text
stringlengths
144
682k
Anthropometric failure in children related to intra-population variation in health determinants 1. Differences in health determinants within populations have a greater effect on anthropometric status of children than differences in population level health determinants in low- and middle-income countries (LMICs). 2. Household wealth and maternal education had the greatest impact on anthropometric status variation between populations in LMICs. Evidence Rating Level: 4 (Below Average) Study Rundown: Despite ongoing international emphasis on improving nutrition in young children living in LMICs, growth failure continues to be a major cause of life-long morbidity in this population. Developing strategies to combat anthropometric failure requires an understanding of differences in disease patterns and health determinants between populations (Bpop) and between individuals within a population (Wpop). In this study, researchers evaluated measures of maternal and child health and socioeconomic status to determine the relationship between anthropometric failure between differences in Bpop and Wpop health determinants. Results showed that Wpop differences were responsible for more than 80% of anthropometric variation among children, while Bpop differences played a more minor role. Country differences, and differences in household wealth had the greatest contribution to anthropometric variation at the Bpop level. This study was limited by lack of race/ethnicity data which previous studies suggest may independently affect certain health outcomes. Results from this study can be used to develop targeted strategies for reducing growth failure in children n LMICs. Click to read the study, published today in Pediatrics In-depth [cross-sectional study]: This study analyzed health and nutrition data collected on mothers (aged 15-49 years) and their children (aged <5 years) as part of the Demographic and Health Surveys program in 57 countries between 2001 and 2015. Researchers defined Bpop using measures related to communities, regions, and countries while Wpop was defined using metrics related to mothers and children. Anthropometric status was defined using z-scores, with failure defined as z-score of < -2 for height-for-age (HAZ), weight-for-age (WAZ), and weight-for-height (WHZ). Results showed that Wpop differences were responsible for 89%, 83%, and 85% of differences in HAZ, WAZ, and WHZ, respectively. Conversely, 11%, 17%, and 15% of variation in HAZ, WAZ, and WHZ were associated with Bpop differences. Bpop differences in HAZ and WAZ were most heavily affected by household wealth and maternal education (27%-41% and 20-31%, respectively). Most of the Bpop variation in HAZ, WAZ, and WHZ was associated with country level differences (41%, 63%, and 53%), followed by community level differences (37%, 23%, and 32%) and regional level differences (22%, 13%, and 15%). Image: PD
Hong Kong schools and parents need to emphasise life skills teaching PUBLISHED : Monday, 10 August, 2015, 8:04pm UPDATED : Monday, 10 August, 2015, 8:04pm Students who have recently graduated from school are preparing to embark on their college careers made possible by the grades they have received at their secondary school-leaving exams. But how prepared are they for the next chapter in their lives? Most students will be 18 when they start their university education - the age they are regarded by the law as being able to "manage their own affairs". But how do we know if they can actually do that? If there was a life skills report card, would we as parents be as impressed with their life skills grade as we are with their academic grades? Life skills, unfortunately, is an abstract and broad term for the abilities one would need for full participation in everyday life. And the World Health Organisation informs us that these are comprised of adaptive and positive behaviours that enable individuals to deal effectively with the demands and challenges of everyday life. While they can be taught and learn through experience, their context is shaped by the society to which students belong. Social, thinking and emotional skills are considered as core life skills and a number of international agreements and conventions directly and indirectly highlight their learning. In fact, the World Development Report from 2007 identified "enhancing capabilities through life skills education" as one of three policy directions recommended to help young people develop and contribute to society. However, a Google search for life skills returns 240,000,000 hits, including "7 essential life skills", "12 life skills students need to succeed", or "27 skills your child needs to know that she's not getting in school". So I did a casual survey among friends and family members. I asked how they would determine whether an individual has, say, good social skills. One said the language of such individuals would be grammatically correct and they would enunciate their words well. Good diction helps others listen better. Another said good eye contact was imperative. Yet another believed manners and being courteous was intrinsic to having good social skills. Our son Akhil, a doctor who administers critical care, adds to the list the following criteria: "The ability not to get fazed; to get along with people whether or not you agree with them; not to take things personally and the ability to listen to and help others." If most adults have difficulty articulating the positive behaviours that are necessary to life skills, how do we know if students have acquired them the way I can gauge and describe on a report card? Marlaine Paulsen Cover, founder of Parenting 2.0 and author of Kissing the Mirror: Raising Humanity in the Twenty-first Century, has done just that. Cover created a communication tool called the Life Skills Report Card (LSRC). Similar in format to academic report cards, the LSRC divides life skills into five primary categories: personal care, organisation, respect for self and others, communication, and social. Sub-categories on the LSRC include: sleep, exercise, spirit, safety, time utilisation, finances, ownership in problems and conflicts, altruism, and environmental consciousness. She found that societies around the globe routinely supported children's active learning from third party instructors for music, sports, and academics. When it came to the critical arena of life skills, however, the popular perspective was simply "children learn what they live". "Yet when children are deficient in certain life skills, society is quick to pass a whole person judgment," Cover says. Parenting 2.0 is LinkedIn's top ranked parenting group with over 5,000 members in more than 70 countries, all sharing Cover's vision that "one day, children's LSA [Life Skills Average] will be as appreciated as children's GPA [Grade Point Average]". Life skills are necessary, because - to quote Scottish poet and novelist Robert Louis Stevenson - "to be what we are, and to become what we are capable of becoming, that is the only end of life". Anjali Hazari teaches biology at the French International School
Southwest Region By: Lorin Boutte' Arizona, New Mexico, Oklahoma, Texas Some of the most common things people mine for are, copper, and uranium. You can probably find uranium in Arizona. Arizona uses uranium for rings. The Southwest uses copper for penny's and wire. Texas is know for oil. Texas gets the oil from oil rigs. The oil rigs have a giant pipe that gets oil from under the ground. The Southwest is mostly hot. If you were to go out on a hot day in the Southwest you would be so hot you would sweat a lot, and the air would feel dry. .Some parts of the Southwest are deserts. The desert barley have any water. If it does rain in the Southwest it's not that much. When it does rain it's only 10 inches of rain. The desert is mostly filled with cactus. The cactus stay alive by storing water inside of them. In the Southwest farmers raise cattle and they eat them for meat. Farmers also raise cows and horses. Some crops that farmers grow are corn and beans. They use the corn and beans for food. Some of the land forms in the Southwest are, the Grand Canyon, the Grand Canyon was formed by the Colorado River. Witch is also know as water erosion. Another land form is the Colorado River. Some people like to raft the river. Most of the land in the Southwest is bumpy and dry and filled with cactus. Some common businesses in the Southwest are the oil industry.They can use the oil for gas, to fuel aircraft and vehicles. The southwest also has the air conditioning industry. The Southwest use the air conditioning for factories to keep the workers cool on the inside.Another common business in the Southwest is skinning cattle for, soap, buttons, and they sell the products for money. The Southwest also gets a lot of tourist. Some of the most popular attractions are the Grand Canyon, Johnson Space Center, Alamo, and the Cherokee Cultural Center.
Hackberry portal Forum HACKberry FAQ How does the index finger move? This topic contains 0 replies, has 1 voice, and was last updated by  Hiroshi Yamaura 3 years, 1 month ago. Viewing 1 post (of 1 total) • Author • #325 Hiroshi Yamaura Please check this video. The index finger is normally straight but it bends when an object touches its proximal phalanx. This mechanism enables users to choose pinching or grasping intuitively. Viewing 1 post (of 1 total)
How do you write a literature review for research Developing a coherent essay Galvan, Refworks Import Directions for guide on how to do this from different databases. Some tips for identifying suitable literature and narrowing your search: If you do include tables as part of your review each must be accompanied by an analysis that summarizes, interprets and synthesizes the literature that you have charted in the table. Typically a review will cover the last five years, but should also refer to any landmark studies prior to this time if they have significance in shaping the direction of the field. Provide closure so that the path of the argument ends with a conclusion of some kind. If you copy the exact words from an article, be sure to cite the page number as you will need this should you decide to use the quote when you write your review as direct quotes must always be accompanied by page references. Analyze the literature Once you have identified and located the articles for your review, you need to analyze them and organize them before you begin writing: Summarize individual studies or articles with as much or as little detail as each merits according to its comparative importance in the literature, remembering that space length denotes significance. You can record the topics in the same box as before User 1 or use User 2 box for the topic s under which you have chosen to place this article. Aim for a clear and cohesive essay that integrates the key details of the literature and communicates your point of view a literature is not a series of annotated articles. Learn how to write a review of literature. How you end the review, however, will depend on your reason for writing it. Identify gaps in the literature, and reflect on why these might exist based on the understandings that you have gained by reading literature in this field of study. These gaps will be important for you to address as you plan and write your review. Select useful quotes that you may want to include in your review. Writing the review Galvan, Point out overall trends in what has been published about the topic; or conflicts in theory, methodology, evidence, and conclusions; or gaps in research and scholarship; or a single problem or new perspective of immediate interest. You may also note that studies fall into different categories categories that you see emerging or ones that are already discussed in the literature. As you read a range of articles on your topic, you should make note of trends and patterns over time as reported in the literature. Conclude by providing some insight into the relationship between the central topic of the literature review and a larger area of study such as a discipline, a scientific endeavor, or a profession. Define or identify the general topic, issue, or area of concern, thus providing an appropriate context for reviewing the literature. You will need to experiment with different searches, such as limiting your search to descriptors that appear only in the document titles, or in both the document title and in the abstract. This can then be exported into a Microsoft Word document. Note key statistics that you may want to use in the introduction to your review. Your analysis can make generalizations across a majority of studies, but should also note inconsistencies across studies and over time. You are also developing skills in reviewing and writing, to provide a foundation on which you will build in subsequent courses within your M. You can also do this using a Word Processor, or a concept mapping program like Inspiration free 30 trial downloada data base program e. Identify major trends or patterns: A literature review is not series of annotations like an annotated bibliography. Since different research studies focus on different aspects of the issue being studied, each article that you read will have different emphases, strengths. As you take notes, record which specific aspects of the article you are reading are relevant to your topic as you read you will come up with key descriptors that you can record in your notes that will help you organize your findings when you come to write up your review. When you write your review, you should address these relationships and different categories and discuss relevant studies using this as a framework.Writing a Literature Review. As an academic writer, you are expected to provide an analytical overview of the significant literature published on your topic. If your audience knows less than you do on the topic, your purpose is instructional. Through citations, situate your research in a larger narrative. The conscientious use of citations. Learn how to write a review of literature. What is a review of literature? Writing the introduction; Writing the body; or a preface to and rationale for engaging in primary research. A review is a required part of grant and research proposals and often a chapter in theses and dissertations. Generally, the purpose of a review is to analyze. A literature review asks: What do we know - or not know - about this particular issue/ topic/ subject? OK. You’ve got to write a literature review. You dust off a novel and a book of poetry, settle down in your chair, and get ready to issue a “thumbs up” or “thumbs down” as you leaf through the pages. Why do we write literature reviews? If you have limited time to conduct research, literature reviews can give you an overview or. Literature Review: Conducting & Writing Sample Literature Reviews Search this Guide Search. Literature Review: Conducting & Writing. What is a Literature Review? This guide will provide research and writing tips to help students complete a literature review assignment. Home; Have you written a stellar literature review you care to share for teaching purposes? Guidelines for writing a literature review Download How do you write a literature review for research Rated 3/5 based on 39 review
The 10 Best Resources For Anticancer Some of the Top Anti-cancer Foods That You Should Buy On top of the list of anti-cancer foods which are recommended for you is fruits and vegetables. When you consume fruits and vegetables, you will intake a lot of rich nutrients and vitamins that are generally regarded to reduce the risk of some types of cancer. You should eat fruits and vegetables because they also have moderates levels of sugar unlike the factory foods such as bread. Fish is another meal that will guarantee you of reducing your chances of getting cancer. Fish contains omega-3 acids which are attributed to a reduced risk of cancer especially the prostate cancer. The other foods which can ensure that you reduce the risk of cancer is going to which contains some antioxidants which reduce the growth of tumor cells. It is also recommended that you use turmeric as a spice in your food because it contains ingredients which are useful in lowering the risk of cancer. When you’re cooking, you could use garlic in your food because research has shown that garlic is one of the cancer-fighting foods. Research has also shown that people who use olive oil for cooking are also at a reduced risk of getting cancer. You should also use tomatoes because they will help you to minimize the risk of cancer in your body. If you would love to read more about the other anti-cancer foods which are effective in fighting cancer, click here. Source: important source
New study confirms (again): New Mexico’s methane hot spot largely tied to oil and gas pollution In 2014, NASA scientists published their discovery of a methane “hot spot” hovering over New Mexico’s San Juan Basin. The 2,500-square-mile methane cloud is the largest area of elevated methane concentration ever measured in the U.S., and is so big scientists can spot it from space. While some have tried to debate the cause of the hot spot, it is more than mere coincidence that the San Juan Basin is one of the most productive natural gas fields in North America, and that oil and gas development is the leading industrial cause of methane emissions nationally. Manmade methane emissions are an urgent concern for scientists and policy makers since they are responsible for about a quarter of current global warming, which is why Scientists from NASA and NOAA embarked on a series of studies to try to pinpoint the source of New Mexico’s methane cloud. Jon Goldstein is the Director of Regulatory and Legislative Affairs at the Environmental Defense Fund In 2016 NASA researchers concluded that many of the region’s highest-emitting sources were associated with the region’s oil and gas production and distribution infrastructure. In heart of Southwest, natural gas leaks fuel a methane menace
Thursday, August 18, 2011 Bridges to Terminal Island, Part 1 The bascule or "jackknife" bridge, probably in the 1910s. Since its earliest days in the 1910s, the Port of Long Beach has needed reliable access to Terminal Island. The first bridge from Long Beach to the island was a single railroad track built on a wooden trestle by the Salt Lake Railway. By 1908, though, it was clear something better (and something that didn't block access to Craig Shipyard) was needed. So in that year the trestle was replaced with a 187-foot bascule drawbridge, commonly referred to as the "jackknife" bridge, because it opened and closed just like a pocket knife. The jackknife bridge was in place for years, but at some point during the mid-1930s it was removed when the Union Pacific stopped using it. Incredibly, there was no bridge there for several years, leaving the Badger Avenue Bridge (now known as the Henry Ford Bridge) over the Cerritos Channel as the only rail link to Terminal Island. (We'll have more on this bridge in Part 2 of this post.) Driving over the pontoon bridge had its ups and downs. When World War II came along, the Navy needed better access to and from its station and shipyard on Terminal Island. So a pontoon bridge was constructed that could be opened and closed to allow ship traffic to pass into and out of the harbor. The pontoon bridge was intended to be a temporary structure in place for six months, but it was used for decades. Many longtime Long Beach residents can tell stories about crossing the peculiar span, which literally floated on the mouth of the L.A. River. Drivers, especially when alcohol was involved, would occasionally go over the side into the water, and traffic would often back up along Ocean Boulevard when ships passed through. In 1946, the Spruce Goose was transported over the pontoon bridge -- you can read more and see pictures here. In the 1960s, the pontoon bridge was replaced by the Gerald Desmond Bridge, which eliminated the need for a movable bridge and could handle much larger traffic volumes. These days, time and traffic have taken their toll on the Desmond (nets called "diapers" are placed underneath it to catch chunks of concrete), and the bridge is slated for replacement beginning next year. The new bridge will allow the largest post-Panamax ships to enter the Port, as well as accommodate more traffic. For more information on the replacement project, go to Read a Steve Harvey L.A. Times column about the pontoon bridge. See a photo gallery of the Terminal Island bridges. Traffic congestion could be a problem sometimes. 1 comment: btamper said... The "Jack Knife Bridge" was the scene of a silent movie stunt filmed in 1915. In the series Hazards of Helen "The Wild Engine" episode (you can watch it on YouTube) at about 7:20 in the show the stunt occurs with Helen taking a crazy leap off the bridge on an old Indian Motorcycle! Quite a stunt for anyone, but especially a woman in those days. One has to wonder if the Indian was left in the deep....??
Nelson Mandela and Ruth First ©Dr Peter Magubane Nelson Mandela conversing with fellow activist Ruth First, the wife of Joe Slovo, who was the Secretary-General of the Communist Party of South Africa. Ruth First was a prominent anti-apartheid activist and author and one of the founding members of the South African Congress of Democrats (COD). She was also the editor of the Guardian, Fighting Talk and the New Age, writing about the injustices of Apartheid. During the 1960’s, First was in solitary confinement for 117 days and went into exile to England. She was assassinated by a letter bomb in Maputo, Mozambique. First was married to fellow activist Joe Slovo and they had two children. Nelson Mandela was friends with Ruth and they frequently spoke about politics and the liberation movement. They were co-accused in 1955 of treason and were acquitted in 1961. This image captures him conversing with First at their treason trial. “We too will die but that which we collectively contribute to our national cultural identity will live forever beyond us.” ~ Nelson Mandela Mandela 100 - Mandela: A Man of Principle Mandela 100 - The Charm of Mandela Mandela 100 - The Fight for Freedom Madiba laughs as his shoe comes off while kicking a soccer ball....more Mandela 100 - The Mandela Legacy
A century after WWI gas attacks, scientists must unite against chemical weapons Never again? A poison gas attack in World War I. Wikimedia Commons The first large-scale use of chemical weapons occurred 100 years ago at Ypres in Belgium. Its passing gives us all cause for reflection on the dreadful horrors of war – but more specifically on those that arise form chemical weapons. At a commemoration of the April 1915 incident, the Secretary General of the Organisation for the Protection of Chemical Weapons emphasised that “chemical scientists must use chemistry only for the benefit of mankind and chemicals must never again be used to do harm.” The event also saw a new Ypres Declaration, which commits the organisation to removing all chemical weapons, as well as calling for all countries that have not done so to sign and ratify the Convention on Chemical Weapons. It also emphasises the huge importance of ethically used chemicals and chemistry to the lives of all of us. I am president of the European Association for Chemical and Molecular Sciences, which represents some 160,000 chemists in Europe and beyond. We recognise that as chemists, we have the ability to make, control and deactivate chemical weapons – and that it is incumbent on us to use these skills only for ethical purposes. We have a particular responsibility to stand up and call for an end to the use of chemical weapons and for the destruction of all stockpiles. The task is enormous. These weapons have remained in circulation even though the world has long acknowledged that they have no place in modern civilisation. They were first banned by the Geneva Protocol of 1925, but the current regime is framed by the Convention on the Development, Production, Stockpiling and Use of Chemical Weapons, adopted in Geneva in 1992. Signatories to this treaty have to reveal what, if any, stocks of chemical weapons they hold. They are then given help to destroy any stockpiles, delivery systems or manufacturing facilities. For early signatories, a deadline of April 29 2012 was set for the destruction of stockpiles. Of the 196 nations in the world, only four have not acceded to the convention: Angola, Egypt, North Korea and South Sudan. Israel has signed but not ratified the treaty, meaning that it has not declared its position; Myanmar (Burma) recently ratified it. (Taiwan, not being a recognised nation, is not included in the convention.) It is known that some of these countries, notably Egypt, North Korea, Israel and Burma have or have had the ability to make and supply chemical weapons. And although Russia and the US have worked to destroy their very large stockpiles or make them unavailable, they have not finished doing so. The most recent signatory to the convention is Syria, which used chemical weapons against its own people in 2013. An agreement was reached with the OPCW that other countries, mainly Russia and the US would remove and destroy chemical weapons by mid-2014. Disposal practice. EPA/Philipp Schulze By now, almost all are believed to have been destroyed – yet despite this, it is clear that barrel bombs containing chlorine, one of the agents used in Ypres in 1915, are still being dropped on inhabited areas. Everyday substances Chlorine is used in almost all countries as a water additive. It allows us to drink tap water without contracting typhoid or other diseases that were rampant before its use. Barrels of chlorine will be held by every water purification plant for perfectly benign purposes, but in the wrong hands, they can become weapons of mass destruction. Phosgene, the other agent used in the April 1915 attack, is a key intermediate in the production of the tough, transparent polycarbonates and in the production of methyl isocyanate for making polyurethanes. But the devastating risks of its ineffective containment were made plain in the 1984 tragedy at Bhopal in India, where the failure of a methyl isocyanate plant is believed to have led to the release of hydrogen cyanide and phosgene. The Indian government estimates that around 15,000 people were killed. Meanwhile, some potential chemical agents are effective weapons because they attack fast-growing cells like those in mucous membranes. But many of these agents have found use as anti-cancer drugs, since cancer cells are also faster-growing than normal cells – again meaning that they are on the market as substances with legitimate uses. Stand up Ultimately, it is chemists and their knowledge who stand between these chemicals and states and forces that want to use them for lethal ends. As president of the European Association for Chemical and Molecular Sciences (EuCheMS), I call on all chemists worldwide to denounce chemical weapons and refuse to do any work on them other than on their control and deactivation. EuCheMS supports the efforts of the OPCW and urges it to redouble its efforts to remove the scourge of chemical weapons permanently from our planet. I also urge all chemists involved in the peaceful and legitimate use of chemicals that can be chemical weapons themselves or can be precursors to them, to ensure that all supplies are stored in terrorist-proof ways. Only if chemists use their skills and knowledge this way will we have any hope of stopping the repeat of what’s happening in Syria – and what happened at Ypres 100 years ago.
Foster Care Many times in society there are children who are treated by their parents in a way that is not good for their well being. The children are subjected to sexual and physical abuse. Sometimes some of these children are also abandoned by their parents. In situations like these the government run foster care system takes over. The foster care system looks after abandoned and ill-treated children and some of these children are later available for adoption. Apart from the government run foster care system there are also a number of foster families who on their own initiative take care of these unfortunate children. Families that provide a temporary home to children in such problematic situations are called Foster families. Although all these families do such activities voluntarily but as per government rules they are suppose to fill certain conditions to be eligible to take care of the children. The foster parent should be a minimum 21 years old and should not have any alcohol and drinking problems. They should not have any criminal history especially that of child abuse. The government does provide for financial support to foster families. However the foster parents have to prove the requirement of the support. Also the house and living conditions should be go enough to accommodate another member into the family. Foster families are not just suppose to take care of the child’s basic needs but is also suppose to provide emotional support and guidance. The family is suppose to be the child’s alternative support system and therefore interacts with the child’s school staff, doctors and social workers. Before taking the responsibility of the child through a foster care system on must answer to oneself a few important questions. Would you be able to provide the same level of affection and love as you provide to your children? Would you be capable of creating a situation where the child feels comfortable and safe? Would you be able to ignore the circumstances that the child has come from? Would you be to be patient with he bad behaviour of the child as it is quite possible that the child will be uncomfortable in the beginning and therefore may not behave in the most appropriate manner. Would you be able to deal in cordial manner with the actual parent even though the parent itself might be the cause of the child’s problems? It is important that you as an individual can provide the child with affection and care but at the same time be ready to let him/her go when the time arrives. Foster families can also adopt the child once the biological parents give up their rights on their child. This happens after a court proceeding and the court finds that the biological family is not suitable and capable of handling the care of the child. In this case the foster families become responsible for the long term emotional, financial and other support of the child. Foster parents are no longer foster parents and have to take on the responsibility of real birth parents.
Imagine you've just been hired for a creative, thinking-intensive job, and then you discover that your boss has 19 other people reporting to her as well. How do you think that's going to go? Conventional wisdom is that most most people are only able to manage half a dozen others effectively [1] — that's why sports teams are always about that size [2]. OK, now imagine that you've just enrolled in a school where students are expected to do most of their learning online via videos and exercises. There is a teacher, but she's there to help when you can't figure things out for yourself. Oh, and she has 19 other students [3]. Why would you think that was going to go any better? Learning is the creative, thinking-intensive job; if most experienced managers can only handle half a dozen grown-ups before they start dropping balls, why should we believe that teachers will be able to handle more than half-a-dozen children before doing the same? [1] Though many believe, wrongly, that they're able to handle more. [2] Larger teams always break down into sub-units: forwards and backs in rugby, infield and outfield in baseball, etc. [3] I'm being optimistic here: many classrooms have more than 20 students, and since many school boards' real motivation for moving education online is to save money, it's very like that student-teacher ratios will increase.
Sunday, March 15, 2015 @MAKE Electronics Experiment 20: Keypad Security System Epilogue Part II: Making it Work Getting past the fact that the 555 won't supply enough voltage, ever, the next question is how can we amplify it. The answer is with a transistor.  It took me way longer than it should have to get it to work, because of wiring problems and cooked transistors. First the wiring:  instead of taking 555 Output Pin 3 to the + side of the relay coil, I connected it to the base pin of a 2N2222A transistor (NPN BJT).  I then connected + side the relay coil to the 5V rail, and the - side of the coil to the collector pin of the transistor.  The emitter pin goes to GND. Initially, I left the LED in the circuit, but since that's connected to GND, the circuit was always completed. I'm sure there's a place I can put it, but it works without it. After few wrong connections, I still could not get it to work. I was absolutely sure that it was wired correctly.   During this process I must have cooked a transistor or two, In desperation, I replaced the transistor again, and it worked. So, that's the answer:  insert a transistor, properly wired, and the voltage that was too low to trip the relay is enough to activate the transistor, allowing 5V to flow from the 5V rail through the relay to the collector, and when the 555 is triggered, the output pin will supply enough voltage to the base pin of the transistor to allow current to flow through to the emitter, completing the circuit. Here's the video I'm glad I got this to work.  I hate to leave something incomplete..
Yeast infections are common, but women who get yeast infections report feeling embarrassed, self-conscious, afraid they will be judged or as if they have done something wrong. Part of the unease comes from the myths and misconceptions surrounding the condition. Three in four women will suffer from a yeast infection at some point in their life. So why are yeast infections a taboo topic? What’s true and what’s not? 1. MYTH: Sex causes yeast infections FACT: Yeast infections CAN’T be transmitted through sexual intercourse Yeast infections are caused by an imbalance of bacteria in the body. It is not a sexually transmitted disease. Sexual activity, however, could cause irritation or discomfort. If the discomfort continues after a few days, talk to your doctor about your symptoms. 2. MYTH: Inserting garlic into the vagina will cure a yeast infection FACT: Inserting any foreign object into the vagina may worsen the infection or cause several complications Although many consider garlic to have detoxifying qualities, it is not scientifically proven that garlic can cure yeast infections. 1. MYTH: Eating yogurt will decrease your chances of getting a yeast infection FACT: There is no particular food that can prevent you from getting a yeast infection A healthy and balanced diet may help you fight infections faster; however, yeast infections are caused when the bacteria in your body are at an imbalance. Eating excess probiotic-packed yogurt or even applying it to the infected area will not change the imbalance. 1. MYTH: Douching will help with your yeast infection FACT: Douching is not a recommended or an approved practice by the medical community In fact, douching can cause more harm than good. The practice can worsen your yeast infection and may lead to other infections. 1. MYTH: Swimming can cause yeast infections FACT: Yeast infections are not contagious; therefore, can’t be transmitted You will not get a yeast infection because you went swimming, but wearing damp or tight-fitted clothes can create the ideal environment for yeast to grow. Change into clean and dry clothes after swimming or a workout to decrease the risk of a yeast infection. 1. MYTH: Regularly using a laptop may increase the risk of getting a yeast infection FACT: The heat generated by laptops may cause your legs and lap area to perspire, creating the ideal environment for yeast to grow. Keeping the area around the vaginal dry can prevent you from developing a yeast infection. If you or someone you love has a yeast infection, share these facts with them. Yeast infections are common and are nothing to be ashamed of. Women’s Health Care Research is currently seeking volunteers with yeast infections to participate in research studies. Those that qualify may receive study-related care and medication at no cost, and a better understanding of the condition. Qualified volunteers may receive compensation for time and travel. Click below to learn more! For more general information, visit:
Mathematics (from Greek μάθημα máthēma, "knowledge, study, learning") is the abstract study of topics encompassing quantity, structure, space, change, and other properties; it has no generally accepted definition. Read more about Mathematics:  Etymology, Definitions of Mathematics, History, Inspiration, Pure and Applied Mathematics, and Aesthetics, Notation, Language, and Rigor, Fields of Mathematics, Mathematics As Profession, Mathematics As Science Other articles related to "mathematics": Mathematics As Science ... Gauss referred to mathematics as "the Queen of the Sciences" ... Of course, mathematics is in this sense a field of knowledge ... course, the role of empirical experimentation and observation is negligible in mathematics, compared to natural sciences such as psychology, biology, or physics ... Egon Zakrajšek ... He graduated from technical mathematics at the Department of mathematics and physics of then Faculty for natural sciences and technology (FNT) of the ... solved problems from many fields the usage of mathematics in natural and social sciences, statistics, mechanics, classical applied mathematics, discrete mathematics, graph and network ... Foundations Of Mathematics - Foundational Crisis - Philosophical Views - Logicism Otto Toeplitz - Life and Work Famous quotes containing the word mathematics: Amelia E. Barr (1831–1919) George Bernard Shaw (1856–1950) Why does man freeze to death trying to reach the North Pole? Why does man drive himself to suffer the steam and heat of the Amazon? Why does he stagger his mind with the mathematics of the sky? Once the question mark has arisen in the human brain the answer must be found, if it takes a hundred years. A thousand years. Walter Reisch (1903–1963)
Diving suit: Wikis From Wikipedia, the free encyclopedia Two divers, one wearing a 1 atmosphere diving suit and the other standard diving dress, preparing to explore the wreck of the RMS Lusitania, 1935 A diving suit is a garment or device designed to protect a diver from the underwater environment. Modern diving suits can be divided into two kinds: Ambient pressure suits There are five main types of ambient pressure diving suits • dive skins • wetsuits • semi-dry suits • drysuits • hot water suits Apart from hot water suits, these types of suit are not exclusively used by divers but are often used for thermal protection by people engaged in other water sports activities such as surfing, sailing, powerboating, windsurfing, kite surfing, waterskiing, caving and swimming. Ambient pressure suits are a form of exposure protection protecting the wearer from the cold. They also provide some defence from abrasive and sharp objects as well as potentially harmful underwater life. They do not protect divers from the pressure of the surrounding water or resulting barotrauma and decompression sickness. The suits are often made from Neoprene, heavy-duty fabric coated with rubber, or PVC. Added buoyancy, created by the volume of the suit, is a side effect of diving suits. Sometimes a weightbelt must be worn to counteract this buoyancy. Some drysuits have controls allowing the suit to be inflated to reduce "squeeze" caused by increasing pressure; they also have vents allowing the excess air to be removed from the suit on ascent. Standard diving dress, a sixth type of ambient pressure diving suit, is now obsolete but is historically interesting. Dive skins Dive skins are used when diving in water temperatures above 25 °C (77 °F). They are made from Spandex or Lycra and provide little thermal protection, but do protect the skin from jellyfish stings, abrasion and sunburn. This kind of suit is also known as a 'Stinger Suit'. Some divers wear a dive skin under a wetsuit, which allows easier donning and (for those who experience skin problems from neoprene) provides additional comfort. Wetsuits are relatively inexpensive, simple, Neoprene suits that are typically used where the water temperature is between 10 and 25 °C (50 and 77 °F). The foamed neoprene of the suit thermally insulates the wearer.[1][2] Although water can enter the suit, a tight fitting suit prevents excessive heat loss because little of the water warmed inside the suit escapes from the suit. Proper fit is critical for warmth. A suit that is too loose will allow too much water to circulate over the diver's skin, robbing body heat. A suit that is too tight is very uncomfortable and can impair circulation at the neck, a very dangerous condition which can cause blackouts. For this reason, many divers choose to have wetsuits custom-tailored instead of buying them "off-the-rack." Many companies offer this service and the cost is often comparable to an off-the-rack suit. Wetsuits are limited in their ability to provide warmth by two factors: the wearer is still exposed to some amount of water, and the insulating Neoprene can only be made to a certain thickness before it becomes impractical to don and wear. The thickest commercially-available wetsuits are usually 8mm thick. Other common thicknesses are 7mm, 5mm, 3mm, and 1mm. A 1mm suit provides very little warmth and is usually considered a dive skin, rather than a wetsuit. Semi-dry suits Semi-dry suits are used typically where the water temperature is between 10 and 20 °C (50 and 68 °F). They are effectively a thick wetsuit with better-than-usual seals at wrist, neck and ankles. Drysuit in icy water Drysuits[3][4][5] are used typically where the water temperature is between −2 and 15 °C (28 and 59 °F). Water is prevented from entering the suit by seals at the neck and wrists; also, the means of getting the suit on and off (typically a zipper) is waterproof. The suit insulates the wearer in one of two main ways: by maintaining pockets of air between the body and the cold water in standard air-containing fabric undergarments beneath the suit (in exactly the way that insulation garments work in air) or via (additional) foamed-neoprene material which contains insulative air, which may be incorporated into the outside of the drysuit itself. Both fabric and neoprene drysuits have advantages and disadvantages: a fabric drysuit is more adaptable to varying water temperatures because different garments can be layered underneath. However, they are quite bulky and this causes increased drag and swimming effort. Additionally, if a fabric drysuit malfunctions and floods, it loses nearly all of its insulating properties. Neoprene drysuits are comparatively streamlined like wetsuits, but generally do not allow garments to be layered underneath and are thus less adaptable to varying temperatures. An advantage of this design is that even it if floods completely, it essentially becomes a wetsuit and will still provide a degree of insulation. Special drysuits (typically made of thick rubber) are worn by commercial divers who work in contaminated environments such as sewage or hazardous chemicals. The drysuit is sealed to a diving helmet to prevent any exposure to the hazardous material. For additional warmth, some drysuit users inflate their suits with argon, an inert gas which has superior thermal insulating properties compared to air.[6] The argon is carried in a small cylinder, separate from the diver's breathing gas. Hot water suits Hot water suits are used in cold water commercial surface supplied diving.[7] An insulated pipe in the umbilical line, which links the diver to the surface support, carries the hot water from a heater on the surface down to the suit. The diver controls the flow rate of the water from a valve near his waist, allowing him to vary the warmth of the suit in response to changes in environmental conditions and workload. Pipes inside the suit transport the water to the limbs, chest, and back. Special boots, gloves, and hood are worn. The wrists and ankles of the suit are open, allowing water to flush out of the suit as it is replenished with fresh hot water from the surface. Hot water suits are often employed for extremely deep dives when breathing mixes containing helium are used. Helium conducts heat much more efficiently than air, which means that the diver will lose large quantities of body heat through the lungs when breathing it. This fact compounds the risk of hypothermia already present in the cold temperatures found at these depths. Under these conditions a hot water suit is a matter of survival, not comfort. Just as an emergency backup source of breathing gas is required, a backup water heater is also an essential precaution whenever dive conditions warrant a hot water suit. If the heater fails and a backup unit cannot be immediately brought online, a diver in the coldest conditions can die within minutes. Diving suit combinations A "shortie" wetsuit may be worn in over a full wetsuit for added warmth. A "skin" may also be worn under a wetsuit. This practice started with divers (of both sexes) wearing women's body tights under a wetsuit for extra warmth and to make donning and removing the wetsuit easier. A "skin" may also be used instead of an undersuit beneath a drysuit in temperatures where a full undersuit is not necessary. See also 1. ^ US Navy Diving Manual, 6th revision. United States: US Naval Sea Systems Command. 2006. http://www.supsalv.org/00c3_publications.asp?destPage=00c3&pageID=3.9. Retrieved 2008-04-24.   2. ^ Fulton, HT; Welham, W; Dwyer, JV; Dobbins, RF (1952). "Preliminary Report on Protection Against Cold Water". US Naval Experimental Diving Unit Technical Report NEDU-RR-5-52. http://archive.rubicon-foundation.org/3387. Retrieved 2008-04-25.   3. ^ Piantadosi, C. A.; Ball D. J., Nuckols M. L., and Thalmann E. D. (1979). "Manned Evaluation of the NCSC Diver Thermal Protection (DTP) Passive System Prototype". US Naval Experimental Diving Unit Technical Report NEDU-13-79. http://archive.rubicon-foundation.org/3356. Retrieved 2008-05-05.   4. ^ Brewster, D. F.; Sterba J. A. (1988). "Market Survey of Commercially Available Dry Suits". US Naval Experimental Diving Unit Technical Report NEDU-3-88. http://archive.rubicon-foundation.org/4868. Retrieved 2008-05-05.   5. ^ Nishi, R. Y. (1989). "Proceedings of the DCIEM Diver Thermal Protection Workshop". Defence and Civil Institute of Environmental Medicine, Toronto, CA DCIEM 92-10. http://archive.rubicon-foundation.org/3922. Retrieved 2008-05-05.   6. ^ Nuckols ML, Giblo J, Wood-Putnam JL. (September 15-18, 2008). "Thermal Characteristics of Diving Garments When Using Argon as a Suit Inflation Gas.". Proceedings of the Oceans 08 MTS/IEEE Quebec, Canada Meeting (MTS/IEEE). http://archive.rubicon-foundation.org/7962. Retrieved 2009-03-02.   7. ^ Mekjavić B, Golden FS, Eglin M, Tipton MJ (2001). "Thermal status of saturation divers during operational dives in the North Sea". Undersea Hyperb Med 28 (3): 149–55. PMID 12067151. http://archive.rubicon-foundation.org/2394. Retrieved 2008-05-05.   External links Simple English Got something to say? Make a comment. Your name Your email address
Habitat and Distribution The Wrentit is a non-migratory resident of a narrow strip of coastal habitat in the western coast of North America, being found from Oregon south through California, to Baja California, the north state of the Baja California peninsula. It is usually restricted to certain chaparral and woodland habitats. The Wrentit feeds by skulking through dense scrub gleaning exposed insects found by sight. It feeds primarily on beetles,bugs, caterpillars and ants, but also takes small berries and seeds. Wrentits mate for life, forming pair bonds only a few months after hatching. The bird nests in 1 metre high shrubs such as poison oak, coyote bush, and California blackberry. Three or four eggs are laid , then incubated for 14 days, by both sexes. The chicks fledge after 15 days and are fed by their parents for another 40 days. Calls and Songs Both sexes sing, but the male has a faster rhythm. Its call is similar to a ping pong ball falling on the table.
Cassidy – well educated physicians History of the Irish name Cassidy. Image copyright Ireland Calling History of the Irish name Cassidy. Image copyright Ireland Calling Cassidy is an ancient Irish surname which has also become popular as a first name. Back to Irish surnames It comes from the old Gaelic name ‘O’Caiside’. The name O’Caiside was made up of two separate, parts. The ‘O’ prefix indicated that the name belonged to a ‘descendent of…’, and ‘Caiside’ comes from the Gaelic word ‘Cas’ which means ‘curly hair’. History of the Irish name Cassidy. Image copyright Ireland CallingIt would have originally been used as a nickname for people with curly hair and eventually became a surname. The descendants and followers of the original clan leader ‘Cas’ would have taken the name O’Caiside. Prominent in Co Fermanagh The O’Caisides were an important clan in Ireland. They were particularly prominent in Co Fermanagh and the other Ulster counties. They were well respected and highly intelligent. For hundreds of years during the medieval period they worked as doctors and physicians to the Maguire clan who were Kings of Ulster. They were also prominent in religion, literature and the arts. The O’Cassidys were famous as a highly educated family up until the 19th century. Rory O’Cassidy, who was Archdeacon of Clogher, is one of the people who contributed to creating The Annals of Ulster. The Annals of Ulster was a record of events in medieval Ulster and was compiled in the 15th century. Video of the story of the Cassidy name Supporters of Home Rule for Ireland The Cassidys were also known as a patriotic family who believed in Home Rule for Ireland. William Cassidy was a politician who founded the United Irishmen of America. His organisation aimed to end the British rule over Ireland and even used its power to attempt to stop the USA from helping Great Britain in the two World Wars. Famous Cassidys throughout history Natalie Cassidy is an English actress. She is famous across Britain and Ireland for her role of Sonia Jackson in the British soap EastEnders. She started out as a child actress and remained in the soap for over a decade before turning to theatre and other TV work. Ted Cassidy was an American actor who was famous for his role as Lurch, the Butler on The Adams Family. He was also the voice of the incredible Hulk in the 1970s. Giolla Moduda O’Cassidy was a poet in the 12th century. He is the earliest person in history to have his surname ‘O’Cassidy’ in public records. Butch Cassidy was an American outlaw in the Old West who was notorious as a train and bank robber. He remains well known to this day thanks to movies such as Paul Newman’s Butch Cassidy and the Sundance Kid. However, his real name was Robert Parker so he is unlikely to be related to the Cassidys. Eva Cassidy Eva Cassidy was a soul singer from Maryland, USA. She released an album of duets with Chuck Brown as well as a live album. She tragically died aged just 33 and only recorded one solo studio album. David Cassidy copyright Allan Warren cc3 Since her death, her unreleased recordings as well as compilation albums have gone on to sell millions of copies. Elaine Cassidy is an actress from Co Wicklow, Ireland. She has appeared in several movies such as And When Did You Last See Your Father, Disco Pigs and Calvary. Katie, David and Jack Cassidy Katie Cassidy is an actress from Los Angeles, California. She has appeared in numerous films including Take, Click and Monte Carlo. Her father, David, and grandfather, Jack were also well known actors. David has appeared in several movies and TV shows and made his name in the 1970s playing the role of Keith Partridge in the Partridge Family. He also had a successful music career. Jack was a successful actor on stage, film and TV. He won a Tony award for his role in the Broadway play, She Loves Me. Back to Irish surnames Great Celtic art available in our store - Personalised prints Your name in Ogham. Personalised artwork Loads more products and designs available Did you know? Have you heard about… What about this… Copy Protected by Chetan's WP-Copyprotect.
The Barbell Effect of Machine Learning f there is one technology that promises to change the world more than any other over the next several decades, it is arguably machine learning. By enabling computers to learn certain things more efficiently than humans and discover certain things that humans cannot, machine learning promises to bring increasing intelligence to software everywhere and enable computers to develop ever new capabilities — from driving cars to diagnosing disease — that were previously thought impossible. While most of the core algorithms that drive machine learning have been around for decades, what has magnified its promise so dramatically in recent years is the extraordinary growth of the two fuels that power these algorithms — data and computing power. Both continue to grow at exponential rates, suggesting that machine learning is at the beginning of a very long and productive run. For startups seeking to take advantage of the machine learning revolution, this barbell effect is a helpful lens to look for the biggest business opportunities. While there will be many new kinds of startups that machine learning will enable, the most promising will likely cluster around the incumbent end of the barbell.
McClure's Magazine Samuel McClure established McClure's Magazine, an American literary and political magazine, in June 1893. Selling at the low price of 15 cents, this illustrated magazine published the work of leading popular writers such as Rudyard Kipling, Robert Louis Stevenson and Arthur Conan Doyle. He also promoted the work of educationalist, Maria Montessori. In 1902 the magazine began to specialize in what became known as muckraking journalism. On the advice of Norman Hapgood, McClure recruited Lincoln Steffens as editor of the magazine. In his autobiography, Steffens described McClure as: "Blond, smiling, enthusiastic, unreliable, he was the receiver of the ideas of his day. He was a flower that did not sit and wait for the bees to come and take his honey and leave their seeds. He flew forth to find and rob the bees." Steffens carried out an investigation into St. Louis for the magazine: "Go to St. Louis and you will find the habit of civic pride in them; they still boast. The visitor is told of the wealth of the residents, of the financial strength of the banks, and of the growing importance of the industries; yet he sees poorly paved, refuse-burdened streets, and dusty or mud-covered alleys; he passes a ramshackle firetrap crowded with the sick and learns that it is the City Hospital: he enters the Four Courts, and his nostrils are greeted with the odor of formaldehyde used as a disinfectant and insect powder used to destroy vermin; he calls at the new City Hall and finds half the entrance boarded with pine planks to cover up the unfinished interior. Finally, he turns a tap in the hotel to see liquid mud flow into wash basin or bathtub." Lincoln Steffens recruited Ida Tarbell as a staff writer. Tarbell's articles on John D. Rockefeller and how he had achieved a monopoly in refining, transporting and marketing oil appeared in the magazine between November, 1902 and October, 1904. This material was eventually published as a book, History of the Standard Oil Company (1904). Rockefeller responded to these attacks by describing Tarbell as "Miss Tarbarrel". The New York Times commented that" Miss Tarbell's fine analytical powers and gift for popular interpretation stood her in good stead" in the articles that she wrote for the magazine. McClure's Magazine (July, 1905) McClure's Magazine (July, 1905) Other articles that appeared in McClure's Magazine included those by Lincoln Steffens (Enemies of the Republic, March, 1904; Rhode Island: A State for Sale, February, 1905; New Jersey: A Traitor State, April, 1905; Ohio: A Tale of Two Cities, July, 1905) and Ray Stannard Baker (What the United States Steel Corporation Really Is?, November, 1901; The Right to Work, January, 1903; Reign of Lawlessness, May, 1904, What is Lynching; January, 1905; Railroads on Trial, January, 1906, How Railroads Make Public Opinion, March, 1906). Other writers who worked for the magazine during this period included Jack London, Upton Sinclair, Willa Cather and Burton J. Hendrick. Sales of the magazine declined in the 1920s and the last issue appeared in March 1929. Primary Sources (1) Ida Tarbell, The Standard Oil Company, McClure's Magazine (December, 1902) In the fall of 1871, while Mr. Rockefeller and his friends were occupied with all these questions certain Pennsylvania refiners, it is not too certain who, brought to them a remarkable scheme, the gist of which was to bring together secretly a large enough body of refiners and shippers to compel all the railroads handling oil to give to the company formed special rebates on its oil, and drawbacks on that of others. If they could get such rates, it was evident that those outside of their combination could not compete with them long, and that they would become eventually the only refiners. They could then limit their output to actual demand, and so keep up prices. This done, they could easily persuade the railroads to transport no crude for exportation, so that the foreigners would be forced to buy American refined. They believed that the price of oil thus exported could easily be advanced 50 per cent. The control of the refining interests would also enable them to fix their own price on crude. As they would be the only buyers and sellers, the speculative character of the business would be done away with. In short, the scheme they worked out put the entire oil business in their hands. It looked as simple to put into operation as it was dazzling in its results. (2) Samuel McClure, McClure's Magazine (January, 1903) How many of those who have read through this number of the magazine noticed that it contains three articles on one subject? We did not plan it so; it is a coincidence that the January McClure's is such an arraignment of American character as should make every one of us stop and think. How many noticed that? The leading article, "The Shame of Minneapolis," might have been called "The American Contempt of Law." That title could well have served for the current chapter of Miss Tarbell's History of Standard Oil. And it would have fitted perfectly Mr. Baker's "The Right to Work." All together, these articles come pretty near showing how universal is this dangerous trait of ours. Miss Tarbell has our capitalists conspiring among themselves, deliberately, shrewdly, upon legal advice, to break the law so far as it restrained them, and to misuse it to restrain others who were in their way. Mr. Baker shows labor, the ancient enemy of capital, and the chief complainant of the trusts' unlawful acts, itself committing and excusing crimes. And in "The Shame of Minneapolis" we see the administration o£ a city employing criminals to commit crimes for the profit of the elected officials, while the citizens - Americans of good stock and more than average culture, and honest, healthy Scandinavians - stood by complacent and not alarmed. There is no one left; none but all of us. Capital is learning (with indignation at labor's unlawful acts) that its rival's contempt of law is a menace to property. Labor has shrieked the belief that the illegal power of capital is a menace to the worker. These two are drawing together. Last November when a strike was threatened by the yard-men on all the railroads centering in Chicago, the men got together and settled by raising wages, and raising freight rates too. They made the public pay. We all are doing our worst and making the public pay. The public is the people. We forget that we all are the people; that while each of us in his group can shove off on the rest the bill of today, the debt is only postponed; the rest are passing it on back to us. We have to pay in the end, every one of us. And in the end the sum total of the debt will be our liberty. (3) Ray Stannard Baker, What is a Lynching?, McClure's Magazine (February, 1905) "He'll get ten days in jail and suspended sentence." Then there were voices: '"It'll save the county a lot of money!" Significant lessons, these, for the young!
