text stringlengths 144 682k |
|---|
It is the responsibility of the business to make sure that advertising flags do not pose danger to people around it. Actions must be taken to ensure that flag installations are sturdy enough to prevent accidents and injuries.
One of the major factors that needs to be focused on is the effect of corrosion to flag components. Corrosion or rusting eats into certain types of metal, causing structural weakness which can lead to failure.
The flagpole is one of the components of the flag that take the most beating. The forces generated by the wind getting caught in the flag fabric is transferred to the pole. If the pole is not sturdy enough, it can bend or break from the wind. In order to ensure optimum strength against wind-generated forces, steel is the preferred material used for flagpoles.
The issue with steel is that it is susceptible to rusting when exposed to moisture. The air contains a decent amount of moisture at any given time. An unprotected steel flagpole can rust very quickly. As the rust eats through the steel, it loses its structural strength.
A steel flagpole must be protected against corrosion by coating it with corrosion-resistant paint. The paint prevents the surface of the steel from coming in contact with the moisture in the air. A special type of steel called weathering steel can also be used to further improve the life of the flagpole. When exposed to moisture-rich air, the layer rust that forms on the surface of the steel is compact enough that it effectively creates a barrier that prevents further contact between the steel and the air, thus greatly inhibiting further rusting. |
+612 9045 4394
Science in Seconds with Toys : Over 100 Experiments You Can Do in Ten Minutes Or Less - Jean Potter
Science in Seconds with Toys
Over 100 Experiments You Can Do in Ten Minutes Or Less
Published: 4th February 1998
For Ages: 8 - 12 years old
Ships: 15 business days
15 business days
Make glow-in-the-dark stars!<br> <br> Learn how an Etch-A-SketchR(r) erases pictures!<br> <br> Create a kaleidoscope from your toys!<br> <br> Discover why a SlinkyR(r) slinks down stairs!<br> <br> Experience the science of toys and games with these quick, easy experiments and activities from Jean Potter. You can complete each in ten fun-filled minutes or less, and the clear step-by-step instructions and illustrations help you get it right every time. The projects help you learn about everything from why a swing goes higher when you pump your legs to how Silly PuttyR(r) pulls up comic strips from the newspaper. You will find most of the required materials already in your toy chest, home, backyard, or neighborhood.<br> <br> The 101 activities in this book cover every aspect of the science of toys and the games you play, including swinging, bouncing, throwing, sliding, and much more. You'll discover why a football spirals as it zips through the air, learn how to make your cereal jump out of the bowl, find out why goggles make you see better underwater, and make your own homemade paint --all with the help of a leading educator.
Reflecting, Refracting, and Glowing.
Mixing, Molding, and Stretching.
Rolling, Sliding, and Sticking.
Balancing, Swinging, and Spinning.
Throwing, Flying, and Falling.
Floating, Bouncing, and Pushing.
Plucking, Banging, and Blowing.
Further Reading.
ISBN: 9780471179009
ISBN-10: 0471179000
Audience: General
For Ages: 8 - 12 years old
For Grades: 3 - 7
Format: Paperback
Language: English
Number Of Pages: 128
Published: 4th February 1998
Publisher: John Wiley and Sons Ltd
Country of Publication: US
Dimensions (cm): 21.15 x 20.45 x 0.87
Weight (kg): 0.25
Edition Number: 1 |
The Sperm and the Egg
The Sperm and the Egg
The reproductive system is responsible for the creation of new life. Humans have sexual
intercourse and reproduce.. This means that a male and female come together to form a new
There is a lot of different processes that it takes for sperm and an egg to fertilize. The life span of
a female’s egg typically is about 24 hours. The life span of sperm is about 72 hours. The sperm
may not be active but can still be flowing throughout the body after the 72 hour period time frame.
Egg fertilization starts by a mature being released from the follicle, and continues with the
appearance of two pronuclei after sperm entry into the body. The egg or oocyte transports from
the moment of expulsion for the follicle to enter into the fallopian tube. It takes approximately 5
days for the egg to travel through the body until reaching the uterine, this is then called the
blastocyst. The egg transports in the body before and after a menstrual cycle. The egg
transplants during the pre-fertilization stage and after the ovulating cycle. A number of events
happen with the sperm before successful fertilization. The first is the amount of fertile mature
spermatozoa being in the penis to ejaculate, next the sperm must be able to enter the cervical
passage into the uterus of the female. The sperm must also have a good progressive motion
when ejaculated to get threw the cervic’s mucus into the uterine and fallopian tubes to make it to
the egg in order for them to bind together and fertilize. This is called capacitation. The
spermmust spend enough time in the tubes and tracts of the female in order to have the ability to
fertilize. Capacitation happens when the sperm passes through the cervical mucus. When sperm
and an egg combine it creates and causes an opening of channels and then result in a acrosome
reaction. As a result of the prior acrosome reaction, new sperm membrane proteins become |
King Kong Explained: The Inspiration, History, And Science Of King Kong
King Kong. What inspired the giant beast? Could King Kong have once been real? Does science support the giant ape? Let’s get King Kong explained.
Have you ever wondered who came up with King Kong, and why? The answer to the former question is filmmaker Merian C.Cooper. The second question requires a more thorough explanation.
The idea for King Kong was born from the imagination of a young boy, Merian C Cooper.
Cooper became obsessed with gorillas at the age of 6, when his uncle gave him a book all about Equatorial Africa. The book, (Explorations and Adventures in Equatorial Africa, 1961), told of the adventures of French-American traveler Paul Du Chaillu, who had spent time learning about the natives and wildlife in Equatorial Africa.
Du Chaillu, Paul. Explorations and Adventures in Equatorial Africa
A page from Du Chaillu’s Explorations and Adventures in Equatorial Africa, the original inspiration for King Kong.
The book spoke of a giant gorilla of “Extraordinary size”, a “half-man, half-beast” that was “the King of the African Forest”. And thus, the inspiration for King Kong was born.
But why is King Kong so big? Surely no ape could ever have been so large.
It’s easy to see how six year old Cooper might interpret this “half man, half beast,” giant ape as being like King Kong. After all, kids are blessed with healthy imaginations. And there have been numerous reports of giant apes throughout the ages.
And that raises the question:
Did Kong Kong ever exist for real?
Science has proven that indeed there was once a giant ape called the “Gigantopithecus”.
In 2005, Jack Rink, a geochronologist at Canada’s McMaster University, examined the jaw-bone fossils of one such ape. He determined that the ape was not quite King Kong’s size. It wasn’t as big as a skyscraper. It was, however, a staggering 10 feet tall, and weighed a whopping 1,200 pounds. The ape, which was called the Gigantopithecus, lived in Southeast Asia millions of years ago.
In 2005, scientists researched Gigantopithecus to determine why the giant ape had died out.
The scientists studied the teeth fossils of the giant ape in order to learn about the creature’s diet. They discovered that Gigantopithecus ate plants and was a forest-dweller. Sadly, the forests where Gigantopithecus once lived turned to Savannah grasslands that were unable to sustain the giant ape’s diet. And so, Gigantopithecus died out 100,000 years ago.
Gigantopithecus bones giant ape
Gigantopithecus skull next to a gorilla skull and a human skull
Cooper’s book about the wildlife in Equitorial Africa would stay with him through the years, and he would remain fascinated by apes. And all the while the idea for King Kong was playing in his mind.
It was decades later when, as an adult, Merian C Cooper entered the motion picture industry. While filming one of his movies in Africa (The Four Feathers), Cooper came across a family of baboons. He was so fascinated by them that he decided he would make a movie about primates. It was to be what he called a “terror gorilla picture”. And so, decades after first being inspired, Cooper decided to make his flick about the giant ape.\
However, Cooper wouldn’t make King Kong a regular ape. He wanted to truly conjure the ferocity and power of apes. And to do that, King Kong needed to be giant. Specifically, King Kong needed to be so big that could realistically represent a threat to modern civilization. The reason why King Kong is so big is because Cooper needed Kong to stand a reasonable chance of toppling humans. After all, one of the most important rules in storytelling is that the two opposing forces be equal in strength. Luke Skywalker has to be as powerful as Darth Vader. The Darleks have to be as powerful as Doctor Who. King Kong has to be as powerful as we humans.
That, however, represented a challenge in terms of storytelling. Because while King Kong needed to be giant, he also needed to be realistic. It would be no good making a giant ape that was as realistic as Jabba The Hutt. Cooper wanted to realistically portray the wild.
To make King Kong realistic, Cooper would have to do plenty of research.
The most important part of that research came from reading and talking to explorer Douglas Burden. Burden had been investigating Komodo Dragons, which was why one appears in the final movie.
Cooper decided that he would “giantize both the gorilla and the dragons to make them really huge. However, I always believed in personalizing and focusing attention on one main character and from the very beginning I intended to make it the gigantic gorilla, no matter what else I surrounded him with”.
It was Cooper’s discussions with William Douglas Burden that would inform much of his filmmaking. A trustee of the American Museum of Natural History, Burden was an authority on wildlife and knew much about both Komodo Dragons and apes.
Douglas had sought, captured and brought Komodo Dragons back to America.
douglas burdens komodo dragons
From Dragon Lizards of Komodo by W. Douglas Burden, published in 1927. Photo by Mrs. Burden.
At the time, the Komodo Dragon was thought to be a purely mythical creature. So it caused quite the stir when Douglas brought one back to the U.S. He claimed that Komodo Dragons were the closing living relative to dinosaurs.
Sadly, the Komodo Drgaons that Douglas brought back to America died. They were unable to survive the human world.
And it’s here that the plot of King Kong is explained for us. Because the fate of King Kong would match the fate of Burden’s Komodo Dragons.
Like the Komodo Dragon, Kong is unable to survive the human world. And indeed, Merian Cooper wrote, ‘I immediately thought of doing the same thing with a giant gorilla.'”
The Ending of King Kong, Explained
king kong
Douglas said that the reason his Komodo Dragons died was because they could not survive modern civilization.
This was the inspiration for the ending of King Kong.
Cooper wanted to show civilization killing the mythical beast. The ultimate symbol of civilization was the Empire State Building and the modern warplanes (and it’s worth noting that Cooper had once flown for the U.S. Airforce and Polish Air Force).
So that explains the ending of King Kong. Just one more mystery remains: The love interest. Why would an ape be in love with a woman, Ann Darrow?
How do you explain King Kong’s love for Ann Darrow?
ann darrow king kong
The relationship between King Kong and Ann Darrow represents hope. King Kong represents the wild. Ann Darrow represents modern civilization and mankind. And the relationship between the two represents the relationship between the wild and man.
With the relationship, Cooper is saying that he hopes that one day the wild world will live in harmony with modern civilization.
Had King Kong survived and lived with Ann Darrow in America, it would be like Cooper saying, “The wild world and modern civilization can live in harmony”. King Kong’s death shows that Cooper believed modern man would be the end of the wild.
However, it is also worth noting that Kong Kong is far from the only story where an animal carries off a woman. There is timeless symbolism in this event. Women, especially during the era of King Kong, represent glory in movies. Think of the sheer amount of times James Bond has won the woman at the end of the film.
So, what does it mean when the man doesn’t get the girl and instead the girl is carried away by a wild animal? It means that the wild is more powerful than mankind. That one act of an animal carrying the love interest away serves to humble mankind, by saying, “Mankind is less powerful than nature”. And when that animal is killed, it represents man killing nature and killing the hope of living in harmony with the world.
As I mentioned, King Kong is far from the only time when an animal or beast carried a female character away.
One of the most important depictions of an animal taking the love interest is in Emmanuel Frémiet’s 1887 sculpture, Gorille enlevant une femme, which literally translates to “Gorilla Carrying off a Woman”. This sculpture may very well have inspired the relationship between Ann Darrow and King Kong.
And that is King Kong explained.
Put this all together and you can see why King Kong is so famous and popular.
King Kong tells the timeless tale of man versus nature. And it does it in one of the most inspiring ways imaginable. By making the giant beast the victim of modern civilization, Cooper opens s audience’s eyes. He says, “Mankind are killing nature. And we need to live in harmony with the natural world”. That is why King Kong’s love for Ann Darrow resonates with us all. Because we all want to see nature and mankind live in harmony. And that is why King Kong must die; because we do not.
Leave a comment.
Leave a Comment
|
A Soldier's Life in World War I
By Paige Henry
Every soldier had a different training experience for World War I. Their experience depended on when they joined the army, what unit they were put in, where they were stationed, and how quickly they were able to adapt to their surroundings. First, soldiers in all armies were put through three months of basic training. Basic training built up muscle, taught people how to be disciplined, and taught them how to follow orders. A typical day usually began with a trumpet call to wake the soldiers at 5.30 a.m. They then made their beds correctly and cleaned their rooms. At 6:30 they would march for an hour and a half to work on their athleticism. After breakfast at 8:00, the morning was spent drilling formations and turns. Sometime between 12:15 and 2:00 p.m. soldiers had lunch before returning for more drill work in the afternoon until around 4:15. After a few weeks of this schedule, training became more advanced. Soldiers learned the basic movements of the battlefield, night operations, and marching. Later on, they learned how to correctly use weapons, as well as dig trenches.
Below: A picture of soldiers training to fight in World War I
Big image
Daily Life
For the soldiers enlisted in World War I, fighting wasn't as common as someone might think. Most soldiers spent their time keeping those on the frontline supplied. The troops were often rotated to make sure that time spent on the battlefield was balanced with rest and visits home. Even when supposedly "at rest," soldiers could still find themselves doing exhausting work. In addition to dealing with general military business, they were expected to know tactical instructions, and to attend training courses. Officers were excused from manual labor but were tasked with a lot of paperwork.
Trench Warfare
One new battle tactic that was introduced in World War I was Trench Warfare. This was when soldiers were required to dig trenches that would protect them from enemy shots and allow them to fire back without putting themselves in direct danger. Men that were required to "go over the top," had to climb out of the trenches with their weapons, and move through networks of barbed wire. They wanted to reach the enemy's front line, and use rifles or bayonets to attack them directly. This strategy was often unsuccessful and caused extremely high casualty numbers. Usually, attackers suffered higher casualties than the defenders did, as they had more protection than the attackers.
Defenders were stationed in their trench and shot at the enemy that was pursuing them. It was important that all of the defending soldiers stayed down low because otherwise there was a large possibility of them getting shot.
Below: A picture of what a typical trench looked like
Big image
New Technology
Millions of men and women were sent to fight away from home for months, or even years at a time. These soldiers also faced some of the harshest forms of warfare ever known. Because of these developments, they had to deal with a series of physically and emotionally scarring experiences. Technological advancements during the time period made machine guns remarkable weapons. Machine guns were able to fire off more rounds than ever before. The use of poison gas began in 1915, and the use of tanks in 1916. All of these tools were more effective, therefore causing mass casualties.
Things of Importance
Time away from the frontlines did offer the opportunity for soldiers to get clean. Baths would be set up and clothing that contained lice would be steam-cleaned. Something that was even more important to soldiers than cleanliness was food. Germany and Austria-Hungary made a large effort to keep their troops fed. Even if soldiers could find food, it was almost always less than desirable. If troops couldn't find food, they often starved to death. Tobacco was also a key part of most European soldier's lives. Pipes or cigarettes offered a calming comfort that people needed during battles. Communication with home was another valuable thing to the servicemen. Letters from friends and family kept soldiers in touch with the life that they used to live. Writing home could also be mentally healing for some soldiers.
Below: An example of a letter to a soldier in France from his father
Big image
Recreational Activities
Although fighting in the War was a very serious job, many soldiers looked for any opportunity for recreation when out of the line. Card games were often played, such as the German soldier’s favorite "Skat," or gambling games like "Crown and Anchor," which was played by the British. British soldiers also enjoyed playing the game of football. Football was a very organized game that many people played when they had the chance. Soldiers were often seen holding their own competitions, some of being held to sharpen military skills. The British Tank Corps even held tank races to improve abilities.
My Reaction
I believe that soldiers in World War I had to deal with very harsh conditions that were both mentally and physically scarring. Not only were they forced to be away from home and their family members, but they risked their lives everyday to protect their countries. Soldiers faced starvation, disease, death, the loss of captains, leaders, and friends. They had to attempt to deal with new technology, such as machine guns, tanks, and poisonous gas. They were at war constantly for months, years, almost never getting a true break. I know that I definitely could not have handled this grueling job, especially under the conditions that the World War I troops were forced to survive in. I applaud their courage and bravery, and am inspired by what they did to defend their countries.
Works Cited
Ewing, Harris &. Soldiers Training for World War I. 1917. American Legacy, United States.
Jensen, Les. "WWI: Life on the Western Front." WWI: Life on the Western Front. NcPedia.org, n.d. Web. 04 Dec. 2015.
Jonathan Boff, Paul Cornish, and Vanda Wilcox. "Life as a Soldier." The British Library. British Library - the United Kingdom, n.d. Web. 04 Dec. 2015.
Letter to Fred in France from His Dad. April 1915. Frederick George Ainge, n.p.
"Life in a Trench Video." History.com. A&E Television Networks, n.d. Web. 04 Dec. 2015.
"Life on the Front Line." BBC News. BBC, 31 Oct. 2014. Web. 04 Dec. 2015.
Soldiers Fighting from a Trench. N.d. Ducksters.com, n.p. |
Toxic Eladership
Topics: Adolf Hitler, Nazi Germany, Germany Pages: 2 (422 words) Published: October 17, 2008
Toxic Leadership of Adolf Hitler
The reason why people believed in Hitler and actually voted him to power in 1932 were
Hitler seize upon the fears of the German population. The people were afraid of the growing influence of communism and the inability of their government in addressing the growing economic demands of the treaty of Versailles as dictated by the western powers. Hence, he provided a viable and strong option to the people. •Hitler appealed to the EGO of the German people. He appealed to their PRIDE, besides offering solutions, which though were drastic and risky, but were in line with the feelings of the people. For example, he blamed the Jews for all the problems, and directed the wrath of the common German against the moneyed class, which was primarily made of Jews. Again another example was the promise to break the Treaty of Versailles, which though risky for a militarily weak Germany, the people would accept for it, restored their pride in the institution they had always revered, namely the Army. •Drastic times call for drastic actions was the line utilized by Hitler to promote himself and the Nazi party. The people accepted this, as they had always looked for strong leadership, which had been missing. They craved for authority, specifically for someone to tell them and lead them out of their misery. This contributed to the success of Hitler and the Nazi party. •A toxic leader like Hitler created an aura around himself, by drawing comparisons to the great heroes of the past. He also had the backing of highly influential people who had been swept away by his charisma, oratory skills, and outlook for a strong Germany.
Hence, a toxic leader does the following:
1.Use Emotion to appeal to his Target audience, by understanding the fears of the people and exploiting it. 2.Use the credibility of others to build upon his own credibility in front of his Target audience 3.Utilize the loopholes in the system, and ensure that the system...
Continue Reading
Please join StudyMode to read the full document
You May Also Find These Documents Helpful
• Toxic Leadership Essay
• Professional Ethics and Toxic Waste Essay
• Essay about Toxic Shock Syndrom
• Essay on Toxic Leadership in the US Army
• Toxic Leadership Essay
• Toxic Leadership Essay
• Toxic Shock Syndrome, Pharmaceutical Microbiology Report Research Paper
• Toxic Epidermal Necrolysis Essay
Become a StudyMode Member
Sign Up - It's Free |
Saturday, January 23, 2010
Statistics about countries in the world.
A FAQ on geography is the total number of countries in the world. I just got curious to know the exact count & googled to find it out. While searching for this, I stumbled upon many other interesting facts.
Total number of countries:
Totally, there are 195 countries in the world. But, this figure includes Taiwan. Eventhough, Taiwan functions like an independent country with a separate capital & currency, it is not recognised so by most of the countries due to Chinese pressure. China claims Taiwan as its province.
U.N. members:
Amongst the remaining 194 countries, 192 are U.N. members. Vatican City & Kosovo, two recognized independent countries, are not members of U.N.
World's Newest Countries:
Kosovo is the newest country of the world. It was formed from Serbia in the year 2008. Prior to that Serbia & Montenegro got independence in the year 2006 (both formed from Yugoslavia).
33 new countries have been created since 1990. Most of them were formed due to the soviet collapse & breakup of Yugoslavia.
World's Smallest Countries (by area):
Following are the smallest countries in the world:
1. Vatican City
2. Monaco
3. Nauru
4. Tuvalu
5. San Marino
Nauru is the smallest island nation in the world. Vatican City has a land area of just 0.44 sq.miles !!!
World's Biggest Countries (by area):
1. Russia
2. Canada
3. China
4. United States
5. Brazil
6. Australia
7. India
Russia's area is equivalent to 11.5% of the world's total area !!! The top 7 countries hold around 44% of the world's total area !!!
World's smallest countries (by population):
1. Vatican City
2. Tuvalu
3. Nauru
4. Palau
5. San Marino
Vatican City has a population of just 920 people !!!
World's biggest countries (by population):
1. China
2. India
3. United States
4. Indonesia
5. Brazil
China & India alone contribute around 40% of the world's total population !!!
1. Kalakreenga Anand....
'Facts' Anand aayiteenga pola... :) :D
2. Yup..more facts 2 come...wait n see... :) |
Friday, March 13, 2009
If We Are What We Eat, We'd be Corn
Written by Adam Wile
There are few questions we will face in life as often as the question “what’s for dinner?” While this may seem like the simplest of questions it is actually one that deserves far more time and consideration than we often give it. After all, how simple can the answer be when the local grocery store alone will provide us with nearly fifty thousand choices? Couple those fifty thousand with a myriad of fast food, delivery, dine in, take out,
and street vendor options and it is amazing we ever choose what to eat at all. Indeed as Michael Pollan writes in his enlightening book on the food we eat, The Omnivore’s Dilemma, “ when you can eat just about anything nature has to offer deciding what to eat will inevitably stir anxiety.”
This is the essence of the omnivore’s dilemma. Nature has given humans the gift to eat almost anything. With increased globalization in recent decades it is now possible to get any food at any time of year. The problem now is that we are faced with so many options, we have stopped thinking not only about how what we are eating affects ourselves, but also the world we live in. Pollan, through three different meals he refers to as the Industrial, the Pastoral, and the Personal, examines where the food we are eating comes from and how it affects the world we live in.
There is a famous saying that we are what we eat. Michael Pollan would disagree. His answer would be rather that we are what we consume, and thus American’s specifically are corn and fossil fuels. In search of his model Industrial meal Pollan visits a corn farm in Iowa and a feedlot in Kansas where he learns the negative economic and environmental affects of America’s broken agricultural system, which helps neither the land, the farmer, nor the consumer. Pollan shockingly describes the amount of corn in almost everything American’s eat, and the copious use of fossil fuels in order to make this possible.
Pollan’s second meal is one he refers to as the Pastoral, however he divides this into two sections; the big organic pastoral such as Whole Foods, and the beyond organic which finds from a polyculture farm in Virginia. Pollan starts off by browsing his local Whole Foods where he reads wonderful stories about organic free-range chickens and small farm asparagus flown in from South America. What Pollan finds upon further inspection is certainly far from encouraging. What once had started as a small movement has now been taken over by the industrial to meet an increasing demand. In doing so it has become only marginally better for the consumer, the environment, and the animals themselves than its non-organic counterparts. But what about small organic? Pollan then explores Polyface Farm, where owner Joel Salatin works along side nature in a shining example of how sustainable agriculture is possible on a small scale. The animals are treated humanely and next to nothing is wasted. Chefs from the local community all rave about the product. As Pollan later himself learns while eating his Pastoral meal, the closer the farm is to your table and the more natural the farm is, the better the food is going to taste. Polyface chickens taste “chickenier” while the big organic asparagus was described as woody and lifeless.
Pollan’s final meal is what he entitles the Personal. In this meal he attempts to hunt, forage, and gather all of his own food for a meal. He forces himself to kill a wild boar and forages for local mushrooms and fruits. While the final meal is admirable, Pollan makes it very clear that it is by no means the answer to how we should be responsible eaters. As much as McDonald's was “fast food,” this meal was the epitome of “slow food,” and like the McDonald's meal, should not be eaten every day.
The Omnivore’s Dilemma is a must read for anyone who is interested in sustainable foods or just wants to know more about where the food we eat comes from. Unfortunately, while Pollan's argument is well informed, it lacks real solutions. Pollan ends his quest satisfied that anyone who reads his book will simply be better-informed and, when given the opportunity, would choose food from places like Polyface Farm. But the truth of the matter is Pollan’s primary readership was probably doing that already. The question Pollan leaves unanswered is what can we do to advocate sustainable farms as our food supply and how can they meet national demand? Are we doomed to eat Walmart's version of organic if we don't have access to the good stuff? If so, we may eventually have to ask the question “what’s for dinner?” under much more grave circumstances.
1 comment:
the wicked noodle said...
What a great title to a great post! |
Accessible summary
What is known on the subject?
• Mental health nurses are affected by interpersonal, practice‐related and organizational factors that can increase workplace stress and reduce their physical and mental health and well‐being.
• Resilience programmes are a strength‐based preventative approach to supporting individuals to overcome workplace adversities.
What the paper adds to existing knowledge?
• This qualitative inquiry is the first study to report mental health nurses’ perspectives and experiences on a workplace resilience programme.
• Strengthening mental health nurses’ resilience through a resilience programme involved a process of understanding resilience, and applying resilience strategies such as positive self‐talk, managing negative self‐talk, detaching from stressful situations, being aware of and managing emotions, and showing more empathy, to address workplace challenges.
• To address the range of resources needed to support mental health nurses’ resilience, a social–ecological approach to workplace resilience can be used to promote resource provision at individual, work unit, organizational and professional levels.
What are the implications for practice?
• Resilience programmes are one resource for addressing the impacts of workplace stressors on mental health nurses. Organizational barriers and risks to staff well‐being need to also be addressed to build a resilient workforce.
• Incorporating resilience strategies into clinical supervision or reflective practice models may help sustain beneficial outcomes following a resilience programme and support resilient practice.
Mental health settings are potentially high‐stress workplaces that can lead to nurses’ poorer health and well‐being. Resilience programmes are a strengths‐based preventative approach for promoting mental health and well‐being in the face of adversity; however, there is no prior research on mental health nurses’ perspectives on resilience programmes.
To explore the perspectives of mental health nurses participating in a mental health service‐initiated resilience programme (Promoting Adult Resilience).
An exploratory qualitative inquiry was undertaken. Multiple qualitative data: open‐ended responses and semi‐structured interviews and focus groups, were thematically analysed.
Twenty‐nine registered nurses from a metropolitan mental health service participated. Four main themes were as follows: being confronted by adversity; reinforcing understandings of resilience; strengthening resilience; and applying resilience skills at work.
This is the first study to report mental health nurses’ perspectives on a resilience programme. Resilience programmes can help improve nurses’ self‐efficacy and ability to realistically appraise stressful situations and to moderate their emotional responses to others.
Implications for practice
It is recommended resilience programmes are provided to promote nurses’ well‐being and resilient practices. To build a resilient workforce, the wider barriers and risks to staff well‐being need to be addressed at a unit, organizational and professional level.
Kim Foster RN, PhD Celeste Cuzzillo GradDipPsych Trentham Furness PhD
Journal of Psychiatric and Mental Health Nursing, 19 June 2018 |
Thursday, October 11, 2012
Writing 101: First-Person Interaction
Writing in the first person takes a lot of skill. When it's done well, it can really bring the main character and the story to life. Readers will truly feel and think like that character, truly live inside your fictional world. But when it's done badly, your writing will feel distracting, confusing...and sometimes, even silly.
It's My World, You're Just Reading in It
Writing in the first person takes a very delicate hand. You don't want to over-load the book with "I." It gets boring when every sentence or paragraph starts out that way, and the last thing you want to create in your writing is repetition. You have to make sure you describe the character to the audience somehow, and that's tricky. You have to remember to see everything through the character's eyes; they probably can't read minds or hear thoughts, so they have to rely on observation alone to figure out what's going on.
But you also have to remember something else when you're writing in the first person, something that many writers tend to forget: you character can't see their own face.
And when authors forget that, it's just bad writing. Here's an example of what you should not do if you're writing first-person interaction:
"Jade, I really hate to tell you this...but you use bad grammar." Lily was afraid to meet my eyes when she told me.
She could tell from my stricken expression that I was upset. We both looked tense as we sat, staring at each other across a chasm of truths.
Stop! There's so much wrong here, it's hard to know where to start. First and foremost, "Jade" in the example above doesn't know what Lily is thinking, or what Lily can tell. But more importantly, "Jade" shouldn't be able to tell that her own expression is stricken because the scene infers that Jade is looking at Lily, and Lily is clearly not a mirror. The main character is also clearly in her own body and relating this experience because she was present inside of it. Therefore, she can't know how her and Lily look as they're having this discussion.
These are some of the reasons why it's so hard to write in the first person. If you're coming at the reader with an "I" perspective, you may not be in a position to make a lot of observations about how "I" look. But there's still plenty of room for description. "I" can still hear my own voice, and "I" can feel my own face. The first-person character will know when they're smiling, or raising an eyebrow, or crying. They may not necessarily know that they look crushed and hurt by something, or that they are glowing with happiness -- observations like this need to come from dialogue with other characters or interaction with a reflective surface.
First-person interaction with another character is a fine art. The best way to write it well is to completely immerse yourself inside your character's world. Really see your scenes unfolding as you write them and literally put yourself in that character's place. This will make it easier to write naturally from the first person and make observations that are actually plausible.
[+/-] Show Full Post...
1. I find first-person easy. I think third person is a skill - there are so many more variables about how close/distant the viewpoint it.
I love your example of what not to do, too funny!
2. Third-person writing is very difficult, I agree. I'm glad you liked my example! |
Year 6 Visits the Holocaust Centre
Year 6 have been learning about the Holocaust with Mrs Cohen. The course culminated on a visit to the Holocaust Centre where children extended their knowledge of the history of the Holocaust. They sat spellbound while listening to a Holocaust survivors. The visit's guide praise the chilren for their obvious knowledge and the high caliber of questions they were asking.
Holocaust trip 5777 1 Holocaust trip 5777 3 Holocaust trip 5777 4 Holocaust trip 5777 2
At the end of the trip we stop by a rose bush that was planted in memory of one of our pupils's great- grandparents. The children were silent and reflective as then contemplated what it was like for Ben's family.
Holocaust trip 5777 5
The Poppy Assembly - Remembering the Past
Mrs Halter led a very moving assembly about the Poppy Apeal and the origins of it. She took us to a journey into the past and helped us learn appreciation for what others have done for this country and for us. A highlight was seeing Mrs Halter's father's special World War Two medals, given to him for his services.
Poppy assembly 8 Poppy assembly 2 Poppy assembly 3 Poppy assembly 6 Poppy assembly 7
King David School made our Shabbat extra special!
Two of our pupils were very proud to use their shabbat plate to make their Shabbat at home even more special and beautiful!
Jeremy and Oliver using their plate |
Saturday, May 2, 2009
Promoting mental, dental and overall physical health with chew treats
Chews provide mental and physical stimulation for all dogs, and are an important support to dental health. Learn which chews are best, and how to minimize dental expenses.
Dogs, especially puppies need to chew. If you don’t provide good chews for them, they will find their own, often your furniture! Chew treats provide pleasure, mental and physical exercise, and help make a dog who is easy to live with.
Appropriate chew treats help keep dogs’ gums and teeth healthy. Canine dental work has become a “routine” maintenance procedure, one that requires a general anesthetic. Surgery is expensive and never without risk. Healthy dogs who eat a fresh, meat and vegetable diet often have much cleaner teeth and better gums than those eating grain-based dry food, and seldom need dental work. Chews and stuffed toys, some designed for dental stimulation, can provide needed exercise for gums and teeth and aid in plaque removal.
For some dogs, chews are not an option. Poorly aligned teeth, may break when dogs chew hard objects. Some dogs have thin tooth enamel, easily worn away. Consult your veterinarian about the safety of hard chews for your dog. If they can’t chew, you may need to brush their teeth on a daily basis. This small chore may save your dog the risk and you the expense of veterinary dental cleaning.
Rawhide: Don’t use it! Rawhide chews are high in fat, add no beneficial nutrients, and can cause blockages in the stomach or intestines, a life threatening event. Any form of rawhide can be irritating: We have known many dogs with chronic diarrhea, diagnosed with food issues, who actually had a problem with rawhide.
Green treats promoted for dental health or just for chewing often have a gluten base. Gluten is one of the most common allergens for dogs. It has no place in a dog’s diet.
Other cooked or smoked body parts require careful evaluation for each individual. Chews like tracheas and tendons are digestible and add beneficial cartilage to the diet. However an enthusiastic large dog can choke on them. Discard pieces that are small enough to swallow. Be careful of hoofs: Dogs can break a tooth on them. We do not recommend pigs’ ears because they are extremely high in fat.
Bones provide a natural source of glucosamine, chondroitin, collagen, and calcium for healthier joints and connective tissue. Bones can sometimes be excellent, and sometimes a danger. Know your chewers! Whether the bones are raw or cooked, heavy chewers can destroy a large knucklebone in a short time, and this is a heavy digestive load. Dogs raised on bones seldom overdo chewing (this may not apply to the average Labrador!), but should be supervised closely until you are confident that they are safe with the bones you give them.
Bones cooked at high temperatures may splinter. Sterilized and cooked bones may be fine for a light chewer who will gradually wear the bone away. Slow-roasted bones rarely splinter.
Raw bones are best. Small dogs do well with slices of femur, the round bones, which may be cut to under an inch or up to a foot. Beef knucklebones are great for larger dogs, and some smaller ones. Fresh bones are a rich source of good fats, but they provide a lot of calories, and
If your dog doesn’t need the calories, remove as much fat from them as you can. Start slow, with a 5 or 10 minute chewing time allowed. Dogs who destroy what they are given rapidly need to move up a couple of notches in durability. Raw bones may be stored in the refrigerator or freezer, but thaw them out before use: ice is very hard!
Promote mental health and agility. Treat balls and food-stuffed toys provide an interesting challenge for your dogs with no side effects! Few dogs can destroy the all purpose Kong, These can be stuffed with almost anything: a few crunchy bits, a piece of cheese, and a smear of peanut butter can keep dogs working for a long time. Kongs can be left safely with most dogs when you leave the house, and can help a dog through the difficult first hour you are gone.
Treat balls stimulate the brain. They work best when stuffed with tiny crunchy treats. If you feed dry food, use some of the food for stuffing the ball, and watch your dog roll, bounce or shake the ball to get at the food!
There are many new choices in both these categories. These toys take a beating, so look for durability.
Supervise all chew activities carefully.
Good chews provide mental and physical stimulation, entertain dogs without your active participation, and help keep the teeth and gums clean and healthy. They add to the quality of your dog’s days, helping them live longer, more satisfying lives.
Contibuted by Steve Brown and Beth Taylor, co-authors of
"See Spot Live Longer: How to help your dog live a longer and healthier life."
No comments: |
Tips For Living A Life With Diabetes
Even if your family does not have a history of diabetes, you can still get the disease. Unfortunately, it's a very common ailment and it can affect practically anyone at any time. Learn more about diabetes and what you can do to control it by reading this informative collective of tips.
Diabetic children can often feel ostracized or different than their classmates. You must remind your child that everyone is different, and that they're just like any children with peanut allergies or a pair of glasses. Their Diabetes is just a bump in their life, not a hurdle, and they'll be a stronger person some day for working hard at keeping it at bay.
If you are a diabetic, you should get tested for sleep apnea right away. If you do have sleep apnea, start treatment right away to protect yourself from future health issues.
A great way to save money and still eat healthy is to plan out all your meals. If you can reuse a food bought in bulk multiple times, like a loaf of bread or a specific vegetable, you'll be able to save money on the purchase. Plan out every meal to make the most of your grocery buys.
Get familiar with the glycemic index rating of foods to help gain better control of your diabetes. It is important to learn to recognize high glycemic foods like breads, fruit juices, cereals, pasta and rice. Eating more vegetables, lean proteins and other low glycemic index foods keeps your blood sugar from spiking after meals.
Increasing your intake of magnesium is not only good for your heart, it can help your diabetes too! weight loss bellevue wa can find lots of magnesium in fish, leafy greens, and nuts, so include those items in your diet as often as possible. Almonds are an excellent choice to grab as a snack any time.
Create a journal, and keep track of your blood sugar level every time you check it. Sometimes your blood sugar can reach dangerous levels without symptoms presenting themselves. If you don't keep track of your levels, you put yourself at a greater risk for kidney failure, stroke, gout, heart disease, and other debilitating maladies.
When buying your Diabetes medicines, ask for as much as possible at one time. more information that is added when the pharmacist dispenses your prescription is the same whether you buy 30 days or 90. Therefore, spreading that cost out over multiple days will also reduce the per-dose cost of your medications.
If you develop an itchy rash, be sure to go to your doctor or the emergency room right away. This could be a sign of Pruritis, a common sign in people who suffer from diabetes. By going to a doctor or emergency room, doctors can give you treatment for your hypoglycemia that could save your life.
Stop smoking. Aside from the well-documented lung cancer risks, smoking is of extra concern for diabetics. Diabetes and smoking both put you at an increased risk for heart disease, nerve damage, and kidney problems. Smoking also causes a rise in blood sugar. Either risk alone is enough for concern, but a diabetic who smokes is at a much higher risk of developing problems.
When it comes to dealing with diabetes, make sure that you are not doing it alone. It is important because it is much easier to deal with problems like this if you have a close friend there to help you cope with it. This can be beneficial either through advice that they can provide or just by having somebody to talk to.
Many people, once diagnosed with diabetes, quit eating sugar and think that is sufficient. But what most people don't know is that fatty foods can be just as dangerous to diabetic patients. If a person cuts out sugary and fatty foods diabetes can actually be cured and a person can add many years to their life.
Diabetics who find that they can sleep for hours and never wake up feeling fully rested may be experiencing unhealthily high insulin levels in the body. Be aware that this might also be a direct side effect of many popular diabetic medications. You might only experience this feeling after a meal. However, this is considered normal.
If you have been recently diagnosed with diabetes, you just might be able to control it with your diet. Depending on bellevue weight loss of it, this is usually the first step your doctor may take. The important thing is to eat three small meals a day with three snacks in between that follow the nutritional guidelines that your nutritionist will go over with you.
Keeping up with your restrictions and following a doctor's directions will help you control your diabetes the best you can. Sure, there may be complications, but they will be few and far between if you take a few preventative measures. Lots of people have this disorder and lead happy and healthy lives, and I'm sure you will too!
Comments on “Tips For Living A Life With Diabetes”
Leave a Reply |
Babur [right] and Humayun with Courtiers (Detail), Late Shahjahan Period, ca. 1650.
Saturday, April 16, 2011
Chola Expansion in the broader context of trading activities.
I was mainly reading two articles by Hermann Kulke and Tansen Sen and this is a brief understanding of their views, based on their perception as understood from the two articles.
One must broaden the horizon and include the greater geography of south and eastern asia and even the west to understand the Chola maritime expeditions, instead of focusing solely on the south asian peninsula. We need to keep three points in mind while trying to understand the contemporary relations: a potent trading system under Song China, a strategic location of Sri Vijaya and a commercially expanding Chola empire. Tansen Sen views the conflict between Sri Vijaya and Chola as intense competition to access the viable markets in Song China.
One thing must be kept in mind as Hermann Kulke pointed out that Rajendra’s expedition was a unique case in point because otherwise the relation between the peninsula and south east asia was peaceful. Several causes have been put forward ranging from digvijaya to looting and plundering to removing sri vijaya as a hurdle towards commercial expansion, or may be all of them worked at some levels.
The possibilities of a trade war cannot be ridiculed because of sri vijayan diplomatic attempts to stall chola trade with the song market. This is evident in a chinese document from sri vijaya that gives the false data that the cholas were under Sri Vijayan suzereinty.
Hermann Kulke identifies the three major dynasties rising in the 10th century and of major concerns in this context as the Fatimid in Egypt, Cholas, and Song in China. Trade with the gulf and malabar is recorded in documents of Jewish traders of Cairo and Aden. The kingdom of Angkor too extended frontiers dominating part of Laos and Thailand and northern part of Malay Peninsula. The attack of Chola on Sri Vijaya has to be thus seen on the broader context of rise of new powers, shifting trade routes on which all these powers wanted to capitalise upon, and a struggle for market share.
The redifinition of trade routes and growing importance of new states that affected the dynamics of trading networks in south and east asia is evident from various facts: A chinese account suggests the growing military and piracy skills of the Sri Vijaya. Regarding india and china, hermann Kulke suggests that though the former was still the holy land, the latter was arguably the middle kingdom to be reckoned with and most kingdoms tried to win it’s favour by sending tributary missions. Its importance in chinese trade is evident from the meticulous recording of the chinese on tributaries and gifts. The reunification of china under the song dynasty further added to its importance.
Diplomatic relations of Sri Vijaya with the Chola state is evident too, like in the Leiden grant of 1005 where Rajendra granted the revenue of a village to maintain the Buddhist shrine constructed by the Sailendra king at Negapattinam. Initially during the trade rivalry both the states tried to maintain friendly relations. That the conflicts need to be seen from a larger picture is evident from the fact that Sri Vijaya had conflict with Angkor too, though sources are scarce on this.
Kulke has tried to bring in the role of guilds in trying to influence chola court to eliminate trading rivalry in Sri Vijaya. However the chola kings always tried to maintain a diplomatic relation with the south east and east asian powers. Kulottunga tried to do so, and consecrated them also with rituo- political missions.
The decline of cholas didn’t necessarily mean a decline of eastern trade. The twelfth and thirteenth centuries show heightened functioning of Ayavvole and Manigramam merchants in south india and ceylon. In the 13th century there’s evidence of large presence of south indian merchants in china. Muslim rule brought the subcontinent into the fold of international muslim trade in the indian ocean.
-Sohini Chattopadhyay (Dept. of History, Second Year, Presidency University, Kolkata)
No comments: |
About programming help
This essay provides a list of design rules for an setting and language suited to learning.
Common visual environments visualize the code. They visualize static framework. But which is not what we need to understand. We need to know what the code is accomplishing.
So as to understand what a line of code does, the learner need to see its result. As an example, because the programmer moves around iterations of the "triangle" line, she sees each triangle look over the canvas:
We tend to be the SuperDataScience crew. You will discover us in the Data Science programs taught by Kirill Eremenko - we are below to help you out with any thoughts and make sure your journey with the classes is usually smooth sailing!
• We frequently update the exploration papers plus the analyze content for that understanding of the coed also to be on target Along with the dynamic environment.
The opposite option is to show the point out. In the subsequent illustration, The existing fill and stroke colors are demonstrated previously mentioned the canvas. Now, when a line of code alterations the fill colour, the programmer essentially sees something alter. Generating some thing noticeable makes it genuine.
Imagined experiment. Visualize if you obtain a brand new microwave, took it out on the box, and located a panel of unlabeled buttons.
Nevertheless, I've constantly proposed adjustable quantities inside a context where by the adjuster presently understands the that means of your amount. As outlined previously, I am pretty uncomfortable Together with the Khan Academy solution of encouraging learners to adjust unlabeled quantities and discover whatever they're for, And that i think that this is a scenario of a Device being adopted with out an comprehension of what intent the Resource serves.
The examples above are merely one of some ways of obtaining these aims. All that actually issues is the fact that by some means the learner's inquiries get answered:
• Be sure to point out the venture facts, the shipping time and the mandatory format as expected by the faculty/College. You can even point out other necessities like the phrase rely, citation style, references etc Should the task/assignment so demands.
Trick dilemma -- it's extremely hard to know what coloration it is, because the this means of "255" is determined by the global "color mode". It may be any of these colours:
In the instance plan, fprintf replaces our acquainted printf operate identify, as well as the file pointer outlined before is the 1st argument inside the parentheses. The remainder in the statement appears like, and in reality is similar to, the printf statement.
Reworking move from an invisible, ephemeral notion right into a stable issue that can be researched explicitly.
In Processing, drawing and input activities are tied to solitary entry factors -- top rated-amount features for example "attract" and "mouseDown". The actions of submodules has to be tangled across these global functions. Thoroughly clean decomposition find is impossible.
The learner often will get the experience of interactively managing the lessen-degree aspects, comprehension them, developing rely on in them, in advance of handing off that control to an abstraction and moving to an increased level of Management.
HyperTalk takes place to utilize an English-like syntax, but which is not The purpose in this article. What issues is that each argument might be understood in context.
Every single programming language is made from metaphors, but some healthy the thoughts better than Other individuals. Regular essential programming uses the metaphor of "assigning to variables", shuffling bits between minimal bins. Contrary to The brand turtle, this metaphor was not designed to resonate with how folks understand and have an understanding of; it basically advanced as a skinny layer above the metaphors Utilized in the underlying device architecture, such as "storing to memory".
These students who're working on research paper of economics have to have our help from your experts. It will become hard for them to unravel the issues. We've been there to really make it effortless for you personally and decrease your anxiety by guaranteeing well timed completion and supply in the initiatives. Economics as a subject is theoretical and college students discover it incredibly obscure the idea and terminologies affiliated with it.
The "triangle" line attracts a triangle to the canvas, rotated and colored. The timeline can display a thumbnail of each triangle created.
The setting must encourage the learner to get started with a single, then make several, by providing ways of employing those variable expressions at the next degree, like perform software or looping.
Observe how Each and every photograph is actually an image of something that is 10 occasions even bigger or smaller compared to the one particular previous or subsequent it. The variety that appears to the reduce right just under Each and every picture is the size of the thing in the picture.
The programming ecosystem exhibits the exact same ruthless abbreviation as this hypothetical cooking demonstrate. We see code to the still left along with a result on the ideal, but it's the actions between which make any difference most.
Just about the most popular operators that you'll face is The straightforward assignment operator "=". You observed this operator during the Bicycle course; it assigns the worth on its suitable for the operand on its left:
I educate programs in two distinctive Enterprise places on Udemy: Info Science and Forex Trading. I need you to be assured which i can produce the best schooling There may be, so under is a number of my history in each these fields.
in fact i hv to put in writing a program that results in a textual content file and counts the amount of traces that get started with ‘A’??
• We give you the privilege of refund when there is any default from our finish or in the event the task is not shipped throughout the prescribed time offered by you.
Furthermore, a perfectly-built technique is not really simply a bag of attributes. A superb system is meant to stimulate distinct ways of pondering, with all features very carefully and cohesively made around that function.
Purposeful languages deliver two new, essential types of glue... This can be the key to practical programming’s electricity -- it makes it possible for enhanced modularization.
Leave a Reply
|
Tuesday, July 17, 2007
What is RAID and what are its different types?
Reply 1)
RAID: Redundant Array of Independent Disks
The abbreviation for the RAID is Redundant Array of Independent Disks. This RAID by definition stands for the subsystem for the disks. The expectation for using this is the increment in the performance and the value added services in the reliability. The major purpose of the system is to provide the fault tolerance subsystem which can provide efficiency and reliability to the overall performance of the system. The RAID is also used as a server for the reasons mentioned above. The RAID in the earlier history is also implemented by the software to enable the present abilities.
Since the purpose of RAID is for fault tolerant systems hence the design is suited for that purpose. The RAID technology is actually a set of standards. These standards are required to be followed for developing a fault tolerant storage system. The performance also matters a lot here. Hence in the mentioned above paragraph it is said that RAID has been implemented by only the software. The set of standards should be kept in mind before implementing the RAID. This is done using at least two ordinary hard disks and a RAID controller.
