text
stringlengths
144
682k
Blood Wedding Blood Wedding Study Guide Welcome to the LitCharts study guide on Federico García Lorca's Blood Wedding. Created by the original team behind SparkNotes, LitCharts are the world's best literature guides. Brief Biography of Federico García Lorca García Lorca’s father was a successful farmer married to a teacher. Together they raised four children, of which Federico García Lorca was the eldest. When the author was ten years old, the family moved to Granada, where García Lorca enrolled in a Catholic school as well as a secular institute run by the Roman Catholic Church. Later, García Lorca attended the University of Granada, where it took him nine years to earn a degree on account of his unimpressive schoolwork. An impassioned pianist, he traded music for writing when he was a young man, eventually befriending several artists, including filmmaker Luis Buñuel and painter Salvador Dalí. In 1919 he wrote his first play, The Butterfly’s Evil Spell, which was composed in verse. Unfortunately, it was largely made fun of by critics and thus only ran for four shows. In the 1920s García Lorca became associated with Spain’s avant-garde scene, publishing both poetry and plays, including Gypsy Ballads, his most popular poetry collection, which came out in 1928 and is largely about life in Andalusia—a theme he explored throughout his career. After a brief stint in New York City in 1929, the author returned to Spain during Primo de Rivera’s dictatorial rule, at which point he began touring as an actor and director of a theater troupe that brought plays to rural communities throughout the country. It was during this period that he penned three plays now known as the “rural trilogy,” which includes Blood Wedding, Yerma, and The House of Bernarda Alba. As he presented these plays, he became known for his socialist beliefs. Because of the Spanish government’s fascist government at the time, though, he was arrested in 1936 on the same day that his brother-in-law was assassinated after having accepted the position of mayor in Grenada. It is said that García Lorca himself was assassinated for political reasons the following day, though some people uphold that there were other factors that contributed to his execution. Get the entire Blood Wedding LitChart as a printable PDF. Blood wedding.pdf.medium Historical Context of Blood Wedding Although Blood Wedding presents itself as a work of realism, it becomes progressively symbolic as the play goes on. This is likely due to the influence on García Lorca’s work of Symbolism, which emerged in the early twentieth century. Symbolism was largely a reaction to Naturalism, which had dominated literature and the theater throughout the last decades of the nineteenth century, when playwrights like Anton Chekhov and Henrik Ibsen wrote many texts that examined the effect of the external world on humans. Under Symbolism, though, artists began exploring more abstract and figurative methods of depicting the human experience. What’s more, the turn of the century also brought Cubism, Expressionism, Dadaism, and—eventually—Surrealism. García Lorca was undoubtedly affected by all of these movements, especially because he became close friends with the surrealist painter Salvador Dalí and a number of other artists who were experimenting with how to present perspective and subjectivity in the arts. Given these influences, it’s unsurprising that the most climactic scenes in Blood Wedding draw upon highly symbolic and surreal techniques, with characters appearing onstage to represent the moon and death. In this sense, Blood Wedding is a combination of Naturalism and other more expressive literary techniques, as the play blends realist elements with abstraction and figuration. Other Books Related to Blood Wedding Blood Wedding is the first play in what’s commonly referred to as Federico García Lorca’s “rural trilogy.” As such, it’s helpful to consider this text alongside the other two works, Yerma and The House of Bernarda Alba. In Yerma, García Lorca explores the pressure women felt in the early twentieth century in rural Spanish communities to have children, ultimately examining themes of passion and inheritance, both of which also factor into Blood Wedding. Furthermore, The House of Bernarda Alba resembles elements of Blood Wedding because it looks at the effect of tragedy on a family, as the titular character forces her daughters to continue mourning her husband’s death. Also, given that Blood Wedding is a play about feuding families and forbidden love, there is a clear parallel between it and Shakespeare’s Romeo and Juliet, which is perhaps the most famous work about revenge and clandestine affairs. Key Facts about Blood Wedding • Full Title: Blood Wedding • When Written: 1932 • When Published: First staged in 1933 • Literary Period: Modernism • Genre: Drama, rural tragedy • Setting: Andalusia, Spain • Climax: Moments after Leonardo and the Bride slink away in the dark woods, an old beggar woman who represents death appears and screams twice, turning her back to the audience and opening her ragged coat like “a great bird with huge wings.” • Antagonist: Violence and the characters’ obsession with revenge. Extra Credit for Blood Wedding Trouble Onstage. Because it was rather uncommon for a play to switch between prose and verse, the original cast of Blood Wedding found it challenging to deliver their lines in the way García Lorca intended. Unfortunately, this was exacerbated by the fact that several of the actors weren’t particularly talented to begin with, making it even harder for them to convincingly speak lines in verse. Dictatorship. After García Lorca’s assassination—which took place in the first year of the Spanish Civil War—his plays weren’t staged in Spain for twenty years, a time during which the fascist regime that murdered him strictly controlled the country.
Free admission (all visitors, all hours) Exhibitions include: Mathenaeum: A seven-­‐sided, columned geometric sculpture studio with stations that allow you to transform basic shapes into original designs. A 3-D printer will build your design before your very eyes. Feedback Fractals: Get behind —and in front of— a camera to use effects to create unique, beautiful and ever-changing fractals. Tracks of Galileo: Build downhill tracks with different curves and discover how to speed things up. Hyper Hyperboloid: Sit on a swivel chair inside a chamber walled by vertical cords. Spin and watch as the straight cords come together to form a curved surface that surrounds you. Math Square: Walk into an ever-changing display screen floor that detects your feet. You might be inside a maze, a game, a pattern or a simulation. You steps affect the action below! Harmony of the Spheres: Touch connected glowing spheres to make and see music. Explore major chords, minor chords and harmonies. Watch the patterns of colored lights as the music moves through space. 3-D Doodle: Turn 2-D doodles into 3-D images by stacking them the right way in the 3-D display. Tile Factory: Create a unique tile that will fit together perfectly to cover any flat surface with no gaps or overlaps. Then watch as the MoMath laser cutter creates a real set of tiles in the shape you designed to take home. Tessellation Station: Apply geometric magnetic tiles to MoMath’s largest metallic wall and unleash your creativity to make an endless variety of patterns and designs. For more exhibition descriptions, visit
Can dumping toxic waste violate human rights? In 1995, a group of mostly African countries turned to the United Nations Commission on Human Rights here to address how to stem the huge flow of dangerous substances to their continent. The commission agreed to look into whether dumping toxic products and wastes threatened the basic rights of life and good health. The idea was that an investigator would find evidence of unlawful dumping and produce an annual list of wrongdoers. But that was not what the investigator, Fatma-Zohra Ksentini of Algeria, was able to do, given her limited resources and little cooperation from developed countries or corporations. Only 18 of the 185 members of the United Nations replied to her requests for information; most were nonindustrial countries. She made some site visits, but had to rely mainly on information from United Nations bodies and nongovernmental groups. The United States did not give her any information. The United States' position is that such issues marginalize the significance of human rights, said Craig Kuehl, an American official who monitors the commission. ''The question of illicit movement and dumping of toxic products and waste is a serious problem,'' he said, ''but the Commission on Human Rights is not the correct international forum.'' There is no doubt in Mrs. Ksentini's mind that dumping is a human rights violation. She said information she gathered shows ''serious violations of the right to life and health'' that in some cases ''had led to sickness, disorders, physical or mental disabilty and even death.'' Her report was a bit embarrassing: She named the United States, Germany, Australia, Britain and the Netherlands as the biggest toxic-waste exporters, and said masses of toxic waste are still being sent to Africa, while the bulk of European waste goes to the Baltic countries and to Eastern and Central Europe. Half of the United States exports went to Latin America; British exports go largely to Asia. Continue reading the main story Despite her lack of progress, developing countries are seeking to extend Mrs. Ksentini's mandate for three years. American officials have already prepared a recommendation limiting her to one more year. A vote on the extension is scheduled for next week. Continue reading the main story
Private school past english papers Cultural materialism essay, Aqa combined science gcse foundation past papers; Engineering university essay Posted on Aug 06, 2018 by in science, foundation, gcse, past, aqa, combined, papers in some places changed the order based on atomic weights. AQA gcse grade 9-1, combined Science, trilogy chemistry and double check your exam table from school, college or academy. Download Paper, download Mark Scheme, paper 6 Combined Science Trilogy: Physics - Higher. Gcse Combined Science: Trilogy looks like this: AQA gcse in Combined Science: Trilogy 8464F (for students taking the Foundation Tier exams) or, aQA gcse in Combined Science: Trilogy 8464H (for students taking the Higher Tier exams). Below you will find the legacy gcse Biology, Chemistry and Physics AQA papers as well as the specimen papers for the new combined Science and Triple award Science gcse's. You should have experienced the safe and careful use of liquids. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required. Revision summary help for the 9-1 AQA gcse chemistry 1st Exam Paper 1 - learning objectives, aQA gcse (Grade 9-1) chemistry 8462 Paper 1 Chemistry 1 1F 1H papers - AQA (Grade 9-1) gcse chemistry Topic 1 "Atomic structure and the periodic table Topic. General introduction to nanoscience and commonly used terms explained Revision Notes Nanochemistry - an introduction and potential applications Revision Notes Uses of Nanoparticles of titanium(IV) oxide, fat and silver Revision Notes Topic 3 Quantitative chemistry (AQA gcse Chemistry 1, paper 1, Topic 3 "Quantitative chemistry. The stronger the forces between the particles the higher the melting point and boiling point of the substance. Download Paper, download Mark Scheme, paper 2 Combined Science Trilogy: Biology - Higher. You should be able to: explain why a mixture is used as the electrolyte explain why the positive electrode must be continually replaced The electrolysis of molten aluminium oxide - extraction of aluminium from bauxite ore Revision Notes Introduction to Metal Extraction Revision Notes Electrolysis. The reactions of metals with water and acids are limited to room temperature and do not include reactions with steam. Chemistry Paper 1 : Thursday 16th May 2019 (am) (1h15m). Covalent bonding and giant structures and their properties and uses Revision Notes Quiz on the Structure, Properties how to write a good diary entry english creative and Chemical Bonding of Materials Word-fill quiz "The structure and uses of different forms of carbon".2.7 Properties of metals and alloys (AQA gcse Chemistry 1, paper. Introduction to Chemical Bonding Revision Notes Ionic bonding and ionic compounds and their properties Revision Notes Quiz on the Structure, Properties and Chemical Bonding of Materials.1.4 Covalent bonding (AQA gcse Chemistry 1, paper 1, Topic 2 "Bonding, structure and the properties of matter Know. Almost all of the mass of an atom is in the nucleus. You should be able to compare nano dimensions to typical dimensions of atoms and molecules. At Fallibroome, the exact course followed is from the AQA exam board: AQA gcse Combined Science: Trilogy (8464). At the positive electrode (anode oxygen is produced unless the solution contains halide ions when the halogen is produced. Students have three Science teachers, one each for the biology, chemistry and physics thirds of the course, and they have 10 lessons of Science per fortnight on their timetables. Calculating relative formula/molecular mass (Mr) of a compound or element molecule Revision Notes More reacting mass ratio calculations of reactants and products from equations (NOT using moles) Type in answer quiz on relative formula mass Multiple Choice quiz on relative formula mass.1.3 Mass changes. This means metals can be bent and shaped. You should be able to describe the nature of the compounds formed when chlorine, bromine and iodine react with metals and non-metals. Coarse particles (PM10) have diameters between 1 x 10-5 m and.5 x 10-6. The sharing of delocalised electrons gives rise to strong metallic bonds. It may also mean that smaller quantities are needed to be effective than for materials with normal particle sizes. Cant submit essay blackboard down Aqa combined science gcse foundation past papers Reaction yield definition and theoretical yield calculations. Some covalently bonded substances have all blues essay very large molecules. The reactant that is completely used up is called the limiting reactant because it limits the amount of products. Combined Science, you should be able to recognise common substances that consist of small molecules from their chemical formula. Religion vs superstition essay Aqa combined science gcse foundation past papers Aluminium forms at the negative electrode cathode and oxygen at the positive electrode anode. Recognise and use expressions in decimal form use ratios. Particle models of gases, in an endothermic reaction 1 or showing two electrons in the lowest energy level. The layers of atoms are able to slide over each other. States of Matter particle theory gas. State changes Revision Notes analysis Multiple choice quiz on States of Matter gases. For example, the energy needed to break existing bonds is greater than the energy released from forming english new bonds. You should be able to calculate the relative atomic mass of an element given the percentage abundance of its isotopes. The different sizes of atoms in an alloy distort the layers in the structure, making it more difficult for them to slide over each other, so alloys are harder than pure metals.You should be able to: predict products from given reactants use the formulae of common ions to deduce the formulae of salts.Paused   You're listening to a sample of the Audible audio edition. Leave your comment Leave your comment
 Star micronics sp742me paper: Durability of paper Homeworks maine. Paper mill 's wiki: A paper mill is a factory devoted to making Scarves made with paper. Durability of paper! The nickle paper in washington By Kamnox on Jul 20, 2018 techniques for painting. This sheet which had now become a stencil was placed on a blank sheet of paper, and ink rolled over it so that the ink oozed through the holes, creating a duplicate on the second sheet. This emulsion commonly used Turkey-Red Oil (Sulfated Castor Oil) which gives it a distinctive and heavy scent. Mimeograph machines continue to be used in developing countries because it is a simple, cheap, and robust technology. 15 Limitations edit Unlike spirit duplicators (where the only ink available is depleted from the master image mimeograph technology works by forcing a replenishable supply of ink through the stencil master. Obliterine" was a popular paper brand of correction fluid in Australia and the United Kingdom.) 14 Stencils were also made with a thermal process; an infrared method similar to that used by early photocopiers. The process was commercialized 3 4 and Zuccato applied for a patent in 1895 having stencils prepared by typewriting. They were also commonly used for low-budget amateur publishing, including club newsletters and church bulletins. This is called "cutting a stencil." 12 A variety of specialized styluses were used on the stencil to render lettering, illustrations, or other artistic features by hand against a textured plastic backing plate. Mimeograph: Operation Maintenance and Repair. The mimeograph became popular because it was much cheaper than traditional print - there was neither typesetting nor skilled labor involved. The stencil would gradually stretch, starting near the top where the mechanical forces were greatest, causing a characteristic "mid-line sag" in the textual lines of the copies, that would progress until the stencil failed completely. Many mimeographs can be hand-cranked, requiring no electricity. For the EP by Old 97's, see. Early flatbed machines used a kind of squeegee. Over time, the term became generic and is now an example of a genericized trademark. If further copies are desired at this point, another stencil must be made. Another device, called an electrostencil machine, sometimes was used to make mimeo stencils from a typed or printed original. During the declining years of the mimeograph, some people made stencils with early computers and dot-matrix impact printers. It is currently listed as a dead entry, but shows the.B. This was spot color for mastheads. 10 Roneograph also "Roneo machine was another trademark used for mimeograph machines, the name being a contraction of Rotary Neostyle.) Cyclostyle edit Main article: Cyclostyle (copier) In 1891, David Gestetner patented his Automatic Cyclostyle. Contents, origins edit, use of stencils is an ancient art, butthrough chemistry, papers, and pressestechniques advanced rapidly in the late nineteenth century: Papyrograph edit, a description of the Papyrograph method of duplication was published by David Owen: 2, a major beneficiary of the invention. In the late 1960s, mimeographs, spirit duplicators, and hectographs began to be gradually displaced by photocopying. Typically the stencil deteriorates gradually, producing a characteristic degraded image quality until the stencil tears, abruptly ending the print run. Colors could not be mixed. Dick Company of Chicago as the owner of the name. The stencil material consists of a very thin polymer film laminated to a long-fibre non-woven tissue. Text from electrostencils had lower resolution than that from typed stencils, although the process was good for reproducing illustrations. This invention provided for more automated, faster reproductions since the pages were produced and moved by rollers instead of pressing one single sheet at a time. In the US Patent Office 7 The word mimeograph was first used by Albert Blake Dick 8 when he licensed Edisonapos. Often 857 durability for Autographic Printing on August. Easiertouse photocopying and offset printing have replaced mimeography almost entirely in developed countries. G Mimeographed copies have moderate durability when acidfree paper is durability used. Rawlings is a sports equipment manufacturing company based in Town and Country, Missouri and founded in 1887.The parent company has been Newell Brands since 2016.Rawlings specializes in baseball equipment, but also manufactures softball, basketball, training equipment and American footballs. Durability of paper, Nps thesis topics Strength, which passed back and forth under inked rollers. They were especially popular with science fiction elsevier copyright dissertation fans. In a precursor to ascii art. This flexible waxed or coated sheet is backed by a sheet of stiff card stock. As well as crepe paper for decorating. In practice, most lowcost mimeo stencils gradually wear out over the course of producing several hundred copies. Sometimes mixed with bleached and mechanical pulp. Away-from-Home products: Also known as Commercial Industrial Tissue, these are the products that serve markets such as hospitals, restaurants, businesses, institutions, and janitorial supply firms.In theory, the mimeography process could be continued indefinitely, especially if a durable stencil master were used (e.g.Later this became an immersion-coated long-fibre paper, with the coating being a plasticized nitrocellulose. Name * Email * USA-Printables: US History, coloring Pages - Famous US People The primary preservation challenge is the low-quality paper often used, which would yellow and degrade due to residual acid in the treated pulp from which the paper was made.Originally used for removal of creams, oil, and so on, from the skin, it is now used in large volume for packaged facial tissue, toilet paper, paper napkins, professional towels, industrial wipes, and for hospital items.Zuccatos system involved writing on a sheet of varnished paper with caustic ink, which ate through the varnish and paper fibers, leaving holes where the writing had been."a "b "d "e "g etc.) would fall away during continued printing, causing ink-filled letters in the copies.
Shapes Splat In this learning game, students identify shapes by shooting the shape that matches the given word. There are four games that students can practice. Students can identify basic shapes, shapes with rotation, more shapes, or three dimensional shapes. After selecting the category to be played, students can choose to play at their own pace or against the clock. As you match the correct word with the correct shape, watch the points soar. Courtesy of Knovation
The term "vehicle refueling vapors" refers to the vapors displaced from the vehicle fuel tank during refueling. Storage tank evaporative vapors, on the other hand, are vapors that are created as gasoline undergoes a change from liquid phase to vapor phase. This change must occur to re-establish an equilibrium vapor concentration in the space above the liquid in fixed roof storage tanks (USTs or ASTs). The vapor space concentration is driven below natural levels by the ingestion of lean vapors or air into the storage tank during vehicle refueling. If the natural equilibrium vapor concentration is momentarily reduced, liquid gasoline will evaporate until the equilibrium concentration level is re-attained. One gallon of liquid gasoline will expand to approximately 520 gallons of vapor at 40 percent hydrocarbon concentration. Therefore, storage tank pressure will increase rapidly as relatively small amounts of liquid evaporate. This increased pressure can result in vapor emissions from pressure/vacuum relief valves or through any leaks in the vapor piping. What goes in must come out Any refueling scenario, with or without ORVR or Stage II systems, which introduces lean vapors or air into gasoline storage tanks will result in the creation of evaporative vapors, as discussed above. The subsequent emission of the evaporative vapors compromises the overall efficiency of whatever vapor recovery systems are used. The four possible refueling scenarios are as follows: • No ORVR and no Stage II (uncontrolled stations). In this scenario, refueling will contribute to significant liquid evaporation as atmospheric air is ingested into the storage tank via the vapor vent or breaches in the vapor piping. The air will enter at a volume equivalent to the volume of liquid dispensed, and upon re-equilibration, this air will generate significant emissions. • Stage II only (no ORVR). In this scenario, atmospheric air and hydrocarbon vapors enter the storage tank when gasoline is pumped to the automobile. Some typical vacuum-assisted systems obtain high collection efficiencies at the expense of introducing excess air into storage tanks. For example, if 10 gallons of liquid gasoline are pumped to an automobile, the vapor volume returned to the storage tanks may range from 11 to 25 gallons. This excess air/vapor volume will quickly increase storage tank pressure. • ORVR only (No Stage II). While the ORVR system may capture the refueling vapors as designed, atmospheric air will enter the storage tank as described in the first scenario above (uncontrolled stations). • ORVR and Stage II. As the ORVR system captures vapors displaced from the automobile fuel tank, the storage tanks will be back-filled with atmospheric air. Where vacuum-assisted Stage II systems are employed, the storage tanks will be backfilled with atmospheric air at a volume greater than the volume of liquid dispensed. In these cases, the combination of excess gaseous volume and extremely low hydrocarbon concentration will result in rapid storage tank pressurization and subsequent emissions. These emissions come through either the vent pipes (vent emissions) or leaks in the vapor piping (fugitive emissions). If the vacuum-assisted systems are disabled during refueling of ORVR-equipped vehicles, the resulting storage tank evaporative losses will be equivalent to those generated at uncontrolled dispensing facilities. This must be the case, since the air ingestion volume will be equal to the volume of liquid dispensed. If balance Stage II systems are used, the storage tank evaporative losses will be equivalent to those generated at uncontrolled stations. This, again, is because the air ingestion volume will equal the volume of liquid dispensed. In summary, no matter what the scenario, the space vacated by pumping gasoline out of the storage tank is replaced by air or hydrocarbons that are equivalent at least to the volume of liquid displaced. In some cases involving Stage II systems and ORVR, the volume of air ingested is greater than the volume of liquid displaced. Membranes article continued
From Emulation General Wiki Jump to navigation Jump to search A field-programmable gate array (FPGA) is a type of microchip that can reconfigure itself after it has been manufactured, hence "field-programmable". The technology has found use in emulation as it can reimplement the hardware without having to resort to any kind of binary translation to a computer platform's native code. Instead of adhering to an instruction set or a programming language, FPGA chips are instead programmed using a hardware descriptor language (HDL) that describes the components and logic needed to run the software. This programming isn't permanent; corrections and other changes can be made afterwards so that it isn't limited to one application like an ASIC. Despite what one may think, FPGAs are not a new technology; they've been around for as long as Macintoshes have been, with manufacturer Altera being the first to introduce an FPGA to the market in 1984. While they already had use in aftermarket cartridges (like setting up mappers for ROMs like the SD2SNES does), using them in place of entire consoles was considered esoteric until commercial devices using FPGAs were released in the mid to late 2010s. List of aftermarket reimplementations[edit] Product Manufacturer Reimplements MSRP Super Nt Analogue Super Nintendo Entertainment System $189 Nt Mini Analogue Nintendo Entertainment System $449/$499 MegaSG Analogue Sega Genesis $189 AVS retroUSB Nintendo Entertainment System $185
Adbhuta Rāmāyaṇa One of the two great epics of India, the Rāmāyaṇa of Vālmīki, has been the basic text for the story of Rāma. It has been the primary source of inspiration over the millennia, for many a poet who has retold the story in his own way, often adopting it to the philosophy of his life. One such work is the Adbhuta Rāmāyaṇa (‘the Wonder that is Rāmāyaṇa’). Though attributed to Vālmīki, it is obviously a late work. Scholars are divided about its being earlier or later to another, more well-known work, the Adhyātma Rāmāyaṇa (A. D. 1400). The glorification of Kālī and identifying her with Sītā induce us to think that the work must have been written at a time when reconciling the Rāma cult of the Vaiṣṇavas and the Śākta cults had become a social necessity. Also, the words in the colophon as seen from a printed text—‘iti ārṣe śrīmad-rāmāyaṇe vālmīkīye ādikāvye adbhutottarakāṇḍe...’—give rise to the suspicion that the writer might have attemp-ted to pass it off as an appendix to the Uttarakāṇḍa of Vālmīki’s Rāmāyaṇa. The Adbhuta Ramayaṇa is a compa-ratively smaller work of 1355 verses spread over 27 sargas or chapters. Unlike the other Rāmāyaṇas it is not divided into kāṇḍas or books. The contents of the work may be summarized briefly as follows: The sage Bhāradvāja approaches the great sage Vālmīki and requests him to give the secret teaching that is hidden in his original Rāmāyaṇa which is rather voluminous. Vālmīki replies that the real secret is that Rāma is the Highest Brahman and Sītā, the Highest Prakṛti, the power of Brahman. Then he goes on to narrate the reasons for the descent of Rāma (sargas 2 to 4) and Sītā (s. 5 to 7), which were apparently due to the curses of the sages Nārada and Parvata, but really to destroy the wicked and protect the good. This is followed by the story of the birth of Sītā as the daughter of Rāvaṇa, but abandoned by his wife Maṇḍodarī, and found by Janaka, the king of Mithilā, in his field. After this, the events move at a terrific speed: Rāma’s marriage, Paraśurāma’s humiliation at the hands of Rāma (s. 9), Rāma’s entering the forest along with Sītā and Lakṣmaṇa (The entire episode of the Ayodhyākāṇḍa of Vālmīki’s Rāmāyaṇa leading to Rāma’s banishment is glossed over here!), Sītā’s abduction by Rāvaṇa and Rāma striking friendship with Sugrīva and Hanumān (s.10). In answer to the simple question that Hanumān asks, ‘Who are you?’ (s.10) Rāma waxes eloquently to describe himself as the Ātman, Parameśvara, Māyāvī and Antaryāmin (s. 11 and 12). Most of the ideas and even the words are reminiscent of the Bhagavadgītā, and some of the Upaniṣads. This is followed by a short discourse on bhakti or devotion (s. 13) and a curious mixture of a variety of philosophical and mythological topics (s. 14). The next chapter contains a beautiful hymn of Hanumān on Rāma (s. 15). The sixteenth sarga disposes off very briefly (in 20 verses) the entire story of the Yuddhakāṇḍa. In the seventeenth, Sītā reveals the existence of a thousand-headed Rāvaṇa, the elder brother of the ten-headed demon, and describes him as she had heard from a brāhmaṇa in her younger days. Hearing this, Rāma starts on an invasion of the Puṣkara Dvīpa, the abode of the thousand-headed monster, in order to destroy him. In the terrific war that ensues, Rāma falls down unconscious (s. 18 to 22). Seeing this tragedy that had overtaken Rāma and his forces, Sītā assumes the terrible form of Kālī and destroys the demon along with all his forces. She is helped in this by her innumerable emanations (s. 23). Rāma wakes up and is surprised to see Kālī there (s. 24). He praises her with a long hymn containing 1008 names (s. 25). Though called Sītā-sahasranāma (‘thousand names of Sītā’) almost all the names belong to the Śakti cult. Sītā dissolves the form of Kālī and reappears in her original form. After thus gaining victory, Rāma returns to Ayodhyā and resumes his rule (s. 26 and 27). Though this work might have served a specific purpose during the days of its composition and later, it fails to come up to the level of the Adhyātma Rāmāyaṇa and the Ānanda Rāmāyaṇa.
Melissa Laird National Institute of Dramatic Art Australia Thinking through Practice: Enhancing ‘maker-cultures’ through material culture research and creative-arts-based pedagogy Practice-oriented approaches to learning and teaching in higher education have a unique capacity to provide students with distinctive, authentic and generative learning opportunities. This paper demonstrates how ‘thinking through practice’, promotes students’ curiosity and empathy by engaging with artisanal work, whilst cultivating the higher order critical and flexible thinking skills they require for productive engagements in the creative and performing arts. Demonstrated through a unique community of creative practice, the paper provides insight into the embodied ‘thinking’ and creative ‘practice’ which lies at the core of the pedagogy and the inherent student learning experiences provided at the National Institute of Dramatic Art (NIDA), Sydney Australia. Educational theorist Robyn Tudor (2005) notes: “Creativity is a dynamic cultural mechanism that supports human life and learning in an uncertain world” (p.20). Situating the artisan-maker at the core of learning, the paper examines ‘thinking-making’ through ‘education-crafting’. Using pedagogy that places the artisan-maker at the fore, the paper outlines NIDA’s approach to material culture and creative arts pedagogies through its Sensate Studio (Master of Fine Arts Common Subject); a learning framework which uses ‘lived experience’ learning (Kolb 2015) and experimental creative practice to examine the six senses through practice-oriented research, cognitive biology and cultural theory. As Robyn Tudor (2005) notes; “creative modes of learning deal not so much with 'what is' but with 'what-might-be' using rhetorical questions such as 'What if?' and 'Why not?'” (p.9). Maker-culture is reinforced in the Sensate Studio by arts-based learning strategies in which embodied practice, skills acquisition and knowledge are developed by ‘doing ‘ and ‘becoming’ (Dewey 1934). Artefact narratives and object biographies are created as responses to sensual stimulation. Designed and crafted by students, artefacts are then analysed revealing their multiple meanings, through make, manufacture, drawing, surface, texture, materiality, colour, gesture and form. Cultural theorist Celeste Olalquiaga (1999) states that, “…objects bear the imprint of the hands that gave them birth” (p. 17). Material culture research methodologies are used to underpin artefact analysis; aesthetic and artisanal qualities which connect artefacts to the time and place of their origin, make and use, and are deeply connected through their economic histories, to notions of maker identity and reputation (Laird 2013). By thinking though their practice in the Sensate Studio students develop a shared language which connects their discipline expertise with that of their industry-peers, and in doing so, prepares students for professional engagements as ‘makers’ and cultural leaders of the future. “Key educational elements for students in arts-based training are those relating to the intersection of academic knowledge and professional discipline-focused knowledge, underpinned by interdisciplinary collaboration, and engagement with creativity and the senses” (Ramburuth and Laird 2017). The paper is underpinned by arts-based education and cultural theory, ranging from Dewey's (1934) philosophies of practical activity, Merleau-Ponty’s (1960) refutation of the mind-body dichotomy, Schon’s (1983) reflective practice and learning by doing, Martin Heidegger’s (1962) emotional and creative ‘being-in-the-world’ (p.195), and O’Loughlin’s (1997) embodiment as a foundation for a creative-arts-based education. Evidence of artefacts and filmic outcomes are provided in the presentation.
Guidelines for Incorporating Native Language Into the Classroom The Alaska Natives were born with tongue to use our own language. When the missionaries came into our part of the world they did not know we had our own communications with our maker, but they had to teach simple English words so we can communicate with them when they came to give us baptism and confirmation. Include English names in our region. (This was in late 1800's.) This helped our people to speak little English with the prospectors and trappers who came into our area. English became the first language when our Athabascan people started going to school and missions popped up in a few places in the Interior. My generation was ninety percent English. The Athabascan language will be second instead of the first unless we adopt a resolution in the state of Alaska to teach our Native language in all our schools in Alaska. Resolution to include: The state should adopt a bill that could include Native language to the education system and be taught by Native teachers. It should be our Native constitutional right to enforce such a bill. A teacher should encourage their students and themselves to learn Native language. There are simple Native words that can be taught such as animal names, clothing names, food items, Native songs and short stories. Native words should be taught at kindergarten. Have Elders who are familiar with Native language help the teachers to teach simple words. Create workshops on Native language and invite the parents to participate. Create video games to help teach Native language. Create general Native words for public to understand. Author: Robert M Charlie
__________________ ____________________   René Descartes René Descartes was born on March 31, 1596 in La Haye, Touraine. He was the son of a minor nobleman, and belonged to an intellectual family. His mother died of tuberculosis a few days after he was born. He inherited the disease from her, and was continually sick throughout his infancy. The only one who cared for him was his nurse, who gave him warmth and nourishment from her body.(Durant pg.456 ,Philosophy) He eventually came back to life, and perhaps that is why he was named Rene, which means Renatus, His early education began at the Jesuit school of La Fleche in Anjou. Roman Catholicism was a strong influence in his life. Upon graduating from school, he studied law at the University of Poitiers, graduating in 1616. However, he never practiced law, and in 1618 he entered the army of Prince Maurice of Nassau at Breda in the Netherlands. His intention was t have a military career. Here he had a vision that encouraged him to focuses on a life of learning, education and intellect. Descartes served in a few armies, but his attention quickly turned to mathematics and philosophy, to which he devoted the rest of his life. Descartes lived in France for four years where he studied philosophy and optics, and returned back to the Netherlands. It was during his first year back in the Netherlands that he wrote his first major work, Essais Philosophiques. The work contained four parts: an essay on geometry, one on optics, a third on meteors, and a fourth titled Discors de la Methode, which described his philosophical speculations. His other works include Meditations on First Philosophy 1641, and The Principles of Philosophy 1644, which was dedicated to Princess Elizabeth Stuart of Bohemia., with whom Descartes had formed a deep friendship. (Durant pg.456 Philosophy) In 1649 Descartes was invited to the court of Queen Christina of Sweden in Stockholm, to join an elite circle of intellectuals which would instruct the queen in philosophy. Descartes died on February 1, 1650 of pneumonia, which was caused by the rigors of the Northern Swedish climate, and the rigorous schedule demanded by the queen.(Durant pg. 398 Descartes has been labeled the father of modern philosophy.(Barrett pg. 53) He is classified as a dualist because he claimed that the world consisted of two sorts of basic substance- matter and spirit. Matter is the physical universe, which our bodies are part of . Spirit is the human mind, which interacts with the body, but can, in principle, exist without it. Descartes theories were called and refered to as Occasionalism. Descartes believed matter could be understood through certain concepts that he borrowed from geometry and his theories of motion. Descartes invented the Cartesian Coordinate System, and analytic geometry both of which are the fore ground for more complex physics and math. In Descartes view, the whole world, including it's laws and even the truths of mathematics, was created by God. He believed that everything functioned according to God. Descartes thought of God as resembling the mind in that both God and the mind think but have no physical being. But he believed God is unlike the mind in that God is infinite and does not depend on his existence from some other creator. This problem of whether mental entities are different in nature from physical entities continues to be a primary concern of philosophers and phycologists. (Bell pg. 51) In Meditations on First Philosophy, Descartes first considered the strongest reasons that might be used to show that he could never be certain of anything. These so called "skeptical" arguments included the idea that perhaps he might be dreaming, so that nothing he seemed to perceive would be real. In another argument, Descartes reflected that perhaps God or some evil spirit was constantly tricking his mind, causing him to believe what was false. Descartes responded to these arguments by saying that even if he were dreaming, or constantly deceived, he could at least be certain that he had thoughts, and therefore existed as a thinking being. This, he wrote, was a "clear and distinct" perception of the mind. Nothing could make him doubt it. From this Descartes created the famous Latin phrase "cogito ergo sum", which means "I think therefore I am". Descartes then argued that he could also clearly and distinctly perceive that an infinitely powerful and good God exists. This God would not let Descartes be deceived. According to Descartes, one cannot be certain of one's reasoning unless one is certain good exists. To Descartes this is why the physical world existed. Descartes also believed that self evident truths could not be found through the senses, they were innate. This is called rationalism. Rationalism, as stated by Webster, is the formation of opinions by relying upon reason alone. (Randall pg.45) In Descartes Discours on Method, I found two particularly interesting quotes. The first one was; "For to be possessed of a vigorous mind is not enough; the prime requisite is rightly to apply it". (Descartes Discours on Method pg.2) This makes perfect sense to me. Just to be smart is not enough, you must constantly be using your knowledge, and always striving to gain more. If people state that they're knowledgeable Descartes would responded by saying; "O.K., prove it." This quote showed Descartes in a more realistic, human-like picture. The second quote in Descartes Discours on Method is: the reasoning of each individual with reference to the affairs in which he is personally interested, and the issues of which must presently punish him if he has judged amiss, than those conducted by a man of letters in his study, regarding speculative matters that are of no practical moment, and followed by no consequences to himself.( Barrett pg.14) One thing this quote tells me is that you learn more by doing and experiencing then just by being lectured or reading out of a book, especially if it is something you are interested in. I also feel that this quote means that you should study things that are practical and have relevance to you. Of course there are things we all must study, but why should an arts major have to sit through a class of chemistry. For one to have great knowledge there must be a strong desire of relevance to that knowledge. Before his time, philosophy had been dominated by the method of Scholasticism, which was entirely based on comparing and contrasting the views of recognized intellectuals. Rejecting this method, Descartes stated, "In our search for the direct road to truth, we should busy ourselves with no object about which we cannot attain a certitude equal to that of the demonstration of arithmetic and geometry." (Bell pg. 67) Clear connections can be drawn between the philosophies of Descartes and Socrates. Descartes clearly follows the Socratic tradition. Both believe that our senses are not good indicators of truth and reason. They lie to us, and conceal the truth. Our senses cannot confirm empirical data. Descartes believed that just by thinking we are confirming what our senses tell us. Socrates and Descartes both believed that we should find our truths and reasons in other things. Descartes believed we could find them in geometry and math, not our senses. Just by thinking we are attaining the highest knowledge possible. Quotes: Search by Author
March: Book One – A review of color, style and storytelling The tone of March: Book One, the graphic novel of the first part of Congressman John Lewis’ life and role in the Civil Rights Movement,  was primarily depicted through the way the design of the pages, the location of the words, and the stylistic decisions made throughout. These stylistic traits really crafted the experience and feeling s of the story while reading. First, the whole book was in black and white, immediately highlighting the differences and separation between the whites and black in society at the time. The fact that there was frame around the whole story and that John Lewis was telling the whole story from first person but to an audience drew you in as though you were those little boys in the office talking with the congressman as well. This frame also ties the novel inseparably to the speaker, Congressman John Lewis, and his life story. The imagery in the book was dramatic with dark shadows further darkening the black and white on the pages. For example, on page 93, when they are describing one of the sit ins, the whole page illustration while they are all sitting at the bar and there is just one word “klik” resounding throughout the day. The anticipation builds as you take in the whole scene. In this frame, you see a lot of black filling the page, which is interesting because it contrasts what the environment would likely literally look like. Instead, the diner is likely brightly lit, the darkness highlights the tension, the insecurity, and the fear that is present in the room. You also see fear and determination on the characters faces who are participating in the sit in. In the background, you see the white people who are angry, standing with crossed-arms and formed almost as a wall, a resounding force in the frame as well. Contrasting that, when the congressman is talking in his office with the boys, there is a lot more white on the pages and a lot more humor throughout the language. In fact, this is the only place where humor pears in the novel throughout. It is presented through the naiveté of the small boys with the questions that highlight how far the society has come since the Civil Rights Movement. What is also apparent, is the aging that John Lewis has gone through. The book of course, only covers the first part of his life and his entrance and rise in the Civil Rights Movement, so the distance in time is even more apparent. While John Lewis is more than willing to share his story with the children and mother, he also appears very strained while telling the story, very exhausted. This shows how his work in the Civil Rights Movement has worn on him, it has become a part of who he is, it is apparent in his outward physique. Why Congressman John Lewis chose to present his autobiography in a graphic novel is an interesting thought. I didn’t do research to find his official answer on this, because I wanted to first consider what benefits he could take advantage of. First thought that comes to mind is the idea that this format stands out amongst other biographies, however, I do not feel this is enough of a reason to publish in this format. Maybe, the main advantage is this style makes the feeling, the experience, and the tone all very experiential. Like discussed above, you feel drawn in to the scene, you see the emotions, the colors (or lack thereof) tell you what the scene felt like instead of depicting what it actually looked like. This is very difficult to accomplish through words on a page, especially in a typical auto-biography which can be very dry and lack that same descriptive ability. One other note, I wanted to mention, I read the book on both the iPad and in a hard copy and I feel that that the intensity of the imagery came through substantially more dramatically in the hard cover version. Part of it was due to the tactile aspect of holding the pages, but the main effect was the intensity of the illustrations was more impactful. The back lit screen of the iPad removed the darkness from some of the scenes.  And the technology added a layer of detachment from the time period being described. Overall, I thought the choice to write in a graphic novel was very effective and the stylistic choices made throughout only added to the experience of reading. The fact that this is only book one, and the story cuts off somewhat abruptly, builds anticipation for the next book. However, this also left you with a sense of lack of closure. On the other hand, this could have been intentional, as Civil Rights is still an issue in many parts of our society. The work is not done. The story is not over. The Digital Dilemma –Key Findings and Reflection Table 1.1 Significant Discoveries Tech Savvy? (1-5) Assumption on opinion of smartphones Generally Positive Response to Technology? Not Just for Profit I loved hearing Steve Butcher from Brown Paper Tickets talk this past Saturday. The whole concept of “Not just for profit” is simple yet revolutionary. I was astounded to hear about his road trips across the country to theaters and small locations where he simply offers his assistance with a show or repairs and then eventually will talk to them about Brown Paper Tickets, but only if it feels right. I read recently about a dentist who offered free dental services to patients without insurance from 7 AM to 7 PM. He called it the Dental Hope 2014 event. He brought on sufficient staff and was able to serve over 40 patients in those 12 hours. The press kept asking, why are you doing this, no really, why? The answer was simple: To give back.  I believe organizations of all sizes and industries could benefit from this type of mentality. Everyone has one day they can donate to a cause. There is always room in the budget to make a positive impact on people’s lives. At first, it feels daunting to shut down an office for a day and go out to make a difference, but in the end, you can afford it. We get so wrapped up in our day-to-day tasks, our deadlines and our scheduled meetings that we lose sight of what impact we can really have. Think of all the appointments Justin Coke, founder and CEO of 7to7 Dental, gave up that day to offer free appointments to patients without insurance, then think of the number of appointments he was actually able to fit in that had a huge impact on those people’s lives. I would say the benefit far outweighs the costs. I hope I will be able to keep this in mind when I run a company some day. I also want to emphasize this type of mentality at my current workplace. This is about more than the giving tree at Christmas or the food bank at Thanksgiving, this is about looking for what you can do every day to make sure you are leaving the world better than you found it. It is about going the extra mile for the customer because they are relying on you to find the answer to their question. It is about helping out a co-worker with something outside of work. It is about taking a day for the company to serve the community and stop worrying about the meetings or emails coming in. I really enjoyed Steve Butcher’s mentality and hope to keep this inspiration with me as I move throughout my life and career. Givers and Takers Give and Take has been a very interesting read. While I believe I am definitely on the far side of the Giver spectrum, I was uncomfortable with the villainous descriptions of the Takers. There are people who are self-serving, who will do anything to get to the top, who take all the credit and who believe that they are better than other people, but no one is arguing (except maybe those people) that is an effective way to do business. How many companies do we see fall into scandal while being led by a leader that fits this description? Also, I believe there is something to be said for the incredible and invincible self-confidence it takes to create a company and believe it will be industry changing. This type of genius and bullishness may not be appealing, but it is still incredible and impactful. This is reminiscent of the fine line between genius and insanity. Overall, I found the analysis of the success of Givers in various situations interesting, but limited because it appears that every study proves his point, and when it doesn’t prove his point, he stretches the scope of perspective to the point where he is supported. I also felt there were too many case studies or scientific experiments mentioned. One or two per concept is sufficient rather than three. The book may have been more efficient to cut out 100 pages, however, perhaps this is a side-effect of being a Giver – you just want to credit everyone and give them their time to shine. I did enjoy considering what type of person I am and the type of people I work with. I was able to better understand the behaviors of some of my co-workers with this added information. For example, it becomes evident how ineffective taking a Matcher approach can be in the workplace, maybe even less effective than the Taker in the long- and short-run. I took the quiz on the Give and Take website to see if I am accurate in my assumption of how I fall within the spectrum (at least based on how I see myself!). It turns out that I am mostly on the giver side but I also have matcher and taker tendencies. Give and Take Leading Through Change I have been thinking a lot about leading through change, especially about how, even though I am not a leader by title, I can still be a leader by example. My work is currently going through some changes. They are all good and I am excited to see where they take us. But they are hard, because change is hard, on everyone. Even something as simple as rearranging the furniture and changing desks can trigger something in people that makes them forget why they come to work every day. The other interesting piece is talking with customers as they adjust to changes in their relationship with the company. We recently made two major announcements, one that had a generally positive effect on people, even though they felt it was negative, and a second which either positively affected a member or had a significant negative affect on them. Ultimately, both changes were necessary for our company to maintain sustainability and be able to offer even greater benefit down the road. But change is hard, especially when it comes in the form of less dollars in a pocket. Part of my job is to assist my CEO with answering the barrage of questions he gets when announcements are made. I write in his voice, he approves, edits and the messages are sent to our members. Suddenly, I am acting the leader and am leading through change. This is what I have learned from assisting my CEO in this way. • Start with empathy and understanding. • Provide them an avenue to express their concerns. • Let the team know you are listening to what they have to say. • Give reply to their concerns with heartfelt sincerity and as much transparency as is possible. • Make changes to your change when necessary and where possible. • Reassure them by providing extra resources to aid in their understanding of why the change is necessary. • And finally, you will not be able to please everyone. You will lose members of your customer base, you may lose members of your team. • Keep your sights on the vision and what is best for the company. Do not allow the negative to bring you down or second guess your capability. Reading John Maeda’s book and then reading the articles and learning about the vote of no confidence and talking in class, brought a lot of this into perspective. It is hard to say if he was a success or not at his school, despite the number one ranking. Ultimately, we do the best we can through change and with each failure we must pick ourselves up, see what we’ve learned and try again. A good leader will get it right most of the time. “The Scared is scared” the Scared is scared from Bianca Giaever on Vimeo. This is not art for art’s sake anymore Photo: The art of Frank Wright Icarus: The art of Frank Wright Andy Fife is the Director of Shunpike and an Independent Consultant for Art Strategy and Innovation according to his LinkedIn profile. From reading the title alone, you may not fully understand the philosophical depth of Fife’s work and the impact he has made through successful integration of this philosophy. I was able to hear Fife talk on Saturday at the University of Washington and was thrilled to gain a deeper understanding of his perspective on art and strategy as well as learn more about what his title really means. From my understanding, Fife believes that the integration of art is intrinsic and absolutely necessary for a project’s ultimate success. Without it we will miss something valuable. In his philosophy “art is the how not just the why.” This means we use the culture we already have around us to inform our decisions on business, health care, or transportation. We need to do this because people are making art every day in their homes, in their work, in their communities. It is on a small scale, not an opera house or a theatre, but in parlors, offices and public parks. With this in mind, Fife believes “we can create something together and you do not have to have all the answers in order to create something beautiful.” The art is part of the process and the process illuminates the culture and the decisions that must be made. Fife’s talk paralleled the thoughts within Seth Godin’s The Icarus Deception. Godin proposes the idea that everyone is an artist and that it is our responsibility to ourselves as well as our society to break free from the comfort zone we have been taught in order to create art. This art isn’t something that hangs on the wall, Godin clarifies, it is something that stretches us beyond where we currently stand in order to impact an audience we are trying to reach. Ignore the crowds, Godin says, the crowds are always wrong. Fife’s work is along these lines. He is creating his art by weaving art into questions generally unassociated with art. It is not art for art’s sake, it is art for a reason. Godin’s art has purpose too. Godin specifies, if your art is not connecting with your audience, you have failed. If you have created art and it is never published, you have failed. For both, art is for change. And for both, art is within every person. There is no scarcity of art in our communities. We just need to harness it and make an impact!
