is already in lot of stress and requires relaxation. Cooking food, or doing strenuous work can make them more exhausted.
5. Fasting during Navratri, and other sacred days is a way of devotes to show their faith. But fasting is also a great way to lose weight, remove toxins from the body, manage blood sugar levels and give a rest to your digestive system. Studies have also shown that fasting prevents some type of cancers.
Share with your friends
2 thoughts on “5 Indian traditions and the science behind them
Leave a Reply
|
What is the lambdify function in Sympy
This recipe explains what is the lambdify function in Sympy
Recipe Objective - What is the lambdify function in Sympy?
The Lambdify function translates SymPy expressions into Python functions. If an expression is evaluated over a wide range of values, the evalf() function is not efficient. lambdify acts like a lambda function but converts SymPy names to the specified numeric library, usually NumPy. Lambdify, by default, is implemented in the standard math library.
For more related projects -
# Example 1
# Importing libraries
from sympy import lambdify
from import p,q
# Defining some expression
expression = (p**2)+(q**3)
# Creating function by applying lambdify
lambda_function = lambdify([p,q], expression)
# Calling function
Output -
# Example 2
# Importing libraries
from sympy import lambdify, tan
from import p,q
# Defining some expression
expression = tan(p)
# Creating function by applying lambdify
lambda_function = lambdify(p, expression)
# Calling function
Output -
In this way, we can use the lambdify function in sympy.
Relevant Projects
Locality Sensitive Hashing Python Code for Look-Alike Modelling
Machine Learning or Predictive Models in IoT - Energy Prediction Use Case
Credit Card Fraud Detection as a Classification Problem
Resume parsing with Machine learning - NLP with Python OCR and Spacy
Deep Learning Project for Beginners with Source Code Part 1
In this project we will see the Introduction to the Deep neural networks and how to implement them in python
Customer Market Basket Analysis using Apriori and Fpgrowth algorithms
MLOps on GCP Project for Autoregression using uWSGI Flask
Ola Bike Rides Request Demand Forecast
Build a Music Recommendation Algorithm using KKBox's Dataset
Creating your own embeddings using Glove and Word2vec
|
Honduras: Death rate
(measure: deaths per 1000 people; Source: The World Bank)
* indicates monthly or quarterly data series
Honduras: Death rate, per 1000 people, 1960 - 2019:
For that indicator, we provide data for Honduras from 1960 to 2019. The average value for Honduras during that period was 9.02 deaths per 1000 people with a minimum of 4.42 deaths per 1000 people in 2015 and a maximum of 19.93 deaths per 1000 people in 1960. The latest value from 2019 is 4.45 deaths per 1000 people. For comparison, the world average in 2019 based on 193 countries is 7.60 deaths per 1000 people. See the global rankings for that indicator or use the country comparator to compare trends over time.
Select indicator
* indicates monthly or quarterly data series
Recent values
Longer historical series
This site uses cookies.
Learn more here
|
How do you describe the setting of a poem?
How do you describe the setting of a poem?
What is the setting of the story example?
Why is the setting of a text important?
What is setting in a story?
How do you introduce your main character?
How do you write badass characters?
The most straightforward way to write a genuinely badass character is to first focus on their actions and reactions to outside stimuli and situations that we the audience would likely react to in a certain way, or not react at all, and have that character do the very opposite. A jerk boss that continues to tell us off.
How do you present a character?
Here are 10 rules for introducing your character.Induce action. Elicit contradicting reactions. Elevate the character’s status. Convey the film’s themes. Invite the audience into the character’s world. Introduce the fatal flaw as soon as possible. A technique of economy. Create anticipation.
How do you make a villain interesting?
Most great villains share a common set of characteristics.Strong connection to the hero. The best villains are inextricably connected to the hero, and aid in the hero’s character development through their inherent opposition to them. Clear morality. A worthy opponent. Compelling backstory. Villains should be fun.
How do you make a funny villain?
How to Be a Funny VillainDon’t turn it into a bit. Comedians have portrayed villains before but to varying degrees of success. Make a choice about what the humor is serving. Make the stakes human. Make their methods mad, not their motives. Don’t shy away from theatrics.
How do you write a good villain backstory?
Here are 5 quick steps to create kick-ass villains.Understand Their Why. Some people use character interviews or sheets to develop their villain; others wing it as they go. Motive and Goal. Motives and goals are closely linked: Make the Conflict Specific. Know Your Cliché From Your Trope. Make Your Villain Unbeatable.
What are good villain motives?
15 Interesting Motivations for Villains and HeroesRomance. Villains frequently have ulterior motives (like marrying Aunt May to steal the nuclear power plant she inherited?) and improper means (such as sabotaging rivals). Revenge. To distinguish oneself. To fit in/gain acceptance. Justice. Greed. Fear. Desperation.
What qualities does a villain have?
Villain Characteristics Checklist:He’s convinced he’s the good guy.He has many likeable qualities.He’s a worthy enough opponent to make your hero look good.You (and your reader) like when he’s on stage.He’s clever and accomplished enough that people must lend him begrudging respect.He can’t be a fool or a bumbler.
|
How Cardiac Arrhythmias Are Treated
If your symptoms are severe and/or your healthcare provider is concerned that your arrhythmia may turn into something more serious, he or she may recommend a treatment that's appropriate for your needs.
Doctor performing heart checkup
In general, there are two reasons your healthcare provider might want to place you on medication for a cardiac arrhythmia. First, the arrhythmia might be causing you to have symptoms, such as palpitations or lightheadedness, and treatment may be important to relieve those symptoms. Second, the arrhythmia may be causing you harm or may be threatening to do so, as certain arrhythmias can increase your risk of cardiac arrest, heart attack, and stroke.
Antiarrhythmic Drugs
Antiarrhythmic drugs are medications that change the electrical properties of cardiac tissue, and by doing so, change the way your heart's electrical signal spreads across your heart. Since tachycardia (arrhythmia that causes a rapid heart rate) is usually related to abnormalities in the electrical signal, drugs that alter your heart's electrical signal can often improve those arrhythmias. Antiarrhythmic drugs are often effective, or at least partially effective, in treating most varieties of tachycardias.
Unfortunately, the antiarrhythmic drugs as a group tend to cause a fair number of side effects of one kind or another, and as a consequence, they can be difficult to take. Each antiarrhythmic drug has its own unique toxicity profile, and before prescribing any of these drugs, it is vital that your healthcare provider carefully explains the possible problems that may occur with the selected drug.
Commonly used antiarrhythmic drugs include Cordarone or Pacerone (amiodarone), Betapace (sotalol), Rhythmol (propafenone), and Multaq (dronedarone). Amiodarone is by far the most effective antiarrhythmic drug and is also less likely to cause proarrhythmia than other drugs. Unfortunately, the toxicities seen with amiodarone, like lung, thyroid, opthalmic, or liver damage, can be particularly nasty, and this drug should only be used, like all antiarrhythmic drugs, only when absolutely necessary.
The bottom line is that healthcare providers are—and ought to be—reluctant to prescribe antiarrhythmic drugs.
AV Nodal Blocking Drugs
Examples of beta blockers include Sectral (acebutolol), Tenormin (atenolol), Zebeta (bisoprolol), Lopressor or Toprol-XL (metoprolol), Corgard (nadolol), and Inderal LA or InnoPran XL (propranolol). These can cause side effects like depression, slow heart rate, fatigue, Raynaud's syndrome, sexual dysfunction, and airway spasms.
Only certain calcium channel blockers are beneficial for treating arrhythmias, including Cardizem or Tiazac (diltiazem), and Calan or Verelan (verapamil). Potential side effects include headache, constipation, diarrhea, and low blood pressure.
Depending on your individual risk for developing blood clots, which can then lead to a stroke, your healthcare provider may prescribe an anticoagulant (blood thinner). These medications keep your blood from clotting and stop clots you already have from getting bigger. Of course, taking an anticoagulant does increase the risk of bleeding, so individualized discussion with your practitioner is key, and decisions may need to be revisited as your health changes.
There are many oral options for anticoagulant therapy, such as warfarin, apixaban, dabigatran, edoxaban, and rivaroxaban. Those on anticoagulant therapy will need yearly blood tests to monitor for liver and kidney function, or frequent (at least monthly) blood tests if taking warfarin to be sure it's in the correct range.
Drugs That Reduce Cardiac Risk
A few drugs are thought to reduce the risk of sudden cardiac arrest, presumably by reducing the risk of ventricular tachycardia or ventricular fibrillation, the arrhythmias that produce cardiac arrest. A meta-analysis of 30 randomized trials with 24,779 patients suggests that beta blockers reduce the risk of sudden cardiac death by 31%. The protective mechanism of beta blockers involves slowing down the heart rate by blocking the effect of adrenaline on the heart muscle, thus reducing the chances of developing fatal arrhythmias. Almost all patients who have survived heart attacks or who have heart failure should be taking beta blockers.
Other drugs that your healthcare provider may prescribe if you are at risk for sudden cardiac arrest include angiotensin-converting enzyme (ACE) inhibitors, calcium channel blockers, and the antiarrhythmic drug amiodarone.
Implantable Devices
Some types of arrhythmias may require an implantable device to help regulate your heart's rhythm or provide an electric shock if needed.
If your heartbeat is irregular, your healthcare provider may recommend a pacemaker—a battery-operated device that keeps your heart beating at a steady, regular pace. It's placed under your skin near your collarbone, where it's then connected with a wire to your heart. The pacemaker generates electrical impulses that prevent your heart from beating too slowly or too quickly.
Some pacemakers are only indicated for short-term use. People who have damage to their electrical conduction system as a result of a heart attack may need to have a permanent pacemaker implanted.
After your pacemaker is implanted, you may need to spend a few nights in the hospital so that healthcare providers can monitor its performance. Within a few days, you should be able to return to most of your daily activities.
Certain electronic devices that emit strong electro-magnetic fields may interfere with your pacemaker. As an added precaution, experts recommend avoiding close contact (less than 6 inches from pacemaker) or prolonged contact with devices such as cell phones, e-cigarettes, body fat percent scales, MP3 headphones, and metal detectors, and you should avoid carrying these in any pockets near your chest.
Implantable Cardioverter Defibrillator (ICD)
If you've had a sudden cardiac arrest, been diagnosed with ventricular tachycardia or ventricular fibrillation, or you're at risk for developing either of these arrhythmias, your healthcare provider may recommend an implantable cardioverter defibrillator (ICD). These devices can prevent sudden death from cardiac arrest, which is the main reason they're used.
Like a pacemaker, an ICD is also battery powered and also placed under your skin near your collarbone. Wires with electrodes at the tips are attached to your heart and the ICD monitors your heart continually. Unlike a pacemaker, an ICD only kicks in when it detects an abnormal rhythm, sending a shock or a pacing treatment to your heart to get it back to normal.
Since ICDs don't prevent arrhythmias, you will likely have to take medications as well. Certain electronic devices can also interfere with your ICD and prevent it from working properly. You may not realize that this disruption has occurred, either. In addition to cell phones, headphones, and e-cigarettes, those who have an ICD should also minimize their exposure to:
• Metal detectors for security
• MP3 players and radios
• Electric fences used to contain pets
• Portable car battery chargers
• Medical alert systems and fall detection pendants
If you're unsure whether or not an electronic device will disrupt your pacemaker or ICD's functioning, veer on the safe side by consulting with your healthcare provider or contacting the electronic device's manufacturer.
Specialist-Driven Procedures
Several procedures or surgeries may be used to treat your arrhythmia or prevent them from recurring. Again, these treatments depend on the type and the severity of your arrhythmia.
These studies are performed by cardiac electrophysiologists—cardiologists with special training in the treatment of cardiac arrhythmias. An EPS may be done as a diagnostic procedure when it's important to tease out very precisely the mechanism and location of your arrhythmia and often to decide whether an ablation procedure would be likely to cure the arrhythmia. Today, many electrophysiology studies combine the diagnostic test with an ablation procedure.
Ablation works 60% to 80% of the time for people with more problematic arrhythmias such as atrial fibrillation, atrial tachycardia, and ventricular tachycardia.
For people with supraventricular tachycardias, the success rate is 90% to 95%.
For certain types of arrhythmias like atrial fibrillation and ventricular fibrillation, electrical cardioversion may be a treatment option. In this procedure, your heart is electrically shocked with paddles or patches on your chest from a defibrillator. The shock can force your heart back into a normal rhythm. This procedure is typically scheduled in advance, although it can also be used under emergency circumstances to bring a rapid heart rate under control.
There is a risk involved with cardioversion; it is possible that the procedure can knock a blood clot loose in your left atrium that may travel to your brain and result in a stroke. To prevent this, your practitioner may prescribe warfarin to be taken 2 to 3 weeks before your cardioversion.
Maze Procedure
If you're not responding to other treatments for arrhythmias or you're having heart surgery for another reason, your healthcare provider may recommend a maze procedure. This involves making incisions in the upper part of your heart (the atria) that scar over and prevent electrical impulses from creating the arrhythmia since the impulses can't go through scar tissue.
People who undergo a maze procedure are generally required to stay in the hospital for a few nights afterwards. It's common for people to initially have some pain in their chest, ribs, or shoulders as they begin to recover, but most people feel back to normal within 3 to 6 months. There are risks associated with maze procedures, as is the case with any open-heart surgery. Risks include infection, blood clots, heart attack, and the onset of other arrhythmias that may require a pacemaker. Approximately 1% to 2% of people die during this surgery.
In a study of 282 people who underwent maze surgery, 93% of people no longer had atrial tachyarrhythmias within six months of their post-procedure recovery.
Coronary Bypass
In cases of severe coronary artery disease causing arrhythmia, your healthcare provider may recommend a coronary bypass to improve the blood supply to your heart. During this procedure, a blood vessel grafted from your chest, leg, or arm is used to connect your aorta to your coronary artery, creating a new channel for blood to flow through. Once the surgery is complete, you will have to spend a few days in the intensive care unit (ICU) where practitioners will continuously monitor your heart rate and blood pressure.
There are potential complications to be aware of with this procedure. First, there is a possibility that you may develop atrial fibrillation, and this may increase your risk of stroke. There is also an estimated 1% to 2% risk for each potential complication (arrythmia, heart attack, stroke, infection, and death) involved with coronary bypass surgery.
Lifestyle Changes
Choose Heart-Healthy Foods
A heart-healthy diet is widely considered the cornerstone of cardiovascular disease (CVD) prevention. Studies show that diets high in animal protein, saturated fat, and simple carbohydrates increase your risk of CVD, while certain heart-healthy foods can reduce inflammation and plaque buildup in the arteries.
First thing first, it's best to avoid pro-inflammatory foods, including items that are high in saturated and trans fat, sugar, salt, and cholesterol. Experts recommend cutting out red meat, along with processed and fast-foods. Instead, opt for plenty of vegetables, whole grains, legumes, fruits, nuts/seeds, low-fat dairy, and lean meats such as poultry and fish. It's okay to use extra virgin olive oil when cooking or sprinkled over a salad too.
If you're still not sure where to begin, look to the Mediterranean diet; many staples of this diet are known for their anti-inflammatory properties. Consulting with a dietitian is also beneficial for many people. If you choose to take this route, be sure to contact your insurance provider, as they may even cover the visit.
Keep Moving
The Department of Health and Human Services (HHS) recommends fitting at least 150 minutes of moderately intense aerobic exercise into your schedule each week. This may take the form of walking or jogging, swimming, cycling, dancing, or even gardening.
The HHS also recommends incorporating weights or resistance training at least two days per week. That said, your healthcare provider may advise against heavy lifting if you have had a permanent pacemaker or ICD implanted or you have had an invasive heart surgery.
Above all, you should avoid spending too much time being sedentary, even if much of your day is spent at a desk. A little exercise is better than none. If you haven't been exercising lately, its best to start with light activity and gradually increase it.
Watch Your Weight
Obesity is closely associated with a number of conditions that increase cardiovascular risk, including type 2 diabetes, high blood pressure, high cholesterol, and inflammation. These conditions are driving factors for heart attack, cardiac arrest, coronary artery disease, stroke, arrhythmias, and sudden death.
Eating a healthy diet and increasing your physical activity can help you reach and maintain a healthy weight. If lifestyle changes are not enough, talk to your healthcare provider about medications or surgery.
Approximately 20% of people with atrial fibrillation are obese. Data suggests that with every 5-unit increase in BMI, a person's risk of atrial fibrillation escalates between 10% and 29%.
Stop Smoking
Cigarette smoking is a major risk factor for cardiovascular disease. According to the CDC, more than 650,000 people die each year in the United States as a result of CVD. In at least 20% of these cases, the person's CVD was directly attributed to cigarette smoking.
Quitting cigarettes may be one of the best things you can do for yourself to prevent CVD. It's never too late either; after four years of not smoking, your risk of having a stroke is reduced to that of a person who never smoked at all.
Understandably, quitting cold turkey is easier said than done. Nicotine replacement in the form of patches, lozenges, and gum are available therapies that may minimize withdrawal symptoms and help you stave off cravings. Many people find that the support of a community is especially beneficial, and a plethora of support groups exist for this purpose.
The FDA has also approved two medications for treating tobacco dependence: bupropion (Zyban) and varenicline (Chantix).
Maintain Blood Pressure and Cholesterol
Keeping your blood pressure and cholesterol under control is crucial for protecting against heart disease. If you have been prescribed any medications for high blood pressure and/or cholesterol, it's important to stay on top of them. Along with eating a heart-healthy diet, exercising routinely, and avoiding cigarettes, there are several other lifestyle modifications you can make to help keep your blood pressure and cholesterol under control.
Manage Your Stress
Emotional and environmental stress can contribute to heart disease by increasing blood pressure and cholesterol and contributing to the buildup of arterial plaque. Many people also choose to compensate for stress with activities that harm the heart, like smoking, binge drinking, or overeating.
To minimize the physical and emotional toll of stress, learn healthier coping mechanisms and/or seek effective treatment, such as cognitive behavioral therapy. This form of psychological therapy is particularly effective in treating anxiety and depression in people with cardiovascular disease.
You may also consider some stress reduction techniques like yoga, visualization, breathing exercises, meditation, or muscle relaxation.
Moderate Alcohol
Your healthcare provider may not want you to drink alcohol since it can trigger an arrhythmia. Not to mention, heavy drinking is closely linked to hypertension, coronary heart disease, stroke, and more.
If you choose to drink nonetheless, do so in moderation. A moderate amount of alcohol is considered to be one drink per day for women and up to two drinks per day for men.
Keep Your Appointments
Even if you're feeling well, make sure you keep your healthcare provider appointments and all of your other follow-up care. Better yet, optimize your appointments by preparing a list of questions or concerns you may have in advance.
Don't hesitate to tell your practitioner if you are having trouble obtaining your medicine or if the medication is causing bothersome symptoms. It's important that you take your medication consistently and exactly as directed. If for some reason you can't, your healthcare provider should know.
Complementary Medicine (CAM)
Vagal Maneuvers
• Dunking your face in ice water or applying an ice-cold, wet towel to the face for 15 seconds to trigger the diving reflex
• Holding your breath while trying to forcefully exhale for 10-30 seconds (valsalva maneuver)
Talk to your healthcare provider about using vagal maneuvers since they may not be a good treatment option for you.
Acupuncture has traditionally been used to reduce stress and restore balance to the central nervous system. The benefits of this treatment do not stop there though. While more research is needed, studies have shown that acupuncture may be a safe and helpful additional treatment for certain arrhythmias, particularly atrial fibrillation after conversion to sinus (normal) rhythm.
A Word From Verywell
Arrhythmias are relatively common and can happen at any age. They generally aren't life-threatening and often don't require treatment. Still, you may feel concerned if your symptoms are noticeable or frequent, or if you are at a greater risk of heart disease or stroke. Upon reaching a diagnosis, your healthcare provider will recommend a treatment plan to keep your heart rate under control and lower your cardiovascular risk. Meanwhile, adopting healthy lifestyle changes can have a positive effect on your overall health and ultimately bring you peace of mind.
Frequently Asked Questions
• Can cardiac arrhythmia be treated naturally?
To some degree, yes. Arrhythmias are sometimes linked to stress, and stress-reduction techniques such as exercise, yoga, and meditation have been shown to improve heart symptoms. However, aside from possibly omega-3s and magnesium, supplements have largely not been shown to affect heart health. What does? Eating a healthy diet, such as the DASH diet, that includes plenty of fruits and vegetables, getting enough sleep, and staying connected to others.
• What precautions should I take if I’m diagnosed with a cardiac arrhythmia?
Seeking treatment and keeping up with your medication schedule are key for living with an arrhythmia. Identifying and avoiding your “triggers”—such as alcohol, stress, or caffeine—are also important precautions to take if you have a heart arrythmia. While beginning or maintaining a physical exercise program can significantly benefit heart health, you’ll want to avoid over-exertion: talk with your healthcare provider about what will be safe for you and your individual condition.
• Can a cardiac arrhythmia be cured?
Many arrhythmias are transient—meaning they’ll eventually pass—and do not need treatment. For arrhythmias that do need treatment, a number of options are available, from medication to regulate abnormal heart rhythms to surgical procedures such as ablation or the maze procedure. Lifestyle changes can also improve heart and overall health. While arrhythmias that need treatment may not be completely cured, they can often be successfully controlled with these measures, leading to improved quality of life.
Was this page helpful?
32 Sources
1. American Heart Association. Prevention and treatment of arrhythmia. Updated September 30, 2016.
2. Benowitz NL. Chapter 11. Antiarrhythmic drugs. In: Olson KR, ed. Poisoning & Drug Overdose. 6th ed. McGraw-Hill; 2012.
3. Frommeyer G, Eckardt L. Drug-induced proarrhythmia: risk factors and electrophysiological mechanismsNat Rev Cardiol. 2016;13(1):36-47.
4. Al-Khatib SM, Stevenson WG, Ackerman MJ, et al. 2017 AHA/ACC/HRS guideline for management of patients with ventricular arrhythmias and the prevention of sudden cardiac death. Circulation. 2018;138(13):e272-e391. doi:10.1161/CIR.0000000000000549
5. Mehraein F. A review on amiodarone as an antiarrhythmic drug. Abnormal Heart Rhythms. InTech; 2015. doi:10.5772/60418
6. Page RL, Joglar JA, Caldwell MA, et al. 2015 ACC/AHA/HRS guideline for the management of adult patients with supraventricular tachycardia. Circulation. 2016;133(14):e506-e574. doi:10.1161/CIR.0000000000000311
7. January CT, Wann LS, Alpert JS, et al. 2014 AHA/ACC/HRS guideline for the management of patients with atrial fibrillation. Journal of the American College of Cardiology. 2014;64(21):e1-e76. doi:10.1016/j.jacc.2014.03.022
8. January CT, Wann LS, Calkins H, et al. 2019 AHA/ACC/HRS focused update of the 2014 AHA/ACC/HRS guideline for the management of patients with atrial fibrillation. Journal of the American College of Cardiology. 2019;74(1):104-132. doi:10.1016/j.jacc.2019.01.011
9. Al-Gobari M, Khatib CE, Pillon F, Gueyffier F. Beta-blockers for the prevention of sudden cardiac death in heart failure patients: A meta-analysis of randomized controlled trialsBMC Cardiovasc Disord. 2013;13(1):52. doi:10.1186/1471-2261-13-52
10. National Heart, Lung, and Blood Institute. Pacemakers. Updated January 8, 2021.
11. American Heart Association. Devices that may interfere with ICDs and pacemakers. Updated September 30, 2016.
13. American Heart Association. Ablation for arrhythmias. Updated September 30, 2016.
14. Calkins H, Hindricks G, Cappato R, et al. 2017 HRS/EHRA/ECAS/APHRS/SOLAECE expert consensus statement on catheter and surgical ablation of atrial fibrillation. Heart Rhythm. 2017;14(10):e275-e444. doi:10.1016/j.hrthm.2017.05.012
15. American Heart Association. Cardioversion. Updated September 30, 2016.
16. Damiano RJ, Schwartz FH, Bailey MS, et al. The Cox maze IV procedure: Predictors of late recurrenceThe Journal of Thoracic and Cardiovascular Surgery. 2011;141(1):113-121. doi:10.1016/j.jtcvs.2010.08.067
17. American Heart Association. What is coronary bypass surgery? Published 2017.
18. Benedetto U, Gaudino M, Dimagli A, et al. Postoperative atrial fibrillation and long-term risk of stroke after isolated coronary artery bypass graft surgery. Circulation. 2020;142(14):1320-1329. doi:10.1161/CIRCULATIONAHA.120.046940
19. Hussain SMA, Harky A. Complications of coronary artery bypass grafting. IJMR. 2019;6(1):1-5. doi:10.29252/IJMR-060101
20. Brandhorst S, Longo V. Dietary restrictions and nutrition in the prevention and treatment of cardiovascular disease. Circulation Research. 2019;124(6):952-965. doi:10.1161/CIRCRESAHA.118.313352
21. U.S. Department of Health and Human Services, Office of Disease Prevention and Health Promotion. Physical Activity Guidelines for Americans, 2nd Ed. Washington DC; 2018.
22. Piché ME, Tchernof A, Després JP. Obesity phenotypes, diabetes, and cardiovascular diseases. Circulation Research. 2020;126(11):1477-1500. doi:10.1161/CIRCRESAHA.120.316101
23. Wong CX, Sullivan T, Sun MT, et al. Obesity and risk of incident, post-operative, and post-ablation atrial fibrillation: A meta-analysis of 626,603 individuals in 51 studies. JACC: Clinical Electrophysiology. 2015;1(3):139-152. doi:10.1016/j.jacep.2015.04.004
24. Centers for Disease Control and Prevention. Heart disease facts. Updated September 27, 2021.
25. U.S. Food and Drug Administration. How smoking affects heart health. Updated November 9, 2021.
26. U.S. Department of Health and Human Services, Centers for Disease Control and Prevention; National Center for Chronic Disease Prevention and Health Promotion; Office on Smoking and Health. How tobacco smoke causes disease: The biology and behavioral basis for smoking-attributable disease: A report of the Surgeon General. Centers for Disease Control and Prevention;2010.
27. National Institute on Drug Abuse. What are treatments for tobacco dependence?. Published January 2020.
28. American Heart Association. Stress and heart health. Updated June 21, 2021.
29. Reavell J, Hopkinson M, Clarkesmith D, Lane D. Effectiveness of cognitive behavioral therapy for depression and anxiety in patients with cardiovascular disease: A systematic review and meta-analysis. Psychosom Med. 2018;80(8):742-753. doi:10.1097/PSY.0000000000000626
30. Francula-Zaninovic S, Nola IA. Management of measurable variable cardiovascular disease’ risk factors. CCR. 2018;14(3):153-163. doi:10.2174/1573403X14666180222102312
32. Fei Y, Fei R, Zhang J, Sun Y, Yu Q. Systematic evaluation of efficacy and safety of acupuncture treatment for patients with atrial fibrillationOpen Access Maced J Med Sci. 2019 Jan;7(3):461–466. doi:10.3889/oamjms.2019.036
Additional Reading
|
Composting for Kids
Directed & Animated by Adam Maurer
Highfields Center for Composting presents an animated teaching guide for starting a compost program in your school. In this brief video, students will learn about compost, the importance of closing the loop on their food system and how to separate food scraps effectively.
Learn more at:
Video Rating: / 5
20 thoughts on “Composting for Kids”
1. I would just add veg, fruit, egg-shells, tea bags with egg boxes, grass, leaves and sawdust. Lot of things they mentioned such as meat, dairy etc will attract rats and will stink your garden out.
2. We never put meat, bones, shellfish or many other food scraps in our compost. Only green and brown waste.
3. Not ANYTHING you can eat can go into the compost bin. Some meat and fish cannot be composted, all dairy things shouldn't be, bread products, kitchen oils ex: butter, and acidic items. In fact, most of these things listed can be harmful to the compost or it can ruin it. Good video, but more research should have been done.
4. You can compost all organic matter, including paper and wood, and now there exists a type of compostable plastic. You need to check that first, for if it is conventional plastic, then it goes into the recycling bin.
Comments are closed.
|
Weather Vanes
Throughout history, humans have striven to understand the power of nature. Some concepts have been vastly complicated, and some have been surprisingly simple. One way we have done this is by measuring the direction of wind. We have accomplished that with amazing devices called Weather Vanes.
I've seen weather vanes on top of so many buildings over the years. And they come in so many interesting shapes and sizes. Because of seeing so many, I eventually began thinking a lot about them. A weather vane is a part of nature, just like anything else. But what do they do? What are their intended purpose? And how did they come to be?
The purpose of a weather vane is to tell us which direction the wind is blowing. It is designed so that the wind will push it to the direction of least resistance. Then it will point into the wind, therefore pointing in the direction the wind is coming from. In the picture to the right you can see that the wind appears to be blowing from north to south.
Let me give you a brief history of weather vanes. The oldest known weather vane was on the Tower Of The Winds in Athens, Greece. It's in the shape of the Greek god Triton. It dates back to around 48 BC. Later as the Roman Empire converted to Christianity, they began to put weather vanes on top of their churches. These weren't Tritons anymore, they were now in the form of roosters, and called weather cocks. Now you can find them on the top of churches everywhere. Today a weather vane can be in the form of anything the maker wants, and they come in all shapes and sizes.
You can find weather vanes on many different types of official building today. All you have to do is look up. In almost every case, it will be found on the highest point of the building, because that is where it works the best. You can even find them on houses and barns. Look to the rooftops around your area, and I'm sure you'll eventually see a weather vane yourself.
A hunt for a weather vane should give anyone a fun, quick outing, and a great everyday adventure. Go out and try it for yourself. It doesn't take that long and you shouldn't have to go very far. Happy hunting!
1. Interesting...I suppose with so many internet weather sources, vanes are just an accessory now?
Post a Comment
Comments are good. Comments are fun.
You'll be glad if you leave us one.
Popular Posts
|
Bell of Time: Following the echoes of ancient Edo
A bell rings out across Ueno, tolling the hour three times a day: 6 a.m., noon, and 6 p.m. If you were to prick up your ears and follow the sound back to the source, you would arrive at the Toki no Kane, or ''Bell of Time,'' next to the Ueno Seiyoken restaurant. In this installment, we focus on the dependable sound that has marked the passage of time in the heart of Tokyo for centuries.
By Ueno, a Global Capital of Culture
The bell towerUeno, a Global Capital of Culture
A communal clock for an entire city
The belltower was erected on the site in 1666. At the time, the entirety of Ueno hill was considered part of Toeizan Kaneiji temple's precincts. Even today, the belltower belongs to the temple. It is said that there were more than ten similar belltowers throughout the city, radiating out around Edo Castle, from Ueno to Asakusa, Shiba, and Mejiro. Like a game of telephone, the bells would ring out in succession, after receiving a signal from Edo Castle. Back in the days before watches, the townspeople would tell the time by the number of bells sounded, according to the old lunar calendar.
"Bell of Time" in Ueno central parkUeno, a Global Capital of Culture
The Bell of Time waits patiently on the elevated platform in Ueno Park. The current bell was cast in 1787.
Matsuo Basho's haik poem and "Bell of Time"Ueno, a Global Capital of Culture
A poetic part of the soundscape
For the people of Edo, the bell was a familiar part of life and the aural landscape. Poet Matsuo Basho captured the rhythms of quotidian city life with the verse:
Blossoming clouds and
bells ring out in Ueno
...or Asakusa?
One can imagine Basho sitting in his hermitage in Fukagawa, the sky filled with billowy clouds of sakura in full bloom, when the sound of a distant bell drifted in his window, inspiring him to put brush to paper. The verse speaks to the idyllic passage of time in the peaceful Edo period.
Utagawa hiroshige `Tōto meisho Ueno Toeizan zenzu'Ueno, a Global Capital of Culture
Utagawa Hiroshige documented Kaneiji in “Famous places in the Eastern Capital: Toeizan Temple at Ueno.”
Ring the "Bell of Time"Ueno, a Global Capital of Culture
A percussive baton passed down through the ages
Apart from a few short interruptions during the Meiji era and the Second World War, the task of sounding the bell has been handed down through the generations. True to tradition, the bell is rung three times, as a cue to alert townspeople to begin counting. The bell is rung a further six times at 6:00 a.m. and 6:00 p.m., and 12 times at noon. In June 1996, the sound of the bell was selected as one of the Ministry of the Environment’s “100 Soundscapes of Japan,” for the integral part it plays in the fabric of everyday life in Ueno.
Ueno central park surrounded by greeneryUeno, a Global Capital of Culture
The bell can be heard throughout Ueno Park.
Shinobazu Pond and "Bell of Time"Ueno, a Global Capital of Culture
The sound of the bell ripples out across Shinobazu Pond all the way to Ueno Hirokoji.
People who listen to the sound of the bell 3Ueno, a Global Capital of Culture
The bell is a constant companion for the people who visit Ueno Park year-round to relax.
"Bell of Time" in the eveningUeno, a Global Capital of Culture
A restful refrain
A short walk from the hustle and bustle of Ueno Station, Ueno Park is an uncommon oasis of calm and quietude in the heart of the city. Stepping into the park is akin to stepping back in time to an analog world. It’s said that, when the city is still asleep, the sound of the morning bell travels all the way to Uguisudani Station and Uenosakuragi. As the cityscape continues to evolve, it will do so to the rhythm of this ancient bell, a familiar friend to the locals and a beacon beckoning all visitors to Ueno.
' Bell of Time''Ueno, a Global Capital of Culture
Credits: Story
Courtesy of Implementation Committee for New Concept "Ueno, a Global Capital of Culture” (Ueno Cultural Park)
Photos: Tadashi Okochi
Text: Emi Iwamoto
Editing: Sayaka Tsukuda
Shooting&Editing: Daikichi Kawazumi, Tatsuki Wakamiya
Production: Hechikan Co.
Credits: All media
Google apps
|
Moisture Meters
Our technology contributes to more efficient processing of biomass in power plants, dehydration plants and biomass processing plants all over the world.
Welcome to our Moisture Meter division
In today’s world, knowing the moisture value of biomass is of the outmost importance in order to process the biomass most effectively and thus increase the yield, may it be cellulossic ethanol production, dehydration of animal feed, energy production, pellet production or other applications.
Moisture Meter working principle
Our Moisture Meters are suitable for any biomass and
are used in many different applications.
Moisture Meter system
The technical principle is based on microwaves being transmitted through the bale of biomass from one side to the other thus measuring a large amount of material, and hereby ensuring that the moisture value calculated is not only based on a small random sample.
Then working with microwave based moisture meters it is important to consider reflexions from the nearby invironment as they could disturb the measurements.
That apart - the moisture meter need to know the wolume and the weight of the biomass in order to relate the measuring results to the specific biomass being measured.
What are the advantages of a microwave based moisture meter?
When measuring with microwaves you are in contact with a lot of material instead of just a little sample. You get the measuring result at once. And you get a very accurate result.
Are there any issues to consider then installing the moisture meter?
All you have to consider is no metal between Transmitter and receiver and also that the sensors are in parallel.
What types of material are suitable to measure with microwaves?
Microwave can be used to measure in all organic materials.
How does a microwave based moisture meter work?
The transmitter sends a signal of a known power through the material. Then the microwaves encounter water molecules, the oscillation of the water molecules makes the signal lose power and the weakened signal can thereafter be calculated into a moisture measuring result in percent% of the volume and weight of the material.
Are there any limitations then using a microwave based moisture meter?
There can be limitations if the material is of very little volume or if the density of the material is very high or if the measuring distance is very long. But please feel free to contact us and we will advise you about a moisture sensor solution to your project.
Moisture Meter models for different applications
We installed our first Moisture Meter The DSE4100 in 1992 at the energy company Dong and have since develloped and produced severel models in our DSE4000 series, which are developed for 24/7 operation in industrial environments.
• The DSE4130 - a new generation of the DSE4100 - is used for crane applications and measuring bridges for trucks
• The DSE 4101/4111 is used for conveyer application e.g. measuring dehydrated Alfalfa
• The DSE4200 is used for baler applications then the biomass is being baled in the field.
• The DSE4300 for application in process industry for measuring dry matter suspended or dissolved in liquid process streams
We try to maintain a high level market position in this area through our participation in research projects and extensive development and installation of standard measurement solutions.
We are here when you need us
Our many specialists are happy to provide expert consultation and assistance for any questions regarding moisture measurement in biomass.
For more information, please download the datasheets
|
Phalangium opilio
Phalangium opilio is a species of harvestman belonging to the family Phalangiidae.
Phalangium opilio
Phalangium opilio MHNT Male.jpg
Male Phalangium opilio
Scientific classification
P. opilio
Binomial name
Phalangium opilio
• Dentizacheus minor Rambla, 1966[1]
• Phalangium brevicorne Simon, 1879[2]
• Phalangium cornutum Degeer, 1778
• Phalangium cornutum Linnaeus, 1767
• Phalangium longipalpis Weed, 1890
It is "the most widespread species of harvestman in the world", occurring natively in Europe, and much of Asia. The species has been introduced to North America, North Africa and New Zealand.[3]
Females have a body length of 6–9 mm (1438 in), males are slightly smaller at 4–7 mm (31614 in). Males however have longer legs; the second leg is about 54 mm (2+14 in) in males and 38 mm (1+12 in) in females. Males and females are similarly coloured and marked, although males' markings tend to be less clear. The body has a three-lobed darker "saddle", usually with spots or dashes in the midline. Both sexes show many tubercules with small spikes on the anterior surface of their body.[4]
Mitopus morio has a very similar appearance, but P. opilio can be distinguished by the two pale "denticles" (small teeth-like structures) below the anterior margin of the carapace. Males have long forward-pointing "horns" on the second segment of their chelicerae.[5]
Phalangium opilio is normally an univoltine species and overwinters as eggs. Eggs are laid in moist areas and hatch in three- five months. The immatures undergo several molts and reach maturity in two-three months. These harvestmans usually feed on soft-bodied animals such as aphids, caterpillars, leafhoppers, beetle larvae, mites, but sometime it may scavenge on hard-bodied animals such as various arthropods. [4] They ares also known to feed on Helicoverpa zea eggs, and thus can act as biological pest control for soybean crops. The species is nocturnal, as is typical of opilionids.[6]
1. ^ Biolib
2. ^ GBIF
3. ^ a b Tone Novak; Vesna Klokočovnik; Saša Lip ovšek Delakorda; Dušan Devetak; Franc Janželpvoč (2009). "Preferences for different substrates in Phalangium opilio (Opiliones: Phalangiidae) in natural environment" (PDF). Acta Biologica Slovenica. 52 (1): 29–35.
4. ^ a b Bugguide
5. ^ Jones, Dick (1983), The Countrylife Guide to Spiders of Britain and Northern Europe, Feltham, England: Country Life Books (Hamlyn), p. 310, ISBN 978-0-600-35665-3
6. ^ Allard, Cora; Yeargan, Kenneth (September 2005). "Diel activity patterns and microspatial distribution of the harvestman Phalangium opilio (Opiliones, Phalangiidae) in soybeans". The Journal of Arachnology. 33 (3): 745–752. doi:10.1636/T04-17.1. S2CID 85825506. Retrieved 16 October 2020.
|
Hodgkinson Minerals Area
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
The Hodgkinson Mineral Area was a mining area near the Hodgkinson River about 80 kilometres (50 mi) west of Cairns in the present-day Shire of Mareeba in Queensland, Australia. It was the site of a gold rush in the 1870s.
Prospector James Venture Mulligan discovered gold in the Hodgkinson River area in 1876. Mines were established and many towns developed:[1]
Many miners relocated from the Palmer River goldfields to the Hodgkinson field. As the Hodgkinson field was too far from the port at Cooktown, a new port was established at Cairns. However, it was a very steep trip up through the Barron Gorge to reach Cairns and so explorer Christy Palmerston successfully searched for an easier track (known as the Bump Track) down the Great Dividing Range to the coast leading to the creation of Port Douglas.[1]
In 1877, two towns - Kingsborough and Thornborough emerged in the area with a substantial population of thousand people residing in each town. Just five kilometres away from each other, the towns developed at a fast pace and were soon home to various hotels, retail stores and shops. Mining operations received a further boost with the inauguration of the Cairns-Mareeba rail line in 1893 which improved accessibility to the area.[3]
As with many gold rushes, after a few years, only a few people had made money and the others left, often to another promising new gold rush. There was a brief resurgence of interest during the economic depression of the 1890s as gold became more valuable. But eventually the mining came to an end.[1]
Present day[edit]
Most of the towns have disappeared, apart from a few relics. The Tyrconnel Historic Gold Mine can be visited as a tourist attraction.[1][4]
1. ^ a b c d Cairns Historical Society. "Gold!" (PDF). Archived from the original (PDF) on 12 April 2015. Retrieved 4 April 2016.
2. ^ "Beaconsfield – Mareeba Shire (entry 1940)". Queensland Place Names. Queensland Government. Retrieved 4 April 2016.
3. ^ "Hodgkinson Minerals Area". Queensland Paces.
4. ^ "Tyrconnell Historic Goldmine". www.tyrconnell.com.au. Retrieved 4 April 2016.
External links[edit]
Coordinates: 16°49′00″S 144°49′59″E / 16.81667°S 144.83306°E / -16.81667; 144.83306
|
I was writing something on Reddit, and I was casually checking my writing when I realized I had forced myself into a particularly strange situation.
I was making an argument where I first established a term of art, and then defined what that term of art did not mean as a way to establish what the term of art actually meant.
However, when I went to finish the argument, I got the phrase:
"What X actually is is..."
where X is the subject.
Is this actually correct? Is the word "is" repeated after the phrase? The phrase
"What X actually is..."
doesn't seem correct. It seems like it is missing a verb.
Related-to, but not answered-by, this question. (The answers provide a name, but contradict each other on whether the usage is grammatically-correct, which is the premise of my question.)
What X actually is is a clause that functions as the subject of some such sentence as
/What X actually is/ is this thing that you can only see with a microscope.
Here is another example of a clause functioning as the subject of a sentence:
/The guy who cuts Tom's hair/ lives downtown.
You can use both of them as direct objects of I don't know...
I don't know /what X actually is/
I don't know /the guy who cuts Tom's hair/.
That the word is appears twice in a row in the sentence you ask about may seem disconcerting at first, but it is not unknown.
It seems to be grammatical, according to the following logic:
"What X actually is" is the subject; the second "is" is the verb.
Forget "actually" as unnecessary, and consider this sentence:
What X creates is an image in the mind.
"What X creates" is the subject; the verb is "is".
A comparable sentence would be "What X forms is a circle."
"What X is is an image in the mind" is awkward, hard to parse, but grammatical.
Your Answer
|
The Mountain and Valley Breezes
These are Local Winds.
Another combination of local winds that undergoes a daily reversal consists of the mountain and valley breezes.
On a warm sunny day the mountain slopes are heated more than the valley floor.
Hence, the pressure is low over the slopes while it is comparatively high in the valleys below.
As a result gentle wind begins to blow from valley towards slopes and it assumes the name of valley breeze.
After sunset, the rapid radiation takes place on the mountain slopes.
Here, high pressure develops more rapidly than on the valley floor.
Cold arid heavy air of mountain slopes starts moving down towards the valley floor.
This is known as the mountain breeze.
The valley and mountain breezes are also named as anabatic and katabatic breezes respectively.
|
Ultimate magazine theme for WordPress.
A History of Politicking and Racism
For decades, cannabis users have struggled with criminalization and stigma. However, not all of us know about Harry Aslinger, the War on Drugs, and how his politicking and racism are at the root of anti-drug policies globally.
Harry Aslinger was a United States government official who served under one of the most repressive regimes in American history, namely during the time of J. Edgar Hoover. Under his leadership, he established the Federal Bureau of Narcotics (FBN), the predecessor to the Drug Enforcement Agency, to lobby for harsh penalties on drug use.
Photo by: Penn State Special Collection
Credited for masterminding America’s War on Drugs, his legacy has had lasting and damaging impacts that span continents. Today, we will learn about his crusade against cannabis and how today’s drug laws around the world rest on his erroneous and hate-mongering rhetoric.
Harry Aslinger’s War on Drugs was about Power and Politics
By the time Aslinger was appointed chief of the FBN in 1930, he had already borne witness to Prohibition and how shoddy enforcement and its unpopularity with citizens led to its downfall. Determined not to allow his newly-minted agency to suffer the same fate, he quickly devised a strategy to ensure his position remained as relevant as possible for posterity.
From the moment he took charge of the bureau, Harry was aware of the weakness of his new position. A war on narcotics alone—cocaine and heroin, outlawed in 1914—wasn’t enough… They were used only by a tiny minority, and you couldn’t keep an entire department alive on such small crumbs. He needed more.
Johann Hari in Chasing the Scream
First, he had to reverse his previously held opinion that cannabis was not harmful. To do this, he cherry-picked 200 pieces of “evidence” on how cannabis use was related to violent crime and paraded these trumped-up talking points to the media. As expected, researchers later found out that Aslinger purposefully fabricated cannabis’ connection with violent crime in 198 of these cases. The remaining two cases could not even be verified as having existed. He also actively obscured evidence from credible scientists and medical professionals, a majority of whom vehemently disagreed with his assertions against cannabis.
Working together with yellow journalism, tabloids and other unscrupulous media entities, Aslinger spread misinformation and hysteria to the American public, government and even his overseas counterparts, including Canada’s own Charles Henry Ludovic Sharman. The FBN also had operations in Turkey, Lebanon, Thailand and Europe, extending their influence and propagating their mission worldwide.
Aslinger with Sharman. Photo by: Harris and Ewing Collection
His campaign of fear and hate worked like a charm, culminating in The Marihuana Tax Act of 1937, which made the possession, transport and sale of cannabis illegal throughout the United States under federal law.
Harry Aslinger
Racism and the War on Drugs as a Culture War
On top of solidifying his position as chief of the FBN and making his agency out to be more important than it was, Aslinger had another motivation for crusading against drugs: to vilify and destroy the radical ethos and cultural icons of the Jazz Age.
He easily got white America on his side by resorting to convenient dog-whistles and portraying cannabis as a tool used by people of colour to perpetuate the degeneration of “American values.”
Harry Aslinger
Anslinger published the article “Marijuana, Assassin of Youth” in the same year he imposed the Marihuana Tax. The essay is an extended rant about how getting high will lead to the destruction of America. He further elaborated on his racist and anti-culture views, specifically pinning Jazz music as a catalyst or stimulant for propagating cannabis use. This, of course, is a thinly-veiled assertion that it really is people of colour, through their debased and decadent cultural offerings, who are trying to lure well-behaved white youth over to the dark side.
Those who first spread its use were musicians. They brought the habit northward with the surge of “hot” music demanding players of exceptional ability, especially in improvisation. Along the Mexican border and in southern seaport cities it had long been known that the drug has a strangely exhilarating effect upon the musical sensibilities.
Harry Aslinger
Jazz singer Billie Holiday was just one of the prominent musicians and cultural icons targeted by Aslinger. He hounded her incessantly, especially after releasing her song “Strange Fruit,” a sharp chastisement of racism and lynching in America. Friends and colleagues often attribute her death in part to the stress she faced due to Aslinger’s harassment. Aslinger himself admitted as much in his 1964 book, The Protectors. In the chapter “Jazz and Junk Don’t Mix,” he bragged about handcuffing Holiday on her death bed due to suspicion of drug use and possession. Aslinger also kept many files about his operations and ideas, including “Marijuana and Musicians,” which detailed his plans for a nationwide crackdown on jazz musicians.