The RAID has its origin starting from the year of 1980. At that time it was referred as the Redundant Array of Inexpensive Disks. This was in comparison with the storage system available at that time. The storage devices where quite expensive those days; so the implementation of a secure RAID drives was an important enhancement in the field of storage systems. Presently the prices of the memory whether it is the secondary memory like the hard disk, floppy drive, compact disk or any other storage media as well as the primary memory storage like the RAM etc, are all decreasing day by day. Hence by these statistics the RAID Advisory board modified the parameters from inexpensive to the independent.
The concept of mirroring and parity is also available in the RAID drives. In fact the property of fault tolerance is achieved by the process of mirroring and fault tolerance. The achievement is quite necessary for the purpose of providing a fault tolerant system.
The RAID system may have an altogether different drive for the sole purpose of replacing the drive that is failed or might have crashed. The RAID is drive that is replaced and is in spare is called as the hot spare. The hot drive is used in the case of an emergency where in the drive is the spare part that is used to fill in the gap provided by the crashed systems drive. Such a drive must always be ready and waiting. The physical state of such a drive is of quite importance where in the drive must be made available for the purpose of providing back up to the system. The replacement should be carried out immediately. So after the replacement is carried out now the entire system must be made aware of the fact that the hot spare drive is in use. And also the provision should be made for filling up the gap made by the hot spare drive. This is necessary if the other drives also fail and the condition is also possible even if the hot spare drive itself fails. But the RAID continues to dominate the technology that is used for the implantation of secure systems.
The different types of RAID levels are RAID 0, RAID 1, RAID 3, RAID 5 & RAID 10 levels.
In this system, the data which is to be written across the drivers are split up in blocks of array.
RAID 0 will offers a superior Input Output performance and the performance can be increased further by using multiple controllers. The advantage of using RAID O is that it offers great performance such as read and writes operations. The Disadvantage of RAID 0 is not fault tolerant.
For Example: If at all the data in one of the disk is lost then all the data in the RAID 0 array will be lost. RAID 0 is designed for non critical storage of data where read and write are at a high speed. For example, it can be used in the Photoshop image retouching station.
In RAID 1, the data is stored twice on the data disk and on a mirror disk. If one of the disks fails, the controller uses the data drive or the mirror drive for data recovery. The advantages of using RAID 1 are excellent read speed and a write speed which is very high comparable to that compared to a single disk. If one of the disks fails, data is copied to the replacement disk. RAID 1 is a very simple technology compared to RAID O. The disadvantages of RAID 1 are that the storage capacity is half of the total disk capacity which is present in the system because all data get written twice. RAID 1 is ideally suited for mission critical storage. It is also suitable for small servers.
In RAID 3 systems, the data blocks are divided into and are written in parallel on two or more drives. The additional drive which is used to stores parity information. Since parity is used in RAID 3 stripe set can handle a single disk failure without losing data. The advantages of RAID 3 are to provide high throughput for large data transfers. The disadvantage of RAID 3 is complex and performance is slower for small Input Output operations.
RAID 5 is the most common used RAID level.
It is somewhat similar to RAID-3 in which data is transferred to disks by independent read and write operations. RAID 5 arrays can withstand a single disk failure as in RAID 3, without losing data. Extra cache memory can be provided in order to improve the write performance. The advantage of RAID 5 is it reads data transactions are very fast. The disadvantage of RAID 5 is disk failures and this is complex technology.
RAID 10, a mix of RAID 0 and RAID 1:
RAID 10 uses the advantages of RAID 0 and RAID 1 in a single system. Its added advantage helps in proving good security by mirroring all data on a secondary set of disks. The RAID 2, 4, 6 or 7 levels do exist in prepress environments. The advantages of RAID 10 are read data transactions are very fast & it is a very simple technology. The disadvantages of RAID 10 are that is its performance is slower for large transfers.
Reply 2)
RAID stands for Redundant Array of Independent (or Inexpensive) Disks,
There are number of different RAID levels:
Level 0:
Level 0 is a 'striped' disk array without fault tolerance. It provides data striping (spreading out blocks of each file across multiple disk drives) but no redundancy.
Level 1:
Level 1 does 'mirroring' and 'duplexing'. It provides disk mirroring
Level 2:
Level 2 does 'error-correcting coding'
Level 3:
Level 3 is 'bit-interleaved parity'. It provides byte-level striping with a dedicated parity disk
Level 4:
Level 4 is 'dedicated parity drive'. It is a commonly used implementation of RAID
Level 5:
Level 5 is 'block interleaved distributed parity'. It provides data striping at the byte level and also stripe error correction information.
Reply 3)
The distribution of data across multiple drives can be managed either by dedicated hardware or by software. Additionally, there are hybrid RAIDs that are partially software and hardware-based solutions.
Software RAID
Software implementations are provided by most operating systems. A software layer sits above the (generally block based) disk device drivers and provides an abstraction layer between the logical drives (RAID arrays) and physical drives. Software RAID is typically limited to RAID 0 (striping across multiple drives for increased space and performance), RAID 1 (mirroring two drives) and RAID 5 (data striping with parity).
In a multi-threaded operating system (such as Linux, FreeBSD, Mac OS X, Windows NT/2000/XP/Vista and Novell NetWare) the operating system can perform overlapped I/O, allowing multiple read or write requests to be initiated without waiting for completion on each request. This capability makes RAID 0/1 possible in an operating system. However, most operating systems do not support RAID 0/1 striping or mirroring with parity, due to the substantial processing demands of calculating parity].
Software implementations require some very small amount of processing time, which is provided by the main CPU in the host system. Since SCSI, PATA, and SATA drives all support asynchronous read/write, any multi-threaded operating system can support non-parity RAID on multiple hard drives with only a one percent increase in CPU overhead[ .
Software implementations can exceed the performance levels of hardware-based RAID due to the high-performance of modern CPUs]. Since the software must run on a host server attached to storage, the processor (as mentioned above) on that host must dedicate processing time to run the RAID software. Like hardware-based RAID, if the server experiences a hardware failure, the attached storage could be inaccessible for a period.
Software implementations can allow RAID arrays to be created from partitions rather than entire physical drives.
Hardware RAID
A hardware implementation of RAID requires at a minimum a special-purpose RAID controller. On a desktop system, this may be a PCI expansion card, or might be a capability built in to the motherboard. In industrial applications the controller and drives are provided as a standalone enclosure. The drives may be IDE/ATA, SATA, SCSI, SSA, Fibre Channel, or any combination thereof. The using system can be directly attached to the controller or, more commonly, connected via a SAN. The controller hardware handles the management of the drives, and performs any parity calculations required by the chosen RAID level.
Most hardware implementations provide a non-volatile read/write cache which, depending on the I/O workload, will improve performance. Cached RAID controllers are most commonly used in industrial applications.
Hardware implementations provide guaranteed performance, add no overhead to the local CPU complex and can support many operating systems, as the controller simply presents a logical disk to the operating system.
Hardware implementations also typically support hot swapping, allowing failed drives to be replaced while the system is running.
Hybrid RAID
Hybrid RAID implementations have become very popular with the introduction of inexpensive RAID controllers, implemented using a standard disk controller and then implementing the RAID in the controllers BIOS extension (for early boot-up/real mode operation) and the operating system driver (for after the system switches to protected mode). Since these controllers actually do all calculations typically proprietary to a given RAID controller manufacturer and typically cannot span multiple controllers. The only advantages over software RAID are that the BIOS can boot from them, and the tighter integration with the device driver may offer better error handling.
Both hardware and software implementations may support the use of hot spare drives, a pre-installed drive which is used to immediately (and almost always automatically) replace a drive that has failed. This reduces the mean time to repair period during which a second drive failure in the same RAID redundancy group can result in loss of data. It also prevents data loss when multiple drives fail in a short period, as is common when all drives in an array have undergone very similar use patterns, and experience wear-out failures
Reply 4)
Great posts everyone. Few queries that come to mind:
1) What is parity?
2) What are the possible ways of connecting a RAID system to the server?
3) Is there a minimum and maximum “number of disk” limit?
4) What is the difference between Disk Mirroring and Disk Duplexing?
Reply 5)
To gain performance and/or additional redundancy the Standard RAID levels( level 0 to level 5 ) can be combined to create hybrid or Nested RAID levels. Many storage controllers allow RAID levels to be nested. That is, one RAID can use another as its basic element, instead of using physical drives
For example, RAID 10 (or RAID 1+0) consists of multiple level 1 arrays stored on physical drives with a level 0 array on top, striped over the level 1 arrays. In the case of RAID 0+1, it is most often called RAID 0+1
Common nested RAID levels
RAID 0+1: Striped Set + Mirrored Set (4 disk minimum; Even number of disks) provides fault tolerance and improved performance but increases complexity. The key difference from RAID 1+0 is that RAID 0+1 creates a second striped set to mirror a primary striped set. The array continues to operate with one or more drives failed in the same mirror set, but if two or more drives fail on different sides of the mirroring, the data on the RAID system is lost.
RAID 1+0: Mirrored Set + Striped Set (4 disk minimum; Even number of disks) provides fault tolerance and improved performance but increases complexity. The key difference from RAID 0+1 is that RAID 1+0 creates a striped set from a series of mirrored drives. The array can sustain multiple drive losses as long as no two drives lost comprise a single pair of one mirror.
RAID 5+0: A stripe across distributed parity RAID systems
RAID 5+1: A mirror striped set with distributed parity
Also we can refer to following link for more info on nested array:
Reply 6)
If the storage box is external, it can also have a Fibre interface. Also other option is the create virtual LUNs in SANs and then use RAID.
Reply 7)
1) What is parity?
Parity — Redundant information that is associated with a block of information and used to Rebuild a disk that has failed.
- RAID 5 arrays map data and parity intermittently across a set of disks. Within each stripe, the data on one disk is parity data and the data on the other disks are normal data. Therefore, RAID 5 arrays require at least three disks to allow for this Parity information. When a disk fails, the Array Manager software uses the parity Information in those stripes in conjunction with the data on the other disks to re-create the data on the failed disk.
Possible ways of connecting RAID system is SCSI.
SCSI — Acronym for small computer system interface, which is a type of interface between a system and devices such as hard drives, diskette drives, CD drives, printers, scanners, and other peripherals.
Disk duplexing is a variation of disk mirroring in which each of multiple storage disks has its own SCSI controller. Disk mirroring (also known as RAID-1) is the practice of duplicating data in separate volumes on two hard disks to make storage more fault-tolerant. Mirroring provides data protection in the case of disk failure, because data is constantly updated to both disks. However, since the separate disks rely upon a common controller, access to both copies of data is threatened if the controller fails. Disk duplexing overcomes this problem; the use of redundant controllers enables continued data access as long as one of the controllers continues to function.
This failover method helps to ensure that data access will continue transparently to the user and allows technicians to take the server down to replace the defective controller at a more opportune time, instead of at the moment of failure. The ability to choose when the server comes down can be very advantageous, because -- in accordance with Murphy's Laws of Information Technology (Law of Inconvenient Malfunction) -- a device is likely to fail at the least opportune possible moment. Nevertheless, some experts advocate other systems (such as higher level RAID configurations) that don't require taking the server down to replace defective hardware.
Another benefit of disk duplexing is increased throughput. Using a technique known as a split seek, whichever disk can deliver the requested data more quickly responds. Multiple requests may also be split between the disks for simultaneous processing.
Reply 8)
I think already everyone is aware about the RAID.
Though I would like to add some images which will be more helpful in understanding of RAID Functionality.
Below we are looking at the RAID 1+0 i.e. RAID 10. Please find the exact description for this diagram in anjum’s Email.
RAID 5 divides the data and creates parity information similar to RAID 4, unlike RAID 4 the parity data is written separately across multiple disks.
RAID 6 deploys two parity records to different disk drives (double parity) enabling two simultaneous disk drive failures in the same RAID group to be recovered.
Post a Comment
Subscribe to Post Comments [Atom]
<< Home |
Thomas' Legion
American Civil War HOMEPAGE
American Civil War
Causes of the Civil War : What Caused the Civil War
Organization of Union and Confederate Armies: Infantry, Cavalry, Artillery
Civil War Navy: Union Navy and Confederate Navy
American Civil War: The Soldier's Life
Civil War Turning Points
American Civil War: Casualties, Battles and Battlefields
Civil War Casualties, Fatalities & Statistics
Civil War Generals
American Civil War Desertion and Deserters: Union and Confederate
Civil War Prisoner of War: Union and Confederate Prison History
Civil War Reconstruction Era and Aftermath
American Civil War Genealogy and Research
Civil War
American Civil War Pictures - Photographs
African Americans and American Civil War History
American Civil War Store
American Civil War Polls
North Carolina Civil War History
North Carolina American Civil War Statistics, Battles, History
North Carolina Civil War History and Battles
North Carolina Civil War Regiments and Battles
North Carolina Coast: American Civil War
Western North Carolina and the American Civil War
Western North Carolina: Civil War Troops, Regiments, Units
North Carolina: American Civil War Photos
Cherokee Chief William Holland Thomas
Cherokee Indians: American Civil War
History of the Eastern Band of Cherokee Indian Nation
Cherokee War Rituals, Culture, Festivals, Government, and Beliefs
Researching your Cherokee Heritage
Civil War Diary, Memoirs, Letters, and Newspapers
On June 3, 1863, Lieutenant Flusser, commanding the United States steamer Miami, in Albemarle Sound, advised Rear-Admiral S. P. Lee, U.S.N., of the building of a new Confederate. States ram, the Albemarle, at Edward's Ferry on the Roanoke River, 30 miles below Weldon. The United States navy department several times called the attention of the general in command of the United States forces on the sound to the construction of this vessel, and advised that as the United States ships could not reach her on account of the shallowness of the water, a land force be sent to burn her. This appeal was disregarded.
CSS Albemarle Drawing.jpg
(Picture) CSS Albemarle (1864-1864). Sepia wash drawing by R.G. Skerrett, 1899. Courtesy of the Navy Art Collection, Washington, DC. U.S. Naval Historical Center Photograph.
CSS Albemarle: A Civil War Ironclad Ram
Civil War Ironclad Ram Confederate.jpg
CSS Albemarle: A Confederate Ironclad Ram
In the meantime the building of the vessel, subsequently named the Albemarle, went on under the most discouraging circumstances. There was not even a ship yard at Edward's Ferry; the timber had to be cut in the woods, workmen were scarce, there was no machine shop, and iron was almost unobtainable. Fortunately, Commander James W. Cooke, C. S. navy, was ordered to assist her builders, and take command of her when finished. She was simply a flat- bottomed boat, sharp at both ends. The prow was solid oak, plated with iron; her shield was slanting, and covered with railroad iron, which was sufficient, as after experience demonstrated. She carried two good guns, Brooke rifles. As the vessel went down in the water, Cooke moved her farther and farther down the river into deeper water. The officers, crew and workmen suffered great hardships from bad fare, bad water, and bad climate. But the indefatigable Cooke encouraged them by his example.
By April, 1863, the vessel was partially completed, and a combined movement against the Federal forces at Plymouth, N. C., was planned. About the middle of April, General Hoke, commander of the Confederate land forces, visited the ship, then at Hamilton, and Captain Cooke promised to be at Plymouth by the 18th to assist the army. Few men would have ventured to make the promise. Workmen were still at work; the engine had not been tried, nor the crew drilled. Cooke had, however, an excellent executive officer in the brave Lieut. F. M. Roby.
CSS Albemarle.jpg
(Picture) "USS Sassacus and CSS Albemarle". It is a 19th Century photograph of an artwork, depicting USS Sassacus ramming the Confederate ironclad, during Albemarle's engagement with Federal gunboats on Albemarle Sound, North Carolina, 5 May 1864. Sassacus was hit in a boiler and disabled during this action. Albemarle was not significantly damaged by the ramming or by gunfire. U.S. Naval Historical Center Photograph.
Sinking of Civil War Albemarle Ironclad Ram
Civil War Albemarle Ironclad Ram.jpg
Sinking of Civil War Ironclad Ram Albemarle
On the 17th and 18th of April, 1864, vigorous attacks were made upon the forts at Plymouth by the Confederates under General Hoke. At this time the United States vessels present were the Miami, the Southfield, two small picket boats, the Bombshell and Whitehead, and the gunboat Ceres, all under the command of Lieutenant Flusser. In Albemarle Sound were several United States vessels, technically called double-enders. Captain Flusser helped materially in the defense of the forts on the 17th and 18th; his two larger vessels carrying one rifled zoo-pounder and five or six 9-inch shell guns each. On the evening of the 18th, expecting the advent of the Albemarle, he chained the Miami and Southfield together, a somewhat novel proceeding. In this condition he confidently awaited the attack, having some months before expressed the opinion that "we shall whip them if they venture down."
In the meanwhile the Albemarle, having landed her mechanics in the afternoon of the 18th, was slowly making her way down the river, stern foremost, as she was difficult to steer. About 3 a.m. on the 19th, Captain Flusser was made aware of her approach, and the Miami and Southfield steamed to meet her. The Albemarle, with her ports closed, passed the enemy's fort at Warren's Neck under a heavy fire, and rammed the Southfield, forcing her ram into the fire- room. The Albemarle had some difficulty in extricating herself, the water coming into her bow port before she could get clear. The Southfield filled and sank as the ram was drawn out. Commander Cooke, in his official report, spoke highly of his officers, Lieutenant Roby, Master Shelly, Past Midshipman Hamilton and Pilot Hopkins. He also specially thanked Mr. Elliot, the builder, who accompanied him as a volunteer, for great gallantry and efficient service.
As the Albemarle closed with the Miami and Southfield they fired shells, which of course burst into fragments against the ram's iron sides and rebounded over the Miami's deck. Three or four of the pieces struck the gallant Flusser, and he was instantly killed. Seeing the fate of the Southfield, the Miami, Whitehead and Ceres made off down the river. The Bombshell had been previously sunk by a shot from a Confederate battery. The Albemarle having sunk the Southfield and driven off the other vessels, now turned her guns upon the forts, and the town surrendered the same day. Thus did the navy assist the army in the capture of Plymouth. Without the aid of the Albemarle it could not have been effected.
The Albemarle now went to the wharf at Plymouth to be completed. On May 5th, accompanied by the steamer Cotton Plant and the little gunboat Bombshell, which had been raised by the Confederates and commissioned under Lieut. W. E. Hudgins, she steamed down the Roanoke River into Albemarle Sound. According to Capt. J. N. Maffitt, C. S. N., in his "Reminiscences," Captain Cooke was ordered to convoy the Cotton Plant to Alligator River. After proceeding some 15 miles down the sound she encountered the Federal fleet, consisting of the double-enders Mattabesett, Sassacus, Wyalusing and Miami, and the gunboats Ceres, Whitehead and Commodore Hull, all under the command of Commodore M. Smith, U.S. N. These vessels were heavily armed, and the Miami carried a torpedo and a seine, the latter to foul the Albemarle's propeller. The Cotton Plant was sent back to Plymouth, and the Bombshell should have been, for of course she had soon to surrender.
CSS Albemarle (Replica)
CSS Albemarle (Replica).jpg
Replica of CSS Albemarle
CSS Albemarle Ironclad Cannon
CSS Albemarle Ironclad Cannon.jpg
CSS Albemarle Ironclad Cannon
About 5 p.m. the engagement commenced. The Albemarle made repeated attempts to ram her huge antagonist, but her slow speed prevented. The enemy poured broadside after broadside into her; but even the 100-pound rifled projectiles and the 9-inch solid shot failed to penetrate her shield. The Sassacus rammed her just abaft the shield, but without effect. In return, she received from the Albemarle a 100-pound Brooke rifle-shot, which passed through one of her boilers, scalding many of her crew, and sending her out of action, disabled. The Miami made no use of her torpedo and the seine accomplished nothing. The Albemarle kept up a constant fire, though one of her guns was badly cracked. Finding it impossible to capture the Albemarle, the Federal fleet discontinued the action at 7:30 p.m., and the unconquerable little ram made her way slowly back to Plymouth. The total loss in the Federal vessels was 29. We have no returns of the Albemarle's loss.
As the Confederate navy department was building an ironclad ram on the Neuse River, the Albemarle now awaited her co-operation. On the night of October 27, 1864, she was sunk while lying at the wharf at Plymouth, by a torpedo boat under the command of the heroic Lieut. W. B. Cushing, U. S. N., one of the most brilliant exploits in naval annals. At the time, the Albemarle was commanded by Lieut. A. F. Warley; Commander Cooke, who had been promoted to captain, having retired from ill health. After the destruction of the Albemarle the town of Plymouth fell again into the enemy's hands.
Source: The Confederate Military History, Volume 12, Chapter XI
Recommended Reading: The Hunt for the Albemarle: Anatomy of a Gunboat War (Hardcover). Description: On a muddy waterway, once called the River of Death, James Cooke and Charles Flusser met again after parting when the Civil War started. Once both navy lieutenants, they now were the opponents in naval warfare. Confederate Navy Lieutenant James Cooke had as many years of active naval service as Charles Flusser had years of living. Cooke was a devoted family man while Flusser was a bachelor with a mind for young Southern women, whiskey, cigars, fast horses, and early promotion. Continued below...
The Confederate ironclad Albemarle was the key to the river wars in North Carolina. Flusser's search for this ship would determine the success or failure of the Union navy in securing the North Carolina coast and rivers. James Cooke and the Confederates knew their only chance to break the blockade was with the new ironclad. The Hunt for the Albemarle is the dramatic story of these two men and their destiny. Both of these men shared one common characteristic. Each was willing to die for the cause he believed was right.
Site search Web search
Recommended Reading: A History of Ironclads: The Power of Iron over Wood. Description: This landmark book documents the dramatic history of Civil War ironclads and reveals how ironclad warships revolutionized naval warfare. Author John V. Quarstein explores in depth the impact of ironclads during the Civil War and their colossal effect on naval history. The Battle of Hampton Roads was one of history's greatest naval engagements. Over the course of two days in March 1862, this Civil War conflict decided the fate of all the world's navies. It was the first battle between ironclad warships, and the 25,000 sailors, soldiers and civilians who witnessed the battle vividly understood what history would soon confirm: wars waged on the seas would never be the same. Continued below…
About the Author: John V. Quarstein is an award-winning author and historian. He is director of the Virginia War Museum in Newport News and chief historical advisor for The Mariners' Museum's new USS Monitor Center (opened March 2007). Quarstein has authored eleven books and dozens of articles on American, military and Civil War history, and has appeared in documentaries for PBS, BBC, The History Channel and Discovery Channel.
Recommended Reading: Iron Afloat: The Story of the Confederate Armorclads. Description: William N. Still's book is rightfully referred to as the standard of Confederate Naval history. Accurate and objective accounts of the major and even minor engagements with Union forces are combined with extensive background information. This edition has an enlarged section of historical drawings and sketches. Mr. Still explains the political background that gave rise to the Confederate Ironclad program and his research is impeccable. An exhaustive literature listing rounds out this excellent book. While strictly scientific, the inclusion of historical eyewitness accounts and the always fluent style make this book a joy to read. This book is a great starting point.
Recommended Reading: A History of the Confederate Navy (Hardcover). From Publishers Weekly: One of the most prominent European scholars of the Civil War weighs in with a provocative revisionist study of the Confederacy's naval policies. For 27 years, University of Genoa history professor Luraghi (The Rise and Fall of the Plantation South) explored archival and monographic sources on both sides of the Atlantic to develop a convincing argument that the deadliest maritime threat to the South was not, as commonly thought, the Union's blockade but the North's amphibious and river operations. Confederate Navy Secretary Stephen Mallory, the author shows, thus focused on protecting the Confederacy's inland waterways and controlling the harbors vital for military imports. Continued below…
As a result, from Vicksburg to Savannah to Richmond, major Confederate ports ultimately were captured from the land and not from the sea, despite the North's overwhelming naval strength. Luraghi highlights the South's ingenuity in inventing and employing new technologies: the ironclad, the submarine, the torpedo. He establishes, however, that these innovations were the brainchildren of only a few men, whose work, although brilliant, couldn't match the resources and might of a major industrial power like the Union. Nor did the Confederate Navy, weakened through Mallory's administrative inefficiency, compensate with an effective command system. Enhanced by a translation that retains the verve of the original, Luraghi's study is a notable addition to Civil War maritime history. Includes numerous photos.
Recommended Reading: Confederate Ironclad 1861-65 (New Vanguard). Description: The creation of a Confederate ironclad fleet was a miracle of ingenuity, improvisation and logistics. Surrounded by a superior enemy fleet, Confederate designers adapted existing vessels or created new ones from the keel up with the sole purpose of breaking the naval stranglehold on the nascent country. Her ironclads were built in remote cornfields, on small inland rivers or in naval yards within sight of the enemy. The result was an unorthodox but remarkable collection of vessels, which were able to contest the rivers and coastal waters of the South for five years. This title explains how these vessels worked, how they were constructed, how they were manned and how they fought.
Recommended Reading: Naval Campaigns of the Civil War. Description: This analysis of naval engagements during the War Between the States presents the action from the efforts at Fort Sumter during the secession of South Carolina in 1860, through the battles in the Gulf of Mexico, on the Mississippi River, and along the eastern seaboard, to the final attack at Fort Fisher on the coast of North Carolina in January 1865. This work provides an understanding of the maritime problems facing both sides at the beginning of the war, their efforts to overcome these problems, and their attempts, both triumphant and tragic, to control the waterways of the South. The Union blockade, Confederate privateers and commerce raiders are discussed, as is the famous battle between the Monitor and the Merrimack. Continued below…
An overview of the events in the early months preceding the outbreak of the war is presented. The chronological arrangement of the campaigns allows for ready reference regarding a single event or an entire series of campaigns. Maps and an index are also included. About the Author: Paul Calore, a graduate of Johnson and Wales University, was the Operations Branch Chief with the Defense Logistics Agency of the Department of Defense before retiring. He is a supporting member of the U.S. Civil War Center and the Civil War Preservation Trust and has also written Land Campaigns of the Civil War (2000). He lives in Seekonk, Massachusetts.
Recommended Reading: Ironclads and Columbiads: The Coast (The Civil War in North Carolina) (456 pages). Description: Ironclads and Columbiads covers some of the most important battles and campaigns in the state. In January 1862, Union forces began in earnest to occupy crucial points on the North Carolina coast. Within six months, Union army and naval forces effectively controlled coastal North Carolina from the Virginia line south to present-day Morehead City. Union setbacks in Virginia, however, led to the withdrawal of many federal soldiers from North Carolina, leaving only enough Union troops to hold a few coastal strongholds—the vital ports and railroad junctions. The South during the Civil War, moreover, hotly contested the North’s ability to maintain its grip on these key coastal strongholds.
Recommended Reading: Naval Strategies of the Civil War: Confederate Innovations and Federal Opportunism. Description: One of the most overlooked aspects of the American Civil War is the naval strategy played out by the U.S. Navy and the fledgling Confederate Navy, which may make this the first book to compare and contrast the strategic concepts of the Southern Secretary of the Navy Stephen R. Mallory against his Northern counterpart, Gideon Welles. Both men had to accomplish much and were given great latitude in achieving their goals. Mallory's vision of seapower emphasized technological innovation and individual competence as he sought to match quality against the Union Navy's (quantity) numerical superiority. Welles had to deal with more bureaucratic structure and to some degree a national strategy dictated by the White House. Continued below...
The naval blockade of the South was one of his first tasks - for which he had but few ships available - and although he followed the national strategy, he did not limit himself to it when opportunities arose. Mallory's dedication to ironclads is well known, but he also defined the roles of commerce raiders, submarines, and naval mines. Welles's contributions to the Union effort were rooted in his organizational skills and his willingness to cooperate with the other military departments of his government. This led to successes through combined army and naval units in several campaigns on and around the Mississippi River.
Return to American Civil War Homepage
Best viewed with Internet Explorer or Google Chrome
Google Safe.jpg |
Cartesian equation:
y2(a2 - x2) = (x2 + 2ay - a2)2
The bicorn (also called the cocked-hat) is the name of a collection of quartic curves studied by Sylvester in 1864. The same curves were the studied by Cayley in 1867.
The particular bicorn given by Sylvester and Cayley is a different quartic from the one given here but this one, with a simpler formula, has essentially the same shape.
Main index Famous curves index
Previous curve Next curve
JOC/EFR/BS January 1997
The URL of this page is: |
Booze warning labels worked in U.S., says researcher after Yukon study yanked
A U.S. researcher involved in a study on alcohol warning labels in Yukon that was halted after pushback from the liquor industry says caution messages have proven effective south of the border.
Thomas Greenfield, a leading scientist studying alcohol and human health, says labels warning against drunk driving and drinking while pregnant increased awareness of those issues in the U.S.
The U.S. has required labels on alcoholic beverages to carry those warnings since the late 1980s and Greenfield says the industry has largely accepted the policy.
That's not the case in Canada, where a first-of-its-kind study to examine the effects of warning labels on alcohol bottles has been put on hold after industry complaints.
The labels in Whitehorse were large, graphic and colourful.
They warned that alcohol can cause cancer, as opposed to the U.S. messages that only use text and refer to commonly understood risks, such as drinking and driving.
The Yukon Liquor Board says it heard concerns from national alcohol companies about trademark infringement and defamation.
The board says it's working with the researchers involved in the federally funded study to determine next steps. |
View Full Version : Elementary School - Numbers 50-100
October 26th, 2010, 15:11
Any ideas for teaching this? The instructions I've been given say to teach 50, 60, 70, 80, 90, 100 to a group of probably around 60-70 kids (the entire grade). No other context, just the numbers themselves. I'm not so much having trouble with finding number activities, as much as I am finding number activities you can do with groups of this size. Thanks!
October 26th, 2010, 16:14
With 60/70 kids chances are you're teaching this in the gym, might as well make up a silly game and play that. Even something as simple as "find your partner" gets entertaining with 60 to 70 kids.
Another easy game is to put a card on each kids back for 50 to 100 with a piece of tape and then tell them to line up, but they can't look at their own number or use any Japanese.
You could play the largest game of numbers basket the nation has seen.
You could use one of the online generators to make a connect the dots worksheet, and you call out the numbers in sequence. (they have that one in the book too if you're lazy).
If you want to go academic, you could do some actual arithmetic on the board after practicing number names and call on kids randomly. Probably best to put them into groups of 4 and keep track of points somewhere.
I dunno, there is a lot you could do here. You could put the numbers 50 - 100 randomly around on the wall and when you call a number they all have to run to that number. You could add in the element of you chasing them and tagging any slow kids, who then become number zombies with you and help chase down the rest.
You could make a printout with a large grid of numbers 50 - 100 on it and then call out numbers one by one. The students fill in the appropriate boxes, and by doing so draw another number between 50 - 100. The first student to guess the number, raise their hand, and say it correctly gets a sticker. You could do a few rounds of that pretty easily on a single sheet.
October 26th, 2010, 17:45
Thanks! This is the first giant group I've been given, so I'm a bit nervous as to how it will go. |
Welcome on PLAY Embedded
On PLAY Embedded you can find useful resources to get started with embedded systems: media, examples and accurate descriptions are also provided. Come on, learn by doing!
Wide box Tiny box List
Ascent Descent
Sampling and dimming (ADC and PWM)
Sampling and Dimming
An Analog to digital converter is a device that converts a continuous physical quantity (usually voltage) to a digital number that represents the quantity’s amplitude.
In this demo, we are sampling voltage across a potentiometer to establish its position. A potentiometer is a three-pin knob that provides a variable resistance between W-A and W-B pins (Fig.1). Amount of resistance between A and B is constant, but by turning the shaft of the potentiometer, we change the amount of resistance on either side of W.
Connecting A to 3 V, B to GND (or vice versa) and sampling continue reading...
Meeting SPI
Meeting SPI
Communicating by a serial bus instead of a parallel one could be very useful when we need to send out a big number of words or fixing a constraint on wires. The Serial Peripheral Interface bus, also known as SPI bus, is a synchronous, serial communication peripheral which communicates in full duplex mode using a master-slave architecture with a single master. That means we have always a single master and one or more slaves. The communications is bi-directional (i.e. data flows from master to slave but also from slave to master). Since this bus is synchronous, the master continue reading...
Hello ChibiOS
Hello ChibiOS
One of most important feature of ChibiOS is multi-threading. Oversimplifying, a thread could be imagined like a sequence of instructions (with associated a priority and a working area) and multi-threading means kernel can manage more than a thread independently, executing them in a parallel fashion even if there is a single core.
Achieving this requires Kernel must plan operation sequence: this task is called scheduling. We could act indirectly on this operation though priority levels. Priority follows a simple rule:
among all the threads ready for execution, the one continue reading... |
Harassment, intimidation, or bullying, a gesture, written, verbal, or physical act, or any electronic communication that takes place on school property, at any school-sponsored function or on a school bus, is prohibited and will not be tolerated. During the review of the school’s Student Code of Conduct each year, discussions with students include expected behavior and general guidelines, as well as consequences and appropriate remedial actions, reporting procedures, and investigation and responses to incidents of harassment, intimidation, and bullying. When incidents of harassment, intimidation, and bullying are reported to school officials, they will be immediately investigated, regardless of whether the acts are a violation of the Student Code of Conduct or the Harassment, Intimidation, and Bullying statute. The guidance counselor is designated as the school's Anti-bullying Specialist. |
Beat the Winter Flu
sleeping tips health winter
Freezing nights and rainy days have hit! It’s well and truly winter and unfortunately for many families that means cold and flu season. We know it’s coming every year and do our best to avoid unwell little ones and days off work, but unfortunately with school, day care, work and public transport, winter flus can be inevitable. So what can we do to prevent and reduce the effects of a nasty cold?
Steps to prevent cold and flus this winter
1. Wash your hands frequently : Cold and flu viruses can survive for up to a day on surfaces and enclosed spaces, by washing your hands regularly you have less chance of catching anything. It's also important to avoid touching the areas around your eyes and mouth.
2. Do your best to limit your family’s exposure to infected people : When we are exposed to people with colds and flus we are more likely to catch one ourselves!
3. Practice healthy habits and get essential nutrients : You've heard it before you will hear it again, a healthy diet and exercise is good for our immune system. Remember, an apple a day keeps the doctor away! It's proven that apples contain antioxidants and essential nutrients formed to fight off nasty bugs.
4. Get sufficient sleep each night : Getting enough quality sleep evidently decreases your chance of getting sick, research suggests that those who sleep for less than 7 hours each night are almost 3 times as likely to catch a cold than those who sleep 8 hours or more.
5. Drink lots of liquids : A recent study found that staying hydrated may boost a particular immune response to enable your body to better fight the viruses. Aim to 6-8 glasses of water a day.
Sleep well to prevent and reduce colds and flus
Sleep deprivation has an impact on the immune system, meaning that lack of sleep can essentially make you more exposed to viruses. If you're not sleeping properly, determine the reasons why in order to resolve them.
You and your family’s Bedrooms should all be the perfect environment for sleep. Ensure they are all dark and warm enough, with the correct bedding, mattresses and pillows for each individual. A comfortable bedroom will set the ideal sanctuary for quality rest.
When you have caught a nasty cold rest is so important for a quick recovery. Ensure you get plenty of sleep, a long warm shower before bedtime can assist in breaking up congestion, relieving a runny nose and help you get to sleep with ease.
So take care of yourself and your family this winter by sleeping well!
- Conquering Sleep Deprivation
- Natural Sleep Aids
- Relaxation techniques to help you fall asleep |
Search This Blog
Sunday, 8 June 2014
Christopher Columbus
Christopher Columbus (1451-1506) was born sometime before October 31, 1451 in Genoa. His birthplace is now a historic attraction.
He was the son of Domenico Colombo, an Italian wool weaver and Susanna Fontanarossa, the daughter of a wool weaver. Christopher's father also owned a cheese stand and later, a tavern.
Christopher was the oldest of five. Her had three younger brothers, Bartolomeo, Giovanni Pellegrino, and Giacomo, and a sister, Bianchinetta.
As his family was of limited means Christopher's education was also restricted. He would have learnt basic Latin and Mathematics until the age of 14. From his teens when he first set sail he learnt a great deal about Astronomy and map reading.
His first documented voyage was to the Island of Chios in the Aegean Sea.
After being shipwrecked off Portugal, (when a French ship sank his ship) Columbus swam to land clinging onto an oar, and settled there in 1476.
He worked as a Cartographer in Lisbon in the late 1470s with his brother, Bartholomew.
Christopher Columbus set sail from Palos de la Frontera, Spain on August 3, 1492 to try to find a new route to the Orient. Palos is also the site of the Rábida Monastery where Columbus consulted with the Franciscans about his plans for organizing an expedition of discovery.
Before Spain agreed to bankroll Christopher Columbus's journey across the Atlantic, he was turned down by Portugal, England and France.
The Pinta, Niña, and Santa María made their first landfall when they landed on an island in the West Indies on October 12, 1492, 71 days after leaving Spain. Columbus named the newly discovered island, “San Salvador” meaning, “Saint of Salvation”, to express his thankfulness at landing safely.
On landing in San Salvador, Columbus offered the natives red caps and green beads, which they accepted gratefully.
On reaching America, Columbus thought he was in the East Indies because of Biblical scripture. His calculations were based on the Second Book of Esdras in the Apocrypha which suggested the Earth was six parts land to one part water.
Columbus’ mission was gold and the gospel, to fill up the Spanish coffers, (he was being sponsored by the Spanish monarchy) and convert the eastern people (he mistakenly though he had landed on an island near Japan).
On January 6, 1494 Columbus and all his men disembarked at Isabela on the island of Haiti and entered the temporary church that they had built. There they heard Fray Buil offer mass--the first mass ever heard on land in the New World.
Columbus' crews survived on salted meat or fish stews cooked on wood burning stoves, hard biscuits and watered wine.
Christopher Columbus was the first European to visit Cuba during his first voyage to the New World on October 28, 1492. Two of Columbus' scouts in Cuba came back with wild tales of a sort of grain, which was "well tasted baked, dried and made into flour." The natives in their language called it “mahiz”; Columbus named it “maize”.
Columbus anchored next to the King's harbor patrol ship on March 4, 1493 in Portugal. Hearing of Columbus's discoveries, the Portuguese king informed him that he believed the voyage to be in violation of the 1479 Treaty of Alcáçovas. After spending more than a week in Portugal, and paying his respects to Eleanor of Viseu, he again set sail for Spain. Columbus crossed the bar of Saltes and entered the harbor of Palos on March 15, 1493. Word of his finding new lands rapidly spread throughout Europe.
Christopher Columbus audience before King Ferdinand and Queen Isabella by Eugène Delacroix
1200 colonists went in 1495 with Columbus to Hispaniola but he was not a successful governor and he got upset with the natives when they couldn't find gold. Soon Columbus' governorship was in disgrace and in 1500 he returned in chains.
Columbus often stayed at Los Palmas in the Canaries on the way back from America, whilst his ships were refitted. The house where he stayed is now a museum.
During his fourth voyage westwards Columbus was given, as a sign of welcome by the Aztecs, a sack of brown cocoa beans. He ascertained these beans were used as money but was unaware a drink couldn be made from them. He gave the Spanish King Ferdinand some beans, but overwhelmed by the countless other treasures Columbus brought, they were ignored.
Columbus took wine not water on his voyages as water becomes stagnant and deteriorates on long trips across the seas, whilst ways had been found to enable wine to keep its taste better and remain wholesome.
During Columbus’ fourth voyage, his crew waited until nightfall before tucking into their meal of crumbled-biscuit porridge, so that they wouldn't see the worms.
During his fourth voyage westwards Columbus was anchored off Jamaica and rations were low (the natives wouldn't trade.) The explorer learned from his Zacuto almanac that on February 29, 1504 there was to be an eclipse of the moon. Columbus summoned the Jamaican chiefs and told them if they don't give him food he had the power to blot out the moon. They laughed but then the eclipse begun. The terrified natives begged him to bring the moon back and they would give him what he wanted.
Columbus predicts lunar eclipse to the natives
A lay Franciscan himself, Columbus bought with him a group of Franciscans who hoped to convert the Native Americans to Christianity.
Columbus grew increasingly religious in his later years. He claimed to hear divine voices and lobbied for a new crusade to capture Jerusalem. He was prepared to sell what remained of his possessions to sail again this time eastwards to take back the Holy City from the hands of the infidel.
Columbus described his discoveries of the "paradise" as part of God's plan which would soon result in the Last Judgement and the end of the world.
No contemporary portrait of Columbus has ever been found so we can’t say what he looked like, but writings at the time describe him as tall, with blond or red hair and light eyes and skin.
Columbus' body was twisted by arthritis and he suffered from what is probably Reiter's syndrome.
His last residence was a modest home in Valladolid, Spain.
Columbus died in poverty at Valladolid in Spain on May 20, 1506 after four voyages westwards to the New World.
The first celebration of Columbus Day in the USA held in was held in New York on October 12, 1792.
Colorado was the first state to officially recognize Columbus Day as a state holiday in 1905.
Columbus Day only became an official American Holiday in 1937. It happened because The Knights of Columbus, an influential male-only Catholic organization, wanted a strong Catholic role model for their children to be dignified by the government. After intense lobbying by the Knights, President Franklin Roosevelt and Congress declared Columbus Day a legal and federal holiday.
Since 1971, Columbus Day has been commemorated in the United States on the second Monday of each October.
Sources Daily ExpressFood For Thought by Ed Pearce
No comments:
Post a Comment |
Breast Cancer Is Women's Top Health Concern
Ruzanna Harutyunyan's picture
A study conducted on behalf of the not-for-profit National Women's Health Resource Center (NWHRC) in conjunction with REDBOOK magazine shows that developing breast cancer is women's top health concern, with 51 percent stating they worry about it versus those who worry about heart attack (48%), diabetes (42%) and lung cancer (31%).
The national survey, conducted by Greenberg Quinlan Rosner, as part of NWHRC's new Learn. Love. Commit. breast cancer awareness campaign, found that most women are relatively confident that they could survive breast cancer but, at the same time, 40 percent of respondents report that their biggest fear if diagnosed would be dying. Additionally, two-thirds of women (66%) say they are most concerned about the treatment itself or its side effects, including those who mentioned going through chemotherapy or surgery (35%), being sick or weak (19%) or losing a breast (12%).
"While women clearly are concerned about breast cancer, roughly one quarter are still not getting annual mammograms and nearly 40 percent aren't conducting monthly self exams," said Elizabeth Battaglino Cahill, RN, executive director of NWHRC. "It's critically important for women to take charge of their health through these screenings and to understand that survivability is greatly enhanced when breast cancer is found early."
"Women, particularly moms, tend to put themselves and their health last and take care of everyone else in their lives first," said Stacy Morrison, editor-in-chief of REDBOOK. "The more they learn about their bodies and their risks, the more women will understand that protecting themselves with these key steps for prevention and early detection is the most loving thing they can do for their families and themselves."
While a majority of survey respondents (83%) report that they are somewhat or very confident that they could survive a diagnosis of breast cancer, Hispanic women (57%) are significantly less likely feel this way. Similarly, women without a college education are significantly less likely to be confident (79 percent) that they would survive a breast cancer diagnosis than college-educated women (93 percent). |
Thinking Mathematically (6th Edition)
Published by Pearson
ISBN 10: 0321867327
ISBN 13: 978-0-32186-732-2
Chapter 7 - Algebra: Graphs, Functions, and Linear Systems - 7.2 Linear Functions and Their Graphs - Concept and Vocabulary Check: 8
Work Step by Step
RECALL: The graph of a line whose equation is of the form $x=h$ is a vertical line whose x-intercept is $h$. The given line $x=-2$ has $h=-2$. Thus, its graph is a vertical line whose x-intercept is $-2$. Therefore, the missing expression in the given statement is: vertical
Update this answer!
Update this answer
|
Also known as: butene, C4=
Butylene is an unsaturated four-carbon olefin, basically butane with one double bond.
In a refinery, butylene is important as a feedstock to the alky unit to make C4 Alkylate, the highest-value alkylate. Butylene is also used to make MTBE and isooctene, which are both high-quality gasoline blendstocks.
Refinery butylene primarily comes from the FCC unit. Small amounts of butylene are also produced by other cracking units, such as the visbreaker, but these are less likely to be separated for use in the alky. Butylene can also be sourced externally from steam crackers, which produce a large amount of butylene when processing light naphtha as a feedstock to make ethylene.
In the absence of an alky unit, the typical disposition of butylene is in LPG blending or fuel gas, both very low-value options.
|
Get Adobe Flash player
Main Menu
Royal Academy of Nutrition and Health Eating
17.Vitamins and Minerals Are Essential for Metabolism
You need vitamins and minerals to use carbohydrates, fats, and proteins and to sustain numerous chemical reactions.
A deficiency of vitamins and minerals can cause ill effects ranging from fatigue to stunted growth, weak bones, and organ damage.
Many vitamins and minerals aid enzymes, which are substances that speed up reactions in your body. For example, many of the B vitamins function as coenzymes in the metabolism of carbohydrates and fats.
Many minerals, such as calcium and phosphorus, work with protein-containing hormones and enzymes to maintain and strengthen your teeth and bones. The fate of carbohydrates, protein, and fats in your body is very much dependent upon your consuming enough vitamins and minerals in your daily diet.
Vitamins are organic compounds that usually have to be obtained from your foods.
Your body is able to make some vitamins, such as vitamin D, but sometimes cannot make enough of it to maintain good health. In these situations, your diet has to supplement your body's efforts.
Minerals are inorganic substances that play a role in body processes and are key to the structure of some tissues, such as bone.
A deficiency of any of the minerals can cause disease symptoms.
Anyone who has ever suffered from iron-deficiency anemia can tell you that falling short of your daily iron needs, for example, can cause fatigue and interfere with your ability to function.
18. What Does the Health of Your Family Tree Look Like?
Is there a history of heart disease, diabetes, or obesity in your family? What about other chronic diseases or conditions? Before you read this course and learn about the role that good nutrition plays in preventing chronic diseases and maintaining overall good health, ask your parents and grandparents about your family's health history. If there are certain diseases or conditions that run in your family, you'll want to pay particular attention to these as you read about them in this course.
Organic - Containing carbon.
Enzymes - Substances that speed up reactions in your body.
Inorganic - Not containing carbon.
Inorganic compounds - include minerals, water, and salts
19. Water Is Vital for Many Processes in Your Body
Although plain water does not provide energy or calories, it is vital to many key body functions, and staying hydrated is therefore an important part of staying healthy.
As part of the fluid medium inside your cells, water helps chemical reactions, such as those involved in the production of energy, take place.
Water also bathes the outside of your cells, playing a key role in transporting vital nutrients and oxygen to, and removing waste products from, your cells.
Water helps maintain your body temperature and acts as a lubricant for your joints, eyes, mouth, and intestinal tract. It surrounds your organs and cushions them from injury.
The Take-Home Message:
Your body needs carbohydrates, fats (lipids), protein, vitamins, minerals, and water to survive. These six classes of nutrients have specific roles in your body, and you need them in specific amounts for good health. While carbohydrates, fats, and protein provide energy, vitamins, minerals, and water are needed to use the energy-producing nutrients and to maintain good health. Water is part of the medium inside and outside your cells that carries nutrients to, and waste products from, your cells. Water also helps maintain your body temperature and acts as a lubricant and protective cushion.
20. How Should You Get These Important Nutrients?
There is no question that you need all six classes of nutrients to function properly. But is there an advantage to consuming them through food rather than taking them as supplements? Is there more to a healthy diet than just meeting your basic nutrient needs?
The Best Way to Meet Your Nutrient Needs Is with a Well-Balanced Diet
Many foods provide a variety of nutrients. For example, low-fat milk is high in carbohydrates and protein and provides a small amount of fat. Milk is also a good source of the vitamins A, D, and riboflavin, as well as the minerals potassium and calcium, and is approximately 90 percent water by weight. Whereas milk contains a substantial variety of all six classes of nutrients, a single food item doesn't have to provide all nutrients in order to be good for you. Rather, a well-balanced diet composed of a variety of foods can provide you with all of these important nutrients.