Hashing values in SQL Server • SQL Server can hash values using some of the common hashing algorithms like MD or SHA. • It is possible to use XQuery in addition to XPath in XML value() function to do things T-SQL cannot do on its own. The Details Hash values or (hash codes) is what we typically use to store_passwords in databases. We use salt values too. Definitely, we don’t store clear text passwords. Right? Typically during a login to an application, a password is combined with a salt value stored somewhere in a database and a hash value is calculated which is then compared with the hash value previously stored in a database. But there are other options. It is possible to calculate hash values directly in a database using T-SQL. It could be useful if a bulk update needs to be performed if you want to generate a lot of test users with predefined passwords during a database migration, but it is also possible to overwrite a password hash and gain access to the application as any user. SQL Server (starting with 2008) has hashbytes function which can be used to calculate hashes using a number of different algorithms. The algorithms supported differ from version to version. The latest 2017 supports MD2, MD4, MD5, SHA, SHA1, SHA2_256, SHA2_512. Let’s have a look at how to use it declare @password nvarchar(32) = 'Secret1234' select 'MD5' Algorithm, hashbytes('md5', @password) Hash union all select 'SHA' ,hashbytes('sha', @password) union all select 'SHA2_256' ,hashbytes('sha2_256', @password) which produces something like this Hashing results You can see that the results are of varbinary type. That’s OK if your application is storing the hash in this format, but from my experiance, most developers will not know that a byte array can be stored in a database and they will convert it into a Base64 string. SQL Server does not do Base64 encoding (not as far as I know) but it does support XML and XQuery, and they do encoding. So let’s use it. declare @password nvarchar(32) = 'Secret1234' select Algorithm ,convert(xml, N'').value(' xs:base64Binary(xs:hexBinary(sql:column("Hash")))', 'varchar(max)' ) Base64Hash from ( ) t Here I’m converting an empty string N'' to an XML type which creates an empty XML object which allows me to use it’s value() method to execute XQuery which is a functional language. In most examples of XML in SQL Server the only thing you will see is XPath in value() but XQuery can be used too. The results are more what you’d expect: Hashes to Base64 One thing to note. The hashing algorithms operator on bytes so are not only case sensitive but type sensitive too. declare @password nvarchar(32) = 'Secret1234' 'varchar' Type ,hashbytes('md5', convert(varchar(32), @password)) Hash union all select ,hashbytes('md5', convert(nvarchar(32), @password)) Have a look at the results. Only because type used is different, the hash is different too. Hash values using different types If you want to make it work with .Net make sure to use nvarchar as in .Net strings are Unicode. How can it be useful? • It is possible to push hash calculation and comparison to database which means the correct hash and salt value are never loaded to the application memory. • It is possible to generate hashes for test users in database seeding scripts avoiding application doing row by row processing. • It is possible to generate hashes of objects to detect changes (although the checksum function can good enough and faster too). • It is possible to use XQuery to do things T-SQL cannot do. But it brings some risk too * It is possible to gain access to an account by updating values in a database even when using hashing with salt. Performance of JSON in SQL Server Have you heard claims that in SQL Server the new JSON data support performs 10 times better than the old XML storage? And all that despite using nvarchar type for storage instead of the specialised xml type. Claims like this one on blogs.msdn.microsoft.com. I used to do a lot of XML in SQL Server and now I use JSON too so I decided to check how they compare when it comes to performance in SQL Server (2017). Setting the Scene XML Data Type has been supported by SQL Server since version 2005. It was implemented as a new built-in data type. It is possible to define a column as an XML type with, or without schema and then query the non-relational data together with relational data. It came with for xml clause and three main methods: modify, query and value defined on the XML type. Let’s see an example of retrieving a value of a node from an XML variable: declare @xml xml = N'<Test>123</Test>'; select @xml.value(N'(//Test/text())[1]', N'int'); JSON support was introduced in SQL Server 2016. That’s right, JSON support but not a JSON type. The data is stored as plain text, something that was possible before of course, but there is for json clause and 4 methods: isjson, json_modify, json_query and json_value. An example of retrieving value from a JSON document can look something like this: declare @json nvarchar(max) = N'{ "Test": "123" }'; select json_value(@json, '$.Test'); It would be difficult to compare performance of every single usecase so I have decided to focus on comparing single value retrieval from a document using .value and json_value for XML and JSON respectively. Sample XML document <row key="ValueA" value="123" /> <row key="ValueB" value="-432" /> <row key="ValueZ" value="849" /> Sample JSON document "ValueA": "123", "ValueB": "-432", "ValueZ": 849" I have tables created where there are only two columns, an integer primary key Id and a Data column of the test type. The tables are populated with 100,000 random records. The test consists of simply calculating a sum of a specific property from the document across all the rows in the table. To put things in perspective I will compare performance on the document types to aggregate on an int and an varchar type columns. Test XML query select sum( [Data].value('(//test/row[@key="ValueA"]/@value)[1]', 'int') from dbo.XmlData Test JSON query select sum( convert(int, json_value([Data], '$.ValueA')) from dbo.JsonData There are no indexes or computed columns to help with the performance of the queries as the objective is to simply measure performance of parsing and document querying. First Comparison Results Json in SQL Server Performance Comparison That can’t be right!? Can it? JSON query took on average of 0.43 seconds which is 36 times faster than the 16.79 seconds it took to sum the values out of the XML documents. Better (or worse) still when compared to an XML with schema which took 40.47 seconds the JSON type seems to be 94 times faster. So what happened to the 10 times faster claim? Well, the native VARCHAR column performed 10 times faster at 0.04 seconds than the JSON one. the INT column was still faster at 0.03 seconds. It is also worth looking at the logical reads. Native INT and VARCHAR columns required just over 200 logical reads while both JSON and schema-less XML took around 12,000 logical reads, while the XML with schema required over 34,000. Playing with storage types The above were rather unexpected results. Both in terms of CPU and the logical reads. And that got me thinking, what if I could reduce the number of reads? The simplest way to do so would be to reduce the size of data by changing the types. I have created additional tables with the exact copy of the JSON test records but using VARCHAR(max), NVARCHAR(512) and VARCHAR(512) types in addition to the standard (as in most common in all the examples I have seen) NVARCHAR(max). Performance of JSON data with different storage types Another surprise! As expected using VARCHAR instead of unicode NVARCHAR halved the number of logical reads but that didn’t translate to improved CPU times. Using json_value on VARCHAR(MAX) was significantly (and consistently) worse than the same method on NVARCHAR(MAX). Specific maximum length types performed better than the the types with the max length but there too unicode required less CPU time despite having twice as many page reads. At the beginning or at the end So is it really possible that the old XML type is 36 times worse than on-the-fly JSON parsing? Perhaps there are some benefits to XML storage? I’d imagine the JSON parser is clever enough to stop parsing after the first matching node is found which probably means that the performance will depend on weather we are looking for a value of a property close to the beginning or close to the end of the document? And, perhaps, that’s where XML will perform better being pre-parsed type? I have modified the tests to look at the first and last values from the documents. Performance depending on value position in a document Here the results were more as expected. When using json_value on a NVARCHAR(max) data ValueZ being at the end of the document structure performed worse than ValueA which is at the beginning. In fact ValueZ queries took 10 times longer than ValueA. XML still has shown differences but ValueZ queries took only 30% longer than the ValueA ones. Still worst case JSON query was 4 times faster than the best case XML query! So that shows that JSON on unicode types uses less CPU time but requires more logical reads which suggests more pressure on RAM and potentially more I/O. How does the storage requirements of all those types compare? Data storage comparison XML with Schema is the most expensive in terms of storage, by quite some margin. Despite being visually more verbose the XML type actually takes slightly less disk space than the unicode json which is twice as much as non-unicode json. As one would expect the standard INT columns require least. JSON data in SQL Server 2017 really is faster than the old XML type. How much faster will depend on the position of the specific value in the document. That’s important, the structure and ordering of properties in the document matters. If you are in control of the JSON document structure consider putting properties more likely to be queried at the beginning of the document and those you know you will index at the end so that you don’t have to parse through them when working with properties which are not indexed. Types matter too. NVARCHAR is faster than VARCHAR but will use twice logical reads (and therefor RAM). Specific lengths perform better than using (max).
Psychological Projection Why do we believe in conspiracy theories? According to research, one reason is the so-called ‘psychological projection’. ‘Psychological projection’ is a phenomenon where someone denies their attitude or traits and assumes instead that others are doing so. They see their negative qualities in others, even when the negative characteristics are not present in the others being accused. In the case of the flat-Earth concept, flat-Earthers would create various ad-hoc hypotheses to explain away the problems and save the flat-earth theory from being falsified; without even bothering to bring real evidence to the table. When a weakness is found in the new ad-hoc hypotheses, they will invent other ad-hoc hypotheses to explain it away. And so on, until these chains of ad-hoc hypotheses eventually reach conspiracy theories. At the end of the day, to save the flat-earth theory from being falsified, at some point, they will have no choice but to accuse others of being part of a conspiracy. Some of us are more easily affected by these conspiracy theories invented by unscrupulous flat-Earthers. But, this might be only a result of the ‘psychological projection’. Maybe —just maybe— we accuse the scientists working for NASA being involved in a big conspiracy only because we would have done the same conspiracy if we were in their shoes?
Definitions Edit Automated transportation system Edit An incident is [a]n occurrence involving one or more vehicles in which a hazard or a potential hazard is involved but not classified as a crash due to the degree of injury and/or extent of damage. An incident could affect the safety of operations. This definition covers a broad range of events.[1] Computer security Edit An incident (also called cyber incident) is: an umbrella term encompassing a range of malicious activity carried out by diverse actors with varying motivations and capabilities — all of whom exploit cyberspace.[2] [a]n event occurring on or conducted through a computer network that actually or imminently jeopardizes the integrity, confidentiality, or availability of computers, information or communications systems or networks, physical or virtual infrastructure controlled by computers or information systems, or information resident thereon. For purposes of this directive, a cyber incident may include a vulnerability in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.[3] [a]n occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.[4] [a]n occurrence that actually or potentially results in adverse consequences to (adverse effects on) (poses a threat to) an information system or the information that the system processes, stores, or transmits and that may require a response action to mitigate the consequences.[5] [a] violation or imminent threat of violation of computer security policies, acceptable use policies, or standard computer security practices.[6] [a]n occurrence that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.[7] Military Edit In information operations, an incident is an: Overview Edit Incidents can include major disasters, emergencies, terrorist attacks, terrorist threats, wild and urban fires, floods, hazardous materials spills, nuclear accidents, aircraft accidents, earthquakes, hurricanes, tornadoes, tropical storms, war-related disasters, public health and medical emergencies, and other occurrences requiring an emergency response.[10] To date, the vast majority — nearly all mdash; of actual cyber incidents have been exploitations, and sensitive digitally stored information such as Social Security numbers, medical records, blueprints and other intellectual property, classified information, contract and bid information, and software source code have all been obtained by unauthorized parties.[11] Symptoms Edit The symptoms of an incident could include any of the following: References Edit 1. Federal Automated Vehicles Policy: Accelerating the Next Revolution In Roadway Safety, at 84. 2. Justice Department's Role in Cyber Incident Response, at 1. 3. Presidential Policy Directive 41 (PPD-41): United States Cyber Incident Coordination. 4. NIST, FIPS 200; 44 U.S.C. §2552(b)(2). 6. NIST Special Publication 800-61 (rev. 1), Glossary, at D-2; NIST Special Publication 800-150, at 59. 7. Id. 8. Improving Cybersecurity Protections in Federal Acquisitions. 9. U.S. Department of Defense, Joint Pub. 1–02: DOD Dictionary of Military and Associated Terms (Apr. 2010) (full-text). 10. Department of Homeland Security, National Infrastructure Protection Plan 110 (2009) (full-text). 11. At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues, at 14. See also Edit
Movie Analysis : Like Stars On Earth Essays Movie Analysis : Like Stars On Earth Essays Length: 882 words (2.5 double-spaced pages) Rating: Better Essays Open Document Essay Preview The education system in India is based on forced learning that kills student’s spirit and zest of learning. In the film “Like Stars on Earth,” we look specifically at the draw backed role played by parents and teacher in Indian education system. We follow the story of a dyslexic Indian boy, Ishaan, who always had trouble coping with his studies, but in the end with the help of an understanding teacher he is able to study normally and catch up with his peers. We will analyze this film using the concepts from Practices of Looking to explain our thesis. Eddie will cover the concepts of encoding and the ideology surrounding Indian education; Kiranjot Singh will explain the concepts of punctum, negotiated reading and producer’s intended meaning; Harjeet Gill will go into details with the concepts of viewers makes meaning and myth. Our working thesis is the film “Like Stars on Earth” clearly portrays the fault of rote learning in India’s education system, especially during primary level education. Encoding is one of the concepts we use to analyze this film. The aesthetics, music and setting are wisely chosen by the producers when making this film. This film is taken within the beautiful urban scenery of Mumbai, India and the music are chosen carefully to convey a certain message in certain scenes (will be explained further on Singh’s part). Besides that, the producers also cleverly use visual effects and animation to give an abstract view of what the characters are feeling or thinking. Most of the scenes in this film are taken in broad daylight to show off the beautiful scenery and to produce a more cheerful atmosphere. In Practices of Looking, Struken and Cartwright explain ideology as “system of belief that exist w... ... middle of paper ... the movie when the robotic music is played to touch people’s emotions. Mr. Singh will talk about our negotiated reading approach towards the movie, especially about the need of a special teacher for a weak student in India. Also, the twilight filmed sad song “ma” (mother) is created by producer’s demand to link the movie to producer’s intended meaning. demand that links the movie to producer’s intended meaning concept. Furthermore, the setting like the dark locations, a boarding school close to hills and river and the background music, for example on tense or sad situations with guitar music , the recurring theme music representing Ishaan ‘s peaceful character, use of music that starts with a slow flow then becomes loud create a sad emotional drama. These settings seem touching citizen’s sad emotions and seek them to think according to producer’s intended meaning. Need Writing Help? Get feedback on grammar, clarity, concision and logic instantly. Check your paper » Essay on 1960's Movie Industry Compared to the One Today - Tonight is the opening night for a film the critics have been raving about for weeks. With the crisp separation of your ticket, the attendant politely directs you to the correct theater. The smell of freshly buttered popcorn permeates the air as you proceed to find your seat among the other patrons. As the opening previews end and the lights begin to dim, the excited whispering surrounding you gradually tapers off. The movie that you have been anticipating for months is about to begin. Movie theaters have been essential encouragers of social interaction for decades....   [tags: Movie Theaters, Social Interaction, History] Better Essays 1462 words (4.2 pages) Analysis Of The Movie ' Storytellers ' Essay - Analysis Storytelling has been an essential part of the human spirit for as long as history can see. From the very beginning, there are paintings on the walls of the caves of early man; stories, telling of brave hunts and harsh winters. From there, stories have evolved; retold across generation after generation, moving from paintings to spoken word to books, and finally, and recently, to film. There is just something about a good story that is essentially captivating to us as people, and we keep searching for more....   [tags: Emotion, Feeling, Audience theory, Earth] Better Essays 1538 words (4.4 pages) Essay about Hollywood's Biggest Stars Better Essays 2285 words (6.5 pages) Movie Review Of Jerry Maguire Essay - Movie Review of Jerry Maguire If you want to take a break from the frigid air of a Montreal winter, go to see Jerry Maguire; it will be sure to warm your heart. If you're like me, you're a little tired of going to see big name stars in overly hyped, big time busts. Combine that with the fact that sports movies are rarely impressive, (Necessary Roughness?!. The Program?!?) and I have to say that my hopes were not too high for this movie. Let me tell you, I was pleasantly surprised. The title character, played by Tom Cruise, is a sports agent at the top of his business, and at the bottom of humanity....   [tags: essays research papers] Free Essays 690 words (2 pages) Essay on An Angel is Sent to Save the Day in the Movie, The Bishop's Wife - The Bishop’s Wife was directed by Henry Koster in 1947. Cary Grant stars as an angel sent to help a newly appointed bishop played by David Niven and his wife played by Loretta Young. The story line is nothing but typical for its time. Niven’s character is having issues raising the funds to build a much needed addition for his church. The wealthy upper class is offering the needed funds in exchange for greedy control and all the say in how it is built. While trying to stay true to his beliefs, the new and young bishop is finding it hard to resist the promised funds of the well off members of the church....   [tags: cary grant, church, neglect] Better Essays 866 words (2.5 pages) Is It Like Earth? Essay - “Is it like Earth?” Stefan answered hopefully. The entire cabin as all ears to hear Pars answer this question about their prospective home. “Indeed, Gnaritus is about the same size as Earth,” Pars replied, pointing to a diagram of Gnaritus’ solar system. “It is also at a similar distance from its larger parent sun about a hundred and sixty million kilometers. This orbital distance is not quite the same as for the Earth, which is a hundred and fifty million kilometers from the Sun. However, Gnaritus also orbits around two other smaller daughter stars that are, in fact, a hundred and fifty million kilometers away....   [tags: Earth, Oxygen, Sun, Solar System] Better Essays 1764 words (5 pages) Analysis Of The Movie ' The Perfect Guy ' Essay - The perfect guy is a romantic thriller that stars a black actress by the name of Sanaa Lathan who plays the role of Leah Vaughn, Michael Ealy who plays the role of Carter and Morris Chestnut who plays Dave. The film was released this September 2015. In the film Leah Vaughn is a very successful political Lobbyist in Los Angeles. Leah does her job very well; she has a beautiful home and a nice car. She is like the superwoman. But, Leah’s love life is not going so well. This film is very interesting because it is a film, but it does deal with the reality of women in relation to men....   [tags: Sexual intercourse, Human sexuality] Better Essays 2189 words (6.3 pages) Analysis of M. Night Shyamalan´s After Earth Essay - “Danger is real, but fear is a choice.” As intriguing and captivating as this catch phrase sounds, the film as a whole may not fit that classification. While M. Night Shyamalan’s After Earth (2013) is ineffective in reaching some of its audiences as anticipated, others seem to have enjoyed the movie thoroughly. The film opens with a promising story where humans are forced to escape a polluted Earth inhabited by an alien race that is trained to exterminate them and retreat to Nova Prime, a new home, to find refuge....   [tags: alien, human, earth, movie] Better Essays 1280 words (3.7 pages) Essay on Analysis of the Movie, The Yellow Earth - Analysis of the Movie, The Yellow Earth In a village left behind as the rest of the China is progressing, the fate of women remains in the hands of men. Old customs and traditions reign supreme, not because it is believed such ways of life are best, but rather because they have worked for many years despite harsh conditions. In response to Brother Gu’s suggestion of joining communist South China’s progress, Cuiqiao’s widower father put it best: “Farmer’s have their own rules.” One member of this society is not as eager to keep the status quo....   [tags: Movie Film Essays] Better Essays 494 words (1.4 pages) Essay about Frame in the Movie Yellow Earth - Frame in the Movie Yellow Earth The movie, Yellow Earth, focuses on images that use mise en scene aesthetics. Bazin advocates the use of mise en scene rather than using montage. In mise en scene, the director takes account for everything that appears in the frame. The director also takes the effects in the onstage space of the frame. Some examples of effects in the frame are lighting, setting, costume, and character behavior. Even though mise en scene literally means, “placing of the scene”, contextually it means all the effects, actions, and settings in a frame prior to editing....   [tags: Movie Film Essays] Free Essays 391 words (1.1 pages)
EDP Sciences Free Access Volume 598, February 2017 Article Number A88 Number of page(s) 11 Section Astrophysical processes DOI https://doi.org/10.1051/0004-6361/201629254 Published online 07 February 2017 © ESO, 2017 1. Introduction Fast radio bursts (FRBs) are transient radio events with millisecond durations, and they are typically associated with large dispersion measures (DMs). Sources of cosmological and galactic origins have both been proposed (see the review article Katz 2016a, and references therein), with the latter challenged by more recent observations and theoretical arguments (Masui et al. 2015; Katz 2016b; Luan & Goldreich 2014), therefore we assume extragalactic sources to be responsible for FRBs here. The enormous distance scales that come with this assumption imply that a large amount of energy needs to be available, 1038−1040 erg, to be more precise (Katz 2016a, assuming isotropic emission). In addition, the short pulse duration requires a compact source region. Neutron stars (NSs) represent natural candidates that simultaneously satisfy these two requirements. The gravitational energy of an NS can obviously serve as a deep energy well, but to draw from it, significant changes (such as a collapse, see Falcke & Rezzolla 2014) probably have to occur on the star itself, which would be difficult to repair. This contradicts the recent observation that FRBs repeat (Spitler et al. 2016; Scholz et al. 2016), which excludes the possibility that disruptive processes cause irreversible damages to the source. An alternative energy well is the electromagnetic (EM) well residing in the NS magnetosphere. This well is shallower, however, and the FRB energy estimate constitutes a substantial portion of the total EM energy in the magnetosphere of a normal pulsar (magnetic field strength of 1011−1013 G). Having this in mind, much attention has been paid to magnetars (see, e.g., Lyubarsky 2014), which possess a stronger magnetic field (up to 1015 G), for which relatively minor magnetospheric events would already suffice energetically. This thinking underestimates the flexibility of the magnetospheres, however, and the possibility remains that catastrophic global reconfigurations of a normal pulsar’s magnetosphere can occur (under the influence of external factors), but without altering the star itself, which then restores the magnetosphere to its usual state. Such a global event produces a large emission region that it takes radio signals milliseconds to traverse (see the beginning of Sect. 7.1 below), thus providing a more natural explanation for the duration of FRBs, as opposed to having to amalgamate a large number of short-duration events, such as giant pulses of young pulsars (see, e.g., Kulkarni et al. 2015, for more discussions). In this paper, we explore this alternative. To begin with, we note that a large rotation measure has been recorded for an FRB (Masui et al. 2015), suggesting that a strong magnetic field exists near the source. On the other hand, we know that the region surrounding a supermassive black hole (SMBH) is pervaded by a strong magnetic field, which is a vital ingredient in jet launching mechanisms such as the Blandford-Znajek process (Blandford & Znajek 1977). Therefore, it is interesting to see if this field can act as the destabilizing external influence that triggers magnetospheric reconfigurations. The field strength is sufficient to play this role. The key is to concentrate on a structurally vital place for pulsar magnetospheres called the light cylinder (LC). If the typical pulsar rotation period is 1 s, then within geometrized units the angular velocity of the pulsar rotation can be computed as . This implies that a particle that corotates with the NS will have to travel at the speed of light if it is located at ~5 × 109 cm away from the rotation axes of the star. Such a place is termed the LC. At such a large distance from the star, the star-generated magnetic field would have dropped to 10-11 of its strength near the star, assuming a dipolar field out to the LC. In contrast, the magnetic field close to a supermassive black hole is limited by the Eddington field strength to G (Dermer et al. 2008; Palenzuela et al. 2010) where M8 is the mass of the supermassive black hole divided by 108M. From active galactic nuclei jet considerations, Blandford & Znajek (1977) estimated that the field strength must exceed 100 G, while for our quieter Milky Way, the field strength close to the SMBH Sgr A* is about 20 G (Melia 2013). These values are not negligible compared to pulsar’s intrinsic field at the LC, and can exert strong influences on the magnetospheric dynamics. We begin a rough sketch of this influence in Sect. 2 by computing the current density along current sheets (CSs) that enclose closed (return to the star) magnetic field lines. Even though they are of vital importance (they determine the force-free regions through boundary conditions), a detailed description of the CS dynamical evolution is generally lacking. Nevertheless, we can evaluate (in Sect. 3) the Lorentz force that they experience when immersed in the background magnetic field near an SMBH, and show that force discontinuities would dismember the bubble enclosure they provide, with the magnetosphere experiencing a catastrophic transition as a result. We then estimate the overall energy released from such a violent event in Sect. 4, and describe in Sect. 5 the process through which bubbles regrow, thereby completing a full repeatable dynamical cycle (noting that FRBs have been observed to repeat). We finally examine some potential complications to our computations in Sect. 6, and evaluate the conformity of the present proposal to salient features of the FRBs in Sect. 7, introducing some new analysis, for instance, on the temporal pulse profile. The results show good agreement with FRB observations, especially with several previously overlooked features of the signals. Finally, we conclude with an outlook for future work in Sect. 8. The formulae in this paper are in geometrized units where c = G = ϵ0 = 1, unless stated otherwise. With this choice, only one fundamental unit, that of length, is required, and we take it to be the radius R of the NS. In other words, a length of 1 R in our formulae corresponds to roughly 106 cm in cgs units. The index notation adopted in this paper is that the beginning part of the Latin alphabet denotes four dimensional spacetime quantities, while the middle part of the Latin alphabet denotes spatial components. 2. Pulsar magnetosphere in isolation Before examining the dynamical evolution brought about by the background magnetic field of the galactic center, we first enumerate some of the important structural features of a pulsar magnetosphere in isolation. We take the outline of Goldreich & Julian (1969), and in particular the quantitative refinement from (Gralla et al. 2016, GLP for short). The underlying assumption for their treatment is that the plasma particles’ contribution to the total stress-energy tensor of the system is subdominant to that of the EM field, so that the particles’ inertia is negligible, and they can experience no forces, or else will be infinitely accelerated. GLP also asserted that the spacetime metric outside of the NS (r> 1 in our units) takes the form of (1)where is a dimensionless compactness parameter with a typical value of 1/2, and is the dimensionless moment of inertia, with a value of 2/5 for a uniform density sphere. These quantities are dependent on the NS equation of state, and we take the aforementioned example values for concreteness. The quantity Ω, on the other hand, is the angular frequency of the NS rotation, which we retain as a free parameter in the expressions below. In addition, as the essential ingredients we need already appear for aligned rotators (rotation and magnetic axes of the NS are aligned), this is the case we examine. A most salient feature of the pulsar magnetosphere is that a bundle of closed field lines without accompanying currents exists in a bubble, separated from the open field lines outside, along which currents do flow (see Fig. 1a). In order for such regions of distinct characters to coexist, a compressed layer of high current density called the CS needs to be present to separate them (across which the magnetic field is allowed be discontinuous), and the integral version of the Maxwell equations (see Sect. 6 in Gralla & Jacobson 2014) dictates that the CSs need to be tangential to the magnetic field lines. Quantitatively, we note that the Faraday tensor within the stationary axisymmetric force-free magnetosphere is given by GLP, Eq. (6), in the exterior calculus notation as (2)The quantity 2πψ(r,θ) is the polar magnetic flux through any surface bounded by the toroidal curve of constant r and θ (as given by the arguments of the function ψ), and I is the polar current through that same surface. The bubble region corresponds to high values ψ>ψ0 ≈ 1.23 μΩ, where μ is the dipole moment of the magnetic field close to the star. In this region, we have I(ψ) = 0, which is quite different from the outside region with ψ<ψ0, where (GLP, Eq. (22), + sign for the northern hemisphere) (3)Although the closed field lines are of secondary importance to pulsars in isolation because they are unrelated to the regular pulsed radiations, they nevertheless serve as a reservoir holding on to energy that is available to be released in a sudden outburst, should the bubble walls experience any catastrophic failure. A general rule for the closed field lines is that they must reside within the LC, never venture outside. The reason being that beyond the LC, the particles that are stuck on the field lines satisfying force-free conditions will have to move superluminally, which is impossible (Goldreich & Julian 1969). Alternatively, magnetic dominance is lost for such field lines beyond the LC (Gralla & Jacobson 2014). That these two statements are equivalent can be seen simply by writing down the flat spacetime expression for the Lorentz force q(E + v × B), and observe that in an electrically dominated region, we would need | v | > 1 in order to achieve a vanishing force. To see what distiunguishes the closed and open field lines in terms of penetrating the LC, we compute from Eq. (2)the invariant (with notation | B | 2BaBa, cf. Gralla & Jacobson 2014, Eq. (66)) (4)and note that | dψ | 2< 0 as it is space-like and that dφ−Ωdt changes from being space-like to time-like when we cross the LC outward bound. Therefore when I = 0, as in the case of the closed field lines, the region beyond the LC is an electrically dominated forbidden zone, while for open field lines with non-vanishing I, this region can remain magnetically dominated. It is then not surprising that the tip of the bubble enclosing those close field lines is on the LC, as depicted in Fig. 1a. thumbnail Fig. 1 a): Schematic depiction of a poloidal slice of the magnetosphere of an isolated pulsar, reproduced from GLP Fig. 1. The vertical dashed lines mark the location of the LC (ρ/RL = 1, with ρ and z being the cylindrical coordinates measuring the distance to and along the rotation axis, and the LC is at ρ = RL). The red curves represent the CSs that demarcate the different magnetic domains (1) (inside the shaded bubble containing closed field lines) and (2) (open field line region). b): A depiction of the split monopole solution, with a CS on the equatorial plane, facilitating the change of field line direction across it. Open with DEXTER From Eq. (2), we can also obtain the explicit form of the magnetic field using Ba = ϵbcdaFbcτd/ 2, where ϵabcd is the 4D Levi-Civita tensor, and τa is the time-like one form orthogonal to constant t slices of spacetime. The result is (upper index spatial vector in the basis of { φ,r,θ }) (5)We see that the toroidal magnetic components immediately inside and outside of the CS have values of (6)Therefore, by the usual boundary condition across the CS ( is the outward normal to the CS, which is purely poloidal as a result of axisymmetry) (7)we have that there is a return current (with surface density σ) flowing inward toward the star along the singular separatrix (separating open and closed lines) CS in the poloidal direction. In particular, its distribution is reflection-symmetric against the equatorial plane, or in other words, the currents along the top and bottom red arches in Fig. 1a are both flowing to the left. 3. Destabilizing Lorentz force We now place the pulsar in the galactic center, but still far away from the innermost stable circular orbit, so that the general relativistic effects from the SMBH are negligible. The speed of the NS, on the other hand, is approximated by the Keplerian expression , which for orbital radius r ~ 0.005 pc (estimated size of the magnetized region, see Sect. 7 for details) and SMBH mass M ~ 4 × 106M gives v ~ 10-2c (Lorentz factor γ−1 ~ 10-5), and thus special relativistic effects are not important either. In addition, the electric field strength when we move into the comoving frame of the NS is correspondingly weak. For the purpose of grasping the basics of the proposed FRB mechanism then, it suffices to consider a stationary pulsar immersed in a static magnetic-only background EM field. As is clear from Fig. 1, the CSs form the skeleton of the magnetosphere (it has been observed that force-free solutions are in general numerous and the CS configuration is the deciding factor in selecting particular solutions out of large families of possible candidates Goldreich & Julian 1969; Yang et al. 2015), therefore we concentrate on their reaction to our placing the pulsar in the galactic nuclei. Specifically, they would experience a Lorentz force from the external background field, provided that such fields have not been cancelled by a slight adjustment of the magnetospheric currents. Because the external field strength is comparable to (or easily orders of magnitude stronger than) the star-generated field near the LC, it is clear that small perturbative alterations to the magnetospheric currents are insufficient to shield the background field in that region. The result is that the CSs are moved by the Lorentz force, resulting in a loss of stationarity for the entire magnetosphere, with the CSs serving as moving boundaries to the force-free regions. thumbnail Fig. 2 Force distribution near the critical point. The background magnetic field points out of the paper, the dotted line denotes the LC, and the black arrows indicate the force directions. a) The isolated magnetospheric configuration. b) Slightly adjusted so that the three branches of the current sheets intersect tangentially, but the forces do not synchronize. c) Heavily modified so that the three branches have matching force directions, but the volume of the bubble is curtailed near the LC. Open with DEXTER The result of this loss of stationarity is episodic magnetospheric reconfigurations. Specifically, in the regions close to the NS, the CSs in a stationary solution, if it exists, would be similar to their counterparts in the isolated case with two inflowing currents (computed in Sect. 2) above and below the equatorial plane with similar fluxes (obeying approximate reflection symmetry) because these regions are still dominated by the magnetic field of the NS itself. However, near the LC, the CS configuration as depicted in Fig. 1 is no longer stable, which means that such stationary solutions cannot in fact exist. This is because the three branches of CSs intersect at a critical point Y (see Fig. 1a), where the current flows (with a non-vanishing density , see Eqs. (6)and (7)) dictate that the different branches are pulled by Lorentz forces in different directions when the non-negligible (near the Y point) background magnetic field is orientated as in Fig. 2a. In other words, the forces will tear the three branches apart at the seams. While a simple deformation may bring the three branches to intersect tangentially (Fig. 2b), the currents in the top and bottom sheets that flow back to the star are necessarily opposite, so that the forces would still not align at the critical point. A proper force alignment requires more drastic deformations, where the top and bottom branches collapse together at the critical point, as shown in Fig. 2c. The force directions will align at Y, but the volume of the bubble will be squeezed, and the energy stored in the closed field lines compacted. This implies that significant magnetic pressure ( energy density) would have built up inside the bubble that prevented this configuration from being achieved in the first place, especially since the Lorentz force acting on the top separatrix CS also tries to expand instead of compress the bubble. In short, tearing is unavoidable1. The attention is also directed to the fact that the region surrounding the Y point is not perfectly force-free; Mestel & Shibata (1994) predicted that dissipative zones necessarily exist, which means that magnetic reconnections are allowed there. Therefore, failure in the form of rapidly recurring forced reconnections, and the subsequent disorderly current flows (i.e., charged particle motion), would develop in the CSs at the Y point, which is also characterized by high particle speeds and thus a high Reynolds number. The turbulent flows would then be convected along the CSs to regions farther away from the Y point, introducing dissipation and resistivity at these places as well. Resistive magnetohydrodynamic instabilities such as the rippling and tearing modes (Furth et al. 1963) would then be able to develop. The configuration with a sudden jump of Bφ across a current layer (see Eq. (6)) is a stable equilibrium only when the conductivity of the CS is infinite, and once a resistivity η is introduced, instabilities grow on a timescale much greater than that of Alfvén (~, where ρ0 is the plasma density), but much shorter than that of resistive diffusion (~), destroying the structural integrity of the CSs and thus removing the segregation between distinct magnetic domains (the magnetic field is no longer allowed to be discontinuous in the absence of CSs, therefore the two domains must assimilate). In other words, the bubble containing the closed field lines that were punctured at the Y point would burst open, allowing these lines to spring out into open field lines (to match smoothly with the open field configuration outside), along which currents and Alfvén waves can travel, possibly as the null solutions of Brennan et al. (2013, see also Zhang et al. 2015, for their stability). When these plasma winds and waves propagate along the originally open field lines near the poles of isolated pulsars, the energy they carry eventually turns into the regular pulsar radio emissions. It is therefore not unreasonable to expect that the same conversion process could channel some of the large amounts of energy initially stored in the closed field lines into a bright, although short-lived, radio burst, or FRB. 4. Bubble-free magnetosphere The now fully open magnetosphere resembles a split-monopole (see Fig. 1b and Michel 1974; Gralla & Jacobson 2014), which is a valid solution for force-free electrodynamics given by (q being the monopole charge) (8)and has long been used as a simpler surrogate for the true isolated magnetosphere in regions far from the NS (see, e.g., Brennan & Gralla 2014). A visual comparison between panels a and b of Fig. 1 shows that the true isolated solution asymptotes to a monopole-like field distribution at large r, which is expected because monopole-like radial (in the poloidal directions) field lines is imposed as a boundary condition in GLP. The split-monopole is a poor approximate for the isolated magnetosphere when we are closer to the NS, however, as the current inside the star is expected to favor a dipolar near-zone field. However, the field lines of a dipole, given by (9)are all closed, so that energy cannot be transported out as Poynting or wind fluxes moving out along the field lines. Therefore, to account for the fact that we do observe regular pulsar emissions, field lines near the polar regions will have to be opened up into monopole-like lines by the currents in the magnetosphere. In the regions closer to the equatorial plane, on the other hand, the influence of the dipole is restricted to within the LC, allowing the monopole to dominate outside. The bubble is then essentially an island of dipolar dominance in this tug of war, trapping the dipole-like closed field lines within, until released by the collapse of the separatrix CSs, at which time the same split-monopole that dominated outside of the LC becomes dominant everywhere. A turbulent current region close to the star surface (generated during the collapse of the CSs) is then responsible for keeping the influence of the dipole temporarily at bay (allowing for a temporary alteration of the boundary condition near the star). Given this general scenario, we can then estimate the energy budget available to be released from the bubble by comparing the energy originally stored there in the form of the dipole solution (9), with the same region filled with monopole fields (8)after the bursting. It is straightforward to compute the energy density, or the ·tt component of the stress-energy tensor (10)which is (11)for the split-monopole and (12)for the dipole (setting I = 0 as we are interested in the region inside the bubble). In addition, the magnetic field strengths in the two cases are (13)and (14)Take a pulsar with a magnetic field strength of ~B11 × 1011 G at the star surface where the dipole dominates (we note that the variable B11 is only the coefficient in front of the power 1011, and does not include the power term itself, so that for a pulsar with a field strength of 1012 G at the NS surface, we have B11 = 10, and the field strength at the LC for this pulsar would be 1 × B11 = 10 G), then from Eq. (14)we can work out μ. Since the dipole dominance is taken over by a split-monopole at the LC (at the typical value of RL = 5 × 103R for a pulsar of a one-second period), the monopole field strength from Eq. (13)must be commensurate to the dipole field value at that location, from which we can determine q. Because a dipole magnetic field drops off as 1 /r3 as opposed to the monopole’s 1 /r2, the bubble configuration will have to contain a much stronger magnetic field (as compared to the post-burst monopole) in the near zone to match the same asymptotic field strengths. This is in essence the energy reservoir. Substituting the aforementioned values into Eqs. (11)and (12), we can then integrate the resulting over the bubble region to yield a total released energy of erg. This result appears to be in good agreement with the implied energy of 1038−1040 erg for the FRBs (Katz 2016a), noting that these observation-implied numbers may be slight overestimates, however, depending on which fraction of the DMs is appropriated into the intergalactic medium (see Sect. 7 below). In which case we would have additional room for a much lower radiation efficiency (especially since for a typical pulsar B11 ~ 10). 5. Recharging the bubble Although the split monopole is a valid description of the magnetosphere immediately after the bubble’s bursting, the toroidal currents within the NS have not been removed, and they will try to impose a dipolar boundary condition on the magnetosphere (such boundary conditions supported the original dipolar closed field line region in the first place) and restore the closed field line bubble. Immediately after the bursting, their efforts are hindered by a turbulent current layer near the NS surface that temporarily shields the dipolar boundary condition from the magnetosphere. However, the high dissipation within the turbulence would eventually vanquish such currents, and the dipolar influence would begin to push outward again by injecting energy into a nascent bubble, causing it to grow gradually in size. The detailed process most likely resembles the one outlined in Contopoulos (2007), that is, magnetic reconnection across a resistive equatorial CS (see the red line in Fig. 1b), but applied in a different context inside of the LC: the residual resistivity from the bursting episode inside of the split-monopole’s equatorial CS facilitates reconnection of open field lines across the equatorial plane, into closed lines. The process begins near the NS where the toroidal current inside the star bends the field lines into dipolar shapes to be reconnected, and then marches outward. Let v and η denote the material velocity and the magnetic diffusivity in the equatorial CS, then the evolution of the closed magnetic field lines along the resistive CS is governed by the induction equation (Contopoulos 2007, Eq. (13)) (15)where the first term denotes the advection of the closed field lines by the particle flow in the CS and the second term a diffusion that has a characteristic timescale of Tch = RLh/η, where h is the half thickness of the CS. Contopoulos (2007) integrated and plotted (in their Fig. 2) the outward marching of closed field lines according to Eq. (15)for a toy model. Although that toy model was designed to illustrate the principles for a different process occurring outside of the LC, it turns out to be more directly analogous to our bubble growth process, and we refer to that paper for more details (in particular, their Fig. 2 provides a good visualization for a growing bubble). We note, however, that the magnetic diffusivity η is proportional to electric resistivity, which means that lower turbulence-induced resistivity in the outer regions (which had more time to settle down before the new bubble reaches them) would prevent effective reconnection of the field lines and thus slow down the growth of the new bubble, causing protracted periods of inactivity and thus low FRB duty cycles. The overall length of the bubble’s growth period is otherwise stochastic, as the turbulent post-bursting environment injects variability into both η and v. Nevertheless, the diffusion timescale Tch provides a crude estimate for the FRB recurrence interval and thus its repeat rate. We first note that η = 1/(μ0σ0), where μ0 is the vacuum permeability, and σ0 is the plasma conductivity, which we approximate by the Coulomb collision formula , with ne being the electron number density, qe and me the electron charge and mass, and vc the collision frequency. For ne, we can take Goldreich & Julian (1969) Eq. (9), which gives ne = 7 × 10-2BzΩ/(2π), and note that the regrowth process in the outer regions consumes the most time, so that the relevant G for a typical pulsar (we also adopt a typical 1s pulsar rotation period). Substituting all these numbers, we obtain Tch ≈ 10-2h/νc. Recalling that FRB 121102 has been observed to repeat on 10 min intervals (Spitler et al. 2016), we obtain νe ≈ 2 × 10-5 hs-1, which translates into an effective thermal motion temperature of ~1.4 × 104/h2/3K, broadly in line with temperatures typically found near pulsars (e.g., Page et al. 1996; and Pavlov et al. 2001, found a surface temperature of 106 K for the Vela pulsar). During the growing phase, while the bubble remains small and hidden inside regions of strong intrinsic pulsar magnetic field, the external field can be shielded by perturbations to the intrinsic field, and in this way, the bubble is protected against the destabilizing effects described in Sect. 3. When its Y point once again breaches a certain threshold radius and reaches close to the LC, however (i.e., when the lost energy has been replenished by the NS), the intrinsic pulsar magnetic field becomes subdominant in strength to the external field and will not be able to neutralize the latter through its own perturbations. Consequently, Lorentz-force-induced instabilities set in once again to burst the newly grown bubble, and the cycle repeats itself. When the environmental field strength is denoted as BeG, the stability threshold is approximately located near (B11 × 1011/Be)1/3R, where the intrinsic and external magnetic fields are of comparable strengths. As the Y point will not push beyond the LC, we need this threshold radius to be inside of the LC for any instability to occur at all, which gives us a criterion (an additional criterion is to be given in Eq. (22)below) (16)meaning that the pulsar has to be sufficiently close to the SMBH such that Be is large enough to trigger our FRB mechanism. We further note that the short bursts we propose are not induced by sudden changes in the environmental magnetic field, but rather are a violent constituent episode in an intrinsic dynamical cycle for the pulsar magnetosphere immersed in a steady external field. In other words, the episodic short-duration FRBs is due to the intrinsic cyclic dynamics of an out-of-equilibrium nonlinear system, and does not require an external trigger with a similar temporal variation profile, somewhat like the crashes in business cycles that do not need to be induced by wars or natural disasters. 6. Complications 6.1. Tidal forces We have placed the pulsars close to the SMBH, which means that tidal forces might become significant. In this section, we briefly estimate their strengths as compared to the Lorentz forces to obtain a rough idea of when tidal effects have to be taken into account in our computations. To evaluate the tidal forces, we note that the tide-induced relative acceleration Δa between two freely falling observers that are spatially separated by a vector ξ is given by (see Nichols et al. 2011) (17)where represents the tidal tensor. For a Kerr black hole of mass M and dimensionless spin a, the tidal tensor as measured by locally nonrotating Boyer-Lindquist observers is given by (see Zhang et al. 2012) (18)whereby (19)and (r,θ) are Boyer-Lindquist coordinates. To represent the directional dependence of the tidal forces in a more explicit and economic manner (as a result of frame dragging, the maximum tidal effect does not necessarily manifest itself in the radial direction), we can compute the eigenvalues of the matrix (18), which are (20)These eigenvalues correspond to the tidal field strength in the three principal (eigenvector) directions of the tidal tensor. thumbnail Fig. 3 Relative accelerations corresponding to the three principal directions of the tidal tensor (the blue curves are covered by the red ones). Both axes are in log scale. Open with DEXTER Using Sgr A* as a concrete example (4.9 million solar masses and a spin of 0.996) for the SMBH and | ξ | ≈ 5 × 109 cm (distance from the star to the LC) as a generous upper limit for the length scale inside the LC, we can compute the tidally induced relative acceleration in the three principal directions as a function of the distance r from the pulsar to the SMBH. We plot the results for two angles θ = π/ 2 and 0 (i.e., when the pulsar is on the equatorial plane and in the polar regions of the SMBH) in Fig. 3, for r ranging from the black hole event horizon to about 0.01 pc, which has been used in the literature as a rough bound for the galactic center region (see references in Sect. 7.4). We can compare this tidal acceleration with that resulting from the Lorentz force, using B = 20 G as an example (applicable for our Milky Way, see Sect. 1), and noting that the closed magnetic field lines at the LC are loaded with electrons and positrons traveling close to the speed of light, we arrive at a Lorentz-force-induced acceleration on the order of 1019 cm s-2. A close examination of Fig. 3 then shows that the tidal effects can be safely ignored all the way down to the event horizon. The reason for this is of course that the black hole is very large, so that although the resulting gravitational field is strong, it varies slowly on a very long length scale. 6.2. Pulsar wind In Sect. 2 we have sketched an analytical outline for the structure of pulsar magnetospheres in regions extending as far out as the LC. In real astronomical surroundings, relativistic winds typically dominate in regions farther out, forming a termination shock front at a stand-off distance Rs where the wind pressure balances that of the surrounding medium. This stand-off distance for a bow shock is expected to satisfy (see, e.g., Gaensler & Slane 2006) (21)where L is the spin-down luminosity and vP the speed of the pulsar, while ρ0 is the density of the interstellar medium. Substituting some typical values for field pulsars listed in Gaensler & Slane (2006), which are L ≈ 1033 erg s-1, vP ≈ 5 × 107 cm s-1, and ρ0 ≈ 1.67 × 10-25 g cm-3 (hydrogen with a number density of 0.1 per cm3), we obtain RS ≈ 2.5 × 1015 cm, which is far greater than the LC radius of 5 × 109 cm. Although both ρ0 and vP should statistically be greater for pulsars in the galactic center than their field counterparts, the vast gap in order of magnitudes from our estimate suggests that RS would still most likely to be of sufficient size to enclose the closed field line region, forming in effect a cocoon that isolates this region from the outside environment, at least in terms of matter contents. It is therefore important to assess whether an effective shielding from the magnetic field near the SMBH is also thus established (in addition to the interstellar particles being blown away), which may shut down our FRB mechanism. Our conclusion is in the negative, since in our strong field scenario, the blowing away of interstellar charged particles by the wind does not translate into an expulsion of the environmental magnetic field. To see this, we note that the magnetic pressure from a Be = 20 G galactic center magnetic field (we note that the pulsar wind literature is typically concerned with much weaker fields, e.g., the Crab Nebula has an estimated field strength of 300 μG Trimble 1982, while 3C 58 carries 80 μG Green & Scheuer 1992) is around 107 MeV cm-3, which when equated with the left-hand side of Eq. (21), which represents the pulsar wind pressure, yields the stand-off radius against the magnetic pressure at 1010 cm. Comparing this with the LC radius of 5 × 109 cm for a pulsar of period 1 s, we see that a slight increase in the period and/or decrease in the spin-down luminosity and/or increase in the Be will allow the environmental magnetic field to penetrate the closed field line region and trigger the instabilities described in Sect. 3. The pulsar wind consideration thus sets a (an astronomically achievable) lower bound on Be that has to be satisfied in addition to Eq. (16), so that now we have an overall threshold of (22) 7. Observables We have proposed a candidate mechanism for the FRBs, which relies on the interaction between the pulsar magnetospheres and a strong background magnetic field within galactic nuclei. This scenario needs to comply with the observed properties of the FRBs. Some have already been discussed; we consider the rest in turn. 7.1. Intrinsic pulse duration and temporal profile A distinguishing feature of the present model is that the release of energy locked up in the bubble is a global event, whose observation signatures are intrinsically of millisecond durations. Specifically, the released energy streams out along sprung-open magnetic field lines in an orderly fashion, so that only those source locations along field lines that point toward Earth will contribute to the signals we observe. Furthermore, radially along such lines, only those regions of sufficiently high energy density (i.e., close to the star) will contribute fluxes that register above the background noise. When we assume that such regions extend to ~10−100 R, it will take ~0.3−3 milliseconds for lights to traverse (Aflvén waves in force-free plasma also travel with a group velocity equaling the speed of light). This is in contrast to other pulsar events such as giant pulses, which last microseconds. This would help explain the rather broad FRB pulses, especially since evidence of multipath scattering is sometimes lacking (Spitler et al. 2016). thumbnail Fig. 4 Log of flux (in arbitrary units) against the log of time to peak-amplitude, with a reference straight line (black) . The inset indicates the location of the data points on the overall signal profile (with space between data points filled in with straight lines). The horizontal line in the inset is the zero flux. a) Burst 11 of the repeating FRB 121102. b) The Lorimer burst FRB 010724. Open with DEXTER We can even predict more than just the overall pulse width. The energy originally stored farther away from the star (e.g., at point B in Fig. 1b as compared to point C) would have a head-start in terms of streaming along the field lines pointed toward Earth and will arrive at our radio telescopes slightly earlier. Because the density of the released energy is lower at B than it is at C, we expect to see an increase in the FRB signal at its leading edge, beginning a few hundred milliseconds before the peak time, but only becoming strong enough to rise above noises much later. Semi-quantitatively, the released energy is roughly the difference between a dipole () and a monopole (). On the other hand, the transverse area subtending the same solid angle is r2, which means that the energy density along the radial direction is r2ΔρE. Near the peak of the signal (arriving at tp) where energy is released from close to the star, the monopolar term is subdominant and can be dropped. We have then that the log of the flux is approximately (23)where we have used r−ℛ ≈ tPt = δt, with tP being the arrival time for the peak of the signal and the radius from which the peak radiation comes, which we set to ℛ ≈ R = 106 cm or 0.03 ms in temporal units. We can then fit the logarithm of the frequency-summed burst profiles to expression (23)by varying the overall amplitude . Because 0.03 ms is a small offset, the pulse profile is expected to be rather steep near the peak (without it, the index −4 power law would diverge there), so that given a fixed temporal sampling interval, only few data points would land on the leading edge. Therefore we should look for the strongest signals for which more of the pre-peak segments rise above the background noise. The cleanest and simplest (single-peaked) signal with a high signal-to-noise ratio and several data points on the leading edge is burst 11 reported in Spitler et al. (2016). We display it in Fig. 4a, and observe that the early part of the leading edge appears to agree with a power law with index −4, but the part closer to the peak deviates from it. This may be due to other pulse-smearing effects experienced during signal propagation, or if intrinsic, possibly indicates the existence of complicated dynamics such as turbulences very close to the star that prevent an efficient transportation of the released energy. Another strong burst that had multiple data points on the leading edge of its pulse profile is the Lorimer burst (Lorimer et al. 2007), which, as seen from Fig. 4b, displays a similar morphology. For prudence, we caution that several points at the very beginning of the pulses are not above the larger noise peaks during quiescent periods, and that the precise slope of the fitting lines will be influenced by DC offsets in the flux (i.e., the uncertainty in where true zero is). There is thus the need for more dedicated high temporal resolution searches. 