This question already has an answer here: How can the following function be implemented in various languages? • Radius • Angle • Origin (optional parameter, if supported by the language) marked as duplicate by Adam Lear Dec 28 '13 at 1:07 • 2 Unlikely, @Binary, since he posted an answer. This is one of the self-answered questions (which are allowed, according to earlier communications from the moderators). But given it was already answered in…, it's probably best closed as a dupe. The languages that do this won't be that disparate. – paxdiablo May 8 '09 at 14:16 • 22 I just logged in to say this: you sir (Rook) are a Jerk. Not everyone has the same level of education as you do but can still code, so no this is not a trivial code golf question. Shame on you. – user2213764 Dec 14 '15 at 20:06 up vote 502 down vote accepted The parametric equation for a circle is x = cx + r * cos(a) y = cy + r * sin(a) Where r is the radius, cx,cy the origin, and a the angle. That's pretty easy to adapt into any language with basic trig functions. Note that most languages will use radians for the angle in trig functions, so rather than cycling through 0..360 degrees, you're cycling through 0..2PI radians. • 82 Note that a must be in radians - that was really hard for me as a beginner to understand. – ioanb7 Jun 2 '13 at 20:55 • 9 I've been trying to derive this equation for an hour now. Thanks. Who know the trig identities you learned in high school would be so helpful. – Isioma Nnodum May 28 '14 at 22:37 • 1 @Dean No need for extra brackets because of the operator precedence. When you have + and * like in those two equations and without any brackets you always go for the * first and then for the +. – rbaleksandar Oct 30 '15 at 7:27 • 7 @IsiomaNnodum Couldn't have been that helpful if we're all coming back here just to remember what the equation was. – b1nary.atr0phy Aug 7 '16 at 22:17 Here is my implementation in C#: return new PointF(x, y); • 5 Who needs trig when you have complex numbers: #include <complex.h> #include <math.h> #define PI 3.14159265358979323846 typedef complex double Point; Point point_on_circle ( double radius, double angle_in_degrees, Point centre ) • How does this work? How does it compare speed wise? Why isn't this more commonly used? – Mark A. Ropper Feb 16 at 17:42 • @MarkA.Ropper how do complex numbers work? - look up a maths tutorial or go from if you already know what a complex number is. It's probably not as efficient in speed compared to say implementing sin as a look-up table, but sometimes you are using complex numbers to represent points throughout to exploit other properties of them. Similar to using quaternions for 3D rotations, it's not really the speed but the capabilities they give you. – Pete Kirkham Feb 19 at 9:44
Lectins: The 'Healthy' Foods that Could Be Making You Sick Many people are following what they believe is a healthy diet, and yet they are feeling bloated and tired and are struggling to lose those extra few kilos. If this sounds familiar, it could very well be the lectins in your food that are obstructing your path to a leaner, healthier you. A nutritional therapist’s perspective on lectins and why they might be harmful to your health What are lectins? Plants have been around for a long time, certainly much longer than us. And before animals arrived, plants did not have to protect themselves or their seeds from being eaten. However, once animals appeared on the scene, plants had a problem. They could not run, hide or fight so had to find another way of protecting themselves and their seeds. This is where lectins come in. Lectins have evolved as a natural defence in plants. They are essentially toxins (a form of ‘chemical warfare’), that deter animals from eating the plants. In small amounts, they can provide several health benefits. However, in large amounts they can damage the gut wall, causing irritation that often results in symptoms such as vomiting and diarrhoea. Lectins can also interfere with the absorption of nutrients. Lectins act like missiles that attack the gut lining, nerves and joints of animals, making them feel ill or preventing them from thriving. In most cases, animals get the message and move on. Humans however simply resort to pharmaceutical drugs to relieve their symptoms, often unaware of the extent to which lectins are responsible. Which foods contain lectins? Lectins are found in hundreds of common foods. According to former heart surgeon, Dr Steve Gundry (author of the book The Plant Paradox), people who are trying to reduce or avoid lectins, should limit the following foods: • Legumes, such as beans, peas, peanuts and lentils • Squash • Nightshade vegetables such ads tomatoes, aubergine, potatoes and peppers • Grains • Fruit, although it is safe to include in-season fruits in moderation How to decrease lectins in foods Are you suffering from gut issues? Learn about Leaky Gut Syndrome • Soaking (preferably overnight, rinsing a few times before bed and again in the morning) • Boiling • Fermentation • Deseeding • Peeling • Sprouting • Pressure cooking Who should go on a lectin-free diet? If you have one or more autoimmune diseases, Irritable Bowel Syndrome (IBS), arthritis, brain fog, migraines or some other chronic health issue and, despite making changes to your diet and lifestyle, you are feeling no better, it is possibly time to consider whether your diet is high in lectins and whether it is the lectins that are causing your health problems. According to Dr Gundry, “My research and others suggest that lectins cause most heart disease, arthritis, dementia, and all autoimmune disease. I reference all these studies, including my own in The Plant Paradox. As I show in my book, lectins promote weight gain, obesity, and diabetes…” In humans, Gundry says that eating lectins can provoke an inflammatory response – which can lead to weight gain and other serious health conditions, such as leaky gut, autoimmune diseases and IBS. If you are looking to reduce lectins in your diet, it is advisable to choose white rice and white pasta over brown rice and whole wheat pasta. In the case of lectins, white is the safer option Gluten is a lectin. However, the real trouble is not the gluten, but rather a wheat germ called agglutinin. In the quest for a ‘healthier’ diet, many people have started eating whole grains and brown rice, which contain far more lectins. Traditional cultures have always removed the hull from grains. Today, many cultures which use rice as their staple, still use white rice, not brown. They have been throwing the lectins away for centuries. If you are looking to reduce lectins in your diet, it is advisable to choose white rice and white pasta over brown rice and whole wheat pasta. Broccoli does not contain lectins and is safe to eat What foods to eat on a lectin-free diet • Leafy green vegetables like broccoli, cauliflower, asparagus, spinach, Bok Choi • Mushrooms • Nuts and seeds • Millet • Pasture-raised meats • Wild caught fish. Going lectin-free may very well help some people, but not necessarily all those with the health issues referred to above. The ‘one size fits all’ approach is more and more being recognised as the incorrect approach to resolving health issues. Each individual’s health problems are the product of their genetic make-up, diet and lifestyle habits, toxic exposure and build-up, lifelong use of pharmaceutical drugs and antibiotics, etc. Lectins can be troublesome in high quantities, but do also have several health benefits. Some lectins are anti-microbial and may even have anti-cancer potential. The only time YOU will know if you are one of the many whose health issues do resolve by following a lectin-free diet, is by doing exactly that. Following my reduced lectin, 3-day grain-free diet, available on my Free Downloads page is a good place to start. If you wish to discuss your health issues in more detail, or wish to follow a lectin-free programme for longer, contact me here to arrange a free 30-minute discovery call.
Healthy Living Why Crying Is Healthy For You, According To Science 09/25/2016 10:28pm ET | Updated October 20, 2016 Like me, you’ve probably heard of the song “Don’t Cry for Me Argentina.” While emotionally compelling, its refrain, sung to fame by Madonna in the 1996 film Evita, actually does not strike a good chord with me. I, much to Eva Peron’s chagrin, would prefer to cry when I experience extreme grief or mourn the loss of someone special. Macho naysayers might frown upon this and urge me to wipe off the tears instead of embracing them. But the reality is that crying is perfectly natural and, as science would have it, shedding tears can actually be good for your health. The average human can produce 30 gallons of tears a year. Tears help with lubrication, prevent irritants from damaging our eyes, and contain antibacterial properties. But their most significant role lies in the endocrine system. In an article published by Psychology Today, tear specialist and biochemist Dr. William Frey points out that tears shed from crying can release toxins that accumulate as a result of stress. The removal of toxins from our body helps reduce cortisol levels in the body, resulting in a lighter mood. Crying has also been shown to activate the production of endorphins, also known as the “happy hormones.” Look back on the times that you cried. How did you feel afterward? If you’re like me and most people, you probably felt better and calmer. That’s because after crying, our breathing and heart rates decrease, many thanks to our parasympathetic nervous system. “Letting down one's guard and one's defenses and [crying] is a very positive, healthy thing,” Dr. Stephen Sideroff, a clinical psychologist at UCLA, said in a WebMD interview. Stress “tightens muscles and heightens tension, so when you cry you release some of that.” Of course, there are some caveats to keep in mind. In a study by the University of South Florida and Tilburg University in the Netherlands, clinical psychologists found that participants who cried in the presence of a small group of people reported feelings of catharsis at higher rates than those who cried in the presence of a larger group. In other words, crying may only be beneficial for you if you do it in front of your closest friends as opposed to doing it in public. Additionally, there's the potential relationship between our upbringing and our reaction to crying. Judith Kay Nelson, author of Seeing Through Tears: Crying and Attachment, points out that people whose parents were attentive during their childhood find more satisfaction from crying than those whose parents were emotionally distant. But what happens if you are a person who prefers not to turn on the waterworks? According to research, you might be putting your relationships in jeopardy. Cord Benecke, a professor at the University of Kassel in Germany, conducted a study where he interviewed over a hundred individuals and compared the group who embraced crying versus those who did not. He discovered that the latter group was more likely to isolate themselves from relationships and harbor negativity. People who weren’t open to crying “had a tendency to withdraw and described their relationships as less connected,” Benecke said in a Time article. “They also experienced more negative aggressive feelings, like rage, anger and disgust, than people who cried.” It is worth noting that modern research on crying is still developing. However, all things considered, we should not ignore the suggested benefits crying provides to our health and well-being. If we keep negative emotions bottled up inside, we might find ourselves slowly suffocating from toxic feelings that should be unashamedly expressed and released out in the open. So next time you receive advice from someone, Madonna or otherwise, on why you shouldn’t cry, simply close your eyes and don’t be afraid to let go. Emotional Dads At Weddings Suggest a correction
The concept of window blinds that react to changing sunlight isn’t new. But Sunbreak is one of the first smart shading technologies designed for an entire skyscraper, where individual panels adjusts to the sun window by window. The prototype comes from US design firm NBBJ who envision a shading system that “not only lowers energy costs, but gives users greater control of temperature and light in their offices.” So, when the sun is out, the blinds come down. When it’s cloudy, the shades bend so their built-in solar panels can reflect more sunlight into the interior. Individual panels can even be controlled independently, as Gizmodo explains: …so if a conference room needs to be darkened for a presentation, or an office is too cold and could use some solar gain, someone inside can simply use an app on their iPhone to raise or lower the screen. It can also sense when no one is in the space—like on the weekends—and put the entire building in energy-conservation mode. The Sunbreak prototype is not unlike the retractable shades that New York-based REX designed for a pair of towers in the Middle East. Where Sunbreak seems to have the technological edge, however, is the blinds’ ability to move independent of the larger system. We look forward to the day when the prototype is pushed through to production. Developments featured in this article More Like This Facebook Chatter
Papyrus writing Адальберт-атил | 0 | 2326 visits Papyrus writing hasten to agree with Bagnall and Cribiore's conviction that "people could find on the market papyrus stationary and could purchase individual pieces, whether whole sheets or not, and not. Plus it was quite light in colour, making for good contrast between ink and background. V 966, register of Documents, greek: 46 AD full image: front, the papyrus below is an example of a cut sheet, used for an official decree. It is believed that some really coarse papyrus was used exclusively for wrapping rather than writing. This statement has its questionable parts -.g. Many are the fine volumes which have been defaced in this way, with the under-writing barely legible if legible at all. Nonetheless the basic description is certainly true: The stalks were sliced, set side by side, braced by having another layer of strips glued across them perpendicularly, pressed, and dried. It is thought that manufacture of papyrus ceased around the tenth century. It is not just papyrus that is destroyed by water. Most of the Linear B tablets that survive from Pylos, for instance, survived because they were caught in the fire that destroyed the citadel. Why i went to the woods essay Papyrus writing The paper thus formed was pure papyrus white in colour and. quot; parchment treated animal skins was by far the most durable. Cords, mats, g Paper, a papyrus codex had to have a single sharp fold either in a single sheet or at the joining papyrus of two sheets. Papyrus, in fact, these crossbraced sheets are then" S difficult to get large numbers of sheets of the same size and color. But also the most expensive, when papyri are taken out of the desert. And itapos, the ancient Egyptians used the stem of the papyrus plant to make sails. There is little that needs to be said about paper. The strips are then" and, stains. The new climate can be detrimental to their preservation. Introduction papyrus parchment recu paper clay, parchment, it is not very flexible. With a writing few minor exceptions such as verses written on amulets and pots. Greek papyrus reused for the feet of a mummy full image 106 Dionysia chastises her brother for not sending her a sheet of unwritten papyrus. Parchment is a very different material. And it was used for all manner of public documents. Best surveys Paper made from papyrus was the chief writing material in ancient Egypt, was adopted by the Greeks, and was used extensively in the Roman Empire.Properly baked clay is fairly permanent, but sun-dried clay is not. Individual sheets of papyrus were of course often sold for use in record-keeping, memoranda, writing training, etc.In other words, it was out of necessity that some papyri were re-used for inscription.The rolls could be used for long texts, such as literary works, or could be cut into sheets for shorter uses, like private letters. And while exposure to dry conditions is not as quickly destructive, the papyrus does turn brittle in dry conditions.The history of parchment is among the most complicated of any writing material.Leo Deuel, in, testaments of Time: The Search for Lost Manuscripts Records (p. The strips are placed upon a table, and "moistened with water from the Nile.How Ancient Papyrus Was Made ) which would measure 20-40 cm in height (top to bottom and could be up to 30 meters in length (left to right).From ancient descriptions and illustrations, it seems that the scroll would would then normally be wrapped around a rod, usually of wood (Hebrew Torah scrolls generally had two rods, at inner and outer ends though few such rods survive.
MIST 7500: Gamification of Applications – Executive Summary 4 Engaging people and holding their attention span is very important especially for businesses that rely on user interaction, feedback and advertising. As technology improves and services become more accessible to everybody, this has proven to be more challenging now than in the past. With the advances in the Internet, media delivery, digital content, etc., users are able to move between each activity so fast that the attention span of humans are decreasing. If they see a website that is clunky or is not visually pleasing, they just move on to the next one. If they see a website that gives a much better experience than another, users already form an opinion about that particular site within just a minute or two and they stop going to the mediocre site. One of the concepts developed that try to help engage people so they will keep coming back to use an application is called the ‘Gamification of Applications’. The idea is to design a service that provides a game-like experience for the user. This concept has gained the attention of a lot of people in the industry to help attract users. Some of the techniques used in ‘gamification’ include the use of achievement levels, leader boards, badges, concept of progression in a mission, challenges and virtual currency. A good example of a service with ‘gamification’ qualities is the website Code Academy (http://www.codecademy.com). Code Academy helps people who want to learn a certain programming language such as JavaScript or Ruby. Their challenge is to keep users committed in finishing the tutorials and exercises so they can start to learn how to code. Code Academy does this by giving the user a badge for every chapter they complete. Badges can be shared with friends, so they can see how much you have already learned. They also provide a progress tracker, so the user can see where he/she is in the lessons and in the entire program. The gamification of applications seems like a good way to improve services but this practice has also received negative attention from professionals in the gaming industry, business executives and academics. Some of the criticism of the concept is that it simplifies user interaction to just following certain rules and mechanics of the ‘game’. Others think that gamification makes the concept of games look one dimensional. Given all that, I think this concept can be considered internally to improve certain administrative tasks. We can take a look at some elements that we can ‘gamify’ with staff satisfaction in mind. Speak Your Mind
Friday, August 8, 2008 assert the machine did not explode I see it often done by novices, heck, I used to do that myself. When writing a unit test for a method cloning an object, I would put an assertion to check that the original object is left unchanged. Well, that is wrong. This is checking against a possible bug in the implementation, in which the original object gets modified. But this is just one thing that could go wrong. There are infinitely many possible bugs like this, maybe even one that causes your machine to explode. You can't write assertions against all of them, so don't do it against any of them. It has two advantages. First is that you stop worrying you forget assertions against some possible bug; that is, if you were worrying about that in the first place. I am sure there are people out there who feel bad about not testing against printing foul language. Second is that the tests themselves become smaller, focused on the positive behavior, therefore easier to read. In the specific example of cloning: check that the cloned object is equal to the original but they are not the same objects, and that is it. Nothing else. Unit tests are positive tests, they should only test what you want the code to do, not what it shouldn't do. I am not sure about the case when we fix a defect, but probably a functional test for the defect is enough. Sunday, April 6, 2008 GVim to convert code into html Few are aware of the fact that gvim can generate html for the code inside the buffer. The command is :TOhtml; just type it in, and the html will promptly appear in a split window. In the browser, the generated html should look exactly as you see it in gvim. By default it generates html that should work in old browsers too, but can be told to generate CSS stylesheets or even xhtml. Type :help TOhtml for more details. It works only in gvim, though; not in vim. It is handy for posting snippets of code on the web. Sunday, March 2, 2008 .NET BCL source code Source code for .NET Base Class Library has been made available for debugging sessions in VS2008. It would download one file at a time as they are needed. Since then John Robbins and Karem Kusmezer have create a tool to download all the source files without hassle, great work! The tool is NetMassDownloader. Use it whilst it is still working :). Download, unpack, and run: NetMassDownloader.exe -output bcl -d C:\Windows\Microsoft.NET\Framework\v2.0.50727 I executed in in Windows XP as a limited user and have seen numerous failure messages printed out. Nevertheless, 120MB of data was downloaded and I had all the files I wanted. The authors advise though to run it as a privileged process (at least on Vista). The most interesting parts are bcl/redbits/ndp/clr/src/BCL/System and bcl/redbits/ndp/fx/src where bcl is the name of the directory you provided after -output switch. Together they are about 75MB. It was pretty interesting to read the implementation of the classes I had been using for so long: String, Hashtable, Arraylist. They are easy to understand, with lots of comments, and of course in C#. The classes I have read are all pretty basic and no wonder there are lots of pointers and calls into unmanaged code, but it is still readable. One surprising thing, but obvious after knowing it, is that " s ".Trim() will not create a new string "s", but return a slice, an object that holds a reference to the original string and knows where are the beginning and the end. This is possible thanks to the immutability of strings. I bet the substring method is implemented like this too. There are also some monster methods to be seen. One example is internal HttpListener.HandleAuthenticate spanning more than half a thousand lines. BTW source code for mono is available at Source for mono's BCL is under mcs/class/corlib. It might be interesting to compare the two. Saturday, March 1, 2008 Why Vim's modes frustrate newbies Some people say they hate the Vim's modes. Puzzling, because I consider the modes as the killer feature of Vim, something that makes it superior to Emacs. Why modes rock I spend most of the time in the normal mode. In this mode, undo is just u, delete line dd and move one word forward w. In Emacs these commands would all include ctrl, shift, alt or whatever. Inserting text is not what I spend most of the time in an editor on. Most of the time I need to quickly navigate around and make small modification to an already existing text. It is false economy to have the keys on the keyboard be bound to less often used functionality all the time. When I reach the exact place where I need to enter some text, I press i to enter insert mode, type it, and immediately get back to normal mode (I get to normal mode by pressing ctrl-[ rather than ESC). Why modes frustrate newbies While pairing with people new to Vim I noticed that they leave it in whatever mode. So if they were inserting, they live it in insert mode. When they come back to Vim window (after inspecting results of a test run for example), they think they are typing normal-mode commands, but are actually in the insert mode typing text. Or the opposite situation: start typing and instead of inserting text they are rapidly killing one chunk of the file after another. Experienced Vimers follow a convention. After doing something briefly in other mode, immediately go back to the normal mode. I never live Vim in the insert mode or any other mode than normal; when I get back to the Vim window I can always assume Vim is in the normal mode. Sunday, February 17, 2008 BTW xmonad is cool. Monday, February 4, 2008 Debugging memory problems in an IronPython app This blog entry contains notes on debugging memory problems in an IronPython application on Windows. I also provide scripts that are helpful in the process. I should also mention that it is specific to IronPython 1.*. The Debugger I was using is windbg.exe. It is a GUI application, but feels more like a command line. It is certainly more powerful than Visual Studio Debugger. First steps First thing after starting windbg should be loading SOS.dll, which is an extension to windbg providing commands specific to debugging .NET apps (all starting with !). There is !help command that provides description for these commands (invoke after loading sos). .load sos If you have problems it might be because of the wrong sos.dll version. There is a different version for each .net runtime. Since IronPython runs in .net 2.0 you need sos for that specific version. You can find it in the .net sdk directory and specify the full path for the load command. Say freeze ;) Windbg can attach to a process by id (F6 shortcut, but there is also a menu item for it). From that moment on, the debugee is freezed until you detach from it. Before we actually do any debugging we need to have something to debug. Prepare application so that after it does some considerable leaking, there is a moment in its execution that you would attach windbg to it. This moment should be after doing thorough garbage collection to ensure that during debugging we are dealing only with alive objects. You could have code like this: from System import GC from System.Diagnostics import Process from System.Threading import Thread for _ in range(2): print "attach now to process id %d" %\ Next thing is to find objects that leak. In our case the biggest ones were Dictionaries so it was enough to just list all dictionary objects. Sometimes it is unclear which objects leak, this blogpost suggest a strategy for finding out leaking objects. For this task you will find the helpful. This following listing shows output of !dumpheap command the heap with given substring in the type name. This is always the first command after attaching to a process. !dumpheap -type System.Collections.Generic.Dictionary 1b489a58 000e2e00 124 02713600 000e2e00 134720 02b756b0 000e2e00 2503008 24b496a0 000e2e00 2503008 Now copy one of the addresses and issue gcroot command to find some of the chains of references holding the object alive. I'll take the last address. It is worth mentioning that 24b496a0 points to an array that holds the entries of the dictionary. !gcroot 24b496a0 13ab6360(<Unloaded Type>)-> 13ab63c8(System.Collections.Generic.Dictionary`2[[IronPython.Runtime.SymbolId, IronPython],[System.Object, mscorlib]])-> 13ab6424(System.Collections.Generic.Dictionary`2+Entry[[IronPython.Runtime.SymbolId, IronPython],[System.Object, mscorlib]][])-> 186787d4(<Unloaded Type>)-> The previous listing shows only a fragment of the output of the !gcroot command. Arrows indicate directions of references. In the output of !gcroot command, the root (a static object or value on some stack) will be at the top whereas the object you invoked the !gcroot with will be towards the bottom. Difficulties in debugging an IronPython app Python is a dynamic language and that makes it more difficult to debug IronPython than C# for example (with windbg). There are two problems. Firstly, types defined in IronPython appear under windbg as Unloaded Type. Even if the type names would be shown (no clue why they are not), they would be C# types (or should I say .NET native types) like OldType and UserType: the guts of the IronPython implementation, not the classes defined in our IronPython code. Secondly, the attributes of an object are not fields. They are stored in a dictionary, and to make things worse, that dictionary is not keyed by strings but by SymbolIDs. Somewhere in memory lies a table containing strings to which SymbolIDs hold indexes. To find out the attribute name or the type name there are many commands needed. I have created two scripts to automate it. Explaining the windbg scripts is out of scope for this entry, but I think I will post about it soon. attr script The first script, attr, takes two addresses as arguments, one to the array holding the dictionary entries, second to the value of the attribute, and prints the name of the attribute. Below I include the same fragment of the gcroot output plus example use of the attr. It will display the name under which 186787d4 is kept in the __dict__ of 13ab6360. Note that I pass to attr the address of the array not 13ab6360. ... 13ab6360(<Unloaded Type>)-> 186787d4(<Unloaded Type>)-> $$>a<c:\path\attr 13ab6424 186787d4 Name: System.String MethodTable: 790fc6cc EEClass: 790fc62c Size: 110(0x6e) bytes String: _GUIThreadTestCase__guiControl The above listing assumes you save the attr script in c:\path, and the dollars are required, pounds will not do. Make sure you invoke it giving an address of a dictionary entry array keyed by SymbolIds like in the above example. So the above gives the name of one attribute. To get more attributes you can invoke !dumparray on the entry array, which will display all the values there which you can then check individually with attr script (or write another script to automate it ^^). !dumparray -details <entryArrayAddress> The attr script may not work if the executable you are debugging is running from a path that contains spaces. There is one constant in the script that would have to be increased to make up for that additional space. usrtype script The next script is less reliable that the first one, it worked half the time I invoked it on a Unloaded Type object. I think it works for UserType, so I named it usrtype. It takes just one argument which is the address of an object and returns the name of its Python type. $$>a<c:\path\usrtype <address> I again assume you have it saved in c:\path. Now the most frequently used command, !dumpobj. It displays the values of the fields of an object. Of course it displays only the fields defined in the .net class. It knows what the object's type is, because each object on the managed heap has the pointer to its type in its first 4 bytes (or 8 if it is 64 bit machine). Since all the leaking I was chasing ware caused by design flaw in implementation of events in IronPython, I usually looked for object of type ReflectedEvent in the chain displayed by the !gcroot. ReflectedEvent stores the name of the event. It was usually also useful to inspect the IronPython.Runtime.Calls.Method further down the chain, from which you can get the name of the method handling the event as well as the class this method is defined in. Tips & Tricks I hope you will find them useful. Testing that the memory leak is gone So you got rid of the memory leak, but how do you test that it is gone? I mean an automated unit test! obj = objectThatMightLeak() weakRefToObj = WeakReference(obj) del obj for _ in range(2): assert !weakRefToObj.IsAlive WeakReference will allow GC to collect the object, and after collection it will answer if the object was garbage collected. The del obj line is very important, ware it not there the test would have no chance of passing. Marking objects Let's say you suspect that some object is not being garbage collected, and its class is defined in Python. Because of the dynamic nature of Python, its class is not represented as .NET type, hence you can't simply find it with !dumpheap -type <type_name> command. My mother works in laboratory, when she analyzes samples, she sometimes marks them with special substance to make some elements stand out. You can mark Python objects in a similar way. from System import GopherStyleUriParser pythonObject.tag = GopherStyleUriParser() GopherStyleUriParser is a good enough mark, there is low probability you will have a second one on the heap, and because it is .NET type you can find it easily with !dumpheap -type Gopher. Then invoke !gcroot on it and you will find that the chain goes through your object. Update: Previously I was recommending using ArithmeticException instead of GopherStyleUriParser for the tag; don't do this. As soon as you would get rid of the other leaks, the object would be kept alive by the instance of ArithmeticException, which captures the stack trace. Nuking events That one is a dirty hack. All the trouble I had with memory leaks were because of the events, how about nuking them? The reason the IronPython team didn't just use the .net implementation of events was that they wanted to allow removing handlers by object equality, rather then by referential equality. By referential equality I mean comparing objects' references (is operator in Python). So how about defining an object that is equal to everything? class EqualityForAll(object):     def __eq__(_, __):         return True That is a very fine fellow, which we can use to get all the handlers out of an event. e = EqualityForAll() for _ in irange(100)     control.OnClick -= e Ok, that will kill at most 100 handlers, but there is no way you can find out how many there are. And not, it will not throw an exception if there are no more handlers. If I remember correctly from looking at the implementation code (open source is great), there are some exception being thrown under the hood, but are swallowed higher up. This makes the operation costly if there are no handlers, as the exception in .NET are much more expensive than in CPython. I thought that finding and stopping the leaks would be easy, but it took many days. Perhaps fixing the IronPython implementation could have taken less time. Anyway, if you think that the bug should be fixed, please vote for it. It was given a low priority and it is not easy to do, so without votes it might not make it to IronPython 2.0. Thursday, January 31, 2008 (11 12 13 . nil) (nil t nil t nil) In Python it would be: airports["Boston"] = 'bos Wednesday, January 30, 2008 Resolver One for Open Source Sunday, January 6, 2008 Anti-pattern: static subject to observer mapping Short description GC - Garbage Collector. What is wrong with static subject to observer mapping Known occurrences Thursday, January 3, 2008 All possible FontStyles FontStyle is an enumeration with the following members. FontStyle.Regular = 0 FontStyle.Bold = 1 FontStyle.Italic = 2 FontStyle.Underline = 4 FontStyle.Strikeout = 8 How to generate all possible combinations? for i in xrange(16):     fontStyle = Enum.ToObject(FontStyle, i)     if fontFamily.IsStyleAvailable(fontStyle):         return Font(fontFamily, fontSize, fontStyle)
Mental Maths For Adults a problem by mere mental maths for adults arithmetic is very attractive to children (and adults too). The Math Worksheet Children. The mental and written arithmetic abilities of adults with dyslexia. Dyslexia and Specific Learning Difficulties in Adults Dyscalculia Eyes and Increasing mental stamina books, fun new series starters, and captivating young adult novels. if mental maths for adults have not done significant amounts of mental calculation in recent years (which is true for most adults) then these. Mental Maths Videos are created to speed up your mental math abilities, pick up. Looking for Adult Numeracy Guides and Handbooks Books products. Increase your mental math ability with scott flansburg Mental math isnt as difficult as it might sound, and you be surprised at how natural remedy for brain fog it is to make. Which of the pizzas is his. This has been adapted. Mental Arithmetic 5. Surveys of computations best medicine brain memory out by adults. Practical, common-sense maths for adults. Mental Maths Videos are created to mind improve your mental well being up your mental math abilities, pick up. 99 7. Treatment for brain swelling after concussion In adults this scaffold is not needed because memory for math facts has most. The abilities of 19 adult students with dyslexia and 19 students without dyslexia to recall number facts were compared. Charity, National Numeracy, has created a maths mental maths for adults test to raise skill levels among millions of adults across the UK. In adults this scaffold is not needed because memory for math facts has most. I love the games and Math seems easy with abacus. Practice mental arithmetic for aptitude tests, assessments, psychometric tests, iq tests, for school. Weak mental arithmetic skills. If you didnt get the opportunity to retake your GCSEs first time round, or are wanting to return to education, then we also offer standalone Maths. The Government has said that calculators will be banned in maths tests for. To solve a problem, perhaps a difficult one, by mere mental arithmetic. Benjamin of Harvey Mudd College, one of. Can you pass the National Numeracy Challenge? Do you panic about the QTS numeracy test?. Dyslexia. Primary (7-13 years old) Adult(14-110 years old), Teachers Training. Fun way to learn math and. As adults it seems way. Mental maths for adults photo 1 Mental Arithmetic 5. Sure, there ARE mathematicians out there, real mathematicians, who admit to having poor mental maths skills and do just fine. All questions taken from increase concentration and focus supplements 2014 junior maths challenge paper. to an improvement in working memory skills and mental arithmetic, however no. These questions are actually meant for 12 year olds but you wont believe it. Become good with numbers. • cognitive enhancement drug new • drugs to improve memory loss • do brain enhancement pills work Free IQ test,mental math test, abstract reasoning test, spatial reasoning test, verbal reasoning test. Primary (7-13 years old) Adult(14-110 years old), Teachers Training. Mathemagics Mental Math Tricks. And for adults struggling with the disorder, a shift in attitude be the first step.
Read Efficient Data Structures May 01, 2018 0 Comments Read Efficient Data Structures The previous blog post introduced the RUM conjecture. It describes the trade-off between read (RO), update (UO), and memory (MO) overheads that one should take into account when designing data structures and access methods. In this post we want to take a closer look at data structures designed for low read overhead that are commonly used in practice, i.e. hash tables, red-black trees, and skip lists. This blog post is the second part of the RUM series: In order to compare the different implementations we are using the same example as in the previous post. The task is to implement a set of integers, this time focusing on a small amount of read overhead. The post is structured as follows. In the first section we want to recap the solution from the last post which has minimum read overhead. The following sections take a closer look at three practical alternatives, starting with hash tables, then red-black trees, and closing with skip lists. The final section is wrapping up by comparing the three different data structures from a theoretical point of view as well as conducting simple run time experiments. Minimizing The Read Overhead We have seen an optimal implementation in terms of read overhead: Given possible integers from 0 to 1000, we can utilize a boolean array a of size 1001. The array elements are initialized with false. To mark an integer i as member of the set, we set a[i] := true. Recall the following overheads: This is impractical for most real life scenarios as the memory overhead grows with the number of possible values. While it might be theoretically possible to use this method for integers, it gets impossible if we're trying to store strings in a set, for example. How can we reduce the memory overhead without losing too much read (and write) performance? In practice this is achieved by using hash, sorted tree or list based approaches. Let's take a look at three data structures designed to be read efficient without sacrificing too much of write and memory performance: Hash tables, red-black trees, and skip lists. Hash Tables The idea of hash tables is similar to the one used in the optimal solution. Instead of reserving a boolean slot for every possible integer we limit the space to an integer array a of size m. Then we pick a function h such that for each integer i: h(i) ∈ [0..m-1]. This function can be used to compute the array index and we can store i in a[h(i)]. The following diagram illustrates how the integer 3 is stored in the set implemented using a hash table. We compute h(3) and store the value in the corresponding field of the array. hash table How do we pick h? A practical choice for h is to reuse an existing cryptographic hash function (e.g. MD5) and take the resulting value modulo m. The disadvantage is that these hash functions might be slow. This is why Java, e.g., relies on custom hash functions for every data type (e.g. String). If we know all possible values upfront we can pick a perfect hash function. But this is not possible most of the time. What do we do if two integers i and j get mapped to the same index h(i) = h(j)? There are different techniques how to resolve these so called collisions. One collision resolution method is separate chaining. In separate chaining we do not store the actual values in the array but another layer of data structures. A value is read from the hash table by first computing the array index and then querying the data structure stored there. Possible candidates are tree or list based structures as introduced in the following sections. But it is also common to simply use a linked list, if the number of collisions is expected to be low. Another commonly used method is called open addressing. If a collision happens, we compute a new index based on some probing strategy, e.g. linear probing with h(i) + 1. RUM Overheads The RUM overheads of a hash table implementation heavily depends on the selected hash function, the array size m, as well as the collision resolution strategy. This makes it possible to tune the RUM overheads of your hash table. If there is no collision, the read overhead is influenced only by the overhead of computing h(i). A smaller overhead in evaluating the hash function results in a smaller overall read overhead. In case of a collision there is additional overhead which depends on the resolution strategy. Although it is useful to avoid collisions by choosing an almost perfect hash function, the total overhead might be smaller if we make the hash function reasonably fast and live with a few extra operations when resolving collisions. As an update requires a read operation first, the update overhead is equal to the read overhead, plus an insertion / deletion operation on either the array or the chained data structures in case of separate chaining. The memory overhead is indirectly proportial to the load factor (n/m). We also have to take additional memory into account if we are using separate chaining for collision resolution. If we are inserting more and more data, the memory overhead decreases. However the read overhead increases as we have to resolve more collisions. In this case, it is possible to rescale the hash table, which requires a full copy of the existing data into a bigger array and a re-computation of all hash values. Asymptotic Complexity Read and update operations have constant asymptotic complexity on average, as computing the hash value takes constant time, independent of the amount of data stored in the table. In the worst case (all n input values get the same hash value), we have n - 1 collisions to resolve. Thus the worst case performance is as bad as if we stored the data in an unordered array and performed a full scan. If m is chosen as small as possible and the hash table is resized if required, the amortized memory requirement is linear in the number of values stored in the set. Type Average Worst case Read O(1) O(n) Update O(1) O(n) Memory O(n) O(n) Read performance of hash table based data structures is constant on average. However, by its design it only supports point queries efficiently. If your access patterns contain range queries, e.g. checking if the integers [0..500] are contained in the set, hash sets are not the right choice. To efficiently support range queries, we can store the data in a sorted manner. One of the most common types of data structure for this use case are binary search trees. Red-Black Trees In a binary search tree, the data is stored in the nodes. Each node has up to two child nodes. The left sub-tree contains only elements that are smaller than the current node. The right sub-tree contains only larger elements. If the tree is balanced, i.e. for all nodes the height of the left and right sub-trees differ at most by 1, searching a node takes logarithmic time. The following picture illustrates how to store the set {0..6} in a binary search tree. binary search tree The question is how do we keep the tree balanced when inserting and deleting elements? We need to design our insertion and deletion algorithm accordingly to make the tree self-balancing. A widely used variant of such self-balancing binary search trees are red-black trees [1]. In a red-black tree, each node stores its color in addition to the actual value. The color information is used when inserting or deleting nodes in order to determine how to rebalance the tree. Rebalancing is done by changing color and rotating sub-trees around their parents recursively until the tree is balanced again. Explaining the algorithm in detail is beyond the scope of this post, so please feel free to look it up on your own. Also there is an amazing interactive visualization of red-black trees by David Galles which is worth checking out. Now let's take a look at the same example set {0..6} stored in a red-black tree. red-black tree Note that red-black trees are not necessarily balanced perfectly, but rather in terms of of the height of black nodes in the sub-trees. Due to the invariants of red-black trees, a balanced red-black tree is never much worse than a perfectly balanced tree, i.e. they have the same asymptotic complexity for searches. RUM Overheads The RUM overheads in self-balancing binary search trees depend on the algorithm to keep the tree balanced. In red-black trees rebalancing happens recursively and might affect nodes all the way up to the root. A read operation involves traversing the tree until the element is found. If the element is stored in a leaf node, it takes at most log(n) + c traversal steps, with c being the potential overhead if the tree is not perfectly balanced. As in the hash table based implementation, an update operation on a red-black tree based set requires a read operation first. In addition to the read overhead, the update overhead depends on the value to be updated, whether it should be inserted and removed, as well as the current structure of the tree. In the most trivial cases an update only requires a single operation on the parent node, i.e. modifying the pointer to the child. Worst case we have to rebalance the tree all the way up to the root. Asymptotic Complexity Read operations have logarithmic complexity as red-black trees are balanced, thus searching a value conceptually corresponds to a binary search. Update operations have the same complexity, as they require logarithmic search, plus worst case rebalancing operations from a leaf to the root, which is again logarithmic. As we require one node per value, the memory requirements are linear. Type Average Worst case Read O(log n) O(log n) Update O(log n) O(log n) Memory O(n) O(n) We have seen that self-balancing binary search trees are useful data structures if range queries are required or the data should be presented to the user in a sorted manner. However, the algorithms required to make them self-balancing are rather complex. In addition, if we want to support concurrent access, we have to lock parts of the tree during rebalancing. This might lead to unpredictable slow-downs if a lot of rebalancing is required. How can we design a concurrency-friendly data structure that also supports logarithmic search cost? Skip Lists By design linked lists are very concurrency-friendly as updates are highly localized and cache-friendly [3]. If our data would be a sorted sequence, we could utilize binary search to achieve logarithmic read complexity. The problem with a sorted linked list is, however, that we cannot access a random element of the list. Thus, binary search is not possible. Or is it? This is where skip lists come in. Skip lists are a probabilistic alternative to balanced trees [4, 5, 6]. The core idea of a skip list is to provide express lanes to later parts of the data using skip pointers. To perform binary search we have to compare our query against the median. If the median is not the element we are looking for, we take either the left or right sublist and recursively repeat the median comparison. This means we do not really need complete random access, but rather access to the median of the current sublist. The following figure illustrates how we can achieve this using skip pointers. perfect skip list This skip list has three levels. The lowest level contains the full set of integers {0..6}. The next level only {1, 3, 5}, while the upper level only contains {3}. We are adding two artificial nodes -∞ and . Each node holds a value and an array of pointers, one to each successor on the corresponding level. If we now want to check if 4 is member of the set, we proceed as follows. • Start from the leftmost element (-∞) with the top most pointer (level 3) • Compare the query (4) with the next element in the current level (3) • As 3 < 4, we move one element to the right (to 3) • We then again compare the query (4) with the next element in the current level () • As ∞ >= 4, we move one level down (to level 2) • We then again compare the query (4) with the next element in the current level (5) • As 5 >= 4, we move one level down (to level 1) • We then again compare the query (4) with the next element in the current level (4) • As 4 = 4, the query returns successfully This algorithm works perfectly if the list is static and we can build up the skip pointers to support our binary search. In a real life scenario, however, we want to be able to insert or delete elements. How can we efficiently support inserts and deletions without losing the nice properties of well-placed skip pointers? Completely rebuilding the skip list after each modification is not practical. In the end we want to have highly localized updates to support high concurrency. We introduced skip lists as a probabilistic alternative to balanced trees. And the probabilistic part is exactly the one needed to solve the problem of where and how to place skip pointers. For each element we want to insert into the skip list, we first search for its position in the existing elements. Then we insert it into the lowest level. Afterwards we flip a coin. If the coin shows tails, we are done. If it shows heads, we "promote" the element to the next level, inserting it into the higher level list, and repeat the procedure. In order to delete an element, we search for it and then simply remove it from all levels. Feel free to check out this amazing interactive skip list visualization. Due to the non-deterministic nature of the insertion algorithm, real-life skip lists do not look as optimal as the one in the figure above. They will most likely look a lot more messy. Nevertheless it can be shown that the expected search complexity is still logarithmic [7]. RUM Overheads The RUM overheads in skip lists are non-deterministic. This is also why the asymptotic complexity analysis is more complex than usual, as it involves probability theory as well. Nevertheless we are going to take a look at the different overheads on a conceptual level. A read operation requires walking through a sequence of horizontal and vertical pointers, comparing the query against different list elements along the way. This means that there is a potentially high number of auxiliary reads until the query can return. As you might have guessed, we require a read operation before we can perform an update. The number of auxiliary updates, i.e. promotions, are non-deterministic. However they are completely local and do not depend on the structure of the remaining skip list. This makes it easy to parallelize updates. The memory overhead depends on the number of promotions, as we have to store additional pointers for each promotion. By using a non-fair coin, i.e. using a probability for a promotion / non-promotion of [p, 1-p] with 0 < p < 1 instead of [0.5, 0.5], we can actually tune the memory overhead, potentially trading against additional read and update overhead. If we chose p = 0 we would get a linked list which has the minimum memory overhead we can achieve in this data structure. If we choose p to be too large I believe that both the memory and the read overhead increases, as we have to potentially perform a lot of vertical moves along the different levels. Asymptotic Complexity There are different ways to analyze the asymptotic complexity of skip-lists. Two commonly used methods are to look at the expected asymptotic complexity or an asymptotic complexity that holds with high probability. For simplicity reasons, let us take a look at the expected complexity here. When implementing skip lists as described above, there is a small chance to end up with an infinitely promoted element. While the expected number of levels is O(log(n)), it is theoretically unbounded. To solve this it is possible to choose a maximum number of levels M that an element can get promoted. If M is sufficiently large, there are no negative implications in practice. The expected read and update complexity in the average case is logarithmic. The expected height of a skip list is O(log(n)). However, higher promoted elements are less likely, allowing us to derive linear expected memory requirements [8]. Analyzing the worst case is more interesting for the bounded list, as the unbounded worst case is an infinitely high skip list. In the worst case of a bounded list we promoted every element to the maximum level. If we choose the maximum level to depend on n, we can derive linear complexity for read and update operations. Type Average Worst case (M-bounded) Worst case (unbounded) Read O(log n) O(n) Update O(log n) O(n) Memory O(n) O(nM) Now we got to know three different types of data structures which are widely used in the industry. We looked at them from a theoretical point of view one by one. The next section contains a static comparison, summarizing our findings, as well as some run time experiments using implementations from the Java standard library. From what we have learned today it is safe to say that read-efficient data structures aim at sub-linear read overhead. Hash tables are great for in-memory maps or sets. The disadvantages lie in the need to rescale the underlying array if the data grows, as well as the lack of range-query support. Tree based data structures are a good alternative if range queries or sorted output is of concern. Skip lists are sometimes preferred over trees due to their simplicity, especially when it comes to lock-free implementations. Some of the data structures are configurable in terms of RUM overheads. By tuning parameters like the collision resolution strategy or the desired load factor, we can trade memory overhead against read overhead in hash tables. In skip lists we can achieve this by modifying the promotion probability. The following table summarizes the average asymptotic read, update, and memory requirements, as well as the RUM tunability aspect of the three data structures we have seen in this post. Hash Table Red-Black Tree Skip List Avg. Read O(1) O(log n) O(log n) Avg. Update O(1) O(log n) O(log n) Avg. Memory O(n) O(n) O(n) RUM Tuning Parameters load factor, hash function, collision resolution strategy - promotion probability Runtime Experiments Last but not least, we want to take a look at the actual read performance of three Java standard library data structures: HashSet, TreeSet, and ConcurrentSkipListSet. HashSet uses separate chaining for collision resolution. If the number of elements in a bucket is small enough, they will be stored in a list. If the number exceeds the TREEIFY_THRESHOLD, it will be migrated to a red-black tree. TreeSet is implemented using a red-black tree. Both, HashSet and TreeSet are not thread safe and do not support concurrent modifications. As the name suggests, ConcurrentSkipListSet supports concurrent access. The base lists use a variant of the Harris-Maged linked ordered set algorithm [9, 10]. As a benchmark we generate a set from n random integers, and copy it into a HashSet, TreeSet, and ConcurrentSkipListSet, respectively. We also create a read-optimal set from those numbers, i.e. using a huge boolean array. We then create a list of n random point queries and measure the run time for all queries to complete. We are using ScalaMeter for measuring the runtime performance. Feel free to check out my microbenchmarking blog post which contains more details about the tool. The following chart shows the run time for 100 000 point queries on the different sets generated from 100 000 random integers. As expected, the read-optimal implementation performs significantly better than all the others. The second place goes to the hash set. Both the read-optimal implementation and the hash set have constant asymptotic read overhead. The tree set and skip list set perform much worse. This is also expected, as they have logarithmic run time complexity. It would be interesting to also look at the other overheads of the four implementations, as well as including concurrency into the mix. But I am leaving this exercise to the reader :P In the next post we are going to take a closer look at write efficient data structures which are designed to have low update overhead. • [1] Guibas, L.J. and Sedgewick, R., 1978, October. A dichromatic framework for balanced trees. In Foundations of Computer Science, 1978., 19th Annual Symposium on (pp. 8-21). IEEE. • [2] Memory consumption of popular Java data types – part 2 by Mikhail Vorontsov • [3] Choose Concurrency-Friendly Data Structures By Herb Sutter • [4] Pugh, W., 1989, August. Skip lists: A probabilistic alternative to balanced trees. In Workshop on Algorithms and Data Structures (pp. 437-449). Springer, Berlin, Heidelberg. • [5] Fraser, K. and Harris, T., 2007. Concurrent programming without locks. ACM Transactions on Computer Systems (TOCS), 25(2), p.5. • [6] Herlihy, M., Lev, Y., Luchangco, V. and Shavit, N., 2006. A provably correct scalable concurrent skip list. In Conference On Principles of Distributed Systems (OPODIS). • [7] Papadakis, T., 1993. Skip lists and probabilistic analysis of algorithms. Ph. D. Dissertation: University of Waterloo. • [8] Skip lists - Data Structures Course of Ben-Gurion University of the Negev • [9] Harris, T.L., 2001, October. A pragmatic implementation of non-blocking linked-lists. In International Symposium on Distributed Computing (pp. 300-314). Springer, Berlin, Heidelberg. • [10] Michael, M.M., 2002, August. High performance dynamic lock-free hash tables and list-based sets. In Proceedings of the fourteenth annual ACM symposium on Parallel algorithms and architectures (pp. 73-82). ACM. • Cover image by Smabs Sputzer - It's a Rum Do... auf flickr, CC BY 2.0, Tag cloud
Oxygen concentrators are machines that take in the air from the surroundings, and concentrates the oxygen from the air.  Since air consists of about eighty percent nitrogen and about twenty percent oxygen, O2 concentrators operate by removing the nitrogen from the air, just leaving the oxygen.  They make use of a substance called Zeolite to absorb the nitrogen.  At high pressure, the zeolite can absorb large amounts of nitrogen, due to the large and porous surface area.  Oxygen concentrators are therefore essentially nitrogen scrubbers, allowing oxygen and the other atmospheric gasses to pass through, leaving oxygen as the major gas remaining.  The oxygen, that is now ninety five percent pure, will then be supplied to the large reservoir bag in the EWOT Asutralia system. As soon as the oxygen, and the other free components, are collected in the reservoir bag the pressure drops, enabling the nitrogen to dissipate. With EWOT Energy Plus, some of this “de-oxygenated” air is held in a smaller reservoir to be used in the “contrast training” element of the EWOT Australia protocol. Generally speaking, oxygen concentrators are widely-used in water treatment, pharmaceutical production and also as a source of pure oxygen in medical applications. Oxygen concentrators are devices that also supply oxygen to people at substantially higher concentrations than the typical oxygen level obtainable in the ambient air. This means that they may also be used to raise the amount of oxygen in the bloodstream, which can then be converted into energy. Individuals who have inadequate blood circulation and regularly run out of breath may also reap the benefits of supplemental oxygen therapy. EWOT also utilizes the oxygen concentrator to supply high oxygen and low oxygen contrasts to athletes and people looking tom improve their well-being. There a wide range of models on the market, including the EWOT Australia Oxygen Concentrator. For the application of EWOT and successful and meaningful Exercise With Oxygen Therapy, the oxygen concentrator must meet specific output standards. Lesser EWOT systems only deliver a very small amount of oxygen that is not enough to make as great an impact as the EWOT Australia system. Some don’t use a suitable system to deliver the oxygen, such as the nasal cannulas or the headset style delivery systems, where the oxygen simply dissipates into the atmosphere. For athletes and people who are serious about getting the full benefits of EWOT, a mask especially designed with the two way valve systems for high volumes of oxygen exchange, are absolutely essential. Oxygen Concentrators are considered safe mediums for oxygen production, reducing much of the fire risk of medical oxygen bottles. They are relatively cheap and can be used in the home, gym or clinic setting. EWOT Australia provides full instructions for the use of their systems and professionals who choose to employ EWOT in their gym or clinic can also avail themselves of additional training in protocols delivery and variations.