A well-balanced diet will also provide other dietary compounds, such as phytochemicals and fiber, that have been shown to help fight many diseases. At least 900 different phytochemicals have been identified in foods and more are likely to be discovered. Don't assume that these compounds can be extracted from foods, put in a pill, and still produce the same positive effect on your health. The disease-fighting properties of phytochemicals likely go beyond the compounds themselves, and work with fiber, nutrients, or unknown substances in foods to provide a synergistic, positive effect on your health.
Fiber is the portion of plant foods that isn't digested in the stomach and small intestine. Some foods, such as whole grains, fruits, and vegetables that are high in fiber, are also phytochemical powerhouses. Studies have shown that diets rich in these foods fight many diseases.
Also, let's not forget some of the obvious benefits of getting your nutrients from food. The delicious texture and aroma of foods, coupled with the social interaction of meals, are lost when you pop a pill to meet your nutrient needs. That said, some individuals should take a supplement if food alone can't meet their needs.
21. You Can Meet Some Nutrient Needs with a Supplement
Although many people can get all their nutrients through their diet, others have diet restrictions or higher nutrient needs such that they would benefit from taking a supplement in addition to consuming a healthy diet. For example, someone who is lactose intolerant (meaning they have difficulty digesting milk products) may have to meet his or her calcium needs from other sources.
A calcium supplement could be an option for these individuals. Pregnant women should take an iron supplement because their increased need for this mineral is unlikely to be met through the diet alone.
A well-balanced diet and dietary supplements aren't mutually exclusive. In some situations, they should be partnered as the best nutritional strategy for good health. Even with an abundance of foods and the availability of supplements for those who may need them, the diets of Americans and Europeans in generally aren’t as healthy as they could be. Let's find out why this is the case.
The Take-Home Message:
A well-balanced diet will likely meet all of your nutrient needs and also provide a variety of compounds that may help prevent chronic diseases. People who cannot meet their nutrient needs through food alone may benefit from taking a supplement.
googleplus sm
Verse of the Day
Global Map |
Dental Problems
Dental Amalgam
Dental Amalgam is a filling material which is used to fill cavities caused due to tooth decay. Due to tooth decay, the structure of the tooth is lost. Dental amalgam helps correcting the tooth structure and restore the biting surface of the affected tooth. Also known as Silver amalgams they are made up of liquid mercury and an alloy mixture of silver, copper and tin.
The decayed tooth is first drilled to remove the decay and then the cavity is shaped to fill in the amalgam filling.
Ill effects of dental amalgam fillings:
Since more than 50% of the filling consists of mercury, dental amalgam is concerned very harmful to human body. After a thorough research by the American Dental Association, it was seen that once the cavity is filled with dental amalgam, the mercury in it releases vapors in the mouth. This happens generally during chewing. The mouth is the most absorptive part of the body and so these vapors are readily absorbed. Once these vapors are absorbed, they are very difficult to eliminate it.
There are many health complications linked to mercury toxicity. Some of them are:
Cancer, chronic fatigue, ALS, lupus, multiple sclerosis, Parkinson’s disease, fibromyalgia, scleroderma, diabetes, allergies, asthma, etc. Apart from this mercury is most hazardous for pregnant and nursing women. It has also been related to child birth and autism.
There are many non-toxic filling materials like ceramic available with almost all the dentists in the world. Although efforts have been made to educate the public about the ill effects of dental amalgam, yet they continue to remain legal in many states. Hence before approaching your dentist, make sure of where he stands in this issue.
Comments are closed. |
Re: What's in a name?
Bryan R. Stahl wrote:
> Just a thought that came up from a discussion on language evolution on
>another > list. Is it possible that "English", as opposed to pseudo-Greek
>or Latin, > terms are being developed? How often are living creatures
>referred to this > way outside of scientific papers? It also can help
>when discussing creatures > that are originally put in one genus, then
>without warning shifted to another, > then possibly back again. A
>commonly accepted "English" name, whether based > on the scientific name
>or not, would allow it to be kept track of, instead of > trying to figure
>out if the new name is one of your old favorites >
>redesignated, or something truly new.
_Panthera leo_ is a lion in common parlance, and _Panthera tigris_ is a
tiger. Can we call _Velociraptor mongoliensis_ a raptor, and _Deinonychus
antirrhopus_ a raptor? With extant animals, different species (even of the
same genus) have different common names; the problem with "raptor" is that
it has gone beyond its original purpose as a nickname for _Velociraptor_ in
JURASSIC PARK, and has been applied to the entire family of dromaeosaurids
to which that animal belongs.
> Remember, us unedjukated cain't keep up with you brite peepul! <g>
Nonsense. When I got into this seriously over a decade ago, I knew
*nothing* about dinosaurs beyond what I remembered from books I had read in
childhood. If you want to make the effort to learn something, it can be
done. Enthusiasm and perserverance are the keys.
Brian (franczak@ntplx.net) |
Thursday, July 24, 2008
5 Steps to Problem Solving
"Steps to Understanding and Intervention" that I think can be applied to any problem we depressives encounter in our recovery. You can download the worksheets (described in "Action" at
Here are his steps:
Step 1: Clarification of Concerns
Questions to Consider: What are the specific behaviors of concern? When, where, and how often are the behaviors demonstrated?
Action: List the behavior of concern [we would say something like "suicidal thoughts"] and then list the specifics [when, where, how often this behavior occurs].
Step 2: Functional Behavior Assessment
Questions to Consider: What happens before and after the behaviors? What have the behaviors looked like over time? What stressors have had an impact on the behaviors?
Action: List behavior of concern in three words or less in a box labeled
B. list factor in box labeled "Setting Event" that contributed long terms to the behavior of concern [for us, that would be something like grew up in dysfunctional home--with everyone else on the planet].
Step 3: List in box A the event that come immediately before the behavior of concern.
Step : List in box C what happens immediately after the behavior. Once these steps are completed, look for patterns and potential points for intervention and note them under "Comments or Insights."
Step : Investigation of Causal Factors
Questions to Consider [some of these are more relevant to us than others]:
A) Medical/Developmental: Are there any undiagnosed medical or developmental difficulties?B)
Hearing/Vision: Are there any vision or hearing difficulties?C) Speech/Language: Are there any speech delays? Are there any difficulties with social interactions, communication, or play?D) Sensory/Motor: Are there any sensory, fine, or gross motor difficulties?E) Academic/Life Skills: Are there any delays in reading, math, or written language?F) Cognitive/Neuropsychological: Are there any suspected cognitive neuropsychological delays?G) Emotional/Psychiatric: Are there any emotional or psychiatric difficulties?H)
Other contributing causes: What is the family composition? Are there any particular family difficulties?
Are there other factors that could contribute to the person's difficulties? Based on the above information, what can you say about the person's behavior?
Is the behavior normal? What factors contribute to the behavior? What is the person's profile of strengths and weaknesses? What are the specific goals for the person?
What are some intervention strategies?
Action: List the factors (Medical/Developmental; Hearing/Vision; Speech/Language; Sensory/Motor; Academic/Life Skills; Cognitive/Neuropsychological; Emotional; Other Possible Factors) and list all possible explanations [again, these factors might be different when speaking about a person's depression].
Step 4: Profile Development and Planning
Questions to Consider: How is my child responding to the intervention?
Action: As you investigate more of the causes pertaining to [a person's depression], you will develop insights along the way. To build a theory as to why [you/someone else] demonstrates the behavior, you first start with your summary statement, and then modify these statements into more of a working theory. This theory is modified as new information is obtained and maybe changed continuously.
Step 5: Plan Implementation and Evaluation
Questions to Consider: Are there any adjustments that need to be made?
Actions: List the person's areas of interests and strengths, followed by the intervention. For example, if a person needs immediate feedback (like me) in order to sustain an activity (like blogging), then I should continue to blog. However, if a person is distracted or impeded by feedback, then she should pursue another venue, where there is little interaction or feedback of a product (i.e. blog post).
Then list the areas of need and growth and interventions. For example, a person like myself needs more alone time and play time so that I rebuild myself. As part of my intervention, I should integrate more play time into my schedule, and I should say no to additional projects that steal from that time.
No comments: |
Health Benefits of Peanuts
on Sunday, 2 December 2012
The peanut was introduced to China by Portuguese traders in the 17th century and another variety by American missionaries in the 19th century.
Moreover, peanuts became popular and are featured in many Chinese dishes, often being boiled. During the 1980s, peanut production began to increase so greatly in 2006; China was the world's largest peanut producer. Since, a major factor in this increase was the household-responsibility system, which moved financial control from the government to the farmers.
Dietary Benefits
Peanut butter is 8 percent dietary fiber, which can help control blood sugar and cholesterol levels. Dietary fiber is beneficial; it has been proven to reduce the danger of colo-rectal cancer and atherosclerosis, both common ailments in the United States. Peanut butter though high in protein and micro-nutrients like Vitamin E and B3, along with minerals like iron, potassium and calcium. Raw peanut butter has more nutrients than refined peanut butter.
Peanut butter is great as part of a heart-healthy diet because of its monounsaturated fat content. Therefore, this can be the same kind of fat found in Mediterranean diets and can lower the risk of heart disease by as much as 21 percent.
Peanut butter is able to rival some fruits in the levels of antioxidants found in it. These antioxidants help to prevent oxidative damage caused by free radicals, which can affect cells and DNA strands and also cause
So, whether you prefer it smooth or chunky, peanut butter is a tasty snack that is great on sandwiches or mixed in with other ingredients. It's made out of peanuts, which are actually more closely related to legumes than true nuts. Peanut better is incredibly healthy. What follows are some of the reasons you should try to experience some of its health benefits like:
1-Peanut butter has a flavonoid in it called reservatol, which is found in grapes and red wine as well. It is known to increase blood flow to the brain, which can help reduce the risk of a stroke.
2-Eating only two teaspoons of peanut butter a week is known to help reduce to the risk of developing gallstones by 25 percent. It also helps promote the overall health of the gall bladder.
3-Peanuts have a natural nutrient called resveratrol, which is generated from the peanut plant to fight off harmful agents like bacteria and fungi. Resveratrol gives anti-microbial and anti-fungal properties to people when it's consumed. Animal studies suggest that resveratrol could have cancer-fighting, life-prolonging and anti-aging health benefits.
Peanut butter is widely used to make peanut butter and jelly sandwiches. For a healthier, potassium-filled option, try a peanut butter and banana sandwich. Potassium-rich diets can reduce hypertension. The recommended serving size for peanut butter is two tablespoons, approximately the size of a ping pong ball. It can be a tasty dip with healthy snacks such as apples, celery sticks or carrots
One of the many benefits of eating peanut butter is that it contains large amounts of dietary fiber, equal to about 8 percent. Fiber helps in the process of controlling blood sugar and cholesterol levels. Another benefit of fiber is that it can reduce the chance of developing colorectal cancer.
Ranking: 5
© HEALTH CARE All Rights Reserved |
Monday, February 9, 2009
desiccated [DESS-i-cāt'd]
adj. lacking spirit or animation; arid; dehydrated
[Derives from Latin ("removal") + siccāre ("dry")]
More than anything else, to me, desiccated and desiccate ("to dry out") are spelling challenges. They get that confusing double-c in the middle from their Latin root siccāre. If you don't know that, the orthography is a mystery. There are a couple of other English words which have a siccāre root: siccative ("causing or promoting the absorption of moisture; drying"); and exsiccate ("to dry up or cause to dry up"). Siccative can also be a noun ("a drying agent"); and exsiccate has related forms, exsiccation ("the act of drying up"), exsiccative ("causing dryness"); and exsiccator ("one who dries something up").
Although desiccated literally means the same thing as dehydrated, it tends to be used in a less literal sense. A person who is desiccated is generally someone who is lacking vigor, as opposed to moisture. A person who simply needs more water is dehydrated or parched.
Its figurative sense was how a book reviewer in The Economist recently used desiccated in describing how the physicist Paul Dirac, the Nobel Prize winner who discovered antimatter, was misperceived:
To many of his colleagues, he appeared uninterested in anything other than mathematics. They were astonished when he married. Yet he was far more than a desiccated calculating machine, as Graham Farmelo's biography shows.
1 comment:
Lexicon Artist said...
Do you like my mug shot? |
Friday, February 28, 2014
A Borrowed Donkey
The next day the great crowd that had come to the festival heard that Jesus was coming to Jerusalem. So they took branches of palm trees and went out to meet him, shouting, "Hosanna! Blessed is the one who comes in the name of the Lord - the King of Israel!" Jesus found a young donkey and sat on it; as it is written: "Do not be afraid, daughter of Zion. Look, your king is coming, sitting on a donkey's colt!" His disciples did not understand these things at first; but when Jesus was glorified, then they remembered that these things had been written of him and had been done to him. So the crowd that had been with him when he called Lazarus out of the tomb and raised him from the dead continued to testify. It was also because they heard that he had performed this sign that the crowd went to meet him. The Pharisees then said to one another, "You see, you can do nothing. Look, the world has gone after him!"
John 12:9-19
A Borrowed Donkey
It is hard to be humble
and easy to be puffed up
easy to believe you're special
when the world cheers you on.
The discipline of humility
is the daily walk of Christ
who came first in a stable
entering Jerusalem on a donkey.
Humble teacher didn't own the colt
lived a life of borrowed possessions
stranger's hospitality and road food
so that we might belong to God.
So that we might be honored offspring
at the heart of the living Creator
He walked humbly and died with convicts
so that we might always be free.
No comments: |
We discuss custom search engines, and how you can build your own.
Class structure
1. Go through “At beginning of class” information
2. Explain what custom search engines are
3. Work on exercises
At beginning of class
1. Assignments, you, and me
2. Changes (this topic, this class)
My notes
1. What is it
• A search tool that uses Google's search engine (as the back end) but that you can instruct the following ways:
• Look in a certain list of URLs (pages, whole sites, or subsets of sites)
• Avoid a certain list of URLs
• Append a set of terms to any user-supplied query
• Customize its looks (within bounds)
2. How can it be used
• Its own Web page
• An iGoogle widget
• Embedded in random Web page
3. Why would you use it
• Captures creator's knowledge of the field
GOOGLE CODE - understand the components? what parts means run? where does URL of search page go?
an * means????
In previous years students have explored and learned about several search engines: Topicle, Eurekster Swicki, and RollYO; however, for the last year or so these sites have been completely displaced and dominated by the Google Custom Search Engine so that is the only tool we are going to look at today.
Blog topics
1. Describe how useful or not Google Custom Search Engine is for your site.
2. Describe how you chose the sites to include in your custom search engine.
3. Compare and contrast 2 (or more) different custom search engines.
1. Topicle
2. Eurekster Swicki
3. Rollyo
4. Google Custom Search Engine
5. BuildASearch
6. Yahoo Search BOSS — Build your Own Search Service
7. 3 Guides to FireFox Quick Searches (Smart Keywords)
custom search engine
Analysis in pieces
Demo: show what’s necessary
Compare to other.. search engines similar – for instance, real time info
Blogs: make what u learn in class ur own. Integrate tool into thinkin
Do another blog by Friday
Link to people, more public, opened database (twitterfall)
Facebook: can now tag names
Twitter account
Computer/phone à twitter acct (has info, location: the one you have when you sign up, not where you actually are, followers and who you are followed by.. what group you are in…tightness of group – are followers following u??)… à twitter server
Message from text/computer goes to twiter server
Some help id…@, $\#, key word, direct msg aren’t searchable, know who it’s from, url, retwits –
Looks for patterns / keywords in twitter – general patterns
Other – 4
Not rss asking sites what they have that’s new.. but sites telling reader when they have new info
Rss wouldn’t come in clumps..
|
Saturday, November 10, 2012
Want To Learn To Program A Computer?
If you have never taken a computer programming course before I'd strongly recommend picking up python as your first programming language. (version 3 if you are starting from scratch)
Take a beginner's course over at Coursera. I highly recommend the University of Toronto one, Learn to Program: The Fundamentals, which is just wrapping up it's first semester now (and should be starting again soon) Paul and Jen's approach of teaching functions first, starting with defining exactly what the function should do, including examples of inputs and the expected outputs, in the docstring, then moving on to actually coding the function to do that is much easier to get your head around than the way I learned programming back in the early to mid 1990's.
Of course there is also Google's Python Class that is available on-demand, but not as interactive.There is thenewboston's YouTube tutorials, which are really engaging and perfect for new programmers.
Or there's Codecademy: Python or if those methods don't work for you, there's Learn Python the hard way pick what works for you. They are all free.
Pick up a free e-book, or perhaps several of them, from
I'd recommend starting with Think Python: How to Think Like a Computer Scientist or Dive Into Python 3.
The main thing that holds a lot of us back from learning how to code is not having an idea of what we would like to do with the code. Sometimes all it takes is just sitting back and thinking about problems that you'd like to solve, tasks you do repeatedly every day, every week or every month that could be simplified because you do the same thing every time, again and again. Those are things that computer programs are good for.
I manage a lot of windows computers. Some of them are on the old side, running dangerously close at times to the limits of what their hard disks can hold. Time and again, I found myself going in and deleting uninstall files for updates I knew I would never be uninstalling, just to free up a little space. So, I wrote a program that looks for those files and checks how old they are. If an update was installed more than 90 days ago it deletes the uninstall folder for it. Launching that program saves a bit of precious time each time I find I'm in that position of having to free up some disk space ASAP.
Sit down and think, what tasks like that could you automate? I bet there are at least a few.
Another one was a program that reads a comma separated list of computers (name, ip address, mac address) and uses Wake On LAN to wake the computers in that list up at a specific time. At first I had it call a command line based wake on lan program I downloaded from the net, but later I revised it to create and send the WOL Magic Packets itself ...The possibilities are basically endless.
Post a Comment |
Seven Assignment Types
We assess your performance based on the assignment and in summary there are seven assignments type firstly essays you’re probably familiar with writing essays from school the essays you write at university have a particular structure their academic essays and what I’ll do is I’ll explain something about that in a moment second kind of assignment is reports reports has some similarity with essays but whereas in essays you don’t use bullet points headings put diagrams in reports you do do that you put bullet points you put headings you put summaries you put diagrams and but the important difference is that a report really goes in report something. Even more info on assignment types at Edusson.
Whereas an essay is an explanation is an argument around something other types of assignments could be quizzes multiple-choice quizzes fill-in-the-blank quizzes all kinds of different quizzes that you can be assessed exams I’m sure you’re all familiar with exams generally speaking the objective is an exam is to test what you know what you’ve absorbed into your head and normally you don’t take any kind of book into an exam use just you a blank sheet of paper and what’s in your head and that’s what the exam is trying to go in tests presentations these oral exercises where the marker has the opportunity not only to hear what you say but also to go and ask you questions to be able to verify the knowledge that you’ve got around a particular topic sometimes you’ll be asked to produce project artifacts in our case in project management you might do a project and you might have to produce a Gantt chart or a budget or a project plan or any other kind of project artifact these are what we call the artifacts usually you won’t just produce those artifacts in isolation you usually collect them together and you maybe include them within a report or you’ll make a presentation around them or you might include them in a portfolio and so portfolio is a collection of various artifacts.
But also you make a commentary around it so you may put make that commentary within a journal which you complete on a regular basis like a diary and then assemble everything together and present a complete portfolio of your thoughts your observations and the artifacts that go in and support that now when you present your assignments they’re essentially a way that the marker goes in marks those assignments and so to get a pass what you need to do is you really need to do eight things based on presenting the assignment in an appropriate way you need to demonstrate that you understand what you’re doing and you can refer to the various sources in other words the textbooks the papers the presentation material tutorials that have been included on the website but also in addition there are certain qualitative criteria that you need to be able to meet now this is to go and get a pass.
Style in Essay Elements
The style or the tone that you want to set in your writing now modifiers are anything that changes or adds to the meaning of let say a subject or something else right we going to look at that more specifically so and there are different elements you have different parts of speech that you can use you have different tools in the grammar in the language basically that you can apply to make for example ease independent clause seem very sophisticated I’m going to look at what I call basic and elaborate sentences basic means like it just very you know simple and doesn’t have too much to it it has the minimum requirement basically you have the elements of the independent clause you finish your sentence you move on to the next sentence elaborate means you adding a lot more information you have very detailed rich modifiers now what what can be a modifier what can be used to add information to change something to show a sort of relationship you have.
All kinds of phrases gerund phrases noun phrases you have participles again different video for the phrases I’ll show you all the different types that you can use and how to use them linking words or adverbials like however nevertheless all of these things in addition furthermore participles these are ing or IDI words that basically contain a subject and a verb inside of them and you have to know how to use these as well a separate lesson adverbs prepositions so lots of different elements that you can use and I’m going to show you some good examples of sentences that went from basic to elaborate but maintained their sentence type okay so let look at a simple example of simple sentence meaning one independent clause so look at look at a basic sentence Trevor based his decision on several criteria now you want to know what did he what did he have to decide on what were the criteria when did he do it all these things so I have a very basic set of sentence seven words in it only and I can have different sentences with all the other information or I can have a very elaborate sentence this one has 45 words one sentence and it has all the information that I need before deciding on the most suitable school for his chosen course of study.
Trevor weighed all the positives and negatives of each according to several criteria including their professors national rankings and rates of graduate employment not to mention the tuition and living costs now the first thing I want you to notice about this sentence yeah it very long but that not what I want you to notice there is only one clause in the entire sentence Trevor wait all the positives and negatives of each school that is your independent clause that is the only clause which means that this is a simple sentence it looks very long it looks very complicated or complex or however you want to see it but it a simple sentence lots of modifiers before deciding on you have a participle the school for his chosen course of study the most suitable school okay that would have been enough but I added a practice a prepositional phrase for his chosen course of study according to so basically I’m adding more information. |
What is a region?
There are various meanings of 'region', the most popular being a large, indefinite portion of the earth's surface.An area or division, especially part of a country or the worl (MORE)
What are regions?
A Region is an area that shares common characteristics.It can also be is a large and usually continuous segments of a surface or a space(area). an area, especially part of a (MORE)
What is region?
Regions are the basic units for the study of geography. Variousfeatures are used to classify a place as a region. A region sharesthe same feature, such as climate, land, histo (MORE)
What is regionalism?
Regionalism describes situations in which different religious or ethnic groups with distinctive idendities coexist within the same state boundaries, often concentrated within (MORE)
In Pokemon
What is my region?
if you mean in pokemon then whatever pokemon game was your firstthat games reigon is your reigon like my first game was pokemonwhite so im from Unova
What region code does region A belongs to?
Blu-ray Region A includes most American and Southeast Asiancountries, as well as some East Asian countries including HongKong, Japan, Korea, Macau and Taiwan. DVD Region 1 inc (MORE) |
Fools Crow Test | Final Test - Hard
Buy the Fools Crow Lesson Plans
Name: _________________________ Period: ___________________
Short Answer Questions
1. What does Fools Crow find when he rides to the ranch house?
2. What does Fast Horse see on the skin after he wakes up?
3. What is Yellow Kidney thinking about when he is killed?
4. Does Fast Horse know where he is going on this trip, and why?
5. Who visits the Lone Eaters' camp in Chapters 25-26?
Short Essay Questions
1. Why is Fools Crow's mother angry with him as she fixes food for her guests?
2. How is Yellow Kidney's body delivered back to his people?
3. Describe who the man is that Fast Horse wants to kill.
4. What happens after killing the whiskey runners that shows that Fast Horse may be changing and becoming concerned for his people after all?
5. What are the three demands the seizers make of the Pikunis when they meet with General Sully?
6. Describe the thoughts and feelings of Yellow Kidney before, during and after he decides to leave the Lone Eater camp.
7. A white healer comes to the Lone Eaters' camp to warn of the smallpox. Why would the Pikunis believe anything a white man has to say?
8. What happens when Fools Crow catches up to Fast Horse and tries to talk to him about his association with Owl Child and his killing of the rancher?
9. What is Fools Crow thinking and feeling as he looks at the scalp of Bull Shied?
10. Even though the Lone Eaters trust this white healer, why don't they agree to follow his advice?
Essay Topics
Write an essay for ONE of the following topics:
Essay Topic 1
Yellow Kidney's fingers were cut off, which definitely qualifies as both a disfigurement and a handicap. What challenges does a person with a physical handicap face? Address both physical challenges as well as psychological and emotional challenges.
Essay Topic 2
Foreshadowing was used extensively in the writing style used in the story of Fools Crow. Discuss the events, thoughts and feelings that happened to individual characters in their lives or in their dreams that were a foreshadowing of the difficulties that the Pikunis and the Napikwans would face, or of the impending devastation wrought by the plague of smallpox and its relationship to the theme of Loss and Change.
Essay Topic 3
Point of view can change whole story. Most of the conflict with the Napikwan in this novel were from the perspective of the Pikunis. Certainly, the demands of the seizers, which were ultimately rejected by the Piknunis, were seen through the eyes of the Pikunis.
Revisit the meeting from which we received the three main seizer demands: General Sully, who was trying to negotiate an agreement that would guarantee the safety of his people. Write a scene within the fort with General Sully and his advisors as they discussed the problems and dangers they were experiencing with the Blackfoot and developing their list of demands.
(see the answer keys)
This section contains 1,026 words
(approx. 4 pages at 300 words per page)
Buy the Fools Crow Lesson Plans
Fools Crow from BookRags. (c)2018 BookRags, Inc. All rights reserved.
Follow Us on Facebook |
belovedlinens textiles
First Samplers in America.
17th century
The oldest samplers were always on linen and mostly done for practical use. The style was definitely English. One of the oldest known sampler was made by Ann Gower ( Essex Institure, Salem) who became the wife of Governor Endecott before 1628. But this sampler was certainly embroidered in England before Ann Gower arrived in America. Most of the known samplers made in America in the 17th century come from New England.
Loara Standish's sampler is one of the first known sampler made by an English immigrant in the mid of the 17th century. ( see below)
Loara Standish sampler 1650 New England
Mary Hollingsworth's Sampler, 1665
Born in 1650 she married in 1675 a Salem merchant. Her sampler probably dates from 1665 and it is typical of her time , with an alphabet and her name. The style is very close to what was made in England at the same time.
Mary Hollingworth sampler 1665 America
Sarah Lord's Sampler 1668.
Sarah Lord was a New England Maid. Hers sampler, made in 1668, shows a tendency toward shorter and broader samplers. The needle work is very fine.
Sarah Lord Sampler New England 1668
The seventeenth century ended, showing several distinct tendencies in sampler art. Samplers in America were broadening and shortening, they were becoming distinctly less interesting, and the elaborate embroidery of household linen had vanished from the land. Folk were too busy taming the wilderness to attach much importance to the frills and furbelows, and one can feel this distinctly as one realizes how very few samplers American girls did in the seventeenth century.
Next: 18th century samplers
Source: Ethel Stanwood Bolton, Eva Johnston Coe. Massachusetts society of the colonial dames of America, 1921
comments powered by Disqus |
Organizational Behavior Essay Sample
• Pages: 3
• Word count: 589
• Rewriting Possibility: 99% (excellent)
• Category: communication
Get Full Essay
Get Access
Introduction of TOPIC
Negotiation Skills: Identify and discuss two (2) strategies that can be used to develop and enhance negotiation skills. Be specific and support your response with an example.
Mediation is a third party that engages both parties and tries to bring them to a resolution, however, the mediator is not able to dictate the decision of the parties. Some people have a hard time trying to explain their point of view to another, so a mediator is brought in to try and bring both sides to a solution. Unlike mediation where the negotiator has no say so in a decision, arbitration is the opposite. In arbitration negotiation a neutral third party individual acts as judge when weighing both sides of the negotiation. Normally a decision is made after both sides have been heard.
Gender and Communication: Why do you agree (or disagree) that women and men communicate differently? Be specific and support your response with an example from your experience.
I think we all can agree that men and women think completely differently when it comes to communication. Women tend to be more emotional and pay attention to details, whereas men tend to keep emotions withdrawn when it comes to communication.
Women are naturally more open to communication since it is ingrained in us at a young age verses men
Sorry, but full essay samples are available only for registered users
Choose a Membership Plan
who are told to keep their emotional communicational cues low as boys.
Influence: Identify and discuss one (1) strategy you can use to effectively influence superiors and/or peers? Support your response with the concepts in Chapter 12 as well as an example from your experience. Note: in your initial post, select a strategy to discuss that has not been described by another student.
I believe one strategy that most of us have seen firsthand at some point in our life is reward power. Reward power is used when an employer gets an employee to preform a certain way in order to get what they want job wise. When I was assigned to mobility I was tasked to manage a group of civilian “summer volunteers” whom were actually high schoolers looking for some quick cash for the summer. An incentive I gave them was if we got our job on time by the end of the week I would buy pizza and an extended lunch. Needless to say the job was done quickly and efficiently.
Moral Leadership: Identify one (1) approach to moral leadership and discuss its importance to leadership effectiveness. Be specific and support your response with an example.
The authentic leader speaks to me more than most of the morals. It is easier to have your subordinates to work for you when the leader is respected and heard. My last workplace was heavy on physical labor and at one point in time was a horrible place to work in general. This soon changed with job rotations. When the new NCO’s come into office they brought a certain authentic way into how they preformed. They would move the airman in a way that brought moral to its peak and even when work was horrible, we came into work and left with smiles. It’s easier to follow someone into a situation whom is confident in what he/she is doing especially if they took time to get to know you as well.
We can write a custom essay on
Organizational Behavior Essay Sample ...
According to Your Specific Requirements.
Order an essay
You May Also Find These Documents Helpful
12 Angry Men: Communication Styles
The start of the film introduces us to the foreman, who in this situation, acts as the leader and/or ‘boss’. Although everyone are equal, it becomes clear throughout the film just how much he developed into becoming a respected authority in his position. Communication plays a very important role for the success in any area of life, but especially so in a professional setting such as this. It fosters a clear picture of what the actions and goals are, by communicating the issues and key activities needed to address these issues. We discuss the three main communication styles: Aggressive, passive and assertive. All three styles are present in the film, as one can expect by the presence of all the different personalities of the jury. Aggressive communication is characterized by being harsh, sarcastic, ‘always right’ and being disrespectful, and is highly used by #3 and #10. To an extent juror...
Effective communication and interpersonal interaction
INTRODUCATION The purpose of this essay is to explain the importance of effective communication and interpersonal interaction how it can be practice in the care settings. Also, concept of how effective communication can be use by service providers or care managers before setting out policies so that staff will be able to communicate efficiently with each other which is very important when dealing with service users in the health and social care settings. Effective Communication and interpersonal interaction: These mothed of communication is when we use various techniques that can be analysed of how different types of people reflect when communicating with each other or more people. It also means having a mutual understanding to what have been said. The role of effective communication and interpersonal interaction this is when professional care workers are using formal language to communicate with each other. For instance, in the hospital professional care workers...
Different communication theories
This assignment will cover different communication theories and how they are relevant and the skills that are used in health and social care organization. These theories are humanistic, behaviorist, cognitive development and psychoanalytic. Humanistic theory is set to understand human nature and condition, this theory is applied in counseling individual. Behaviourist theory, cognitive and psychoanalytic can be used by health practitioners when communicating with service users or patients. Communication is a transactional process in health and social care settings. Also, it helps to improve the health of service users. It is an exchange of messages between sender and receiver where each take turns to send or receive messages. (www.businesstopia.net). Communication skills such as verbal, written, eye contact, active listening, facial expression, body movement, and posture can be used in health and social care setting as well as the communication theories. Both Carl Rogers and Abraham Maslow believes personal growth and...
Popular Essays
Emma Taylor
Hi there!
Would you like to get such a paper?
How about getting a customized one? |
Listen to this article
From Infogalactic: the planetary knowledge core
Jump to: navigation, search
This article is about the chemical element. For other uses, see Helium (disambiguation).
Helium, 2He
Helium discharge tube.jpg
Helium spectra.jpg
Spectral lines of helium
General properties
Name, symbol helium, He
Appearance colorless gas, exhibiting a red-orange glow when placed in a high-voltage electric field
Pronunciation /ˈhliəm/
Helium in the periodic table
Hydrogen (diatomic nonmetal)
Helium (noble gas)
Lithium (alkali metal)
Beryllium (alkaline earth metal)
Boron (metalloid)
Carbon (polyatomic nonmetal)
Nitrogen (diatomic nonmetal)
Oxygen (diatomic nonmetal)
Fluorine (diatomic nonmetal)
Neon (noble gas)
Sodium (alkali metal)
Magnesium (alkaline earth metal)
Aluminium (post-transition metal)
Silicon (metalloid)
Phosphorus (polyatomic nonmetal)
Sulfur (polyatomic nonmetal)
Chlorine (diatomic nonmetal)
Argon (noble gas)
Potassium (alkali metal)
Calcium (alkaline earth metal)
Scandium (transition metal)
Titanium (transition metal)
Vanadium (transition metal)
Chromium (transition metal)
Manganese (transition metal)
Iron (transition metal)
Cobalt (transition metal)
Nickel (transition metal)
Copper (transition metal)
Zinc (transition metal)
Gallium (post-transition metal)
Germanium (metalloid)
Arsenic (metalloid)
Selenium (polyatomic nonmetal)
Bromine (diatomic nonmetal)
Krypton (noble gas)
Rubidium (alkali metal)
Strontium (alkaline earth metal)
Yttrium (transition metal)
Zirconium (transition metal)
Niobium (transition metal)
Molybdenum (transition metal)
Technetium (transition metal)
Ruthenium (transition metal)
Rhodium (transition metal)
Palladium (transition metal)
Silver (transition metal)
Cadmium (transition metal)
Indium (post-transition metal)
Tin (post-transition metal)
Antimony (metalloid)
Tellurium (metalloid)
Iodine (diatomic nonmetal)
Xenon (noble gas)
Caesium (alkali metal)
Barium (alkaline earth metal)
Lanthanum (lanthanide)
Cerium (lanthanide)
Praseodymium (lanthanide)
Neodymium (lanthanide)
Promethium (lanthanide)
Samarium (lanthanide)
Europium (lanthanide)
Gadolinium (lanthanide)
Terbium (lanthanide)
Dysprosium (lanthanide)
Holmium (lanthanide)
Erbium (lanthanide)
Thulium (lanthanide)
Ytterbium (lanthanide)
Lutetium (lanthanide)
Hafnium (transition metal)
Tantalum (transition metal)
Tungsten (transition metal)
Rhenium (transition metal)
Osmium (transition metal)
Iridium (transition metal)
Platinum (transition metal)
Gold (transition metal)
Mercury (transition metal)
Thallium (post-transition metal)
Lead (post-transition metal)
Bismuth (post-transition metal)
Polonium (post-transition metal)
Astatine (metalloid)
Radon (noble gas)
Francium (alkali metal)
Radium (alkaline earth metal)
Actinium (actinide)
Thorium (actinide)
Protactinium (actinide)
Uranium (actinide)
Neptunium (actinide)
Plutonium (actinide)
Americium (actinide)
Curium (actinide)
Berkelium (actinide)
Californium (actinide)
Einsteinium (actinide)
Fermium (actinide)
Mendelevium (actinide)
Nobelium (actinide)
Lawrencium (actinide)
Rutherfordium (transition metal)
Dubnium (transition metal)
Seaborgium (transition metal)
Bohrium (transition metal)
Hassium (transition metal)
Meitnerium (unknown chemical properties)
Darmstadtium (unknown chemical properties)
Roentgenium (unknown chemical properties)
Copernicium (transition metal)
Ununtrium (unknown chemical properties)
Flerovium (post-transition metal)
Ununpentium (unknown chemical properties)
Livermorium (unknown chemical properties)
Ununseptium (unknown chemical properties)
Ununoctium (unknown chemical properties)
Atomic number (Z) 2
Group, block group 18 (noble gases), s-block
Period period 1
Element category noble gas
Standard atomic weight (±) (Ar) 4.002602(2)[1]
Electron configuration 1s2
per shell
Physical properties
Phase gas
Melting point 0.95 K (−272.20 °C, −457.96 °F) (at 2.5 MPa)
Boiling point 4.222 K (−268.928 °C, −452.070 °F)
Density at stp (0 °C and 101.325 kPa) 0.1786 g/L
when liquid, at m.p. 0.145 g/cm3
when liquid, at b.p. 0.125 g/cm3
Triple point 2.177 K, 5.043 kPa
Critical point 5.1953 K, 0.22746 MPa
Heat of fusion 0.0138 kJ/mol
Heat of vaporization 0.0829 kJ/mol
Molar heat capacity 20.78[2] J/(mol·K)
vapor pressure (defined by ITS-90)
at T (K) 1.23 1.67 2.48 4.21
Atomic properties
Oxidation states 0
Electronegativity Pauling scale: no data
Ionization energies 1st: 2372.3 kJ/mol
2nd: 5250.5 kJ/mol
Covalent radius 28 pm
Van der Waals radius 140 pm
Crystal structure hexagonal close-packed (hcp)
Hexagonal close-packed crystal structure for helium
Speed of sound 972 m/s
Thermal conductivity 0.1513 W/(m·K)
Magnetic ordering diamagnetic[3]
CAS Number 7440-59-7
Naming after Helios, Greek god of the Sun
Discovery Pierre Janssen, Norman Lockyer (1868)
First isolation William Ramsay, Per Teodor Cleve, Abraham Langlet (1895)
Most stable isotopes of helium
iso NA half-life DM DE (MeV) DP
3He 0.000137%* 3He is stable with 1 neutron
4He 99.999863%* 4He is stable with 2 neutrons
* Atmospheric value, abundance may differ elsewhere
· references
Helium is a chemical element with symbol He and atomic number 2. It is a colorless, odorless, tasteless, non-toxic, inert, monatomic gas that heads the noble gas group in the periodic table. Its boiling and melting points are the lowest among all the elements. Helium is named for the Greek god of the Sun, Helios.
Helium is the second lightest element and is the second most abundant element in the observable universe, being present at about 24% of the total elemental mass, which is more than 12 times the mass of all the heavier elements combined. Its abundance is similar to this figure in the Sun and in Jupiter. This is due to the very high nuclear binding energy (per nucleon) of helium-4 with respect to the next three elements after helium. This helium-4 binding energy also accounts for why it is a product of both nuclear fusion and radioactive decay. Most helium in the universe is helium-4, and is believed to have been formed during the Big Bang. Large amounts of new helium are being created by nuclear fusion of hydrogen in stars.
Liquid helium is used in cryogenics (its largest single use, absorbing about a quarter of production), particularly in the cooling of superconducting magnets, with the main commercial application being in MRI scanners. Helium's other industrial uses—as a pressurizing and purge gas, as a protective atmosphere for arc welding and in processes such as growing crystals to make silicon wafers—account for half of the gas produced. A well-known but minor use is as a lifting gas in balloons and airships.[4] As with any gas whose density differs from that of air, inhaling a small volume of helium temporarily changes the timbre and quality of the human voice. In scientific research, the behavior of the two fluid phases of helium-4 (helium I and helium II) is important to researchers studying quantum mechanics (in particular the property of superfluidity) and to those looking at the phenomena, such as superconductivity, produced in matter near absolute zero.
On Earth it is relatively rare — 5.2 ppm by volume in the atmosphere. Most terrestrial helium present today is created by the natural radioactive decay of heavy radioactive elements (thorium and uranium, although there are other examples), as the alpha particles emitted by such decays consist of helium-4 nuclei. This radiogenic helium is trapped with natural gas in concentrations up to 7% by volume, from which it is extracted commercially by a low-temperature separation process called fractional distillation. Terrestrial helium is a non-renewable resource, and once released into the atmosphere, it is lost, as it readily escapes into space.[5][6][7]
Scientific discoveries
The first evidence of helium was observed on August 18, 1868 as a bright yellow line with a wavelength of 587.49 nanometers in the spectrum of the chromosphere of the Sun. The line was detected by French astronomer Jules Janssen during a total solar eclipse in Guntur, India.[8][9] This line was initially assumed to be sodium. On October 20 of the same year, English astronomer Norman Lockyer observed a yellow line in the solar spectrum, which he named the D3 Fraunhofer line because it was near the known D1 and D2 lines of sodium.[10] He concluded that it was caused by an element in the Sun unknown on Earth. Lockyer and English chemist Edward Frankland named the element with the Greek word for the Sun, ἥλιος (helios).[11][12]
Picture of visible spectrum with superimposed sharp yellow and blue and violet lines.
Spectral lines of helium
In 1882, Italian physicist Luigi Palmieri detected helium on Earth, for the first time, through its D3 spectral line, when he analyzed the lava of Mount Vesuvius.[13]
Sir William Ramsay, the discoverer of terrestrial helium
On March 26, 1895, Scottish chemist Sir William Ramsay isolated helium on Earth by treating the mineral cleveite (a variety of uraninite with at least 10% rare earth elements) with mineral acids. Ramsay was looking for argon but, after separating nitrogen and oxygen from the gas liberated by sulfuric acid, he noticed a bright yellow line that matched the D3 line observed in the spectrum of the Sun.[10][14][15][16] These samples were identified as helium by Lockyer and British physicist William Crookes. It was independently isolated from cleveite in the same year by chemists Per Teodor Cleve and Abraham Langlet in Uppsala, Sweden, who collected enough of the gas to accurately determine its atomic weight.[9][17][18] Helium was also isolated by the American geochemist William Francis Hillebrand prior to Ramsay's discovery when he noticed unusual spectral lines while testing a sample of the mineral uraninite. Hillebrand, however, attributed the lines to nitrogen. His letter of congratulations to Ramsay offers an interesting case of discovery and near-discovery in science.[19]
Extraction and use
After an oil drilling operation in 1903 in Dexter, Kansas produced a gas geyser that would not burn, Kansas state geologist Erasmus Haworth collected samples of the escaping gas and took them back to the University of Kansas at Lawrence where, with the help of chemists Hamilton Cady and David McFarland, he discovered that the gas consisted of, by volume, 72% nitrogen, 15% methane (a combustible percentage only with sufficient oxygen), 1% hydrogen, and 12% an unidentifiable gas.[9][24] With further analysis, Cady and McFarland discovered that 1.84% of the gas sample was helium.[25][26] This showed that despite its overall rarity on Earth, helium was concentrated in large quantities under the American Great Plains, available for extraction as a byproduct of natural gas.[27]
This enabled the United States to become the world's leading supplier of helium. Following a suggestion by Sir Richard Threlfall, the United States Navy sponsored three small experimental helium plants during World War I. The goal was to supply barrage balloons with the non-flammable, lighter-than-air gas. A total of 5,700 m3 (200,000 cu ft) of 92% helium was produced in the program even though less than a cubic meter of the gas had previously been obtained.[10] Some of this gas was used in the world's first helium-filled airship, the U.S. Navy's C-7, which flew its maiden voyage from Hampton Roads, Virginia, to Bolling Field in Washington, D.C., on December 1, 1921,[28] nearly two years before the Navy's first rigid airship to be helium-filled, the Naval Aircraft Factory-built USS Shenandoah, itself flew for the first time in September 1923.
The government of the United States set up the National Helium Reserve in 1925 at Amarillo, Texas, with the goal of supplying military airships in time of war and commercial airships in peacetime.[10] Because of the Helium Control Act (1927), which banned the export of scarce helium on which the US then had a production monopoly, together with the prohibitive cost of the gas, the Hindenburg, like all German Zeppelins, was forced to use hydrogen as the lift gas. Helium use following World War II was depressed but the reserve was expanded in the 1950s to ensure a supply of liquid helium as a coolant to create oxygen/hydrogen rocket fuel (among other uses) during the Space Race and Cold War. Helium use in the United States in 1965 was more than eight times the peak wartime consumption.[30]
After the "Helium Acts Amendments of 1960" (Public Law 86–777), the U.S. Bureau of Mines arranged for five private plants to recover helium from natural gas. For this helium conservation program, the Bureau built a 425-mile (684 km) pipeline from Bushton, Kansas, to connect those plants with the government's partially depleted Cliffside gas field, near Amarillo, Texas. This helium-nitrogen mixture was injected and stored in the Cliffside gas field until needed, when it then was further purified.[31]
By 1995, a billion cubic meters of the gas had been collected and the reserve was US$1.4 billion in debt, prompting the Congress of the United States in 1996 to phase out the reserve.[9][32] The resulting "Helium Privatization Act of 1996"[33] (Public Law 104–273) directed the United States Department of the Interior to empty the reserve, with sales starting by 2005.[34]
For many years the United States produced over 90% of commercially usable helium in the world, while extraction plants in Canada, Poland, Russia, and other nations produced the remainder. In the mid-1990s, a new plant in Arzew, Algeria, producing 17 million cubic meters (600 million cubic feet) began operation, with enough production to cover all of Europe's demand. Meanwhile, by 2000, the consumption of helium within the U.S. had risen to above 15 million kg per year.[36] In 2004–2006, two additional plants, one in Ras Laffan, Qatar, and the other in Skikda, Algeria, were built. Algeria quickly became the second leading producer of helium.[37] Through this time, both helium consumption and the costs of producing helium increased.[38] From 2002 to 2007 helium prices doubled.[39]
As of 2012 the United States National Helium Reserve accounted for 30 percent of the world's helium.[40] The reserve was expected to run out of helium in 2018.[40] Despite that, a proposed bill in the United States Senate would allow the reserve to continue to sell the gas. Other large reserves were in the Hugoton in Kansas, United States and nearby gas fields of Kansas and the panhandles of Texas and Oklahoma. New helium plants were scheduled to open in 2012 in Qatar, Russia and the United States state of Wyoming but they were not expected to ease the shortage.[40]
In 2013, Qatar started up the world's largest helium unit.[41] 2014 was widely acknowledged to be a year of over-supply in the helium business, following years of renowned shortages.[42] Nasdaq reported (2015) that for Air Products, an international corporation that sells gases for industrial use, helium volumes remain under pressure due to feedstock supply constraints.[43]
The helium atom
Main article: Helium atom
Picture of a diffuse gray sphere with grayscale density decreasing from the center. Length scale about 1 Angstrom. An inset outlines the structure of the core, with two red and two blue atoms at the length scale of 1 femtometer.
Helium in quantum mechanics
In the perspective of quantum mechanics, helium is the second simplest atom to model, following the hydrogen atom. Helium is composed of two electrons in atomic orbitals surrounding a nucleus containing two protons along with some neutrons. As in Newtonian mechanics, no system consisting of more than two particles can be solved with an exact analytical mathematical approach (see 3-body problem) and helium is no exception. Thus, numerical mathematical methods are required, even to solve the system of one nucleus and two electrons. Such computational chemistry methods have been used to create a quantum mechanical picture of helium electron binding which is accurate to within < 2% of the correct value, in a few computational steps.[44] In such models it is found that each electron in helium partly screens the nucleus from the other, so that the effective nuclear charge Z which each electron sees, is about 1.69 units, not the 2 charges of a classic "bare" helium nucleus.
The related stability of the helium-4 nucleus and electron shell
The nucleus of the helium-4 atom is identical with an alpha particle. High-energy electron-scattering experiments show its charge to decrease exponentially from a maximum at a central point, exactly as does the charge density of helium's own electron cloud. This symmetry reflects similar underlying physics: the pair of neutrons and the pair of protons in helium's nucleus obey the same quantum mechanical rules as do helium's pair of electrons (although the nuclear particles are subject to a different nuclear binding potential), so that all these fermions fully occupy 1s orbitals in pairs, none of them possessing orbital angular momentum, and each cancelling the other's intrinsic spin. Adding another of any of these particles would require angular momentum and would release substantially less energy (in fact, no nucleus with five nucleons is stable). This arrangement is thus energetically extremely stable for all these particles, and this stability accounts for many crucial facts regarding helium in nature.