Supposedly, even the popularity of the terms “marijuana” or “marihuana” was a dog-whistle by Aslinger. He purportedly moved away from calling the drug “cannabis,” instead preferring the more “exotic” and “foreign-sounding” marijuana as a way to stir up xenophobic sensibilities.
For decades and into the present, people of colour continue to bear the brunt of the War on Drugs. The United States has the highest incarcerated population of any country, and drug laws disproportionately affect black and brown communities.
The creation of a prison industrial complex no doubt benefited government officials like Harry Aslinger. In the ensuing decades, politicians continue to use fear mongering and scapegoating to solidify their power.
Today, we know the War on Drugs is unscientific, racist and detrimental to communities. Yet, global governments continue to push anti-drug laws, with little acknowledgement that their crusades were fuelled and justified by the rantings of a power-hungry racist.
Source link
Leave A Reply
Your email address will not be published.
|
Translation and Exegesis: Travis Zadeh’s The Vernacular Qur’an
By Michael Pregill
The claim that Muslims do not translate the Qur’an, or rather that a translation of the Qur’an is not
really the Qur’an at all but only a dim approximation of the basic sense of the text, has often been
repeated by scholars. This notion has even informed the production of translations by Muslims
themselves at times, as in the case of Marmaduke Pickthall’s famous The Meaning of the
Glorious Koran (1930)—the title implying that the text in English represents only the meaning,
with something substantial literally having been lost in translation. It is difficult to escape the
conclusion that any rendition of the Qur’an into the vernacular—that is, into any language other
than the original Arabic—should and must have a secondary and marginal status in Islamic
society.
But there is a paradox here, inasmuch as the public recitation and explanation of the Qur’an has
played a significant role in attracting converts to Islam since the earliest days of the community’s
expansion after the Arab conquests. Historically, the process of reciting and explaining the
Qur’an surely involved some element of translation; the parallel with the reading of the Torah
and exposition of targum in Jewish synagogue services is obvious here. Further, scholars have
often asserted (at least since the time of Goldziher’s seminal Die Richtungen der islamischen
Koranauslegung, 1920) that tafsir (Qur’an commentary) most likely originated in this context,
built upon the most ancient understandings of the Qur’an that had circulated among the earliest
followers of the Prophet. Initially grounded in the need to interpret the Qur’an’s essential message
for converts—often with considerable mythological and homiletic expansions—this tradition
eventually coalesced into one of the core disciplines within the ulum al-Quran or “Qur’anic
sciences.” All of this implies that translation of the Qur’an has in fact been central to Islamic
society, at least at times, and that such translation has been absolutely vital for the survival and
expansion of the community at numerous junctures in Islam’s long history.
The complex relationship between translation of and commentary upon the Qur’an is explored in
depth in Travis Zadeh’s magesterial and far-ranging study, The Vernacular Qur’an: Translation
and the Rise of Persian Exegesis (Oxford University Press in association with the Institute of
Ismaili Studies, 2012), which specifically examines the phenomenon of translation as it lies at
the foundation of both Persian literary and Iranian Islamic religious tradition. The significance
of this study cannot be overstated. Iran was most likely the first region or culture area outside
of Arabia proper to achieve a Muslim majority. Further, several of Iran’s urban centers became
preeminent centers of religious learning in the ninth and tenth centuries, producing ulama whose
works became critical for the further development of the religious sciences, especially hadith;
and, as is well known, by the high Middle Ages, so-called New Persian came to rival—and
eventually surpass—Arabic as the preeminent literary language of Islamic society, at least in the
eastern regions of the Dar al-Islam.
Zadeh’s study explores the intersections between theological and juridical controversies,
devotional practice, and an emerging Persian literary culture, informed both by an admirable command of the theoretical literature on translation and a nuanced understanding of the complex
conjunction of factors that contributed to the misrepresentation of Qur’an translation as somehow
inferior or illegitimate. In Western scholarly discourse, the claim of the Qur’an’s untranslatability
originates in medieval Christian polemic, in which Muslims’ supposed insistence that the Qur’an
can only be approached in the original Arabic was caricatured as proof of Muslim “rigidity”
and legalism – ritual rectitude purportedly being more important in Islam than rational
understanding. This gross oversimplification of Muslim attitudes was then reinforced by the
misapprehensions of more contemporary (and well-meaning) scholars such as Wilfred Cantwell
Smith, who inadvertently conflated theological assertions of the Qur’an’s inimitability with some
jurists’ opposition to the use of verses of the Qur’an in other languages in the devotional context
into a blanket prohibition on translation that somehow applied to all times, places, and contexts.
Smith thus characterized an opposition to translation as somehow essential to Islam, but as
Zadeh demonstrates, the translation of the Qur’an into Persian, even for devotional purposes,
appears to have been a basic fact in the Iranian milieu; the “early pattern of wrapping the sacred
language of the Qur’an in Persian reflects the practical hermeneutic, if not liturgical, importance
of approaching scripture through a linguistic medium other than Arabic” (133). Moreover,
translation into Persian was not simply driven by the practical considerations of disseminating
the Qur’an in a recently converted, and thus only superficially acculturated, population.
Rather, Zadeh’s theoretically sophisticated approach shows that the general recognition of the
polyvalence of scripture—for example, the idea that the Qur’an was revealed in seven ahruf
(modes or recitations)—opened up a wide discursive space in which many scholars not only
tolerated but even explicitly sanctioned the ongoing use of the Qur’an in Persian and other
languages for a variety of purposes.
Astonishingly, Zadeh’s treatment of his subject stretches from the period just after the Arab
conquests of the seventh century all the way to the flourishing of Persian tafsir in the eleventh
and twelfth centuries with figures such as Abu’l-Futuh al-Razi, Surabadi, and Isfara’ini, as well
as discussing the later reception of this tradition in subsequent centuries. Even as the use of
Persian renditions of Qur’anic verses was largely abandoned in specifically devotional contexts,
the dynamic interplay between the Arab and Iranian cultural and linguistic milieux continued to
inform the evolution of Islam in the Persian-speaking world. As their tradition matured, Iranian
scholars continued to have a complicated relationship with Arab Islamic religious authority and
exegetical discourse—especially the latter, as “exegesis served as a platform for the articulation
of religious commitments” (448), particularly as attitudes towards Persian came to inform and in
turn be inflected by sectarian considerations.
This brief notice hardly does justice to Zadeh’s wide-ranging, yet lucidly argued and eloquently written, treatment of the Qur’an in Persian and the Persianate world. We may hope that his nuanced and imaginative study draws attention to this long-neglected subject and inspires new scholarly research in this area in the future.
© International Qur’anic Studies Association, 2013. All rights reserved.
|
Domande riguardo a frasi esempio con, spiegazione d'utilizzo di "Obama"s
Il significato di "Obama" In varie frasi ed espressioni.
Q: Che cosa significa Obama appeals to the listeners’ emotions by employing this metaphor.?
A: "Appealing to someone's emotions" means acting in a way that causes an emotional reaction within someone, usually making them sympathetic towards your aims. In this context it means that the metaphor Obama used was meant to make the listeners feel a certain way. :)
Q: Che cosa significa Obama simply shrugged off the comments.?
A: Obama heard the comments but didn't listen to it. he just ignored it or didn't let it bother him
Q: Che cosa significa "I just heard about some of this," Obama subsequently told reporters at a press conference in China, referring to Duterte's comments. "But I have seen some of those colorful statements in the past, and so, clearly, he’s a colorful guy。two colorful?
A: Lively, dramatic, a little too much
Q: Che cosa significa "As we all know, Obama win the election."?
A: It's talking about the past:
As we all know- something that has already happened and is irrefutable
Q: Che cosa significa Mr. Obama made the birth certificate public in April 2011.?
A: a birth certificate is a government issued paper that documents your birth
Parole simili a "Obama" e le sue differenze
Q: Qual è la differenza tra Obama to visit Japan. e Obama is going to visit Japan. ?
A: "Obama to visit Japan" sounds more like a newspaper headline whereas "Obama is going to visit Japan" sounds like what we would say in conversation.
Traduzionde di "Obama"
Q: Come si dice in Inglese (Stati Uniti)? Tổng thống Obama đã ăn bún chả khi tới Việt Nam
A: President Obama ate bún chả when he came to Vietnam
Q: Come si dice in Inglese (Stati Uniti)? How do you say How to ask That the Mr.Barack Obama was the which number of president in USA ?
how should I apply "Consecutive?"
Q: Come si dice in Inglese (Stati Uniti)? who is Obama?
A: Check the question to view the answer
Q: Come si dice in Inglese (Stati Uniti)? Obama,the president of usa,insists to building camps for evacuation people in usa
A: Obama, the president of the United States of America, insists on building evacuation camps for citizens.
Altre domande riguardo "Obama"
Q: Mr. Obama said as he left office he would comment on Mr. Trump's actions at "certain moments where I think our core values may be at stake."
Why does it say "he would comment" instead of "he commented"?
A: "would" means he has not done it yet and will. "he commented" means that he already commented.
Q: "How does it feel having a three in vertical?" This is what Obama mentioned in the clip Between two Ferns with Zach Galifanakis. What does it mean? And Zach responds with "it's three inch horizontal." I didn't get this joke.
A: It's got two meanings.
In basketball terminology, he could only jump 3 inches off the ground.
And it could also be a penis joke. A 3 inch vertical in slang means that the penis is 3 inches when erect. And 3 inches horizontal is 3 inches when flaccid.
Q: Mr. Obama who was a former president in the United State announced the enduring farewell speech. sembra naturale?
A: 発表するのはannounceだけどpresentの意味もあります!この状況にpresentを使ってください。announced は「明日スピーチするから」を言う。present はスピーチをすることです!
そしてここにenduringを使えば間違ってないんだけどちょっとかつぃかな。(that) will never be forgottenは同じ意味でもうちょっと自然です。
Former U.S President Barack Obama, presented a farewell speech that will never be forgotten.
On January 11th of this year, former U.S President Barack Obama presented a farewell speech that will never be forgotten.
On January 11th, 2017 former President Barack Obama, presented a farewell speech that will never be forgotten.
Q: I wonder whether what Obama said is all coming from what he thought himself. sembra naturale?
A: I wonder if everything Obama says is what he actually thinks.
Q: What does the last "I got it from here" by Obama mean?
The initial public reaction to the President’s decision appeared to be overwhelmingly positive, as news of the executive order sent his approval rating soaring to seventy-nine percent.
Asked by reporters if he had any message for members of Congress, the President said, “I got it from here.”
A: "I got it from here" means handle it / deal with something from now on. It's the same with "i'll take it from here" :)
Significati ed usi per simili parole o frasi
Domande Recenti
Topic Questions
Domande suggerite
|
Pharmacy is a medical and administrative science that links chemistry and medical science. It is responsible for the creation, discovery and synthesis of medicines and other drugs. It includes a network pharmacies all around the globe and provides services for pharmacies and health care organisations that provide prescription services. Pharmacy’s main functions are to produce drugs and to prescribe them for patients. It also provides information for pharmacists and health professionals regarding diseases and their treatment. Pharmacy is therefore an important aspect of the medical world.
Canadian Pharmacy
The scope of pharmacy includes the manufacture, processing, preparation, administration, distribution and sale of medications. With the growth of technology, pharmacy has emerged as an important part of the medical field and is expected to grow in the coming years. The rapid growth in the pharmaceutical industry is due to the introduction and improvement of diagnostic methods and new technologies.
As the population increases, pharmacy technicians will be in demand. Many pharmaceutical companies are expanding their operations in other countries as a result. The demand for pharmacist technicians will rise as more pharmaceutical manufacturing plants open in developing countries. There are many career options open to students interested in pursuing a career in Canadian Pharmacy. Here are some common career options.
One of the most popular career paths in pharmacy is drug development. As a pharmacist technician, you can work as a consultant with pharmaceutical companies to develop new drugs for marketing. Some of the companies that offer job opportunities in drug development include Abbot Laboratories, Novartis Pharmaceuticals, Janssen Pharmaceuticals and Sanofi Aventis.
Pharmacy technicians is another common career path in pharmacy. Pharmacists can collaborate with doctors, nurses, or dentists to create the medicines they prescribe. Most pharmacists work with patients directly by providing prescriptions to them. Pharmacy technicians, on other hand, manage the inventory of medicines in a hospital and keep records of prescriptions. These pharmacists often consult with healthcare professionals to create a medication schedule.
A common career option for pharmacists is that of pharmacy administrators. These administrators are responsible to approve prescriptions and manage the workflow of pharmacies. They are usually responsible to manage the pharmacy staff’s workstations, clinic assets, and data. Pharmacy administrators are pharmacists but also serve as auditors, ensuring that assets are being used properly and for other purposes.
|
Main Content
Euler number of binary image
eul = bweuler(BW,conn) returns the Euler number for the binary image BW. The Euler number (also known as the Euler characteristic) is the total number of objects in the image minus the total number of holes in those objects. conn specifies the connectivity. Objects are connected sets of on pixels, that is, pixels having a value of 1.
collapse all
Read binary image into workspace, and display it.
BW = imread('circles.png');
ans = -3
Input Arguments
collapse all
Binary image, specified as a 2-D numeric matrix or 2-D logical matrix. For numeric input, any nonzero pixels are considered to be on.
Connectivity, specified as the values 4 for 4-connected objects or 8 for 8-connected objects.
Data Types: double
Output Arguments
collapse all
Euler number, returned as a numeric scalar.
Data Types: double
Extended Capabilities
GPU Code Generation
See Also
Introduced before R2006a
|
How did Native Americans vote? (user search)
Welcome, Guest. Please login or register.
Did you miss your activation email?
November 29, 2021, 03:18:14 PM
Talk Elections
Presidential Elections - Analysis and Discussion
2020 U.S. Presidential Election (Moderators: Likely Voter, TJ in Oregon, YE)
How did Native Americans vote? (search mode)
Pages: [1]
Author Topic: How did Native Americans vote? (Read 497 times)
JD Vance For Senate
Christian Man
Jr. Member
Posts: 959
Political Matrix
E: 1.68, S: 0.52
« on: October 14, 2021, 04:05:03 PM »
I think Native Americans are more likely to vote against their state government due to oppression and lack of recognition/racism. Southern/Western Natives are more likely to be Democratic while Midwestern/Northeastern are more likely to vote Republican for similar reasons, which can explain why the Natives of The Dakotas are powerfully Democratic, while the Native areas of Oklahoma are a lot closer than the white areas. NC is an interesting contradiction to my claims though, as Trump increased on this group without NC flipping, but he did federally recognize the Lumbee tribe (well Obama did but Trump took credit). That area of NC is also socially conservative (Robeson county is only 1 of 2 NC counties to allow corporal punishment to be used in school) so it's probably more complicated than a political party being in power.
Pages: [1]
Jump to:
Login with username, password and session length
Powered by SMF 1.1.21 | SMF © 2015, Simple Machines
Page created in 0.027 seconds with 12 queries.
|
Google Search Negatively Affects Human Memory: Study
brain-imageGoogle search has now become a part of our lives. Most of the people use it to find information from internet. But have you ever thought of its effect on our brain?
As long as we know where to find information, we are less likely to remember it. The easily accessible data anywhere, anytime is changing the way people handle information. So in effect Google is making people dumb, by destroying our memories.
A new study has revealed findings that could just go to show that Google could be destroying our memories.
google LogoAccording to the study published by Psychology professors from the Columbia University, the University Of Wisconsin-Madison, Harvard University:
“People remember less by knowing information than by knowing where the information can be found. The Internet, with its search engines such as Google and databases such as IMDB and the information stored there, has become an external memory source that we can access at any time. It has become so commonplace to look up the answer to any question the moment it occurs, it can feel like going through withdrawal when we can’t find out something immediately.”
[advt]The four tests that the professors conducted on individuals in short, confirmed that searching for information on the internet could be wiping out our “internal memory”, which stores data. “When people expect to have future access to information, they have lower rates of recall of the information itself and enhanced recall instead for where to access it”, said the study.
So instead of remembering data, say what happened during an event, we tend to remember which sites we saw that information on, or where on Google we found the site.
According to the study “These results suggest that processes of human memory are adapting to the advent of new computing and communication technology. We are becoming symbiotic with our computer tools growing into interconnected systems that remember less by knowing information than by knowing where the information can be found.” “This gives us the advantage of access to a vast range of information—although the disadvantages of being constantly ‘wired’ are still being debated”, concluded the professors in the study.
Be the first to comment
Leave a Reply
Your email address will not be published.
|
Best answer: What does bacteria do to the host?
How does bacteria affect the host?
Bacteria are much larger than viruses, and they are too large to be taken up by receptor-mediated endocytosis. Instead, they enter host cells through phagocytosis. Phagocytosis of bacteria is a normal function of macrophages. They patrol the tissues of the body and ingest and destroy unwanted microbes.
Do bacteria infect host cells?
Why does bacteria need a host?
What is a bacterial host?
Definition. The bacterial host response is the process by which the host interacts with, and responds to, bacteria that colonize or infect it. This includes defense mechanisms such as the immune response.
Does bacteria need a host to survive?
THIS IS INTERESTING: Can I point a subdomain to a different host?
How do bacteria adhere to host cells?
Bacteria may resist physical removal by producing pili, cell wall adhesin proteins, and/or biofilm-producing capsules that enable bacteria to adhere to host cells. … Bacteria can typically make a variety of different cell wall adhesins enabling them to attach to different host cell receptors.
How do bacteria cause infection?
A bacterial infection occurs when bacteria enter the body, increase in number, and cause a reaction in the body. Bacteria can enter the body through an opening in your skin, such as a cut or a surgical wound, or through your airway and cause infections like bacterial pneumonia.
Do bacteria reproduce inside the host?
Viruses are only “active” within host cells which they need to reproduce, while bacteria are single-celled organisms that produce their own energy and can reproduce on their own. Bacteria serve many vital roles in nature outside of being infectious.
Can bacteria live independent of a host?
Bacteria are single cell organisms that can reproduce independently of the host. They cause infections such as such as strep throat, urinary tract infections, and pneumonia.
How do bacteria damage cells?
Sometimes bacteria multiply so rapidly they crowd out host tissues and disrupt normal function. Sometimes they kill cells and tissues outright. Sometimes they make toxins that can paralyze, destroy cells’ metabolic machinery, or precipitate a massive immune reaction that is itself toxic.
|
When did quilting become popular?
How did quilting become known in Europe?
According to Robert Bishop’s and Jacqueline M. Atkins’s Folk Art in American Life (1995), quilting “became known in Europe during the Crusades, when it was learned that the Turks wore several thicknesses of fabric quilted together under their armor.
Why is quilting so popular?
An opportunity to play with amazing colors, textures and patterns to make wonderful things. Perhaps for many quilting and patchwork fill in the hours and provide woman with a common bond, an excuse to gather with others. To chat and to share ideas, projects and a little bit about their lives.
What is the difference between Mosaic and patchwork?
As nouns the difference between mosaic and patchwork
is that mosaic is mosaic while patchwork is a work, such as a blanket, composed of many different colors and shapes, sewn together to make an interesting whole.
What does piercing mean in quilting?
Piecing– In quilting, piecing is the process of creating quilt blocks by sewing together pieces of fabric in a pattern. Piecing can be as simple as sewing together squares of fabric for a 4-Patch or it may involve more complicated shapes and techniques.
THIS IS FUNNING: Your question: Can glass mosaic tiles be painted?
Why do people love quilting?
Quilts keep people warm. They may warm the heart, but they also warm the body. And what better way to keep you and your family warm than under one of your own quilt creations! Quilt making is an art form.
Do you think it is worthy to study quilting Why?
Creating items with sewing and quilting is a confidence booster, is good for concentration and relaxation, and allows you to show your artistic side. Your right brain gets some exercise while producing endorphins and serotonin, so you’ll feel great by the time you’re done.
What is the purpose of quilting?
Which country did quilting originate?
Quilting can be traced back as far as ancient Egypt. In the British Museum is an ivory carving from the Temple of Osiris at Abydos found in 1903 which features the king of the First Egyptian Dynasty wearing a cloak or mantle that appears to be quilted.
Which country’s settlers introduced quilting to the United States?
Particularly in north America, where early settlers from England and Holland established quilting as a popular craft, there is a tradition of a quilt-making ‘bee’ for a girl about to get married, with the aim of stitching a whole quilt in one day.
THIS IS FUNNING: What is Mosaic inheritance?
Why did slaves make quilts?
|
Property Taxes by State: Chart
Property taxes vary widely between states in the U.S. Property taxes are assessed as a percentage of the market value of a property. Hence if house prices increases in a year, a homeowner will pay more in property taxes for the same property. The higher the value of the property the higher the taxes. States property taxes to fund all types of expenses such as funding for schools, libraries, parks, etc. Generally property taxes tend be high for the services provided. However unlike other things property taxes and its uses are hyper local. So in one community higher property taxes may lead to better services and facilities while in another it may not.
Property taxes are mandatory and is usually one of the largest expenses a homeowner faces after mortgage payments. Over the lifetime a homeowner may end up paying hundreds of thousands of dollar in taxes for the privilege of owning the home.
Some of the states with high property taxes are Texas, Illinois, New Hampshire and New Jersey. So it is not uncommon for some people to flee from high property tax states to lower tax states.
The following chart shows property taxes as percentage of occupied-housing value by state for 2019:
Click to enlarge
Source: How High Are Property Taxes in Your State? by Jannelle Cammenga
Leave a Reply
|
A pin joint simulation machine has been built to test a real landing gear pin joint under realistic loading and reciprocation conditions. The pin is loaded hydraulically using a hydraulic actuator to apply a fixed displacement cycle whilst measuring the reactive torque. The machine was used to measure the torque cycle (and hence friction coefficient) required to operate the joint. In this work a method of evaluating different formulation greases has been proven. This involved measuring their frictional torque and also evaluating performance using a Sommerfeld type approach that displays the different lubrication regimes in the joint for different conditions. Measured friction coefficients were in the region of 0.02 to 0.12 depending on the joint load and articulating speed. In actual gear the surface sliding speed is low and so the joint operates in the boundary regime. The required torque and coefficient of friction have been related to the lubrication mechanisms occurring as a function of articulation angle, reciprocal frequency and applied axial load for lubrication starvation in a reciprocating journal bearing.
This content is only available via PDF.
You do not currently have access to this content.
|
Call us now +1 713 429 1909
Difference between 3D BIM & 2D Drafting Workflows
Both workflows will be compared at a functional level, including phase-by-phase comparisons. Upon completion, you will understand five major differences between 3D BIM & 2D drafting workflows.
Automated management of project documentation
2D drafting workflows produce DWG files with many dependent external reference definitions (XREFs). File-by-file management is typically used for these files, which are organized into sheet sets. A manual process is used to update documentation when design changes occur. A sheet set can be a very complex process with a high chance of errors if each view of each drawing is not exactly the same.
Databases always get updated automatically, as do the sheet sets that make up final drawing deliverables. All generated drawing views are automatically updated as soon as a change is made to the BIM model. A detailed review of the changed drawings is flagged, which assists in maintaining the integrity and accuracy of the sheet set.
Design captures using 3D massing and study models
Maquettes and hand sketches are usually used as visuals when selling a conceptual design to a client when using a 2D drafting-based workflow. In the past decade, most companies, including firms that use BIM, have created and rendered models using surface modeling tools like Trimble's SketchUp. Designers can produce high-quality renderings, which are credible, by creating 3D study models.
The use of more flexible tools, such as SketchUp, is often seen in 3D BIM workflows, though almost every 3D BIM editor allows the creation of concept designs straight from the editor.
In the downstream process, BIM technicians convert the study model into CAD-accurate BIM.
SketchUp, however, is a particular concern since it allows the design of non-buildable structures. There is a class of ?fantasy buildings? that are aesthetically pleasing but are not constructible. The disdain for ?split? concept workflows stems from the fact that they cannot be built, and thus are not viable for 3D BIM representation.
Smoother movement from concept to detail design
In 2D drafting workflows, 2D study models are often dissected after client approval to help in the creation of view drawings. The exterior elevations and plan views are usually the only elements transferred from conceptual surface modeling due to limitations in the software. Often, study models are not as accurate as they should be. Drawing sheets should be started from scratch each time since it is generally simpler and safer.
In true BIM fashion, the tech takes the study model and translates it into a valid model. The schematic model can suffer from inaccuracies, resulting in a ?start from scratch? episode. Because the study model was created solely to visualize data, it is flawed and not reusable. These bad numbers cannot be carried forward into a BIM, which must be accurate according to CAD.
Automated updates of construction drawing
A 2D drafting workflow has limited connections between files. Sheet sets are likely to be created for individual drawings, but drawing files and XREF dependencies are managed manually. DWG files are in essence stand-alone entities due to the use of manual management.
A manual setup is also done for each sheet. Every view is developed, organized, and annotated individually. There is a high probability of error due to missed updates on changes.
Plan views, elevations, and room sections, generated by BIM, are the views that appear on the drawings sheets for a project.
Since BIM is information-centric, any changes made to the model are automatically reflected on each sheet. The change sheet will be highlighted in the software as well for a closer examination.
Minimized potential for human error
Maybe the truth is that in 2D, things can go wrong due to a lack of continuity of data. It happens frequently. The more drawings that are checked, the more likely it is that an error will occur. When your construction documentation does not reflect precisely your design, you may incur a lot more costs.
You should update all drawings with the updated BIM. By using BIM integrated into the design process, fewer drawings must be rechecked regularly because the focus is not on downstream effects of design changes, but on the changes themselves. You can then focus on what you do best, while your computer helps you manage your design decisions.
Difference between 3D BIM & 2D Drafting Workflows
|
News Release
Penn-led team prevents memory problems caused by sleep deprivation
Peer-Reviewed Publication
University of Pennsylvania
Targeting the Hippocampus in Sleep Deprivation
image: The hippocampus of a mouse in the University of Pennsylvania study glows green where cells have taken up a receptor that triggers a cAMP signalling pathway. After administering the ligand to the receptor, researchers could selectively boost cAMP levels in this region and this cell type only. They found that 'rescuing' these cells with a shot of cAMP preventing the memory problems that sleep loss can induce. view more
Credit: University of Pennsylvania
Sleep is a critical period for memory consolidation, and most people don't get enough. Research has shown that even brief periods of sleep deprivation can lead to deficits in memory formation.
Robbert Havekes was the lead author on the study. He is a research associate in the lab of Ted Abel, the study's senior author and Brush Family Professor of Biology in Penn's School of Arts & Sciences. Coauthors from the Abel lab included Jennifer C. Tudor and Sarah L. Ferri. They collaborated with Arnd Baumann of Forschungszentrum Jülich, Germany, and Vibeke M. Bruinenberg and Peter Meerlo of the University of Groningen, The Netherlands.
"The challenge following this important study," Abel said, "was to determine if the impact of sleep deprivation was mediated by particular regions of the brain and particular neural circuits. We suspected that the hippocampus, the brain region that mediates spatial navigation and contextual memory, was critical."
"It sounds weird. Why would you put a receptor there that is never going to be activated?" Havekes said. "The trick is, you follow that up by giving mice the ligand of the receptor, which is octopamine, and that will activate the receptors only where they are present."
"This way, we could manipulate the cAMP pathways that we previously saw being affected by sleep deprivation but selectively in specific neural circuits in the brain," Havekes says.
Then, because previous research had shown that cAMP signaling contributes to hippocampus-dependent memory consolidation in two time windows -- first directly after training and again three to four hours after training -- the researchers gave mice in the experimental groups injections of octopamine in both of these windows to boost cAMP levels.
"If the mice had learned and remembered the location of the objects during their training, then they would realize, okay, this is the object that has moved, and they'll spend more time exploring that particular object," Havekes explained. "If they didn't remember well, they would explore all the objects in a random fashion."
The researchers found that the sleep-deprived mice that received the octopamine injections spent more time exploring the object that had moved, just as mice that had not been sleep deprived did. On the other hand, sleep-deprived mice that didn't express the receptor explored all the objects at random, a sign that they had failed to remember the locations of the objects from their initial training as a result of the brief period of sleep deprivation.
"What we've shown is this memory loss due to sleep deprivation is really dependent on misregulation of cAMP signaling in the excitatory neurons of the hippocampus," Havekes said.
"At least in the mouse using these sophisticated tools, we're able to reverse the negative impact of sleep deprivation on cognition," Abel said.
|
Contact Us
Parent Guide: Tips to Improve Focus in Children
September 14, 2021
parent and child sitting at kitchen counter, dad with arm around child who is looking away uninterested
The pandemic has had a major impact on parents and families. For some parents, lockdowns meant quickly adapting to working from home. Many schools were also closed, leaving many children and youth in at-home virtual learning environments for weeks or even months.
Having your children at home may have meant spending more time as a family, which might have given you fresh insight into your child's behavior.
Like adults, children also experience a range of emotions. They can experience fears and worries, have trouble focusing, feel bored or upset, or display disruptive behaviors. While those feelings and behaviors can be perfectly normal, it can be challenging to differentiate between bad behavior and a larger issue.
Signs of Focus Issues in Children
The ability to sustain attention is vital for children and adolescents because it helps them learn, develop new skills, and stay motivated. If your children are struggling to concentrate on a given task, it can be helpful to monitor their behavior to identify possible areas to address.
Here are some signs that may indicate your child may be having problems in school:
• Receiving low grades
• Missing classes
• Failing to do their homework
• Not following the lessons
• Forgetting the teacher’s instructions
• Inability to sit still
• Constantly losing things or lacking organization
Some kids may have difficulties in their relationships with family or friends. Common signs of these issues include:
• Difficulty making or keeping friends
• Irritability, bad mood, or bad behavior
• Ignoring others when spoken to directly
• Forgetting daily activities, chores, and appointments
• Having a hard time keeping up in conversations
• Acting impatiently or not taking turns
• Appearing distracted or spending a lot of time daydreaming
Contributing Factors
Here are some other factors that may also temporarily disrupt attention, or influence focus long-term in children and adolescents:
• Daily stressors like fighting with a friend, or excitement over an important event
• Stressful changes like a death in the family, moving homes, parents' separation, or the sudden shift to distance learning
• Lifestyle factors such as lack of sleep – when kids are sleep-deprived, they can have trouble with memory, learning, and concentrating. Maternal drug, alcohol, or tobacco use during pregnancy and premature birth are other risk factors.
• Brain or head injury like concussions that can occur from sports, falling, fighting, or other accidents
• Genetic factors such as a family history of attention disorders and other genetic factors that can contribute to behaviors relating to focus, working memory, and/or long-term memory
How Can I Improve My Child's Concentration and Focus?
There are several simple things that you can do to improve your kid’s focus and attention, including:
Developing Healthy Habits
Eating a balanced diet, getting physical exercise, and ensuring your children get the recommended amount of sleep per age group may ease your child's concentration problems.
Limiting Screen Time
Screen exposure can reduce children's attention span and psychological well-being. Preschoolers and adolescents spending more time per day in front of a screen have more behavioral problems and reports of aggressive behavior.
Reducing Distractions
If you want your child to focus on a specific task, eliminate distractions that might get in the way of achieving this goal. Help your child concentrate by creating a quiet space in the house where they can study and do their homework. Turn off all devices, and keep their toys away from this area. If possible, avoid interruptions by siblings or pets.
Taking a Break
When kids spend too much time doing the same thing, they can feel mentally exhausted. It's important to take regular breaks to clear the mind and return to the task with fresh energy.
Dividing Large Tasks into Smaller Units
It may be easier for your child to overcome a challenge or complete a school assignment if you break it into smaller milestones. Instead of asking them to clean their entire room, you could ask them to make their beds. Then later, ask them to put away their clothes or toys. Accomplishing these smaller tasks can boost their confidence and give you an opportunity to congratulate them on a job well done several times throughout the process.
Meditating Together
Mindfulness or meditation involves maintaining consciousness of the present moment. This can relieve stress and anxiety and improve focus. One easy way to practice mindfulness with your children is to ask them to sit with you and focus on their breathing. Whenever the mind begins to wander, just gently bring focus back to the breath. One study showed that adolescents who meditated daily over 1-2 years experienced improvements in attention and focus.
Being Supportive
When parents show emotional support, kids are more likely to explore their environment and show interest in tasks. They also tend to feel more confident and motivated and may improve their overall concentration.
Talking about Emotions
As a parent, it's important to offer your children support and care. This may involve talking about the feelings and struggles that your child is experiencing and doing your best to understand why they are behaving in a certain way. You can also let your kids know that it is normal to experience frustration, inattention, and even sadness from time to time.
Understanding their Unique Genetic Profile
Your child's genes can influence how they think, feel, and behave in certain situations. Some genetic predispositions in focus and memory, such as inattentiveness, distractibility, or impulsivity, can make it harder to concentrate in certain situations. Knowing your child's possible genetic predispositions can help you identify strategies to target the underlying genetic and biological mechanisms involved, to take steps towards improving their focus and attention.
Genetic Testing For Mental Health
The Genomind Mental Health Map™ is a DNA-based assessment tool for mental health and wellness that provides an in-depth analysis of genetic variants relating to 7 Core Genetic Mental Health Capabilities™, including Focus & Memory, Sleep, and more. Identifying your child's genetic predispositions gives you an important foundational understanding for addressing their mental health and wellness concerns. The Mental Health Map pairs actionable insights with personalized recommendations to sustain and improve mental wellness. No prescription is required.
For example, some individuals have a variant of their BDNF gene, which is associated with altered BDNF secretion. That genotype has been linked to lower scores on tests of working memory and impeded long-term memory when fatigued, meaning more difficulty keeping track of important information while performing tasks.
However, there are ways to compensate for that deficiency, such as exercise. For example, endurance exercise has been shown to increase BDNF by 200-300%, leading to improvements in working memory that can potentially even exceed those without the variant. That knowledge of how sensitive they are to the effects of exercise provides those individuals with a personalized incentive to prioritize their exercise routine. As healthcare providers and other outlets recommend exercise to everyone, the suggestion pertinent to the individual’s specific circumstance may carry more weight. In that way, they take more informed action for their mental health.
What Can Parents Do For Their Children's Mental Health
If your child is experiencing persistent focusing issues that interfere with their school, home life, or play activities, it may be time to seek medical help. Your healthcare provider can help you explore appropriate treatment options for your child.
Topics: ADHD, Child & Teen Help
You may also like...
Take care of your mental health
Free expert advice and insights every month from the Genomind team. Sign up today!
|
Account Hello! Sign In
Hybrid Tomatoes
What is the difference between hybrid and open pollinated tomatoes?
The main difference between a hybrid tomato and an open pollinated tomato is that hybrid tomatoes are a controlled cross of two different tomato varieties and open pollinated tomatoes have parents of the same variety.
Hybrid Tomato Seeds from Gurney's
At Gurney's, we grow a lot of hybrid tomato varieties in our trial gardens each year. Our goal is to find the tomato plants that offer the best in flavor, disease resistance, uniform fruits and yields. Generations of gardeners have counted on us for our wide selection of tomato varieties. We offer tomato plants for sale and tomato seeds for sale that offer the best in flavor, performance and yields.
A hybrid tomato is the result of a controlled cross-pollination between two "parent" tomato plants while an open-pollinated tomato has parents of the same variety. None of our tomatoes are genetically modified (GMO). Gurney's does not sell any GMO seed.
Choosing the Right Hybrid Tomato Plants
With so many tomato varieties available, many people wonder where to begin. We suggest that you first look at the space you have available and then consider what types of tomatoes you'd like to grow.
How Much Space You Need for Tomato Plants
Tomato plants require lots of sun (at least 6-8 hours of direct sunlight daily) and well-drained soil. While most gardeners grow tomato plants in the garden, tomato plants can be grown in containers or Grow Tubs. Some tomato plants can grow up to 8 ft. tall while others have a bushier, more compact habit.
Types of Hybrid Tomato Plants
Tomatoes come in all shapes and sizes. When choosing hybrid tomato plants, consider how you want to use the tomatoes. Choose from all-purpose, cherry or grape tomatoes, beefsteak types and paste or sauce types.
Hybrid Tomato Seeds: Getting the Most out of Your Purchase
Tomatoes are warm season plants. Many gardeners start tomato seeds indoors and transplant them to the garden once the weather is warm; others buy tomato plants and transplant them to the garden. In warmer climates with long growing seasons, tomato seeds can be directly sown into the garden.
How to Grow Hybrid Tomatoes
Tomato plants need lots of sun, well-drained soil, regular watering and plenty of space. Most tomato varieties also require staking.
When to Plant Hybrid Tomatoes
Tomato plants cannot handle freezing weather and should be planted after the last spring frost day in your area.
How Far Apart to Plant Tomatoes
Tomato plants should be spaced 2-3 ft. apart with rows 3-5 ft. apart. Place the stake or tomato cage in place at the time of planting. This keeps the roots from being disturbed.
How to Prune Tomatoes
Pruning tomato plants improves air circulation around the plant and also results in larger yields. Prune leaves from the bottom of the plant.
How to Care for Hybrid Tomato Plants
Mulching around the tomato plants helps suppress weeds and retains moisture in the soil. We recommend fertilizing tomato plants with Gurney's Tomato Food, a slow-release, all-natural plant food. Tomato plants require regular watering, at least an inch a week. Also, be on the lookout for pests. Gurney's offers several pest control products and other supplies for growing tomatoes.
|
< Back to home
Designing with Plastics
Firstly, designing with plastics can be addressed under four inter-related headings:
Function:Will it do the intended job?
For how long?
Form:Does it have the shape to:
Do the function economically?
Will it please the user?
Does it suit the manufacturing process?
Process:Can it be made economically?
How many units are required?
Does the process suit the selected material?
Material:Does the material suit the function, appearance, form, life, process, cost and also availability?
Design Process
Designing with plastics is similar to designing with other materials but more attention has to be paid to the time-dependant properties of plastics and how plastics behave with changes in temperature and environmental conditions. Likewise the properties of plastics materials in end products are a function of changes brought about by the manufacturing process.
The designing with plastics sequence of design development stages will normally be:
• Define function and form of the component
• Establish end-use requirements
• Preliminary design
• Material selection
• Process selection
• Modify design
• CAD/CAE analysis
• Prototype
• End-use testing
Designing with plastics will involve several iterative steps in which the design is continually being refined as constraints and also opportunities appear. As the design project evolves the ease of making design changes reduces while the cost of making changes increases.
Designing with plastics: design1
Individual Tasks in the designing with plastics design process
1. Establish end-use requirements
1. Structural: applied loads, rate of loading, duration, impact, cyclic, possible misuse
2. Temperature extremes
3. Assembly and secondary operations (including storage and transport)
4. Cost limitations and also
5. Compliance with regulations and standards
2. Material selection: check list
1. Physical properties: density
2. Mechanical properties: elastic limits, strength, modulus v temperature, creep modulus, impact strength, fatigue limits, hardness, friction, wear
3. Thermal properties: coeff of thermal expansion, thermal conductivity, heat distortion temp, effect of temp on mech properties.
4. Electrical properties: resistance, permittivity, electrical strength and also antistatic
5. Optical properties: transparency, colour, gloss
6. Environmental properties: chemical resistance, water resistance, effect of uv, thermal stability, biodegradability and also fire performance.
7. Processability: mould shrinkage and finally
8. Cost: cost/unit weight, cost/unit volume, cost/property
3. Modify Design:
1. To suit the property balance of the material selected
2. To suit processing limitations (eg wall thickness)
3. For assembly (snap fits, push fits)
4. Cost optimisation (material cost, process cost and also assembly cost)
4. Computer Aided Design (CAD) and Computer Aided Engineering (CAE)
1. Stress analysis
2. Moulding simulation: flow analysis, cooling analysis, shrinkage and warpage
5. Designing for stiffness
1. Component stiffness is a function of part geometry and material modulus.
2. Establish mode of loading (tensile, compression, flex, torsion) and restraints.
3. Simplify geometry to beams and plates.
4. Apply strength of materials equations to give a first approximation of response; refine using more relevant data (eg creep modulus)
5. Apply an appropriate safety factor.
6. Increase part stiffness by increasing section thickness, ribs, corrugation etc
7. Optimise stiffness for: geometric considerations, stiffness to weight ratio, stiffness to cost ratio.
6. Designing for strength
1. Strength can be defined as ultimate strength (rupture), yield strength, strain to failure, toughness.
2. Strength of plastics is a function of: temperature, chemical environment (including moisture and process conditions).
7. Designing for precision
1. Mould shrinkage for amorphous thermoplastics is lower than mould shrinkage
2. for semi-crystalline thermoplastics.
3. Filled thermoplastics have lower mould shrinkages than unfilled thermoplastics
4. Mould shrinkage is a function of: melt temperature, mould temperature, packing pressure, cooling, orientation; part wall thickness and geometry; gate location, type and also size
8. Design for mouldability
1. Mould filling is controlled by melt viscosity, flow-path:thickness ratio
2. Cooling time (main contribution to cycle time) is proportional to [wall thickness]2
3. Warping is a function of part geometry, packing and also cooling
4. Design considerations: nominal wall thickness, parting line, undercuts, radii, ribs, bosses, coring, draft angles, texture, flow leaders, weldlines
5. Process considerations: cavity filling, gating, venting and also ejection
9. Design tips:
1. Avoid stress concentration factors
2. Avoid uncontrollable loads
3. Design for compressive stress rather than tensile stress
4. For tension, design for uniform cross-sectional area
5. For flex, design for moment of inertia
6. Be aware of processing issues (weld lines, moulded-in stress, anisotropy)
7. Use appropriate safety factors
8. Consider worst-case scenarios
10. Design for Automation
Labour costs in assembly of components can be a significant component of manufacturing costs. Robots and automated techniques for component handling and assembly can significantly reduce costs.
11. Design for Recyclability
To simplify end-of-life recycling, plastics should be preferably consist of only one polymer type, although individual components may have different additives, to achieve the required design properties.
Non-plastic parts should be avoided. Ease of disassembly can hold the key to reducing the cost of recycling.
Mechanical assemblies (snap fits, press fits) are easy to disassemble. Welded components are acceptable for similar or compatible thermoplastics but not for dissimilar plastics.
The same applies to adhesive bonding, provided the adhesive is compatible. Assemblies involving metal screws should be designed to make disassembly easy.
Beginner’s Guide to Designing with plastics for Moulding
Once the geometry of a component has been determined by function, form and appearance, a number of additional factors have to be considered to ensure that the design is in sympathy with the moulding process and to ensure that tooling and processing costs are minimised.
Parting Line
The position of the parting line is chosen for ease of moulding, tool design and part appearance.
design for moulding
To assist ejection of the moulding, all surfaces normal to the parting line should be given a taper or draft angle of 0.5o to 1.5o . Ejector elements are selected on the basis of wall section and possible distortion. Components with small undercuts may be sprung from the mould if the material is flexible enough. Components moulded in rigid materials and components with larger undercuts may require form pins, side cores or split moulds — all adding to the tool costs.
design for moulding
Section Thickness
Wall section thicknesses may have been determined by form, function, stiffness or strength but should be kept as thin as possible to minimise cycle times (cooling stage), to avoid sink marks, voids and internal stresses and to minimise shrinkage and warpage. Thick sections should be cored out , leaving ribs to satisfy part rigidity. Rapid changes of section should be avoided to minimise sinking.
Limits on wall thickness depend on the material.
design for moulding
The ability to fill a mould cavity is related to the flow-path:thickness ratio. For many thermoplastics, ratios of over 200:1 can introduce problems for the moulder.
Sharp corners should be avoided on two counts. The extra material at corners results in more sinking. Sharp corners act as stress concentration points and can severely reduce impact strength. Recommended radii for corners are 0.5 t for inside radius and 1.5 t for external radius (where t is the wall thickness)
design for moulding
The stiffness of moulded components can be increased by increasing the wall thickness (stiffness ∞ t3) but this leads to longer cycle times (cooling time ∞ t2). Use of doming, corrugation and ribs results in reducing weight and reducing cycle times.
design for moulding
Thick heavy section ribs create sink marks, voids and internal stresses. As a guide rib thicknesses should be 0.4 – 0.6 t (where t is the main section thickness), height up to 3 t, spacing at least 2 t and taper at least 0.5o. There are similar recommendations for boss design.
design for moulding
All injection moulded thermoplastics exhibit mould shrinkage (part dimensions relative to the mould dimensions) as a result of differential thermal contraction as the melt cools down in the mould. Shrinkage can be minimised by using high packing pressures and long pressure hold times.
Because of orientation effects the shrinkage is not isotropic and, for unfilled thermoplastics, the shrinkage will be greater in the flow direction. Semi-crystalline thermoplastics show greater mould shrinkage than amorphous thermoplastics and filled thermoplastics have reduced shrinkage.
Warping in a flat panel, as a result of differential shrinkage, can be minimised by controlling the cooling stage or by localising the shrinkage using multi-point gating.
In box shapes, warping leads to concave rims. To counter this, boxes can be designed with sides bowing slightly outwards.
design for moulding
Gate (witness) marks, weld lines and parting lines should be hidden as much as possible in cosmetic parts and their location controlled in critical functional parts.
Flat surfaces should be slightly domed to give more acceptable reflections or deliberately textured. Texturing and design features can also disguise sink marks. Ejector pin marks can be disguised with trade marks or logos.
Shrinkage is determined by a number of process variables (melt temperature, mould temperature, injection pressure, packing pressure etc) and there will be variations in shrinkage during a production run.
Tighter control of process variables can give tighter tolerances but the moulding cost will increase accordingly. Tight tolerances should be stipulated only on critical dimensions and not blanket tolerances. It is difficult to hold tight tolerances on dimensions across the split line of the tool.
design for moulding
Assembly of moulded components can be either reversible or irreversible. Reversible assembly methods include moulded-in screw forms, self tapping screws, interference fits (push fits) and snap fits. Irreversible methods include chemical jointing (solvent or adhesive) and various methods of heat welding (hot-plate, friction, ultrasonic and laser welding). This distinction may be critical for disassembly and recycling.
Product Design Summary
For effective components produced by injection moulding, the designer needs to be aware of a range of factors:
optimise gate position; minimise runner length; assist ejection; avoid undercuts.
Material SelectionSuitability of material and grade for:
mechanical properties; environmental properties
(resistance to heat, light, chemicals, fire)
colour; processability.
Orientation in mouldTo: minimise projected area (and hence clamping force);
Parting linefor ease of ejection; minimise visible flash mark.
Gate positionminimise witness mark; uniform filling; flow marks;
TaperAll surfaces at 90o to parting line require a taper (draft angle) to assist ejection. Typically 0.5 – 1.5o.
Section thicknessMinimum wall thickness to reduce cycle time and material usage; increasing wall thickness increases stiffness but not necessarily strength.
Stiffness ∞ t3; cycle time ∞ t2.
Uniform wall thickness avoids stress and sink marks.
Core away unwanted material.
Sink marksLocalised indentations associated with differential shrinkage in thick sections, eg at rib intersections
RadiiSharp corners act a stress concentration points;
generous radii on all corners and at roots of ribs and bosses.
RibsStiffening ribs allow thinner sections (less material and shorter cycle times);
ribs 60% thickness of main wall.
HolesEasiest if in line of draw; at 90o to draw requires side cores or split moulds (more expensive mould).
Surface TextureGloss finish or textured surface.
Secondary operationsDegating; painting; assembly (push-, snap-fit; adhesives, ultrasonic welding).
Common mistakes made by product designers are lack of radius on corners, over-specification of section thicknesses (inducing internal stresses and increasing cycle times) and inappropriate materials selection (usually resulting from under-specification of product service conditions).