Eastern and western religions It emphasizes values the West has forgotten. On God and Devas: This would help to give readers a better understanding of these mysterious Eastern faith systems that we may hear very Eastern and western religions about in the West if one does not actively seek it. Or speak of it in silence. Within the last decade, many Americans have begun viewing the turban as a symbol of terrorism and commit hate crimes towards Sikh immigrants. It is presumptuous for man to seek personal knowledge of God. It is common to find people from eastern or western countries that practice religions from across the world. New religious movements[ edit ] Further information: The texts of Confucianism stress respect for others that are both above and below one in status. In summary, the Philosophy program challenges Eastern and western religions students to think and write well, ponder their most basic assumptions, see themselves as participants in a vital history of ideas, and grow in spirit to become intellectually generous citizens of the world. Doctrines tend to be subtle, complex and even paradoxical. Such is again antithetical to Christian theism in the way that mans is his own saviour, he via decisions and choices will determine his future, as one commentator, David Bentley, adds: During the last century, America has witnessed an in increase in the population of immigrants who practice Sikhism. Eastern religions seek a mystical psychic transformation. The classic Rinzai Zen koan, "What was your face before you were born? The school faced both support and opposition for the suspension. Difference Between Eastern Religions and Western Religions There is no Judgment Day for God does not judge or punish. There are many differences in Eastern and Western religions that are fitting to different people across the world. There is no absolute end to the world, neither is there a duality of God and world, but a unity. Subsequently, in Hinduism the soul has always existed and will continue to exist until via a process of rebirths it has merged with the ultimate reality Brahman. The Concept of Time The concept of time marks another telling difference between Eastern and Western thought. Nevertheless, Sikh immigrants have faced prejudice from the American government and its citizens. Mystical sects, though minor, provide exceptions. With God as the creator, humans are lower in status, but higher than animals. Western religions are found in the 3. There are few similarities between speaking of Western and Eastern religions other than there are some people who live in the western world and have Eastern religions, and there are those who live in the East and believe in Western religions. All religions speak of Him. Virtuous conduct and right belief are the foundation stones of religious life, the first step toward higher mystical communion. Worship and belief are formalized, exacting and required. Buddhism is based on dharma where the goal is to liberate oneself from the suffering of the Earth. Not enough time to write paper about Eastern and Western Religions? The Abrahamic idea of a judgemental, anthropomorphic God does not fit well into the Eastern worldview. What Are the Differences Between Eastern And Western Religions? Even though religions differ in the East and West, the goal of religion remains the same: Quite to the contrary of some proponents of pluralism in our age that propound the notion that all religions or belief systems are the same, or that they are just different avenues to God, I think falls short of actuality. Altogether this is different to that of Jesus who not only proclaimed the one true Kingdom of God, but also claimed to be the only way to God John Each tradition offers us a way past or through or over the obstacles and presents us a guide to a life more rich, more joyful, more wise. Western religions are not driven so much by certain principles and ideals, rather everyday good and bad behavior to reach Heaven. We are also told that Jesus is close to us in a personal way, in fact closer than any brother Proverbs The goals of enlightenment and liberation are to be found in this life, within the context of time, within man himself. Western religions depend upon historical events to give significance to their most precious beliefs. In an Eastern worldview, Hinduism for instance, God is an impersonal force or principle that does not transcend nature, in other words the Hindus, and many other Easterners, are pantheists who believe that God is part of the natural world. The world was created by God and at some point in the future will be forever destroyed by Him.With the western religions in life and death, you only live and die once while the eastern religions there is reincarnation. In western religions, the priest, Pope and so forth relay the words of God while the sources of enlightenment are within each individual person. Eastern Religions seem to have a common concept of humanity as an important component of universe while Western religion and especially Christianity seem more focused on humanity relationship with God, than on one-on-one relationship that is emphasizes by Hinduism, Buddhism and almost all other religions of the East. The differences and similarities between the Eastern, Buddhism and Hinduism, and the Western, Christanity and Judiasm, religious traditions had a cultural impact on the society during mi-centre.com to C.E. Eastern religion follows more the eastern traditional culture, whereas, Western religion follows more the western culture. Western religions Eastern religions are the religions that originate in the Eastern areas like China, Southeast Asia, India and Japan. Eastern religions are also typically polytheistic, whereas typically Western religions are monotheistic in that only one God is worshipped. Western religions are those religions that are practiced in most other countries outside of the East. One such category is popularly referred to as "western religions", thereby differentiating the religions constituting it from "eastern religions." Islam, Judaism, and Christianity are of the three most popular religions that rest on the foundation of a single creator belief and are therefore called western religions. Eastern and western religions Rated 0/5 based on 79 review
Reconstructing visual experiences from brain activity evoked by natural movies Shinji Nishimoto, An T. Vu, Thomas Naselaris, Yuval Benjamini, Bin Yu & Jack L. Gallant (Current Biology 2011, PDF 1.4M). Reconstructing movies from evoked brain activity Reconstructions from several different individuals Frequently asked questions about this work Could you give a simple outline of the experiment? Can you give an intuitive explanation of movie reconstruction? As you move through the world or you watch a movie, a dynamic, ever-changing pattern of activity is evoked in the brain. The goal of movie reconstruction is to use the evoked activity to recreate the movie you observed. To do this, we create encoding models that describe how movies are transformed into brain activity, and then we use those models to decode brain activity and reconstruct the stimulus. Can you explain the encoding model and how it was fit to the data? To understand our encoding model, it is most useful to think of the process of perception as one of filtering the visual input in order to extract useful information. The human visual cortex consist of billions of neurons. Each neuron can be viewed as a filter that takes a visual stimulus as input, and produces a spiking response as output. In early visual cortex these neural filters are selective for simple features such as spatial position, motion direction and speed. Our motion-energy encoding model describes this filtering process. Currently the best method for measuring human brain activity is fMRI. However, fMRI does not measure neural activity directly, but rather measures hemodynamic changes (i.e. changes in blood flow, blood volume and blood oxygenation) that are caused by neural activity. These hemodynamic changes take place over seconds, so they are much slower than the changes that can occur in natural movies (or in the individual neurons that filter those movies). Thus, it has previously been thought impossible to decode dynamic information from brain activtiy recorded by fMRI. To overcome this fundamental limitation we use a two stage encoding model. The first stage consists of a large collection of motion-energy filters that span a range of positions, motion directions and speeds as the underlying neurons. This stage models the fast responses in the early visual system. The output from the first stage of the model is fed into a second stage that describes how neural activity affects hemodynamic activity in turn. The two stage processing allows us to model the relationship between the fine temporal information in the movies and the slow brain activity signals measured using fMRI. Functional MRI records brain activity from small volumes of brain tissue called voxels (here each voxel was 2.0 x 2.0 x 2.5 mm). Each voxel represents the pooled activity of hundreds of thousands of neurons. Therefore, we do not model each voxel as a single motion-energy filter, but rather as a bank of thousands of such filters. In practice fitting the encoding model to each voxel is a straightforward regression problem. First, each movie is processed by a bank of nonlinear motion-energy filters. Next, a set of weights is found that optimally map the filtered movie (now represented as a vector of about 6,000 filter outputs) into measured brain activity. (Linear summation is assumed in order to simplify fitting.) How accurate is the decoder? A good decoder should produce a reconstruction that a neutral observer judges to be visually similar to the viewed movie. However, it is difficult to quantify human judgments of visual similarity. In this paper we use similarity in the motion-energy domain. That is, we quantify how much of the spatially localized motion information in the viewed movie was reconstructed. The accuracy of our reconstructions is far above chance. Other studies have attempted reconstruction before. How is your study different? Previous studies showed that it is possible to reconstruct static visual patterns (Thirion et al., 2006 Neuroimage; Miyawaki et al., 2008 Neuron), static natural images (Naselaris et al., 2009 Neuron) or handwriting digits (van Gerven et al. 2010 Neural Computation). However, no previous study has produced reconstructions of dynamic natural movies. This is a critical step toward obtaining reconstructions of internal states such as imagery, dreams and so on. Why is this finding important? From a basic science perspective, our paper provides the first quantitative description of dynamic human brain activity during conditions simulating natural vision. This information will be important to vision scientists and other neuroscientists. Our study also represents another important step in the development of brain-reading technologies that could someday be useful to society. Previous brain-reading approaches could only decode static information. But most of our visual experience is dynamic, and these dynamics are often the most compelling aspect of visual experience. Our results will be crucial for developing brain-reading technologies that can decode dynamic experiences. How many subjects did you run? Is there any chance that they could have cheated? We ran three subjects for the experiments in this paper, all co-authors. There are several technical considerations that made it advantageous to use authors as subjects. It takes several hours to acquire sufficient data to build an accurate motion-energy encoding model for each subject, and naive subjects find it difficult to stay still and alert for this long. Authors are motivated to be good subjects, to their data are of high quality. These high quality data enabled us to build detailed and accurate models for each individual subject. There is no reason to think that the use of authors as subjects weakens the validity of the study. The experiment focuses solely on the early part of the visual system, and this part of the brain is not heavily modulated by intention or prior knowledge. The movies used to develop encoding models for each subject and those used for decoding were completely separate, and there no plausible way that a subject could have changed their own brain activity in order to improve decoding. Many fMRI studies use much larger groups of subjects, but they collect much less data on each subject. Such studies tend to average over a lot of the individual variability in the data, and the results provide a poor description of brain activity in any individual subject. What are the limits on brain decoding? Decoding performance depends on the quality of brain activity measurements. In this study we used functional MRI (fMRI) to measure brain activity. (Note that fMRI does not actually measure the activity of neurons. Instead, it measures blood flow consequent to neural activity. However, many studies have shown that the blood flow signals measured using fMRI are generally correlated with neural activity.) fMRI has relatively modest spatial and temporal resolution, so much of the information contained in the underlying neural activity is lost when using this technique. fMRI measurements are also quite variable from trial-to-trial. Both of these factors limit the amount of information that can be decoded from fMRI measurements. Decoding also depends critically on our understanding of how the brain represents information, because this will determine the quality of the computational model. If the encoding model is poor (i.e., if it does a poor job of prediction) then the decoder will be inaccurate. While our computational models of some cortical visual areas perform well, they do not perform well when used to decode activity in other parts of the brain. A better understanding of the processing that occurs in parts of the brain beyond visual cortex (e.g. parietal cortex, frontal cortex) will be required before it will be possible to decode other aspects of human experience. What are the future applications of this technology? At some later date when the technology is developed further, will it be possible to decode dreams, memory, and visual imagery? Neuroscientists generally assume that all mental processes have a concrete neurobiological basis. Under this assumption, as long as we have good measurements of brain activity and good computational models of the brain, it should be possible in principle to decode the visual content of mental processes like dreams, memory, and imagery. The computational encoding models in our study provide a functional account of brain activity evoked by natural movies. It is currently unknown whether processes like dreaming and imagination are realized in the brain in a way that is functionally similar to perception. If they are, then it should be possible to use the techniques developed in this paper to decode brain activity during dreaming or imagination. At some later date when the technology is developed further, will it be possible to use this technology in detective work, court cases, trials, etc? The potential use of this technology in the legal system is questionable. Many psychology studies have now demonstrated that eyewitness testimony is notoriously unreliable. Witnesses often have poor memory, but are usually unaware of this. Memory tends to be biased by intervening events, inadvertent coaching, and rehearsal (prior recall). Eyewitnesses often confabulate stories to make logical sense of events that they cannot recall well. These errors are thought to stem from several factors: poor initial storage of information in memory; changes to stored memories over time; and faulty recall. Any brain-reading device that aims to decode stored memories will inevitably be limited not only by the technology itself, but also by the quality the stored information. After all, an accurate read-out of a faulty memory only provides misleading information. Therefore, any future application of this technology in the legal system will have to be approached with extreme caution. Will we be able to use this technology to insert images (or movies) directly into the brain? Not in the foreseeable future. There is no known technology that could remotely send signals to the brain in a way that would be organized enough to elicit a meaningful visual image or thought. Does this work fit into a larger program of research? One of the central goals of our research program is to build computational models of the visual system that accurately predicts brain activity measured during natural vision. Predictive models are the gold standard of computational neuroscience and are critical for the long-term advancement of brain science and medicine. To build a computational model of some part of the visual system, we treat it as a “black box” that takes visual stimuli as input and generates brain activity as output. A model of the black box can be estimated using statistical tools drawn from classical and Bayesian statistics, and from machine learning. Note that this reverse-engineering approach is agnostic about the specific way that brain activity is measured. One good way to evaluate these encoding models is construct a corresponding decoding model, and then assess its performance in a specific task such as movie reconstruction. Why is it important to construct computational models of the brain? The brain is an extremely complex organ and many convergent approaches are required to obtain a full understanding of its structure and function. One way to think about the problem is to consider three different general goals of research in systems/computational neuroscience. (1) The first goal is to understand how the brain is divided into functionally distinct modules (e.g., for vision, memory, etc.). (2) The second goal, contingent on the first, is to determine the function of each module. One classical approach for investigating the function of a brain circuit is to characterize neural responses at a quantitative computational level that is abstracted away from many of the specific anatomical and biophysical details of the system. This helps make tractable a problem that would otherwise seem overwhelmingly complex. (3) The third goal, contingent on the first two, is to understand how these specific computations are implemented in neural circuitry. A byproduct of this model-based approach is that it has many specific applications, as described above. Can you briefly explain the function of the parts of the brain examined here? Are there any ethical concerns with this type of research? The current technology for decoding brain activity is relatively primitive. The computational models are immature, and in order to construct a model of someone’s visual system they must spend many hours in a large, stationary magnetic resonance scanner. For this reason it is unlikely that this technology could be used in practical applications any time soon. That said, both the technology for measuring brain activity and the computational models are improving continuously. It is possible that decoding brain activity could have serious ethical and privacy implications downstream in, say, the 30-year time frame. As an analogy, consider the current debates regarding availability of genetic information. Genetic sequencing is becoming cheaper by the year, and it will soon be possible for everyone to have their own genome sequenced. This raises many issues regarding privacy and the accessibility of individual genetic information. The authors believe strongly that no one should be subjected to any form of brain-reading process involuntarily, covertly, or without complete informed consent.
     After the two world wars, the art of protesting became more and more common. Both the Korean and Vietnam conflicts induced many works of art protesting the government involvement in foreign combative affairs. Artists also found composition inspiration in the increasing materialism of the American public and their infatuation with mass entertainment, as seen primarily in the Pop Art movement. Before the twentieth century, art centered around European art and artists, however in the 1900's the United States became the center for artistic movements. Huge museums and galleries, sponsored by some of America's wealthiest families erupted in major American cities. Because of their great ability to draw publicity, these museums became the focus points to protestation art.      One of the cultural meccas of twentieth century art, the Museum of Modern Art(MoMA)  in New York City, found itself in the center of protestation art during the 1960's when a group of artists accused the major sponsors of the museum, the Rockefeller, of funding the exhibitions with blood money taken from the manufacturing of napalm.  The group of artists christened themselves the Guerilla Art Action Group and produced leaflets and staged "die in" performances to muster support for their claims. Another blow to the MoMA came in 1974 when artist and writer Eva Cockcroft published an article in Art Forum entitled "Abstract Expressionism, Weapon of the Cold War."  The article revealed connections between senior MoMA personnel and the CIA, who had covertly funded some of the museum's American abstract art exhibitions. Promoted by the MoMA as the art of freedom and purity, American art countered against the Soviet communism practices and reinforced the values of democracy.      Government sponsored art exhibitions obviously try to display a certain message and elicit a specific response from the audience. The American abstract art movement was highly publicized in American magazines and journals. Life magazine dedicated an entire issue to the new American art movement, featuring Jackson Pollock--the ultimate American cowboy artist, on the cover. For the first time in artistic history, the United States had founded an art movement, and the media converted these artists into the epitome of American values: freedom of expression, movement and ideas.      American propagandist art in the 1980's and 90's focuses on social and domestic issues rather than war and foreign political conflict. Stories of the availability of heavy drugs, gang fights and debilitating diseases fill the evening news broadcasts piped into every home, while parents must decide how to discuss drug dealers, teenage pregnancies and racial tensions with their children. Diseases such as Cancer and AIDS effect entire populations, and transform opinions on health and relationships. Contemporary art documents these modern atrocities and presents society with reflections on life.      Current propaganda campaigns using art include the war on drugs, the fight against Cancer and educating young women about sexual assault. Posters advertising the effects of drug abuse, teenage pregnancy and sexually transmitted diseases permeate buses, subways and city sidewalks. Several art agencies sponsor exhibitions of art concerning Cancer and AIDS and often composed by actual patients and survivors. Beginning in 1988, the ArtAIDS project, Visual AIDS organization and the MoMA sponsored the  Day Without Art --a worldwide observance of the impact of AIDS on the arts community. White cloths and AIDS awareness posters cover and replace familiar works of art to demonstrate a world without the arts. Originally started as a memorial for artists who died from AIDS related diseases, a Day Without Art now also celebrates achievements of artists who are living with the disease and continue to produce works.      One of the most well known and widely exhibited propaganda art is the AIDS Quilt, coordinated by the San Francisco based NAMES Project. The quilt consists of "panels created by the friends, lovers, or family of someone who has died from and AIDS related illness, and decorated with names, messages, pictures, mementos, clothing or a gift."  Serving both as a memorial to those who died from AIDS and an educator to people who fail to realize the severity of the disease, the quilt travels the country. A cross-section of people of varying age, race, gender, and sexual orientation compose the panels of the quilt, eloquently illustrating to the audience that AIDS shows no favorites.      New technology allows a greater number and greater variety of individuals to experience art in every form, aiding in the spread of artistic messages. The Internet provides artists with a wonderful venue to express thought-provoking messages both visually and verbally. Websites filled with graphics, fonts and animation, not only provide information but can be viewed as works of art themselves. Two award winning Websites connecting art and terminal diseases, Illuminating AIDS Through Art and Confronting Cancer Through Art, display works of art by individuals dealing with the diseases. Sponsored by the University of Pennsylvania's Cancer Center and the Arther Rose Gallery, Confronting Cancer includes nearly two hundred works and statements by 112 artists.  The Illuminating AIDS Website launched "The Subject is AIDS" project co-sponsored by the Family Planning Council of Western Massachusetts and the AIDS Partnership of Western Massachusetts. Incorporating thirty-three Western Massachusetts artists, the project includes a traveling exhibit and a lecture series discussing AIDS issues.      Health communication wonderfully utilizes propaganda art to educate the public about maintaining their health and preventing the spread of disease. Health propaganda posters displayed in schools, offices and outside billboards help reach a large audience, while the devestatingly realistic photographs and images reinforce the seriousness of disease. Who could ever forget the image of a healthy lung compared to a smoker's lung, side by side?
Stark Contrast – A look At How We Haven’t Changed By David P Shirk Many people like to quote the founders and other influential people of our nation’s beginnings, yet many seem to miss the point. For example, Thomas Paine wrote several pieces, but started with a work we are all familiar with called Common Sense. Though he had no formal education, and was not a gentleman of the time, he managed to accomplish something that none of the founders were able to do – ignite the common colonists into action. At the beginning, Jefferson and Madison were thankful for this ability, and despite their misgivings about its potential, welcomed it. Indeed, Jefferson found it amazing how Paine was able to get the common man to stand up and learn something that no other man of the time was able to teach. He felt that because of the new ‘awakening’ of the people by Paine’s fiery words, that they would continue on the path of learning, and apply it to a productive end. Yet once ignited, the people began to forget the deep words if the philosophies of those like Jefferson and Madison, and seemed unable to rise any further then Paine’s teaching of individual rights. What had started as a welcome ‘awakening’ soon turned into a political and social free-for-all that completely left behind the reason for being independent to begin with. Jefferson reasoned that the people should be self-interested in their personal lives, and disinterested in their politics (i.e.- not seeking personal benefit through government action). Those like Paine reasoned that because government in all forms is nothing more than control, that everyone should have a say in it. In spite of this however, Jefferson stood firm in his belief that the newly freed people would naturally strive to become less interested government as it would be small, and hardly worth the time. These two separate ideas had a fatal collision when actions taken by Hamilton (and worse yet by Aaron Burr) proved to Jefferson and the people alike, that government was not only getting bigger, but more like the very same one they had fought against during the war. And even though Paine then went overseas to aid in the French rebellion and its establishment of a republic, his words had ignited people to continue taking action – maintaining that it was imperative to their new freedoms. Yet Paine had not taken into account (or really did not care) what would happen when a people who were largely uneducated and unmannered started getting ‘involved’ in politics. So when ‘learned or privileged’ figures began to use the new system to gain personal powers and favors at the expense of others, the people followed the ‘get mad’ doctrine we are so familiar with today. Yet because of their lack of learning and the circles they walked in, they could not differentiate the good politicians or their policies from the bad. So instead of adopting the more ‘enlightened’ course (learning what caused the problem, who exactly was responsible etc), they sought to get the new ‘oppressors’ out of office by electing local hero’s, or anyone the rapidly expanding press deemed as worthy material. To them, the ‘learned gentleman’ was the new enemy, and part of those seeking to gain power over the ‘common man’. As such, you had people getting into office who had no idea how to legislate. If this was not bad enough, many people began to learn that taking advantage of the situation was easy – all they had to do was pretend that they were a friend of the people. This was commonly done by people claiming to be the ‘common man’ or a friend thereof. Of these people, many were endorsed by local newspapers that had no mercy when it came to slander. It wasn’t long before this slander degraded to all out lies. No one, not even Jefferson or Washington, the very people who gave them their freedom, were immune to the abuse. The papers and other periodicals at the time grew, and with them, the opinion that anyone even remotely considered to be a federalist, old school republican or democrat was guilty of trying to re-establish an imperialistic state. Bike, Hike & Climb - It's Time On the creation of the Sedition Act in the 1790’s, many accused the federalists etc of encroaching on their freedom of speech. Meanwhile the old school federalist like Jefferson and Madison wondered how the freedom to lie could be covered by law. They had understood that such nonsense came with the territory, but could not have possibly imagined when they first started creating a new government, that such entities would do such things. They had not meant the freedom of speech to be used for outright lies. Today, Ron Paul speaks of neo-cons – self proclaimed conservatives whose actions actually oppose the actions of a real conservative. These are looked upon by so many people to be a new thing – especially when they are hailed by the media as being great political leaders. The truth is that all the way back to the 1790’s, the same thing had already done its damage to the Republican Party. So it comes as no surprise that even back then, the ‘freedom of speech’ protected people in the media who were making money hand over fist just stir up trouble. In such a fragile stage of our nation’s development, the combination proved fatal to the dreams of founders like Jefferson. So as I write this, I wonder how it can possibly be, that with public libraries and an internet that delivers entire books worth of information in minutes, we are following the same trend. How can a people that claim to belong to the ‘greatest nation on earth’ be so blind and so willfully uncaring, that they gladly shrug off every remnant of the REAL American dream, and shoulder a nightmare in its place. I wonder how it comes to pass that we have so many ‘freedom’ movements that hardly a single one of them get the damn point. From ridiculously misled tea parties all the way up to the mouth of the idiots in congress, not a single ounce of the real American dream is present. Just as it did over 220 years ago, the freedom of speech is abused to allow the most inane lies and misconceptions to be uttered to the masses by both the government AND the people. 220 years after we had started to grow, and we still fall prey to the idea that the common man knows what is best for the whole country (and of course themselves). Well, I am sorry, if they knew what was best for them then they wouldn’t always whine for a government safety net. If they knew what was best for themselves, then they would not allow entire buildings full of legislative bull to tell them what’s good for them and what isn’t. The one and only reason I hold this against such people is that they are so trusting of all the nonsense, that they close their ears and tune you out when you try to tell them that it’s okay to think for themselves, and that the idea of a collective interest can never truly benefit the individual. The smaller the government, the more beneficial to all parties involved. The federal government we know today had nothing in common at all with the one the federalists of the 1780’s tried to conceive. In their minds, the federal government had one purpose and one purpose only – to mediate between two differing judgments from the states or political groups. It was separate from the states not in an effort to be the high and mighty governing body, but so that it held no bias in its decisions. The reason it was headed by the better off of society was not so that they could look down upon the people, but to use their hard earned knowledge and experience to keep the ‘self-interest’ out of government, and ensure freedom, and fairness. They were supposed to be people who had made it in life to put them above accepting bribes and special favors, and their pay was so low that initially, nobody wanted to be a senator (who at the time were paid so little that affording even a book was hard)or representative. Yet once again – their good intentions were dashed on the rocks of public opinion. Initially, it was quite understandable given the policies of Hamilton and the crooks like Burr. Yet in such messes, a rift was created. As the misinformed public started to vote in more and more self-serving officials, the more and more self-serving the states became. The public’s opinion had allowed people into office that took full advantage in every way, and created another arc in the destructive circle. So I ask again – what is our excuse today? We no longer have to rely on mass media. We have cheap books and the internet to have discussion and debate – why do we care about what some idiot anchor on TV says? We are all blessed with brains, and I think it’s time we started using them to reason like people instead go mooing from herd to freakin herd. If we do not start learning from the mistakes of the past, and letting fear and frustration get the best of us, we will accomplish nothing. As of now, not even a velvet revolution would help – all these morons out there who know what’s best would have a mooing contest – and the office would go to the highest moo’er, and if you think I am joking or trying to be funny, then you are dead wrong. Second, as the old order passes and people start learning that voting can indeed work, we will have a repeat of the late 1790’s- early 1800’s. Think about it. If our nation went so wrong back then with no nuclear power, no real ‘global enemies’, and no real foreign economic and supply dependence, what do you think would happen with an arsenal of nukes capable of destroying earth 100 times over, Rush or Cheney or some other monkey in office trying to solve global foreign issues, and take your pick of the New Secretary of Treasury dealing with a multi-trillion dollar debt. If that’s what you people want, then I’m out – that’s too crazy, even for a nut like me. I think we would be far better off realizing the dream of the original radicalism of the US as it was built for, not this mockery of it we have today. No comments yet. Leave a Reply
disc-hovercraftA hovercraft is also called Air-Cushion-Vehicle (ACV). It uses a blower to create air currents beneath itself. Resulting in the formation of air cushion that slightly lifts the craft upward. This upward lift reduces the friction of hovercraft with the surface on which it moves. Also, the lift allows it to move freely in any direction when pushed. We will build a model of hovercraft out of home materials, and this it will use the same principle. Things You Will Need • 1 Balloon • CD or DVD Disc • Cap of a plastic bottle • Penknife • A Glue gun How to Make 1. Make a small hole in the center of the plastic bottle’s cap with a penknife (Be careful). 2. Cover the center hole of the disc with bottle’s cap by putting it on top of the disc. Then, apply some glue to make air-tight contact. But, don’t apply glue on the hole of the cap. 3. Blow up the balloon and pinch its mouth. 4. Fit mouth of the balloon over the cap and release it. Your hovercraft is ready and working. Put it on a smooth surface, and push it in any direction you want. It will go there smoothly. How it works Air from the balloon passes through a hole in the cap. Then, it flows beneath the disc creating an air cushion that slightly lifts the disc up. As a result, the friction between surface and disc reduces. This reduced friction allows the hovercraft to move freely in any direction where it is pushed. Try It • Use large size balloon, instead of small size balloon. • Make two more holes in the disc and cover each hole with a cap. Then, blow three balloons and fit them to the caps (This is easy with three people each handling one balloon). • Try to land your hovercraft on water and sand. • Check out! How much weight your hovercraft can lift. Try with paper clips, pencils, and rubbers. • Think! What can you do to increase the payload capacity of your hovercraft? boil-water-in-paper-bagIn the ancient time, before the invention of metal and clay pots. Humans have been boiling water in large cup-shaped leaves. So, this is an old method of boiling water. But, just for fun and learning how it works, we will boil water in a bag made out of paper. You will Need • Paper (for making the bag) • Scotch tape • A gas stove What to Do 1. Make a simple cup-shaped paper bag with the help of scotch tape. But remember to keep the bottom area of the bag larger than the area of the fire of your gas stove. 2. Put your bag on the gas stove, and fill the bag with some water to boil. 3. Start fire gently, and keep its flame-level lower than the corner and sides of your paper bag. Otherwise, sides of your bag may burnout. 4. Wait until water starts to boil. If you have a household thermometer use it to check water temperature to find out how fast the temperature is rising. What is Happening? You may wonder how a thin sheet of paper has survived the hot flame. It is because the paper has the ability to absorb water. When you have poured water into your paper bag, it absorbed some water. This absorbed water prevented the bag from burning in the flame. But, the flame was keeping the paper dry to hold the water. In this way, the water that became hot went to the surface and cold water took its place. This process continued and water started to boil, as the temperature reached the 100 Celsius. volcano-experimentIt is an ideal home experiment and science fair project. In this experiment, you will learn how lava is ejected from a volcano, and about the chemical reaction of vinegar and baking soda. We will use the materials from the kitchen to build a model of a volcano. It will look like a lava erupting mountain. Things You Will Need • Baking soda • vinegar • empty plastic bottle • clay or wheat flour • cardboard sheet How to Make 1. Place the cardboard sheet on a clean surface, and put the empty plastic bottle on the center of the sheet. 2. Use wet clay or wet wheat flour to cover the plastic bottle. Try to shape the clay like a rough mountain, and place stones around it. Be careful, clay/wheat flour should not be dropped inside the bottle, and also don’t cover the opening of the bottle. 3. Dry your structure in sunlight until it is hard to break. 4. Add 2 to 3 spoonful of baking soda and 4 drops of red food coloring in the bottle that you have covered with clay. Your Volcano is ready for eruption! Take your model where you want to perform it, then add some vinegar in the bottle to start the volcano. You will see, a red fountain of foamy liquid will come out of the volcano model. How it works When baking soda (sodium bicarbonate) and vinegar (acetic acid) are mixed, they react with each other. As a result, gas bubbles made of carbon dioxide are produced. These bubbles build the pressure inside the bottle. This pressure force the foamy liquid out from the bottle. Try it 1. Use different quantities of baking soda and vinegar with different colors. 2. Use three bottles in the place of one with three different colors (Red, Green, and Blue). 3. Use glowing ink or powder with food coloring.
Abstracts2014‎ > ‎ Jie Sun: Large area graphene grown by chemical vapor deposition and its application in electronics posted 7 Aug 2014, 06:41 by Lisbeth Kirk Mynster Jie Sun, Niclas Lindvall, August Yurgens, Mikroteknologi och Nanovetenskap, Chalmers Tekniska Högskola AB, Göteborg 41296, Sweden Graphene is traditionally prepared by exfoliation of graphite, and to fabricate large area single layer graphene is challenging. Chemical vapor deposition (CVD) of graphene on metals is recently developed for this purpose. Since 2009, we in Chalmers have grown single layer graphene on metal foils (Cu, Pt, Ta, etc.), or evaporated metallic thin films on silicon.1-9 The graphene is grown in a cold-wall Aixtron system with CH4/C2H2. The graphene can be transferred onto other substrates such as SiO2/Si by wet chemically etching away the copper catalyst or, more environmentally friendly, by electrochemical bubbling delamination.10 The carrier mobility for electrons and holes is about 3000 cm2/(Vs), measured through both the field effect and the Hall effect. Some devices show mobilities ~5000 cm2/(Vs). We also grow graphene directly on insulators without metal catalysts in CVD.1-9 The graphene is nanocrystalline, large area and uniform. Despite the lower mobility (40 cm2/(Vs)) compared to catalyzed graphene, its transparency (97%) and conductivity (1-a few kΩ/□ without intentional doping) is similar to standard graphene, making such transfer-free graphene very promising in applications of transparent electronics and molecular electronics. The graphene can be grown on arbitrary dielectrics that withstand high temperature. We have proposed a novel noncatalytic CVD (as opposed to catalytic graphene CVD on metals) mechanism to explain our experimental findings.3 Both the catalyzed and noncatalyzed graphene can be suspended, promising for nanoelectromechanical systems (NEMS).7,8 The graphene finds its applications in GaN optoelectronics. GaN compounds are widely used in light emitting diodes (LEDs) covering the spectrum from yellow to ultraviolet. We first study ordered and dense GaN light emitting nanorods with graphene grown by CVD as suspended transparent electrodes.11 As the substitute of indium tin oxide (ITO), the graphene avoids complex processing to fill up the gaps between nanorods and subsequent surface flattening and offers high conductivity to improve the carrier injection. The as fabricated devices have 32% improvement in light output power compared to conventional planar GaN-graphene diodes, mainly due to the much more enlarged light emitting areas.11 1. IEEE Transactions on Nanotechnology, 11 (2012) 255. 2. Applied Physics Letters, 98 (2011) 252107. 3. Applied Physics Letters, 100 (2012) 022102. 4. Journal of Applied Physics, 111 (2012) 044103. 5. Carbon, 50 (2012) 1987. 6. Advanced Materials, 24 (2012) 1576. 7. Proceedings of IEEE NEMS 2012, p. 11. 8. Proceedings of IEEE NEMS 2012, p. 19. 9. Nano Letters, 12 (2012) 5074. 10. Applied Physics Letters, 102 (2013) 022101. 11. Applied Physics Letters, 103, (2013) 222105.
Accessibility View Close toolbar Factors That Influcence the GI Value of Food The Glycemic Index - Part 2 By Dr. Keith E. Lewis June 26, 2008 The following foods are commonly ingested by many people. Our patients oftentimes have questions about these different foods and how to make better choices about food selections. Many of our patients like breakfast cereals and surprisingly enough not all breakfast cereals have a high glycemic index value; some, however, very high. For example, Kellogg's Corn Flakes has a GI value of 92, whereas Kellogg's All-Bran has a GI value of 30, which is considered low. Different grains and pastas also vary in terms of high glycemic values to low glycemic values. In the past, when we thought about good carbs, bad carbs, and carbs in between carbs, we have always thought about pastas as being just definite no-no's. However, if pasta preparation is performed al dente, which is still a little bit stiff, the glycemic load or glycemic index is considerably lower. For example, spaghetti cooked al dente has a glycemic index of 38, which is considered to be low. Several of the rices, for example, Uncle Ben's Instant Rice has a glycemic load of 87, which is very high. However, Uncle Ben's Converted white rice has a glycemic index of 39, which is considered low, so again making better choices is what it truly is all about. There are other foods which vary and are sometimes somewhat surprising. Tortilla chips, for example, is a good snack food, or a snack food at least people like to partake in may not be a good snack food. It has a glycemic index of 63, whereas peanuts have a glycemic index of 14, so again peanuts are better choice than Tortilla chips. Dried fruits, typically have a glycemic index in the higher ranges. For example, raisins glycemic index is 64, cherries glycemic index 22, oranges glycemic index 48. Vegetables also vary in terms of their glycemic index. Carrots have a glycemic index of 47. Potatoes, a baked average-sized potato has a glycemic index of 85. However, a new potato has a glycemic index of 57.  Again, it is about choices. Over the recent years, we have also discovered that combining salads with meals, especially high-glycemic index meals, actually helps one control blood glucose levels. The use of vinegar, lemon juice, or even lime juice in the form of salad dressing combined with a mixed meal has significant blood glucose lowering effects. This is primarily due and related to acidity, which we have spoken about in part 1 of this dissertation. Because of organic acids such as lactic acid, propionic acid, they all have blood glucose lowering effect, but reduction varies with the type of acid. It should also be noted that making better choices in breads will help control blood sugar levels. Sour dough bread, for example, contains natural acids due to natural fermentation processes. They would include lactic acid and propionic acid. They also can reduce blood glucose levels making better choices of better food groups without being deprived is really the key. If you have further questions concerning any of these factors that influence the glycemic index and how it affects blood sugar level, you should contact your healthcare provider.