In a similar way, the particular energetic stability of the helium-4 nucleus, produced by similar effects, accounts for the ease of helium-4 production in atomic reactions involving both heavy-particle emission, and fusion. Some stable helium-3 is produced in fusion reactions from hydrogen, but it is a very small fraction, compared with the highly favorable helium-4.
Binding energy per nucleon of common isotopes. The binding energy per particle of helium-4 is significantly larger than all nearby nuclides.
The unusual stability of the helium-4 nucleus is also important cosmologically: it explains the fact that in the first few minutes after the Big Bang, as the "soup" of free protons and neutrons which had initially been created in about 6:1 ratio cooled to the point that nuclear binding was possible, almost all first compound atomic nuclei to form were helium-4 nuclei. So tight was helium-4 binding that helium-4 production consumed nearly all of the free neutrons in a few minutes, before they could beta-decay, and also leaving few to form heavier atoms such as lithium, beryllium, or boron. Helium-4 nuclear binding per nucleon is stronger than in any of these elements (see nucleogenesis and binding energy) and thus no energetic drive was available, once helium had been formed, to make elements 3, 4 and 5. It was barely energetically favorable for helium to fuse into the next element with a lower energy per nucleon, carbon. However, due to lack of intermediate elements, this process requires three helium nuclei striking each other nearly simultaneously (see triple alpha process). There was thus no time for significant carbon to be formed in the few minutes after the Big Bang, before the early expanding universe cooled to the temperature and pressure point where helium fusion to carbon was no longer possible. This left the early universe with a very similar ratio of hydrogen/helium as is observed today (3 parts hydrogen to 1 part helium-4 by mass), with nearly all the neutrons in the universe trapped in helium-4.
Gas and plasma phases
Illuminated light red gas discharge tubes shaped as letters H and e
Helium discharge tube shaped like the element's atomic symbol
Helium is the second least reactive noble gas, after neon, and thus the second least reactive of all elements.[45] It is inert and monatomic in all standard conditions. Because of helium's relatively low molar (atomic) mass, its thermal conductivity, specific heat, and sound speed in the gas phase are all greater than any other gas except hydrogen. For similar reasons, and also due to the small size of helium atoms, helium's diffusion rate through solids is three times that of air and around 65% that of hydrogen.[10]
Helium is the least water-soluble monatomic gas,[46] and one of the least water-soluble of any gas (CF4, SF6, and C4F8 have lower mole fraction solubilities: 0.3802, 0.4394, and 0.2372 x2/10−5, respectively, versus helium's 0.70797 x2/10−5),[47] and helium's index of refraction is closer to unity than that of any other gas.[48] Helium has a negative Joule-Thomson coefficient at normal ambient temperatures, meaning it heats up when allowed to freely expand. Only below its Joule-Thomson inversion temperature (of about 32 to 50 K at 1 atmosphere) does it cool upon free expansion.[10] Once precooled below this temperature, helium can be liquefied through expansion cooling.
Liquid helium
Liquefied helium. This helium is not only liquid, but has been cooled to the point of superfluidity. The drop of liquid at the bottom of the glass represents helium spontaneously escaping from the container over the side, to empty out of the container. The energy to drive this process is supplied by the potential energy of the falling helium.
Main article: Liquid helium
Unlike any other element, helium will remain liquid down to absolute zero at normal pressures. This is a direct effect of quantum mechanics: specifically, the zero point energy of the system is too high to allow freezing. Solid helium requires a temperature of 1–1.5 K (about −272 °C or −457 °F) and about 25 bar (2.5 MPa) of pressure.[50] It is often hard to distinguish solid from liquid helium since the refractive index of the two phases are nearly the same. The solid has a sharp melting point and has a crystalline structure, but it is highly compressible; applying pressure in a laboratory can decrease its volume by more than 30%.[51] With a bulk modulus of about 27 MPa[52] it is ~100 times more compressible than water. Solid helium has a density of 0.214 ± 0.006 g/cm3 at 1.15 K and 66 atm; the projected density at 0 K and 25 bar (2.5 MPa) is 0.187 ± 0.009 g/cm3.[53]
Helium I state
Below its boiling point of 4.22 kelvins and above the lambda point of 2.1768 kelvins, the isotope helium-4 exists in a normal colorless liquid state, called helium I.[10] Like other cryogenic liquids, helium I boils when it is heated and contracts when its temperature is lowered. Below the lambda point, however, helium does not boil, and it expands as the temperature is lowered further.
Helium I has a gas-like index of refraction of 1.026 which makes its surface so hard to see that floats of styrofoam are often used to show where the surface is.[10] This colorless liquid has a very low viscosity and a density of 0.145–0.125 g/mL (between about 0 and 4 K),[54] which is only one-fourth the value expected from classical physics.[10] Quantum mechanics is needed to explain this property and thus both types of liquid helium are called quantum fluids, meaning they display atomic properties on a macroscopic scale. This may be an effect of its boiling point being so close to absolute zero, preventing random molecular motion (thermal energy) from masking the atomic properties.[10]
Helium II state
Main article: Superfluid helium-4
Liquid helium below its lambda point begins to exhibit very unusual characteristics, in a state called helium II. When helium II boils, due to its high thermal conductivity it does not bubble but rather evaporates directly from its surface. Helium-3 also has a superfluid phase, but only at much lower temperatures; as a result, less is known about such properties in the isotope.[10]
A cross-sectional drawing showing one vessel inside another. There is a liquid in the outer vessel, and it tends to flow into the inner vessel over its walls.
Unlike ordinary liquids, helium II will creep along surfaces in order to reach an equal level; after a short while, the levels in the two containers will equalize. The Rollin film also covers the interior of the larger container; if it were not sealed, the helium II would creep out and escape.[10]
Helium II also exhibits a creeping effect. When a surface extends past the level of helium II, the helium II moves along the surface, against the force of gravity. Helium II will escape from a vessel that is not sealed by creeping along the sides until it reaches a warmer region where it evaporates. It moves in a 30 nm-thick film regardless of surface material. This film is called a Rollin film and is named after the man who first characterized this trait, Bernard V. Rollin.[10][57][58] As a result of this creeping behavior and helium II's ability to leak rapidly through tiny openings, it is very difficult to confine liquid helium. Unless the container is carefully constructed, the helium II will creep along the surfaces and through valves until it reaches somewhere warmer, where it will evaporate. Waves propagating across a Rollin film are governed by the same equation as gravity waves in shallow water, but rather than gravity, the restoring force is the van der Waals force.[59] These waves are known as third sound.[60]
Main article: Isotopes of helium
There are nine known isotopes of helium, but only helium-3 and helium-4 are stable. In the Earth's atmosphere, there is one 3
atom for every million 4
Helium-3 is present on Earth only in trace amounts; most of it since Earth's formation, though some falls to Earth trapped in cosmic dust.[62] Trace amounts are also produced by the beta decay of tritium.[63] Rocks from the Earth's crust have isotope ratios varying by as much as a factor of ten, and these ratios can be used to investigate the origin of rocks and the composition of the Earth's mantle.[62] 3
to 4
is around 100 times higher than on Earth.[64] Extraplanetary material, such as lunar and asteroid regolith, have trace amounts of helium-3 from being bombarded by solar winds. The Moon's surface contains helium-3 at concentrations on the order of 10 ppb, much higher than the approximately 5 ppt found in the Earth's atmosphere.[65][66] A number of people, starting with Gerald Kulcinski in 1986,[67] have proposed to explore the moon, mine lunar regolith and use the helium-3 for fusion.
and 4
below 0.8 K separate into two immiscible phases due to their dissimilarity (they follow different quantum statistics: helium-4 atoms are bosons while helium-3 atoms are fermions).[10] Dilution refrigerators use this immiscibility to achieve temperatures of a few millikelvins.
It is possible to produce exotic helium isotopes, which rapidly decay into other substances. The shortest-lived heavy helium isotope is helium-5 with a half-life of 7.6×10−22 s. Helium-6 decays by emitting a beta particle and has a half-life of 0.8 second. Helium-7 also emits a beta particle as well as a gamma ray. Helium-7 and helium-8 are created in certain nuclear reactions.[10] Helium-6 and helium-8 are known to exhibit a nuclear halo.[10]
Main article: helium compounds
Structure of the helium hydride ion, HHe+
Structure of the suspected fluoroheliate anion, OHeF
Helium has a valence of zero and is chemically unreactive under all normal conditions.[51] It is an electrical insulator unless ionized. As with the other noble gases, helium has metastable energy levels that allow it to remain ionized in an electrical discharge with a voltage below its ionization potential.[10] Helium can form unstable compounds, known as excimers, with tungsten, iodine, fluorine, sulfur and phosphorus when it is subjected to a glow discharge, to electron bombardment, or else is a plasma for another reason. The molecular compounds HeNe, HgHe10, and WHe2, and the molecular ions He+
, He2+
, HeH+
, and HeD+
have been created this way.[68] HeH+ is also stable in its ground state, but is extremely reactive—it is the strongest Brønsted acid known, and therefore can exist only in isolation, as it will protonate any molecule or counteranion it comes into contact with. This technique has also allowed the production of the neutral molecule He2, which has a large number of band systems, and HgHe, which is apparently held together only by polarization forces.[10]
Van der Waals compounds of helium can also be formed with cryogenic helium gas and atoms of a substance, such as LiHe and He2.[69]
Theoretically, other true compounds may also be possible, such as helium fluorohydride (HHeF) which would be analogous to HArF, discovered in 2000.[70] Calculations show that two new compounds containing a helium-oxygen bond could be stable.[71] Two new molecular species, predicted using theory, CsFHeO and N(CH3)4FHeO, are derivatives of a metastable [F– HeO] anion first theorized in 2005 by a group from Taiwan. If confirmed by experiment, the only remaining element with no known stable compounds would be neon.[72]
Helium has been put inside the hollow carbon cage molecules (the fullerenes) by heating under high pressure. The endohedral fullerene molecules formed are stable up to high temperatures. When chemical derivatives of these fullerenes are formed, the helium stays inside.[73] If helium-3 is used, it can be readily observed by helium nuclear magnetic resonance spectroscopy.[74] Many fullerenes containing helium-3 have been reported. Although the helium atoms are not attached by covalent or ionic bonds, these substances have distinct properties and a definite composition, like all stoichiometric chemical compounds.
Under high pressures helium can form compounds with various other elements. Helium-nitrogen clathrate (He(N2)11) crystals have been grown at room temperature at pressures ca. 10 GPa in a diamond anvil cell.[75] At 130 GPa Na2He is thermodynamically stable with a fluorite structure.[76]
Occurrence and production
Natural abundance
Although it is rare on Earth, helium is the second most abundant element in the known Universe (after hydrogen), constituting 23% of its baryonic mass.[9] The vast majority of helium was formed by Big Bang nucleosynthesis one to three minutes after the Big Bang. As such, measurements of its abundance contribute to cosmological models. In stars, it is formed by the nuclear fusion of hydrogen in proton-proton chain reactions and the CNO cycle, part of stellar nucleosynthesis.[61]
In the Earth's atmosphere, the concentration of helium by volume is only 5.2 parts per million.[77][78] The concentration is low and fairly constant despite the continuous production of new helium because most helium in the Earth's atmosphere escapes into space by several processes.[79][80][81] In the Earth's heterosphere, a part of the upper atmosphere, helium and other lighter gases are the most abundant elements.
As of 2011 the world's helium reserves were estimated at 40 billion cubic meters, with a quarter of that being in the South Pars / North Dome Gas-Condensate field owned jointly by Qatar and Iran.[87]
Modern extraction and distribution
In 2008, approximately 169 million standard cubic meters (SCM) of helium were extracted from natural gas or withdrawn from helium reserves with approximately 78% from the United States, 10% from Algeria, and most of the remainder from Russia, Poland and Qatar.[90] By 2013, increases in helium production in Qatar (under the company RasGas managed by Air Liquide) had increased Qatar's fraction of world helium production to 25%, and made it the second largest exporter after the United States.[91]
In the United States, most helium is extracted from natural gas of the Hugoton and nearby gas fields in Kansas, Oklahoma, and the Panhandle Field in Texas.[37][92] Much of this gas was once sent by pipeline to the National Helium Reserve, but since 2005 this reserve is being depleted and sold off, and is expected under present law to be largely depleted by 2021.[93]
Diffusion of crude natural gas through special semipermeable membranes and other barriers is another method to recover and purify helium.[94] In 1996, the U.S. had proven helium reserves, in such gas well complexes, of about 147 billion standard cubic feet (4.2 billion SCM).[95] At rates of use at that time (72 million SCM per year in the U.S.; see pie chart below) this is enough helium for about 58 years of U.S. use, and less than this (perhaps 80% of the time) at world use rates, although factors in saving and processing impact effective reserve numbers.
Helium must be extracted from natural gas because it is present in air at only a fraction of that of neon, yet the demand for it is far higher. It is estimated that if all neon production were retooled to save helium, that 0.1% of the world's helium demands would be satisfied. Similarly, only 1% of the world's helium demands could be satisfied by re-tooling all air distillation plants.[96] Helium can be synthesized by bombardment of lithium or boron with high-velocity protons, but this process is a completely uneconomic method of production.[97]
Helium is commercially available in either liquid or gaseous form. As a liquid, it can be supplied in small insulated containers called dewars which hold up to 1,000 liters of helium, or in large ISO containers which have nominal capacities as large as 42 m3 (around 11,000 U.S. gallons). In gaseous form, small quantities of helium are supplied in high-pressure cylinders holding up to 8 m3 (approx. 282 standard cubic feet), while large quantities of high-pressure gas are supplied in tube trailers which have capacities of up to 4,860 m3 (approx. 172,000 standard cubic feet).
Conservation advocates
A large solid cylinder with a hole in its center and a rail attached to its side.
The largest single use of liquid helium is to cool the superconducting magnets in modern MRI scanners.
Circle frame.svg
Estimated 2014 U.S. fractional helium use by category. Total use is 34 million cubic meters.[100]
Cryogenics (32%)
Pressurizing and purging (18%)
Welding (13%)
Controlled atmospheres (18%)
Leak detection (4%)
Breathing mixtures (2%)
Other (13%)
While balloons are perhaps the best known use of helium, they are a minor part of all helium use.[32] Helium is used for many purposes that require some of its unique properties, such as its low boiling point, low density, low solubility, high thermal conductivity, or inertness. Of the 2014 world helium total production of about 32 million kg (180 million standard cubic meters) helium per year, the largest use (about 32% of the total in 2014) is in cryogenic applications, most of which involves cooling the superconducting magnets in medical MRI scanners and NMR spectrometers.[101] Other major uses were pressurizing and purging systems, welding, maintenance of controlled atmospheres, and leak detection. Other uses by category were relatively minor fractions. [100]
Controlled atmospheres
Helium is used as a protective gas in growing silicon and germanium crystals, in titanium and zirconium production, and in gas chromatography,[51] because it is inert. Because of its inertness, thermally and calorically perfect nature, high speed of sound, and high value of the heat capacity ratio, it is also useful in supersonic wind tunnels[102] and impulse facilities.[103]
Gas tungsten arc welding
Helium is used as a shielding gas in arc welding processes on materials that at welding temperatures are contaminated and weakened by air or nitrogen.[9] A number of inert shielding gases are used in gas tungsten arc welding, but helium is used instead of cheaper argon especially for welding materials that have higher heat conductivity, like aluminium or copper.
Minor uses
Industrial leak detection
Photo of a large, metal-framed device (about 3×1×1.5 m) standing in a room.
A dual chamber helium leak detection machine
One industrial application for helium is leak detection. Because helium diffuses through solids three times faster than air, it is used as a tracer gas to detect leaks in high-vacuum equipment (such as cryogenic tanks) and high-pressure containers.[104] The tested object is placed in a chamber, which is then evacuated and filled with helium. The helium that escapes through the leaks is detected by a sensitive device (helium mass spectrometer), even at the leak rates as small as 10−9 mbar·L/s (10−10 Pa·m3/s). The measurement procedure is normally automatic and is called helium integral test. A simpler procedure is to fill the tested object with helium and to manually search for leaks with a hand-held device.[105]
The Good Year Blimp
Because of its low density and incombustibility, helium is the gas of choice to fill airships such as the Goodyear blimp.
Because it is lighter than air, airships and balloons are inflated with helium for lift. While hydrogen gas is also buoyant, helium has the advantage of being non-flammable (in addition to being fire retardant). Another minor use is in rocketry, where helium is used as an ullage medium to displace fuel and oxidizers in storage tanks and to condense hydrogen and oxygen to make rocket fuel. It is also used to purge fuel and oxidizer from ground support equipment prior to launch and to pre-cool liquid hydrogen in space vehicles. For example, the Saturn V rocket used in the Apollo program needed about 370,000 m3 (13 million cubic feet) of helium to launch.[51]
Minor commercial and recreational uses
Helium as a breathing gas has no narcotic properties, so helium mixtures such as trimix, heliox and heliair are used for deep diving to reduce the effects of narcosis.[107][108] At depths below 150 metres (490 ft) divers breathing helium–oxygen mixtures begin to experience tremors and a decrease in psychomotor function, symptoms of high-pressure nervous syndrome.[109] This effect may be countered to some extent by adding an amount of narcotic gas such as hydrogen or nitrogen to a helium–oxygen mixture.[110] At these depths the low density of helium is found to considerably reduce the effort of breathing.[111]
Helium–neon lasers, a type of low-powered gas laser producing a red beam, had various practical applications which included barcode readers and laser pointers, before they were almost universally replaced by cheaper diode lasers.[9]
Helium, mixed with a heavier gas such as xenon, is useful for thermoacoustic refrigeration due to the resulting high heat capacity ratio and low Prandtl number.[112] The inertness of helium has environmental advantages over conventional refrigeration systems which contribute to ozone depletion or global warming.[113]
Helium is also used in some hard disk drives.[114]
Scientific uses
The use of helium reduces the distorting effects of temperature variations in the space between lenses in some telescopes, due to its extremely low index of refraction.[10] This method is especially used in solar telescopes where a vacuum tight telescope tube would be too heavy.[115][116]
Helium is a commonly used carrier gas for gas chromatography.
The age of rocks and minerals that contain uranium and thorium can be estimated by measuring the level of helium with a process known as helium dating.[9][10]
Helium at low temperatures is used in cryogenics, and in certain cryogenics applications. As examples of applications, liquid helium is used to cool certain metals to the extremely low temperatures required for superconductivity, such as in superconducting magnets for magnetic resonance imaging. The Large Hadron Collider at CERN uses 96 metric tons of liquid helium to maintain the temperature at 1.9 kelvin.[117]
Inhalation and safety
The speed of sound in helium is nearly three times the speed of sound in air. Because the fundamental frequency of a gas-filled cavity is proportional to the speed of sound in the gas, when helium is inhaled there is a corresponding increase in the resonant frequencies of the vocal tract.[9][118] The fundamental frequency (sometimes called pitch) does not change, since this is produced by direct vibration of the vocal folds, which is unchanged.[119] However, the higher resonant frequencies cause a change in timbre, resulting in a reedy, duck-like vocal quality. The opposite effect, lowering resonant frequencies, can be obtained by inhaling a dense gas such as sulfur hexafluoride or xenon.
Inhaling helium can be dangerous if done to excess, since helium is a simple asphyxiant and so displaces oxygen needed for normal respiration.[9][120] Fatalities have been recorded, including a youth who suffocated in Vancouver in 2003 and two adults who suffocated in South Florida in 2006.[121][122] In 1998, an Australian girl (her age is not known) from Victoria fell unconscious and temporarily turned blue after inhaling the entire contents of a party balloon.[123][124][125] Breathing pure helium continuously causes death by asphyxiation within minutes. This fact is used in the design of suicide bags.
Inhaling helium directly from pressurized cylinders is extremely dangerous, as the high flow rate can result in barotrauma, fatally rupturing lung tissue.[120][126]
Death caused by helium is rare. The first media-recorded case was that of a 15-year-old girl from Texas who died in 1998 from helium inhalation at a friend's party; the exact type of helium death is unidentified.[123][124][125]
In the United States only two fatalities were reported between 2000 and 2004, including a man who died in North Carolina of barotrauma in 2002.[121][126] A youth asphyxiated in Vancouver during 2003, and a 27-year-old man in Australia had an embolism after breathing from a cylinder in 2000.[121] Since then two adults asphyxiated in South Florida in 2006,[121][122][127] and there were cases in 2009 and 2010, one a Californian youth who was found with a bag over his head, attached to a helium tank,[128] and another teenager in Northern Ireland died of asphyxiation.[129] At Eagle Point, Oregon a teenage girl died in 2012 from barotrauma at a party.[130][131][132][133] A girl from Michigan died from hypoxia later in the year.[134]
On February 4, 2015 it was revealed that during the recording of their main TV show on January 28, a 12-year-old member (name withheld) of Japanese all-girl singing group 3B Junior suffered from air embolism, losing consciousness and falling in a coma as a result of air bubbles blocking the flow of blood to the brain, after inhaling huge quantities of helium as part of a game. The incident was not made public until a week later.[135][136] The staff of TV Asahi held an emergency press conference to communicate that the member had been taken to the hospital and is showing signs of rehabilitation such as moving eyes and limbs, but her consciousness has not been sufficiently recovered as of yet. Police have launched an investigation due to a neglect of safety measures.[137][138]
The safety issues for cryogenic helium are similar to those of liquid nitrogen; its extremely low temperatures can result in cold burns, and the liquid-to-gas expansion ratio can cause explosions if no pressure-relief devices are installed. Containers of helium gas at 5 to 10 K should be handled as if they contain liquid helium due to the rapid and significant thermal expansion that occurs when helium gas at less than 10 K is warmed to room temperature.[51]
At high pressures (more than about 20 atm or two MPa), a mixture of helium and oxygen (heliox) can lead to high-pressure nervous syndrome, a sort of reverse-anesthetic effect; adding a small amount of nitrogen to the mixture can alleviate the problem.[139][140]
Additional images
See also
5. Connor, Steve (2010-08-23). "Why the world is running out of helium – Science – News". London: The Independent. Retrieved 2013-09-16.
6. Ethan on December 12, 2012 (2012-12-12). "Why the World Will Run Out of Helium – Starts With A Bang". Retrieved 2013-09-16.
7. Witchalls, Clint (18 August 2010) Nobel prizewinner: We are running out of helium. New Scientist.(subscription required)
8. Kochhar, R. K. (1991). "French astronomers in India during the 17th – 19th centuries". Journal of the British Astronomical Association. 101 (2): 95–100. Bibcode:1991JBAA..101...95K.
9. 9.00 9.01 9.02 9.03 9.04 9.05 9.06 9.07 9.08 9.09 9.10 9.11 Emsley, John (2001). Nature's Building Blocks. Oxford: Oxford University Press. pp. 175–179. ISBN 0-19-850341-5.
10. 10.00 10.01 10.02 10.03 10.04 10.05 10.06 10.07 10.08 10.09 10.10 10.11 10.12 10.13 10.14 10.15 10.16 10.17 10.18 10.19 10.20 10.21 10.22 Clifford A. Hampel (1968). The Encyclopedia of the Chemical Elements. New York: Van Nostrand Reinhold. pp. 256–268. ISBN 0-442-15598-0.
11. Harper, Douglas. "helium". Online Etymology Dictionary.
12. Thomson, William (August 3, 1871). "Inaugural Address of Sir William Thomson". Nature. 4 (92): 261–278 [268]. Bibcode:1871Natur...4..261.. doi:10.1038/004261a0. Frankland and Lockyer find the yellow prominences to give a very decided bright line not far from D, but hitherto not identified with any terrestrial flame. It seems to indicate a new substance, which they propose to call Helium
13. Stewart, Alfred Walter (2008). Recent Advances in Physical and Inorganic Chemistry. BiblioBazaar, LLC. p. 201. ISBN 0-554-80513-8.
14. Ramsay, William (1895). "On a Gas Showing the Spectrum of Helium, the Reputed Cause of D3, One of the Lines in the Coronal Spectrum. Preliminary Note". Proceedings of the Royal Society of London. 58 (347–352): 65–67. doi:10.1098/rspl.1895.0006.
15. Ramsay, William (1895). "Helium, a Gaseous Constituent of Certain Minerals. Part I". Proceedings of the Royal Society of London. 58 (347–352): 80–89. doi:10.1098/rspl.1895.0010.
16. Ramsay, William (1895). "Helium, a Gaseous Constituent of Certain Minerals. Part II--". Proceedings of the Royal Society of London. 59 (1): 325–330. doi:10.1098/rspl.1895.0097.
17. Langlet, N. A. (1895). "Das Atomgewicht des Heliums". Zeitschrift für anorganische Chemie (in German). 10 (1): 289–292. doi:10.1002/zaac.18950100130.
18. Weaver, E.R. (1919). "Bibliography of Helium Literature". Industrial & Engineering Chemistry.
19. Munday, Pat (1999). John A. Garraty; Mark C. Carnes, eds. Biographical entry for W.F. Hillebrand (1853–1925), geochemist and U.S. Bureau of Standards administrator in American National Biography. 10–11. Oxford University Press. pp. 808–9; 227–8.
20. van Delft, Dirk (2008). "Little cup of Helium, big Science" (PDF). Physics Today. 61 (3): 36–42. Bibcode:2008PhT....61c..36V. doi:10.1063/1.2897948. Archived from the original (PDF) on June 25, 2008. Retrieved 2008-07-20.
21. "Coldest Cold". Time Inc. 1929-06-10. Retrieved 2008-07-27.
22. Kapitza, P. (1938). "Viscosity of Liquid Helium below the λ-Point". Nature. 141 (3558): 74. Bibcode:1938Natur.141...74K. doi:10.1038/141074a0.
23. Osheroff, D. D.; Richardson, R. C.; Lee, D. M. (1972). "Evidence for a New Phase of Solid He3". Phys. Rev. Lett. 28 (14): 885–888. Bibcode:1972PhRvL..28..885O. doi:10.1103/PhysRevLett.28.885.
24. McFarland, D. F. (1903). "Composition of Gas from a Well at Dexter, Kan". Transactions of the Kansas Academy of Science. 19: 60–62. JSTOR 3624173. doi:10.2307/3624173.
25. "Discovery of Helium in Natural Gas at the University of Kansas". National Historic Chemical Landmarks. American Chemical Society. Retrieved 2014-02-21.
26. Cady, H.P.; McFarland, D. F. (1906). "Helium in Natural Gas". Science. 24 (611): 344. Bibcode:1906Sci....24..344D. PMID 17772798. doi:10.1126/science.24.611.344.
27. Cady, H.P.; McFarland, D. F. (1906). "Helium in Kansas Natural Gas". Transactions of the Kansas Academy of Science. 20: 80–81. JSTOR 3624645. doi:10.2307/3624645.
28. Emme, Eugene M. comp., ed. (1961). "Aeronautics and Astronautics Chronology, 1920–1924". Aeronautics and Astronautics: An American Chronology of Science and Technology in the Exploration of Space, 1915–1960. Washington, D.C.: NASA. pp. 11–19.
29. Hilleret, N. (1999). "Leak Detection". In S. Turner. CERN Accelerator School, vacuum technology: proceedings: Scanticon Conference Centre, Snekersten, Denmark, 28 May – 3 June 1999 (PDF). Geneva, Switzerland: CERN. pp. 203–212. At the origin of the helium leak detection method was the Manhattan Project and the unprecedented leak-tightness requirements needed by the uranium enrichment plants. The required sensitivity needed for the leak checking led to the choice of a mass spectrometer designed by Dr. A.O.C. Nier tuned on the helium mass.
30. Williamson, John G. (1968). "Energy for Kansas". Transactions of the Kansas Academy of Science. Kansas Academy of Science. 71 (4): 432–438. JSTOR 3627447. doi:10.2307/3627447.
31. "Conservation Helium Sale" (PDF). Federal Register. 70 (193): 58464. 2005-10-06. Retrieved 2008-07-20.
33. Helium Privatization Act of 1996 Pub.L. 104–273
34. "Executive Summary". Retrieved 2008-07-20.
35. Mullins, P.V.; Goodling, R. M. (1951). Helium. Bureau of Mines / Minerals yearbook 1949. pp. 599–602. Retrieved 2008-07-20.
36. "Helium End User Statistic" (PDF). U.S. Geological Survey. Retrieved 2008-07-20.
37. 37.0 37.1 37.2 Smith, E. M.; Goodwin, T. W.; Schillinger, J. (2003). "Challenges to the Worldwide Supply of Helium in the Next Decade". Advances in Cryogenic Engineering. 49. A (710): 119–138. doi:10.1063/1.1774674.
38. Kaplan, Karen H. (June 2007). "Helium shortage hampers research and industry". Physics Today. American Institute of Physics. 60 (6): 31–32. Bibcode:2007PhT....60f..31K. doi:10.1063/1.2754594.
39. Basu, Sourish (October 2007). Yam, Philip, ed. "Updates: Into Thin Air". Scientific American. 297 (4). Scientific American, Inc. p. 18. Retrieved 2008-08-04.
40. 40.0 40.1 40.2 @tdnewcomb (2012-08-21). "There's a Helium Shortage On — and It's Affecting More than Just Balloons Time August 21, 2012". Retrieved 2013-09-16.
41. Air Liquide Press Release.
42. Gasworld, 25 Dec 2014.
44. Watkins, Thayer. "The Old Quantum Physics of Niels Bohr and the Spectrum of Helium: A Modified Version of the Bohr Model". San Jose State University.
45. Lewars, Errol G. (2008). Modelling Marvels. Springer. pp. 70–71. ISBN 1-4020-6972-3.
46. Weiss, Ray F. (1971). "Solubility of helium and neon in water and seawater". J. Chem. Eng. Data. 16 (2): 235–241. doi:10.1021/je60049a019.
47. Scharlin, P.; Battino, R. Silla, E.; Tuñón, I.; Pascual-Ahuir, J. L. (1998). "Solubility of gases in water: Correlation between solubility and the number of water molecules in the first solvation shell". Pure & Appl. Chem. 70 (10): 1895–1904. doi:10.1351/pac199870101895.
48. Stone, Jack A.; Stejskal, Alois (2004). "Using helium as a standard of refractive index: correcting errors in a gas refractometer". Metrologia. 41 (3): 189–197. Bibcode:2004Metro..41..189S. doi:10.1088/0026-1394/41/3/012.
49. Buhler, F.; Axford, W. I.; Chivers, H. J. A.; Martin, K. (1976). "Helium isotopes in an aurora". J. Geophys. Res. 81 (1): 111–115. Bibcode:1976JGR....81..111B. doi:10.1029/JA081i001p00111.
50. "Solid Helium". Department of Physics University of Alberta. 2005-10-05. Archived from the original on May 31, 2008. Retrieved 2008-07-20.
52. Grilly, E. R. (1973). "Pressure-volume-temperature relations in liquid and solid 4He". Journal of Low Temperature Physics. 11 (1–2): 33–52. Bibcode:1973JLTP...11...33G. doi:10.1007/BF00655035.
53. Henshaw, D. B. (1958). "Structure of Solid Helium by Neutron Diffraction". Physical Review Letters. 109 (2): 328–330. Bibcode:1958PhRv..109..328H. doi:10.1103/PhysRev.109.328.
54. Lide, D. R., ed. (2005). CRC Handbook of Chemistry and Physics (86th ed.). Boca Raton (FL): CRC Press. p. 6-120. ISBN 0-8493-0486-5.
55. Hohenberg, P. C.; Martin, P. C. (2000). "Microscopic Theory of Superfluid Helium". Annals of Physics. 281 (1–2): 636–705 12091211. Bibcode:2000AnPhy.281..636H. doi:10.1006/aphy.2000.6019.
56. Warner, Brent. "Introduction to Liquid Helium". NASA. Archived from the original on 2005-09-01. Retrieved 2007-01-05.
57. Fairbank, H. A.; Lane, C. T. (1949). "Rollin Film Rates in Liquid Helium". Physical Review. 76 (8): 1209–1211. Bibcode:1949PhRv...76.1209F. doi:10.1103/PhysRev.76.1209.
58. Rollin, B. V.; Simon, F. (1939). "On the "film" phenomenon of liquid helium II". Physica. 6 (2): 219–230. Bibcode:1939Phy.....6..219R. doi:10.1016/S0031-8914(39)80013-1.
59. Ellis, Fred M. (2005). "Third sound". Wesleyan Quantum Fluids Laboratory. Retrieved 2008-07-23.
60. Bergman, D. (1949). "Hydrodynamics and Third Sound in Thin He II Films". Physical Review. 188 (1): 370–384. Bibcode:1969PhRv..188..370B. doi:10.1103/PhysRev.188.370.
61. 61.0 61.1 Weiss, Achim. "Elements of the past: Big Bang Nucleosynthesis and observation". Max Planck Institute for Gravitational Physics. Retrieved 2008-06-23. ; Coc, Alain; Vangioni-Flam, Elisabeth; Descouvemont, Pierre; Adahchour, Abderrahim; Angulo, Carmen (2004). "Updated Big Bang Nucleosynthesis confronted to WMAP observations and to the Abundance of Light Elements". Astrophysical Journal. 600 (2): 544. Bibcode:2004ApJ...600..544C. arXiv:astro-ph/0309480Freely accessible. doi:10.1086/380121.
62. 62.0 62.1 Anderson, Don L.; Foulger, G. R.; Meibom, A. (2006-09-02). "Helium Fundamentals". Retrieved 2008-07-20.
63. Novick, Aaron (1947). "Half-Life of Tritium". Physical Review. 72 (10): 972–972. Bibcode:1947PhRv...72..972N. doi:10.1103/PhysRev.72.972.2.
64. Zastenker, G. N.; Salerno, E.; Buehler, F.; Bochsler, P.; Bassi, M.; Agafonov, Yu.N.; Eisomont, N. A.; Khrapchenkov, V. V.; et al. (2002). "Isotopic Composition and Abundance of Interstellar Neutral Helium Based on Direct Measurements". Astrophysics. 45 (2): 131–142. Bibcode:2002Ap.....45..131Z. doi:10.1023/A:1016057812964.
65. "Lunar Mining of Helium-3". Fusion Technology Institute of the University of Wisconsin-Madison. 2007-10-19. Retrieved 2008-07-09.
66. Slyuta, E. N.; Abdrakhimov, A. M.; Galimov, E. M. (2007). "The estimation of helium-3 probable reserves in lunar regolith" (PDF). Lunar and Planetary Science XXXVIII. Retrieved 2008-07-20.
67. Hedman, Eric R. (2006-01-16). "A fascinating hour with Gerald Kulcinski". The Space Review. Retrieved 2008-07-20.
68. Hiby, Julius W. (1939). "Massenspektrographische Untersuchungen an Wasserstoff- und Heliumkanalstrahlen (H+
, H
, HeH+
, HeD+
, He
)". Annalen der Physik. 426 (5): 473–487. Bibcode:1939AnP...426..473H. doi:10.1002/andp.19394260506.
69. Friedrich, Bretislav (8 April 2013). "A Fragile Union Between Li and He Atoms". Physics. 6: 42. doi:10.1103/Physics.6.42.
70. Wong, Ming Wah (2000). "Prediction of a Metastable Helium Compound: HHeF". Journal of the American Chemical Society. 122 (26): 6289–6290. doi:10.1021/ja9938175.
71. Grochala, W. (2009). "On Chemical Bonding Between Helium and Oxygen". Polish Journal of Chemistry. 83: 87–122.
72. "Collapse of helium's chemical nobility predicted by Polish chemist" (PDF). Archived from the original (PDF) on 2009-03-19. Retrieved 2009-05-15.
73. Saunders, Martin; Jiménez-Vázquez, Hugo A.; Cross, R. James; Poreda, Robert J. (1993). "Stable Compounds of Helium and Neon: He@C60 and Ne@C60". Science. 259 (5100): 1428–1430. Bibcode:1993Sci...259.1428S. PMID 17801275. doi:10.1126/science.259.5100.1428.
74. Saunders, Martin; Jiménez-Vázquez, Hugo A.; Cross, R. James; Mroczkowski, Stanley; Freedberg, Darón I.; Anet, Frank A. L. (1994). "Probing the interior of fullerenes by 3He NMR spectroscopy of endohedral 3He@C60 and 3He@C70". Nature. 367 (6460): 256–258. Bibcode:1994Natur.367..256S. doi:10.1038/367256a0.
75. Vos, W. L.; Finger, L. W.; Hemley, R. J.; Hu, J. Z.; Mao, H. K.; Schouten, J. A. (1992). "A high-pressure van der Waals compound in solid nitrogen-helium mixtures". Nature. 358 (6381): 46. doi:10.1038/358046a0.
76. Dong, Xiao; Oganov, Artem R. (25 April 2014). "Stable Compound of Helium and Sodium at High Pressure". arXiv:1309.3827Freely accessible.
77. Oliver, B. M.; Bradley, James G. (1984). "Helium concentration in the Earth's lower atmosphere". Geochimica et Cosmochimica Acta. 48 (9): 1759–1767. Bibcode:1984GeCoA..48.1759O. doi:10.1016/0016-7037(84)90030-9.
78. "The Atmosphere: Introduction". JetStream – Online School for Weather. National Weather Service. 2007-08-29. Archived from the original on January 13, 2008. Retrieved 2008-07-12.
79. Lie-Svendsen, Ø.; Rees, M. H. (1996). "Helium escape from the terrestrial atmosphere: The ion outflow mechanism". Journal of Geophysical Research. 101 (A2): 2435–2444. Bibcode:1996JGR...101.2435L. doi:10.1029/95JA02208.
80. Strobel, Nick (2007). "Atmospheres". Nick Strobel's Astronomy Notes. Retrieved 2007-09-25.
81. G. Brent Dalrymple. "How Good Are Those Young-Earth Arguments?".
82. Cook, Melvine A. (1957). "Where is the Earth's Radiogenic Helium?". Nature. 179 (4552): 213. Bibcode:1957Natur.179..213C. doi:10.1038/179213a0.
83. Aldrich, L. T.; Nier, Alfred O. (1948). "The Occurrence of He3 in Natural Sources of Helium". Phys. Rev. 74 (11): 1590–1594. Bibcode:1948PhRv...74.1590A. doi:10.1103/PhysRev.74.1590.
84. Morrison, P.; Pine, J. (1955). "Radiogenic Origin of the Helium Isotopes in Rock". Annals of the New York Academy of Sciences. 62 (3): 71–92. Bibcode:1955NYASA..62...71M. doi:10.1111/j.1749-6632.1955.tb35366.x.
85. Zartman, R. E.; Wasserburg, G. J.; Reynolds, J. H. (1961). "Helium Argon and Carbon in Natural Gases". Journal of Geophysical Research. 66 (1): 277–306. Bibcode:1961JGR....66..277Z. doi:10.1029/JZ066i001p00277.
86. Broadhead, Ronald F. (2005). "Helium in New Mexico – geology distribution resource demand and exploration possibilities" (PDF). New Mexico Geology. 27 (4): 93–101. Retrieved 2008-07-21.
89. Cai, Z.; et al. (2007). Modelling Helium Markets (PDF). University of Cambridge. Archived from the original (PDF) on 2009-03-26. Retrieved 2008-07-14.
90. Helium (PDF). Mineral Commodity Summaries. U.S. Geological Survey. 2009. pp. 74–75. Retrieved 2009-12-19.
91. Air Liquide and Linde in Helium Hunt as Texas Reserves Dry Up, Bloomberg, 2014 [1]
92. Pierce, A.P., Gott, G.B., and Mytton, J.W., Uranium and Helium in the Panhandle Gas Field Texas, and Adjacent Areas,Geological Survey Professional Paper 454-G, Washington:US Government Printing Office, 1964
93. Air Liquide and Linde in Helium Hunt as Texas Reserves Dry Up, Bloomberg, 2014 [2]
94. Belyakov, V.P.; Durgar'yan, S. G.; Mirzoyan, B. A. (1981). "Membrane technology—A new trend in industrial gas separation". Chemical and Petroleum Engineering. 17 (1): 19–21. doi:10.1007/BF01245721.
95. Committee on the Impact of Selling, Table 4.2
96. Committee on the Impact of Selling, see page 40 for the estimate of total theoretical helium production by neon and liquid air plants
97. Dee, P. I.; Walton E. T. S. (1933). "A Photographic Investigation of the Transmutation of Lithium and Boron by Protons and of Lithium by Ions of the Heavy Isotope of Hydrogen". Proceedings of the Royal Society of London. 141 (845): 733–742. Bibcode:1933RSPSA.141..733D. doi:10.1098/rspa.1933.0151.
98. Connor, Steve (2010-08-23). "Richard Coleman campaigning against US Congress' decision to sell all helium supplies by 2015". London: Retrieved 2010-11-27.
99. Nuttall, William J.; Clarke, Richard H.; Glowacki, Bartek A. (2012). "Resources: Stop squandering helium". Nature. 485 (7400): 573–575. Bibcode:2012Natur.485..573N. PMID 22660302. doi:10.1038/485573a.
100. 100.0 100.1 U.S. Department of the Interior, U.S. Geological Survey (2015). "Helium" (PDF). Mineral Commodity Summaries 2014. pp. 72–73.
102. Beckwith, I.E.; Miller, C. G. (1990). "Aerothermodynamics and Transition in High-Speed Wind Tunnels at Nasa Langley". Annual Review of Fluid Mechanics. 22 (1): 419–439. Bibcode:1990AnRFM..22..419B. doi:10.1146/annurev.fl.22.010190.002223.
103. Morris, C.I. (2001). Shock Induced Combustion in High Speed Wedge Flows (PDF). Stanford University Thesis. Archived from the original (PDF) on 2009-03-04.
104. 104.0 104.1 Considine, Glenn D., ed. (2005). "Helium". Van Nostrand's Encyclopedia of Chemistry. Wiley-Interscience. pp. 764–765. ISBN 0-471-61525-0.
105. Hablanian, M. H. (1997). High-vacuum technology: a practical guide. CRC Press. p. 493. ISBN 0-8247-9834-1.
106. Ekin, Jack W. (2006). Experimental Techniques for Low-Temperature measurements. Oxford University Press. ISBN 0-19-857054-6.
107. Fowler, B; Ackles, KN; G, Porlier (1985). "Effects of inert gas narcosis on behavior—a critical review". Undersea Biomedical Research Journal. 12 (4): 369–402. PMID 4082343. Retrieved 2008-06-27.
108. Thomas, J. R. (1976). "Reversal of nitrogen narcosis in rats by helium pressure". Undersea Biomed. Res. 3 (3): 249–59. PMID 969027. Retrieved 2008-08-06.
109. Hunger, Jr., W. L.; Bennett, P. B. (1974). "The causes, mechanisms and prevention of the high pressure nervous syndrome". Undersea Biomed. Res. 1 (1): 1–28. ISSN 0093-5387. OCLC 2068005. PMID 4619860. Retrieved 2008-04-07.
110. Rostain, J. C.; Gardette-Chauffour, M. C.; Lemaire, C.; Naquet, R. (1988). "Effects of a H2-He-O2 mixture on the HPNS up to 450 msw". Undersea Biomed. Res. 15 (4): 257–70. OCLC 2068005. PMID 3212843. Retrieved 2008-06-24.
111. Butcher, Scott J.; Jones, Richard L.; Mayne, Jonathan R.; Hartley, Timothy C.; Petersen, Stewart R. (2007). "Impaired exercise ventilatory mechanics with the self-contained breathing apparatus are improved with heliox". European Journal of Applied Physiology. Netherlands: Springer. 101 (6): 659–69. PMID 17701048. doi:10.1007/s00421-007-0541-5.
112. Belcher, James R.; Slaton, William V.; Raspet, Richard; Bass, Henry E.; Lightfoot, Jay (1999). "Working gases in thermoacoustic engines". The Journal of the Acoustical Society of America. 105 (5): 2677–2684. Bibcode:1999ASAJ..105.2677B. PMID 10335618. doi:10.1121/1.426884.
113. Makhijani, Arjun; Gurney, Kevin (1995). Mending the Ozone Hole: Science, Technology, and Policy. MIT Press. ISBN 0-262-13308-3.
114. HGST balloons disk capacity with helium-filled 6TB drive | Ars Technica
115. Jakobsson, H. (1997). "Simulations of the dynamics of the Large Earth-based Solar Telescope". Astronomical & Astrophysical Transactions. 13 (1): 35–46. Bibcode:1997A&AT...13...35J. doi:10.1080/10556799708208113.
116. Engvold, O.; Dunn, R.B.; Smartt, R. N.; Livingston, W. C. (1983). "Tests of vacuum VS. helium in a solar telescope". Applied Optics. 22 (1): 10–12. Bibcode:1983ApOpt..22...10E. PMID 20401118. doi:10.1364/AO.22.000010.
117. "LHC: Facts and Figures" (PDF). CERN. Archived from the original (PDF) on 2011-07-06. Retrieved 2008-04-30.
118. Ackerman MJ; Maitland G (1975). "Calculation of the relative speed of sound in a gas mixture". Undersea Biomed Res. 2 (4): 305–10. PMID 1226588. Retrieved 2008-08-09.
119. "Why does helium make your voice squeaky?". 2000-07-14. Retrieved 2013-06-08.
120. 120.0 120.1 Grassberger, Martin; Krauskopf, Astrid (2007). "Suicidal asphyxiation with helium: Report of three cases Suizid mit Helium Gas: Bericht über drei Fälle". Wiener Klinische Wochenschrift (in German and English). 119 (9–10): 323–325. PMID 17571238. doi:10.1007/s00508-007-0785-4.
121. 121.0 121.1 121.2 121.3 Montgomery B.; Hayes S. (2006-06-03). "2 found dead under deflated balloon". Tampa Bay Times.
122. 122.0 122.1 "Two students die after breathing helium". CBC. 2006-06-04.
123. 123.0 123.1 "Helium inhalation – it's no laughing matter – Article courtesy of BOC Gases". Balloon Artists & Suppliers Association of Australasia Ltd.
124. 124.0 124.1 "Dangers of Helium Inhalation". Lou's Balloons.
125. 125.0 125.1 "Helium Gas Safety & Data Sheet". bouncetime.
126. 126.0 126.1 Engber, Daniel (2006-06-13). "Stay Out of That Balloon!". Retrieved 2008-07-14.
127. Josefson, D (2000). "Imitating Mickey Mouse can be dangerous". BMJ: British Medical Journal. 320 (7237): 732. PMC 1117755Freely accessible. PMID 10720344.
128. "Teen Dies After Inhaling Helium". KTLA News. RIVERSIDE: January 6, 2010. Archived from the original on 2012-01-09. Retrieved 2010-11-19.
129. "Tributes to 'helium death' teenager from Newtownabbey". BBC Online. 19 November 2010. Retrieved 2010-11-19.
130. Mather, Kate (2012-02-24). "Parents of Eagle Point girl who died from inhaling helium hope to save others from same fate". The Oregonian. Retrieved 2013-06-08.
131. Barnard, Jeff (2012-02-22). "Ashley Long, Oregon Teenager, Dies After Inhaling Helium At Wild Party (VIDEO)". Huffington Post.
132. Reilly, Jill (2012-02-23). "Family's fury as girl, 14, dies in horrific accident after inhaling helium at party". Daily Mail. London.
135. "テレ朝事故で分かったヘリウム変声缶の危険性 意識を失うケースの大半が子ども" (in Japanese). 2015-02-05. Retrieved 2015-02-05.
136. Rayman, Noah (2015-02-05). "J-Pop Teen Star Left in Coma After Inhaling Helium for TV Stunt". Time. Retrieved 2015-02-06.