7.2. Rotation measure A close examination of FRB 110523 yields a rotation measure (RM) of ~−186 rad m-2, far in excess of that to be expected from the intergalactic medium and the signal’s journey through the Milky Way, which when combined, only gives an RM that is an order of magnitude lower (Masui et al. 2015). The present proposal places the source pulsar within a strongly magnetized region (SMR) in the galactic nucleus, and is therefore endowed with the ability to account for the dominant remainder. The expression for computing the RM is (24)where B is the magnetic field along the line of sight, and ne is the electron density. Ideally, we would like to know all three terms on the right-hand side and see if we can reproduce the observed RM. However, we know very little about the status of the interstellar medium in the close vicinity of a SMBH, and thus ne is uncertain. As a surrogate test, then, we attempt to paint a general picture for ne within the present proposal instead, and see if its inferred value from the RM is at least broadly consistent with this picture. We first note that the SMR is expected to be relatively clean outside of the accretion disk (we are statistically unlikely to be viewing the host galaxy disk exactly edge-on, therefore the FRB signal path to Earth traverses mostly non-disk parts of the SMR, regardless of whether the source pulsar is itself embedded in the disk), as compared to farther out in the galactic nucleus. This is because charged particles need a source of resistivity to cross the magnetic field lines and therefore are prevented from entering our region of strong magnetization (except for those in the accretion disk near the equatorial plane where mechanisms for strong Ohmic dissipation exist, see Blandford & Znajek 1977). Magnetic reconnection may also generate heat and buoyancy in infalling gas, pushing it out (Igumenshchev & Narayan 2002). We therefore expect magnetic dominance (i.e., matter stress-energy density is negligible as compared to that of the EM field), and thus a force-free environment within the SMR. More specifically, as the magnetic field lines thread through the accretion disk, the electric field component E along those lines accelerate charged particles and lift them out of the disk. The charges are subsequently distributed along the magnetic lines in such a way that the lines become equipotential, shutting down further particle extraction and establishing a state of quasi-equilibrium. This enforces EiBi = 0, which is a necessary condition for force-free electrodynamics. The charged particle density is then the minimum value sufficient to short out E. We now turn to computing the RM-inferred ne (after excluding the intergalactic and Milky Way contributions), and see if it is indeed consistent with a force-free environment. We start with the following ingredients: • The magnetic field strength in the SMR is determined by the requirement that it exerts significant influence on the pulsar magnetosphere at its LC, therefore we set its value to B11 G. • We take the geometric factor from projecting the magnetic field onto our line of sight to be on the order of unity. We also assume that this line traverses a large portion of the SMR, so that the RM measurement for FRB 110523 is not a chance underestimate of the average FRB value. • For the Milky Way, ~0.01−0.1 pc (scales to other galaxies linearly with SMBH mass) is where the matter is captured by Sgr A* and begins infalling (Melia 2013, 1994; Quataert 2002), which means that an accreting-material-supported magnetic field extending out to around LSMR ~ 0.005 pc should be a safe guess (the headroom is larger for heavier SMBHs). From these values, the ne comes out at 0.04 /B11 cm-3. For a reference scale, we can compute the ne of the pulsar magnetosphere near its LC (where the magnetic field strength is similar), which is given by Goldreich & Julian (1969) Eq. (9) (not strictly valid at the LC, but the Lorentz factor drops sharply as we move inward from it, so that this is still an approximate for nearby locations) as 7 × 10-2Bz/P ~ 0.07B11 cm-3, where Bz ~ B11 is the magnetic field strength along the rotation axis in gauss, and P ~ 1 s is the pulsar period. One major difference exists between the SMR and the pulsar magnetosphere, however. The positively charged particles in the SMR are protons (with number density np = ne) instead of the less massive positrons. Therefore, to ensure self-consistency, we need to check that the energy density of the protons is still subdominant to that of the EM field in the SMR. A simple computation shows that the ratio between them (proton over field) is ~ , where γ is the average Lorentz factor of the protons. Therefore, with a plasma temperature lower than ~ K, our ne estimate is indeed consistent with the force-free assumption. 7.3. Dspersion measure and the scattering tail A galactic-center location for FRB sources has been invoked by Pen & Connor (2015) to account for the large DMs. The high electron density within the nucleus of the host galaxy is made responsible for the majority of the DM, and the remainder places the sources at extragalactic but non-cosmological distances of hundreds of millions of parsecs. Our scenario is somewhat different, as we place the pulsars close to the SMBH in a relatively clean SMR, in the eye of any scattering screen of a toroidal topology (see the inset of Fig. 5). Therefore, unless we view the host galaxy approximately edge-on, the radio signal would not have passed through the central core of the screens, and the intergalactic medium would still have contributed a significant fraction to the total DM. (The local SMR contributes a negligible amount to the DM. For example, with FRB 110523, the SMR contribution to DM can be estimated as ~RM/(0.812B) ~ 10-4/B11cm-3 pc (note B is in μG), out of a total of ~600 cm-3 pc. The SMR is also not significant in its contribution to the scattering tail, as it is physically too small, thus all locations within are too close to the source). In fact, the scattering tail may offer a way to distinguish which FRBs are viewed through a screen. thumbnail Fig. 5 DM against tail-to-head ratio. The tail (head) section width is the distance from the end (beginning) of the pulse to its peak. The red crosses correspond to DM values without the Milky Way contribution (i.e., DME), and the gray shadow crosses provide the original overall DM for reference. The two blue crosses correspond to the two pulse profiles plotted in Fig. 4 and replaces two red crosses. The inset shows the two lines of sight. No points are obscured by the inset. Open with DEXTER Some FRBs (e.g., FRB 110220) show clear exponential tails typical of multipath broadening, and Luan & Goldreich (2014) also showed that the intergalactic medium does not appear sufficient to achieve this amount of scattering. Therefore, screens closer to the sources need to be involved (the detection of scintillation in FRB 110523 further supports this scenario). On the other hand, some signals, including those plotted in Fig. 4, do not display the signature of a scattering tail as clearly. One possibility is that in some cases, our line of sight (line I in the inset of Fig. 5) threads through the scattering screens in the galactic center, while in other cases, we peek a more direct view (line II). If this is true, then repeat bursts should retain their classification under the dichotomy, as they originate from the same source, an expectation that appears to have been borne out (Spitler et al. 2016; Scholz et al. 2016). Moreover, we should expect statistically that signals with larger DMs would exhibit more pronounced scattering signatures, manifesting themselves as a fatter tail when compared to the width of the leading edge (lack of such an asymmetry is quoted in Spitler et al. (2016) as a sign of the missing scattering tail). In other words, we normalize the tail by the intrinsic width of the signal, instead of assigning all of the extendedness of the trailing half or the whole of the profile as being due to scattering, which may lead to significant overestimates (a simple plot of DM versus pulse width shows no discernible correlation). Our investigation is of course further complicated by the fact that we cannot remove the intergalactic component from the overall DM, therefore a correlation will be loose at best, but a scatter plot of DM vs width ratios could still demonstrate a bias provided that the screen contribution to the DM is not completely overwhelmed. We make such a plot in Fig. 52, which does appear to display a general trend. With better data quality and quantity, and a much more refined method for extracting the scattering contribution to the trailing edge, it may become possible to separate the intergalactic medium contribution to the DM from that of the screen, with the former appearing as a stochastic spread in the horizontal direction around a smooth monotonic curve representing the latter (assuming the existence of a universal temporal scattering versus DM relationship for screens across galaxies). 7.4. Event rate The FRBs have a high implied aggregate event rate of up to 7 × 104 per day at above 1.5 Jy ms fluence across all sky directions (Law et al. 2015). There are two ways to achieve a high rate: a large number of independent sources, or large number of repeat events from each individual source. The bubble-bursting model falls within the second category. If 500 Mpc is to be used as a conservative detectability horizon for the FRBs (the DM is contaminated by the source’s local environment, therefore we take predictions from Pen & Connor (2015) as a lower bound), then there would be millions of galaxies within a volume of that radius, assuming a ~1011 total galaxy population in the observable universe (Gott et al. 2005). Furthermore, assuming that there is an SMBH at the center of each, we reach the upper FRB rate limit with an average recurrence rate of once per month (lower than the upper limit of 3.2 per day set by Law et al. 2015) if there are ~0.5 pulsars in the strongly magnetized central region. The number of normal pulsars close to our Sgr A* was estimated by Pfahl & Loeb (2004) to be around 100−1000 within about 0.02 pc from it, and with a naive volumetric averaging, the number of pulsars expected within a SMR of LSMR ~ 0.005 pc is 1.6−16, which covers our required population comfortably. We caution, however, that there appears to be a “missing-pulsar problem” (Macquart et al. 2010; Dexter & O’Leary 2014). Within the present model, however, it is relatively easy to accommodate any deficiencies in the galactic center pulsar number by noting that the size of LSMR can be increased further with more massive SMBHs, and that the burst repeat frequency as well as the detectability horizon also have some room to expand into. 7.5. Correlated observations The observables considered so far have been somewhat circumstantial in terms of placing the sources of the FRBs in galactic centers. In this section, we briefly consider the possibility and difficulties in using correlated observations to carry out more reliable source localizations. Although for our proposed FRB mechanism to operate, the pulsars can be on stable orbits around the SMBH and do not need to be falling directly into it, occasions may nevertheless arise when the latter scenario becomes realized, such as when orbital parameters are altered by perturbations by other stars. This may present us with a distinguishing test for the mechanism, namely that the observation of the neutron star’s tidal disruption by the SMBH (for example, if the disruption occurs before the NS reaches the innermost stable circular orbit, or ISCO, of the SMBH, the gravitational wave signal detectable by space-based detectors will exhibit a distinct cutoff frequency) should be preceded by a sequence of FRBs from essentially the same location. We can quickly assess the feasibility of this particular type of correlated observations. The disruption of the NS by a black hole is highly dependent on the NS equation of state, and even more sensitively on the black hole mass. As we have seen in Sect. 6.1, larger black holes tend to lead to less pronounced tidal effects. While SMBHs regularly disrupt normal stars (e.g., Swift J1644+57), they will not be able to disrupt neutron stars outside of the ISCO, regardless of the equation of state (see Table II in Ferrari et al. 2010, for the black hole mass limit beyond which no disruption occurs; they range from several to tens of solar masses for different equations of state, many orders of magnitudes smaller than the masses of SMBHs), and unlikely to do so before the NS enters the event horizon (for extremally spinning black holes in particular, the ISCO is on the horizon, see Jacobson 2011). This is unfortunate, but hope remains that binary neutron star or neutron star-stellar mass black hole mergers may occur close to an SMBH, as such regions with dense stellar populations should be hotbeds for dynamical capture, leading to highly eccentric binaries that merge quickly (see O’Leary et al. 2009; Antonini & Perets 2012, and also Hopman 2009, for an estimate on binary fraction). When this scenario is realized, a gravitational wave detection would precede and forewarn electromagnetic telescopes, which should subsequently observe, among other things, a short gamma ray burst (SGRB) and an optical kilonova (Metzger & Berger 2012) that may allow for identifying the signal as being from a galactic center environment (with optimal conditions, even the gravitational wave signal alone may display the effects of a nearly SMBH, see Zenginoǧlu & Galley 2012). Before these observations, however, the NSs should have generated a string of FRB signals that we may try to dig out of archival data. Furthermore, if the merger remnant is another neutron star, then we may have additional FRBs after the merger. By comparing with, for example, SGRB sources outside of galactic centers (should be without correlated FRBs), we may obtain strong indications as to whether FRBs are indeed associated with galactic center locations. In addition to correlated but separate events, search has also been ongoing for afterglows of the same event that generated FRBs (see, e.g., Keane et al. 2016). No confirmed observations have been made (Williams & Berger 2016), and the present proposal predicts little afterglow. To arrive at this prediction, we note that once the closed field lines open up, the stored dipolar energy can stream out along the monopolar field lines as Alfvén waves. Analytical solutions for this process exists (see Brennan et al. 2013; Brennan & Gralla 2014; Zhang et al. 2015), demonstrating that such waves are stable and highly efficient transporters of energy, as they can propagate cleanly without being back-scattered. They would thus evacuate excess energy out of the busted bubble regions quickly, without any residuals hanging back or sloshing around to power long-duration afterglows. Nevertheless, temporally coincident observations to FRBs in other electromagnetic frequency bands may be possible. The aforementioned waves can take on the characteristics of a wind (Brennan et al. 2013). We may therefore reasonably expect that as the pulse of wind slams into the interstellar medium, a “termination shock” may become visible in a broad frequency range up to γ-rays, in analogy with pulsar wind nebulae. Coincident detections in multiple bands should at the very least provide additional extinction data, aiding the effort to assess whether the FRBs occur in galactic centers. 8. Conclusion The FRBs are intriguing phenomena, their frequent appearances and consistency (especially on energy scales) indicate a reliable underlying driving mechanism, preferably relying on no incidental environmental factors that can vary significantly from event to event. We proposed a candidate model that attempts to adhere to this observation. We began by noting that the magnetic field strength within galactic nuclei is comparable to the intrinsic pulsar field at its LC, which is a vital but potentially fragile place for the pulsar magnetosphere, harboring such extreme conditions as particles traveling at the speed of light. We then showed that the galactic magnetic field exerts a destabilizing influence there by imposing discontinuous Lorentz forces on sheets of high surface current density that enclose dipole-like closed magnetic field lines. The result is that the CSs collapse and the closed lines open up into a split-monopole configuration, with reduced field strengths so that they can retain the same asymptotic boundary conditions farther away from the star. This implies a reduction of energy density in the magnetosphere, with the difference becoming available to fuel FRBs. The FRB energy budget thus computed agrees with observed values, and several other aspects of the process also appear to be compatible with observations. We note, however, that although we have sketched the aforementioned synopsis, a detailed blueprint of the dynamical energy-release process requires sophisticated numerical simulations, where a realistic treatment of the resistivity arising from turbulences excited during the bubble-bursting process would be essential. In short, the most important magnetospheric dynamics involved are those for which the force-free assumption does not apply. Unfortunately, these are also the processes that we understand the least. With this paper, we wish to highlight this issue and evoke further discussions, especially on the dynamical evolution of the CSs. Beyond tearing, that force acting on the top separatrix sheet even tries to take it across the LC, which would incite further instability, as the closed field lines abutting it and tangential to it will have to accompany it on this journey (our discussion does not rely on this also happening though). The data are taken from Thornton et al. (2013) for FRB 110220, FRB 110627, FRB 110703, FRB 120127; from Lorimer et al. (2007) for FRB 010724; from Burke-Spolaor & Bannister (2014) for FRB 011025; from Champion et al. (2016) for FRB 090625, FRB 130626, FRB 130628, FRB 130729; Ravi et al. (2015) for FRB 131104; Spitler et al. (2016) for FRB 121102; Petroff et al. (2015) for FRB 140514; Masui et al. (2015) for FRB 110523. We chose the single-peak profiles, with the highest signal-to-noise ratio when data from multiple bursts were available. In particular, this excludes FRB 121002 from Thornton (2013), which has the largest DM. The temporal sampling rate for this double-peaked signal is relatively low, but the fitted profile does not appear to show a scattering tail. We thank an anonymous referee for insightful comments and suggestions that led to the introduction of Sects. 5, 6, and 7.5. This work is supported by the NSFC Grant 11503003, the Fundamental Research Funds for the Central Universities Grant 2015KJJCB06, and a Returned Overseas Chinese Scholars Foundation grant. All Figures thumbnail Fig. 1 Open with DEXTER In the text thumbnail Fig. 2 Open with DEXTER In the text thumbnail Fig. 3 Open with DEXTER In the text thumbnail Fig. 4 Open with DEXTER In the text thumbnail Fig. 5 Open with DEXTER In the text Initial download of the metrics may take a while.
Rubis Family History 14-Day Free Trial Rubis Name Meaning Lithuanian: nickname for an unkempt person, from a derivative of rubti ‘to become rough’. Greek (also Roubis): descriptive nickname from modern Greek roubi ‘ruddy’, ‘ruby-colored’, from Venetian rubin. Greek: alternatively it may be from rombos (classical Greek rhombos) ‘knot’, ‘fist’, or Peloponnesian dialect roumbi ‘rag’. Similar surnames: Rodis, Kulis, Kubis, Rubin, Rubins, Regis, Juris, Rubio, Dubis, Remis Ready to discover your family story? Simply start with yourself and we'll do the searching for you. Rubis Family Origin Where is the Rubis family from? Rubis Family Occupations What did your Rubis ancestors do for a living? In 1880, the most common Rubis occupation in the USA was Farmer. 50% of Rubis's were Farmers. Farmer and Works In Brewery were the top 2 reported jobs worked by Rubis. View Census data for Rubis | Data not to scale • Farmer • Works In Brewery Census records can tell you a lot of little known facts about your Rubis ancestors, such as occupation. Occupation can tell you about your ancestor's social and economic status. Rubis Historical Records What Rubis family records will you find? Census Record There are 3,000 census records available for the last name Rubis. Like a window into their day-to-day life, Rubis census records can tell you where and how your ancestors worked, their level of education, veteran status, and more. Search 1940's US census records for Rubis Passenger List There are 642 immigration records available for the last name Rubis. Passenger lists are your ticket to knowing when your ancestors arrived in the USA, and how they made the journey - from the ship name to ports of arrival and departure. View all Rubis immigration records Draft Card There are 1,000 military records available for the last name Rubis. For the veterans among your Rubis ancestors, military collections provide insights into where and when they served, and even physical descriptions. View all Rubis military records You've only scratched the surface of Rubis family history. Rubis Life Expectancy What is the average Rubis lifespan? Between 1954 and 2004, in the United States, Rubis life expectancy was at its lowest point in 1954, and highest in 1992. The average life expectancy for Rubis in 1954 was 55, and 90 in 2004. View Social Security Death Index (SSDI) for Rubis An unusually short lifespan might indicate that your Rubis ancestors lived in harsh conditions. A short lifespan might also indicate health problems that were once prevalent in your family. The SSDI is a searchable database of more than 70 million names. You can find birthdates, death dates, addresses and more. Famous Rubis Family Ancestors Discover the unique achievements of ancestors in your family tree Look up another name
Bamako, Mali (11th Century– ) “Image Ownership: Public Domain” Bamako, with a population of 1.8 million, is the largest city in the Republic of Mali. It serves as Mali’s seat of government and the country’s economic and cultural center. The city is located in the southwestern corner of Mali, along the banks of the Niger River.  In the Bambara language Bamako means “crocodile river.” Bamako is connected to other major parts of Mali via the Niger River. Although it first came into prominence as an urban center in the Mali Empire, the precise date of its founding is unknown. From the 11th through the 16th centuries people throughout the Mali Empire traveled to Bamako to study Islam. At one point Bamako rivaled the more famous Timbuktu as a seat of learning.  Bamako diminished both in size and importance after the collapse of the Mali Empire. Mungo Park, a Scottish explorer with the British African Association, visited Bamako in 1797 and in 1806, becoming the first European in modern times to enter the city. In 1806 Park estimated Bamako to have a population of 6,000 people, but towards the end of the century the city had become a settlement of a few hundred inhabitants. In 1883 the French gained control of the city, which now had a population of about 1,000.  They built a fort there that year and in 1908 made Bamako the capital of the French Soudan Colony. In 1923 the French completed a railroad connecting Bamako with Dakar, Senegal. As a colonial capital, Bamako ironically emerged as a center of anti-colonial activity. With the intent of ending colonialism in Francophone Africa, in 1946 the Rassemblement Démocratique Africain (RDA) was established in Bamako. The RDA became the first French-speaking Pan-African organization in the world.  By 1957, Modibo Keita, the mayor of Bamako, was named leader of the RDA. With independence in 1960 the French Soudan renamed itself the “Republic of Mali.” Modibo Keita became the country’s first president. As people relocated to the city to escape famine and poverty in the countryside Bamako’s population increased tremendously over the next four decades. In addition to being the political hub of Mali, Bamako is the economic and cultural center of Mali as well as its capital.  Products from the countryside such as gold, rice, cotton, livestock, and kola nuts are transported to the city and packaged for international trade and domestic consumption. The city also manufactures textiles, ceramics, and pharmaceuticals for local consumption.  Bamako is home to many notable institutions such as the University of Bamako, the National Museum of Mali, the Mali National Zoo, the Grand Mosque of Bamako, and the Bamako-Senou International Airport. The buildings of Bamako have a unique architectural style.  Bamako’s largest building is the BCEAO Tower, which houses the Mali branch of the Central Bank of West African States. Combining modern building techniques with local indigenous aesthetics, the tower is classified as Neo-Sudanic in design. Bamako, like other metropolitan capitals, is challenged with issues of urban blight, massive unemployment, and underdeveloped public services.  Mali’s poverty exacerbates the city’s problems. “Bamako,” New Encyclopedia of Africa 2nd Edition, editors John Middleton and Joseph Miller (Detroit: Charles Scribner’s Sons, 2008.); Elizabeth Heath, “Bamako, Mali” Africana: The Encyclopedia of the African American Experience, 2nd Edition (New York: Oxford University Press, 2005).
FREE 40-part music theory course! The Clements Blog If music be the food of love ... Sunday, 9th February 2014 | 1 comment What is it that makes us love music so much? Well, a group of Canadian scientists think they have found an answer. According to their research, published last month, listening to music releases a chemical in the brain – called dopamine – that creates a sense of pleasure and euphoria. And it's exactly the same chemical that is released when we eat a delicious meal. Four hundred years ago Shakespeare called music the food of love – and he may have been more right than he realised. What's really fascinating is that the scientists found that it's not single notes on their own that provide the pleasure, but the experience of listening to a series of notes arranged into melodies or longer pieces of music. In other words, listening to music and making sense of it in your mind, rather than just hearing aimless sound, was what releases that dopamine and creates the feeling of pleasure and enjoyment. There may be something to learning how all those different rhythms, suspensions and cadences work after all – get it right and you might be able to serve up the musical equivalent of steak, chips and ice cream. The scientists found that Samuel Barber's Adagio for strings was one piece that had a particularly strong effect on the people they tested – maybe it's those great, slow melodies that take so long to resolve. But what pieces of music give you the goosebumps? Saturday, 19th February 2011 I like listening to all kinds of music, so I found this post very interesting! Thanks! Leave your comment You must be logged in to post a comment.
Skip to Content Abdominal Aortic Aneurysm Repair An abdominal aortic aneurysm (AAA) occurs when your aorta weakens and bulges out like a balloon. The aorta is a large blood vessel that extends from your heart to your abdomen. An aneurysm that is too big may burst and need repair. Abdominal aortic aneurysm (AAA) repair is surgery to fix an aneurysm in your abdominal aorta. The week before your surgery: • Ask your healthcare provider if you need to stop using aspirin, or any other prescribed or over-the-counter medicine. Ask your healthcare provider if you need to take antibiotics before your surgery. • Tell your healthcare provider if you had surgery on your abdomen in the past. Tell him if you have any other medical conditions, such as heart, lung, or kidney disease. Other procedures or medicines may be needed to treat your medical condition before your surgery. • You may need to have blood and urine tests done before your surgery. Imaging tests, such as x-rays, ultrasound, computed tomography (CT) scan, or magnetic resonance imaging (MRI), may also be done. You may also need other tests to check how your heart, lungs, and kidneys are working. Ask your healthcare provider for more information on other tests that you may need. Write down the date, time, and location of each test. The night before your surgery: • Ask caregivers about directions for eating and drinking. The day of your surgery: • You may want to bring items such as a toothbrush and bathrobe. Ask your healthcare provider before taking any medicines on the day of your surgery. Bring all the medicines you are taking, including the pill bottles, to the hospital. • Healthcare providers may put a tube through your back into your spine if you are having a TAAA repair. This tube will measure the pressure in your spinal canal. Cerebrospinal fluid (CSF) may be drained during your surgery to decrease pressure and prevent damage to your spinal cord. CSF is a clear fluid that flows around the brain and inside the spinal canal. What will happen: • You will be taken to the room where your surgery will be done. Medicine called anesthesia will be given to keep you asleep and free from pain during your surgery. Special IV lines showing how your body is doing during surgery are usually inserted after you are asleep. Your chest and abdominal area will be cleaned. Sheets will be put over you to keep the area clean. You will be placed lying on your back or on your right side. During your surgery, an incision will be made to open your abdomen. Your healthcare provider will carefully cut through and move muscle and other tissues away from your aneurysm. • A clamp will be placed on your aorta above the aneurysm to stop the blood from flowing through. Your AAA is opened and plaques such as fat and cholesterol are removed from your aortic walls. A graft will replace the weakened part of your aorta. You may have warm sheets or blankets on you during surgery to keep your body temperature normal. You may be given a blood thinning medicine to stop clots from forming inside the graft. Before your surgery is over, your healthcare provider will remove the clamp and check your blood flow. The incision will then be closed with stitches or staples. After your surgery: You will be taken to the recovery room or your hospital room, which may be in intensive care. Healthcare providers will check you often, and you may be on monitors that your healthcare providers watch outside your room. Do not get out of bed until your healthcare provider says it is OK. A bandage may cover your stitches or staples to keep the area clean and dry. The bandage will also help to prevent infection. A healthcare provider may remove the bandage soon after your surgery to check the area. Waiting area: • You cannot make it to your surgery on time. • You have a new cough or are short of breath. • You have problems swallowing or your voice is hoarse. • You have worsening symptoms. • You have questions or concerns about your surgery. Seek Care Immediately if • Your abdomen feels hard and tight when touched, or you see bruises on the left side of your abdomen. • You are dizzy or have trouble staying alert or awake. • You can feel heartbeats in your abdomen. • You have blood in your bowel movements. • You suddenly have bad pain in your chest, neck, abdomen, back, or side. The pain may travel down to your legs, hips, and groin. • You urinate less than before or not at all. • Your feet and legs become swollen, change color, or have color patches. • During your AAA repair, you may bleed more than usual. Other organs or tissues near your aorta may be damaged, and you may get an infection. You may get a blood clot in your leg or arm. This can cause pain and swelling, and it can stop blood from flowing where it needs to go in your body. The blood clot can break loose and travel to your lungs or brain. A blood clot in your lungs can cause chest pain and trouble breathing. A blood clot in your brain can cause a stroke. These problems can be life-threatening. • Body organs such as your heart, kidneys, and bowels may also be damaged and may stop working. Your spinal cord may be damaged and you may become paralyzed. Your AAA could rupture during the surgery, and you could die. People who smoke, or have kidney, lung, or heart disease are at a higher risk of problems. • Without treatment, your AAA may grow larger. This may press on other parts of your body and cause poor blood flow and blood clot formation. Blood clots may block blood from getting to areas of your body. If this happens, it may cause the tissues of the body part to die. An AAA that keeps growing may leak blood around your aorta, other blood vessels, or into your abdomen. It may cause the AAA to burst, which is life-threatening. Call your healthcare provider if you are worried or have questions about your surgery, condition, or care. Care Agreement Further information
Bulk Bag Loading & Unloading Bulk bags have changed the way materials are stored and shipped around the world. Weigh systems measure how much dry material is being loaded into or out of a bulk bag. When filling bulk bags, the system will typically have a fast fill and dribble fill mode to optimize the cycle time. More bags filled during a shift, and minimized production time translates into increased production. After the bulk bags are filled they are then transported to the customers that will empty or discharge them into their process. This would be the second time these bags are weighed. Loaded into a frame by a fork truck the frame would sit on load cells that transmit the weight to a digital control device. The weight signal tells the operator how much material is left in the bulk bag so they can reload and keep their process running efficiently. img Questions: Contact Group Four Engineering Product Groups: S-Beam, Single Ended Beam, Double Ended Beam, Weighing Module
Obsessive Compulsive Disorder Treatment for Obsessive Compulsive Disorder can begin TODAY by calling Mindful at 516-505-7200 Obsessive Compulsive Disorder (OCD) is a series of irrational thoughts or beliefs followed by subsequent, often repetitive, behaviors. People with OCD feel a pressing need to carry out their compulsive behaviors out of distress or fear that something bad may happen if they do not, or due to feelings of anxiety that exist until the behavior is carried out. OCD can take up a large part of a persons’ focus and attention throughout the day, making it difficult to focus on other things or carry out responsibilities. People with OCD often feel a loss of control over their symptoms despite their best efforts, thus leading to embarrassment, frustration, and hopelessness. Obsessions may be about cleanliness, symmetry, repetition, self-harm, or harm towards others. Compulsions, in response, may include washing/cleaning, counting, checking again and again, needing reassurance, or following a particular ‘ritual.’ OCD can be precipitated by stressful events and increase with additional stress, or may have no particular cause. Some individuals’ may experience qualities or some symptoms of OCD, however it is only diagnosed once a persons’ quality of life is severely impacted by these symptoms. “When a person seeks help and treatment for OCD matters. The longer someone waits, the worse it can get. Recovery from OCD takes work, but it is possible.” Call Mindful today to receive a personalized treatment plan for OCD that may include psychotherapy with behavior management, and medication management to ease some symptoms of discomfort associated with OCD.
The UK is currently enjoying one of the hottest summers in history, and beaches along the British coast are packed with sun-seekers. Some lucky people may have noticed a mysterious glow lighting up the waters. This is caused by bioluminescent plankton - tiny creatures that emit a beautiful blue-green light. Bioluminescence occurs when chemical reactions within the plankton produce light in response to the water being disturbed. During the heatwave, waters are significantly warmer, giving the plankton the opportunity to ‘charge up’, and glow even brighter than normal. Here’s our guide to the best places in the UK and Ireland to see the beautiful phenomenon for yourself. Three Cliffs Bay, Swansea 1. Lough Hyne, Ireland Lough Hyne is a lake in the southwest of Ireland, where bioluminescence is regularly spotted. Most of the glow comes from a type of aquatic algae called dinoflagellates, which convert light energy from the sun into chemical energy. The lake is well sheltered and warmed by sunlight, meaning the algae can easily ‘charge-up’ in the day, and glow at night. The best time to see the phenomenon is July and August. 2. Aberavon Beach, Port Talbot Aberavon Beach, Port Talbot Wales’ Aberavon Beach is a tourist hot-spot when it comes to seeing bioluminescent plankton. The "sea sparkle" is caused by the plankton called Noctiluca scintillans which shimmers a bright blue light when it is disturbed. 3. Three Cliffs Bay, Swansea Three Cliffs Bay, Swansea Not too far away from Aberavon Beach is Three Cliffs Bay, another site where bioluminescence can be seen. In a blog about the stunning glow at this site, photographer Alyn Wallace said: “It was one of those things I never thought I'd experience without travelling half-way across the world but my home country Wales continues to blow me away." "Being surrounded by the blue glow and sparkle of bioluminescent plankton whilst underneath the grace of the Milky Way was one of the most surreal and magical moments of my life.” 4. Grouville, Jersey Grouville, Jersey Visitors to Grouville, Jersey, have the opportunity to complete a ‘moonwalk’ across the seabed. During the guided walk, you’ll see star-like shapes of luminous green at low tide. But in just a few hours, the ocean will return to its regular form, as the water covers your footprints. You can book the tour here . 5. Norfolk Video Loading The Norfolk coast is one of the better-known coasts for witnessing bioluminescence. Our top tip to make sure you see the glowing plankton is to gently touch the water, or throw a small stone in. This minor disruption causes the plankton to emit light.
[Skip to Content] * Required Fields Member Area Login Forgotten Password? Forgotten password Parallels and contrasts between Greece and Germany Parallels and contrasts between Greece and Germany How a serial defaulter became a model nation  by Chris Golden and Con Keating Wed 1 Apr 2015 Imagine a country that finds itself so heavily indebted that it cannot adequately repay its creditors. The debts were incurred by a previous government, largely as a result of non-productive, profligate spending.  The country’s best efforts in trying to repay its debts led to deep recession and great social unrest. This debt was renegotiated on more than two occasions and very significant debt write-downs applied, with the remaining debt to be paid over a stretched-out period. A later government defaults entirely on the debt, but still manages to lead the country into deeper and deeper problems. This sounds like a description of how Greece got into a debt mess – and a prescription for how to clean it up. In fact it describes the position up to the 1953 debt restructuring for Germany, one of the 20th century’s most notorious serial defaulters among sovereign nations, with one of the worst inflation records and a penchant for changing its currency. Germany’s record of international co-operation was cataclysmic. But with the help of debt relief agreed with a ‘troika’ of international lenders at the 1953 London debt conference, Germany put its house in order. It became an international success story and a model nation. The clearest parallel between Greece today and Germany in 1953 is that neither has a good track record. Germany was seen as a hopeless case, as Greece is accused of being today. The second important parallel is that, without a complete and generous renegotiation of all of Germany’s debt in 1953, the country would have become quickly insolvent. The same holds true of Greece today. The only solution that will lead to a better future is to renegotiate all of Greece’s debt in a spirit of generosity, treating Greece as an equal partner and requiring solely payments that can be afforded reasonably easily. There are two key differences between Germany  62 years ago and Greece today. First, Germany, even as a serial defaulter, had a track record as an industrial powerhouse, which gave creditors some confidence that they would eventually be repaid, albeit at a much lower rate than anticipated when they bought German bonds. The second difference is geopolitical. Germany was an occupied country. Its viability as a buffer state shielding the rest of western Europe from Soviet domination needed to be bolstered. A viable (West) Germany was essential to the US and Nato strategy of containment. Notwithstanding the geopolitical sensitivities about Greece’s position in a volatile part of southeast Europe, the country is not in the same acutely vulnerable circumstances as was Germany eight years after the end of the second world war. During that time of uncertainty at the beginning of the cold war, Germany amassed even more debt than in 1945, more than doubling the total. A syndicate of 31 creditors was formed to find a solution. Negotiations ensued in London with a troika representing all creditors. After two years, a satisfactory compromise was found, involving reducing the amount of the debt by about 50%. It was payable over 30 years with reduced interest rates and a grace period of five years in which no principal would be repaid. Debt repayments were limited to 3% of export revenues in any year. Where Germany felt it could not meet those sums, it had recourse to arbitration. There were a number of contingent repayments. For example, German reunification in 1990 triggered the repayment of interest accumulated up to 1953 after Hitler’s default in 1934 on the Dawes loan of 1924 and the Young and Kreuger loans of 1929. The 1953 settlement gave the Federal Republic an exemption on repayment of East Germany’s debts. They became repayable on reunification in 1990, in the form of 20-year bonds which matured and were repaid in 2010. There were further contingent reschedulings, including debts of the state of Prussia, which will be renegotiated if and when the lands in question are reunified into Germany. These negotiated contingency plans could be similar to various ideas for Greek rescheduling put forward by the Athens government, which has suggested repayments linked to GDP growth – assuming that the Greek economy eventually turns the corner. All these aspects depend on one crucial issue – trust – at present singularly lacking between Greece and its lenders. A minor source of solace for Greece may be that, at the London conference of 1953, this was a factor in gravely short supply – and yet, as it turned out, this did not halt an eventual accord. Chris Golden is Chairman of three standing Commissions of the European Federation of Financial Analysts Societies. Con Keating is Head of Research, BrightonRock Group. This is an abridged version of an analysis of the 1953 debt conference that will appear in the OMFIF April Bulletin. It is the second of two articles on aspects of German history commemorating the 200th anniversary of Bismarck’s birth. Tell a friend View this page in PDF format
Meaning of Options By Research Desk about 3 months ago Options are a financial instrument which offers an investor the right to either buy or sell an underlying asset at a price agreed upon by the buyer and seller at a predetermined date. Option does not create an obligation on the buyer or the seller and can be exercised at their own will. This freedom to exercise the right at one’s discretion comes at a cost known as ‘premium’. The price at which the contract is called upon is the ‘strike price’. The premium is a non-refundable upfront deposit which gives the trader the right: • Right to buy a security at a certain strike price is known as a Call Option. • Right to sell a security at a certain strike price is known as a Put Option. Options are usually used by investors to leverage or hedge their positions. They can help investor protect one’s portfolio in a volatile market but the process of trading in options is very complex compared to trading in normal cash segment. It involves good understanding of trading and investment philosophy and constant monitoring of the fluctuations in the stock prices. An example of Nifty Call option Mr. A buys Nifty 11,500 call expiring 27 December 2018 at Rs. 100 a share, with 75 shares making a lot. Nifty expired at 11,750 making the option in the money Rs. 150 (after deducting the premium paid by buyer). In this case the seller is obliged to sell Nifty to buyer at 11,500 even when the index is 11,750. End result is the buyer makes a gross profit of Rs. 150 per share or Rs. 11,250. In the above case, if Nifty would have expired at 11,300, the buyer would have not exercised the call, as it is out-of-money (he would end up with loss on execution). On expiry date, Nifty is settled in cash by the buyer and the seller. Option Buyer is the holder of the ‘Call Option’ which gives the right to the buyer to buy the underlying asset at the strike price on or before the expiration date. They are usually the traders who believe that the stock price will rise above the strike price plus the premium paid. The Option Buyer can also hold ‘Put Option’ which is the right to sell the shares at a strike price on or before the expiration date. Option buyers believe that the stock price will fall below the strike price and the premium amount paid. In cases where the stock prices rises in opposition of their expectations, these Put Option traders will only lose the amount paid as a premium, restricting the loss. Option Seller is the person who sells the call or put option. They take an obligation to sell the underlying asset to the buyer at a predetermined rate, only if the buyer wishes to exercise his option. There are usually two forms of Option Sellers: 1. Covered Calls: In this case, the option seller owns the underlying asset. The investor is basically selling the right to an equity already owned by him. If the buyer of the option decides to exercise his right, then the seller will have to sell the stock at the predetermined strike price. 2. Naked / Uncovered Calls: In this case, the Option seller or the Option writer does not own any shares of the stock which is linked to the option. This strategy involves huge risk and is pure speculation. It can also be the most profitable, if the stock price does not breach the strike price in the specified period, these option sellers earn huge premiums. Popular Comments
10 Simple Tips And Tricks For Planting A Vertical Garden People of today cannot enjoy living surrounded by any conventional garden. New real-estate and buildings are designed with a built-in vertical garden to save space. Plants and other greenery use carbon dioxide and water to make solar energized foods. In the process, plants produce oxygen required for respiration of all. Plants also remove pollutants from the air and reduce the heat. Vertical gardens are grown upwards using trellis, fences and other supporting systems. These vertical gardens commonly created on the fencing will add privacy to home and front/back yard. The main structure of the vertical garden is a three-layered framework. The wall should be covered with ceramic tiles for easy maintenance. A plastic framework is fitted with studs such that there is a cavity left behind for cleansing. The irrigation pipeline should produce lateral running water for drip irrigation. The pipe should be inserted from the rear side over the basic framework that holds rows of plastic pots and plastic frames. Another method of Vertical gardening is the use of DIY kits. These comprise of small containers arranged in neat rows facing vertical support. Typically, these containers are filled with soil and fertilizers ready for the seeds. After placing the seeds, carefully water them till they germinate into small saplings. One can add a series of rows to cover the vertical surface of the wall. The main objective of vertical gardening is that plants should grow vertically and not outwardly. People have to use scaffolding, shelving system and other methods. One has to create flat surfaces at various intervals along the vertical axis to grow plants in pots. Here, we have discussed step-by-step methods of how to set up a vertical garden within your premises. { 1 } Choose a Wall For Your Vertical Garden Choose A Wall For Vertical Garden Vertical Green Wall With Planting Crates By Lulu and Isabelle/Shutterstock First and foremost, vertical gardeners have to select the most appropriate wall for creating a vertical garden. This could be the wall of the fence, vertical wall of one’s home including the wall in the living room. Interested in flowering plants means one has to ensure the vertical garden gets morning sunshine for many hours. Make four sets of eight crates using four stacked crates divided into two segments. Place two of these sets one on top of the other. Leave some space and again place two of the sets one on top of the other. Use these crates to hold trays or pots of plants in soil and fertilizer. On the top crates, plant flowering plants that require maximum sunshine for most of the day. Below, plant leafy ones such as the common English Ivy and other green foliage. In the lower crate, plant mostly leafy plants and add some flowering ones too. One can plant climbers, flowering plants and decorative plants. One has to keep in mind to maintain the symmetry to make it pleasing to the eyes. { 2 } Waterproof Your Wall Waterproof Your Wall Waterproof Pockets For Vertical Herb Garden Wall By Del Boy/Shutterstock You do not wish to damage the vertical wall due to dampness and cause mold. Hence, ensure you use plant holders made of “water-proof” material and arranged tilted. Several vertical rows of these water-proof pockets hang adjacent to each other maintaining small space. These water-proof containers are held by similar water-proof material too. { 3 } Consider Sun And Shade Consider Sun And Shade Beautiful Refreshing Outdoor Vertical Garden By Appleyayee/Shutterstock The vertical wall can be one of the inner walls of the living room. Ensure you get enough light for flowering plants. However, if the wall is not exposed to lots of sunshine, you can plant indoor ones. Also, you can use plants that thrive in less sunshine and yet produce pleasing flowers of different hues. In your living room, you can use your cozy sitting arrangement right in front of the vertical garden. It adds beauty and absorbs toxins making your home healthy to live in. { 4 } Decide Your Watering Method Decide Your Watering Method There are several watering methods to choose from. The most common method is using the watering can when it is poured from above. Water from sprinklers can also be used for watering the containers of plants from the rear side. { 5 } Choose Your Plants Carefully Choose Your Plants Carefully Vertical Hydroponics Garden on Bamboo Wall By Jajaladdawan/Shutterstock Selecting the right plants for the vertical garden is extremely important. Plants are sensitive to the amount of sunlight, water and nutrient soil and fertilizer provided for growth. You can opt for growing leafy vegetables such as different varieties of Lettuce or flowering plants that require moderate sunlight. Always plant those species that require most sunlight on top of others. { 6 } Add Mulch or Fertilizer Add Mulch or Fertilizer The soil is often insufficient so adding “Mulch” or Fertilizer is essential to fortify the required nutrients. As a result, the plant grows healthy and well even in the minimum container for vertical gardening. { 7 } Water Regularly and Wisely Water Regularly and Wisely The new sapling requires special care and nurturing. As a vertical gardener, one should water the sapling regularly and wisely. Water the plants when the soil is partially dry. Overwatering causes damage and rotting of the roots causing death to the plant. { 8 } Add Stakes to Help Plants Grow Vertically Add Stakes to Grow Vertically The main aim is to grow the sapling into a plant for vertical growth. It is advisable for Vertical gardeners to use stakes to make the plants grow vertically. Place four stakes at four corners inside the pot of the plant. Use twine and tie the four-cornered stakes. Ensure the plants are growing towards the tied stakes. { 9 } Place Plants Requiring Less Water on Top Plants Needing Less Water On Top Beautiful Plants In Vertical Garden By 7th Son Studio/Shutterstock After the plants have become healthy and steady, you can start decorating the vertical garden. You can hang the plant plastic pots on the vertical wooden or plastic frame. Ensure you place plants requiring less water on top. This is because those plants would not require watering every day. { 10 } Get Creative With Your Planters Get Creative With Your Planters Creative Plastic Bottle Planters For Vertical Garden By Jeerayut Rianwed/Shutterstock You can get several planters at a time and use each of them creatively. You can use each planter to plant two different plants or two similar plants. Then you can hang all them with a long thread to reach various heights. These would help in creating a new special design. Alternatively, you can use different objects like used plastic bottles, tin cans, wood crates, etc. creatively as planters too. Simply buying colorful planters or doing some DIY painting on your simple planters can also make them look attractive and appealing. • Facebook • Twitter • Google+ • Linkedin • Pinterest
Monday, November 4, 2013 Kinder in the Library I think there is a special place in heaven for Kinder teachers.  I once saw a sign at a craft show that said "Teaching kindergarten is like trying to herd grasshoppers".  I would be lying if I said that I didn't have a little panic attack right before each of my 6 kinder classes come into the library every week.  I see them once a week for 30 minutes which includes story time and checkout.  I hate to admit this but when I first became a librarian, 5 minutes before my first kinder class came for the week, I would look quickly around the library and chose a book at random to read to them.  There was no rhyme or reason to what I picked.  It was just something to get me through those 15 minutes.  I am happy to say that I no longer do that.  Thanks to one of the other librarians in my district that I was mentoring one year (however I think I actually got more from her than she got from me).  She was new to our district but had been a librarian way longer than I had.  She showed me the journals that she does with some of her grade levels and something clicked for me.  I could do this with Kinder!  Each one of my kinder students has "My Library ABC Journal".  It is a journal from A to Z with a book and activity for each letter.  It stays in the library all year long.  Each week we do a letter in the journal and at the end of the year they get to take it home to remember all the great books we read that year.  They really enjoy seeing how at the beginning of the year their "writing" is mostly pictures and maybe the beginning sound of a word but by the end of the year they are writing sentences.  It is fun to see their excitement each week as they try to guess what letter we are going to do that week.  And I feel better knowing that I have a focus for my lessons using our state standards and really great books. What are things you do with kinder in the library? 1. Do you choose your books based on the topic that is on the ABC page? Like, maybe Pete the Cat for C is cat? Or is P for Pete the Cat? I love this idea! 2. @ Mrs. Alli - yes, I match the book to the letters but usually it is more choosing the books first and then deciding which letter I can make work. Some start with the title like the B book was called "The Wonderful Book" other times it might be something within the book or like this year I did I for Illustrator and we used the wordless book "Chalk". I always put the cover of the book on the page so they can go back and remember the title. 3. Here is the link to the journal in my TPT store...