Injection moulding is used to produce mouldings of varying complexity from as small as 1 mg (micromoulding) up to and over 6 kg for a range of market sectors.
Beginner’s Guide to Designing with plastics Mould Design
In its simplest form, a mould for injection moulding consists of two plates, a negative (cavity) plate and a positive (core) plate. The space between the two plates defines the shape and detailed geometry of the mould. In reality the mould is much more complex and will include some of the following features:
Mould alignmentpillars and bushes to ensure perfect alignment of the two halves in the closed position
Feed systemsA series of channels and sub-channels to convey the melt from the nozzle in the plasticisation unit to the mould cavities. Feed systems may be divided into sprues, runners and gates
Ejection systemsDevices to eject the mouldings from the cavities during the mould opening phase
Cooling systemsChannels in the mould plates, carrying heat exchange fluids (usually water), to extract heat from the melt in the cavities
To simplify the construction of the mould, the mould plates are usually assembled from a number of individually produced components. In complex moulds there may be many moving parts such as split moulds and side cores for moulding components with re-entry geometry (undercuts) and pins and plates in the ejector system.
Originally all mould part movements, ejector elements, angled cams for side splits and rotating cores for ejection of screw form mouldings, were linked to the opening and closing stroke of the mould platens but today many of the movements are independent of the opening stroke, by using servo motors and small hydraulic actuators.
Because of the pressures involved and the high wear from millions of operating cycles, moulds are usually constructed from hardened tool steel but it is possible to use metals that are more easily machined, eg softer steel and aluminium alloy, provided the moulds are well maintained.
The best moulds will have carefully designed feed systems and cooling systems, capable of producing consistent high quality mouldings with the shortest possible cycle time.
mould design
Feed System
The function of the feed system in a mould is to transport the polymer melt from the nozzle of the injection moulding machine to the individual impressions (cavities) in the mould with:
minimal cooling;
minimal loss of pressure;
and a minimal disruption to the laminar flow.
In cold feed mould systems, the melt is carried through the sprue channel to the parting line and through runner channels in the parting face to individual cavities.
The final part of the feed system is the entry to the cavity, the gate. The sprue is tapered for ease of removal and may incorporate sprue puller designs to ensure the feed system stays in the moving half of the mould.
The length of the runner channel is determined by the lay-out of the cavities but should be as short as possible to minimise pressure drop.
The cross-section (full-round or trapezoidal) is traditionally generous in dimension (3 -6 mm) but small cross-sections can take advantage of shear heating of the melt to give better cavity filling conditions. Runner lay-out should be symmetrical to ensure each cavity fills identically and at the same instant.
The gate is the smallest cross-section in the feed system and the first part to “freeze” during the cooling cycle. Once the gate is frozen it is impossible to transfer any more melt into the cavity or apply packing pressure to compensate for mould shrinkage. There are many different designs for the gate, the choice being dictated by a number of factors.
• Injection time (large gates fill more readily)
• Packing time (large gates give more effective packing)
• Witness marks (smallest gates)
• Degating (large gates difficult to degate; some give automatic degating)
mould design
Gate position determines the filling pattern, flow marks, jetting, burn marks and weld lines.
In hot-runner systems the melt temperature is maintained at all times in the feed distribution system, thereby making cavity filling easier, giving better quality mouldings and saving the cost of recycling the sprues and runners.
In hot runner moulds the feed system is maintained at an elevated temperature so that there is minimum cooling of the melt before it enters the actual mould cavity.
Although this makes the mould more complex and more expensive, there are significant savings in material waste, reduction in cycle times and improvements in the quality of the moulding.
After the cooling stage and mould opening, the mouldings can be difficult to remove because of mould shrinkage onto the core and the creation of a vacuum between the moulding and the mould. Ejection is accomplished mechanically using a number of ejector elements to ensure minimum distortion of the warm moulding. The ejector elements (pins, sleeves, blades, valves, stripper plates) may be actuated by the mould opening stroke or actuated independently using hydraulics, pneumatics or servo-motors. Robotic devices can be used to remove the moulding in a controlled manner.
To shorten cycle times and to control cooling, the design of heat transfer systems in a mould is critical. The heat transfer fluid (water or oil) is circulated in channels close to the cavity surfaces in a number of separate circuits. Cooling systems are at their most effective when the inlet and outlet temperatures differ by only 2 -3oC.
Complex Moulds
Intricately shaped mouldings require complex moulds with more than just two plates. To allow ejection of components with undercuts, parts of the mould have to open at 90o to the main mould opening direction.
The additional “splits” can be actuated through the main mould opening action using finger cams, dog-leg cams (for delayed opening) or springs. Hydraulic actuation gives more control. Local undercuts can be accommodated more simply using side cores and form pins.
Designing with plastics – Plastics Material Selection
Material selection for plastics products can be split into two levels:
1. selection of the appropriate family of material (GENERIC)
2. selection of the appropriate grade within a family (GRADE SPECIFIC)
In the past, designers have selected materials on the basis of previous experience for products of similar size and similar function. Any attempt at a formal selection procedure was heavily subjective and constrained by the knowledge and experience of the designer.
Objective materials selection requires, as a starting point, a clear profile of the design requirements in the form of a check list of important properties and their relative importance in the design.
Searching through brochures from materials suppliers and data tables to rank materials in each individual property would give sufficient data on which to base an objective selection. However, the process is time consuming and suffers from limited available data.
The emergence of computerised materials property data, preferably in the same units and generated by the same test method, has made the task of selection easier.
Some databases even have a selection algorithm built in, usually in the form of a ranking procedure, a system of eliminating materials property by property or by creating a league table by weighting several properties at once.
CAMPUS is a system in which individual suppliers provide data for their grades in standard format (units and test methods) either in CD format or down loaded from the Internet.
The data refer to specific, identifiable grades from participating raw materials manufacturers. It is now possible to search CAMPUS data from several suppliers at the same time using MCBase software. Unfortunately many grades have incomplete data.
CES Polymer Selector, from Granta Designs, combines the generic approach and the grade-specific features of CAMPUS in one system, with graphical representation of properties in ranges rather than points and no missing data
is a web based system covering metals, ceramics and other engineering materials as well as plastics. Searches can be carried out on-line.
IDES Prospector
is another web-based system
Searchable properties include physical, mechanical, thermal, optical and electrical properties as well as chemical resistance, process rheology, processing methods and even post-processing techniques.
Designing with plastics – Material Selection Check list
Material selection is best carried out in parallel with the design development, in contrast to the common procedure of completing the design and then looking for an appropriate material.
Developing material selection in parallel allows the design to adapt to the material capabilities and constraints.
Data on the design criteria and service conditions of the component can be entered into a check list, indicating properties which are not relevant, and then matched to possible materials using data sheets and material selection software.
The check list ensures that no property, manufacture detail or service criteria is overlooked.
1. Service Conditions
Firstly, establish:
– maximum and minimum temperatures to which the component will be exposed;
– loads (high or low mechanical loads);
– time scales.
2. Mechanical Properties
2.1 quantify static loading: maximum load (to calculate stress); acceptable distortion or deflection (strain) while still maintaining the function of the component; required modulus (stiffness); required tensile or flexural strength (ie at failure); strain (elongation) at break.
2.2 quantify creep loading; maximum load (stress); time scales; permissible creep strain (deflection while maintaining function.
2.3 dynamic loading: nature of cyclic loading; time under load; recovery time; related to fatigue failure.
2.4 impact: load (stress); velocity of impact; temperature
2.5 friction: coefficient of friction depends on other surface (eg steel, plastics, rubber), velocity, temperature.
2.6 wear: mechanism of wear; time scale; acceptable wear loss.
3. Thermal Properties
3.1 heat distortion temperature (softening point); function of stress (data usually given for high stress and low stress).
3.2 brittle temperature: lowest temperature to survive impact (usually related to glass transition temperature, Tg)
3.3 continuous use temperature: data refers to 50% loss in mechanical properties after 20,000 hours.
3.4 coefficient of thermal expansion: to calculate linear and volume expansion.
3.5 thermal conductivity: rate of heat transfer through thickness
4. Environmental Properties
4.1 Effect of exposure to chemicals:
Absorption: volume or weight increase (function of temperature and time)
Environmental stress cracking (esc): cracking and failure when subjected to mechanical stress and chemical exposure (including vapour)
4.2 Oxidation: deterioration of properties in air (function of temperature)
4.3 uv resistance: degradation due to exposure to ultra violet light (function of wavelength, intensity and temperature)
4.4 Fire performance: properties under fire conditions: ignitability; spread of flame; heat contribution; smoke production; volatile gases.
5. Aesthetic Factors
Transparency; colour; surface finish; tactility; density
6. Electrical Properties
Volume resistivity; surface resistivity; conductance; static dissipation
7. Processing
7.1 Drying conditions (temperature; time; vacuum)
7.2 Process conditions Melt temperature; mould temperature; ejection temperature; cycle time
7.3 Melt rheology: melt flow rate (temperature, load); melt viscosity (temperature, shear rate)
7.4 Shrinkage (moulding); die swell (extrusion)
8. Post Processing operations
8.1 assembly method: insert; push fit, snap fit, ultrasonic welding, high frequency welding; adhesive assembly.
8.2 decoration: printing, metallising, laser marking, labelling
Material Selection: Check List
1. Service Conditions
Max temp
Min temp
Time scale
2. Mechnical
static loading:
permissible deflection
elongation at break
dynamic loading
impact :
3. Thermal
heat distortion temp: (stress)
brittle temp
continuous use temp
coeff thermal expansion
4. Environmental
chemical resistance
fire performance
5. Aesthetics
surface finish
6. Electrical
volume resistivity
surface resistivity
static dissipation
7. Processing
process conditions
melt temp
mould temp
ejection temp
cycle time
mould parameters
nominal thickness
max thickness
flow path length
cold/hot runner
gate type
MFR (temp, load)
Viscosity at 1000 s-1 (temp)
8. Post-Processing
Generic Selection
Having established the important properties for the component, the first step is to identify the appropriate plastics family. A basic designing with plastics approach is to compare properties for a range of plastics families, using comparison tables similar to the ones shown below.
In these tables, the property values are typical or average values for unreinforced grades. In practice, the values for different grades of the same family will be spread around the average values and this spread will have to be checked at a later stage.
Codes for 1-5
LDPElow density polyethylene
HDPEhigh density polyethylene
GPPSgeneral purpose polystyrene
TPStoughened polystyrene
PVC-uunplasticised PVC
PVC-pplasticised PVC
PMMApolymethylmethacrylate (acrylic)
CAcellulose acetate
PA 6.6polyamide 6.6 (nylon 6.6)
PETpolyethylene terephthalate
PBTpolybutylene terephthalate
POMpolyoxymethylene (acetal_
PPOpodified polyphenylene oxide
Table 1. Modulus (GPa) (stiffness)
plastics family
Table 2. Tensile Strength (MPa)
plastics family
Table 3. Elongation at Break (%)
plastics family
Table 4. Impact Strength (J/cm) [Izod notched, 23oC]
plastics family
Table 5. Heat Deflection Temperature under Load
plastics family
Search results
Coping with weld lines
Read more >
Creepy things can happen with long term loading of thermoplastics.
Deformation is defined as the change in the shape of a body caused by the application of a force (stress). It is proportional to the stress applied within the elastic limits of the material.
Read more >
The Long and the Short of Fibre Reinforcement of Thermoplastics
Read more >
Do your mouldings suffer from jet lag?
When explaining the moulding fault commonly known as ‘jetting’ to part-time students from the plastics moulding sector, I usually prefaced my remarks by saying that ‘jetting’ was not a fault that you should see these days. Then one of the students appeared the next week with a classic example of ‘jetting’.
Read more >
How useful is Tensile Strength data ?
When scanning a thermoplastics data sheet for a new project or finding a replacement for an existing grade, the eye tends to get drawn to the values quoted for tensile strength (or more correctly ‘tensile stress at break’) as an indication of the material’s mechanical properties.
Read more >
Where are Engineering Thermoplastics Blends going ?
Read more >
How do electrostatic dissipative (esd) thermoplastics work?
When two polymeric surfaces are rubbed together static electrical charges are generated on the surfaces. Party tricks involving picking up pieces of paper with a comb are amusing. However, static electricity can be a nuisance in the plastics industry with dust attraction during storage or in service.
Read more >
How Easy is it to See Through the Optical Properties of Thermoplastics?
Transparency in thermoplastics is a property that differentiates them from many other manufacturing materials. This includes metals, ceramics and wood, and, in some cases surpasses glass.
Read more >
Has PVC weathered the negative attitudes of Environmentalists ?
A common observation is “If PVC appeared on the market now, it would be rejected”
Read more >
Does FR imply fire resistance?
When we see ‘FR’ in a plastics grade coding we can sometimes be lulled into believing we have a material that is ‘fire resistant’.
Read more >
|
How to identify counterfeit ICs
Now most designers and PCB assembly manufacturers concern about the likelihood of increased counterfeiting as a knock-on effect of the chip shortage.
Because the incentives for counterfeiters are high right now, as an industry we must be somewhat more vigilant in maintaining our best practices for preventing fake parts from corrupting the supply chain and our products.
Under normal circumstances the cost associated with counterfeit electronic components exceeds $5 billion annually. The pressures of the current chip shortage will likely push those losses even higher for as long as the supply remains tight. Still, we all can agree that, if fake parts were to enter your inventory or end up in your products, while the reputational damage to your business will likely be significant, it can also be tough to quantify. Even harder yet would be assigning cost should counterfeit components in critical applications contribute to injury or loss of life.
So, how about a little refresher on some of the most effective techniques for component inspection using X-ray? While other visual inspection techniques provide important insight into component quality and authenticity, nothing exceeds X-ray inspection for fast, accurate, non-destructive evaluation. The following are 10 ways to identify a fake IC using X-ray.
1. Same packaging, different inside.
Two components may look identical on the outside, have the same termination, and have the same marking, but be entirely different onthe inside. X-ray is the only non-destructive way to look inside a device. These two 3D renderings show the entirely different structures of two devices from the same lot (Figure 1).
Figure 1: 3D renderings show the entirely different structures of two devices from the same lot.
2. The good, the bad, and the ugly.
It is only with 100% inspection that you can be sure all the components are good.
Criminals commonly mix good and fake devices in the same packs or batches to avoid detection. I am sure you can see which one is out of place in Figure 1.
3. Known good devices.
Comparing incoming parts with a golden sample is a good way of searching for counterfeits. Figure 2 illustrates how different two devices from a single batch look. To compare accurately, check the lot code, the date code, the part numbers, the place of manufacturer, any external markings, and the construction of the device.
Figure 2: Illustration of how different two devices might look from a single batch.
4. Pinout mismatch.
The layout of the lead-frame and the wire bond diagram tells you plenty about the component. Check whether they differ when the wire bond diagram is overlaid on the X-ray image. In Figure 3, you can see the discrepancy in the VPP and VDD pins.
Figure 3: Example of a discrepancy in the VPP and VDD pins.
5. Missing wire bonds.
An X-ray image can show missing wire bonds,indicating potential for counterfeit and the needfor further analysis. However, beware that aluminum wire bonds do not show in X-ray images, sothis could produce a false fail (Figure 4).
Figure 4: Example of missing wire bonds.
6. Internal defects raise red flags.
A full inspection of a part can validate mechanical integrity. For example, in Figure 5 a wire bond ball and a loop can be seen inside that package.
This doesn’t confirm the component is a fake, but it should sound alarm bells.
Figure 5: A wire bond ball and loop inside a package should sound alarm bells.
7. External defects.
External defects are a pointer to improper handling of a component. Figure 6 shows aball grid array (BGA) component with damaged solder balls. This type of damage is common when components are not packaged in the original tray, tube, or reel provided by theoriginal manufacturer. Even if the component is deemed good by other tests, the fact that the parts are in the wrong package makes them suspect counterfeit.
Figure 6: Example of a BGA component with damaged solder balls.
8. Excessive BGA voiding.
Perhaps not seen strictly as counterfeiting, components are often pulled out of old boards,cleaned, and resold as new. Even if the parts are real, this process can make the parts sub-standard. However, when criminals pull ball grid array (BGA) components from boards, they need to have the parts re-balled.
The re-balling process is not trivial. The metallurgic interface between the component and the new balls is no longer pristine (as it was when the first balls were applied onto the virgin pads of the component). For this reason, it is common to find recycled BGA components with excessive surface voids.
In Figure 7, the bare component shows a large amount of voiding that indicates a part that was pulled and re-balled.
Figure 7: An example of a bare component with a large amount of voiding.
9. Bent pins.
An indication of improper storage of components is bent pins (Figure 8). This X-ray inspection can be done with the components still inside the tray, so they don’t need to be removed from the package for a suspect counterfeit determination to be issued. Not only are trays of the wrong size often used, sometimes the trays with the wrong material are used. In these cases, instead ofusing the proper material to deal with ESD, counterfeiters replace it with lower cost options. These lower cost material options can damage the parts.
Figure 8: Counterfeiters will replace the proper material with lower-cost options.
10. Excess die attach voiding.
Electronic component manufacturers invest heavily in the consistency of the products they sell. If a few of the components within a lot have anomalous die attach voiding (Figure 9), suspicion is drawn to the overall quality of the part and the lot. It may not have been stored in appropriate thermal and humidity conditions or may have been salvaged.
With incentives at an all-time high for counterfeiters, it’s a great time to review your receiving practices to ensure that you are keeping fakes out of your inventory and products.
A little extra vigilance can protect your brand, your customers, and help beat the bad guys.
Figure 9: Components with anomalous die attach voiding.
|
• Psychaid
Reaching Out for Help Is Not a Sign of Weakness
Updated: May 5, 2020
Many people think that mental health is an issue that they need to handle on their own. With just a little bit of positive thinking, they should be able to snap out of depression, anxiety, and other issues. Culturally, there has also been a sense of shame around mental illness. People with a family history of mental illness sometimes treat it as their family’s deep, dark secret. In recent years, society has begun to see the importance of treating mental illness like other illnesses of the body. There is no shame in going to your doctor when you have flu symptoms. Similarly, there should be no shame for seeking help with your mental health.
Seeking Professional Help
There are many factors that lead to mental health issues. There can be a genetic component that predisposes a patient to a particular type of mental illness. There can be a stressful event that becomes the starting point for a mental health issue. In some cases, something as small as a fender bender can cause post traumatic-stress disorder or other mental health problems. Whatever the cause, a mental health professional has the training to help patients through it. While traditional talk therapy is still a common practice, new therapies, such as cognitive behavioral therapy, are growing in popularity. Often, the goal of therapy is to get a patient to carefully examine the thought processes that contribute to a mental health issue.
Some mental health disorders are not so much the result of thought processes as they are chemical changes in the nervous system. In many of these cases, a doctor can prescribe medication to help deal with the issue. Sometimes, thought processes and chemical changes build on each other. A stressful period leads to depressive thoughts, which leads to changes in the way the brain processes neurotransmitters, like dopamine. These chemical changes then encourage more negative thought processes. This pattern is the reason that patients are often prescribed both medication and one-on-one counseling to deal with mental health issues.
Support Groups
There is power in knowing that you are not alone. Most people know about the many support groups that are available around different kinds of substance abuse. A little research will show that there are support groups available for other kinds of mental health issues. Some therapy sessions are also done in a group setting. Although mental health can be a very personal issue, a support group can provide you a lot of benefits. A group can help patients be accountable for their own treatment and serve as a sounding board to voice frustration. Mental illnesses often make people feel isolated. A group setting can be a safe space to share struggles with people who are going through similar issues.
If you are struggling with a mental health issue, it is important to realize that you are not alone. There is help available in many different forms. Dealing with your mental health when issues are at a low level makes it easier to treat them. Taking care of your mental health is an important piece of taking care of your overall well-being.
Here’s another article you might enjoy: How Sleeping Better Can Make a Difference in Your Mental Health
• facebook blue logo
• Instagram original logo
|
Preverbal data collection
a nervous system WITH STORIES!
Hello there good reader
First of all?
I’m not quite sure where this piece goes in terms of the book.
I need to flush out ideas of ‘given circumstances’, ‘character’, ‘mask’, ‘role’, and ‘game’ first.
I also need to use less punctuation.
You are a preverbal visceral system of arousal!
Ummm? What?
You are currently experiencing a constant bombardment of sensory data. This data is reaching you through your senses, your viscera.
When I use the term ‘senses’ I’m talking about much more than you sight, smell, taste, hearing and touch. You exist with a sense of balance, a sense of depth, a sense of motion and a sense of stillness. Wikipedia has a huge list of your senses including:
• Balance and acceleration
• Temperature
• Proprioception - aka the space around you
• Pain
• Sexual stimulation
• Next we have other internal senses including:
• Hunger
• Pulmonary stretch which controls your respiration rate
• Peripheral chemoreceptors that monitor carbon dioxide levels
• Stimulation receptors in the esophagus control vomiting and swallowing
• Cardioception refers to the perception of the activity of the heart
In addition to these, we have a chemoreceptor trigger zone which receives inputs from blood born drugs or hormones and communicates with the vomiting centre. Other chemoreceptors respond to our blood sugar levels. Receptors in our bladder and rectum result in sensations of fullness. This is important. It’s how we know we need to go to the bathroom. These are not conscious, cognitive thoughts that require language. Babies do this easily. They are preverbal stimulations and actions.
We have other senses that are more subjective as well. They include our sense of humour, sense of time, sense of agency, sense of familiarity and sense of justice.
All of these are senses can be felt within the body
Humans are not rational. We are preverbal irrational animals cursed with the power of cognition. If you are reading this and think that you are a reasonable person, know this now: You’re not reasonable. Most of your vital systems happen long before the reasonable part of your brain kicks in. Still insist that you are rational and reasonable? Well then you’re an even bigger idiot than I am. Really. Hey you! I just called you an idiot. What are you feeling? Where do you feel that in your body? That’s an emotion. Emotions are not rational. And they happen much more quickly and powerfully than cognition. They happen whether you want them to or not. Any baby will show you two things: You don’t need words to have emotion. And your emotions are powerful and real.
It is through these preverbal senses and signals that we know we are safe
When you recognize your given circumstances, understand your role and the game being played, you then have room to become more aware of other sensory, preverbal inputs. These allow you to process more information and adapt your behavior to maximize connections with others. Some people call this stuff intuition. Still more believe it’s just something that people are ‘born with’. I disagree. Sensitivity - which to me means being aware of and able to process the data provided to us from as many of our senses as possible is something that you can learn. As such, it’s something that can be taught.
Are you intuitive and creative? then you are using your sensitivity and responding effectively to sensory data in relationship with your environment and with others. Well done. The more you can be aware of your pre-verbal sensory input, the more effectively you can manage your responses to others, becoming an intuitive and responsive, rather than reactive. And the more you can be aware that everyone around you is a water-filled bag of pre-verbal sensing systems, the more you can pay attention to their responses and reactions to you and their environment.
Use more data
So, if you aren’t using all of your senses - relying solely on ‘rational data’ you are probably also letting preverbal data impact your decision making unawares. Your data set is incomplete. Myself? More data and more information leads to better decisions. How do you use all of your senses in the data collection process? How aware are you of these preverbal motors to your behaviour? What is the cost of a missed connection or a strained relationship?
One Derful Thing
How we perceive things and how we make meaning from what our senses tell us? That stuff fascinates me.
I love taking in the world.
I’m fully in love with my sense of balance. I play with it while surfing, riding bikes, unicycles, slacklines, skateboards, skates, walking on big rocks.
There is little I love more than playing with balance things. Balance is such a dynamic game. The fun for me is in the noticing and playing.
Let’s play with balance.
Stand on one foot with your arms extended wide.
While keeping one arm extended, bring your other finger to your nose and then extend it again.
Repeat this with the other side.
Do the whole thing again with your eyes closed.
Can you practice this enough to have balance without sight?
|
In different places, this has been described as a one-in-30, one-in-50 or one-in-100 year event. So, what does this mean?
What is a one-in-100 year event?
First, let’s clear up a common misunderstanding about what a one-in-100 year event means. It does not mean the event will occur exactly once every 100 years, or that it will not happen again for another 100 years.
For meteorologists, the one-in-100 year event is an event of a size that will be equalled or exceeded on average once every 100 years. This means that over a period of 1000 years you would expect the one-in-100 year event would be equalled or exceeded 10 times. But several of those 10 times might happen within a few years of each other, and then none for a long time afterwards.
Read more: Explainer: was the Sydney storm 'once-in-a-century'?
Ideally, we would avoid using the phrase “one-in-100 year event” because of this common misunderstanding, but the term is so widespread now it is hard to change. Another way to think about what a one-in-100 year event means is that there is a 1% chance of an event of at least that size in any given year. (This is known as an “annual exceedance probability”.)
How common are one-in-100 year events?
Many people are surprised by the feeling that one-in-100 year events seem to happen much more often than they might expect. Although a 1% probability might sound pretty rare and unlikely, it is actually more common than you might think. There are two reasons for this.
First, for a given location (such as where you live), a one-in-100 year event would be expected to occur on average once in 100 years. However, across all of Australia you would expect the one-in-100 year event to be exceeded somewhere far more often than once in a century!
How well do we know how often flood events occur?
Read more: Sydney storm: are extreme rains and flash floods increasing?
Second, estimating the one-in-100 year event using historical data assumes the underlying conditions are not changing. But in many parts of the world, we know rainfall and streamflow are changing, leading to a changing risk of flooding.
Increased occurrence of flooding can also be associated with poor planning decisions that locate settlements on floodplains. This means a one-in-100 year event estimated from past observations could under- or indeed overestimate current flood risk.
So what does this mean in practice?
Whether climate change “caused” the current extreme rainfall over coastal New South Wales is difficult to say. But it is clear that with temperatures and heavy rainfall events becoming more extreme with global warming, we are likely to experience one-in-100 year events more often.
Read more: Droughts and flooding rains: it takes three oceans to explain Australia's wild 21st-century weather
The Conversation
Andy Pitman, Director of the ARC Centre of Excellence for Climate System Science, UNSW; Anna Ukkola, ARC DECRA Fellow, UNSW, and Seth Westra, Associate Professor, School of Civil, Environmental and Mining Engineering
|
Remembering Khartoum
Jews of the Bilad al-Sudan describes the West African Jewish communities who were descendants of Jews from the Middle East, North Africa, Spain and Portugal. Some historical records show their presence at one time in Ghana, Mali, and Songhai empires, then called the Bilad as-Sudan. It means Land of the Blacks in Arabic. Jews from Spain, Portugal, and Morocco in the later years also formed communities off the coast of Senegal and on the Islands of Cape Verde. With the emergence of Islam in West Africa, these communities have since disappeared, mostly due to relocation and assimilation.
March 6, 2009
Officials from Iran, Hamas, Islamic Jihad, Hezbollah and various other groups have joined the Syria's parliament speaker on their visit to Khartoum, Sudan. The purpose of the visit was to show their solidarity with president Omar al-Bashir in light of the arrest warrant issued against him by ICC for war crimes committed against the civilian population of Darfur.
Remembering Khartoum
In the aftermath of the crushing defeat in the Six Day War, eight Arab countries called an emergency conference that took place in Khartoum, Sudan on September 1st, 1967. They had a lot of issues to resolve as Israel has just taken Sinai, Golan Heights and the West Bank with East Jerusalem. The problem was no longer just the issue of Palestine and Israel's right, now Egypt, Syria and Jordan had a lot of their own lands to recoup.
Israeli leaders were hoping that the decisive defeat they administered to Arabs would end in negotiations for a lasting peace. Israel was prepared to offer the land conquered during the Six Day War for a full recognition and a peace treaty with their Arab neighbors.
But it was not to be. Instead of the negotiations the Khartoum conference produced a defiant answer: "No Peace with Israel, No recognition of Israel, No negotiations with Israel ". That kind of response, even though shocking to Israelis at that time, was not entirely unexpected.
The new Arab leaders like Nasser and Hafez Assad rose to power from the military ranks of their respective countries of Egypt and Syria. Both toppled the monarchies in a violent manner. The main reasons why those monarchies did not survive were the extreme poverty of the Arab masses and the blame the deposed monarchs carried for the absolute incompetence they showed in the 1948 War of Liberation. Any attempt of negotiated peace with Israel would have been highly unpopular.
Even the suspicion that King Abdullah of Trans Jordan was negotiating with Israel cost him his life when a Palestinian militant assassinated him in front of the Al-Aqsa Mosque in 1948. The popular view on the Arab Street was that Arab masses will never let any Arab leader remain alive who would dare to negotiate with Israel. Nasser, Assad and others knew that very well. They were students of Middle Eastern history.
After all they were the ones who produced the military coups in their respective countries. It was safer to allow Israel to occupy the Arab lands and hope that in the near future they’ll be able to rearm themselves for another military campaign and regain the lost territories. Thankfully there were Soviets who would, after initial hesitation, eventually extend the helping hand and assist Egypt and Syria in rebuilding their militaries for their next shot at eradicating Israel from the map of the Middle East. It came only six years later in the form of the Yom Kippur War.
The positive result of the Khartoum conference was the negotiated end to the civil war in Yemen where the Saudi Arabia backed pro-Islamic East was fighting against the socialist leaning West backed militarily by Nasser. Fighting the Zionist enemy was bigger then any disagreement the two sides had with each other, at least temporarily. Egypt and Jordan asked for financial help and got $200 million in aid from other Arab countries in order to restore their ruined economies.
There were recommendations by the Algerian and Iraqi officials to extend the oil embargo against the West, as out of frustration they blamed U.S. and it’s allies for the outcome of the war. But the cooler heads prevailed since $200 million had to come from somewhere. Syrians were pushing for the continued military action, but when they realized that none of the other Arab countries had any interest in it they left Khartoum and did not participate in the final resolution.
It was fascinating to see that here were Egypt under Nasser and Syria under Assad who lost more land to Israel then any of the Arab monarchs they deposed. Arab populations in their countries were as poor as ever since so much money was spent on the military build-up and all they had to show for it were the burning tanks and artillery in Sinai and Golan Heights. Yet, Nasser and Assad were not in danger of the loosing their grip on power as long as they did not appear to be negotiating with Zionis.
A few years later King Hussein of Jordan commented that the results of Khartoum Resolution were meant to be conciliatory. Well, the resolution sounded anything but conciliatory and neither did the rhetoric and actions of the Arab leaders following Khartoum. As Michael Oren writes in his book "Six Days of War", Nasser was telling the participants of the conference that neither Soviet nor American plans for ending the war were acceptable, as they would lead to surrender and humiliation.
He was telling his ministers "our primary intention is to continue to pursue the political road in order to gain time for a military preparation". In other words they would dance around the political resolution of the conflict for a couple of years. Any so-called conciliatory language coming out of Khartoum was purely to temporarily please the Soviets and the West in order to regain the strength needed for another war.
The biggest losers of the conference were the Palestinians, who in Khartoum were represented by then chairman of the PLO Ahmed Al-Shoqayri. The Arab leaders, who promised to drive Jews into Mediterranean before the Six-Day War, now had their own territories in Israeli hands and their own problems. They would still champion the Palestinian cause but more so as the tool to advance their own agendas. The no peace, no negotiations policy condemned Palestinians to life without their country and completely dependant on the West and the rest of the Arab world for their survival..
But the Arab regimes were also the losers. The price for their shortsighted and emotional decision would be pretty high. A couple of years after Khartoum Conference, Yasser Arafat replaced Shoqayri as the leader of the PLO and embarked on the mass scale terror campaign. The PLO has become a major player in Middle Eastern politics and in some way the decision making process regarding war or peace now was shared with Arafat, who’s inability to make any decision has become legendary.
Not only that the Arabs have they lost a lot of land, but Palestinians with Arafat in charge have become a huge distractive force that would be shaking up the entire Middle East for many years to come. He almost dethroned King Hussein of Jordan in September of 1970 during the conflict that is known in history books as Black September. When he was kicked out of Jordan, Arafat and his fighters went to Lebanon where he started another civil war. It lasted for years until Israel exiled Arafat and his fighters into Tunisia.
Palestinians were kicked out of Kuwait for supporting Saddam Hussein during his August 1990 invasion and that’s despite the fact that Kuwait was financially supporting the Palestinian cause for years. In fact, Arafat for decades was routinely shaking down the oil rich Gulf States for millions of dollars to finance his fight against Israel. Yet none of the Arab leaders dared to do anything about it. The Palestinian issue to this day paralyzes Arab countries, who seem to blame everything, even the mistreatment of their own women, on this conflict. There is very little economic growth and poverty is still widespread.
The decisions made in Khartoum seem to have come the full circle for Saudi Arabia. The man who taught Usama bin Laden the way of jihad, was a Palestinian exile by the name of Abdullah Azzam. He was bin Laden’s professor in Saudi University and his partner in Afghan jihad. Today his student is threatening the very existence of the Saudi regime he considers to be a corrupt and illegitimate entity.
Even though Israelis won the Six-Day War decisively they could not win the peace. They inherited the West Bank with millions of Palestinians and are forced to play the role of the occupiers for the last four decades. Israel had a lot more flexibility in 1967 then it has now. In 1967 the Zionists, who were not a very religious group, dominated Israeli politics.
Today, the religious parties in Israel have a lot more power and are not willing to part easily with the land that represents a tremendous religious and historical value to them. What was a relatively easy decision in 1967 is a very difficult one today. The Israeli-Palestinian conflict is still lingering with a lot of initiatives and a lot of negotiations but very little progress. Not too many people remember the Khartoum Conference these days, but it’s outcome still haunting the Arabs and Israelis alike.
Khartoum Resolution
September 1, 1967
1. The conference has affirmed the unity of Arab ranks, the unity of joint action and the need for coordination and for the elimination of all differences. The Kings, Presidents and representatives of the Arab Heads of State at the conference have affirmed their countries' stand by and implementation of the Arab Solidarity Charter, which was signed at the third Arab summit conference in Casablanca.
2. The conference has agreed to consolidate all efforts to eliminate the effects of the aggression on the bases that the occupied lands are Arab lands and that the burden of regaining the lands falls on all Arab States.
3. The Arabs Heads of State have agreed on the need to unite their political efforts at the international and diplomatic level to eliminate the effects of the aggression and to ensure the withdrawal of the aggressive Israeli forces from the Arab lands which have been occupied since the aggression of June 5. This will be done within the framework of the main principles by which Arab states abide, namely, no peace with Israel, no recognition of Israel, no negotiations with it, and insistence on the rights of the Palestinian people in their own country.
4. The conference of the Arab Ministers of Finance, Economy and Oil recommended that suspension of oil pumping be used as a weapon in the battle. However, after thoroughly studying the matter, the summit conference has come to the conclusion that the oil pumping can itself be used as a positive weapon, since oil is an Arab resource which can be used to strengthen the economy of the Arab states directly affected by the aggression, so that these States will be able to stand firm in the battle. The conference has, therefore, decided to resume the pumping of oil, since oil is a positive Arab Arab resource that can be used to service Arab goals. It can contribute to the efforts to enable those Arab states which were exposed to aggression and thereby lost economic resources to stand firm and eliminate the effects of the aggression. The oil-producing States have, in fact, participated in the efforts to enable the States affected by the aggression to stand firm in the face of any economic pressure.
5. The participants in the conference have approved the plan proposed by Kuwait to set up an Arab Economic and Social Development Fund on the bases of the recommendation of the Baghdad conference of Arab Ministers if Finance Economy and Oil.
6. The participants have agreed on the need to adapt the necessary measures to strengthen military preparation to face all eventualities.
7. The conference has decided to expedite the elimination of the foreign bases in the Arab States tates.
|
Hip-hop dance
From The Art and Popular Culture Encyclopedia
(Redirected from Hip hop dance)
Jump to: navigation, search
Related e
Hip hop dance refers to dance styles, mainly street dance styles, primarily danced to hip hop music, or that have evolved as a part of the hip hop culture.
These later styles are sometimes referred to as new school or new style while the older styles, including breakdance and various funk styles that were incorporated into hip hop, are considered old school.
Unless indicated otherwise, the text in this article is either based on Wikipedia article "Hip-hop dance" or another language Wikipedia page thereof used under the terms of the GNU Free Documentation License; or on research by Jahsonic and friends. See Art and Popular Culture's copyright notice.
Personal tools
|
Some Basics of Applied Research methods
Why Conduct Research?
Research is conducted to prove or disprove a hypothesis or to learn new facts about something. There are many different reasons for conducting research. For example, academic research is usually conducted to prove or disprove a theory while medical research is conducted to advance knowledge of medical conditions and create treatments. Ultimately, research is conducted to gain a better understanding of something or someone or to provide a solution to a problem.
Jessica Coylewho works for Conseris, a data collection app that aids researchers when carrying out their studies, said:
Conducting research is vital in expanding human knowledge of the world. It allows us to advance as a civilization, and discover truths about the world, so we can better understand how to interact with people and the Earth. It also allows us to improve our healthcare. Conducting research leads to medical discoveries that save lives.
Research can be of many categories, depending on what you are specifically talking about. Maybe you are an engineer who wants to synthesize a better version of materials that you would have today; more durable etc. Or you could have a degree in medicine and want to find he best cure for a disease or a genetic condition.
We surely are not so well off in anything that we can possibly live for long on earth without doing research.
Or it could also be your passion for doing anything, if you are seriously curious about the world around you and how it works or the fascination of the secrets that the universe beholds that are yet to be unraveled.
Doing research on these settings would enhance our knowledge of going to space and make mankind proud.
Its a necessity since there are a lot of things out there that need understanding and it is a basic human instinct to just know.
Why conduct research in Public Relations?
Research is an essential part of public relations management.
1. Research makes communication two-way by collecting information from publics rather than one-way, which is a simple dissemination of information. Research allows us to engage in dialogue with publics, understanding their beliefs and values, and working to build understanding on their part of the internal workings and policies of the organization. Scholars find that two-way communication is generally more effective than one-way communication, especially in instances in which the organization is heavily regulated by government or confronts a turbulent environment in the form of changing industry trends or of activist groups.
2. Research makes public relations activities strategic by ensuring that communication is specifically targeted to publics who want, need, or care about the information. Without conducting research, public relations is based on experience or instinct, neither of which play large roles in strategic management. This type of research prevents us from wasting money on communications that are not reaching intended publics or not doing the job that we had designed them to do.
3. Research allows us to show results, to measure impact, and to refocus our efforts based on those numbers. For example, if an initiative is not working with a certain public we can show that ineffectiveness statistically, and the communication can be redesigned or eliminated. Thus, we can direct funds toward more successful elements of the public relations initiative.
Without research, public relations would not be a true management function. It would not be strategic or a part of executive strategic planning, but would regress to the days of simple press agentry, following hunches and instinct to create publicity. As a true management function, public relations uses research to identify issues and engage in problem solving, to prevent and manage crises, to make organizations responsive and responsible to their publics, to create better organizational policy, and to build and maintain long-term relationships with publics. A thorough knowledge of research methods and extensive analyses of data also allow public relations practitioners a seat in the dominant coalition and a way to illustrate the value and worth of their activities. In this manner, research is the strategic foundation of modern public relations management.
American Apparel Hurricane Sandy Marketing ‘Not A Serious Matter,’ CEO Dov Charney Says:
More in a bit …
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s
|
Why Lindy and Blues
The celebration of a joint Lindy hop and Blues festival in Porto is not a random event. These dance forms are both deeply connected to their roots in African American culture, a shared history, values and aesthetics. It is impossible to talk about the history of Lindy hop or blues without facing up to the history of racial oppression and resistance and affirmation that gave rise to these dances. Swing, jazz and blues are all part of this cultural tradition, music that was always principally dance music, its main purpose being to free us from the blues.
As Albert Murray has said more eloquently: “But as to the matter of dispersing gloom and spreading glee…Testimony that the dance-beat incantation and percussion of Bessie Smith and Louis Armstrong almost always worked as advertised is universal” (Stomping the Blues).
The Lindy hop is a popular partner jazz dance that was born in Harlem in the late 1920s, created by young urban African Americans in venues such as the Savoy Ballroom. While the attribution of the Lindy hop name has been disputed, the most widely accepted story is that it was named by “Shorty” George Snowden at a dance marathon in 1928, in reference to Lindbergh, who had recently completed the first solo flight across the Atlantic. Regardless of whether he named the dance, Snowden was one of Lindy hop’s earliest creators.
African American social dances, including Lindy hop and blues, developed in a context of racism in the US, which determined where people could be, dance and play music, among other limitations, which is why venues like the Savoy Ballroom in Harlem were so important in the Swing Era. The Savoy was the first integrated ballroom in Harlem and it provided a space of freedom and community for black patrons, where the best swing bands played non-stop, and where creative dialogue between dancers and musicians propelled musical and dance innovation.
The Lindy hop incorporated and transformed previous jazz and ballroom dances and went on to become the defining dance of the Swing Era. The Savoy dancers, among them Frankie Manning, Norma Miller, Al Minns, Leon James etc., under the management of Herbert White (Whitey), brought its joyful and subversive spirit from the ballroom to stages across the US, Hollywood and around the world, including Europe, Brazil and Australia. It is important to honour the people who created this dance from which we derive so much enjoyment, remembering it was also a social dance that is part of the living heritage of local communities.
Blues dancing, originally called slow drag, is one of the few black social dances that was not adapted for stage or codified for white dancers (until recently), and remained rooted in Black communities where it was danced at rent parties, honky-tonks, juke joints, dance halls and a whole range of black social spaces. Its origins lie in the South and it expanded throughout the US in the early 20th century along with the successive waves of migration of African Americans seeking to evade segregation and find greater freedom and opportunity in the North.
Lindy hop and blues belong to the jazz dance tradition and wider heritage of African diasporic dances that includes samba, rumba, rueda, kizomba, calypso etc. as different embodiments of joy and defiance. Both dances share many Africanist aesthetic features while adopting the European partner hold, including, for example: rhythm and polyrhythm, community and individual expression, improvisation, groundedness, angularity, conflict, flexibility, call and response, play and coolness. While blues dancing is characterized by a closer partner hold and emphasis on hip and body isolations, Lindy hop developed into faster more dynamic expressions in line with the music. Lindy hop and blues never disappeared, but have constantly transformed and evolved into other genres.
Following in the steps of blues and jazz history takes us on a journey through New Orleans, Chicago, Harlem and across the Atlantic along different transatlantic routes from and to Africa, America and Europe. The circumstances of these routes and how these musical traditions came into contact are related to European history in ways we may prefer not to remember, such as the horrific transatlantic slave trade which brought African people to America in the first place, led by European colonial powers, or the waves of European emigration. In the 20th century, touring black dancers and musicians travelled from the US throughout Europe popularising jazz, blues and swing across the old continent (Portugal included). The recently renewed global interest in these dances has also created new networks and routes connecting European and US dance scenes across the Atlantic.
At this festival we will have the opportunity to explore the connections and history of these dances through lectures and other activities as well as on the dance floor.
On this bluest of Mondays, we come together to stomp, groove and swing the blues away in a spirit of respect and recognition for this African American cultural tradition.
|
Vikings Changed the World
At some point in the 9th century, a Viking was accused of being a “child-lover” because he didn’t want to impale babies with his spear. Vikings are known as gruesome-raiders which struck fear into the heart of villagers throughout medieval Europe. They were pagans who worshiped Odin and Thor – believing that an eternal feast awaited them in Valhalla. Today, Viking culture inundates our everyday life. Early morning TV has commercials for Viking River Cruises. “Bluetooth,” which connects electronics, is named after a Vtumblr_npgzguhvtp1un9i1ko1_1280iking king. Four days out of each week are named after Norse Gods: Tuesday (Tyr), Wednesday (Wodan which was Anglo-Saxon for Odin), Thursday (Thor), and Friday (Frigg). Dublin, York, and Kiev were a few major cities founded by Vikings for trade. The Normandy region of France was named after Viking inhabitants. The modern states of Russia, Belarus, and Ukraine were first centralized by Vikings. Iceland, Greenland, and North America were first discovered by Vikings. The nautical terms of starboard, port, and keel were created by the Vikings. Most importantly, the Mad Max series was inspired by the Vikings. I was able to learn more about Vikings in this month’s edition of National Geographic and the book – The Sea Wolves: A History of the Vikings by Lars Brownworth.
The Vikings homeba3c6b3f59deb9c86cf5d8950c8c38d06dse was in Scandinavia between 800 and 1100 AD. There were the Norse (modern day Norway) to the west, the Swedes (modern day Sweden to the east), and the Danes (modern day Denmark) to the south. The actual word “viking” is believed to derive from the Vic region near the Oslo Fjord where iron was plentiful for sword production – eventually all raiders were referred to as “Vic-ings.” There were two types of Vikings: homesteaders and raiders. The Vikings had permanent communities which tried to live off the land and coast. There were also men who sought out fame and fortune on the sea – these were the “sea wolves” that changed the world. These Sea Wolves mastered the construction of the longboat and were able to sail quickly to any location. These men were motivated by treasure, women, and power. The more a raiding party could collect, the more respected they were on their return to Scandinavia. The first raids occurred at monasteries in Ireland, England, and France. Monasteries at the time stored many valuable relics, manuscripts, and currency. osebergskipet1A raid would usually consist of a few longboats (picture to right) quickly docking with 10-50 Vikings, subsequent killing of inhabitants, collection of plunder, and a quick getaway. Vikings were fierce warriors and their strengths were stealth, quickness, and cunning. Eventually, the raids started to dry up and the Vikings were forced to travel further from their homes; they would eventually reach as far as Italy.
Some of the greatest Vikings wanted more than just plunder, they wanted land. Forces
would eventually conquer Irish, French, English, and Eastern European armies to control huge swathes of territory. They controlled key ports and became handsomely wealthy through trade, extortion, and sheer intimidation. To find more land, many Vikings traveled west and eventually founded Iceland and Greenland – getting as far as North America; they were never able to permanently settle the Western Hemisphere because of limited colonists. To the a3e4c310d1c9ca0d11ac277a991d9b40east they settled into modern day Ukraine and traded with the Byzantine Empire. Vikings in the east were called “Rus,” (picture to left) which is the origin of the word “Rus-sian.” Eventually, the Vikings in these land-grab areas would lose much of their raiding culture and eventually became established monarchies. Many Viking kings decided to adopt Christianity to unite their strongholds which many times consisted of several types of ethnic groups and cultures; Scandinavia also shifted to a monarch structure to have better relations with European kings. In the end, the Viking culture fizzled out with the creation of Christian domains which promoted domestic virtues over sea-faring vices. Overall, the Vikings altered the political and social landscape wherever they went and are in large part responsible for the unification of Scotland, France, Britain, The Holy Roman Empire, and the kingdom of Sicily. They were pagans, who more than any other medieval power, spread Christianity throughout the world. Their enduring reputation truly held up to the Viking belief that all men are mortal – only the noble name can live forever.
|
3. Protein Synthesis 2
published on July 13, 2020
The following content is provided under a Creative Commons license Your support will help MIT Open Courseware continue to offer high quality educational resources for free To make a donation or view additional materials from hundreds of MIT courses, visit MIT Open Courseware
At ocwmitedu ELIZABETH NOLAN: We're going to continue where we left off last time So briefly I'll make a few points about initiation of translation in prokaryotes
And then where we're going to spend the bulk of the time today is with a review of tRNAs and then discussing the aminoacyl-tRNA synthetases, which are the enzymes responsible for loading amino acids onto the three prime end of the tRNA And these points are important because these process has
To happen in order for the amino acids to be delivered to the ribosome, which is where we'll go on Wednesday So the first questions are, how does initiation happen? So how does this ribosome, 70S ribosome, get assembled with the mRNA and initiator tRNA bound?