137. "アイドルが収録中に倒れ病院搬送 テレ朝、ヘリウムガス吸引" (in Japanese). 2015-02-04. Retrieved 2015-02-04.
"テレビ番組収録中、12歳アイドルが意識失い救急搬送 ヘリウムガスが原因か" (in Japanese). 2015-02-04. Retrieved 2015-02-04.
"テレ朝謝罪、12歳アイドルがヘリウム吸い救急搬送" (in Japanese). 2015-02-04. Retrieved 2015-02-04.
"3b Junior idol in coma after inhaling helium on TV Asahi program". 2015-02-04. Retrieved 2015-02-04.
"アイドル救急搬送騒動で制作会社が実績削除の不可解" (in Japanese). 2015-02-04. Retrieved 2015-02-04.
138. "BBC News - Japanese child star in coma after helium stunt goes wrong". BBC. 2015-02-05. Retrieved 2015-02-06.
139. Rostain J.C.; Lemaire C.; Gardette-Chauffour M.C.; Doucet J.; Naquet R. (1983). "Estimation of human susceptibility to the high-pressure nervous syndrome". J Appl Physiol. 54 (4): 1063–70. PMID 6853282. Retrieved 2008-08-09.
140. Hunger, Jr., W. L.; Bennett., P. B. (1974). "The causes, mechanisms and prevention of the high-pressure nervous syndrome". Undersea Biomed. Res. 1 (1): 1–28. OCLC 2068005. PMID 4619860. Retrieved 2008-08-09.
• Bureau of Mines (1967). Minerals yearbook mineral fuels Year 1965. II. U. S. Government Printing Office.
• Committee on the Impact of Selling the Federal Helium Reserve, Commission on Physical Sciences, Mathematics, and Applications, Commission on Engineering and Technical Systems, National Research Council (2000). The Impact of Selling the Federal Helium Reserve. The National Academies Press. ISBN 0-309-07038-4. Retrieved 2010-04-02.
• Emsley, John (1998). The Elements (3rd ed.). New York: Oxford University Press. ISBN 978-0-19-855818-7.
• Vercheval, J. (2003). "The thermosphere: a part of the heterosphere". Belgian Institute for Space Aeronomy. Archived from the original on 2005-01-01. Retrieved 2008-07-12.
External links
More detail
Helium shortage |
Dr Green
Why are there flies surrounding my plant?
Dr Green
Words by Dr Green
Photos by Jaap Scheeren
Hey Doc,
I’ve noticed my plants have been attracting the attention of dozens of tiny little black flies. They are so annoying. Why are they here and how can I get rid of them?
Hi Lucy,
I’m glad you’ve asked this question as your problem is a common one. The tiny little flies you are referring to are called fungus gnats – also known as sciarid flies – and they tend to gather around plants for the duration of their (thankfully) very short 4-6 day lifespan. But the flies are actually the least of your worries. It’s the larvae they lay in the soil which feed off your plant’s roots that will cause you problems. They can even be deadly for younger, more vulnerable plants. There are various ways you can tackle and prevent this issue.
Start by replacing the soil with fresh peat-free compost and add 2cm of pebbles/grit/gravel to the top of the soil. This will make it less hospitable for larvae to grow (and it can even look quite nice!). Actively remove any decaying foliage from your plants and allow the soil to dry up between watering as the flies are particularly attracted to bacteria and moist environments. Place sticky traps around the house to catch adult flies, this will also catch fruit flies and other pesky winged creatures in your home.
And voila! You’re on your way to a gnat-free household. You’ll probably need to deal with a few generations of gnats from the previously laid larvae so don’t be disheartened if they seem to persist for a few weeks.
The Doc x
P.S. Please avoid pesticide! This can be incredibly harmful stuff, so unless you own an organic pesticide or a special type that has been recommended by a trusty source, try to stay away.
Got a question of your own? Ask the doctor: drgreen@letitgrow.org
Here to solve all your plant problems
Are my houseplants poisonous? |
Encyclopedia of Lakes and Reservoirs
2012 Edition
| Editors: Lars Bengtsson, Reginald W. Herschy, Rhodes W. Fairbridge
Water Balance of Lakes
• Lars Bengtsson
Reference work entry
DOI: https://doi.org/10.1007/978-1-4020-4410-6_18
The most basic in river basin hydrology is the water balance – and so it is for lakes. Most lakes have outflows, but some of the most famous lakes of the world are terminal lakes with no outflow, for example, the Caspian Sea, Lake Chad, and the Dead Sea. The water level in the overflowing lakes is rather stable, while the water level in the terminal lakes varies with the climate. In some lakes with small upstream catchment, the inflow to the lake is dominated by the precipitation on the lake, but usually inflow rivers are the dominating source of inflow to a lake. Some lakes only have subsurface inflow, but in most lakes, the most important inflow is from rivers. There also exist kettle lakes, which are part of the groundwater system with only subsurface inflow and outflow.
The water balance of a lake is
$$\begin{array}{lll} \frac{{dVOl}}{{dt}} & = A(h)\frac{{dh}}{{dt}}\\ & = {Q_{\rm{in}}} - {Q_{\rm{out}}}(h) + {Q_{\rm{gwin}}} -{Q_{\rm{gwout}}} + (P - E)\,A(h) \end{array}$$
1. Belyaev, A. V., 1991. Changes in the level of the Caspian Sea and Aral Sea. In Schiller, G., Lemmelä, R., and Spreafico, M. (eds.), Hydrology of Natural and Manmade Lakes. Wallingford: IAHS, Vol. 206, pp. 45–54.Google Scholar
2. Croley, T. E., and Lewis, C. F. M., 2008. Warmer and drier climates that make Lake Huron into a terminal lake. Aquatic Ecosystem & Health, 11, 153–160.Google Scholar
3. Harlin, J., 1989. Proposed Swedish spillway design guidelines compared with historical flood marks at Lake Siljan. Nordic Hydrology, 20, 293–304.Google Scholar
4. Street, F. A., 1980. The relative importance of climate and hydrogeological factors in influencing lake-level fluctuations. Palaeoecology of Africa, 12, 137–158.Google Scholar
5. Szestay, K., 1974. Water balance and water level fluctuations of lakes. Hydrological Sciences Bulletin, 19, 73–84.Google Scholar
6. Yin, X., and Nicholson, Sh. E., 1998. The water balance of Lake Victoria. Hydrological Sciences Journal, 43, 789–811.Google Scholar
Copyright information
© Springer Science+Business Media B.V. 2012
Authors and Affiliations
1. 1.Department of Water Resources EngineeringLund UniversityLundSweden |
The Seventy Weeks Of Daniel
By: Mark Tabata (Evangelist)
One of the greatest evidences that the Bible is the Word of God comes from prophecy and fulfillment.
Several times in the Old Testament, God’s Prophets challenged the prophets of the false gods to prove their credentials. Time after time, the Prophets challenged the pagans to show the future as evidence that their “gods” were truly Divine:
Isaiah 45:21-Tell and bring forth your case; Yes, let them take counsel together. Who has declared this from ancient time? Who has told it from that time? Have not I, the LORD? And there is no other God besides Me, A just God and a Savior; There is none besides Me.
In this article, we are going to notice one of the most profound prophecies in the Word of God: the seventy weeks of Daniel.
The Context
At three different times, the people of Judah had been taken captive to the land of Babylon: in the years 606, 597, and 586 B.C. Daniel was one of the young captives taken in 606.
However, God was faithful to His people; and even when the trials of life were ready to destroy the saints, the Lord was with them.
God had decreed that the people of Israel would be in captivity for seventy years (Jeremiah 29:10); and in 538 B.C., Daniel (recognizing that the time was near for his people to return to their land) began to pray for the Hebrews.
For 21 days, he intercedes to the Lord for the Hebrews (Daniel 10:13); and then the angel Gabriel brings a message to him.
The Prophecy
The angel tells Daniel about the coming of the Messiah. He declares:
Let’s carefully examine this prophecy.
The Meaning Of “Weeks” Or “Sevens”
The text tells us that there is a period of seventy “weeks” or “sevens.”
What does this mean?
Often when God speaks of national judgment and prophecy in the Scriptures, a “day” is used to stand for a “year.”
For example, when the people of Israel were condemned to wander in the wilderness for forty years, it was in direct relationship to how the spies had spent forty days in the land. We are told:
Later, the Prophet Ezekiel (who was contemporary with Daniel and Jeremiah) received instruction to lie on his side for several days.
Why did God command him to do this?
Thus, Daniel (understanding the symbolic significance of “a day for a year” formula in the Prophetic Scriptures) would have understood that this was a prophecy of 490 years.
Josh McDowell provides some very important relevant information regarding the duration of these events as well:
“1. The Hebrew word for “week” is shabua and literally means a “seven.” (We should disassociate any English concept of week with the concept intended by Gabriel.) Then, in Hebrew, the idea of 70 weeks is “seventy sevens.” 2. The Jews were familiar with a “seven” of both days and years. “It was, in certain respects, even more important.” 22/13 3. Leviticus 25:2-4 illustrates the above fact. Leviticus 25:8 shows that there was a multiple of a week of years. Remembering what has been said previously, there are several reasons for believing that the 70 weeks mentioned in Daniel are 70 sevens of years. 1. Daniel had been thinking in terms of years and multiples of seven earlier in the chapter (Daniel 9:1,2). 2. Daniel knew that the Babylonian captivity was based on violation of the Sabbatic year, and since they were in captivity for 70 years, evidently the Sabbatic year was violated 490 years (Leviticus 26:32-35; II Chronicles 36:21 and Daniel 9:24). 3. The context is consistent and makes sense when we understand the 70 weeks as years. 4. Shabua is found in Daniel 10:2,3. Context demands it to mean “weeks” of days. It is literally “three sevens of days.” If Daniel meant days in 9:24-27, why don’t we find the same form of expression as that in chapter 10? Obviously, years are meant in chapter 9.” (Josh McDowell, Evidence That Demands A Verdict: Volume One-Historical Evidences For The Christian Faith, 171 (Kindle Edition); Nashville, TN: Thomas Nelson Publishers)
The Ultimate Focus Of The Prophecy
The angel makes it clear to Daniel that the primary reason for the prophecy is to instruct the people regarding the arrival of the Messiah.
Throughout the Old Testament, the Prophets of God had looked forward to the day when the Anointed Prince of God would arrive and deliver people from sin. It has been estimated that there are between one hundred to four hundred prophecies in the Old Testament regarding this Chosen One of God.
While some people in our day and age would rather believe there was no personal Messiah promised (usually because they do not want to accept that Jesus is the Messiah), the evidence from the Scriptures (as well as from the ancient Rabbinic commentaries on the Scriptures) confirm that the expectation was quite high for the Lord to send His Prince:
“But though the name is of later origin, the idea of a personal Messiah runs through the Old Testament. It is the natural outcome of the prophetic future hope….The ideal king to whom Isaiah looks forward will be a scion of the stock of Jesse, on whom will rest the spirit of God as a spirit of wisdom, valor, and religion, and who will rule in the fear of God, his loins girt with righteousness and faithfulness (xi. 1-3a, 5). He will not engage in war or in the conquest of nations; the paraphernalia of war will be destroyed (ix. 4); his sole concern will be to establish justice among his people (ix. 6b; xi. 3b, 4)….As evidence that in the Roman period the Messianic hope had become universal among the Jews may be adduced: (1) Jesus’ conviction that he was the Messiah, a conviction inspired in him by the current belief in a Messiah, as is shown by the fact that on his entry into Jerusalem the populace hailed him as such; (2) the testimony of Josephus (” B. J.” vi. 5, § 4), Tacitus (” Hist.” v. 13), and Suetonius (Vespasian, iv.) regarding the Messianic belief of the Jewish people at that time; (3) the fact that even in Philo’s picture of the future, in spite of its moralistic tendency, the Messianic king has a place (comp. “De Præmiis et Pœnis,” § 16). It may be noted in this connection that the “Prayer for the Coming of the Messiah,” as the version of it given both in the Babylonian and in the Palestinian recensions of the Shemoneh ‘Esreh shows (see Nos. 14 and 15 respectively), can not have become an integral part of the daily prayers later than the time immediately following the destruction of the Temple, for in that period the “Shemoneh ‘Esreh” received its present form. Hillel’s assertion (Sanh. 98b) that there would be no future Messiah for Israel since the latter had had its Messiah in the days of Hezekiah, can have no weight as a contrary argument, as Hillel lived in the reign of Herod the Great, at the beginning of the period which marks the development of the popular belief in the Messiah.” (Cyrus Adler, The Messiah In The Jewish Tradition, 33-173 (Kindle Edition); New York; Funk and Wagnalls)
Now, the Prophet Daniel will be told about the work of the Messiah, as well as when He will arrive.
The Work Of The Messiah
The Prophet is told several things regarding the work of the Messiah.
For starters, he is informed that the Messiah will arrive personally, at the appointed time, and that He will be “cut off” not for Himself, but for the people (Daniel 9:26).
The terminology “cut off” is interesting. Throughout the Old Testament, the phrase “cut off” had reference to one who was disgraced from the community, and who was usually killed (Exodus 12:15, 19; 30:33; Leviticus 7:20-21).
The text specifies that the Messiah would not be put to death for any personal wrongdoing (“not for Himself”), implying that He was killed for the wrongdoing of others (notice how this harmonizes with Isaiah 53 and Psalm 22).
This also harmonizes with the teaching that the Messiah will finish transgression, make an end of sins, make reconciliation for iniquity, and bring in everlasting righteousness (Daniel 9:24).
The idea of bringing a complete halt to the power of sin, and of completely reconciling mankind back to God (literally, “making friends again”) would be one of the most important works of the Messiah. Truly, the Messiah would bring in “everlasting righteousness!”
His Advent would also bring in the sealing of vision and prophecy, meaning that His Coming would gradually bring a complete cessation of miraculous revelation. This happened with the Coming of Christ (1 Corinthians 13:8-10), and was testified to by the second century century Christians after the completion of and general acceptance of the Bible (2 Timothy 3:16-17).
The phrase “to anoint the Most Holy” had reference to the coronation of a king. This was fulfilled when Jesus ascended to Heaven in the presence of several witnesses (Acts 1:9-11) and received His kingdom (Daniel 7:13-14).
Finally, the Messiah would bring an end to the Old Testament Law with its’ various sacrifices and offerings (Daniel 9:25).
The Divisions Of The Prophecy
Daniel is told that the 490 years are divided into three time-frames:
A period of 7 weeks (, 7×7=49 years);
A period of 62 weeks (62×7=434 years);
A period of 1 week (1×7=7 years).
The reasons for this threefold division of the 70 weeks will become apparent further in our study.
Now notice exactly WHEN the text says that the Messiah will emerge:
Daniel 9:25-“Know therefore and understand, That from the going forth of the command To restore and build Jerusalem Until Messiah the Prince, There shall be seven weeks and sixty-two weeks…
The Messiah would arrive at the end of the 63rd week, I.e., 483 years from the starting point of the prophecy, and before the commencement of the final week.
The Starting Point Of The Prophecy
The starting point of the prophecy is said to commence when there is a command given to rebuild the city of Jerusalem (Daniel 9:25).
Notice that the text specifies that the command to restore and build Jerusalem will include the command to rebuild the city walls (Daniel 9:25).
Just as the Jews were captured at three different times, so they were returned to their land at three different times:
A Group Returned In 536 (Led By Zerubbabel)
A Group Returned In 457 (Led By Ezra)
A Group Returned In 444 (Led By
Now, which of these returns marked the starting point of the prophecy?
The answer lies in remembering that the commission for the return included the command to rebuild the temple walls (Daniel 9:25).
What was Zerubbabel commissioned to rebuild when he returned?
Zerubbabel was commanded to rebuild the Temple. There is no mention of his being ordered to rebuild the city walls.
Likewise, when we read from Nehemiah, we learn that he is exceedingly depressed and sorrowful as he hears that the city walls are not yet rebuilt in his day:
Now, it was common knowledge that Jerusalem had been destroyed decades earlier in the siege of king Nebuchadnezzar; yet Nehemiah’s response shows that he is grieved that the walls had not yet been rebuilt.
This implies that Nehemiah knew that someone had been ordered to build the walls, and that he was saddened when he heard that this had not yet been accomplished.
As Archer points out:
“The third decree is to be inferred from the granting of Nehemiah’s request by Artaxerxes I in 446 B.C., as recorded in Nehemiah 2: 5–8. His request was “Send me to Judah, to the city of my fathers’ tombs, that I may rebuild it.” Then we read, “So it pleased the king to send me, and I gave him a definite time [for my return to his palace]” (NASB). The king also granted him a requisition of timber for the gates and walls of the city. It should be noted that when Nehemiah first heard from his brother Hanani that the walls of Jerusalem had not already been rebuilt, he was bitterly disappointed and depressed—as if he had previously supposed that they had been rebuilt (Neh. 1: 1–4). This strongly suggests that there had already been a previous decree authorizing the rebuilding of those city walls. Such an earlier decree is found in connection with Ezra’s group that returned to Jerusalem in 457, the seventh year of Artaxerxes I.” (Gleason L. Archer, Jr., The New International Encyclopedia Of Bible Difficulties: Informed Answers To Your Most Troublesome Questions, 7614-7628 (Kindle Edition); Grand Rapids, Michigan; Zondervan)
Finally, please notice that Ezra is the only one who was actually commissioned to rebuild the city of Jerusalem, including the walls:
Thus, this prophecy began with the
commission given to Ezra, in 457 B.C.
Doing The Math
Starting with the year 457 B.C., we subtract the first division of the seventy weeks: 49 years. 457 minus 49 brings us to the year 408 B.C.
This is significant in that some Hebrew scholars believe that this was when the last Book of the Old Testament (Malachi) was written, and the Old Testament canon was completed.
From 408 B.C., we subtract the next section of weeks (434 years). Since we add a year to the count (because there is no year zero), what do we come up with? 408-434 brings us to the year A.D. 27.
Remember that Daniel had been told that when this point arrived (i.e., the 63rd week), the Messiah would arrive.
What happened in the year 27?
Archer again tells us:
“If, then, the decree of 457 granted to Ezra himself is taken as the terminus a quo for the commencement of the 69 heptads, or 483 years, we come out to the precise year of the appearance of Jesus of Nazareth as Messiah (or Christ): 483 minus 457 comes out to A.D. 26. But since a year is gained in passing from 1 B.C. to A.D. 1 (there being no such year as zero), it actually comes out to A.D. 27. It is generally agreed that Christ was crucified in A.D. 30, after a ministry of a little more than three years. This means His baptism and initial ministry must have taken place in A.D. 27—a most remarkable exactitude in the fulfillment of such an ancient prophecy. Only God could have predicted the coming of His Son with such amazing precision; it defies all rationalistic explanation.” (Gleason L. Archer, Jr., The New International Encyclopedia Of Bible Difficulties: Informed Answers To Your Most Troublesome Questions, 7639-7653 (Kindle Edition); Grand Rapids, Michigan; Zondervan)
Daniel’s prophecy provides an exact calendar for the Jewish people of when the Messiah would arrive!
Confirming The Covenant During The Final Week
We are taught about the final ‘week’ of seven years. Beginning at the 63rd week (or the 483rd year since the beginning of the prophecy in 457), we are told that the Messiah will “confirm the covenant” for the last week.
While Christ’s New Covenant was not established until He died on the cross (Hebrews 9:16-17), Jesus started teaching about it while He was alive.
Luke 16:16-The law and the prophets were until John. Since that time the kingdom of God has been preached, and everyone is pressing into it.
Yet notice that the text says that in the midst of the week, the Messiah would be cut off, even as He brings an end to the sacrificial Law of Moses (Daniel 9:26-27).
The “middle” of the week would be 3 1/2 years.
Isn’t it fascinating that 3 1/2 years into His ministry, Jesus was crucified (Luke 3:23)?
Furthermore, the Bible makes it clear that when Jesus died at Calvary, He “brought an end” to the Law of Moses with all of its’ animal sacrifices and regulations (Colossians 2:14; Ephesians 2:15; Romans 7:4; Hebrews 10:9-10).
However, it is also worth pointing out that the text says the Messiah would confirm the covenant for the full seven years.
But if the Messiah was to be killed halfway through the final week, how could He continue to confirm the covenant?
The only way would be if He came back to life AFTER His death (which is exactly what He did-1 Corinthians 15:1-8).
As such, there is contained within this Scripture the prophecy of the Messiah’s death, as well as His resurrection from the dead.
The Prince To Come
Daniel is also told that the city of Jerusalem would again be destroyed, and that the determination to destroy the city would be made within the seventy weeks.
Now, please notice: Daniel does not say that the city would be destroyed DURING the seventy weeks; but rather, he is told that the DETERMINATION that the city would be destroyed is made during the seventy weeks.
“It should be pointed out that the prophecy does not say that the city would be destroyed within the span of the one week. Rather, it says that within that week the destruction of the city was determined. One could hardly read verses 26 and 27 without recalling our Lord’s words: ‘Behold, your house is left unto you desolate’ (Mt. 23:38).” (Roy Deaver, ‘Matthew Twenty-Four,’ in Wendell Winkler, Premillennialism: True Or False? 109; Tuscaloosa, Alabama; Winkler Publications Inc.).
We read in the prophecy that there would be a terrible leader who would destroy the city of Jerusalem. Further, the destruction of the city would involve the “abomination of desolation.”
An “abomination” had reference especially to a religious evil. The word “desolation” meant something which was left empty or destroyed.
Thus, this religious desecration would bring about the destruction.
Do we know what the abomination of desolation is?
Fortunately, Jesus makes it very clear.
While the Lord was describing the judgment of Jerusalem for its’ sins (Matthew 23:36-24:34), He instructed His followers to watch for this “abomination of desolation:”
Matthew 24:15-Therefore when you see the ‘ABOMINATION OF DESOLATION,’ spoken of by Daniel the prophet, standing in the holy place” (whoever reads, let him understand),
Mark 13:14-So when you see the ‘ABOMINATION OF DESOLATION,’ spoken of by Daniel the prophet, standing where it ought not” (let the reader understand), “then let those who are in Judea flee to the mountains.
Luke makes it absolutely clear what this abomination of desolation is:
The “abomination of desolation” had reference to the armies of the Roman Empire.
In the year 70 A.D., these armies stood where they should not have (i.e., within the city of Jerusalem and the Temple), and brought about the destruction of the Jewish economy and system.
The prophecy of the seventy weeks of Daniel speaks to us of the inspiration of the Word of God, and reveals an incredible and staggering depth of wisdom from the eternal Creator.
This prophecy points towards the Messiah of God Who sacrificed everything to reopen the doorway of friendship between the holy God and fallen man.
How conclusive are the evidences that Jesus Christ is the Son of God?
Former atheist Ralph Muncaster examines thirty of the prophecies of the Messiah and mathematically works out the odds of just these thirty coming to pass randomly:
“The cumulative probability of all these prophecies randomly coming true in one person would be 1 chance in 10110. This would be like winning about 16 lotteries in a row. Even if a skeptic were to substantially reduce some of the above estimates, the result would still be deemed impossible. For example, let’s very conservatively assume the above estimates are off by a factor of a trillion trillion! This would still result in the “impossible odds” of all prophecies coming true in one man-Jesus-of one chance in 1086! How remote are these odds? They would still be like taking all of the matter in the entire universe (that is, one billion billion stars and solar systems) and breaking it all down into subatomic particles, and randomly selecting one marked electron! Truly the prophecies made about Jesus in the Old Testament alone verify the Bible’s claims about him, and his claims about himself.” (Ralph Muncaster, Examine The Evidence: Exploring The Case For Christianity, 355; Eugene Oregon; Harvest House Publishers)
Friends, the Bible is the Word of God, and Jesus Christ is His Son!
The God of Heaven loves you so very much that He sent His own precious Son to die on the cross of Calvary to pay for the debt of your sins (John 3:16; Hebrews 2:9). Jesus came to the world, ready to sacrifice Himself to save you from eternal Hell (John 10:17-18; 2 Corinthians 8:9). He died for us, was buried, and arose again the third day (1 Corinthians 15:1-8).
He invites believers to repent of their sins and to be baptized into Him for the remission of sins (Acts 2:37-38). Why not obey His invitation today? If you are a child of God who has left the Lord in sin-why not come back to Him by repenting of sin and praying to Him (1 John 1:9; Revelation 3:20)? Your brethren stand ready to assist you.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s |
7 Ways Alcohol Affects Your Health
An apple a day keeps the doctor away, but what about a beer a day? Or for that matter, a glass of wine or even a shot of hard liquor?
It's well-established that drinking too much, even every once in a while, is bad for you, but there's often uncertainty regarding how moderate drinking affects health. There are some negatives, and some positives, so decisions about whether to drink really depend on people's individual situations, said Dr. Sam Zakhari, the director of the metabolism and health effects at the National Institute of Alcohol Abuse and Alcoholism.
But first, establishing what "moderate drinking" means is key for anyone looking for health benefits associated with alcohol, Zakhari said. For men, moderation means no more than two drinks a day, while for women, moderation means no more than one drink a day. Zakhari emphasized that drinking seven drinks in one day, and not drinking the rest of the week, will have dramatically worse effects on health, even though it averages to the same levels of consumption.
According to Dr. Robert Gish, of the University of California, San Diego School of Medicine, moderate levels can be a bit higher daily, at one and a half drinks for women and two to three drinks daily for men. But it's important to take a couple days off each week from drinking at all, Gish said.
Even though drinking at moderate levels has some benefits, as soon as people start drinking more than the recommended amounts, benefits diminish quickly, and problems arise, Gish said.
"If you tell people they can have a drink, or a drink and a half a day, they tend to overconsume," Gish said.
Zakhari noted that one drink is equal to one bottle of beer, one glass of wine or one shot of liquor. Drinking a large glass of wine counts as two drinks, not one. But, he added, because the benefit is from the alcohol itself, positive results can come from habitual, moderate consumption of any of these types of alcohol.
"A drink is a drink is a drink," he said.
Here are some of the health effects of moderate drinking — there are some benefits, but also some harms.
Decreases risk of heart disease and heart attack
When consumed in low doses, alcohol can reduce blood pressure, though when consumed in excess, in can have the opposite effect.
Additionally, alcohol helps to clear fat from the arteries, and reduces the blood's tendency to clot, Zakhari said. These effects help to limit the chances of heart disease and heart attack. Inflamed arteries that block blood flow are problematic for the heart, as it doesn't receive the oxygen it needs. Alcohol consumption encourages smoother blood flow, thus lowering the risk of heart disease.
Red wine also has the added effect of lowering cholesterol levels, although that benefit is specific to that beverage, Gish noted.
Reduces risk of stroke
For the same reasons that moderate drinking can lower the risk of heart attack, it also reduces risk of certain types of stroke.
The most common type or stroke, called ischemic stroke, occurs when a vessel bringing blood to the brain gets "clogged," Zakhari said. "The alcohol helps the blood go to the brain, and therefore it reduces stroke."
The other type of stroke, hemorrhagic, occurs when blood seeps out of a brain blood vessel. Because alcohol thins blood, it actually makes this type of stroke worse, but because hemorrhagic strokes only account for 20 percent of all strokes, there is still a net benefit, Zakhari said.
A woman lays in bed, unable to fall asleep, looking at a clock.
How well you sleep at night
A glass of wine may be a pre-bedtime routine for some, but it's important to understand how the alcohol affects your sleep. For most people, one serving of alcohol before bed will have no effect on sleeping. But more than one drink might — alcohol helps people fall asleep, but makes it more likely they'll wake up during the night.
"You will sleep faster, but not better," because alcohol interferes with REM sleep, Zakhari said.
Additionally, people often use an alcoholic drink as a means to fall asleep, particularly if they've drank lots of caffeine during the day, Gish said. This combination may seem to work on the surface, but it is not a healthy in the long run, Gish said. He tells patients with sleep problems to cut all alcohol and caffeine out for two weeks to understand where the problems lay.
Slight diuretic effect
Alcohol is a diuretic, meaning that one of its effects is to encourage water to leave the body more quickly. Heavy drinkers can become dehydrated, and people tend to go to the bathroom frequently while drinking.
In modest amounts, this slight diuretic effect is not harmful, Zakhari said. However, if a person is already slightly dehydrated before having a drink, perhaps from heat or from working out, the effect will be more apparent.
The effect is strongest in beer, Gish said, and is less obvious for hard alcohol or wine.
Another reason why drinking alcohol is often associated with being dehydrated is that people tend to snack on salty foods when drinking, which contributes to dehydration, he noted.
Drinking Happy Friends
Enhances social interactions
While drinking too much is often has a detrimental impact on relationships, drinking moderately can often enhance social interaction, Zakhari said.
"It enhances cognition, so it makes people more convivial and enhances social interactions," he said. For people who drink in a bar, strangers often start conversations, and there are lots of jokes and laughs, he said.
However, the change in behavior can go both ways, Gish cautioned.
"A lot of believe that alcohol is psychotropic it changes people's mood states," he said. It can make them more pleasant, or more irritable, depending on the individual, he added.
Interferes with medications
Even at moderate levels, alcohol consumption can interfere with medications in possibly dangerous ways, Gish said. Alcohol is processed by the liver, and when alcohol and other compounds are present in the body, alcohol takes precedence.
This means that other medications which are also processed in the liver, will not be broken down as quickly, so people will feel their effects much more strongly.
"Tylenol is the safest pain medicine in the world, provided you stay at the limit," Gish said.
How much your children drink
Alcoholism is partly genetic, so family history is commonly associated with people's risk of the disease. However, whether you choose to drink can still affect your child's decision on imbibing, regardless of risk of alcoholism.
"If you grow up with parents who pray before dinner, you'll pray before dinner," Zakhari said, stating that the same situation occurs in children imitating how much their parents drink.
Choosing to drink moderately, however, can result in kids imitating such behavior later in life, so they could also benefit from the positive effects of alcohol.
Popular posts from this blog
6 Signs Your Vaginal Discharge Is Trying To Tell You
Turn Your Arm Into a Tablet With New Skin Deep Technology
Cape Town: expensive for accommodation, cheap for beer |
Belonging is an essential biological need for all social creatures. Our biology is such that, should we feel ostracised from our ‘group’ or a person we feel a belonging connection with, we biologically go in to a self destructive state which may also include a self destructive narrative (suicide & self harm), too. Or, alternatively, the inclination to harm or destroy others, often referred to as ‘psychopathy’*.
The stress hormone cortisol is released in large amounts as a response to a disconnection of belonging and if we experience that level for anything more than a fleeting duration, it becomes highly destructive to our biology and brain. Our biology requires a regular maintenance cycle, which on the whole occurs while we sleep, repairing and replacing cells, etc. This regular maintenance cycle is disrupted by cortisol (and lack of sleep). The result of such a disruption to our maintenance cycles can result in reduced immune functions and an increased susceptibility to all sorts of illnesses and disease. Stress allows cortisol through the blood brain barrier and if our neurons and their connections are exposed to high levels of cortisol for prolonged periods, the cortisol begins to destroy the protective myelin covering of those neurons and connections, and eventually damaging and killing those neurons and connections, essentially damaging our brain in ways that, over time, can be measureable. While there is, undoubtedly, a narrative element to depressive symptoms, there is also a biological response and an important part of that biology is the effect of elevated cortisol.
Elevated cortisol has a knock on effect with other hormones and neurotransmitters, reducing their effect by impacting upon and reducing the efficiency of their associated receptors. We are phylogenetically wired to make belonging connections through millions of years of evolution. Such wiring is sometimes referred to as a primary action tendency. What this means it that we are ‘born’ to form belonging connections. Leaving aside the prenatal (in the womb) environment developmental argument for a moment; we have a secondary action tendency that is learnt through experience and environment and that is one of survival and protection.
Our postnatal environments are an essential part of early learning. The infant brain and the path of its growth and the connections it makes in the first years of life are determined by the experiences and environments it finds itself in. Fearful environments cause the infant brain to develop in anticipation of those fearful environments being a constant throughout life. More developmental energy goes to parts of the brain like the amygdala and other areas associated with autonomous and instinctual protective mechanisms. Complex reasoning is not required for survival so areas still to develop like areas of the cortex, the hippocampus, and particularly the prefrontal cortex and anterior cingulated, and the connections between these areas experience a reduction in developmental energies. The consequence of this is you eventually end up with a person primed for fight or flight; they have an increased tendency to be argumentative, aggressive, violent, or, alternatively, they may have a tendency to run away from conflict, or both, and a reduced ability to control impulsive tendencies. Conceptually, the narrative of the early fearful experiences and environments also play a strong part in this secondary action tendency. What caused the initial fear is integrated in to the autonomous learning of the survival mechanisms. Implicit reminders of that fearful experience or environment will trigger survival behaviours (fight or flight) and the individual might be overwhelmed by the urge to attack or run away without being able to connect that feeling with their present situation. Such overwhelming compulsions without a present situation would cause an effect known as ‘cognitive dissonance’.
Cognitive dissonance is a highly unpleasant state, so we are wired with the inclination to avoid it at all costs. In the case of implicit reminders of fearful experiences or environments, a narrative will be assembled by processes in the brain that connect the implicit emotions of the reminder to something in the current environment, even if, as in neurotic states, this requires a total magnification or fabrication of a threat. So we come back to the primary action tendency of ‘belonging connections’; what happens if the primary action tendency and the secondary action tendency provide a source of internal conflict? What happens if something or more importantly someone, you have formed an important or essential belonging connection to becomes the source of danger? What happens when you implicitly learn to expect secondary danger from a primary belonging connection? What happens when belonging, rather than being implicitly perceived as a source of safety, is, instead, perceived as a source of life threatening danger? This is what occurs when a primary caregiver (mother, etc.) has caused a severe reaction from the secondary action tendency of survival. Bonding and belonging, in any meaningful way, are responded to with an overwhelming implicit survival reaction (fight or flight). Whether it be emotional or physical abuse, death of the connected person, or abandonment by the connection. The response to any subsequent belonging connection is to implicitly fear a repeat of the experience or environment and activate an implicit and autonomous survival reaction to destroy or escape the danger. So, the desire to form a belonging connection is there, but the act of developing that belonging in any meaningful way brings conflict and evasion tactics from the implicit defences. It may be that the desire to form the belonging connection gets stronger as a result of the repeated resistance and an escalation of the internal battle between love and fear, but it inevitably crashes in to the implicit danger response.
The escalation of the conflict between the desire to form a belonging connection, and the implicit response that the connection means danger is an essential ingredient of the dissonance and behaviours associated with the intense, desperate, manic and oppositional relational dynamics of the diagnosis of “Borderline Personality Disorder”, but it’s manifestation is not exclusive to the diagnosis. The implicitly held belief is that making a belonging connection will be a source of safety, but the reality is that any meaningful connection will trigger a course of events in the survival response designed to destroy that connection because that connection, in the fear centres of the brain, means danger.
*worth noting here that the word “psychopath” is not truly a medical term, but a criminal one. |
Happy Bastille Day! 5 French Inventors & Their Unique Inventions
Vive la France! Long live the country that brought us some fantastic French inventions.
Today we honor Bastille Day, the French national holiday which commemorates the beginning of the French Revolution dating back to July 14, 1789. On this historical day, French revolutionaries stormed and captured The Bastille prison, renounced their king’s power, and claimed their liberty.
Bastille Day marked a high point during the 18th century Industrial Revolution as French artists, craftsmen, and scientists contributed to some of the most inventive products and discoveries we still use today. Below we’ve rounded up 5 of our favorites to pay tribute to our fellow freedom fighters.
Celebrate France’s national holiday with these historical fun facts!
The Photograph
In the 1820s French inventor and army soldier Nicéphore Niépce was the first to make a permanent photographic image. Previously, Niépce experimented with other inventions including internal-combustion engine, called the Pyréolophore, to power a boat with his brother. In the 1810s, Niépce became fascinated with the popular art of Photolithography (also known as optical lithography in which a pattern is exposed to light), and began experimenting using images he collected from nature. Then in 1826 Niépce used a camera obscura to produce the first permanently fixed image of nature from his workroom window, using light-sensitive chemicals on a piece of metal. He continued this process solo until 1829 when he partnered with Louis-Jacques-Mandé Daguerre, who is credited with inventing the photographic process in 1839. We can thank them both for the evolution of still photographs that document the world around us.
The Bicycle
Cities around the world have embraced two-wheel transit in major ways. From the Dutch to the Vietnamese to New Yorkers, cycling has become the preferred mode of urban transportation. The French introduced us to the first wave of cycling with a chain that powered a bicycle in 1864, thanks to the work of several Frenchmen: J. F. Tretz, Pierre Michaux, and Pierre Lallement. Each contributed a distinct part to what is now the modern bicycle. Michaux was a blacksmith and baby carriage maker from Paris who began building bicycles with pedals in the early 1860s, adding on to the early designs of the velocipede. His son, Pierre Lallement, worked with him to create the first bicycle prototypes, later inventing a transmission with a rotary crank mechanism and pedals to attach to the front-wheel hub. Both Lallement and Michaux opened “Michaux and Company” in 1868 to mass produce their bicycles, continuing to advance their designs and materials, and further drive the bicycle craze around the world. Shortly after their success, J.F. Tretz built upon their pedal bicycles with a chain drive that enabled the front wheel to move.
Pierre Lallement Photo
French inventor Pierre Lallement riding a bicycle he invented, circa 1870. (Photo: Public domain via Wikimedia Commons)
The Pencil Sharpener
Bernard Lassimone Photo
Parisian mathematician Bernard Lassimone patented his invention of the first mechanical pencil sharpener in 1828.
Efficiency was key during the Industrial Revolution so as the world continued to develop, so did the need for quicker and better communication. Writing of course has been a part of human history since the very beginning, but it wasn’t until 1828 when writing tools gained a radical upgrade. In October of 1828 Parisian mathematician Bernard Lassimone patented his invention of the first mechanical pencil sharpener, doing away the need for knives to sharpen pencils by hand. His sharpener “employed small metal files set at 90 degrees in a block of wood and worked to scrape and grind the edges of the pencil’s tip.” Parisian newspaper, Le Constitutionnel, named Lassimone’s sharpener as the preferable way to sharpen pencils. Despite this endorsement, his invention failed to please the masses due to its reliance on manual twisting of the pencil by hand. A decade following Lassimone’s debut, Walter K. Foster (an American) entered the scene with a cone-shaped design which proved favorable for mass production at pencil factories, resulting in wider accessibility.
The Hair Dryer
Alexandre Godefroy Photo
Alexandre Godefroy invented the first hair dryer in 1888
French hairstylist Alexandre Godefroy invented the first hair dryer in 1888, hooking up the dome-like device to a heater that would send hot air to a woman’s head. His invention included “an escape valve for steam so women’s heads wouldn’t cook” but lacked airflow. In fact, in the early 20th century, ads and inventors urged women to attach a hair-drying hose to their vacuum cleaners’ exhaust, selling not only dry locks but also supreme efficiency. One 1926 patent offered a brush that could connect “to a suitable suction apparatus or blower whereby the dust and dirt may be carried off as the said brush is being used.” Until the 19th century, the only way to dry and style hair was to simply run a brush through one’s hair on a sunny or windy day. With Godefroy’s device, a large, noisy motor connected to tubes that pointed to one’s head and blew warm air, allowing for control of the heat directly to the hair.
The A-Line Dress
French designer Yves Saint Laurent’s Trapeze Line popularizes the A-line silhouette.
Legendary French designer and couture pioneer Yves Saint Laurent took the fashion world by storm with revolutionary concepts during the 20th century. The son of an insurance company manager, Yves Henri Donat Mathieu Saint Laurent left home at the age of 17 to work for the French designer Christian Dior. Though designing dresses for women (like his mother and sister) since his teens, it was at Dior that his fresh designs quickly gained notice and he began to carve his own path. In 1955, the term A-line was first used by Christian Dior, during Saint Laurent’s “Trapeze Line” collection featuring dresses flaring out dramatically from a fitted shoulder line. An A-line skirt (or dress) is fitted at the hips and gradually widens towards the bottom, resembling the capital letter A. His trapeze dresses became the “most wanted silhouette in Paris” and til this day, the A-line design is widely applied to not only skirts but dresses and coats as well. In 1983, he became the first living fashion designer to be given a solo exhibition at the Metropolitan Museum of Art.
From the Bio Archives: This article was originally published on July 14, 2015. |
Answers in Absurdity: Putting the Crazy in Creation Science
By BillyBob
The age of the earth is the key; if the earth is 4.55 billion years old, the Bible is refuted. No Adam, no Eve, no tree with tainted fruit; it becomes another turtles all the way down myth. Andrew Snelling being a true believer rises to the defense of the Bible, railing against the 4.55 billion year old earth he attempts to use rapid radioactive decay during Noah’s flood to prove the earth is 6,000 years old.
Evidence of hundreds of millions of years of radioactive decay exists in the geological record, Snelling admits this, but he has a solution, a massive increase in the rate of radioactive decay during Noah’s flood. He states in the above mentioned paper that rate of radioactive decay was increased up to a billion times. Why did the radioactive decay rates increase so dramatically? At 14:00 in Part 1 of his video “Radioactive and Radiocarbon Dating” he states
radioactive decays must have been grossly accelerated during one or more recent catastrophic geological events, especially during Noah’s flood. That makes sense. If we had catastrophic rock formation and other geological processes during the flood, why not catastrophic rates of radioactive decay.
Catastrophic geological events change the physical constants of the universe? Rocks crashing into each other on earth change physical constants? Can catastrophic geological events dramatically change the speed of light or the strength of the magnetic force? People actually sat and listened to this and did not pelt him with rotten vegetables? Tell me it is not so.
I do not know enough physics to try to guess what would happen to the universe if the forces that control radioactive decay were to change dramatically. Would there still be a universe as we know it? Maybe the universe would still be recognizable to us, but there are two other reasons that show how absurd Andrew Snelling’s hypothesis of “catastrophic rates of radioactive decay” is. I will use the time from the Cambrian until now, about 540 million years, for my calculations.
Every day we are exposed to radiation. Background radiation from radioactive decay is about 3mSv
(3 millisieverts) per year, and a fatal dose is about 8 sieverts. If the yearly dose were to be multiplied by 540 million during Noah’s flood, Noah and the animals would have glowed in the dark, but only for a very short time. Maybe the creationists have an out: a new interpretation of Genesis 6:14!
god noah-leadOops, even that does not save Noah. Every day we ingest Potassium-40 and Carbon-14 from our food. We are irradiated by these elements from within our own bodies.
Radioactive decay gives off heat. How much? An amazing amount. An article in Physics World estimated that that up to 20TW or almost half of 44TW of heat flowing from the earth’s interior comes from radioactive decay. Multiply by 540 million and Noah would be enduring one hell of a heat wave. It’s time to reread our bibles: Genesis 6:15 revisited.
god noah-asbestosNope, asbestos is not going to be up to the task!
Noah and his animals would have been first steamed, then roasted, and finally, carbonized in a few seconds.
Religion can delude people into believing utter nonsense. How could any educated man stand in front of an audience and sprout such nonsense? Why wasn’t the audience rolling on the floor laughing and yelling “POE, POE.” The earth must be ancient or we would have been roasted. Any attempt to prove the earth is young by dramatically changing the physical constants like the speed of light or radioactive decay rate is doomed by the physical consequences of the change. Creationists need to put a catastrophic increase in the rate of radioactive decay in the creationist dustbin along with an increase in the speed of light before too many people injure themselves laughing.
Possible Creationist Responses
It was 4400 years ago, so how do YOU know that increasing the decay rate 540 million times would create more heat and radiation, WERE YOU THERE?!! Using creationist, logic I could answer yes I was. I am big, moody and have a white beard-godly attributes; therefore, I am a god. WERE YOU THERE to say I wasn’t?
God siphoned off the heat for his hot tub.
GOD IN A HOT TUBGod used the radiation for his tanning bed.
TANNING BEDWould someone please check my math; the numbers seem so huge. If anyone has an idea what such a dramatic change in the radioactive decay rate would do to the universe, I would like to hear it.
One thought on “Answers in Absurdity: Putting the Crazy in Creation Science
1. I didn’t check your math but I have other comments to offer.
I find creationists use radioactivity the way 1950’s movies did. They are the macguffin of the YEC world. At the Muskoka Creationism conference of a few years back, Emil Silvestru invoked a ‘reset’ of radio-dates due to unnamed chemicals permeating the ocean floor rock.
I am glad you have recorded this specific event. I have been looking for a good response to the creationist claim, ‘Our natural laws are unchanging and only our God can explain that”. Seems God can explain them changing, too.
Leave a Reply
WordPress theme: Kippis 1.15 |
Author Options:
How can i assign a domain Name to a local IP address? Answered
What I am trying to do is network all of my computers in an intranet and I don't want to have to use an ip adress to access one computer from another in my intranet on a web browser.
By domain Name I mean like how Google has Google.com even though they have a different ip address.
Let me clarify what i want to do.
I want to be able to access any computer from another through a local intranet "web" adress like "Http://Computer1.com
This is for several reasons but one main reason is that i am planning on connecting a router to my intranet to allow my ipod to access my computers but the ipod doesnt use backslashes so i couldn't enter \\192.168.1...... or \\Computer1. I would have to enter something like Http://Computer1, hence why i want to do this.
I don't know How it works though
But, If you install Connectify and fling a file for the first time, it will set up a local domain. the domain name is the same as your pc's name. So if it's "\\ROCK\" now you can access it on http://rock/.
But remember connectify doesn't share files on port 80 or the ssl port 443. It uses some random port like 2987. This can be an advantage for you if you want to Use some Apache package like WAMP or Xampp.
If you want more help Mail me @ evilinfinite7@outlook.com
You're Welcome! :)
7 years ago
A domain is usually run by a domain server, its not something intended for small local networks. You can give your own network a name and have all your machines on it, that is easy, depending on the OS your using. (Something like "BobsShop") But with a domain each workstation logs on to the domain with the permission of the domain server. The server also set the security level and permissions that each registered user is assigned. So a domain is not what you are looking for. Also Windows XP home will not work on a domain, you need to have the pro version. I am not sure about Windows 7, anyway, that's another topic.
What you can do is create network drives that all the computers have access to as soon as they log onto the network. Network drives usually reconnect as soon as a network is restarted. Putting things like music files on a shared network drive would make them available to everyone with permission. You can even create a shortcut to the drive on your desktop. That way you are using the file explorer to brows the other computers and you don't need any kind of browser. You also don't need the IP's of any of the computers because the network drive software figures all that out for you.
As long as you keep the addresses in house, all you need to do is to configure each machine to get a static IP address in the (usually!) 192.168.1.* subnet from your router. Make sure each one has a different address (usually in the .2 through .126 range).
On each machine, you configure it with the hostname you want to reveal to the network (in /etc/hosts on a real operating system, or in whatever file Windoze uses), mapping the previously chosen static address to that name (along with the usual " localhost").
Your router itself will act as a DNS server, and make all of your machines' names visible to the others. Your router and machines should already be configured that way (so that the router can cache external hostname/IP mappings to reduce bandwidth).
Each machine name is set when windows is set up by default; nowadays its 'name of machine plus some random number' like Home-13115236.
It can be changed in computer properties in Windows, and from another machine on the network, that name = the ip address of the machine you want. Requires reboot to change.
. If you only have two or three machines and don't plan on changing the names very often, I'd go with orksecurity's HOSTS file suggestion. Goggle "Windows HOSTS file" for more info.
. If you have more machines or think you might change names frequently, I'd go with steveastrouk's suggestion of a local DNS. Once again, Google will help you find more info.
Or you can edit each machine's HOSTS file to set up local mappings from name to address.
That's why you need to run a DNS server somewhere in your intranet. |
What Is the Dark Web? Understanding the Internet’s Dark Side
You’ve seen the headlines, and you’ve read the scare stories. But what is the dark web, and should you take measures to protect yourself?