Can the flu permanently damage your sense of smell : Can the flu permanently damage your sense of smell : Can the flu permanently damage your sense of smell : Can the flu permanently damage your sense of smell : The flu can damage your sense of smell. Fortunately, this is usually not permanent, though it may take it a while to return. Often, whether or not you regain your sense of smell depends upon the underlying cause. If extensive damage is done to your nasal nerves, it is more likely that the condition will be permanent. The medical term for a complete loss of smell is anosmia, while a partial loss of smell is called hyposmia.  Typically, anosmia is not an indicator of a serious condition. However, because the sense of taste and sense of smell are closely related, anosmia may mean that you lose interest in eating, and as a result, lose too much weight. Therefore, you fail to get the important nutrients your body needs.  Anosmia affects 3 percent of the adult population over the age of 40, and the incidence increases with age. For those over 60 years of age, the rate rises to as much as 22 percent. Reasons for loss of smell: Any condition that obstructs your nasal passage or flow of air through your nose can cause you to lose your sense of smell.  These conditions include: Common cold Chronic congestion Nasal polyps There are also neurological conditions that can cause anosmia. Although uncommon, the olfactory center of the brain the part used for processing the sense of smell can be damaged by: Alzheimer’s disease A brain tumor Head injury Exposure to harmful chemicals such as insecticides Certain medications Zinc-containing nasal sprays (these have been taken off the market)  How can we help you : Ent surgeons who have extensive expertise and can implement a plan to help you. The course of care depends upon the underlying cause. For example, if your problem is caused by chronic sinus infections, then we will create a treatment plan to help you. In cases like this, your sense of smell should return at some point after the underlying problem is resolved. If your anosmia is due to an underlying neurological condition, the good news is that your olfactory (sense of smell) nerves can regenerate, although it cannot be predicted when or to what extent. There’s also a large difference in the rate of regeneration among different individuals—for some it may take days, while for others, it may take years. There are some treatments available, and we’ll be happy to discuss if one of them is right for you. Dr. Mamatarani Rout ENT Consultant. (Otolaryngologist MBBS, DLO (ENT). Posted on: February 4, 2019harshent Leave a Reply
Violent winds topple stone pillars at Taj Mahal complex Violent winds topple stone pillars at Taj Mahal complex Violent winds topple stone pillars at Taj Mahal complex A violent storm has destroyed two ancient pillars at the entryways to the Taj Mahal, an official said April 12, underscoring the fragility of the centuries-old marble monument to love. The four-meter high sandstone minarets topped by ornate spires were left in chunks after being felled by strong winds late April 11. None of the four white marble minarets surrounding the Taj, or the spectacular shimmering mausoleum itself, were damaged in the storm, authorities said. Tourists often get their first glimpse of the Taj, a UNESCO world heritage site, through the royal gate, a grand fortress-like entrance made largely of red sandstone. It was flanked by two imposing minarets before the storm brought one crashing down. Footage showed the stone pillars lying in large broken pieces, the distinct spire still intact but separated cleanly from the shaft. Nobody was injured by the falling steeples, authorities said. Mughal emperor Shah Jahan built the Taj Mahal as a tomb for his beloved wife Mumtaz Mahal, who died giving birth in 1631. The Taj, one of the world's most popular tourist attractions, is beset by problems from air pollution yellowing the marble to insects leaving green stains on its rear wall. Efforts to restore its grandeur have dragged into a fourth year, with scaffolding marring the view for the 10,000-plus tourists that visit the 17th-century mausoleum every day. Work is yet to begin on its main dome, with authorities concerned about how to proceed with handling the fragile centerpiece. The Taj has attracted world leaders and royalty, including former US President Bill Clinton. Diana, the late British princess, was famously photographed alone on a marble seat there in 1992. taj mahal, india, winds
Judaism is one of the three major monotheistic religions, and the oldest. It is founded on the belief in one God, who gave His laws to the Israelites. Judaic law is mainly found in the Torah, which refers to the Five Books of Moses - Genesis, Exodus, Leviticus, Numbers, and Deuteronomy - and in the rest of the Jewish Bible, known to Jews as the Tanakh and non-Jews as the Old Testament. Besides the Five Books of Moses, the Tanakh includes books about different prophets, prophecies, as well as Psalms, Proverbs, and other stories relevant to the laws. Along with the Torah, the Talmud and Midrash are also important in the study and understanding of Jewish law. The Talmud is a collection of rabbinic discussions and debates on the law, and the Midrash is a collection of rabbinic stories and interpretations based on the law and stories found in the Tanakh. The Talmud examines the law in greater depth, considering different elements and commenting on specific application. The Midrash studies and attempts to answer questions raised, but not answered, by the text. Elements common to all synagogues: 1. The Aron HaKodsh (Holy Ark) - often the most defining part of the synagogue, found at the front of the synagogue, usually ornately decorated, with Hebrew writing around it. The ark houses the Torah scrolls, which are removed during the service to be read. This ark symbolizes the ark carried by the Israelites through the desert, which held the tablets of the Ten Commandments. 2. Torah scrolls - Torah scrolls are hand-written on animal parchment by a scribe specially trained for the task. Because of the time-consuming and exacting process of writing out the Torah scrolls, it can take up to a year to complete one scroll, and they are usually very expensive, but thanks to the quality, they can last for hundreds of years. 3. Bimah - elevated platform or podium from which the Torah is read or service is led. 4. Ner Tamid (Eternal Light) - a light found above the Ark which is always lit, symbolizing the eternal presence of God. 5. Menorahs - seven-branched candelabra, usually found on either side of the Ark, which symbolize the six days of creation and the Sabbath day. 6. Memorial markers - either on the walls of the synagogue or to the side, these markers have name plaques on them, each with a small light next to it, to commemorate members of the congregation who have died. The lights are lit on high holidays and/or during the month or week that the person died. Most synagogues, although perhaps not all, will also have prayer shawls (Hebrew - tallit) and skull caps (Hebrew - kipah, Yiddish - yarmulke) available for members of the congregation who may not have their own. Besides the Ark, synagogues are not usually elaborately decorated. There may be symbols of the 12 tribes of Israel or certain symbols important to the Jewish faith, but there will not be any statues or paintings. There are few physical features that can distinguish Orthodox, Conservative, and Reform synagogues from each other. One of the only distinguishing features is found in Orthodox synagogues, where there is separate seating for men and women, with sections either separated by a banister or railing or, sometimes, different levels. The true differences between these three movements of Judaism come in how they understand the origin, flexibility, and adaptability of the laws given in the Torah. Click the thumbnails for larger images. Photo by Rebecca Krieger unless otherwise noted. Bimah and Ner Tamid The Bimah and Ner Tamid of Reform Congregation Oheb Sholom, Wyomissing. Prayer caps and shawls provided for members of Oheb Sholom Caps and prayer shawls provided by Oheb Sholom for their members. Holy Ark, Bimah, and menorahs The Holy Ark, Bimah, and menorahs at Kesher Zion in Reading. Holy Ark at Kesher Israel The Holy Ark at Kesher Israel in Harrisburg. A memorial marker at Kesher Zion A memorial marker at Kesher Zion. The lights next to each name are lit to commemorate the anniversary of the person's death. Stained glass window of stone tablets at Kesher Zion A stained glass window in Kesher Zion that depicts the two stone tablets on which the Ten Commandments were originally written. Pages in this Section:
The Primordial Light of Genesis The primordial light and darkness can be understood as a parable for good and evil. Clues: God creates light, and although in our physicality darkness is the absence of light, which we know to be made of distinct quanta, the “darkness” seems, according to the plain meaning of the text, to be an entity unto its own, and even once the  light is created, the light and darkness are still mixed up to the extent that God has to “separate” the two, and He describes the light as “good.” Throughout the rest of the Torah, darkness and light are metaphors for good and evil. The difference between the two is as stark and defined as the difference “between the holy and the profane, the Sabbath and week, and Israel and the nations.” However, in this world, we have the chance to morally obfuscate, to lose our moral compass, to mix the light and darkness. We are therefore bidden to recognize and sanctify these distinctions, and this is what Abraham stood for. Our sages used the imagery of the chaos that existed before the creation of the light to describe world history before the advent of Abraham, who endowed the  world with moral clarity. Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
Cataract - Symptoms What are the symptoms of a Cataract? The most common symptoms of a Cataract are: • Cloudy or blurry vision • Colors seem faded • Glare with oncoming Headlights or when driving at night/li> • Lamps, or sunlight may appear too bright • A halo may appear around lights • Poor night vision • Double vision or multiple images in one eye (This symptom may clear as the cataract gets larger.) • Frequent prescription changes in your eyeglasses or contact lenses Cataract surgery was invented in India!! Circa 600 years BC the Indian sage Sushrut, in his textbook described cataract surgery with local anaesthesia in the days when the rest of the world were climbing trees and huddling in caves! He also used plastic surgery techniques including forehead flaps and described over 300 surgeries in all. The Arab doctor Shams UdDeen, described Glaucoma hundreds of years ago and spoke of Cataract as white water in the eye or “maiabiyat” a term still used today in the middle east. The words Cataract Surgery, inspire anxiety and denial in people, mostly because they are ill informed about the disease and its treatment. If we are fortunate enough to live to a ripe old age, we will develop cataracts. For indeed the most common type of cataract is part of a natural process of ageing. A cataract is simply opacification or clouding of the human lens in the eye so that light is not focused properly on the Retina leading to a blurred image. The most frequent symptoms of Cataract are: Diminished vision and glare – In the early stages only distance vision may suffer or the oncoming headlights at night can cause unbearable glare. As it progresses reading vision can suffer along with a change in spectacle number. People who were forced to wear reading glasses will find that they can go without them. This is called Second Sight and indicates the formation of a Cataract. Sometimes because of swelling of the cataract the pressure in the eye goes up and the patient complains of mild heaviness or headache. Cataract can develop at any age. Newborns can have cataract due to infection in the womb commonly due to rubella. Young children can develop cataract due to metabolic imbalances and infections for eg. the inability to digest milk is sometimes associated with cataract. Any blow to the eye in play and even severe malnutrition can lead to cataract in childhood. The use of steroid containing skin creams for months, putting steroid anti allergy eye drops for a long period of time and exposure to sunlight can cause cataracts in the 20-40 year age group. Cataract is seen in glassblowers and in foundry workers due to infrared rays and so its advisable to have protective dark spectacles in these professions. Diabetes, other eye diseases, Glaucoma and even any eye surgery or retina detachment lead to Cataract. Anytime there is an internal eye disease, Cataract is the likely result! In old age the most common type of Cataract called Senile Cataract is seen. This is because the proteins in the human lens congeal and coagulate like the egg white in a frying pan leading to a whiteness. Finally, exposure to radiation for eg. Nuclear power plant technicians and people undergoing radiotherapy for cancer of the head and neck are likely to develop Cataract. Copyright © Dr. Cyres Mehta 2014. All Rights Reserved | Site Designed & Maintained by Goradia Infotech
The Alberta government has launched a $36 million rebate program for the installment of solar generated power in households and commercial establishments. This initiative aims to reduce the cost of solar energy in Alberta and is expected to generate approximately 900 jobs in Alberta for the solar sector. "It's going to help the solar industry grow, which is very important because long term plans need to have a huge amount of solar in it," said Gordon Howell, professional engingeer with Howell-Mayhew Engineering. "The industry has been growing at 95% per year for the last seven years, but we still have a long way to go to catch to where the rest of the world is." Approximately 99% of Canada's solar electricity is in Ontario. The installation of rooftop solar panels for homeowners, businesses, and non-profit organizations could be as early as summer. This rebate will cut solar installation cost by 30% for homeowners and 25% for businesses and non-profit organizations. "This is a way to help reduce the cost of installation," Howell added. "It helps to grow the market, but it also reduces the cost because the industry is larger, there is more competition, and there is more people actively working so that makes the warehouses and installers busier so there is less overhead and cost to the customers." Solar power reduces greenhouse gas emissions primarily from coal and methane fired generating plants. The initiative is projected to reduce greenhouse gas emissions in the province by a half million tonnes. This is equivalent to removing 100,000 vehicles from the roads. "It creates a lot of ideas for people to create more innovative things like starting to manufacture solar or racking systems in Alberta because the market is growing," said Howell. "Ontario put in a very large solar program for the sole purpose of helping their industry grow so they can serve the world and you do that always by having a local market to begin with." A third party contractor will oversee the program that is predicted to have 10,000 solar panels on the rooftops of Albertans by 2020. More Local News Mayor Impressed with 20/20 Challenge Response Kilo of Kindness Helps Food Bank Search the Biz Guide
ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel Sandro Botticelli: Primavera Updated on April 5, 2013 Primavera (Spring) is an Early Renaissance painting by Sandro Botticelli. Painted in 1482 it has become one of the most popular paintings in Western art. The meaning of the painting is still widely debated. Botticelli's painting was most likely commissioned by a member of the Medici family, which member of the family though is not certain. It was first written about and seen at the villa of Lorenzo di Pierfrancesco de' Medici at Castello. Recently though scholars believe it may have been first placed at Lorenzo de' Medici's town house in Florence, only later to appear at the Castello. Castello was also home to The Birth of Venus, Botticelli's other famous painting. Sandro Botticelli Little is known about the early life of Botticelli, but he was born in Florence in 1445 with the name Alessandro di Mariano di Vanni Filipepi. He would more commonly be known as Sandro Botticelli. Botticelli, meaning little barrel, was a nickname given to his older brother that was also passed on to him. At the age of 14 he began an apprenticeship as an artist. This took him off the course of being a goldsmith, which was set by his older brother. It's believed that by the age of 17 Botticelli had begun an apprenticeship under the the painter, Fra Fillipo Lippi. With a master like Lippi, Botticelli learned about the finer details in painting, and he learned how to create more intimate expressions in his art. By the age of 25 Botticelli had opened his own workshop and began taking commissions. In 1481 Botticelli headed to Rome under orders from Pope Sixtus IV to fresco the walls of the Sistine Chapel. After a successful visit to Rome, Botticelli returned to Florence and began working on a printed version of the Inferno by Dante and eventually on Primavera. Painting Info Sandro Botticelli Florence Italy Year Painted Art Movement Early Renaissance Type of Painting Tempera Panel Painting 203 x 314cm On Display Uffizi Florence Italy Looking at the Painting From Right to Left the following people can be seen in Primavera. All the way to the right, the blue green thing is Zephyrus, also called the west wind, he has his hands on Chloris a nymph. To the left of Chloris is Flora, the Goddess that Chloris transforms into. At the center of the painting is Venus and above her with the bow and arrow is Cupid. The three women holding hands in a circle are the Three Graces. Finally, the man all the way to the left is Mercury. From Right to Left The primary reason why the people are listed from right to left in the above description is because that is the most commonly argued school of thought in regards to this painting. That school believes that Primavera are series of episodes that move from left to right across the painting. Chloris, Flora, and Zephyrus Looking at Chloris and Zephyrus, Chloris looks surprised and afraid as she is grabbed from behind by Zephyrus. According to the story, Zephyrus transforms Chloris in to Flora, the Goddess of Spring. The moment Chloris is transformed into Flora, flowers emerge from her mouth, which is depicted in the painting. Flora who is believed to be standing to the left of Chloris and Zephyrus is the completely changed, and new form of Chloris. Flora wears a dress with lots of flowers and a reef around her neck, both symbols of Spring. Venus is the Roman God of love and beauty. In this painting she stands at the center and above her flies Cupid, who is blindfolded while armed with his bow and arrow. Venus's belly is swelling, which suggests she is pregnant. Behind her is a myrtle plant which represents sexual desire. Birth and love are two commonly associated images with Spring, which is why Cupid is in the painting, and that's why Venus is in the painting and pregnant. There placement in the center may be suggesting that love is the heart or the center of Spring. Mercury and The Three Graces The Three Graces existed both in Greek and Roman mythology and usually represented charm, beauty, and creativity. In the painting they are seen holding hands with one another; two face the viewer while one has their back turned, this is the usual grouping of the Three Graces. Mercury is the God of Trade, who is usually depicted as a messenger. Mercury takes a very masculine and heroic pose and is also seen carrying a sword. His hand that is pointing towards the sky is removing a cloud from the scene, which presumably would have hidden the entire painting from the viewer. Flowers and Plants The flowers and plants that surround the figures in the painting help bring a fantasy like landscape for the people in the painting to exist in. The plant life is painted in a naturalistic style and great attention to detail can be observed. Over 500 identified species of flowers and plants have been documented in the painting. Legacy and Meanings Other interpretations to the work have said the painting is a documentation of the seasons from February (Zephyrus) to September (Mercury). Some interpretations argue that the painting is about Neoplatonic love. Despite the numerous interpretations out there, these are only a few, there almost always seems to be an underlying idea that ideals cannot be realized in this painting. The removal of the clouds from the scene, the transformation of Chloris into a beautiful Goddess, the pastoral background which goes above and beyond what was expected at the time creates ideals that are other worldly. These are ideals that can not be realized in our world, and that is something that can be argued is underlying to all possible interpretations of this painting. Additional Information About Medieval and Early Renaissance Paintings Giotto Bondone: The Lamentation of the Death of Christ Bondone's Lamentation of the Death of Christ is one of 37 different fresco scenes painted by Bondone for the Scrovegni Chapel. Bondone is able to convey emotions in greater detail than his predecessors. Giotto is widely regarded today as the first artist in a line of great Italian artists that would make up the Italian Renaissance Rogier Van Der Weyden: Descent From The Cross This article focuses on the Flemish painter's life and arguably his most famous painting Descent From The Cross. Van Der Weyden pays tribute to the crossbow guild that commissioned him in the painting by featuring several hidden crossbow images. Hugo Van Der Goes: Portinari Altarpiece The Portinari Altarpiece is an Early Renaissance painting by Flemish painter Hugo Van Der Goes. The painting depicts a Nativity scene focusing on the Adoration of the Shepherds on three panels. Jan van Eyck: The Arnolfini Portrait The Arnolfini is one world's earliest oil paintings and is arguably one of the earliest examples of a genre painting. With this painting Jan van Eyck helped to encourage the trend to make more realistic looking paintings. 0 of 8192 characters used Post Comment • Music-and-Art-45 profile imageAUTHOR 6 years ago from USA, Illinois Hello DafodilSky thanks for reading and voting up. I envy your visit to this painting in Florence, I hope to make a trip there at some point in my life. I have not read the Botticelli Secret, but I'm going to look into it now that you've mentioned it. • DaffodilSky profile image Helen Lush  6 years ago from Cardiff, Wales, UK One of my favourite paintings - lucky enough to have visited it in Florence and also the Medici Villa at Castello. Have you ever read an insane but very enjoyable book called "The Botticelli Secret" by Marina Fiorato? The symbolism in this painting is the key to the story...voted up. • Music-and-Art-45 profile imageAUTHOR 6 years ago from USA, Illinois Hello forbcrin thanks for stopping by, I like your statement its very musical, I think that describes the painting perfectly. • forbcrin profile image Crin Forbes  6 years ago from Michigan I was born in Spring and the first time I saw La Primavera I fell in love with it. I don't know why. The body types are not my favorite, but there is something in the general air of the painting... It is also very musical to me. This website uses cookies Show Details LoginThis is necessary to sign in to the HubPages Service. AkismetThis is used to detect comment spam. (Privacy Policy) Google AdSenseThis is an ad network. (Privacy Policy) Index ExchangeThis is an ad network. (Privacy Policy) SovrnThis is an ad network. (Privacy Policy) Facebook AdsThis is an ad network. (Privacy Policy) AppNexusThis is an ad network. (Privacy Policy) OpenxThis is an ad network. (Privacy Policy) Rubicon ProjectThis is an ad network. (Privacy Policy) TripleLiftThis is an ad network. (Privacy Policy)
Alfalfa Leafcutter Bee Facts General Facts: Megachile Rotunda or Alfalfa Leafcutter Bee belong to the family Megachilidae and are members of the Megachile genus. Leaf cutters are non-agressive, non- colonizing solitary bees that Pollinate alfalfa, gardens, and flowers. They are fuzzy with thin yellow/gray stripes down the abdomen and the underside is gray. They are small; about 1/2 the size of a house fly. What do Alfalfa Leafcutter Bees Pollinate? They are generalists; meaning they don’t stick to certain blossoms, they pollinate whatever they find and like. They pollinate most blossoming garden vegetables and various flowers including: alfalfa, blueberries, borage, canola, carrot, cranberries, crown vetch, hairy vetch, legume blossoms, melons, mint, onion, peas, sweet vetch, and many more. How Many Bees Do I Need? A single female Leafcutter Bee visits 100,000+ blossoms per day whereas a honey bee visits 50-1000. This means they pollinate 100% more effectively and efficiently than honey bees. As rule of thumb for a backyard garden is 1 bee per square foot. If you need help knowing what bees you need check out our step-by-step guide. Leafcutter Bees are summertime pollinators. They incubate for 23-28 days at  70*F and emerge(usually June- July), find a nest, mate, and begin pollinating. Once a nest is chosen they don’t travel more than 400 yards to pollinate, usually staying within 100 yards. Their average nesting season is 8-12 weeks, after which they die. If bees emerge soon enough in June sometimes a second generation emerges in August for extended crop pollination. There are 3 essential items for prime Leafcutter bee habitat:1. nesting place, 2. pollen source, 3. leaf source. 1. The best nesting place for Leafcutter bees are in reed tubes; they feel most natural to the bees and provide a far greater return than other products including wood blocks, straws, misc.tubes, and grooved boards. To read more about nesting materials click here. 2. They require a pollen source: alfalfa, canola, cranberries, onions, peas, blueberries, and various other vegetables and melons. 3. They prefer soft flexible plants to harvest leaves for nest construction: alfalfa, flower petals, clover, buckwheat, roses, and other plant species. Why Are The Called Leafcutter Bees? Leafcutter Bees nest in tunnel cavities/tubes where they lay their larva. They lay 8-15 larva per tube; each larva is separated into cells where the mother places collected pollen and nectar to feed her young. Each cell is separated by layers of leaves. The bee collects layers by chewing semicircles in leaves and flower petals, hence  the name “Leafcutter”. Holes are a good sign on your leaves! Once the tube is full the bee cements leaves together to plug off the entrance as a barrier against rain, predators, and parasites. She then moves on to the next tube. Storing the Bees: Once you receive your bees keep the in a cold place such as the fridge, garage, or cold storage; below 40*F (ideally 35*) so they stay in hibernation from fall to spring. Warning: if cocoons’ temperature exceeds 44*F for an extended period of time they will not hibernate properly; this may result in premature emergence and/or death. Keep the bees in  cold hibernation until outside temperature consistently exceeds 70*F; it is then time to place the bees in your bee house for releasing. You may also place summertime bees in the house in spring with he spring time bees and let mother nature take it from there. If the habitat is right roughly 80% will nest from where they emerge and the return of bees should be between 80-120% for next years pollination. Setting Up the Bee House Place house facing south- east. Leaf cutter bees are cold blooded and need the morning sun to warm them to begin flying. The bee house should be in secure place such as a tree, fence post, side of a house, barn, etc… Make sure the bee house is at least 3 feet off the ground to deter ants. If you have a lot of squirrels in the area you may want to squirrel proof the houses with chicken wire. Read more here. Take Down and Winter Prep: Magachile species require winter temperatures for successful emergence the following spring. In September- October (after the first frost) take the bee house down (or cover) and place until next spring. This will help keep parasites/predators away. if house is taken down early it can dislodge the larva from their food, be sure to store with the entrances up so larva remains in contact with their food at all times. This is the best time to replace used reeds and purchase new bees if needed. 104 Hole Laminate 104 Hole Laminate Comes with 2 reusable bands Cardboard backing so light doesn’t come threw the back Reusable year after year. Used for Leafcutter bees. Fits in the Apiary and Deluxe Bee Houses More Information on Nesting Material Click Here We ship through USPS Priority Mail, Monday to Noon on Wednesday. Special request call or email us at 801-648-9035 Leaf Cutter Bees 10 Tubes of Leaf Cutter Bees, +/- 100 bees Used in Garden and other summer time crops One set of Leaf Cutter Bees will pollinate about a 20X20 garden space. For more Information on Leaf Cutter Bees Click Here Common Bee House Common Bee House Mix of Large and Small Reeds +/- 120 For all Bees Mounting Bracket Instructions on how to set up Click Here
Posts filed under: Q and A Trigonometry does the trick here. Below is that line making a 42° angle with the positive x-axis. I’ve also drawn a dotted segment to make myself a neat little right triangle. Remember that slope is rise over run—how high the line climbs divided by how far it travels right. In this case, the dotted segment labeled a is the rise and the bottom of the triangle labeled b is the run. And luckily for us, the tangent function calculates that a/b ratio! Remember your SOH-CAH-TOA. Tangent = Opposite/Adjacent. Just use your calculator to evaluate tan 42°. You’ll get 0.90. from Tumblr You can make two equations here. First, you know the total number of marbles is 103, so: The second equation is more complicated, so let’s do it in parts. First, he gives away 15 red marbles, so he should have r – 15 left. He gives away 2/5 of his blue marbles, so he should have b – 2/5b = 3/5b left. So the ratio of red marbles he has left to blue marbles he has left (which the question tells us is 3/7) should be: The question asks how many blue marbles he had originally, so let’s substitute and solve for b. First get r by itself in the first equation: Now substitute that into the second equation and solve: from Tumblr This question comes from my own book, so my tips on how to deal with these can be found in the same chapter. The main key to getting it right is making sure you translate the words into math correctly. Note that although the question tells you that Tariq makes brownies and Penelope makes cookies, in the end it only asks about “treats,” so we can lump cookies and brownies together. Tariq makes 30 treats per hour and Penelope makes 48 treats per hour. Together, then, they make 78 treats per hour. We know they both worked for the same amount of hours. The other key to getting this right is keeping track of the units of the numbers you know. In this case, we have treats and hours for units. We know the number of total treats, and we know the rate of treats per hour. We want the number of hours. How do we set up the equation we need to solve? We need to divide the total number of treats, 312, by the number of treats they made per hour, 78. from Tumblr One gallon of honey weighs approximately 12 lbs. If one gallon of honey is mixed with 5 gallons of water to make tea, how many ounces of honey will be in each 8 fluid ounce cup of tea? Choices are 1, 2, 3 or 4. (Answer= 2) given: 16 oz = 1 lb, 128 fl oz = 1 gallon Wow, that’s going to be some really sweet honeywater tea. You’re making 6 gallons of “tea” (1 gallon honey + 5 gallons water = 6 gallons). Converting that to fl oz, you should have, in total, (128 fl oz/gallon)(6 gallons) = 768 fl oz. Therefore, a cup with 8 fl oz is 8/768 = 1/96 of the mixture. By weight in oz, the 12 lbs of honey you put in the mixture is (16 oz/lb)(12 lbs) = 192 oz. How may fl oz of honey will be in 1/96 of the mixture if 192 oz of honey are in the whole mixture? (192 oz)(1/96) = 2 oz PWN the SAT Parabolas drill explanation p. 325 #10: The final way to solve: If we are seeking x=y, since the point is (a,a), why can you set f(x) = 0? You start out with the original equation in vertex form, making y=a and x=a, but halfway through you change to y=0 (while x is still = a). How can we be solving the equation when we no longer have a for both x and y? For everyone else’s context, here’s the problem: Now, be careful! I am not changing to y = 0 in that algebraic solution in the back of the book; I am subtracting a from both sides! Note how the a term on the right changes from –22a to –23a. Draw this out. Start with the two points you’re given. from Tumblr Start with the second equation, which tells you that t = 4. If t = 4, then you can rewrite the first equation as follows (and solve): 4u – u = 18 3u = 18 u = 6 from Tumblr Choice A is the only one that works. Researchers in Australia experimented to determine if color of a coffee mug affects how people rate the flavor intensity of the coffee. Volunteers were randomly assigned to taste coffee in mugs: some white and some clear. If same type of coffee was used, researchers concluded that rating was significantly higher for those who drank coffee in clear mug. What can be concluded. A) Color caused the difference and can be generalized to all drinkers B)Same as A but cannot be generalized to all drinkers Volunteers are not a random sample, so the results cannot be generalized to all coffee drinkers. There may be something different about people who would volunteer for a coffee drinking study. For example, people who would volunteer for such a study might be more likely to drink a lot of coffee and thus consider themselves able to discern subtle differences in taste. Think of it this way: the g function is doing SOME AS-YET-UNKNOWN THINGS to (–x + 7) to turn it into (2x + 1). Of the simple mathematical operations probably at play here (addition, subtraction, multiplication, division) what could be going on? First, the only way you go from –x to 2x is you multiply by –2. So let’s see what happens if we just multiply f(x) by –2. –2(–x + 7) = 2x – 14 OK, so the first part’s good now, but how can we turn –14 into +1? Well, we don’t want to multiply or divide again because that would screw up the 2x we just nailed down, so why don’t we try adding 15? 2x – 14 + 15 = 2x + 1 Combine the two operations we just did (multiply by –2, add 15) and you have the g function. The function g will multiply its argument by –2, then add 15. Mathematically, we can write that like this: g(x) = –2x + 15 Now, start from the top and make sure we’re right. = g(–x + 7)             <– substitute (–x + 7) for f(x) = –2(–x + 7) + 15   <– apply the g function to (–x + 7) = 2x – 14 + 15 = 2x + 1 It works! Now all we need to do is calculate g(2). g(2) = –2(2) + 15 g(2) = 11 from Tumblr I have a question on practice question 7 in “Circles, Radians, and a Little More Trigonometry.” I solved it a different way, but I’m not sure if I was just lucky to get the correct answer. Basically, I figured that, because one radian is when the arc and radius are the same length, that radians are like proportions. So if arc RQ were equal to 6, it would be 6/6, or one radian. So then I divided π by 6 and concluded that’s how many radians it was. Does that actually work? Or was I just lucky? Yes, that 100% works. Nice thinking! Practice test 8 Calculator #13 First, you can plug in on this one, so if you feel rusty on your exponent rules at all, that’s a good move. Especially on the calculator section. Say, for example, that you plug in 4 for a. Just enter it all into your calculator (you may need to be careful with parentheses in the exponent depending on the kind of calculator you have): Now that you know x, plug 0.5 into each answer choice to see which one gives you 4. A) \sqrt{0.5}\approx 0.707 B) -\sqrt{0.5}\approx -0.707 C) \frac{1}{0.5^2}=4 D) -\frac{1}{0.5^2}=-4 Obviously, C must be the answer. To solve this algebraically, first start by squaring both sides. Raising a power to a power is the same as multiplying the powers, so that’ll get rid of the 1/2 on the left: Now raise both sides to the –1 power to get a truly alone. Remember that a negative exponent is the same as 1 over the positive exponent, so you can transform the right hand side from x^{-2} to \frac{1}{x^2} to finish the problem. A triangle’s base was increased by 15%. If its area is increased by 38%, what percent was the height of the triangle increased by? The easiest way to get this question is to plug in! Say the base and height of the original triangle are each 10. The formula for finding the area of a triangle is A=\frac{1}{2}bh, where b and h are the base and height, so the area of our original triangle is A=\frac{1}{2}(10)(10)=50. Increasing the base by 15% brings it from 10 to 10\times 1.15=11.5. Increasing the area by 38% brings it from 50 to 50\times 1.38=69. Plug those back into the formula to solve for the new height: If the original height was 10 and the new height is 12, then the height increased by 20%. Hi Mike, Here is a really confusing question from Applerouth’s SAT text: a = 1.5 x + 1.50 b = 1.25x + 4.50 In the system of equations above, a and b represent the cost, in dollars, of buying x buffalo wings at two different restaurants. What amount of money will get you the same number of buffalo wings at both restaurants? A) 12 B) 19.5 C) 20 D) 29.5 The answer is A. No idea how to do this. You have to find this by looking for the number of wings that costs the same at both stores, so set a and b (the costs at each store) equal to each other and then solve for (the number of wings that will make each store’s cost the same). 1.5x + 1.50 = 1.25x + 4.50 0.25x = 3 x = 12 Therefore, buying 12 wings at each store costs the same amount of money. The question appears to ask HOW MUCH money, so to finish the problem you need to plug 12 back in for x in either of the equations. I’ll do the first one: a = 1.5(12) + 1.50 a = 19.50 So the answer really should be B. The answer would be A if the question asked for the number of wings that cost the same at both stores, but that’s not what the question asks. One other note: it might make it more clear what’s going on to graph each line. What the graph below shows is that the price (on the y-axis) is cheaper at store a for up to 12 wings, but store b becomes a better deal for 13 or more wings. At the intersection point—12 wings, $19.50—the same number of wings costs the same amount at both stores. One way to make sure you get questions like these right is to plug in some values to see which equation makes sense. For example, you might choose to plug in 0 for h here because you know that at zero feet above sea level the boiling point should be 212° F. Choices C and D don’t give you 212 when h = 0, so they’re definitely wrong! Now plug in 1000 for h. We should expect the right equation to do what the question says—the boiling point should be (212 – 1.84)° F = 210.16° F. Which remaining choice, A or B, does that when you plug in 1000 for h? Choice A gives you a crazy low number: 212 – 1.84(1000) = –1628. Choice B does exactly what you want: 212 – (0.00184)(1000) = 210.16 So the answer is B. To get this without plugging in, you should think about the elements of the language you’re translating into math. You want to start at 212, and subtract 1.84 degrees for every thousand feet (h/1000), so you might write this to start: From there, a little manipulation lands you on the right answer choice: My recommendation, though: plug in. With a little practice you’ll get very fast at it, and then questions like this go from head scratchers to gimmies. from Tumblr
In Camouflaging the Chimera by Yusef Komunyakaa, what is the metaphor Komunyakaa has created with the use of the chimera in his poem custom essay [meteor_slideshow slideshow=”arp1″] Note that a chimera is is a creature from Greek mythology – a fire breathing monster. In Camouflaging the Chimera, what runs through the soldiers’ bones? What other images suggest that the speaker is merging with his surroundings? What does the speaker mean by his observation that “We weren’t there” in Camouflaging the Chimera? At the end of Ambush – from The Things They Carried by Tim O’Brien, about what does the narrator fantasize? How does the fantasy add to the meaning of the story? In Ambush, the narrator tells his story twice, a short then a long version. Why do you think the author chose this narrative device? (if one page not enough can add it up)
Renaissance/Reformation/Exploration Supplements Made for TruthQuest History Covers 1400-1600 Your children must understand the deep issues of this time period! It was such a crossroad! They will see two different responses develop to the spiritual emptiness of the late Middle Ages--an emptiness quite like that of our own age, so we can learn much. It was good for the people to seek truth, but where did they turn? Themselves? God? How did the 'searchings' of the great artists, scientists, mathematicians, architects, businessmen, writers, philosophers, rulers, and explorers affect their awesome achievements? This truth quest, and the decisions made in response, determined the future of many nations--those that were on their way to cataclysm and those headed for greater freedom. The issues are not Catholic vs. Protestant, as TruthQuest History explains, so people of both faiths can feel safe using this guide. We have three different supplements that can be used with the TruthQuest Renaissance/Reformation/Exploration textbook. We do not sell the TruthQuest textbooks, but they can be found easily doing a Google search or going straight to TruthQuest's webstore. What we do create and sell are the following supplements: 1. Binder-Builder Lapbook- See Sample Pages 2. Maps,Timelines, and Reports Pages- See Sample Pages 3. Notebooking Pages- See Sample Pages You recently viewed Clear recently viewed
Riders of the Purple Sage Study Guide Riders of the Purple Sage Riders of the Purple Sage by Zane Grey Riders of the Purple Sage Book Summary The events depicted in Riders of the Purple Sage occur in mid-spring and late summer 1871. Early in Riders of the Purple Sage , Jane Withersteen's main conflict is her right to befriend a Gentile. (The word Gentile means "non-Mormon" and is used a lot in the book). Jane Withersteen’s father wished Jane to marry Elder Tull, but Jane refused saying she did not love him, causing controversy and leading to persecution by the local Mormons. Jane’s friend, (cowboy) Bern Venters is "arrested" by Tull and his men, but is not clear under what authority. Jane defends Venters, declaring him her best rider. Her churchmen refuse to value the opinion of a woman: "Tull lifted a shaking finger toward her. 'That'll do from you. Understand, you'll not be allowed to hold this boy [Venters] to a friendship that's offensive to your bishop. Jane Withersteen, your father left you wealth and power. It has turned your head. You haven't yet come to see the place of Mormon women ...'" It is here we first hear of Lassiter. Ironically, at the moment when Venters mentions Lassiter’s name, the actual Lassiter is seen approaching in the distance by Tull’s men. Upon his arrival, Lassiter expresses his trust in the word of women, at which Tull rebukes him, telling him not to meddle in Mormon affairs. Tull’s men begin to take Venters away, and Venters realizes who he is and screams "Lassiter!" Tull understands that this is the infamous Lassiter and flees. Lassiter inquires as to the location of Millie Erne's grave, to which a transfixed Jane agrees to take him. Venters later tells Jane he must leave her. When she protests, Venters delivers this statement: " ... Tull is implacable. You ought to see from his intention today that ... but you can't see. Your blindness ... your damned religion! Jane, forgive me ... I'm sore within and something rankles. Well, I fear that invisible hand [of Mormon power in the region] will turn its hidden work to your ruin.", showing that Venters could see far into the future, and although Jane rebukes his statement, he is indeed correct. Jane’s red herd is rustled shortly afterward and Venters tracks it and returns it to Jane. Bern finds the herd, but, in his travels, wages a gun battle with two of Oldring’s rustlers, killing one and managing to wound Oldring’s notorious Masked Rider. Upon further examination, he removes the maskand shirt of the wounded rider and learns that the Masked Rider is a young woman named Bess whom he believes had been abused by Oldring. Venters experiences a large amount of guilt about shooting a girl and decides that it is his duty to save her. Venters discovers Surprise Valley and Balancing Rock, where he takes Bess, the girl he has found. Bess gradually gains health and begins to fall in love with Venters who begins to fall in love with Bess. Each explain their individual stories ambiguously, but through Venters' dedicated care for Bess, the pair forms a mutual love that leads to their resolve to marry. Bess also discovered the truth concerning Oldring’s rustlers, who rustled cattle only to disguise their true lifestyle of surviving off gold in the streams and business deals with the Mormons. Venters then determines that there is a need for supplies warranting a trip back to Cottonwoods. On his way, Venters sees Jane Withersteen’s prize horses being stolen. He kills the thieves and retrieves the horses for Jane, but unfortunately loses his horse, Wrangle. Jane’s horses are returned to her, and are locked in the entry hall to Withersteen's house. Venters officially breaks his friendship with Jane at this time. He goes into the village and proclaimed that he was breaking his friendship and leaving. After he leaves, Jane’s other herd gets stolen. Jane at first pretends to love Lassiter— knowing he came to Utah to avenge his sister Milly Erne — to prevent him from murdering Mormon elders she knew were guilty. The two characters grow to love each other. Then Jane's adopted daughter Fay is kidnapped and Lassiter kills Bishop Dyer while risking his own life. The four main characters— Venters, Bess, Lassiter, and Jane — realize that they can no longer safely stay in Utah. Lassiter convinces Jane to prepare to leave with him, Lassiter determines the name of a Mormon who contributed to the ruin of Milly and Jane implicates her father in the proselytizing of Milly. In a stateof shock, Jane packs. Meanwhile, in Surprise Valley, Venters and Bess are preparing to leave as Jane and Lassiter departing, except on burros. Lassiter sets fire to Withersteen House and flees on horseback with Jane. They encounter Venters and Bess in travel. Before they part, Lassiter explains that Bess is not really Bess Oldring, but actually Elizabeth Erne, the lost daughter of Milly Erne. Jane gives Venters her horses, Venters and Bess gallop for Venters' Illinois home, and Lassiter and Jane find refuge in Venters' valley paradise. On the way, Lassiter rescues Fay, but they are pursued to Surprise Valley. As Tull and his men begin to climb up the cliffside, Jane shouts to Lassiter to "roll the stone," which he does. The ensuing avalanche closes the outlet to Deception Pass "forever." (This is, of course, not true, as Jane, Lassiter, and Fay return in Grey's sequel, The Rainbow Trail/The Desert Crucible .) Unlike many Western novels, which are often straightforward and stylized morality tales, Riders of the Purple Sage is a long novel with a complex plot that develops in many threads. The story is set in the cañon country of southern Utah in 1871. Jane Withersteen, a Mormon-born spinster of 28, has inherited a valuable ranch and spring from her father, which is coveted by other Mormons in the community. When Jane refuses to marry one of the (polygamous) Mormon elders and instead befriends Venters, a young Gentile rider, the Mormons begin to persecute her openly. Meanwhile, Lassiter, a notorious gunman, arrives at the Withersteen ranch in search of the grave of his long-lost sister, and stays on as Jane's defender while Venters is on the trail of a gang of rustlers that includes a mysterious Masked Rider. Jane is intent on preventing Lassiter from doing further violence to Mormons and is eventually driven off her ranch as the persecution escalates, but she and Lassiter fall in love, Lassiter solves the mystery of his sister's death and the fate of her child, the Masked Rider is unmasked, and Venters finds his own romance. Along the way, Jane also finds time to adopt Fay Larkin, a young Gentile orphan who accompanies her and Lassiter at the end of the story Riders of the Purple Sage was written in 1912 and is set in a remote part of Utah after the influx of Mormon settlers (1847-1857) as a backdrop for the plot (1871). The Mormons had been centered in Kirtland, Ohio in the 1830s and Zane Grey would have been aware of the Mormon sect given that he grew up in Zanesville, Ohio. Plural marriage was only officially prohibited by the Mormons with the issuing of the First and Second Manifesto in 1890 and 1904 respectively, enacted primarily to allow the territory to attain statehood. In 1871, mainstream American society found plural marriage offensive. Even after the Morrill Anti-Bigamy Act was passed in 1862, the practice continued. Therefore, Zane Grey described the distaste of the institution through Lassiter in 1912, some 22 years after the practice had officially ended. You'll need to sign up to view the entire study guide. Sign Up Now, It's FREE
Approach To Anemia Anemia (PCV < 38% in the dog and < 24% in the cat) is frequently seen in clinical practice and can be grouped into 3 broad categories to aid in diagnosis of the underlying cause: blood loss, hemolysis or decreased production. Classifying anemia in this way can guide testing and suggest prognosis. There are three, simple diagnostic tests that can be performed in-house which can quickly help the veterinarian classify the anemia and make a diagnostic plan. They are inexpensive and can be completed in just a few minutes. The tests are PCV (packed cell volume) and TS (total solids), a blood smear and a slide agglutination test. The first test, a PCV and TS, need to be interpreted together. A low PCV and low TS suggests blood loss although in acute blood loss the PCV and TS will initially be normal and then drop (first the TS in 1-4 hrs then the PCV in 12-24 hrs). A low PCV combined with a normal TS could be consistent with either hemolysis or decreased RBC production. Examining the plasma in the hematocrit tube and finding hemoglobin or bilirubin would be suggestive of either intravascular or extravascular hemolysis. The second test, which is evaluating a blood smear, can differentiate hemolysis from decreased production. Significant polychromasia and anisocytosis can represent a regenerative anemia. Blood parasites (Mycoplasma haemofelis, M. haemominutium, cytauxzoonosis, babesiosis), changes in red blood cell morphology and Heinz bodies can also be identified on a blood smear. Heinz bodies represent denatured and precipitated hemoglobin from oxidative injury caused by toxins such as onions, garlic, methylene blue and Vitamin K3. Cats are more susceptible to Heinz body formation and can also be seen with hyperthyroidism, lymphoma, other cancers and diabetes mellitus (esp. ketoacidosis). Spherocytes (small, round RBCs with no central pallor) can be seen with IMHA. Schistocytes (fragments of RBCs) represent microangiopathic causes of hemolysis such as caval syndrome, DIC, hemangiosarcoma or splenic torsion. Acanthocytes (RBCs with spiney projections) can be seen with hepatic or splenic neoplasia or disorders of lipid metabolism. The third test is a slide agglutination test which is performed when hemolysis is suspected. A drop of anticoagulated blood from the purple top tube or capillary tube is mixed with several drops of saline and is examined for autoagglutination. Autoagglutination is diagnostic for IMHA and is caused by the cross- linking of antibodies on the RBC membrane. A Coombs test is NOT necessary if there is autoagglutination. To further diagnose blood loss requires a thorough history and physical exam, a minimum database (CBC, biochemistry panel, urinalysis), platelet count, reticulocyte count, coagulation profile and imaging (radiographs and/or ultrasound). Differentials for blood loss include trauma, neoplasia, primary hemostatic defect (thrombocytopenia, thrombocytopathia, von Willebrands), secondary hemostatic defects (rodenticide toxicity, hemophilia, DIC), GI losses or surgical/iatrogenic losses. Hemolysis can be immunologic or non-immunologic. Testing can include a minimum database, platelet count, reticulocyte count, testing for vector-borne illnesses, FeLV/FIV testing, imaging and possibly a Coombs test if hemolysis is suspected but there is no autoagglutination (not a sensitive test). Hemolytic anemias are usually highly regenerative but it takes 3-5 days to get a response. Immunologic hemolytic anemias can be primary or secondary. Secondary IMHA may be triggered by vaccinations (w/in 4 weeks), drugs (sulfas, penicillins, cephalosporins), neoplasia, vector-borne diseases (Ehrlichiosis, Babesiosis, Bartonellosis, Hemoplasmosis) and FeLV/FIV. Non-immunologic hemolysis can be caused by zinc exposure, oxidative toxins, microangiopathic conditions, hypophosphatemia, hereditary diseases and others. Decreased production anemias often require bone marrow histopathology to characterize the anemia and are classically non-regenerative. They can include anemia of chronic disease, chronic renal failure, endocrine diseases (hypothyroidism, hypoadrenocorticism), pure red cell aplasia, generalized bone marrow hypoplasia (from radiation, toxins, drugs, infectious agents, myelophthisis, myelofibrosis), iron deficiency and myelodysplasia.