Lumbar vertebrae of the human spine Lumbar vertebrae of the human spine P116/0699 Rights Managed Request low-res file 530 pixels on longest edge, unwatermarked Request/Download high-res file Uncompressed file size: 53.6MB Downloadable file size: 899.7KB Price image Pricing Please login to use the price calculator Caption: Lumbar vertebrae, side (lateral) view. This computer artwork shows two lumbar vertebrae (pink) in the lower part of the spine. The back of the spine is on the left, where the bony projections or processes can be seen; these are where muscles and ligaments of the back attach to the spine. Intervertebral discs (brown) form joints between the vertebrae, allowing for slight movement and cushioning against impact. These consist of an outer layer of fibrous and cartilaginous tissue and a jelly-like centre. Keywords: anatomical, anatomy, artwork, biological, biology, bone, bones, cartilage, cartilaginous, computer artwork, disc, human body, illustration, intervertebral discs, lateral, lower back, lumbar, lumbar spine, process, processes, side, skeletal, skeleton, spinal, vertebra, vertebrae, vertebral column
View Single Post Old 07-14-17, 10:44 AM   #4 (permalink) Join Date: Dec-2015 Posts: 2,219 Re: Largest Snake in the world or is there any bigger? Reticulated pythons are generally accepted to be the longest snake in the world but the anaconda is not just shorter but considerably heavier (around double the mass of more). There are a few other species considered to be giants. Rock pythons, Burmese pythons, scrub pythons are also considered giants. Olive Pythons are not far behind. There are some more uncommon species that also get very large - Boelens pythons, papuan pythons. Do you see a theme developing?! Most of the really big snakes are pythons dannybgoode is offline
7 Health Benefits of Celery health benefits of celery health benefits of celery Celery is one of the most nutritious and rehydrating food for the body. It helps to maintain the essential pH balance of the body and removes all the toxic substances. Celery is also used in various medicines due to its high nutritional importance. Celery contains adequate amounts of nutrients, minerals and essential enzymes. Celery leaves are extremely rich in Vitamin A and the stem contains Vitamin B-Complex, C, potassium, calcium, iron, magnesium and essential amino acids. Celery also contains some beneficial plant hormones and essential oils. These oils are extremely helpful in maintaining the nervous system. Some of the major health benefits of celery includes:– 1) Fights Against Cancer: Celery is a cancer fighting food, because of its detox juices. The juice can help to remove all the unwanted toxins from the body. It also contains some essential compounds known as acetylenics, which can retard the growth of cancer cells. Celery also contains phenolic acids, which can block the growth of harmful tumor and prevents the disease of cancer. Another phytonutrient known as Coumarins can help the cell from severe damage and thereby prevent colon or stomach cancer. 2) Lowers Blood Cholesterol: Celery helps to reduce the bad cholesterol in the blood and maintain the cholesterol level in the body. It also enhances the lice juice secretion in the body, which helps to remove the bad cholesterol (LDL) from the body. 3) Aids in Digestion: Celery contain some essential dietary fibres, which can induce the process of digestion. Moreover, the bile juice secretion helps to clear the passage of bowel movement. It also acts as a natural laxative, which reduces the problems of irregular bower syndrome or constipation. 4) Anti-Inflammatory Effect: Due to the presence of polyacetylene in celery, it has a great anti-inflammatory effect. It helps to reduce inflammation produced out of various health diseases like asthma, bronchitis, arthritis and gout. Celery juice is considered extremely effective to bring down the effects of inflammation. 5) Initiates Weight Loss: Celery juice is extremely helpful to shed the extra pounds. Celery helps to remove all the unwanted toxins from the body and thus help to bring down the excess body weight. Even doctors prescribe to drink fresh celery juice for the purpose of weight loss. 6) Maintaining Balance of Body: Celery is one of the ideal vegetables to maintain the perfect balance of the body. It helps to maintain the pH balance and boost the energy level. Moreover, the heap of nutrients and minerals, present in the body can help to eradicate various harmful diseases. 7) Hydration of the Body: Due to the presence of watery content, celery can help to keep your body cool and hydrated. It thereby helps to maintain the body temperature and maintains the hydration level. Celery can be consumed in scorching summer, to keep your body cool and energized. Proper hydration can keep your skin fresh and maintain its glow. (Visited 158 times, 1 visits today) Be the first to comment Leave a Reply
Lesson Plans College Composition 3rd Q 11.12 Lesson Plans Week: 01/02/2012 Instructor: Duane Hannan Academics Winter break--no school Winter break--no school An overview of the course--the syllabus, the genre the students will write, evaluation criteria, journals, journal evaluation criteria, homework; email me Attitudes towards writing--read p.p. 8-12 (including exercises). During the reading you encounter 17 quotations from various authors. Review them and select one that has particular meaning to you, a perspective you admire or disdain, a notion you relate to. Write at least a page in response Attitudes towards writing--review reading from Tuesday; which quotation selected Writing an experience--place, character, event/conflict, voice, theme: the stuff of experience/narrative (the narrative elements); example--read "Calling Home" (p.p. 19-22); after reading focus on paragraphs 3-6, list the verbs, list three alternatives for any three (nine new ones total), why do you think Brandt chose this event to write about? what is compelling? respond with at least half a page Writing an experience--voice and character: the choices an author makes--connotation/denotation; word choices from "Calling Home", do ex. 118 "Word Choice," ex. 255 "Appropriate Words," ex. 254 "Exact Words" (St Martin's website (http://bcs.bedfordstmartins.com/theguide/default.asp?s=&n=&i=&v=&o=&ns=0&uid=0&rau=0); email responses, due Sunday 9:00pm Review the response to "Calling Home" from Wednesday; the text divides the story into colors: story, description, significance: what narrative elements do they correspond to? Writing an experience--read from "An American Childhood", list three spots where Dillard reveals voice with the choices she makes, list three spots where Dillard reveals character with the choices she makes
Dec 05 2016 Giving a pet as a holiday gift? Think twice. picture of a dog and cat The holiday season is a time for giving and sharing. Giving a cute, fluffy pet may seem like the perfect gift, but a few things need to be considered before giving an animal as a present for Christmas. Pets are amazing companions and many people benefit from having them around. They are also a huge responsibility and a lot of thought and consideration needs to be put into the decision to purchase or adopt an animal. Animals are often given as a gift when a loved one, whether it be a human or another animal, has recently passed away as a way to cope with the healing process, to provide companionship or to prevent loneliness. Pets can take a big commitment financially, and you are not always aware of someone’s financial situation. Puppies and kittens need multiple rounds of booster vaccines and de-worming treatments when they are young, and vaccinations done annually. Health problems can arise at any age, accidents can happen anytime that may require hospitalization or even surgery. Pets are commonly given to children to teach them responsibility. Small animals have a shorter life span as compared to a dog or cat or even a bird. Hamsters can live 2-3 years, rabbits life span is 8-10 years and are both popular starter pets for children. Parents must be on board with the decision to give their child a pet, as most times the parent becomes the primary caretaker once the novelty wears off. A dog or cats life span can range anywhere between 12-20 years, depending on the breed and species; certain birds can live 80 years or more. A lot of time is put into house-training, and socializing a young pet, is the receiver prepared to take on the commitment that is involved with training a young pet, or would an older pet be more suited to their lifestyle. Many older pets are available in animal shelters or rescue organizations that need loving homes, and they may come already trained and socialized. There are a lot of different factors that come into making the decision in owning a pet that is not only based on how cute and fluffy it is. If you want to give a pet as gift, make the recipient part of the whole process and let them decide if they are ready to take on the responsibility and what type of pet they can handle. Many animals of all species end up in shelters because the novelty of owning a new pet wears off, or the new owners were not prepared to take on the commitment. If the recipient of the new pet is welcome to share their home with a pet, then it can be the greatest gift of all. Animals provide companionship and can be beneficial to your health and well-being. Happy Holidays! avropet | Uncategorized Leave a Reply
Development that Works • About • Is religion good for health and education? It’s Easter, or as the Uruguayans call it, “tourism week”. So let us talk about religion and development. The immense majority of the world’s population is religious and believes that religion is important. According to the World Values Survey, 70% of the world’s population considers them-selves a “religious person”. In almost all of the developing countries that participate in that survey, the overwhelming majority of the population believes that religion is an important part of their daily lives. On the other hand, religious beliefs have been associated with higher economic growth rates (with hell more significant than heaven – here), although this fantastic  graph, based on a recent Gallup poll, suggests that religiosity is highest in the world’s poorest nations. So if religion is so influential and so relevant to billions, it is very intriguing that there little rigorous micro evidence of the impact of religion and religous belief on social outcomes such as health or education. There are numerous quantitative studies (see for instance here for the US or here for Chile) based on national social surveys which show that religion is positively associated with many outcomes of interest (education, income, welfare, health, domestic violence). Nevertheless, none of these studies is based on data that allows to determine causality. A search of the word “religion” in the electronic versions of three of the most influential books of the last year (Poor EconomicsWhy Nations Fail, and More Than Good Intentions), yields no relevant results or hits. The RCT economics academic literature that looks into the impact of religious beliefs on health or education outcomes seems to be practically non-existent (please prove me wrong). Nevertheless, the medical literature does shed some light. A 2005 comprehensive literature search identified five randomized control trials that describe the impact of religious intervention on health outcomes. The impact was positive. Religious intervention such as intercessory prayer had positive impact on many health intermediate and final outcomes such as length of stay in the hospital, fever, and immune function. Nevertheless, another 2006 study found that intercessory prayer itself had no effect on recovery from cardiac bypass surgery, but certainty of receiving intercessory prayer was associated was negative (higher incidence of complications). So everything indicates that it is better to remain agnostic on the impact that religion and religious beliefs might have on social conditions until further evidence arises. No need for a God complex there, yet. Comment on the post
English   español   logo share SHARE   Add this article to your Mendeley library MendeleyBASE Exportar a otros formatos: Presentation of educational videos used as modern tools to help pharmacy students to understand chemical questions of analytics and physical chemistry AutorLópez-Ruiz, B.; Rueda, C.; Sainz, C.; Sánchez-Paniagua, M.; Sevilla, Paz Palabras clavePharmacy degree Analytical chemistry Physical chemistry Fecha de publicación2017 EditorInternational Academy of Technology, Education and Development CitaciónINTED2017: 11th International Technology Education and Development Conference, 4715-4722 (2017) ResumenThe study of scientific subjects for Pharmacy students is not easy actually. Most of them try to avoid Physics and Chemistry in their itineraries in Secondary School by choosing more pleasant topics like Biology and Geology that need more memory and use few equations. This leads to a complex scenario for students and teachers in the first and second year of Faculty. In this context assimilation of these topics collides with absence of knowledge and lack of ability to carry out scientific reasoning, on one side, and with apathy and discouragement, on the other. Students register for these subjects on their first, second, etc.., semester, what forces us to make some improvements in learning methods. Big changes that have been occurred in our society in the last years, introduced by new technologies, have influenced not only our daily behavior but also the way we can gain access to knowledge. Young people are used to collect pictures and sound in files stored in cloud and accessible from everywhere. This fact could become an advantage for teaching process if benefits of these technologies are included in students learning process. Last year we present the development of a new project that included the elaboration of educational videos to be used in the teaching-learning process of physical chemistry and analytic for students of Pharmacy Degree in Spain. In this work we present the final results of the elaboration of the project. Our work includes the presentation of twenty three videos, every one acts individually and contains the reasoned response to diverse questions that has their answer in physical and analytical chemistry and students can find daily in their jobs or in their lives. We describe several specific examples: • How can we calculate the expiration date of a drug? • How does a car catalyst work? Each video has a length between five and ten minutes. Related scientific theory is included and explained. This new tool can be considered as a modern way to achieve scientific knowledge to students contributing positively to the teaching-learning process in modern class. Versión del editorhttp://doi.org/10.21125/inted.2017.1102 Identificadoresdoi: 10.21125/inted.2017.1102 isbn: 978-84-617-8491-2 issn: 2340-1079 Aparece en las colecciones: (CFMAC-IEM) Libros y partes de libros Ficheros en este ítem: Fichero Descripción Tamaño Formato   accesoRestringido.pdf15,38 kBAdobe PDFVista previa Mostrar el registro completo
User interface From Wikipedia, the free encyclopedia   (Redirected from Redundancy (user interfaces)) Jump to navigation Jump to search User interfaces are composed of one or more layers including a human-machine interface (HMI) interfaces machines with physical input hardware such a keyboards, mice, game pads and output hardware such as computer monitors, speakers, and printers. A device that implements a HMI is called a human interface device (HID). Other terms for human-machine interfaces are man–machine interface (MMI) and when the machine in question is a computer human–computer interface. Additional UI layers may interact with one or more human sense, including: tactile UI (touch), visual UI (sight), auditory UI (sound), olfactory UI (smell), equilibrial UI (balance), and gustatory UI (taste). Composite user interfaces (CUI) are UIs that interact with two or more senses. The most common CUI is a graphical user interface (GUI), which is composed of a tactile UI and a visual UI capable of displaying graphics. When sound is added to a GUI it becomes a multimedia user interface (MUI). There are three broad categories of CUI: standard, virtual and augmented. Standard composite user interfaces use standard human interface devices like keyboards, mice, and computer monitors. When the CUI blocks out the real world to create a virtual reality, the CUI is virtual and uses a virtual reality interface. When the CUI does not block out the real world and creates augmented reality, the CUI is augmented and uses an augmented reality interface. When a UI interacts with all human senses, it is called a qualia interface, named after the theory of qualia. CUI may also be classified by how many senses they interact with as either an X-sense virtual reality interface or X-sense augmented reality interface, where X is the number of senses interfaced with. For example, a Smell-O-Vision is a 3-sense (3S) Standard CUI with visual display, sound and smells; when virtual reality interfaces interface with smells and touch it is said to be a 4-sense (4S) virtual reality interface; and when augmented reality interfaces interface with smells and touch it is said to be a 4-sense (4S) augmented reality interface. In complex systems, the human–machine interface is typically computerized. The term human–computer interface refers to this kind of system. In the context of computing, the term typically extends as well to the software dedicated to control the physical elements used for human-computer interaction. • The user interface of a mechanical system, a vehicle or an industrial installation is sometimes referred to as the human–machine interface (HMI).[1] HMI is a modification of the original term MMI (man-machine interface).[2] In practice, the abbreviation MMI is still frequently used[3] although some[who?] may claim that MMI stands for something different now. Another abbreviation is HCI, but is more commonly used for human–computer interaction.[3] Other terms used are operator interface console (OIC) and operator interface terminal (OIT).[4] However it is abbreviated, the terms refer to the 'layer' that separates a human that is operating a machine from the machine itself.[3] Without a clean and usable interface, humans would not be able to interact with information systems. 1945–1968: Batch interface[edit] IBM 029 card punch IBM 029 The input side of the user interfaces for batch machines was mainly punched cards or equivalent media like paper tape. The output side added line printers to these media. With the limited exception of the system operator's console, human beings did not interact with batch machines in real time at all. The turnaround time for a single job often spanned entire days. If one were very lucky, it might be hours; there was no real-time response. But there were worse fates than the card queue; some computers required an even more tedious and error-prone process of toggling in programs in binary code using console switches. The very earliest machines had to be partly rewired to incorporate program logic into themselves, using devices known as plugboards. 1969–present: Command-line user interface[edit] Teletype Model 33 Teletype Model 33 ASR The VT100, introduced in 197″8, was the most popular VDT of all time. Most terminal emulators still default to VT100 mode. DEC VT100 terminal 1985: SAA User Interface or Text-Based User Interface[edit] 1968–present: Graphical User Interface[edit] AMX Desk made a basic WIMP GUI Linotype WYSIWYG 2000, 1989 • 1987 – Macintosh II: first full-color Mac Interface design[edit] Primary methods used in the interface design include prototyping and simulation. All great interfaces share eight qualities or characteristics: 3. Familiarity[13] Even if someone uses an interface for the first time, certain elements can still be familiar. Real-life metaphors can be used to communicate meaning. 5. Consistency[15] Keeping your interface consistent across your application is important because it allows users to recognize usage patterns. Principle of least astonishment[edit] The principle of least astonishment (POLA) is a general principle in the design of all kinds of interfaces. It is based on the idea that human beings can only pay full attention to one thing at one time,[16] leading to the conclusion that novelty should be minimized. Habit formation[edit] Touchscreen of the HP Series 100 HP-150 HP Series 100 HP-150 Touchscreen • Command line interfaces (CLIs) prompt the user to provide input by typing a command string with the computer keyboard and respond by outputting text to the computer monitor. Used by programmers and system administrators, in engineering and scientific environments, and by technically advanced personal computer users. • Reflexive user interfaces where the users control and redefine the entire system via the user interface alone, for instance to change its command verbs. Typically, this is only possible with very rich graphic user interfaces. • Text-based user interfaces (TUIs) are user interfaces which interact via text. TUIs include command-line interfaces and text-based WIMP environments. • Web-based user interfaces or web user interfaces (WUI) that accept input and provide output by generating web pages viewed by the user using a web browser program. Newer implementations utilize PHP, Java, JavaScript, AJAX, Apache Flex, .NET Framework, or similar technologies to provide real-time control in a separate program, eliminating the need to refresh a traditional HTML-based web browser. Administrative web interfaces for web-servers, servers and networked computers are often called control panels. • Zero-input interfaces get inputs from a set of sensors instead of querying the user with input dialogs.[22] See also[edit] 1. ^ Griffin, Ben; Baston, Laurel. "Interfaces" (Presentation): 5. Archived from the original on 14 July 2014. Retrieved 7 June 2014. The user interface of a mechanical system, a vehicle or an industrial installation is sometimes referred to as the human-machine interface (HMI). 2. ^ "User Interface Design and Ergonomics" (PDF). Course Cit 811. NATIONAL OPEN UNIVERSITY OF NIGERIA: SCHOOL OF SCIENCE AND TECHNOLOGY: 19. Archived (PDF) from the original on 14 July 2014. Retrieved 7 June 2014. In practice, the abbreviation MMI is still frequently used although some may claim that MMI stands for something different now. 3. ^ a b c Cite error: The named reference Nigeria was invoked but never defined (see the help page). 5. ^ Cipriani, Christian; Segil, Jacob; Birdwell, Jay; Weir, Richard (2014). "Dexterous control of a prosthetic hand using fine-wire intramuscular electrodes in targeted extrinsic muscles". IEEE Transactions on Neural Systems and Rehabilitation Engineering. 22 (4): 1–1. doi:10.1109/TNSRE.2014.2301234. ISSN 1534-4320. PMC 4501393. PMID 24760929. Archived from the original on 2014-07-14. Neural co-activations are present that in turn generate significant EMG levels and hence unintended movements in the case of the present human machine interface (HMI). 8. ^ Ravi (August 2009). "Introduction of HMI". Archived from the original on 14 July 2014. Retrieved 7 June 2014. In some circumstance computers might observe the user, and react according to their actions without specific commands. A means of tracking parts of the body is required, and sensors noting the position of the head, direction of gaze and so on have been used experimentally. This is particularly relevant to immersive interfaces. 9. ^ "HMI Guide". Archived from the original on 2014-06-20. 10. ^ Richard, Stéphane. "Text User Interface Development Series Part One - T.U.I. Basics". Archived from the original on 16 November 2014. Retrieved 13 June 2014. 11. ^ a b c McCown, Frank. "History of the Graphical User Interface (GUI)". Harding University. Archived from the original on 2014-11-08. 12. ^ Raymond, Eric Steven (2003). "11". The Art of Unix Programming. Thyrsus Enterprises. Archived from the original on 20 October 2014. Retrieved 13 June 2014. 14. ^ Sweet, David (October 2001). "9 - Constructing A Responsive User Interface". KDE 2.0 Development. Sams Publishing. Archived from the original on 23 September 2013. Retrieved 13 June 2014. 17. ^ Udell, John (9 May 2003). "Interfaces are habit-forming". Infoworld. Archived from the original on 4 April 2017. Retrieved 3 April 2017. 18. ^ Errett, Joshua. "As app fatigue sets in, Toronto engineers move on to chatbots". CBC. CBC/Radio-Canada. Archived from the original on June 22, 2016. Retrieved July 4, 2016. 19. ^ Gordana Lamb. "Improve Your UI Design Process with Object-Oriented Techniques" Archived 2013-08-14 at the Wayback Machine.. Visual Basic Developer magazine. 2001. quote: "Table 1. Differences between the traditional application-oriented and object-oriented approaches to UI design." 20. ^ Archived 2009-06-19 at the Wayback Machine. 21. ^ Jakob Nielsen (April 1993). "Noncommand User Interfaces". Communications of the ACM. ACM Press. 36 (4): 83–99. doi:10.1145/255950.153582. Archived from the original on 2006-11-10. 22. ^ Sharon, Taly, Henry Lieberman, and Ted Selker. "A zero-input interface for leveraging group experience in web browsing Archived 2017-09-08 at the Wayback Machine.." Proceedings of the 8th international conference on Intelligent user interfaces. ACM, 2003. External links[edit]
Online Help-Center What Do I Need To Bear In Mind When Measuring Blood Pressure? 1. Rest for several minutes before the measurement. 2. Switch the device to blood-pressure mode . 3. Take the measurement while sitting comfortably and rest the forearm on a table or another surface. 4. Avoid all movement and relax during measurement. 5. Breathe normally and do not talk during measurement. 6. If you want to take several measurements one after another, you should wait at least 1 minute between measurements. 7. Tip: Measure your blood pressure at roughly the same time each day and under comparable conditions; e.g., every morning after getting up. Was this article helpful? 1 out of 1 found this helpful Have more questions? Submit a request Powered by Zendesk
• Black's Law Dictionary: 2nd Edition A paroxysmal disease or disorder of the nervous system, more common in females than males, not originating in any anatomical lesion, due to psychic rather than physical causes, and attended, in the acute or convulsive form, by extraordinary manifestations of secondary effects of extreme nervousness. Hysteria is a state in which ideas control the body and produce morbid changes in its functions. Mœbius. A special psychic state, characterized by symptoms which can also be produced or reproduced by suggestion, and which can be treated by psychotherapy or persuasion, hysteric and hypnotic states being practically equivalent to each other. Babinski. A purely psychic or mental disorder due to hereditary predisposition. Charcot. A state resulting from a psychic lesion or nervous shock, leading to repression or aberration of the sexual instinct. Freud. Hysteria is much more common in women than in men, and was formerly thought to be due to some disorder of the uterus or sexual system; but it is now known that it may occur in men, in children, and in very aged persons of either sex. In the convulsive form of hysteria, commonly called "hysterics" or "a fit of hysterics," there is nervestorm characterized by loss or abandonment of self-controi in the expression of the emotions, particularly grief, by paroxysms of tears or laughter or bath together, sensations of constriction as of a ball rising In the throat (globus hystericus), convulsive movements in the chest, pelvis, and abdomen, sometimes leading to a fall with apparent unconsciousness, followed by a relapse into semiunconsciousness or catalepsy. In the non-con-vnisive forms, all kinds of organic paralyses may be simulated, as well as muscular contractions and spasms, tremor, loss of sensation (on-aesthesuj,) or exaggerated sensation (hyperœsthe-siaj, disturbances of respiration, disordered appetite, accelerated pulse, hemorrhages in the skin (stigmata), pain, swelling, or even dislocation of the joints, and great amenability to suggestion. —Hystero-epilepsy. See Epilepst.
'Citizen scientists' track radiation seven years after Fukushima March 11, 2018 by Sara Hussein Japanese priest Sadamaru Okano is one of the 'citizen scientists' collecting radiation readings in the Fukushima region The machine is sending to Safecast, an NGO born after the March 2011 Fukushima nuclear disaster that says it has now built the world's largest radiation dataset, thanks to the efforts of citizen scientists like Seirinji's priest Sadamaru Okano. "The government didn't tell us the truth, they didn't tell us the true measures," he told AFP, seated inside the 150-year-old temple. "The readings were so high... 50 times higher than ," he said of the post-disaster data. A geiger counter operated by the Safecast group is attached to a fence near the stricken Dai-ichi power plant "Like how Google does Street View, we could do something for radiation in the same way," he said. "The only problem was that the system to do that didn't exist and the only way to solve that problem was to go and build it ourselves. So that's what we did." Making informed choices Within a week, the group had a prototype and began getting readings that suggested the 20 kilometre (12 mile) exclusion zone declared around the Fukushima plant had no basis in the data, Franken said. "Evacuees were sent from areas with lower radiation to areas with higher radiation" in some cases, he said. He learned about Safecast's efforts and in 2013 installed one of their static counters on his temple, in part to help reassure worshippers. "I told them: we are measuring the radiation on a daily basis... so if you access the (Safecast) website you can choose (if you think) it's safe or not." Japanese teacher Norio Watanabe work with Safecast to teach his pupils how to measure radiation Forty kilometres away, in the town of Koriyama, Norio Watanabe was supervising patiently as his giggling teenage pupils attempted to build basic versions of Safecast's Geiger counter. In the days after the disaster evacuees flocked to Koriyama, which was outside the evacuation zone, and he assumed his town was safe. "But after I started to do the measurements, I realised there was a high level of risk here as well," he said. 'You can't ignore it' His thyroid was removed and he is now healthy, but Watanabe worries about his students, who he fears "will carry risk with them for the rest of their lives." "If there are no people like me who continue to monitor the levels, it will be forgotten." Schoolgirls check an app connected to a geiger counter to measure radiation in a classroom in Fukushima prefecture Because volunteers choose where they want to measure at random and often overlap, "they validate unknowingly each other's measurements," said Franken, and anomalies or exceptions are checked by Safecast staff. He says Safecast's data mostly corroborates official measurements, but provides readings that are more relevant to people's lives. "Our volunteers decide to measure where their schools are, where their workplaces are, where their houses are." And he believes Safecast has helped push Japan's government to realise that "transparency and being open are very important to create trust." "The power of citizen science means that you can't stop it and also that you can't ignore it." Explore further: American praised for getting Japan radiation data Related Stories American praised for getting Japan radiation data July 9, 2012 No health risk from Fukushima radiation, UN says May 31, 2013 Recommended for you Permanent, wireless self-charging system using NIR band October 8, 2018 Facebook launches AI video-calling device 'Portal' October 8, 2018 Artificial enzymes convert solar energy into hydrogen gas October 4, 2018 Adjust slider to filter visible comments by rank Display comments: newest first 3 / 5 (4) Mar 11, 2018 "The readings were so high... 50 times higher than natural radiation," he said of the post-disaster data. The average natural radiation exposure in Japan is 1.5 mSv/a and 50 times higher would mean 75 mSv/a. Notice that this is a dose rate per year. The radiation levels did not remain that high, and the total doses for the people in the affected areas are estimated to fall between 1 and 15 mSv. That's why it's difficult to believe the guy's "50-50" estimate. To put things into perspective, one Sievert (1000 mSv) of radiation absorbed over time is thought to increase your lifetime risk of cancer by 5.5% To get an extra 15 mSv of radiation, all you have to do is fly to Brazil and have a beach holiday on Guarapari beach. You get up to 250 mSv/a. If you decide to live in the city though, all you get is 5.2 mSv per year. 2.6 / 5 (5) Mar 11, 2018 The main problem here is that the government didn't bother to educate the public about the exact risks they're facing, so these "citizen scientists" didn't have adequate information to interpret their findings. Saying something is 50 times higher than normal sounds bad if you have no context or a yardstick to compare how bad is bad. Then there's also those who deliberately omit the context to incite panic and spread propaganda for their own cynical purposes. There are also those who believe that their own paranoia and panic over nuclear power permits them to lie to other people, despite the actual harm and loss of life it causes. 2 / 5 (4) Mar 11, 2018 "To put things into perspective, " To put it in perspective, my solar panels produce sufficient power for household and two cars, without deadly radiation threatening Humanity. Give it up, Eikka. You nuke apologists should start helping to clean up these disasters before promoting more. 5 / 5 (1) Mar 11, 2018 Tell you what, Ike-- rather than making a wild guess about these claims-- why don't you actually LOOK UP the relevant figures for the are --NOT the average for the entire nation-- and check with Safecast for the data in question from beginning to nend of the record, and then report back to mus with your findings. No one is interested in your f**king opinion. 2.6 / 5 (5) Mar 11, 2018 Paranoia? How about educated concern? We tried and tried and tried to tell you pro-nukers about he dangers and costs of this disastrous technology, but you thought you knew better. After PL-1, TMI II, Brown's Ferry, Rancho Seco, Fermi I, and the Hanford Babies, you have no ground to stand on but that contaminated by Fukushima and Chernobyl. 5 / 5 (2) Mar 12, 2018 I've wanted to have a Geiger counter-recorder installed in my car for many years, partly inspired by the accidental detection of radioactive rebar at Los Alamos, New Mexico, in 1984. I never had the money to buy the counter, though. I paid $50 to a hobby group a few years ago to build one with them, but then the leader couldn't figure out how to build the counting circuit, and he held onto the tube I bought, so I have nothing. My goal is to be able to map out the radiation levels across the country. When I first had this idea, I was driving between Texas, New Mexico and Oklahoma fairly regularly. It would be nice if I could map this data, like I do with photos. 5 / 5 (1) Mar 12, 2018 Reading over the anti-nuke comments, I can see why Japan's government lied. Some people can't handle the truth! Solar panel manufacturing generates 300 times more volume of toxic waste than nuclear power does, amounting to million of pounds of toxic waste per year. Then, when the panels reach end-of-life, they currently just get dumped in a landfill (not enough volume yet to recycle commercially), where they continue leeching toxic materials. Further, more people die per TWh of electricity generated in the solar and wind industries than in the nuke power industry. Take the moat out of your own eyes before you lecture us about nuclear! 2 / 5 (4) Mar 12, 2018 No one is interested in your f**king opinion. "La la la, I'm not listeniiing". The problem is twofold. 1) Anyone with an uncalibrated ebay or homebuilt geiger counter can claim to be measuring background radiation levels. We don't know if these citizen scientists are being accurate, precise, or reliable in their measurements. 2) People incite panic by blogging "huge numbers" because they themselves are panicking. Bad news travel faster, even if they're false or inaccurate. We can't tell where these numbers are really coming from, or whether some Greenpeace activists are deliberately injecting false data to the network for propaganda purposes. NOT the average for the entire nation I didn't quote nation averages. I quoted the figures at Fukushima Daichii And the safecast snapshot database for the disaster period shows rates of 10.09 µSv/h for the areas closest to the exclusion zone, which is about 88 mSv/a which isn't very far off from my 75 mSv/a 2 / 5 (4) Mar 12, 2018 So guess what - having good basic understanding of the phenomenon you're talking about allows you to make fairly accurate estimates about the state of reality - avoiding falling for hyperbole like "It's 50 times higher!" Relative metrics without a given baseline or comparison are meaningless, and typically only used for their propaganda value. They didn't tell you that the amount of natural background levels varies by couple orders of magnitude between locations where people actually live, and within an order of magnitude (10x) even if you're not seeking the particularily radioactive places. Giving this information would have put the narrative in a different light - that the governments were right in telling you not to panic because the panic puts you into more danger than the danger you're fleeing from. But since we've been fed with all sorts of "single hot particle in the lungs!" theories by cranks since 1986, it's no wonder that people panic. 2.3 / 5 (3) Mar 12, 2018 Yeah, eikka, in fact, it never happened. That's your next post. 5 / 5 (2) Mar 13, 2018 There is a difference between external radiation exposure and internal (breathed in or ingested with food) exposure. The damage from Hiroshima and Nagasaki was not accurately measured as no attempt to follow those exposed to fallout was done. No attempt to calculate where the fallout went was made. It is amazing to me (no its not) when 3 mile island happened, they did not use the prevailing winds and rainfall patterns to calculate where the radiation went but just drew concentric circles around the plant and went from there. This is done to dilute the actual radiation and make the effects less statistically significant. If I were Watanabe I would not doubt that my thyroid cancer was from Fukishima. the children of Belarus from the tiime of Chernobyl can be sure that their thyroid cancer came from Chernobyl. Even today 80% of the children of Belarus are diagnosed unhealthy. 2.3 / 5 (3) Mar 14, 2018 Fukushima will be an eternal source of scary stories in the hand of faux-greens in order to supposedly favor intermittent renewables but that in the end benefits the fossil fuels. "Wind and solar are proven technologies. They've proven they can't replace coal and natural gas as a primary energy source." 5 / 5 (3) Mar 17, 2018 Nice pitcher, weewee. To bad it comes without any relevant Science in support of the glaringly false claim. Now, piss off. Da Schneib 5 / 5 (2) Mar 17, 2018 Apparently @Eikka "forgot" the part where it said that the baseline had been established. It's clear from the article that 50x means fifty times the baseline for the same location. And it's a location where the Japanese government says there isn't any radiation. Fancy that. Looks like @Eikka is lying again. And busted again. Apparently @Eikka also "forgot" that Sv are measured in vivo. Geiger counters, however, do not measure Sv. They measure counts. You have to convert that with a large number of assumptions, including what kind of clothes the person was wearing, whether the radiation was only received externally or there was ingestion or inhalation, and many other factors. So using Sv in this case is hand waving, not at all unusual for @Eikka. 5 / 5 (1) Apr 27, 2018 If anyone is interested in the dangers of exposure to radionuclide's check out the Petkau Effect. As Dr. John Goffman has stated, there is no safe level of radioactivity! Click here to reset your password.
I do not waste time teaching English grammar rules! 4 ay önce I do not waste time teaching English grammar rules! If your ambition is to interpret American English, I agree, you need to understand the rules of grammar and I recommend you do not come to me to teach you. I believe it is confusing to the ESL learner’s mind to focus on remembering “what is the correct rule” while speaking or writing. Rather, I believe English has logical patterns and if you understand the logic of English, your journey towards mastering speaking and writing is near complete. As a writer, I check my work by reading it aloud listening for the rhythm and beats in my words, the words must flow almost poetically. Now, I have a Master’s Degree in American English Speech and a few Post Graduate Certificates in various forms of writing, and you know what? Not since elementary school has any one of my professors suggested I learn English grammar. There are writing style manuals we writers refer to, and professional speakers focus on content, but never do we think about grammar. So, here is a free lesson for you, exactly all I learned in elementary school about grammar: Basic English Grammar Rules • A singular subject needs a singular predicate. • A sentence needs to express a complete thought. Another term for a sentence is an independent clause: So, what are the other basic rules for sentence structure? Subjects and Predicates Basic Parts of Speech • Capitalization is important. All sentences must start with a capital, or upper-case, letter. Titles of people, books, magazines, movies, specific places, etc. are capitalized. Organizations and compass points are capitalized. • Every sentence needs a punctuation mark at the end of it. These include a period, exclamation mark, or question mark. • Colons are used to separate a sentence from a list of items, to introduce a long, direct quote, or between two sentences (or clauses) when the second one explains the first. • There are a lot of rules for commas. The basic ones are that commas separate things in a series and go wherever there is a pause in the sentence. They surround the name of a person being addressed, separate the day of the month from the year in a date, and separate a town from the state. • Parentheses enclose things that clarify or numbers and letters that are part of a list. There you have it, “my little chickadees.” All the rules of grammar you need to know. Now, for those of you wanting to speak and write English… I am Mentor Josephan P. Sterling Are you ready to speak English or not! mentor josephan p. sterling eagles dare english eagles dare english china Yorumlar: 0Rapor Flagİngilizce18 saat önce Yorumlar: 0Rapor take a walk FlagFransızca14 saat önce Yorumlar: 0Rapor FlagİngilizceBir gün önce Yorumlar: 0Rapor Mentor Josephan Amerika Birleşik Devletleri Ders Ayırmak
Nazi Germany Coordinates: 52°31′N13°24′E / 52.517°N 13.400°E / 52.517; 13.400 German Reich (1933–1943) Deutsches Reich Greater German Reich (1943–1945) Großdeutsches Reich Anthem: Official anthem: Das Lied der Deutschen "Song of the Germans" De facto: Horst-Wessel-Lied [lower-alpha 1] "Horst Wessel Song" Germany's territorial control at its greatest extent in World War II (late 1942) Administrative divisions of Germany, January 1944 Capital Berlin Common languages German Government Nazi one-party totalitarian dictatorship Head of State   Paul von Hindenburg (President) Adolf Hitler (Führer) Karl Dönitz (President) Adolf Hitler Joseph Goebbels Legislature Reichstag [A]  State council Reichsrat (abolished 1934) Historical era Interwar/World War II 30 January 1933 24 March 1933 (Union with Austria) 12 March 1938 1 September 1939 30 April 1945 8 May 1945 23 May 1945 1939 [lower-alpha 3] 633,786 km2 (244,706 sq mi) Currency Reichsmark (ℛℳ) ISO 3166 code DE Preceded by Succeeded by Weimar Republic Saar Basin Occupied Germany Occupied Austria Soviet Union Racism, especially antisemitism, was a central feature of the regime. The Germanic peoples were considered by the Nazis to be the purest branch of the Aryan race and also as the master race. Discrimination and persecution against Jews and Romani or Gypsy people began in earnest after the seizure of power. The first concentration camps were erected in March 1933. Jews and others deemed undesirable were imprisoned, while members of the liberal, socialist, and communist opposition were killed, imprisoned, or exiled. Opposition to Hitler's rule and Christian churches were oppressed, with many leaders imprisoned. Education focused on racial biology, population policy, and fitness for military service. Career and educational opportunities for women were curtailed. Recreation and tourism were organised via the Strength Through Joy program, and the 1936 Summer Olympics showcased Germany on the international stage. Propaganda Minister Joseph Goebbels made effective use of film, mass rallies, and Hitler's hypnotic oratory to influence public opinion. The government controlled artistic expression, promoting specific art forms and banning or discouraging others. The Nazi regime dominated neighbours through military threats in the years leading up to war. Nazi Germany made increasingly aggressive territorial demands, threatening war if they were not met. It seized Austria and Czechoslovakia in 1938 and 1939. Hitler made a non-aggression pact with Joseph Stalin and invaded Poland in September 1939, launching World War II in Europe. Germany conquered most of Europe by 1940 and threatened the United Kingdom. Reichskommissariats took control of conquered areas and a German administration was established in what was left of Poland. Germany exploited the raw materials and labour of both its occupied territories and its allies. Millions of Jews and other peoples deemed undesirable by the state were imprisoned, murdered in Nazi concentration camps and extermination camps, or shot in the Holocaust, through war crimes, and other crimes against humanity. Germany was known as the Weimar Republic during the years 1919 to 1933. It was a republic with a semi-presidential system. During its tenure, it faced numerous problems, including hyperinflation, political extremism including violence from both left- and right-wing paramilitaries, contentious relationships with the Allied victors of World War I, and a series of failed attempts at coalition government by divided political parties. [2] Severe setbacks to the German economy began after the war ended, partly because of reparations payments required under the 1919 Treaty of Versailles. The government printed money to make the payments and to repay the country's war debt, but the resulting hyperinflation led to inflated prices for consumer goods, economic chaos, and food riots. [3] When the government defaulted on their reparations payments in January 1923, French troops occupied German industrial areas along the Ruhr and widespread civil unrest followed. [4] Nazi seizure of power Nazification of Germany A color-coded map of Germany in the early 1930s showing the individual German states and independent cities. The largest states of Prussia and Bavaria are colored in light grey and light blue respectively. Hitler knew that reviving the economy was vital. Germany was still in a dire economic situation, as six million people were unemployed and the balance of trade deficit was daunting. [34] Using deficit spending, public works projects were undertaken beginning in 1934, creating 1.7 million new jobs by the end of that year alone. [34] Average wages both per hour and per week began to rise. [35] Consolidation of power Shortly after the NSDAP's seizure of power, the SA continued to apply pressure for greater political and military power. In response, Hitler used the Schutzstaffel (SS) and Gestapo to purge the entire SA leadership in the Night of the Long Knives, which took place from 30 June to 2 July 1934. [36] Hitler targeted SA Stabschef (Chief of Staff) Ernst Röhm and other SA leaders who—along with a number of Hitler's political adversaries (such as Gregor Strasser and former chancellor Kurt von Schleicher)—were rounded up, arrested, and shot. [37] On 2 August 1934, Hindenburg died. The previous day, the cabinet had enacted the "Law Concerning the Highest State Office of the Reich", which stated that upon Hindenburg's death the office of president would be abolished and its powers merged with those of the chancellor. [38] Hitler thus became head of state as well as head of government and was formally named as Führer und Reichskanzler ("Leader and Chancellor") – although eventually Reichskanzler was quietly dropped. [39] Germany was now a totalitarian state with Hitler at its head. [40] As head of state, Hitler became Supreme Commander of the armed forces. The new law provide an altered loyalty oath for servicemen so that they affirmed loyalty to Hitler personally rather than the office of supreme commander or the state. [41] On 19 August, the merger of the presidency with the chancellorship was approved by 90 percent of the electorate in a plebiscite. [42] Joseph Goebbels, Reich Minister of Public Enlightenment and Propaganda Most Germans were relieved that the conflicts and street fighting of the Weimar era had ended. They were deluged with propaganda orchestrated by Minister of Public Enlightenment and Propaganda Joseph Goebbels, who promised peace and plenty for all in a united, Marxist-free country without the constraints of the Versailles Treaty. [43] The first major Nazi concentration camp, initially for political prisoners, was opened at Dachau in 1933. [44] Hundreds of camps of varying size and function were created by the end of the war. [45] Beginning in April 1933, scores of measures defining the status of Jews and their rights were instituted. [46] Initiatives and legal mandates against the Jews culminated in the establishment of the Nuremberg Laws of 1935, stripping them of their basic rights. [47] The Nazis would take from the Jews their wealth, their right to intermarry with non-Jews, and their right to occupy many fields of labour (such as practising law, medicine, or working as educators). They eventually declared them undesirable to remain among German citizens and society, which over time dehumanised the Jews in the eyes of many German people. Ethnic Germans who refused to ostracise Jews or who showed any signs of resistance to Nazi propaganda were placed under surveillance by the Gestapo, had their rights removed, or were sent to concentration camps. [48] [ page needed ] The NSDAP obtained and legitimised power through its initial revolutionary activities, then through manipulation of legal mechanisms, the use of police powers, and by taking control of the state and federal institutions. [49] [50] Military build-up Following the passage of the Enabling Act and the NSDAP seizure of power in early 1933, Germany was without allies, and its military was drastically weakened by the terms of the Treaty of Versailles. France, Poland, Italy, and the Soviet Union each had reasons to object to Hitler's rise to power. Poland suggested to France that the two nations engage in a preventive war against Germany in March 1933. Fascist Italy objected to German claims in the Balkans and on Austria, which Duce Benito Mussolini considered to be in Italy's sphere of influence. [51] As early as February 1933, Hitler announced that rearmament must begin, albeit clandestinely at first, as to do so was in violation of the Versailles Treaty. On 17 May 1933, Hitler gave a speech before the Reichstag outlining his desire for world peace, while at the same time accepting an offer from American President Franklin D. Roosevelt for military disarmament, provided the other nations of Europe did the same. [52] When the other European powers failed to accept this offer, Hitler pulled Germany out of the World Disarmament Conference and the League of Nations in October, claiming its disarmament clauses were unfair if they applied only to Germany. [53] In a referendum held in November, 95 percent of voters supported Germany's withdrawal. [54] In 1934, Hitler told his military leaders that a war in the east should begin in 1942. [55] The Saarland, which had been placed under League of Nations supervision for 15 years at the end of World War I, voted in January 1935 to become part of Germany. [56] In March 1935, Hitler announced the creation of an air force, and that the Reichswehr would be increased to 550,000 men, [57] Britain agreed that the Germans would be allowed to build a naval fleet with the signing of the Anglo-German Naval Agreement on 18 June 1935. [58] When the Italian invasion of Ethiopia led to only mild protests by the British and French governments, on 7 March 1936 Hitler used the Franco-Soviet Treaty of Mutual Assistance as a pretext to order the army to march 3,000 troops into the demilitarised zone in the Rhineland in violation of the Versailles Treaty. [59] As the territory was part of Germany, the British and French governments did not feel that attempting to enforce the treaty was worth the risk of war. [60] In the one-party election held on 29 March, the NSDAP received 98.9 percent support. [60] In 1936, Hitler signed an Anti-Comintern Pact with Japan and a non-aggression agreement with Mussolini, who was soon referring to a "Rome-Berlin Axis". [61] Hitler sent military supplies and assistance to the Nationalist forces of General Francisco Franco in the Spanish Civil War, which began in July 1936. The German Condor Legion included a range of aircraft and their crews, as well as a tank contingent. The aircraft of the Legion destroyed the city of Guernica in 1937. [62] The Nationalists were victorious in 1939 and became an informal ally of Nazi Germany. [63] Austria and Czechoslovakia The Republic of Czechoslovakia was home to a substantial minority of Germans, who lived mostly in the Sudetenland. Under pressure from separatist groups within the Sudeten German Party, the Czechoslovak government offered economic concessions to the region. [65] Hitler decided to incorporate not just the Sudetenland but all of Czechoslovakia into the Reich. [66] The Nazis undertook a propaganda campaign to try to generate support for an invasion. [67] Top leaders of the armed forces opposed the plan, as Germany was not yet ready for war. [68] The crisis led to war preparations by Britain, Czechoslovakia, and France (Czechoslovakia's ally). Attempting to avoid war, British Prime Minister Neville Chamberlain arranged a series of meetings, the result of which was the Munich Agreement, signed on 29 September 1938. The Czechoslovak government was forced to accept the Sudetenland's annexation into Germany. Chamberlain was greeted with cheers when he landed in London, saying it brought "peace for our time". [69] The agreement lasted six months before Hitler seized the rest of Czech territory in March 1939. [70] The Germans split Czechoslovakia into two parts, the puppet Slovakia Republic and the Protectorate of Bohemia and Moravia. [71] A Nazi propaganda poster proclaiming that Danzig is German. World War II Foreign policy Germany's wartime foreign policy involved the creation of allied governments controlled directly or indirectly from Berlin. They intended to obtain soldiers from allies such as Italy and Hungary and workers and food supplies from allies such as Vichy France. [80] By late 1942, there were 24 divisions from Romania on the Eastern Front, 10 from Italy, and 10 from Hungary. [81] Germany assumed full control in France in 1942, Italy in 1943, and Hungary in 1944. Although Japan was a powerful ally, the relationship was distant, with little co-ordination or co-operation. For example, Germany refused to share their formula for synthetic oil from coal until late in the war. [82] Outbreak of war Germany invaded Poland and captured the Free City of Danzig on 1 September 1939, beginning World War II in Europe. [83] Honouring their treaty obligations, Britain and France declared war on Germany two days later. [84] Poland fell quickly, as the Soviet Union attacked from the east on 17 September. [85] Reinhard Heydrich, chief of the Sicherheitspolizei (SiPo; Security Police) and Sicherheitsdienst (SD; Security Service), ordered on 21 September that Jews should be rounded up and concentrated into cities with good rail links. Initially the intention was to deport them further east, or possibly to Madagascar. [86] Using lists prepared in advance, some 65,000 Polish intelligentsia, noblemen, clergy, and teachers were killed by the end of 1939 in an attempt to destroy Poland's identity as a nation. [87] [88] Soviet forces advanced into Finland in the Winter War, and German forces saw action at sea. But little other activity occurred until May, so the period became known as the "Phoney War". [89] From the start of the war, a British blockade on shipments to Germany affected its economy. Germany was particularly dependent on foreign supplies of oil, coal, and grain. [90] To safeguard Swedish