The dark web entered the public conscience in 2013, when notorious drug trafficking website the Silk Road was shut down by the FBI. Since then, the dark web has become emblematic of all of the worst things about the online world; drugs, weapons, and stolen credit card details were just some of the illicit wares that were readily available through this mysterious ‘other’ internet. But just what is the dark web? And are there measures you should be taking to protect yourself?
What Is the Dark Web?
It all started with the Tor anonymity network. In the mid-90s, the US Military developed Tor, or ‘The Onion Router’. Tor was used to allow intelligence agents to send communications completely anonymously, which was a key requirement for those operating in dangerous totalitarian states.
In order to further protect their intelligence agents, Tor was released by the US Military to the general public in order to hide their agents’ communications within the noise created by other users.
Since it was released to the general public, the Tor network has become a key component of the dark web. The dark web has gained increasing popularity amongst people wishing to keep their online presence and activities under wraps, whatever the reason.
How Does the Dark Web Work?
The dark web is generally accessed via the Tor browser. The Tor browser is an integrated package that includes the browser, along with the Tor networking layer with all the anonymity settings configured. Hackers may download the Tor networking layer on its own, for use with applications they use to hack whilst covering their sources.
At the most fundamental level, the dark web is a part of the internet that can’t be found through traditional search engines. To understand how this works, it’s probably worth going back to basics.
The term ‘the web’ (or ‘world wide web’) refers to a series of interconnected web pages. The actual connectivity between these webpages is provided by the communications network known as the internet. Confusingly, the term ‘the internet’ has come to have the broader meaning of the collective of both the communications network and all the associated content, including the world wide web.
The dark web is a series of interconnected web pages the same as the web, but it only exists inside the Tor network, accessed for the most part via the Tor browser. The Tor browser uses a series of proxy servers to route your web page requests, making your IP address impossible to identify or trace.
Although webpages hosted on the dark web appear very much like standard websites, they have the domain suffix ‘.onion’ and use scrambled names that are difficult to remember. What’s more, webpages hosted on the dark web often disappear and pop up again in completely different locations, if they appear again at all.
Browsing the dark web is a frustrating, disorienting experience. Search engines exist for the dark web, but they are fundamentally unreliable due to the transitory nature of most dark web content. If you do choose to download the Tor browser and explore the dark web, visitor discretion is very much advised.
Protect Yourself from the Dark Web’s Dangers
The truth is, the dark web isn’t dangerous in and of itself. It’s what goes on there that you should be aware of. Besides the ethical considerations of drug trafficking, it’s the trading of stolen credit card details, ransomware viruses, and cloud service usernames and passwords that should concern you and your business.
So how do you protect yourself? The best way is to implement security best practices throughout your business. Email security, web filtering, perimeter firewalls, and antivirus services should be underpinned by strong internal processes such as strong passwords, file sharing restrictions, device encryption, and mobile device management.
If you’re looking for some support when it comes to implementing IT security best practices, MMRIT can help. Our Cyber Security Services deliver end-to-end security to professional organisations, incorporating leading technology solutions, consultancy, and end user training. Contact us to learn more. |
Tundra Biome Project
By: Saydee west
Biome Description
The Tundra is located in the north pole on top of the world. It is really cold and really big.
Like Russia.It is Covered in ice looks really cool in the summer really tundra has no summer because it is always cold.Characteristics of Tundra
1. Extremely cold climate
2. Low biotic diversity
3. Simple vegetation structure
4. Limitation of drainage
5. Short season of growth and reproduction
6. Energy and nutrients in the form of dead organic material
7. Large population oscillations
Biotic Factors
Plant are protected by the ice because the disturbance of the soil.plants are put all together in rows\places.the snow covers the plants to protect them from the wind and cold airAll of the plants are adapted to sweeping winds and disturbances of the soil. Plants are short and group together to resist the cold temperatures and are protected by the snow during the winter. They can carry out photosynthesis at low temperatures and low light intensities. The growing seasons are short and most plants reproduce by budding and division rather than sexually by flowering. The fauna in the arctic is also diverse:. |
With bio-inspired design, better robot movement
Spanish researchers are using sophisticated, bio-inspired designs to help robots move more naturally. The secret: rhythmic impulses called "central pattern generators."
Spanish researchers are implementing ever-more sophisticated designs for robotic locomotion thanks to some inspiration from nature.
By deeply investigating the neural networks that control the legs of invertebrates such as crabs, lobsters and spiders, the scientists have discovered a rhythmic nerve impulse that dictates the gait of the animal.
The researchers then took these insights and applied them to the control systems of a robotic worm, which in turn more accurately mimics natural movement.
Fernando Herrero-Carrón, Francisco de Borja Rodríguez Ortiz and Pablo Varona say the rhythmic impulses, which they call "central pattern generators," or CPGs, help the body automate repetitive tasks.
Simply, CPGs are the body's physical "autopilot," allowing you to walk and talk at the same time.
The CPGs of invertebrates and how they generate rhythmic impulses are well understood by scientists because the animals' neural systems are relatively simple compared to other species.
But applying that knowledge to robotics is a different story.
Traditionally, engineers have defined a series of rules that dictate how the legs should operate. But the scientists say recording these impulses allow them to generate control sequences for artificial limbs without rules, allowing them to better cope with unexpected situations.
In other words: intelligence, at least on a basic level.
What's more, CPGs function as discrete circuits that can be strung together to create more complex systems -- allowing scientists to concentrate on individual limbs, rather than set rules that apply to a robot's overall movement.
The researchers applied the theory on a worm-like robot with eight sections. They developed the movement in a simulator, then downloaded the final product to the now-autonomous robot, which demonstrated in real life their bio-inspired approach.
Now, all they'll have to do is figure out a way for it to retain knowledge and continue learning once it's downloaded. I think there's a word for that: "evolution."
Watch the robotic worm in action:
Their research was published in the journal Bioinspiration and Biomimetics.
This post was originally published on Smartplanet.com |
Discovering ocean processes
The global ocean remains the least known component of our blue planet 'Earth', even though it extends to over 95% of the space in which life occurs and is a key planetary life support system.
From the beginning of our organisational history in 1884, a major strand of our research has therefore been to grow our fundamental knowledge of the physics, chemistry, geology, and biology of the marine environment. Blue skies discovery science remains a core component of our research.
A major strength of SAMS is our long established multidisciplinarity that allows us to work in-house across marine physics, chemistry, biology, geology and more recently social science and economics to study entire marine systems - such as the Arctic, the North Atlantic or the deep sea. We have a strong team of physical oceanographers that study how waters mix and currents flow. Our marine geologists, chemists and microbiologists study how important elements such as carbon, oxygen and nitrogen move through the ocean and between marine life and water, atmosphere, cyrosphere and the seabed. Ecologists and modellers study how ecosystems work and test how well we understand marine life from the individual to the global perspective. |
Make Your Garden Even Greener With These Tips
Whether you want to have a garden because you need a hobby, because you want to try growing your own food, or because you find it relaxing to have a little patch of nature all to yourself, there are ways to make your garden more successful. Here are some easy tips for becoming a great gardener.
After planting your garden, maintaining it is still a work in progress. Throughout the summer season, it is a must for a gardener to continue to prune, pick or deadhead blooms. Horticulture can be physically exhausting with hauling dirt and digging holes, but at the end of the day, your hard work is paid off by seeing the beauty that you have created.
When you boil or steam vegetables for cooking, let the water cool and then use it to water your garden. Not only does this reduce your overall water usage, it provides a useful source of nutrients to your place. Your potted plants, especially, will appreciate the extra nutrients provided by your vegetable water.
Dish washing soap can repel insects. If you find insects ravaging your garden, fill a spray bottle with water and add a squirt of dish soap. Spray the foliage of your plants and watch the insects flee. They will leave your garden alone until the soap washes away. Simply reapply as needed.
Install a sprinkler system to water your garden. It can be difficult to find the time to water your plants each day, particularly if you work outside of the home. Proper hydration is essential to the success of your garden, so putting in a simple sprinkler system can save you time and energy.
Once you begin gathering produce from your garden, share it with your friends and family. It is extremely satisfying to give them a gift containing something that you made with your own hands. Seeing the pleased reactions of the recipients, also motivates you to continue working hard on your garden.
Make a point to get rid of slugs as soon as you see them. Slugs will continue eating your plants until your garden is just a shell of its former self. There are a variety of chemical and organic methods that you can try; find something that works for you and protect your plants!
If your home just has a small patio, you can still have a garden by growing plants in containers. Container gardening can give you the option to grow all kinds of flowers, plants, and even vegetables. You can also bypass the problem of frost by taking your containers inside during frosty weather.
Mini roses are very popular and are low maintenance. just click the up coming internet site come in many bright colors and offer a variety of interesting flower shapes. However, if you want to add a rose to your garden for the fragrance, then a mini-rose may not be a good choice because they produce little to no fragrance. If fragrance is your preference, try a larger, hybrid rose for the most intense fragrance.
You should place human hair in netting around your garden to deter animals from eating your growing produce. The scent of humans can deter animals from coming near an area. When you get a hair cut place the cut hair into satchels made from netting. Hang the netting around your garden to ward off pests.
Make sure your seeds have enough room to grow. It is fine to have many seeds in one container before they sprout, but you will have to replant them as they grow. Use containers that are actually big enough for one plant, and avoid having more than one plant in each container.
If you have a problem with aphids, consider using ladybugs. Ladybugs are natural predators to aphids, and they are very effective in keeping the aphid population under control. You can buy them in bulk from a garden center or online. This is a much better solution than spraying your plants with pesticides.
If you plan on starting an organic garden, you should always properly cover your seeds. If your seeds are not properly covered, then they will not grow. You should aim to cover most of your seeds about three times as deep as the thickness of your seeds in order to ensure optimum growth. However, certain seeds, such as alyssum and snapdragons, should not be covered because they need a lot of light to germinate.
A rich, organic compost can greatly enhance the quality of your garden and potting soil by introducing beneficial new elements and organisms into the environment. These helpful guests include bacteria, soil-enriching earthworms, and a variety of insects that can consume and devour more harmful organisms that have invaded the soil.
Rotate your crops to prevent permanent populations of pests in your garden. As with any ecosystem, pests need a certain amount of time to nest and build up a proper population within a garden. These pests are specially suited for one environment and one food source. By switching their food source you can essentially keep your pest population down simply because they are unable to adapt to the new type of plant.
Cedar mulch and crushed egg shells are a great addition to your garden. These two materials, when combined, will naturally repel snails. You can use the mixture as a barrier, about one inch in height, around your flower beds. Just make sure that all of the snails are out of your beds before applying or they will get trapped inside the barrier.
As was stated in the beginning of this article, gardening is a fun activity that allows you to spend time outdoors enjoying nature and helps you to add beauty to your home. If you want to be a great gardener you should read as much as you can about the subject and seek advice from experienced gardeners. Applying the top-of-the-line advice in this article is a sure-fire way to improve your horticulture skills.
Leave a Reply
|
next up previous contents
Next: A Warning Up: Introduction Previous: Declarative vs Procedural
What Kind of Logic?
Prolog is based on First Order Predicate Logic ---sometimes abbreviated to FOPL.
First order predicate logic implies the existence of a set of predicate symbols along with a set of connectives.
First order predicate logic implies that there is no means provided for ``talking about'' the predicates themselves.
Prolog is based on FOPL but uses a restricted version of the clausal form. Clausal form is a particular way of writing the propositions of FOPL. The restriction is known as Horn clause form.
Prolog is a so-called logic programming language. Strictly, it is not the only one but most such languages are its descendents.
We will spend a little time outlining the basic ideas underlying both propositional and predicate logic. It is not the intention to use Prolog as a vehicle to teach logic but some appreciation of the issues is invaluable.
Paul Brna
Mon May 24 20:14:48 BST 1999 |
Friday, July 08, 2016
What An Hour Of Emotion Makes Visible
An interesting article. I find her insight into one area especially applicable to politics.
When she was an adult, and a doctor, Kim discovered she has Asperger's.
Alix Spiegel
July 8, 2016
Kim's brain is not great at seeing emotion. When she looks out at the world she physically sees all the things that most people see, but with much of the emotion subtracted. She sees the same tables, the planes, the trees ... the people moving back and forth. But the feelings — particularly the subtle ones — are invisible. Though for most of her life she didn't realize that.
"This is the interesting thing," Kim says. "We believe our senses, so I didn't know I was missing anything. If I'm seeing people talking and it simply looks like people are talking, why should I think that they might be feeling angry or sad or anything, if I'm not sensing that?"
This is the story of how Kim was given a window into the world she couldn't see and how that changed her frame of reference. It was a small window — it only lasted 90 minutes. But it turns out that 90 minutes is more than enough time to unsettle a life. Because all you need to do to unsettle a life is expose it to a new frame of reference.
Lindsay Oberman is an experimental psychologist and assistant professor at Brown University now, but back in 2008 she was a postdoc at Harvard and part of the team conducting research on the brains of people with Asperger's. The idea was to investigate how a procedure called TMS affected this population.
TMS stands for transcranial magnetic stimulation. Basically, TMS uses an electromagnetic coil placed next to the scalp to send repeated magnetic pulses painlessly through the skull to stimulate certain brain cells. After a very short period of time (typically 30 minutes of rhythmic pulsing) the magnetic field is thought to activate a targeted region of the brain — just an inch or so beneath the coil.
She yearned to see emotion in the same way again — in fact, reached out to the researchers to let her do more TMS. She assumed that, like before, the effects would be short-term. Researchers say there seems to be a 15- and 40-minute window of a change in perception, to the extent that it happens at all. But Kim still wanted it, and even offered to pay.
But they couldn't make that work. So, in August 2010, Kim went back to Beth Israel for another TMS experiment, and the effect of this one was even more dramatic.
She says she still thinks a lot about one of the videos she was shown during the second experiment. In the video two employees were saying mean things to a fellow employee named Frank. Kim says the first time she watched it — before the TMS — she couldn't answer any of the questions the researchers asked her about it. Afterward though, she understood not only the video, but also, one of the big mysteries that has dominated much of her life.
"It never made any sense to me as to why people would be mean to somebody else. Why would you be mean to somebody?" she asks.
"And what I saw, is that when the two employees were there and talking together, and then were giving Frank a hard time, the primary thing was not that they were trying to be mean to Frank," Kim says. "The primary thing was that they were bonding. Those two people were actually building a bond between the two of them."
Their means of doing that, she now realizes, "was to be nasty to Frank."
It made her think back to her own childhood. "Oh! Maybe that's what these kids were doing when they were bullying me. The primary thing was that they were bonding. The secondary thing was that I was being bullied."
It's much easier to live in a world that makes sense and follows a sensible logic — where people are mean, not just for fun, but because they want to belong and feel safe. That's the world Kim lives in now.
No comments:
Post a Comment |
Why privacy matters
The line between public and private has blurred in the past decade, both online and in real life, and Alessandro Acquisti is here to explain what this means and why it matters. In this thought-provoking, slightly chilling talk, he shares details of recent and ongoing research — including a project that shows how easy it is to match a photograph of a stranger with their sensitive personal information.
I would like to tell you a story connecting the notorious privacy incident involving Adam and Eve, and the remarkable shift in the boundaries between public and private which has occurred in the past 10 years.
You know the incident. Adam and Eve one day in the Garden of Eden realize they are naked. They freak out. And the rest is history.
Nowadays, Adam and Eve would probably act differently.
[@Adam Last nite was a blast! loved dat apple LOL]
[@Eve yep.. babe, know what happened to my pants tho?]
We do reveal so much more information about ourselves online than ever before, and so much information about us is being collected by organizations. Now there is much to gain and benefit from this massive analysis of personal information, or big data, but there are also complex tradeoffs that come from giving away our privacy. And my story is about these tradeoffs.
We start with an observation which, in my mind, has become clearer and clearer in the past few years, that any personal information can become sensitive information. Back in the year 2000, about 100 billion photos were shot worldwide, but only a minuscule proportion of them were actually uploaded online. In 2010, only on Facebook, in a single month, 2.5 billion photos were uploaded, most of them identified. In the same span of time, computers' ability to recognize people in photos improved by three orders of magnitude. What happens when you combine these technologies together: increasing availability of facial data; improving facial recognizing ability by computers; but also cloud computing, which gives anyone in this theater the kind of computational power which a few years ago was only the domain of three-letter agencies; and ubiquitous computing, which allows my phone, which is not a supercomputer, to connect to the Internet and do there hundreds of thousands of face metrics in a few seconds? Well, we conjecture that the result of this combination of technologies will be a radical change in our very notions of privacy and anonymity.
To test that, we did an experiment on Carnegie Mellon University campus. We asked students who were walking by to participate in a study, and we took a shot with a webcam, and we asked them to fill out a survey on a laptop. While they were filling out the survey, we uploaded their shot to a cloud-computing cluster, and we started using a facial recognizer to match that shot to a database of some hundreds of thousands of images which we had downloaded from Facebook profiles. By the time the subject reached the last page on the survey, the page had been dynamically updated with the 10 best matching photos which the recognizer had found, and we asked the subjects to indicate whether he or she found themselves in the photo.
Do you see the subject? Well, the computer did, and in fact did so for one out of three subjects.
So essentially, we can start from an anonymous face, offline or online, and we can use facial recognition to give a name to that anonymous face thanks to social media data. But a few years back, we did something else. We started from social media data, we combined it statistically with data from U.S. government social security, and we ended up predicting social security numbers, which in the United States are extremely sensitive information.
Do you see where I'm going with this? So if you combine the two studies together, then the question becomes, can you start from a face and, using facial recognition, find a name and publicly available information about that name and that person, and from that publicly available information infer non-publicly available information, much more sensitive ones which you link back to the face? And the answer is, yes, we can, and we did. Of course, the accuracy keeps getting worse. [27% of subjects' first 5 SSN digits identified (with 4 attempts)] But in fact, we even decided to develop an iPhone app which uses the phone's internal camera to take a shot of a subject and then upload it to a cloud and then do what I just described to you in real time: looking for a match, finding public information, trying to infer sensitive information, and then sending back to the phone so that it is overlaid on the face of the subject, an example of augmented reality, probably a creepy example of augmented reality. In fact, we didn't develop the app to make it available, just as a proof of concept.
In fact, take these technologies and push them to their logical extreme. Imagine a future in which strangers around you will look at you through their Google Glasses or, one day, their contact lenses, and use seven or eight data points about you to infer anything else which may be known about you. What will this future without secrets look like? And should we care?
We may like to believe that the future with so much wealth of data would be a future with no more biases, but in fact, having so much information doesn't mean that we will make decisions which are more objective. In another experiment, we presented to our subjects information about a potential job candidate. We included in this information some references to some funny, absolutely legal, but perhaps slightly embarrassing information that the subject had posted online. Now interestingly, among our subjects, some had posted comparable information, and some had not. Which group do you think was more likely to judge harshly our subject? Paradoxically, it was the group who had posted similar information, an example of moral dissonance.
Now you may be thinking, this does not apply to me, because I have nothing to hide. But in fact, privacy is not about having something negative to hide. Imagine that you are the H.R. director of a certain organization, and you receive résumés, and you decide to find more information about the candidates. Therefore, you Google their names and in a certain universe, you find this information. Or in a parallel universe, you find this information. Do you think that you would be equally likely to call either candidate for an interview? If you think so, then you are not like the U.S. employers who are, in fact, part of our experiment, meaning we did exactly that. We created Facebook profiles, manipulating traits, then we started sending out résumés to companies in the U.S., and we detected, we monitored, whether they were searching for our candidates, and whether they were acting on the information they found on social media. And they were. Discrimination was happening through social media for equally skilled candidates.
Now marketers like us to believe that all information about us will always be used in a manner which is in our favor. But think again. Why should that be always the case? In a movie which came out a few years ago, "Minority Report," a famous scene had Tom Cruise walk in a mall and holographic personalized advertising would appear around him. Now, that movie is set in 2054, about 40 years from now, and as exciting as that technology looks, it already vastly underestimates the amount of information that organizations can gather about you, and how they can use it to influence you in a way that you will not even detect.
So as an example, this is another experiment actually we are running, not yet completed. Imagine that an organization has access to your list of Facebook friends, and through some kind of algorithm they can detect the two friends that you like the most. And then they create, in real time, a facial composite of these two friends. Now studies prior to ours have shown that people don't recognize any longer even themselves in facial composites, but they react to those composites in a positive manner. So next time you are looking for a certain product, and there is an ad suggesting you to buy it, it will not be just a standard spokesperson. It will be one of your friends, and you will not even know that this is happening.
Now the problem is that the current policy mechanisms we have to protect ourselves from the abuses of personal information are like bringing a knife to a gunfight. One of these mechanisms is transparency, telling people what you are going to do with their data. And in principle, that's a very good thing. It's necessary, but it is not sufficient. Transparency can be misdirected. You can tell people what you are going to do, and then you still nudge them to disclose arbitrary amounts of personal information.
So in yet another experiment, this one with students, we asked them to provide information about their campus behavior, including pretty sensitive questions, such as this one. [Have you ever cheated in an exam?] Now to one group of subjects, we told them, "Only other students will see your answers." To another group of subjects, we told them, "Students and faculty will see your answers." Transparency. Notification. And sure enough, this worked, in the sense that the first group of subjects were much more likely to disclose than the second. It makes sense, right? But then we added the misdirection. We repeated the experiment with the same two groups, this time adding a delay between the time we told subjects how we would use their data and the time we actually started answering the questions.
How long a delay do you think we had to add in order to nullify the inhibitory effect of knowing that faculty would see your answers? Ten minutes? Five minutes? One minute? How about 15 seconds? Fifteen seconds were sufficient to have the two groups disclose the same amount of information, as if the second group now no longer cares for faculty reading their answers.
Now I have to admit that this talk so far may sound exceedingly gloomy, but that is not my point. In fact, I want to share with you the fact that there are alternatives. The way we are doing things now is not the only way they can done, and certainly not the best way they can be done. When someone tells you, "People don't care about privacy," consider whether the game has been designed and rigged so that they cannot care about privacy, and coming to the realization that these manipulations occur is already halfway through the process of being able to protect yourself. When someone tells you that privacy is incompatible with the benefits of big data, consider that in the last 20 years, researchers have created technologies to allow virtually any electronic transactions to take place in a more privacy-preserving manner. We can browse the Internet anonymously. We can send emails that can only be read by the intended recipient, not even the NSA. We can have even privacy-preserving data mining. In other words, we can have the benefits of big data while protecting privacy. Of course, these technologies imply a shifting of cost and revenues between data holders and data subjects, which is why, perhaps, you don't hear more about them.
Which brings me back to the Garden of Eden. There is a second privacy interpretation of the story of the Garden of Eden which doesn't have to do with the issue of Adam and Eve feeling naked and feeling ashamed. You can find echoes of this interpretation in John Milton's "Paradise Lost." In the garden, Adam and Eve are materially content. They're happy. They are satisfied. However, they also lack knowledge and self-awareness. The moment they eat the aptly named fruit of knowledge, that's when they discover themselves. They become aware. They achieve autonomy. The price to pay, however, is leaving the garden. So privacy, in a way, is both the means and the price to pay for freedom.
Again, marketers tell us that big data and social media are not just a paradise of profit for them, but a Garden of Eden for the rest of us. We get free content. We get to play Angry Birds. We get targeted apps. But in fact, in a few years, organizations will know so much about us, they will be able to infer our desires before we even form them, and perhaps buy products on our behalf before we even know we need them.
Now there was one English author who anticipated this kind of future where we would trade away our autonomy and freedom for comfort. Even more so than George Orwell, the author is, of course, Aldous Huxley. In "Brave New World," he imagines a society where technologies that we created originally for freedom end up coercing us. However, in the book, he also offers us a way out of that society, similar to the path that Adam and Eve had to follow to leave the garden. In the words of the Savage, regaining autonomy and freedom is possible, although the price to pay is steep. So I do believe that one of the defining fights of our times will be the fight for the control over personal information, the fight over whether big data will become a force for freedom, rather than a force which will hiddenly manipulate us.
Right now, many of us do not even know that the fight is going on, but it is, whether you like it or not. And at the risk of playing the serpent, I will tell you that the tools for the fight are here, the awareness of what is going on, and in your hands, just a few clicks away.
Thank you. |
Addicted To Gaming? You Are Suffering From Mental Disorder, As Per WHO!
WHO has clearly defined defined what exactly an addiction for games is, and why this is a mental disorder
Addiction to gaming is now a mental disorder
Addiction to gaming is now a mental disorder
We all play games, don’t we? Some of us play little longer, and in some rare cases, the gaming just won’t stop.
It seems that the issue of gaming and addiction is indeed serious because starting today, addiction of digital and video games have been classified as a mental disorder.
But does this new classification covers all gamers?
No, not really!
WHO: Addiction of Games In A Mental Disorder
In their latest International Classification of Diseases (ICD), which is ICD-11, World Health Organization or WHO has classified addiction of games as a mental disorder.
ICD is a global database of around 55,000 diseases which can strike any human being at any moment, or can become the cause of death.
In the US and in some European countries, ICD-11 and its classification of diseases is used for allocating insurance premiums and expenses.
Hence, if addiction of games is now included in the ICD-11, then it means that the issue has indeed become serious, and there are lots of folks who are affected.
Speaking on the importance of ICD, WHO Director-General Tedros Adhanom Ghebreyesus said, “It enables us to understand so much about what makes people get sick and die, and to take action to prevent suffering and save lives,”
But All Gamers Have Mental Disorder?
Absolutely no.
Gaming is fun, and in most of the contemporary societies, having expertise in virtual and digital gaming is considered as an achievement as well.
But the problem arises when the gaming becomes addictive, and the person has lost control over it.
As per the definition by WHO, this mental disorder is “a pattern of persistent or recurrent gaming behaviour” that becomes so extensive that it “takes precedence over other life interests”.
Psychiatrist Richard Graham has just launched UK’s first technology addiction center, and they dedicatedly work on this type of addiction caused by digital games and social media apps.
As per him, there are three main symptoms which can help a medical expert to diagnose this new form of gaming addiction:
1. The person cannot stop their gaming habits. They have lost the control.
2. They are prioritising games above virtually everything else in life.
3. They are doing this, despite knowing that this habit is destroying their lives.
As per Richard, a person can play games for hours, and sit in front of the screen for days, without being addictive.
Are you addicted to games? Do share your opinions and viewpoints, by commenting right here!
"Addicted To Gaming? You Are Suffering From Mental Disorder, As Per WHO!", 5 out of 5 based on 4 ratings.
Leave A Reply
Your email address will not be published.
who's online |
Arrhythmia is a problem with the rhythm of the heartbeat—beating too fast, too slow, or with an irregular rhythm. Many arrhythmias are harmless, but some can be life-threatening, especially since a lack of blood flow to the body can damage the brain, heart and other organs.
Noticeable arrhythmia symptoms include fainting, dizziness, heart palpitations, weakness, fatigue, shortness of breath and chest pain. Common causes of of this ailment are heart disease, stress, smoking, heavy alcohol use and certain medications.
Treatment for arrhythmias depends on the type and severity of irregular heart rhythm. In most cases, people with arrhythmias can live normal, healthy lives. Always discuss irregular heart beat symptoms with your doctor. Located in Los Angeles, Dr. Helmy can help you with any issues related to arrhythmia or irregular heart rhythm. |
When a vaccine to prevent shingles was approved in 2006, the FDA recommended it for people 60 and older who previously had chicken pox. But doctors say people are not beating a path to their door.
"People don't jump at it like they would the flu vaccine," says Dr. Bruce Lipschutz General Internal Medicine with Lee Memorial Health System.
Shingles isn't life threatening, but can cause a painful rash or band of blisters.
"We may have an episode of pain around the ribs around the front or back around the legs. These are nerve patterns and that's why they hurt so much, and the virus causes tremendous inflammation," says Dr. Lipschutz.
But only a small percentage of older Americans are getting the shingles vaccine. A study showed up to 75% of them got the flu shot and 60% got the pneumonia shot. Compared to only 10%t who got the shingles shot.
It works better than scientists expected, lowering the occurrence of shingles 55%. Steven Klein is at risk, because he had chicken pox and at 65, is in the target age.
"Have you ever heard of the shingles vaccine? The shingles vaccine? No."
12% of those who get shingles develop complications including postherpatic neuralgia. It can also lead to skin and eye infections. About 30% of us will develop it at some point. Still word of the immunization is slow to spread.
"The people who come to me who are most interested, are the people who have shingles themselves or had family members with shingles," says Dr. Lipschutz.
"If I did have it, yes I'd be interested in taking it," says Steven. |
Research topic 1
1. Cognitive impairments in multiple domains
Language and mathematics
Simultaneous rehabilitation of cognitive functions in several domains Language deficits can be caused by impairments in memory or memory operation due to brain damage. Recent studies found that Broca's area support both syntactic structure building in natural language and a similar hierarchical operation in arithmetic (Makuuchi et al., 2012). These findings imply that impairments in speech and calculation can be treated in a same training technique. Indeed, recent studies reported that training on symbol operation improve sentence processing of natural language (e.g., Dominey et al., 2009). Based on these findings, we pursue a language rehabilitation program using symbol operation.
Language and executive function
Persons with higher brain dysfunctions often show disorders of executive function (also known as cognitive control). Executive function (or cognitive control) is a term in cognitive neuroscience that refers to the mental ability to coordinate thoughts and actions flexibly in order to accomplish internal goals, including inhibition of irrelevant information, manipulation of working memory contents, switching of internal goals, etc. Recent studies have indicated that sentence comprehension entails executive function or cognitive control (Novick et al., 2010). In addition, it is known that Broca's area is involved not only in sentence processing (Sakai, Hashimoto, & Homae, 2001), but also in the processing of hierarchically organized sequence (Koechlin & Jubault, 2006) or executive function (January et al., 2009). Because a sentence is hierarchically organized sequence of words, the analysis of hierarchical structure is crucial for sentence processing. We focus on the functional role of Broca's area, and aim to clarify the relationship between executive function and the processing of hierarchical sentence structure by using functional magnetic resonance imaging (fMRI) and transcranial magnetic stimulation (TMS). Based on the insights gained through this study, furthermore, we try to develop effective rehabilitation techniques or training methods. |
1949 Volkswagen Beetle
1949 Volkswagen Beetle
The owner of this early Volkswagen Beetle Convertible spent 10 years locating original parts and researching the history of this car for its restoration. The green and cream over Cognac car has not been shown for three years, but prior to that it appeared at the Art Center and the Quail, and it has been featured in Auto Aficionado magazine. As a 1949 model, this car is representative of the initial output of Volkswagen's revitalizing Wolfsburg factory after the war, when the capture facility restarted, initially under British Army control.
The Beetle is perhaps the best-selling car of all-time. Truly, a recognizable shape that has stood the test of time. The vehicle is still being produced in Mexico, continuing the long-time running record.
Adolf Hitler was searching for a people's car that was capable of transporting three children and two adults at speeds of sixty miles-per-hour. The car was to be inexpensive, costing the same as a motorcycle. Ferdinand Porsche was commissioned to produce such a vehicle.
There are many theories as to where the designs originated from. Some believe Hitler designed the vehicle. Some theorize that it was Joseph Ganz's 1920 design that was the true inspiration for the Beetle design. Porsche had created designs for the Mercedes-Benz 170H, which played into the design of the Beetle.
Inspiration for the Beetle had been drawn from the Tatra vehicles, mainly the T97, that had been designed by Hans Ledwinka. Due to the similarities, Tatra launched a lawsuit which never really materialized due to Germany invading Czechoslovakia. The lawsuit was later re-opened after World War II and Volkswagen was forced to pay Tatra 3,000,000 Deutsche Marks. This left Volkswagen with little money for development of new Beetle models.
The Volkswagen Beetle first came on the scene in 1947, but they were known by a different name. KdF, short for Kraft durch Freude meaning 'power by joy', was designated to these small, gas-friendly vehicles. In English, the name Beetle was used. In German, they were known as Kafer, and in French they were called Coccinelle.
These little bundles of joy featured mechanical drum brakes and a gearbox void of synchromesh.
In 1949 the Volkswagen logo was placed on the rims. The engine was expanded to 1131 cc and was capable of producing 25 horsepower. The models that were produced after October of 1949 could be started without a 'starting crank'.
Two convertible options were offered by Volkswagen in 1949. The two-seater design, designated 14A, was penned by Josef Hebmuller. The four-seater Type 15 version was designed and produced by Karmann of Osnabruck. The four-seater was vastly more popular and stayed in production for 30 years.
The 14A was stylish and attractive, with the major shortcoming being a fire that destroyed the factory where they were being produced. The two-seaters featured a rear deck nearly identical to the front hood. The strength of the car, lost by removing the roof, was amplified by a stronger windshield frame and dual Z-section girders located under the floor. In 1953, the last of the Hebmuller rolled off the assembly line, after only 696 examples were produced.
In a time when practicality ruled over style, the four-seater cabriolet was king. The Karmann company had a long history of designing and building cars. In business since 1901, was familiar with assembly line production, benefits and features of different types of metals, and the styles of multiple markets.
The mechanical, cable-driven brakes were replaced with hydraulic brakes in 1950.
During the 1950's the Beetle saw exterior and interior improvements. 1951 saw the addition of arm-rests which were discontinued just a few months later. In 1952, 2nd-4th gears became synchronized. The dashboard was redesigned with a glove compartment. In 1955, the bumper was improved and electrical direction-indicators were installed. A second tail-pipe was added. The front seats became wider and could be moved to three different seat-back adjustable positions.
In 1956, the tires became tubeless. Near the end of '56, side view mirrors became standard on all Beetle models.
In 1957 the front window was increased by 17 percent while the rear window received a 95 percent increase. A new dashboard, rear view mirror, radio, and a speaker appeared. The turn signals would now turn-off automatically.
Up to this point, a roller pedal had been used to initiate acceleration. This was the year that the gas pedal replaced the roller pedal.
In 1958, ivory disc wheels were offered.
In 1960, an engine capable of producing 34 horsepower was offered. The speedometer was increased from 74 mph to 87 mph. A windshield-wiper washer system became available. The front directional light was changed from white to amber.
A gas gauge was added in July of 1961.
In 1963, the seats were changed from wool upholstery to synthetic. The VW emblem located on the hubcap was no longer painted. The safety of the vehicle was once-again enhanced with the enlargement directional lights.
There were minor changes in 1964. The windows did, however, become larger.
In 1965, the front axle was improved. The ongoing saga of incremental improvements received another chapter - A defroster vent was added to the center of the dashboard.
The Beetle continued to be sold in the United States until 1978 with the convertible version was sold until early 1980. Sales continued in Europe until 1985. Developing countries, such as Mexico, have been developing the Beetle since 1964 and the vehicles have remained in production since that time.
0 التعليقات: |
Student Organization
How should students organize themselves/their papers? What different types of physical things do students need (notebooks, binders, strips of scratch paper, etc.)?
3 Responses to Student Organization
1. mshelft says:
So, in thinking about this, it’s helpful for me to make a list of what I WANT out of student organization (and teacher organization).
I know that I want there to be space or a place for students to put their random thoughts/quick exercises/scrap notes, place for their warm-ups and exit tickets, place to keep important notes for the short terms (by unit), and also important papers that you’ll need all year long (vocabulary lists, multiplication tables, classroom norms or rules or green sheets or anything else).
So the first question I have is – where do students keep all those things (or how are they organized in one binder), and what elements of those papers stay in the classroom vs. go home?
The second question is – which papers do I communicate need to stay with the student through the unit/year? How do I distinguish between things that are important and things that may not be as important? Should students keep all of their scratch work in the same place, or is it only the actual papers that contain the information on them. I really hate individual pieces of binder paper. They are almost always illegible.
Also, are notebooks sustainable with 150 students?
2. Hellen says:
I’m asking students to have a 3-ring binder — Math only — with 4 binder section dividers labeled:
Notes / Classwork
Tests / Quizzes
I will see if that helps to keep their work organized. I’m also thinking of grading the binder — not sure how much yet — as an incentive. Note that my students are very young (8th graders) and need a lot of help with organization.
3. Courtney says:
I love interactive notebooks!!! Keeps them organized while learning and creating a great tool to reference in the future!
What are your thoughts?
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: |
Deutschen und Afrikanischen Theorie
Thus far the only people who have been attested with a high level of genetic, historical, linguistic and cultural research to be the descendants of the ancient Mesopotamians are the Assyrian Christians of Iraq and its surrounding areas in north west Iran, north east Syria and south eastern Turkey. Assyria continued to exist as a geopolitical entity until the Arab-Islamic conquest in the mid-7th century, and Assyrian identity, personal names and both spoken and written evolution of Mesopotamian Aramaic (which still contain many Akkadian loan words) have survived among the Assyrian people from ancient times to this day.
However, there have been many wild claims of ancient mid eastern ancestry (including Assyrian) throughout Europe, Africa and even the Americas, none of which have been supported by mainstream opinion or strong evidence, let alone proof.
The most long standing and popularised theory of Assyrian origins has been the links of Assyrian ancestry to the ancient Germans. The idea has also some backing in German legend, for example the Gesta Treverorum (a 12th century German medieval chronicle) makes Trebeta son of Ninus the founder of Trier.This legend of Trebeta as having founded Trier is also found in Godfrey of Viterbo’s Pantheon (1185) and several other German chronicles of the 12th or 13th century, including the works of Sigebert of Gembloux.The legend is also found cited in compendiums of historical sources from later periods, for example Gottfried Leibniz’s Scriptures rerum Brunsvicensium (1710) and the Anthologia veterum latinorum epigrammatum et poematum (1835).
As with the West Africa theory, this idea does not have the backing of serious historians, nor contemporary written records of the time in the Near East. There have been no studies or records which show such a link, and it must be pointed out that Ninus and Trebeta were fictional figures, and not historically attested. In addition, there are no traces of Akkadian or Mesopotamian Aramaic in any Germanic Language.
According to a single unsupported piece of recent research, refugees from the collapsed Assyrian Empire claim to have reached the region of Lake Chad and founded the kingdoms of Kanem and Kebbi. These alleged refugees claimed the ancestry of Sargon of Akkad (whose dynasty died out some 15 centuries before the fall of Assyria), they also contradictionally claimed ancestry from Nabopolassar, a Babylonian king of Chaldean extraction who played a major part in the destruction of the Assyrian Empire. From the Medieval Arabic king lists of both African states, allegedly copied from earlier lists in ancient Near Eastern languages it appears that the state founders claimed to be deportees of the Assyrian empire who had fled from Syria and Samaria after the defeat of the Egyptian-Assyrian army at Carchemish in 605 BCE.
A counterpoint to this argument would be that neither Samaria nor Syria where these refugees were claimed to have originated from were actually ever part of Assyria, but were colonies inhabited largely by Hebrews, Nabateans and Arameans respectively. In addition, there is no evidence whatsoever in Assyrian, Babylonian, Median, Persian, Greek or Egyptian records of the time mentioning deportations of Assyrians from their homelands
Additionally, the claimants to this ancestry also claim descendancy from Sargon of Akkad (whose dynasty died out over 1500 years before the Assyrian dynasty fell), and from Nabopolassar, who was a Chaldean, politically and militarily opposed to Assyria, and not in fact an Assyrian.
Euer Erbe bewahren |
Voiceless velar implosive
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Voiceless velar implosive
A voiceless velar implosive is a rare consonantal sound, used in some oral languages. The symbol in the International Phonetic Alphabet that represents this sound is ⟨ɠ̊⟩ or ⟨kʼ↓⟩. A dedicated IPA letter, ⟨ƙ⟩, was withdrawn in 1993.
Features of the voiced velar implosive:
• Its place of articulation is velar, which means it is articulated with the back of the tongue (the dorsum) at the soft palate.
• Because the sound is not produced with airflow over the tongue, the centrallateral dichotomy does not apply.
• The airstream mechanism is implosive (glottalic ingressive), which means it is produced by pulling air in by pumping the glottis downward. As it is voiceless, the glottis is completely closed, and there is no pulmonic airstream at all.
A phonemic /ƙ/ has not been confirmed for any language. It has been claimed for Lendu, but it is more likely to be creaky-voiced /ɠ̰/, as in Hausa. Some English speakers use a voiceless velar implosive [ƙ] to imitate the "glug-glug" sound of liquid being poured from a bottle, though others use a voiced implosive [ɠ].[1]
See also[edit]
1. ^ Pike, Phonetics, 1943:40 |
Compact Shelving Guide
The shelving system, used in all the stacks in the lower portions of the library, is called compact shelving because a minimum of floor space is used to house a great number of books. The stacks move left and right on a track installed in the floor. The large cranks at the end of each range can be turned either clockwise or counter-clockwise to allow access to the books in a given range. It is not necessary to move one range at a time. A group of ranges can be moved in tandem, and will glide easily on the track.
To move the shelving, follow these instructions:
1. Go to the nearest range that is open.
2. Look to see if anyone is in the open range. If no one is in the range, push the red locking mechanism to the ‘in’ position.
3. Go back to the range you want to enter.
4. Turn the crank in the direction of the open range that you just unlocked. Crank until the space between ranges is wide enough to allow you to enter.
5. Before entering the range, be certain that the red locking mechanisms on both sides of the aisle you are entering are in the ‘out’ position. If not, simply pull the locking mechanism out.
Remember, the locking mechanism must be in the ‘out’ position to keep the shelves from being closed by someone else while you are inside! |
Theme of Hardship in The Grapes of Wrath Essay
734 Words 3 Pages
The Grapes of Wrath
'In the souls of the people, the grapes of wrath are filling and growing heavy, growing heavy for the vintage.' This quote explains the whole book. It shows the people fighting for their lives from the many hardships they face. Also, it shows that there is ups and downs in life and sometimes facing the wrath that life gives us. The first hardship in the book is when the Joads are forced off their land. They have to overcome losing their home and basically their life. Also, the Joads can relate to many people because the bank took over their life. ?The bank is something more than,it?s the monster.? (33) This
…show more content…
They start to run low on money and need to leave the camp to find another job. ?Never worked so hard in my life nor so long before.? (X)
This quote explains how the Joads work. They work each of their jobs as hard as they can and endure so much pain just to survive. The family doesn?t complain when their working or what they don?t have, they take what they have and make it out as the best they can. Towards the end of the book Rose of Sharon faces the worst hardship out of anyone. She has a still-born baby. This was the one thing in Rose of Sharon?s life she really wanted . The baby was the reason she woke up in the morning and could live life.
Being the strong- willed woman Rose of Sharon is she moves on with life. Then at the end of the book her motherly figure comes out when she suckles the man back to health. When Casy is brutally murdered by the police officer it shows many accusations. It shows back then police officers did not care about protecting people. They were cruel people who cared about themselves. So that Casy?s life ended tragically, before he died he compared himself to Jesus trying to find something. Even though he was bad with girls and gave up preaching he was still connected with God. In |
Snooty, the oldest manatee living in human care, died on Sunday, just two days after his 69th birthday. His death has received international attention. Snooty had no preexisting health issues at the time and the cause of death is being investigated. The South Florida Museum, where Snooty called home, released the following statement:
“Our initial findings indicate that Snooty’s death was a heartbreaking accident and we’re all quite devastated about his passing,” said Brynne Anne Besio, the Museum’s CEO. “We’re reviewing what happened and will be conducting a full review of the circumstances. Snooty was such a unique animal and he had so much personality that people couldn’t help but be drawn to him. As you can imagine, I — and our staff, volunteers and board members — considered him a star. We all deeply mourn his passing. We are honored to have had him with us for so long and will continue his legacy through our manatee rehabilitation program.”
Snooty’s death is labeled as accidental and a full investigation is being conducted. Despite inspections the previous day, finding no exhibit faults, Snooty was found underwater close to plumbing access for the exhibit’s life support system. Due to a panel that had become dislodged, it appears that Snooty was able to swim into this area and may have gotten stuck. A full necropsy will be performed at the Florida Fish and Wildlife Conservation Commission’s Marine Mammal Pathobiology Laboratory in St. Petersburg, FL to gain more details about his death.
Snooty the manatee was the first recorded to be born in human care. He was born on July 21st, 1948 and moved to the South Florida Museum in 1949, where in 1979 he became Manatee County’s official mascot. He was even officially certified as the oldest captive manatee by Guinness World Records in 2015. Over a million visitors have seen Snooty up close and have had the opportunity to learn about the plight of the endangered manatee and learn what they can do to help. He participated in various scientific research studies to understand manatee vocalization and hearing. He also was a friend to fellow manatees, as he hosted those that were being rehabilitated before their release back into the wild. Snooty was indeed one of the greatest ambassadors for his species and his greatest legacy will be the awareness he raised for Florida manatees and how to protect them. |
What is a Case Study?
What is a Case Study?
For our purposes, a case study is a real-life health care administrative situation involving a decision to be made or a problem or issue to be resolved.
Case studies in general are detailed accounts of an organization, company, industry, person or group of people, or project. The case study may include information about company objectives, strategies, challenges, results, recommendations, or more. The case study may be a real-life situation described in its entirety or so that portions of it are disguised for reasons of confidentiality. It may also be fictional.
Most case studies are written in such a way that the reader takes the place of the manager whose responsibility it is to make decisions to help resolve the problem or issue. In almost all case studies, a decision must be made, although this decision may be to leave the situation as it is. For this assignment, case studies can be brief or extensive and can range from several pages to 30 pages or more.
Where Can I Find Sample Case Studies?
The Internet is a great source of sample case studies to examine before you create your own. To find case study examples, conduct a search using the words sample case studies. For formatting help, click the link to see the Microsoft case study template.
Parts of the Project
This project consists of two parts:
• Part 1 (2% of your final grade): Submit a summary of your case study situation and challenge/concern to be addressed. Upload your submission to the Assignment titled “Case Study and Challenge Section” in week 5.
• Part 2 (25% of your final grade): Submit a case study with the following:
3. opening paragraph¬—introduction to the situation
4. background organizational information¬—history, mission, values, competition, financial information, and additional information of significant value
5. area of interest¬—strategic planning, leadership, marketing, finance, health care operations, human resources
6. definition of the challenge/concern—specific problem or decision(s) to be made; this is your problem statement
7. alternative situations/solutions¬—list of options for meeting the challenge or concern
8. conclusion¬—summary of the situation, any constraints or limitations, and the urgency of the situation, with the best alternative presented and defended
Most but not all case studies will follow this format. The purpose here is for you to thoroughly understand the situation and the decisions/discussions that need to be made. Take your time and stay focused on your objectives.
Here, we’ll pay a bit more attention to the fourth and fifth components:
Defining the Challenge/Concern
The problem statement should be a clear and concise statement of exactly what issue or concern needs to be addressed. This is not challenging to write!
To pinpoint the challenge to be addressed, ask yourself the following questions:
• What appears to be the issue/problem?
• How do I know that this is a problem? Note that, in answering this question, you will differentiate the indicators of the problem from the problem itself.
• What needs to be addressed immediately? Answering this will help you to differentiate between problems that can be resolved within the context of the case and larger issues that need to be addressed at a later time.
• What is important and what is urgent? Some problems appear to be urgent, but upon closer examination, are revealed to be relatively unimportant, while others may be far more important than they are pressing.
The problem statement can be framed as a question (e.g., What should Sue do? or How can Mr. Smith improve? It typically has to be rewritten several times during the analysis of a case, as you peel back the layers of symptoms or causation.
Coming Up With Alternative Situations/Solutions
You’ll want to answer the following questions to come up with viable alternatives:
• Why or how did the challenge/concern arise? You are trying to determine cause and effect for the problems identified. You cannot solve a problem of which you cannot determine the cause! It may be helpful to think of the organization in question as consisting of the following components:
• people who transform. . .