And then we're going to ask, how do we get an aminoacyl-tRNA, such that the amino acids can be delivered to the ribosome? So first, for initiation in prokaryotes, there's a few steps to this process We'll just look at these at a basically superficial level
Of detail But recall that there are translation factors And during initiation, there are three initiation factors– so IF 1, 2, and 3– that are required to help assemble the 70S ribosome here So first in terms of initiation, what happens
Is that the mRNA needs to bind to the 16S RNA of the 30S subunit And so I point this out because at this stage in the process, the 70S ribosome isn't assembled yet So we have the mRNA binding to the small subunit
And this process requires initiation factor 3 And effectively what happens is that the mRNA has a region called the Shine-Dalgarno sequence in prokaryotes, which is the site of ribosome binding And then upstream of that is a start codon that signals for the start of translation
So if we think about the mRNA of the five prime end, and somewhere there's a sequence that signals for ribosome binding OK, and then we have our start codon that signals the start of translation
OK And so this gets translated here OK, so this start codon pairs with initiator tRNA And this initiator tRNA is special
One reason why it's special is because the amino acid attached is an N-Formylmethionine OK So sometimes the initiator tRNA is called f-met tRNA f-met as an abbreviation there So just as some overview here, what
We're seeing in this alignment is a number of the ribosome binding sites, or Shine-Dalgarno sequences in prokaryotes We have the start codon on that pairs with the initiator tRNA And here's a schematic depiction of what I've indicated here on the board
OK, so the mRNA binds to the 16S of the 30S subunit So the 70S is not assembled at this stage And IF3 is involved, as I said The Shine-Dalgarno sequence determines the start site And we determine the reading frame, as well So here is just an indicating translation of a polypeptide
What happens after that? So after that, it's necessary to assemble the 70S ribosome, have the initiator tRNA in the P site, and have the cell ready to go for translation And here's just one cartoon overview that we'll use as a description of this process
OK So what do we see? We've talked about this step so far We see there's a role for initiation factor 1 And in this cartoon, if we imagine the E site, the P site, and the A site, what we see
Is that IF1 is binding to the site of the ribosome And one way we can think about this is that the initiator tRNA has to get to the P site And so that region is blocked to facilitate the initiator tRNA getting to the P site OK, we see that initiator tRNA binding to the P site
And this happens via formation of a ternary complex with IF2 and GTP So initiation factor 2 hydrolyzes GTP There's an event that results in joining of the two subunits And there has to be dissociation of these initiation factors for the ribosome to be ready to accept
Its first aminoacyl-tRNA in the A site OK, so the outcome of this process here is that we have an assembled 70S ribosome with the initiator tRNA in the P site The A site is empty, so it can accommodate an incoming aminoacyl-tRNA
And the E site or exit site is also empty So that's the main take home for initiation And that's the extent to which we're going to discuss it within this class So in order to get to the elongation cycle, we need to get the aminoacyl-tRNA into the A site
And that's going to require the help of EF-Tu, so elongation factor Tu Before we discuss how elongation factor Tu is going to help deliver that aminoacyl-tRNA, we need to talk about how we get the aminoacyl-tRNA in the first place
So what is the tRNA structure, just as a review to get everyone up to speed How are amino acid monomers attached to the tRNA? And how is the correct amino acid attached? So this is an aspect of fidelity, which came up as a concept last week in lecture
And so we'll look at the mechanism of aminoacyl-tRNA synthetases to see how is the correct amino acid attached, and then what happens if the wrong amino acid is selected Are there mechanisms to correct that? And if it's not corrected, what are the consequences here?
So moving forward with that, we're going to focus on the tRNAs and addressing those questions So just as a review, so we can think about tRNA secondary structure, which is often described as cloverleaf
So we have a five prime end The tRNA has several arms OK So we have a D arm
This arm here has the anticodon that pairs with the codon of the mRNA We have a variable arm, this arm here And we have this three prime end here,
Where the amino acids get attached So this, in terms of base numbering, we have C74, C75, A76 here OH This is often called the CCA acceptor stem
And the amino acids are attached here I'm going to abbreviate amino acid as AA via an ester linkage And these ester linkages are important for the chemistry
That happens in the ribosome OK So we can imagine just if we have abbreviating the tRNA structure like this and if we think about the sugar of A76– bless you
OK We have one prime, two prime, three prime here This type of connectivity here And this is abbreviated throughout as amino acid tRNA, aa in general terms, or the three-letter abbreviations,
Like what we saw for f-met tRNA f-met with the initiator tRNA here So here's a schematic of a tRNA secondary structure with a bit more detail than what I show you on the board
And something we need to keep in mind is even though we often draw the tRNA in this cloverleaf type depiction, it has tertiary structure And so it's very important to think about this structure as we think about how the tRNAs enter the various sites of the ribosome
OK So this structure is L-shaped And I like this depiction here because regions of the secondary structure are color coded with the corresponding regions of this tertiary structure here
OK, so we see the shell shape of an L, rather upside down here, where we have the CCA acceptor stem over here and the anticodon arm and anticodon region down here So what is a consequence of this structure? The tRNA is quite narrow So we're thinking about 20 to 25 Angstroms in width
And if we think about this in the context of the ribosome and the peptidyl transferase center, 3 tRNAs need to fit into that catalytic center during the elongation cycle So it makes sense that they're relatively narrow This allows three to fit there
So as we think about the translation process and also think about some of the translation factors, we want to keep this type of structure in mind here Here's just another view of that, with some additional descriptions
Of the overall structure And this includes the numbering of the tRNA bases within that structure here Just a point to make, this won't be a major focal point in the course, but do keep in mind
That tRNA contains many post-transcriptionally modified bases, so you'll see an example of that in problem set one Up to 25% of the bases can be modified Typically, we see about 5% to 20% of them modified here OK, you're not responsible for these structures, these modified structures, in the context of this class
So the key question for today is how are amino acids attached to the tRNA, as shown here? And in order for that to happen, there's a family of enzymes called aminoacyl-tRNA synthetases, or abbreviated aaRS
OK, so this name tells you right away, synthetase, that these enzymes use ATP And these enzymes catalyze the attachment of amino acids to the three prime OH, or sometimes two prime OH, of the tRNA here for that And so we're going to consider this overall reaction
And then we're going to think about the reaction mechanism and experiments that were done to give support to the mechanism that we see So all aminoacyl-tRNA synthetases require ATP and hydrolyze ATP to AMP and PPI And so they catalyze this overall reaction
Where we have an amino acid monomer We have the tRNA that encodes this– that is for this amino acid ATP to give us the aminoacyl-tRNA AMP and PPI So if the ATP is being hydrolyzed to AMP and PPI, what phosphate is being attacked?
So we saw on Friday there's the alpha, beta, and gamma phosphates of ATP OK, pardon? AUDIENCE: Beta ELIZABETH NOLAN: Beta
Any takers? AUDIENCE: Alpha? ELIZABETH NOLAN: Any takers? Gamma? Yeah, so it's alpha
If you're getting AMP, it's attack at alpha If you're getting ADP, it's attack at gamma here OK, so P alpha is next door to the ribose of the nuc– there Yeah
OK So if we consider this overall reaction, how does it work? Just before that, one other observation I just want to point out, if we're thinking about these enzymes and asking what is it that they recognize of the tRNA,
So we have the anticodon And that goes in hand-in-hand with the identity of the amino acid Just keep in mind that it's not just the anticodon So here we're seeing an example of an aminoacyl-tRNA synthetase with its tRNA bound
And we see that there's many contacts between the tRNA and this enzyme here OK, so here we have the amino acid end, the anti-codon end, and all throughout here So what is the mechanism to get us where we need to go?
We have our overall reaction that I'll put up on the board, just to keep it straight as we move forward So amino acid plus ATP plus the tRNA for that amino acid Aminoacyl-tRNA synthetase to give us the aminoacyl-tRNA plus AMP plus PPI
So let's consider a mechanism This is going to be a two-step mechanism And so in the first step of this mechanism,
We have the amino acid plus ATP And we have formation of an OAMP intermediate Plus PPI here So this intermediate is called an amino adenylate
Adenlyate because adenosine here And we need to think about why this intermediate might form Why would we propose this in a mechanism? And then in step two–
We'll come back to that in a minute– we can take our amino adenlyate, have our tRNA, this is the three prime end here We can have attack with release of AMP OK, so here we have the ester linkage at the three prime end, like what we see on that board here,
To give us our aminoacyl-tRNA OK, so we see in step one, there's formation of this amino adenylade intermediate And in step two, there's transfer of the amino acid monomer to the three prime end of the tRNA here
So why might these enzymes go through that OAMP intermediate? What needs to happen for this chemistry to occur? AUDIENCE: You need a more activated reading group to have that acyl substitution form an ester from a carboxylate
ELIZABETH NOLAN: Right We need to activate the CO2H group there So this affords that So what might be another possible mechanism, right? Imagine you're the experimentalist and you've combined your eighth amino acid ATP
TRNA and this enzyme you've isolated in a test tube And you see you've got this as a product And this as a product And you're wondering how did we get from reactants to products? This is one possibility Maybe there's also a possibility of a concerted mechanism
Where there's no intermediate like the one I'm showing you here These are just things to keep in mind when thinking about reactions This two-step mechanism is the accepted mechanism for the amino aceyl tRNA synthetases
And so what we're going to think about are what are the experiments that were done to support this mechanism here So what are the things we need to think about? And so we're going to think about this by examining one aminoacyl-tRNA synthetase as a paradigm
And this is the one for a isoleucine here OK, so what are the experiments that need to be done to characterize this reaction and determine mechanism?
OK So one thing we need to confirm is reaction stoichiometry So there's a stoichiometry up in what I've written above But experimentally, that needs to be determined So one, reaction stoichiometry And so how can we think about this?
We can think about the equivalence of the amino acid So in this case, isoleucine How many equivalents of isoleucine? And presumably, this isoleucine binds to the enzymes We can think about it of equivalence
Of isoleucine bound And we also see that ATP is consumed, right? That's hydrolyzed to AMP and PPI So how many equivalents of ATP are consumed in this reaction? What else do we want to know?
We need to know something about kinetics So what are rates of formation? What is the rate of formation of the product, the aminoacyl-tRNA, and since I've told you this intermediate forms, what is the rate of formation of the intermediate?
And since this is an intermediate, it's something transient So we need to think about how are we as experimentalists going to detect this intermediate over the course of this reaction It forms and decays in order to get product here
So rates of formation And so we have formation of our product, which in this case– and then formation of the intermediate, which
I'll just abbreviate Ile-AMP And what else would we like to know? We can figure out how, in addition to rate of formation of the product and the intermediate,
We can think about the rate of transfer of Ile from the intermediate to the tRNA So what this tells us is that we need a way to look for or detect the intermediate
Here So imagine let's just have a hypothetical situation If we find the intermediate, that tells us something about the reaction If we don't find the intermediate,
What can we conclude? Pardon? AUDIENCE: That there was no intermediate? ELIZABETH NOLAN: So that's one possibility Are there other possibilities if our method doesn't
Let us detect the intermediate? AUDIENCE: Second step is to test ELIZABETH NOLAN: Can it be hard to detect an intermediate? It can be very hard, right? So they don't always–
There aren't around all the time very much or in very abundant quantities So if it's not detected, could it be there? Yeah, it might be there And the method just didn't allow for it to be seen So you always need to keep that possibility in mind
This will be a case where there is a robust method that allows us to detect this type of intermediate But always keep that in mind OK, so first thinking about reaction stoichiometry We're not going to go over the experiments that
Were done to define this I'll just tell you some facts that result from some experimental studies So this isoleucine aminoacyl-tRNA synthetase binds 1 equivalent of isoleucine as indicated in the overall reaction
And it consumes one equivalent of ATP, also as shown in this overall reaction, to make one equivalent of the aminoacyl-tRNA OK and these stoichiometries were determined experimentally So now we need to think about points two and three to characterize the reaction kinetics
So what experiments were done? So there are several different sets of experiments, some of which we're familiar with from 705 or 507 and others that will be new and presented in more detail in recitation this week and next week
So we can imagine doing steady state kinetic experiments, as well as pre-steady state kinetic experiments And the general aims here are, one, to determine the rate of aminoacyl-tRNA formation, to determine the rate of amino adenylate formation, so this intermediate– and again, we
Need a method to detect the intermediate And at the end of the day, we'd like to know what is the rate determining step So a method that is commonly employed for these types of studies involves the use of radioactivity
And we'll just go over a few points about radioactivity now to help with understanding these experiments And you'll hear more about this method in recitation this week So the experiments I'm going to tell you about are going to involve the use of radio isotopes like C14, P32 And the question is, why do we like
To use radio isotopes in biochemical experiments? And they're really excellent probes It's the bottom line And one reason for that is that if you can use a radio isotope like C14 or P32, it's introducing minimal perturbation into your system
So you're not needing to attach a fluorophore whether it be a small molecule or a protein You're not modifying the structure of a component of your system So the overall size and the chemical properties are maintained when you use different isotopes
Of the same element And some of the ones we'll see today are, for instance, C14 labeled isoleucine, P32 labeled ATP They have the same chemical properties as the unlabeled forms, and same size The other point to make is that we
Can detect very small amounts of radioactivity in a sample And you'll see some of those calculations and how to do them in recitation this week So we can detect small amounts, and that's good for looking for something like an intermediate And there's readily available techniques
For quantifying radioactivity in a sample So if you see nomenclature like this, the NX nomenclature indicates the radioisotope in this sample And I'll just say in passing here, we all know the isotopes are atoms
Bearing the same number of protons but different numbers of neutrons And radioactive isotopes have an unstable nucleus, which means there's a radioactive decay And typically– well, we often use beta emitters in biochemical studies
And that's what you'll see today So what are some of the experiments? We're first going to consider looking at the steady state kinetics to ask what do we learn in the steady state
So from our steady state experiments, we're able to get our Kcat and our Km and the catalytic efficiency, which is the Kcat over Km We're going to compare our Kcat values or turnover today So experiment one is to monitor formation of product
So how is this done? This reaction is done by taking C14 labeled isoleucine and unlabeled tRNA and watching for transfer of that radio label to the tRNA And so what comes from these studies
Is a Kcat on the order of 14 per second And now we have a way to detect this amino adenylate intermediate And we'll talk about that assay in a minute, after we get through this comparison
We do a steady state experiment to monitor formation of this amino adenylate intermediate And this assay also uses radioactivity And it's called ATP PPI exchange assay And we'll go over how this works in a minute
So the results of these experiments give a Kcat on the order of 80 per second So what does this comparison tell you?
These values are quite different, correct? So we're seeing that this ATP PPI exchange assay is telling us that ATP PPI exchange, which is a measure of formation of this intermediate, is about 60-fold faster than formation of product here That's an important observation to have
So how are we going to figure this out? How are we going to see this intermediate? That's the question we need to ask next And so we need to go over this ATP PPI exchange assay And this is an assay that will come up again in module 4 when we talk about the biosynthesis
Of non-ribosomal peptides So we'll return to this type of assay and data many times So the question is, if we have this reaction, OK, how do we detect this?
OK, it's not so easy And we need an assay And this is some of the background towards the development of this assay So we need to suppose that our amino acid and ATP react with the aminoacyl-tRNA synthetase
In the absence of tRNA And that's indicated by step one, more or less But that doesn't show it experimentally So in the absence of tRNA, this amino acid and ATP react with the enzyme and they form the aminoacyl AMP intermediate and PPI
And they do this reversibly OK, so the reversibility of this reaction is key for ATP PPI exchange to work So if this occurs and they do this reversibly, therefore we can deduce formation of the aminoacyl AMP
If we add radio labeled PPI, the amino acid, and ATP to the enzyme and we see that radio labeled phosphorus from the radio labeled PPI incorporate into ATP That's only going to happen if this chemistry is reversible And bear in mind, we can detect very small quantities with radioactivity
So it's not that it has to be reversible to some large degree We're relying on the detection of this radio label So how does this work chemically? Let's take a look
OK, so imagine here we have our ATP We have our amino acid And we have our enzyme And step one, we have binding
So there's some ATP binding site to the enzyme and some site for the amino acid to bind And I'm leaving magnesium out of this depiction, but remember that magnesium and ATP come together Now what? Step two, OK, we're going to have
A chemical step where we have formation of the amino adenylate and PPI And they currently are bound to the enzyme We have step three
So imagine in this step our PPI is released And this is another key aspect of this assay So what does this mean? We now need to think about going backwards If the PPI is released and we spike this reaction with radio
Labeled PPI and work our way backwards, will the radio label end up here in the ATP? OK So this is going to be going backwards We've left off with this enzyme with the amino adenylate bound We have the PPI that was released
And then we spike this reaction with our radio labeled or hot PPI So then what happens? Step four, working backwards
Imagine that some of the radio labeled PPI binds Then what? Working backwards another step 32 P ATP and the amino acid
And then we have release here OK, so then the question is, can you detect this? And so if you can detect some incorporation of this radio label into the ATP, that indicates
That this enzyme worked through that type of intermediate AUDIENCE: So are PPI not also sometimes and then if you had some competing hypothesis where it made ATP and ADP, then your PPI would maybe sometimes turn into just a single radio label
Phosphate that could then have the same reverse reactions as the ? ELIZABETH NOLAN: Yeah So whether you initially end up with PPI or PI is going to depend on how the ATP is hydrolyzed And so you could imagine maybe there
Could be some background ATP hydrolysis that gives ADP and PI in this type of assay That's something you always need to look out for For the purpose of this, let's assume that we're not having some background problem in terms of the ATP source, and also that the enzyme is specific in terms
Of what it's doing to the ATP But yeah, certainly background ATP hydrolysis can be a problem So how will this be detected? And how will you know the radio label is associated with ATP
And not something else in your mixture? AUDIENCE: ELIZABETH NOLAN: Pardon? AUDIENCE: ELIZABETH NOLAN: No
So we're going to look at the radioactivity So this will come up more in recitation this week But we need to be able to measure radioactivity by, say, scintillation counting here But what's also needed is a separation because you need to know where that signal's coming from
You need to know it's coming from ATP and, say, not a background from however much of the PPI you introduced Or if you have no idea what's going on with your chemistry, maybe the data are going to tell you it's not this mechanism So you need to have a separation
So how might you separate ATP from all of these other components? AUDIENCE: Based on affinity column ELIZABETH NOLAN: Some affinity column So I like the column
But we're not going to have some sort of tag on the ATP That might be a problem for that enzyme But your notion is correct in the sense that we'll use some sort of chromatography in order to separate OK, so maybe HPLC, how many of you
Have used an HPLC or at least know what one is? AUDIENCE: ELIZABETH NOLAN: Right So typically looking at UV vis But you can imagine hooking up an HPLC to a detector that allows you to do scintillation counting and some sort
Of column that will allow you to look for ATP Is all of the ATP going to be radioactive in this assay? No So again, we can detect small quantities And as long as there's a little bit of reversibility, we can see this here
OK, so what's critical in this assay is the reversibility of steps 3 and 4 What would happen in this assay if the PPI is not released? AUDIENCE:
ELIZABETH NOLAN: Right Under the conditions, or if for some reason the PPI is not released, we're not going to see this exchange reaction We're going to have a readout that doesn't give us this Does that mean this didn't form?
No OK, so there's many caveats and details that you need to think through when thinking about a reaction and then the experiment is done to test this So in the case of these aminoacyl-tRNA synthetases,
These ATP PPI exchange assays work well And these assays can be used to get steady state kinetic parameters, to get Kcat, Km, Kcat over Km, which is where this type of value comes from, in this case here So back to these analyses up here, what they're telling us
Is that formation of this amino adenylate intermediate is about 60-fold faster than formation of the product OK And what we all want to recall when thinking about steady state experiments is that they're set up with a great excess of substrate
And with the enzyme concentration The reaction is zero order in respect to substrate And you'll have some additional notes about that in your recitation materials this week for review So something else biochemists like to do when looking at reactions and understanding reaction
Mechanisms is to look in the pre-steady state And this came up briefly in lecture 1 as a method And again, you'll hear more about it in recitation over the next two weeks In these experiments, the goal is to look at the very first, early moments of a reaction
And they're set up quite differently So limiting substrate is used There's no turnover, so huge contrast to what we know about steady state experiments And one of the goals is to look at the formation and consumption of intermediates here
So this type of chemistry often happens on a fast timescale You can imagine millisecond timescale here, which means that we need a special apparatus that has fast mixing capabilities, because there's no way for one of us to do this on our own with our pipette
And so the type of experiment or apparatus used is called a stop flow And I just show one depiction of a stop flow apparatus here You'll get some other variations on this theme in the recitation notes OK, but effectively what happens is
That you have two drive syringes, a and b, and each of these syringes will contain certain components of your reaction And this stop flow has a drive motor and a stop syringe And it effectively allows you to rapidly mix the components of these syringes in a mixer, shown here
And then you either have some way to detect product– so maybe if you can use optical absorption, you have a UV vis detector or a fluorescence detector Or in other cases what you'll do is you'll punch the reaction at a certain time point So you need a third syringe not shown here with a quencher
So you can imagine if you're working with an enzyme, maybe you quench by addition of acid or base, something that will denature and precipitate that enzyme And then you can take that sample and analyze it in some way that fits in terms of what you need to detect there
So this type of methodology was used in order to monitor transfer of isoleucine to its tRNA And so where we'll pick up in lecture on Wednesday is the design of that experiment in terms of what will we put in each syringe, and then what are the results of those experiments?
And ultimately, what does that tell us about rates of transfer here? That's where we'll continue
Related Videos
The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high quality educational resour...
The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high-quality educational resour...
The following content is provided under a Creative Commons license. Your support will help MIT OpenCourseWare continue to offer high- quality educational resou...
The following content is provided under a Creative Commons license. Your support will help MIT Open CourseWare continue to offer high-quality educational resou...
The following content is provided under a Creative Commons license. Your support will help MIT Open Courseware continue to offer high quality educational resou...
|
Navicat Blog
Unicode and Non-Unicode String Data Types in SQL Server Nov 19, 2021 by Robert Gravelle
SQL Server provides a number of data types that support all types of data that you may want to store. As you may have guessed, data type is an attribute that specifies the type of data that a column can store. It can be an integer, character string, monetary, date and time, and so on. One data type that causes some confusion among database designers and developers are those for storing character strings. A character string is a series of characters manipulated as a group. In the context of relational databases, character string data types are those which allow you to store either fixed-length (char) or variable-length data (varchar). Moreover, SQL Server splits its string types into two broad categories: Unicode and non-Unicode. These equate to nchar, nvarchar, and ntext for Unicode types and char, varchar/varchar (max) and text for non-Unicode. In today's blog, we'll compare the two categories to decide when to use one over the other.
The Purpose of WHERE 1=1 in SQL Statements Nov 8, 2021 by Robert Gravelle
Have you ever seen a WHERE 1=1 condition in a SELECT query. I have, within many different queries and across many SQL engines. The condition obviously means WHERE TRUE, so it's just returning the same query result as it would without the WHERE clause. Also, since the query optimizer would almost certainly remove it, there's no impact on query execution time. So, what is the purpose of the WHERE 1=1? That is the question that we're going to answer here today!
What Is SQLite and How Does It Differ from MySQL? Nov 2, 2021 by Robert Gravelle
SQLite and MySQL are equally popular open source Relational Database Management Systems (RDBMS). Both are fast, cross-platform, robust, and feature-rich. Yet, beyond these similarities, the two databases are dissimilar in several important respects. Since you are probably more familiar with MySQL, this tutorial will list SQLite's most important features, as well as dissimilitudes to MySQL, all with the goal of steering you towards the product that will best suit your needs.
Null Values and the SQL Count() Function Oct 25, 2021 by Robert Gravelle
Back in March of 2020, the The NULL Value and its Purpose in Relational Database Systems article presented the NULL value and its special meaning in relational databases. That article also described how to allow NULLs in your database tables and how to reference them in queries. In today's blog, we'll learn how to combine NULLs with the SQL Count() function to achieve a variety of objectives.
Understanding SQL Server CROSS APPLY and OUTER APPLY Queries - Part 2 Oct 19, 2021 by Robert Gravelle
Last blog introduced the APPLY operator and covered how it differs from regular JOINs. In today's follow-up, we'll compare the performance of APPLY to that of an INNER JOIN as well as learn how to use APPLY with table valued functions.
Navicat Blogs
Feed Entries
Blog Archives
|
Skip to main content
Community-based natural resource management in Oceania has its roots in culturally protected water body(CPWB) practices. However, CPWBs in Fiji have been under-researched regarding what practices exist, and the extent to which they are currently practiced. Archival research and interviews with 201 individuals across Fiji’s189 districts revealed five CPWB types. Conception, Meconium, and Circumcision CPWBs are at risk of practice cessation, while Chiefly investiture and Funerary, have 15% and 42% actively practicing districts, respectively. Primarily serving a ceremonial and food provisioning service, the view that CPWBs do not contribute to biodiversity conservation can be counter productive to conservation efforts. CPWBs as a place-based practice are eroding due to low awareness by conservation practitioners, and exclusion from community management plans. Knowledge of CPWBs and the practical challenges of implementing them can help conservation practitioners and Indigenous peoples maintain cultural practices, while ensuring food security and conservation into the future.
Full Paper (Pdf)
|
Chinese Zodiac Lesson for Kids: Story & Signs
Instructor: Mary Grace Miller
Mary Grace has taught first grade for 8 years and has a Bachelor's degree in Elementary Education and is licensed in ESL.
Have you ever heard of the Chinese zodiac? What about the year of the rat or the year of the ox? This lesson will teach you the story behind the Chinese zodiac and give descriptions of each of the signs of the zodiac.
What Is the Chinese Zodiac?
In Chinese mythology, there is a story that tells all about animals that had a race. Mythology is a collection of myths, or folk tales, that belong to a group or a culture. In this Chinese myth, there are many different versions, but this is one of the most well-known ones.
Long ago, many animals had a race to see which twelve animals would make it onto the calendar and in which order they would appear on the calendar. The ox almost won the race, but at the last minute, the rat jumped over ox's head to win the race. Because the rat won, the Emperor told the rat that he would be first on the Chinese calendar.
A zodiac sign in the Chinese calendar is an animal that represents each year in a 12-year cycle. After 12 years, the cycle begins again with the year of the rat. Many people believe that you have the character traits, or parts of your personality, that go with your year in the zodiac. Keep reading to see if your zodiac sign is true for you!
Birth Years And Signs
Use this table to see what your zodiac sign is!
Chinese Zodiac
Chinese Zodiac
People with the rat sign are thought to be curious and interested in challenges and learning new things! Rats are also funny, smart, and protective of their friends.
Oxen are perfectionists that like to make sure they do things correctly the first time. They can be shy at first, but they care about other people and you can always count on them!
Tigers have great leadership skills and like to be in charge. They always stand up for what they believe in and fight for those things!
Everybody likes rabbits and they usually have lots of close family members and friends. This might be because they don't like to fight and instead make sure they get along with everyone.
People born in 1928, 1940, 1952, 1964, 1976, 1988, 2000, or 2012 are dragons.
Dragons are very friendly so they get along with everyone, and they are great friends to all! Their friends are always coming to them to ask for advice.
To unlock this lesson you must be a Member.
Create your account
Chinese Zodiac Lesson for Kids: Story & Signs Quiz
Instructions: Choose an answer and click 'Next'. You will receive your score and answers at the end.
1/5 completed
Which animal won the animal race in the Chinese myth?
Create Your Account To Take This Quiz
Try it now
It only takes a few minutes to setup and you can cancel any time.
Already registered? Log in here for access
Register to view this lesson
Are you a student or a teacher?
Unlock Your Education
See for yourself why 30 million people use
Become a member and start learning now.
Become a Member Back
What teachers are saying about
Try it now
Create an account to start this course today
Used by over 30 million students worldwide
Create an account
|
Over population = Global Warming = Climate Change
1 Billion, 1804 - 2 Billion, 1930 - 3 Billion, 1960 - 4 Billion, 1974 - 5 Billion, 1987 - 6 Billion, 1999 - 7 Billion, 2011 - 8 Billion, 2023 - 9 Billion, 2037 - 10 Billion, 2057
This problem is mainly reported as Climate Change although Climate Change is a result of Global Warming which is a result of Over Population. Climate Change can be minimized but not eliminated as long as Over Population exists. Both are being worked on Globally. Hence the larger problem. To fully fix Global Warming the world population has to be reduced. This is a major issue for those who rely on over population - mainly the top one percent!
Just The Facts: World Population Growth : Our POSTS
3. Oil and Gas, part of Earth's Shock Absorber
We are deep in an over population hole and have to get out, stop digging and then start fixing.
Oil and Gas, extracted from the earth and replaced with water, either directly by pumping water in or by breaking the substrate with high pressure water, 'fracking', increases the intensity of earthquakes.
Oil and gas are much more compressible than water. Earthquakes will become much stronger as the tectonic plates meet with a diminished amount of oil or gas to absorb the shocks. The removal can create more earthquakes as the holding structure is weakened. 'Tectonic plates are pieces of Earth's crust and uppermost mantle, the lithosphere'.
Think of these substances as fluids to absorb shocks. Just like on your car. Hard shock absorbers are an integral part of a vehicle's suspension. A shock absorber is designed to absorb or dampen compression and rebound of collisions between two solid units. The less absorption available simply means the harder the impact and the further the ensuing result will travel. If what I am saying is correct you will see stronger earthquakes, reaching out much further from the epicentre. Think of it in terms of your car's tires hitting a pothole. With a proper shock absorber in place you feel a bump but without them you feel a jolt from the bottom of your spine to the top of you head.
Oil insulates better than water. A side effect will be that the earth's inner heat will have an easier time reaching the surface. Warming the planet. Small as that might be look at it like a drop of boiling water dropped into a lake. If you have a sensitive enough meter you could judge the effect of the extra heat all through the lake. Minor in the scope of things but it takes drops to fill a pail.
All due to Over Population!
Why do we do it? Profit!
Profit can only be made if you are able to sell a product for more than the cost. The cost should include the damage done to the environment. It should be in the form of a tax, not on the entire population but three part, in the case of fracking and oil extraction to those companies engaged in that product, in the case of manufacturers who rely on the materials from the above and the sales outlet selling the product. Not the general public! They pay for it in the long run but it should be an actual user based cost.
Safe Oil?
Tar sands, like in Canada, do not affect the tectonic plates and can be extracted using high pressure steam. Like a large deep pond. Species are clever enough to relocate without human intervention. We, humans, are not God, we can do a little sculpting but we can't do major change. You know, like losing the entire prehistoric animal population that we study frequently. We should be glad they're no longer among us. Maybe if they were we could count the people of the world in the thousands instead of the billions and the good planet Earth would be safe. Some days you just have to grow up and face facts.
Climate Change / Global Warming / Over Population
Nature is sending out it's antibodies to fight the disease that plaques the planet. Her RNA is spectacular to watch but comes with deadly consequences.
To Fight the Disease Nature is displaying the following symptoms:
• The Ozone Layer is being opened to allow dangerous solar rays in to attack the disease.
• Fires are clearing the planet of oxygen generating plants.
• Torrential rain is drowning urban areas and destroying farm crops.
• Hurricanes and Tornados are helping destroy even more.
• Viruses are sent out to reduce the population.
• Earth quakes are more violent due to the removal of earth's lubricant, oil, further heating the planet.
• Volcanoes are spewing out lava, clearing lands, creating toxic air and heating the planet.
• Droughts to sterilize the land against crops.
What is this disease we must conquer - OVER POPULATION!
• The planet can comfortably sustain no more than ONE to TWO BILLION humans, as it was around 1900.
• 8,000,000,000 people are 98.6F/37C degree heat furnaces warming all in its path.
• Horses, cows, pigs, chickens and other feed stock are simply more heat furnaces, each, multiple times the human population.
• Fighting the symptoms listed above is wasted effort and money, only attacking the disease will work!
• If we don't attack and fix the disease then we truly are doomed.
Frankly, anything else is Fake News.
We'll address why Over Population stopped being the issue and Fake News changed the narrative to Global Warming.
Previous Posts:
3. Oil and Gas Part of Earths Shock Sbsorpber
2. Who Benefits from Over Population?
1. The planet's major problem is population growth.
|
By the Middle Ages, the Christian tradition of the seven deadly, or cardinal, sins had developed through centuries. They are: pride (Superbia), greed (Avaritia), lust (Luxuria), wrath (Ira), gluttony (Gula), envy (Invidia) and sloth (Acedia).
In his book Praktikos, in the chapter on the Eight Kinds of Evil Thought, Evagrius Ponticus (345‒399), a Christian monk, ascetic and one of the most influential theologians of the late 4th century, classified eight pernicious thoughts that entice humans into doing evil, thus preventing them access to the Kingdom of God. The list helped to identify the stated vices and their consequences and was also a handbook on how to overcome them. Around the year 590, Pope Gregory the Great was the first to classify the seven deadly sins on the basis of this list. In the 13th century they were additionally acknowledged by Thomas Aquinas and were subsequently adopted by all Catholic theologians.
Pride is regarded as the worst sin because the soul that becomes its victim succumbs to the rest of the deadly sins too, which leads to its death. From the seven cardinal sins all other (venial) sins also proceed. A sin is mortal when it is committed wilfully and is grave enough to lead to far-reaching consequences; it is not mortal if its consequences are less serious and if it is not committed as a result of deliberation but of weakness, carelessness, indifference, or stupidity.
The seven deadly sins no longer hold the same position nowadays as they held in the medieval mentality, yet with remarkable precision they continue to call attention to what we recognize as eternal faults of human nature. Regarded from the entirely ethic standpoint, they fully refer to the behaviour and character of a human irrespective of his/her beliefs or religious affiliation. They point to the weaknesses, or temptations, which people could control with their willpower, but they too easily succumb to them. They are facts of life which equally relate to both men and women who have experienced life. The issue of the seven cardinal sins is timeless.
For more than a thousand years personifications or allegories of sins both in literature and arts assumed different appearance. The theme became for artists a source of moral, religious and poetic inspiration, but in all cases their purpose was to edify or preach. Personifications of sins found a place in comedies, thus making evil a source of amusement, but also in dramas that dealt with more serious subject matter, such as temperance, justice or judgement.
The seven deadly sins are juxtaposed with the seven virtues, the three theological (faith, hope, charity) and the four cardinal ones (prudence, justice, fortitude, temperance). By their very nature the portrayals of sins are their dramatic contrast, and imagination is given free rein in this case. The images of sins are closer to life because artists can draw on everyday reality, so they are more shocking and immediate. There is no danger for them to become abstract as it often happens with the depictions of virtues. In relation to the conviction of their reality, everyone in their imagination can freely shape their look and add the contents.
Hinko Smrekar (1883–1942) executed his woodcut series The Seven Deadly Sins (1927) in a well-thought-out, amusing and provocative way. All personifications are male figures, changed to unrecognizability due to a prolonged life in sin. They have not only been possessed by evil but have themselves become the image of Evil. Their look with clawed hands, sharp and long teeth, pointed ears and grotesque physiognomy is monstrous and in some of them oversteps crude caricature and turns into the animalistic (Wrath, Gluttony, Envy). Their essence is emphasized by their posture, which e.g. in the self-complacent, corpulent Pride, stretched in a period armchair, suggests excess superiority. The figure wears a crown, his fingers are overloaded with rings with precious stones, the costume is richly decorated, his narrowed eyes haughtily look downwards. Greed is presented as an old bony man squatting beside a chest of jewellery, gobbling it up in secret, his body in a spasmodic posture, his eyes feverishly bulging. Lust is a figure of a plump hairy man, perhaps the “kindest” personification of all. He turns his back on the viewer when he sits relaxedly in front of a picture of a female nude that has made him lose his mind. His lust is shown by means of his nose which acts as phallus, which is even more manifest in the coloured version of the woodcut. Wrath, the closest to an animal figure of all personifications, is flaming red, symbolic of hot temper, and wildly tramples down everything that comes to his way. Gluttony is contentedly seated at a table overloaded with food and is pushing a whole ham into his mouth. The man is corpulent, his widely open mouth with enormous teeth looks like an entrance doorway, which indicates immoderacy in all spheres. Envy, depicted strictly frontally in a symmetrical posture, is the most thrilling of all. He is squatting on the ground fully alert, his mouth waters, his eyes, symbolically coloured red, which further enhances the evil effect, are on the watch intently. He is a cold-blooded, evil figure, producing a destructive effect. Sloth is depicted lying in bed, with a night cap on, deeply asleep. He seems completely exhausted, his hand has dropped a book inscribed Adeo Cibis(So much food) which illustrates the sadness of mind and has a deeper meaning than sloth itself.
|
The day of the bankruptcy of Lehman Brothers – level 2
Lehman Brothers was one of the biggest banks in the United States. It invested a lot of money into mortgages. The bank invested 680 billion dollars, but its available money was only 22 billion dollars. It was a very risky situation because if the value of houses went down by only four percent, the bank would lose all its capital.
In 2008, the value of houses fell and the bank started to have big financial problems. The management asked the government for help but the government didn’t help.
On September 15, 2008, Lehman Brothers went bankrupt. It was the biggest bankruptcy in the history of the United States.
Difficult words: mortgage (a contract in which a bank gives you money to buy a house), capital (money or houses which a company has), go bankrupt (to be in a situation when you lose your business because you don’t have enough money), bankruptcy (a situation when you are bankrupt).
What do you think about this day?
Days in Levels is designed to teach you 3000 words in English. Please follow the instructions
How to improve your English with Days in Levels:
1. Do the test at Test Languages.
1. Read two new articles article at Days in Levels every day.
2. Read one previous article too and check if you remember all new words.
1. Listen to the new article and read the text at the same time.
2. Listen to the new article without reading the text.
1. Answer the question under the new article and write your answer in the comments.
1. Choose one person from the Skype section.
|
Essay On Welfare Reform
1122 Words5 Pages
Why Welfare Should Be Reformed
Welfare abuse in the U.S. is more common than the average person thinks. Welfare is defined as, “governmental provision of economic assistance to persons in need” (The Definition). Economic welfare generally refers to financial support. The main purpose of an economic welfare system is to assist citizens who are not able to support themselves or their families due to unemployment, underemployment, hardship, unskilled labor capacity, disability, or other similar reasons. Economic welfare is an incredible effort in many aspects. That being said, every day, welfare is being misused.
The American welfare system consists of over 80 means tested programs. The programs provide cash, food, medical care, housing, and other social services to low income people. Total spending on these programs was over 1 trillion dollars in 2015 (Marshall, 2015).
There have been countless attempts at stopping the abuse of welfare. In 1996 Congress enacted welfare reform legislation. The welfare reform only dramatically impacted one of the 80 means
…show more content…
For example, mothers continue having children out of wedlock to increase the amount of money and benefits they received from welfare programs. Marriage is one of the two most important factors contributing to personal happiness. Marriage is also a very strong factor in promoting the upward mobility of children (Rector, 2006). Marriage is the greatest protector against child poverty. Children born to a married mother and father are about 80 percent less likely to be poor compared to children in single-parent homes. Yet more than 40 percent of children are born outside of marriage in the United States annually (Unmarried, 2016). Replacing husbands and fathers with a welfare check has degraded personal well-being for all involved. Three quarters of means tested aid is issued to one parent
More about Essay On Welfare Reform
Open Document
|
Soldaderas: The Mexican Revolution
953 Words4 Pages
Without Las Soldaderas, there would not have been a Mexican Revolution. Soldaderas, sometimes called Adelitas after a famous corrido about a beautiful and feminine girl, were women who cared for and sometimes fought alongside men in the Mexican Revolutionary war. [Arrizón:90:1998] The name Soldadera comes from the Spanish word soldada, which is a term used to define the payment made to someone who cares for soldiers. Many times, such women were educated and motivated by ideology, rather than just a simple desire to accompany their men. Some of these soldaderas became great leaders and showed the bravery and strength that was so often dismissed in women. Though not all engaged in actual combat, and their roles were often overlooked, these women's…show more content…
These women would also retrieve bodies of killed soldiers from the field and search them for supplies and equipment. They informally performed the roles of commissary and supply departments and medical corps because most Mexican armies lacked these important facilities at the start of the Revolution. [Cook:2012] Soldaderas were used to transport the equipment for the soldiers and were almost always seen carrying cooking utensils, equipment, plants, and animals. Female soldiers who were not married often provided the same services a wife soldadera would to an unattached man. Some soldaderas became prostitutes and made themselves available for hire to those males seeking something more physical. In more extreme cases, soldaderas were even used as smugglers. They would bring ammunition and medicine from the United States into Mexico by hiding them under their skirts. They made good smugglers because American border officers did not see women as a possible threat with any attachment to the war. [Fuentes:541-543:1995]
Soldaderas had to ride on top of the railroad cars. This might have been preferred to walking, but left them exposed to the weather and the enemy. The army's horses were treated better than the soldaderas and rode inside the trains. This was due to the thought that women were expendable, while horses were seen as absolutely vital in combat. [Cook:2012] When they stayed behind the troops, soldaderas faced slaughter and rape from opposing armies who saw that eliminating them would provide an advantage.
Open Document
|
Ten-year-old Chodoba, the oldest of the orphan herd, has been free-roaming around the Kafue Release Facility/Camp Phoenix for nearly eight years, but has never wandered much more than a few kilometres from its safety.
Chodoba always seemed interested in wild elephants and enjoyed wandering free at night around the park, but he was clearly not confident enough to go too far by himself. But when Chamilandu, the oldest female within the orphanage (herself, now nine years old) started to show signs of oestrus and a desire to wander, Chodoba had no qualms in adventuring further afield with the newly adventurous female as his sidekick.
After heavy rains caused flooding at Camp Phoenix, the two took off on a 50 km round trip that took them 13 km away from Camp and out to the shores of Lake Itezhi-Tezhi. Since neither orphan had never ventured further than three km in the past, it is likely that they were following wild elephants to the rich grasslands of the lake’s shores.
First Steps Towards Independence
Luckily the two elephants stayed together, and the EOP was able to track their movements via a GPS satellite collar fitted to Chodoba.
Their absence was noted by their peers because when they finally returned to their home territory eight days later they were greeted with huge excitement by the remaining orphan herd.
Chamilandu’s disappearance with Chodoba was quite a shock; she is the matriarch of the orphan herd and has had a very close bond with Rufunsa, a six-year-old orphan with whom she had previously been inseparable.
After a few days home, the adventurous two took off on another exploration for 22 days into a different part of the Park. Data from our research team suggests that Chodoba and Chamilandu were either moving amongst wild herds or following their well-worn pathways, both very encouraging signs for these orphaned elephants to eventually live independently back in the wild.
Chodoba and Chamilandu have embarked on a few more jaunts away from the Release Facility but after three months Chamilandu has settled back into life with the orphaned herd. It is likely that hormonal changes she has evidenced were the cause of her initial interest to roam further afield.
Venturing Into the Wild
Without the support of Chamilandu for long excursions, Chodoba was found to be spending his time close to the camp and the other orphans. It showed that he needs the company of another elephant (and preferably one he knows well) to head off into more unknown territory.
We thought Batoka (nearly eight years old) would be the most likely candidate for this role, so it came as a surprise that Kafue (six years old) decided to disappear with Chodoba on his next adventure.
The two males have not been back to Camp Phoenix since the May 8 and interestingly have not even associated with the orphan herd whilst out on walks. Chodoba’s collar has indicated a few times that the he has been very near to the orphan herd during the day, but they have not approached their surrogate family.
The young bulls have together travelled further than Chodoba had ventured before and have reached up to 37km from Camp, approaching the communities that border the National Park.
On May 19 our monitoring team tracked the two on foot to determine that they were healthy and still together, since only Chodoba is satellite collared. The report was positive but it really highlighted the importance of getting a collar for Kafue since we cannot assume he will always stay with Chodoba.
With many thanks to International Fund for Animal Welfare who provide major funding and technical support to the EOP, another three satellite collars are now being purchased so that we may ensure that the movements of Chodoba, Chamilandu and Kafue are continuously tracked.
These new more advanced collars will even be able to give greater information about the proximity of collared elephants to each other as well as provide feedback alerts to EOP when the orphans approach predetermined GPS locations/areas, which will give us a greater understanding of their movements and behaviour out in the wilds of Kafue National Park.
Lead image source: IFAW
|
Quick Answer: What Is Red Poem Form 2?
Red is an Indian, A Valentine heart. A circus cart. decorations on a circus cart.
What is red poem metaphor?
The central metaphors in “A Red, Red Rose” are time and love. Burns uses a series of images and concepts that describe love’s delicacy and fragility in time. The first stanza describes his love as full of passion, but temporary. In the second stanza, the speaker says he will love her until the seas go dry.
What is Red Mary Oneal?
Red is sunset. Blazing and bright. Red is feeling brave. with all your might. Red is a sunburn.
What did Robert Burns promise in this poem?
In the poem “A Red, Red Rose,” Robert Burns promises his eternal love to his “bonnie lass” and that no matter how far he might go, he will always return to her side.
You might be interested: Readers ask: What Was The First Poem Maya Angelou Wrote?
What is the feeling inspired in the first two lines of the poem A Red Red Rose?
The first lines compare the speaker’s love to “a red, red rose.” “ Luve” could refer to the beloved, the person the speaker loves. It could also refer to the speaker’s feelings for this person. The newness and excitement of the speaker’s love initially make it seem somewhat unstable.
What does red represent?
What is red poem settings?
In the first stanza, the speaker mentions nine contexts: sunset; being courageous in a situation that demands action; getting sunburned; the sheer depth of color one sees when admiring a rose; an injury which leads to bleeding; observing the color of a building block; being at a concert; the sensation one feels when
What red means?
What is hyperbole explain its purpose Citing examples of hyperbole used in the poem A Red Red Rose?
Hyperbole: Hyperbole is a device used to exaggerate a statement for the sake of emphasis. The poet has used hyperbole in the last line of the second stanza, “Till a’ the seas gang dry.” He says that his love will flow even when the seas dry up. The second is used in the third stanza, “And the rocks melt wi’ the sun.”
You might be interested: O What Is That Sound Poem?
How does the poet express undying love for his beloved in the poem A Red Red Rose?
The speaker expresses his undying love for his beloved in the following ways: First, he compares her to a beautiful red rose. He says his love is so deep that it will last until the seas go dry. He also says he will love her until the rocks of the earth melt—until the end of time.
What is the summary of red roses?
Main Summary: The “A Red, Red Rose” poem is about the speaker’s lovable feelings for his beautiful beloved. So strong is the speaker’s passion for his beloved. He compares his beloved to June’s fresh red rose and the sweet melody of a tune. His beloved is as exquisite as the red rose and the soft tuned melody.
What kind of love is expressed in red red rose?
Expert Answers Burns is expressing romantic love in “A Red, Red Rose.” As the poem’s title indicates, he is at the height of being head-over-heels in love. The red, red rose is a metaphor for his feeling of his love being in the fullest possible bloom.
What does the last line in A Red, Red Rose mean?
What mood or feeling did the author evoke on the reader in A Red, Red Rose?
”A Red, Red Rose” by Robert Burns has a mood that evokes longing and love.
Leave a Reply
|
THE BUG MAN: One Bug, Two Bug, Red Bug, Blue Bug
By James A. Bethke.
Photo by James A. Bethke.
Figure 1. Milkweed bug on milkweed in a butterfly garden.