Differences Between Men And Women 's Leadership Styles 2242 Words Nov 9th, 2014 9 Pages Gender can be defined as the state of being male or female (typically used with reference to social and cultural differences rather than biological ones). Leadership can be defined as the action of leading a group of people or organization. Societies perception of women and the actual reality of women and leadership is very flawed. In the last decade leadership and its definition has changed significantly. Changes have been driven by many factors including increasing diversity in the labour force, shifts in work environment from being local to international, mergers and acquisitions among corporations from different countries, organizational restructure across national boundaries, increasing advanced technology and the large number of females entering the workforce (Gibson, 1995, p 225). There are many opposing viewpoints on women’s ability to be leaders and the style that they use to execute their role. There are 2 different opinions on leadership in the workplace 1. That men and women differ in their leadership styles and attributes that make them good leaders and 2. That there is essentially no difference between men and women’s leadership styles. Many believe that there are certain characteristics and personal attributes that are specific to men and women that can either hinder or help their situation. Men are viewed as agentic in their qualities as leaders. Agentic style can be evaluated by being assertive, goal-directed, controlling, aggressive, ambitious,… More about Differences Between Men And Women 's Leadership Styles Open Document
Open a PDF version to print this topic HealthInfo Canterbury Broken ankle (fractured ankle) The bones of the ankle are the fibula and tibia in your calf, the lateral and medial malleolus in your ankle, and the talus and calcaneus in your footYour ankle joint is made up of four bones. The two bones of your lower leg, called the tibia and fibula, fit over your talus bone. Your talus bone sits on top of your heel bone, or calcaneus. The most common place for the ankle to break, or fracture, is at the ends of your tibia and fibula. These are also called the medial malleolus and lateral malleolus. This often happens because you have rolled your ankle while playing sport, particularly if there is another force, such as a rugby tackle. Breaks in the talus and calcaneus tend to be caused by a blow to the base of the foot, for example in a car accident, or a fall from a height on to a hard surface. Your doctor will diagnose this injury by listening to your explanation of what happened, examining your ankle, and looking at an X-ray of your ankle. You might need another scan, such as a CT or MRI scan, if the X-rays are not clear. How is a broken ankle treated? There are different ways to treat a broken ankle, depending on where the bones are broken and what sort of break it is. If the break is in a good position, you may be put into a plaster of Paris cast to support your ankle and stop the bones from moving while they heal. If the bones are not in a good position or if they are unstable, you may need an operation to put them in the right position and fix them in place. The surgeon may need to use a metal rod or a plate and screws to hold your bones in place. If the break is more complicated, you might need a metal frame around the outside of your ankle to keep the bones in the right position. Your orthopaedic surgeon will talk to you before any surgery about your options and what they plan to do. You will be given antibiotics during your operation. If your ankle is very swollen, you may need to wait for a few days before surgery, because the tight skin can make it difficult for wounds to heal. During this time, you will be put into a plaster of Paris backslab, which is a half cast around the back of your leg, to make you more comfortable. You will be asked to keep your leg up on pillows. Please ask a nurse or doctor if you would like more information about your operation and recovery. Before and after surgery you may have a plaster of Paris cast or backslab fitted to support your ankle and stop the bones from moving. If you are older than 65, Older Person's Health Specialist Services will also see you and review your health with the orthopaedic team. What to expect after your surgery Your leg will be up on a pillow to help reduce any swelling. You may feel some numbness or tingling in your leg or foot, but this will eventually get better. Your nurse will regularly check the blood flow to your injured leg. They will also check how much pain you are feeling and give you pain relief, which your doctor will prescribe. You may need to continue taking antibiotics. You will also see a physiotherapist, who will aim to get you moving as soon as possible. This helps to prevent problems that can happen with long periods of bed rest. These can include deep vein thrombosis, infections, and muscle weakness. Your doctor will let you know how much weight you can put on your leg. The physiotherapist will teach you how to walk with either a walking frame or crutches without putting too much weight on your leg. Going home Before you leave hospital a physiotherapist and occupational therapist will assess what help you may need at home and arrange it for you. You can also talk to a social worker about any worries you may have about going home. When you leave the ward, you will be given a follow-up appointment, a discharge letter that explains what has happened to you and your treatment plan, and a prescription or medication card if you need one. Written by director of nursing, Orthopaedic Services, Canterbury DHB. Adapted by HealthInfo clinical advisers. Page created April 2016. Last updated November 2018. See also: Broken bones first aid Care of your ankle following a fracture Communication cards in multiple languages Living with an injury Page reference: 132233 Review key: HIAAF-225274
Writing data to a file in Java By | 2015-05-07T01:40:27+05:30 May 6th, 2015|java| The most important question when we attend an interview on ios in Java, how to write data in a file using java. Well here is the example, in which we are going to write the data in a file. Writing data to a file in Java package io; import java.io.BufferedWriter; import java.io.FileOutputStream; import java.io.OutputStreamWriter; import java.util.Scanner; public class WriteFile {     public static void main(String[] args) {         WriteFile wf = new WriteFile();     public void write(String file_path) {         Scanner scanner = null;         String content_to_write = null;         BufferedWriter writer = null;         try {             System.out.println("Write to File..");             scanner = new Scanner(System.in);             content_to_write = scanner.nextLine();             writer = new BufferedWriter(new OutputStreamWriter(new FileOutputStream(file_path)));             if (!content_to_write.equals("done")) {                 writer.write(content_to_write + "\n");             while (true) {                 content_to_write = scanner.nextLine();                 if (!content_to_write.equals("done")) {                     writer.write(content_to_write + "\n");                 } else {         } catch (Exception e) {         } finally {             scanner = null;             content_to_write = null; To run the above example, you have to create a file on your desktop and give a name as “FileOperations.txt”.  And give the complete path in example at line number 12. While running the example we have to give the inputs(words) to file, the data will be saved in the “FileOperations.txt” file. To terminate the program we have to mention “done” as input. Write to File.. About the Author: Leave A Comment
Home Blogging 10 Of The Best Online Educational Games 10 Of The Best Online Educational Games 10 Of The Best online Educational Games The importance of online games. Today almost every family has a computer, without which it’s hard to imagine our existence. They help us to learn, work, and have fun. Nowadays big popularity has online games that can be connected with everything: age, educational skills, fashion, politics, communication, and even salvation langston hughes summary. This article we want to dedicate to the best online educational games that will make your brain work better. The top 10 educational online games. 1.Danger Zone. Students are faced with serious global issues to tackle in this fantastic character-based game. They have to use different skills to solve a challenge like combating a deadly airborne illness using test-samples, note-taking and learning along the way! 2.The blood typing game. Probably everyone knows how many there are blood groups. With transfusion, things are a little more complicated. To whom what blood can be transfused? The goal of the game is to understand this issue, as well as to find out what groups and Rh factors are, how it all relates to antibodies and antigens, and what will happen if the wrong type of blood is transfused. Learn and save the lives of virtual patients! The game and the materials attached to it refer to the awarding of the Nobel Prize in Physiology or Medicine in 1930. The prize was given to Karl Landsteiner – for the discovery of human blood groups (this happened thirty years earlier). And in 1940, Landsteiner discovered another Rh factor. That came will teach you how to create your own city and be able to cooperate its work in all aspects: trade, cleaning, utilities, production, salaries and more. 4.The immune system. What happens when we get a scratch? What types of cells are involved in immune processes? How do immune cells “fight” bacteria and warn each other about uninvited guests? In this game, dedicated to the work of the immune system, you have to protect a person from infection by commanding the troops of white blood cells (granulocytes) and the army of macrophages and dendritic cells. 5.Climate challenge. That game is based on global warming, on Flash, developed by the BBC and by Red Redemption. 6.Pavlov’s dog. As you might guess, this is a game about reflexes and stimuli in physiology, as well as about a dog that sacrificed itself to our knowledge. The goal of the game is to train Pavlov’s dog to react to the signal that will be associated with the treatment. If you give signals incorrectly or overdo it, the dog refuses to respond. A transistor is a component of a semiconductor material that is used as an electronic signal switch, or as an amplifier. In this game, your task is to take part in the processing of transistors. To do this, we need to understand which, in fact, gadgets and household appliances there are transistors, and in which there are not. You have to separate the lambs from the goats and throw things that do not match the conditions from the fast-moving conveyor. This is a whole set of tools that allows you to create three-dimensional games without the presence of specific knowledge. The application is a software product from Microsoft Corporation. The main task of using the program is to create game worlds in which the embedded characters will be located and interact according to established rules. 9.The split brain experiences. The brain consists of two hemispheres, connected together by means of millions of nerve fibers. Thanks to this, each hemisphere constantly knows what’s going on in the other. But what happens if the connection fails? The game allows you to follow the classic experiment with a patient who has been removed from the corpus callosum – “connecting cables” between the hemispheres. SimCEO is a great game that will allow you to check your management skills by operating a company. The positives of online games. Online games take almost all the time in modern youth, in some cases, in children and adults. The person who admires them creates a virtual life. In this life, he/she can appear in an image that he/she likes, communicate with other players. Online games, like many other modern phenomena, have its positives and negatives. As far as you can see, we have tried to concentrate your attention on its pluses. Online games are the ability to communicate with people who have similar interests living in different parts of the world. It is an opportunity to find friends, communication with whom can be transferred to real life. And the most important, it’s a possibility to increase your knowledge in different fiends of studying.
There’s a Planet With a 27,000 Year Orbit, and That’s Just the Beginning An international team of astronomers has discovered two strange exoplanets in a star system 1,200 light-years from Earth.  Using a Transit Method and Direct Imaging to detect the two exoplanets, they were very surprised at what they found. One of the exoplanets has an orbital period of less than 11 days around its sun, whereas the other exoplanet takes a staggering 27,000 Earth years to orbit the same star. Image result for There’s a Planet With a 27,000 Year Orbit Astronomers using the Transit Method detected the first of the two exoplanets, CVSO 30b back in 2012. The planet is roughly believed to be six times the size of Jupiter and has an orbital distance of 1.2 million kilometers from its parent star, taking CVSO 30b less than 11 days to complete one full orbit. In contrast, international astronomers using the Keck Observatory in Hawaii, the ESO’s Very Large Telescope in Chile, and the Spanish National Research Council’s (CSIC) Calar Alto Observatory, found the second of the two exoplanets, CVSO 30c in remote regions around its parent star with a orbiting distance of 666 astronomical units (1 AU = 9.296x107 miles). CVSO 30c  is also several times the mass Jupiter, yet it takes the planet 27,000 years to complete one orbit.   Lead author of the paper that described the initial findings, Tobias Schmidt from the University of Hamburg, the Astrophysical Institute and University Observatory Jena, told Universe Today via email: An artist’s conception of a T-type brown dwarf. What is strange is that both exoplanets are several times the mass of Jupiter and both are still very young — less than 10 million years old — it’s not something astronomers would have expected to observe, planets with similar masses but very different orbiting periods. Since astronomers started to discover exoplanets in remote star systems, we have come to learn that our universe can be extremely diverse, and there is still much we don’t understand. For now, let’s wait on the next discovery of an exoplanet to see what it will have in store.
Anne Curzan As an expert in the history of the English language, Anne describes herself as a fount of random linguistic information about how English works and how it got to be that way. She received the University's Henry Russel Award for outstanding research and teaching in 2007, as well as the Faculty Recognition Award in 2009 and the 2012 John Dewey Award for undergraduate teaching. Anne has published multiple books and dozens of articles on the history of the English language (from medieval to modern), language and gender, and pedagogy. Her newest book is Fixing English: Prescriptivism and Language History (2014). She has also created three audio/video courses for The Great Courses, including "The Secret Life of Words" and "English Grammar Boot Camp." When she is not tracking down new slang or other changes in the language, Anne can be found running around Ann Arbor, swimming in pools both indoor and out, and now doing yoga (in hopes that she can keep running for a few more years to come). It appears that as of today, there isn't much concern about the phrase "as of." Perhaps that's because it's such a simple phrase. Two words, two letters each, nothing flashy. But this is That's What They Say, and when Michigan Radio's chief engineer Bob Skon asked us about the distinction between the phrases "as of today" and "as from today," we had to check it out. Recently, English Professor Anne Curzan was giving a talk in Washington about reduplication. In reduplication, a form is repeated in a straightforward way, like "no-no" or "boo-boo," or with a vowel change like "flip-flop" or "mish-mash." During Curzan's talk, someone in the audience raised their hand and said, "You keep using the word 'reduplication.' Isn't that redundant? Why don't you just say 'duplication'?" Fair question. Even when it comes to the most interesting conversations, there's usually a routine to how they start and how they end. Think of how your conversations usually start. Generally, you don't just walk up to someone or call them on the phone and immediately start talking about something specific. You usually say something like "hello" or "hey" or "what's up?" to get things going. Sometimes you might even make your opener a question like, "Hi, how are you?" Among the many odd things about standard varieties of English is the “s” at the end of “knocks” as in “She knocks on the door.” If you were to change “she” to “I,” “you,” “we,” or “they,” the “s” would go away, and “knocks” would become “knock.” Why does third person singular tense get an "s" tacked on the end?  If your life is in shambles, you probably have bigger things to worry about than grammar. This week's topic comes from a listener who wanted to know the origin of "in shambles." Soon after we received this question, a co-worker told us she was surprised to learn this phrase, used to refer to a mess or state of disorder, was originally "a shambles." A few weeks ago on Reddit, someone posted a clip from the Ellen Degeneres Show. The guest was Candice Payne, the Chicago woman who rented hotel rooms for homeless people during last month’s polar vortex. The post’s headline was, “Ellen gifts $50k to Candice Payne, Chicago woman who help over 122 homeless people during brutal cold winter last week.” In the comments below the post, one user asked the question, “When did ‘give,’ the verb, give way to ‘gift,’ the noun, becoming the verb? On behalf of a listener, this week we're raising the question of whether we can speak on behalf of ourselves. Often at weddings, funerals and other gatherings, there's a moment when someone stands up and says something like, "On behalf of my family and myself, I want to thank you for coming today." A listener named Suzanne wants to know whether "and myself" is necessary in this expression. She says, "You don't speak on your behalf. You are speaking." The words and phrases that pop culture inserts into our everyday language never cease to amaze us here at That's What They Say. A listener recently wrote to use about one in particular. Laurel wanted to know what we think about "nado" as in the movie "Sharknado." There's a set of questions that we as speakers use regularly and that we may not realize have their own special name. They're called tag questions, and they're everywhere. You probably don't know what a tag question is, do you? You want to learn about tag questions, don’t you? That's probably why you're reading this column, isn't it? By now you've probably figured out what a tag question is, right? Sometimes we like to ask people what a particular word or phrase means to them. Sometimes when we do that, we get several completely different answers. Take “out-of-pocket,” for example. One that caught our eye is "basket case." If you think about the verb “dive” too hard, it can shake your confidence that you know which past tense to use.   Let’s say you’re telling someone about a diving competition you participated in yesterday. Do you tell them you dived yesterday, or do you tell them you dove? Not all verbs cause this sort of confusion. Regular verbs like “play” have the same past tense and past participle – I play, I played, I have played. Irregular verbs like “drive” are a little trickier – I drive, I drove, I have driven. For much of its life, “dive” was a regular verb – dive/dived/dived. But in the modern era, we English speakers created an irregular past tense – dove. There are many things in life worth keeping unsullied or unsoiled. From our good name to our best dress shirt, it's preferable to keep things safe from both literal and figurative sullying or soiling. It would seem that "sully" and "soil" have a lot in common. So much so that a listener recently asked if they're related. In fact, they are. Sully comes from the French verb "souiller" which means to pollute or stain. That's the same meaning it had when it came into English in 1615, according to the Oxford English Dictionary. Early on, "sully" takes on both physical and metaphorical meanings.  Since both of these words meant “awe-inspiring” at one point in their lives, we should look at “awe” first. “Awe” has changed meaning over time, which helps explain why “awful” and “awesome” have changed over time. Early on, “awe” meant fear or dread. Therefore, to be “awe-inspiring” meant to inspire awe or dread. However, later on “awe” comes to mean respectful fear or reverence – for example, someone could be in awe of the dead. This shift affects “awesome” and “awful.”
Focal Length Investigation Night Blindness There has been a lot of concern recently about the vision of drivers at night. It appears that drivers with good vision, or at least vision suitably correct by spectacles, become virtually blind by night. In this Activity, you will investigate possible physical (i.e. physics) causes of night blindness. Here are some theories: 1. Less clear images are produced when light passes through larger apertures of a lens. (N.B. The pupil of the eye becomes larger as light intensity decreases). 2. Lenses have different focal lengths for light of different wavelengths so the eye does not focus light from sodium street lamps in the same way as daylight. Choose one of these theories, design and carry out an experiment to test it. N.B. The experiment must yield quantitative results. I have opted to do the second investigation. To find if the theory is correct, I will find the focal length of a lens using several different colours of light. To achieve the different colours, I will use the filters and lamps in the following combinations: 1. White Bulb 2. Sodium Lamp 3. Ultraviolet Lamp 4. White Bulb with Red Filter 5. White Bulb with Green Filter 6. White Bulb with Blue Filter 7. White Bulb with Yellow Filter 8. White Bulb with Cyan Filter 9. White Bulb with Magenta Filter To find the focal length of the lens at the different wavelengths, I will attempt to focus light going through a grid onto a white screen. The equipment consists of a Light Source at some distance from the Filter and Object, which is at some distance from the Lens, which itself is at some distance from a Screen and the Image. The Filter and Object, the Lens, and the Screen and Image components are all placed on a ruler. The filter will be afixed to the grid, which acts as an object. At some distance away from the object will be the light source. The distance is required to get the rays arriving in a supposedly parallel fashion (the actual distance possible is limited since intensity decreases rather rapidly as distance increases). On the other side of the object will be the lens, and further on still will be the screen. The image of the object, focused by the lens, will be on the screen. The whole contraption is built on a ruler, allowing the relative distances to be measured easily. To find accurate values for the focal length, I will find the distance required (from lens to screen) to focus the grid for several different object to lens distances. Decisions and Preliminary Investigations Preliminary investigations with the white light showed that the focal length is in the range of 0.07 cm-1. (You can see this in the white light data, since the preliminary investigations' results were combined with the main white light results). Preliminary work also suggested that the best range of distances (for object to lens) is 20 cm to 40 cm. After setting up the equipment as explained above, each set of readings will progress as follows: 1. Set the lens to be 20 cm from the grid. 2. Move the screen from the lens away until a perfectly focused image is formed. 3. Note the gird to screen distance. 4. Move the screen from far from the lens inwards until a perfectly focused image is formed. It is important to complete this step as well as the second since there is always a depth of field when using a lens - a small 'tolerance' in which the image is well focused. It is not as clear cut as the term focal length would have you believe. 5. Note the gird to screen distance. 6. Move the screen yet again and take yet another reading of the grid to screen distance. 7. Set the lens to 25 cm from the grid and repeat steps 2 to 6 again. 8. Repeat step 7 with distances 30 cm, 35 cm and 40 cm. 9. Change the filter and/or lamp and repeat steps 1 to 9 for this new wavelength. 10. Repeat step 10 for all remaining lamp/filter combinations. Object Distance The distance between the object (the grid) and the lens. cf: Image Distance. Image Distance The distance between the image (the screen) and the lens. cf: Object Distance. Focal Length The principal focus (F) of a thin lens is the point on the principal axis towards which all paraxial rays parallel to the principal axis converge (in the case of a convex lens), or from which they appear to diverge (in the case of a concave lens), after refraction. Since light can fall on either surface (front or back) of a lens, lenses have two principal foci, one on each side. These are equidistant from the centre (P) of the lens (provided the lens is thin and has the same medium on both sides, e.g., air). The distance FP is the focal length of the lens. In equations, u represents the object distance and v represents the image distance. The third variable, f, represents the focal length of the lens. The object distance, u, the image distance, v, and the focal length, f, are related by the equation: + 1 = 1 A quick way of measuring f is to measure the image distance required to focus a distant object. This works because if u is large, u-1 is small and so cancels. + 1 = 1 » 1 and this leaves v » f I will not be using this technique since it is not accurate enough. The technique I will be using, which is described above, is somewhat more accurate and involves finding values of u and v, and using the equation to calculate f. There are three variations on the calculation of f by this method (the experimental steps are the same in all cases, although more data is required for the more accurate calculations). 1. Find one pair of values (one u and one v) and simply calculate f by using the equation + 1 = 1 2. The second method is to take several pairs of u and v and average the resulting fs. 3. The third and best method is to take even more data and to plot it. Hopefully (and theoretically) the x-axis intercept and the y-axis intercept should be equal. This is easily proved. Starting from the equation + 1 = 1 we rearrange into the y = mx + c form, = -1 + 1 Where y is equivalent to u-1, m is equivalent to -1, x is equivalent to v-1, and c is equivalent to f-1. Since the gradient, m is equal to -1, at u-1 = 0 (y = 0) 0 = -1 + 1 which rearranges to = 1 And at v-1 = 0 (x = 0) = 0 + 1 which cancels down to = 1 Very clearly then, the best fit line of the plotted data should result in a line of gradient -1 which crosses the x- and y- axes at the same point. I have opted for the more time consuming third option. Based on research and past experience, I would suggest that the theory proposed in the brief is indeed correct. It is my belief that as the wavelength shortens (blue end), the focal length will decrease, and as the wavelength increases (red end), the focal length will get longer. This is because waves of different wavelengths are refracted by different amounts in the same material (same principle as for a prism splitting white light) and the blue light is bent more than the red light upon entering and exiting the lens. It will be interesting to see what happens with cyan, since it's filter lets through two distinct wavelengths at opposite ends of the visible light spectrum (see results section). Wavelengths of lights used 1 Light Source or Filter Wavelengths (nanometres) White 400 - 700 Sodium 589.00, 589.59 Ultraviolet 404.7 Red 700 Green 525 Blue 450 Yellow 550 - 700 Cyan 675, 400 Magenta 400 - 550 All the results in the results tables and graphs are in centimetres. Technically, I should have converted my centremetre readings into metres, however, in this case it makes little difference. There are nine tables, which give all the data (one sheet per lamp/filter combination). There are also twelve tables, one for each combination (all using the same scales), one for white light (to show all the data I used different scales on this graph) and two final results summary graphs (one plotting f-1, in cm-1, and one plotting f, in cm)). Skew Results Light Source or Filter Skew cm- 1 White 0.001 Sodium 0.006 Ultraviolet 0.006 Red 0.006 Green 0.006 Blue 0.006 Yellow 0.001 Cyan 0.001 Magenta 0.008 The data was surprisingly nice. There was one slightly abnormally high value in the blue data, a very wrong data point for the ultraviolet lamp (probably a transcript error, that is, I probably mis-noted the data during collection) and one slightly low value in the yellow data. All the other data seemed fine. To calculate the errors, I plotted the data then drew two best fit lines: one above the data and one below. I found that actually, the gradient wasn't exactly -1. Examination of my equipment suggested that a possible reason for this is that my lens was not actually exactly above the point I was measuring each time. Indeed, I collected the data in three sets and within each set all the data has the same skew. This seems to indicate that it is experimental error. In the case of magenta, the skew is also probably due to the large - huge - range of wavelengths involved. What I am calling skew is the difference between the x-intercept and the y-intercept (in cm-1). The error margins were in the order of 0.001 to 0.007 cm -1. Magenta had the biggest error range, which is to be expected since it also had the largest skew and the largest wavelength spread. White light was next, which again is normal, since it has a wavelength spread of the whole visible light spectrum. Errors in Best Fit Lines Light Source or Filter ± Error cm- 1 Magenta 0.0071 White 0.0046 Blue 0.0024 Green 0.0021 Yellow 0.0020 Sodium 0.0019 Red 0.0016 Cyan 0.0015 Ultraviolet 0.0012 What is surprising is that Blue and Green light were next (note, however, that they have a much smaller error - only Magenta and White have considerable error margins). The blue error margin actually enables the "wrong" data point to be "correct" since it's error bars are within the best fit lines. The Results Summary graphs show the trend well. They are a plot of the focal lengths of each of the filters, against the wavelengths of the filters (when I say filters, read lamps and/or filters really). There is a definite trend, as the wavelength increases, so does the focal length. Luckily for me, this is as I predicted. Three things are of note however. 1. Cyan was an interesting case, I could not really understand it's pattern. This was effectively a mixture of two other filters (blue and green, theoretically) so it is not surprising that there is no obvious trend. 2. Yellow was a wide band of wavelengths, but unlike Magenta (which is also a wide band) it didn't fit into the general pattern. 3. Sodium seems to have "missed" the trend. This is odd as Sodium should have been a very accurate part of the experiment (it has very definite lines (it's D-lines) as it's wavelengths). I would have expected it's focal length to be about 0.1 to 0.2 cm longer. The summary graphs do not pretend to be accurate (I have merely placed the labels on the graph, not dots) because the error bars are so relatively large that this is the only way to accurately portray the information. The theory I put forward in the prediction matches the facts. I can therefore conclude that it is the correct one until such time as contradicting data is discovered or these results are reinterpreted. If you recall, I suggested that the theory proposed in the brief was indeed correct. It seems that as the wavelength shortens (as in the blue end of the visible light spectrum), the focal length decreases, and as the wavelength increases (as towards the red end of the visible light spectrum), the focal length gets longer. This is probably because waves of different wavelengths are refracted by different amounts in the same material (as I said in my prediction, this is the same principle as for a prism splitting white light) and the blue light is bent more than the red light upon entering and exiting the lens. As always, time was an important factor limiting my work. The other factor was that the point at which something is focused is quite subjective and dependant on the user's eyesight. During the course of the experiment I asked some of my colleagues to see if they thought my screen was focused and their opinions varied. The experiment would seem to indicate that Sodium lamps are not the best invention as far as good night road lighting goes, although this is not entirely true. After all, human eyes can accommodate to the required focal length as needed. We do it all the time, to look at distant objects or close ones. If one is perfectly honest, the difference in focal length is actually negligible (around half a centimetre over the whole of the visible light spectrum). Further Research Obviously it would be interesting to investigate the first of the two experiments suggested. It would also be interesting, in my humble opinion, to find out if there is a way of objectively ascertaining is something is focused or not. That way, the exact range could be found automatically by computer and a much more accurate study with greater emphasis on the quantitative results could be achieved. PHYSICS A Textbook for Advanced Level Students 2nd Edition (1987). Author: Duncan, Tom. Publishers: John Murray (Publishers) Ltd. ISBN: 0-7195-4336-3 Philip Harris Catalogue (1) This resource contained the transmission charts from which I found the wavelengths for the various filters I used. Internet Explorer 4.01 I used IE4 for the publishing of this document. The standards I used were HTML4 and CSS2, created by the World Wide Web Consortium. EMACS (text editor) GNU Emacs 19.34.6 (i386-*-nt4.0) of Thu Sep 25 1997 on ESME. Used for editing this document. Quattro Pro 6.1 For the graphs and spreadsheet I used QPW6. All pictures are supplementary to the text, which describes all information contained within the pictures fully. Note. CSS support (aka, IE4) makes a huge difference to this page. I have used <i> to mean instance of use as discussed on my Internet Projects page.
Ghost dunes discovered on Mars The remnants of sand dunes have been found on Mars: features that formed about 2 billion years ago, when the Red Planet had flowing water and active volcanoes. The remnants of sand dunes, seen in satellite images of the surface of Mars.  Studying features like these can reveal the secrets of the Red Planet's environmental history. Credit: NASA/JPL/University of Arizona ‘Ghost dunes’ have been discovered on Mars, adding another piece to the puzzle of how the Red Planet has undergone environmental changes over the past two billion years. The discovery will help scientists piece together an impression of how the Martian climate has evolved. The ghost dunes appear today as crescent-shaped pits, and are thought to be the remnants of sand dunes the size of the US Capitol building, according to the team who made the discovery. Read more about Mars from BBC Sky at Night Magazine: They formed when lava or water-borne sediments partially buried ancient sand dunes and hardened. Wind then blew sand off the exposed tops and continued removing sand from the inside, leaving behind a hole in the shape of the dune. Ghost dunes were only discovered on Earth in 2016, in Idaho in the US. Satellite images of Hellas basin and Noctis Labyrinths on Mars revealed similar formations. “Any one of these pits is not enough to tell you that it’s a dune, or from an ancient dune field, but when you put them all together, they have so many commonalities with dunes on Mars and on Earth that you have to employ some kind of fantastic explanation to explain them as anything other than dunes,” says Mackenzie Day, a planetary geomorphologist at the University of Washington in Seattle and an author of the study. The locations of the dunes at Noctis Labyrinthus (b), just west of Vallis Marinaris at the black star (a). Close-ups of the pits (c) and (d) show them as crescent shapes similar to barchan dunes found on Earth. Credit: Mackenzie Day and David Catling/ AGU Learning more about Martian winds in the past can help scientists calculate how sediments could have been carried over the surface of the planet, and whether its ancient climate differed from that of modern Mars. The team behind the study used satellite images of Mars to document over 480 potential dune moulds at Noctis Labyrinthus, a collection of plateaus on the Martian equator just west of canyon Valles Marineris. They also found over 300 crescent-shaped pits in eastern Hellas Planitia, a four billion year old impact crater that stretches over 2,700 kilometres across. When the dunes formed, Mars had flowing water and active volcanoes. “If some of the water that carved those valleys made it downstream far enough, it could have gotten to the dune field,” Day says. “The only thing that we know for sure is that the flow had to be relatively low energy, relatively slow, otherwise it would erode the dunes and we wouldn’t get the shapes that we see today.” Read more about this story Like this article? Why not: Meteorite found after asteroid seen falling to Earth previous news Article Rare neutrinos seen coming from a black hole next news Article
Your Story Assignment Digital storytelling is a powerful means to reflect upon and enter into conversations about your leadership. In this case we are looking at self “as leader.” Digital storytelling can be as simplistic as a set of pictures accompanied by narrative and as complex as fully produced videos.  This story should include the factors that brought you into the educational setting and describe the type of leader you were, are, and want to become. In the end, you should state what you believe you are and want to become as a leader. Use at least two of the following domains biological, historical, cultural, political to tell your story; the information below describes these domains and gives you questions to consider. These stories will be posted for your classmates to see. Stories should not exceed 5 minutes.  Information about the foundations of digital story telling can be found in the following short video:  Here are some examples of this project,,, As a result of completing this assignment, students will be able to: • Reflect on their personal development as a leader • Summarize the type of leader they were, are and want to become • Synthesize content covered in class thus far to contribute to the story • Analyze how various domains (biological, historical, cultural, political) influence their leadership Submission Instructions:   1. Upload your video to YouTube (or another video sharing service) and locate and copy the embed code for your video. 2. Create a new blog post titled “My Story” 3. Click on the tab that says “Text” (next to Visual) 4. Paste your embed code 5. Publish your blog If you have any trouble with this, let me know and I’ll help you.  Don’t worry. 🙂 A note about creating videos: If you’re very unsure of how to create and post videos, check out the instructional videos  To access these videos, you must go to, click “myCI”, log in with your University credentials, click on “” located on the list of resources on the left.  Then, type the technology tool you’re using in the search box… for instance… you may want to check out the “YouTube Essential Training.” “Your Story” Four Domains Historical Contributions to the development of the self: • Present a historical event(s) that has impacted your life…include both micro and macro. Make sure you look at this event historically, i.e. what caused it and what were the future ramifications? • Micro level events are those that are close to you spatially, geographically, physically, and emotionally. • Macro level events are those that are more global. i.e. geography and scope, yet they are equally as important in shaping people’s life and surroundings. • Do a generational analysis (look at your ancestors) of what brought you to the place/space you find yourself in at this time in history…personally, professionally and academically. Biological Contributions to the self: • Present pictures of yourself as a youth and compare them to the present…how have you changed? • Describe your physical make up and genetic composition and elaborate on where it comes from, i.e. father, mother, grandparents, etc… Though, if you cannot because you do not know this history, imagine what your ancestors looked like based on your genotype and phenotype. • Connect your genes to your relatives and see where your dominant composition comes from and what are your more prominent characteristics…do you see this in other relatives or your children? • How have you changed and what will you look like in the future? • How will this impact what you do from now on? Cultural Contributions to the development of the self (culture is defined as the unwritten rules that guide the way we live life): • What are the values, beliefs and practices that you hold dear and that guide your daily life? How aware are you of these values daily? • Where did these values come from and how have they changed through out your life? (be specific) • What is the context and conditions that have molded your cultural identity? • What does diversity mean to you? • When was one time you resisted diversity and why? Political Contributions to the development of the self (politics in the educational literature is simply defined as who gets what when and how): • Explore and describe the construction of your values and beliefs, and their uses. • What was your first political action (test your memory)? • What is your gender identity and how do you use it? • What is your racial composition and what does this mean to the communities where you live, work and play? And what does this mean to you? • What is the role of relationships in your life? How do you use these relationships? How do they use you? • What do your friends say about you? • How do you define power and how do you use it? • How do you deal with conflict? **Assignment adapted from
Article by Aydan Corkern Volcanoes can be found all over the world. Some are downright dangerous while others have been laying low for quite some time. Here are the top 5 dangerous volcanoes in the United States. Taking the top spot for most dangerous volcano is Hawaii’s own Kilauea, which is considered to be the most active volcano in the world. Kilauea’s first eruption is believed to have occurred some 300,000 to 600,000 years ago, and the oldest dated rocks found are more than 20,000 years old. Surround Kilauea is a rainforest and other volcanic formations, and the volcano, which is located in Volcanoes National Park is open to visitors. It has been erupting continuously since 1983 and is predicted to last for as long as the planet lives. Mount St. Helens is located in Skamania County, Washington, which is over 90 miles south of Seattle. Mount St. Helens is particularly famous for the deadliest volcano in U.S. History that occurred on May 18, 1980 and killed 57 people, damaged 250 homes, 47 bridges, 15 miles of railway, and almost 200 miles of highway. Also located in Washington state, is Mount Rainier, located over 50 miles southeast of Seattle in the Mount Rainier National Park. The lava dates back to over 800,000 years ago. While it is a generally dormant volcano with limited activity, there is the threat of mudflows caused by the excess ice that accumulates atop the volcano. Nearby communities, such as Renton, Kent, and Auburn could very well be destroyed and parts of Seattle could be affected as well. Oregon’s Mount Hood, on first glance, belongs on the front of a postcard or the cover of a traveling magazine. Its peak reaches in excess of 11,200 feet and houses twelve glaciers. The volcano is classified as dormant in the time being and the likelihood of an eruption during the next few years is unlikely. As a result, the area around Mount Hood has been open to recreational activities, such as fishing, skiing, and river rafting. Last on the list is Mount Shasta, located in Northern California’s Siskiyou County. Shasta is a single formation with no other mountains surrounding it. Mount Shasta has been quiet for hundreds of years, the last eruption believed to have occurred about 200 years ago. During the past 10,000 years, Shasta erupted every 800 years but records show that it has erupted every 600 years during the past 4,500 years. Deposits from its eruptions can be found under its nearby towns and although the volcano is dormant for now, it is only a matter of years before it shall erupt again. About the Author Visit Aydan Corkern’s sites:volcano vaporizer and e cigarette.
Protecting Property Against Wave Erosion with Bulkheads an erosion near the pipesLiving on a seafront property has its inherent responsibilities. The action of the wind and waves erodes the land and requires building bulkheads especially in Rockport, Texas. Bulkheads are a necessary part of the local landscape. With the primary function of resisting excessive coastal erosion, bulkheads are not designed like seawalls. These are vertical walls of low height made of stone, steel, concrete, or timber. Stone walls and concrete can be designed as gravity walls, while steel, timber, and concrete walls can be constructed as anchored walls. Additionally, mesh boxes with stones can also be used as bulkheads. Hardening Against the Waves and Wind Bulkheads are a means to harden the shore or bluff at the waterline. This is useful when the property adjoins the sea, which often happens with reclaimed land. The waterline continues to erode the land with wave and wind action. Hardening the bluff face with a barrier protects it against a wave attack. Hardening the shoreline involves designs and methods that use local materials. For modern coastal properties, bulkheads are made of concrete. Most bulkheads are not aesthetically pleasing. In some places, these look like walls defending the land from the sea. Effect of Bulkheads Bulkheads can be freestanding structures or have tiebacks for stability. These can greatly reduce or eliminate shoreline retreat at its location. Due to the effect of the waves, the bottom is scoured by the waves as it retreats from the bulkhead. This effectively digs into the soft bottom of the bulkhead. To prevent this from happening, stone or riprap is placed at the bottom of the bulkhead to absorb the wave energy and prevent further underwater erosion. Bulkheads are not designed for strong waves like those at the seashore. If possible, bulkheads are only as high as the land it protects, and not any higher. Bulkheads are ideal for protecting private property from wave erosion. In addition, the bottom of the bulkhead requires stone to absorb the power of the waves. Tags: × ×
LaTeX, or more precisely speaking TikZ, lets you create really great diagrams for your economic papers. The main difference compared to carelessly embedding images in your document is that you will be creating vector images with TiKz, which are lossless scaleable, what means they won’t blur and you won’t see pixels when you scale them up. Another great point which makes me be in favor of vector graphics by TikZ is that they are more accurate compared to their now randomly appearing pixel brothers. The final product Lately I was creating the diagram which I attached below. In this task I was focused primarily on some fine details, i.e. the arrowheads, the crosshatching, and the line thickness ratio. Economic diagram in LaTeX created with TikZ Even if this diagram is just of qualitative and not of quantitative nature, it is any the less important for me to have correctly set arrowheads. I must admit at this point, that I consider diagrams which do not feature this detail, as of lacking accuracy. Well set heads, by contrast, demonstrate understanding of the Cartesian coordinate system, for they, being set at the end of each coordinate axis indicate the growth direction of the coordinate itself. A coordinate without correct arrowheads can therefore, in a very consequent way, be considered meaningless and vague. Custom arrowheads In the first place it was necessary to customize the arrowheads which would be loaded using the default TikZ Library arrows. Beneath I have attached the necessary code to produce finer arrowheads. % Call arrow library and declare arrowheads \advance\pgfutil@tempdima by.25\pgflinewidth% \pgfutil@tempdimb=7.29\pgfutil@tempdima\advance\pgfutil@tempdimb by.5\pgflinewidth% \pgfutil@tempdimb=.5\pgfutil@tempdima\advance\pgfutil@tempdimb by1.6\pgflinewidth% \advance\pgfutil@tempdima by.25\pgflinewidth% \pgfarrowsdeclarereversed{dinarr reversed}{dinarr reversed}{dinarr}{dinarr} These arrowheads can be of course altered to specific needs, but this code snippet will produce - if properly inserted - arrowheads which have .5mm in height and 3mm in length. You can alter their appearance by changing the values in \pgfqpoint{-3mm}{0.5mm} and its counterpart two lines below. If you are happy with the appearance you can use them as usual with a command like \draw[-dinarr]. Custom hatching Creating a neat hatching was the next task which I was up to. I wanted the hatching to be vertically aligned and 1mm apart. The code was again customized after the pattern library was called. % Call some libraries and declare vertical hatchings What’s next? Having this done, I was ready to finally draw some lines with LaTeX and TikZ. Well, not really. There were still some styles to define, i.e. intercept points, labels, etc. I will continue this note, when I have some more spare time and possibly upload the .tex file as well.