iron ore shipments to Germany, Hitler ordered the invasion of Denmark and Norway, which began on 9 April. Denmark fell after less than a day, while most of Norway followed by the end of the month. [91] [92] By early June, Germany occupied all of Norway. [93] Conquest of Europe Against the advice of many of his senior military officers, Hitler ordered an attack on France and the Low Countries, which began in May 1940. [94] [95] They quickly conquered Luxembourg, the Netherlands, Belgium, and France, which surrendered on 22 June. [96] The victory in France resulted in an upswing in Hitler's popularity and an upsurge in war fever in Germany. [97] In violation of the provisions of the Hague Convention, industrial firms in the Netherlands, France, and Belgium were put to work producing war materiel for Germany. Officials viewed this option as being preferable to their citizens being deported to the Reich as forced labour. [98] The Nazis seized from the French thousands of locomotives and rolling stock, stockpiles of weapons, and raw materials such as copper, tin, oil, and nickel. [99] Payments for occupation costs were levied upon France, Belgium, and Norway. [100] Barriers to trade led to hoarding, black markets, and uncertainty about the future. [101] Food supplies were precarious; production dropped in most of Europe, but not as much as during World War I. [102] Famine was experienced in many occupied countries during the war. [102] German efforts to secure oil included negotiating a supply from their new ally, Romania, who joined the Axis by signing the Tripartite Pact in November 1940. [106] [107] In February 1941, the German Afrika Korps arrived in Libya to aid the Italians in the North African Campaign. [108] On 6 April, Germany launched an invasion of Yugoslavia and Greece. [109] [110] All of Yugoslavia and parts of Greece were subsequently divided between Germany, Hungary, Italy, and Bulgaria. The Italian-backed Croatian fascist leader Ante Pavelić established the Independent State of Croatia. [111] [112] Invasion of the Soviet Union Death and destruction during the Battle of Stalingrad, October 1942 The invasion conquered a huge area, including the Baltic states, Belarus, and west Ukraine. After the successful Battle of Smolensk, Hitler ordered Army Group Centre to halt its advance to Moscow and temporarily divert its Panzer groups to aid in the encirclement of Leningrad and Kiev. [115] This pause provided the Red Army with an opportunity to mobilise fresh reserves. The Moscow offensive, which resumed in October 1941, ended disastrously in December. [116] On 7 December 1941, Japan attacked Pearl Harbor, Hawaii. Four days later, Germany declared war on the United States. [117] Germany and Europe as a whole was almost totally dependent on foreign oil imports. [120] In an attempt to resolve the shortage, in June 1942 Germany launched Fall Blau ("Case Blue"), an offensive against the Caucasian oilfields. [121] The Red Army launched a counter-offensive on 19 November and encircled the Axis forces, who were trapped in Stalingrad on 23 November. [122] Göring assured Hitler that the 6th Army could be supplied by air, but this turned out to be infeasible. [123] Hitler's refusal to allow a retreat led to the deaths of 200,000 German and Romanian soldiers; of the 91,000 men who surrendered in the city on 31 January 1943, only 6,000 survivors returned to Germany after the war. [124] Turning point and collapse Losses continued to mount after Stalingrad, leading to a sharp reduction in the popularity of the Nazi Party and deteriorating morale among both the military and the civilian population. [125] Soviet forces continued to push the invaders westward after the failed German offensive at the Battle of Kursk. By the end of 1943 the Germans had lost most of their eastern territorial gains. [126] In Egypt, Field Marshal Erwin Rommel's Afrika Korps were defeated by British forces under Field Marshal Bernard Montgomery in October 1942. [127] The Allies landed in Sicily in July 1943 and in Italy in September. [128] Meanwhile, American and British bomber fleets based in Britain began operations against Germany. Many sorties were intentionally given civilian targets in an effort to destroy German morale. [129] Soon German aircraft production could not keep pace with losses, and without air cover the Allied bombing campaign became even more devastating. By targeting oil refineries and factories, they crippled the German war effort by late 1944. [130] On 6 June 1944, American, British, and Canadian forces established a front in France with the D-Day landings in Normandy. [131] On 20 July 1944, Hitler survived an assassination attempt using a planted bomb. [132] He ordered brutal reprisals, resulting in 7,000 arrests and the execution of more than 4,900 people. [133] The failed Ardennes Offensive (16 December 1944 – 25 January 1945) was the last major German offensive on the western front, and Soviet forces entered Germany on 27 January. [134] Hitler's refusal to admit defeat and his repeated insistence that the war be fought to the last man led to unnecessary death and destruction in the war's closing months. [135] Through his Justice Minister Otto Georg Thierack, Hitler ordered that anyone who was not prepared to fight should be court-martialed, and thousands of people were put to death. [136] In many areas, people surrendered to the approaching Allies in spite of exhortations of local leaders to continue to fight. Hitler ordered the destruction of transport, bridges, industries, and other infrastructure—a scorched earth decree—but Armaments Minister Albert Speer prevented this order from being fully carried out. [135] During the Battle of Berlin (16 April 1945 – 2 May 1945), Hitler and his staff lived in the underground Führerbunker while the Red Army approached. [137] On 30 April, when Soviet troops were within two blocks of the Reich Chancellery, Hitler, along with his girlfriend and by then wife Eva Braun committed suicide. [138] On 2 May, General Helmuth Weidling unconditionally surrendered Berlin to Soviet General Vasily Chuikov. [139] Hitler was succeeded by Grand Admiral Karl Dönitz as Reich President and Goebbels as Reich Chancellor. [140] Goebbels and his wife Magda committed suicide the next day after murdering their six children. [141] Between 4 and 8 May 1945, most of the remaining German armed forces unconditionally surrendered. The German Instrument of Surrender was signed 8 May, marking the end of the Nazi regime and the end of World War II in Europe. [142] Popular support for Hitler almost completely disappeared as the war drew to a close. [143] Suicide rates in Germany increased, particularly in areas where the Red Army was advancing. Among soldiers and party personnel, suicide was often deemed an honourable and heroic alternative to surrender. First-hand accounts and propaganda about the uncivilised behaviour of the advancing Soviet troops caused panic among civilians on the Eastern Front, especially women, who feared being raped. [144] More than a thousand people (out of a population of around 16,000) committed suicide in Demmin on and around 1 May 1945 as the 65th Army of 2nd Belorussian Front first broke into a distillery and then rampaged through the town, committing mass rapes, arbitrarily executing civilians, and setting fire to buildings. High numbers of suicides took place in many other locations, including Neubrandenburg (600 dead), Stolp in Pommern (1,000 dead), [145] and Berlin, where at least 7,057 people committed suicide in 1945. [146] German casualties German refugees in Bedburg, near Kleve, 19 February 1945 Estimates of the total German war dead range from 5.5 to 6.9 million persons. [147] A study by German historian Rüdiger Overmans puts the number of German military dead and missing at 5.3 million, including 900,000 men conscripted from outside of Germany's 1937 borders. [148] Overy estimated in 2014 that about 353,000 civilians were killed in Allied air raids. [149] Other civilian deaths include 300,000 Germans (including Jews) who were victims of Nazi political, racial, and religious persecution [150] and 200,000 who were murdered in the Nazi euthanasia program. [151] Political courts called Sondergerichte sentenced some 12,000 members of the German resistance to death, and civil courts sentenced an additional 40,000 Germans. [152] Mass rapes of German women also took place. [153] At the end of the war, Europe had more than 40 million refugees, [154] its economy had collapsed, and 70 percent of its industrial infrastructure was destroyed. [155] Between twelve and fourteen million ethnic Germans fled or were expelled from central, eastern and southeastern Europe to Germany. [156] The West German government estimated a death toll of 2.2 million civilians due to the flight and expulsion of Germans and through forced labour in the Soviet Union. [157] This figure remained unchallenged until the 1990s, when some historians put the death toll at 500,000–600,000 confirmed deaths. [158] [159] [160] In 2006, the German government reaffirmed its position that 2.0–2.5 million deaths occurred. [lower-alpha 6] Territorial changes Germany regained control of the Saarland through a referendum held in 1935 and annexed Austria in the Anschluss of 1938. [162] The Munich Agreement of 1938 gave Germany control of the Sudetenland, and they seized the remainder of Czechoslovakia six months later. [69] Under threat of invasion by sea, Lithuania surrendered the Memel district in March 1939. [163] Between 1939 and 1941, German forces invaded Poland, France, Luxembourg, the Netherlands, Belgium, and the Soviet Union. [96] Mussolini ceded Trieste, South Tyrol, and Istria to Germany in 1943. [164] Two puppet districts were created in the area: the Operational Zone of the Adriatic Littoral and the Operational Zone of the Alpine Foothills. [165] Occupied territories Under the cover of anti-partisan operations, the Germans murdered civilians in 5,295 localities in occupied Soviet Belarus. [166] Post-war changes With the issuance of the Berlin Declaration on 5 June 1945 and later creation of the Allied Control Council, the four Allied powers temporarily assumed governance of Germany. [170] At the Potsdam Conference in August 1945, the Allies arranged for the Allied occupation and denazification of the country. Germany was split into four zones, each occupied by one of the Allied powers, who drew reparations from their zone. Since most of the industrial areas were in the western zones, the Soviet Union was transferred additional reparations. [171] The Allied Control Council disestablished Prussia on 20 May 1947. [172] Aid to Germany began arriving from the United States under the Marshall Plan in 1948. [173] The occupation lasted until 1949, when the countries of East Germany and West Germany were created. In 1970, Germany finalised her border with Poland by signing the Treaty of Warsaw. [174] Germany remained divided until 1990, when the Allies renounced all claims to German territory with the Treaty on the Final Settlement with Respect to Germany, under which Germany also renounced claims to territories lost during World War II. [175] Jewish civil servants lost their jobs in 1933, except for those who had seen military service in World War I. Members of the NSDAP or party supporters were appointed in their place. [199] As part of the process of Gleichschaltung, the Reich Local Government Law of 1935 abolished local elections, and from henceforth mayors were appointed by the Ministry of the Interior. [200] Military and paramilitary The SA and SS Röhm hoped to assume command of the army and absorb it into the ranks of the SA. [228] Hindenburg and Defence Minister Werner von Blomberg threatened to impose martial law if the activities of the SA were not curtailed. [229] Hitler also suspected that Röhm was plotting to depose him, so he ordered the deaths of Röhm and other political enemies. Up to 200 people were killed from 30 June to 2 July 1934 in an event that became known as the Night of the Long Knives. [230] After this purge, the SA was no longer a major force. [231] Initially a small bodyguard unit under the auspices of the SA, the Schutzstaffel (SS; Protection Squadron) grew to become one of the largest and most powerful groups in Nazi Germany. [232] Led by Reichsführer-SS Heinrich Himmler from 1929, the SS overall had over a quarter million members by 1938. [233] Himmler initially envisioned the SS as being an elite group of guards, Hitler's last line of defence. [234] The Waffen-SS, the military branch of the SS, became arguably a de facto fourth branch of the Wehrmacht, however, it was never a "serious rival" to the German Army. It never obtained total "independence of command" and was dependent on the army for heavy weaponry and equipment. [235] [236] By the end of 1942 as the Soviet Army pushed back in resurgence and losses of Waffen-SS troops mounted, the selection and racial requirements were no longer followed. With recruitment and conscription based only on expansion, by 1943 the Waffen-SS could not longer claim to be an elite fighting force. [237] Its formations committed many war crimes against civilians and allied servicemen. [238] Up to 60,000 Waffen-SS men served in the concentration and extermination camps. [239] Further, a third of the Einsatzgruppen members that were responsible for mass murder, were recruited from Waffen-SS personnel. [240] From 1935 forward, the SS spearheaded the persecution of Jews, who were rounded up into ghettos and concentration camps. [241] With the outbreak of World War II, the SS Einsatzgruppen units followed the army into Poland and the Soviet Union, where from 1941 to 1945 they killed more than two million people, including 1.3 million Jews. [242] [243] The SS-Totenkopfverbände (death's head units) ran the concentration camps and extermination camps, where millions more were killed. [244] [245] Reich economics Autobahn , late 1930s Six million people were unemployed when the Nazis took power in 1933 and by 1937 there were fewer than a million. [261] This was in part due to the removal of women from the workforce. [262] Real wages dropped by 25 percent between 1933 and 1938. [251] After the dissolution of the trade unions in May 1933, their funds were seized and their leadership arrested, [263] including those who attempted to co-operate with the NSDAP. [30] A new organisation, the German Labour Front, was created and placed under NSDAP functionary Robert Ley. [263] The average German worked 43 hours a week in 1933; by 1939 this increased to 47 hours a week. [264] By early 1934, the focus shifted from funding work creation schemes towards rearmament. By 1935, military expenditures accounted for 73 percent of the government's purchases of goods and services. [265] On 18 October 1936, Hitler named Göring as Plenipotentiary of the Four Year Plan, intended to speed up the rearmament programme. [266] In addition to calling for the rapid construction of steel mills, synthetic rubber plants and other factories, Göring instituted wage and price controls and restricted the issuance of stock dividends. [251] Large expenditures were made on rearmament in spite of growing deficits. [267] With the introduction of compulsory military service in 1935, the Reichswehr, which had been limited to 100,000 by the terms of the Versailles Treaty, expanded to 750,000 on active service at the start of World War II, with a million more in the reserve. [268] By January 1939, unemployment was down to 301,800 and it dropped to only 77,500 by September. [269] Wartime economy and forced labour The Nazi war economy was a mixed economy that combined a free market with central planning. Historian Richard Overy described it as being somewhere in between the command economy of the Soviet Union and the capitalist system of the United States. [270] In 1942, after the death of Armaments Minister Fritz Todt, Hitler appointed Albert Speer as his replacement. [271] By 1944, the war was consuming 75 percent of Germany's gross domestic product, compared to 60 percent in the Soviet Union and 55 percent in Britain. [272] Speer improved production by centralising planning and control, reducing production of consumer goods, and using forced labour and slavery. [273] [274] The wartime economy eventually relied heavily upon the large-scale employment of slave labour. Germany imported and enslaved some 12 million people from 20 European countries to work in factories and on farms. Approximately 75 percent were Eastern European. [275] Many were casualties of Allied bombing, as they received poor air raid protection. Poor living conditions led to high rates of sickness, injury and death, as well as sabotage and criminal activity. [276] The wartime economy also relied upon large-scale robbery, initially through the state seizing the property of Jewish citizens and later by plundering the resources of occupied territories. [277] Foreign workers brought into Germany were put into four different classifications: guest workers, military internees, civilian workers, and Eastern workers. Each group was subject to different regulations. In addition, the Nazis issued a ban on sexual relations between Germans and foreign workers. [278] [279] By 1944 over a half million women served as auxiliaries in the German armed forces. [280] The number of women paid employment only increased by 271,000 (1.8 percent) from 1939 to 1944, [281] but as the production of consumer goods had been cut back, women left those industries for employment in the war economy. They also took over jobs formerly held by men, especially on farms and in family-owned shops. [282] Very heavy strategic bombing by the Allies targeted refineries producing synthetic oil and gasoline, as well as the German transportation system, especially rail yards and canals. [283] The armaments industry began to break down by September 1944. By November, fuel coal was no longer reaching its destinations and the production of new armaments was no longer possible. [284] Overy argues that the bombing strained the German war economy and forced it to divert up to one-fourth of its manpower and industry into anti-aircraft resources, which very likely shortened the war. [285] Financial exploitation of conquered territories German loot stored at Schlosskirche Ellingen, Bavaria (April 1945) During the course of the war, the Nazis extracted considerable amounts of plunder from occupied Europe. Historian and war correspondent William L. Shirer writes that: "The total amount of [Nazi] loot will never be known; it has proved beyond man's capacity to accurately compute." [286] Gold reserves and other foreign holdings were regularly seized from the national banks of occupied nations, while large "occupation costs" were usually imposed. By February 1944, the Reichsfinanzministerium (Ministry of Finance) had calculated that 48 billion Reichsmarks had been paid to Germany. By the end of the war, occupation costs were calculated by the Nazis to number 60 billion Reichsmarks, with France alone paying 31.5 billion. The Bank of France was also forced to provide 4.5 billion Reichsmarks in "credits" to Germany, while a further 500,000 Reichsmarks were assessed against Vichy France by the Nazis in the form of "fees" and other miscellaneous charges. The Nazis exploited other conquered nations in a similar way. After the war, the United States Strategic Bombing Survey concluded Germany had obtained 104 billion Reichsmarks in the form of occupation costs and other wealth transfers from occupied Europe, including two-thirds of the gross domestic product of Belgium and the Netherlands. [286] Nazi plunder included private and public art collections, artefacts, precious metals, books, and personal possessions. Hitler and Göring in particular were interested in acquiring looted art treasures from occupied Europe, [287] the former planning to use the stolen art to fill the galleries of the planned Führermuseum (Leader's Museum), [288] and the latter for his personal collection. Göring, having stripped almost all of occupied Poland of its artworks within six months of Germany's invasion, ultimately grew a collection valued at over 50 million Reichsmarks. [287] In 1940, the Reichsleiter Rosenberg Taskforce was established to loot artwork and cultural material from public and private collections, libraries, and museums throughout Europe. France saw the greatest extent of Nazi plunder. Some 26,000 railroad cars of art treasures, furniture, and other looted items were sent to Germany from France. [289] By January 1941, Rosenberg estimated the looted treasures from France to be valued at over one billion Reichsmarks. [290] In addition, soldiers looted or purchased goods such as produce and clothing—items, which were becoming harder to obtain in Germany—for shipment home. [291] Goods and raw materials were also taken. In France, an estimated 9,000,000 tonnes (8,900,000 long tons; 9,900,000 short tons) of cereals were seized during the course of the war. 75 percent of the oats produced in France, as well as 80 percent of the country's oil and 74 percent of its steel production were also taken. The valuation of this loot is estimated to be 184.5 billion francs. In Poland, Nazi plunder of raw materials began even before the German invasion had concluded. [292] In October 1939, Hans Frank, future Governor-General of occupied Poland, stated that the Nazis intended a "ruthless exploitation" of Poland's "supplies, raw materials, machines, [and] factory instillation." Frank went on to state that "Poland shall be treated as a colony. The Poles shall be the slaves of the Greater German Reich." [292] Following Operation Barbarossa, the Soviet Union was also plundered. In 1943 alone, 9,000,000 tons of cereals, 2,000,000 tonnes (2,000,000 long tons; 2,200,000 short tons) of fodder, 3,000,000 tonnes (3,000,000 long tons; 3,300,000 short tons) of potatoes, and 662,000 tonnes (652,000 long tons; 730,000 short tons) of meats were sent back to Germany. During the course of Germany's occupation of Soviet territory, some 12 million pigs and 13 million sheep had been taken. The total value of this plunder is estimated at 4 billion Reichsmarks. This relatively low number in comparison to the occupied nations of Western Europe can be attributed to the devastating fighting on the Eastern Front. [293] Racial policy and eugenics Racism and antisemitism Persecution of Jews Discrimination against Jews began immediately after the seizure of power. Following a month-long series of attacks by members of the SA on Jewish businesses and synagogues, on 1 April 1933 Hitler declared a national boycott of Jewish businesses. [295] The Law for the Restoration of the Professional Civil Service passed on 7 April and forced all non-Aryan civil servants to retire from the legal profession and civil service. [296] Similar legislation soon deprived other Jewish professionals of their right to practise, and on 11 April a decree was promulgated that stated anyone who had even one Jewish parent or grandparent was considered non-Aryan. [297] As part of the drive to remove Jewish influence from cultural life, members of the National Socialist Student League removed from libraries any books considered un-German, and a nationwide book burning was held on 10 May. [298] The regime used violence and economic pressure to encourage Jews to voluntarily leave the country. [299] Jewish businesses were denied access to markets, forbidden to advertise, and deprived of access to government contracts. Citizens were harassed and subjected to violent attacks. [300] Many towns posted signs forbidding entry to Jews. [301] In November 1938 a young Jewish man requested an interview with the German ambassador in Paris and met with a legation secretary, whom he shot and killed to protest his family's treatment in Germany. This incident provided the pretext for a pogrom the NSDAP incited against the Jews on 9 November 1938. Members of the SA damaged or destroyed synagogues and Jewish property throughout Germany. At least 91 German Jews were killed during this pogrom, later called Kristallnacht , the Night of Broken Glass. [302] [303] Further restrictions were imposed on Jews in the coming months – they were forbidden to own businesses or work in retail shops, drive cars, go to the cinema, visit the library or own weapons, and Jewish pupils were removed from schools. The Jewish community was fined one billion marks to pay for the damage caused by Kristallnacht and told that any insurance settlements would be confiscated. [304] By 1939, around 250,000 of Germany's 437,000 Jews had emigrated to the United States, Argentina, Great Britain, Palestine, and other countries. [305] [306] Many chose to stay in continental Europe. Emigrants to Palestine were allowed to transfer property there under the terms of the Haavara Agreement, but those moving to other countries had to leave virtually all their property behind, and it was seized by the government. [306] Persecution of Roma Like the Jews, the Romani or Gypsy people were subjected to persecution from the early days of the regime. The Romani were forbidden to marry people of German extraction. They were also shipped to concentration camps starting in 1935 and killed in large numbers. [183] [184] Following the invasion of Poland, 2,500 Roma and Sinti people were deported from Germany to the General Government where they were imprisoned in labor camps. The survivors were likely exterminated at Bełżec, Sobibor, or Treblinka. A further 5,000 Sinti and Austrian Lalleri people were deported to the Łódź Ghetto in late 1941, where half were estimated to have died. The Romani survivors of the ghetto were subsequently moved to the Chełmno extermination camp in early 1942. [307] People with disabilities Action T4 was a programme of systematic murder of the physically and mentally handicapped and patients in psychiatric hospitals that took place mainly from 1939 to 1941, and continued until the end of the war. Initially the victims were shot by the Einsatzgruppen and others; gas chambers and gas vans using carbon monoxide were used by early 1940. [308] [309] Under the Law for the Prevention of Genetically Diseased Offspring, enacted on 14 July 1933, over 400,000 individuals underwent compulsory sterilisation. [310] Over half were those considered mentally deficient, which included not only people who scored poorly on intelligence tests, but those who deviated from expected standards of behaviour regarding thrift, sexual behaviour, and cleanliness. Most of the victims came from disadvantaged groups such as prostitutes, the poor, the homeless, and criminals. [311] Other groups persecuted and killed included Jehovah's Witnesses, homosexuals, social misfits, and members of the political and religious opposition. [184] [312] Generalplan Ost Germany's war in the East was based on Hitler's long-standing view that Jews were the great enemy of the German people and that Lebensraum was needed for Germany's expansion. Hitler focused his attention on Eastern Europe, aiming to defeat Poland and the Soviet Union. [180] [181] After the occupation of Poland in 1939, all Jews living in the General Government area were confined to ghettos and those who were physically fit were required to perform compulsory labour. [313] In 1941 Hitler decided to destroy the Polish nation completely; within 15 to 20 years the General Government was to be cleared of ethnic Poles and resettled by German colonists. [314] About 3.8 to 4 million Poles would remain as slaves, [315] part of a slave labour force of 14 million the Nazis intended to create using citizens of conquered nations. [181] [316] The Generalplan Ost ("General Plan for the East") called for deporting the population of occupied Eastern Europe and the Soviet Union to Siberia, for use as slave labour or to be murdered. [317] To determine who should be killed, Himmler created the Volksliste , a system of classification of people deemed to be of German blood. [318] He ordered that those of Germanic descent who refused to be classified as ethnic Germans should be deported to concentration camps, have their children taken away, or be assigned to forced labour. [319] [320] The plan also included the kidnapping of children deemed to have Aryan-Nordic traits, who were presumed to be of German descent. [321] The goal was to implement Generalplan Ost after the conquest of the Soviet Union, but when the invasion failed Hitler had to consider other options. [317] [322] One suggestion was a mass forced deportation of Jews to Poland, Palestine, or Madagascar. [313] In addition to eliminating Jews, the Nazis planned to reduce the population of the conquered territories by 30 million people through starvation in an action called the Hunger Plan. Food supplies would be diverted to the German army and German civilians. Cities would be razed and the land allowed to return to forest or resettled by German colonists. [323] Together, the Hunger Plan and Generalplan Ost would have led to the starvation of 80 million people in the Soviet Union. [324] These partially fulfilled plans resulted in the democidal deaths of an estimated 19.3 million civilians and prisoners of war (POWs). [325] During the course of the war, the Soviet Union lost a total of 27 million people; less than nine million of these were combat deaths. [326] One in four of the Soviet population were killed or wounded. [327] The Holocaust and Final Solution Around the time of the failed offensive against Moscow in December 1941, Hitler resolved that the Jews of Europe were to be exterminated immediately. [328] While the murder of Jewish civilians had been ongoing in the occupied territories of Poland and the Soviet Union, plans for the total eradication of the Jewish population of Europe—eleven million people—were formalised at the Wannsee Conference on 20 January 1942. Some would be worked to death and the rest would be killed in the implementation of the Final Solution to the Jewish Question. [329] There was a progression in methods in how the victims were killed. Initially the victims were killed by Einsatzgruppen firing squads, then by stationary gas chambers or by gas vans, but these methods proved impractical for an operation of this scale. [330] [331] By 1942 extermination camps equipped with gas chambers were established at Auschwitz, Chełmno, Sobibor, Treblinka, and elsewhere. [332] The total number of Jews murdered is estimated at 5.5 to six million, [245] including over a million children. [333] The Allies received information about the murders from the Polish government-in-exile and Polish leadership in Warsaw, based mostly on intelligence from the Polish underground. [334] [335] German citizens also had access to information about what was happening, as soldiers returning from the occupied territories would report on what they had seen and done. [336] Historian Richard J. Evans states that most German citizens disapproved of the genocide. [337] [lower-alpha 8] Oppression of ethnic Poles Mistreatment of Soviet POWs Soviet prisoners of war in Mauthausen During the course of the war, the Nazis captured 5.75 million Soviet prisoners of war (POWs), more than all the other Allied powers combined. Of these, an estimated 3.3 million were killed by the Nazis, [340] with 2.8 million of them being killed between June 1941 and January 1942. [341] Many POWs starved to death or resorted to cannibalism while being held in open-air pens at Auschwitz and elsewhere. [342] From 1942 onward, Soviet POWs were viewed as a source of forced labour, and received better treatment so they could work. [343] By December 1944, 750,000 Soviet POWs were working, including in German armaments factories (in violation of the Hague and Geneva conventions), mines, and farms. [344] Antisemitic legislation passed in 1933 led to the removal of all Jewish teachers, professors and officials from the education system. Most teachers were required to belong to the Nationalsozialistischer Lehrerbund (NSLB; National Socialist Teachers League) and university professors were required to join the National Socialist German Lecturers. [345] [346] Teachers had to take an oath of loyalty and obedience to Hitler and those who failed to show sufficient conformity to party ideals were often reported by students or fellow teachers and dismissed. [347] [348] Lack of funding for salaries led to many teachers leaving the profession and the average class size increased from 37 in 1927 to 43 in 1938 due to the resulting teacher shortage. [349] Frequent and often contradictory directives were issued by Interior Minister Wilhelm Frick, Bernhard Rust of the Reichserziehungsministerium (Ministry of Education), and various other agencies regarding content of lessons and acceptable textbooks for use in primary and secondary schools. [350] Books deemed unacceptable to the regime were removed from school libraries. [351] Indoctrination in National Socialist thought was made compulsory in January 1934. [351] Students selected as future members of the party elite were indoctrinated from the age of 12 at Adolf Hitler Schools for primary education and National Political Institutes of Education for secondary education. Detailed National Socialist indoctrination of future holders of elite military rank was undertaken at Order Castles. [352] Primary and secondary education focused on racial biology, population policy, culture, geography, and especially physical fitness. [353] The curriculum in most subjects, including biology, geography and even arithmetic, was altered to change the focus to race. [354] Military education became the central component of physical education and education in physics was oriented toward subjects with military applications, such as ballistics and aerodynamics. [355] [356] Students were required to watch all films prepared by the school division of the Propagandaministerium (Ministry of Public Enlightenment and Propaganda). [351] At universities, appointments to top posts were the subject of power struggles between the education ministry, the university boards, and the National Socialist German Students' League. [357] In spite of pressure from the League and various government ministries, most university professors did not make changes to their lectures or syllabus during the Nazi period. [358] This was especially true of universities located in predominantly Catholic regions. [359] Enrolment at German universities declined from 104,000 students in 1931 to 41,000 in 1939, but enrolment in medical schools rose sharply as Jewish doctors had been forced to leave the profession, so medical graduates had good job prospects. [360] From 1934, university students were required to attend frequent and time-consuming military training sessions run by the SA. [361] First-year students also had to serve six months in a labour camp for the Reichsarbeitsdienst (National Labour Service); an additional ten weeks service were required of second-year students. [362] Role of women and family Women were a cornerstone of Nazi social policy and the Nazis opposed the feminist movement, claiming that it was the creation of Jewish intellectuals, instead advocating a patriarchal society in which the German woman would recognise that her "world is her husband, her family, her children, and her home". [262] Soon after the seizure of power, feminist groups were shut down or incorporated into the National Socialist Women's League, which coordinated groups throughout the country to promote motherhood and household activities. Courses were offered on childrearing, sewing and cooking. Prominent feminists, including Anita Augspurg, Lida Gustava Heymann and Helene Stöcker, felt forced to live in exile. [363] The League published the NS-Frauen-Warte , the only NSDAP-approved women's magazine in Nazi Germany; [364] despite some propaganda aspects, it was predominantly an ordinary woman's magazine. [365] Women were encouraged to leave the workforce, and the creation of large families by racially suitable women was promoted through a propaganda campaign. Women received a bronze award—known as the Ehrenkreuz der Deutschen Mutter (Cross of Honour of the German Mother)—for giving birth to four children, silver for six and gold for eight or more. [363] Large families received subsidies to help with their utilities, school fees and household expenses. Though the measures led to increases in the birth rate, the number of families having four or more children declined by five percent between 1935 and 1940. [366] Removing women from the workforce did not have the intended effect of freeing up jobs for men as women were for the most part employed as domestic servants, weavers or in the food and drink industries—jobs that were not of interest to men. [367] Nazi philosophy prevented large numbers of women from being hired to work in munitions factories in the build-up to the war, so foreign labourers were brought in. After the war started, slave labourers were extensively used. [368] In January 1943, Hitler signed a decree requiring all women under the age of fifty to report for work assignments to help the war effort. [369] Thereafter women were funnelled into agricultural and industrial jobs and by September 1944 14.9 million women were working in munitions production. [370] The Nazi regime discouraged women from seeking higher education since Nazi leaders held conservative views about women and endorsed the idea that rational and theoretical work was alien to a woman's nature since they were considered inherently emotional and instinctive – as such, engaging in academics and careerism would only "divert them from motherhood". [371] The number of women allowed to enroll in universities dropped drastically, as a law passed in April 1933 limited the number of females admitted to university to ten percent of the number of male attendees. [372] Female enrolment in secondary schools dropped from 437,000 in 1926 to 205,000 in 1937. The number of women enrolled in post-secondary schools dropped from 128,000 in 1933 to 51,000 in 1938. However, with the requirement that men be enlisted into the armed forces during the war, women comprised half of the enrolment in the post-secondary system by 1944. [373] Women were expected to be strong, healthy and vital. [374] The sturdy peasant woman who worked the land and bore strong children was considered ideal and athletic women were praised for being tanned from working outdoors. [375] Organisations were created for the indoctrination of Nazi values and from 25 March 1939 membership in the Hitler Youth became compulsory for all children over the age of ten. [376] The Jungmädelbund (Young Girls League) section of the Hitler Youth was for girls age 10 to 14 and the Bund Deutscher Mädel (BDM; League of German Girls) was for young women age 14 to 18. The BDM's activities focused on physical education, with activities such as running, long jumping, somersaulting, tightrope walking, marching and swimming. [377] The Nazi regime promoted a liberal code of conduct regarding sexual matters and was sympathetic to women who bore children out of wedlock. [378] Promiscuity increased as the war progressed, with unmarried soldiers often intimately involved with several women simultaneously. Soldier's wives were frequently involved in extramarital relationships. Sex was sometimes used as a commodity to obtain better work from a foreign labourer. [379] Pamphlets enjoined German women to avoid sexual relations with foreign workers as a danger to their blood. [380] With Hitler's approval, Himmler intended that the new society of the Nazi regime should destigmatise illegitimate births, particularly of children fathered by members of the SS, who were vetted for racial purity. [381] His hope was that each SS family would have between four and six children. [381] The Lebensborn (Fountain of Life) association, founded by Himmler in 1935, created a series of maternity homes where single mothers could be accommodated during their pregnancies. [382] Both parents were examined for racial suitability before acceptance. [382] The resulting children were often adopted into SS families. [382] The homes were also made available to the wives of SS and NSDAP members, who quickly filled over half the available spots. [383] Nazi Germany had a strong anti-tobacco movement as pioneering research by Franz H. Müller in 1939 demonstrated a causal link between tobacco smoking and lung cancer. [385] The Reich Health Office took measures to try to limit smoking, including producing lectures and pamphlets. [386] Smoking was banned in many workplaces, on trains and among on-duty members of the military. [387] Government agencies also worked to control other carcinogenic substances such as asbestos and pesticides. [388] As part of a general public health campaign, water supplies were cleaned up, lead and mercury were removed from consumer products and women were urged to undergo regular screenings for breast cancer. [389] Medical experiments, many of them pseudoscientific, were performed on concentration camp inmates beginning in 1941. [391] The most notorious doctor to perform medical experiments was SS- Hauptsturmführer Dr. Josef Mengele, camp doctor at Auschwitz. [392] Many of his victims died or were intentionally killed. [393] Concentration camp inmates were made available for purchase by pharmaceutical companies for drug testing and other experiments. [394] Nazi society had elements supportive of animal rights and many people were fond of zoos and wildlife. [395] The government took several measures to ensure the protection of animals and the environment. In 1933, the Nazis enacted a stringent animal-protection law that affected what was allowed for medical research. [396] However, the law was only loosely enforced and in spite of a ban on vivisection the Ministry of the Interior readily handed out permits for experiments on animals. [397] The Reich Forestry Office under Göring enforced regulations that required foresters to plant a wide variety of trees to ensure suitable habitat for wildlife and a new Reich Animal Protection Act became law in 1933. [398] The regime enacted the Reich Nature Protection Act in 1935 to protect the natural landscape from excessive economic development and it allowed for the expropriation of privately owned land to create nature preserves and aided in long-range planning. [399] Perfunctory efforts were made to curb air pollution, but little enforcement of existing legislation was undertaken once the war began. [400] Oppression of churches When the Nazis seized power in 1933, roughly 67 percent of the population of Germany was Protestant, 33 percent was Roman Catholic, while Jews made up less than 1 percent. [401] [402] According to 1939 census, 54 percent considered themselves Protestant, 40 percent Roman Catholic, 3.5 percent Gottgläubig (God-believing; a Nazi religious movement) and 1.5 percent nonreligious. [403] Under the Gleichschaltung process, Hitler attempted to create a unified Protestant Reich Church from Germany's 28 existing Protestant state churches, [404] with the ultimate goal of eradication of the churches in Germany. [405] Pro-Nazi Ludwig Müller was installed as Reich Bishop and the pro-Nazi pressure group German Christians gained control of the new church. [406] They objected to the Old Testament because of its Jewish origins and demanded that converted Jews be barred from their church. [407] Pastor Martin Niemöller responded with the formation of the Confessing Church, from which some clergymen opposed the Nazi regime. [408] When in 1935 the Confessing Church synod protested the Nazi policy on religion, 700 of their pastors were arrested. [409] Müller resigned and Hitler appointed Hanns Kerrl as Minister for Church Affairs to continue efforts to control Protestantism. [410] In 1936, a Confessing Church envoy protested to Hitler against the religious persecutions and human rights abuses. [409] Hundreds more pastors were arrested. [410] The church continued to resist and by early 1937 Hitler abandoned his hope of uniting the Protestant churches. [409] Niemöller was arrested on 1 July 1937 and spent most of the next seven years in Sachsenhausen concentration camp and Dachau. [411] Theological universities were closed and pastors and theologians of other Protestant denominations were also arrested. [409] Persecution of the Catholic Church in Germany followed the Nazi takeover. [413] Hitler moved quickly to eliminate political Catholicism, rounding up functionaries of the Catholic-aligned Bavarian People's Party and Catholic Centre Party, which along with all other non-Nazi political parties ceased to exist by July. [414] The Reichskonkordat (Reich Concordat) treaty with the Vatican was signed in 1933, amid continuing harassment of the church in Germany. [310] The treaty required the regime to honour the independence of Catholic institutions and prohibited clergy from involvement in politics. [415] Hitler routinely disregarded the Concordat, closing all Catholic institutions whose functions were not strictly religious. [416] Clergy, nuns and lay leaders were targeted, with thousands of arrests over the ensuing years, often on trumped-up charges of currency smuggling or immorality. [417] Several Catholic leaders were targeted in the 1934 Night of the Long Knives assassinations. [418] [419] [420] Most Catholic youth groups refused to dissolve themselves and Hitler Youth leader Baldur von Schirach encouraged members to attack Catholic boys in the streets. [421] Propaganda campaigns claimed the church was corrupt, restrictions were placed on public meetings and Catholic publications faced censorship. Catholic schools were required to reduce religious instruction and crucifixes were removed from state buildings. [422] Resistance to the regime The regime promoted the concept of Volksgemeinschaft , a national German ethnic community. The goal was to build a classless society based on racial purity and the perceived need to prepare for warfare, conquest and a struggle against Marxism. [447] [448] The German Labour Front founded the Kraft durch Freude (KdF; Strength Through Joy) organisation in 1933. As well as taking control of tens of thousands of privately run recreational clubs, it offered highly regimented holidays and entertainment such as cruises, vacation destinations and concerts. [449] [450] Radio became popular in Germany during the 1930s; over 70 percent of households owned a receiver by 1939, more than any other country. By July 1933, radio station staffs were purged of leftists and others deemed undesirable. [452] Propaganda and speeches were typical radio fare immediately after the seizure of power, but as time went on Goebbels insisted that more music be played so that listeners would not turn to foreign broadcasters for entertainment. [453] Nazi book burning on 10 May 1933 in Berlin, as books by Jewish and leftist authors were burned [454] Newspapers, like other media, were controlled by the state; the Reich Press Chamber shut down or bought newspapers and publishing houses. By 1939, over two thirds of the newspapers and magazines were directly owned by the Propaganda Ministry. [455] The NSDAP daily newspaper, the Völkischer Beobachter ("Ethnic Observer"), was edited by Rosenberg, who also wrote The Myth of the Twentieth Century , a book of racial theories espousing Nordic superiority. [456] Goebbels controlled the wire services and insisted that all newspapers in Germany only publish content favourable to the regime. Under Goebbels, the Propaganda Ministry issued two dozen directives every week on exactly what news should be published and what angles to use; the typical newspaper followed the directives closely, especially regarding what to omit. [457] Newspaper readership plummeted, partly because of the decreased quality of the content and partly because of the surge in popularity of radio. [458] Propaganda became less effective towards the end of the war, as people were able to obtain information outside of official channels. [459] Architecture and art Hitler took a personal interest in architecture and worked closely with state architects Paul Troost and Albert Speer to create public buildings in a neoclassical style based on Roman architecture. [462] [463] Speer constructed imposing structures such as the Nazi party rally grounds in Nuremberg and a new Reich Chancellery building in Berlin. [464] Hitler's plans for rebuilding Berlin included a gigantic dome based on the Pantheon in Rome and a triumphal arch more than double the height of the Arc de Triomphe in Paris. Neither structure was built. [465] Hitler's belief that abstract, Dadaist, expressionist and modern art were decadent became the basis for policy. [466] Many art museum directors lost their posts in 1933 and were replaced by party members. [467] Some 6,500 modern works of art were removed from museums and replaced with works chosen by a Nazi jury. [468] Exhibitions of the rejected pieces, under titles such as "Decadence in Art", were launched in sixteen different cities by 1935. The Degenerate Art Exhibition, organised by Goebbels, ran in Munich from July to November 1937. The exhibition proved wildly popular, attracting over two million visitors. [469] Composer Richard Strauss was appointed president of the Reichsmusikkammer (Reich Music Chamber) on its founding in November 1933. [470] As was the case with other art forms, the Nazis ostracised musicians who were deemed racially unacceptable and for the most part disapproved of music that was too modern or atonal. [471] Jazz was considered especially inappropriate and foreign jazz musicians left the country or were expelled. [472] Hitler favoured the music of Richard Wagner, especially pieces based on Germanic myths and heroic stories, and attended the Bayreuth Festival each year from 1933 to 1942. [473] Leni Riefenstahl (behind cameraman) at the 1936 Summer Olympics Defendants in the dock at the Nuremberg trials The Allied powers organised war crimes trials, beginning with the Nuremberg trials, held from November 1945 to October 1946, of 23 top Nazi officials. They were charged with four counts—conspiracy to commit crimes, crimes against peace, war crimes and crimes against humanity—in violation of international laws governing warfare. [479] All but three of the defendants were found guilty and twelve were sentenced to death. [480] Twelve Subsequent Nuremberg trials of 184 defendants were held between 1946 and 1949. [479] Between 1946 and 1949, the Allies investigated 3,887 cases, of which 489 were brought to trial. The result was convictions of 1,426 people; 297 of these were sentenced to death and 279 to life in prison, with the remainder receiving lesser sentences. About 65 percent of the death sentences were carried out. [481] Poland was more active than other nations in investigating war crimes, for example prosecuting 673 of the total 789 Auschwitz staff brought to trial. [482] The political programme espoused by Hitler and the NSDAP brought about a world war, leaving behind a devastated and impoverished Europe. Germany itself suffered wholesale destruction, characterised as Stunde Null (Zero Hour). [483] The number of civilians killed during the Second World War was unprecedented in the history of warfare. [484] As a result, Nazi ideology and the actions taken by the regime are almost universally regarded as gravely immoral. [485] Historians, philosophers, and politicians often use the word "evil" to describe Hitler and the Nazi regime. [486] Interest in Nazi Germany continues in the media and the academic world. While Evans remarks that the era "exerts an almost universal appeal because its murderous racism stands as a warning to the whole of humanity", [487] young neo-Nazis enjoy the shock value the use Nazi symbols or slogans provides. [488] The display or use of Nazi symbolism such as flags, swastikas, or greetings is illegal in Germany and Austria. [489] [490] See also Explanatory notes 1. The Horst-Wessel-Lied has never been an official anthem of Nazi Germany. It was ordered to be played right after the official anthem Deutschlandlied by Reichsinnenminister Wilhelm Frick on 12 July 1933. Tümmler 2010, p. 63. 2. 1 2 Including de facto annexed and incorporated territories. 1. Lauryssens 1999, p. 102. 3. Evans 2003, pp. 103–108. 4. Evans 2003, pp. 186–187. 5. Evans 2003, pp. 170–171. 6. Goldhagen 1996, p. 85. 7. Evans 2003, pp. 179–180. 8. 1 2 Kershaw 2008, p. 81. 9. Evans 2003, pp. 180–181. 10. Evans 2003, pp. 181, 189. 11. Childers 2017, p. 103. 12. Shirer 1960, pp. 136–137. 13. Goldhagen 1996, p. 87. 14. Evans 2003, pp. 293, 302. 15. Shirer 1960, pp. 183–184. 16. Evans 2003, pp. 329–334. 17. Evans 2003, p. 354. 18. Evans 2003, p. 351. 19. Shirer 1960, p. 196. 20. Evans 2003, p. 336. 21. Evans 2003, pp. 358–359. 22. Shirer 1960, p. 201. 23. Shirer 1960, p. 199. 24. Evans 2005, pp. 109, 637. 25. McNab 2009, p. 14. 26. Bracher 1970, pp. 281–87. 27. 1 2 Shirer 1960, p. 200. 28. Evans 2005, p. 109. 29. Koonz 2003, p. 73. 30. 1 2 Shirer 1960, p. 202. 31. Shirer 1960, p. 268. 32. Evans 2005, p. 14. 33. Cuomo 1995, p. 231. 34. 1 2 McNab 2009, p. 54. 35. McNab 2009, p. 56. 36. Kershaw 2008, pp. 309–314. 37. Evans 2005, pp. 31–34. 38. Overy 2005, p. 63. 39. Evans 2005, p. 44. 40. Shirer 1960, pp. 226–227. 41. Kershaw 2008, p. 317. 42. Shirer 1960, p. 230. 43. Kershaw 2001, pp. 50–59. 44. Evans 2003, p. 344. 45. Evans 2008, map, p. 366. 46. Walk 1996, pp. 1–128. 47. Friedländer 2009, pp. 44–53. 48. Fritzsche 2008, pp. 76–142. 49. Hildebrand 1984, pp. 20–21. 50. Childers 2017, p. 248. 51. Shirer 1960, p. 209. 52. Shirer 1960, pp. 209–210. 53. Evans 2005, p. 618. 54. Shirer 1960, pp. 210–212. 55. Evans 2005, pp. 338–339. 56. Evans 2005, p. 623. 57. Kitchen 2006, p. 271. 58. Evans 2005, p. 629. 59. Evans 2005, p. 633. 60. 1 2 Evans 2005, pp. 632–637. 61. Evans 2005, p. 641. 62. Shirer 1960, p. 297. 63. Steiner 2011, pp. 181–251. 64. Evans 2005, pp. 646–652. 65. Evans 2005, p. 667. 66. Kershaw 2008, p. 417. 67. Kershaw 2008, p. 419. 68. Evans 2005, pp. 668–669. 69. 1 2 Evans 2005, pp. 671–674. 70. Evans 2005, p. 683. 71. Beevor 2012, p. 24. 72. Mazower 2008, pp. 264–265. 73. Weinberg 2010, p. 60. 74. Evans 2005, pp. 689–690. 75. Kershaw 2008, p. 486. 76. Evans 2005, p. 691. 77. Kershaw 2008, p. 496. 78. Snyder 2010, p. 116. 79. Molotov-Ribbentrop Pact, 1939, Secret Additional Protocols. Articles I-IV. 80. Mazower 2008, chapter 9. 81. Weinberg 2005, p. 414. 82. Martin 2005, p. 279–80. 83. Evans 2005, pp. 699–701. 84. Beevor 2012, pp. 22, 27–28. 85. Beevor 2012, p. 32. 86. Longerich 2010, pp. 148–149. 87. Longerich 2010, p. 144. 88. Evans 2008, p. 15. 89. Beevor 2012, p. 40. 90. Mazower 2008, p. 260. 91. Beevor 2012, pp. 73–76. 92. Evans 2005, p. 120. 93. Shirer 1960, p. 709. 94. Beevor 2012, pp. 70–71, 79. 95. Shirer 1960, p. 715-719. 96. 1 2 Shirer 1960, pp. 696–730. 97. Kershaw 2008, p. 562. 98. Mazower 2008, p. 265. 99. Evans 2008, pp. 333–334. 100. Mazower 2008, p. 271. 101. Mazower 2008, pp. 272, 279. 102. 1 2 Mazower 2008, p. 262. 103. Shirer 1960, pp. 753, 774–782. 104. Kershaw 2000b, pp. 301–303, 309–310. 105. Harding 2006. 106. Evans 2008, p. 151. 107. Kershaw 2008, p. 584. 108. Evans 2008, p. 149. 109. Evans 2008, p. 153. 110. Shirer 1960, pp. 815–816. 111. Tomasevich 1975, p. 52–53. 112. Richter 1998, p. 616. 113. Evans 2008, pp. 160–161. 114. Evans 2008, pp. 189–190. 115. Stolfi 1982, pp. 32–34, 36–38. 116. Stolfi 1982, pp. 45–46. 117. Shirer 1960, pp. 900–901. 118. Evans 2008, p. 43. 119. Mazower 2008, pp. 284–287. 120. Mazower 2008, p. 290. 121. Glantz 1995, pp. 108–110. 122. Melvin 2010, pp. 282, 285. 123. Evans 2008, pp. 413, 416–417. 124. Evans 2008, pp. 419–420. 125. Kershaw 2011, p. 208. 126. Shirer 1960, p. 1007. 127. Evans 2008, p. 467. 128. Evans 2008, p. 471. 129. Evans 2008, pp. 438–441. 130. Evans 2008, p. 461. 131. Beevor 2012, pp. 576–578. 132. Beevor 2012, pp. 604–605. 133. Shirer 1960, p. 1072. 134. Shirer 1960, pp. 1090–1097. 135. 1 2 Kershaw 2008, pp. 910–912. 136. Kershaw 2011, pp. 224–225. 137. Shirer 1960, p. 1108. 138. Kershaw 2008, pp. 954–955. 139. Beevor 2002, p. 386. 140. Shirer 1960, p. 1126. 141. Beevor 2002, p. 381. 142. Beevor 2002, pp. 400–403. 143. Evans 2008, p. 714. 144. Kershaw 2011, pp. 355–357. 145. Lakotta 2005, pp. 218–221. 146. Goeschel 2009, p. 165. 147. Hubert 1998, p. 272. 148. 1 2 Overmans 2000, p. Bd. 46. 149. Overy 2014, pp. 306–307. 150. Germany Reports 1961, p. 62. 151. Bundesarchiv, "Euthanasie" im Nationalsozialismus. 152. Hoffmann 1996, p. xiii. 153. Beevor 2002, pp. 31–32, 409–412. 154. Time, 9 July 1979. 155. Pilisuk & Rountree 2008, p. 136. 156. Douglas 2012, p. 1. 157. Die deutschen Vertreibungsverluste, 1939/50, pp. 38, 46. 158. Overmans 1994, pp. 51–63. 159. Haar 2009, pp. 363–381. 160. Hahn & Hahnova 2010, pp. 659–726. 161. Evans 2003, p. 62. 162. Evans 2005, pp. 623, 646–652. 163. Shirer 1960, pp. 461–462. 164. Shirer 1960, p. 1005. 165. Wedekind 2005, p. 111. 166. Khatyn State Memorial Complex. 167. 1 2 Evans 2008, p. 373. 168. Longerich 2010, p. 147. 169. Umbreit 2003, p. 26. 170. Berlin Declaration 1945. 171. Hitchcock 2004, pp. 19–25. 172. Clark 2006, p. xii. 173. Hitchcock 2004, p. 145. 174. Smith & Davis 2005, pp. 289–290. 175. Boczek 2005, p. 134. 176. Evans 2005, pp. 6–9. 177. Kershaw 2008, p. 204. 178. Kershaw 2008, pp. 146–147. 179. Evans 2008, p. 7. 180. 1 2 Bendersky 2007, p. 161. 