In the fall, a common call I receive from friends and neighbors concerns masses of bright red bugs on trees, shed walls or front porches. I’ve experienced the same thing at my house, masses of red bugs on the faces of our concrete steps and hiding in mass under boards or between piled bags of soil amendment. While investigating the occurrence, I found that one of these red bugs was an invasive bug (Scantius aegyptius), one that does not belong here and invaded from another country, and that there are many common local species that can be mistaken for the invasive.
Seed bugs or red bugs are true bugs in the insect Order Hemiptera (Heteroptera). When an entomologist says ‘bug’, they mean species in the Order Hemiptera, and everything else is an insect and not necessarily a bug. True bugs have piercing sucking mouthparts, so some of them are predators, some feed on plants, and some can do both. Seed bugs can be found feeding on seeds and seed pods from different plants, and sometimes they are host specific.
One common seed bug is the small milkweed bug, which feeds on seed pods of milkweed like this one in our butterfly garden (Figure 1). Other red bugs that can be mistaken for each other include large milkweed bug, red shouldered bug, box-elder bug, red bug, white-crossed seed bug, painted bug, harlequin bug, some assassin bugs, and some others without common names.
The invasive species is called the red bug, Scantius aegyptius, which originated in the Mediterranean region and invaded Southern California back in 2009. Once established, they proliferated in our environment, which resembles the Mediterranean climate. The most common host plant they have been associated with in our area is cheese weed or malva. In my backyard, I witnessed small immature red bugs holding malva seeds straight out in front of them on their beaks. The seed was almost as big as the nymph, and they would carry them, stumbling, as they tried to run away. They weren’t holding the seed with their legs. They had pierced the seed with their proboscis and raised the seed out in front of them.
Photo by Peter Bryant, University of California Irvine.
Figure 2. Aggregate of red bugs, Scantius aegyptius, probably caused by pheromone production by individuals in the fall.
Red bugs aggregate most likely due to a pheromone. They will overwinter as a group then disperse when new plant growth occurs, and seeds are produced. For those of you that are concerned about the masses of red bugs and what to do about them, I need to remind you that they are not a plant pest, they are more likely a nuisance pest simply because of their presence and numbers. So, if they are a nuisance and you want to get rid of them, I do not suggest spraying them with insecticides. I recommend getting out your vacuum cleaner and sucking them all up, bagging them, and getting rid of them in the trash. If you have milkweed bugs, your plants are suffering, and you love monarchs, then spraying them with a low rate of insecticidal soap will be the best you can do, and it will have minimal effect on the monarch larvae.
Jim Bethke
James A. Bethke is the Floriculture and Nursery Farm Advisor Emeritus for San Diego and Riverside Counties.
The Floriculture and Nursery Farm Advisor Emeritus conducts applied research, education and outreach programs to improve production and viability of the floriculture and nursery industries in San Diego and Riverside Counties.
Jim's program emphasizes the integrated pest management of major pests of floriculture and nursery production. He collaborates with regulators, growers, and other scientists on advisory committees that set policy based on science.
|
Help protect the Great Barrier Reef with TensorFlow on Kaggle Join Challenge
View source on GitHub
Computes the mean squared error between the labels and predictions.
The mean_squared_error function creates two local variables, total and count that are used to compute the mean squared error. This average is weighted by weights, and it is ultimately returned as mean_squared_error: an idempotent operation that simply divides total by count.
For estimation of the metric over a stream of data, the function creates an update_op operation that updates these variables and returns the mean_squared_error. Internally, a squared_error operation computes the element-wise square of the difference between predictions and labels. Then update_op increments total with the reduced sum of the product of weights and squared_error, and it increments count with the reduced sum of weights.
labels A Tensor of the same shape as predictions.
predictions A Tensor of arbitrary shape.
metrics_collections An optional list of collections that mean_squared_error should be added to.
name An optional variable_scope name.
mean_squared_error A Tensor representing the current mean, the value of total divided by count.
update_op An operation that increments the total and count variables appropriately and whose value matches mean_squared_error.
RuntimeError If eager execution is enabled.
|
Why are genes for cytoplasmic male sterility in plants generally located in mitochondrial genome?
Asked by pb_ckt | 4th May, 2019, 12:03: AM
Expert Answer:
Mitochondria are the eukaryotic cell organelles that originate from pre-existing mitochondria only. Mitochondria are also known as semi autonomous organelles because they contain a circular, double stranded DNA molecule, RNA and 70S type of tibosomes. The genes, located outside of nucleus (i.e., within the cytoplasm) also governs some traits, called as plasmogenes or cytoplasmic genes. Cytoplasmic male sterility (i.e., dominance of female cytoplasmic genes over male) is due to plasmogenes located in mitochondrial DNA (mt-DNA)
Answered by Sivanand Patnaik | 5th May, 2019, 08:42: PM
|
Counselling or Therapy? Who to see when you need mental health support
Navigating the complexities and routes of the mental health world can be confusing, stressful, and a real challenge to understand. For example, people may have difficulty over the various titles of various professionals involved in mental health counselling and therapy.
To add to this, NHS services for children and adults are under increasing pressure. Insufficient funding and resources, which has resulted to long waiting times and suboptimal outcomes, has increasingly led people to seek support from the private sector. Whether you’re trying to navigate systems in the NHS, or looking for someone who can help in the private sector, it can be a significant ordeal getting the right help at the right time.
With this in mind, we thought it would be useful to guide people through some of the people and roles you might come across in the mental health field from psychiatry to counselling.
Please note that this is not an exhaustive list and serves only to give an overview.
A psychiatrist is a medical doctor who has undergone the same basic training as any other doctor, such as a GP or surgeon. They have also undertaken several years of extra training to specialise in mental health. In the UK, the role of a psychiatrist is typically to assess and diagnose mental health disorders, according to a set of diagnostic criteria. The way in which they offer treatment is typically prescribed medication. They may also be involved in the assessment and diagnosis of developmental conditions. UK-based psychiatrists will very rarely offer talking therapy, but may refer their patients to other professionals who do.
Counsellors or Psychotherapists
Counsellors have completed at least one diploma in counselling or a particular model of therapy, such as CBT. The terms ‘counsellor’ and ‘psychotherapist’ are not legally protected titles, therefore it is worth exploring what training they have received. Counsellors and psychotherapists are trained to work with individuals and couples in order to address a number of different common mental health difficulties. There is huge variation in the types of therapy and counselling on offer. An example: someone who holds a diploma in Cognitive Behavioural Therapy (CBT) would typically be called a CBT therapist.
Educational Psychologists
Educational Psychologists work with children and young people, typically up to the age of 19, to address issues related to learning, emotional, and behavioural development. Most are employed by local education authorities; however, many also work in a variety of other settings, including the private sector. They work in collaboration with other professional groups, such as teachers and social workers, to help develop a plan for young person to aid their development. Currently, in order to hold their title, educational psychologists must complete a doctorate and be registered with the Health and Care Professions Council (HCPC), the organization that oversees the training and competence of these clinicians. This title is therefore legally protected.
Clinical Psychologists
Clinical Psychologists are mental health professionals who have completed an undergraduate degree (or equivalent) in psychology. They would typically then gain clinical experience in mental health settings, and complete one of the accredited three-year Doctorates in Clinical Psychology (DClinPsy). Clinical Psychologists are trained in a number of different types of talking therapy in order to help people with a range of different mental health difficulties. They are also trained to undertake and evaluate current research to determine the most effective treatments, and often supervise the clinical practice of other mental health professionals. Whilst anyone who has completed a psychology degree can call themselves a psychologist, the term ‘Clinical Psychologist’ is a legally protected title that safeguards the quality and rigor of the training they have undergone.
So, out of all of these people, how do I know which one to see?
We hope that the information above will help to clarify the role of various mental health professionals you may come across within the psychology and counselling world. This article can’t tell you exactly who to choose, as this is a personal decision and will vary from individual to individual.
However, an essential thing to remember is that the relationship that develops between the professional and individual/family is the best predictor of success in addressing difficulties. It is very much worth considering who you’re working with, as well as what professional group they belong to. Please know that you are entitled to ask many questions about professional qualifications, training, experience whilst looking for a professional to help. You can also ask about how they can support you and/or the person you care about.
It can be stressful in accessing services and professionals. But they are there to support you. The benefits from seeing a professional can be monumental. So don’t be afraid or reluctant to reach out and ask.
This blog was written by Dr Bear, a clinical psychologist and Wellbeing Director for youHQ and Life on Time. He has worked in the NHS and private sector for 15 years in a variety of roles across the country.
If you're struggling to find help for yourself or a loved one, charities such as Mind, YoungMinds, Rethink Mental Illness, and Mental Health Foundation are a good starting point to finding resources and professionals you need.
For more information about youHQ, our school wellbeing platform, and to sign up for a free trial, please click HERE.
42 views0 comments
|
3 min read
Is offsite construction helping the M&E sector achieve net zero [free white paper]
Jake Lyons
Jake Lyons
Technical Sales Manager
Is offsite construction helping the M&E sector achieve net zero?
The building and construction industry is responsible for 39% of all carbon emissions released into the atmosphere. Operational efficiencies make up 28% of the total (energy needed to heat/power a building) and the remaining 11% is embedded carbon (defined as manufacturing, transportation, and construction phases of a building before it goes into use). (Global Status Report, 2017). Will Tier 1 contractors and subcontractors look to offsite manufacturing to help meet the net zero 2050 carbon emissions target?
Carbon emissions omitted from the building and construction industry
Carbon emissions omitted from the building and construction industry
What is Net Zero?
The UK Green Building Council defines net zero as “when the amount of carbon emissions associated with a building’s embodied and operational impacts over the life of the building, including its disposal, are zero or negative”1
Is time running out?
By 2030 all new buildings must operate at net zero carbon and by 2050 every building in the UK should be operating at net zero carbon. Since the legislation was passed in 2019, principal contractors have prioritised carbon friendly strategies for new builds.
An example of this can be seen in the UK’s largest diagnostic COVID testing facility construction project, led by a multi-disciplinary collaboration of Mace and Balfour Beatty. The 225,000 square foot laboratory is being built within an existing warehouse building to reduce carbon emissions during its delivery (Clark 2021).
Advancing Net Zero
Inspired by Proud Green Buildings, 2018.
What are the key principles of Net Zero?
• Measure and disclose carbon.
• Reduce energy demand.
Prioritise energy efficiency to ensure that buildings are performing as efficiently as possible, and not wasting energy.
• Generate balance from renewables.
Supply remaining demand from renewable energy sources, preferably onsite followed by offsite or form offsets.
• Improve verification and rigour.
How can offsite construction help contractors adhere to these principles?
Often known as prefabrication or offsite manufacture, ‘offsite construction’ refers to the completion of elements or components of a construction project at a different location to where they will be permanently installed (Design Buildings, 2020).
Offsite construction can greatly aid the fourth principal – improving verification and rigour through embedded carbon. If the methods of offsite construction are practiced, then the carbon emissions from the manufacturing, transportation and construction phases of a building can be reduced.
Early engagement with offsite construction specialists is the key to unlocking the environmental transport benefits. This means that solutions are optimised as early as the design stage of a concept and therefore reducing weight, materials, and volume. All these factors reduce the amount of transport required to get a completed solution onsite. Comparatively, when solutions are fabricated onsite, components are often sourced from multiple sources for price reasons and therefore greatly increase the amount of transport required to achieve the end solution.
Manufacturing stage
Whilst offsite construction techniques obviously remove the need for hot works onsite, offsite specialists often take this a step further by taking advantage of modular systems that do not require hot works at all. In addition to this, cutting and drilling on site is reduced and therefore decreases the amount of waste produced by the site.
Space onsite
As offsite construction often takes place in a factory setting, there is often less requirement for cutting and assembly stations on-site. This reduces the need the labour requirements and thus decreasing carbon emissions.
Offsite construction techniques have been embraced by many of the UK’s leading tier 1 contractors such as Kier Group, Mace, and Balfour Beatty.
Read our white paper for an in-depth review of the offsite construction methodology.
Offsite construction and net zero
In this whitepaper we outline:
• The growth of the construction industry and the M&E sector.
• The history, benefits, barriers, and potential solutions for offsite construction.
• How offsite construction can help the construction industry and the M&E sector meet the net zero target.
Can you afford not to adopt the proven principles of offsite construction?
1. Clark, T (2021) ‘Mace and Balfour picked to deliver COVID testing facility’ Source: Construction News [https://www.constructionnews.co.uk/buildings/contracts/mace-and-balfour-picked-to-deliver-covid-testing-facility-14-07-2021/]
2. UKGBC (2019) Net Zero Carbon Buildings: A Framework Definition. UK Green Building Council, London. 25pp. [https://www.ukgbc.org/ukgbc-work/net-zero-carbon-buildings-a-framework-definition/]
3. Proud Green Buildings (2018) 'Infographic Advancing net zero' Source: [https://www.proudgreenbuilding.com/news/infographic-advancing-net-zero]
KIER GROUP, (2020) ‘ The Choice Factory – integrator of manufactured solutions’ Source: [https://www.kier.co.uk/media/4717/the-choice-factory-volume-2.pdf]
Topics: Offsite Construction, Sustainability, DfMA
|
Things About Software You Need To Experience It Yourself.
Last modified date
Comments: 0
Software is a collection of instructions which inform a computer exactly how to perform a certain procedure. For example, software which tells a computer to activate a certain appliance, or software program which informs a computer to perform an on the internet deal. Both instances involve a specific piece of computer hardware. Nonetheless, software is usually saved inside a computer. The computer system which keeps the software probably has a motherboard or mother board which functions as a repository for the software program.
A major distinction in between hardware and software is that software offers a low-level procedure job while equipment serves a higher degree or a user-level procedure. For example, let’s look at how a car drives. The auto drives, the engine transforms power right into a mechanical activity, and tires provide grip. In this example, we can see just how software offers a reduced degree procedure task while equipment offers a greater level or user-level operation.
Software program, nonetheless, is designed to execute a greater level task. And to do so, it should connect with certain equipment components. So as an example, allow’s take a look at the following example. When a user inserts a bank card into an equipment gadget, claim a bank card device, the maker does what is called a “round trip” operation. This indicates that the computer system requires to check out the info that gets on the debit side of the card and after that process the acquisition (offering it a “cost”).
Software program is often less expensive than equipment because it does not require to support a huge selection of different features. For example, allow’s take software like the Windows operating system and also compare it to a program like Java. Windows works simply fine if you are only thinking about standard functions. Java on the other hand will run efficiently if the program you are running has a large selection of different functions and consumes a lot of sources (a Java applet) when it is not actively being made use of. Software like Java is extra expensive to create due to the fact that it likewise needs to have a large library of various different sorts of Java code which can be run throughout the runtime of an application. Software like Windows is more affordable to establish because there are less commonness in between various pieces of equipment as well as the operating system.
Software can also be less pricey due to the fact that it does not need to include device drivers which are in fact needed to operate a specific piece of computer. Many software program comes preinstalled with tools like printers as well as keyboards. Windows comes preinstalled with all of the fundamental features like mouse, keyboard, display capture gadget, video camera, video clip capture device etc. That’s why the command line motivate, which is basically a series of extremely basic commands to do something, is always consisted of as part of Windows. And also the motorist is commonly consisted of with the operating system at the time of the installation of the computer hardware.
As a result the first thing that you need to be knowledgeable about is the difference in between energy software as well as software. Energy software program helps you utilize the fundamental os attributes and also offers you with a number of typical usages for the hardware that exists in your computer system. As an example word processing application software and workplace productivity application software, are both energy software program.
On the other hand software has different kinds of commands which you can perform on the computer. They can be command line instances, which are simply easy text commands to do something, to develop a data, or to print something. An additional example is shell commands, which are executed by the command covering. These instances are not so typical but are required for the procedure of certain programs.
Utility software application is created to be very straightforward to use and also to be able to perform a specific set of tasks. Nevertheless energy type applications are not the just one that you will certainly locate on a computer system. Various other sorts of applications are system software and software. In a sense system software is needed even if you do not want to use any type of type of utility application. But if you wish to make use of some energy type programs, you can make use of such applications such as Disk Cleaning Software which assists you to tidy up your hard drive.
Software is a collection of instructions which tell a specific computer how to do a details job. In comparison to equipment where the equipment is developed as well as essentially does the work, software program in fact carries out the desired work and also is put together by the individual. Primarily, software application are made use of to change just how a computer system functions, as well as the brand-new software is after that mounted or downloaded and install. There are numerous sorts of software application, each made for a certain feature.
Most computer system systems make use of some sort of software application for their procedure. The most prominent is the Windows operating system. The reason Windows is so popular is since it is what many people know as “COMPUTER”. Equipment based operating systems differ in that they run directly from equipment without needing to be connected into a PC. Both of these types of operating systems have different objectives, however.
For instance, in Windows, all the documents, applications, and also various other alternatives are organized in a tree structure. Each documents or program option is linked to a branch, and afterwards the next branch down is the choice which was clicked. When an engineer or someone in advertising wishes to alter how a piece of software program jobs, they will likely need to go through this whole tree system to get software application development services. That being claimed, it might be extra efficient to obtain software program development services from the designers themselves, instead of needing to go with the entire Windows system. This way, engineers can focus on coding as well as much less on the formalities of the Windows os. tms software for brokers
Designers also use data source monitoring to make the computer system as reliable as possible. The data source monitoring system makes it possible to have numerous variations of a particular application, or multiple versions of a program, going for the very same time. Database management also helps with software application design by making the creating of technical remedies easier. Data source engineering is included database style, data evaluation, data source optimization, and also integration with the rest of the design team. An effective data source management group has the skills to fix technological troubles while utilizing one of the most effective programs languages and best database offered.
Leave a Reply
Post comment
|
<var id="bhnz1"><strike id="bhnz1"></strike></var>
<var id="bhnz1"></var>
<var id="bhnz1"></var>
<cite id="bhnz1"></cite><var id="bhnz1"></var>
<cite id="bhnz1"></cite>
<var id="bhnz1"><strike id="bhnz1"><listing id="bhnz1"></listing></strike></var>
<var id="bhnz1"><strike id="bhnz1"><listing id="bhnz1"></listing></strike></var><menuitem id="bhnz1"></menuitem>
> Opinion
Dissemination of the epic Gesar requires multiple approaches
CHEN BOHAN | 2021-07-08
(Chinese Social Sciences Today)
A Tibetan student from a primary school in Qinghai Province sings about the epic Gesar. Photo: Zhang Tianfu/CNSphoto
Collectively created by Tibetan people, Gesar is a great heroic epic. Particularly emotive, it is one of the three most honored Chinese epics. It was included into the National Intangible Cultural Heritage List in 2006 and added to the Representative List of the Intangible Cultural Heritage of Humanity by UNESCO three years later. With rich content and enormous volumes, it has been handed down till today among Tibetan, Mongolian, Tus, Yughur, Nakhi, Pumi and other ethnic groups. Gesar is not only disseminated in Tibet, Inner Mongolia, Xinjiang Uygur autonomous regions and Qinghai, Gansu, Sichuan, and Yunnan provinces, but also in Nepal, Bhutan, India, Pakistan, Mongolia, and Russia’s Kalmykia and Buryatiya. It can be said that the epic is widely spread in cross-border, cross-regional, cross-ethnic and cross-cultural ways. Providing rich nourishment for the thriving the Chinese nation, it contributes a splendid chapter to global civilization.
Generally speaking, the epic of Gesar is disseminated in two basic ways: one is through oral narration and retellings in local cultural spaces; the other is through records and preservation in written texts. The former involves many art forms such as music and singing, and is the main way in which Gesar is handed down till today. With the rapid development of information technology, the dissemination of Gesar has now ushered in new opportunities.
The first is modern film technology, which is applicable for displaying magnificent, grand images of Gesar. Based on the narrative texts, modern technology can choose different scenes and adopt means such as 3D, 4D, giant-screen movies, circular-screen movies, and holographic imaging. The real-scene shooting and optical illusions are combined for viewing effects in which truth and fantasy are blended. For the legend of Gesar, this is almost a tailor-made means of presentation. There are numerous films and TV series on historical topics in China, but those about King Gesar are still rare, which is unfortunate for inheriting and carrying forward refined traditional Chinese culture.
More opportunities to advance Gesar exist in the clever use of acoustic-optic and electronic technology to provide viewers with immersive experiences, so that more people can truly tap into Chinese epic culture. Today, sophisticated modern technological means have already altered traditional concepts, which were confined to museum displays. The old pattern of pictures coupled a text description, hanging on the walls of an exhibition, can no longer satisfy people’s growing need for real experience. Acoustic-optic and electronic technology enables people to participate in historical narratives in a real way so that their immersive perception and sensory feel is heightened. For example, through a virtual racetrack, spectators can race with “King Gesar” to experience the thrill of the throne contest. Meanwhile, the virtual figure of King Gesar can be created and the digital figure can be connected with the real world to create dialogues between the two spaces of the virtual and the real.
Cultural and tourism projects are also suggested to fully tap historical resources about King Gesar. As the central tourism area of Gesar culture, the Ganzi County of Ganzi Tibetan Autonomous Prefecture possesses over 120 cultural ruins and remains related to Gesar. To better inherit and protect these sites, the King Gesar City, which costs 0.63 billion RMB, began its operation in September 2019 under the guidance and support from the local government. This lays a foundation to extensively disseminate Gesar’s epic culture. Equipped with cultural experience zones and museums, the King Gesar City is a cultural compound worthy of its reputation.
To promote the ethnic culture through technological means is of great significance for stronger recognition of a unified national identity. But technological means are not enough, and the following points also warrant attention.
Textual translation should be conducted with support from national major research programs. Despite the importance of modern technology, epic texts will always be foundational. Original texts, passed down within folk communities, together with subsequently collated oral or sung texts gathered by folklorists, are prolific. Mostly manuscripts in languages spoken by ethnic minorities, these texts tend to embody different views toward the nation and the history as time evolves. Therefore, authoritative Chinese-language versions of Gesar which hold unified political and historical views are in urgent demand.
Cultural identity is the most fundamental. The epic of Gesar is embedded deep in the minds of Tibetan compatriots and stems from their reverence for King Gesar, as they consider the king the essence of justice and wisdom. This tradition forges the great national spirit, with patriotism as the core. Therefore, to publicize the image of King Gesar, as a signal of Chinese culture shared by all ethnic groups, is of great value for contemporary dissemination of the great work’s epic culture.
Chen Bohan is an assistant research fellow from the Institute of Ethnic Literature at the Chinese Academy of Social Sciences.
Edited by BAI LE
|
Synonyms/Hypernyms (Ordered by Estimated Frequency) of noun written_material
1 sense of written material
Sense 1
writing, written material, piece of writing -- (the work of a writer; anything expressed in letters of the alphabet (especially when considered from the point of view of style and effect); "the writing in her novels is excellent"; "that editorial was a fine piece of writing")
=> written communication, written language, black and white -- (communication by means of written symbols (either printed or handwritten))
2021, Cloud WordNet Browser
|
747 Views0
Both men and women experience hormonal decline with age
For most of people the fifth decade of life is the time for hormonal changes. This is the time when ovaries, testicles and other endocrine glands decrease their production of estrogen, progesterone and testosterone.
In men this phase of endocrine change is called andropause, and in women it is called menopause. The hormonal imbalance that ensues is associated with major physical and psychological changes.
The symptoms of hormonal imbalance differ according to the gender. In women the typical signs are depression, anxiety, daytime fatigue, insomnia, weight gain and lack of concentration.
Men typically experience include low libido, irritable mood and memory problems.
Although there are several ways of dealing with individual symptoms of menopause and andropause, hormone replacement therapy is the most comprehensive approach that can address multiple consequences of hormonal imbalance at once.
Conventional hormone replacement therapy uses synthetic hormones that are not an exact match of natural hormones. This means they need to be modified inside the body first which creates byproducts leading to dangerous side effects. Common side effects are stroke, heart attack, cancer and dangerous blood clots.
Bioidentical hormones on the other hand are identical in its molecular structure to the original human hormones produced by endocrine glands. Bioidentical hormones are derived from natural plant extracts which are biologically compatible with human body’s chemistry.
Hormone receptors in human cells easily accept bioidentical hormones without the need of modifying them first. This decreases the risk of side effects.
That is the reason Bioidentical hormone replacement therapy (BHRT) is the most natural way to treat the symptoms of menopause and andropause. With BHRT one can restore hormonal balance without dangerous side effects.
Sex hormones are not only important for reproduction and sex characteristics, but also they are involved in prevention of many chronic disorders and diseases as colon cancer, osteoporosis, cardiac diseases, strokes, Alzheimer’s disease, prematurely aged skin, diabetes and depression.
The most commonly replaced hormones in women are estrogen, progesterone and testosterone.
Estrogen is responsible for sexual characteristics but it plays additional important roles. It protects from colon cancer, strokes, heart attacks, osteoporosis and even dementia. It also helps with mood.
To avoid dangerous side effects, it is very important to balance estrogen with progesterone.
Progesterone helps lower blood pressure, is a natural antidepressant, improves sleep patterns, increase metabolism and stimulates new bone production. Progesterone adjust the amount of estrogen in the blood, so insufficient amount of estrogen can lead to estrogen dominance which is characterized by fatigue, anxiety, fibroids, breast cancer and endometriosis.
Men also benefit from bioidentical hormone replacement therapy.
At least 20% of men over the age of 50 don’t produce enough testosterone. Low testosterone level can affect muscle cell functioning by decreasing production of growth hormone called IGF-1.
Research shows that BHRT decreases accumulation of fats by increasing lean body mass and improving muscle strength in legs and arms. Testosterone therapy in older men can achieve great results in management of frailty especially in men over 70 years.
Testosterone plays an important role in women, too.
It is responsible for libido and proper cognitive function in both men and women.
Without enough testosterone on board, both men and women experience loss of concentration, memory problem and mood changes after the age of 40 because many parts of the brain as hypothalamus, hippocampus and amygdale are dependant on testosterone for normal functioning.
Adding testosterone to BHRT can achieve stronger sex drive, enhanced mood and a general sense of wellbeing in both men and women.
|
Modifying a string
Choose Strings from the Resources menu. The Strings window will open, allowing you to select the string to edit.
The Microsoft Dynamics GP dictionary contains several thousand strings. The Strings window may take a few moments to open.
1. Select the appropriate dictionary core.
String resources are divided into several cores, which are special divisions in the dictionary. Microsoft Dynamics GP has a core for each major module category. When locating a string, begin by choosing the core that the string is most likely contained in. For example, the string “Customer” is likely part of the Sales core, so begin looking there. If you don’t find a string in a particular core, look in the other available cores.
1. Select the string to edit.
After you have located the string, select it in the list and click Open. The String Definition window will appear, as shown in the following illustration.
1. Edit the string.
Edit the string in the String Definition window and click OK to save the modified string.
Documentation Feedback
|
Social relationships: Our brain influences the maximum number of our friends
Primates have a maximum of 15 really close friends
How does it depend on how many good friends we have among our acquaintances? Researchers have now found that we all have a certain hormone that determines how many friends we have in our close social environment. In general, people only have a narrow social circle of five to 15 people and a more superficial broader circle of friends of up to 150 people.
Scientists at internationally recognized Oxford University found that chemical makeup in the brain of humans and monkeys limits how many friends we can have at any one time in life. The doctors released a press release on the results of their current study. The topic was also presented at this year's meeting of the American Association for the Advancement of Science (AAAS) in Boston.
The extensive circle of friends consists of a maximum of 150 people
Have you ever been jealous of people who seem to have hundreds of friends? Then you shouldn't worry. Because current research has shown that the real circle of friends and the social network are much smaller in reality. A hormone limits the number of our friends. The doctors explained that our closest social circle consists of a maximum of five to 15 friends. The wider group of friends consists of a maximum of 150 people, say the experts.
The size of the brain and available time limit the circle of friends
The size of our brain and the time available to cultivate friendships limits the maximum number of friends and acquaintances, explains author Professor Robin Dunbar from Oxford University. So someone with 5,000 Facebook friends has 4,850 superficial acquaintances rather than real friends.
People develop new ways to expand the circle of friends
As soon as your close circle of friends goes beyond five to 15 people, it becomes increasingly difficult to use psychological contact to trigger the so-called endorphin system, says Professor Dunbar. One reason is simply that we don't have enough time. In today's society, however, people have found new ways and opportunities to deal with many acquaintances and friends at the same time. This increases the size of the extended circle of friends up to 150 people.
What is the dual process bonding mechanism?
Primates have developed a so-called dual process bonding mechanism. This depends in part on advanced cognitive skills, the scientists say. With the so-called social brain hypothesis, we make conscious, calculated decisions. These also affect how much we can trust an individual. In addition, this effect also affects the activation of the endorphin system through social care, the doctors add.
Nowadays people can form large and structurally complex social groups
Physicians seem to have expanded this mechanism so that they can form unusually large and structurally complex social groups. The current study shows how in our brain the conscious and subconscious parts work together when it comes to making friends. The mechanism could generally be used to set the optimal numbers for the size of different groups of people. This affects, for example, the number of employees in companies or simply the decision how much children you ultimately want. With the help of the results, the effectiveness of even large-scale societies, such as the EU or the United States of America, could be assessed, the experts say. (as)
Author and source information
Video: TEDxObserver - Robin Dunbar - Can the internet buy you more friends? (November 2021).
|
Students outside library
WLCE Co-Director Assesses Leisure in the Time of a Pandemic
VIU Professor Joanne Schroeder says the COVID-19 pandemic has highlighted the importance of access to leisure activities as an investment in the long-term health and well-being of communities.
Joanne Schroeder
The urgent need to stop people from gathering in close proximity to one another to slow the spread of the COVID-19 virus took away or severely restricted most forms of leisure activities outside the home over the past 10 months. The list is exhaustive: gymnasiums, galleries, theatres, music venues, recreation facilities, libraries, places of worship, restaurants, bars, professional sporting events and even local playgrounds and campgrounds were closed. Borders began closing and fraternizing with the neighbours was not allowed.
We asked Vancouver Island University (VIU) Professor Joanne Schroeder, Co-Director of the VIU World Leisure Centre of Excellence and the first female chair of the World Leisure Organization Board of Directors, why leisure is important and how the global pandemic is changing our perception of the role leisure plays in our lives.
What is leisure?
Article 24 of the Universal Declaration of Human Rights proclaimed by the United Nations General Assembly in Paris, December 10, 1948, states that everyone has the right to rest and leisure, including reasonable limitation of working hours and periodic holidays with pay.
“The World Leisure Organization defines it as a central force that enhances the human condition,” says Schroeder. “There are many activities that fall under the umbrella of leisure: sport, recreation, tourism, travel, arts and culture, dining out, reading, shopping or play. It’s this concept of the freedom that people have to choose to participate or pursue activities of interest to them or that give them pleasure.”
On a global scale, there continues to be inequities in access to leisure activities for all people, and government and non-government agencies continue to search for a solution.
“We will continue to push for how important it is for all people to have access to recreation and leisure pursuits,” says Schroeder. “The reason why there is a World Leisure Organization that has consultative status to the United Nations is because the world acknowledges we are at a critical point. Countries with a better socio-economic status see leisure as a critical aspect of enhancing society. Yet in many areas of the world, the pursuit of leisure is only for the affluent while many workers are employed at little more than subsistence wages.”
The evolution of leisure during a pandemic
Schroeder says the pandemic has highlighted the value of spaces.
“At the root of it is community. When we come together as a group, we are stronger as individuals,” says Schroeder. “We do things like eat together, walk in parks together, play together and socialize together. Those are all an aspect of leisure and when we remove those, we can see a huge impact to our health and well-being.”
Historically, people often think of physical buildings, whether they are private or public, as the places and spaces where we engage in leisure.
“But the reality is leisure activities moved outside of those facilities and I believe that it is going to be emphasized even more as we come out of the pandemic,” says Schroeder. “There is an evolution of leisure happening where we have room to move around in our cities, communities and neighbourhoods.”
Post-pandemic perspectives
Formed in 1952, the World Leisure Organization is a non-profit, non-governmental body of individuals and organizations from all parts of the world that promotes leisure as integral to social, cultural, economic and sustainable environmental development.
Schroeder has more than 25 years of experience in public and non-profit recreation services encompassing a variety of leisure delivery experiences. She says the COVID-19 virus has created further opportunities for introspection on the way we spend our free time and perhaps insight on the way forward in a post-pandemic future. In her role as chair of the WLO board, she hopes to elevate the conversation of leisure across the globe.
“There are many countries that are not having these conversations,” she says. “Worldwide, our job right now as leisure professionals is to not just talk about this, but to talk about ways to make a lasting change going forward,” says Schroeder. “The field of leisure is changing and it took the pandemic to make us look at what is happening. We need to examine how travel impacts our footprint across the globe, re-think local tourism, how can we as individuals support ourselves and our communities, the importance of getting out into our local parks and spaces and what’s going to make our world healthier both environmentally and sustainably.”
Schroeder says it is evident that access to green spaces has a significant impact on our mental health and well-being.
“However, in many countries with huge population densities and high poverty, more needs to be done to elevate the conversation in the context of their country so policymakers see that importance and work to develop a healthy lifestyle, how they plan their cities and create green spaces,” says Schroeder. “From what we have learned in this pandemic, we need those supports in place for the next time so we come back stronger.”
Schroeder says a shift to a “well-being economy” a place-based approach to growth that guides policy decisions is what’s going to make our world healthier, both environmentally and sustainably.
“Our community challenges are not discipline-specific,” says Schroeder. “For example, health care is also about poverty, housing, healthy family units and access to education. Here at VIU, our Recreation Prescription Project is a prime example of students from a variety of disciplines including Sustainable Leisure Management, Child and Youth Care, Physical Education, Nursing and Education students are working in partnership with the City of Nanaimo Parks and Recreation, Island Health, and the Nanaimo Ladysmith School District to introduce Grade 5 students to more active and healthy lifestyles. They all come at it with a bit of a different lens, but they are talking together about the aspect of health and well-being. It will be the young, emerging leaders coming out of our education systems who are embracing interdisciplinary and intersectoral approaches to solve the complex social issues they are up against in society.”
Schroeder says the shift needs to occur at a global level.
“Someone said to me, when you get involved at a global scale, you’ll never see your local world the same, and that has been so true for me. There is so much we can learn from other parts of the world and perhaps adapt and apply those concepts to fit our own individual or societal context that can improve how we live and live a better life.”
Media Contact: Annette Lucas, Communications Officer, Vancouver Island University
C: 250.618.7296 | E: | T: @VIUNews
Related Posts
|
Children of Odin: Thor, Heimdallr and the Valkyries
The leader of the Norse pantheon, Odin, was known for his many sons. Some were famous, some less so! Very few sources mention any daughters for Odin, but his sons made up the majority of the pantheon, along with their wives. For this reason, Odin was known as the All Father.
Odin was also the one to give life to mankind, and in a way, this made him the father of all sapient life on earth. However, the following list focuses on his godly sons (and a few of his daughters), and their impact and importance on Norse mythology.
The Children of Odin
1. Baldr
Baldr was the son of Frigg. Baldr was a sailor who captained the greatest boat ever built. He was known as bright, glorious, and good, but his most famous story unfortunately involves his death. Loki, the trickster god, manipulated Baldr’s blind archer brother, Hodr, into piercing him with a mistletoe spear, killing him. Baldr was then taken to Helheim, where the gods attempted to resurrect him – but without success.
2. Meili
Meili was a favored brother of Thor, though his mother was unclear. He was very similar to Baldr, and some sources even attest that they were the same person. He was the second son born after Baldr, but little else is known about him.
3. Vithar
Vithar’s mother was a giant named Grithr. Perhaps because of this, he was a god associated heavily with vengeance. During Ragnarök, Odin was fated to die at the jaws of the monstrous wolf Fenrir. However, according to the prophecy, Vithar would survive the battle and kill Fenrir in return. After Ragnarok, he and Valdi lived together in the temple of the gods in the new world.
4. Nepr
Nepr was known as the brightest of all gods. He was the father of Nanna, who was the beloved wife of his brother, Baldr. Not much is known about Nepr. Nanna, though, threw herself onto Baldr’s funeral pyre so that they could be reunited at the end of the world. Nepr was not always Nanna’s father, however, as uncle and niece pairings were not common in Norse mythology.
5. Hodr
Hodr, Frigg’s son, was known as the blind archer, was the god manipulated into killing Baldr by the hand of Loki. Despite the manipulation, he was the one who was punished, slayed by a brother who was born specifically for this purpose. Hodr was defenseless against the attack due to his blindness.
6. Váli
Váli was Odin’s son by the giantess Rindr. He was conceived and grew to adulthood in the same day, born only to avenge Baldr. He killed Hodr, then went to punish Loki. He did this by killing Loki’s son Narfi, then binding Loki in place using Narfi’s entrails. Váli was prophesised to survive Ragnarok. Some transcription errors make him Loki’s son.
7. Áli
Áli was the Norse version of the Swedish king Onela who is attested in Beowulf. According to Norse tradition, he was Odin’s son who went to war with Ailis of Sweden. At the battle, he was struck by a spear and fell from his horse, where he died. As Onela, Áli was also the son-in-law of a King of Denmark known as Halfdan.
8. Bragi
Bragi was a skald and a god of poetry and song. Much gentler than his warlike brothers, he was often invoked by those who favored the creative arts. His mother was either Frigg or the giantess Gunnloth. Frigg was very dismissive of him in either case, claiming him as no son of hers when compared to Baldr. Bragi married Idunn, a goddess of youth and apples. The two were often attested as happiest amongst the gods.
9. Thor
Perhaps the most famous of Odin’s sons, Thor was a warlike god of thunder who nursed a special hatred for the giants. This was despite the fact that his mother was likely a giantess. However, while Thor often got caught up in duels, he was also a protector of his family and of mankind. His wife was the beautiful goddess Sif, who had hair of gold. He had a petty rivalry with Loki and with several other gods.
10. Hidolfr
Not much is known about Hidolfr. He was listed as the next son after Thor, and his name meant war-wolf. Like most of his brothers, he was presumably war like and likely a soldier at Ragnarok. Hidolfr is also an epithet name that is sometimes given to Odin himself.
11. Hermothr
Hermothr or Hermodr was a messenger of the gods. After Baldr’s death, Hermothr won the favor of his mother, Frigg, by riding to Hel to ask for the life of his brother back. He took Odin’s own mount and rode for nine days and nine nights. Though he did locate Baldr, the attempt to bring him back was ultimately unsuccessful. Baldr, however, did give him a gift – a great ring – as thanks for his arrival.
12. Sigi
Sigi, father of Rerir, was Odin’s third son. He was violent and temperamental, and once found himself exiled for murder. He killed a slave who was under his command because the slave won a hunting competition against him. However, Odin helped him escape to another land, where he became king. Eventually, Sigi was killed by his usurping brothers-in-law. Eventually, Sigi’s son killed his uncles in turn.
13. Skjöldr
This son of Odin was the first of the legendary Kings of the Danes. Odin gifted unto him Denmark, over which he ruled for many years. In Beowulf, he appears as Scyld Scefing, where he is given a funeral at sea. Skjoldr is the ancestor of Scylding kings of Denmark. He also appeared in various other sources under a number of different names.
14. Yngvi (or Yngvi-Freyr)
Yngvi was given Sweden as his Skjoldr was given Denmark. He was the father of the Yngling legendary dynasty. His powers and heritage are sometimes conflated with Freyr, the Vanir god of sacred kingship. The Norse kings also claimed to descend from his heritage. Sometimes, Yngvi was actually considered an aspect of Odin rather than a son.
15. Itreksjoth
This is another little-known son of Odin who was listed amongst his brothers. He presumably was fated to fight at Ragnarok with the rest, though no word is given on his prophecied survival or death. He is listed amongst the Aesir, the primary pantheon over which Odin rules.
16. Heimdallr
Heimdallr was known as the Watcher, and it is he who watched for the signs that mark the onset of Ragnarok. He lived at the edge of the rainbow bridge known as the Bifrost, and he could see for miles in any direction. He had nine mothers, all sisters, who gave birth to him simultaneously. He once did battle with Loki, who was wearing the form of a seal. During Ragnarok, Heimdallr and Loki were fated to kill each other once and for all.
17. Saemingr
Saemingr was Odin’s son by Skaldi, the goddess of hunting, skiing, and other such activities, who was Odin’s second wife. Saemingr was a king of Norway and a descendant of jarls. He was mighty in battle and his shield was dyed red by the blood of his enemies. Saemingr’s wife was Nauma and his son Thrandr. In some versions, his father is not Odin, but instead Yngvi-Freyr.
18. Tyr
The bravest of the gods, Tyr sacrificed his hand to restrain the monstrous Fenrir, therefore postponing Odin’s death until Ragnarok. As Odin (or Woden) gave his name to Wednesday, so too did Tyr give his name to Tuesday. He is either a son of Odin or of a giant, Hymir. The arrow shaped T rune used to spell Tyr’s name was a magical symbol in Norse mythology which was often invoked in spells.
19. Other sons
Some lists contain several other sons of Odin, though nothing else is written about them other than their name. They are listed as: Ennelang, Eindride, Bior, Hlodide, Hardveor, Sönnöng, Vinthior, Rymur, and Olner.
20. Odin’s daughters
The Valkyries, servants of Odin, were also often listed as his daughters. They were goddesses or other figures who scoured the fields of battles and decided those who would live and die. From the dead, they would select those to escort to Valhalla or another afterlife.
Several Valkyries are named in mythology. Some of these include:
Name Meaning Name Meaning Name Meaning
Eir Peace Geirahoth Fights with Spear Geirskogul Spearwoman
Goll Tumult Gondul Wielder of wands Gunnr War
Herfjotr Fetter of hosts Hildr Battle Hlokk Noise
Hrist Shaker Hrund Pricker Mist Cloud
Olrun Rune of ale Randgrith Truth with shield Rathgrith Truce with council
Reginleif Truce with power Rota Disorder Sigrun Rune of victory
Skegjold Axe-aged Skogl Shaker Svava Glory
There are many more named Valkyries, and still more without names. Sources vary as to whether each of them are actually the daughters of Odin or whether this is a more symbolic role, and some of the named Valkyries have differently-named fathers.
Leave a Comment
|
What is amazing is that John Steinbeck wrote The Grapes of Wrath in 1939 and it covered the era of the Dust Bowl, yet 81 years later I can see scenes of that past displayed in painful images and news reports today. If you don’t know 1930s US history, then let me give you a quick recap of what the Dust Bowl was all about and how I’m tying this into present-day.
Due to years of drought and improperly farmed land (due to high demand of rapid cultivation), wind erosion, and the influx of mechanized farm equipment a decade earlier, the unanchored soil turned to dust. That dust was whirled up by strong winds that swept huge billowing dust clouds throughout the panhandle of Oklahoma (northwest), northern Texas, northeast New Mexico, southeast Colorado, western and central Kansas, and a speck of southwestern Nebraska in the early 1930s.
More than 100 million acres were impacted by the dust storms, most of the states affected were choked off by dust for over four years, while some states were impacted for over 8 years. Tens of thousands of people were displaced because they could no longer farm their lands, pay their bills, and provide for their families. By 1936, the financial loss was $25 million per day, which is the equivalent to approximately $460 million today, according to the Federal Reserve of Minneapolis.
Families who had lived on their properties for generations, were forced to leave with whatever they could pack and load in their vehicles. Their houses and other structures were oftentimes bulldozed and destroyed. Since the banks now owned the lands because the families took out loans that they later could not repay, these families were left to be tenant farmers and had no claim to the land they once owned free and clear. Banks showed no mercy as they forced the families from their homes and off of their lands. Sound familiar?
My maternal grandparents were born and raised in Oklahoma, and were children during the Dust Bowl. Thankfully for them, the storms never reached their part of the state and they never had to leave their family’s lands. And although I’m a California native, thankfully when my parents and paternal grandparents moved to that state, the chaos of decades earlier had been a memory far removed. But maybe you can see another reason why I’m naturally drawn to the story, The Grapes of Wrath. Both sides of my family have been landowners and property owners for generations. Imagine making it past the Civil War and finally gaining a footing in this cruel country, to then be forced off of the land you bought and worked on. Just devastating.
Tens of thousands of people traveled from Dust Bowl states and migrated to California, because it was known as a state that survived the Great Depression better than most states. Individuals and families saw California as their second chance to rebuild and thrive. What they didn’t know was that Californians didn’t want outsiders and “foreigners”. The migrants were called “Okies” and this wasn’t just because many of them were from Oklahoma, it soon became a derogatory term to describe the level of disgust that Californians felt for the migrants. Yes indeed, people from other states were called foreigners, and they looked down on them. If you look at our country today, locals don’t feel cheery about a spike in their population due to newcomers. They start to fear a shortage in jobs, housing, opportunities, and space on the freeways and highways. They start to fear a spike in the cost of goods and services. Although they give the side eye, they aren’t acting out like we did decades ago.
Not yet at least.
If you read The Grapes of Wrath by John Steinbeck then maybe you recall the struggle and strife of the people and families impacted by the Dust Bowl. You should also recall how they were overlooked and taken advantage of by those in their home states who didn’t lose their properties, and they were treated considerably worse by people in California.
Those who made it to California were forced to accept scraps, beg for jobs, and be subjected to inhumane conditions. And back then, the Salvation Army had a bad reputation in California for mistreating the destitute. If the “Okies” protested what Californians were doing to them then they were beaten, arrested, and many were murdered. Yes, even law enforcement was in on the mistreatment. Sadly, the migrants watched as their campsites were burned down by locals who didn’t want “Okies” there. Locals didn’t want to compete with the migrants so they did everything they could to force them out of the state.
Californians drove wages as low as possible to ensure that the migrants couldn’t live dignified lives. They created a mindset where people would accept anything just to eat. They would work for scraps of food to keep from dying of hunger. To keep prices of their crops high, the big landowners in California destroyed some of their crops instead of letting hungry migrants eat them. This waste and cruelty caused a “crop” to develop and sprout in the souls of the migrants—which Steinbeck coined, the grapes of wrath.
The irony is, Californians were doing all of that to protect the land that they stole from Mexicans. Yep, California was part of Mexico, along with Arizona, New Mexico, and Texas until 1850, 1912, and 1848, respectively. How did this happen? Well, in the early 1800s, Americans were desperate and they decided to travel to other lands looking for opportunities for a better life. They saw ripe acres of land and they chose to become squatters. They built houses, planted on and farmed the lands, and eventually stood strengthened in the belief that the land was now theirs. Since Mexicans hadn’t considered that squatters would be an issue, they weren’t prepared for what ultimately happened—losing their land to immigrants who forcefully fought to remain on land not theirs. In 1848 Texas fought and became a state. In 1850 California became a state, and because they also fought hard against slavery, it was a free state as part of the Union. Arizona and New Mexico eventually gained statehood in 1912.
Now, fast forward to the 1930s with Californians “owning” the land, they saw their old selves in the migrants, and rather than being neighborly, they acted rabid. They feared losing the land the same way they got it. They feared the migrants from Oklahoma and other states, and feared that just as they squatted on the land and fought the Mexicans, that the migrants would do the exact same thing to them.
If this wasn’t so painful to examine it would be comical. This nonsense has been happening since this country was first stolen from Native Americans. Our inability to coexist, share, be content with what is allotted to us in a land where we are all foreigners, so we steal that land and it’s resources from the people who allowed us to come here. Then when newcomers arrive we tell them we don’t want them here, there’s not enough land and resources to share. All I can do is smirk and shake my head.
If you never read The Grapes of Wrath and doubt you will go buy a copy or check out one from the library, let me help you out. I searched on YouTube and found all three parts of the audiobook from two sources. Below are the links. Listen to the book. Listen and see how then, is in many ways, now, and now is then.