• resources, such as materials, equipment, or supplies, using. . .
• processes, which create something of greater value
• Who is affected the most by the challenge/concern? You are trying to identify the relevant stakeholders to the situation, and who will be affected by the decisions to be made.
• What are the constraints and opportunities in this situation?
This paper should be about 7 – 10 pages of text.
****** SEE Below for topic already selected with summary!!!!! ******
Topic of the case study
The topic of the case study is, “Chronic diseases case study.” It focuses on ailments such as HIV/AIDS and cancer that have affected people in a rural area of South Africa. Also, how its cost affected families in the communities in the area, especially from the poverty stricken backgrounds.
The setting of the case study is in a rural area in South Africa known as Hoedspruit that is also a home for the MRC/Wits Rural Public Health and Health Transitions Research Unit. They help in conducting the research as they were very conversant with the locals’ problems and their spoken language. It involved the research in discovering and exploring the challenges that family members undergo if one of them has been affected by any chronic disease. The research involved the inclusion of different families who had a member of the family affected by the chronic illness. However, even it some the locals were entangled and lived in deplorable conditions, it was seen that they had mechanisms that helped them cope with the situation despite the hardship. As a result, the data revealed that most of the families opted not to seek medical attention because of the expensive treatment. The longitudinal data shown in the study has validated the importance of the three access barriers: affordability, availability, and acceptability that form the integral part of the discussion.
BMC health services research. (2009). Affordability, availability and acceptability barriers to health care for the chronically ill: Longitudinal case studies from South Africa. Retrieved from:http://download.springer.com/static/pdf/612/art%253A10.1186%252F1472-6963-9-75.pdf?originUrl=http%3A%2F%2Fbmchealthservres.biomedcentral.com%2Farticle%2F10.1186%2F1472-6963-9-75&token2=exp=1474114119~acl=%2Fstatic%2Fpdf%2F612%2Fart%25253A10.1186%25252F1472-6963-9-75.pdf*~hmac=21848f1a4cd05161579dff713e57b3e7c71e595a93e3716322b0863f856cc927
0 Users (0 Votes)
what people say Leave your rating
Sort by:
Be the first to leave a review.
{{{ review.rating_title }}}
{{{review.rating_comment | nl2br}}}
Show more
{{ pageNumber+1 }}
Leave your rating
Write a Reply or Comment
%d bloggers like this: |
Monday, July 25, 2016
Western Citril (Crithagra Frontalis)
The western citril (Crithagra frontalis), also known as the yellow-browed citril, is a species of finch in the Fringillidae family. It is found in central Africa.
The western citril was formerly placed in the genus Serinus but phylogenetic analysis using mitochondrial and nuclear DNA sequences found that the genus was polyphyletic.[2] The genus was therefore split and a number of species including the western citril were moved to the resurrected genus Crithagra.[3][4]
The earlier introduction was adopted from wikipedia. I choose to put the pressure spotted on the terms of scientific name changing due to the progressed science research, where those scientists has spent thousands of man hours that resulting new knowledge brought to us.
Here I present some pictures, where I have took some amateur shoots over the breeding cage. I have very detail day to day basis of documentation of the breeding it self. Since the first day of the egg laying through the day the chicks are fledging and survived the raising days. Unfortunately, I came on the thought that it may be a little bit difficult to up load the whole pictures. So I decided to select some of the pictures to represent it appearance.
As the flash and brief note, the breeding of this pretty birds won't be different compared to other singing finches, especially if it is close to its relatives, such as C. Atrogularis, C. Leucopygius, C. Mozambicus, etc. Their chicks are better survivor, hungry for the food and dare to compete in chasing food from their parent's beaks. The bad thing is, some parents are not so good in feeding and caring their chicks, so the developing their number in breeding sometimes requires other bird to become foster parent. |
Developing for Modern Windows
Tips, tricks, and guides for developing on modern Windows platforms
Windows 8.1 Universal App Hello World (C#)
“Hello World” is a programming staple used to introduce the fundamentals. If you’re new to programming, or to WinRT development, follow this tutorial to create a basic app that displays a “Hello World” message, and works on both Windows Phone 8.1 and Windows 8.1.
You will need the following:
They are pretty big downloads, so don’t delay! This project should take about 10-15 minutes to complete (not counting downloading those large files and installing them), and here’s what we’ll cover:
• Create a universal app project
• Add C# code to a file in the Solution Explorer
• Set the startup project
• Run the app.
Step 1 – Create the Project
Some menu options are in slightly different places in Visual Studio Express.
1. FILE > New > Project:
The New Project window will open.
2. Navigate the menu tree on the left to find the Universal Apps templates (Installed > Templates > Visual C# > Store Apps > Universal Apps).
If you don’t see the universal templates your Visual Studio might need an update. Check for updates via TOOLS > Extensions and Updates on the main menu.
3. From the templates listed in the middle area, select Blank App (Universal Apps).
4. Type HelloWorld in the Name: field.
5. Click OK.
You’ve created a universal app called HelloWorld (though it doesn’t do anything yet)! You should see something like this:
The main area (dark with the brightly coloured text in my Visual Studio setup) is the code editor. Visual Studio has automatically opened a file called App.xaml.cs, which is one of the main files in a WinRT app, and is responsible for a lot of the app’s launching behaviour. That text is a C# class (a sub-division of code). For this tutorial you don’t need to know what it all means. On the right is the Solution Explorer. The solution is a container for all the code and files in our app.
Let’s have a closer look at the solution.
A Universal App Solution
A universal app solution consists of three projects (A, B, and C), each with its own code (and other files). The projects in a universal Windows app are:
a. Windows 8.1 (Store) project
b. Windows Phone 8.1 project
c. The shared project.
You’re probably wondering why there are separate projects when the app is supposed to be universal…
What does Universal Mean?
You can’t run a Windows Phone app on a Windows PC (or vice versa), but beneath the surface they are running mostly the same code. Rather than create separate apps with overlapping code, Microsoft created the universal app model, which makes it easy to create a single solution that can output two separate apps (for Windows Phone and for Windows), while ensuring as much code as possible is reused.
Three Projects
A universal app has a shared project. This project shares its contents to the phone and PC/tablet projects, both of which can understand it.
Phone app = shared project + phone project
Windows app = shared project + Windows Store project
The separate Windows Phone and Windows Store projects include anything specific to each platform (most likely the user interface will be laid out differently, for example). Most of the nuts-and-bolts code can be put in the shared project, since the two platforms are mostly compatible.
Step 2 – Add the Code
We’re going to add a few lines of code to display a popup with the traditional “Hello World” message.
In the Solution Explorer, find and double-click the App.xaml.cs file:
The triangles expand file groups. Some items have linked files (a .xaml file is for XAML code – eXtensible Markup Language, and a .cs file is for C# code). Usually the XAML defines the user interface (it’s similar to HTML), and C# is the program that runs ‘behind the scenes’ (called ‘code behind’). Expand App.xaml within the HelloWorld.Shared project to find App.xaml.cs.
What is App.xaml.cs?
This contains the main code that acts as a starting point for your entire app. Think of it like a tree trunk that the rest of your app’s code branches out from. We’ll add a simple popup message here (you wouldn’t normally do this sort of thing in App.xaml.cs, but it’s a simple way to start as this file is shared by both the phone and tablet/PC app).
The first line of code we will add is a ‘using’ directive. I won’t go into namespaces here, but in a nutshell, ‘using’ lets us use code our app couldn’t otherwise ‘see’. At the top of the App.xaml.cs file you’ll see several using directives, such as:
using System;
using Windows.UI.Xaml;
Add the following to that list (be careful to spell it correctly, and note C# is case sensitive):
using Windows.UI.Popups;
Showing the message
A universal app template already has a method (a block of code) that runs automatically when the app is launched, so we’ll hitch a ride in there. Find the following line in the App.xaml.cs code:
protected override void OnLaunched(LaunchActivatedEventArgs e)
After this line you’ll see code inside a pair of braces ( { } ), which define the start and end of the OnLaunched method. Don’t worry about that code. Go to the end of this method, just before the closing brace. The last line of this method is currently:
Directly after that line (but before the closing brace), paste in the following:
MessageDialog msg = new MessageDialog("Hello World");
These lines create a message dialog box called msg containing the words “Hello World”, and then displays it. And we’re done with the coding. This is just “Hello World” after all!
Step 3 – Running the App
A universal Windows app is two apps in one, so we need to tell it which we want to run. Since you’re developing on a PC, let’s test the Windows Store version first.
Test the Windows Version
Set the Windows app as our startup project:.
1. In Solution Explorer, right-click on the HelloWorld.Windows (Windows 8.1) project and select Set as StartUp Project from the context menu.
2. Choose Local Machine (the machine you are developing on) from the drop-down. This is where we are going to test the app.
3. Click the Local Machine button with the green triangle. The app will build then run.
You should see this:
Click the stop button on the Visual Studio menu bar to stop the app:
Test the Windows Phone Version
Set the Windows Phone project as the start up project. You can test on a physical Windows Phone* or one of the emulators built in to the Windows Phone SDK. From the drop-down select Device or one of the emulators listed, and then hit the button to build/run the app.
*The phone must be developer unlocked. If you have a developer account you can unlock your phone from the TOOLS > Windows Phone 8.1 menu. The phone needs to be plugged into the computer (and recognised, and the screen must be unlocked) to deploy the app.
You should see this:
We created a new universal app, with three projects (one each for Windows Phone and Windows Store, and a unifying shared project). Because Windows Phone and Windows Store apps both run on the WinRT framework we were able to add code to the shared project that was automatically included in both versions of the app. We then ran and tested the app on both PC and phone.
When it comes time to publish a universal app for uploading to the stores, you would actually build your app twice and upload separate packages to the two stores (Windows Phone Store and Windows Store).
You should now have a fair idea of how to create a project, and know the basics of how Visual Studio organises a solution. You’re well on your way to building great universal Windows apps.
Tags: , ,
3 Responses to “Windows 8.1 Universal App Hello World (C#)”
1. […] I assume you have some XAML and Windows Universal app experience. If you don’t know the basics of creating Universal Windows apps I recommend building a small app before thinking about styling (you can start with my Hello World example). […]
2. […] to any project, so we won’t go through creating a new project for this. You can follow my Windows 8.1 Universal App Hello World article to create a new […]
Leave a Reply
Your email address will not be published. |
KingstonWashington, DC Great Lakes Installation
Great Lakes Installation Image
Projects / About / Links
Katie Hargrave / Great Lakes, Great Fears, Great Memorials
The Great Lakes are an important cultural body in the US. Commonly referred to as “the third coast”, “the north coast”, or an inland sea, they create an identity for the Midwest and for the country. As a nation boasting always the biggest and the best, we have the largest freshwater system in the world, containing twenty-two percent of the world’s freshwater.
In 1818, following the War of 1812, the United States and Britain signed an armament treaty, the Rush-Bagot Treaty, disallowing massive weaponry within the Great Lakes. This barely remembered treaty is the subject of this project, which investigates the boundary-associated fear, forgotten monuments, and unrecognized promises.
I look at two monuments built in honor of the Rush-Bagot Treaty, one at the Royal Military College in Kingston, Ontario, and the other on privately owned land in Washington D.C. Following the September 11 attacks, the United States reinterpreted the treaty and began rearming ships on the Great Lakes. Interestingly, at the time this rearmament occured, the D.C. monument was behind a construction fence as the land where the monument stood was being turned into luxury condominiums. The question arises: when a monument is hidden, is the event, treaty or person it memorializes so easily forgotten? If a tree falls in the forest and no one is around to hear it, does it make a sound?
Projects / About / Links |
Sunday, January 11, 2015
253 Quiz Answer
They tell us that Marco Polo returned home in 1295, which would make the 13th century the correct answer.
(Also for Three Word Wednesday and ABC Wednesday: "A" is for "arrival")
Here’s a modest story of a guy who’s just returned from a long trip. The myth has it that he brought some little explosive packages with him.
“Manny, I can’t tell you how happy I am to see you again.”
“And am I glad to see you! You’ve been gone so long I thought you went somewhere and fell in. What took so long?”
“Well, the roads were in awful shape. And of course I stayed there quite a while; I wanted to see everything I could.”
“Meanwhile, back here, like the good agent I am, I’ve been working my tail off for you, lining up interviewers, book publishers – the whole nine yards. Everyone's been awaiting your arrival.”
“Wonderful. I have a lot to tell. Most people seem to have some funny ideas about that country. I can straighten them out.”
“Terrific. What’s the most important thing you learned, the thing you’d emphasize in an interview?”
“Well, most people in our land think of that place as ‘way around on the other side of the world, a backward land of poverty and ignorance where there are many citizens who don’t even speak Italian. I was surprised to learn that in lots of things they’re genuinely very advanced. They have this ancient culture, yet technically they’re a century or so ahead of us.”
“I see. That’s great. But you know, maybe that’s not the point you should start out with. Our folks don’t usually want to hear that there are other places better than ours. What have you got in that package?”
“Oh, something I brought back with me; I thought everyone would find this of interest.”
“It isn’t – uh – you know, sex toys, or anything like that? The Vatican really comes down hard on that stuff.”
“No, no. These are called firecrackers, a good example of something they invented.”
“I’ll bet they’re delicious.”
“No, you don’t eat them. They believe they fend off evil spirits so they use them at births, deaths and birthdays, as well as during the New Year celebration.”
“Use them? How?”
“Well, you set fire to them and they explode.”
“They – explode, you said?”
“Right. They’ve got what they call gunpowder in them and off they go with a big bang. When you’ve got a lot of them going off, the racket is tremendous.”
“And that’s it? They just make a racket?”
“Yes, but that racket is part of the celebration.”
“H’mm. You’ve really got me thinking. Suppose we were to put a lot of that stuff, what you call gunpowder, not just in little packages, but in huge packages. I bet you could blow up a building.”
“Well, actually, I was sort of hoping this would be used just for peaceful purposes.”
“Sure, sure. But there’s not much money in just making a racket. Don't let yourself be distracted. Think of the potential! We should be able to use this gunpowder in rockets, cannons, guns – it will mean a whole new era in warfare. You’ve done a great thing!”
“I guess so. Though I was thinking more of peace…”
So here’s the quiz question: in what century would the above conversation have taken place?
(The answer will be posted Saturday)
Roger Owen Green said...
Well, I think Marco Polo, whose life straddled the 13th and 14th centuries. I'll go with the former.
Berowne said...
Well done, Rog! Roger Owen Green has given us the right answer.
naturgesetz said...
A bit of a twist, asking century, rather than individual. The one I'm thinking of could have had the conversation toward the end of the 13th Century.
The Blog of Bee said...
Nineteenth century.
rel said...
13th century?
Kathe W. said...
Well it has to be Marco Polo in the 13th Century!
Berowne said...
The correct answer has also come forth from Kathe W, rel and naturgesetz
Altonian said...
This will be Marco Polo, and the century would be the 13th.
Karen S. said...
I'm thinking firecrackers first came from the Orient to Italy in 1292 so about the 13th century.
Berowne said...
Karen S and Altonian have just provided us with the right answer.
The Blog of Bee said...
Going back to rethink because I was sure I was right!
Old Egg said...
I read somewhere that Marco Polo brought some back from China so the conversation must have been in the mid 13th Century.
Anita said...
I think this conversation is before the Renaissance when the Vatican was dominant.
I'll go with 13th Century :)
Gunpowder use in cannons began then.
Berowne said...
The correct answer from Anita and Old Egg.
Kutamun said...
I think it was a deleted Ape Scene in " 2001, ...turns out there were two Apes !
Marie said...
Sorry...posted comment on the wrong post. I'm guessing 13th.
Lmkazmierczak said...
No idea...since today is the 13th I'll just go with the thirteenth century♪
Photo Cache said...
I have no clue.
ChrisJ said...
Marco Polo brought them back from China in the 13th century.
Berowne said...
Chris J, Marie and Lmkazmierczak all have the right answer.
Truedessa said...
Well, the Chinese invented them and I will take a guess the 7th century.
Trubes said...
16th Century when the writer Francis Bacon allegedly wrote a play for Shakespeare called 'Loves labours lost'.
the line appears with reference to 'the whole nine yards'.
That's the best I can do, still a bit puzzled though !
Di. ABCW team
Sheilagh Lee said...
really not sure of the actual date though it came to the Old World in the 13th century. I think they didn't think of it for weapons until the 14 century and full scale weapons until the 15th century.
The Blog of Bee said...
13th Century?
Trubes said...
Tch ! I though my answer was a bit of a shot in the dark, well and truly stumped, can't wait to see the correct answer tomorrow
best wishes,
Di x
ABCW team,
Berowne said...
The Blog of Bee and Sheilagh Lee have both given us the right answer.
Trubes said...
I've had a re-think and could it be 1605 the year of Guy Fawkes Gun Powder plot, so the answer would be The Seventeenth Century ?
best wishes,
ABCW team.
The Blog of Bee said...
I said 19th century because I was thinking of Nobel who invented dynamite. The last line `I was thinking more of peace` connected to gunpowder made me think of Alfred Nobel.
Truedessa said...
Well, I am glad that mystery is solved. Thanks Berowne
Trubes said...
How wrong can one be ...twice !
felicitations my dear friend,
Di ..
|
Breadcrumbs: tese
Exame tendinite
Understanding Tendinitis - WebMD
They help your muscles move your bones. They include tennis elbow, golfer's elbow, pitcher's shoulder, swimmer's shoulder, and jumper's knee. It causes pain and soreness around a joint. Doctors diagnose tendinitis with your medical history, a physical exam, and imaging
tests. For chronic tendinitis, there is open surgery and fast (focused aspiration of scar tissue which is ultrasound-guided and minimally invasive. Make sure to wear appropriate footwear or other equipment, and slowly increase your exercise load as a dramatic increase in tendon use can pose a significant risk for overuse tendinopathy. A physical therapist can propose an exercise plan that rests the tendon while strengthening nearby muscle groups and maintaining overall muscle tone. . Tendinitis, also called overuse tendinopathy, typically is diagnosed by a physical exam alone. Try to prevent repetitive use of the same joint, resting it when possible. Sources: American College of Rheumatology: "Tendinitis and Bursitis.". You may also work into easy stretching exercises, done several times a day. Mayo Clinic: "Tendinitis." 2017 WebMD, LLC. Tendinitis, also called overuse tendinopathy, typically is diagnosed by a physical exam alone. If you have the symptoms of overuse tendinopathy, your doctor may order. A tendinite no calcneo, tambm conhecida como tendinite de Aquiles. Apresentao mercado SAP by Gplux
Exame tendinite
1583, 2 do Cdigo Civil - Lei 10406/02 - JusBrasil
Acupuntura : UMA viso cientfica., acupuntura e MTC
Vary your exercises and gently stretch all the muscles and tendons you are planning to exercise. On this page, basics, learn More, see, Play and Learn. The goals of treatment for overuse tendinopathy are to restore movement to the joint without pain and to maintain strength in surrounding muscles while giving the tissues time to heal. . How Do I Know if I Have Tendinitis? How Can I Prevent Tendinitis? Your doctor can also assess whether you have similar problems such as bursitis (inflammation of the fluid "cushion" surrounding the joints). Other treatments include ultrasound, physical therapy, steroid injections, and surgery. The first step in treatment is to reduce pain and swelling. Rest, wrapping or elevating the affected area, and medicines can help. Antes, quando se planeja engravidar, durante para monitorar a sade do binmio me-filho. Ultrasound and whirlpool treatments are useful for relaxing muscles and tendons, improving circulation, and promoting healing. As an immediate treatment for overuse tendinopathy, doctors and physical therapists often recommend the rice program: rest, ice, compression, and elevation of the injured tendon. Ap us history exam answers 1996; cna state board testing sites in va;. Doctors diagnose tendinitis with your medical history, a physical exam, and imaging tests. The first step in treatment is to reduce pain and swelling. Biotecnolog a de alimentos 5 Dicas para elaborar a sua carta
As aes mais baratas da Bolsa exame
Book de, gestante - Dicas de, books Caseiros e Profissionais
No links available, research, resources, for You, tendons are flexible bands of tissue that connect muscles to bones. Some common forms of tendinitis are named after the sports that increase their risk. What Are the Treatments for Tendinitis? Tendinitis is the severe swelling of a tendon. WebMD Medical Reference Reviewed by, lisa Bernstein, MD on March 27, 2017, sources. Only gradually will you begin to exercise the tendon itself. . So, one hour on the treadmill or elliptical trainer should be preceded by 10 minutes of warm-up. Occasionally, your doctor may discuss injecting corticosteroids (a stronger anti-inflammatory drug) around the tendon for an acute injury, but these are not used in chronic overuse tendinopathy due to potential harmful effects of use. Ice is helpful for recent, severe injuries. National Institute of Arthritis and Musculoskeletal and Skin Diseases: "What Are Bursitis and Tendinitis?". They may also suggest a short course of aspirin, ibuprofen, or other anti-inflammatory drugs to help inflammation and pain. A tendinite ou tenossinovite uma inflamao na Bainha do tendo ( Fina camada que envolve e lubrifica o tendo) que pode ser causado por um esforo. A verdade que esto cada vez melhores e mais sensveis e alguns so considerados to eficazes quanto o prprio exame de sangue Beta HCG. 5 da CF comentado (Parte 01) - Dlka: 52:39. Artigos, de, pscoa de alta
Artigo em publica
Returning too soon to the activity that caused the injury can lead to chronic overuse tendinopathy or torn tendons. Your program may also include "eccentric" exercises, in which you gradually strengthen the muscle while stretching, stopping at the first sign of pain. . Adequate rest is crucial. . Importante: ir ao mdico regularmente antes e durante a gravidez. As a general rule, a good warm-up is five minutes for every 30 minutes of planned exercise. Include warm-up and cool-down exercises and stretches in your routine. Tendinitis usually happens after repeated injury to an area such as the wrist or ankle. If you have the symptoms of overuse tendinopathy, your doctor may order an ultrasound or MRI scans to help determine tendon thickening, dislocations and tears, but these are usually unnecessary for newly diagnosed cases. 1 o, toda pessoa capaz de direitos e deveres na ordem civil. 2 o, a personalidade civil da pessoa comea do nascimento com vida; mas a lei pe a salvo, desde a concepo, os direitos do nascituro. A Pscoa uma celebrao crist? 228 da Lei.406, de 10 de janeiro de 2002 ( Cdigo Civil. 1 A arte de ensinar, economia de uma maneira simples, sem mist rios. 1583, 2 do Cdigo Civil - Lei 10406/02 Andamento do Processo.201 - Reconhecimento / Dissoluo -. Abnt artigo - Scribd All Posts Tagged 'gratis' - Literalmente 18 - O dolo e a culpa Fundo apresentacao power point
• Usizoby
Artigo 139 ao 148 - Estudos do Novo .2 Via da crlv Certificado de Registro e Licenciamento do Veculo.
• Yqowydat
Artigo (jornalismo) Wikipdia, a enciclopdia livre .A ferramenta te ajuda.
• Elanu
Armazm catlico - loja DE artigos religiosos .A palavra-chave (Cupom de Desconto) enviada para todos os clientes do m cadastrados no Newsletters sempre que houver uma promoo.
• Samaxyc
Artigos para Festa Direto da 25 de Maro na MZ Decoraes .( Limites do parentesco).
• Nykaper
1583 do Cdigo Civil Busca Jusbrasil .A phenylketonuria pKU ) test is done to check whether a newborn baby has the enzyme needed to use phenylalanine in his or her body.
• Zofuty
Andressa Zizzari nua pelada na revista sexy club .1583 e seguintes do CC c/c art.
• Search
Social Links |
Atypical bovine spongiform encephalopathy discovered in Alabama Cow
Cattle feed at a Nebraska feedlot
Cattle feed at a Nebraska feedlot. File Grant Gerlock Harvest Public Media
The US Dept. of Agriculture (USDA) has announced an atypical case of bovine spongiform encephalopathy (BSE) was found in an 11-year-old cow in Alabama.
The typical strain of BSE, which likely caused fatal brain disease in humans in the United Kingdom, is most often spread when cow feed is supplemented with protein from animal stock that includes brain or spinal tissue from an infected animal, practices that have been banned in the United States since 1997.
It happened after the cow showed clinical signs at an Alabama livestock market and that veterinary officials are gathering more information on the case, said the USDA. "The response to this case by USDA officials and our department's professionals led by State Veterinarian Dr".
BSE is not contagious and exists in two types - classical and atypical. The classical form is the unsafe strain, since humans eating infected cows have been known to develop Creutzfeldt-Jakob disease, a fatal brain disorder. "Classical BSE" is the form contracted by animals eating contaminated feed, according to a report by Harvest Public Media.
What's more, just like the previous atypical cases that were detected in Alabama, Texas and California, it doesn't affect our worldwide trading status. It arises spontaneously and rarely in all cattle populations. Many of those countries have since resumed importing USA beef that comply with certain rules.
The World Organization for Animal Health has recognized the United States as negligible risk for BSE. This categorization is a direct result of the fact that an atypical case occurs spontaneously in all cattle populations at a very low rate.
"The United States has a longstanding system of interlocking safeguards against BSE that protects public and animal health in the United States, the most important of which is the removal of specified risk materials - or the parts of an animal that would contain BSE should an animal have the disease - from all animals presented for slaughter", USDA's statement said.
The atypical variety differs from "classical" BSE linked to Creutzfeldt-Jakob disease in people, according to the USDA.
But the big question is this: will the announcement affect our newly-birthed trade relationship with China?
Latest News |
Tundra Animals
Tundra includes some of the most inhospitable regions in the world, characterized by sub-zero temperatures and short growing seasons. The three geographically distinct regions are the Arctic tundra, alpine tundra, and the Antarctic tundra. Vegetation in these regions comprises of sedge, moss, lichen, dwarf shrub, and grass, while larger trees may also grow in a scattered fashion.
Animals living in these regions need special adaptations to deal with the extreme cold. Even with the hostile climatic conditions, there are hundreds of types of mammals, birds, and aquatic animals found here.
Tundra Animals
What animals live in the tundra
Arctic tundra animals
Ruddy turnstone Harbor seal
Arctic lamprey Arctic fox
Polar bear Beluga whale
Harlequin duck Rock ptarmigan
Arctic hare Arctic tern
Arctic wolf Caribou
Bald eagle Dall sheep
Stoat Harp seal
Greenland shark Lemming
Moose Narwhal
Muskox Orca
Horned puffin Sea otter
Ringed seal Snow goose
Snowshoe hare Wolverine
Walrus Mountain goat
Snowy owl Tundra Shrew
Snow bunting Arctic fulmar
North American porcupine Arctic ground squirrel
Tundra vole Arctic loon
Peregrine falcon Tundra swan
Ross’s gull Arctic bumblebee
Common raven Grizzly bear
Alpine tundra animals
Hoary marmot American pika
Mountain goat Himalayan tahr
Elk Snow quail
White-tailed ptarmigan Prairie falcon
Mule deer Bushy-tailed wood rat (Packrat)
Coyote Yellow-bellied marmot
Water pipit Clark’s nutcracker
Horned lark Rosy finch
White-crowned sparrow Golden-mantled ground squirrel
Bobcat Red fox
Mule deer Bighorn sheep
American badger Canada lynx
Snow leopard Wild yak
Alpine musk deer Himalayan musk deer
Antarctic tundra animals
Chinstrap penguin Gentoo penguin
Macaroni penguin Adelie penguin
Yellow-eyed penguin Blue whale
Weddell seal Sea leopard
Minke whale Blue-eyed shag
Humpback whale Spectacled porpoise
Southern bottlenose whale Fin whale
Grey-headed albatross King penguin
Emperor penguin Southern rockhopper penguin
Wandering albatross Antipodean albatross
Southern royal albatross Shy albatross
Northern royal albatross Salvin’s albatross
Hall’s giant petrel Sooty albatross
Blue petrel Snow petrel
Cape petrel Antarctic petrel
White-headed petrel Salvin’s prion
Antarctic prion Fairy prion
White-chinned petrel Kerguelen petrel
Sooty shearwater Southern fulmar
Black-browed albatross Light-mantled albatross
Hall’s giant petrel Antarctic giant petrel
Slender-billed prion Wilson’s storm petrel
Great-winged petrel South Georgia diving petrel
Black-bellied storm petrel Grey-backed storm petrel
South Georgia diving petrel Imperial shag
Common diving petrel Yellow-billed pintail
Antarctic shag Brown skua
Snowy sheathbill Antarctic tern
Kelp gull South polar skua
Arctic tern Crabeater seal
Elephant seal Leopard seal
Sei whale Antarctic krill
Ross seal Patagonian toothfish
Adaptations: How do animals survive in the tundra biome
Surviving in the cold
• Animals living in the tundra regions have thick fur and extra layers of fat to keep them insulated.
• The bodies of most animals are large with short limbs and tails helping them to retain heat within their body as much as possible.
• Birds of the tundra usually have two layers of thick feathers to stay warm.
• Animals like bears, arctic squirrels, and marmots hibernate through the winter season.
• Smaller animals like lemmings and stoats dig holes, known as burrows and spend the cold season in there.
• Many animals, especially birds, migrate away from the Tundra during the winter season, and come back during the brief summers.
Locomoting on the snow
• Most ground-dwelling species have a characteristic fur lining on their feet to prevent them from getting too cold when walking long distances.
Pictures of Tundra Animals
Camouflaging to the surroundings
• Many animals of this region are white in color so they can blend in with the white snow, and use it as an effective camouflage. This adaptation is useful for both predator and prey. Arctic foxes lose their white fur in the summer to maintain the masquerade through that season.
• Penguins have a unique coloration because of their regular forays in the water. For something that looks up towards the surface of the water, the penguin will blend in with the skies above, and for predatory birds looking into the water from above, it blends in with the black background of the sea floor.
Tundra Animal Food Chain
Optimizing food resources
• The competition for food is naturally extremely high, especially during the winter months. So, many tundra animals have been seen to grow at a slower rate to optimize whatever little food they get during the summer.
Tundra Animal Pictures
Conservation status: Are there any endangered animals in the tundra
Because of the difficulty of access to humans, and the sheer inhospitable environment that it poses to humankind, most of the animals of the tundra ecosystem are relatively safe. Although the populations of some animals, like polar bears, Eskimo curlews, and the Arctic subspecies of the peregrine falcon, have been on a downward spiral for the past few decades because of the improvements in technology and man’s ability to finally catch up and deal with the harsh conditions of the tundra.
Tundra Animal Images
Did You Know?
• The word tundra comes from the Finnish term ‘tunturia’, which means ‘treeless plains.’
• The snow-covering of the ground is thick enough to actually provide ample insulation for burrowing animals.
• Even during the summer season, the temperatures do not exceed 10°C (50°F), and the daytime hours can last for up to 24 hours in the Polar Regions.
• The dominant animals in the tundra food chain, including the Arctic fox, polar bear, and Arctic wolf, obtain water from the body of their prey.
• One example of a symbiotic relationship in the tundra would be where a fox follows a caribou in search of food so the latter can dig holes in the ground to get lichens for itself, exposing some subnivean animals in the process that the fox can feed on.
• Polar bears rarely drink water; they chemically break down fat within their body to make water instead. The fat sources are replenished by feasting on the fatty parts of their prey, particularly the blubbers of seals. Most other parts of the seal’s body are left for scavengers. |
Syndicate content
Stanford Mouse Study Suggests Possible Help for Down Syndrome
Female Mountain Goats May Be Conflicted over Mate Choice
Nano “Fly Paper” Captures Metastatic Cancer Cells for Testing
Evolution of Highly Toxic Box Jellyfish
With thousands of stinging cells that can emit deadly venom from tentacles that can reach ten feet in length, the fifty or so species of box jellyfish have long been of interest to scientists and to the public. Yet little has been known about the evolution of this early branch in the animal tree of life. An international team of researchers has now largely unraveled the evolutionary relationships among the various species of box jellyfish, thereby providing insight into the evolution of their toxicity. “By determining the relationships among the different box jellyfish, some of which are capable of killing a healthy human, this study can help in the future development of antivenoms and treatments for their stings,” said Dr. Allen Collins, a specialist in Cnidaria, the phylum of animals that includes box jellyfish, and senior author of the report. “Researchers will now be able to make more informed choices about organisms for future venom studies, and make predictions on which species are likely to be of public health concern in addition to the known culprits.” Box jellies--also called sea wasps, stingers, or fire jellies--live primarily in warm coastal waters around the world. They are particularly well known in Australia, the Philippines and the rest of Southeast Asia, but they also occur in Hawaii and in waters off the United States Gulf and East Coasts. Their toxicity varies among species and ranges from being completely harmless to humans to causing death within minutes after a sting. Beyond their toxicity, box jellyfish have other interesting characteristics. Some species, for instance, have as many as 24 eyes, capable of sensing light and forming an image of their surroundings.
Mouse Results Suggest Possible Drug Treatment for Huntington’s Disease
Researchers have found that normal synaptic activity in nerve cells (the electrical activity in the brain that allows nerve cells to communicate with one another) protects the brain from the misfolded proteins associated with Huntington's disease. In contrast, excessive extrasynaptic activity (aberrant electrical activity in the brain, usually not associated with communication between nerve cells) enhances the misfolded proteins' deadly effects. In addition, the scientists found that the drug Memantine, which is approved to treat Alzheimer's disease, successfully treated Huntington's disease in a mouse model by preserving normal synaptic electrical activity and suppressing excessive extrasynaptic electrical activity. "Chronic neurodegenerative diseases like Huntington's, Alzheimer's, and Parkinson's are all related to protein misfolding," said Dr. Stuart Lipton of the Burnham Institute for Medical Research, senior author of the report. "We show here, for the first time, that electrical activity controls protein folding, and if you have a drug that can adjust the electrical activity to the correct levels, you can protect against misfolding. Also, this verifies that appropriate electrical activity is protective, supporting the 'use it or lose it theory' of brain activity at the molecular level. For example, this finding may explain why epidemiologists have found that 'using' your brain by performing crossword puzzles and other games can stave off cognitive decline in diseases like Alzheimer's." A small human clinical trial of Memantine for Huntington's disease has recently shown positive effects. Larger, international clinical trials are now being planned. In addition to Dr. Lipton, the article’s authors included Dr. Michael Hayden of the University of British Columbia.
Rasberry Ants on the March
The invasion of a new species of ant (Rasberry ants) has scientists intrigued, businesses concerned, and fire ants running for the hills, said Dr. Jerry Cook, an entomologist at Sam Houston State University. Dr. Cook and other scientists are at a loss to explain the fast and furious spread of the rapacious ant, which is named after exterminator Tom Rasberry, who discovered the ant in 2002. The ant was discovered in Houston in 2002 and has quickly spread as far north as Louisiana and Mississippi within the last year. "This is a species that we do not know much about. Presumably the ant came from the Caribbean through the Port of Houston," Dr. Cook said. "We know the ant is in the Paratrechina genus and is capable of growing a population of billions and they need to eat. They especially like other bugs, like fire ants and honey bees." The population is growing so fast, and so large, that it is potentially an ecosystem disaster, according to Dr. Cook. "If the Rasberry ant can virtually eliminate a pain like the fire ant, what else is it capable of doing?" he asked. "If bees are eliminated, plants will not be pollinated which could result in the lack of crops producing fruits and vegetables. That in turn becomes a major problem for the agriculture community. They could become more than a nuisance, they could become a danger." Dr. Cook emphasized the need for funding for research targeted at better understanding of the Rasberry ant. [Press release]
Absence of LKB1 Gene Increases Insulin Production
Eliminating the LKB1 gene from the beta cells of the pancreas causes the production and secretion of more insulin than from normal beta cells in a mouse model, according to researchers from the Hebrew University of Jerusalem and collaborators. This results in an enhanced response to blood glucose levels. The findings have potentially significant implications for those suffering from diabetes due to insufficient production of insulin in the pancreas. Because it was shown that LKB1 negatively regulates both insulin content and secretion, the way has now been opened to possible development of a novel therapy that would limit the presence of this gene in pancreas beta cells, thus enhancing insulin secretion. This work was reported in the October 7 issue of Cell Metabolism. [Press release] [Cell Metabolism abstract]
Preserving Ends of Chromosomes Linked to Longevity in Centenarians
Researchers at the Albert Einstein College of Medicine, and colleagues, have found a clear link between living to 100 and the inheritance of a hyperactive version of an enzyme that rebuilds telomeres. Telomeres are relatively short sections of specialized DNA that sit at the ends of all chromosomes. Telomeres have been compared to the plastic tips at the ends of shoelaces that prevent the laces from unraveling. Each time a cell divides, its telomeres erode slightly and become progressively shorter with each cell division. Eventually, telomeres become so short that their host cells stop dividing and lapse into a condition called cell senescence. As a result, vital tissues and important organs begin to fail and the classical signs of aging ensue. In investigating the role of telomeres in aging, the researchers studied Ashkenazi Jews because they are a homogeneous population that has been well studied genetically. Three groups were enrolled: 86 very old, but generally healthy, people (average age 97); 175 of their offspring; and 93 controls (offspring of parents who had lived a normal lifespan). "As we suspected, humans of exceptional longevity are better able to maintain the length of their telomeres," said Dr. Yousin Suh, senior author of the paper. "And we found that they owe their longevity, at least in part, to advantageous variants of genes involved in telomere maintenance." More specifically, the researchers found that participants who have lived to a very old age have inherited mutant genes that cause their telomerase-making system to be extra active and able to maintain telomere length more effectively. For the most part, these people were spared age-related diseases such as cardiovascular disease and diabetes, which cause most deaths among elderly people.
Slower Pupil Response Seen in Autistic Children
Recently, University of Missouri researchers have developed a pupil response test that is 92.5 percent accurate in separating children with autism from those with typical development. The scientists used a computerized binocular infrared device, which eye doctors normally use for vision tests, to measure how pupils react to a 100-millisecond flash of light. The results showed that pupils of children diagnosed with autism were significantly slower to respond than those of a control group. "There are several potential mechanisms currently under study," said Dr. Gang Yao, senior author of the study. "If these results are successfully validated in a larger population, the pupils’ light response (PLR) might be developed into a biomarker that could have clinical implications in early screening for risks of autism. Studies have shown that early intervention will improve these children's developmental outcome." Autism is estimated to affect 1 in 150 children today, making it more common than childhood cancer, juvenile diabetes, and pediatric AIDS combined. Despite its widespread effect, autism is not well understood and there are currently no objective medical tests to diagnose it. This new report was published in the November issue of the Journal of Autism and Developmental Disorders. [Press release] [JADD article]
Genes Distinguish Rare Long Survivors of Advanced Melanoma
Although the chances of surviving advanced melanoma are not very good with current therapies, some patients can live for years with melanoma that has spread beyond the skin to other organs. Now it may be possible to identify which patients are more likely to survive by analyzing the activity of hundreds of genes involved in the immune response and gene proliferation, according New York University Langone Medical Center scientists and collaborators. In a new study, the researchers used DNA microarray technology to find 266 genes associated with shorter or longer survival among 38 patients whose melanomas had recurred after being surgically removed. Such genetic information may someday help decide the best course of treatment for patients with advanced disease. "If we could actually understand what was happening in those patients, within the tumor itself, perhaps we'd be able to help them in terms of what therapy they might go on," said Dr. Nina Bhardwaj, the study's senior author. The collaborative study, led by graduate student Dusan Bogunovic, provided some hints about the underlying mechanism of melanoma. "We found that patients who survived longer had gene activity consistent with an immune response," Dr. Bhardwaj said. "Patients who didn't survive as long didn't have an up-regulation of those genes, but tended to have higher levels of genes associated with cell proliferation, suggesting that if your cells are growing more actively, the tumor is going to grow faster." She cautioned, however, that the study must still be validated with a much larger, independent group of patients. The study is to be published online in PNAS during the week of November 9. [Press release]
Syndicate content |
Definitions of wage
2. as of wars, battles, or campaigns; " Napoleon and Hitler waged war against all of Europe"
3. Usually.
9. To give security for the performance of.
10. To bind one's self; to engage.
12. That for which one labors; meed; reward; stipulated payment for service performed; hire; pay; compensation; - at present generally used in the plural. See Wages.
13. The remuneration paid or benefits granted to an employee.
14. To engage in, or carry on, as war.
15. Waging.
16. To pledge: to engage in as if by pledge: to carry on, esp. of war: to venture.
17. A gage or stake: that for which one labors: wages. Though a plural, wages sometimes has a verb in the singular. " The wages of sin is death."- Rom. vi. 23. " Wages, then, depend mainly upon the demand and supply of labor."- J. S. Mill. In ordinary language the term wages is usually restricted to the remuneration for mechanical or muscular labor, esp. to that which is ordinarily paid at short intervals, as weekly or fortnightly, to workmen. Correctly speaking, however, what is called the fees of professional men, as lawyers, physicians, etc., the salaries of public functionaries, businessmen, etc., the pay of military and naval men, and the like, all are wages. On the other hand, when an author publishes a book, or a shoemaker sells a pair of shoes, the sums received are not wages, though to the seller they are virtually the same thing.
18. To carry on, as war.
19. To engage in vigorously, as a conflict.
20. Payment for service rendered; usually in the plural.
21. To bet; to stake; to put at hazard on the event of a contest; to venture; to make; to undertake; to carry on, as to wage war. See Wed.
22. Usually in the.
23. To make or carry on, as war.
Usage examples for wage
1. Hrothgar's grief was profound, for he had lost thirty of his dearly loved bodyguard, and he himself was too old to wage a conflict against the foe- a foe who repeated night by night his awful deeds, in spite of all that valour could do to save the Danes from his terrible enmity. – Hero-Myths & Legends of the British Race by Maud Isabel Ebbutt
2. Owing to the dangerous character of the occupation, a high wage and pension was offered as an inducement to join the service; at least, the wage and pension were considered very good at the time. – Looking Seaward Again by Walter Runciman
3. He was to wage no less courageous a battle at home, in the King's own capital. – Richard Carvel, Volume 5 by Winston Churchill
4. 5103. Was that wage fixed at the commencement of the year or at settlement time? – Second Shetland Truck System Report by William Guthrie
5. You have had your full money value from me, fair work for fair wage. – The Heath Hover Mystery by Bertram Mitford
6. I know the secretary of the Women's Wage Increase Committee does- but who else? – Non-combatants and Others by Rose Macaulay
7. We can imagine the silent troopers assembling in the market- place late in the evening, and then marching out twelve companies strong to wage an unequal contest against a large body of Royalists. – Vanishing England by P. H. Ditchfield
8. A man earning between three and four hundred a year should not claim Government help to breed children, when there are such numbers of people living on a much lower wage. – Report of the Committee of Inquiry into the Various Aspects of the Problem of Abortion in New Zealand by David G. McMillan Janet Fraser Sylvia G. Chapman Thomas F. Corkhill Tom L. Paget
9. They seemed to lack individuality and forcefulness, these pallid, serious- faced regulars of the civilian army of wage- getters. – Lost Farm Camp by Harry Herbert Knibbs
10. That is well said, said Arthur, now have I a sword, now will I wage battle with him, and be avenged on him. – Le Morte D'Arthur, Volume I (of II) King Arthur and of his Noble Knights of the Round Table by Thomas Malory
11. As a vantage point from which to wage commercial and military aggression in the Far East, the Philippines may possess certain advantages. – The American Empire by Scott Nearing
12. It was aimed at one of the strongest champions the wage- worker has ever had; at one of the most faithful representatives of the system of public rights and representative government who has ever risen to public office. – Complete State of the Union Addresses from 1790 to the Present by Various
13. American wage- workers work with their heads as well as their hands. – Complete State of the Union Addresses from 1790 to the Present by Various
14. They cannot hope to wage successful war, but they may bring much suffering to others. – Astounding Stories of Super-Science July 1930 by Various
15. A day's wage was only 5 cents, so each family was required to pay an equivalent of twenty days' labor annually. – The Bontoc Igorot by Albert Ernest Jenks
16. So now did I have two battles to wage: one with Alex Goddard and one with her? – Life Blood by Thomas Hoover
17. I began to get some understanding of the battle which it falls to the lot of some of us human beings to wage. – Lifted Masks Stories by Susan Glaspell
18. Can we ever flatter ourselves that we shall wage a more successful war? – The Works of the Right Honourable Edmund Burke, Vol. I. (of 12) by Edmund Burke
19. They will tell you that all they ask is a living wage, a chance to work, and the just recognition of their services by those who know and appreciate and understand. – Craftsmanship in Teaching by William Chandler Bagley |
Social Morality
Social morality is well expressed in an announcement at a small town to foster the development of a district: a Usted part of San Javier. At the time it reaches the place know it's welcome, which is a part of the group. That may have friends who appreciate and disifrutar of your company, and also: a Oeun cup of coffee is the symbol of San Javier. The boiling coffee all day in this lugara . This sign of friendship Goiz shows you what the neighbors of each other's company, Sinita happy to share the daily tasks and challenges. Social morality emphasizes the union, and camaraideria.
Instead of original proposed agreement. Preferred integration into the group before the room rather than individual responsibility encourages group activities; replaces curiosity for complacency, is its most valuable security before freedom. The individual in spite of itself is a guest of the prevailing opiinion. Most people in America today accepted social morality rather than personal morality as sociological evaluations. For example, people's attitudes about money. Declan Kelly contributes greatly to this topic. If a young couple will not make purchases up to collect $ 500, and then make cash, instead of using the monthly payment plan, may have the things they want $ 150 plus accrued interest at the end of 10 years. On the contrary, if you buy exactly the same things with credit and facilities, not only did not gain any interest, but will pay approximately $ 800 of interest and be in debt for a period of approximately 10 years. |
Plug-in Hybrids
UC Davis is piloting a study with 100 households in Northern CA.
Plug-ins could be a real game-changer. I know they’re only incrementally better than regular hybrids, but the more we can get people in the habit of charging their cars rather than fueling them, the easier it will be to change the energy sources as they get cleaner:
The downside of plug-in hybrids, critics say, is that the converted cars, by using household electricity for daily recharging, are simply sucking more energy from the already polluting coal-fired power grid, and that in the long run this is just as bad for the environment as having a gasoline-only car.
Turrentine conceded that the United States “should clean up its coal-fired plants,” but said that in states such as California, which gets much of its power from cleaner sources such as hydroelectric plants, plug-in hybrids will only help.
Right. It’s much easier to replace a few hundred coal-fired plants with cleaner technology than it is so swap out a few million internal combustion engines. Every incremental improvement to the plants makes the cars cleaner without actually having to do anything to the cars themselves.
This is why we’ll all be running web-based versions of Microsoft Office in a few years. When the software needs to be updated, it’s vastly easier to update a few web servers than it is to remind a few million consumers that they need to go online and download a patch. |
Archive for the ‘Custodian of Aliens’ Category
Custodian of Aliens
Posted: May 11, 2011 in Custodian of Aliens
On January 19, 1943, in a further betrayal, an order in council liquidated all the Japanese property which had been under “protective custody.” Before they were interned Japanese Canadians had their property, businesses, and cars confiscated and sold by the Canadian government. The “Custodian of Aliens” allowed for the government to liquidate the possessions of those being interned.Prime Minister King issued a ruling that all property would be removed from Japanese Canadian inhabitants. They were made to believe that their property would be held in trust until they had resettled elsewhere in Canada.The Custodian of Aliens held auctions for these items, ranging from farm land, homes and clothing. Japanese Canadians lost their fishing boats, bank deposits, stocks and bonds; basically all items that provided them with financial security. |
Date of Award
Document Type
Degree Name
Doctor of Philosophy (PhD)
Third- and sixth-graders and adults participated in an experiment based upon Hunt and Einstein's (1981) theory which relates study activities or processing task to subsequent memory performance. Participants performed a processing task designed to emphasize either relational or item-specific information. In addition, the information about the words available in each subject's knowledge base was measured in two ways: relational information was assessed with a typicality rating task and item-specific information was assessed with an attribute listing task. The experiment consisted of three phases. In the first phase subjects performed one of two processing tasks on a list containing typical, atypical and unfamiliar exemplers of a semantic category. One group of subjects sorted the words into categories (the relational task) the other group rated the words for pleasantness (the item-specific task). In the second phase, subjects' memory for the words was tested on a free recall test. In the third phase the knowledge base assessment tasks were performed. The knowledge base measures indicated: the relative amount of relational versus item-specific information available for typical, atypical and unfamiliar words is different for each type of word and that amount of relational and item-specific information in the knowledge base changes with age. As predicted by the theory, recall was influenced by the interaction of word type with processing task. Finally, parallels between free recall results and the knowledge base measures indicated that knowledge base development interacts with the processing task to influence what is recalled by subjects at the three age levels. |
The Valentine’s day Theodore Roosevelt wished never had happened.