181. 1 2 3 Gellately 1996, pp. 270–274. 182. Bytwerk 1998. 183. 1 2 Longerich 2010, p. 49. 184. 1 2 3 Evans 2008, p. 759. 185. Evans 2005, pp. 7, 443. 186. Evans 2005, pp. 210–211. 187. Evans 2005, pp. 121–122. 188. Kershaw 2008, pp. 170, 172, 181. 189. Evans 2005, p. 400. 190. Kershaw 2008, pp. 105–106. 191. Gill 2006, p. 259. 192. Kershaw 2001, p. 253. 193. Kershaw 2008, pp. 320–321. 194. McElligott, Kirk & Kershaw 2003, p. 6. 195. Speer 1971, p. 281. 196. Manvell & Fraenkel 2007, p. 29. 197. Evans 2005, pp. 48–49. 198. Freeman 1995, p. 6. 199. Evans 2005, pp. 14–15, 49. 200. Evans 2005, p. 49. 201. Evans 2005, pp. 43–44. 202. Evans 2005, p. 45. 203. Evans 2005, p. 46. 204. 1 2 Evans 2005, p. 75. 205. Evans 2005, p. 76. 206. Evans 2005, pp. 79–80. 207. Evans 2005, pp. 68, 70. 208. Evans 2008, p. 514. 209. Evans 2005, p. 72. 210. Weale 2012, p. 154. 211. Evans 2005, p. 73. 212. Evans 2005, pp. 539, 551. 213. Gellately 2001, p. 216. 214. Kershaw 2008, p. 346. 215. 1 2 Evans 2005, p. 544. 216. Kershaw 2008, p. 347. 217. Evans 2005, pp. 43–45. 218. Longerich 2010, p. 146. 219. Longerich 2010, pp. 242–247. 220. Kershaw 2000b, p. 467. 221. Longerich 2010, p. 198. 222. Longerich 2010, p. 207. 223. Constable 1988, pp. 139, 154. 224. Evans 2008, pp. 760–761. 225. Weale 2012, pp. 15–16. 226. Weale 2012, pp. 70, 166. 227. Weale 2012, p. 88. 228. Kershaw 2008, p. 306. 229. Tooze 2006, p. 67. 230. Kershaw 2008, pp. 306–313. 231. Kershaw 2008, p. 313. 232. Weale 2012, pp. 1, 26–29. 233. Longerich 2012, pp. 113, 255. 234. Longerich 2012, pp. 122–123. 235. Stein 2002, pp. 18, 287. 236. Weale 2012, p. 195. 237. Wegner 1990, pp. 307, 313, 325, 327–331. 238. Stein 2002, pp. 75–76, 276–280. 239. Wiederschein 2015. 240. Bartrop & Jacobs 2014, p. 1424. 241. Longerich 2012, p. 215. 242. Kershaw 2008, pp. 518–519. 243. Rhodes 2002, p. 257. 244. Weale 2012, p. 116. 245. 1 2 Evans 2008, p. 318. 246. Longerich 2012, p. 125. 247. Longerich 2012, pp. 212–213. 248. Weale 2012, p. 411. 249. Sereny 1996, pp. 323, 329. 250. Evans 2008, p. 343. 251. 1 2 3 4 DeLong 1997. 252. Evans 2005, p. 345. 253. Tooze 2006, pp. 125–127. 254. Tooze 2006, p. 131. 255. Tooze 2006, pp. 106, 117–118. 256. Evans 2005, pp. 322–326, 329. 257. Evans 2005, p. 320. 258. Evans 2005, pp. 330–331. 259. Evans 2005, p. 166. 260. Evans 2005, pp. 327–328, 338. 261. Evans 2005, pp. 328, 333. 262. 1 2 Evans 2005, p. 331. 263. 1 2 Kershaw 2008, p. 289. 264. McNab 2009, pp. 54, 71. 265. Tooze 2006, pp. 61–62. 266. Evans 2005, pp. 357–360. 267. Evans 2005, p. 360. 268. Evans 2005, pp. 141–142. 269. McNab 2009, p. 59. 270. Overy 2006, p. 252. 271. Speer 1971, pp. 263–264. 272. Evans 2008, p. 333. 273. Speer 1971, p. 337. 274. Fest 1999, pp. 142–44, 146–50. 275. Beyer & Schneider. 276. Panayi 2005, pp. 490, 495. 277. Hamblet 2008, pp. 267–268. 278. Nazi forced labour 1942. 279. Special treatment 1942. 280. Holocaust Memorial Museum: Women in the Third Reich. 281. Evans 2008, p. 361. 282. Evans 2008, pp. 358–359. 283. Davis 1995. 284. Speer 1971, pp. 524–527. 285. Overy 2006, pp. 128–130. 286. 1 2 Shirer 1960, p. 943. 287. 1 2 Shirer 1960, p. 945. 288. Spotts 2002, pp. 377–378. 289. Manvell 2011, pp. 283–285. 290. Shirer 1960, p. 946. 291. Evans 2008, p. 334. 292. 1 2 Shirer 1960, p. 944. 293. Shirer 1960, pp. 943–944. 294. Longerich 2010, pp. 30–32. 295. Shirer 1960, p. 203. 296. Majer 2003, p. 92. 297. Majer 2003, p. 60. 298. Longerich 2010, pp. 38–39. 299. Longerich 2010, pp. 67–69. 300. Longerich 2010, p. 41. 301. Shirer 1960, p. 233. 302. Kitchen 2006, p. 273. 303. Longerich 2010, p. 112–113. 304. Longerich 2010, p. 117. 305. Longerich 2010, p. 127. 306. 1 2 Evans 2005, pp. 555–558. 307. 1 2 Holocaust Memorial Museum: Genocide of European Roma. 308. Longerich 2010, pp. 138–141. 309. Evans 2008, pp. 75–76. 310. 1 2 Kershaw 2008, p. 295. 311. Longerich 2010, pp. 47–48. 312. Niewyk & Nicosia 2000, p. 45. 313. 1 2 Kershaw 2000a, p. 111. 314. Berghahn 1999, p. 32. 315. Powszechna PWN 2004, p. 267. 316. Heinemann et al. 2006. 317. 1 2 Snyder 2010, p. 416. 318. Overy 2005, p. 544. 319. Nicholas 2006, p. 247. 320. Lukas 2001, p. 113. 321. Sereny 1999. 322. Kershaw 2008, p. 683. 323. Snyder 2010, pp. 162–163, 416. 324. Dorland 2009, p. 6. 325. Rummel 1994, table, p. 112. 326. Hosking 2006, p. 242. 327. Smith 1994, p. 204. 328. Longerich, Chapter 17 2003. 329. Longerich 2012, pp. 555–556. 330. Evans 2008, pp. 256–257. 331. Browning 2005, pp. 188–190. 332. Longerich 2010, pp. 279–280. 333. Holocaust Memorial Museum: Children. 334. Fleming 2014, pp. 31–32, 35–36. 335. Evans 2008, pp. 559–560. 336. Evans 2008, pp. 555–556, 560. 337. Evans 2008, pp. 560–561. 338. Materski & Szarota 2009, p. 9. 339. Wrobel 1999. 340. Shirer 1960, p. 952. 341. Goldhagen 1996, p. 290. 342. Evans 2008, pp. 295–296. 343. Shirer 1960, p. 954. 344. Shirer 1960, pp. 951, 954. 345. Nakosteen 1965, p. 386. 346. Pine 2011, pp. 14–15, 27. 347. Shirer 1960, p. 249. 348. Evans 2005, p. 270. 349. Evans 2005, p. 269. 350. Evans 2005, pp. 263–264, 270. 351. 1 2 3 Evans 2005, p. 264. 352. Shirer 1960, p. 255. 353. Pine 2011, pp. 13–40. 354. Evans 2005, pp. 263–265. 355. Farago 1972, p. 65. 356. Evans 2005, p. 265. 357. Evans 2005, p. 292. 358. Evans 2005, pp. 302–303. 359. Evans 2005, p. 305. 360. Evans 2005, pp. 295–297. 361. Evans 2005, p. 293. 362. Evans 2005, p. 299. 363. 1 2 Evans 2005, pp. 516–517. 364. Heidelberg University Library. 365. Rupp 1978, p. 45. 366. Evans 2005, pp. 518–519. 367. Evans 2005, pp. 332–333. 368. Evans 2005, p. 369. 369. Kershaw 2008, p. 749. 370. McNab 2009, p. 164. 371. Stephenson 2001, p. 70. 372. Evans 2005, p. 297. 373. Pauley 2003, pp. 119–137. 374. Overy 2005, p. 248. 375. Rupp 1978, pp. 45–46. 376. Evans 2005, p. 272. 377. Grunberger 1971, p. 278. 378. Biddiscombe 2001, pp. 612, 633. 379. Biddiscombe 2001, p. 612. 380. Rupp 1978, pp. 124–125. 381. 1 2 Longerich 2012, p. 370. 382. 1 2 3 Longerich 2012, p. 371. 383. Evans 2005, p. 521. 384. Evans 2005, p. 515. 385. Proctor 1999, p. 196. 386. Proctor 1999, p. 198. 387. Proctor 1999, p. 203. 388. Evans 2005, p. 319. 389. Proctor 1999, p. 40. 390. Busse & Riesberg 2004, p. 20. 391. Evans 2008, p. 611. 392. Evans 2008, p. 608. 393. Evans 2008, pp. 609–661. 394. Evans 2008, p. 612. 395. DeGregori 2002, p. 153. 396. Hanauske-Abel 1996, p. 10. 397. Uekötter 2006, p. 56. 398. Closmann 2005, pp. 30–32. 399. Closmann 2005, pp. 18, 30. 400. Uekötter 2005, pp. 113, 118. 401. Evans 2005, p. 222. 402. Holocaust Memorial Museum: The German Churches and the Nazi State. 403. Ericksen & Heschel 1999, p. 10. 404. Shirer 1960, p. 237. 405. 1 2 3 Shirer 1960, p. 240. 406. Shirer 1960, pp. 234–238. 407. Evans 2005, pp. 220–230. 408. Kershaw 2008, pp. 295–297. 409. 1 2 3 4 Berben 1975, p. 140. 410. 1 2 Shirer 1960, pp. 238–239. 411. Shirer 1960, p. 239. 412. Berben 1975, pp. 276–277. 413. Kershaw 2008, p. 332. 414. Kershaw 2008, p. 290. 415. Evans 2005, pp. 234–235. 416. Gill 1994, p. 57. 417. 1 2 Shirer 1960, pp. 234–235. 418. Kershaw 2008, p. 315. 419. Lewis 2000, p. 45. 420. Conway 2001, p. 92. 421. Evans 2005, pp. 226, 237. 422. Evans 2005, pp. 239–240. 423. Evans 2005, pp. 241–243. 424. Evans 2005, pp. 245–246. 425. Fest 1996, p. 377. 426. Evans 2005, p. 244. 427. Holocaust Memorial Museum: Dachau. 428. Berben 1975, pp. 141–142. 429. Libionka, The Catholic Church in Poland. 430. Davies 2003, pp. 86, 92. 431. Klemperer 1992, pp. 4–5. 432. Cox 2009, pp. 33–36. 433. Shirer 1960, p. 372. 434. Hoffmann 1988, p. 2. 435. Evans 2008, pp. 626–627. 436. Evans 2008, pp. 625–626. 437. Evans 2008, pp. 626–269. 438. Evans 2008, pp. 634, 643. 439. Gill 1994, p. 2. 440. Evans 2008, p. 630. 441. Evans 2005, pp. 669–671. 442. Shirer 1960, p. 659. 443. Evans 2008, p. 631. 444. Evans 2008, p. 635. 445. Kershaw 2008, pp. 816–818. 446. Shirer 1960, pp. 1048–1072. 447. Grunberger 1971, p. 18. 448. Kershaw 2008, pp. 182, 203, 272. 449. Evans 2005, pp. 465–467. 450. Shirer 1960, p. 265. 451. Shirer 1960, pp. 241–242. 452. Evans 2005, pp. 133–135. 453. Evans 2005, p. 136. 454. 1 2 Evans 2005, p. 16. 455. Evans 2005, pp. 143–144. 456. Shirer 1960, p. 149. 457. Dussel 2010, pp. 545, 555–557. 458. Evans 2005, pp. 146–147. 459. Dussel 2010, pp. 561. 460. Evans 2005, pp. 152–159. 461. Shirer 1960, p. 241. 462. Scobie 1990, p. 92. 463. Evans 2005, p. 181. 464. Speer 1971, pp. 92, 150–151. 465. Speer 1971, pp. 115–116, 190. 466. Evans 2005, p. 168. 467. Evans 2005, p. 169. 468. Shirer 1960, pp. 243–244. 469. Evans 2005, pp. 171, 173. 470. Evans 2005, p. 187. 471. Evans 2005, p. 199. 472. Evans 2005, p. 204. 473. Evans 2005, pp. 199–200. 474. Evans 2005, p. 130. 475. SPIO, Department of Statistics. 476. Evans 2005, pp. 130–132. 477. The Daily Telegraph, 2003. 478. Evans 2005, pp. 125–126. 479. 1 2 Evans 2008, p. 741. 480. Shirer 1960, p. 1143. 481. Marcuse 2001, p. 98. 482. Rees 2005, pp. 295–96. 483. Fischer 1995, p. 569. 484. Murray & Millett 2001, p. 554. 485. Kershaw 2000a, pp. 1–6. 486. Welch 2001, p. 2. 487. Evans 2009, p. 56. 488. 1 2 The Economist 2015. 489. Strafgesetzbuch, section 86a. 490. Allied Agreement 1945. 491. Evans 2008, pp. 748–749. 492. 1 2 3 Sontheimer 2005. • Beevor, Antony (2012). The Second World War . New York, NY: Little, Brown. ISBN   978-0-316-02374-0. • Berben, Paul (1975). Dachau 1933–1945: The Official History. London: Norfolk Press. ISBN   0-85211-009-X. • Berghahn, Volker R. (1999). "Germans and Poles, 1871–1945". In Bullivant, Keith; Giles, Geoffrey; Pape, Walter. Germany and Eastern Europe: Cultural Identities and Cultural Differences. Yearbook of European Studies. Amsterdam and Atlanta, GA: Rodopi. ISBN   90-420-0688-9. • Boczek, Bolesław Adam (2005). International Law: A Dictionary. Lanham, MD: Scarecrow Press. ISBN   0-8108-5078-8. • Bracher, Karl Dietrich (1970). The German Dictatorship. Translated by Jean Steinberg. New York, NY: Penguin Books. ISBN   0-14-013724-6. • Constable, George, ed. (1988). Fists of Steel. The Third Reich. Alexandria, VA: Time-Life Books. ISBN   0-8094-6966-9. • Conway, John S (2001). The Nazi Persecution of the Churches, 1933–1945. Vancouver: Regent College Publishing. ISBN   1-57383-080-1. • Cuomo, Glenn R. (1995). National Socialist Cultural Policy. New York, NY: Palgrave MacMillan. ISBN   978-0-312-09094-4. • Davies, Norman (2003). Rising '44: the Battle for Warsaw. New York, NY: Viking. ISBN   0-670-03284-0. • DeGregori, Thomas R. (2002). Bountiful Harvest: Technology, Food Safety, and the Environment . Washington: Cato Institute. ISBN   1-930865-31-7. • Dussel, Konrad (2010). "Wie erfolgreich war die nationalsozlalistische Presselenkung?" [How Successful was National Socialist Control of the Daily Press?]. Vierteljahrshefte für Zeitgeschichte (in German). Munich: Institut für Zeitgeschichte. 58 (4): 543–561. doi:10.1524/vfzg.2010.0026.(subscription required) • Encyklopedia Powszechna PWN (in Polish). 3. Warsaw: Państwowe Wydawnictwo Naukowe. 2004. ISBN   83-01-14179-4. • Ericksen, Robert P.; Heschel, Susannah (1999). Betrayal: German Churches and the Holocaust. Minneapolis: Augsberg Fortress. ISBN   0-8006-2931-0. • Evans, Richard J. (2003). The Coming of the Third Reich . New York, NY: Penguin. ISBN   978-0-14-303469-8. • Evans, Richard J. (2005). The Third Reich in Power. New York, NY: Penguin. ISBN   978-0-14-303790-3. • Evans, Richard J. (2008). The Third Reich at War. New York, NY: Penguin. ISBN   978-0-14-311671-4. • Evans, Richard J. (2009). Cosmopolitan Islanders: British Historians and the European Continent. Cambridge; New York, NY: Cambridge University Press. ISBN   978-0-521-19998-8. • Farago, Ladislas (1972) [1942]. German Psychological Warfare. International Propaganda and Communications. New York, NY: Arno Press. ISBN   978-0-405-04747-3. • Fest, Joachim (1999). Speer: The Final Verdict. translated by Ewald Osers and Alexandra Dring. Harcourt. ISBN   978-0-15-100556-7.
You are here Handling Treated Seed Planting seed treated with an insecticide or fungicide gives the plant a fighting chance by safeguarding against disease, which then optimizes yields. However, it’s critical that farmers follow handling instructions on the seed bag label to avoid environmentally-sensitive exposure to the chemicals. Liz Stahl is an Extension crop educator at the University of Minnesota. She says treated seed can generate dust, which is often harmful to pollinators such as bees. Do what you can to cut down the dust. "There’s a lot of work being done on that. I know seed companies are looking at different polymers, also it’s an equipment manufacturer issue too. One thing that we recommend farmers do is just be aware of where you’re filling up the planter, cleaning out the planter," says Stahl. "Wherever you’ve got flowering plants, basically you can expect bees to be out there foraging so if you can fill or clean out that planter away from flowering plants, that’s going to really help." Treated seed spilled on the ground should be cleaned up or covered with soil because it can be toxic for birds and wildlife.  Any seed that’s not used should be disposed of properly. Stahl says there is zero tolerance in the export market for treated seed. "There’s a good reason why treated seed has a colorant on there, so it’s easily identifiable as being treated. You hear horror stories every once in awhile somebody just took a bag of left over treated seed, threw it in the wagon, and brought it to the elevator. Well, you can pick up that colored seed pretty easily, and you can get that whole lot rejected," she says. "That’s a pretty expensive mistake." Find more tips for handling treated seed  Most Recent Poll What condition are your crops?
Energy-Aware Network Control Approaches Energy-Aware Network Control Approaches DOI: 10.4018/978-1-5225-1952-2.ch005 Energy is considered as valuable resource for loT network, because the devices used for loT applications are low power-battery operated nodes. In some applications the devices are placed in remote area, when battery of the device would drain out its power, it is difficult to replace the battery. Radio Frequency (RF) energy transfer and harvesting techniques have recently become alternative methods to overcome the barriers that prevent the real world wireless device deployment. Meanwhile, for cellular networks, the base stations (BSs) account for more than 50 percent of the energy consumption of the networks. Therefore, reducing the power consumption of BSs is crucial to energy efficient wireless networks. It can also subsequently reduce the carbon footprints. In this chapter, we focus our attention on the energy-aware IoT control algorithms. For the next-generation IoT systems, they will be key techniques. Chapter Preview The Radio Frequency Based Energy Transfer (Rfet) Scheme The Radio Frequency based Energy Transfer (RFET) scheme is developed as a novel energy harvesting scheme for the Cognitive Radio (CR) network system. Using the sequential game model, data transmission and energy harvesting in each device are dynamically scheduled. The RFET scheme can capture the wireless channel state while considering multiple device interactions. In a distributed manner, individual devices adaptively adjust their decisions based on the current system information while maximizing their payoffs. When data collision occurs, the sequential bargaining process in the RFET scheme can coordinates this problem to optimize social fairness. Complete Chapter List Search this Book:
Previous research has linked the so-called second-generation antipsychotics to an increased risk of diabetes in adults. And there's been some evidence that the drugs can cause weight gain in children. The drugs are used to treat conditions like bipolar disorder, schizophrenia and irritability and aggression in children with autism. They are also sometimes given to children with attention-deficit hyperactivity disorder (ADHD), even though there's no research evidence to support that. And it's the growing use of the drugs in kids -- particularly for conditions in which the benefit is unclear -- that makes the potential diabetes risk concerning, according to Dr. Jonathan Mink, chief of child neurology at the University of Rochester Medical Center in New York. "These medications can be very helpful in certain settings," said Mink, who is also part of a pediatric advisory panel to the U.S. Food and Drug Administration. In September, the panel recommended that the agency keep monitoring the risks of weight gain and diabetes in children on antipsychotics. The drugs are often effective, for example, in managing aggressive behavior in children with autism. In other cases -- like ADHD, Mink noted -- the effectiveness, if any, has not been established. Exactly why antipsychotics would lead to diabetes in some children is not clear. It's known that they can spur weight gain, but Mink said that "it's hard to argue that it's just weight gain." In this study, kids on antipsychotics who developed diabetes were diagnosed an average of 4.5 months after starting the drug. That's a short period of time, Mink noted. And it's not clear, he said, exactly how the drugs could lead to diabetes in that time frame. "The take-home from this study, to me, is that this (risk) is real," Mink said. "It's something we should take seriously." Antidepressants can cause weight gain. And there's some evidence, Andrade's team notes, that the drugs are related to diabetes risk -- but studies have come to conflicting findings on that. For now, Mink said that parents of children on antipsychotics should be sure their doctor regularly checks their child's weight and blood sugar, to detect any signs of trouble early. And if your child's doctor recommends an antipsychotic, Mink said, don't hesitate to ask questions -- including whether there are any alternative treatments, and what the plan will be for monitoring your child for side effects. U.S. researchers have found that children's use of antipsychotics increased by 65 percent from 2002 to 2009, primarily through prescriptions for teenagers.
domingo, 11 de octubre de 2009 This is your assignment Two weeks without your English teacher, that seems to be a very long time. So, what can you do in order to keep you studying English during these two weeks? Remember that your main task is to interview one of your classmates (in English, of course) and find out as much as you can about him/her. After that, you'll have to write a personal description and prepare to speak about it for at least two minutes in the classroom. In order to help you with this work, I have selected some audio files for you to practice: click on the following links, press PLAY, listen to the podcast and in some cases, there are some exercises to follow. When you have listened to them and completed the exercises, please write a comment or send me an email with your opinion about the different links. • link 1 (2 exercises, press PLAY and fill in the gaps) • link 2 (1 exercise, press PLAY and fill in the gaps) • link 3 (listen to the description of a character in the TV series "House") 2 comentarios: 1. I think the exercises are very good, but alittle boring. The old man from Liverpool and the woman from New York speak a little fast to us understand them, I think. The students listening is easier than the others, and they make a mistake because in question number 8 they say: " 2000 euros per month". And it isn't a possible answer. See you next week, teacher. From Fran. 2. I didn't have problems to solve first two links, but last one, for me, was very difficult to understand. I hope you had a good time in France. See you tomorrow.
Othello the importance of war Freebooksummarycom ✅ othello essay- importance of war othello is a man of war- it is all he has ever known and he has now proved himself a. 'in war, events of importance are the result of trivial causes' the royal banner, and all quality, pride, pomp, and circumstance of glorious war' othello. Othello study guide contains a biography of william shakespeare, literature storms are always of great significance in shakespeare here, the storm is a however, this isn't war that othello is in, and things are not as. (3) how important is the issue of race in othello's downfall (4) how that a mil hary general of such repute in the fie 1 d of war does not see the truth about i. Many critics read othello as an extended war allegory: it is possible to see iago's does othello seem torn between his role as a soldier and his role as a lover. Though in the trade of war i have slain men, yet do i hold it very stuff o' the conscience 15 i,2,209 nay, but he prated, and spoke such scurvy and provoking. War the character of desdemona the setting of cyprus in shakespeare's acclaimed play of othello, setting has played a significant role in the development and. Featuring jude sandy as othello, rebecca gibel as desdemona, and stephen thorne as iago community partners the naval war college daughters of. War between turks and venice fleet invading the island of cyprus draws othello launched a full scale invasion of cyprus, a large, strategically important. A summary of themes in william shakespeare's othello hath made the flinty and steel couch of war / my thrice-driven bed of down” (iiii227–229) isolation enables many of the play's most important effects: iago frequently speaks in. The truth of the turks and the moor in othello: notes on representation, rationality, with aristotle we can see the emerging importance of language as between the relationship the venetians have with the turks (war) in the play and the. Othello's role as an important figure in the army and the respect given to him from references to war in the line “i won his daughter” (95) implies othello is. Why should you care about war in william shakespeare's othello we have the answers here, in a quick and easy way. Othello the importance of war The significance of honour to othello's central characters mobilizes the tragic a principal element in a soldier's life, as many wars are fought on the basis of. Culture wars and language arts education: readings of othello as a there is overwhelming consensus that concepts of culture play a central role in how we. Bombast is cotton stuffing circumstance is wordy rigmarole and epithets of war are military terms in short, iago accuses othello of using phony military. Othello quest is a free online othello game server created to be beginner friendly, simple and speedy. (basketball is the) most likely version of war for a high school setting it was important for the writer and me to follow shakespeare's play because the original . Shakespeare's classic othello a respected and successful political leader faces war has come to cyprus the island lies crippled under siege from the most feared and brenton herwat fills the role of desmond may 18th through may 20th. The first recorded performance of shakespeare's play othello, the moor of venice played the role in some sort of blackface makeup, to suggest othello's race aldridge was considering returning to perform in america after the civil war, but. Free essay: marriage and power in othello there is more to shakespeare's othello it is important to find out who these people really areshow more content not yet married, othello would tell stories of the wars that he had fought in. The significance of war in othello - download as word doc (doc / docx), pdf file (pdf), text file (txt) or read online shakespeare class essay. Ken jacobsen „ the “machiavellian moment” in othello 499 stantively machiavellian reading of the play and for the importance of the art of war to an adequate. othello the importance of war When iago accuses desdemona of adultery, othello asks for proof marriage by refusing to house her while othello's at war with the turks roderigo works to . othello the importance of war When iago accuses desdemona of adultery, othello asks for proof marriage by refusing to house her while othello's at war with the turks roderigo works to . Othello the importance of war Rated 5/5 based on 46 review
Writing in script A script serves a a plan for a movie or a play you might want to refer to a few script writing examples and samples found in this source. How to write a script scripts are good setups for writing and maneuvering a show whether you're writing it for an upcoming show, or just trying to see how your talents can be shown, to write a script, follow these guidelines. English script lettering is a spiky, graceful way of writing that evokes images of 19th-century england while this method of writing may look difficult, it is, in fact, easy to do if you have some patience and an artistic eye. writing in script Basic javascript a tutorial in the fundamentals of javascript programming learn what it is, what it can do, and how to write a basic script event handlers. Free printable cursive writing worksheets - cursive alphabet, cursive letters, cursive words, cursive sentences practice your penmanship with these handwriting worksheets from k5 learning. When you are writing a script there are certain technicalities you need to understand outside of the creative process such as script formatting and using the correct film language, and while at first learning the rules of screenwriting may feel like a distraction from actually writing your story and script, it won't take long for you to get . Cursive (also known as script or longhand, among other names) is any style of penmanship in which some characters are written joined together in a flowing manner, generally for the purpose of making writing faster formal cursive is generally joined, but casual cursive is a combination of joins and pen lifts. If you do, you can write a batch file in its simplest form, a batch file (or batch script) is a list of several commands that are executed when you double-click the . If you dream of making it in hollywood, seeing your words translated into film, or turned into the next great indie project, you’re at the right place get insights into writing the perfect spec script, crafting scenes, and developing that perfect opening plot point and learn even more at . Writing into the html output using documentwrite() writing into an alert box, using windowalert() writing into the browser console, using consolelog() . Screenwriting, also called scriptwriting, is the art and craft of writing scripts for mass media such as feature films, television productions or video games it is often a freelance profession screenwriters are responsible for researching the story, developing the narrative, writing the script, screenplay, dialogues and delivering it, in the . All handwriting practice worksheets have are on primary writing paper with dotted lines so students learn to form the heights of the letters correctly all worksheets have letters for students to trace and space to practice writing the letters on their own. You must work backwards it is the only way to write a documentary script once you have collected your research, data, and interviews, only then can you write the script. Learn how to write a screenplay the right way with this script writing example and screenwriting tips you'll also find the best software for writers and more. Writing a script a shell script is a file that contains ascii text to create a shell script, you use a text editor a text editor is a program, like a word . Article writing & content writing projects for $250 - $750 i need a few script writing that can be used in videos i will be talking in much concepts and angles to address the content but it must get people to want to buy a product so the emotions and credibi. A great brand video starts with a great video script voiceover, music, visuals—these devices enhance your story, but that story needs to be on paper first for that reason, there’s a great deal of responsibility at this stage of the video production process the good news is that you can write . The most intuitive, most user-friendly scriptwriting software i've ever used - ed solomon (men in black) writerduet is a modern, professional writing program that features real-time collaboration, seamless online/offline writing, and infinite revision tracking. A process for writing scripts think about what your script must accomplish for example, it might need to connect to the sms namespace (in wmi), find a collection that is based on a collection identifier, and change a property on that collection. Write the script, prepare the shoot, and take your cast and crew into production from script to shoot, celtx kickstarts your production with cloud-based planning . For all writers out there who have even a passing interest in writing a screenplay, this article is your guide to help you turn your prose into a great script. Reading television scripts – find a series that is close to what you are writing, find the pilot script for it, and emulate it as much as possible perhaps the best place to go is script city because it offers you a library of pilot and episode scripts for many, many shows. Writing in script Script writing is the craftsmanship and specialty of composing contents for mass communication, for example, include films, tv production, animation videos or computer games this is normally a freelance job. I put this together to teach cursive to my english language learners my penmanship is not the best, but i hope this will help people make capital and lower . Definition of script for english language learners : to write the script for (a play, movie, television show, etc) : to plan how (something) will happen, be done, etc. Cursive fonts simply emulate cursive handwriting, in which letters are usually connected in a slanted and flowing manner however, for different languages, cursive writing can mean differently, for example, for eastern asian languages like chinese, cursive writing focuses more on the formation and connectedness of strokes within an individual character while for latin, cyrillic and arabic . The most common ways of writing a text file with ps are: set-content cmdlet, which will erase existing data in the file and write your value if the file doesn’t exist, it will be created ie. A script writing template is the thing that can work wonders for your play as it helps you to make scene by scene sequence of your story in a single format these templates give you an appropriate way to make your artist connect necessary feel, expressions and dialogues together thus resulting in a powerful presentation of your imagination. Just like printing, cursive writing is typically not presented in alphabetical order i've chosen to present the letters in groups that are formed in a similar manner (you'll find this is what most schools do). ‘each scroll was labeled along its edge in the flowing script used in most writing’ ‘many of the texts came in the form of original handwritten or typed scripts, which often included artists' notations, sketches, and greetings’. Dan's 2-minute screenwriting school #1 - how your screenplay should look industry format final draft - duration: 2:27 story maps: how to write a great screenplay 17,147 views. writing in script Basic javascript a tutorial in the fundamentals of javascript programming learn what it is, what it can do, and how to write a basic script event handlers. writing in script Basic javascript a tutorial in the fundamentals of javascript programming learn what it is, what it can do, and how to write a basic script event handlers. Writing in script Rated 5/5 based on 30 review
AcI vs present participle By Matthaeus, in 'Latin Grammar Questions', Aug 9, 2018. 1. Matthaeus Vemortuicida strenuus • Civis Illustris Salvete omnes sodales! This query may have come up before, but just to refresh mine and others' knowledge of this particular bit of grammar, what would be the difference in meaning between these two sentences? video puerum in horto ludentem vieo puerum in horto ludere "I see the boy playing in the garden," or "I see the playing boy in the garden," as opposed to "I see THAT the boy plays/is playing in the garden." Surely there has to be some nuance. I'd be interested to see your replies. Any comments appreciated! Terry S. likes this. 2. Iáson Cívis Illústris • Civis Illustris Something like this? ōlim in trīclīniō aestīvō cuiiusdam amīcī sedēbam, ē quō hortum īnspicere poterāmus. 'ecce', inquam, 'videō puerum in hortō lūdentem.' 'minimē vērō', respondit ille, 'nam haec est tabula picta in hortō posita. puer enim est in ātriō, quod nōn hinc vidēre possimus, ubi lūdit gladiō suō - gladiātōrum spectāculum magnoperē illī placet.' subitō clāmor perterritus ortus est. 'ēheu,' inquam, 'videō puerum tuum iam cum meō servō lūdere.' 3. Iáson Cívis Illústris • Civis Illustris I guess fundamentally I think that when the present participle is used, the 'playing' of the boy is presented as in the mind of the speaker of the statement, whereas the infinitive construction presents it as in the mind of the person seeing, because it is dependant on the verb. In this example, however, because the verb of seeing is first person, the two are the same. However, I think there is still a difference, which I tried to show through the story: videō can have a more metaphorical meaning (perceive or realise a fact, rather than directly see an object), and in this sense it must take an indirect statement. Thus when (in the first instance) the speaker was seeing an object, the participle was used, but when the speaker was deducing a fact, the indirect statement appeared. But since seeing an object with a quality X automatically means deducing that that object has quality X, the difference is not usually apparent... But I'm not very certain and I would also be interested in what other people think. 4. Godmy A Monkey • Civis Illustris Anyway, my take on this always was that in the finite clause the participles with the copula ellipsed or not ellipsed (esse+ participle) simply never appear*, the participle is never the predicate of a finite clause, so shouldn't they in non-finite clauses (pseudo-clauses), they shouldn't make a predicate, the predicate (if a verb) should come as infinitive. If it doesn't, then my suspicion is that not being classical/native Latin... or it is and I don't know the examples (which doesn't say much, I don't carry the corpus of the Roman literature in my head). So my suggestion is: let us bring some real examples before we start making judgements about the [native] Latin. And if we don't find anything persuasive enough, then let's go with what I suggested in the first part :) *Like the typical English Latinist beginner's mistake: "laudans est" = "he is praising" 5. Godmy A Monkey • Civis Illustris (That is, if it's not a predicate, then it's a verbal attribute with the predicate [*potentially] following later in a form of inifinitive, e.g. ) Last edited by Godmy, Aug 11, 2018 6. Iáson Cívis Illústris • Civis Illustris I think this is sort of what I was trying to say: if a participle is found in a non-finite clause, it is not a predicate but an attribute, and thus signifies seeing an object, not noticing a fact. Some real examples: Cic. Pro Sestio: Videō P. Sēstium, meae salūtis, vestrae auctōritātis, pūblicae causae dēfēnsōrem, prōpugnātōrem, āctōrem, reum; videō hunc praetextātum eius fīlium oculīs lacrimantibus mē intuentem; ... Cic. In Catilinam: Videō dē istīs quī sē populārīs habērī volunt abesse nōn nēminem, ... I'm not sure if these really bear it out, though? At any rate it supports the object/fact distinction, as in the first instance the statement shows an act of vision, but in the second it conveys a deduction (since Cicero can't literally see these people if they're not there). Godmy likes this. 7. Godmy A Monkey • Civis Illustris Okay, we would agree in that: pretty much that the participle construction in question is not tantamount syntactically to the pseudo-clause of the type ACI... Hm, yes, so pretty much, he doesn't say "I see how this underage boy of his stares at me." but rather something along the lines "I see [also] this underage boy of his, that one who stares/would-stare at me." - if we more or less agree on that interpretation (and syntax wise) then I suppose we agree pretty much. I think that Matt had the idea that they could be treated almost quite as equal - and I don't doubt that there is many otherwise very well written quality non-classical Latin that will use occasionally a participle instead of the infinitive to convey the predicate, not just a verbal attribute and therefore pretty much making it equal to the present active infinitive, but I think we would probably agree on the summary that such treatment wouldn't be entirely correct and that those people (albeit many times perfect and experienced Latinists) may not know then what they are doing in respect to the original Latin. As a counter-example with the same verb (videō) - yeah, the attribute here is the relative clause but the statement is that some-of-them are-present (not-nobody-of-them is-absent), some kind of absentem then wouldn't fill the gap for the predicate and that would be still awaited. (=with the intended meaning) I suppose we conveyed the same using different wording (you tried more to use the everyday language, I went with the technical terms), but having understood one another, I guess there is no disagreement... Last edited by Godmy, Aug 11, 2018 Iáson likes this. 8. Godmy A Monkey • Civis Illustris Anyway, if I should render the Matt's examples to some English, I would do it this way: videō puerum in hortō lūdentem = I see a boy, he plays in the garden, [he has blue eyes.... + some other characteristics or a statement that follows about him] => if none statement about him follows than the only statement there is that there is a boy + some characteristics of his (including the participle) video puerum in hortō lūdere = I see a (the) boy plays (is playing) in the garden. | I see how a/the boy plays in the garden. => the statement is that the boy plays in the garden, the boy is already characterized in the mind of the speaker on the beginning so it's needless now, instead he focuses on what he does. But I think that all these thoughts pretty much follow from the simple fact that the true participles (not adjectivized) never make predicates, they make only attributes to something, both in finite and non-finite clauses, that's all what Matt needs to know, everything else we said follows logically from that after some meditation. Last edited by Godmy, Aug 11, 2018 Matthaeus likes this. 9. Matthaeus Vemortuicida strenuus • Civis Illustris Thank you for the explanations! Share This Page Latin Boards on this Forum:
IN MATH: 1. v. in a proportion, to rewrite the equation so that the product of the means equals the product of the extremes. EX. Cross multiply to solve: 3/4 = x/17. IN ENGLISH: 1. as defined above. Remind me. Why Is It Legal to Cross Multiply? • It is legal to multiply any number by 1 without changing its value. • In solving an equation you must do the same thing to each side of the equation. • If you "flip" the proportion, exchanging numerators with denominators, the proportion is still true. This is the same as taking the reciprocal of each side of the equation. APPLICATION: See list 350. 1. Cross multiply to solve: x/5=5/8. IN MATH: 1. n. in solving a proportion by cross multiplication, either of the two products produced by the cross multiplication: either member or side of the equation resulting from cross multiplication, either the product of the means or the product of the extremes. APPLICATION: 1. as defined above. APPLICATION: See list 350. © 2008, Agnes Azzolino
Product Accessibility HTML is indexable by search engines and makes it easier for the public to find the content they are looking for. HTML forms are the only type that can be filled out by mobile devices and all assistive technologies used by people who are blind or have other disabilities. HTML is the easiest format to make text larger and easier to view for the elderly, folks with glasses, or who just like reading large text. This proposal will save time, money, and open the internet to all people regardless of ability! 7 votes Idea No. 68
• tcmwell.com Causes of Arthritis from Chinese Medical Perspective Updated: Saturday, Mar 28,2009, 2:54:29 PM • A • A • A Share this URL Causes of Arthritis from Chinese Medical Perspective 1. Weakness of the Internal Organs: We already know that the condition of the internal organs is closely related to our health. According to Chinese medicine, there are five Yin organs which are considered the most important for our health and longevity. These organs are the heart, liver, lungs, kidneys, and spleen. Whenever any of these five organs is not functioning properly, sickness or even death can occur. Furthermore, all of these five organs are mutually interrelated. Whenever there is a problem with one, the others are always involved too. For example, gouty arthritis is caused by the improper functioning of the liver and kidneys. 2. Defective Genes: Only recently it was reported that some forms of arthritis are caused by defective genes, which are inherited from one's parents. According to Chinese medicine, the genes are considered the essence of your being. This essence is responsible for the production of hormones, from which Qi is generated. When this Qi is led to the brain, the spirit is raised. When all of these conversion processes are functioning normally, the immune system is strong and sickness is less likely. One of the main goals of Qigong is learning how to convert the essence into Qi efficiently and lead it to the brain. 3. Weak Joints: Weak joints can come from heredity or from lack of exercise. The body is a living machine, so the more you use it, the better condition it will be in. Chinese medicine believes that even if you have inherited a weak joint it is still possible to strengthen it through Qigong. When you exercise, Qi is brought to the joint by the movement of the muscles and tendons. This will nourish the joint and rebuild it. 4. Injury: According to today's medicine, some forms of arthritis are caused by injury to the joints. Although the injury may not be serious, it may have significant results. The injury can affect the muscles, tendons, ligaments, or even the cartilage and bone. Whenever any joint injury, even a minor one, is not treated, the normal smooth Qi circulation in the joint area will be affected. If the situation persists, the Qi imbal ance can cause problems such as arthritis. 5. Aging: Aging has always been the cause of many sicknesses, including arthritis. When you are old, the Qi level in your body is low. Since your system is being deprived of the required amount of Qi, it starts to degenerate. One of the main goals of Qigong practice is learning how to slow down the aging process by building up the Qi in the body. 6. Qi Deficiency: Qi deficiency is responsible for many problems. It can be caused by emotional depression and sadness, which can lead the Qi inward and make the body Yin. This deprives the outer body of Qi. When this happens, you will generally feel cold. If the problem persists for a long time, the muscles and tendons will be affected by the the lack of Qi, and the joints will be weakened. Qi deficiency can have other causes, such as the weather. For example, your body's Qi is more deficient in the winter, and there fore, arthritis can be more serious then. Qi deficiency can also be caused by working for prolonged periods in a damp area, or by exposing your joints to the cold. 7. Tension: Tension includes both mental tension and physical tension, which are related and cannot be separated. Constant mental and physical tension can increase the pressure on the joints. For example, some people are very tense and grind their teeth in their sleep, which can cause arthritis in the jaw. A lot of body tension is caused by the emotional disturbance which is related to your mental reaction to stressful events. For this reason, learning how to regulate your mind is an important part of the treatment of arthritis. 2-5. Other Possible Means of Preventing or Curing Arthritis In addition to the ones already discussed, there are a number of other methods of preventing or curing arthritis. Although many of them are still awaiting scientific confirmation, they may be worth your consideration. However, you must understand that everybody has his or her own unique characteristics, and his or her own unique inheritance. In addition to the habits and lifestyle that each person has developed, everyone's mental and physical structure is different. For example, some people are affected by allergies while others are not. What this means is that you cannot necessarily use the same method to treat different people, even when they have the same disease. Even modern Western medicine has found that the same treatment will not work equally well on all patients. Therefore, do not automatically brush off some of the treatment methods we will discuss. After all, Western medicine is only in its infancy, and it may come to understand and accept these alternative remedies. 1. Diet: People who are experienced in Qigong have always considered food to be a significant influence on the condition of the Qi in the body. For this reason, diet is one of the main concerns of Chinese medicine. There is a saying: "You are what you eat." It is well known that improper diet is one of the main causes of gouty arthri tis. The Chinese have found many different herbs that can ease the pain and reduce the swelling of arthritis. It has recently been dis covered that protein, calories, and fats can reduce the inflammation of arthritis. Certain fish oils may interfere with the process of inflammation and therefore reduce the symptoms of rheumatoid arthritis.(*5, *6). 2. Change of Residence: Since the Qi in your environment can affect the Qi in your body, arthritis sufferers should give serious consideration to this method. If the climate where you live is too damp or too cold, it may be affect ing your arthritis. It has recently been discovered that the Qi in our bodies can be significantly affected by the electromagnetic fields generated by modern technology, and therefore cause some forms of cancer. For example, people who live near high tension power lines tend to get cancer more often than those who do not. Perhaps similar environmental effects on arthritis will be found. 3. Change of Lifestyle: Your lifestyle affects how the Qi circulates in your body. If you frequently feel ill, especially mentally, you might need to change your lifestyle. How you think and how you coordinate the Qi pattern in your body with the natural Qi is very important for your health. Whenever your Qi circulation is against the "Dao" (nature), you will be sick. You may find that walking for an hour or doing Qigong exer eises every morning improves your Qi circulation. 4. Clothing: What you wear also affects the Qi in your body. In the winter you must stay warm, and especially protect your joints. Joints that are left unprotected can loose Qi very quickly. It has been discovered that many man-made fibers can adverse ly affect the Qi distribution and circulation in the body. For example, polyester is known to cause Qi stagnation, and to prevent the body's Qi from exchanging with the environmental Qi. You may have noticed that clothing made of polyester can accumulate a con siderable charge of static electricity in the winter. This builds up an electromagnetic field and affects the Qi circulation in your body. There are many other ways of improving the condition of your arthritis. For example, it is reported that sexual activity can stimu late the adrenal glands to produce more corticosteroid, a hormone that reduces joint inflammation and pain. It is believed that sexual activity may also trigger the release of endorphins, a naturally occurring painkilling substance.(*7) You can see from our brief discussion that, if we want to under stand arthritis completely, we must remain humble and continue our study and research. Only then will we be able to reach the goal of a complete cure. Post A Comment
How college students use wikipedia for course related 2 essay Very few Wikipedia editors and contributors use their real name or provide any information about who they are. Discussion Few research studies have investigated how and why college students use Wikipedia. Composition studies Discourse community can be thought of as members of an academic discipline or a select audience. When students were looking for background context they went to course readings, Google, scholarly research databases, and OPACs, more often than Wikipedia. It is difficult to ask ESL students to write freely if they possess limited vocabulary or grammar. When you have this many articles, typos and other errors will sneak in. Therefore, these standards cannot be relied upon to judge writing. The survey question 13 was stated as follows: I [also] use the Otherness of the cultures reproduced in foreign texts to estrange the American familiar" However, recently there are an increasing number of departments specifically dedicated to this field of study e. Bevor Sie fortfahren... Due to the fact that Wikipedia can be edited by anyone with an Internet connection, users can falsify entries. North Carolina State University Libraries has a short video that explains what Wikipedia is and how information is entered into it. To a lesser extent, two more predictors of Wikipedia usage can be deduced from negative values reported in Figure 5. Remember that any encyclopedia is a starting point for research, not an ending point. One student in our sessions put it simply when discussing the value of Wikipedia: Wikipedia is ideal in these situations because it will allow you to find the information, as well as sources which you can research to confirm that information. However, the editor or editors who did that summary might have made errors or they might mis-characterize the contents. Opportunities As a whole, our findings present some opportunities for librarians, educators, and information resource vendors. Shor insists "subject matter is best introduced as problems related to student experience, in language familiar to them" How often do you use Wikipedia? The full model containing all predictors of Wikipedia usage had a Nagelkerke R—squared value of 20 percent. One explanation for these findings may be these majors, more than students in other disciplines, may need additional background for their paper assignments. Most Recent Beyond The Headlines. She took this idea from her observation of different writers. Conclusion This study investigated how and why college students use Wikipedia within the context of using other resources for course—related research. Do you ever go to Wikipedia during your research process for course—related research, even if your instructor suggests that you should not? In MarchIrish student Shane Fitzgerald, who was conducting research on the Internet and globalization of information, posted a fake quotation on the Wikipedia article about recently deceased French composer Maurice Jarre. See the Project Information Literacy Web site at http: We found a small amount of respondents three percent used Wikipedia as their first step in the research process; most used course readings first, see Alison J. Additional research about the relationship between using Wikipedia for course—related research and outcomes e. We also found students enrolled in four—year institutions were more likely to use Wikipedia than students in our sample enrolled in two—year institutions i. It has become harder for casual participants to contribute. For a discussion of crowdsourcing, see Jeff Howe, Students majoring in architecture, engineering, or the sciences, compared to other majors in our model, were more likely to use Wikipedia than other students in our sample. The model contained 11 independent variables in three general groupings: Acknowledgments Hil Lyons, Karen Schneider, and Sarah Vital made insightful recommendations for this paper and we thank them for their time.Students from a USA university also pointed out they did not cite Wikipedia in the reference list and that although professors did not agree with that, they consulted Wikipedia when they had a need (which is confirmed by the results of the research called How today's college student use Wikipedia for course-related IJSSES research (Head. Wikipedia:Academic use There Should Not Be Any Required Courses In College Essays - Simply, university is meant to be a time to explore one’s self. Yet almost all post secondary institutions traditionally impose some unequivocal academic curriculum, nearly deciding the path of a student’s career long before they can question their own passion. The Top 10 Reasons Students Cannot Cite or Rely On Wikipedia After 15 enriching, rewarding years of teaching in the Connecticut community college system, I have come to the conclusion that, in all likelihood, I will have at least one of these four different types of students in my English course: the Conspiracy Theorist, the Schemer, the Veteran or the Dreamer. Oct 27,  · 2. Accurate contributors can be silenced. Deletionists on Wikipedia often rely on the argument that a contribution comes from an “unreliable source,” with the editor deciding what is reliable. An incident last year showed the degree to which editors at the very top of Wikipedia were willing to rely on this crutch when it suits their purpose. Findings are reported from student focus groups and a large-scale survey about how and why students, (enrolled at six different U.S. colleges), use Wikipedia during the course-related research process. A majority of respondents frequently used Wikipedia for background information, but less often. Apr 03,  · The content in Wikipedia, though not that accurate, is informative, and good as a starting point. College students tend to have little time, so they should go there first to get a basic information about the material they're looking for. I personally would not rely on a reference that could be edited by anyone else Resolved. How college students use wikipedia for course related 2 essay Rated 5/5 based on 100 review
News Releases Legs 186-210 Legs 173-185 Legs 145-172 Legs 131-144 Legs 100-115 Ocean Drilling Program News Releases Leg 116.1 - Scientists to investigate forces which created the Himalayas and the submarine Bengal Fan Leg 116.2 - Scientists prepared to rewrite current theories about the timing of the Himalayan mountain range uplift and the subsequent formation of the enormous Bengal Fan Leg 117.1 - Drilling for evidence of the southwest monsoon's evolution Leg 117.2 - Scientists can now reconstruct the origin and evolution of the southwest monsoon, the dominant atmospheric phenomenon that determines the fate of millions of Asians and Africans Leg 118.1 - Resolution to drill into the flanks of the Southwest Indian Ridge Leg 118.2 - More than a quarter mile of rock recovered from the deepest layer of the ocean's crust beneath the Atlantis II fracture zone Leg 119.1 - Expedition to drill into the Kerguelen Plateau Leg 119.2 - Exploring the major factors affecting the evolution of the Southern Ocean and its climatic conditions through time Leg 120.1 - Scientists to try to determine to origin and evolution of the Kerguelen Plateau Leg 120.2 - Scientists now have a 97-million year geologic record to determine the origin and evolution of the Kerguelen Plateau, one of the world's largest underwater structures Leg 121.1 - Scientists to investigate the geological history of the eastern Indian Ocean Leg 121.2 - Drilling to take place in two ridges - an underwater mountain range named Broken Ridge and a subterranean mountain range named Ninetyeast Ridge Leg 122.2 - Scientists recover the oldest marine rocks ever obtained through scientific drilling Leg 123.1 - Drilling expedition off the Northwest Australian continental margin to study geologic processes that separated continents, formed ocean basins and consumed an ancient sea Leg 123.2 - Scientists are one step closer to learning how crustal plate movement in the Indian Ocean, sea-floor subduction and the rise and fall of global sea levels have shaped the planet's geologic history Leg 124.1 - An international team of marine scientists will drill into a welter of ocean basins located at the juncture of three major crustal plates Leg 124.2 - A violent history of crustal plate collision, mountain building and erupting volcanoes mark the origin and evolution of two Southeastern Asian basins Leg 125.1 - Seagoing scientists will drill off the Mariana and Bonin island chains in the western Pacific Leg 125 - Scientists recover 40-million year volcanic record Leg 126 - Scientists were able to record the geologic history of an event that began more than 30 million years ago and is still occurring today Leg 127 - Scientists have learned that a marginal sea in the Western Pacific has expanded and contracted and its level has risen and fallen in response to 20 million years of geologic upheaval Leg 128 - Scientists went back in time to piece together a marginal sea's ancient geologic record Leg 129 - Oceanographers for the first time have recovered the oldest remaining remnants of the Pacific Ocean's original seafloor Leg 130 - Sediment and rocks from an underwater plateau have given scientists new information about changes in global climate and the geologic history of the Pacific Ocean Send comments to Modified on Monday, 06-May-2002 15:47:53 CDT.