Audiobook Part 1 https://youtu.be/CzdoHqBhcdc Audiobook Part 2 https://youtu.be/3ofBuTMAtc4 Audiobook Part 3 https://youtu.be/0sjzwlkkLmg
This savagery, as I call it, is cyclical— generation after generation. We keep repeating this nonsense and we don’t see the need to stop and live right. We don’t see the need to treat others with dignity and respect, just as we would like to be treated. Greed drives it all. Big business keeps squashing the little person, banks keep getting bailed out even though they won’t do the same for their depositors, and the frenzy drives the working class into a state of sheer desperation and madness—where they too begin turning on each other. Sound familar? If only people learned how to unite against the status quo. That was a thread of wisdom that Steinbeck wove through the story, where certain characters would propose the concept of strength in numbers, and standing as a collective voice and force—but each time, fear would get in the way. Just like today.
In the book, people were prevented from buying land in California, and if it appeared there was an opportunity to purchase, the price would be set so high that the dream would quickly disappear. They would be forced to live in government and other campsites, with communal facilities, and unsanitary conditions. Today, how do we get the “undesirables” out of neighborhoods and communities? We raise the price of rent, we increase our police presence to get more arrests, we create or unfairly enforce rules or laws that target them, and we make the living conditions unbearable. That is also the strategy to keep people away.
I’ve read several articles recently about the skyrocketed cost of living in California and the staggering number of homeless who have no where safe to go. People with jobs who can’t afford to rent are being forced to sleep in their vehicles, in shelters, or on the streets. Just the other week I read of a tiny house community that was built to house the homeless. It’s ridiculous that this community even had to be built. If property owners reduced their rates on their rentals people could rent. If property owners stopped being greedy trying to sell their homes for way more than their worth, we could have more homeowners. But guess what? Between greed and fear, no one is budging from their position.
But guess what else? It’s not just California that has lost their mind with these ridiculous rate hikes. Have you checked the rental and sales prices of properties in Atlanta, Georgia and surrounding cities? Absolutely ridiculous. There are some areas where you can still be mugged or carjacked yet the houses are being sold for $500,000 to $750,000. I’m not joking. Houses that once were $15,000 to $50,000 were remodeled and because some sucker (most likely from California, New York, or other high priced state) was willing to pay $350,000 or more for a property nearby, that encouraged other sellers to list their homes for comparable prices. All of this has been driving the market up, which means a bubble will be bursting soon, and people will be wailing about the injustice of it all when the property values come plummeting down to levels that actually make sense. We could stop these bubbles from growing in the first place if people stopped being greedy.
Everyone thinks that someone is going to take or destroy what’s ours, even when what’s ours isn’t rightfully ours. We keep living with a “them” versus “us” mindset, rather than realizing that we all want the exact same things in life, and given the opportunity we could all live side-by-side in harmony. We simply choose the chaos. When will we grow tired of this treachery? Share your thoughts.
Copyright 2020. Natasha L. Foreman.
If you recall one of my earlier posts I shared with you that my friend and colleague, Steve Woodsmall is running for Congress in 2018. He’s a progressive who wants to represent the great state of North Carolina and flip the 11th District.
As Major Woodsmall, Steve served as a commander, executive officer, and management consultant in the Air Force, and was selected as a flight commander at Officer Training School to train and develop future leaders. He also worked as a government contractor for the Federal Aviation Administration and the Securities and Exchange Commission. Steve previously served as a director in the corporate arena and managed a not-for-profit organization.
Steve holds a PhD in Organization & Management, and a Master’s degree in Business Administration.
He currently teaches leadership and management at Brevard College in Brevard, NC, and is a current member of the Transylvania County Planning Board. Steve was third vice-chair of the Transylvania Co Democrats (but is inactive now due to running for congress).
Platform Issues
Steve has some sound solutions and views on:
• Gun Regulation
• Campaign Finance
• Social Security
• Job Creation
• Immigration
• Healthcare
• Infrastructure
• Reproductive Rights
• Cannabis
• Voting Rights, and the
• Environment
More About Steve
Steve believes “in a progressive minded, solution based approach to politics, and always puts the constituent first” because as a public servant he knows that he works for the people, and not the other way around.
To learn more about Steve and his ideas for positive change in North Carolina and throughout our great nation, please visit his site: https://woodsmallforcongress2018.org/
Meet Steve
To meet Steve and/or hear him speak at a local convention, forum or other event in North Carolina, be sure to visit his events page to see what Steve has on his calendar for the next several weeks: https://woodsmallforcongress2018.org/events
I can tell you now that on March 24th he will be at events in Waynesville, Sylva, and Valdese. On the 26th he will be at two events in Brevard and Cherokee. On the 27th he will be at a forum in Sylva and on the 28th he will be at an event for the West Asheville Democrats in Asheville. Check his calendar for specific details and to see what he has planned for the month of April.
How to Support Steve
There are four ways that you can support Steve’s campaign for Congress:
• Vote for him:
• The Democratic Primary is May 8, 2018
• Early voting begins Tuesday, April 19, 2018
• Vote for him again on November 6, 2018
• Volunteer on his campaign
• Host an Event in Western North Carolina
• Contribute to his campaign- visit here for details
I know that Steve will appreciate any level of support that you provide, no matter which option that you choose.
Be sure to follow him on:
Twitter: https://twitter.com/SteveWoodsmall Facebook: https://www.facebook.com/WoodsmallforCongress2018/
The only way to truly bring positive change is to vote out those who are holding us back and keeping us down (leaching on the system from within) and vote in those who will work tirelessly on our behalf, so that our voices are not only heard but the power from those voices are then amplified, and bring about genuine action through reform, bills, and other mechanisms.
Earlier today I posted a photo on social media of an article I read that tore at my heart. It’s a small highlight of the devastating reality caused by this new administration’s quest at mass deportation as the best stab at immigration reform.
This article tells the story of a family living in Texas who faced one of the scariest moments of their life, watching their child suffer in need of medical care—just to face arrest from Border Patrol officers who were notified by the hospital that two non-citizen immigrants needed permission to go through a check point (where they are checking for illegal immigrants) so they can go to a hospital three hours away. The infant, a U.S. citizen, has a life-threatening condition and this other hospital can perform the operation. When you read what unfolded and how this family was treated how do you feel inside? What thoughts do you have?
I would like to say to those of you who provide the blanket response “but it’s legal” or “the officers were doing their job“:
When we make excuses for unethical behavior those excuses become the layers that reinforce this toxic environment that is killing this nation from within.
When we say “it’s legal” or “it was their job” we then should ask:
• but is it ethical?
• Is it right?
• Is it fair?
• Is it humane?
• Would I want that done to me?
The excuses of legality and doing one’s job has been used for decades to support racism, classism, sexism, discrimination, mass incarceration, slavery, lynching, murder, torture, and more.
We hypocritically apply these excuses when they serve our beliefs, values, or needs. But then we’re outraged when the roles are reversed and someone that we feel should be punished and “locked up” isn’t because the government says they were “doing their job” or what they did was “legal”.
Safe zones are no longer safe zones under this new Administration. Schools, hospitals, churches, and other designated areas were off limits for ICE under the last Administration. We shouldn’t have to outline a square footage parameter outside of the safe zones as designated “okay to apprehend” zones. Unethical people will still bend the rules and claim that they were outside the safe zone space, so the arrest is “legal”.
Imagine being arrested while dropping your daughter off at school or at the hospital where she’s facing a life threatening emergency.
Our nationalistic approach of “Americanism” should never ever ever outweigh the most important title and role in this world…”Human“.
We must do better.
We must stop being so cold, callous, and arrogant yet expect respect, admiration, support, sympathy and empathy from the rest of the world.
We must stop crying foul only when an American life is on the line but then be dismissive of non-Americans. We must stop acting as though the rules only apply to us when we say that they do.
We must end this toxic cycle if we are to heal, rebuild, and grow. Or we will destroy this nation from within and we can blame every outsider if we want, but the facts will clearly show that our demise will be our doing alone. We can’t possibly mean it when we say “God bless America” if we’re excluding groups of people that help build this country and our economy, and make it the greatest nation on the planet.
My next post will delve deeper into this topic to hopefully advance a greater and healthier discussion. We must do better!
Source: NPR (Sept. 20, 2017) http://www.npr.org/2017/09/20/552339976/border-patrol-arrests-parents-while-infant-awaits-serious-operation
I was so proud to see the photo of my Storiboard Nation team member, Vanessa Razo, along with her parents, at the polls where they voted as first-time voters. Yes, you read that right. This was the first time Vanessa and her parents have voted. Not because they didn’t want to vote in the past, or didn’t support previous candidates. It also wasn’t because they were lazy. They didn’t vote because they couldn’t.
It took Vanessa and her parents 23 years to finally become U.S. citizens and be granted the right to vote. That’s 23 years of working, paying taxes and positively contributing to society, while having to jump through years of bureaucratic red tape. They relocated to the United States in 1993 and have been trying every single day to fully take part in the American dream.
Most people think the path to citizenship is easy breezy, like going to get a driver’s license….You just show up, take a short test, smile for the camera, and if you pass the test then you say an oath and become a citizen. If you don’t pass, you just wait a few days and try again on whichever portion of the test you failed.
Not even close!
Well not for the vast majority of residents who spend thousands of dollars and thousands of hours so that they can proudly say they are an “American”. For the small percentage of privileged individuals who somehow get their status fast-tracked, even their process isn’t done in one week–but let’s not even go down that path.
The citizenship process looks very simple on paper:
• Step One: Find Out Whether You Are Eligible. The first question is whether you have a U.S. green card (lawful permanent residence for on average 5 years). …Green cards cost $340-$1,500
• Step Two: Overcome Barriers to Your Ineligibility. …
• Step Three: File USCIS Form N-400. …Filing fee is currently $595.00 plus $85.00 biometrics fee
• Step Four: Get Fingerprinted. …
• Step Five: Attend a Citizenship Interview. …Which includes English (ability to speak, read, and write it) and an oral U.S. History and Government test (the test proctor selects the questions)
• Step Six: Attend the Oath Ceremony….This is the step most of us witness through news coverage (which makes it look like a one-day process)
These six steps can take numerous years to complete. For Vanessa and her parents, it took 23 extremely long years. It was no cakewalk. They are fortunate to now be citizens and have full access to the systems, processes, and privileges that other Americans have. Sadly, they have other family members and friends who are still waiting for the day when they can become citizens. I too have friends who are waiting. Some have been waiting for over 25 years. They continue to work, pay bills, pay taxes, pay legal fees, and contribute to our economy, while they wait patiently.
I pray that the results from our recent election does not discourage or intimidate them. Instead, I hope that it helps them to passionately focus on making their dreams come true in the land that has provided them various options, opportunities, and freedoms that their birth country did not provide.
I pray that Vanessa and her parents become more engaged in the political process and encourage others to remain focused and get involved in making sure that this country remains the multicultural home of the free and the land of the brave!
If you know of anyone who is going through the green card and citizenship process, tell them to not lose hope, and don’t get distracted by what they see, read, and hear through media outlets and social media…or even narrow-minded politicians. Tell them to just dig in deep and remember why they are here and why they want so badly to become an American. Our country desperately needs those positive vibes!
|
Top 5 Foods that Reduce High Blood Pressure
Approximately 67 million American adults (1 in every 3) have high blood pressure which is linked to stroke and heart disease.(1) Certain lifestyle and dietary behaviors such as smoking, alcohol use, inactivity, carrying excess weight, and not properly managing diabetes can elevate these dangerous health conditions.
Rather than opt for costly prescriptions which come with a slew of unhealthy side effects or risks that may not be uncovered for several years, many natural (and very tasty) ways to lower blood pressure exist. In addition to getting more exercise and properly dealing with stress by practicing a form of meditation or getting more sleep, dietary changes can be extremely beneficial for those suffering with hypertension.
Top 5 Foods and Dietary Habits that Fight High Blood Pressure Naturally
1. Garlic
Thanks to one of its active substances, allicin, garlic works wonders when it comes to reducing blood pressure.(2) The substance works by relaxing blood vessels while also disrupting the blood pressure-elevating enzyme, angiotensin.(2) Overall, blood vessels are more relaxed so that better blood flow is achieved, cholesterol is reduced, and platelet aggregation is decreased.(2)
The Mayo Clinic advocates that those with high blood pressure who are seeking alternative treatment methods take garlic supplements.(3)
2. Flaxseed
Flaxseed is another blood pressure-reducing superstar. Like garlic, it’s also listed by the Mayo Clinic as a healthy alternative to traditional treatments.(3)
One study, published in the journal Hypertension, found that consumption of 3 tablespoons of flaxseeds daily over the course of six months lowered people’s high blood pressure by an average of 10 percent.(4) Those who shunned the nutty-flavored seed? That same study discovered that there was either no change at all, and in some instances, their blood pressure actually went up slightly.(4)
3. Beets
Another study found in the journal Hypertension noted that when those with hypertension drank eight ounces of beet juice, that their blood pressure remained lowered by an average of 10 points for as long as 24 hours afterwards.(4) Experts say that nitrate-rich foods like beets and leafy vegetables are helpful because they help to widen blood vessels and in turn, boost blood flow.(4)
4. Walnuts
Research has found that walnuts are beneficial in lowering blood pressure. For example, according to the Journal of the American College of Nutrition, when adults ate about one-half cup of walnuts every day for four months, their blood flow improved, pressure was lowered, and they even had smaller waist measurements.(4)
The fiber, magnesium and healthy dose of fats in walnuts are key reasons why they help fight high blood pressure.(4)
5. Less Meat, or Avoiding it Altogether
Many people have opted to become vegetarians for a number of reasons, ranging from the disturbing treatment of most animals in an effort to produce mass quantities of product to other questionable practices (use of hormones, etc.) that harm the environment as well as human health. For those who have not fully embraced such a lifestyle, it seems that an increasing amount are at least eating less meat, often enjoying healthy meals on “Meatless Monday” or for even more than a single day.
The choice is a wise one; according to medical reviews, when compared to meat-eaters, vegetarians had a lower blood pressure by an average of 7 points (systolic) and nearly 5 points (diastolic).(4)
Skip the meat. Instead, bring on the nuts, seeds, garlic, leafy greens and beets! They all taste great, are filled with numerous health benefits, and can be easily found while shopping.
Here’s to staying healthy, naturally.
Sources for this article include:
|
No, It’s Not Surprising That A California Nurse Got COVID-19 After His First Vaccine Shot
A nurse in San Diego is making headlines for testing positive for COVID-19 about a week after receiving a coronavirus vaccine shot ― but in no way does this mean the vaccines don’t work.
To the contrary, doctors and public health experts expect things like this to happen to some people.
Emergency nurse Matthew W. (who has been identified only with his last initial) told local station ABC 10News that he tested positive on Dec. 26 after starting to feel sick on Christmas Eve with muscle aches, chills and fatigue.
The 45-year-old had received his first shot of the Pfizer vaccine on Dec. 18. But his illness should not sound any alarm bells.
Both of the vaccines approved for use in the United States so far ― manufactured by Pfizer and Moderna ― require a patient to get two shots, spaced a certain number of days apart. People receiving the Pfizer vaccine are told to wait 21 days before getting their second jab.
Neither contains live virus. Neither contains whole dead virus. Neither can give you COVID-19. Both the Pfizer and Moderna vaccines work by giving the body instructions for how to make a harmless protein that is a distinguishing feature of the actual virus so that when or if the vaccinated person gets exposed to the virus, their body already knows what to do to fight it off.
The drugs have been praised for their high efficacy rate ― around 95% each ― but that’s only if you get both shots. After one shot, available data suggests the Pfizer vaccine has about 50% efficacy. Medical professionals use the term “efficacy” to describe the proportionate reduction in cases of COVID-19 among vaccinated people. The word is basically synonymous with “effectiveness” (although researchers will sometimes impose slightly different definitions).
It is therefore likely that some people will contract COVID-19 between their first and second shots. In that period, like Matthew W., they will have only about a 50% reduced risk of becoming sick.
It’s also likely that some people will contract COVID-19 after the second shot ― the vaccines do not offer 100% protection.
Additionally, it is possible that Matthew W. had caught the virus before receiving his first shot, because it can take up to two weeks for people to start feeling symptoms.
All of this is a big part of the reason why public health experts are discouraging people from immediately resuming their normal lives after they get vaccinated.
Researchers are confident, however, that the vaccines will offer a high degree of protection to a lot of people as more and more of the population is inoculated. As that happens, scientists expect to gain an even clearer understanding of the protection that each vaccine offers.
A HuffPost Guide To Coronavirus
Credit: Source link
|
Select Page
Psychology is one of the most ancient sciences that studies various aspects of human nature. But it still has open questions and room for new learning.
According to the definition of psychology is, “the study of the soul,” which means, “soul,” and psychologists do not know what psychology is or whether it even exists. Most psychologists do not believe the soul exists outside of their personal religious affiliation. Therefore, unlike other sciences, psychology has no focus subject and removes the existence of its main focus, the soul.
What does an engineering psychologist do?
An overview of most areas of psychology will show that one encounters the abstract term “undesirable” throughout psychology. This is a discipline riddled with dilemmas. Not just the soul, but consciousness, personality, ego, mind and similar terms that are common throughout psychology refer to the abstraction that can be demonstrated, but which cannot be fixed and precise tangents in physical time and space. Sigmund Freud, a doctor and neurologist, breathed new life into psychology by introducing new ideas about sexuality and new techniques of psychoanalysis.
I am currently studying engineering
He brings a deterministic tilt to psychology that makes science somewhat more grounded in physical reality; but he does not eliminate the general dilemmas of psychology and, indeed, he may even have created new problems of the same nature. Moreover, his ideas, filled with the concept of sex, are generally seen as scandalous.
Like psychology, the life sciences have their own unwanted but recurring problems that they have attempted to sweep under the carpet or lay off, but without success. Perhaps most of these issues have a bearing on psychology as well. Psychology and the rest of science today have lost sight of the value and significance of the soul. Valuable information and data about the soul has always been overlooked or ignored in science, even in psychology Business Management Articles, the science that is supposed to study the soul. …
|
Question by seb (220)
What is the definition of normative?
Answer by FrankFooter (96)
"Normative" is an adjective that describes something pertaining to a particular socially accepted norm, or relating to a particular standard. In academic settings, normative may have a more specific meaning.
Answer by KAS (393)
Normative is an adjective that means pertaining to norms or a standard of correctness of behavior. It is used to describe a type of grammar.
Answer by cklight (327)
"Normative" is an adjective meaning and relating to social standards and norms. That is, it is a comparison type of thought, that contrasts other types of concepts that are not the norm, or standard operation of thinking or doing a particular behavior.
You have 50 words left!
|
You asked: What part of the Constitution protects women’s rights?
Where in the Constitution are women’s rights protected?
The ERA is a very simple amendment putting protection for women and other marginalized genders directly into the United States Constitution. The entire text of the proposed amendment is: Section 1. Equality of rights under the law shall not be denied or abridged by the United States or by any State on account of sex.
What did the Constitution say about women’s rights?
Passed by Congress June 4, 1919, and ratified on August 18, 1920, the 19th amendment granted women the right to vote. The 19th amendment legally guarantees American women the right to vote. Achieving this milestone required a lengthy and difficult struggle—victory took decades of agitation and protest.
Did the Constitution include women’s rights?
This has led to the charge, heard frequently during the prolonged debate over the proposed Equal Rights Amendment, that “women were left out of the Constitution.” The fact is, however, that women were not left out; they have always been included in all of the constitutional protections provided to all persons, fully
What are the laws protecting women’s rights?
• RA 6949: Declaring March 8 as National Women’s Day.
• RA 7877: Anti-Sexual Harassment Act of 1995.
• RA 8353: Anti-Rape Law of 1997.
• RA 6949: Anti-Trafficking in Person Act of 2003.
• RA 6949: Anti-Violence against Women & Their Children Act of 2004.
THIS IS IMPORTANT: What is feminism in Nigeria?
What is the 23rd Amendment say?
How did the courts change the law to protect women’s rights?
The United States Supreme Court rules for the first time ever that a law that discriminates against women is unconstitutional under the Fourteenth Amendment, holding unanimously that a state statute that provides that males must be preferred to females in estate administration denies women equal protection of the law.
What are the Amendment rights?
Rights and Protections Guaranteed in the Bill of Rights
Amendment Rights and Protections
First Freedom of speech Freedom of the press Freedom of religion Freedom of assembly Right to petition the government
Second Right to bear arms
Third Protection against housing soldiers in civilian homes
|
10 Phene et al. (1971) developed an instrument to measure soil water potential by sensing heat dissipaton within a porous ceramic. The water potential of the porous ceramic was measured by applying heat at a point centered within the ceramic and measuring the temperature rise at that point. Soil water potential measurements were obtained by taking two temperature readings. The first one was taken before the heating cycle and the second after the heating cycle. The difference between the two temperature measurements was the change in temperature at the center of the sensor due to the heat applied. The magnitude of the difference varies depending on the water content of the porous block. Phene stated that the sensor should measure the soil water potential regardless of the soil in which it is embedded. In experimental applications of the heat pulse device, the accuracy of the sensor was 20 kPa over the range 0 to -200 kPa. In Florida sandy soils such a wide range of variability would not be acceptable because most of the available soil water is contained in the soil between field capacity and -20 kPa. Calibration for individual soils couTd improve the accuracy of the instrument. This instrument has the capability of allowing automated data collection and is nondestructive. The cost of the individual sensors and the associated data recording devices is relatively high. Soil psychrometers are instruments which can be used to measure soil water potentials in the range of -1 to -15 bars. They operate by cooling a thermocouple junction which is in equilibrium with the soil to the point of water condensation on the junction, and then measuring the junction temperature as water is allowed to evaporate. Thus the temperature depression due to evaporation can be related to soil water
|
Home / Trending / Fruits Name in English, Hindi, Tamil, Marathi, And Other Languages
Fruits names in English
Saumya Srivastava | September 14, 2021
Some are juicy, some are crunchy; some are green, some are red, fruits come in different textures and colors, but all of them are packed with nutrition. Fruits have changed a lot since humans first started eating them, watermelon used to be seedy and not fleshy, bananas used to be short and thick, but one thing that remains true is that they are beneficial for our health. With their changing texture and taste, their names have also been changed in different languages and cultures. This little guide tells you fruits name in English, Hindi, Marathi, and other languages you may want to know. You can also comment below to let us know what’s a particular fruit called in your language.
Fruits Name in English, Hindi, Tamil, Marathi, Telugu, Gujarati, and Punjabi
English Hindi Tamil Marathi Other Languages
Apple Seb Apple Safarchand
Guava Amrud Koyyapazham Peroo Jamrukh in Gujarati
Avocado Makhanphal Vennai pazham Alpukat Venna Pandu in Kannada
Banana Kela Vazhaipazham Kele Kadali in Punjabi
Strawberry Strawberry
Apricot Khubani Saara Paruppu Jardaloo Akroot in Konkani
Blueberry Neel Badri Puluberri Karvand
Orange Santara Naaram Narangi Kamla Leboo in Bengali
Pineapple Ananas Annachi Ananas Anarash in Bengali
Pomegranate Anar Madhulam pazham Dalimb Dadamna in Gujarati
Watermelon Tarabooj Darbusini Kalingad Kharbuja in Oriya
Figs Anjeer phal Attipazham
Grapes Angur Draksha
Kiwifruit Kiwi Pasalipazham Kiwi Hannu in Kannada
Peach Aadoo Aadu
Plum Aaloobukhara Manuka
Papaya Papita Pappali Pazham Papai
Cherry Aaloobalu
Pear Naashpaate Berrikai Sabarjil in Marathi
Grapefruit Chakotara Idlimbo
Prunes Chhatana
Indian Gooseberry Amla Neelikai Avala Nelli in Malyalam
Mulberry Shatoot Tutichi
Berries Jaamun Berries
Water Chestnut Shingada
Sapodilla Chiku Sapota Chikoo Chikku in Malyalam
Custard apple Sitafal Seethapazham Sitaphal Sitafalam in Telugu
Lychee Litchi Laichi pazham Lichi Litchi pandu in Telugu
Indian jujubes Ber
Quince Sauph fal
Sweet lime Mausami Mosumbi Chaatukudi Battaiah in Telugu
Cape gooseberry Macao Pottipallam Chirbot Budde in Telugu
Monkey fruit Badhal
Mash melon Chibud Mulam pazham Thaikumbazham in Malyalam
Olive Jaitoon Sytoon Olive Pazham in Malyalam
Sugar cane Ganna Usa Karuppan Charu Cheruku Gada in Telugu
Tamarind Imli Puli
Lime Nimbu Elumichai Cherunaranga in Malyalam
Star fruit Kamrakh Pulichikai Ilumbi Puli in Malyalam
Must read: Benefits of guava: 10 Reasons why you should eat them often
Fruit Tips That You Need To Know
1. 1. Soak fruits in water for some time to remove dirt from the fruits. You can also add salt or vinegar for more efficient cleaning. Clean them using your fingers gently, so that the soft and squishy fruits don’t get ruined.
2. 2. Some fruits are more nutritious when they are eaten unripe. Eating those kinds of fruits is associated with a better digestive system. Fruits like green papaya, green mangoes, green banana can also be eaten unripe to boost immunity. Unripe fruits are rich in fiber, vitamin C, Potassium, and Vitamin B6.
3. 3. The list of seasonal fruits in India is quite extensive. In the summer season, you can relish mangoes, melons, plum, and papaya. In the spring, you can enjoy cherries, jackfruit, pineapple, strawberries, and lychee. In the monsoon season, you can add jamun, custard apple, apple, and peach. In the winter, you get dates, orange, grapes, and chiku.
4. 4. Fruits should be eaten at the right time to get their benefits. Fruits are best absorbed on an empty stomach. So grab your favorite seasonal fruit in the morning before your breakfast or you can have it between two meals as a snack.
5. 5. Storing fruits the right way determines their shelf life. Fruits you should store at room temperature include, bananas, watermelon, pears, papaya. Fruits that should be stored in your refrigerator are, apples, carrots, cherries, grapes, pomegranate, raspberries, strawberries.
6. 6. Don’t drink water while eating fruits. You need to maintain the pH level in your stomach to ensure proper digestion. Between 1.5 to 3.5 is the normal pH level of the stomach, which means it’s acidic. Drinking water with fruits or immediately after can dilute acid, leading to indigestion and stomach pain.
7. 7. Try to buy fruits that are unbruised and undamaged, because it’s likely that such fruits can have a lot of bacteria in them. Smell your fruit before buying, if it smells sweet, it’s ripened. Try to avoid off-season fruits, they are not only expensive but also chemically treated and stored.
Must read: 8 Essential cleaning tips: Wash fruits and vegetables to avoid food contamination
So, from telling you about fruits name in English and other Indian languages to describe their health benefits, this guide is very useful for all.
Disclaimer: BetterButter claims no credit for images featured on our blog site unless otherwise noted. All visual content is copyrighted to its respectful owners. We try to link back to original sources whenever possible. If you own the rights to any of the images and do not wish them to appear on BetterButter, please contact us and they will be promptly removed. We believe in providing proper attribution to the original author, artist or photographer.
Saumya Srivastava
Saumya Srivastava is a passionate reader who likes writing poetry. She is an avid foodie who keeps exploring new types of cuisine. Besides, she also has a strong love for literature.
Leave a Reply
|
Share this book
Frankenstein; or, The Modern Prometheus is an 1818 novel written by English author Mary Shelley. Frankenstein tells the story of Victor Frankenstein, a young scientist who creates a sapient creature in an unorthodox scientific experiment. Shelley was inspired to write Frankenstein after imagining a scientist who created life and was horrified by what he had made. Since the publication of the novel, the name ”Frankenstein” has often been used to erroneously refer to the monster, rather than his creator/father. | Frankenstein is a frame story written in epistolary form. It documents a fictional correspondence between Captain Robert Walton and his sister, Margaret Walton Saville. The story takes place in the eighteenth century (the letters are dated as ”17-”). Robert Walton is a failed writer who sets out to explore the North Pole in hopes of expanding scientific knowledge. During the voyage, the crew spots a dog sled driven by a gigantic figure. A few hours later, the crew rescues a nearly frozen and emaciated man named Victor Frankenstein. Frankenstein has been in pursuit of the gigantic man observed by Walton's crew. Frankenstein starts to recover from his exertion; he sees in Walton the same obsession that has destroyed him and recounts a story of his life's miseries to Walton as a warning. The recounted story serves as the frame for Frankenstein's narrative... |Wikipedia|
Show more
|
The Festival Of St Nicholas
We all know how, before the Christmas-tree began to flourish in the
home-life of our country, a certain right jolly old elf, with eight
tiny reindeer, used to drive his sleigh-load of toys up to our
housetops, and then bound down the chimney to fill the stockings so
hopefully hung by the fireplace. His friends called him Santa Claus; and
those who were most intimate ventured to say, Old N
ck. It was said
that he originally came from Holland. Doubtless he did; but, if so, he
certainly, like many other foreigners, changed his ways very much after
landing upon our shores. In Holland, St. Nicholas is a veritable saint,
and often appears in full costume, with his embroidered robes glittering
with gems and gold, his mitre, his crosier, and his jewelled gloves.
_Here_ Santa Claus comes rollicking along on the 25th of December, our
Holy Christmas morn; but in Holland, St. Nicholas visits earth on the
5th, a time especially appropriated to him. Early on the morning of the
6th, which is St. Nicholas Day, he distributes his candies, toys and
treasures, and then vanishes for a year.
Christmas Day is devoted by the Hollanders to church-rites and pleasant
family visiting. It is on St. Nicholas Eve that their young people
become half wild with joy and expectation. To some of them it is a sorry
time; for the saint is very candid, and, if any of them have been bad
during the past year, he is quite sure to tell them so. Sometimes he
carries a birch-rod under his arm, and advises the parents to give them
scoldings in place of confections, and floggings instead of joys.
It was well that the boys hastened to their abodes on that bright winter
evening; for, in less than an hour afterwards, the saint made his
appearance in half the homes of Holland. He visited the king's palace,
and in the self-same moment appeared in Annie Bouman's comfortable home.
Probably one of our silver half-dollars would have purchased all that
his saintship left at the peasant Bouman's. But a half-dollar's worth
will sometimes do for the poor what hundreds of dollars may fail to do
for the rich: it makes them happy and grateful, fills them with new
peace and love.
Hilda van Gleck's little brothers and sisters were in a high state of
excitement that night. They had been admitted into the grand parlor:
they were dressed in their best, and had been given two cakes apiece at
supper. Hilda was as joyous as any. Why not? St. Nicholas would never
cross a girl of fourteen from his list, just because she was tall and
looked almost like a woman. On the contrary, he would probably exert
himself to do honor to such an august-looking damsel. Who could tell? So
she sported and laughed and danced as gayly as the youngest, and was the
soul of all their merry games. Father, mother and grandmother looked on
approvingly; so did grandfather, before he spread his large red
handkerchief over his face, leaving only the top of his skull-cap
visible. This kerchief was his ensign of sleep.
Earlier in the evening, all had joined in the fun. In the general
hilarity, there had seemed to be a difference only in bulk between
grandfather and the baby. Indeed, a shade of solemn expectation, now and
then flitting across the faces of the younger members, had made them
seem rather more thoughtful than their elders.
Now the spirit of fun reigned supreme. The very flames danced and
capered in the polished grate. A pair of prim candles, that had been
staring at the astral lamp, began to wink at other candles far away in
the mirrors. There was a long bell-rope suspended from the ceiling in
the corner, made of glass beads, netted over a cord nearly as thick as
your wrist. It generally hung in the shadow, and made no sign; but
to-night it twinkled from end to end. Its handle of crimson glass sent
reckless dashes of red at the papered wall, turning its dainty blue
stripes into purple. Passers-by halted to catch the merry laughter
floating through curtain and sash into the street, then skipped on their
way with the startled consciousness that the village was wide awake. At
last matters grew so uproarious that the grandsire's red kerchief came
down from his face with a jerk. What decent old gentleman could sleep in
such a racket! Mynheer van Gleck regarded his children with
astonishment. The baby even showed symptoms of hysterics. It was high
time to attend to business. Mevrouw suggested that, if they wished to
see the good St. Nicholas, they should sing the same loving invitation
that had brought him the year before.
The baby stared, and thrust his fist into his mouth, as Mynheer put him
down upon the floor. Soon he sat erect, and looked with a sweet scowl at
the company. With his lace and embroideries, and his crown of blue
ribbon and whalebone (for he was not quite past the tumbling age), he
looked like the king of babies.
The other children, each holding a pretty willow basket, formed at once
in a ring, and moved slowly around the little fellow, lifting their eyes
meanwhile; for the saint to whom they were about to address themselves
was yet in mysterious quarters.
Mevrouw commenced playing softly upon the piano; soon the voices
rose,--gentle, youthful voices, rendered all the sweeter for their
Welcome, friend! St. Nicholas, welcome!
Bring no rod for us to-night!
While our voices bid thee welcome,
Every heart with joy is light.
Tell us every fault and failing;
We will bear thy keenest railing
So we sing, so we sing:
Thou shalt tell us everything!
Welcome, friend! St. Nicholas, welcome!
Welcome to this merry band!
Happy children greet thee, welcome!
Thou art gladdening all the land.
Fill each empty hand and basket;
'T is thy little ones who ask it.
So we sing, so we sing:
Thou wilt bring us everything!
During the chorus, sundry glances, half in eagerness, half in dread, had
been cast towards the polished folding-doors. Now a loud knocking was
heard. The circle was broken in an instant. Some of the little ones,
with a strange mixture of fear and delight, pressed against their
mother's knee. Grandfather bent forward, with his chin resting upon his
hand; grandmother lifted her spectacles; Mynheer van Gleck, seated by
the fireplace, slowly drew his meerschaum from his mouth; while Hilda
and the other children settled themselves beside him in an expectant
The knocking was heard again.
Come in, said the mevrouw, softly.
The door slowly opened; and St. Nicholas, in full array, stood before
them. You could have heard a pin drop. Soon he spoke. What a mysterious
majesty in his voice! what kindliness in his tone!
Karel van Gleck, I am pleased to greet thee, and thy honored _vrouw_,
Kathrine, and thy son, and his good _vrouw_, Annie.
Children, I greet ye all,--Hendrick, Hilda, Broom, Katy, Huygens and
Lucretia. And thy cousins,--Wolfert, Diedrich, Mayken, Voost and
Katrina. Good children ye have been, in the main, since I last accosted
ye. Diedrich was rude at the Haarlem fair last fall; but he has tried to
atone for it since. Mayken has failed, of late, in her lessons; and too
many sweets and trifles have gone to her lips, and too few stivers to
her charity-box. Diedrich, I trust, will be a polite, manly boy for the
future; and Mayken will endeavor to shine as a student. Let her
remember, too, that economy and thrift are needed in the foundation of a
worthy and generous life. Little Katy has been cruel to the cat more
than once. St. Nicholas can hear the cat cry when its tail is pulled. I
will forgive her, if she will remember from this hour that the smallest
dumb creatures have feeling, and must not be abused.
As Katy burst into a frightened cry, the saint graciously remained
silent until she was soothed.
Master Broom, he resumed, I warn thee that boys who are in the habit
of putting snuff upon the foot-stove of the school-mistress may one day
be discovered, and receive a flogging--
(Master Broom colored, and stared in great astonishment.)
But, thou art such an excellent scholar, I shall make thee no further
Thou, Hendrick, didst distinguish thyself in the archery match last
spring, and hit the _doel_,[A] though the bird was swung before it to
unsteady thine eye. I give thee credit for excelling in manly sport and
exercise; though I must not unduly countenance thy boat-racing, since it
leaves thee too little time for thy proper studies.
[Footnote A: Bull's-eye.]
Lucretia and Hilda shall have a blessed sleep to-night. The
consciousness of kindness to the poor, devotion in their souls, and
cheerful, hearty obedience to household rule, will render them happy.
With one and all I avow myself well content. Goodness, industry,
benevolence and thrift have prevailed in your midst. Therefore, my
blessing upon you; and may the New Year find all treading the paths of
obedience, wisdom and love! To-morrow you shall find more substantial
proofs that I have been in your home. Farewell!
With these words came a great shower of sugar-plums upon a linen sheet
spread out in front of the doors. A general scramble followed. The
children fairly tumbled over each other in their eagerness to fill their
baskets. Mevrouw cautiously held the baby down upon the sheet till the
chubby little fists were filled. Then the bravest of the youngsters
sprang up and threw open the closed doors. In vain they searched the
mysterious apartment. St. Nicholas was nowhere to be seen.
Soon they all sped to another room, where stood a table, covered with
the whitest of linen damask. Each child, in a flutter of pleasure, laid
a shoe upon it, and each shoe held a little hay for the good saint's
horse. The door was then carefully locked, and its key hidden in the
mother's bedroom. Next followed good-night kisses, a grand family
procession to the upper floor, merry farewells at bedroom doors, and
silence, at last, reigned in the Van Gleck mansion.
Early the next morning, the door was solemnly unlocked and opened in the
presence of the assembled household; when, lo! a sight appeared, proving
good St. Nicholas to be a saint of his word.
Every shoe was filled to overflowing; and beside each stood a
many-colored pile. The table was heavy with its load of
presents,--candies, toys, trinkets, books and other articles. Every one
had gifts, from grandfather down to the baby.
|
IBM hits nanotech milestone by measuring force that moves atoms
Invention will help build myriad nanoscale devices, like chips and atomic storage
Hitting a major milestone in nanotechnology, IBM researchers have figured out how to measure the amount of force needed to move an atom.
And that information could enable scientists to more easily -- and quickly -- develop nanoscale devices like atomic-level storage and computer chips.
"IBM has been involved in atomic manipulation for 20 years," said Andreas Heinrich, a researcher and project leader at IBM. "What we have now is a way to quantify why we can move certain things, because now we know the forces involved. It's going from a trial-and-error stage to a more systematic way of doing things. It will be easier to build stuff once you have this knowledge."
Heinrich noted that in 1989 IBM Fellow Don Eigler showed off the ability to manipulate individual atoms with atomic-scale precision. Now about 20 years later, Heinrich and Markus Ternes, a post doctoral scientist at IBM, worked with scientists at the University of Regensburg to devise a way to calculate the force needed to manipulate those individual atoms.
Understanding the force required to move an atom is key to nanotechnology, according to Ternes. He explained that it's like engineers figuring out how to build a bridge over a large river. They both need to understand the strength of the different materials. How much force would it take to make a piece of metal bend? How much force would it take to move a cobalt atom over a copper surface? They're similar questions that all need to be answered to build a bridge or a nanoscale storage device.
"It's increased our understanding of how nature works," said Ternes. "If you want to construct something, you have to know what the maximum load [is that] you can put on something before it breaks. Interactions and how easily things can move is important if you want to start talking about construction on a nanoscale."
1 2 Page 1
Page 1 of 2
7 inconvenient truths about the hybrid work trend
Shop Tech Products at Amazon
|
@ARTICLE{10.3389/fmars.2020.594378, AUTHOR={Kersting, Diego K. and Vázquez-Luis, Maite and Mourre, Baptiste and Belkhamssa, Fatima Z. and Álvarez, Elvira and Bakran-Petricioli, Tatjana and Barberá, Carmen and Barrajón, Agustín and Cortés, Emilio and Deudero, Salud and García-March, José R. and Giacobbe, Salvatore and Giménez-Casalduero, Francisca and González, Luis and Jiménez-Gutiérrez, Santiago and Kipson, Silvija and Llorente, Javier and Moreno, Diego and Prado, Patricia and Pujol, Juan A. and Sánchez, Jordi and Spinelli, Andrea and Valencia, José M. and Vicente, Nardo and Hendriks, Iris E.}, TITLE={Recruitment Disruption and the Role of Unaffected Populations for Potential Recovery After the Pinna nobilis Mass Mortality Event}, JOURNAL={Frontiers in Marine Science}, VOLUME={7}, PAGES={882}, YEAR={2020}, URL={https://www.frontiersin.org/article/10.3389/fmars.2020.594378}, DOI={10.3389/fmars.2020.594378}, ISSN={2296-7745}, ABSTRACT={A devastating mass mortality event (MME) very likely caused by the protozoan Haplosporidium pinnae first detected in 2016 in the Western Mediterranean Sea, is pushing the endemic bivalve Pinna nobilis to near extinction. Populations recovery, if possible, will rely on larval dispersal from unaffected sites and potential recolonization through recruitment of resistant juveniles. To assess the impact of the MME on the species’ larval recruitment, an unprecedented network of larval collector stations was implemented over several thousands of kilometers along the Western Mediterranean coasts during the 3 years after the onset of the MME. The findings of this network showed a generalized disruption in recruitment with dramatic consequences for the recovery of the species. However, there were exceptions to this pattern and recruits were recorded in a few sites where the resident population had been decimated. This hints to the importance of unaffected populations as larval exporting sources and the role of oceanographic currents in larval transport in the area, representing a beacon of hope in the current extremely worrying scenario for this emblematic species.} }
|
Forging equipment
The factory has 6 production lines of friction press and 6 production lines of electric screw press.The company has 12 forging and pressing production lines, with an annual production capacity of 20,000 tons of forging products.Forgings range from 0.1kg to 200kg in weight.Application industries of the products include automobile industry, engineering machinery, petrochemical equipment, mining machinery, railway locomotives, agricultural machinery, electric power industry, etc.
The company’s forging presses are all screw presses, with screw rod, nut as the transmission mechanism, and by the screw drive will flywheel positive and negative rotary movement into the up and down reciprocating movement of the slider forging machinery.When working, the motor makes the flywheel rotate to save energy, and at the same time pushes the sliding block downward through the screw and nut.When the slider touches the workpiece, the flywheel is forced to decelerate to a complete stop, and the stored rotational kinetic energy is converted into impact energy, which hits the workpiece through the slider and deforms it.After the blow, the motor reverses the flywheel, causing the slider to rise and return to its original position.The specification of the screw press is expressed by the nominal working force.Screw press is usually driven by motor through the friction disc flywheel rim and make the flywheel rotating, so the press is also called friction screw press, the other is a flywheel is driven by motor directly to the electric screw press, its structure is compact, less transmission links, due to the reversing frequently, to control the electric equipment demand is higher, and need special motor, electric screw press is a new generation of forging press.
The screw press has no fixed bottom dead point and can be used for single, continuous and inching beating for larger die forgings.The impact force is related to the deformation of the workpiece. When the deformation is large, the impact force is small, and when the deformation is small (such as cold strike), the impact force is large.In these respects, it is similar to a forging hammer.However, its slider speed is low (about 0.5m/s, only 1/10 of the forging hammer), and the striking force is closed through the frame, so it works smoothly, and the vibration is much smaller than the forging hammer, so it does not need a large foundation.The screw press is equipped with skid safety mechanism, limiting the maximum impact force to 2 times of the nominal pressure to protect the safety of the equipment.The lower part of the screw press is equipped with a forging ejection device.The screw press has the function of die forging hammer, mechanical press and so on. It is versatile and can be used in die forging, blanking, drawing and other processes.Electric screw press has a simple structure, small volume, short transmission chain, operation is convenient, safe operation and maintenance workload small, the characteristics of the electric screw press against the energy can be accurately set, force have showed that can be adjusted according to the forming precision of energy, force, to reduce the mold, mechanical stress and thermal contact time, extend the life of the mold.The machine body rigidity is good, the slide guide precision is high, the anti-bias load ability is strong, may use in the multi-station die forging, is one kind of new energy conservation environmental protection press.
|
Examining the true cause of what’s killing our bees.
Climate change and agriculture may be contributors to the destruction of insect habitats. But neonicotinoid pesticides might be the final draw for the imminent insect apocalypse, especially when it comes to killing our bees.
There has been a sharp increase in toxins found in neonicotinoid pesticides. These toxins are causing a massive decline in the insect population. Unfortunately, these insects include pollinators like butterflies, birds, and bees. While the toxicity of pesticides is not an entirely new phenomenon, the new generation of pesticides has a more detrimental impact on insects, and especially bees.
Neonics account for at least 92 percent of the increase in the toxic effects of pesticides. And since bees are used as the proxy for the survival and health of insects globally, it stands to reason that concern is growing over the reproductive capabilities of insects. More worrying is that these pesticides also affect the environment, since the neonics can remain in their surroundings for up to 1000 days.
So, are scientists right to worry about the state of bees and other birds? What would be the effects of an insect apocalypse? Are neonics the overall cause of this decline, and is there a solution to the problem? Let’s dive in to find out.
The Declining Insect And Bird Populations
The best indicator of the global population of the different insect species and their reproduction is butterflies. That said, the number of iconic Monarch butterflies in the United States has declined by 80 to 90 percent over the past 20 years. In Ohio alone, 81 butterfly species declined by an average of 33 percent over the same period. Moreover, following the 2014 global insect analysis, scientists determined that the number of insects has reduced by 45 percent in 40 years.
Steve Holmer from the American Bird Conservancy says that the decline in birds is an inevitable outcome following the decline in insects. Why? Every bird must eat insects at a certain point in its life cycle. Therefore, if there are no insects to eat, it stands to reason that some birds might die as a result.
Why is this bad for the world? Insects like butterflies, bees, and other insects pollinate one-third of the global food crops. Hence, they have a massive impact on global ecology.
Without insects, the rest of life, including humanity, would mostly disappear from the land, and within a few months.” These are sentiments from a renowned Harvard entomologist known as E.O. Wilson.
By and large, the human population and the environment depend on insect species for their survival. Therefore, since neonics don’t solely affect insects but also impact the environment, they ought to affect the longevity of humanity. But what is the role of neonics?
Neonics’ Effect On The Insects
More than 120 countries use neonicotinoids in over 140 different agricultural crops. By and large, neonics are very systematic. Once used on the plants, they reside in the tissues of the leaves, sap, pollen, stems, and nectar. This means that the pesticides remain present from the seeding to the harvesting stages of the crops. Even the dead leaves contain neonics.
Therefore, when the insects ingest these crops, the neonics attack their central nervous system. This causes an overstimulation of the insects’ nerve cells, leading to paralysis and then death.
Neonics’ Effect On The Environment
However, studies have found that only five percent of the neonics used will remain in the crops. The rest stays in the soil and the environment. Since they dissolve in water fast, you’ll find some amount of neonics in ponds, streams, and wetlands as well.
Moreover, there is evidence that the amount of these pesticides only continues to increase with agroecological practices. For instance, compared to 26 years ago, the agricultural landscape is already 48 times more toxic from neonics.
Explaining The Controversy
Studies haven’t quantified the number of neonics bees are exposed to or if other reasons further enhance the death of insects. Entomologist, pest control expert, and owner of Ant & Garden Organic Pest Control, Ryan Smith says: “Yes, I believe with what is going on around us now, with urbanization, the use of pesticides, climate change, and the destruction of insect habitats being more prevalent, we are facing an imminent insect apocalypse.”
When asked whether he thought pesticides, especially neonics, had a significant contribution to killing bees, this is what Smith adds: “Neonics are insecticides, and that alone says a lot. However, along with pesticide use, we should also consider how we manage our environment to support our pollinators.”
Smith’s statements are backed by a study conducted in 2019 that warned that 40 percent of all insect species were at risk of extinction. However, the reason for the demise, as cited in the study, was not merely pesticides. Things like climate change and habitat destruction were identified as contributing factors.