"Dark L" is "L" at the end of the word or after a vowel sound. Example: ball, pull. "Light L" is "L" at the beginning or before a vowel sound. Example: light, love. There are 4 explanations of how to pronounce "dark L": • 1st explanation: the tongue tip must contact the ridge right behind the upper teeth. • 2nd explanation: before the tongue tip must contact the ridge right behind the upper teeth, you must curl the tongue and make sound like /r/ before make the /l/ as in the 1st explanation. • 3rd explanation: just put the tongue between upper and lower teeth is enough to make the dark L • 4th explanation: the tongue tip must contact the ridge right behind the upper teeth & the back of the tongue raises up (a British teacher teaches that). see this vid: https://www.youtube.com/watch?v=pejo6YC_BnM and https://www.youtube.com/watch?v=U4En7vG1wV4 for more info So what is the correct way to make the "dark L"? • I can't give an authoritative answer to this, but as a native speaker of American-English who studied diction in acting school, explanation #1 seems like the best of the four. – William Bloom Jan 9 '15 at 9:41 • My daughter uses #3, the rest of the family do #1. She can't do #1, so we get her to say "falafel" and we laugh at her. – Phil M Jones Jan 9 '15 at 10:22 • 2 "There r 4 explanation"? Seriously, don't do this on a language site. We have no upper limit of letters in a question. – anongoodnurse Jan 9 '15 at 10:51 • @medica? u mean there r more explanation? – Tom Jan 9 '15 at 10:52 • @user105551 Welcome to ELU! I think Medica means please use full words: are not r, for example :) – Araucaria Jan 9 '15 at 11:10 I watched the first Youtube video you referenced, done by Rachel, and I think several of the observations are good, but overall, it misses the point. The important difference between dark l and neutral l in English is retraction of the tongue body for the dark l. (I'm calling the non-dark l "neutral", because I don't think l in English is truly light -- just sometimes not dark.) The position of the tongue tip doesn't matter. When the body of the tongue is pulled back, that may affect the position of the tongue tip, but that's just because the tongue tip and the tongue body are connected -- they're both part of the tongue. It's the retraction of the tongue body that makes the l dark, whether or not there is any difference in the position of the tip. Rachel talks about the pronunciation of "real" and observes, correctly, that there is an extra vowel sound that intrudes between the [i] and the [l]. But that is not what makes the [l] dark. When the tongue body is pulled back for the dark l, the body of the tongue has to move from front to back, since it was pushed to the front to make the [i] vowel, and it has to be pulled back for the dark l. To get from one place to the other, the tongue body has to move through an intermediate central position, and this is what Rachel hears as an extra vowel sound between the [i] and [l]. This central glide is predictable if you have a correct idea about how dark l is articulated. The rule for dark /l/ is that we always use dark /l/ when /l/ isn't followed by a vowel. So in the word falafel the first /l/ is clear, the second is dark. Arguably, there are two parts to an /l/ sound. The first is caused by the redirection of the air as it travels out of the vocal tract. This is caused by the tongue tip making firm contact with the alveolar ridge, the flat shelf behind the teeth. This redirects the air sideways out of the mouth giving a special kind of resonance. The second part of the dark /l/ sound, concerns what kind of vowel quality the sound has. The quality of dark /l/ is something like cardinal vowel 7, a high mid, back, rounded vowel. For learners, you could aim for an /ʊ/ sound, which would do fine. For a vowel like this, the back of the tongue is raised, but it's not easy to consciously raise this part of the tongue: it is much simpler to just aim for an /ʊ/ vowel. This is the vowel we use in the word put. • To make a good dark /l/ then, make an /ʊ/ sound, whilst putting the tongue tip on the alveolar ridge behind the teeth. This effectively will achieve what is described in the fourth explanation. Edit note: The vowel behind dark /l/ differs between speakers of RP. Alan Cruttenden in Gimson's Pronunciation of English describes it thus: Variations in the quality of the back vowel resonance associated with [ɫ] are found among RP speakers, with a range extending from [ö], [ʊ], or [ɤ] to [ɔ:] or [ʌ]. 7th Ed, p. 216 Some readers might find that using /ʊ/ sounds a bit too Londony (see David Garner's comment below). However, it's probably the most commonly found, and is easy for non-native speakers, who will recognise the quality from the FOOT vowel, in words like put. • As a native [Northern England] speaker, I'm not convinced by Araucaria'm method. The word 'milk' has a dark L, but if I try to say it following A's method, it comes out with the Cockney vocalized L. I'd say, Concentrate on raising the back of the tongue [but not too much, or it comes out as 'stage Russian'] and let the tip of the tongue rest a little behind the teeth. – David Garner Jan 9 '15 at 12:22 • 1 @DavidGarner Exactly so, the vocalised /l/ is a bit like a dark /l/ without the contact on the alveolar ridge. The quality of the vowel behind the dark /l/, [ɫ], varies alot between speakers and areas. The world famous Grimsons Pronunciation of English describes it thus: Variations in the quality of the back vowel resonance associated with [ɫ] are found ... with a range extending from [ö], [ʊ], or [ɤ] to [ɔ:] or [ʌ] If your particular vowel or variation has a different quality, the [ʊ] may sound weird to you. However, it's good for learners because they are already familiar ... – Araucaria Jan 9 '15 at 13:27 • @DavidGarner ... with the FOOT vowel, /ʊ/. It's also one of the most common realisations, and as you point out, very similar to the vocalised /l/ which has now moved into standard English for many young speakers. i.e. it makes vocalised /l/ easier to recognise as /l/. It can be pretty hard for learners to raise the "back" of their tongue. This specialised meaning of 'back' requires an anatomy lesson before it can be understood, imo! My guess from your descrioption is that your using a [ɤ]-like vowel in your dark /l/. If you're teaching and can demonstrate, that would work fine too! :) – Araucaria Jan 9 '15 at 13:28 • 1 No, I'm just a phonetics and language enthusiast, but I'm convinced that I use a traditional dark L until I artificially try to say it by using the FOOT-vowel. – David Garner Jan 9 '15 at 13:49 • 1 Araucaria, I've now looked up what you mean by "Gimson's versions", and I'll concede that it's more complicated than I imagined - thank-you. – David Garner Jan 10 '15 at 19:17 Dark L --> Why not simply add voice to /h/ ? f-v-f-v s-z-s-z h-ɫ-h-ɫ Works for me. I'm mid-atlantic being born in Ontario and raised in South England. I use a dark L in milk but a clear L on the end of many words like kill. I love the accents from elsewhere in the UK so I'm not recommending mine, except to say I'm usually understood well enough. Phonetically, the dark l [ɫ] is basically the light l [l] velarized. • 2 Adding voice to [h] makes it [ɦ], which is definitely not what you want. For more information, see this link: phon.ucl.ac.uk/courses/plin/plin2108/week5.php – Arnold Pinson Apr 3 '17 at 4:38 • 1 We're looking for long answers that provide some explanation and context. Don't just give a one-line answer; explain why your answer is right, ideally with citations. Answers that don't include explanations may be removed. – Skooba Apr 3 '17 at 12:50 Being someone with the same confusion I found this video really helped me in my pronunciation. I know this was question was asked a while ago, but for anyone with the same problem, I hope this will help. To summarize a bit of the important parts of the video: the host goes on to talk about how the dark L is more commonly found in British English speakers, and less in American English speakers. He also talk about the extreme similarity of the dark L to that of a "w" sound, describing the pronunciation as "putting your tongue in the middle of your mouth, and not letting [it] touch anything." • Can you summarize the important parts of that video in your answer? Link-only answers will be deleted. See here for more information on this policy. – Laurel Sep 23 '18 at 18:59 • @Laurel Is that better? – Alex Dukhan Sep 23 '18 at 19:14 Your Answer
Browse Subject Areas Click through the PLOS taxonomy to find articles in your field. For more information about PLOS Subject Areas, click here. • Loading metrics Numbers in the Blind's “Eye” Numbers in the Blind's “Eye” • Elena Salillas,  • Alessia Graná,  • Radouane El-Yagoubi,  • Carlo Semenza Although lacking visual experience with numerosities, recent evidence shows that the blind perform similarly to sighted persons on numerical comparison or parity judgement tasks. In particular, on tasks presented in the auditory modality, the blind surprisingly show the same effect that appears in sighted persons, demonstrating that numbers are represented through a spatial code, i.e. the Spatial-Numerical Association of Response Codes (SNARC) effect. But, if this is the case, how is this numerical spatial representation processed in the brain of the blind? Principal Findings Here we report that, although blind and sighted people have similarly organized numerical representations, the attentional shifts generated by numbers have different electrophysiological correlates (sensorial N100 in the sighted and cognitive P300 in the blind). These results highlight possible differences in the use of spatial representations acquired through modalities other than vision in the blind population. Blind as well as sighted people show the SNARC effect[1]. This effect refers to the fact that, within a given interval, people in cultures where numbers are written from left to right are faster at making judgements (e.g. odd/even judgements) about smaller numbers with the left hand but are faster with their right hand for bigger numbers [2]. The SNARC effect has been interpreted to reflect the automatic activation of an internal representation of magnitude, where numbers are represented along a left-to-right oriented mental number line. Testing the number-space relationship in blindness entails a straightforward way of testing the suggested amodality of number semantics [see 3 for a review]. Finding that people deprived of visual world experience nonetheless show a spatial organization of number representation provides a clear indication of the existence of a modality-neutral, hardwired, core number representation. Number distance effects in the blind population provide converging evidence for this conclusion [4]. However, whether the blind process internal number representations the same way as sighted people remains to be shown. The present investigation aims at answering these questions. Fischer, Castel, Dodd, & Pratt [5] investigated whether the internal representation of numbers could induce a shift of attention in the corresponding visual field. To address this question, they used a detection task in which irrelevant central cues (i.e., numbers 1, 2, 8 or 9) were presented followed by a lateralized target. A detection of the lateralized visual target was requested and detection times were measured. This way, congruent trials entailed targets on the right or left hemispace, preceded by large or small numbers, respectively, and incongruent trials entailed the opposite combination of number size and target location. Following large number cues (e.g., 8 or 9), detection times were faster for targets presented in the Right Visual Field (RVF), whereas after small numbers (e.g., 1 or 2) detection times were faster for targets presented in the Left Visual Field (LVF). In other words, Fischer et al. found a congruency effect with faster detection times for number size-location congruent trials. This finding suggests that the location of attention that follows number perception influences the location of attention in the visual field and that similar structures underlie attention shifts across internal spatial representations and external space. The electrophysiological correlates of this effect were recently described in sighted people [6]. In the present ERP study, we adapted this paradigm to the auditory modality in order to test blind individuals while measuring both behavioral detection times (behavioral experiment) and electrophysiological responses to the presentation of the target (ERP experiment). People suffering congenital or early onset blindness have necessarily experienced numbers and numerosities in a different way compared to sighted people. We hypothesized that if shifts of attention induced by the perception of numbers differ between the blind and the sighted, then differences in the sensory (N100) and cognitive (P300) ERP components should be observed. Modulation of the sensory N100 has indeed been obtained with external cues in the blind (sound presented in the left or right auditory space [7]). In the current study, binaurally presented numbers were provided as cues in order to determine if the modulation of this component is also generated by an internal representation in the blind. Moreover, the serial unfolding of the auditory modality and the higher span of auditory working memory in the blind [8] could have an impact on the way that the blind manipulate numerical representations. Despite having similar left to right orientation in their numerical representation, and as a consequence of the kind of numerical input they receive, blind individuals may have a representation more dependent on working memory. The P300, which is an index of working memory load and has been interpreted as reflecting more controlled processes [9], [10], [21], [23] (i.e. whereby task relevant stimuli produce “matches” with internal representations or the maintenance of those representations in working memory), may be sensitive to number-space congruency in this auditory paradigm, especially in the blind who are required to compensate for lack of access to the visual modality. Hence, the development of representations with spatial characteristics through other modalities than vision, via intrinsic differences in processing, may have an impact on the general manipulation of these representations. Seven sighted (mean age 34.4 years ranging from 22 to 50) and seven early-onset blind participants (mean age 35.4 years ranging from 25 to 50) completed the two experiments. All participants gave verbal informed consent to participate in the study, according to the rules enforced in the University of Trieste. Furthermore, for the blind group, this informed consent was obtained after a talk at the Blind Italian Union, Trieste provincial section. In this talk, the experimenter gave some details of the ERP technique, data collection, and the task to be performed, and participants willing to collaborate were recruited. No other revisions are mandatory in Italy for the methodology used in this study. Numbers were recorded by a female speaker and compressed to a fixed duration of 350 ms. using Wavelab 4.0. Auditory intensity of large (8 and 9) and small (1 and 2) numbers was equivalent (70 dB.). Lateralized auditory targets were presented using dichotic listening: a target sine wave sound (166.67 Hz.) was presented in one ear, and pink noise was presented in the other ear. Therefore a target on the right occurred when the sine sound was presented in the right ear and pink noise was presented in the left ear and vice-versa for targets on the left. Both right and left targets were identical and were generated by cross-splicing the same sound to the corresponding channel, therefore the two targets had exactly the same acoustic characteristics. For catch-trial stimuli, pink noise was presented in both channels. All experimental and catch sounds had a duration of 100 ms. All participants did a behavioural experiment, where detection times after the presentation of the target were collected, and a second experiment, where ERPs to the presentation of the target were measured. These two separate experiments made it possible to obtain reaction times immediately after the presentation of the target, while avoiding the ERP response contamination with response preparation. Our paradigm (fig. 1a) consisted of the binaural auditory presentation of large (8 or 9) or small (1 or 2) numbers. The number was followed by a fixed delay of 450 ms., and then a lateralized target was presented through dichotic listening. This delay showed the strongest effect in the study of Fischer and collaborators [5]. The experimental session was divided into 4 blocks of 60 trials, during which a total of 240 trials were presented. ERPs were computed by averaging the EEG recordings associated with the presentation of the target. Figure 1. a. Sequence of the stimulus in the two experiments. Detection responses were requested right after the target in the behavioural experiment and after the second sound in the ERP experiment. b. Behavioral results. Mean detection times plotted with standard error of the mean. A main effect of congruency can be observed, without interaction with group or with side of presentation of the target. Auditory stimuli were presented through headphones with a fixed volume for all participants (audio format PCM, 44100 Hz, 16 bits, stereo). A number (1, 2, 8 or 9) was binaurally presented with a duration of 350 ms. After a fixed delay of 450 ms. a target was presented through dichotic listening, or a catch-noise sound was presented binaurally. Both target sounds and catch sounds had a duration of 100 ms. In the behavioural experiment, detection of the target was requested by immediately pressing a button. If a catch sound had been presented, the participant was instructed to do nothing. In the ERP experiment, after a delay of 2000 ms. from the onset of the target, a different sound signalled the moment in which the subject had to press a button if a target had appeared before (delayed detection task). ERPs were measured from the initiation of the target or catch sounds. In both experiments, the hand used for the response was intermixed across blocks and varied across participants. All participants were asked to close their eyes while performing the tasks. EEG Recording and data analysis Continuous EEG was recorded from 28 scalp electrodes mounted in an elastic cap (Electro-Cap international) and located at standard left and right hemisphere positions over frontal, central, parietal, occipital and temporal areas (International 10/20 System, at Fz, Cz, Pz, Oz, Fp1, Fp2, F3, F4, C3, C4, P3, P4, O1, O2, F7, F8, T3, T4, T5, T6, Ft7, Ft8, Fc3, Fc4, Cp3, Cp4, Tp7, Tp8). These recording sites, plus an electrode placed over the right mastoid, were referenced to the left mastoid electrode online. The data were recorded continuously throughout the task by a SynAmps amplifier and NeuroScan 4.3 software. Each electrode was re-referenced off-line to the algebraic average of the left and right mastoids. Impedances of these electrodes never exceeded 5 kΩ. The horizontal electro-oculogram (HEOG) was recorded from a bipolar montage with electrodes placed 1 cm. to the left and right of the external canthi; the vertical (VEOG) was recorded from a bipolar montage with electrodes placed above and below the right eye, to detect eye movements. EOG activity were detected by wavelet analysis and corrected using a regression method in the time domain [11]. Epochs from 100 ms. before and 600 ms. after the presentation of the target were extracted from the EEG. The EEG and EOG were amplified by a Synamp's amplifier digitized at a rate of 500 Hz and filtered with a band pass of 0.01–30 Hz. Another filtering (low-pass filtering cutoff of 5 Hz. [12] was performed in order to remove alpha rhythm that could be different between blind and sighted participants, with eyes closed. Epochs were excluded from averaging if they contained amplitudes outside the range +/−150 µV at any EEG site. ERPs were extracted by averaging trials separately for subjects, electrodes, and experimental conditions. The 100 ms. period preceding the target was used as the prestimulus baseline. ERP averages were analysed by computing the mean amplitude in selected latency windows. ANOVAs were used for all statistical tests and were carried out with the Greenhouse-Geisser correction for non-sphericity [13]. To explore the potential topographic differences, ANOVAs were conducted separately for midline and lateral electrodes. ANOVAs for midline electrodes had a repeated-measures design, with group (blind/ighted) as a between-subjects factor, and congruent/incongruent, side of presentation of the target (Left Visual Field (LVF)/Right Visual Field (RVF)), Localization (2 Regions Of Interest [ROIs] or Area; Anterior and Posterior) and electrodes (2 for each ROI with Anterior including: Fz, Cz, and Posterior including: Pz and Oz) as within-subjects factors. ANOVAs for lateral electrodes also had a repeated-measures design with congruency (congruent/incongruent), side of presentation of the target (Left Visual Field (LVF)/Right Visual Field (RVF)), hemispheres (Left vs. Right), Localization (2 Regions Of Interest [ROIs] or Area; Anterior, and Posterior), and electrodes (6 for each ROI with Left Anterior including: FP1, F7, F3, FT7, FC3, C3; Left Posterior: CP3, T3, TP7, P3, T5, O1; Right Anterior: FP2, F8, F4, FT8, FC4, C4; and Right Posterior: CP4, T4, TP8, P4, T6, O2). A similar ANOVA was performed for the catch trials with Number (large and small) as within-subjects factor and group as a between-subjects factor with all the rest of factors being the same: ROI/hemisphere/electrode. Behavioral results We determined the presence of a congruency effect for both groups in terms of their reaction times (RTs, fig. 1b). This experiment was designed in order to provide reaction times, as the delayed-detection task in the ERP experiment could obscure any behavioural effects due to the interval between the target and response. A three factorial ANOVA with 2 (congruency) ×2 (side) as repeated measures, and 2 (group) as a between-subjects factor showed an effect of congruency (F(1,12) = 17.55, p = 0.001; Congruent trials: Mean = 376.12 ms., SD = 29.78 ms; Incongruent trials: Mean = 403.9 ms., SD = 29.95 ms.) but no interaction with side (F(1,12) = 0.3, p = 0.58) or group (F(1,12) = 0.01, p = 0.92). The main effect of group was not significant (F = 0.9, p = 0.36)1 That is, regardless of side or group, targets in congruent trials were detected faster than targets in incongruent trials. ERP results In order to capture the stimulus processing phase and to separate it from the motor preparation of the response, a delayed response paradigm was used (see Fig. 1a) in the ERP experiment. Figures 2 and 3 provide a comparison of the ERPs for congruent vs. incongruent trials on each side of the presentation of the target for sighted (Fig. 2) and blind (Fig. 3) participants. A visual inspection of the ERPs of congruent vs. incongruent trials showed two main components that were differentially modulated by congruency depending on the group: while a negativity for the latency and distribution of the N100 component showed a modulation by congruency in sighted individuals, a positivity at the latency and centro-parietal distribution of the P300 component showed modulation by congruency in blind individuals. A peak-latency analysis of a window between 80 and 180 ms. for the N100 and between 200 and 500 ms. for the P300 did not reveal any difference in latency between the groups, or across conditions for any of the components in the experimental trials (average peak latency of 140.5 ms. for the N100 and 314.2 for the P300). Figure 2. ERPs elicited by the target in sighted participants. a) target on the left; b) target on the right. Black line represents congruent trials and red line incongruent trials. c) Difference between congruent and incongruent conditions in the two latency windows. Figure 3. ERPs elicited by the target in blind participants. a) target on the left; b) target on the right. Black line represents congruent trials and red line incongruent trials. c) Difference between congruent and incongruent conditions in the two latency windows. A continuation of the congruency effects on the N100 is shown in the latency window of the P300: same scalp distribution as for the effect on the negativity can be seen. Statistical analysis of mean amplitudes by a 2 (congruency) ×2 (side) ×2 (hemisphere) ×2 (ROI: anterior/posterior) ×6 (electrode) ANOVA for the lateral electrodes and by a 2 (congruency) ×2 (side) ×2 (ROI: anterior/posterior) ×2 (electrode) ANOVA for the midline electrodes confirmed these observations. The main effect of group was not significant (lateral: F(1,12) = 0.147, p = 0.7; midline: F(1,12) = 0.54, p = 0.47). An interaction between group and congruency showed that the N100 (latency band between 100 and 180 ms.) was modulated by congruency only in sighted participants (lateral: F(1,12) = 8.50, p = 0.013; midline: F(1,12) = 8.33, p = 0.014). In this group, congruent trials elicited larger amplitudes than incongruent trials, independent of the location of the target (lateral: F(1,6) = 10.02, p = 0.019; midline: F(1,6) = 7.9, p = 0.03). The N100 for both groups, as well as the congruency effect in sighted participants, was localized to anterior sites as shown by a main effect of ROI (lateral: F(1,12) = 39.5, p<0.001; midline: F(1,12) = 75.08, p<0.001) and the interaction between congruency and ROI in the sighted participants (lateral: F(1,6) = 8.08, p = 0.03; midline: F(1,6) = 10.39, p = 0.018; effect of congruency in anterior sites: lateral: F(1,6) = 15.1, p = 0.008; midline: F(1,6) = 13.04, p = 0.01; posterior sites: n.s.). The P300 (latency band between 260 and 380 ms.) also showed a modulation by congruency, but in this case only for the blind group, as shown by the group × congruency interaction (lateral: F(1,12) = 12.31, p = 0.04; midline: F(1,12) = 10.38, p = 0.007). Larger amplitudes for congruent trials appeared in the blind group, with no interaction with the side of presentation of the target (lateral: F(1,6) = 6.38, p = 0.04; midline: F(1,6) = 11.39, p = 0.015)2. A main effect of group appeared, with generally larger amplitudes for the blind than for the sighted participants (lateral: F(1,12) = 4.25, p = 0.06; midline: F(1,12) = 11.97, p = 0.005). Catch trials In the latency band of the N100 an effect of ROI was also shown in the catch trials (F(1,12) = 7.2, p = 0.02) for lateral electrodes and in midline electrodes (F(1,12) = 16.9, p = 0.001), therefore, the distribution of this component was the same for experimental and catch trials, with larger amplitudes in anterior sites. A number × hemisphere interaction was also present (F(1,12) = 6.31, p = 0.02). This interaction showed larger amplitudes for small numbers in the right hemisphere, while there were no differences in the left hemisphere. The simple effects for this interaction were not statistically significant. No interactions by group or other effects were found for this component. In the latency band of the P300 (300–420 ms.) a number × hemisphere interaction was found in the lateral electrodes (F(1,12) = 17.9, p = 0.001). Large numbers elicited a greater positivity than small numbers in the right hemisphere. The simple effects for this interaction did not reach significance. Our results are consistent with the behavioural findings from Fischer et al. [5] and the ERP data from Salillas et al. [6], both obtained in the visual modality, and extend them to the auditory modality. Our behavioural data show a similar overall organization of the mental number line for sighted as well as blind individuals, as previously demonstrated by Castronovo and Seron [1]. Importantly, the present work shows that the size of a spoken number generates shifts of spatial attention in the auditory space in both groups. However, congruency had a different effect on the ERPs for blind and sighted individuals. The amplitude of the early sensory N100 component was modulated by congruency only in the sighted group. Previous work has shown enhanced N100 amplitude for the same auditory stimulus when presented in an attended versus unattended location [14], [15], [16]. It has been suggested that these effects are generated by an enhancement of information received from the selected source, according to the amount of attention allocated to that input [16]. Evidence further suggests that effects of selective attention to location exert an early influence in the primary auditory cortex [17], [18]. In our experiment, access to a spatially-organized internal numerical representation [19] exerts spatial shifts of attention over auditory space. Moreover, as signalled by the modulation of the N100 for the sighted participants, the effect of congruency between number and target location can be explained as an amplification of the auditory sensory processes. Importantly, this amplification may be the consequence of a top down mechanism: the sensorial activity of primary areas seems to be modulated by a higher order representation. By contrast, in the blind group, the ERP congruency effect was only observed in the cognitive P300 and not in the early N100 component. Moreover, this component showed larger amplitudes for this group. The P300 effect is typically attributed to the increase of relevance of the cued location [20], [21]. It is also described as reflecting higher cognitive processes of attention allocation, retrieval and maintenance of a representation in working memory [10], [14]. Attending to these functional explanations of P300 the larger P300 amplitude found for congruent trials signals that a trace of the relevance of a location may have been held in working memory. The absence of the same modulation in the N100 in the blind suggests that the activation of the number representation does not influence the sensory processing of the target for this group. Accordingly, blind individuals may have restricted processing of congruency to a cognitive level (P300), applying working memory resources to the computation of congruency. The absence of a modulation of P300 amplitude by congruency in the sighted group could be due to the modality of presentation of the stimuli. Provided that the visual modality is functional, auditory working memory in the sighted is less necessary than in the blind [22]. In other words, a different use of spatial representations may derive from the lack of vision. The manipulation of representations like those of numbers may become more dependent on working memory resources and thus more controlled [23], its impact on attention remaining at a higher level. In summary, although our RT data as well as those of previous behavioural studies [1], [4] show the same pattern for blind and sighted participants, our study has uncovered different neurophysiological correlates for number manipulation in the two groups and, therefore, different underlying processes. The absence of visual input and the use of the auditory modality with less discriminative power and greater working memory requirements, may lead blind people to manipulate the mental number line in a more controlled way than sighted people, relying on working memory while showing no effects at the sensory level. In other words, receiving the numerical input through the auditory or tactile modalities may have generated a representation ultimately linked to working memory in its manipulation. This could explain why superior number estimation performance is found compared to sighted people [24]. To rely on a more controlled process when doing number estimation would result in a more accurate outcome. Similarly, the SNARC effect has been found when a manipulation of the mental number line becomes more controlled as in numeric comparison tasks [25], [26]. In conclusion, this study demonstrated how numbers represented in the blind mind's “eye” are processed in a more controlled way compared to sighted people, which may explain the superior performance of non-sighted people in some estimation tasks. 1. One of the blind participants was very slow in the behavioural experiment, which explains the apparent longer reaction times for this group. This participant was not excluded from the analysis in order to have the same individuals for both experiments. The analysis for the behavioural data without this participant showed the same main effect of congruency (F(1,11) = 14.33, p = 0.003) with no interaction with group or side of the target and with mean RTs of 373.28 ms. for the blind group and of 361.73 for the sighted group. 2. An effect of congruency was detected in the sighted group for the P300 window in the lateral analysis (F(1,6) = 6.83, 0.04; F(1,6) = 3.06, p = 0.1) i.e. bigger amplitude for incongruent than for congruent trial. This effect had the same anterior distribution of the N100 for this group, which clearly indicates contamination from the previous component: differing from the broadly distributed P300 congruency effect for the blind group, a congruency × ROI interaction was observed for the sighted group (F(1,6) = 6.01, p = 0.05; F(1,6) = 7.76, p = 0.03), the same interaction that was found for the N100 in this group. If a P300 modulation with bigger amplitudes in congruent trials should be found for the sighted group this would have appeared in at least some posterior sites, which was not the case. Therefore, the bigger negativities for congruent trials in the anterior sites within the P300 latency band for the sighted group suggest a contamination from the earlier N100 effect. We wish to thank all the participants in this study, the Unione Italiana dei Ciechi e degli Ipovedenti, Sezione Provinciale di Trieste for their support in the selection of the participants and Antonio Napoli (University of Trieste) for his help in the collection of data. Author Contributions Conceived and designed the experiments: ES CS. Performed the experiments: ES AG REY. Analyzed the data: ES. Wrote the paper: ES AG REY CS. 1. 1. Castronovo J, Seron X (2007a) Semantic numerical representation in blind subjects: the role of vision in the spatial format of the mental number line. Q J Exp Psychol 60: 101–119. 2. 2. Dehaene S, Bossini S, Giraux P (1993) The mental representation of parity and number magnitude. J Exp Psychol Gen 122: 371–396. 3. 3. Hubbard EM, Piazza M, Pinel P, Dehaene S (2005) Interactions between number and space in parietal cortex. Nat Rev Neurosci 6: 435–48. 4. 4. Szücs D, Csépe V (2005) The parietal distance effect appears in both the congenitally blind and matched sighted controls in an acoustic number comparison task. Neurosci Lett 384: 11–16. 5. 5. Fischer MH, Castel AD, Dodd MD, Pratt J (2003) Perceiving numbers causes spatial shifts of attention. Nat Neurosci 6: 555–556. 6. 6. Salillas E, El-Yagoubi R, Semenza C (2008) Sensory and cognitive processes of shifts of spatial attention induced by numbers: An ERP study. Cortex 44: 406–413. 7. 7. Röder B, Teder-Sälejärvi W, Sterr A, Rösler F, Hillyard SA, et al. (1999) Improved auditory spatial tuning in blind humans. Nature 400: 162–166. 8. 8. Hull T, Mason H (1995) Performance of blind children on digit-span tests. J Vis Impair Blind 89: 166–169. 9. 9. Johnson MR, Mitchell KJ, Raye CL, D'Esposito MK (2007) A brief thought can modulate activity in extrastriate visual areas: Top-down effects of refreshing just-seen visual stimuli. NeuroImage 37: 290–299. 10. 10. Kok A (2001) On the utility of P3 amplitude as a measure of processing capacity. Psychophysiology 38: 557–577. 11. 11. Semlitsch HV, Anderer P, Schuster P, Presslich O (1986) A solution for reliable and valid reduction of ocular artifacts, applied to the P300 ERP. Psychophysiology 23: 695–703. 12. 12. Edgar JC, Stewart JL, Miller GA (2005) Digital filtering in EEG/ERP research. In: Handy TC, editor. Event-Related Potentials. A Methods Handbook. Cambridge: MIT Press. pp. 85–115. 13. 13. Geisser S, Greenhouse S (1959) On methods in the analysis of profile data. Psychometrika 24: 95–112. 14. 14. Luck SJ (1998) Neurophysiology of selective attention. In: Pashler H, editor. Attention. East Sussex, UK: Psychology Press. 15. 15. Woods DL (1990) The physiological basis of selective attention: implications of event related potential studies. In: Rohrbaugh JW, Parasuraman R, Johnson JR, editors. Event-related potentials: Basic issues and applications. New York: Oxford University Press. 16. 16. Hillyard SA, Picton TW (1987) Higher functions of the brain. In: Plum F, editor. Handbook of physiology section I: The nervous system, Part, II. 17. 17. Petkov CI, Kang X, Alho K, Bertrand O, Yund EW, Woods DL (2004) Attentional modulation of human auditory cortex. Nat Neurosci 7: 658–663. 18. 18. Hugdahl K, Law I, Kyllingsbaek S, Bronnick K, Gade A, et al. (2000) Effects of attention on dichotic listening: an 15O-PET study. Hum Brain Mapp 10: 87–97. 20. 20. Hopfinger JB, Mangun GR (2001) Tracking the influence of reflexive attention on sensory and cognitive processing. Cogn Affect Behav Neurosci 1: 56–65. 21. 21. Hopfinger JB, West VMA (2006) Interactions between endogenous and exogenous attention on cortical visual processing. Neuroimage 31: 774–789. 22. 22. Thinus-Blanc C, Gaunet F (1997) Space representations in the blind: Vision as a spatial sense? Psychol Bull 121: 20–42. 23. 23. Rösler F, Clausen G, Sojka B (1986) The double-priming paradigm: a tool for analyzing the functional significance of endogenous event-related brain potentials. Biol Psychol 22: 238–268. 24. 24. Castronovo J, Seron X (2007b) Numerical estimation in blind subjects: Evidence of the impact of blindness. J Exp Psychol Hum Percept Perform 33: 1089–1106. 25. 25. Dehaene S (1990) Varieties of numerical abilities. Cognition 44: 1–42. 26. 26. Bachtold D, Baumuller M, Brugger P (1998) Stimulus-Response Compatibility in representational space. Neuropsychologia 36: 731–735.
Successive governments have failed to realise the potential of the sector, which engages about 35 million people, or 20 percent of the population, in direct or related work. While other countries worked on ways to improve livestock gene pools, fodder and veterinary medicine, Pakistan largely left its farmers to fend for themselves over the decades. The result is a haphazard supply chain riddled with inefficiencies stretching from the cow's udder all the way to the tea cup. The challenge for Iqbal and his fellow pioneers starts with men like 65-year-old Abdul Rashid, a farmer limping along with a cane made from a branch, trying to keep up with his cows and buffaloes wandering through flooded fields in Punjab, Pakistan's agricultural heartland. Unlike in the West, where livestock is neatly organised in high-tech farms for maximum efficiency, Pakistan's dairy industry is fragmented. The majority of suppliers are individual farmers who own three or four cows and buffalos and are scattered in remote villages along crumbling roads or cart tracks. There is no modern marketing system, so it is up to the farmers to find a buyer for their meagre yields. "I have no one to turn to for help," said Rashid as he struggled to stop his animals wandering across a road. "I spend my time chasing my animals and they don't give me enough milk to improve my family's life." Rashid and millions of farmers like him rely on middlemen, or dodhis in Urdu, to sell their milk to households, transporting it in rusty cans tied to old motorcycles. In the potholed town of Sahiwal, dodhis dropped dirty ice cubes into the churns. Dead flies floated on the surface, a reminder of the bacteria that often contaminates Pakistan's milk supplies. "Nothing has changed in 40 years," said one of the middlemen, Mohammed Akram, 55, wearing worn-out plastic sandals and standing near a pile of fetid garbage. "We get up at four in the morning to buy the milk, two kilograms from here, four kilograms from there. We get it from far and wide. It's a lot of hard work." Only about three percent of Pakistan's milk is processed, unlike in many countries where supermarket shelves are stacked with various domestically produced brands. After 15 years of making good money as an executive for Western beverage and tobacco companies overseas, Iqbal decided he wanted to do something for Pakistan. To Iqbal, there was no more glaring example of the gap between Pakistan's potential and its performance than the dairy industry. Rather than despair, he saw an opportunity, pouring his savings of $1 million into creating a breed improvement project called Jassar Farms. He dreams of the day when the average Pakistani cow, which yields about 1,600 litres of milk after it calves, can compete with the top of the line Israeli Holstein that churns out 12,500 litres. Iqbal can take comfort from the fact that he is not alone in his quest for reform. Some international companies are also working for change. Nestle has installed 3,200 industrial-size milk refrigerators at collection points across the country to lay the foundations for the kind of cold storage chain essential for a modern dairy industry, and give farmers a steady market for their milk. At a training centre with manicured lawns and spotless dormitories for farmers in Punjab, Nestle holds workshops to drive home a simple message - properly managed cows produce more milk. So far, Nestle has put 9,000 farmers through the programme. Some have doubled their milk output, says the company, which estimates it could make about $450 million in milk exports from Pakistan. "The potential is very large but it will only succeed if we can develop milk of export quality because we need to be able to trade in the commodity export market," said New Zealander Bill Stevenson, head of milk collection and dairy development at Nestle Pakistan Ltd. Like Iqbal, he has found that deep in rural Punjab, attitudes are hard to change. Many farmers still view their animals as status symbols, not assets that can help turn around the economy, where some believe a lack of opportunities for a frustrated, youthful population may pose as big a threat to stability as militancy. Cows are often sold to pay for weddings or dowries and are seen as four-legged insurance policies for hard times, usually living beside farmers' mud and brick homes. "It's a full-time job," said farmer Mukhtar Ahmed as he lay on a rope bed outside his home, a cow defecating nearby. "And farmers can't always sell their milk because it's not easy to transport and find buyers. Many are left with unsold milk."                            –Reuters
• Subscribe Feature - NetLogo: A low threshold, no ceiling language Feature - NetLogo: A low threshold, no ceiling language Two fifth grade students use NetLogo to learn about electrical current. Image courtesy Pratim Sengupta. Front page image: Tiling with squares whose sides are successive Fibonacci numbers in length. Courtesy Wikipedia under Creative Commons license. Elementary school students may not be able to decipher mathematical models such as Maxwell's Equations. But given the right visualization and computational modeling tools, they can learn the underlying concepts. Meet NetLogo, a multi-agent programmable modeling environment authored in 1999 by Uri Wilensky, a learning sciences and computer science professor at Northwestern University, and founder of the Center for Connected Learning and Computer-Based Modeling. Remember the turtle? A generation of adults were introduced to functions and programming through Logo and the "turtle" - an on-screen triangular cursor - that accompanied it. Logo was first created in 1967 by Wally Feurzeig and Seymour Papert at MIT. The first Logo implementation, Ghost, was written in LISP. But this functional programming language's intellectual lineage can be traced back to such areas as artificial intelligence, mathematical logic, and developmental psychology. Wilensky's NetLogo takes the familiar language to a new level, blending Logo with StarLisp. StarLisp was in turn conceived by Cliff Lasser and Steve Omohundro in 1985 at Thinking Machines Corporation, for use on the company's supercomputers. "While in Logo, you can only give commands to program the behavior of a single turtle, in NetLogo, you can create as many turtles as you want, and give them commands to model emergent patterns that arise from the interactions between these agents," explained Pratim Sengupta, a learning sciences researcher at Vanderbilt University. Sengupta, pictured above, is an assistant professor in the Teaching and Learning department at Vanderbilt University, and the director of the Mind, Matter and Media Lab. Here he demonstrates a NetLogo simulation that shows students magnetic field lines. Image courtesy Miriam Boon From supercomputer to school laptop Today, NetLogo is in wide use by researchers in the natural and social sciences, according to Wilensky's biography, and it comes equipped with models in other domains, such as economics, biology, physics, chemistry, psychology, and system dynamics, to name a few. Sengupta's group is using NetLogo to study how students learn about complex mathematical and scientific concepts. To understand electricity from a microscopic perspective, for example, higher-level physics students traditionally use their knowledge of differential equations and integrals. "That's real easy at the level of a Ph.D. student, but inaccessible to a fifth grade student," Sengupta explained. "Fifth graders don't know algebra very well. They don't have a handle on what rates are. They don't know what calculus is." That's where the educational models and modeling labs built in NetLogo by Sengupta's team come into the picture. "What the labs do is they show the aggregate level behaviors of electric current as emergent from simple interactions between many individual objects such as electrons and ions," Sengupta said. "This is a computational narrative of what's going on, which is both generative and intuitive." So far, Sengupta has conducted trials with over 500 fifth, seventh, and twelfth grade students from several different US schools, and researchers in Singapore and Australia are now using NetLogo in ninth through twelfth grades in several schools. All of these studies support the theory that younger students can develop fairly sophisticated forms of scientific thinking and reasoning through bootstrapping their intuitive knowledge - a theory that contradicts the dominant school of thought that has shaped science curriculums around the world. Sengupta and Wilensky's work goes beyond providing evidence that could overturn what we thought we knew about teaching science, however. It also identifies a mechanism through which students with no previous exposure to mathematically advanced science can gain an intuitive grasp of aggregate behavior on a microscopic level. And in the process, it leaves behind a tool that novice learners at various ages can use to learn about electricity. What next? Sengupta hopes to re-examine and push the limits of what students can learn across several domains such as physics, environmental literacy and evolution, by iteratively building and empirically testing more generalizable versions of the cognitive model of naive intuitions on which he has been working on over the past few years. He is also working on creating more agent-based computational programmable toolkits and learning environments that can support longer-term learning progressions, spanning several years. -Miriam Boon, iSGTW Join the conversation Copyright © 2019 Science Node ™  |  Privacy Notice  |  Sitemap 1. You have to credit our authors.
Can you be an expert in fisheries without a degree in marine biology? The famous scientist Dr Robert Johannes, a marine biologist, spent much of his working life answering this question with a “Hell, yes!” In the 1970s Johannes spent 16 months living with local people in the islands of Palau in the Western Pacific Ocean, learning about fish from them. They taught him about the different types of fish, which reefs the fish lived on, what they ate, how they hid from predators. They also knew when different fish would arrive in their fishing grounds and when they would disappear, when they bred and how many of the different types there were. This information he got from the fishers had been built up over generations. Later, Johannes said that those fishers taught him more in just over a year than he had learnt in 15 years using research methods he practiced at university. What did Johannes do with this knowledge? He wrote it down, and became one of the first researchers of fishers’ knowledge. Other people had lived with, and written about similar communities 50 years earlier, but their work had been lost. Johannes and others uncovered their journals and notes. He found an admiration for people in traditional fishing communities, and felt that their knowledge should be shared with the world. There was a challenge. The scientific way of studying fish was very different to Johannes’ approach of spending months with the local fishers, and recording their ocean lore. Scientists believed in their academic methods, where everything could be counted and measured. The types of knowledge possessed by the fishers did not fit easily with this. Johannes’ challenge was to bring the two approaches together. He believed we could get a complete understanding of fisheries by studying the knowledge that local fishers had built over years. This could be combined with modern science to seeing patterns within the broader picture. Since those early years, experts in both approaches have been busy. Over time, the sea of information they have produced has become murky, and hard to read. In 2014, Dr Edward Hind, a researcher in marine sustainability, embarked on a voyage of discovery, to dredge all this information and summarise its flowing tides. In his review, he describes the ebbs and flows of both research approaches, and asks if they have started to come together. Much like the oceans themselves, Dr Hind finds that the research into fishers’ knowledge has come in waves. Story: Aarti Sridhar and Matthew Creasey Illustrations: Kabini Amin Share This
or ob·tect·ed [ ob-tekt or ob-tek-tid ] / ɒbˈtɛkt or ɒbˈtɛk tɪd / (of a pupa) having the antennae, legs, and wings glued to the surface of the body. Nearby words 1. obstructivity, 2. obstruent, 3. obtain, 4. obtainable, 5. obtaining by deception, 6. obtemper, 7. obtest, 8. obtrude, 9. obtrusion, 10. obtrusive Compare exarate. Origin of obtect 1810–20; < Latin obtēctus (past participle of obtegere, variant of obtigere to cover over), equivalent to ob- ob- + teg(ere) to cover (see thatch, toga) + -tus past participle suffix Examples from the Web for obtect • Consequently the obtect pupa, as this type is called, does not resemble its imago as fully as a free pupa does. The Life-Story of Insects|Geo. H. Carpenter British Dictionary definitions for obtect / (ɒbˈtɛkt) / (of a pupa) encased in a hardened secretion so that the wings, legs, etc, are held immovably to the body, as in butterfliesAlso: obtected Word Origin for obtect C19: from Latin obtectus covered, past participle of obtegere, from ob- (intensive) + tegere to cover
Did a freak storm pushes North Pole 50 degrees above normal to melting point? Claim: A freak storm occurred that pushed the North Pole 50 degrees above normal to a melting point. Status: Likely True Summary: Climate writer Robertscribbler put together a post on his Wordpress stating that a North Atlantic storm would "Push Temps to 36-72+ Degrees (F) Above Normal At North Pole". Each mention of the storm in further articles also states that while El Niño is the usual cause of these storms, the temperature difference is not normal. This article focuses on the storm that pushed the North Pole 50 degrees above melting point. A winter cyclone same as the one that caused tornado out breaks in throughout the US along with severe flooding pushed the North Pole above melting point. There was an extreme drop in pressure this causes the criteria for a bomb cyclone which is defined as dropping one millibar an hour for 24 hours. NOAA predicted that the minimum pressure drop was around 928 millibars around 1 am. The normal temperature at the North Pole is usually 20 degrees below zero. For it to reach freezing or a little higher shows severe weather issues. Origin and Prevalence The claim was first made by climate writer Robertscribbler on his Wordpress. The blog post was made on December 27, 2015, and was titled "Warm Arctic Storm To Hurl Hurricane Force Winds at UK and Iceland, Push Temps to 36-72+ Degrees (F) Above Normal at North Pole". Robertscribbler pulls information from a variety of sources, such as Earth Nullschool and Claudio Cassardo's Wordpress. Robertscribbler's work has been featured in National Geographic's science blogs and has been quoted in major news sources ( as stated on his Facebook page), and Cassardo has a P.H.D in Physics. Robertscribbler's post was used as a source in an article by the Atlantic talking about the storm, posted on December 29, 2015. Later mentions of this claim have been made on Weather.com, an Australian news website name Smh.com, and by meteorologists Ryan Maue and Chris Dolce. All of which were made in February 2017. This claim was also mentioned in November 2016, when a similar event was reported by the Washington Post. The articles original source is the Washington Post. It was published on December 30, 2015. What was added on January: "Data from the International Arctic BuoyProgramme confirms that temperatures very close to the North Pole surpassed the melting point on Wednesday. A buoy (WMO ID Buoy 6400476) at a latitude of 87.45 degrees North hit a high temperature of 0.7 degrees Celsius — or 33 degrees Fahrenheit." Issues and Analysis A day after the Atlantic article, on December 30, 2015, the Washington Post posted their own article about the freak storm. The article did not mention either Robertscribbler's or the Atlantic's articles. This article pulls from a variety of sources but most notably Mashable, which also directly discusses the storm. Because prior sources have not been linked to El Nino, which can occur in a annual cycle, it is hard to find whether or not the claim is concretely true because it has appeared in more than one occasion from 2015 to 2017. DigiPo members can edit this page
What is SAT Superscore and How Does It Work? What is SAT Superscore and How Does It Work? What is SAT Superscore? Your SAT Superscore is the total of your highest scores on each test section. For example: Let’s say you scored a 630 on the Evidence-Based Reading and Writing test and a a 710 on the Math test the first time you took the SAT. On your second try, let’s say you scored a 650 in EBRW and a 700 on Math. Your Superscore would be the total of your highest scores on each section, which would amount to a total score of 1360 (650 plus 710). Sounds good, right? Superscoring is great, but keep in mind that while many colleges and universities count applicants’ SAT Superscores, many others do not. And remember, Superscores only come into play if you take the SAT more than once (which you should do, if you can). Some use the Superscore for admission decisions but request to see all of each applicants’ test scores in order to create a more holistic picture of each candidate. That’s why, depending on where you’re applying, it may be important not to take the test too many times. Some others will only consider your single highest total SAT score. In the example above, that would be a 1350, the total score of the second test. If you are unsure of a school’s policies regarding score submission, check out College Board’s BigFuture site. Admission policies do change regularly, so also make sure to double check the “application requirements” section of each university and college website at the beginning of your application cycle (the fall of the year you’ll be applying to college). How to Use It For schools that do accept Superscores, you should use College Board’s Score Choice tool, which allows you to send only your highest scores to colleges and universities. And be sure to read this post on taking the SAT more than twice for advice on strategizing your test-taking and score submission.
Kid's ASL sign for: vacuum Definition: an electrical apparatus that by means of suction collects dust and small particles from floors and other surfaces. The earliest ASL sign was captured at age 0;11. She not only signed it but also the 'raspberry' mouth morpheme was accompanied. The movement was long and continuous (but the video was cut early). In the video, she was pointing to the vacuum cleaner and then signing it. With the advantage of this 3-dimensional modality of language and the nature of the ASL sign, the mother played language, "sucking" and tickling the baby.
Why Do We Feel Urge To Squeeze Cute Animals And Babies? Posted: Dec 9 2018, 8:27am CST | by , Updated: Dec 9 2018, 8:32am CST, in Latest Science News This story may contain affiliate links. Why Do We Feel Urge to Squeeze Cute Animals and Babies? Credit: University of Delaware Scientists may have found a reason for seeing something too cute and feeling the need to squeeze or pinch it. When we see something cute, why do we want to squeeze or even bite it? There is a reason why it happens and researchers have named it ‘cute aggression.’ Cute aggression has been studied before. For instance, a team of Yale University psychologists released a study related to phenomenon in 2015. But recently, a researcher from University of California, Riverside has thoroughly studied the emotion and took it few steps further. "The Yale researchers initially found that people reported feeling cute aggression more in response to baby animals versus adult animals. But even beyond that, people reported feeling cute aggression more in response to picture of human babies that had been digitally enhanced to appear more infantile, and therefore 'more cute,' by enlarging features like their eyes, cheeks, and foreheads.” Katherine Stavropoulos, a professor of special education at the University of California, Riverside said in a statement. Cute aggresion is mainly considered part of behavioral psychology. But Stavropoulos wondered what happens to brain when people experience urge to squeeze, crush, or even bite creatures they found cute. To find out, she showed four sets of cute images to 52 participants and studied their brains via electrophysiology. The study was designed to assess how adorable participants found each set of photographs and measured their brain activity before, during, and after viewing the images. Results showed that someone’s cute aggression appears to be tied to how overwhelmed that person is feeling. The more overwhelmed they felt after viewing cute animals or babies, the stronger neural reactions they experience. "There was an especially strong correlation between ratings of cute aggression experienced toward cute animals and the reward response in the brain toward cute animals," said Stavropoulos. "Cute aggression may serve as a tempering mechanism that allows us to function and actually take care of something we might first perceive as overwhelmingly cute." This story may contain affiliate links. Find rare products online! Get the free Tracker App now. Latest News The Author comments powered by Disqus
Sun.Star Pampanga - - PERSPECTIVE! - Les­lie Ann L. Lau­rente --oo0oo-- One of the best way to fully en­gage learn­ers into the teach­ing learn­ing process is hav­ing proper mo­ti­va­tion. The fol­low­ing are rec­om­mended strate­gies in or­der to mo­ti­vate learn­ers: 1. Create var­ied learn­ing ex­pe­ri­ences The typ­i­cal class­room is com­posed of dif­fer­ent learn­ers with dif­fer­ent per­son­al­i­ties and in­ter­ests. The role of the teacher is to ad­dress all the needs of th­ese learn­ers and make sure that no­body is left be­hind. The best way to do this is to create var­ied hands-on ex­pe­ri­ences for learn­ers which gives chances to their pref­er­ences. In do­ing so, the learn­ers will be fully en­gaged into the teach­ing learn­ing process and will pay at­ten­tion to ev­ery ac­tiv­ity. 2. Giv­ing learn­ers the sense of con­trol Be­ing the fa­cil­i­ta­tor of learn­ing, the teacher is most of the time in con­trol to what is hap­pen­ing in­side the class­room. How­ever, the teacher must also give chance for learn­ers to have some choice and con­trol over what hap­pens in the class­room. Giv­ing them op­tions on how to present their prod­uct or mak­ing them choose the best strategy for them to work on with a task may give them a sense of con­trol that may just mo­ti­vate them to do more. 3. Try New Learn­ing En­vi­ron­ments Al­though the class­room is the great place for in­cul­cat­ing knowl­edge to learn­ers, hav­ing learn­ers stay for 5 – 6 hours in­side the room will create a sense of bore­dom for some learn­ers. In or­der break the mo­not­o­nous learn­ing en­vi­ron­ment, the teacher should once in a while give the learn­ers a chance to get out of the class­room and in­stead do their ac­tiv­i­ties out­side es­pe­cially when the school has a gar­den or other fa­cil­i­ties that has plants and trees around. This may also help them to bet­ter ap­pre­ci­ate the en­vi­ron­ment and en­joy na­ture at its best. 4. Pro­mote Healthy Com­pe­ti­tion Pro­mot­ing healthy com­pe­ti­tion dur­ing class­room ac­tiv­i­ties isn’t al­ways a bad thin, in some ways, this may help mo­ti­vate learn­ers and would drive them to try harder and ex­cel. The role of the teacher is to make sure that the spirit of sports­man­ship and friendly com­pe­ti­tion is alive in ev­ery group game or any ac­tiv­ity that may re­quire them to show­case their prod­ucts or tal­ents. 5. Ap­pre­ci­ate and Rec­og­nize Learn­ers’ Ef­forts Most learn­ers are mo­ti­vated when they are be­ing rec­og­nized. In some cases, the teacher must make sure that all ef­forts and hard work of learn­ers are rec­og­nized so that this will be an­other way to ig­nite their in­ter­ests to do well. In do­ing so, the learn­ers will be more con­fi­dent and may de­velop their self-es­teem. The au­thor is Teacher II at North Ville High School Newspapers in English Newspapers from Philippines © PressReader. All rights reserved.
Dr Lisa Ackerley, Chartered Environmental Health Practitioner and Media Hygiene Expert, gives us her 10 top tips to prevent Campylobacter food poisoning. Some people think of food poisoning as a mild illness that, if anything, might help them lose a few pounds. I recently watched this clip of a man who contracted Campylobacter food poisoning and went on to develop Guillain-Barre syndrome, causing him to become paralysed. Having also seen a friend go through a similar slow recovery from this syndrome I know how awful, painful and scary it is.  Simple precautions can help to prevent what can be a life-changing, or even life-threatening, event. When we think about the chain of infection, the places to break that chain become very obvious and we see that these precautions are simple and inexpensive.  In the clip Dai talks about the importance of cooking chicken to prevent illness but there is more to it than that. It may have been that he did cook his chicken properly, so how else could he have become so ill? Campylobacter is infectious in very low numbers, so contamination on your fingertips transferred to your mouth is enough to cause illness. No fancy incubation of bacteria or production of toxins, just around 500 microscopic bacteria on a fingertip is enough to do the job.  The bacteria could be present on the food itself, food packaging or in the outdoor environment. Apart from the fact that it may not actually have been the food a person ate that caused the illness, what foxes people is the fact that the symptoms take a few days to appear, so trying to figure out what the ‘mistake’ was is difficult.  Despite great progress in reducing Campylobacter in chicken, it is still prevalent and, as we can’t see it, we must to assume that we need to take measures to prevent illness when handling chicken.  10 top tips to prevent Campylobacter food poisoning 1. When shopping for raw meats and poultry, keep these items away from ready-to-eat foods in your trolley and bag them separately. Or better still, if you have an anti-bacterial bag for life, use that. 2. Wash your hands after packing these foods safely in the fridge away from ready-to-eat foods (I have a fridge box or drawer just for raw meats). 3. When preparing chicken, get ready first! All your utensils and ingredients should be out so you don’t have to touch door handles with contaminated hands. 4. Don’t wash your chicken as it sprays bacteria everywhere and it is not necessary. 5. I use a fork to get my chicken out of the pack and cut it up on the board using a fork to hold it still. Whole chickens get a two fork treatment to get them in the roasting dish. This way I am not coating my hands and nails with Campylobacter. 6. Get it in the pan or oven, preferably without touching it, and so long as you cook it to over 75 °C in the centre (I use a thermometer) then Campylobacter should be killed. 7. The mess that is left behind, that is what could cause infection. Anything that has been contaminated needs to be disinfected, from utensils and worktops to anything your dirty hands may have touched (phone, screens, handles, cooker knobs, kettle etc). 8. The best way to disinfect utensils is in the dishwasher on a hot setting, but if you don’t have a dishwasher wash in hot soapy water. I would tip the wash water away (don’t use for anything else) and then very carefully pour a kettle of just boiled water over the items in the sink as a disinfecting rinse, (Please don’t scald yourself!) or use an anti-microbial spray. 9. On surfaces, you need to clean and sanitise and hot soapy water will not be hot enough (if you can bear the heat with your hands it is not hot enough). Use a squirt of anti-bacterial spray, leaving it on the surface for a couple of minutes and then remove with paper towel. Even if you don’t like using chemicals, targeted hygiene is worth it for peace of mind. We aren’t talking bucket loads anyway! 10. Finally, I can’t write a blog without saying that hand washing is absolutely key. After handling raw meat and poultry, wash your hands thoroughly with soap and dry them (I would use a piece of paper towel). After doing the cleaning up, wash your hands again. The cost of these precautions is small in terms of time and money but think of what suffering it may save, which in itself has a huge personal and financial cost. It’s worth it. No-one wants Campylobacter food poisoning! For more information on Campylobacter food poisoning I helped to create an e-learning module with RSPH, The Campylobacter: facts and prevention strategies, for which CPD points can be awarded for those who need them. RSPH also gives members free access to a webinar I gave on the subject in 2017. RSPH members have access to the Campylobacter webinar, and many more, 12 months after original broadcast. If you would like to find out more about our membership, please visit the membership section of our website.
Winterberries for Winter Color  Winterberries bring a flash of scarlet to our color-starved northern winter landscape. By Thomas Christopher The law of supply and demand dictates that when something is in short supply, its value skyrockets. This is precisely what makes winterberry so precious.  Ilex verticillata, our native winterberry, is an uninspiring shrub during the growing season, an expansive fountain of medium to dark green leaves that bears inconspicuous greenish-white flowers in late spring. And although this native shrub is a member of the holly genus, it isn’t evergreen. Nor do the leaves color in fall, they just fall from the twigs.  When they do, though, they reveal the winterberry’s great gift. As the name suggests the branches are typically laden with vivid scarlet berries that gladden the hearts of gardeners in the color-starved northern winter. These fruits are also popular with birds ranging from wild turkeys and woodpeckers to cedar waxwings and over-wintering robins. Likewise, squirrels, rabbits, and foxes are likely to partake of this late season feast. Ranging from the Atlantic provinces of Canada south to Texas and Florida, the winterberry naturally inhabits swamps, stream sides and moist lowlands, but it easily adapts to well-watered, acidic garden soils. In its natural state, this shrub is slow growing but can eventually attain a height and spread of twelve feet. Fortunately, plant breeders have developed a number of more compact cultivars. ‘Red Sprite’, for example, bears exuberant crops of large red berries but makes a shrub only 4 ft. tall by 4 ft. wide.  ‘Shaver,’ is slightly larger at 6 ft. by 6 ft., and is remarkable in that it bears orange-red fruits.  ‘Cacapon,’ which reaches a height 6 to 8 ft. bears glossy, dark green, crinkled leaves and heavy crops of true red fruits. Larger cultivars that are outstanding berry producers include ‘Winter Red’ which grows to a height and width of 8 f.t and bears particularly heavy crops of red fruits which typically persist well into winter, and ‘Winter Gold’ (10 ft. by 10 ft.) whose pinkish-orange fruits mature to a rich gold.  The growth of winterberries tends to be slow, though regular watering and the application of appropriate doses of fertilizer will enhance it somewhat.  The impatient gardener, however, may prefer the race of hybrids created by crossing Ilex verticillata with an Asian relative, the Japanese winterberry, Ilex serrata. These preserve the appearance of the familiar American winterberry but match it with more vigorous growth.  Most popular of these is ‘Sparkleberry’ which reaches a height and width of 6 to 10 ft.  This hybrid is also less hardy than the pure native types, over-wintering reliably only through zone 5. Like all hollies, winterberry is dioecious.  That is, it bears its male and female flowers on different shrubs. This means that in order for your female specimens to bear fruit, there has to be a male plant nearby to fertilize them. Generally, a single male is sufficient to fertilize 5-10 female winterberries, which is good because the males have little to recommend them other than their ability to bring on fruiting in their female counterparts. Plant the male near to the females (within 50 feet), but in someplace inconspicuous. Complicating this issue of pollination is the fact that different strains of winterberry bloom at slightly different times, so that an early-blooming male may fail to pollinate a late-blooming female. Use the early-blooming male cultivar ‘Jim Dandy’ to pollinate early-blooming females ‘Red Sprite,’ ‘Shaver,’ and ‘Cacapon,’ and late-season male ‘Southern Gentleman’ to pollinate late-season females ‘Sparkleberry,’ ‘Winter Red,’ and ‘Winter Gold.’ Because they flower on new growth, winterberries should be pruned in early spring. Though starring in the winter garden, winterberries are relatively plain plants in other seasons.  As such, they may not deserve a central spot in the landscape, but, adapted as they are to full sun or partial shade, they make a fine shrub for backing up a flower garden or for massing at the edge of a woodland. Their tolerance for wet soils makes winterberries indispensable for damp, low-lying spots and rain gardens.  Enjoy the wild winterberries in our wetlands this winter, and find time to introduce a pair – one female and one male – into your garden next spring.  That way, when the dim, cold days return, you’ll have something to warm your spirits at your own doorstep. Thomas Christopher is the co-author of “Garden Revolution” (Timber Press, 2016) and is a volunteer at Berkshire Botanical Garden. Be-a-Better-Gardener is a community service of Berkshire Botanical Garden, one of the nation’s oldest botanical gardens in Stockbridge, MA. Its mission to provide knowledge of gardening and the environment through 25 display gardens and a diverse range of classes informs and inspires thousands of students and visitors on horticultural topics every year.  Thomas Christopher is the co-author of Garden Revolution (Timber press, 2016) and is a volunteer at Berkshire Botanical Garden.