DEC: Drying and Cooling Without Refrigeration The climate in a room is determined by both the air temperature and relative humidity. In summer the air entering from outside must usually be cooled. Using conventional air-conditioners, this process becomes expensive owing to the high energy required. One alternative is DEC, which stands for ‘dehumidification and evaporative cooling’. This process drastically reduces the cost of room climate control and often allows air-conditioners to be dispensed with altogether. In summer DEC enables low-energy dehumidification and air cooling; in winter, the built-in sorption rotor provides additional heat recovery together with humidity transfer. DEC makes use of several physical PWTnomena, including cooling by evaporation (adiabatic cooling) and air drying by sorption. Air from outside is dried by the sorption rotor, then pre-cooled using a condensation rotor and finally brought to the desired room temperature and humidity via evaporative cooling. DEC systems are well suited to buildings with large room volumes, such as auditoriums, offices and government offices, hotels and printing works. Example of a DEC System This diagram shows the DEC principle for summer operation (outside air approx. 86°F, relative humidity approx. 35%). 1–2 The sorption rotor extracts most of the moisture from the incoming air. Just as air is cooled when steam is introduced, the reverse occurs when it is dried - it becomes warmer as adsorption heat is released. The air leaves the rotor considerably warmer and with much lower relative humidity. The air now passes into a rotary heat exchanger. Here the rotor cools the air using the stored coolness from the exhaust airstream. The air is further cooled in the humidifier via evaporative humidification. The air entering the building is now at roughly 69,8°F with about 60% relative humidity and is thus within the ‘comfort zone’. 4–5 Inside the building the air becomes warmer and the humidity falls slightly. 5–6 Within the exhaust airstream the used air traverses another humidifier and is again significantly cooled by evaporative cooling. Now it is saturated with moisture. 6–7 The exhaust air is strongly heated in the rotary heat exchanger by the heat stored from the supply air; at the same time, the humidity level falls considerably. 7–8 The air is further heated by an external heat source (e.g. a solar thermal system, regeneration air heater or, in summer, unused district heating). 8–9 The high heat level binds the moisture into the air and the sorption rotor is regenerated by desorption. Klingenburg supplies all relevant components for DEC systems. Talk to us. we will be pleased to help you design your individual DEC solution. The Carrier diagram demonstrates the changes in terms of temperature, moisture and energy content of the air at the various stages in our example.
Great Explorers Christopher Columbus, Sir Francis Drake and Neil Armstrong Please access topic resources below. Christopher Columbus Columbus was an explorer. In 1492, he sailed from Europe to America. He and his sailors crossed the Atlantic Ocean, not knowing where they would land. It was a voyage into the unknown. BBC Primary History - Christopher Columbus BBC Historical Figures - Christopher Columbus Sir Francis Drake English admiral Sir Francis Drake circumnavigated the globe from 1577-1580, helped defeat the Spanish Armada of 1588 and was the most renowned seaman of the Elizabethan era. BBC Historical Figures - Sir Francis Drake Neil Armstrong BBC Class Clips - The Moon BBC School Radio - Neil Armstrong Describes the view of Earth from space NASA Biography - Neil Armstrong
Hint: double-click any word to get it searched! Noun wart has 2 senses 1. wart - any small rounded protuberance (as on certain plants or animals) --1 is a kind of 2. wart, verruca - (pathology) a firm abnormal elevated blemish on the skin; caused by a virus --2 is a kind of blemish, defect, mar; keratosis --2 has particulars:  common wart; genital wart, venereal wart, condyloma acuminatum, verruca acuminata; juvenile wart; plantar wart
IHN Database Skin health and nutrition ZEIST, THE NETHERLANDS. A healthy skin begins from the inside, but little information is available as to how nutrition actually affects skin health and appearance. A group of Dutch researchers has now taken a preliminary step towards discovering the relationship between diet and skin health. Their study involved 149 men (aged 19-73 years) and 153 women (aged 18-73 years). All participants completed food frequency questionnaires and had blood samples drawn for analysis of vitamin A (retinol), vitamin E (alpha- tocopherol), vitamin C (ascorbic acid), beta-carotene, lycopene, lutein, zeaxanthin, and beta-cryptoxanthin. The degree of skin hydration, the skin content of sebum, and the surface pH (acidity) of the skin were also measured. Adequate hydration is important for a smooth and soft skin, sebum helps maintain hydration by providing a protective layer on the skin surface that reduces fluid loss, and a low pH (higher acidity) helps protect the skin from bacteria and other disease-causing pathogens. The researchers found that men tended to have higher hydration values and sebum content, but lower pH than did women. There was a clear inverse correlation between the concentration of vitamin A in the blood serum and sebum content and pH, i.e. the higher the vitamin A level the lower the sebum and pH values. There was no correlation between blood levels of vitamin C and vitamin E and skin conditions. A higher beta-cryptoxanthin level was found to correspond to an increase in hydration level in men. An increased fluid intake, somewhat surprisingly, had very little effect on skin hydration, but was associated with a barely significant decrease in surface pH among men, but not among women. Total fat intake was negatively associated with hydration with saturated and monounsaturated fats decreasing hydration the most. Monounsaturated fats were also associated with a significant increase in surface pH among men. Boelsma, E, et al. Human skin condition and its associations with nutrient concentration in serum and diet. American Journal of Clinical Nutrition, Vol. 77, February 2003, pp. 348-55 Editor's comment: The results of this study are still somewhat rudimentary and difficult to apply to a formula for improved skin health and appearance. However, it is a start. category search Keyword Search copyright notice
Writing a short rationale crossword Define the scope of the rationale without making it so narrow that you risk alienating parts of your research. The texts are much more emotive and tend to be effective on an audience. Writing rationales Begin with a thesis and end with a conclusion that can also include a call to action. This can help you, the designer, clarify your thoughts before getting the concepts in front of your client. I will incorporate the things I have experiences in y teaching and also other responsibilities I have in my department. Clarify and identify the meanings behind the icons you chose to incorporate into the design. How are you going to change the way you do things after this activity? In regards to how to write a rationale, teachers should assess the issues of theme, tone and style for the books and check whether there is a need to censor anything. How Can You Write a Perfect Rationale? Rationale Definition in Simple Terms To find the simple rationale definition, you first must understand why you are writing a rationale. This makes for a much more effective overall paper, prospectus or project. Why you are deciding to use the chosen format and particular audience? Her full bio and clips can be seen at www. Including your own voice to personalize things and give your own opinions. How Should a Rationale Be Written? It also clearly points to the importance of the subject, program or event. Make sure the rationale truly supports the entire research paper. Use headings and sub-headings if necessary and split your writing into paragraphs. Explain why you chose the typefaces used in the logo. You could be an entrepreneur trying to explain to your investors and convince them to be a part of your deal and let you launch a new business, or you could be a teacher that needs to justify what the value of going to a conference would be for the school, fellow colleagues and students. How do they relate to the rest of the design and the company it represents? A good rationale will shore up your research paper or affirm your goals for business plans for investors.Short story rationale My short story is aimed at teachers and students aged 14 to I choose this target audience as I feel the need for students to be educated about this topic through raising awareness by teachers as well. How can you write a perfect rationale? A rationale is a detailed proposal and here are 4 great tips on writing a convincing and logical rationale! value of going to a conference would be for the school, fellow colleagues and students. Rationales are supposed to be short, concise and detailed, highlighting what you intend to do and the. How to Write a Rationale By Kimberley McGee ; Updated August 10, Your rationale can be as short as a couple of sentences or it can take up several pages, depending on the scope of your proposal. These Writing crossword puzzles were created using Crossword Hobbyist’s easy-to-use crossword puzzle maker. Solve unlimited crossword puzzles for free. Considerations might include how knowledge of a specific discipline will be impacted by the activity, how activities will help people use their skill set and training in other disciplines, and what type or level of professional or personal growth authors hope to achieve by writing a rationale. How to Write a Rationale Rationale for this publication. In. NETworking: Using Short Stories in the English Classroom, you will find teaching A Short Story Writing Competition organised by the NET Section. The workshop materials have been revised and updated for this publication to be used. Writing a short rationale crossword Rated 3/5 based on 82 review
Feb 08 2017 Spay and Neuter Awareness Month picture of surgery Spaying or neutering your pet reduces the number of animals euthanized in animal shelters each year, can improve your pet’s health, reduce unwanted behaviour, and can save on the cost of pet care. Spaying is an ovariohysterectomy, which means that both the ovaries and the uterus are removed. Ideally this surgery is done around 6 months of age prior to a dog or cats first heat cycle. Spaying reduces the chance of a female dog or cat developing mammary cancer or pyometra, and having un-wanted litters. A female dog that is spayed before her first heat cycle will have a minimal chance of developing mammary cancer. Pyometra is a uterus abscess infected and filled with pus. It is considered to be a serious and life threatening condition that must be treated quickly and aggressively. One of the known causes of pyometra in dogs is the repeat exposure to estrogen and progesterone during their normal heat cycle. Intact, older female dogs that have never given birth are at a higher risk of developing pyometra. Allowing your dog or cat to go through its heat cycles without being bred has been shown to increase the chance of pyometra. Therefore, spaying your dog or cat is the best form of prevention. Neutering is the surgical removal of a male dog or cat’s testicles. This surgery is performed for the purposes of population control, for medical health benefits, genetic-disease control and behavioral modification. Neutering prevents dogs and cats from developing testicular cancer and the risk of prostate problems are reduced. Inappropriate behaviours such as mounting, roaming, urine marking and aggressive behaviours are also significantly reduced. Neutering can be done at any age, although most veterinarians recommend neutering around 6 months of age. Spaying and neutering prevents the contribution to the animal shelters that are over-populated with many healthy dogs and cats waiting to be adopted. There are many myths and controversy surrounding the topic of spaying and neutering, getting the facts and doing research will help inform you of the reasons to spay or neuter your dog or cat. avropet | Uncategorized Leave a Reply
Night to his day Essay Afterreading Judith Lorber article” Night to his day” the social construction of gender, I realized that we have been “doing gender” every day without us noticing - Night to his day Essay introduction. These “doing gender”activities have implement into our brain through life experience, parents and social life. In her article, she “denaturalized” gender into three different categories: “individual; society; and gender”. First of all, she talks about how we determine gender for each individual by the time he or she was born. The moment an infant was born, their sex was determined by genitalia. The infants will be taught by their sex whether to be a “masculine or feminine”. According to Simone de Beauvoir said” One is not born, but rather becomes, a women; it is civilization as a whole that produces this creature. Which is described as feminine.”(Page 57, para 3). This statement is very true to the extent in which our society was build or “constructed” the gender system. In my opinion, our gender roles was taught rather than we decide our own gender. I was taught to be a male and do things what a man should do. We will write a custom essay sample on Night to his day Essay or any similar topic specifically for you Do Not Waste Your Time More Essay Examples on Gender Rubric Judith Lorber also describes the different between in male and female roles and how the society hold each individuals responsible for their designated gender Male and female act differently depend on their culture but their roles are very similar. Female will do all the housework and male will be the breadwinner. By taking out the biological sex, everyone in this whole world is the same. We are just “doing gender” every day to portrait and follow the expectation from the “socially constructed gender”. Secondary, our society view each gender differently. Judith Lorber criticizes on how the society value “male” and “female” role just based on the status of his/her gender rather than result or outcome. Our society already determine what job we will do by our gender such as: office secretary or operation manager. In our society, women seem to be treated unfairly because their role was viewed as not important because of their label. Judith Lorber notes” It does not matter what men and women actually do, it does not even matter if they do exactly the same thing. The social institution of gender insists only that what they do is perceived as different.”Even in today society, women have always had lower status than menandthere are not many female hold a high position in organization job or in our government system.If our society was able to strip off the status label, the gender itself means “different” and “segregation”. The last point which Judith Lorber talks about is the “gender” systems itself. “Gender is a process of creating distinguishable social statuses for the assignment of right and responsibilities. As a process gender creates the social differences that define “woman “and “men”(Page 60, para1)”In general, the formation of our “gender” system seem to put men in a higher status than women. It does not even matter what the capability of women can do but by comparison of the label “man” and “women”. If we compare the result/performance of what women can bring in without their label, I doubt that man would do any better. Even in any cultures, women always deem to be the “subordinate” according in Judith Lorber article. Our society build a “structure” frame in our “gender” system which underestimate the women role. Judith Lorber talks about the inequality provides by “stratification system”. The inequality attached to individual at the moment he/she was born by the “social constructed gender” system. The “gender” system overestimate the value of “men” and view “men” as the “social dominant”. It does not matter where and what “men” do things, their role and jobs are always deem to be value at high bracket thanthe other types of gender. In Judith Lorber’s article, “when gender is a major component of structured inequality, the devalued genders have less power, prestige, and economic rewards than the value genders.”(Page 61, para4) This “gender” type of differentia does not stop at the level of between “men” and “women” but it applies in any race of human, organizations and social norms. Judith mentions about the point of view of Nancy Jayabout how our society divided other type of race or origin into different type of groups and label them as “A” for the favored groups and “ Not-A” for the unfavorable. In summary, Judith Lorber article “Night to his day”: the social construction of gender, she point out the failure of “the social constructed gender”. If we are able to denaturalize the entire “gender” system, we would be better off living a better role in which we “doing our gender” rather than living a given label “gender” by the “constructed gender system”. Each individual should have the right to determine or develop their own gender through their life experience, development in social and their own personal perception. Our social norms always portraits a slogan about the equality for every one and when we look closely to the “gender system”; we can hardly find any equality. Haven’t Found A Paper? Haven't found the Essay You Want? Get your custom essay sample For Only $13.90/page
Eating what you want, when you want it, has become so much part of our lives that it’s hard to imagine a time when you could only eat broccoli in October and blueberries in July. But with the growth of supermarkets and fancy (un-natural) techniques of preservation and growth, you can pretty much get any fruit or vegetable year-round. But what we gain in choice and convenience we lose in health benefits. Nature creates the perfect conditions for foods to be grown and we shouldn’t be messing with nature. Non-seasonal foods need to be preserved, so often times, they are filled with pesticides, waxes, preservatives, and other chemicals. Remember, when plant-based foods are not in season they are not going to look as fresh, vibrant, or appetizing...and well, that’s bad for business. Therefore, chemicals usually have to be pumped into them to make them look like they would be…in season! Consuming foods that are harvested in certain times of the year allow your body to go through the natural cleansing, protective, and building cycles and processes needed for optimal health. Furthermore, enjoying naturally warming foods in the winter helps to nourish our bodies to heal and protect us from the stressful elements of cold. In the summer, our bodies began to shift to more of a cleansing and cooling process, and certain foods help to move this process along. Eating seasonally allows you to save money, consume foods at the height of their nutrient density and taste, create natural variety in your diet, and work with your own body's rhythms. The SEACRET to be creating an optimal dietary lifestyle by saving you money, eating foods at the height of their nutrient density and taste, creating natural variety in your diet, and being synergistic to your body’s own natural rhythms is to eat seasonally. Winter: Acorn Squash, Brussel Sprouts, Butternut Squash, Collard Greens, Cauliflower, Kale, Cabbage, Grapefruit, Pomegranates, Oranges Spring: Artichokes, Asparagus, Broccoli, Arugula, Green Beans, Spinach, Mangoes, Pineapple, Strawberries, Limes Summer: Beets, Cucumbers, Eggplant, Radishes, Tomatoes, Peas, Cherries, Grapes, Berries Autumn: Mushrooms, Pumpkins, Peppers, Squash, Artichokes, Leeks, Pears, Cranberries
Subscribe Donate en | fr | + Accéder au menu Mercator supplement The notion of progress in the cosmological and religious traditions of Africa This article is taken from a speech entitled “The notion of progress in the cosmological and religious traditions in Africa” delivered by John MBiti during the Conference on the Notion of Progress in the Diversity of World Cultures organized, in particular, by the United Nations in New York (May-June 2015). 1. Oral and Artistic Traditions Africa is a continent of oral versus written traditions, including: legends, myths, proverbs, rituals, etc. in addition to architecture, basketry, metal works, paintings (in caves and on rocks), and symbols. Progress evokes history, which in turn has to do with Time. Traditional African concepts of the future are tied to the natural rhythm of time: day and night, the seasons and the life rhythm of human persons. 2. Traditional African Concepts of Time Traditional African concepts of linear time recognize the threefold pattern: (a) A long and indefinite past; (b) An intensive, humanly experiential and tangible present; and (c) A conceptually reachable (or even inevitable) future, stretching a few months or years from the present. I have not found African calendars that count or depict a sequence of months, years, and centuries. Nor have I found any mythology about the future, whereas there are thousands of mythological narratives and explanations about the origin of the world, of human beings, and of death, among other mysteries. 3. A Multiple Religious Continent Africa is a profoundly religious continent, with African Religion, Christianity, and Islam as the biggest historically and numerically. Accordingly, the cosmology of African Religion is centred on a firm monotheistic notion of God. My research into the traditional religion of 600 peoples and languages shows that of these, every African language, dialect, and people has a word for God. Besides the generic term “God”, there are thousands of attributes about God, of which I have collected some 1,600. The oral knowledge and belief about God is communal, which people discuss and communicate in proverbs, rituals, prayers, and invocations. Atheism has no place in traditonal African society. Openly and daily, people speak of God, call upon God to help in need, and invoke God in pronouncing blessings. People express the traditional attributes, beliefs, and conceptions of God anthropologically, metaphorically, symbolically and in personifications. For examples: Almighty, Creator, Immanent, Invisible, Loving, Omnipresent, Omniscient, Parent, Transcendent, and Unknowable. 4. The (Implicit) Notion of Progress in Mythological Origins of Humans The myths (stories) of human creation abound. They generally start with God creating the world, then first persons, and placing them in a particular situation and condition of life. This is followed by subsequent states of their life, in a semi-progressive sequence. As an illustration let us take the creation myth of the Shilluk people of South Sudan. It “tells that God made humans out of clay... Then God gave them legs with which to walk and run, hands with which to plant grain, eyes with which to see that grain, and a mouth with which to eat it. Afterwards God gave them the tongue, with which to sing and talk; and finally ears, so that they may enjoy the sound of music, dance, and the talk of great persons. Then God sent the humans out onto the earth, each a complete human being”. This myth depicts God prominently, as the Creator and the caring Parent who provides the humans with faculties to live happily (making music and dancing). There is a clear element of implicit progress in the story, beginning with the first persons getting legs and hands, progressing to planting, harvesting and dancing. In some of the African creation myths, it is narrated that God endowed the first humans with one of three gifts: immortality, resurrection, and rejuvenation (after becoming old). But somehow, these primeval gifts perished and humans did not know how to regain them. Could it then be, that the pursuit of progress is ultimately a mythological and eschatological endeavor to regain the mythological immortality, resurrection, and rejuvenation? 5. The Notion of Progress in Prayers With the many prayers in African Religion, people address the invisible world. There are two worlds in African cosmology: the visible (physical), and the invisible (spiritual). These interact. Prayers facilitate communication between the visible and invisible worlds. We take an example of the prayer of a childless woman (wife), from the Banyarwanda people of Rwanda. It is called Kwambaza: a cry for help . It is a global, painful, powerful, and timeless prayer. “O Imana [God] of Urundi [Rwanda], if only you would help me! / O Imana of pity, Imana of my father’s home [country], if only you would help me! / O Imana of the country of the Hutu and the Tutsi, 3/ if only you would help me just this once!... / I cry to you: Give me offspring; give me as you give to others! / Imana, what shall I do, where shall I go?... / O Merciful, O Imana of mercy, help this once!” This prayer is set on the process of personal progress. It moves from the past “my father’s home [country]”, through the agonizing present “I cry to you… I am in distress”, towards a hoped for tangible future “Give me offspring!”. But the childless woman is utterly unable to bring about this personal progress. She can only cry and appeal for God’s (Imana’s) mercy, to transform her “here and now” state of being childless, into the tomorrow state of hopefully being the mother of an offspring. Millions of women throughout the world, cry, and hope in harmony with her. 6. The Notion of Progress in Stories African peoples tell millions of traditional stories, which serve many purposes like education and entertainment. Let us look at one story, The animal well of the Akamba people in Kenya. It tells that a long time ago the country, Ukambani, suffered a prolonged drought. All the rivers and ponds dried up. So, the animals decided to dig a well in a riverbed, in search of water. Day by day all the animals except the hare, came to the dry riverbed, toiled and toiled. The hare would stand at the bank and watch. They beckoned to her to join them, but she would merely say, “Just dig on, you will find water. I will wait here till you find it!” When the animals reached water, they jubilated and danced for joy. They unanimously resolved to keep a security guard, to bar the hare from getting their water. The first day, the pig kept watch, the next day the buffalo, then the leopard, and so on. Every day the hare came to get water, carrying a small calabash (with honey) and a big one. When they tried to stop her, she would laugh, “Aha, aha! I have sweet water and do not need your water”. If the animals did not believe her, she would tell them in that case to taste her water (honey). They liked it, and would ask for more. But the hare would only give more on condition that she would bind them first, so that they do not run wild from being drunk with the sweet “water”. They would agree, and the hare would then tie them up, hands and legs. Then she would fill her big calabash with water, and walk away laughing. One day the tortoise offered to keep watch. Other animals whispered skeptically that it was not strong enough to stop the hare. The tortoise procured glue, smeared itself with it, and waited at the entrance to the well. When the hare came and saw the tortoise, she said, “I don’t even give you my sweet water. I will just push you aside, fetch water, and go home”. The tortoise tried to stop the hare, which retorted, “I will strike you!” The tortoise replied, “Yes, I dare you!”. The hare got one hand stuck by the glue. She struck with the other hand, which also got stuck. Then she tried to kick, but her legs got stuck, as did also her mouth when she tried to bite the tortoise. When all the animals came, they found the hare stuck onto the tortoise. They said they would kill it. But the leopard requested that she would bring it alive to her cubs. They put the hare in the leopard’s basket, and let it take her home. However, on the way, the hare gnawed a hole in the basket and sneaked out into the bushes. The animals never saw her again, for the rains came and there was water everywhere. Can this story of the animal well serve as a parable for the notion of progress? Why not? The community finds itself in a situation that threatens its very existence. It lacks water, the symbol of life. However, the community will not easily accept to succumb to this natural disaster. It knows that there is water in the ground. To survive, it resolves to dig a well and get to that water. The process of progress sets it. The community moves progressively from drought to abundant water. Joint effort drives the community forward and in the ground it exploits the resources of life. The rain comes from God, but it is society that must dig the ground to find water. Hard work, tensions, and refusal to dig – all these elements come into play in course of progress. 7. The Notion of Progress in Proverbs Millions of proverbs and wise sayings circulate in all African communities. They serve a multitude of purposes in society: advice, information, entertainment, ethics, parables, religion, symbols, teaching, and warning. Some endorse the notion of progress, without necessarily naming it as such. Some examples are: “Asking for something in prayer is not the same as receiving it. When God wills it, God will give it to you”. Progress is inbuilt in this proverb: a need arises, the person concerned prays to God about it, and waits. In due time, God gives the person the requested item. There are two dimensions at work here: the human and the divine. They both involve the element of time, moving from the present towards the indefinite future. “Cattle are born with ears; their horns grow later.” Symbolically, Progress here is the natural change from one state towards another and final state. The proverb can be applied symbolically about many things. “Go back, and fetch what was left behind!” The proverb recognises that Progress is underway. It may have its foundation from the past, but it now moves towards the present and the future. “If God gives you sickness, God gives you its cure.” Personal Progress is inbuilt in this proverb. “If parents take care of you up to the time you cut your teeth, you take care of them when they lose their own teeth.” Personal Progress counteracts personal regress. The process is repeated in families ad infinitum. “Most of the world is still ahead.” There is a progressive movement towards further reality over the horizon, in the (undefined) future. The present state of the world is not the end of reality. There is room for it to progress continue, to progress, to reach fruition or completion. 8. Introducing Modern Notions of Progress on a Mathematical and Calendar Scale: Africa Agenda 2063, “The Africa We Want.” The African Union Commission (AUC) and the All Africa Conference of Churches (AACC), organized a Consultation for Africa Faith-Based Organizations on the “Agenda 2063: The Africa We Want” (1). This took place on 5-6 November 2014, at the Desmond Tutu Conference Centre Nairobi, Kenya. There were 93 participants from religious organisations in Africa. On several considerations, this was an extremely significant consultation: 1. It brought together Secular and Religious bodies, in keeping with Africa being a deeply religious continent, to discuss a common target. 2. It tabled the future dimension of Time on a mathematical scale, along the Western). Even though, as we have shown, there are indeed potential and implicit notions of Progress in African Religion and Cosmology, they are not articulated on a mathematical scale or calendars (which did not exist). 3. This Consultation made a combined secular cum religious commitment to the proposed Progress projected for up to the year 2063. That year will be the 100th anniversary of both the AU and AACC. It assigned the idea of Progress to a historical projection. If the Agenda is a dream, then it is a very vivid one. 4. According to this Consultation, Progress involves a radical change towards 2063. The Consultation appealed to all areas of African reality to work for and commit them to this change. Whether we want it or not, change will inevitably continue to take place, as the years roll by. However, change does not necessarily mean Progress. There is an undeclared tug-of-war between Progress and Change. Progress is a forward moving phenomenon. But change is largely neutral, and may produce both Progress and /or Regress, separately or simultaneously. My precautionary maxim is: “If we do not change Change, Change will change us”. 5. The Consultation arose originally from the agreement of African Union Heads of State and Governments, which they made at the AU’s Golden Jubilee in 2013, “on the formulation of Agenda 2063: The Africa We Want.” That foresees “inclusive growth and sustainable development”. 6. The Consultation highlighted seven “Agenda 2063 Aspirations, Goals, and Implementation Strategy”, namely: 1. A prosperous Africa... 2. An integrated continent, politically united… and the vision of Africa’s renaissance. 3. An Africa of good governance, democracy, respect for Human Rights, Justice and the rule of Law. 4. A peaceful and secure Africa. 5. An Africa with a strong cultural identity, common heritage, values, and ethics. 6. An Africa whose development is people-driven. 7. “Africa as a strong and influential global player and partner” Consultation report, p. 24, from the address of Mandla Madonsela This Agenda is both secular and religious, it has both personal and communal consequences. It addresses all aspects of African reality, including: communication, conflicts, culture, economics, education, ethics, health, justice, media, peace, politics, religion, scientific contributions, and technological developments. “African Agenda 2063” as outlined in that joint Consultation, sounds both beautiful and idealistic in projecting Progress between 2013 and 2063. Undoubtedly Progress = Change. But Change is not necessarily Progress. God will make the sun rise and set without fail, year by year, to bring Africa and the world to the year 2063 and beyond. It is the humans that have to change changes to produce Progress or result in Regress. I find it difficult to relate this mathematically designed Progress, to the traditional African notions of time on a fifty-year stretch of time. Is the idea perhaps too impersonal and abstract, for individuals and communities to identify themselves with it? Will our languages stretch the concept of time into the distant future beyond a few years from the present (and past)? Maybe we have to mythologise Agenda 2063, in order to install it into our “African blood”. An African proverb says: The person who chews food slowly, will finally swallow it. African Agenda 2063 has enough time to chew its big mouthful of food, maybe slowly at first, until finally it swallows it. John Mbiti Original text in English John Mbiti is philosopher, writer and professor emeritus of african cultural history. (1Agenda 2063: «The Africa We Want» (PDF), 2015. See also Share this article / © Le Monde diplomatique - 2018
Twitter in the Elementary Classroom I was recently challenged by my instructor to come up with some ways to use twitter in your classroom. I had to think long and hard on ways to use it in my classroom because I am a third grade teacher, and just automatically assumed it would be too high tech for my students. After, thinking things through, I came to the conclusion that my students would probably be better at navigating and learning the process than myself. Now days kids are so tech savvy. It is nor uncommon for toddlers to be toting around smartphones or tablets, and using them rather smoothly. So, my quest began. My instructor stated that we must use two websites, and one article that could be found in our school’s library. I was really surprised at how many things I found when I began looking. The first web-site that caught my attention was: EdTechReview. This web site caught my attention it talked about “tips” for using twitter in the classroom. One tip that stuck out was setting up one account for all the students to log in too. I was floored! That was such a genius idea! The students would all have the username and password and could communicate through creating unique hashtags.For example you can create a hashtag like #butts3rdgrademath, and every time a student responds with that hashtag, it will all fall together. The next web site that caught my attention was: Education Aspirations. This web site was very intriguing because this teacher had a class account where students were required to respond to the teacher’s tweets once a week. Often times, the teacher’s tweet would just be to tweet about what you learned this week in class. the teacher would also set up a unique hashtag for the tweet. The school that this teacher worked at did not have a specific hashtag so she set up one just for the class, this made it easier to track the tweets. Finally, the teacher would pull up the tweets in the class and talk about the ones that stuck out to her the most. For example, if a student tweeted that he or she didn’t learn anything then she would ask them to explain why they though they didn’t learn anything, and then have them reflect back on what they did that week. The article I chose to read was: Article by Jeff Kurtz, “Twittering About Learning: Using Twitter In The Elementary Classroom.”This teacher used twitter to promote the writing process in an elementary classroom. I know it sounds crazy,but once I read the article it all made sense. At the beginning of the year the teacher would walk the students through the process of setting up a twitter account and show them for weeks how to post and respond. Once the students felt comfortable, the teacher started with “journal like” assignments. The teacher would give a journal prompt and then the students (along with the teacher directing) would tweet the response. After the teacher typed up the tweet, while the students are watching, they would go back and look for revisions. Revisions like, run on sentences, misspellings,and  pronunciation errors. However, the most intriguing edit to me was, twitter only allows 140 characters, so if the tweet was over that amount, the students would see the negative number and realize they had to change some wording to get to the 140 character limit.This was so awesome to me. I could see my students so engaged in this whole process. I firmly believe that I will come up with a way to incorporate Twitter into my classroom really soon! Leave a Reply You are commenting using your account. Log Out /  Change ) Google+ photo Twitter picture Facebook photo Connecting to %s
by George Taniwaki Back when I was in high school, every summer my friends and I would go to the amusement park. One of the attractions we visited was the hall of mirrors. Ten points worth of tickets allowed you to go through the hall once. The goal is to go in through the entrance and find the exit before you starved to death. ( I’ve been told that there are numerous bodies of lost patrons still stuck inside the hall, but I digress.) The hall of mirrors consists of a room with a series of tracks on the floor and ceiling laid out in an equilateral triangular array, called an isohedral tiling pattern (Fig 1). Figure 1. Isohedral tiling. Image from Wikipedia.org Each triangular cell is about 3-foot to a side. The tracks on some of the sides have a floor-to-ceiling partition inserted in them. The partitions form walls creating a maze with a single entrance, a single exit, and exactly one path between them. Solving a maze of this type is a great mathematics problem. The maze is called a hall of mirrors because the partitions are not just solid opaque panels. Instead, they are all of one of two types, either mirrored on both sides or clear plastic. I had never been in the hall of mirrors. While waiting in line, one of my friends urged us to go twice. The first time would be figuring the maze out. The second time we would race through. He then bet me he could get through it faster than me both the first and second times. I eagerly accepted because I knew a trick for solving simple mazes called the wall follower algorithm. In the wall follower algorithm, you place one hand (say your left hand) on the wall as you enter the maze and never take it off. As you move through the maze, if you reach an intersection, keep your left hand on the wall, meaning you take the leftmost turn. If you reach a dead-end, keep your left hand on the wall, meaning you will return to the intersection and take the next path. Eventually, you will reach the exit. If you remember the series of correct paths you took, the next time you enter the maze, you will not need to keep you hand on the wall. You just need to remember the turns you took at each intersection. For example, left, right, center, right, right, left, right. Seeing how eager I was, all my other friends also made the same bet and I accepted. After giving our tickets to the operator, my friends ran into the maze. I was surprised that they would dash off without caution. I was determined to show them that I could beat them and solve the maze faster by simply walking through the maze using my logical skills. What I didn’t know were three facts. First, because of the mirrors and clear walls, as you stepped into each triangular cell, you couldn’t be sure which direction would lead you to an adjacent open cell and which led you into a wall. Using the wall follower algorithm by placing your hand on the wall definitely helped, but it was slow going moving around. Second, the maze was crowded. There were lots of other people who were moving around, sometimes in the opposite direction as me, and it was difficult to navigate around them. To do so, I often had to take my hand off the wall and as I was getting jostled, I couldn’t be sure I placed my hand back on the same wall. Similarly, it was difficult for me to remember if I had returned to the same point as before. This meant I couldn’t memorize which turn I should make at each intersection. After a few minutes of trying to solve the maze, I noticed that all of my friends were already outside the maze watching me. I began to panic and became disoriented. Eventually, feeling sorry for me, they began shouting and pointing the directions for me to take. Finally, with their help, I reached the exit of the maze and stepped out to be with them. Except, I wasn’t quite at the exit yet and bam, I walked right into a clear wall mashing my eyeglasses into my face. So much for my superior maze solving skills. Upon exiting the maze, I learned the third fact. My friends had all been to the amusement park previously that summer and had memorized the path through the hall of mirrors. As we agreed, we went through the hall a second time. I did a lot better, but still made several wrong turns and became disoriented a couple of times. I was the last one out of the maze again. I had to pay off on two losing bets with each of my friends that day. However, I did learn an important lessons about gambling (and investing in the market too). First, don’t place a bet on a game of skill simply because you know something your opponent doesn’t (like the algorithm to solve a maze). Only place a bet if you have actual experience winning the game you are betting on (like having run through the maze before). Second, if someone challenges you to a contest (who can run through the maze fastest), they probably already have the skills needed to win and you should avoid the bet. Solving a maze using pencil and paper is another interesting problem. And is one that should not induce panic attacks about getting lost. One way to study a maze is to first identify the walls. A maze with a single entrance and single exit must have at least two separate walls as shown on the left of Figure 2. In the case of a maze with exactly two walls, you can solve it using the wall follower algorithm described earlier. But a faster solution exists. Notice that any path where the wall on both sides is the same color ends in a dead-end. By following the path that has one wall of each color on each side you will quickly find the solution. Notice that this technique is faster only if the walls are already color coded. Figure 2. Three simple mazes with two walls (left), three walls adjacent to each other (center) and three walls where one is enclosed (right) Image by George Taniwaki A maze may have more than two walls. If there is only one entrance and exit, there will still be only two exterior walls. Any additional walls will be totally enclosed within the exterior walls. If an interior wall is at any point adjacent to two walls that are part of a solution, then a path following this wall will also add a solution. A wall that is adjacent to only a single wall (is totally enclosed within a wall) will not add another solution. An interior wall that is adjacent to one or fewer walls that is part of a solution will not add another solution either. In Figure 2 above, the center maze has three walls and has two solutions. You can turn either left or right at the blue wall. The right maze has three walls but only a single solution since the blue wall is totally surrounded by the red wall. For a more complex example, consider a maze (Fig 3a) that is included in a recent advertisement for Dropbox, a cloud file sharing service. Figure 3a. Dropbox print ad. Image from Dropbox It is hard to see the solution to this maze just by inspection. But if we color code all the walls we will discover there are four separate walls (Fig 3b, to save time I only added color at the turns and intersections). The two interior walls (in blue near the top of the puzzle) are both completely contained within a single wall (in red), so they do not add any new solutions, so there is only one solution. The solution is the path that stays between the two exterior walls (green and red). The solution is easy to recognize when the walls are color coded (assuming you do not have red/green color deficient vision). Try it and see how easy it is. Figure 3b. Dropbox print ad with color coded walls and enclosed paths highlighted. The solution is the path that keeps walls of different colors on each side. Notice that there are two errors in the maze. There are two paths (filled in yellow) that are completely enclosed, meaning they are not connected to the entrance or exit and so cannot be reached. Despite the errors, this is a nice maze. A good maze has the following attributes: 1. The path for the solution is quite long and traverses all four quadrants of the grid, meaning that finding the solution path is not obvious if the walls are not color coded 2. There are many branches off the solution path, meaning that there are many potential places to make an error 3. Many of the dead-end branches are long and also have branches, meaning that discovering whether a path is a dead-end branch or part of the solution takes a long time
user environment management (UEM) Contributor(s): Kelly Stewart and Eddie Lockhart This definition is part of our Essential Guide: The go-to guide for managing VDI users User environment management is a technology designed to allow IT to oversee a user's complete desktop experience, including the profile, any policies IT applies and customizations the user makes. The software allows IT administrators to control all of the personal and corporate settings, personas, access controls and more that are unique to each user on their Windows desktops. This includes aspects such as display, folder and application settings. User environment management software pulls out the policies, data and settings from the operating system and applications from a centrally managed location, and stores them to an individual user profile. This process creates a personalized environment for each user when they access their desktops -- whether the desktop is virtual or not. It even allows for personalization in nonpersistent deployments. IT administrators can also use the data from user environment analytics to better adapt desktops to fit users' needs. What goes into managing an environment User environment management typically offers a GUI for IT to control permissions on multiple levels, from the individual user to groups or departments to specific applications and geographic locations. IT can also work with user environment management tools to disable certain peripheral devices, prevent users from consuming too many resources and override Group Policy. In addition, IT can create logon scripts that enforce certain security policies. Liquidware ProfileUnity for enterprise user environment management A user environment management tool can translate a user profile so it works across multiple versions of an operating system. It can also give users elevated privileges for specific applications and for specific periods of time. How user environment management evolved IT can manage user profiles with tools such as folder redirection and Group Policy, but these measures are all encompassing. If IT denies a user administrator privileges, for example, he is denied across the board even though he may need privileges in a specific application or in a certain circumstance. The larger the user base gets, the easier it becomes to have contradicting Group Policies. Roaming profiles, which allow for a central file system to hold the information of a user's profile and policies -- or user environment -- without downloading multiple profiles onto one hard drive, are another approach. Roaming profile management can get complicated as organizations grow and add more profiles, which bloat as users personalize their desktops.   The need for something more effective than these built-in Windows methods made room for third-party profile management software, and the term user environment management expanded upon profile management around 2007. Liquidware user environment management Liquidware's ProfileUnity console for user environment management User environment manager software Citrix acquired Norskale to improve user environment management in XenDesktop and XenApp, and renamed the software Workspace Environment Management. VMware bought Immidio and RTO Software, changing Immidio to VMware User Environment Manager. Finally, Microsoft has UE-V. Liquidware, AppiXoft's Scense Workspace Management and Ivanti -- formerly LANDesk -- with AppSense and Workspace Control powered by RES are a few other tools available. This was last updated in April 2018 Continue Reading About user environment management (UEM) Join the conversation Send me notifications when other members comment. Please create a username to comment. What is the best use case for user environment management? There are many;  On VDI, commonly, it's about making the non-persistent, persistent....ensure the desktop looks the same as the user jumps from one VM to another. It also helps deliver fast logons and with many of the tools, contextual rules mean you can apply settings not just based on username or group.  With a traditional desktop, UEM is much more about logon script replacement, group policy management, and security for an increasingly mobile workforce. Image reduction, contextual security, reducing the number of app packages, improved productivity, increased security, reduction in profile corruption (3rd line support calls) are all common use cases... File Extensions and File Formats Powered by:
Place your order Essay (any type) 14 days Pages Total 100% Original work provided by professional academic writers. 100% Original work provided by professional academic writers. Order Now! Write a compare and contrast essay for me In order to obtain an effective Topic1: Write an essay to compare contrast two persons of your. Coursera After completing this course cause effect, practice activities are available for free, argument essays write well developed body paragraphs Note: The lectures , write compare contrast, but you must upgrade to the pay version in order to Compare , you will be able to: create effective thesis statements for your essays plan Contrast Essay Examples. It is about comparing talking about how such things are alike , contrasting two subjects how they are different. Dwellers of ideas thinned seek to close novels but are really once sustainable of Buy Compare and Contrast Essay Online. A compare talks about how two ideas , objects differ , contrast essay, also known as a comparison essay how they are similar. Here you can find the main tips on how to write a winning compare and contrast essay. Consider Writing a compare and contrast essay. How many times do students worldwide ask this question without finding an answer. Construct a Writing Plan that contains the developed thesis statement and related points that How to Write a Conclusion for a Compare Contrast Essay. The Compare Contrast strategy strengthens students' Help me write a compare and contrast essay Oelbert. This article contains a few great examples to guide you How to Start a Compare and Contrast Essay: Build the Framework. If you do not know how to write a compare contrast essay up to standard use these tips. Comparing and Contrasting. Thus, the Compare Contrast Essay. ASCD Compare Contrast improves comprehension by highlighting important details making abstract ideas more concrete reducing the confusion between related conceptsthink meiosis versus mitosis. Writing this essay will Compare and Contrast Essay Writing: 4 Great Tips. In this type of essay students have to compare twoin some essays several) things events , evaluate their resemblances , problems, ideas differences. The approach to a compare contrast paper must therefore be objective in disentangling the subject highlighting their common characteristics. The entities My Sister and I Jill Nicholson May 19. There is little sense that the writing Practice Makes Perfect Comparison and Contrast Essay: High. Biology homework help. Reminds me to standard essay contest. Democratic how to write comparison essay. Although I have been making friend with them for long time but I have the wrong Giang Son learning objectives , study for comparison contrast Provide sufficient evidence to support comparison contrast analysis. Some essays may only talk about similarities, while others may only talk about differences. State title author general ideas of what is being compared. Expository writing encompasses a wide range of essay variations contrast essay, thehow to” , such as the comparison , the cause , effect essay . As always the instructor , the assignment sheet provide the definitive expectations . This lesson explains what it is to write a compare and contrast essay. Fast Writing Help You will be met with a resounding yes yes to writing the compare yes to hitting the urgent deadline , contrast essay yes to a high grade. Have you compiled your list of similarities and differences in your prewriting stage. Giang and Son are twin bothers. Essay about mother Cheap Academic Writing Editing Help Get Online Paper Assignments Quick Cheap College Essay Writing Assistance Get Custom Essays Research. A compare and contrast essay is one of the papers students need to write while studying at their educational establishments. High school, as well as college is just another part in everyone s lives. Many experts say that the composition and most other forms of literary papers do in fact challenge the creativity of the writer on a level that few other academic exercises could accomplish. Therefore it is important that you find out relevant points of similarities differences of the two mentioned things after In need of a great Essay. She is also very Essay Wikipedia The comparison highlights the similarities between two more similar objects while contrasting highlights the differences between two more objects. Turnaround from 3 hours Write Essay For Me. Instead of going to see your friends you stay at home write one compare contrast essay after another. Often art history papers will ask you to compare , second attempts at the drafting of my compare , Reflection2 Compare , Contrast Will Few portfolio Google Sites Following my not very successful first , contrast more than one artwork in formal , contrast essay I was nervous heading into our in class peer. A compare and contrast essay is a form of academic writing that is built around an examination of at least two items. Com A contrast essay is not as complicated as you think. Incompare IELTS examiners want you to discuss the points of comparing , contrast' type of essay contrasting the two things i. Concluding sentence: Restates the idea discussed. This page gives information on what a compare Contrast Essay Fresh Essays While studying, how to structure this type of essay, contrast essay is, you get various assignments, Buy Compare , how to use compare , one of which is writing a compare contrast essay. In the academic arena in the employment world, you will often be required to use your best judgment to discern between two viewpoints policies. In contrast but leave the past in the past so I can focus on the present the future. Complete confidentiality. Write an email to 1000 now. Suppose you are taking a course on 19th century America contrast the reasons why the North Tips for Writing Essay Exams Did the question ask you to apply a theory to historical , the instructor hands out the following essay assignment: Compare contemporary events. Argument Summaries. Webster University Comparison people, things are alikecomparison) , contrast are processes of identifying how ideas how they are differentcontrast. Summary of main points. Affordable pricing. With this being said these two works were written under the influence of experience not only discrimination but a desperate struggle to be equal , one can now see how this type of assignment so Compare , Contrast Essay Examples: free Samples As both of them belong to racial minorities have the same life opportunities. Practice writing. Each technique comparison , can help yield an excellent essay, contrast if you choose your topic matter wisely. Thesis Statement: When How to Write a Contrast Essay SolidEssay. Com We Can Write Your Paper For You. More topics are at varying degrees. Pick one of the following pairs of essays from 50 Essays a The Joy of Reading Writing: Superman Me” by Sherman Alexiep. Frederick was born a slave for life 1817 he didn t go to school but wanted to have knowledge. Similarities and differences between the two. Formulate an overall thesis that states an overall perspective for a comparison or contrast essay. Tell me what How to write a title for a comparison essay Quora A comparison essayor a Compare college, Contrast essay) is a commonly used type of writing assignment in various classes of high school from art to. I recommend you to ask the assistance of Custom Paper Writing Help Online This is a professional custom writing service you d tell me who wrote it, what the plot of the book is, which sometimes help me cope with Writing an Art History Essay Ivy Tech asked you to write a book report who the characters. As for me this holiday is more cheerful than Christmas Before High school vs college essay compare contrast The Friary. Applying Theory to Practice. He had a lot of obstacles in his path but the fact he wanted to learn to read write keep him going though he wanted to give up Writing Comparison Contrast Paper Choose Your Framework. So diet and lifestyle changes can be good topics that are easier to write about than some others. It is a way of indicating both the similarity dissimilarity that go along with two different things How To Pick A Catchy Topic For A Compare Contrast Essay Help Me Find Some Good Topics for a Compare Contrast Essay. Dave Letterman vs Shakespeare comedy EssayThe guy who kinda looks like me is the guy that brings me a joy” is compare and contrast essay assignment 1 pick one of the following. An interpretation about the meaning of a work of art) can be at heart of an essay. Such assignments require you to move beyond mere 24 Captivating Titles For A Compare Contrast Paper 24 Compare Contrast Essay Topics To Boost Your Creativity. A wellknown specialist in fonmailto copywriting and marketing dan kennedy was a list of ten questions which can help in understanding customer needs. Cannot decide on the topic. This focus depends on the length scope of How To Write A Compare Contrast Essay Outline. Do I know enough about my topic to write an effective compare contrast essay about it. Below is a list of How can I start writing my compare and contrast essay between me. Evaluation possible future developments Learning to read Malcolm X Compare , Frederick Douglass . This type of essay advances and develops Getting Started with Essay Writing. Sample compare and contrast essay college level find main tips as to how to receive the best research paper ever Use this company to. Need some directions. Time4Writing Help your student understand different types of essays and learn the four major types of essays required for school success. Some details are not in a logical expected order this distracts the reader. I encourage you to discuss ideas outlines drafts of your paper with me before it is due. However here s the deal: Writing a compare , blowing How to Write a Compare , contrast essay that will knock your professors' socks off can mean the difference between just making it through Contrast Essay. Months a great companion for me. Job descriptiona resume writer help writing a comparison contrast our original essay help writing services professional com research paper design/ Reference to his last detail how to be used for me Writing a Compare Contrast Essay CLRC Writing Center. Check out our compare and contrast essay samples to see how to write essays of this type on your own. Distinguish between point by point and block organization. Nature Then , Nurture Now. No one in the telecourse program was asked to write Comparison essay examples. Get this wrong you risk the chance of writing an essay that lacks focus is irrelevant Compare' andcontrast' will often feature together in an essay question. ÊÊ Pick several poems short stories from the syllabus write a synthesis paper. When writing compare contrast essays one is often dealing with a vast amount of detail. Does my instructor want me to compare contrast am I only being asked to do one of those things. There are two kinds of compare contrast essays: one where you focus more on the similarities of chosen items one that contrasts their differences. Persuasive Essays: Convince Me How do you write a paper on comparing a movie with the book. Although you have probably been writing compare contrast papers since grade school, it can be a difficult form to master. Our academic writing research writing family is huge. The paper should be clear and comprehensive to avoid misconstrued elements that confuse the reader on the points outlined by the writer. She can get very angry very fast, especially with our mother. 1000+ experts will write any content for you. Help it would it also write best for me to stay to an compare on lessons the contrast that essay real layers closer them, followed by a different contact to a wider of HC with no online to administer that this system was later from further held. Did you have to prove an argument. Begin with some How to WriteCompare and Contrast' Type of Essay in IELTS Writing. Essay Writing Service Expert Team of Writers. Jpg What college essay writing service 24 7. The next slide for essays. Examine your Venn diagram ask What does this information tell me ' Develop a Help Me Write A Compare Contrast Essay. Don t worry read these useful tips to start working on the best essays and research papers The Four Major Types of Essays. In this article plus provide some examples of attention getters for your next essay. My problem is that a lifetime of reading good fictionand having it read to me before I was old enough to indulge myself) has left me with fairly good instincts for what is Essay about mother We Write Custom College Essay Writing and. Inside the intersection of the two circlesoverlapping area either as an essay type on its own, as part of a larger essay which includes one , write all the traits that the objects Compare contrast essays EAP Foundation Compare , contrast is a common form of academic writing, more paragraphs which compare contrast. High school vs college essay compare and contrast. Which additional penalty wrong comparison contrast essay example answers it is best to include general introductions to philosophy as a Compare Contrast Essay Template Writing Centre. First grade compare contrast essay is one of the most common assignments in American high schools , contrast writing template Google Search Comparison , contrast essay Free Essay Writing Tips Comparison universities. 3 ՀունվարրոպեThesis: Therefore three categories of mental health disorders that affects individuals in today s Synthesis , Comparison Contrast Paper Comparison contrast elements are inherent in a synthesissee Assignment 1 handout. Simply draw twoor three) large circles trait, give each circle a title, reflecting each object person you are comparing. Pull it apart look at each detail in isolation so you can Help writing a comparison contrast essay Sunday Salon. Did you have to compare contrast theories. Knowing how to start a compare and contrast essay is the first step to writing an interesting essay that will keep readers engaged all the way to the end Writing Philosophy Papers: A Student Guide College of Liberal Arts 21. Academic writing your. When writing a compare contrast essay consider their audience, consider the basis , contrast essay i know Part of growing up , consider their thesis Help me write a compare , writers need to determine their purpose, points of comparison contrast essay completed as fast 10 Examples Of Compare Contrast Essay Thesis Statements Have no clue how to create a good thesis for your comparative paper. Louis harrison sociology she is supposed to describe completely in the compare contrast essay Section 1: Why Compare Contrast. Looking at the essay. Com How to Write a Contrast Essay at SolidEssay. When I was a high school student Son. Are these two things ideas similar , different in at least one meaningful way. Can You Write My Essay for Me. Ly Ytbuzzfeedviolet oct 11 others require more , but, contrast essay database the brainstorming phase through the two. We re ready we ll take care of it for you, contrast essay for me” , waiting to take your order just selectcompare sending you a top rated paper from one of our Many details are not in a logical or expected order. For the student who. If I understand your question correctly you are to write a comparison contrast essay on a character from literature yourself. Writing a comparison contrast paper involves comparing and contrasting two subjects. We Write Essays similarities to differences, Business papers Theses Comparison , point- by point structure, Contrast Rubric ReadWriteThink The paper breaks the information into whole- to whole, Term papers but some information is in the wrong section. Anything that can be a claime. You re tired of Compare Contrast Essay: Definition, Topics Examples Video. These diverse worlds can be compared not all are aware of the possible similarities , contrasted by everyone; however, differences Compare Contrast Paper. Assertion Essays I Believe Thesis Statements The Writing Center This handout describes what a thesis statement is how you can discover , how thesis statements work in your writing refine one for your draft. At the same time, essays appear to be probably among the most popular academic assignments. Quit wanted to close to be involved in reconstruction of a better self who is more. First then include a secti Compare , you can write about each thing separately , Contrast Daily Writing Tips In general use, compare meansfind the similarities" , such as in writing acompare contrast" essay contrast meansfind the differences. A contrast essay also known as a comparative essay, how they are first grade compare , is a paper that compares two , discusses how they are similar , more different things contrast writing template Google Search. Depending on your emphasis the Great Hints on How to Write a Compare Contrast Essay. Students from various US Essay Writers Online Custom Essay Writing Service Looking for Expert US or UK essay writer online. Even after Good Attention Getters for Essays With Examples. When studying a particular subject students are often asked to write essays that compare contrast various aspects of that area of study. We d rather not check the official statistics. Writing Service by Edusson OH, WRITE MY ESSAY FOR ME PLEASE. They are very similar with appearances such as eyes face stature. Comparison clear. You can use this as a first step to creating an outline for a compare and contrast essay. 15 19) andReading to Write” by Stephen Kingp. Introduction: General statement about topic. Compare Contrast Essay. I said it was strange for me to have a good time doing a writing assignment because prior to this writing102 class, I had not had the best time with writing assignments GradeMiners: Essay Writing Service From Vetted Writers Get your paper written by a vetted academic writer with 15% off. In one of the first help me write a compare and contrast essay written texts i have decided to use their scholarship. So Customer reviews , our returning client, no matter are you a newcomer, you have an option to browse essay writers by Success Rate Stats. Whenever your essay topic involves comparison, you can organize in either of two ways. The subject must be broken down into parts for analysis details must be considered. Easy to use Uber for writers Essay terms explained To write a good essay, you firstly need to have a clear understanding of what the essay question is asking you to do. Forms of Philosophical Writing. Self Discovery Writing. If you feel you need assistance contact us , we will write a great compare , price, contrast the quality, you will compare , contrast essay for you Compare Contrast essay assignment sheet Mineral Area College As a consumer overall value of commercial products. Conclusion: Restate thesis. Writing a Compare Contrast Essay. Look at these and decide what commonalities you share with the character while yet differing. Imagine yourself in the role of the instructor what did the instructor emphasize. Testing Hypotheses. What are the big ideas in the course. Http: the compare and college can be further apart. Almost everyone go through such a transition between two very diverse and different worlds. You may decide to write a Comparison Contrast Essay: Write an A+ Comparison or Contrast. Frederick Douglass and Malcolm X both were African Americans who struggled to be successful. By Timandra HarknessOklahoma 1973, begins the documentary COMPARE CONTRAST ESSAYS BREAK DOWN INTO PARTS. GOAL4: Enhance Students' Writing in the Content Areas. Compare and Contrast Essay Template. Need to write a compare and contrast paper for your tomorrow class. Compare and Contrast Essays. Prejudice in to kill a mockingbird essay. For any further Compare and Contrast Essay Student Learning Center Otis. You have to do it again again but it actually irritates you takes away a lot of your free time. Net This type of essay can be really confusing as balancing between comparing contrasting can be rather difficult. On the other hand things don t really bother me. Connect to broader concepts. The successful completion of your college education probably won t hinge solely on the compare and contrast essays you write. 221 26 b Just Walk On By: Black Men Public Space” by Brent Staplesp andOn Dumpster Diving” by Lars Eighnerp Compare Contrast Essay PrivateWriting. University of iowa graduate creative writing Mfa creative writing umd Homework help quotes Do my political science homework I can t do my science homework Creative writing on family Ou advanced creative writing a363 Average cost to have a business plan written Writing college personal statement essay Essay Service ireland Comparison Essay Point by Point Faculty Make a point of comparison for each topic and then write about first one item of the comparison and then the other. In longer essays. A transition separates the two halves of the comparisondifferent from, in contrast, on the other hand, etc. My parents never worried about me, and I never even thought about being afraid Using a Venn Diagram for a Compare and Contrast Essay.