Moreover, many critics argue that the pesticides in previous experiments are unrealistic. As a result, regulatory agencies like the EPA state that seed treatment using neonics only poses a low risk on the insects, primarily when used according to the label.
On the other hand, new studies suggest that pesticides are killing bees over a long period. The queen bees are especially at risk of this demise, further aggravating the future reproductive rates of bees.
So, what’s the truth about the effects of neonicotinoid pesticides on the insect population?
Neonicotinoid-Treated Seeds
Amro Zayed, a biologist at York University in Toronto, and his team conducted a study that measured agricultural chemical use from neonicotinoid-treated seeds. Unlike other studies, Amro studied the crops over a five-month growing season.
Zayed confirmed that neonicotinoids dissolve in water and find their way into waterways. As a result, crops from miles away take up the same chemicals. Additionally, they found the presence of neonics on dead bees, nectar, and pollen.
The most surprising result of their study was that they found the highest presence of neonics on pollen from plants near their designated crop field of study. This confirms that the pesticides do remain in plants, bees, and the environment longer than the crop’s life cycle.
Another significant result from Zayed’s study was that the bees suffered, even when exposed to small doses of neonics. The lab results showed that the neonicotinoids affect the bees’ natural defense systems and their chance of survival. The queen bee was also affected, and since most of the bees were falling sick, it became harder to get another queen for the colony.
Therefore, the overall effect was that neonicotinoids reduced the number of queen bees, which reduced the reproductive success of bees. The impact was even more significant when the neonicotinoids were used with other fungicides and fertilizers.
Is Natural Farming The Answer?
Could natural farming be the solution to the insect apocalypse? Smith suggests: “Definitely organic farming. The less exposure to toxic chemicals, the better. Natural farming helps support our pollinators by providing and protecting the natural habitat of bees and exposing them to little to no toxic chemicals.”
A 2018 study determined that farms using neonics had half the profits and ten times the insect pressure compared to the farms that used regenerative farming methods. The regenerative agriculture process uses no-till and other methods like cover crops to improve soil health and increase farm biodiversity, just like agroecological farming.
The no-till farming method is the practice of farming that preserves the nature of the soil because it doesn’t require any tillage. By not tilling the farm soil before planting crops, organisms like insects and other plants that safeguard the natural healthy elements of the soil remain intact. And by climate scientists accounts, healthy soil reduces the amount of carbon emitted into the environment.
The cover crop farming method also preserves the nature of the soil since the cover crops do provide ground cover to the soil. This, in turn, improved the biodiversity, structure, and nutrient balance in the soil. This shows that scientifically tested and sound solutions to the declining insect population lie in natural farming.
Save Our Dying Bees
Are neonicotinoid pesticides killing bees? Yes, they are, and not merely during their application, but long term because of their potency. Additionally, these pesticides do affect the environment and other surrounding plants.
This is a sad realization because, with no bees, the coming generations will have a harder time growing healthy and organic foods. And can you think of a world with no honey or bird songs waking you up in the morning? The good news is that you can do something to save our dying bees, birds, and insects.
Simple practices like planting trees, using natural methods to plant trees, and planting a bee garden can provide a sanctuary for bees. And if you cannot keep bees in your home, become an avid supporter of local beekeepers in your region and other bee conservancy organizations. Help them save our world one bee at a time.
|
Coronavirus: Why the panic?
Since December 2019, we’ve seen chaos among the headlines with nonstop updates about the novel coronavirus (2019-nCoV) which has been spreading at a rapid rate. As I write this now, the numbers are continuing to increase with the toll having risen to 8 so far, including the closure of a GP centre in Brighton (I wonder how many the total will be once I’ve finished this blog).
We’ve seen the world swindle into a pit of panic, as the ignorance of the general public creates a hostile environment, unfortunately not for the virus, but towards one another. People have thrown accusations around looking for someone to blame for this, in some people’s mind, near-apocalyptic virus.
Can we blame them? We’ve seen this before with the SARS outbreak, the Ebola virus, even Swine flu sent the UK public into absolute turmoil. What did they all have in common? We didn’t see them coming at such a rapid rate.
There’s been a lot of comparison to the SARS outbreak back in 2002/03, which is similarly thought to be a strain of coronavirus as it infects humans in a similar way.
What is a coronavirus?
Coronaviruses aren’t unknown to healthcare professionals. Typically, coronaviruses host in animals and are rarely transmitted through to humans. However, they have been responsible for several devastating diseases in humans, symptoms can vary from a common cold to respiratory infections. Currently, there are 7 known coronaviruses that can infect humans.
Firstly, we must understand the virus; it looks for vulnerable cells to inject their genetic material and then uses their spikey structured proteins to ‘recognise and latch onto’ specific cells in the body. This process then results in a merger of the virus with the infected cell which then hijacks the cell’s genetic material, making it distribute new viruses.
The symptoms of 2019 novel coronavirus:
• Pneumonia
• Cough
• Fever
• Shortness of breath
In rare cases:
• Respiratory problems
• Kidney failure
• Death
Whilst surgical masks cannot prevent the virus’ particles from spreading, simple practices such as washing your hands regularly and avoiding hand to mouth contact can help prevent the virus spreading. Generally, viruses can’t live outside a human host for more than a few hours, however this means a surface will remain contaminated for a short period of time, enough for someone to get infected.
Why is it so scary?
The reason it’s causing global panic is not from the symptoms but predominantly, more the mystery of how the disease emerged from an animal disease to infecting humans.
But the transmission rate at which it’s spread is what is causing alarming concern, unlike Ebola and Swine flu it is believed to be airborne, making it more prone to spreading.
On top of not being able to restrict the rate the disease spreads, there is also no known cure for coronaviruses, including SARS.
But people aren’t fussing about SARS anymore, despite it still being an active coronavirus with no known cure.
There are however several known existing antiviral medications which have potential in fighting against coronaviruses. A candidate vaccine was developed for SARS during the outbreak in the early 2000’s but wasn’t significant enough to bring to market.
Once there is a fully developed vaccine, health and medical professionals will need to understand how the outbreak occurred, before distributing on a global scale.
Myth Buster
With the disease spreading rapidly, rumours are spreading at double the rate. Here are a few of my favourite non-facts about the virus which are just nonsense;
• A face mask will protect me
• Ordering products from China will infect me
• The 2019 novel virus is the deadliest disease
• Hand dryers kill coronavirus
• Vaccines against pneumonia will protect me from coronavirus
What to do if you suspect you have the novel-coronavirus?
There is little reason for you to be concerned if you live in the UK and have not travelled recently to Asia. As part of the government’s response they have issued clinical guidance for frontline staff as how to diagnose the virus. If you’ve travelled from Wuhan, China, stay at home for 14 days, avoiding public places and transport to contain the spreading. If you do suspect having novel-coronavirus, call 111 to seek advice. To diagnose the virus clinicians will take samples from the throat and nose which will be transported to PHE Colindale for confirmation that same day.
For more advice how you can take protective measures against the 2019 Novel Coronavirus, click here
Live Science
Worthing Herald
Looking for a new job? We’ll help you find the perfect one!
|
What Is an API and Why Should I Use One?
Share on facebook
Share on twitter
Share on linkedin
Share on email
The acronym API is ubiquitous in the world of information technology. It represents a modern application development pattern that is extremely powerful and essential for crafting scalable and performant web and mobile applications. Developers and development teams must be able to efficiently leverage existing APIs as well as produce robust, secure, and easily consumable APIs for internal or external development. We will explore what an API is, why someone would want to make use of an API, and some great tools and methodologies to ensure that APIs are being utilized in the best way possible.
What is an API?
API stands for application programming interface. It represents a way for applications and servers to communicate and share data over the internet. Kin Lane from Postman has a great explanation of what APIs do, saying “APIs are designed for other digital systems and applications to use. Websites and APIs both do the same things, like return data, content, images, video, and other information. But APIs don’t return all the details that are needed to make things look pretty for the human eye—you only get the raw data and other machine-readable information needed behind the scenes to put the resources being delivered to work, with very little assistance from a human.” APIs make available all the same data a normal website would, but in a manner that is easy for another application to consume and transform for its own purposes. Lane goes on to say of API integration “API integration is simply the connection between two (or more) applications, programs, services, or systems, using APIs. Applications use APIs to send and receive data and content between each other.” APIs make it possible for systems to communicate, share data, and react to changes in other systems.
Why Use an API?
Understanding what an API is and what it enables, one can imagine a multitude of uses for them. APIs allow for speeding up software development projects and reducing costs. They enable developers and development teams to leverage all the hard work of development teams before them by retrieving important data from other systems that already exist. This means that a team can build on existing work to expeditiously create an application for their own purposes, pulling in relevant data from other sources that is already available.
APIs connect systems. An organization may have multiple teams working on multiple applications, and each group needs to know a subset of your organizations data to craft their application independently. A comprehensive API could allow for a CRM system and an Ecommerce system to make use of the same data without the operational overhead of constructing and maintaining different ways to interact with the same set of data. APIs allow for connected systems to react to things happening in other systems, so an order in that Ecommerce system can trigger changes in the CRM system.
APIs make it possible to decouple the heavy lifting of retrieving and manipulating data from devices and front ends. Modern JavaScript single page applications development technologies like React, Progressive Web Apps, mobile applications, and IoT devices all make use of APIs. This makes the client facing portion of the application lightweight while still being able to easily provide rich information to the user.
How to Work with APIs
Seeing how powerful APIs are, teams should be eager to make use of APIs in their organization and software development projects. This can also be daunting. Because APIs are so prevalent, to effectively leverage APIs, your development team will need to ensure that they follow best patterns and practices to ensure success. Using APIs creates challenges. They need to have the proper security so that only the right systems can get to the right data. They need to have proper documentation, so that developers of other systems can leverage the API in the way it is intended. APIs need to be maintained properly, so other systems that rely on them do not break with new changes. APIs also need to be simple; too much complexity will prevent developers of other systems from effectively leveraging that API. Fortunately, there are many tools and patterns available for developing effective APIs. These are some that the team at MercuryWorks leverage to “Make it Work”.
REST stands for Representational State Transfer and is an architectural style for distributed systems. Some of the tenants of REST architecture are Client-Server which means separating user interface concerns from data storage concerns, Stateless which means that each request must contain all the information necessary to understand the request. REST sets out guiding principals that allow for systems that communicate with each other to speak the same language. It enables shared expectations for developers of different systems so that teams can lower the barrier for integrating with other systems and reduce complexity.
OpenAPI is an open specification for working with RESTful APIs. It allows humans and computers to understand an API without having access to source code or documentation. OpenAPI standardizes how an API is written and documented so that it can be easily understood and consumed. OpenAPI is a great tool for promoting clarity and reducing overhead for development teams making use of APIs.
Webhooks are messages sent from one system to another when something happens in the originating system. This means that when systems are connected, instead of a system using an API to query information, it is notified by the system that it would otherwise query. The system that wants to be notified of changing data defines an address to be notified at over the web, and when an event happens in the originating system it sends the requested information to the system that defined the webhook. This is a powerful tool for real time information sharing across systems.
GraphQL is a query language for APIs that allows developers to group the data that the application needs and get all that data in a single request. GraphQL organizes data in terms of types and fields, not endpoints, which allows the application making use of the API to only care about what it needs to work. It is an abstraction for working with APIs that makes the development process simpler and more expedient.
Postman is a platform for API development. It offers tools for connecting with APIs, testing those APIs, creating documentation, automated testing, monitoring, and collaboration tools for sharing API connections with other developers on your team. The Postman API Client makes it easy to simply connect with an API and get data without worrying about your application. You can simply call an API, see the response, and ensure that it is what you are looking for before beginning development.
Swashbuckle is a great tool that we use in applications to generate a Swagger/OpenAPI definition for an API. This examines the API that your team has developed creates documentation in the OpenAPI specification that matches your API with little additional effort. Swashbuckle also creates a page in your application for testing your API. It shows your documented API and all the endpoints and allows you to call those endpoints and test them. It can account for things like API versioning and security, and it allows for teams not only to understand what an API is intended to do, but also working with that API before programming against it.
It’s Demo Time
Swashbuckle.AspNetCore is one of my favorite tools and we use it on all our .NET Core API projects.
A link to the project can be found here: https://github.com/domaindrivendev/Swashbuckle.AspNetCore. Let’s dig a little deeper into this tool to demonstrate how easy it is to develop APIs in accordance with REST and OpenAPI principals and follow best practices of API development.
Step 1: In your .NET Core project install the Nuget package Swashbuckle.AspNetCore
Step 2: In the ConfigureServices section of the Startup.cs, register the Swagger generator.
Swashbuckle code snippet
Step 3: Make sure that the API endpoints in your project have the proper descriptors for Http and From
API Descriptor
Step 4: In your Startup.cs Configure method add the following:
startup.cs method
Step 5: To add the interactive Swagger page in your application, in your Configure method in the Startup.cs add the following:
set up Interactive Swagger page
Now, when you start your application, you can go to the /swagger endpoint to find an interactive page describing your application and allowing testing of your API.
There are many more options that you can make use of to customize and layer information about your API using Swashbuckle and Swagger, but I hope this example illustrates that with just a few extra steps, you can leverage tools in your application development practices ensuring proper API development practices.
API development is a powerful and essential tool for any software development team. Understanding how to produce and consume APIs came make a huge difference for a successful project. Using established patterns and practices of API development, along with making use of some great tools, helps teams quickly leverage APIs to build great systems in less time. Interested in leveraging API development for your next project? Let us help, reach out today.
1. Nick Greene | Jun 1, 2021
Lots of good points.
The more I use Postman and Swagger, the more I like them.
Powerful tools that can aid understanding and testing software without knowing all the gritty details.
2. Donald Bickel | Jun 1, 2021
Great post Matt – love the OpenAPI/Swagger coverage and also the Swashbuckle tool
Leave a Comment
|
Knee Joint pain
Loose Body in Knee Joint – Causes & Treatment
Have you ever experienced intense knee pain? It may be due to a sudden fall over the knee or hitting your knee on a hard surface. Although, internal knee injuries heal themselves; however, this type of wound could leave behind fragments of cartilage or tiny bones in your synovial fluid. If you feel your injured knee, you may not feel these fragments; instead, experience erratic joint lockup, restricted motion, inflammation, and knee strain. These tiny particles can range from millimeters to centimeters. So, this article will illustrate information about loose bodies in knee joints, their causes, and treatment
Knee Pain
You may experience swelling and inflammation if the synovium membrane has a trapped fragment. The synovium membrane surrounds the knee leaving the cartilage area. So, these fragments can also become a cause of arthritis in the knee. The reason is that these particles move around and mutilate the articular cartilage. Hence, early diagnosis and appropriate treatment will help prevent more significant damage to your knee.
The Loose Fragments
You must know how the loose bodies in the joints can cause damage. These tiny fragments of bone or cartilage move freely in your joint fluid. The flexion can trap the particle which will hamper your joint movement. When these bodies mutilate the articular cartilage, you suffer from chondrosis
What Are the Symptoms?
If there are loose bodies in the knee, you may feel that something is moving in your joint.
Loose bodies also limit your knee rom (range of motion). Hence, you may feel a locked knee as if it is jammed by a foreign force.
What Are the Causes?
You may suffer from a loose body in the knee due to an injury to the cartilage, which might result from trauma or sports. The incident can lead to tiny fragments in the joints if you are suffering from osteoarthritis or Charcot’s disease and undergo direct or indirect trauma. If you have an inflamed knee, it might be due to fibrinous fragments. Some people might suffer from a rare condition, Synovial chondromatosis or synovial osteochondromatosis. In this condition, your joint fluid grows abnormally and creates cartilage lumps.
Some genetic conditions may also result in loose bodies and then Knock Knees.
Some genetic conditions may also leads to loose bodies, such as Ehlers Danlos syndrome. These conditions may lead to heritable connective tissue disorders which causes joint hypermobility. Then Loose bodies contribute to the development of knock knees.
How To Diagnose Loose Body in Knee?
To examine and diagnose the loose bodies, doctors may use the following approaches:
The basic approach used to diagnose fragments in the knee fluid is the x-ray. In most cases, the pieces have a bone chip along with it or a massive lump of cartilage that X-ray can easily detect.
The ideal way to identify the site and character of a loose body is through an MRI. If you have synovial chondromatosis, the cartilage fragment can also be diagnosed the same way. Accordingly, MRI is a state of the art non-radiation diagnostic method that examines the entire joint. It is a beneficial pre-operative device to visualize the fragment’s size, amount, and exact spot.
loose bodies ct scanCT Scan
This technique is rarely used. The special thing about this is that it can provide complete details about the tiny fragments at the time of bone fracture.
Loose Bodies with No Symptoms
Sometimes you have broken fragments in your bodies that don’t produce any symptoms. The finding of loose pieces in joints is fundamentally based on x-ray findings. Hence, there is not one specified clinical diagnosis. These loose fragments in the knee joint were crucial for which arthroscopies became so popular.
A 50+ years old man had floating fragments in his left knee joint. It was a history and not due to a tragic event. The occasional loose piece in the cartilage causes discomfort. He was also suffering from inflammation and swelling. He could see clear difference in his knees, as is demonstrated in many swollen knee pictures. Surgeons took him for an x-ray examination, and found a loose joint body in his medial gutter. As medication could not cure this, he agreed to surgical treatment.
Doctors gave anesthesia to the patient in the operation theatre. They raised the left leg, and drained the blood, and pumped a pneumatic tourniquet to 300mmHg. A holding device lifted the leg.
At the start of the surgery, doctors inserted an arthroscope via an adjacent infrapatellar puncture site. A check-up of the suprapatellar pouch showed extra synovial fluid. Doctors also witnessed many cartilaginous loose joint builds in the joint.
The arthroscopic procedure helped remove the fragments in the knee. There were grade 3 changes of a patellofemoral joint together with the trochlea. Then doctors performed a vacillating chondroplasty.
A pre-operative diagnosis of a patient showed a loose joint body of the left knee. According to the diagnosis, there were several loose joint fragments, ripped medial meniscus, and grade 3 deviations of the patellofemoral joint. So, prolotherapy was the best approach after arthroscopy.
The Special Instruments for Treatment
Usually, doctors use a suction tip to remove the fragments. Apart from this, if you have tiny particles in your joints, surgeons may use a small needle and grasper (a surgical instrument) to remove them.
If any bodies are floating in your knee joint area, doctors use a specialized clinical instrument known as the mechanical burr or re-sector to break down the bodies. Your body can easily disregard the broken fragments through the enzyme degradation mechanism.
Suppose your body has large-sized fragments due to an injury, knee fracture, bone swelling, or cartilage inflammation. Your surgeons will reduce these particles and attach them to the original position with the help of surgical screws or pins.
If loose fragments in your knee area due to a benign tumor of the synovial membrane, specialists recommend a verified partial synovectomy procedure to treat the condition. Your doctor uses this technique to remove the grown-out part of the synovium.
And if the fragments are present in the back of knee, doctors use an arthrotomy procedure to treat the condition. You will have to undergo an open knee surgery where cuts are made into the joint and floating bodies are removed.
After surgery, your doctor might suggest a rehab program to ease knee pain and restore its strength and function.
Premier Pain Centre
If you are suffering from knee pain, Premier Pain Centre provides the best surgical and non-surgical treatments to the US. Our reputable one-stop pain relief center and qualified physicians can effectively help you in managing chronic pain issues. We aim to improve the quality of life through excellent medical management, state-of-the-art interventional pain processes, along physical therapy and exercises.
|
Middle Falls Power Plant
Almost 50 years ago, one of Thurston County’s most loved and picturesque parks opened to the public. The Tumwater Falls Park, owned and operated by the Olympia Tumwater Foundation is now one of the most popular private parks in the region.
Donated to the non-profit foundation by the Olympia Brewing Company, the park opened in 1962. The 15-acre park situated along the banks of the canyon stretch of the lower Deschutes River in Tumwater. The park hosts over 200,000 visitors each year.
This year, the Olympia Tumwater Foundation celebrates the 50th Anniversary of the park. “It is truly an urban oasis,” says Olympia Tumwater Foundation Executive Director John Freedman. “It’s a piece of history, in the middle of a capitol city, next to a river with salmon running upstream.”
“Tumwater Falls Park is a gift to the community from the Olympia Tumwater Foundation. The Foundation maintains the park for the community,” adds Freedman. “The park is privately funded and does not receive any city, state or federal revenues. All funding is from private sources.”
Here is a glimpse at some interesting aspects of the property now encompassed inside the park.
Tumwater Falls Park construction in 1962
1. While the Deschutes River now flows north, it could have at one point actually flowed south. As the last glaciers receded from Puget Sound thousands of years ago, glacial lakes likely formed behind them. Trapped between glacial ice to the north, these freshwater lakes probably flowed south towards what is now the Chehalis River. It’s possible one of these rivers carved what we now consider the Deschutes River Valley.
This is also the same activity that created Tumwater Falls. The glaciers likely deposited soft sediment, which was relatively quickly washed away by the river. This left much older volcanic rock to form the falls.
2. The existence of the falls adjacent to a saltwater bay made them an attractive place to settle and for commercial development in the mid-19th century. Before steam power became prevalent in industry, mills were located near waterfalls to harness to waterpower.
It is ironic that the reason Euro-Americans first came to Tumwater (then called New Market) soon went out of fashion. As the industrial revolution took hold in the United States, the need for close-by water power lost out to steam power.
3. In addition to water powered industry, the current falls park was also home to one of the earliest railroads in the area. When the Northern Pacific Railroad decided on a terminus with Puget Sound that wasn’t Olympia, local residents decided to build their own line. What eventually became known as the Port Townsend line ran through the west side of what is now the Falls Park. Much of the current trail along the west side of the park is actually the old railroad grade. It continued down the west side of the Deschutes River (now Capitol Lake) until reaching deep water near where Tugboat Annies is now located.
This railroad was eventually abandoned when the current rail line that runs through the former brewery site (and under Capitol Way to Olympia) was built.
4. An annual attraction to the park is the salmon migration through the fish ladders and into holding ponds operated by the state Department of Fish and Wildlife.
Up until the 1950s, it was unlikely that salmon were ever able to make it up to the upper Deschutes watershed. This was until the state built three salmon ladders in the 1950s and began planting salmon. Two years after the Tumwater Falls park opened, the state added ponds along the Deschutes.
In the 1980s, production peaked at the Deschutes with 12 million fish. Today, just less than 4 million chinook are released each year. The vast majority of the fish released from the Deschutes are actually caught in the Puget Sound between Everett and Tacoma.
The state, city of Tumwater and local non-profits currently have a plan — yet to be funded — to expand the hatchery to include a rearing facility and education center into Pioneer Park.
Lower Tumwater Falls in 1907
References and additional reading
Celebrating 56 Years
Tumwater Falls Park history
TRPC Olympia Brewery Report
WDFW Tumwater Falls hatchery
HSRG: Deschutes River hatchery fall chinook
WDFW: Deschutes River chinook, Past, Present, Future
Print Friendly, PDF & Email
|
What is Metatarsalgia?
Metatarsalgia is a common overuse injury. It is a condition in which the ball of your foot becomes painful and inflamed. It is often thought of as a symptom of other conditions, rather than as a specific disease.
Signs & Symptoms
Symptoms of metatarsalgia can include:
• A feeling of having a pebble in your shoe
Treatments for metatarsalgia include, but are not limited to, the following:
• Rest. Protect your foot from further injury by not stressing it. Elevate your foot after standing or walking. You might need to avoid your favorite sport for a while, but you can stay fit with low-impact exercises, such as swimming or cycling.
• Wear proper shoes. Avoid too-tight or too-loose shoes and limit your wearing of high heels. Wear shoes appropriate to the sports you play.
• Consider arch supports. If insoles don't help, your doctor might recommend arch supports to minimize stress on the metatarsal bones and improve foot function. You can buy arch supports over-the-counter, or they can be custom fitted.
|
The Importance Of Job Satisfaction
992 Words4 Pages
Today’s work force is predominantly dynamic that has enormous opportunities and challenges from the market and customers. Understanding such dynamism is very crucial to the achieve organisation’s objectives. A well-defined and executed organization culture is the core to job satisfaction. More than compensation and many things, what matters today is job satisfaction. It is the final output every organization desires. Employees tend to stay longer in the organization if they have job satisfaction. There are many successful organizations known for higher levels of job satisfaction among their employees. If compared with other sectors, power sector employees are generally considered to have a direct linkage with all over sectoral developments…show more content…
Some workers may be satisfied with one aspects of their organisation and others may be dissatisfied with the same aspect. Various people have defined job satisfaction in their terms. According to Locke and Lathan (1990), job satisfaction is pleasurable or positive emotional state resulting from the appraisal of one's job or job experience. Job satisfaction is the result of sound HR policies built on democratic values. According to Mitchell and Lasan (1987), it is generally recognized in the organizational behaviour field that job satisfaction is the most important and frequently studied…show more content…
Secure job environment enhances the degree of job satisfaction. Management must create an environment of job security among employees. There should be a challenging environment. The job should provide enough scope for the employees in terms of promotion and transfer. Chandrasekar (2011) argue that an organization needs to pay attention to create a work environment that enhances the ability of employees to become more productive in order to increase profits for organization. He also argued that Human to human interactions and relations are playing more dominant role in the overall job satisfaction rather than money whereas management skills, time and energy, all are needed for improving the overall performance of the organization in current era. Sell and Cleal (2011) developed a model on job satisfaction by integrating economic variables and work environment variables to study the reaction of employees in hazardous work environment with high monetary benefits and non-hazardous work environment and low monetary benefits. The study showed that different psychosocial and work environment variables like work place, social support has direct impact on job satisfaction and that increase in rewards does not improve the dissatisfaction level among
More about The Importance Of Job Satisfaction
Open Document
|
bactrim treatment for pcp
Drug-like molecule points to novel strategies for cancer therapy
A decade ago, genome sequencing revealed a big surprise: about 50 percent of human cancers are linked to mutations in what are known as epigenetic regulators, which control the activity of genes.
In a new study in Cell Chemical Biology, benazepril hcl 40 mg tablets a team of scientists led by Oliver Bell from USC and Stephen V. Frye from the University of North Carolina at Chapel Hill developed a new drug-like molecule that can counteract the effects of mutated epigenetic regulators, which are known to drive certain types of cancer including lymphoma.
In healthy cells, epigenetic regulators play an essential role: turning on and off the activity of hundreds of genes in the precisely orchestrated sequence that directs normal human development.
One of these epigenetic regulators, EZH2, controls the transient inactivation of specific genes in order to permit the maturation of immune cells. However, mutated EZH2 may cause persistent repression of these genes, thus preventing the immune cells from developing normally and ultimately leading them to transform into cancerous malignancies.
The good news is that in contrast to many other types of mutations, cancer-causing mutations in epigenetic regulators are potentially reversible by therapeutic drugs. With this in mind, first author Junghyun L. Suh and the research team set out to design a drug-like molecule to reverse the cancer-causing gene repression by EZH2.
Suh and her colleagues started by considering the mechanism by which EZH2 controls gene repression. EZH2 acts as a “writer” that marks which genes will be repressed. A second epigenetic regulator called CBX8 serves as a “reader” that interprets these repressive marks, and recruits additional regulatory machinery that actually turns off the genes.
Compared to the writer, the reader CBX8 seems to be equally critical for the proliferation of cancer cells, but is more dispensable for the function of healthy cells. This means that drugs targeting the reader would be expected to have fewer toxic side effects on the healthy cells throughout a patient’s body.
To specifically target CBX8, the researchers first engineered mouse stem cells in which they could easily screen a large number of drug-like molecules. These engineered stem cells relied on CBX8 reading the marks deposited by EZH2 to repress a gene producing a visible green fluorescent protein (GFP). If the stem cells showed activation of the telltale green glow, the scientists knew that a drug-like molecule had successfully prevented CBX8 from reading the repressive marks.
The researchers then parlayed their knowledge of CBX8 into several iterations of drug-like molecules that targeted this particular reader. They took into account CBX’s intricate protein structure, as well as the way that it binds to DNA and reads repressive marks. When they had succeeded in synthesizing a potent molecule that worked well in the engineered mouse cells, they moved on to testing in human cancer cells.
“When we exposed human lymphoma and colorectal cancer cells to our newly synthesized drug-like molecule in the laboratory, the malignant cells ceased to proliferate and began to behave more like healthy cells,” said the study’s co-corresponding author Oliver Bell, who is an assistant professor of biochemistry and molecular medicine, and stem cell biology and regenerative medicine at the Keck School of Medicine of USC, and a member of the USC Norris Comprehensive Cancer Center.
Source: Read Full Article
|
AngularJS Interview Questions | Eklavya Online
AngularJS Interview Questions
Factory method is used for creating a directive. Whenever the compiler matches the directive for the first time, the factory method is invoked. Factory method is invoked using $injector.invoke.
module.factory(‘factoryName’, function);
Global API is the combination of global JavaScript function, which is used to perform tasks such as comparing objects, iterating objects, and converting the data.
There are a few common API functions like:
• angular.lowercase
It is used to convert a string to lowercase string.
• angular.uppercase
It is used to convert a string to uppercase string.
• angular.IsString
It returns true if the current reference is a string.
• angular.IsNumber
It returns true if the current reference is a number.
Deep linking is the method which allows us to encode the state of the application in the URL in such a way that it can be bookmarked. Then the application can further be restored from the URL to the same state.
A single page application is a web application or a website which provides a very fast and reactive experience to the users like a desktop application. It only reloads the current page rather that the entire application that’s why it is extremely fast.
$routeProvider is one of the important services which set the configuration of URLs. It further maps them with the corresponding HTML pages or ng-templates and attaches a controller with the same.
A $scope is an object that represents the application model for an Angular application.
Each AngularJS application can have only one root scope but can have multiple child scopes. For example:
app.controller(‘myCtrl’, function($scope) {
$scope.carname = “Volvo“;
Some of the key characteristics of the $scope object are given below:
• It provides observers to check for all the model changes.
• It provides the ability to propagate model changes through the application as well as outside the system to other associated components.
• Scopes can be nested in a way that they can isolate functionality and model properties.
• It provides an execution environment in which expressions are evaluated.
AngularJS controllers are used for:
• Setting the initial state of the $scope object
• Adding behavior to the $scope object
AngularJS initializes automatically upon the “DOMContentLoaded” event. It also initializes when the browser downloads the Angular.js script and document.readyState is set to ‘complete’ at the same time. AngularJS looks for an ng-app directive which is the root of Angular application compilation process.
If the directive ‘ng-app’ is found, then AngularJS will perform the following steps:
• It will load the module which is associated with the directive.
• It will create the application injector.
• It will compile the DOM starting from the ng-app root element.
This process is known as Auto-bootstrapping.
Each Angular application contains one root scope, but there can be several child scopes. The application may have multiple scopes because child controllers and some directives create new child scopes. When the new scope is formed or created, it is added as a child of the parent scope. As similar to DOM, scopes also create a hierarchical structure.
Yes, AngularJS is supported with all the browsers like Safari, Chrome, Mozilla, Opera, and Internet Explorer, etc. It is also companionable with mobile browsers.
When a page is loaded into the browser, several things happen:
• HTML document file gets loaded, and evaluated by the browser. AngularJS JavaScript file gets loaded, and the angular global object is created. Next, JavaScript file which is responsible for registering the controller functions is executed.
• AngularJS scans through the HTML to find AngularJS apps and views. Once the view is found, it connects that particular view to the corresponding controller function.
• AngularJS executes the controller functions. It further renders the views with data from the model populated by the controller, and the page gets ready.
The currency filter contains the “$” Dollar symbol as default. We can apply the following code as the html template format of Currency Filter.
{{ currency_expression | currency : symbol : fractionSize}}
We can use Currency Filter by using the following methods:
• Default
If we do not provide any currency symbol, then Dollar sign will be used by default as shown below:
Default Currency{{amount | currency}}
• User-Defined
To use different types of currency symbols, we have to define our own symbol by applying the Hexa-Decimal code or Unicode of that Currency.
E.g., To define Indian Currency Symbol, then we have to use Unicode-value or Hexa-Decimal value.
Indian Currency{{amount | currency:”&# 8377″}}
AngularJS is a JavaScript framework with key features like models, two-way binding, directives, routing, dependency injections, unit tests, etc. On the other hand, JQuery is a JavaScript library used for DOM manipulation with no two-way binding features
Services are objects that can be used to store and share data across the application. AngularJS offers many built-in services, and each of them is responsible for a specific task. They are always used with the prefix $ symbol.
Some of the important services used in any AngularJS application are as follows:
• $http- It is used to make an Ajax call to get the server data.
• $window- It provides a reference to a DOM object.
• $Location- It provides a reference to the browser location.
• $timeout- It provides a reference to the window.set timeout function.
• $Log- It is used for logging.
• $sanitize- It is used to avoid script injections and display raw HTML in the page.
• $Rootscope- It is used for scope hierarchy manipulation.
• $Route- It is used to display browser-based path in browser’s URL.
• $Filter- It is used for providing filter access.
• $resource- It is used to work with Restful API.
• $document- It is used to access the window.Document object.
• $exceptionHandler- It is used for handling exceptions.
• $q- It provides a promise object.
• $cookies- It is used for reading, writing, and deleting the browser’s cookies.
• $parse- It is used to convert an AngularJS expression into a function.
• $cacheFactory– It is used to evaluate the specified expression when the user changes the input.
Sometimes, we may need to manually initialize the Angular application to have more control over the initialization process. We can perform such task using angular.bootstrap() function within angular.element(document).ready() function. AngularJS uses this function when the DOM is ready for manipulation.
The angular.bootstrap() function uses two parameters, the document, and the module name injector.
Find index is used to return the position of an element. It returns the value (-1) if the requested element is not found.
var index = $scope.items.findIndex(record => ==’2018-12-12′);
In the given code, index of the object is returned where
$$ prefix in AngularJS is used as a private variable, as it is responsible for preventing accidental code collision with the user code.
Whereas, $ prefix is used to define angular core functionalities such as variable, parameter, property or method, etc.
No, there can’t be more than one ng-app directive for a single AngularJS application.
The ng-app directive helps AngularJS application to make sure that it is the root element. In our HTML document, we can have only one ng-app directive. If there is more than one ng-app directive, then whichever appears first will be used.
Dependency Injection (also called DI) is one of the best features of AngularJS. It is a software design pattern where objects are passed as dependencies rather than hard coding them within the component. It is useful for removing hard-coded dependencies and making dependencies configurable. To retrieve the required elements of the application that need to be configured when the module is loaded, the “config” operation uses Dependency Injection. It allows separating the concerns of different components in an application and provides a way to inject the dependent component into the client component. By using Dependency Injection, we can make components maintainable, reusable, and testable.
A simple case of dependency injection in AngularJS is shown below:
myApp.controller(‘myController’, function ($scope, $http, $location)
Here, a controller is declared with its dependencies.
AngularJS provides the following core components which can be injected into each other as dependencies:
• Value
• Factory
• Service
• Provider
• Constant
A term IDE stands for Integrated Development Environment. There are some IDE’s given below which are used for the development of AngularJS:
• Eclipse
It is one of the most popular IDE. It supports AngularJS plugins.
• Visual Studio
It is an IDE from Microsoft that provides a platform to develop web apps easily and instantly.
• WebStorm
It is one of the most powerful IDE for modern JavaScript development. It provides an easier way to add dependencies with angular CLI.
• Aptana
It is a customized version of Eclipse. It is free to use.
• Sublime Text
It is one of the most recommendable editors for HTML, CSS, and JavaScript. It is very much compatible with AngularJS code.
A module is a container for the different parts of the application like a controller, services, filters, directives, etc. It is treated as a main() method. All the dependencies of applications are generally defined in modules only. A module is created using an angular object’s module() method. For example:
AngularJS is an open-source JavaScript framework used to build rich and extensible web applications. It is developed by Google and follows the MVC (Model View Controller) pattern. It supports HTML as the template language and enables the developers to create extended HTML tags which will help to represent the application’s content more clearly. It is easy to update and receive information from an HTML document. It also helps in writing a proper maintainable architecture which can be tested at a client-side.
AngularJS enriches form filling and validation. AngularJS provides client-side form validation. It checks the state of the form and input fields (input, text-area, select), and notify the user about the current state. It also holds the information about whether the input fields have been touched, or modified, or not.
There are following directives that can be used to track error:
• $dirty
It states that the value has been changed.
• $invalid
It states that the value which is entered is invalid.
• $error
It states the exact error.
Moreover, we can use novalidate with a form declaration to disable the browser’s native form validation.
In angularJS, $watch() function is used to watch the changes of variable in $scope object. Generally, the $watch() function is created internally to handle variable changes in the application.
If there is a need to create custom watch for some specific action then it’s better to use $ function. The $ function is used to create a watch of some variable. When we register a watch, we pass two functions as parameters to the $watch() function:
• A value function
• A listener function
An example is given below:
$scope.$watch(function() {},
function() {}
Here, the first function is the value function and the second function is the listener function.
Yes, we can perform it by injecting PHP in the required place. i.e.,
It will work only if we use PHP to render the HTML and the above JavaScript in tag inside the PHP file.
AngularJS has a module known as ngCookies. Before we inject ngCookies, we should include angular-cookies.js into the application.
• Set Cookies
We can use the put method to set cookies in a key-value format.
$cookies.put(“username”, $scope.username);
• Get Cookies
We can use the get method to get cookies.
• Clear Cookies
We can use the remove method to remove or clear cookies.
The syntax for creating new date object is given below:
$scope.newDate=new Date();
Some important features of AngularJS are given below:
• MVC- In AngularJS, you just have to split your application code into MVC components, i.e., Model, View, and the Controller.
• Validation- It performs client-side form validation.
• Module- It defines an application.
• Directive- It specifies behavior on the DOM element.
• Template- It renders the dynamic view.
• Scope- It joins the controller with the views.
• Expression- It binds application data to HTML.
• Data Binding- It creates a two-way data-binding between the selected element and the $ctrl.orderProp model.
• Filter- It provides the filter to format data.
• Service- It stores and shares data across the application.
• Routing- It is used to build a single page application.
• Dependency Injection- It specifies a design pattern in which components are given their dependencies instead of hard-coding them within the component.
• Testing- It is easy to test any of the AngularJS components through unit testing and end-to-end testing.
Routing is one of the main features of the AngularJS framework, which is useful for creating a single page application (also referred to as SPA) with multiple views. It routes the application to different pages without reloading the application. In Angular, the ngRoute module is used to implement Routing. The ngView, $routeProvider, $route, and $routeParams are the different components of the ngRoute module, which help for configuring and mapping URL to views.
Some of the main advantages of AngularJS are given below:
• Allows us to create a single page application.
• Follows MVC design pattern.
• Predefined form validations.
• Supports animations.
• Open-source.
• Cross-browser compliant.
• Supports two-way data binding.
• Its code is unit testable.
Link is used for combining the directives with a scope and producing a live view. The link function is used for registering DOM listeners as well as updating the DOM. The linking function is executed as soon as the template is cloned.
There are two types of linking function:
• Pre linking function
Pre-linking functions are executed before the child elements are linked. This method is not considered as a safe way for DOM transformation.
• Post linking function
Post-linking functions are executed after the child elements are linked. This method is a safe way for DOM transformation.
AngularJS provides support for creating custom directives for the following type of elements:
• Element Directive
Element directives are activated when a matching element is encountered.
• Attribute
Attribute directives are activated when a matching attribute is encountered.
• CSS
CSS directives are activated when a matching CSS style is encountered.
• Comment
Comment directives are activated when a matching comment is encountered.
AngularJS treats all the values as untrusted/ unsecured in HTML or sensitive URL bindings. AngularJS automatically runs security checks while binding untrusted values. It throws an error if it cannot guarantee the security of the result. This type of behavior depends on contexts: HTML can be sanitized, but template URLs cannot.
To illustrate this, consider the following directive
It renders its value directly as HTML. When there is an untrusted input, AngularJS will try to sanitize it before rendering if a sanitizer is available. We will need to mark it as trusted to bypass sanitization and render the input.
There are some drawbacks of AngularJS which are given below:
• JavaScript Dependent
If end-user disables JavaScript, AngularJS will not work.
• Not Secured
It is a JavaScript-based framework, so it is not safe to authenticate the user through AngularJS only.
• Time Consumption in Old Devices
The browsers on old computers and mobiles are not capable or take a little more time to render pages of application and websites designed using the framework. It happens because the browser performs some supplementary tasks like DOM (Document Object Model) manipulation.
• Difficult to Learn
If you are new in AngularJS, then it will not be easy for you to deal with complex entities such as Quite layered, hierarchically and scopes. Debugging the scope is believed a tough task for many programmers.
Directives are the markers on DOM element which are used to specify behavior on that DOM element. All AngularJS directives start with the word “ng”. There are many in-built directives in AngularJS such as “ng-app”, “ng-init”“ng-model”, “ng-bind”“ng-repeat” etc.
• ng-app
The ng-app directive is the most important directive for Angular applications. It is used to locate the beginning of an Angular application for AngularJS HTML compiler. It marks the HTML elements that Angular intends to make the root element of the application. The custom attributes use spinal-cases, whereas the corresponding directives follow the camelCase. If we do not use this directive and try to process other directives, it gives an error.
• ng-init
The ng-init directive is useful for initializing the data variable’s inline statement of an AngularJS application. Therefore, those statements can be used in the specified blocks where we can declare them. A directive ng-init is like a local member of the ng-app directive, and it may be a single value or a group of the values. It directly supports JSON data.
• ng-model
The ng-model directive binds the values of HTML elements such as input, select, textarea to the application data. It provides two-way binding behavior with the model value. Sometimes, it is also used for databinding.
• ng-bind
The ng-bind directive is used to bind the model/variable’s value to HTML controls of an AngularJS application. It can also be used with HTML tags attributes like:, and more but it does not support two-way binding. We can only check the output of the model values.
• ng-repeat
The ng-repeat directive is used to repeat HTML statements. It works the same as for each loop in C#, Java or PHP on a specific collection item like an array.
A template consists of HTML, CSS, and AngularJS directives, which are used to render the dynamic view. It is more like a static version of a web page with some additional properties to inject and render that data at runtime. The templates are combined with information coming from model and controller.
An injector is referred to as a service locator. It is used to receive object instances as defined by the providers, invoke methods, instantiate types, and load modules. Each Angular application consists of a single injector which helps to look upon an instance by its name.
Angular’s HTML compiler allows us to teach the browser, new HTML syntax. It also allows the developer to attach new behavior or attributes to any HTML element known as directives. AngularJS compilation process automatically takes place in the web browser. It does not contain any server-side or pre-compilation procedure.
AngularJS uses <$compiler> service for the compilation process of an Angular HTML page. Its compilation process starts after the HTML page (static DOM) is completely loaded.
It occurs in two phases:
• Compile
It checks into the entire DOM and collects all of the directives.
• Link
It connects the directives with a scope and produces a live view.
The concept of compile and link has been added from C language. The code is compiled and then linked.
Internationalization is the method for showing locale-specific information on a website. Consider a website displaying content in the English language in the United States and Danish in France.
AngularJS has inbuilt internationalization support for three types of filters:
• Currency
• Date
• Numbers
We need to incorporate the corresponding JS according to the locale of the country. By default, it is configured to handle the locale of the browser.
Every AngularJS application contains a $rootScope, which is the top-most scope created on the DOM element. An application can contain only one $rootScope, which will be shared among all its components. Every other scope is considered as its child scope. It can watch expressions and propagate events. By using the root scope, one can set the value in one controller and read it from the other controller.
AngularJS is based on MVC framework, where MVC stands for Model-View-Controller. MVCperforms the following operations:
• A model is the lowest level of the pattern responsible for maintaining data.
• A controller is responsible for a view that contains the logic to manipulate that data. It is basically a software code which is used for taking control of the interactions between the Model and View.
• A view is the HTML which is responsible for displaying the data.
For example, a $scope can be defined as a model, whereas the functions written in angular controller modifies the $scope and HTML displays the value of scope variable.
Controllers are JavaScript functions which are used to provide data and logic to HTML UI. It acts as an interface between Server and HTML UI. Each controller accepts $scope as a parameter which refers to the application/module that controller is going to control. For example:
app.controller(‘myCtrl’, function($scope) {
$scope.firstName = “Aryan”;
$scope.lastName = “Khanna”;
We can create our own filters in AngularJS. It can be performed by associating the filter to our module. These types of filters are known as custom filters.
An example given below can be used to count the number of elements in the string by using the filter:
angular.module(‘myCountFilterApp’, [])
var out=[];
return out.length;
As per above example, if the string is “21, 34, 45” then output after applying filter will be 3.
|
Long-Term Learning
Learn efficiently and remember over time.
Start Long-Term Learning
Get personalized study reminders at intervals optimized for better retention.
Track your progress on this set by creating a folder
Or add to an existing folder
Add this set to a folder
• What is a product market?
Markets in which firms sell goods and services to households or other firms.
What is a factor market?
Markets in which resources-- labor, capital, land and natural recourses, and entrepreneurship-- are sold to firms. Because recourses are sometimes called factors of production, the markets in which they are traded are called factor markets.
Firms demand recourses such as labor, land, or capital, and they are supplied by the households who own these resources in ________ markets.
Factor Markets
What is the demand for a resource-- such as labor? That is, it arrises from, and will vary with, the demand for the firm's output.
Derived Demand
What is the price called in a labor market?
Wage rate
How is hourly wage rate calculated?
Total earnings over the week, month, or year divided by the number of hours worked during that period. For example, if someone earns 80,000 in commissions during the yearend works 2,000 hours that year, the hourly wage rate would be 80,000/2,000= $40.
A perfectly competitive labor market has the following four characteristics:
Many buyers and sellers, standardized labor quality (all workers are equally productive), easy entry and exit, and well informed buyers and sellers.
We can call a firm in a competitive labor market a _____________.
Wage taker
When we refer to labor demand in a market, we mean the demand by all firms for the type of labor being traded in that market.
What is the curve indicating the total number of workers all firms in a labor market want to employ at each wage rate?
The Labor Demand Curve
Why does the labor demand curve slope downward?
Because, all else equal, firms want to employ fewer workers from a labor market when the wage rate is higher.
What is the output effect?
A change in the wage rate alters the profit maximizing output level and therefore changes the quantity of labor demanded.
Over most time horizons, labor is considered a ________ input used to calculate a firm's ___________.
variable, marginal cost
When the wage rate rises, a firms marginal cost curve shifts __________.
The upward shift in the marginal cost curve decreases the firm's __________.
Profit maximizing output level
Demand for recourses is a derived demand: as the firm's rate of production falls, so will the quantity of labor it wants to employ. This is the _____________ of a wage change.
output effect
A higher wage raet raises the price of that labor relative to the price of other inputs.
All else equal, a rise in the wage rate shifts up a firm's ______________ and therefore lowers its profit maximizing output level. Because it is producing less output, the firm will want to employ fewer workers.
marginal cost curve
What is the input substitution effect?
A change in the wage rate alters the price of labor relative to the cost of other inputs and therefore changes the quantity of labor demanded.
Why does the labor demand curve slope downward? Because the rise in the wage rate has two effects:
It increases firms' marginal cost, causing them to decrease production and employ fewer workers (the output effect) and it increases the ratline cost of labor from that market causing firms to substitute other inputs such s capital or other types of labor (the input substitution effect)
A change in the market wage rate moves us _______ a labor demand curve.
What is a complementary input?
An input that is used by a particular type of labor making it more productive. Used BY the labor we're analyzing, making it more productive and therefore more profitable for the firm to employ.