Definitions for "Sense of place" a curious phrase for me - and I envision you smelling, sensing, touching, feeling, hearing, even tasting - the smells, sense of being, foods, people - to see whether you can really 'see' them - both in your eyes, but also through their own - i hope a feeling of affinity with the physical environment an affinity with the physical environment A consciousness of one's physical surroundings or collective awareness of place expressed in cultural forms. Sense of place is generally associated with one's neighborhood, community, city or region. an understanding and appreciation of the place in which I live and the web of connections between it and its inhabitants Keywords:  philpotts, kaui, mcgrath, hawaii, mary a website for the Hawaii interior design book by Mary Philpotts McGrath and Kaui Philpotts featuring award winning interior designs a virtual immersion that depends on lived experience and a topographical intimacy a digitisation initiative funded under the New Opportunities Fund (NOF) - Digitise Programme a program that provided participants with the opportunity to learn about the historical figures for whom the District's schools have been named Keywords:  impetus, artistic, big, part a big part of my artistic impetus a collection of stories, reminiscences, personal histories, comments and ideas about what Northern Ireland means to you a way of embracing humanity among all of its neighbors Keywords:  companion, goes, time a companion to Time Goes By - a Keywords:  worth a sense of worth a disappearing resource in America today Keywords:  spirit, essential, character, area the essential character and spirit of an area. a writing course which tests the boundaries of traditional English education Keywords:  thing, personal a personal thing
carnosinaemiamedical dictionary An autosomal recessive congenital disease, characterised by the presence of excess amounts of carnosine in the blood and urine and caused by a genetic deficiency of the enzyme carnosinase. Clinically characterised by progressive neurological damage, severe mental retardation, and myoclonic seizures. Origin: carnosine + G. Haima, blood + -ia American spelling: carnosinemia (05 Mar 2000) Carnivora, carnivore, carnivorous, carnivory < Prev | Next > carnosinase, carnosine, carnosine synthetase
—Matthew 11:28-30 Who is this passage for?  Those who are weighed down by their sense of the weight of their sin before a holy God. What two actions are to be taken?  First, yoke up with Jesus.  A yoke connects two animals, like oxen for instance.  Once yoked, they cannot go in different directions.  They must go together, as one.  Yoking up with Jesus means connecting with Him, desiring to go where He goes.    Second, learn from Jesus.  This underscores that He leads those who yoke up with Him, not the other way around.  This is also translated “learn of Me.”  Not only is Jesus the Teacher, Leader, and Guide for those who yoke up with Him, He is the subject we are to learn, the example we are to follow, and the goal we are to pursue. What is the promise Jesus offers?  Because Jesus is gentle and lowly in heart, He promises those who yoke up with Him that instead of being weary and heavy laden, we will find rest for our souls.  We will find rest from the crushing guilt and condemnation of sin; rest from the burden of trying to be good enough, and/or religious enough—neither of which can anyone accomplish.     That His yoke is easy doesn’t mean that the Christian life is one of no problems.  What it does mean is that yoking up with Him means He carries us and our load.  And though the world’s yoke promises fulfillment, it does not, whereas the promise of yoking up with Jesus is eternal and ultimate rest in Heaven.  Compared with the burden of being yoked up with the world, being yoked up with Jesus truly is no burden at all. May all who have ears to hear, hear the words of our Lord in this passage.
Mount Gerizim is one of the most important ancient biblical sites which appears for the first time in the book of Deuteronomy of the Torah. It was the place that God chose for the blessing ceremony and Mount Ebal was for the curse. The scenic panoramic view from the top of the hill offers a spiritual experience and makes it an excellent opportunity for visitors to learn about the early days of the People of Israel in the Promised Land. “And when the Lord your God has taken you into the land of your heritage, you are to put the blessing on Mount Gerizim and the curse on Mount Ebal.” Deuteronomy 11:29 BBE Deuteronomy 11:29–32 KJV Joshua 8:33–35 KJV “Gerizim,” Easton’s Bible Dictionary, paragraph 2874. Jesus and the Samaritan Woman And he must needs go through Samaria. Then cometh he to a city of Samaria, which is called Sychar, near to the parcel of ground that Jacob gave to his son Joseph. Now Jacob’s well was there. Jesus therefore, being wearied with his journey, sat thus on the well: and it was about the sixth hour. There cometh a woman of Samaria to draw water: Jesus saith unto her, Give me to drink.(For his disciples were gone away unto the city to buy meat.) Then saith the woman of Samaria unto him, How is it that thou, being a Jew, askest drink of me, which am a woman of Samaria? for the Jews have no dealings with the Samaritans. Jesus answered and said unto her, If thou knewest the gift of God, and who it is that saith to thee, Give me to drink; thou wouldest have asked of him, and he would have given thee living water.The woman saith unto him, Sir, thou hast nothing to draw with, and the well is deep: from whence then hast thou that living water? Art thou greater than our father Jacob, which gave us the well, and drank thereof himself, and his children, and his cattle? Jesus answered and said unto her, Whosoever drinketh of this water shall thirst again:But whosoever drinketh of the water that I shall give him shall never thirst; but the water that I shall give him shall be in him a well of water springing up into everlasting life.The woman saith unto him, Sir, give me this water, that I thirst not, neither come hither to draw. Jesus saith unto her, Go, call thy husband, and come hither.The woman answered and said, I have no husband. Jesus said unto her, Thou hast well said, I have no husband:For thou hast had five husbands; and he whom thou now hast is not thy husband: in that saidst thou truly.The woman saith unto him, Sir, I perceive that thou art a prophet. Our fathers worshipped in this mountain; and ye say, that in Jerusalem is the place where men ought to worship. Jesus saith unto her, Woman, believe me, the hour cometh, when ye shall neither in this mountain, nor yet at Jerusalem, worship the Father.Ye worship ye know not what: we know what we worship: for salvation is of the Jews.But the hour cometh, and now is, when the true worshippers shall worship the Father in spirit and in truth: for the Father seeketh such to worship him.God is a Spirit: and they that worship him must worship him in spirit and in truth.The woman saith unto him, I know that Messias cometh, which is called Christ: when he is come, he will tell us all things. Jesus saith unto her, I that speak unto thee am he. John 4:4–26 KJV Jesus and the Samaritans People But he said unto them, I have meat to eat that ye know not of.Therefore said the disciples one to another, Hath any man brought him ought to eat? Jesus saith unto them, My meat is to do the will of him that sent me, and to finish his work.Say not ye, There are yet four months, and then cometh harvest? behold, I say unto you, Lift up your eyes, and look on the fields; for they are white already to harvest.And he that reapeth receiveth wages, and gathereth fruit unto life eternal: that both he that soweth and he that reapeth may rejoice together.And herein is that saying true, One soweth, and another reapeth.I sent you to reap that whereon ye bestowed no labour: other men laboured, and ye are entered into their labours. John 4:27–42 KJV
Dog and Puppy Health dog health care Dog Hip Dysplasia Hip dysplasia is a condition affecting the hip joint, which occurs in humans but is more commonly associated with animals, especially dogs (Canine hip dysplasia). Many mistakenly think that the ailment is a form of arthritis, but that is simply not the case.  Often, dogs that suffer from hip dysplasia will develop arthritis, but this condition is a result of hip dysplasia and not the disease itself.  Even when detected early, there is no “cure” for hip dysplasia; it must be treated with medication to reduce the amount of pain that the dog suffers or be corrected as much as possible with surgery. Hip dysplasia is a congenital disease that, in its more severe form, can eventually cause crippling lameness and painful arthritis of the joints. It is caused by a combination of genetic and environmental factors. It can be found in many animals and occasionally in humans, but is most commonly associated with dogs, and is most common in medium-large pure bred dogs, such as German Shepherd Dogs, Labrador or Golden retrievers, Rottweilers and Mastiffs, but also occurs in some smaller breeds such as spaniels. Hip dysplasia is one of the most studied veterinary conditions in dogs, and the most common single cause of arthritis of the hips. In humans it occurs at a rate of about 4 births per thousand (0.4%) In a hip sufferring from dysplasia, two things are commonly abnormal. First, the caput is not deeply and tightly held by the acetabulum. Instead of being a snug fit like a normal hip would, it is a loose fit, or a partial fit. Secondly, the caput or acetabulum are not smooth and round, but are mis-shapen, causing abnormal wear and tear or friction within the joint as it moves. What Causes Hip Dysplasia? As we mentioned above, there is no “cure” for hip dysplasia. However medication can be given to control the pain and reduce inflammation of the joint, but the only way to treat the condition on any permanent basis is through surgery.  The best way to combat hip dysplasia is through selective breeding.  If the either of the potential parent animals show traits of hip dysplasia, they should not be bred and should be spayed or neutered to ensure they do not pass on the trait.  All breeding dogs should be X-Rayed at a young age to check for signs of the condition.  Many times a dog that appears perfectly healthy and has no signs of the condition can actually have hip dysplasia. Some Material From Wikipedia, the free encyclopedia ~ Agnes Repplier Healthy Dog Toolkit
Paternity Tests Questions surrounding paternity during pregnancy are common, and knowing the answer to who a child’s biological parents are is important for that child’s future. Throughout time, there has been a significant issue regarding a child’s paternity; maternity is easy to determine, as a woman who gives birth to a child knows it is her’s. However, for fathers, it isn’t so easy. Paternity testing uses DNA profiling (or genetic fingerprinting) to establish if an individual is a biological parent of the child or not. There are a few different types of paternity tests, and they can differ in price, accuracy, safety, as well as when they can be done. In some situations, paternity needs to be established prior to birth, which makes tests riskier, more invasive, as well as more expensive. Why is Paternity Important to Know? Knowing the biological family of a child is incredibly important for many reasons. • Knowing the biological family helps provide medical history for a child, which can help manage overall health. Parents can take preventative measures to protect their children from diseases that run in the family.1 • Establish legal and social benefits for the child, including financial support, social security, health insurance, veteran benefits, and government aid. • Help strengthen the bond between parents and child. • Gives the child a sense of identity by knowing who their biological parents are and where they come from. Currently in the United States, roughly 30% of all fathers who are unsure if they are their child’s biological father are right, and around 3% of all dads are unaware that the kid they are raising isn’t their biological child.2 Postnatal Paternity Tests Paternity tests are easier and cheaper to perform after a child is born (postnatal). There are a few ways this can be done: • Umbilical cord sample immediately after delivery • Cheek swab (buccal) or blood sample After samples are collected from both the child and potential father, they are sent to laboratories to be tested.1The buccal samples are tested for DNA markers that match each other through a process called electrophoresis, which takes proteins from a person’s blood and places it into a gel, then runs electric currents through it. Different isozymes of the proteins separate from the rest of the blood in unique ways, indicating specific isozymes.3 These differences are related to the differences in the alleles of the DNA, and through this test it is possible to discover if a child and man share isozymes in their blood, indicating that they are related.3 Each child’s DNA is composed of pieces of both parents’ genetic material, creating a unique combination. This genetic material (or genome) can be compared to a potential father’s DNA to discover if there are enough similarities to establish a paternal relationship. It is easier to test a male child’s paternity because the Y chromosomes can be compared since this chromosome was passed directly from father to son.3 Blood samples are tested through a system called ABO typing, which looks for specific antigens on the blood cells that are coded by the ABO locus on human chromosome 9.3 A child inherits two alleles from their parents (one from the mother, and one from the father). ABO typing establishes if a child has a matching allele to the potential father. These tests are mostly used to exclude the possibility of a particular man being the father, and are thus less accurate than DNA tests through cheek samples.3 Postnatal tests tend to cost between $400 and $800, depending on a person’s health insurance coverage, as well as where one lives.4 Prenatal Paternity Tests Sometimes it is necessary or desired to know a child’s paternity prior to their birth (prenatal). These tests tend to be more expensive, invasive, and carry more risks than postnatal tests. There are three options for prenatal paternity tests, including Amniocentesis, Chorionic Villus Sampling (CVS), and Non-Invasive Prenatal Paternity (NIPP).1 A doctor can perform Chorionic Villus Sampling (CVS) during the first trimester of a pregnancy (10-13 weeks and later) by guiding a thin needle or tube through the vagina and cervix to get chorionic villi, which are finger-like pieces of tissue attached to the wall of uterus.1 These villi contain the same genetic makeup as the fertilized egg, which can be tested for similarities between the baby and the potential father. CVS tests are highly accurate as the sample is taken directly from the fetus, versus from the mother’s blood. A doctor can perform an amniocentesis during the second trimester of pregnancy (14-20 weeks) by using ultrasound imaging to guide a thin needle through the abdomen and into the uterus todraw out a small amount of amniotic fluid. This fluid is then tested to for DNA similarities. Some risks accompany this procedure, including a chance of harming/hurting the baby or causing a miscarriage. Less severe side effects include vaginal bleeding, cramping, and amniotic fluid leakage.1 amniocentesis testing is highly accurate as the sample is taken directly from the fetus. Non-Invasive Prenatal Paternity (NIPP) is the only non-invasive prenatal test with high accuracy, and can be performed as early as seven weeks into gestation. A small amount of fetal DNA is present in the mother’s blood during pregnancy, which can be collected and tested against a sample from the potential father. These tests are around 99.9% accurate and are the safest for the baby. Prenatal pregnancy tests are more expensive than postnatal tests because of additional doctor and hospital fees, with costs ranging from around $1000 and $2000.1 Knowing a child’s biological parents can help prevent future problems in terms of healthcare and benefits, and can help secure healthier and stronger relationships between the child and parents. However, many children are raised by one parent, adopted parents, or by other family and friends and have fulfilling, happy lives. 1. American Pregnancy Association. Paternity Testing. July 2015. Web 2. Rosenthal, Jared. Health Street. Facts About Paternity. January 28, 2015. Web. 3. Adams, Jill. Scitable by Nature Education. Paternity Testing: Blood Types and DNA. 2008. Web. 4. Cost Helper Health. Paternity Test Cost. Web. Last Updated: 28 October 2015.
Agent-Based Social Simulation Overview 1 Social Virtual Agent 2 Agent Vision 3 Agent Perception Combination 4 Evacuation Scenarios 5 Related Papers 6 Demos 7 The MAVSVille project is relat­ed to the devel­op­ment of a social sim­u­la­tion sys­tem where vir­tu­al agents rep­re­sent­ing humans evolve in an envi­ron­ment rep­re­sent­ing a city. The city con­sists of 814 envi­ron­ment objects which include com­mer­cial build­ings, res­i­den­tial areas, roads, trees, bench­es, bas­ket­ball courts and parks. Thou­sands of vir­tu­al agents per­ceive their sur­round­ings through advanced vision, audi­to­ry and olfac­to­ry sen­sors. They exe­cute com­plex path-find­ing and col­li­sion avoid­ance algo­rithms to move with­in the envi­ron­ment. In addi­tion, they inter­act with oth­er vir­tu­al agents and plan and delib­er­ate to achieve their goals. A social vir­tu­al agent is an instance of the DIVAs agent archi­tec­ture that is used to mod­el a human. As such, a social vir­tu­al agent has the fol­low­ing archi­tec­ture: A per­cep­tion sys­tem that mod­els human sen­so­ry sys­tems is crit­i­cal for sim­u­lat­ing vir­tu­al agents evolv­ing in open envi­ron­ments (i.e., inac­ces­si­ble, non-deter­min­is­tic, dynam­ic, con­tin­u­ous) . In order to for­mu­late plans and make deci­sions, vir­tu­al agents need to obtain visu­al envi­ron­men­tal infor­ma­tion. Tech­niques to acquire this infor­ma­tion have two main goals: 1) pro­vide accu­rate results, and 2) exe­cute as quick­ly as pos­si­ble. These goals con­flict with each oth­er since increas­ing the accu­ra­cy of vision tech­niques results in greater pro­cess­ing time. Our vir­tu­al agent vision per­cep­tion algo­rithms approx­i­mate real­is­tic vision while main­tain­ing low exe­cu­tion time. Sim­i­lar­ly to human vision, in our approach, each agent’s per­cep­tion mod­ule process­es envi­ron­ment infor­ma­tion uti­liz­ing the vision sen­sor to deter­mine exact­ly what the agent is able to see with­in a vision cone (the human eye takes in light in the shape of an increas­ing cone). agent-vis1agent-vis2     agent-vis3 The vision sen­sor exe­cutes two tests: the vision test and the vision obstruc­tion test. These tests make use of the agent vision cones in com­bi­na­tion with bound­ing box­es around envi­ron­ment objects in order to effi­cient­ly deter­mine which objects are seen. After the vision tests are com­plete, the infor­ma­tion regard­ing seen objects is stored in the agent’s knowl­edge mod­ule. The accu­ra­cy and effi­cien­cy of our vision tech­niques have been ver­i­fied on mul­ti-agent sce­nar­ios involv­ing thou­sands of agents exe­cut­ing in sim­u­lat­ed real-time. Most Mul­ti-Agent Based Sim­u­la­tion Sys­tems (MABS) have tack­led the chal­lenge of per­cep­tion by pro­vid­ing agents with glob­al or local envi­ron­men­tal knowl­edge. Even though these approach­es are straight­for­ward and easy to imple­ment, they are unfit to sim­u­late real­is­tic sce­nar­ios. To date, most MABS that imple­ment some form of per­cep­tion have focused heav­i­ly on a sin­gle sense, vision. Since the inte­gra­tion of oth­er sens­es such as smell or hear­ing is almost non-exis­tent with­in MABS, the com­bi­na­tion of per­cep­tion data has drawn very lim­it­ed atten­tion. We have devel­oped an agent per­cep­tion mod­ule which inte­grates vision, audi­to­ry and olfac­to­ry sen­sors. The var­i­ous sen­sors para­me­ters can be con­fig­ured indi­vid­u­al­ly for each agent and can be mod­i­fied at exe­cu­tion time. The per­cep­tion com­bi­na­tion algo­rithm com­bines the sen­so­ry data col­lect­ed from the var­i­ous sen­sors to pro­duce knowl­edge. Agent Per­cep­tion Mod­ule The per­cep­tion mod­ule receives as input the event data which includes infor­ma­tion about the event as well as its sen­sor inter­faces. For exam­ple, an explo­sion includes audi­ble, vis­i­ble, olfac­to­ry, and tac­tile inter­faces, where­as a siren only includes an audi­ble inter­face. Once a sen­sor receives event data, it deter­mines whether the infor­ma­tion is per­ceiv­able by exam­in­ing the inter­faces. Using the agent cur­rent state and the raw sen­so­ry data, the sen­sor exe­cutes a spe­cial­ized algo­rithm to deter­mine what is actu­al­ly per­ceived by the agent.
EPA Designation Regulated EPA Classification Organic Chemicals EPA Levels 1,2 0.1 MCLG (mg/L) 0.1 MCLG (mg/L) Alternative Names none Sources Discharge from chemical and agricultural chemical factories Chlorobenzene is an aromatic organic compound with the chemical formula C6H5Cl. This colorless, flammable liquid is a common solvent and a widely used intermediate in the manufacture of other chemicals. Chlorobenzene is a colorless organic liquid with a faint, almond-like odor. Chlorobenzene is used in the manufacture of other organic chemicals, dyestuffs and insecticides. It is also used a solvent for adhesives, drugs, rubber, paints and dry cleaning, and as a fiber-swelling agents in textile processing. Health Effects Some people who drink water containing chlorobenzene well in excess of the maximum contaminant level (MCL) for many years could experience problems with their liver or kidneys. EPA Data Source: Chlorobenzene EPA Definitions:
you're reading... Economic and Social Policies, PUBLICATIONS, Structural and Cohesion Policies What if gene editing became routine practice? Written by Mihalis Kritikos, Manual genetic engineering. Manipulation of DNA with bare hands, scalpel and tweezers. Isolated on a white background © Perception7 / The announcement, in November 2016, that gene editing had been tested in a person for the first time was received as a potential ‘biomedical Sputnik’ moment marking a breakthrough in the field of cancer research. In February 2016, the UK became the first country to authorise the genetic modification of human embryos using CRISPR-Cas9[1] and related techniques, for research. Gene editing is a rapidly developing area of biotechnology that allows scientists to edit the genome of a living organism by inserting, deleting or replacing pieces of DNA. The capacity to engineer genomes in a systematic and cost-effective way has been a long-standing objective in the field of genomic studies. Several gene-editing techniques have recently been developed to improve gene-targeting methods, including CRISPR-Cas9, transcription activator-like effector nucleases (TALENs) and zinc-finger nucleases (ZFNs). This multitude of techniques illustrates the potential of gene editing in targeting genes in a precise and cost-effective manner and modifying human genomes even at the embryonic stage. CRISPR-Cas9 is a powerful tool that has the potential to cut the DNA of any genome at any desired location, replace or add parts to the DNA sequence by introducing the Cas9 protein and appropriately guide RNA into a cell. It currently stands out as the biggest ‘game changer’ in the field of gene editing due to its efficiency and low cost. This technological trajectory is expected to enhance our capacity to target and study particular DNA sequences in the vast expanse of a genome. Potential impacts and developments CRISPR-Cas9, being a fast-moving technology, has a lot of potential as a tool for directly modifying or correcting the fundamental disease-associated variations in the genome and for developing tissue-based treatments for cancer and other diseases by disrupting endogenous disease-causing genes, correcting disease-causing mutations or inserting new genes with protective functions. Two first-in-human safety trials have been initiated to study whether CRISPR-edited immune cells could kill tumour cells in people with terminal cancer. Researchers hope to use it to adjust human genes to eliminate diseases, fight with constantly evolving microbes that could harm crops, wipe out pathogens and even edit the genes of human embryos, which could eventually lead to transformative changes in human well-being. CRISPR-Cas9 can be used to alter the genes of a wide range of organisms with relative precision, and also create animal models for fundamental research. Editing the genes of animals could improve disease resistance, control mosquito populations to mitigate or tackle malaria transmission, or even lead to the creation of farmaceuticals, which are drugs created using domesticated animals or crops. Recently, scientists discovered how mosquitoes become virulent virus hosts unlocking the mechanisms by which yellow fever virus (YFV), Zika virus (ZIKV) and West Nile virus (WNV) antagonise antiviral small RNA pathways in disease vectors. In addition, the technique is expected to facilitate transplanting animal organs into people by eliminating copies of any retrovirus present in animal genomes that may harm human recipients. CRISPR-Cas9 may develop the potential to enable the creation of human organs in chimeric pigs, with the possibility of having an unlimited supply of organs not rejected by the immune system of human recipients. At the same time, the use of CRISPR has generated a series of socio-ethical concerns over whether and how gene editing may be used to make heritable changes to the human genome, lead to designer babies, or even disrupt entire ecosystems, leading some scientists to recommend a moratorium on making inheritable changes to the human genome. For instance, the application of CRISPR as a pest-control technique may produce off-target effects and mutations, which could lead to the dispersion of gene drive, the disappearance of a whole animal population, or accidental releases and/or the irreversible disturbance of entire ecosystems. Taking into account the non-maleficence principle in risk assessment, and distinguishing the clinical and therapeutic aims of gene editing from its enhancement applications/uses have also become sources of major concern. Other important problems are linked to the efficient and safe delivery of CRISPR-Cas9 into cell types or tissues that are hard to transfect and/or infect. These range from the prospect of irreversible harms to the health of future children and generations, all the way to concerns about opening the door to new forms of social inequality, discrimination and eugenics. In October 2017, the Parliamentary Assembly of the Council of Europe reaffirmed its opposition to contemplating germline changes, as expressed in the ‘Oviedo Convention’, on the grounds that they cross ‘a line viewed as ethically inviolable’ (see Recommendation 2115 (2017) on the use of new genetic technologies in human beings). Anticipatory policy-making Given the rapid pace of scientific developments in the field of gene editing, its regulatory oversight seems more necessary than ever before. However, there is a lack of scientific and legal consensus as to whether this transformative technology should be regulated as such, or whether its techniques and products should instead be controlled individually following a result-based approach. International discussion, especially in the frame of the Nagoya Protocol, is currently focused on the regulatory status of genome-editing techniques. Within this frame, the European Commission is working on a legal interpretation of the regulatory status of products generated by new plant-breeding techniques so as to minimise legal uncertainties in this area. In July 2018, the European Court of Justice (ECJ) ruled that genome-edited organisms qualify as products of genetic engineering and hence fall under the scope of the 2001/18 Deliberate Release Directive. The Court declared that genetic modification includes genetic changes ‘in a way that does not occur naturally’. The ruling emphasises that organisms obtained by mutagenesis, a set of techniques which make it possible to alter the genome of a living species without the insertion of foreign DNA, are GMOs and are, in principle, subject to the obligations laid down by the relevant EU-wide authorisation rules. Patenting CRISPR-Cas9 for therapeutic use in humans is also legally controversial. In September 2018, the US Court of Appeals for the Federal Circuit awarded, for the first time, intellectual property on the use of CRISPR in ‘eukaryotic cells’, which include plant and animal cells, to the Broad Institute, MIT, and Harvard, which had been the first to obtain a CRISPR patent in 2014. The risks of heritable, unintended and unpredictable genetic mutations also raise questions about the safety of the technique and the attribution of liability in case of damages. In a recent report under the title ‘Gene Drives on the Horizon: Advancing Science, Navigating Uncertainty, and Aligning Research with Public Values’, the US National Academies of Sciences, Engineering, and Medicine urged caution when releasing gene drives into the open environment and suggested ‘phased testing’, including special safeguards in view of the high scientific uncertainties and potential ecological risks. In fact, many scientists caution that there is much to do before CRISPR is deployed in a safe and efficient manner, given that anyone with the appropriate equipment could engineer a vaccine‐resistant flu virus or invasive species in a laboratory. Finally, yet importantly, CRISPR might create additional challenges from a risk assessment standpoint, in that organisms produced by these methods may contain more pervasive changes to the genomes of living organisms than traditional genetic modification techniques. Given the variety of concerns surrounding the potential unintended consequences of these techniques, public debates on responsible use of this promising technology are needed at local, national and supranational levels. Read this At a glance on ‘What if gene editing became routine practice?‘ on the Think Tank pages of the European Parliament. About Scientific Foresight (STOA) 1. Pingback: What if gene editing became routine practice? | - October 17, 2018 Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s Download the EPRS App EPRS App on Google Play EPRS App on App Store What Europe Does For You EU Legislation in Progress Topical Digests EPRS Podcasts Join 2,945 other followers RSS Link to Scientific Foresight (STOA) Disclaimer and Copyright statement %d bloggers like this:
Time Gadgets Time Zones Frankfurt, HE City of Frankfurt, Hesse, Germany Frankfurt Time Germany Time: Central European Time (CET) Frankfurt Map View Larger Map City of Frankfurt, Germany Frankfurt am Main, commonly known simply as Frankfurt, is the largest city in the German state of Hesse and the fifth-largest city in Germany. Situated on the Main River, Frankfurt is the financial and transportation centre of Germany and the largest financial centre in continental Europe. It is home to the European Central Bank, the German Federal Bank, the Frankfurt Stock Exchange and the Frankfurt Trade Fair. Frankfurt Airport is one of the world's busiest International airports, and is the biggest cargo airport in Europe. The city of Frankfurt contains one of the two tallest skyscrapers in the European Union, the Commerzbank Tower and Messeturm. Bartholomew's Cathedral is a Gothic building which was constructed in the 14th and 15th centuries and is the main church of Frankfurt. From 1356 onwards, kings of the Holy Roman Empire were elected in this church, and from 1562 to 1792, the roman-German emperors were crowned here. The famous old opera house was built in 1880. It was one of the major opera houses in Germany until it was heavily damaged in World War II. Until the late 1970s it was nicknamed "Germany's Most Beautiful Ruin" and there were even efforts to blow it up. Due to public pressure, it was fully reconstructed and reopened in 1981. Today it functions as a concert hall. The Zeil is Frankfurt's main shopping street and one of the most crowded in Germany. The street is a pedestrian-only area and is bordered by two large plazas. During the month before Christmas, the extended pedestrian-only zone is host to the fifth largest Christmas Market in Germany. A major festival in the city is the Museums Riverbank Festival. It is one of the biggest cultural festivals in Germany which attracts more than 3 million visitors. It takes place yearly at the end of August on both sides of the Main Riverbank in the city centre. More than 20 museums are located there and they are open far into the night. Furthermore, there are special attractions like live-bands, dance shows, several booths for crafts, jewellery, clothes and food from all around the world. It ends with a spectacular firework display. International airports Sun / Moon Times Frankfurt Airport The Airport code is: FRA What is the weather in Frankfurt? City of Frankfurt websites: Frankfurt-eu.com Our creative collection City Clock Moving time Sun Time Season progress Moon Time Current phase
Dogs eat grass to make themselves vomit By December 14, 2017True or False There have been many theories as to why dogs do this, but very little research. However, in one study conducted at UC Davis University, researchers found that grass eating was common since 68% of dogs ate grass on a daily or weekly basis. Only 8% of dogs frequently showed signs of illness before eating grass and only 22% of dogs regularly vomited afterwards. In the grass eating dog population they found that it was the younger dogs who ate grass most frequently and they were less likely to appear sick before or to vomit afterwards. The research did find, however, that if a dog showed signs of illness before eating grass it was more likely to vomit afterwards. Leave a Reply
Risk Communications for Disaster Risk Management Risk communication is an indispensable segment of the early warning system. The effectiveness of risk communication relies heavily on 1) how much the source of the information understands his/her role in the risk communication process, the different functions of the risk communication in early warning/disaster risk management, and his/her understanding of the recipients of the message; and 2) how the receiver of the message attributes meaning to the information. Risk communication is vital for obtaining goals, in order to gain trust and ensure that different measures have the intended impact. This training module has been designed to …. 1. Understand the concept, terminologies and process of risk communication 2. Understand the different risk communication functions in early warning/disaster risk management 3. Undertake a situational, audience and channel analyses, for effective response to warning 4. Develop communication objectives for specific audiences in a given scenario/disaster/emergency  5. Identify the roles of different stakeholders at the community level in risk communication 6. Formulate appropriate messages for specific audiences Leave a Reply WordPress.com Logo Google photo Twitter picture Facebook photo Connecting to %s
Merchant vessel From Wikipedia, the free encyclopedia Jump to navigation Jump to search A container ship is one kind of merchant vessel A merchant vessel or trading vessel is a boat or ship that transports cargo or carries passengers for hire. This does not include pleasure craft that do not carry passengers for hire. Warships are also not considered to be merchant ships. Types[change | change source] They come in large number of sizes and shapes. They range from twenty-foot inflatable dive boats in Hawaii, to 5,000 passenger casino vessels on the Mississippi River. They include tugboats working in New York Harbor, to 1,000 foot oil tankers and container ships.[1] Some of the more common types are: Fleets[change | change source] Most countries of the world operate fleets of merchant ships. However, due to the high costs of operations, today these fleets are in many cases sailing under the flags of other nations. These are countries that specialize in providing manpower and services at very good terms. Such flags are known as "flags of convenience". Currently, Liberia and Panama are two of the most popular flags of convenience. Ownership of the vessels can be by any country, however. Today, Japan and Greece are two of the largest merchant fleets by capacity.[4] In 2014, the two countries shipped about 30% of the world's tonnage.[4] However, China is now the nation that owns the most merchant ships.[4] During wars, merchant ships may be used as auxiliaries to the navies of their respective countries. They are called on to deliver military personnel and material. Definitions[change | change source] • The term "commercial vessel" is defined by the United States Coast Guard as "any vessel (i.e. boat or ship) engaged in commercial trade or that carries passengers for hire".[5] References[change | change source] 1. "Summary of the Report from the Passenger Vessel Access Advisory Committee". Retrieved January 1, 2017. 2. 2.0 2.1 2.2 2.3 2.4 "Merchant Vessels". Retrieved January 2, 2017. 3. 3.0 3.1 "International Shipping Facts and Figures" (PDF). Maritime Knowledge Centre. Retrieved January 2, 2017. 4. 4.0 4.1 4.2 "Merchant fleets". The Economist Newspaper Limited. October 17, 2015. Retrieved January 2, 2017. 5. "Merchant vessel splits in two off Yemeni coast". WN. The WorldNews Network. July 19, 2013. Retrieved January 2, 2017.
syn-, sy-, sym-, syl-, sys- (Greek: with, together with; also by extension: united; same, similar; at the same time) To punish by casting out of the synagogue. A lack of symmetry or something that has two sides or halves which are the same or very close in size, shape, and position. economy class syndrome 1. A deep vein thrombosis (blood clot along the wall of a blood vessel), usually in the leg, caused by sitting immobile for long periods in a cramped aircraft seat. 2. A form of phlebitis (inflammation of a vein) in which a blood clot forms in the lower leg after prolonged immobility in a cramped space; such as, traveling in a confined space, like a coach seat on a crowded air flight. It is known as economy class syndrom because so many travelers are turning up with phlebitis. Symbiosis in which one symbiont lives on the outside of the body of the other. An organism that lives on the surface of another organism to the benefit of both; such as, any of the microbes that normally live on the skin. Symbiosis between two organisms which are physically separated from each other. Symbiosis refers to an organism interaction where one organism lives in intimate association with another one. A reference to an organism living on the surface of another organism. egosyntonic (adjective), more egosyntonic, most egosyntonic 1. In psychology, of or relating to ideas, behaviors, or impulses that are acceptable to oneself. 2. A reference to something that is consistent with an individual's self-image. electric converter, synchronous converter, converter 1. A converter in which motor and generator windings are combined on one armature and excited by one magnetic field; normally used to change alternating to direct current. 2. A synchronous machine used to convert alternating current (AC) to direct current (DC), or the reverse. The AC-to-DC converter has been replaced by a mercury arc rectifier (for reasons of efficiency, lower maintenance costs, and fewer problems) or by motor-generator sets. electron synchrotron 1. A machine which accelerates electrons in a circular path by keeping the frequency of the accelerating stream at a constant level while increasing the strength of the magnetic field guiding the stream. 2. A circular electron accelerator in which the frequency of the accelerating system is constant, the strength of the magnetic guide field increases, and the electrons move in orbits of nearly constant radius. 3. A synchrotron (an apparatus used in nuclear physics to produce beams of energetic charged particles and to direct them against various targets) designed to accelerate electrons. The electron beam is allowed to strike an internal target, producing high-energy gamma rays which are used outside the machine. electronic frequency synthesizer An instrument that generates two or more selectable frequencies from one or more fixed-frequency sources. electronic music synthesizer An audio signal processor which contains sound generators (oscillators) and additional circuitry; such as, filters to produce familiar sounds including those produced by conventional musical instruments, or to create unique sounds and effects. electronic waveform synthesizer An apparatus that uses electron devices to generate an electrical signal of a desired waveform. 1. The use of electricity to synthesize or to process compounds by building up a complex compound with the union of simpler compounds or elements of chemical compounds. 2. The process of producing a compound by a chemical reaction or series of reactions, usually from simpler or commonly available starting materials that are induced by an electric current flow in an electrochemical cell. electrotonic synapse A gap junction which transmits electrical impulses in electrically excitable tissue. A gap junction is an intercellular network of protein channels that facilitates the cell-to-cell passage of ions, hormones, and neurotransmitters. Inter-related cross references, directly or indirectly, involving word units dealing with "equal, identical, same, similar": auto-; emul-; equ-, equi-; homeo-; homo-; iso-; pari-; peer; rhomb-; tauto-.
Blossom-end-rot (BER) Symptoms This physiological disorder looks like a typical fruit disease. The symptoms generally occur at the blossom-end of the fruit and begins with a light tan, water soaked lesions, which when enlarged, turn black and leathery. As in tomatoes and watermelons, blossom-end-rot usually appears when the fruit is about half-grown The affected areas first may consist of one or more small water-soaked spots, or they may cover half the fruit. These spots soon become dry, light coloured and papery. Later, affected areas are attacked by various fungi that grow over the dead tissue, darkening it. Causes of Blossom-end-rot (BER) This disorder is usually associated with a localized calcium deficiency in the distal end of the fruit resulting in blossom-end rot. It is not a direct cause of Ca deficiency in the root medium, rather a lack of co-ordination between the transport of assimilates by the phloem and Ca by xylem during rapid cell enlargement in the distal placenta tissue (put simply, the fruit grows faster than what Ca is transported to the areas where it is needed). Climatic changes have a significant influence in the development of blossom-end-rot (BER) but genetic susceptibility is also a major cause of the disorder. Inadequate calcium levels in the nutrient solution can contribute to blossom-end-rot. Low pH can cause blossom-end-rot as well, especially when coupled with water stress conditions. Calcium is not a highly mobile element and can easy occur with even short periods of water supply fluctuation. Moisture extremes promote the likelihood of this disease and rapidly growing plants are more susceptible. Conditions, such as with high salt concentrations or the use of ammonium based nitrogen might prevent the proper uptake of calcium. High relative humidity might also reduce calcium uptake. There is a correlation between calcium and boron in meristematic tissue of the roots. Low boron concentrations can reduce the uptake of calcium. Check the boron concentration in the water (at root level, not in fertilizer tank). Controlling blossom-end-rot Cultivars differ in their tolerance to this disease. Proper water control and fertilization can prevent blossom-end rot. If blossom-end rot occurs during the growing season, apply a calcium based foliar spray. Proper water/nutrient analysis should be done beforehand to determine your nutrient status and to fertilize accordingly. The most common physiological disorder in vegetable fruit grown in hot climates. Not always a direct cause of low calcium, but more climate induced reduction in calcium absorption. The best first defence to this disorder is selecting resistant varieties.
<%rssLink ()%> <%googleAnalytics ()%> When were the majority of statues of the Confederate generals put up? (group1) Other directories: help, engl1190, umw, lane, commons, open, adp, n490, hyp, mac, psu, cfcs Answer: 1960s [Add summary of question and answer here. Examples: 1, 2, 3] Origin and Prevalence [Add a summary here of where you've seen claims about this on the web. For instance, if the question is "Does Citrus Prevent Stroke?" collect some places where that claim has been made. If possible, track that claim to its origin, whether it is a piece of scientific research, an opinion column, or a fake news site. Try to find the most authoritative origin. Note: this is the history of the claim or question being raised -- save the true or false stuff for the next section. Examples: 1, 2, 3] -Robert E. Lee opposed the erecting of Civil War monuments, but it's unclear if it was because he didn't want to see Confederate monuments or any type of Civil War monuments as a whole. Then to add fuel to the issue, with all the racial encounters today, minorities see these statues as representations of antagonism. Issues and Analysis [Add a summary here of the larger context for this question and any evidence that that helps answer the question of the title. For instance, if the question is "Does Citrus Prevent Stroke?" collect some both previous research on the benefits of citrus when it comes to stroke as well as talk about the relative strength of different types of studies. If the origin of the claim is in a journal, newspaper, or website, you could evaluate the reliability of that source. Examples: 1, 2, 3] Screenshot (2).png All Content released CC0 (Public Domain) by the Digital Polarization Initiative. The Digital Polarization Initiative is a cross-institutional project that encourages students to investigate and verify the information they find online. Articles are student-produced, and should be checked for accuracy before citation as sources. DigiPo members can edit this page Photo Credit: Header photos generate in randomly. Check this page for a list of photography credits and licensing. The Digital Polarization Initiative is a student-run project which allows university students to investigate questions of truth and authority on the web and publish their results. Learn more, or see our index. Photo credits here. DigiPo members can edit this page.