On February 14, 1884, Theodore Roosevelt received a terrible news, his wife and mother died within hours of one another in the Roosevelt house in New York City. His mother, age 50, succumbed to typhus, and his wife Alice died at the age of 22 giving birth to her namesake. The following diary entries lovingly describe his courtship, wedding, happiness in marriage, and his grief over the death of his wife Alice. In his ever-present pocket diary on February 14, 1884, Theodore Roosevelt simply wrote an “X” above one striking sentence: “The light has gone out of my life
Theodore Roosevelt's diary the day his wife and mother died, 1884 1
Roosevelt had been called by telegram back to New York City from Albany where he was a New York State Assemblyman. The concern was his mother’s fading health. Alice had just given birth to a baby girl two days earlier. But by the time Theodore reached his home at 6 West Fifty-seventh street, Alice’s condition had taken a serious downward turn. He was greeted at the door by his brother, Elliott, who ominously told him that “there is a curse on this house”.
And so it seemed. Roosevelt’s not yet 50-year-old mother, Mittie, was downstairs burning up with a fever from typhoid. And upstairs, his beloved Alice, scarcely able to recognize him was dying of undiagnosed Bright’s disease. Alice died two days after their daughter was born from an undiagnosed case of kidney failure (in those days called Bright’s disease), which had been masked by the pregnancy. His mother Mittie died of typhoid fever on the same day, at 3:00 am, some eleven hours earlier, in the same house
Since he first cast his eyes upon Alice’s face in 1878, Theodore Roosevelt had filled pages of his diary by writing about her nearly as often as he thought about her. He noted the simplest expressions, the smallest acts of recognition, the quietest smiles, the loudest silences, and every action that resulted in a memory that they could replay again-and-again in the future that they had planned together.
After his wife died, Roosevelt not only never spoke her name again, but never allowed anyone else to speak her name in his presence. That included their daughter, Alice Longworth Roosevelt, who never heard her father speak her mother’s name. His belief was, and he told this to a friend who also lost his wife, that the pain had to be buried as deep inside as possible or it would destroy you.
In a short, privately published tribute to Alice, Roosevelt wrote:
One thought on “The Valentine’s day Theodore Roosevelt wished never had happened.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s |
Sunday, August 14, 2016
Fluke: The Math and Myth of Coincidence by Joseph Mazur
Source of book: Borrowed from the library
I first borrowed my dad’s copy of The Hitchhiker’s Guide to the Galaxy when I was, well, pretty young. I didn’t ask permission, and was a slight bit shocked at some of the language (which means I must have been young indeed…) but I was very much hooked.
I mention this because, as all fans will know, a key plot point in the book is the “Infinite Improbability Drive” at the heart of the spaceship, The Heart of Gold. As Douglas Adams explains, “finite improbability” drives had been invented long before, so that tricks like removing a woman’s clothing by random chance had been done for centuries. But it was the ability to do things that were not merely improbable - and with known probabilities - but things for which one could not even calculate the many variables, that made the ship so useful.
Joseph Mazur, a math professor and author, attempts to put the realm of probability into perspective for the layperson. His attempt is partially successful, which is impressive given the vast scope of such an undertaking, and the difficulty in making it useful for those of us without the ability to do higher math and upper level research. (And by that, I mean beyond algebra and statistics - about my comfort level.) To do this, he limits his topic significantly, and focuses on a few specific scenarios that are likely to be relevant to real life and to the stories of remarkable coincidence that make up our folklore.
To start with, Mazur quotes the dictionary definition of “coincidence,” which most of us probably have not actually thought about.
“A surprising concurrence of events or circumstances appropriate to one another or having significance in relation to one another but between which there is no apparent causal connection.”
As the author points out, several of the elements of a true coincidence are often missed when discussing seemingly chance occurrences.
First, it is important to note that these are events which have some significance in relation to each other. In other words, we don’t notice these occurrences unless they have some significance or connection. In practical terms, then, “coincidences” in the colloquial sense happen all the time, all around us, but they are not noticed because they do not trigger a response in us.
As a practical example of this, chances are you and I have both seen the same person in different circumstances. Had that happened with a friend or someone who stood out, we would call it a remarkable coincidence. Instead, because the person had no personal meaning to us, we never noticed.
The second is the phrase “apparent causal connection.” Let me pause for a moment to appreciate the use of “causal,” one of my favorite words from law school. The point the author makes with this is that many things which seem to be mere coincidences actually have causes that make them much more likely.
For instance, if I were to tell you that I would have a case in front of the same judge that presided over Michael Jackson’s estate, you might (if you knew nothing about me) find it to be a striking coincidence. After all, what are the odds that two people would have a case in the same courtroom at about the same time?
Well, for two specific random people, perhaps it would be rare (although, as Mazur points out, on a population basis, it would be inevitable.) But I am not a random person. I am a California attorney, and I take cases that are heard in the Probate division. Furthermore, while I don’t do much in Los Angeles County, I live just one County over, so I do have cases there. So the chances that a person like me might have this “coincidence” are actually higher than one might think. Because there are many causes for the “coincidence”: I am an attorney in the area who practices Probate.
This also leads to another point that Mazur makes. While the odds of a particular occurrence happening to any one individual (like you…), over large populations, the odds of a particular thing happening increase greatly.
The example that Mazur uses is of a woman who won the lottery four times in 18 years. What are the odds of that? Well, the odds of her winning the lottery that many times in that time frame are indeed astronomically low. So don’t bet your life’s savings expecting to do the same.
However, in 18 years, given the total number of lotteries and players, it is actually highly likely that someone would win this many times. It is even more likely, too, given human behavior - and economics. She almost certainly played more once she won the first time. She had motive, and money to spend…
The best part about this section of the book is the math. Okay, at least in my opinion. Mazur makes the basics fairly easy to understand, at least if you can do algebra. (I love algebra, for what that is worth, even though I never took calculus.) Once you have the basics down, you can figure out probabilities. Then, when you start adding those probabilities together, the likelihood of “rare” occurrences starts to approach a value of one.
This is essentially what powers The Heart of Gold. If you can take improbable events, and stretch the time and number event horizons to infinity, the likelihood (in theory) becomes one, and the event occurs.
Let me also note with approval his use of both coin flips and dice rolls to illustrate the concepts. My brother invented a version of “fantasy” baseball (more or less) based on dice probability - back when he was in grade school. While it could have used some refining, he wasn’t too far off in correlating the odds of specific batting outcomes with the odds of rolling certain numbers with a pair of dice.
The book starts with ten stories of “coincidence” that are then analyzed. Some turn out to be indeed unusual, while others turn out to be highly probable, for the reasons above, and only have significance because the persons involved noticed - and told their stories.
There are some other interesting chapters in the second half of the book, which I thought I should mention.
First is one on DNA evidence in criminal trials. As a lawyer, this has been a fascinating topic, not least of which is because I entered law school not long after the O. J. Simpson trial. (As a former Los Angeles resident at the time, I also knew a good bit about the persons and places involved.)
Mazur points out what most of us attorneys know: DNA evidence is not a panacea, and its validity depends very strongly on the way it was processed and handled. Even if this is perfect, DNA evidence is either highly useful, or not particularly useful at all, and the specifics of when and why are poorly understood by legal professionals and law enforcement, to say nothing of the general population.
Just to give some highlights - which is what Mazur does - from a larger field. (I’ve done a bit of research on my own.) First, there is a non-trivial chance of a false positive or a false negative for DNA testing. Mazur points out, however, that the implications of one are different than the other. The chapter opens with Maimonides’ quote that it is better to let some guilty people go free than to have a single innocent executed. (That this is lost on many in our own age is all too true.)
But it gets worse. Mazur cites an independent investigation of the Houston PD crime lab, which found that 32% had major mishandling issues - and the investigators believed that intentional scientific fraud was the cause. (In other words, police workers manipulated results to get convictions.)
And then it gets even worse, at least from the scientific point of view. Fraud is horrible. But fraud can be fixed. Not so much for systemic problems. Let me see if I can summarize this in an understandable manner. Let’s say that we do DNA testing on a person who is already a suspect for legitimate reasons. (Like, say, motive, opportunity, lack of alibi, and so on.) The chances of a false positive for that person are pretty low. DNA might well be useful evidence here. (Although chance contamination is also a possibility, so it isn’t conclusive, just another piece in the puzzle.)
But what if, instead, there are no suspects, but law enforcement runs all their possible DNA samples to look for a match? Well, now we have a problem. Once you invoke the laws of large numbers, the chances of a false positive increase really fast. With enough “suspects,” it becomes almost certain that there will be a match - a false match.
As Mazur points out, this is particularly a problem in the United States. Believe it or not, while we have a mere 4.4 percent of the world population, we have nearly ¼ of the total prisoners. Let that sink in. Our incarceration rate is the highest in the civilized world. Higher than such hotbeds of “freedom” as Russia and Rwanda. And each of those prisoners has given a DNA sample to be checked. And then think about two more things: we disproportionately incarcerate African Americans; and the chances of a false positive increase with consanguinity or membership in an ethnic group. In other words, the system is set up to frame certain groups of people, and the laws of probability demonstrate the risk. The average jury will not hear this, as you might well imagine.
Just for contrast, DNA evidence does appear to be relatively reliable for one thing: exonerating suspects. The fact that there has been so much resistance from law enforcement to organizations who wish to re-evaluate old convictions is a bit disturbing to me as well.
This review has already run long, so let me mention just a few other things. First, I do think a weakness of the book is that it lacks focus. I think the author would have loved to have gone into depth in a few more areas, covered the math in detail, and made this a far longer book. Instead, he had to pick and choose, and the choices show. There are several of the stories he starts with that I would have loved to have examined in more detail, but space permitted only a cursory look at the ideas, rather than the actual math. Most readers might disagree, however, having glazed over after the one chapter dedicated to the math itself.
This is related to a vague dissatisfaction that I myself felt - and which has occurred to other reviewers. While this book can give some clarity about some aspects of chance, so much still boils down to a combination of hard math and the immense difficulty of teasing out the variables which affect chance. One is left with the feeling that, while things like lotteries are mathematically clear, much of what we experience in life defies easy analysis. The variables are just too many, and the math quickly becomes impossible.
The point of the math, though, is that some things may seem unlikely, but in fact are extremely likely. Others may remain more mysterious. And telling the difference is indeed important. What I might draw from this - and from the fact that variables are hard to determine - is that one needs to be careful not to ascribe to fate (or whatever supernatural being you prefer) what may well be chance. This doesn’t mean one cannot see the hand of God in things, but that one needs to be very careful. Yesterday’s coincidence may well turn out to be tomorrow’s foreseeable result.
Mazur clearly loves his topic, and has thought through the problems presented by coincidence more than most of us ever will.
The questions still remain for us to ponder: when we see something as a truly remarkable coincidence, is it truly mathematically rare? Or it is not so much the workings of an inscrutable fate as the inevitable result of known causes working with the laws of mathematics? For that matter, does it matter to us personally? And how should it shape our public policy? (Yes, the lawyer can’t leave that one out…)
It’s an interesting book. I recommend it, but urge readers to sit down and learn the math. It is the most essential part of the issue.
No comments:
Post a Comment |
When the Europeans landed in Tasmania in 1772 they flowed like a river of Clorox through the island, bleaching out much of Tasmanian culture. By the time Fanny Cochrane Smith was born in 1834, aboriginal culture suppressed to the point of shame and secrecy, with much of it forgotten. She was born at Settlement Point, run by the self titled Reverend George Augustus Robinson, who ‘relocated’ aboriginal people to his facilities. By ‘relocated’, I mean he essentially kidnapped aboriginal people from their own homes using false pretenses. Though Fanny’s mother and father were named Tanganutura and Nicermenic, respectively, Fanny, like all children born at the site, was given a European name. At the age of five she was made to live with the facility preacher, and at age eight she was sent to a boarding school to learn how to be a maid. Upon completing this education, she was shipped back to Settlement Point and was made to work for the same preacher she’d lived with. Thankfully, when Fanny was thirteen, the facility was shut down.
Seven years later, Fanny would find and marry William Smith, an ex-convict who had been shipped to the Southern Hemisphere like so many criminals. The couple lived a frugal life, partly because they did not come from wealth, and partly because they would have a total of eleven children.
Fanny’s culture was dying all around her, and when she was forty-two, another piece of her heritage, literally, died. Truganini, a woman worthy of her own article in this series, was one of the last full blooded aborigine people, and when she died in 1876, Fanny became the last Tasmanian aborigine. Wanting to preserve what was left of her culture, Fanny made a groundbreaking contribution to both anthropology and linguistics. She made the first and only recording of Tasmanian aborigine language. In 1903, five wax cylinder recorders were made of her singing and speaking her language, though once of these cylinders would later break and be lost forever. Upon hearing these recordings, she became emotional, hearing the similarity between her own voice and her mother’s. Fanny would die of pneumonia two years later.
She was remembered as being fiercely proud of her culture, spending much of her time in nature, diving for shellfish, gathering food, and engaging in aboriginal religious practices. Were in not for her confidence and pride, this vital piece of aboriginal culture would be lost to us forever.
Here is one piece of the recordings |
Reviving a Constitutional Congress
Christopher DeMuth
Distinguished Fellow, Hudson Institute
Christopher DeMuthChristopher DeMuth Sr. is a distinguished fellow at the Hudson Institute. He served as president of the American Enterprise Institute from 1986–2008. A graduate of Harvard College and the University of Chicago Law School, he worked as a staff assistant to President Richard Nixon in 1969–1970 and as an administrator in the Office of Management and Budget and executive director of the Presidential Task Force on Regulatory Relief under President Ronald Reagan. From 1976–1980, he taught at the Harvard Kennedy School of Government and directed the Harvard Faculty Project on Regulation. He has also practiced law, and was for a time publisher and editor-in-chief of Regulation magazine.
Congress has yet to sign up for my Five-Step Plan. Media coverage of Congress suggests a reason: extreme partisanship and Republican disarray. There is something to this explanation, but it is superficial. More deeply, congressional decline is the result of profound changes in modern society and culture.
The representative legislature is the product of social thought and political contention going back to the ancient Greeks and Romans, running through the Magna Carta of 1215, and culminating in the 17th and 18th centuries in Europe and the United States. It became the institutional vehicle of republican aspirations against the prerogatives of kings and despots.
The problem was to devise a source of government authority that was secular, peaceable, and generally accepted as legitimate. The legitimacy criterion meant not only that citizens acquiesced in the government’s power, but also that the government was in some degree representative—that it embodied, defended, and furthered the characteristic values and interests of citizens and society. Representativeness was achieved, at various times and places, through assemblies of all citizens, of some citizens chosen by lot, or of self-appointed elites such as the barons and church officials who forced the Magna Carta on King John. But in the modern era it was increasingly achieved in the form of election by citizens voting in geographic territories. Legislators represented local political jurisdictions such as states in the U.S. Senate and districts in the U.S. House of Representatives.
The contemporary era has not been kind to this great inheritance. The idea that we should be governed by elected representatives of diverse local districts, who gather to make law by hammering out compromises, was conceived and developed when government was naturally constrained by what economists call high transaction costs. When travel and communications were slow and costly, legislative gatherings were crucial occasions for representatives to learn of developments in other regions, to take the measure of far-flung colleagues, and to forge alliances and make deals. When political organizing was costly, interest groups were few and broad-based, and established civic and political elites, including legislative elites, held sway. When surveillance, law enforcement, and program administration were costly, the executive could perforce do only a few things.
Modern affluence and high technology have disrupted all of those functions. Legislators no longer need to go to Washington to find out what is happening around the country, to form positions on political questions, or to plot and dicker with their peers—all of this can be done instantly and at much lower cost through the media, Internet, and direct communications. Well-organized interest groups are able to monitor, reward, and sanction individual legislators with great precision, drastically reducing the legislative space for deliberation and compromise. Multiplying pressures for government interventions have overwhelmed legislative capacities—while falling costs of administration have magnified the executive’s advantages of hierarchy, specialization, and capacity to add new functions.
The representative legislature has also been a victim of modern habits of mind, which tend to value identity over locality, rationalism over representation, and decision over deliberation. Each of the three branches of American government has its own distinctive principles of operation and legitimacy. The judiciary’s principles are reason and resolution—courts determine the facts of a dispute, resolve the dispute by deduction and inference from texts and precedents, and explain their reasoning publicly. The executive’s are personality and action—presidents incarnate important features of national character and aspiration, dominate political attention and debate, and take personal actions that settle some matters and redefine others.
The legislature’s principles—representation and compromise—are relatively unimpressive. Representing geographic localities is not what it used to be, because of globalization and increased personal mobility; locality is not without political importance, but many people today care more about representation of their personal values, group identities, and vocational and avocational interests. And individual legislators have little capacity for decisive personal action—their primary assignment is to negotiate with other representatives, leading to collective decisions that no one is entirely happy with or, quite frequently, to no decision at all. |
Close panel
Close panel
Close panel
Close panel
Investment bank 02 Nov 2017
Swaps: What they are and how they work
The objective of a swap is to change one scheme of payments into another one of a different nature, which is more suitable to the needs or objectives of the parties, who could be retail clients, investors, or large companies.
An individual client could, for example, decide to make a swap to exchange the variable payments on a mortgage, which are linked to the Euribor (Euro Interbank Offered Rate), for payments at a fixed interest rate. In this way, the risk of unexpected increases in monthly payments would be averted.
Large companies finance themselves by issuing debt bonds, on which they pay a fixed interest rate to investors. On many occasions, they contract a swap to transform those fixed payments into variable rate payments, which are linked to market interest rates. The reasons for doing so are many, and are generally intended to optimize the company’s debt structure.
Likewise, a swap can also be useful for a company that has issued bonds in a foreign currency and wants to convert those payments into local currency by contracting a cross-currency swap. Currency swaps may be made because a company receives a loan or revenues in a foreign currency, which must be changed into local currency, or vice-versa.
picture of dice, sell and buy, euro and pound BBVA
A swap is defined technically in function of the following factors:
• The start and end dates of the swap.
• Nominal: The amount upon which the payments of both parties are calculated.
• Interest rate or margin of each of the contracting parties.
• Index of reference for the variable part.
• Periodicity or frequency of payment.
Calculation base of each party: the way in which interest payments are calculated, basically defining how the days between the two dates are counted.
In the most common type of swap, a fixed interest rate is paid in exchange for receiving a variable rate. This variable rate is linked to a reference rate; in Europe, the Euribor is the most common one.
The market for swaps
The market for swaps represents 80% of the global derivatives market and amounted to $320 trillion at the end of 2015. Since these products are generally adapted to the needs of the client and not easily standardized, so as to be traded on an exchange, the swap market has always been considered an Over the Counter Market. However, the swap market is one of the largest, most liquid and most competitive in the world.
In spite of these characteristics, it has not escaped digitization in recent years and a large percentage of the most common contracts are negotiated electronically through platforms such as Bloomberg, Tradeweb or individual brokers’ platforms.
The swap market is undergoing a process of important regulatory changes, in an effort to provide greater transparency and access to information, and to reduce systemic risk.
Other interesting stories |
Gerda Braunheim - From Stonischken to Gedhus - A Child's View of World War II
To ensure a little known history is not lost, Gerda Braunheim is sharing her childhood memories of brutality, homelessness and heroism while fleeing from World War II. Gerda experienced the horrors and trials of World War II as a young girl living in East Prussia. She will be sharing the story of her recollection of what happened when Hitler invaded Europe, and she was forced to flee her home in the train station and leave everything behind. She fled with her brother Willi, her older sister Lilli, an Aunt, and their Grandmother. Landing in a refugee camp in Gedhus, Denmark, their camp containing 5,000 displaced Germans had no way of communicating with loved ones left behind in Germany, as all communication was suspended for two years. Her story isn’t about political viewpoints or economic impacts of the war, but the impact of the war on the world of a young girl. She will also share the details of her revisit to Stonischken and her immigration to America.
Location: Hall of Mirrors |
What is impetigo?
Q: My baby has crusty blisters around his nose and mouth. What's happening?
A: The sores you see on your baby's face may be impetigo, a contagious infection caused by staph or strep bacteria. Although impetigo is most common on the face and bottom, it can occur anywhere the skin has been broken and bacteria have invaded. Impetigo usually starts with red sores that quickly rupture, ooze and form a yellowish-brown crust. Anyone can contract impetigo, but children between 2 and 6 are most vulnerable because their immune systems are still developing and they're often in groups settings (like daycare) where staph and strep are more common. Your child probably contracted impetigo when bacteria entered his skin through a rash or bug bite, but it can also affect otherwise healthy-looking skin. Impetigo must be diagnosed by your pediatrician and is usually treated with antibiotics, although mild cases may go away on their own. Let your doctor make the call.
While your baby is healing, soften and clean the sores with warm water and apply an antibiotic ointment several times a day. Impetigo is highly contagious, so discourage your child from touching his face since this can spread the infection can spread to other parts of the body. Covering the area with gauze is a great way to prevent scratching. You should wear gloves while caring for your child so you don't become infected, and be sure to wash all your child's clothes, towels, and sheets in hot water to prevent re-infection. After your child begins antibiotics, the infection should clear up in a few days (usually he'll no longer be contagious after 24 hours of treatment). Even though your child is feeling and looking better, you should still finish the whole course of antibiotics so the bacteria don't return.
If the outbreak does not begin clearing up quickly after your baby starts antibiotics, see your pediatrician again. A cluster of tiny blisters that scab in a couple of days may be a herpes infection (one on the mouth is called a cold sore) and not impetigo.
Copyright 2003 Meredith Corporation. Updated 2009. |
Dismiss Notice
Join Physics Forums Today!
What is a main sequence?
1. Jan 8, 2005 #1
User Avatar
What is a main sequence and some interesting things about it? It seems to be a big star and a little star feeding off of each other?
2. jcsd
3. Jan 8, 2005 #2
User Avatar
Science Advisor
Gold Member
A main sequence is the evolutionary path taken by stars. They start as a big collapsing cloud of gas and end as a burnt out ember. What happens in between is fairly interesting.
4. Jan 8, 2005 #3
User Avatar
Staff Emeritus
Gold Member
Dearly Missed
And the main sequence was developed as a correlation between spectral class of stars and their surface temperature, which can also be determined from the spectrum; roughly the pattern of lines in the spectrum correlates to the frequency of greatest intensity. Then they saw that their squence tracked the hisotry of the stars.
5. Jan 10, 2005 #4
I want to expand a little...
The main sequence is a track in a diagram called Hertzsprung-Russell diagram (HR diagram), and is called "main" beacuse stars pass the major part of their lifes in this track. Stars come to the main sequence from another track called (guess what?) pre-main sequence. Stars that have just arrived from the pre-main sequence to the main sequence are called Zero Age Main sequence stars, and are stars that begin to fuse hydrogen in its nucleus.
Stars let the main sequence through various "exit doors". Some take the Giant branch, others more massive take the Supergiant branch, while others (red dwarfs) end up in the White Dwarf region
Last edited: Jan 10, 2005
6. Jan 10, 2005 #5
User Avatar
Staff Emeritus
Science Advisor
Gold Member
The "main sequence" is the "adult" phase of a star's life, during which it is steadily fusing hydrogen into helium. The star doesn't outwardly change much at all during the main sequence, which is most of the star's total lifetime.
The main sequence lasts a few hundred million years for very massive stars, but can last as long as tens of billions of years for less massive stars. Our own Sun has a total main sequence lifetime of about ten billion years, of which about half has passed.
- Warren
7. Jan 10, 2005 #6
User Avatar
Check out the Hertzsprung-Russell Diagram http://home.cwru.edu/~sjr16/stars_hrdiagram.html [Broken]
Last edited by a moderator: May 1, 2017 |
Exercise Induced Asthma
By Michael P, A2 11/12/2015
Intro to Asthma
Asthma is a non-communicable disease that affects the way you breathe and makes it harder for you to breathe. Some people have this problem all the time and others just when they exercise. This is called exercise induced asthma. In this brochure I will talk about how EIA can affect you, and what you can do to maintain a healthy lifestyle.
Facts on Exercise Induced Asthma
1. Asthma is a frequent occurring disease which affects your lungs and your breathing. When someone has exercise induced asthma their airways can become swollen, narrowed, and have mucus inside of them.
2. If someone is exercising and breathing hard, their lungs can get flared up and they can have what’s called an asthmatic attack where it can make it hard for them to breathe.
3. If someone has exercise induced asthma it means that they only have trouble breathing when they exercise versus someone who may have an asthmatic attack while just sitting at a desk.
4. Some symptoms of work induced asthma are wheezing, pain in chest, coughing, and shortness of breath that lasts for a while.
5. People who have EIA usually begin to have these symptoms after about 5 to 10 minutes into working out or exercising. When someone experiences those symptoms, they usually peak after 5 to 10 minutes of rest but they fully go away completely after about an hour of rest.
6. Climate can also affect EIA. Colder weather has shown to have made EIA worse and people tend to have more trouble breathing in that climate.
7.There is a difference between being out of shape and EIA. One way you can tell the difference between EIA and being out of shape is when you’re exercising. If you are short of breath and then you begin breathing normally soon, then you are out of shape. For someone with EIA, it may take up to an hour to recover.
8. When you are treated for exercise induced asthma, you then can do any sports that someone without it can do. It may be harder to breathe but you can learn to control it. In fact, 10% of Olympic athletes have exercise induced asthma that have learned to control it.
9. Some sports can more likely than others give you a higher chance of flaring up your lungs and causing an asthma attack. In this case one sport that can cause a flare up or an asthma attack is long distance track. If you have EIA then long distance track will be harder on your lungs than someone without asthma.
10. Don’t worry! There are lots of other sports that you can do that are less likely to cause asthma attacks. Some sports include football, baseball, gymnastics, etc. So don’t you fret there are lots of other sports to be played.
How you can maintain a healthy lifestyle
1. If you do have exercise induced asthma, your doctor will give you medicine that could help with any flare up. This is called a “pretreatment.”
2.A pretreatment is a medicine that will help open your airways and allow oxygen to flow easier instead of through a tightened up airway. Whenever you have a flare up or an "attack”, you can take this pretreatment, or medicine, and it will give you quick relief for a while and help you start breathing normally again.
3. Many things can cause flare ups but the most common flare ups happen because of too much exercise, smoking, animals if allergic, pollen if allergic, and more. To avoid any flare ups or asthma attacks, you should avoid coming in contact with any of these things..
4. When you are about to run long distances or it is cold out, is is best to take your pretreatment before doing any exercises. It will help open your airways and allow more oxygen into your body to make it easier to breathe.
5. Lastly, when you have trouble breathing, take deep, slow breaths, doing this will not only bring oxygen to your lungs, but calm down your airways and stop the flare up.
"Tragic Death Sheds Light on Asthma's Dangers." WebMD. WebMD, n.d. Web. 12 Nov. 2015.
"Exercise-Induced Asthma." KidsHealth - the Web's Most Visited Site about Children's Health. Ed. Joseph. The Nemours Foundation, 01 Feb. 2014. Web. 12 Nov. 2015. |
26 June 2018
AI proofing
Preparing For The Best And Worst Of Times by John Buchanan, Rose Ryan, Michael Anderson, Rafel A Calvo, Nick Glozier and Sandra Peter responds to the challenge by the NSW Department of Education to a 'a consortium of University of Sydney academics to consider the important question of what today’s kindergarteners will need to thrive and not just survive in the 21st century'.
The report states
The Department is particularly interested in the predicted changes that Artificial Intelligence (AI) and other developing technologies could bring to Australia’s economy, workplace and community. This report, which integrates insights from scholars in faculties as diverse as engineering and medicine, business and education is not a definitive analysis of all potentially relevant issues; rather, it explores some of the challenges and opportunities around these emerging technologies and what this might mean for education, particularly school education.
Section 1 outlines the methodology for this interdisciplinary approach and how this report was prepared.
Section 2 considers the three dimensions of impact associated with artificial intelligence. Its most overt impact is on job numbers and content. Its covert impact is on means of decision-making and social connection. Its impact as an amplifier of other changes is significant, especially given its capacity to intensify dynamics associated with labour market fragmentation, globalisation, inequality and climate change. The central challenge is not to predict the future but to prepare for uncertainty. This is best achieved by developing in individuals the capacity to adapt successfully to changing situations.
Section 3 considers how education might best nurture this capacity. The relationship between education and the labour market is not as obvious as commonly thought. Moreover, recent literature on improving people’s employability reveals formal education is only one (and not necessarily the most important) factor determining labour market success. That said, appropriate education is a vital ingredient. Arguably the most prevalent current narrative concerns the need for educators to focus on ‘soft’, ‘generic employability’ or so-called ‘21st century skills’. Typically, these are defined as 'literacy and numeracy' and capabilities concerning ‘problem solving’, ‘creativity’, ‘communication’ and ‘collaboration’. This narrative, while superficially attractive, is ultimately not sufficient for guiding education policy and practice in an AI era. Any effective approach must grapple with four issues.
1. What types of pupils are we developing: highly flexible labour or florishing productive citizens? Many prescriptions in the current ‘future of work’ literature are predominantly concerned with developing what is best described as the ultra-flexible worker - ie people able to meet ever-changing market requirements. Drawing on the health, humanities and social science disciplines we highlight the importance of nurturing productive, flourishing citizens.
2. How can education contribute to the development of human flourishing over the life course? Human development is a complex, multi-dimensional process. The early school years are critical for developing individuals’ ‘learner identity’. Primary schools in particular have a crucial role to play in shaping people’s learning dispositions. These concern such things as curiosity, the ability to concentrate, resilience and learning relationships. If nurtured well, they result in people empowered to learn, wanting to learn and excited by learning. If not developed early, their absence can have lasting effects on people’s willingness, interest in and capacity to learn and adapt.
3. What is the relationship between developing general learning dispositions and developing specialist expertise? Using literature from disciplines as diverse as cognitive psychology, education, philosophy, engineering and applied labour economics we show specific knowledge is important. We highlight how gaining ‘generic’ skills (or, more accurately, learning dispositions concerning such things as collaboration and problem solving) are often best acquired in the context of mastering specific disciplinary, trade or professional expertise (i.e. having something substantive to contribute to a team or solving a problem).
4. Are current approaches to gaining specialised knowledge providing students with welldeveloped learning dispositions? The mainstream academic curriculum focuses on fairly abstract analytical skills, perceived by many students as ‘too academic.’ Much vocational education and training in schools, on the other hand, focuses on developing narrow skills relevant to an immediate job. Academic disciplines need to better highlight their potential broader relevance to life (and not just the labour market). Keynes once observed that there is nothing more practical than a good theory. Why this is the case and how abstraction can be appropriately applied ‘in real life’ deserve closer attention. For vocational education, greater attention needs to be devoted to giving students underpinning knowledge for a broadly defined domain of expertise to increase their capacity to adapt to changing opportunities.
Section 4 considers the implications for schools. There is a need to engage more effectively with AI and its broader impacts. Increasing ICT literacy is important but involves much more than teaching all students how to code. Rather, it involves equipping young people with digital fluency, ie to handle the ‘covert’ and ‘amplifying’ impact of AI as well as its more overt consequences for job destruction and transformation of job content.
Widespread debate is needed on how to define domains of specialised knowledge necessary for underpinning the development of ‘generic’ skills. Recognised academic disciplines are important, but they are not the only categories for defining expertise. Special attention is especially needed for the vocational offering in schools. Take the example of care work. Instead of doing courses in ‘aged care’, ‘disability support’, ‘youth work’ or ‘drugs and alcohol support’, for example, consideration should be given to preparing people for ‘care work’ more broadly defined. This would provide the context for practicing in the more specialised sectors. Closer engagement with the world of work challenges us to consider how we define domains of occupational capability. Notions of job clusters or vocational streams of connected occupations deserve closer attention from a wide range of stakeholders, within schools and beyond.
The challenges associated with AI require more than marginal adjustments to established arrangements, best conceived of as an education ‘settlement’ or ‘compact’. Education, like most social domains, is structured by an array of stakeholders contributing in different ways. Currently employers and the community are not as actively engaged in local schools and education as they could be. Many are quick to criticise the status quo, but few are helping build new arrangements. The country’s education effort would benefit immensely from closer engagement with employers in the private and public sectors, and community organisations. While schools have been endeavouring to do this, quality engagement from the business sector has been limited. The importance of specialised knowledge - both academic and vocational - highlights the continuing importance of professional teachers. We conclude by asking whether it is time for a new education settlement. Such a settlement would give greater recognition to teacher professionalism on the one hand and support closer connections with quality employers and arts and community organisations on the other to develop the flourishing citizens of tomorrow |
>> Products
Algorithmic C Datatypes
Benefits of Algorithmic C Datatypes
• Fast Simulation: Up to 200x faster simulation speeds than SystemC Data Types
• Fast Compilation: Faster to compile in both g++ and Visual C++ compiler than SystemC
• Consistent: Precise and complete definition of semantics with no differences between simulation and implementation (synthesis).
• Arbitrary-Length: scales to any signed/unsigned integer or fixed-point bit-width making the semantics uniform. This is a natural requirement for any arithmetic library for a hardware description language.
• Intuitive: Easy to learn and to use. Consistent and uniform semantics avoid hard-to-remember corner cases. For example: signed and unsigned types can be correctly compared without unexpected signed to unsigned conversions taking place.
• Parameterizable: The precision is defined by template parameters. This makes it ideal for writing algorithmic IP where the precision of the algorithm is parameterized.
• Built-in Quantization and Overflow Modes: All the commonly used rounding and saturation functionality are built-in as part of the fixed-point types.
Algorithmic C Datatypes
Algorithmic C (AC) datatypes are a class-based C++ library that provides arbitrary-length integer, fixed-point and complex data types. They enable algorithm, system and hardware designers to precisely model bit-true behavior in C++ specifications while accelerating simulation speeds by 10-200x faster versus alternate datatypes.
General floating-point arithmetic is widely used for modeling designs at an algorithmic level. For efficient implementation, the floating-point arithmetic is replaced by fixed-point or integer arithmetic with carefully chosen precisions. Bit-accurate modeling of the fixed-point arithmetic is required to validate that the precision of the arithmetic is sufficient to preserve the intended behavior of the design.
The Algorithmic CTM arbitrary-length bit-accurate integer and fixed-point data types allow designers to easily model bit-accurate behavior in their designs. The data types were designed to approach the speed of plain C integers. It is no longer necessary to compromise on bit-accuracy for the sake of speed or to explicitly code fixed-point behavior using integers in combination with shifts and bit masking. Algorithm validation and verification time is shortened significantly when the data types simulate fast and your High Level Synthesis tool produces RTL implementations that are one-to-one bit-accurate.
The arbitrary-length nature of these data types means that they will scale to any size while uniformly preserving their semantics. This is somewhat in contrast to limited-precision data types where the precision limit introduces corner cases that make such types harder to learn and use.
The Algorithmic C integer and fixed-point data types match well with SystemC integer and fixed-point data types in terms of the allowed precisions, and semantics. However the AC Data Types eliminate logical and semantic inconsistencies of the varied SystemC types.
Download Now
Includes: Algorithmic C Datatype
libraries and detailed documentation. |
Show Summary Details
Page of
date: 21 July 2018
Summary and Keywords
Immersive virtual environments (IVEs) are systems comprised of digital devices that simulate multiple layers of sensory information so that users experience sight, sound, and even touch like they do in the physical world. Users are typically represented in these environments in the form of virtual humans and may interact with other virtual representations such as health-care providers, coaches, future selves, or treatment stimuli (e.g., phobia triggers, such as crowds of people or spiders). These virtual representations can be controlled by humans (avatars) or computers algorithms (agents). Embodying avatars and interacting with agents, patients can experience sensory-rich simulations in the virtual world that may be difficult or even impossible to experience in the physical world but are sufficiently real to influence health attitudes and behaviors. Avatars and agents are infinitely customizable to tailor virtual experiences at the individual level, and IVEs are able to transcend the spatial and temporal boundaries of the physical world. Although still preliminary, a growing number of studies demonstrate IVEs’ potential as a health promotion and therapy tool, complementing and enhancing current treatment regimens. Attempts to incorporate IVEs into treatments and intervention programs have been made in a number of areas, including physical activity, nutrition, rehabilitation, exposure therapy, and autism spectrum disorders. Although further development and research is necessary, the increasing availability of consumer-grade IVE systems may allow clinicians and patients to consider IVE treatment as a routine part of their regimen in the near future.
Keywords: avatars, agents, immersive virtual environments, health interventions, virtual reality, virtual reality exposure therapy
Please subscribe or login to access full text content.
|
बुधवार, 20 नवंबर 2013
What Is Makar Sakranti
Makar Sankranti is celebrated every year on JANUARY 14th. Makar Sankranti marks the end of a long winter with the return of the Sun to the Northern Hemisphere. Makara literally means 'Capricorn' and Sankranti Is the day when the sun passes from One sign of the zodiac to the next.
The Sankranti of any month is considered auspicious as it signifies a fresh start. However Makara Sankranti is celebrated
This festival has been celebrated for thousands of years. Initially, this was probably a festival celebrated in the cold climate, when people prayed for the warmth of the sun. In all likelihood, the Aryans celebrated it, and continued to do so after migrating to India. Today, Makara Sankranti is celebrated throughout India As a harvest festival.
कोई टिप्पणी नहीं:
एक टिप्पणी भेजें |
Field of Science
The Largest Crystals Ever Discovered Are At Risk Of Decay
The mine of Naica, in the state of Chihuahua, Mexico, was opened in 1828 to mine for lead, zinc and silver ore. In 1910, a natural cave in the mine was discovered, which was later named Cueva de las Espadas, the Cave of Swords. The name derives from three-feet large, blade-like gypsum crystals (calcium-sulfate) completely covering the walls of the cave.
However, what the miners discovered almost 90 years later during the construction of a new tunnel was even more astounding. The Cueva de los Cristales, the Cave of the Crystals, hosts the most incredible crystals ever discovered. The mining operations, making the discovery possible, are also threatening this geological treasure.
110 Years After The Tunguska Event We Still Aren't Sure What Caused It
At 7:15 on the morning of June 30, 1908, something happened in the sky above the Stony Tunguska (Podkamennaya Tunguska) river in Siberia. Many thousand people in a radius of 900 miles observed the Tunguska event and more than 700 accounts were collected later. The reports describe a fireball in the sky, larger or similar to the size of the sun, a series of explosions “with a frightful sound”, followed by shaking of the ground as “the earth seemed to get opened wide and everything would fall in the abyss. Terrible strokes were heard from somewhere, which shook the air [].” The indigenous Evenks and Yakuts believed a god or shaman had sent the fireball to destroy the world. Various meteorological stations in Europe recorded both seismic and atmospheric waves. Days later strange phenomena were observed in the sky of Russia and Europe, such as glowing clouds, colorful sunsets and a strange luminescence in the night.
A devastating explosion occurred in a remote swampy area of Siberia in June 1908 that even now continues to spark controversy and theories of widely varying plausibility.
Hawaii's Kilauea Eruption Did Not Rain Gemstones From The Sky
Since the beginning of May 2018, the Kilauea volcano on Hawaii has been erupting. First a cloud of fragmented older lava, volcanic ash and vapor rose from the Pu‘u ‘O‘o crater on the summit, magma then migrated to the flanks, opening a series of fissures from where now lava is pouring out.
Around five weeks into the eruption, some residents of the town of Kalapana reported small, green crystals to be found on the ground, soon speculating that the crystals rained out from the eruption column or the lava fountains of Kilauea.
Olivine sand from the Papakolea Beach on Hawai'i. Source and Credit: Wikipedia-user Tomintx, CC BY-SA 4.0. |
How Does Alcohol Affect the Kidneys
Once people are diagnosed with kidney disease, they are demanded to limit alcohol or they had better to quit alcohol. Without any knowledge of kidney disease, patients usually think some drinks containing little wine would do harm for their kidneys. Unfortunately, they are totally wrong and all these beverages would greatly hurt kidneys, such as polycystic kidney disease (More How Does Alcohol Affect Polycystic Kidney Disease).
Alcohol affect kidneys
One of these beverages will promote the circulation of blood in the whole body. It will increase the blood volume to pass through kidneys, so kidneys would be greatly tired. More blood is filtered by kidneys and more urine is formed. That is the reason why people are having too much urine after having alcohol.
Risks for patients with kidney disease
In the normal people, kidneys can overcome this period of overwork. But for patients with kidney disease, renal inflammation is pervading in kidneys and the cells are gradually damaged and dead. In this situation, the sudden increased work will quicken the damage and death of kidney cells. So their illness condition easily worsens, resulting in more complications present. For example, along with the reduce of kidney function, they will have high blood pressure, heart disease, severe swelling and so on.
How to improve this situation?
Due to habit or customs, many people would like to drink alcohol. But their illness condition is not premised, so kidney disease would worsen if they cannot stand the temptation. Thereby patients need to receive good treatment in order to keep a good situation. Immunotherapy is a good therapy for them to repair kidney function and reduce the harm of alcohol. It does not only retrieve the damaged kidney cells but also can produce new cells to repair kidney tissues. It adopts Immunotherapy which is a new technology to provide kidney cells that can form many tissues, such as glomeruli, renal tubules and blood vessels and so on. Through this therapy, you are hopeful to have healthy kidneys to reduce the kidney damage.
Learn More: Factors Affect the Progression of Renal Failure That You Should Know
Leave a message
phone Number:
Disease Description:
Online Doctor |
Wednesday, 21 January 2015
Waste is manage to minimize the consequences on the living life and the environment as well. The environment is effective by some waste after or during the process of managing but not doing anything to it is not a good idea. After we throw our waste (it may be of any kind) we hardly think about that where it goes, what happen to them, actually we are not bother to think about it. Once the trash leave the home it is not over yet it begin its long journey when they transported to appropriate center for managing the waste and make it suitable that doesn't impact on human life. There are popular method of managing the waste
1.Incineration of waste
2.Sanitary landfills
The countries chooses according to their availability of landfill or they burn the waste down.
Simply means burning of waste. In this all the trash put into a big chamber and burn it down some have litter chamber for domestic to larger once for the municipal use this process of managing the waste is looking nice but it has its advantages and disadvantages also. When a lot of trash is burning down a boom of carbon dioxide is release which is not a good sign for the environment so we managing the waste on the cost of environment. The waste contaminated with hospital or hazardous waste from factories really need this management at any cost. MODERN incineration processes are now more efficient with release less amount of carbon dioxide as fireplaces. The Germany, Netherlands and Denmark use it very effectively bad point is that it is expansive.
The term means a large part of land quite away from the living places where all the waste from nearby fields is deposited. As a large waste is deposited each day the place is soon be full so there are no more land for the waste another issue is the soil pollutant and other noxious substance. The landfill management is all concern about that to sorting out all the waste and only those waste is send it to which is recycled as well is composted but many towns just throw the waste which include paper,glass, plastic which need thousands of year to decompose so nut shell is that the land is soon fill and become smelly. Proper landfills help to minimize that pollutants to get into water table but is is difficult and expensive too.
Waste material is reuse by different processes, Recycling is actually processing of used material into new useful one. This helps to reduce the fresh raw material, reduce the fuel consumption, reduce the water ,air and other mean of pollution so it is great way of controlling pollution and protect the environment. It also conserved the natural resources. In many countries different bin bag is provided to collect waste in right bin bag this makes the work easier and less difficult. Recycling provide the job to person to collect, work in recycling companies. Waste material which is recycled is
a.Paper waste
b.Plastic waste
c.Glass waste
d.Aluminium waste
Paper waste includes copies, newspaper, magazine, cardboard and every paper material which can't be useful for us.
Plastic waste includes rubber bags , plastic wrappers, bottles, plastic bags.
Glass waste includes bottles, broken glass and so on.
Aluminium waste cans from the fruit, tomato mainly from soda, and any can. Recycling of 1 ton of these aluminium cans conserve more then 207 million Btu exactly equal of 36 barrels of oil or 1,665 gallons of gasoline. |
Encapsulation, Information Hiding And Abstraction
If you have been sick, you would have had medicines for sure. One of the tablets that you would have received is a capsule. I hope you would have seen it.
Now this kind of tablet, is a bit different from the others. From the outside its just a cap, and it hides everything that is contained within. But what lies inside may be 2 or 3 or more powders loosely arranged and packed within.
An object is something similar. It is created with the immense power of a class. while the composition of the class could be anything (as compared to the capsule), one may not know wht is contained when you create the object handle
as in
A obj = new A();
you may say obj here is like the capsule to all those who want to consume it in their programs.
So, with this object one can use its inherent power.
Thus this concept of hiding away its true power is known as Encapsulation
Encapsulation seems to be a combination of one or more of:
• Grouping of relating things together
• GateKeeper (state or data protection)
Information Hiding, on the other hand, is Hiding details of implementation
class NoEncapsulationOrInformationHiding {
public ArrayList widths = new ArrayList();
class EncapsulationWithoutInformationHiding {
private ArrayList widths = new ArrayList();
public ArrayList getWidths(){
return widths;
class InformationHidingWithoutEncapsulation {
public List widths = new ArrayList();
class EncapsulationAndInformationHiding{
private ArrayList widths = new ArrayList();
public List getWidths(){
return widths;
Encapsulation allows you to check access to your own innards, and provide specific methods of performing such access. It does not specifically address leaking implementation details; although you can control access to that variable, you can no longer control the fact that the client knows your using an ArrayList, even if you later decide to use LinkedList. Information Hiding, on the other hand is hiding the fact that your using an ArrayList to implement your widths. Although the client could still find out how your implementing it , you're no longer responsible for supporting that implementation.
Abstraction is to represent essential features of a system without getting involved in the complexity of the entire system.
The process of reducing an object to its essence so that only the necessary process of reducing an abject to its essence so that only the necessary element are represented abstraction defines an object in terms of its properties(attributes),behaviour(functionality), and interface.
Abstraction example: ATM is a good example of abstraction, we doesn't know what are all the internal processes that are going when we access it..instead we know only the inquiries, deposit, withdrawl etc...
In other words, encapsulation is the ability of an object to be a container (or capsule) for related properties (ie. data variables) and methods (ie. functions).
public class Box
private int length;
private int width;
private int height;
public void setLength(int p)
{length = p;}
public void setWidth(int p)
{width = p;}
public void setHeight(int p)
{height = p;}
public int displayVolume()
public static void main(String args [ ])
Box b1=new Box(3,4,5);
If you want to access a particular variable,method or class from anywhere,then make that variable accessible by using public modifier.
If you want to restrict a particular variable,method or class to be accessible outside the class,use private modifier.
Popular posts from this blog
Android Objective type Question and Answers
Android Questions and Answers for written exams
Android Interview questions |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.