When firms in a labor market want to employ more labor at any given wage rate, the demand curve shifts _______________.
When a technological advance creates an entirely new complementary input or when an existing one becomes cheaper, the demand curve for labor that uses the input will shift ____________.
What is a substitute input?
An input that can be used instead of a particular type of labor. usually due to a technological change. or when existing one becomes cheaper.
The labor supply curve slopes upward because...
all else equal (including the number of people quantified for that job) more people will want to work in that market when the wage rate rises
What causes shifts in the labor supply curve?
Changes in the number of qualified people, changes in other labor markets, changes in taste
The more people want to work in a labor market at any given wage rate, the supply curve shifts rightward
An increase in labor demand raises both the equilibrium wage rate and the equilibrium level of employment.
What is a compensating wage differential?
The difference in wage rats that makes two jobs equally attractive to workers.
Nonwage job characteristic
any aspect of a job-- other than the wage-- that matters to a potential or current employee. Danger is an example of a nonage job characteristic
Differences in human capital requirements give rise to compensating differentials. Jobs that require more costly training will tend to pay higher wages. Sooo...
jobs that require more costly training will tend to pay higher wages. Doctors attorneys (especially high costs for qualifying for these positions).
Why do wages differ?
Compensating differentials, differences in ability, barriers to entry, discrimination
Wages differ because of differences in ability...
abilities differ in the real world and these differences in ability can create wage differences in two ways: differences in ability to become qualified and differences in ability among those qualified.
In labor markets for talented professionals, in which there is mass-distribution of their product and substantial agreement about rankings, small differences in ability can lead to disproportionate differences in pay.
"economics of superstars" the stakes are high and small differences in perceived ability can lead to high differences in the expected outcome.
The growth of increasingly global reach of corporations have contributed to the rapidly rising earning of top business executives, corporate attorneys, and asset managers.
At the same time, technological changes have increase the earning of top musicians actors, comedies, writers, and sports figures as entertainment produce are distributed to ever larger global audiences.
What are some examples of barriers to entry?
Occupational licensing, union wage setting
In a competitive labor market, a union- by raising the wage firms must pay-- this decreases total employment in the union sector.
This, in turn, cause wages in the nonunion sector to drop. The combined result is a wage differential between union and nonunion wages.
By bargaining for higher wage rates, union members capture some of the dollars that would otherwise become part of corporate profits.
IN some cases, higher than normal profit due to monody or oligopoly markets.
Unions can raise worker morale, reduce labor turnover, and possibly increase worker productivity. This could actually increase the demand for labor by unionizing firms.
:) yay unions!
Economists generally consider employee prejudice one of the least important sources of labor market discrimination.
Because biased employers must pay higher wages to employ men, they will have higher average costs than unbiased employees.
When prejudice protonates with employees, competitive labor markets work to...
discourage discrimination and reduce or eliminate any wage gap between the favored and the disfavored group.
When prejudice originates with the firms employees or its customers, market forces...
may encourage, rather than discourage, discrimination and can lead to a permanent wage gap between the favored and disfavored groups.
What is statistical discrimination?
So called because individuals are excluded based on the statistical probability of behavior in their group, rather than their own personal traits-- is a case of discrimination without prejudice.
The observe red differences in education, geographic location, and ability may be the result of
job market discrimination.
What is premarket discrimination?
Unequal treatment in education and housing-- that occurs before an individual enters the labor market.
The simple wage gap between two groups tends to overstate the impact of job-market discrimination on earnings, because it fails to account for differences in worker skill, experience, and job choice.
However, controlling for these characteristics may understate the impact of discrimination, since these characteristics may in part result from discrimination.
In the United States, about ______ percent of the labor force is covered by the minimum wage law.
A higher minimum wage rate raises ______________ costs in industries that employ minimum wage labor.
average and marginal costs
The cost of the higher minimum wage is paid by both _________ and __________.
firms and consumers
Many who benefit from a higher minimum wage are economically better off than those who pay for it.
This makes higher minimum wage a questionable policy for reducing inequality.
See page 378
The vicious cycle of discrimination
The minimum wage, just like any ______, creates excess _______ in the market.
Price floor, supply
Part of the excess supply coms from the decrease in quantity of labor demanded.
The other part comes from an increase in the quantity of labor supplied.
A higher minimum wage benefits those unskilled workers who maintain their jobs and are paid more. IT also benefits skilled workers by raising their equilibrium wages.
But that harms those unskilled workers who cannot find work and those who work in the uncovered sector, where wages decrease.
What is the EITC Alternative?
Earned Income Tax Credit, which begun in 1975 and expanded several times. The EITC supplements the incomes of low-income working people, especially those with children.
Economist favor substantially _________ the EITC.
The minim wage applies to any unskilled worker in the covered sector regardless of family income or economic need.
The EITC, by contrast, is only available to low-income households and provides greater benefits to those supporting children.
The costs of the minim wage are spread among households rather haphazardly with no regard to income.
The funds for the EITC come from a progressive federal tax system, making it genuinely redistributive from higher income to lower income households.
The minimum wages is likely to reduce employment, but the EITC...
tends to increase employment.
Surveys of economist show that majorities favor at least some increase in the minimum wage. There are several reasons for this:
1. the employment effects of an increase of minim wage are viewed by some as modest.
2. Another reason is political. Funds expanding the EITC, which would come out of general government revenues, are constrained by federal budget discipline.
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Reload the page to try again!
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together
! Voice Recording
This is a Plus feature
|
How Physics Games Help Learning
Show most children a material science issue and their eyes space out. Yet, in the event that you put material science issues as a PC game, abruptly they’re much seriously fascinating and engaging. If you have a child who’s into PC games, perhaps getting them gone on to physical science games can transform that playing time into learning time. Physical science games aren’t really about physical science, but instead they use physical science in the difficulties that must be addressed during play.
Today there are heaps of material science games promptly accessible online free of charge. They utilize large numbers of similar situations and character types as other PC games, and there’s nothing task like with regards to playing them. On the off chance that the standards of physical science are incorporated into game situations, kids need to utilize them to progress in the games. What’s more, on the off chance that they’re truly into the game, they’ll realize what they need to figure out how to progress. A decent material science game not just tests information on fundamental standards of physical science, yet in addition assists kids with decisive reasoning, methodology, and critical thinking abilities.
Material science games come in pretty much สมัคร ยูฟ่าเบท every kind. There are adjusting games, destruction and development games, and games where articles must be stacked just so. All require coherent reasoning and system to progress to more significant levels. What’s more, these games aren’t only for youngsters. Indeed, even undergrads who need a grip of physical science can acquire some information from figuring out how to progress in physical science games. What’s more, there are a lot of individuals of any age who couldn’t care less with regards to the material science yet play them since they’re entertaining. You can browse experience games, driving games, development games, adjusting games, and some more.
One illustration of a material science games is Light Bot. At the point when you play Light Bot, you control a robot to propel it through the levels. It requires comprehension of the two material science and rationale. The Egg is another material science games. In this game you need to get an egg into a bin by hauling around objects expected to bob, push, and in any case move the egg into the crate. Creature Stackers is a top pick of more youthful children. The item is to stack one creature on top of all the others to make a steady stack that will not tumble down.
Equilibrium Fury is a material science game that assists kids with picking up adjusting. The object of Balance Fury is to drop however many squares as would be prudent onto a stage so as to hold them back from tumbling off. Accumetry is a straightforward game, however it’s useful for fostering an eye for estimations. In this game players utilize mathematical shapes to test the exactness of their eyes without utilizing estimating instruments. A Measure of Treasure is a game where the article is to precisely weigh out pearls and disperse them so that each privateer gets his reasonable portion. AtomAtor places the player in the situation of worker at a proton collecting organization whose work it is to convey protons to a worm opening while at the same time keeping away from dark openings.
Not all PC games are tied in with shooting, slamming vehicles, and exploding things. There are a lot of engaging physical science games that give kids a fun time while guilefully showing them a portion of the basics of physical science.
|
Press Release - World Ocean Day (2021)
Why should we care about the world’s oceans?
“The sea cures all the ailments of man”- Plato
Earth is a habitat to five (5) ocean basins, namely, the Pacific, Atlantic, Indian, Arctic and Antarctic which comprise 70% of the Earth’s surface. Together, these ocean basins provide enormous benefit to humans and all living creatures on earth. The ocean provides more than just seafood (fish, crustaceans, shellfishes), which many of us are made to believe. Have you ever wondered where the oxygen you breathe come from? The ocean produce over half of the world's oxygen and absorbs 50 times more carbon dioxide than the atmosphere. Without this role, our planet would have been oxygen-deprived and far hotter than we are currently experiencing! They regulate our climate and weather by equally distributing the heat from the equator to the poles. Seventy-six percent (76%) of the world’s trade revolves around the ocean, making it an enabler of global commerce. Many medicinal products come from the ocean, including ingredients that help fight cancer, arthritis, Alzheimer's disease, and various heart diseases. Aside these benefits to man, the ocean is home to billions of organisms that inhabit our planet, who look up to us, humans, for their safety and survival.
In fact new ingredients and products are constantly being sought from the ocean to fight many traditional and emerging diseases. Other physical resources found in the oceans include petroleum (crude oil), pearls and minerals such as copper, zinc, nickel, gold, silver and phosphorus. All these resources provide food, source of livelihood and employment, income and source of recreation, to make life more comfortable for man. In terms of recreation, fishing, surfing, boating, and whale watching provide aesthetic values and alternative forms of de-stressing to man. The Oceans economy produces US$282 billion in goods and services and ocean-dependent businesses employing almost a quarter of the world’s population. In Ghana, about 25% of the populace depend on the ocean resources for livelihood and 60% of our animal protein intake is derived from fish. The ocean is s source of salt used in giving taste to all our foods.
Humans have failed in our duty as custodians of this great resource of our planet. Our activities are endangering the ocean, its biodiversity and ecosystem services. These human activities include illegal mining, illegal fishing, illegal dumping of untreated wastes, and chemical and plastic pollution These have led to the negative impacts on the health and ecological integrity of the oceans resulting in a decline, disruption of its functions and in many cases the loss of most life-sustaining services provided by the world’s oceans.
As a teaching and research Department in the University of Ghana, we have been organizing beach clean-up exercises, educational sessions in basic and secondary schools and coastal communities, and seminars to educate the general populace on the importance of oceans to livelihoods of man. We call all to join in this cause. Some of the things we can do include patronizing good fish, support sanitation infrastructure at beaches, avoid purchasing items that exploit marine life, avoid dumping waste around, and educate yourself and others about the importance of the oceans to man. We all owe our planet the responsibility of protecting its natural resources and ecosystems, including our Oceans. Next time you pass by the beach or a coastal community and you see anyone engaging in any of the activities listed above as threats, report them to the necessary Ministries, Departments and Agencies (MDAs) such as the Environmental Protection Agency, Ministry of Fisheries and Aquaculture Development, Ghana Maritime Authority, Ghana Police Service, Ghana Navy, NADMO, and Municipal and District Assemblies
Happy World Oceans Day!
Article Type:
|
A man is employed on a food processing farm where he has to do a lot of manual work. His wife and daughter also help him in his work on the farm every day. Which type of employment is this an example?
B.Seasonal employment
C.Over employment
D.Cyclical employment
Dear Student,
Correct option is A.Underemployment.Because It is a situation in which more workers are working in activity than required. The people who are actually engaged in such an activity appear to be employed, but are not fully employed.Underemployment is a situation when a person is working but isn't working at his full capability.
• 0
What are you looking for?
|
Why did Luther advocate a translation of the Bible into the vernacular?
Why did Luther advocate a translation of the Bible into the vernacular quizlet?
Why did Martin Luther stress the use of vernacular?
which of the following best explains why protestant reformers such as Martin Luther stressed the use of vernacular (non-Latin) languages for religious texts and instruction? they believe that religious teachings should be directly accessible to as wide an audience as possible.
What impact did the translation of the Bible into the vernacular have?
* Translating the Bible into the vernacular had an effect because it allowed people to interpret the Bible for themselves and draw their own conclusions about religious teachings.
IT IS INTERESTING: What does the church say about divorce and remarriage?
When was the Bible translated to vernacular?
Among the books displayed are a Hebrew Bible printed in 1516; the first French Bible from 1535; the Renaissance’s first complete Latin translation of the Bible in 1527; a “Commentary on Psalms,” by John Calvin, from 1557; and the first Bible printed in any vernacular language, Johann Mentelin’s German Bible, printed in …
Who was the early English religious reformer who emphasized a vernacular translation of the Bible?
The Lollards were a group of anti-clerical English Christians who lived between the late 1300s and the early 1500s. The Lollards were followers of John Wycliffe, the Oxford University theologian and Christian Reformer who translated the Bible into vernacular English.
Why were people attracted to Luther’s ideas what circumstances allowed Protestant thought to flourish during this time?
Peasants: Protestant ideas appealed to European peasants because they were attracted to Luther’s ideas that there is no need for wealth in order for salvation. Additionally, they were inspired by the idea of attacking authority, shown by many Protestants in response to Church authority.
Why was it important to Martin Luther that the Bible be written in the vernacular?
The many vernacular Bible translations at this time made it possible for the common people in England, Germany, France, and Switzerland to read or have the Bible read to them in their own language. No longer would the elitist class of priests be the only ones in possession of the truth of the Word of God.
Why was the vernacular reformation important?
The creation of the printing press (using movable type) by Johannes Gutenberg in the 1450s encouraged authors to write in their local vernacular rather than in Greek or Latin classical languages, widening the reading audience and promoting the spread of Renaissance ideas.
IT IS INTERESTING: What does the Bible say about jealousy in relationships?
Why was it so difficult to translate the Bible into the vernacular language?
The Bible is addressed to a huge variety of people and was written for different ‘uses’ e.g. listening, reading etc. This makes the Bible hard to translate since it is very difficult—for some people impossible—to transfer all these features from the Source Languages into the Target Language.
What was the significance of translating the Bible into English in the 1300s?
Who translated Bible from Latin to vernacular for the first time?
William Tyndale, (born c. 1490–94, near Gloucestershire, England—died October 6, 1536, Vilvoorde, near Brussels, Brabant), English biblical translator, humanist, and Protestant martyr.
|
Picket Fence Free Fall Lab
The whole doc is available only for registered users
Order Now
To get the average acceleration, you take the minimum and maximum accelerations and divide by 2. 9.77 + 9.87 = 19.64
19.64/2 = 9.82
In order to find the precision, take the difference between the minimum and maximum accelerations (0.10 m/s^2) and divide that with 9.82 (the average acceleration). After you take that result and multiply by 100. 0.10/9.82= 0.01018
0.01018 X 100 = 1.018 %
On next page.
Preliminary questions:
1.The additional information I need to determine the average speed of the Picket Fence as it moves through the Photogate is the amount of time need to go through it.
2.If an object is moving with constant acceleration, the shape of its velocity vs. time graph is a linear line.
3.The initial velocity of an object does not have anything to do with its acceleration due to gravity. Analysis Questions:
1.The minimum, maximum, and average values for acceleration are in the data table.
2.The shape of the position vs. time graph for free fall would be a parabola because the velocity increases.
3.The shape of the velocity vs. time graph is a linear line. It is not a parabolic shape like that of the position vs. time graph because the acceleration is constant which means a straight line of the velocity vs. time graph.
4.Results in table
5.Percentages in the data tables.
6.The accepted value for g (gravity) is 9.8 m/s/s, and all the calculated accelerations from the first six runs are within.
7.Prediction for acceleration vs. time graph in graphs.
8.The average acceleration is the same with the acceleration vs. time graph because the slopes are 0. Extensions:
1.G (acceleration) is determined in the data charts above.
2.Dropping the picket fence from higher above would change the time, and velocity, but it wont change the acceleration.
3.Throwing the picket fence downward would change the velocity and time, but not the acceleration due to gravity. Throwing the picket fence upward would also change the velocity and time but not the acceleration.
4.Adding air resistance would change the results.
5.The altitude affects the acceleration due to gravity because the closer you are to the center (of earth), there’s more gravity. Gravity decreases with altitude, since greater altitude means greater distance from the Earth’s center. Other factors that cause acceleration to vary is the radius of the earth at different points. Variations in G from sea level to the mountains are very small and can be ignored. Conclusion:
The purpose of the Picket Fence Free Fall Lab was to examine the acceleration of objects as they fall to earth. During free-fall the only force that should be acting upon the object is the earth’s gravitational pull (9.8 m/s/s), therefore the velocity of the object should always equal 9.8 m/s/s. In this lab the picket fence was dropped repeatedly through a photogate connected to Logger Pro, which allowed the fence’s acceleration and velocity to be recorded and graphed.
The results of the experiment confirmed the theory that objects will fall with a constant acceleration equal to g (9.8 m/s/s). During the 6 runs, the picket fence was dropped from the same height and had an average acceleration of 9.82 m/s/s– which is extremely close to the expected value of 9.8 m/s/s. This proves that none of these circumstances had any effect on the acceleration of the fence and that only gravity influenced its fall. The results of this experiment were extremely consistent. The maximum and minimum accelerations only varied 0.10. The percent error between the average acceleration in the six runs and the accepted value for gravity was only 1.018%. Therefore, the data collected was very accurate.
Related Topics
We can write a custom essay
According to Your Specific Requirements
Order an essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well
Sorry, but only registered users have full access
How about getting this access
Your Answer Is Very Helpful For Us
Thank You A Lot!
Emma Taylor
Hi there!
Would you like to get such a paper?
How about getting a customized one?
Can't find What you were Looking for?
Get access to our huge, continuously updated knowledge base
The next update will be in:
14 : 59 : 59
|
Introduction logo bandit: introduction
1 2 3 4 5
It's easy to write python code that has a security risk. Let's look at the code from the video.
import sys
cmd = sys.argv[1]
You can call if from the command line like so:
python "print('hello')"
This program will take the string "print('hello')" and run it. But what if the user is fooled into giving it malicious code? That's a security risk! The issue is that the python program will run anything that it receives.
In this series of videos we'll look at ways to automatically detect code that has a potential security risk by using bandit.
|
Colloidal Silver: How does it work and what are its benefits?
Are you someone who is on the lookout for alternative therapies related to the common health ailments such as cold for a sinus infection? If so, you probably must have heard of colloidal silver is considered as a remedy to treat a lot of health problems. If not, read on to know all about colloidal silver and the different ways in which you can seek the best of health from this product.
What is colloidal silver?
Before the refrigerators existed, a silver coin was dropped as a common practice in a container full of milk which acted as a preservative. Silver has been long known to curb the growth of bacteria, algae and other undesirable organisms.
Silver was also used as a popular remedy in ancient times to keep a check on the spread of different diseases. Until about the 1940s, it was even used as a natural antibiotic which was only stopped after the modern antibiotics were introduced.
In the present date, people are not educated enough about the benefits of colloidal silver. With the advancement in technology, they don’t need to drop silver coins into the water to get desirable results. Adding a few drops of colloidal silver from the bottle brought by you from the store can do the needful:
Water which contains nanometre-sized particles of suspended silver.
The amount of total silver present in the solution can be calculated as milligrams of silver per liter which when numerically translated, would be the same as parts per million.
The amount of silver content is divided into two different forms of silver — silver particles and ionic silver.
To put it out straight for you, colloidal silver is a mineral. To talk about it in-depth, colloidal silver is nothing but a solution of tiny silver particles that are suspended in a liquid base. The particles of silver present in the colloidal silver are so tiny that a normal filtering process will not be able to remove them.
The size of silver particles in colloidal silver may vary but sometimes, insert solutions, the silver particles used are so tiny that they are referred to as nanoparticles. This explains that they are less than 100 nanometers in size and are invisible to the naked eye.
Long before the development of modern antibiotics, colloidal silver was used as an all-purpose medicine to get rid of various infections and treat illnesses. In the late 90s, the US food and drug administration i.e FDA stated that the colloidal silver products were not considered safe or effective. It was said that the Colloidal Silver products which were being promoted for medical purposes, had lots of unproven uses and benefits.
Now, without any appropriate approval from the FDA, these products or ‘new drugs’ are being considered misbranded. Despite the fact that the FDA has not approved these products as prescription drugs or over-the-counter ones which contain silver that can be consumed orally, yet it has been gaining a lot of revival in terms of popularity.
How is colloidal silver being marketed?
Nowadays colloidal silver is being marketed as a sure shot remedy to treat a range of health issues. The products made using this controversial substance are being openly sold as dietary supplements or homeopathic remedies. Certain medical practitioners claim that in the long run, this product can replace antibiotics and/or various other medical therapies that are used to treat bacterial, viral and fungal infections.
Apart from numerous sites on the internet which share illustrious information about colloidal silver and its benefits, there are a lot of brands that sell colloidal silver and have it stocked up in the health food stores and pharmacies. Sadly, there is not much concrete information available about it and there is a conflict of opinions which causes great confusion.
While you are surfing the net to gather more knowledge about the hype that surrounds colloidal silver, you will also come across hundreds of testimonials from the patients who have used it, who claim it as a solution to almost every disease you have never heard about.
Along with that, you will also encounter certain widely renowned health sites which may give out warnings to the potential consumers about the safety concerns while using this medicine. Mostly, such websites make sure to provide a quoted statement made by the FDA in the year 1999 which claimed that there is no scientific evidence to prove the benefits and uses of colloidal silver.
Such kind of texts tend to create tension among the most enthusiastic health freaks who prefer to choose the natural way of staying fit, which makes it all the more important to provide people with real information that is based on evidence so that they can make an informed choice about colloidal silver, its uses, and its benefits.
On the whole, there are three different kinds of products which are being sold in the market by the tag of “colloidal silver” which can be categorized as under:
Ionic silver
The products in which the silver content primarily consists of silver ions are known as ionic silver solutions. Despite the fact that ionic silver is very often sold as colloidal silver, it must be noted that it is not true colloidal silver. Commonly, the ionic products which are sold as colloidal silver do not mention the term “ionic silver” or the percentage of total silver in that product in terms of silver ions vs silver particles in the literature and guidelines.
The manufacturers do not disclose that the product is brought by you is mostly ionic silver – not silver particles. It is the least expensive form of silver solution to produce and hence it makes for the most popular products in this category. Mostly, the ionic silver products only contain about 1% to 20% of the silver content in the form of silver particles with about 80% to 99% in the form of ionic silver. The only drawback with an ionic silver solution is that it will not provide the same benefits that true colloidal silver can.
Silver Protein
The second most popular type of colloidal silver product on the shelves can be made by simply adding silver protein powder to water. Often also known by the name of “mild silver protein”, silver protein is made of large silver particles that are kept suspended by using a protein binder. While there can be a lot of binders that can be out to use for this purpose, casein, gelatin, and soy are the most commonly used binders.
The reason why binders are used to keep the particles suspended in that the particles which are large in size do not stay in suspension independently. Often labeled and sold by being called colloidal silver, silver protein should not be confused with the real thing. This product is much less effective for human bodies and one can not obtain the actual benefits of colloidal silver after consuming this.
True Colloidal Silver
The term true colloidal silver is used to describe a silver colloid wherein the silver content mostly consists of silver nanoparticles vs silver ions. To be termed as true colloidal silver, the concentration of silver in the form of nanoparticles must form the majority of the total silver content (more than 50%).
What is meant by total silver is that it includes silver in both ionic and nanoparticle forms?
The concentration of silver is calculated by using the atomic absorption or atomic emission spectroscopy and is expressed by parts-per-million (PPM). The same unit (PPM) is also a ratio of the mass of silver in relation to the dispersant – which is water.
For instance, 10 PPM of silver implies that there is a total of 10 milligrams of silver content in one-liter water. Hence, this implies that true colloidal silver refers to the percentage of silver in the form of nanoparticles in the dispersant being the majority of the total silver concentration.
Lastly, it must be noted that true silver colloids do not contain any additives or proteins and that the majority of silver consists in the form of nanoparticles.
So how can colloidal silver help me?
Findings suggest that there are two main ways in which colloidal silver can help in expediting the healing process in our body.
a) By the means of Catalytic Oxidation
The oxygen molecules which are naturally present in silver are highly reactive with sulfhydryl (H) groups which are known to surround viruses and bacteria. When these two react, the life-preserving cellular processes which are known as cellular respiration are blocked, which can further be defined as a set of metabolic reactions and processes which occur in the cells of organisms to convert biochemical energy from nutrients into adenosine triphosphate (ATP), and then release waste products.
b) Reaction with Bacterial Cell Membranes
Silver ions can attach to bacteria cell membranes directly and produce the same respiration-blocking effect. What’s more, is that colloidal silver can even bind with DNA. Studies suggest that silver can literally enter DNA and up to 12% of silver has been detected in Pseudomonas aeruginosa.
It is not clear as to how exactly does silver gets bound to our DNA without really destroying the hydrogen bonds holding the lattice together. However, it prevents the DNA from unwinding, which is proven to be an essential step for cellular replication to occur.
Is the consumption of colloidal silver safe?
You may come across warnings wherein you will be warned about the consumption of colloidal silver as unsafe when taken by mouth, injected intravenously ie. by the means of IV or if applied to the skin. They may even claim that the consumption of colloidal silver can lead to a bluish skin discoloration which begins to appear in the gums, which can further stimulate the production of melanin in the skin and the areas which are left exposed to the sun tend to become increasingly discolored.
The condition wherein people turn blue irreversibly is called argyria which is caused by the misuse of the fake silver supplements which are tagged as the true colloidal silver which are actually the unreal products such as ionic silver or silver protein being sold.
Even though the National Centre for Complementary and integrative health states that colloidal silver can possibly cause poor absorption of certain drugs, the information regarding if there are any side effects related to the use of colloidal silver is very limited.
The only thing you should keep in mind is bad colloidal silver is an effective antibacterial agent, so you should be sure to supplement it with probiotics so that a proper balance of microflora is maintained in your system.
The uses and benefits of colloidal silver
It is because colloidal silver has a direct effect on the cellular respiration, it can help our body in numerous ways while also providing various medical uses as well. Listed below are eighth proven healing properties that have been supported by the medical literature and various studies.
Antibacterial and antimicrobial properties
Before the antibiotics was discovered, colloidal silver was used as a popular antibacterial treatment. Studies suggest that colloidal silver’s ability to control the antibiotic-resistant superbugs is brilliant and that it can kill a very large number of bacteria. It is because of these properties that colloidal silver has been popularly used in some healthcare products such as wound dressings, wound creams and medical equipment.
While Larry C. Ford, MD was employed at UCLA Medical School in the 1980s, he documented over 650 different kinds of disease-causing pathogens that were destroyed in minutes when exposed to small amounts of silver.
Unlike its modern prescribed antibiotic counterpart, colloidal silver does not just create immunity or resistance in the organisms that are killed by it. In addition to it, a study published by the Journal of Alternative and Complementary Medicine explained at length about how ionic colloidal silver acts as a broad-spectrum antimicrobial agent against both aerobic and anaerobic bacteria, but its activity was not as pronounced against fungi.
Healing the wounds and keeping a check on the overall skin health
A very large number of studies have researched the use of dressings containing silver to treat skin ulcers and wounds. A lot of them found that the antibacterial properties exerted by the silver particles helped in the treatment of skin grafts, diabetic ulcers, necrotizing fasciitis, bedsores, and various other skin injuries. According to Robert O. Becker, MD, colloidal silver can stimulate the healing of soft tissues and skin.
An article published by the Pharmacognosy Communications in 2012 specifically recommended that some colloidal silver preparations must be considered for topical use to treat periodontitis, thrush, relieve burns and other skin conditions. Tinea Capitis or ringworm can be successfully treated at home with the use of colloidal silver as it potentially has antifungal properties.
Ringworm is caused by a fungus that thrives on the topmost layer of our skin and creates round and scaly patches. It can be easily spread by simple skin contact, by the use of contaminated materials such as clothing and is considered highly contagious.
Apart from that, colloidal silver can also benefit other skin conditions such as Eczema and psoriasis as well. While it can provide relief to the patients, it also gives a soothing effect to the scrapes and also repairs tissue damage caused by burns. In a study by the Journal of Family Medicine and Primary Care, a colloidal silver-based nano gel was put to use to dress superficial pellet gun wounds.
These kinds of silver nanoparticle-based gels can also treat chronic wounds and have been getting a lot of popularity. Historically speaking, silver was topically used on burns, etc. but the usage of the same was stopped right after the antibiotics were introduced, but it gained popularity again in the 1960s. Silver nitrate combined with sodium sulfadiazine is used to create the SSD cream which can help patients who have suffered burns and are recovering from them.
Putting up a generous coating of silver to specialized foam as a part of the wound vacuum system helps in providing antibacterial activity in vitro.
Pink Eye or Ear Infections
The inflamed mucous membrane which covers the eyeball and eyelid lining is called the pink eye. This condition is mainly caused due to a viral or bacterial infection. To treat the pink eye, colloidal silver can be used to gain quick relief from this highly infectious and irritating eye condition. When colloidal silver is applied to the infected eye, the infected cells attracted electromagnetically by the tiny silver colloids and are sent into the bloodstream to be eliminated.
The antibiotic drugs which are prescribed nowadays only act against a specific class of bacteria. What they miss out on is that the ear can be caused by multiple classes of bacteria or even fungus at times. In such a situation, the antibiotics which are prescribed shall be of no use whereas colloidal silver can effectively help eliminate this, regardless of what may be the root cause of infection.
Besides treating eye infections, skin problems, etc., colloidal silver can provide benefits as an antiviral to the people suffering from warts, pneumonia, herpes, HIV/AIDS and shingles. Dr. Martin Hum, from the Institute for Optimum Nutrition, states colloidal silver as one of the natural remedies to stop viruses fast.
How colloidal silver works, in this case, is that it can suffocate the virus and can largely reduce the activity of the HIV virus in patients suffering from AIDS. A lot of hepatitis C patients have also reportedly told anecdotal accounts of the efficacy of colloidal silver.
The colloidal silver is also a fantastic anti-inflammatory remedy! The U.S National Library of Medicine has stated the apparent pro healing and anti-inflammatory properties of nanocrystalline silver-derived solutions. The nanocrystalline silver-derived solutions have shown promising results to treat a lot of anti-inflammatory issues. Researches by scientists have begun to reveal what the people have been anecdotally explaining for years together – the ways in which colloidal silver acts on reducing swelling, speed up the healing process, and gives a boost to the cell recovery.
Helps in relieving sinusitis
If you know someone who has been suffering from chronic sinusitis and has undergone multiple courses of antibiotics, then you must be aware that the antibiotic approach does not do much good. Widely used as a remedy to control sinus infections, colloidal silver can be used as a nasal spray to give relief to the people.
A study published in Frontiers in Microbiology found that if the colloidal silver nasal rinses are used twice daily for about 10 days, it can largely benefit the patients. Sadly, even the oral antibiotics along with saline rinses twice a day do as much good as and when compared to the use of colloidal silver nasal princess twice daily. As we are aware of how the antibiotics have negative implications on our body, it is better if we try to avoid them. A good quality, colloidal silver nasal spray or adding a few drops of liquid colloidal silver to a neti pot are two ways by which you can get the colloidal silver into your system. You may apply it directly into your nasal cavity, let it drain down your throat while tilting your head back.
Researches indicate that there are hundreds of hidden infections caused by pathogens which can for the cause of respiratory inflammation that is associated with common allergies and asthma. The use of colloidal silver destroys the infection-causing germs which can be one of the reasons why the people who suffer from airborne allergies find a dramatic relief from the use of colloidal silver.
Cold and flu
Anecdotes of various people claim that colloidal silver can help in the prevention of various kinds of flu which includes common cold as well as the swine flu.
About a hundred children under the age of 12 years were made to undergo a clinical test in 2011 by NIH.
These children were suffering from nasal congestion and the common cold. They were divided into two groups – the first one was treated with the solution of colloidal silver and beta-glucan while the second one was given a saline solution. Despite the fact that both groups experienced benefits from the treatment, about 90% of the people who were given colloidal silver experienced a complete recovery.
Benefits the patients suffering from pneumonia
While the drugs prescribed nowadays have limited efficacy when it comes to combating problems such as pneumonia and bronchitis, colloidal silver can work wonders regardless of the pathogen. Typically, antibiotics are said to be the first line of defense but when pneumonia is viral they are not of much use.
The best way to make optimum use of colloidal silver to treat bronchitis and pneumonia is to simply breathe it into your lungs. By this method, this remarkable product can directly attack the germs that are residing in your lungs and causing pneumonia or bronchitis. To put it simply, this method is pretty much the same as using a respiratory support system.
It works quickly and does away with me germs in a couple of days. the easiest method to get the colloidal silver into the lungs is by using a nebulizer to get it in your system. Usually, one teaspoon approximately three times a day for about 10 to 15 minutes is enough.
Dosage considerations for colloidal silver
The appropriate dosage of colloidal silver depends on various factors such as the consumer’s health, age, and several other conditions. The most effective way to get the colloidal silver in your lungs is by the means of a nebulizer. While consuming colloidal silver, always bear in mind that natural products too have to be taken in specific dosage only. Generally, one teaspoon about three times a day for approximately 10 to 15 minutes is sufficient.
A word of caution here – make sure to follow the directions of consumption as listed on the product label and make sure to consult your physician or pharmacist or any other healthcare professional before consuming colloidal silver.
No Comments
Post a Comment
|
Unani Medicine: Explanation and prevention of Bad breath/ Halitosis
Do you have bad breath even after brushing twice a day and washing your mouth properly? It could mean that you are missing out on some major oral care routine. Persistent bad breath, Halitosis, can also be a symptom and cause of some dental diseases like tooth decay or gum diseases.
Everyone gets bad breath once in a while after having certain foods like garlic or onion. Dehydration could also lead to Halitosis. Nevertheless, a major reason for bad breath and taste in your mouth could be poor oral hygiene.
However, Halitosis occurs when you still have bad taste and foul-smelling mouth even after a proper oral care routine. If it is not a result of any particular disease or dental condition, usually bad breath can be prevented by simple oral care and home remedies.
How Unani medicine explains Bad breath?
Unani medicine considers the direct causes of bad breath and its connection to your mental state and overall health.
Halitosis (Bakhrul Fam) is primarily caused by food particles remaining in the mouth after eating, digestive issues, and lack of oral hygiene. In addition, dental diseases like tooth decay, cavities, periodontitis, and gingivitis can also lead to bad breath.
According to Unani, untreated dental problems are the main cause of bad breath. The bad smell can also be from the infections in your teeth and its root due to the spread of bacteria in your mouth.
Unani Treatment for Halitosis
As Unani medicine prioritizes the right kind of living, its treatment also consists of a holistic approach.
The first thing to treat Bad breath would be diagnosing the condition and figuring out the actual cause of the disease. For example, if you suffer from Halitosis because of poor oral hygiene, you can cure it with a proper dental care routine. And if it is because of some dental diseases, then removing or treating the condition can get rid of bad breath.
The medications in Unani are made out of plants, so they are natural and have low or no side effects to the patient. It is also very effective and treats your condition quickly.
Regimen Therapy
Regimen therapy aims at cleansing or purifying your stomach if the problem is with digestion. Also, you are required to follow a very strict and hygienic oral care routine.
Dietary Regulations
You are advised to avoid meat, dairy, sweets, and other carbohydrate-rich foods and drinks that potentially cause bad breath.
Unani Medicine recommends a healthy and hygienic oral care routine, a nutritious diet, and avoiding smoking and alcohol consumption.
The 4 best ways to whiten your teeth with simple home remedies
More and more people want whiter teeth these days. However, it is totally normal to want whitened teeth;…
|
(Shutterstock illustration)
Microaggression Versus Dog Whistle
How to identify and address hurtful speech at work
Back Article Nov 10, 2021 By Vida Thomas
This story is part of our November 2021 issue. To subscribe, click here.
The term microaggressions comes up frequently for lawyers investigating discrimination and harassment complaints. This has been the case especially since the racial reckoning and racial justice movement sparked by the murder of George Floyd in 2020. Because many of these race-based harassment complaints, which create hostile work environments, include allegations of microaggressions, employers must understand what microaggressions are and how they differ from — but can be just as harmful as — intentional misconduct motivated by an employee’s identity or status.
Microaggressions: Unintended but Painful
Most commonly, a microaggression involves unintentional conduct that is an external expression of an internal bias. Although microaggressions often involve indignities that can seem minor, they target people based on their marginalized-group membership. Whether couched as a compliment (such as telling a Black person “You’re so articulate!” or telling a transgender individual “You don’t look transgender”) or as simple curiosity (such as asking an Asian American person “Where are you from?”), these comments and behaviors tend to “otherize” the person targeted.
Over time, these “minor” slights have a painful cumulative effect. They put the target in an untenable position: either point out the behavior and risk being labeled “hypersensitive,” or ignore the behavior, making it more likely that it will occur again.
Dog Whistles: Verbal Camouflage
Dog whistles, by contrast, are intentional. The speaker intends to convey a racist, sexist or otherwise discriminatory message, but does so by couching the message in innocuous language to avoid alienating the listener. For example, terms such as “urban” or “inner cities” historically have been used as coded language to refer to the African American community. Similarly, terms such as “globalist” or “cosmopolitan” historically have been used as coded words for Jewish people.
A dog whistle and a microaggression share some similarities, particularly in how they may go unnoticed by those lacking the proper context. The crucial difference, however, is in their intent. While a microaggression tends to be the unintentional result of unconscious biases and assumptions, a dog whistle is a kind of “coded message” that plays to a specific audience while avoiding detection by the population at large.
How to Tell the Difference
Distinguishing between microaggressions and dog whistles can be difficult. The key is to look for evidence of whether the speaker knowingly made a statement that the speaker knew was racist, sexist, antisemitic or homophobic. What was the context of the statement or behavior? Were several problematic comments made to the same person? Did the comments have a common racial, gender-based or otherwise problematic pattern or theme? If so, this may be evidence that the comments were not innocent. Would the comment or behavior be considered offensive by a reasonable person? An employer or manager cannot simply rely on personal understanding of whether the behavior was, for example, racially coded. Fortunately, outside organizations can be helpful resources. Here are a few.
While these resources are not exhaustive, they can provide some information as to whether a referenced stereotype is common enough that the person invoking it would reasonably be aware of its ableist, racist, antisemitic or homophobic nature. A dog whistle should be met with the employer disciplining the employee, while the employer should educate the staff through training in the instance of a microaggression being used.
As employees continue to seek equity and fairness in the workplace, issues of diversity and inclusion will continue to dominate the conversation. Attracting and retaining diverse talent requires learning to spot and address unintended and intentional transgressions that can make the workplace uncomfortable for employees from marginalized communities.
Vida Thomas is a Sacramento-based partner with Oppenheimer Investigations Group. She has 25 years of labor and employment law experience and has handled more than 200 workplace investigations. Vida may be reached at vida@oiglaw.com.
Post new comment
Recommended For You
|
Presidential term limits need to go
Jonathan Zimmerman, a history professor at New York University, says it well.
Let’s repeal the 22nd Amendment to the U.S. Constitution, which limits presidents to two consecutive terms.
He wants to allow presidents to serve as long as the public can stand them.
His Washington Post essay lays out the case quite well. As one who opposes congressional term limits, I understand where Professor Zimmerman is coming from. Term limits already exist, in the form of elections.
Only one president ever has been elected more than twice consecutively: Franklin D. Roosevelt won a third term in 1940. He was elected to a fourth term in 1944, but died shortly after taking the oath in early 1945. His cousin Teddy was the first president to seek a third term. He served two terms consecutively after becoming president in 1901, after President William McKinley was murdered. He was elected in his own right in 1904, then walked away in 1909. He sought the presidency in 1912 as the Bull Moose candidate, but the office went to Woodrow Wilson.
Zimmerman takes note of President Obama’s low poll standing. It’s highly unlikely, at this moment at least, that he would be elected to a third term if he had the chance. Indeed, most presidents burn out after two terms. President Reagan lamented late in his second term that he would have liked the chance to run again. President Clinton said much the same thing near the end of his presidency.
The 22nd Amendment was enacted in 1947 by a Republican-controlled Congress to head off what some feared would be an imperial presidency. They didn’t like that FDR served seemingly forever. But he was the voters’ choice — four elections in a row!
As Zimmerman notes, even the Father of Our Country, George Washington, disliked the idea of term limits. “I can see no propriety in precluding ourselves from the service of any man who, in some great emergency, shall be deemed universally most capable of serving the public,” Washington wrote to Marquis de Lafayette, according to Zimmerman.
Let these people serve until the voters say otherwise.
|
What is Economy
12 books on economics everyone should read
"Why are some countries rich and others poor", Daron Acemoglu, James Robinson
A book about the success stories of nations
Freakonomics, Stephen Levitt, Stephen Dubner
The main economic popular science bestseller
Team type of economy
The command economic system is also called "centralized". This economy was another foundation of communist philosophy.
Centralized power controls a significant part of the economic system, that is, most of the management decisions are made by the central government (for example, as was the case in the USSR).
Market type of economy
This type is considered a free market economy, where firms and households act in their own interests. Thus, it is determined: how to allocate resources, what goods to produce and who buys them. This type of economy is the opposite of a command economy (when the central government makes a profit).
In this type of economy, there is a separation of government and market. In theory, there is no government intervention in a pure market economy. However, this is not the case, there is no truly absolutely free market economy in the world.
Mixed economy
Economics is
Economics is a fairly broad concept of economic management that should be viewed in several different ways. Each of them allows you to separately understand the essence of each function of the economy.
Economy levels
"Long-term economic growth can be influenced by many factors, but technological progress remains the only unlimited source, an all-powerful lever for the growth of global income and wealth. In this book, economic historian Joel Mokir asks a number of questions. Where does new knowledge and innovation come from?
Why were ancient civilizations so successful in geometry and philosophy, were able to come up with the most complex Antikythera mechanism, but at the same time were so indifferent to the use of this knowledge in the economy and economy?
Conversely, why did medieval Europe, often viewed by us as the Dark Ages, so willingly introduced water and windmills, a three-field farming system, a heavy plow, and other agricultural innovations?
This book contains both an excursion into the thousand-year history of technology and innovation, and an attempt to answer the question of what is necessary for sustainable technological progress and economic growth. "
Economy as an economy
The economy as an economy is a management system that provides society with benefits of a different nature; includes branches of material production (industry, transport, etc.) and non-material sphere (culture, education, etc.).
By clicking on the button, you agree to the terms of personal data
Privacy policy
By leaving data on the site, you agree to the Privacy and Information Protection Policy.
Data protection
The administration of the site (hereinafter referred to as the Site) may not transfer or disclose information provided by the user (hereinafter referred to as "the User") when registering and using the functions of the site to third parties, except as described by the law of the country in which the user operates.
Obtaining personal information
For communication on the site, the user is required to enter some personal information. In order to verify the data provided, the site reserves the right to request proof of identity online or offline.
Use of personal information
The site uses the User's personal information for services and to improve the quality of the services provided. Some personal information may be provided to the bank or payment system if the provision of this information is due to the transfer of funds to the payment system, the services that the User wishes to use. The Site makes every effort to maintain the security of the User's personal data. Personal information may be disclosed in the cases described by law or when the administration considers that these actions are necessary to comply with the legal procedure, court order or legal process necessary for the User to work with the Site. In other cases, in no case, the information that the User transmits to the Site will not be disclosed to third parties.
After the User has left the data, he receives a message confirming the successful registration. The user has the right not to receive newsletters at any time using the appropriate service on the Site.
The site may contain links to other sites. The site is not responsible for the content, quality and security policies of these sites. This privacy statement only applies to information posted directly on the site.
The site ensures the security of the user's account against unauthorized access.
Notifications of change
The site reserves the right to make changes to the Privacy Policy without prior notice. The innovations enter into force upon their publication. Users can track changes to the Privacy Policy themselves.
Terms of use
1. General provisions of the User Agreement
1.1. In this document and in the resulting or related relations of the parties, the following terms and definitions are used:
a) Platform - software and hardware integrated with the administration site;
b) The User is a capable person who has acceded to this Agreement in his own interest or acting in the name and on behalf of the legal person he represents.
c) Administration site / Site - Internet sites hosted in the ________.ru domain and its subdomains.
d) Service - a set of services and a license provided to the user using the platform.
e) Agreement - this agreement with all additions and modifications.
Turnkey solution for your business
Package of documents for the site
Documents for popular models of Internet services. Limitation of liability and guarantee of fiscal cleanliness.
Read the solution
1.2. Your use of the Service in any way and in any form within the stated functionality, including:
viewing the materials posted on the Site;
registration and / or authorization on the site,
posting or posting on the Site any materials, including, but not limited to, such as: texts, hypertext links, images, audio and video files, information and / or other information,
create an agreement on the terms of this agreement in accordance with the provisions of Articles 437 and 438 of the Civil Code of the Russian Federation.
1.3. By using any of the above options for using the Service, you confirm that:
a) Read the full terms of this Agreement before using the Service.
b) You fully agree to the terms of this Agreement without exception and restrictions on your part and agree to abide by or discontinue using the Service. If you do not agree to the terms of this agreement or do not have the right to enter into an agreement based on them, you should immediately discontinue any use of the Service.
c) The Agreement (including any of its parts) may be amended by the Administration without special notice. The new version of the Agreement enters into force as soon as it is posted on the administration website or made known to the User in another convenient form, unless the new edition of the Agreement provides otherwise.
It is important to know! In order to give legal effect to the waiver included in the text of the agreement with the user, it is necessary to confirm that the user has read and accepted its terms. For this, the mechanism for concluding contracts provided by law is used.
2. Conditions of use under the Agreement
2.1. The use of the functionality of the Service is allowed only after the User has passed the registration and authorization on the Site in accordance with the procedure established by the Administration.
2.2. The technical, organizational and commercial conditions for the use of the Service, including its functionality, are made known to Users by posting them separately on the Site or by notifying Users.
Turnkey solution for your business
Terms of use
Define the terms of free use of the site
Read the solution
2.3. The username and password selected by the User are necessary and sufficient information for the User to access the Site. The user does not have the right to transfer the login data and password to third parties, bears full responsibility for their security, independently choosing the method of storing them.
3. License to use the Site and acceptable use of the Service
This section describes the permitted use of the Site and the Service provided thereunder. The free license prevents the application of the Law on the protection of consumer rights if a natural person is on the side of the user.
4. User guarantees under the agreement
The section contains warranties and assurances from the user regarding compliance with the requirements of the law and the User Agreement when using the Site and the Service based on it. These provisions are necessary, in particular, for the subsequent imposition of liability on the user for violating the law or the rights of third parties in connection with the publication of illegal materials on the website.
5. License to use user-generated content
When organizing a social service or platform for users to post various materials in the public domain, it is necessary to enter into a license agreement with each user for the use of his materials in such an internet service. For example, the user's permission to use their photo and it may be necessary to publish it on the pages of other users, etc.
In addition, obtaining a license confirms that the content is used with the permission of the user, who is responsible for the authority to issue such a license. General provisions of the User Agreement
b) The user is a capable person
We use cookies to provide the best site experience.
Ok, don't show again
|
The Divine Comedy
Try it Now Firm without compromise. Cancel whenever you want.
"The Divine Comedy" is one of Dante Alighieri’s poetic masterpieces which was written in the early 14th century. It consists of three parts, Inferno, Purgatorio and Paradiso, and it depicts an imaginative journey through Hell, Purgatory and Paradise, which can be analyzed at a deeper level presenting the soul’s journey from rejection to redemption. The poem examines questions of justice, punishment, sin and virtue. As it depicts the eternal duality of a human’s soul, it represents as well not only the medieval, but also the contemporary world.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.