Mapping: DefaultPageMap Map Field: BottomMiddle Ad Slot: PW1_RON_Top_Billboard Size Mappings: top_billboard_970x250 Diagnosing Breast Cancer in Dogs Source: PetWave, Updated on July 16, 2015 Breast Cancer Initial Evaluation Most veterinarians will take a thorough history from any dog’s owner about its overall health, and also perform a complete nose-to-tail physical examination, regardless of why the animal has been brought to the clinic. Sometimes, breast tumors are detected incidentally during a routine annual physical examination, while other times the owner brings her pet to the doctor specifically because she has felt something lumpy in one or more of her dog’s mammary glands. In either case, once a mammary mass is identified, the veterinarian probably will recommend drawing blood and urine samples and submitting them for analysis. While the results of these tests can’t identify breast cancer or the type of tumor per se, they are helpful to detect other medical abnormalities that may affect the dog’s overall health. The veterinarian may measure the size of each tumor and assess whether it is “fixed” or “floating” inside the mammary gland. Often, a chart is made of the location, size and nature of each mass and put into the dog’s medical file so that any subsequent changes can be easily chronicled. The doctor will palpate the dog’s peripheral lymph nodes, to see whether they are enlarged (which could indicate metastasis of the tumors). Diagnostic Procedures Breast cancer is by far the most likely cause of any mass in the mammary gland(s) of an older female dog. The most definitive way to diagnose breast cancer is to remove the tumor surgically (called an “excisional biopsy”) and send the tissue to a special laboratory for microscopic evaluation called “histopathology”. Other techniques, such as taking aspirates from masses through sterile needles (fine needle aspiration) or taking incisional biopsies (where only punches or parts of the tumors are removed) are inconclusive, because they only permit evaluation of certain cells that may not represent the entire tumor and may mimic malignant cancer but actually reflect simple inflammation. Many times, even before a histological confirmation of breast cancer is made, the doctor will advise taking a series of radiographs (X-rays) to “look around” and see whether there is evidence of spread to remote places. Abdominal (belly) X-rays can reveal metastasis to nearby lymph nodes, and thoracic (chest) X-rays can disclose metastasis to the lungs. Ultrasonography can also be used to look for spread to abdominal organs or lymph nodes. More advance radiological techniques, such as computed tomography (CT scan) and magnetic resonance imaging (MRI), are more sensitive for the detection of tumor metastasis to the chest and/or lungs, but are not available everywhere and are much more expensive to perform than standard X-rays. Once cancer has spread widely, it probably doesn’t matter what exact type of cancer cell is involved. The prognosis for dogs with cancer that has metastasized throughout its body is guarded to grave. Special Notes Breast cancer isn’t all that difficult to diagnose, once mammary masses are identified. The quickest way to diagnose this disease is to remove one or more of the masses and have it evaluated. Radiological evidence of metastasis strongly suggests that the tumors (or tumors somewhere in the dog’s body) are malignant and may make specific identification of the cancer type a moot point. Mapping: DefaultPageMap Map Field: TopRight Ad Slot: PW1_RON_Top_Right Size Mappings: Top_Right Disorders Similar to Breast Cancer Mapping: DefaultPageMap Map Field: BottomRight Ad Slot: PW1_RON_Btm_Right Size Mappings: Btm_Right Mapping: DefaultPageMap Map Field: BottomLeft Ad Slot: PW1_RON_Btm_Left_300x250 Size Mappings: Dog Health Center Lead Poisoning Learn more about: Lead Poisoning
April 6, 2019 Flame Licker engine Flammenfresser build info Flame Licker engine Flammenfresser build info: A Flame Licker engine, Flammenfresser in German is a vacuum operated engine, thermodynamicly based on the Newcomen atmospheric engine invented by Thomas Newcomen in 1712. The Flame Licker engine derives its force from atmospheric pressure against the connecting rod side of the piston, and has a partial vacuum on the piston face. At the beginning of an outstroke, a valve in the head of the cylinder opens and admits a charge of burning gas and air, which is higher in volume and trapped by the closing of the valve. Towards the end of the intake stroke the heated air fuel mix comes into a water or air cooled cylinder and is chilled. A furthure cooling of the gas is caused by the increasing in area, swept volume, causing thermodynamic cooling by forced expansion. This sudden drop in pressure combind with an effectivly higher external atmospheric pressure is sufficient to push / suck the piston back on the return stroke. The valve opens again about 90* before top dead center to eliminate any chance of compression which would stall the engine. With the valve full open, the next intake stroke begins. This page is the place holder for the future Flame Licker engine Flammenfresser build info build diagram . https://youtu.be/14kaR2E2Pmg = SHARE ROCKNTV1
You are on page 1of 5 y y y y Multilingualism is a more magnified version of bilingualism o Individual Phenomenon: How one acquires two or more languages in childhood or later, and how these languages are represented in the mind. o Societal Phenomenon: Concerned with institutional dimensions, with issues such as the status and roles of the languages in a given society, attitudes towards languages, determinants of language choice, the symbolic and practical uses of the languages, and the correlations between language use and social factors such as ethnicity, religion and class A multi-lingual s facility in moving from one language to another as the occasion demands is but an extension of the monolingual s capacity to shift registers and styles Territorial principle of multilingualism: The nation as a whole is multilingual but not all the individuals are necessarily multilingual e.g. Canada. Personality principle: Bilingualism is the official policy and most individuals are multilingual e.g. India, East and West Africa. Reasons for Multilingualism: 1. Migration: When speakers of one language settle in an area where another language is used and over the years continue to maintain their own language 2. Cultural Contact: When a society imports and assimilates the cultural institutions e.g. religion or literature, of another society e.g. use of Arabic and English in Asia 3. Annexation: The case of French and Spanish-speaking parts of U.S. 4. Colonialism: English in Latin America 5. Commercial, scientific and technological dependence of the speakers of certain languages on the speakers of other languages. y y y y Speech Community: A conglomeration of individuals who the share the same norms about communication. It is a community sharing knowledge of the rules for the conduct and interpretation of speech. Members are unified by norms about the uses of language Verbal repertoire:The total range of linguistic resources to an individual or a community. o Monolingual speakers: Range of regional, social, functional and stylistic varieties they command either productively or receptively. o Multilingual speakers: Not only the varieties of the same language but also entirely different languages Multilingualism involving balanced native-like command of all the languages in the repertoire is rather uncommon. The differences in competence might be a few lexical items, rudimentary conversational styles all the way to the excellent command of the grammar and vocabulary. Selective functionality: Multi-linguals develop competence in each of the codes to the extent that they need it and for the contexts in which each of the languages is used. He might ve y y y y y y excellent reading, writing skills in both the languages but may be more comfortable using one language for academic and professional purposes and the other for intimate or emotional expression. Domains: Who speaks what language to whom and when in those speech communities. o Intimate (Family) o Formal (religious) o Informal (neighborhood) o Intergroup (economic and recreational activities as well as interactions with government-legal authority) Asymmetric principle of multilingualism: Some languages are more valued than others. The languages in a multilingual community can be viewed as being arranged on a hierarchy. The larger the no. of desired roles a language enables its speakers to play in a given society, the higher its place on the hierarchy. The more restricted the range of valued roles a language provides, the lower its place in the hierarchy. Example of a Tulu speaker: o Although it is spoken by two million people, it is still restricted in its functional range. It gives him ethnic identity. Spoken in the native place network. o Kannada: Medium of instruction through the secondary school. Language of education, administration, commerce, media and literature. It gives him regional identity and statewide mobility. o English: Empowers him to gain access to higher technical education, to communicate on an interstate and international level, and provides national and international mobility as a job candidate. o Hindi: Lingua franca, for communication with north Indian states o Sanskrit: To access, preserve and symbolize the classical lore of India in an enormous range of fields from religion to medicine. o All of these complement each other to the serve the complex communicative demands of a pluralistic society. Sanskrit: Use in ritualistic and intellectual contexts by the most prestigious group in the Indian social system, and so given a status of a sacred, intellectual language. But also perceived as too orthodox, difficult and old-fashioned for every-day purposes. The revival of Hebrew in Israel and the movement to revitalize Sanskrit are reminders that factors such as tribal, caste, ethnic and national identities are also powerful forces in the use, maintenance, revival and regulation of languages. The dynamics of language in a multilingual society reflect the evolution of power in that society. Diglossia: y A relatively stable language situation in which in addition to the primary dialects of language, there is a very divergent, highly codified variety which is the vehicle of a large and respected y y y y body of written literature, either of an earlier period or in another speech community, which is learned largely by formal education and used for written and formal spoken purposes but not used for ordinary conversation. Classical Arabic (H) and Colloquial Arabic (L) The high variety is used in mosques, news broadcasts, political speeches, poetry and the low variety is used in conversations with friends and family, in captions on political cartoons and in folk literature. Three conditions in a speech community that lead to diglossia: o Existence of a large body of literature in a language that is the same as the indigenous language and embodies some of the fundamental values of the community o Literacy in the community is only restricted to a small elite o A long period of time is involved in establishing the first and second conditions Educated Arabic deny the L variety of Arabic and believe that the H variety is more logical, beautiful and better able to express important thoughts. Code Switching: y y y y When two or more languages exist in a community, speakers frequently switch from one language to the other. Situational code switching: The switch is in response to a change in situation, when a new participant enters the scene or to a change in the topic of conversation or the setting Metaphorical code switching: The switch has a stylistic or textual function, to signal a quotation, to mark emphasis, to indicate the punch-line of a joke. Code-switching is not random but functionally motivated. It is governed by a grammar of consequences. Differences between Code switching and Diglossia: Diglossia 1. Occurs across domain boundaries 2. People are aware that they ve switched from H to L or vice versa 3. Little overlapping of codes Code-switching Occurs within domains Unconscious Involves quite a bit of overlap Code mixing: y y A common mode of code switching is the switching of languages within sentences Code mixing raises several issues involving grammar, what kind of morphemes, words or phrases can be mixed from one language into another. Differences between Code mixing and Borrowing: Borrowing 1. May occasionally involve a few set phrases Code mixing Involves every level of lexical and syntactic 2. 3. 4. 5. but is usually restricted to single lexical items Borrowed words can occur even in the speech of monolinguals The set of borrowed expressions typically represent semantic fields outside the experience of the borrowing language Represents a restricted set of expressions with some creativity in the margins Represent mostly nouns and adjectives structure, including words, phrases and sentences Presupposes a certain degree of bilingual competence May duplicate existing expressions and is not used to fill lexical gaps Draws creatively upon the whole vocabulary and grammar of another language Draws on every category of grammar Functions of code-switching y Code-mixing and code-switching serve the same function of identity marking. English for modernity, sophistication or authority and Sanskrit for nationalistic and traditionalistic image, Arabic for Islamic identity, Urdu for macho image in South India. Strategy of neutrality: When the use of any language in the repertoire might suggest the wrong message such as talking-down to somebody Stylistic function: Signal a transition to the sublime or the ridiculous It is a versatile and appropriate vehicle for the expression of multi-cultural communities. Many creative writers use it as a powerful expressive resource to convey multi-cultural experiences y y y y Linguistic Convergence: y y y y Extensive structural modification of the languages of a geographic area in the direction of one another, even though the languages may belong to different language families Distinguished from borrowing, in that morphology and syntax is affected in addition to phonology and lexicon. It results in the formation of a linguistic area in which languages resemble each other structurally more than do their siblings from their own genetic stock. It is the adaptation and assimilation of the structure of one language by another Language transfer: y y y Powerful force in language choice, acquisition, and use in multilingual communities It is an efficient and economical psycholinguistic process in which the tried and tested rules of the first language are used as hypotheses in mastering a second language. It reduces cognitive dissonance and contributes to processing economy Implications for language teaching: 1. Language teachers need to revise their attitudes with regard to the status and value of bilingualism. Bilingualism is independent of intelligence and consistent with the highest educational and socio-economic achievement 2. Teachers need to realize that English, despite its undoubted importance, may only be one of the languages in a learner s repertoire 3. It may be unnecessary and unrealistic to expect complete and native-like competence in the entire range of registers, styles and functions of English 4. Teachers need to be familiar with the other languages in the learner s repertoire 5. Language teachers trained in a monolingual paradigm are harsh towards minority students speaking mixed languages. A mixed code is as important for an in-group, bicultural communication as a monolingual code would be for communicating with monolingual interlocutors. 6. Multilingualism may not only lead to division of labor but also a lot of give and take between languages. A relaxed, open-minded attitude can foster cultural pluralism. y y y Wide range of variation of English throughout the world. These varieties are not deficient or fossilized inter-languages but functionally viable varieties which follow different but productive formal processes of grammar and usage. The traditional prototype paradigm of second language teaching, that a non-native speaker learned English to communicate with a native speaker is no longer applicable Required course in sociolinguistics, contrastive linguistics, methods and materials for English teaching
respect older people essay will discuss the cognitive, physical, and social factors that go into our societys definition of being old. Islam particularly has given parents the highest. Military, Non-commissioned officer, People 2857 Words 7 Pages Open Document Respect Respect Essay I am very lucky to live in Canada, where this beautiful country has not been shattered by destruction of the land and towns, but rather provides protection from it, and delivers respectful. If you are respectful to others then you can get good jobs because they'll like you. You May Also Find These Documents Helpful. "We Can't Stop" was simultaneously premiered on Ryan Seacrest's radio show, and Miley's website on June 3, 2013. No religion can bring the status down for our parents; especially for our mothers. Respect to Older People, essay, example for Free Why You Should Respecting the Elderly, aha! Respect, old, people, free Why Is Respecting Elders Important? Respect your elders, teen Ink respect older people essay To develop self- respect means to cultivate the self-confidence to deal with whatever life throws. The essay will be focusing on Old age and retirement as a particular stage of life course and exploring the disengagement and activity theories and psychological concept of this stage, as well as identifying the importance of social institution in relation to this life course. From my first hand experience I can tell u that respect is one thing that has to be earned. Homeless elders, although increasing in numbers, continue to be a forgotten population. If you dont learn respect from your family then you wont have respect for yourself or others. Simple essay about science and technology, Essay about moral in artificial intelligence,
Improve Your Memory With This Useful Advice Psychologists have found that one way for people to keep mentally sharp is to play games that are challenging on a mental level. This works in the same way that physical exercise helps to build muscle. Regular exercise of your brain helps it to become stronger, and will improve your memory, focus and concentration skills. Crossword puzzles, brain teasers, and word searches are great games that can boost your memory. If this happens to you, take a short break each hour and give your mind time to rest. Then you will be better able to learn new things. Mnemonic Devices If you want to remember information for long periods of time, develop some association strategies, or mnemonic devices, to help you. You can compare mnemonic devices to shorthand writing; the former helps with memory, while the later assists writers. By making a connection between a new piece of information and something you are already familiar with, you have created an association that will help you recall the new information more readily. When you have to memorize a substantial amount of information, try studying at a variety of locations. You don’t want to limit yourself to associating certain information with certain areas. Instead, you want to keep your brain fresh. You basically want to encourage your brain to be able to learn information anywhere possible so that the more you practice learning, the easier it becomes to do anywhere you are. Have fish oil in your diet. Omega-3 fatty acids can help improve memory. Try adding them to your diet if you are experiencing memory loss. Consider getting your dose through a supplemental pill like Formula Focus which currently are one of the most popular brain enhancement supplements. Take a ginseng supplement to have a better memory. The ingredients are thought to improve brain functioning, and that includes the ability to retain memories. It’ll also help your overall health as well as your brain. Another natural ingredient which has been scientifically proven to improve memory loss is green tea. You can remember information by teaching it to others. For instance, if you are having trouble recalling a particular anecdote, try to relate it to a wider circle of individuals. This also allows you to properly encode the memory into your brain, making it much easier to call upon when needed. Start Doubting Do not have any doubts about your memory. The popular consensus is that the older you get, the less you ultimately remember. That isn’t necessarily true. Assuming that your memory is going to abandon you can actually contribute to memory loss. When you start doubting or other people start doubting your memory you can hurt your memory. Simply believing that you have a good memory can help it stay that way. Repeat things out loud. When you learn something new, such as a name, say it out loud. Repeating things out loud is a good way to remember the information later on. If you are not embarrassed or perhaps alone, you can use repetition to your advantage as well.
Swimming Is Surprisingly Hard On Your Smile By | February 7, 2019 If you asked one hundred people which sport was the most dangerous to your teeth, swimming would not be one of the top answers. It’s much more likely for people to name a contact sport, like hockey, basketball, or boxing. Getting hit in the mouth during one of those sports can definitely take a toll on your smile, but swimming is a surprising source of tooth damage. Swimming Is Surprisingly Hard On Your Smile Swimming is healthy Swimming is popular with fitness enthusiasts because it’s considered one of the healthiest sports available. It is low-impact, allows you to build strength and get your cardio in at the same time, and recruits upper and lower body into a comprehensive workout. Experienced swimmers will also tell you that although it’s not exactly a contact sport, it’s easy to take an elbow or hand paddle in the mouth when your lane is full. If you play contact sports like water polo in a chlorinated pool, you should definitely have the dentist on speed dial. The chlorine is the culprit If you’re a swimmer or triathlete who spends a lot of time in the pool, you know that chlorinated water can be hard on your hair. But you should also be aware that the chlorine can cause long-term damage to your smile. The chlorine that is keeping the water safe to swim in breaks down salivary proteins more quickly than they would otherwise. As they break down, the proteins form organic deposits on the enamel, leaving behind a brown residue. Not only is the brown residue unattractive, it eventually wears away the enamel, leaving your teeth brittle and discolored. As the decay advances, the brown residue hardens, and teeth become more sensitive to hot and cold. The accelerated effect of the chemical reaction causes faster decay on your teeth than normal, leaving you vulnerable to cavities, chips, and cracks. Dentists call this condition swimmers’ calculus. Find the cleanest pool to swim in Chlorine is added to pools and hot tubs to kill germs. As swimmers add urine, perspiration, body oils, and lotion to the water, more chlorine is necessary to keep the water clean. As the chlorine reacts with the other substances in the pool, it produces chloramines. It is this byproduct of the chlorine mixing with substances added by swimmers that acts as an irritant to swimmers, producing red eyes, rash, and the overwhelming smell. Modern pools use UV systems and ozone to help sanitize the pool and reduce the amount of chlorine necessary. All pools use chlorine in some capacity because the chemical is extremely effective at killing germs that cause diarrhea, swimmer’s ear, and various skin infections. Avoid pools with a low pH It would make sense if chlorine bleached your teeth in the same way that it bleaches clothes. You most often hear about it being used to lighten colors. But the chemical reaction is more complex than simply one that lightens or darkens everything it touches. One of the factors determining how chlorine affects your teeth is the pH level of the water. The chemical components of chlorine vary based on the pH level of the pool. Ideally, the level of pH in your swimming pool should be 7.4, which is the same as human tears. Chlorine causes the most harm to teeth at low levels of pH. When the pH level in the water dips below 7.0, it is the most damaging. The lower the level, the more damage it can cause. See your dentist often If you spend more than six hours a week training in chlorinated water, see your dentist for recommendations to minimize damage. Rinse and spit with clear water before and after entering the pool. Avoid sweetened drinks while training, such as sports drinks, as the sugar will feed the bacteria causing the damage.  Swimmers who train year-round should see their dentists more often than twice a year for tartar and stain removal because the calculus will continue to accumulate with constant exposure to chlorinated water. If your insurance doesn’t cover additional visits, look into low cost dental care from ED USA so that swimmers’ calculus doesn’t progress to gum disease. With proper care and hygiene, you can minimize the damage to your teeth from the pool and keep your smile sparkling bright. Swim at a pool with a UV or ozone cleaning system that augments the chlorine usage, or one that enforces strict hygiene rules requiring swimmers to shower before entering the pool. Avoid swimming in an older pool with less sophisticated decontamination equipment, because the pool manager will have a harder time controlling the pH balance and chlorine levels. See your dentist often and ask what other actions you can take to keep your smile bright and healthy. Women Fitness
Open main menu Serapis, a Greco-Egyptian God worshipped in Hellenistic Egypt Hellenistic religion is the late form of Ancient Greek religion, covering any of the various systems of beliefs and practices of the people who lived under the influence of ancient Greek culture during the Hellenistic period and the Roman Empire (c. 300 BCE to 300 CE). There was much continuity in Hellenistic religion: the Greek gods continued to be worshipped, and the same rites were practiced as before. Change came from the addition of new religions from other countries, including the Egyptian deities Isis and Serapis, and the Syrian gods Atargatis and Hadad, which provided a new outlet for people seeking fulfillment in both the present life and the afterlife. The worship of Hellenistic rulers was also a feature of this period, most notably in Egypt, where the Ptolemies adapted earlier Egyptian practice and Greek hero cults and established themselves as Pharaohs within the new syncretic Ptolemaic cult of Alexander the Great. Elsewhere, rulers might receive divine status without the full status of a god. Classical Greek religionEdit Remains of the temple of Apollo at Corinth. Magic was a central part of Greek religion[2] and oracles would allow people to determine divine will in the rustle of leaves; the shape of flame and smoke on an altar; the flight of birds; the noises made by a spring; or in the entrails of an animal.[3] Also long established were the Eleusinian Mysteries, associated with Demeter and Persephone.[3][3] People were indoctrinated into mystery religions through initiation ceremonies, which were traditionally kept secret. These religions often had a goal of personal improvement, which would also extend to the afterlife. New religions of the periodEdit The religion of Atargatis (related to the Babylonian and Assyrian Ishtar and Phoenician Ba`alat Gebal), a fertility- and sea goddess from Syria, was also popular. By the 3rd century BCE her worship had spread from Syria to Egypt and Greece, and eventually reached Italy and the west.[10] The religion following Cybele (or the Great Mother) came from Phrygia to Greece and then to Egypt and Italy, where in 204 BCE the Roman Senate permitted her worship. She was a healing and protecting goddess, and a guardian of fertility and wild nature.[10] Ruler cultsEdit Astrology and magicEdit Astrology — the belief that stars and planets influence a person's future — arose in Babylonia, where it was originally only applied to the king or nation.[20] The Greeks, in the Hellenistic era, elaborated it into the fantastically complex system of Hellenistic astrology familiar to later times.[20] Interest in astrology grew rapidly from the 1st century BCE onwards.[20] Hellenistic philosophyEdit An alternative to traditional religion was offered by Hellenistic philosophy. One of these philosophies was Stoicism, which taught that life should be lived according to the rational order which the Stoics believed governed the universe; human beings had to accept their fate as according to divine will, and virtuous acts should be performed for their own intrinsic value. Another philosophy was Epicureanism, which taught that the universe was subject to the random movements of atoms, and life should be lived to achieve psychological contentment and the absence of pain.[7] Other philosophies included Pyrrhonism which taught how to attain inner peace via suspension of judgment; Cynicism (philosophy), which expressed contempt for convention and material possessions; the Platonists who followed the teachings of Plato, and the Peripatetics who followed Aristotle. All of these philosophies, to a greater or lesser extent, sought to accommodate traditional Greek religion, but the philosophers, and those who studied under them, remained a small select group, limited largely to the educated elite.[7] Hellenistic JudaismEdit The decline of Hellenistic Judaism started in the 2nd century AD, and its causes are still not fully understood. It may be that it was eventually marginalized by, partially absorbed into or became progressively the Koiné-speaking core of Early Christianity centered on Antioch and its traditions, such as the Melkite Catholic Church, and the Greek Orthodox Church of Antioch. See alsoEdit 1. ^ a b c d Shipley 1999, p. 154 2. ^ a b c d Chamoux & Roussel 2002, p. 347 3. ^ a b c d Chamoux & Roussel 2002, p. 330 4. ^ Mikalson 2006, p. 218 5. ^ Shipley 1999, p. 155 6. ^ Shipley 1999, p. 170 7. ^ a b c Mikalson 2006, p. 220 8. ^ Mikalson 2006, p. 217 9. ^ a b c d Mikalson 2006, p. 219 10. ^ a b c Shipley 1999, p. 168 11. ^ Diodorus Siculus, i. 25 12. ^ Chamoux & Roussel 2002, p. 340 13. ^ Shipley 1999, p. 167 14. ^ Strabo, xvii.1.17 15. ^ a b Chamoux & Roussel 2002, p. 331 16. ^ a b Mikalson 2006, p. 209 17. ^ a b Shipley 1999, p. 159 18. ^ Chaniotis 2003, p. 436 19. ^ Chaniotis 2003, p. 439 20. ^ a b c Evans 1998, p. 343 22. ^ Barr, James (1989). "Chapter 3 - Hebrew, Aramaic and Greek in the Hellenistic age". In Davies, W.D.; Finkelstein, Louis (eds.). The Cambridge history of Judaism. Volume 2: The Hellenistic Age (1. publ. ed.). Cambridge: Cambridge University Press. pp. 79–114. ISBN 9781139055123. • Chamoux, François; Roussel, Michel (2002), "Chapter 9 - The Needs of the Soul", Hellenistic Civilization, Wiley-Blackwell, ISBN 0-631-22242-1 • Chaniotis, Angelos (2003), "The Divinity of Hellenistic Rulers", in Erskine, Andrew (ed.), A Companion to the Hellenistic World, Wiley-Blackwell, ISBN 1-4051-3278-7 • Evans, James (1998), The History and Practice of Ancient Astronomy, Oxford University Press, ISBN 0-19-509539-1 • Mikalson, Jon D. (2006), "Greek Religion - Continuity and Change in the Hellenistic Period", in Bugh, Glenn Richard (ed.), The Cambridge Companion to the Hellenistic World, Cambridge University Press, ISBN 0-521-53570-0 • Shipley, Graham (1999), "Chapter 5 - Religion and Philosophy", The Greek world after Alexander, 323-30 B.C., Routledge, ISBN 0-415-04618-1
How to Communicate with Power and Impact imagesLeadership and change are driven by people who act and speak in a different way. Great influencers have always known the elemental role of communicating is motivating, persuading and gaining cooperation. But are great communicators born with those inherent skills or is it necessary to practice and develop techniques? The age-old nature versus nurture argument around trusting nature and acting by instinct as opposed to precision techniques and clear understanding to liberate hidden possibilities to learn the hard task of being true to the instinct of the moment. Cicely Berry (renowned for her work as voice coach and director of the RSC) has based her work on the conviction that while all is present in nature, our natural instincts have been crippled from birth by many external influences and society at large. She goes on to say that while there is no one right way to speak, there are a million wrong ways that constipate feeling, constrict activity, blunt expression, level out idiosyncrasy, generalise experience, and coarsen intimacy. So the work is about setting the voice free because life in the voice springs from emotion and speaking is part of a whole: an expression of inner life and awakening deep experiences which are seldom evoked in everyday speech. The voice is the means by which, in everyday life you communicate, and through of course how you present yourself – while your posture, movement, dress and involuntary gesture – gives an impression of your personality, it is your voice and the words you use that convey your precise thoughts and feelings. Poetry in voice is an exciting way to explore moods in tone and voice to tell an emotional story and build confidence to speak more persuasively. Poetry presents a wide range of learning opportunities to include: Offering examples of mastery of language and stocking the mind with images and ideas expressed in unforgettable words and phrases. Training and developing emotional intelligence. Reminding us that language is holistic and that how something is said is part of what is being said: the literal meaning of words is only part of their whole meaning, which is also expressed through tone of voice, inflection, rhythm. To get started: Find passages in poems which you find striking or memorable. Imagine situations in which those passages might be put to use, whether to console, encourage, taunt, flatter, or otherwise make an impact on the listener. Write a short story, letter, or speech in which at least three passages can be quoted effectively to move another character or the listener/recipient. Poetry goes further than connecting with your voice because its also about connecting your head to your heart. Its an unique and dynamic way of getting back to the vocal pathway of instinctive expression through simple, practical actions that can empower you with the ability to communicate with power and impact. Evolving Careers Players delivers 121 career coaching and group learning and development. We devise community forum theatre, corporate drama workshops and role-play scenarios to help individuals and groups develop their communication skills. Get in touch to discuss your needs: Leave a Reply You are commenting using your account. Log Out /  Change ) Google photo Twitter picture Facebook photo Connecting to %s
Burning feet syndrome, which commonly affects people over age 50, can make your feet feel like they're on fire. Symptoms can be mild to severe, and there can be many causes. Proper diagnosis and treatment are recommended for feet that just won't cool down. Burning feet syndrome can be caused by drinking too much alcohol, athlete's foot, excess perspiration, wearing tight socks or ill-fitting shoes without adequate ventilation, thyroid problems, kidney failure, diabetes, vitamin deficiencies or gastric problems resulting from obesity. Burning feet syndrome can be diagnosed by a neurologist, internist or podiatrist. Diagnostic tests include a physical exam with a complete medical history, nerve conduction velocity tests, X-rays, MRI and blood tests. People with burning feet syndrome experience sudden or continuous burning in their feet along with swelling, redness or stinging sensations. Emergency medical care should be sought if feet burn for several weeks without relief. People with burning feet syndrome should wear comfortable socks and shoes, elevate their feet, soak them in cool water and vinegar, sprinkle them with cornstarch powder, take aspirin or acetaminophen for pain and herbal supplements to increase circulation. Placing ice packs on burning feet or soaking them in ice cold water should be avoided as it may lead to other foot problems. Photo Credits • Olga_Danylenko/iStock/Getty Images
7 impressive health benefits of yogurt Yogurt has been consumed by humans for hundreds of years. It is very nutritious and eating it regularly can improve several aspects of your health. This article explores 7 health benefits backed by the science of yogurt. What is yogurt and how is it made? Yogurt is a popular dairy product made by the bacterial fermentation of milk. The bacteria that are used to make yogurt are called "yogurt cultures", which ferment lactose, the natural sugar found in milk. This process produces lactic acid, a substance that causes the proteins in milk to curdle, giving yogurt its unique flavor and texture. Yogurt can be made from all types of milk. The varieties made with skim milk are considered fat-free, while those made with whole milk are considered full-fat. Natural yogurt without added colorants is a thick, white liquid with an acidic taste. Unfortunately, most commercial brands contain added ingredients, such as sugar and artificial flavors. These yogurts are not good for your health. On the other hand, plain yogurt without sugar offers many health benefits. So without further ado, here are 7 health benefits based on the science of natural yogurt. 1. It is rich in important nutrients Yogurt contains some of almost all the nutrients your body needs. It is known to contain a lot of calcium, a mineral necessary for healthy bones and teeth. A single cup provides 49% of your daily calcium needs (1, 2). It also has a high content of B vitamins, particularly vitamin B12 and riboflavin, which can protect against heart disease and certain congenital neural tube defects (2, 3, 4). One cup also provides 38% of your daily need for phosphorus, 12% magnesium and 18% potassium. These minerals are essential for several biological processes, such as regulation of blood pressure, metabolism and bone health (2, 5, 6, 7). A nutrient that yogurt does not contain naturally is vitamin D, but it is commonly fortified with it. Vitamin D promotes bone and immune system health and may reduce the risk of some diseases, such as heart disease and depression (8, 9, 10). Summary: Yogurt provides almost all the nutrients your body needs. It is especially high in calcium, B vitamins and trace minerals. 2. It is high in proteins Yogurt provides an impressive amount of protein, with approximately 12 grams per 7 ounces (200 grams) (2). The protein has been shown to support metabolism by increasing energy expenditure or the amount of calories it burns throughout the day (11). Getting enough protein is also important for appetite regulation, since it increases the production of hormones that indicate fullness. You can automatically reduce the amount of calories you consume in general, which is beneficial for weight control (11, 12, 13). In one study, subjects who ate yogurt ate less hunger and consumed 100 fewer calories at dinner, compared to those who ate low-protein snacks with the same number of calories (14). The effects that promote the fullness of yogurt are even more prominent if you eat Greek yogurt, which is a very thick variety that has strained. It is higher in protein than regular yogurt, and provides 22 grams per 7 ounces (200 grams) (15). It has been shown that Greek yogurt influences the control of appetite and delays feelings of hunger more than normal yogurt with less protein (16). Summary: Yogurt, especially the Greek variety, is very high in protein. The protein is useful for the control of appetite and weight. 3. Some varieties can benefit digestive health Some types of yogurt contain live bacteria, or probiotics, that were part of the starter culture or were added after pasteurization. These can benefit digestive health when consumed (17). Unfortunately, many yogurts have been pasteurized, which is a heat treatment that kills the beneficial bacteria they contain. To ensure that your yogurt contains effective probiotics, look for one that contains live and active cultures, which should appear on the label. Some types of probiotics found in yogurt, such as Bifidobacteria Y Lactobacillus, it has been shown to reduce the uncomfortable symptoms of irritable bowel syndrome (IBS), which is a common disorder affecting the colon (18, 19, 20, 21). A study in which patients with IBS consumed fermented milk or yogurt that contained Bifidobacteria. After only three weeks, they reported improvements in swelling and frequency of bowel movements; the effects were also observed after six weeks (21). Another study found that yogurt with Bifidobacteria improved digestive symptoms and quality of life related to health among women who did not have a diagnosed digestive condition (22). In addition, several studies have found that probiotics can protect against diarrhea associated with antibiotics, as well as against constipation (23, 24, 25, 26, 27, 28). Summary: Some types of yogurt contain probiotics, which can improve digestive health by reducing the symptoms of common gastrointestinal disorders, such as bloating, diarrhea and constipation. 4. It can strengthen your immune system The consumption of yogurt, especially if it contains probiotics, can strengthen your immune system and reduce the chances of getting a disease. It has been shown that probiotics reduce inflammation, which is related to several medical conditions ranging from viral infections to intestinal disorders (29, 30, 31, 32). Research shows that, in some cases, probiotics can also help reduce the incidence, duration, and severity of the common cold (33, 34, 35, 36, 37). In addition, the improving properties of the immune system of yogurt are due in part to its magnesium, selenium and zinc, which are trace minerals known for the role they play in the health of the immune system (38, 39, 40). Yogurt fortified with vitamin D can further improve immune health. Vitamin D has been studied for its potential to prevent diseases such as the common cold and the flu (9, 41, 42, 43). Summary: Yogurt provides probiotics, vitamins and minerals, all of which can improve immune health and prevent certain diseases. 5. It can protect against osteoporosis Yogurt contains some key nutrients to maintain bone health, such as calcium, protein, potassium, phosphorus and, sometimes, vitamin D. All these vitamins and minerals are especially useful to prevent osteoporosis, a condition characterized by weakening of the bones. It is common in the elderly (44, 45, 46). People with osteoporosis have a low bone density and have an increased risk of bone fractures (47, 48). However, research shows that consuming at least three servings of dairy products, such as yogurt, daily can help preserve bone mass and strength (49, 50). Summary: Yogurt is rich in vitamins and minerals that play a key role in bone health. Its regular consumption can reduce the risk of osteoporosis. 6. Can benefit heart health The fat content of yogurt is one of the reasons why your health is often controversial. It contains mainly saturated fat, with a small amount of monounsaturated fatty acids. It was believed that saturated fat caused heart disease, but current research shows that this is not the case. However, non-fat and low-fat yogurt varieties are still popular in the US. UU (51, 52, 53). There is no clear evidence that yogurt fat is harmful to health. In fact, it can benefit heart health (54, 55). Some research shows that the intake of saturated fats from whole milk products increases "good" HDL cholesterol, which can protect heart health. Other studies have found that yogurt intake reduces the overall incidence of heart disease (55, 56, 57). In addition, dairy products such as yogurt have been shown to help reduce high blood pressure, which is a major risk factor for heart disease. The effects appear to be more prominent in those who have already been diagnosed with high blood pressure (58, 59, 60). Summary: Regardless of its fat content, yogurt seems to benefit heart health by raising "good" HDL cholesterol and reducing blood pressure. 7. Can promote weight control Yogurt has several properties that can help control weight. For starters, it has a high protein content, which works together with calcium to increase levels of hormones that reduce appetite, such as peptide YY and GLP-1 (61). In addition, several studies have found that yogurt consumption is associated with lower body weight, percentage of body fat and waist circumference (62). One review found that the intake of whole milk products, including yogurt, can reduce the incidence of obesity. This is contrary to what was previously believed about fat intake and weight gain (63). Other studies have found that those who eat yogurt tend to eat better in general, compared to those who do not eat it. This is partly due to its higher nutrient content, compared to its fairly low calorie content (64, 65). Summary: Yogurt is rich in protein, which is very abundant and can improve your overall diet. Both aspects help control weight. Yogurt may not be for everyone Some people should be careful with their intake of yogurt, as it can cause adverse effects, especially in people with lactose intolerance or milk allergy. Lactose intolerance Lactose intolerance occurs when the body lacks lactase, the enzyme needed to break down lactose, which is the sugar found in milk. It leads to various digestive symptoms, such as abdominal pain and diarrhea, after consuming dairy products. Therefore, people with lactose intolerance may need to avoid yogurt. However, some people who are lactose intolerant can tolerate it. This is because part of the lactose is broken down during production, and probiotics can help with digestion (66). If you are lactose intolerant, it can be a matter of trial and error to determine if eating yogurt works for you. Milk allergy Dairy products contain casein and whey, which are proteins to which some people are allergic. In these cases, milk triggers a reaction that can range from hives and swelling to life-threatening anaphylaxis. For this reason, it is best to avoid yogurt if you are allergic to milk. Added Sugar Many types of yogurt contain high amounts of added sugar, especially those labeled as low in fat. Excessive consumption of sugar is associated with several health problems, such as diabetes and obesity (67, 68, 69). Therefore, it is important to read food labels and avoid brands that contain sugar in the ingredients. Summary: Yogurt can have adverse effects for people with lactose intolerance or milk allergies. Many types also contain high amounts of added sugar, which can contribute to certain health conditions. How to choose the best yogurt for your health Less is more when it comes to choosing a healthy yogurt. Simple varieties without sweeteners are the best, since they contain minimal ingredients without added sugars. Whether you choose low-fat or fat-free yogurt, it's a personal choice. High fat varieties contain more calories, but that does not mean they are not healthy. Just make sure you keep the recommended serving size. You should also look for yogurt that contains live and active cultures to make sure you get your dose of probiotics that promote health. Summary: The best yogurts for your health contain few ingredients and no added sugar. Point to a brand that contains probiotics. The bottom line Yogurt is rich in nutrients and can improve your health when consumed regularly. It can help reduce the risk of some diseases, while also benefiting digestive health and weight control. However, be sure to choose your yogurt wisely. To get maximum health benefits, choose simple, sugar-free varieties that contain probiotics. Reference: https: //www.healthline.com/nutrition/7-benefits-of-yogurt That was 7 impressive health benefits of yogurt That Was 7 impressive health benefits of yogurt, Hopefully it's useful and you like it. Find more posts Related to "7 impressive health benefits of yogurt" under categories below You are reading 7 impressive health benefits of yogurt,Url address: https://meinaustauschblog.blogspot.com/2018/01/7-impressive-health-benefits-of-yogurt.html No comments: Post a Comment Iklan Atas Artikel Iklan Tengah Artikel 1 Iklan Tengah Artikel 2 Iklan Bawah Artikel ==[Close X]==
Does Vaping Cause Acne? Woman taking care of her skin There is some debate about the links between smoking and acne. We cannot count the number of times that we have been asked whether vaping causes pimples, clogged pores, and skin redness. To answer this question, you have to understand the basics of vaping. What is Vaping? According to the definition of vaping, vaping is the process of inhaling vapor through the mouth typically from an electronic device (e-cigarette) that heats up a solution (eliquid) and vaporizes that liquid. In order to understand if vaping can cause skin problems, one must understand the ingredients of an electronic cigarette. Ingredients of an Electronic Cigarette Electronic cigarettes consist of vapor, which is inhaled and exhaled by vapers. Unlike traditional combustible cigarettes, electronic cigarettes do not contain tobacco; however, they do contain nicotine along with PG (Propylene Glycol), VG (Vegetable Glycerin), water, and flavorings. This is important because PG, VG, and Water are commonly used in cosmetics and skin care products. As such, they are unlikely to cause acne. Is Vaping Safe? Many studies have proven that vaping is much safer than smoking traditional combustible cigarettes. For example, the American Heart Association states that vaping can help smokers quit smoking, and vaporizers are less harmful than tobacco cigarettes. Also, The Royal College of Physicians states “E-Cigarettes appears to be effective when used by smokers as an aid to quitting smoking; however, the hazard to health arising from long-term vapor inhalation from e-cigarettes available today is unlikely to exceed 5% of the harm from smoking tobacco.” To sum things up, vaping is much safer than smoking.  Vaping & Acne Although there is no causal connection between vaping and acne, many researchers claim that acne went away shortly after people quit tobacco smoking and turned to vaping. On the other hand, other claims that acne appeared on their skin after they started using electronic cigarettes.  Nicotine and its associated compounds are sometimes use to treat ace, so medicines for acne may sometimes include nicotinamide in cream which is applied to the affected skin. Also, nicotinamide is known to improve brain health and skin health. Therefore, vaping nicotine containing eliquids is more likely to reduce skin acne and improve the overall health of ones skin.  According to an article published by the NCBI, nicotinamide is considered as an effective treatment option for acne and is used as alternative to antibiotics in cases where patients suffer from antibiotic resistance. Due to some similarities between nicotine and nicotinamide, we are led to believe that nicotine, like nicotinamide, results in significant reduction of acne. The study does not note any major adverse side effects of nicotinamide. The study suggests that more data is needed to evaluate the side effects of nicotinamide.  When making the switch from traditional combustible cigarettes to e-cigarettes, many people notice than they start to feel worse and immediately blame electronic cigarettes for their symptoms. The truth is that these are signs of smoking withdrawal and not caused by vaping. The same can be said about acne, when people quit smoking, their body may manifest signs of withdrawal through production of acne. To conclude, acne is not necessarily caused by vaping, but rather caused by the act of quitting cigarettes. After quitting traditional cigarettes the body begins to clean itself expelling some of the waste and toxins left by traditional cigarettes through perspiration, thereby causing skin inflammation and acne. Please enter your comment! Please enter your name here
This question already has an answer here: I've tried to display UTF-8 in the win7 cmd. Currently, I'm using the standard font because as I see with the mysql.exe, it works fine with the characters I'm working with (currently the german umlauts "ßäöüÄÖÜ"). Also, with another font, the same characters appear. But the output of my PHP script displays garbage, e.g. 'ß' for 'ß'. When I pipe the output into a file and open it up with Notepad++, it says the encoding is UTF-8. In php.ini I set UTF-8 as the encoding as well as in the connection to the mySQL database, and in the database itself UTF-8, too. In CMD I tried so far to set the code page to 65001, but nothing changes. edit: my PHP script is saved as UTF-8 as well It seems with latin1, my desired characters can be displayed too and actually it works. But there has to be a way to do it in UTF-8? I can't convert everything to latin1 marked as duplicate by phuclv, Adrian McCarthy, HaveNoDisplayName, Linus Kleen, Ian Mar 20 '16 at 0:52 • If you see ß then the utf-8 encoded text did not get properly interpreted. If chcp 65001 doesn't work then the only decent explanation is that whatever program you are using is changing it back. – Hans Passant Nov 13 '13 at 18:22 • Is it possible that PHP is doing a conversion on the characters before they are output? – Mark Ransom Mar 12 '14 at 2:54 This question has been already answered in Unicode characters in Windows command line - how? You missed one step -> you need to use Lucida console fonts in addition to executing chcp 65001 from cmd console. • Latest information: window version <=1709 can't use chcp and that's why I failed. I think this can still be used in some ways. Upvote. – Rick Jun 6 '18 at 16:27
Results: 1-10 • Murad IV (Ottoman sultan) Murad IV, in full Murad Oglu Ahmed I, (born July 27, 1612, Constantinople, • Guatemala - Civil war years He extirpated communist influence, quashed agrarian reform, and broke labour and peasant unions with considerable violence, but he himself was brought ... • Cour de Cassation (French law) Cour de Cassation, (French: “Court of Cassation,” or “Abrogation”), the highest court of criminal and civil appeal in France, with the power to quash (casser) the ... • Laon (History, Geography, & Points of Interest) In the 12th century Laon revolted against the authority of the bishops, but Louis VI quashed the rebellion. During the Hundred Years' War (1337–1453) Laon ... • World War I - The collapse of Austria-Hungary This proposal was quashed by the United States on the ground that the U.S. position had already been enunciated by the Wilsonian pronouncements (the ... • Mario Sozzi (Roman Catholic priest) • Poland - Partitioned Poland • Joseph Kony A relative of Kony's, spirit medium Alice Lakwena, led a rebel group called the • Ashikaga Takauji (Japanese shogun) The uprising was easily quashed, and the emperor was banished, but two years later he escaped and again marshaled his forces, preparing to advance on the ... • Chess (musical by Rice and Andersson and Björn) Although the band frequently quashed rumours of a possible reunion over the following years, ABBA's music never truly left the popular consciousness. Britannica Examines Earth's Greatest Challenges Earth's To-Do List
Auxiliary Verbs Exercise 5 Complete each sentence with the correct auxiliary verb. 1. you usually send postcards home when you are on holiday? 2. I not working today. 3. she given you the book yet? 4. The boy playing with his toys. 5. I not seen that film yet. 6. Who told you to do this? 7. Where he go to school? 8. What you doing at the moment? 9. Amy not go by bus very often. 10. Marc never travelled by plane before.
Guest column: Climate change beliefs don’t match the facts Though most scientists agree on humans’ impact, majority in North Ga. aren’t in sync By Brian Moss Guest columnist Through the magic of mathematics ​The Yale Program on Climate Change Communication has created a model of our 9th Congressional District’s beliefs about climate change. Out of an array of 28 possible beliefs, I would like to delve into the implications of just a handful in order to answer why people might hold certain beliefs about climate change and why those opinions really matter. Answering these questions should help us to have a more accurate view of where we stand and where we’re headed. According to YPCCC, only 38 percent of adults in our congressional district agree with the following statement” ​“Most scientists believe that global warming is happening.” ​This low percentage, if accurate, is surprising in light of the fact that 97 percent of climate scientists believe in human-caused global warming​. What could account for this misconception? Maybe citizens have an erroneous perspective because the petroleum industry’s campaign to discredit climate change has been effective. ​Exxon alone has spent $30 million on “think tanks that promote climate denial.” What makes their denial egregious is that we know through their own studies beginning as early ​as the 1970s and ’80s, the oil companies were aware of the damage that carbon emissions would cause to our environment​. The petroleum industry has been denying the very fact that its own research has established: Burning fossil fuels causes global warming. So in reality, not only do climate scientists agree that humans are causing climate change, but so do the oil companies, who are actually facilitating climate change while concomitantly denying its existence. The petroleum industry’s disinformation campaign, however, only partially explains why so few citizens fail to recognize something considered common knowledge. A further explanation is provided by Yale’s data that only 21 percent of adults in the 9th District “hear about global warming in the media at least once a week.” What we don’t know is if this low estimate of exposure to reports of global warming is a consequence of people not paying attention to the media, if it is their media that is not paying attention to stories about global warming, or if Yale is mistaken. If Yale is right, then one can be forgiven for assuming that a lack of information on the one hand and a disinformation campaign on the other has likely skewed local beliefs about climate change. In another area, Yale’s data suggests that only 36 percent of people locally agree with the following statement: ​“Global warming will harm me personally.” If this data is accurate, then an unfounded optimism may be due to misunderstanding the type of harm that climate change poses here in Northeast Georgia. Simply put, we are all vulnerable to the extreme weather which will become more common: storms, droughts, and heatwaves. ​If you are poor or work outside, or you are a small child or an elderly person, you are at greater risk from heat​. But we are all susceptible to mosquitoes, bugs in general, and the diseases they carry. These, too, will become more common. The harm caused by climate change affects everyone. Under “Policy Support,” Yale’s Climate Opinion Map indicates that 63 percent locally and 68 percent of people nationally believe ​that corporations should do more to address global warming. But the corporations that could do the most to mitigate global warming are the ones responsible for global warming, so perhaps we should look elsewhere for help. What about the government? Its job is to look out for its citizens, right? Its job is to protect citizens from the greedy indifference of big business, right? Most Americans seem to agree with that notion. In fact Yale says 61 percent locally and 70  percent nationally believe that ​the federal government should set strict CO2 limits on existing coal-fired power plants. ​That seems reasonable. After all it’s common knowledge that because of the free market, ​cheap natural gas is pushing coal out of the power business​. Who could oppose this idea? According to the Aug. 21 edition of the ​Washington Post,  “The Trump administration ... proposed relaxing pollution standards for power plants nationwide, a move that could slow the decline of US carbon emissions and lead to hundreds more premature deaths and thousands of asthma attacks and missed school days.” Well, that ​is​ unfortunate particularly since another Yale study as reported in ​The Guardian, clearly asserts that without the support of the federal government, we’ll never achieve the necessary CO2 reductions to return our atmosphere to a stable condition. Current federal policies undermine efforts to reduce carbon emissions. These policies run counter to national opinion. According to YPCCC, nationwide 70 percent of adults believe that ​environmental protection is more important than economic growth. Citizens’ Climate Lobby is dedicated to persuading congress to pass legislation that will reduce carbon emissions. Legislation trumps policy. The local chapter of CCL regularly meets with our congressman’s office in order to advance this legislation and change our country’s stance. With sound opinion based on accurate information, we can head our country toward clean energy and build a sustainable future. Brian Moss is a retired high school English teacher and Gainesville resident who has lived and voted in the 9th Congressional District for more than 30 years. Contact him at Regional events
CSX train photo by John Mueller -CCOf all freight transportation options, rail is the most environmentally friendly way to move goods over land, according to the Environmental Protection Agency (EPA), which estimates that for every ton-mile, a typical truck emits roughly three times more nitrogen oxide and particulates than a locomotive. If just 10% of the nation’s freight were shifted to rail fuel savings would approach one billion gallons annually. New energy innovations and green programs at CSX Transportation, one of the major rail lines serving the Eastern half of the US, not only save money for the company but are also conserving fuel and cutting additional carbon emissions. So far, the private company has invested $2 billion over the last decade to improve its locomotive fuel efficiency with the result that its trains can move one ton of freight nearly 500 miles, on average, with a single gallon of diesel fuel. 1) Locomotive Idling Reduction Technology To reduce fuel consumption and greenhouse gas emissions during idling along its 21,000 miles of track, CSX has invested in two separate pieces of idle-reducing technology. Auxiliary Power Units  provide power to a locomotive, allowing the larger diesel engine to be shut down. The Automated Engine Start Stop acts similarly by automatically shutting down the locomotive when not in use and automatically starting it when needed. 2) New Piloting Technology A new, real-time energy management technology uses GPS and track data on both grade and curvature to identify the most fuel-efficient throttle settings for each trip as the train moves across the system. In addition, methods of rail lubrication are being explored to reduce rail-to-wheel friction and increase fuel efficiency. 3) Recycling With zero waste the ultimate goal, CSX is using a variety of materials that are recycled in their day-to-day business. Steel from old locomotives and rail cars is recycled, along with batteries, cross ties, and electronic equipment. Also, millions of gallons of oil annually are recycled, with some being used to heat buildings in certain locations. 4) Hazardous Chemicals Cut From Cleaning Regimen Cleaners containing chlorinated solvents and low-flash-point mineral spirits are now banned from use on railroads. These cleaners have been replaced with environmentally friendly cleaners, such as 140 Solvent. Oil-based paints are in the process of being replaced with water- based low-VOC paints, which are purchased in 300-gallon reusable totes, reducing packaging associated with paint products. 5) Environmental Crimes Unit With illegal dumping rampant on railroad properties, CRX has initialed a Police Environmental Crimes Unit to investigate and prosecute offenders. Since the unit’s inception, 1,020 incidents have been investigated, resulting in 52 prosecutions, with a conviction record of nearly 100%. 6) Upgrading Tracks for Double-Decker Freight Cars In May 2008, CSX Corporation launched the National Gateway, an $842 million public-private infrastructure initiative to beef up the transportation link between the Mid-Atlantic ports and the Midwest. The goal is to provide clearance and tracks for double-stack trains that can carry twice as much cargo and provide significant environmental and efficiency benefits. The National Gateway leverages the benefits of rail transportation to the fullest by enhancing three existing rail corridors that run through Maryland, Virginia, North Carolina, Pennsylvania, Ohio and West Virginia. When completed, the National Gateway will significantly benefit the nation by not only cutting fuel use and emissions per ton of freight, but improving safety and highway congestion by maximizing the efficiency of freight rail and partnering with trucking companies to reduce truck miles traveled by more than 14.3 billion miles.     * Increasing economic competitiveness by saving $3.5 billion in shipper and logistics costs, significantly increasing freight capacity, reducing transit times by 24 to 48 hours between West Coast ports and major population centers; and tripling the market access potential for the ports of Baltimore, Hampton Roads and Wilmington;     * Creating more than 50,000 jobs, including more than 25,000 jobs in 14 economically distressed areas (more than 4,000 jobs are to be created by the end of 2012); and     * Repairing and replacing declining infrastructure, replacing older bridges and avoiding more than $670 million in pavement maintenance costs, while requiring no public funding for ongoing maintenance. Backers of the Gateway initiative are currently seeking additional funding to bankroll the project’s completion. Leave a Reply
What is Reye Syndrome? RENO, Nev (KOLO) There are plenty of aspirin products on the grocery store aisle. But look on the back of any of them, and you will find a warning about Reye Syndrome. Photo: MGN Online “People were able to associate flu, cold and chickenpox and the use of aspirin. And that combination gave rise to Reye Syndrome,” says Dr. Max Coppes, Chairman of Pediatrics with the University of Nevada Reno, School of Medicine. Even today, Dr. Coppes says we don't know what causes the disease. What we do know is the syndrome causes a child's brain to swell, and liver damage may accompany the syndrome. If not treated it can be fatal. Symptoms don't come on right away. Rather Dr. Coppes says it almost appears as if the child has just recovered from the flu or cold caused by a virus. “They start getting sick a little bit again, hearing problems, eye problems, not really paying attention, some have seizures. That is when it is actually really bad,” says Dr. Coppes. The syndrome mostly impacts young kids all the way to teens. At its height there were 555 cases reported, in 1979. These days fewer than two cases are reported nationwide annually. Dr. Coppes says that's because pediatricians advised parents to avoid giving their children aspirin early on. They continue to do so today. “It is really being your local pediatrician, as they see the family, reminding people it is flu season; your kid is going to be cranky. Yes, they might be 101; give them Tylenol. Do not give aspirin,” says Dr. Coppes. For children with fever there are plenty of alternative medications that will relieve that symptom. They contain acetaminophen and ibuprofen. Make sure the product is made for children and read the directions for proper dosage. Symptoms of Reye Syndrome include vomiting, lethargy, delirium, and personality changes. They typically appear after the child seems to recover from flu, cold or chickenpox. Seek immediate attention if your child exhibits these symptoms. Vaccine for the flu and chickenpox has also helped keep the incidents of Reye Syndrome at bay.