It is 100 years since the start of World War One - and people can now trace those who lost their lives using our search tool. This unique gadget allows you to search the full records of more than one million casualties of the First World War. The database allows you, for example, to search for people with the same name as you, who came from various parts of out region - or even to see who died from the street where you live. The data comes from the Commonwealth War Graves Commission, which kindly allowed The Gazette to share the astonishingly rich data that they have painstakingly put together over the years.
November 2016 TruthToTell Archives Stolen Childhoods: America's attempt to separate Native children from their families didn't end with boarding schools. In the decades after World War II, the U.S. government created the Indian Adoption Project, an effort designed to place Native kids with white parents. In this one-hour documentary, producer Melissa Olson explores the personal and historical impact of this policy. Her Ojibwe mother, Judy Olson, was raised by a white family. So were the mothers of several friends.
Home > Speed Camera Types > Average Speed Cameras Average speed cameras explained Since their introduction on UK roads in Nottingham average speed camera usage in the UK has grown exponentially. The first average speed check cameras named SPECS appeared on the UKs roads in 2000. More recently in 2014 a new average speed camera has been developed by the same company behind SPECS. This new camera system is named VECTOR. Although the first SPECS average speed check zones were deployed on residential roads circling and crossing Nottingham, their usage has been far more common and synonymous as temporary speed cameras throughout sections of the UK motorway network during roadwork's. However, this trend has been changing in more recent years since the introduction of the VECTOR average speed camera system as more and more councils now use average speed cameras as permanent fixtures on lower speed limit roads. For example, in Nottingham, where average cameras were first installed and the trialed, there are now eighteen roads covered by SPECS cameras including dual-cariageway, urban and rural roads. The map below depicts the UK's five longest average speed check routes in 2016 - these routes includes both VECTOR and SPECS average speed cameras. Map depicts the UK's five longest average speed check routes in 2016 How do average speed cameras work? Each average speed camera system, whether it be SPECS or VECTOR camera system consists of a number of video cameras linked either to a remote enforcement cabinet or, with SPECS3 systems, directly to the police enforcement office. Number plates are read via ANPR as vehicles pass through the fields of view of each camera and the average speed of the vehicle is calculated between any two cameras. If this exceeds the Police threshold a NIP (Notice of Intended Prosecution) letter is created and sent to the keeper of the vehicle. “Driving habits have been affected within the SPECS zones with a far greater level of compliance than expected. There is a more even traffic flow within SPECS Speed Controlled Zones, and it has almost removed the dash between major junctions.” Nottinghamshire Safety Camera Partnership No film Unlike some other fixed UK speed cameras SPECS and VECTOR average speed cameras don't use film so there is no limit to the number of incriminating motorists it can help to prosecute. Your number plate, date and time stamp are stored by each average speed camera and then if your average speed between the cameras is above the speed limit you will automatically be issued a speeding fine. Average speed camera installations The very first SPECS average speed check systems were installed on Nuthall Road (A610) and Western Boulevard (A6514), Nottingham in July 2000. Before SPECS average speed camera system was installed, Nuthall Road and Western Boulevard had the worst Killed or Seriously Injured (KSI) figures in the county. Nottingham wanted to create ‘speed control zones’ rather than target individual accident black spots, so spot speed cameras were not considered appropriate for these key routes into the city centre. The table below highlights the percentage change of those killed or seriously injured before and after SPECS average speed cameras were installed on selected roads in Nottingham. Average Speed Cameras Questions and Answers To read a comprehensive range of average speed cameras questions and answers please click here. Points and Penalties It cannot be detected by radar and laser speed camera detectors - you will need a GPS speed camera detector. Speed camera alerts as you drive What's your view and experiences with average speed cameras? Tell us here. Click here to visit our online detector shop. Last updated: 21st February 2018
Busy. Please wait. show password Forgot Password? Don't have an account?  Sign up  Username is available taken show password Already a StudyStack user? Log In Reset Password Remove Ads Don't know remaining cards Pass complete! "Know" box contains: Time elapsed: restart all cards   Normal Size     Small Size show me how Structured Programming an organized style of programming that places emphasis on modular programming, which aids testing, debugging and modifying. Modules are procedures and functions that process external data passed by parameters. Object Oriented Programming style with emphasis on reliability through modular programming; Contain modules (classes), data, and subroutines (methods) that process data. OOP traits include: Encapsulation, Polymorphism, and Inheritance. Attributes and Methods What objects in java are made up of. Encapsulation Process of placing data structure's data (attributes) with the methods (actions) that act upon the data inside the same module, called a class in Java. Inheritance is the process of using features (both attributes and actions) from an established higher class. Superclass Higher class in java whose public methods and attributes/variables may be used by a class (subclass) that extends it. Subclass Lower class in Java that extends from a Superclass -- extends meaning that the class is able to use (inherits) all public attributes/variables and public methods from the superclass. Polymorphism Allows a single accessing feature, such as an operator, method or class identifier, to have many forms. Class data type that encapsulates both data and the methods that act upon the data; template for the construction of objects Object One instance of a class Attributes/instance variables/fields The data components of a class. In the majority of classes, instance variables should only be accessed by methods of the same class. Methods Action modules that process data. Sometimes called subroutines, procedures, or functions in other languages.Declared inside a class module -- process the instance variables Instantiation Moment or instance that memory is allocated for a specific object of a class; Statements like 'construction', 'definition' and 'creation' of an object have the same meaning as instantiation. constructor The special method that is called during the instantiation of a new object whose purpose is to initialize instance variables (fields/attributes); has the same identifier as the class; is neither a void nor a return method default constructor Constructor without parameters Private class members Can only be accessed by methods of it's own class. Public class member Can be accessed by any client of an object x Inner class Class declared inside another class. Created by: mgarda
One of the strongest Emotions is Fear. Those who manage to arouse Fear before an Image of the Enemy can control the Behavior of a Person. Especially Politicians use this Technique when talking about the Threat of Terrorism or the Threat of Climate Change. And Advertising uses this Technique of Manipulation to Control our Behavior. Car Manufacturers advertise for the Safety of their Products, so they take Advantage of the Fear of an Accident. But who scares must also provide a way out, otherwise the People react upset. Politicians offer Laws, Advertisers their Products. Experiments in Social Psychology have shown, however: Human behavior can only be influenced if a medium Level of Anxiety is generated. Is Fear low, nothing happens. Is Fear too big, People feel powerless and do not believe they can still make a Difference. In addition, about 80 Percent of People take much more effort to avoid a Loss, as they do in order to get something. It is precisely these predictable Patterns of Behavior, that allow subtle Manipulation. Whenever, the correct Technique is used - and the Victim does not know the secret Code of Influence or other Defense Strategy to protect...
Custom Search Friday, April 17, 2015 Functional Mazes Long time, no blog! The algorithm The algorithm I use is a bog-standard recursive walk of the cells in the maze. We start with walls between all the cells, and pick a random cell. Then take each of it's four neighbors in random order. If a neighbor has been visited, we skip it. Otherwise, remove the wall between those two cells, and recursively walk from that neighbor as well. You can find this algorithm described on rosettacode. This will include implementations in a number of languages, including a more idiomatic Haskell version. A maze is just an array of cells that either have halls or walls between each cell. Each cell needs two walls, one for each direction, and boolean to note that it's been visited. Which gives us the basic data types for a maze: data Wall = Wall | Hall deriving Eq data Cell = Cell { x, y :: Wall, visited :: Bool } type Board = Array (Int, Int) Cell If you're wondering why only two walls and not four, it's because each wall is shared by two cells. So each cell will have the wall with the larger coordinate in each direction. In particular, the x wall is the wall that runs in the y direction with the largest x coordinate, and vice versa. To work with the array, we need a few tools from Data.Array: import Data.Array (Array, array, bounds, (//), (!)) We need the Array type for our type declarations, which we've already seen. The array function is used to create the initial array. bounds gets the bounds of the array so we don't have to pass those around. // is used to create a new array with a list of changes to an array, and ! is used to reference a Cell in the array. Generating the board So our initial maze needs to have every cell with both walls, and initially not visited. That's just a Cell wall wall false. But our maze is going to have a border around it, for a number of reasons. We can make the walk easier by creating border cells as visited. So the walk won't need to do bounds checking. And the border on the low coordinate sides will have the wall on that side, and no others. That will simplify drawing the maze. And as a final touch, we'll put entry and exit doors in the maze at the diagonally opposite corners on the axis. So we have a function makeCell that looks convoluted, but each part is straightforward. For a Board of width w and height h, we make the cell at i, j with: makeCell i j = Cell (if j == 0 then Hall else Wall) (if i == 0 || i == 1 && j == h || i == w && j == 0 then Hall else Wall) $ i == 0 || i > w || j == 0 || j > h This creates a Cell with an x Wall except for the first element in the j direction, and a y Wall except for the first element in the i direction, as otherwise we'd try and draw those. We also create Hall's for 1, h and w, 0, which will be the entry and exit for the maze. Finally, if either x or y is 0 or x is greater than w or y greater than h, then mark these border Cell's as Visited, so we won't visit them during the walk. All other cells haven't been visited yet. So now we can create the array with array and makeCell: makeBoard w h = array ((0, 0), (w+1, h+1)) [((i, j), makeCell i j) | i <- [0..w+1], j <- [0..h+1]] array takes list of pairs of indices and values and converts it to an array whose bounds are given as the first argument. In this case, bounds are (0, 0) and (w+1, h+1). That makes the border the indices that have 0 for either x or y, and w+1 for x and h+1 for y. A list comprehension generates the indices, and we call makeCell on them to create the Cell for each index. The walk We start with helper functions to remove each wall from a cell. Well, since this is a functional language, we can't actually remove the wall, so instead well have functions that return a cell with the appropriate wall removed. And one to return a visited cell. clearY, clearX, visit :: Cell -> Cell clearY cell = cell {y = Hall} clearX cell = cell {x = Hall} visit cell = cell {visited = True} A step is represented by a tuple indicating the motion in the x and ydirections, so we'll want a list of all possible steps, allSteps: allSteps = [(0, 1), (0, -1), (1, 0), (-1, 0)] The body of the walkMaze function is straightforward. Just pick a random cell in the maze, then call the internal helper walkCell for allSteps, that board position and our original Board: i <- state $ randomR (1, (fst . snd $ bounds origBoard) - 1) j <- state $ randomR (1, (snd . snd $ bounds origBoard) - 1) walkCell (i, j) allSteps origBoard walkCell implements the "in every direction from each cell" part of the algorithm by calling itself recursively, removing a random move from the list of moves it was passed on each recursion, stopping when there are no more moves. It uses doStep to walk the Board after that step: walkCell _ [] b = return b walkCell start steps board = do step <- (steps !!) <$> (state . randomR) (0, length steps - 1) walkCell start (delete step steps) =<< doStep start step (board // [(start, visit $ board ! start)]) doStep just calls walkCell on allSteps and the cell it steps to, after removing the wall between the Cell it's stepping from and the new Celll. The last bit is the hard part, requiring examining the move in detail: doStep from@(i, j) (dX, dY) board | visited neighbor = return board | dY > 0 = walkCell' $ board // [(from, clearY cell)] | dY < 0 = walkCell' $ board // [(new, clearY neighbor)] | dX > 0 = walkCell' $ board // [(from, clearX cell)] | dX < 0 = walkCell' $ board // [(new, clearX neighbor)] where cell = board ! from new = (i + dX, j + dY) neighbor = board ! new walkCell' = walkCell new allSteps So we can put all that together to get: walkMaze :: Board -> State StdGen Board walkMaze origBoard = let clearY cell = cell {y = Hall} clearX cell = cell {x = Hall} visit cell = cell {visited = True} walkCell _ [] b = return b walkCell start steps board = do walkCell start (delete step steps) | visited neighbor = return board where cell = board ! from new = (i + dX, j + dY) neighbor = board ! new walkCell' = walkCell new allSteps in do walkCell (i, j) allSteps origBoard The key to doing this in a functional language is generating a new Board for the various recursive calls, rather than mutating a Board and just using recursion to keep track of the progress of the walk. This is liable to create a lot of extra state in each recursion. I haven't made any attempts to minimize that, which you would want to do in a solution for production use. Idiomatic Haskell would use the State monad for the Board to hide the extra plumbing, as is done with the random number generator. Displaying the board While the walk above is the meat of this blog entry, I find the display code interesting, so will cover that as well. It would be nice to be able to plug in various different types of output to display the maze, so that we can debug with ASCII to a terminal or a Diagram before adding code to generate OpenSCAD code. So we'll use a Board drawing function that takes functions that generate the walls and pastes them together. The type for the function is: drawBoard :: (Board -> Int -> Int -> a) -- make X-direction cell walls -> (Board -> Int -> Int -> a) -- make Y-direction cell walls -> ([a] -> b) -- combine [walls] into a row -> ([b] -> IO ()) -- Draw the board from [rows] -> Board -- Board to draw -> IO () As you can see, it takes two functions that create Wall's, one in each direction. Then a function to combine a list of walls into a row, and finally one that takes a list of rows and outputs the final maze. For a larger program, it might be worthwhile to use a Render data type to hold those for functions, but for a simple demo, it's just extra formula. The wall drawing functions get the Board and indices, as the indices may be needed to calculate where the wall needs to go. However, we are also going to generate the rows by generating the walls for the Cell's in order of increasing x, then do the same to put the rows together in order of increasing y. So the actual drawBoard code is: drawBoard makeX makeY makeRow makeMaze board = makeMaze . concat $ [firstWall]:[drawCells j | j <- [1 .. height]] where height = (snd . snd $ bounds board) - 1 width = (fst . snd $ bounds board) - 1 firstWall = makeRow [makeX board i 0 | i <- [0 .. width]] drawCells j = [makeRow [makeY board i j | i <- [0 .. width]], makeRow [makeX board i j | i <- [0 .. width]]] This builds firstWall, which is the x direction walls for the 0'th y row. We don't bother making the y direction walls for that row, since they aren't part of the maze proper. That firstWall is wrapped in a list and consed onto the list output by drawCells, which outputs a list consisting of a row x walls and a row of the y walls for the Cell's in that y direction. We draw the 0 Cells in each row to generate the y direction Wall that forms the boundary of the maze. There are no x direction Walls in those Cells, but either makeRow or DrawX will be responsible for dealing with any other artifacts that these cells might generate. That result is passed to concat to turn it into a list of rows instead of a list of lists of rows, which are passed to makeMaze to output the maze. Drawing in ASCII For ASCII output, we only need two extra functions: charX, charY :: Board -> Int -> Int -> String charX board i j = if y (board ! (i, j)) == Wall then "---+" else " +" charY board i j = if x (board ! (i, j)) == Wall then " |" else " " An x Wall is a horizontal line of dashes, and a y wall is a vertical bar. Hall's are just blank spaces, except for a + at an intersection. Note that an x Wall is the y element of a Cell, as the Cell element is named for the direction you are facing, but the Wall rendering is named for the direction the wall runs. makeRow is simply drop 3 . concat, to paste the strings together and then remove the extra Hall's drawCells creates for the 0 cells in each row. makeMaze is just putStr. unlines. At this point, if you load the module (available via the fossil repository link on the right) into ghci, you can print square grids. Just use :main 16 8 to print a 16 by 8 maze. Or on a Unix system, you should be able to do ./maze.hs 16 8 to generate a maze from the shell. Graphical output That works, but it's not very pretty. So let's do a little graphics. Since I'm not much of a graphics designer, it still won't be very pretty. Support routines This is a bit more complicated, so let's start with a couple of support routines. diaSpace is used to create a spacer. It takes an R2, which is a direction, and a Double indicating how long it is. It outputs a Diagram B R2, which is something we can draw. Given that it's a spacer, it won't draw anything when drawn. diaSpace :: R2 -> Double -> Diagram B R2 diaSpace unit size = phantom (fromOffsets [unit # scale size] :: Diagram B R2) diaCell does all the work. It needs to know which Wall to check in a Cell, which direction to draw in, any spacer needed, and the cell size. Plus the board and the cell's index: diaCell :: (Cell -> Wall) -> R2 -> Diagram B R2 -> Double -> Board -> Int -> Int -> Diagram B R2 diaCell side unit space cellSize board i j = space ||| make (side (board ! (i, j))) where make Wall = strokeT (fromOffsets [unit # scale cellSize]) make Hall = diaSpace unit cellSize diaCell returns the space in front of the result of calling the internal function make on the Cells' Wall. make is simple - it uses diaSpace to return a blank space for a Hall, and the Diagram primitives to create a line of length cellSize in the given direction. Drawing cells. Given diaCell, the two routines for drawing walls are simple: diaX, diaY :: Double -> Board -> Int -> Int -> Diagram B R2 diaX = diaCell y unitX mempty diaY cellSize = diaCell x unitY (diaSpace unitX cellSize) cellSize The type of diaX and diaY match the types needed by drawBoard. diaX is just diaCell with the y Wall selector as it's first argument, the x direction and an empty spacer, as the wall spans the entire length of the Cell. diaY needs the cellSize argument as well, since the spacer it passes to diaCell is a cellSize spacer created by diaSpace. Drawing the board The row creator for drawBoard is simply the Diagram function hcat, which accepts a list of diagrams and puts them together horizontally in a new diagram. The board creator is almost that simply, but is actually long enough to get it's own function: diaBoard :: Double -> [Diagram B R2] -> IO () diaBoard ww rows = renderCairo "maze.png" Absolute $ vcat rows # centerXY # pad 1.1 # lwO ww As with the row creator, the bulk of the work is done by the Diagram function vcat, which stacks the diagrams up vertically instead of horizontally. That image is then centered by centerXY, padded by pad 1.1, and the line weight is set to the wall width with lw0 ww. That diagram is passed to renderCairo along with some extra arguments so that it creates an appropriately scaled output in the file maze.png. Seeing the result The version of maze.hs in the fossil repository has the Diagram (and OpenSCAD) drawing code commented out. Once you install the diagrams package and the diagrams-cairo package, you can change that. Look for three places where a line starts with {- Comment out. The first two will need to be moved down to the next blank line. The last one will need to be moved down to beneath diaBoard. You can now run this in ghci as :main 16 8 40 2, or as ./maze.hs 16 8 40 2. The two new arguments are the size of the cell and the width of the walls to draw. The old ASCII invocations will still work as well. After running it with 4 arguments, the file maze.png will be created in the current directory, and you can display that. Expanding this to display images from the command line, or to embed it in an app for solving mazes, is left as an exercise for the reader. In which case, it ought to be made pretty as well. Printing in 3d The inspiration was a 3d-printed maze, so let's do that. This is very similar to the Diagrams code, so the commentary will be a bit shorter. To show what using an encapsulating data type would look like, this uses the SCADCell data type, consisting of the side selector, a routine to construct the appropriate wall, and a Vector3d to move the wall to the appropriate place in the cell: data SCADCell = SCADCell (Cell->Wall) -- Wall extractor (Double -> Double -> Double -> Model3d) -- Wall drawing Vector3d -- translation This is the first argument to scadCell. scadCell just creates a the appropriate wall and base, or a 0-sized block if this is a border Cell. It also need the cell size, wall dimensions and base depth to create those models. scadX and scadY just call scadCell with the appropriate SCADCell. scadX, scadY :: Double -> Double -> Double -> Double -> Board -> Int -> Int -> Model3d scadX cs = scadCell (SCADCell y (flip box) (0, cs, 0)) cs scadY cs = scadCell (SCADCell x box (cs, 0, 0)) cs scadCell :: SCADCell -> Double -> Double -> Double -> Double -> Board -> Int -> Int -> Model3d scadCell (SCADCell side box' move) cs ww wh bd board i j = make (side $ board ! (i, j)) # translate (cs * fromIntegral (i - 1), cs * fromIntegral (j - 1), 0) where make Wall = box' ww (cs + ww) (bd + wh) # translate move <> base make Hall = base base = if i == 0 || j == 0 then box 0 0 0 else box (cs + ww) (cs + ww) bd Again, there's a function in the library that does exactly what we want for turning the output of the cell drawing routines into a row. So we just use union for this. That same function also serves to join the rows into a board, so we just need to compose it with draw in order to print the maze. However, this prints the maze "upside down" compared to the previous two rendering engines, so we use mirror to fix that as well. No real need, but it feels like the right thing. You'll need to install version or later of my Haskell OpenSCAD library from hackage and uncomment the appropriate code segments to use it. You can then run it as either :main or ./main.hs, using arguments like 16 8 20 2 4 10. That's the same four arguments as the Diagram version, with the depth of the base and the height of the walls added. To see the results, you'll also need the OpenSCAD application. That can generate an STL file, and getting it to a 3d printer from there is up to you. Just for completeness, a brief look at the main routine that ties it together. This is really just a kludge to test the others, but it does the job. The outline is to get the arguments, map them to integers. Sorry, no fractional sizes here. Then convert those to floats for the things that need them. Switch on the length of the argument list to either raise a usage error or create a drawBoard' function that's just the drawBoard invoked with the functions appropriate to the type of output we want. Then get a random number generator, and run mazeWalk using it on a board of the appropriate size, which we will use the newly created drawBoard' to output. main :: IO () main = do args <- map read <$> getArgs let floats = map fromIntegral args drawBoard' = case length args of 2 -> drawBoard charX charY (drop 3 . concat) (putStr . unlines) 4 -> drawBoard (diaX cs) (diaY cs) hcat (diaBoard ww) where [_, _, cs, ww] = floats 6 -> drawBoard (scadX cs ww wh bd) (scadY cs ww wh bd) union (draw . mirror (0, 1, 0) . union) where ([_, _, cs, ww, bd, wh]) = floats {- Comment out drawing argument handling _ -> error "Width Height [CellSize WallWidth | CellSize WallWidth WallHeight BaseDepth]" gen <- newStdGen drawBoard' $ evalState (walkMaze $ makeBoard (head args) (args !! 1)) gen
Education Models Evolve In Audrey Watters’ essay, The Invented History of ‘The Factory Model of Education,’ she provides an insightful analysis of recent statements by respected leaders for change in education. According to them, the Western education system is based on an outdated factory model stemming from industrialization and consequently, it needs to be replaced. Watters makes a cogent argument that this assumption is untrue based on historical facts. I agree. It is true that the goals and maybe even the mechanics  of industrialization became intertwined with American education by the late 20th century.  But it took a long time to standardize the system.  For example, in 19th century rural America, the major purpose of multi-age one-room schoolhouses (about 200,000 of them) was to make people feel more connected to an emerging nation, to teach them the responsibilities of living in a democratic society. There was no resemblance to industrialization. During Reconstruction, schooling was very important to African Americans; learning to read and write had been denied them as slaves. Education was the first step towards equality. In urban areas, schooling was mostly enjoyed by the elite until child-labor laws were seriously enforced in the 1920’s and 30’s allowing working-class children to take full advantage of public education. Until then, most children were “industrialized” through apprenticeships and early work years, not schools. Watters cautions: We tend to not see automation today as mechanization as much as algorithmization–the promise and potential in artificial intelligence and virtualization, as if this magically makes these new systems of standardization and control lighter and liberatory. And so too we’ve invented a history of the “factory model of education” in order to justify an “upgrade”–to new software and hardware that will do much of the same thing schools have done for generations now, just (supposedly) more efficiently, with control moved out of the hands of labor (teachers) and into the hands of a new class of engineers, out of the realm of the government and into the realm of the market. In other words, just because we have a new format in technology does not mean that its content will set us free. Accredited education will always involve the passing on of societal values and goals. However, I would not be so quick to say that with technology solutions teachers will be replaced as education influencers. Many EdTech startups are depending on teachers to create content and pedagogy that work in digital programs. We need engineers and instructional designers to lead in technology. Developers admit that they are far from creating education technology that is scalable—cost- and learning- effective. They want to work with educators and government agencies to “make it happen.” How we educate students and who has control will depend on how well experienced educators, technology experts, and government agencies can collaborate for the common good—an old but still valid concept.  Let’s not allow the high speed of technology push any of us into premature interpretations, predictions, and solutions. Let’s not jump from the exaggerated gloom and doom interpretations of the past to gloom and doom predictions for the future.
Short Course on Softeners – Covering The Basics Factors to Consider When Choosing Water Filtration Systems Water recycling methods are now being initiated by many companies to ensure that they recycle dirty water, clean it, purify it and make it safe for use again. Due to an increased level of water pollution, people have taken the initiative of cleaning water for themselves thus reducing their dependence on the government to offer them methods of purifying water. When people are exposed to different kinds of pollutants they risk getting infections and other contagious diseases. Over a long period of time, boiling of water has been considered the best way to treat drinking water has it was believed to be the best way to kill germs and remove impurities, nevertheless it has been considered to be too tedious and also it contributes to wastage of energy resources. Boiling water could not remove all the impurities such as lead that that could not be removed through boiling only and therefore needed more advanced water purifiers that are able to remove all the impurities present in the water. Ensure that you consider several factors that may influence your choice of a filtration system. The amount of electricity supply also matters a lot when it comes to purchasing a water filtration system, thus, you need to know the ratio of power supply to your home as these machines require a lot of power for proper functioning. Your location also matters a lot, if you live in places where there is enough power supply, you can use the RO and ultra-violet filtration systems, however, if you are located in places where electricity supply is unreliable, then you should consider settling with activated carbon purifiers. Comments are closed.
Apollo 17 Apollo 17 Logo Apollo 17 was the last mission in the Apollo missions series, and last crewed mission to land on the moon. They landed in the Taurus-Littrow highlands and valley area. This site was chosen as there were lunar samples with rocks older than and younger than those collected on previous missions. The crew consisted of Eugene A. Cernan, Harrison H. Schmitt, and Ronald E. Evans. This mission was the first one to include a scientist who also set foot on the moon. There were no major technical difficulties that happened on this mission. Apollo 17 Boulder
Diverging Protestant Responses: Introduction “Who can resist temptation? Only he for whom neither reason nor his principles, nor his conscience, nor his freedom, nor his virtue is the final measure of all things, but who is prepared to sacrifice all these when, in faith and bound solely to God, he is called to responsible action, and who in his life seeks nothing more than to respond to God's question and his call. Where are these responsible people?” -Dietrich Bonhoeffer, “Who Can Resist Temptation?” (Dec. 1942) Characterized by mass murder, brutality, discrimination, and a totalitarian regime, Nazi Germany appeared to be a Godless society. In reality, religion and particularly Christianity pervaded the lives of the German people. Nazi politics promoted appeasement and at the very least acceptance in terms of responses from the German people.  The Catholic Church, unlike the Protestant Churches, relied upon structured political agreements between the Vatican in Rome (Holy See) and the Nazi party. Despite Catholics’ divided position in terms of Nazi support, the 1933 Concordat temporarily “secured” the role of the Catholic Church in Germany. Protestantism, the overwhelming faith majority, soon became a point of contention with the introduction of two ideologically contrasting denominations: the German Christians and the Confessing Church. Although racial animosity cannot be limited to the German Christians, the Confessing Church’s resistance to the German Christians’ alliance with the Nazis and insistence on preserving a separation of church and state demonstrated an awareness of the Third Reich’s manipulation of existing religious organizations for political gain. Reich Conference of German Christians (<em>Deutsche Christen</em>) at the <em>Sportpalast</em> in Berlin Nov. 13, 1933 Reich Conference of German Christians (Deutsche Christen) at the Sportpalast in Berlin (German History in Documents and Images). Diverging Protestant Responses: Introduction
Bhutan hosts ‘World Dendro Conference’ for the first time Dendrochronology is a science that uses the growth of tree rings as a detailed record of climate change in a region. Over 150 participants from 35 countries are attending the five-day conference. Bhutan has been chosen for the conference because of its best preserved forest. According to experts, Bhutan currently faces two immediate threats from climate change. The first one is the threat of glacial lake outburst floods and other flooding events. And the second is the changing and uncertain stream flow creating challenges for the generation of hydropower. So the conference provides a platform for the researchers to not only share their findings but offer ways for Bhutan to better manage its forest in sustainable manner.   “Tree rings can tell us how climate is changing from 500 years ago and now and how it is going to change in the future maybe better or worse. But maybe it is the worse that is the problem. Tree rings can tell at what direction the climate is changing and how it might affect Bhutan,” highlighted Dr. Edward R. Cook, Professor of Colombia University. Dendrochronology or the study of tree rings is applied wherever trees are found with distinct annual rings- which will help to provide crucial information on past climatic conditions and extreme events. “If a situation or environment is very favorable for the trees to grow, the rings would be actually much wider. So that’s how we could exactly determine that what was the weather pattern and how was the temperature 100 or 200 years ago,” said Sangay Wangchuk, Researcher at Ugyen Wangchuck Institute for Conservation and Environmental Research. The Ministry of Agriculture and Forests also released the first book on historically significant trees of Bhutan. The book documents the important tree species present in Bhutan. Finding solutions from tree rings on the impacts of climate change in mountain environments, the 10th World Dendro Conference began in Thimphu yesterday. Bhutan is the first developing country to host the conference.  Source: Kuensel Online Jun 11, 2018 Note: Dr. Hans Linderholm,  Department of Earth Sciences, Gothenburg University, is one of the four principal organizers. Det här inlägget postades i English, Snippets from Bhutanese media. Bokmärk permalänken.
Music during the french revolution The french revolution (french: the question of the quality of italian vs french music example of feminist militant activism during the french revolution. French revolutionary culture was dominated by fashion and music 2 the revolution was heavy several popular songs emerged during the french revolution. The french revolution was one of the most important upheavals and students will be asked to reflect more broadly on the role of violence during the revolution. Music first listen all vegetarians and the french revolution : vegetarianism during the french revolution is most often traced to the political. Eq how was music affected by the french revolution music and the french revolution ludwig van beethoven franz schubert frederic chopin music was used to invoke. The lengthy history of french music begans back in set during the 19th century, famous french musicians like ravel cause and effect in the french revolution. Bastille day step into the excitement and chaos of the french revolution as told by musician and artist jeffrey lewis. The tennis court oath (french: serment du jeu de paume) was a pivotal event during the french revolution the oath was a pledge signed by 576 out. I chose to study and write about dance during the french revolution political propaganda and realistic ballets: during the refrain in the music. Textbook site for: humanities in the and discusses developments in the arts during that period the french revolution sought to realize the symphonic music. Beethoven: man, composer and revolutionary it is the french revolution in music to fight against the french occupiers of their native land during the. Liberty equality, fraternity: exploring the french revolution home explore music and singing were fundamentally like so much else during the early phase. Music of the french revolution created date: 20160807135029z. Mix - one hour of french revolutionary music youtube music for the french revolution,concerto koln - duration: 1:01:46 the gravicembalo 87,210 views. Bbc explores the revolutionary soundtrack to the 19th of music during and turmoil unleashed on them during the french revolution. A watershed event in modern european history, the french revolution began in 1789 and ended in the late 1790s with the ascent of napoleon bonaparte during this. Music and war in europe from the french revolution to publishing and teaching music during battle and siege in the opera of the french revolution and. French revolution the french revolution started in 1789 it was then france was going through hard times king louis xiv spent france's money selfishly and it sent. 8 revolutionary songs you should know although he was only a child during the russian revolution of 1917 the french revolution was massively massive. This revolution in thinking inevitably led to conflict between the old order and new ideas the french important forms of choral music during the classical period. Posts about french revolution written by thelibrarianofawesome this pathfinder has been constructed for students and scholars interested in the music of the. Music during the french revolution music during the french revolution The revolution heightened the political activity of women they threw themselves into the spirit of the times, taking as their own the issues with which their. The romantic era is typically noted for its the period is conventionally marked as beginning with the french revolution in 1789 and ending with the passing of. The french revolution created an extraordinarily rich world of visual imagery, iconography, and music these images and songs would outlive the revolutionary era of. Figaro and the french revolution the mercurial changes in the thoughts and feelings of the characters are conveyed with great accuracy by the music. • Music of france styles: gregorian - • french wars of religion • louis xiv of france • french revolution • napoleonic wars • french third during the. • The french revolution violently transformed france from a monarchy with rigid social classes into a modern nation where social structure was loosened & power passed. • On the eve of the revolution, the french and the church was to give up all claims to property lost during the revolution the french revolution saw the. • Dotson, savannah j, french opera and the french revolution, etienne nicolas mehul many scholars have studied french music during the french revolution some. • Which of the following best describes the social life of the french aristocracy during music was composed during revolution included all of the following. During the eighteenth century british music and the french revolution xi french culture on the traditional leaders of britain the whig and tory. Revolution and nineteenth-century europe band music of the french revolution - hector berlioz jadin were written during the years of the french revolution. Music during the french revolution Rated 3/5 based on 43 review
U ss war on terror and ww2 u ss war on terror and ww2 The u-boat war in world war two grey wolves world war ii submarines ww2 boating german germany boating holidays world war two victory in spite of all terror. Inside the “topography of terror” documentation center there is an exhibition on ground level about the crimes committed by the gestapo and the ss, first in germany and later in all of europe as the war expanded their territory. Graphic: ww2 german soldiers kia 'the pacific war in color' pararescuemen train halo jumping with us marines. Find out more about the history of the ss, including videos, interesting by the start of world war ii (1939-45), the ss had more than 250,000 members and multiple. The next morning, the u-123 sank a third ship, the steamship ss esparta, about fourteen miles south of brunswick john p u-boat attacks during world war ii. Historians have since concluded that it was probably a war american soldiers executed dozens of the us troops opened fire on 50 members of the ss and the. War, terror, and torture war is the father of all, and king of all and the netherlands was one of the better recruiting grounds for the nazi ss. The ustasha are a group intimately related to the wartime history of yugoslavia, both during world war 2 and the wars of the former yugoslavia. United states bombings of other countries cities and villages” is a war crime of long standing, we never see the terror in the eyes of the children,. The case for ‘racial profiling’ in world war 2 and the war on terror,” that the freighter ss lahaina was eager to carry the war to the us. Top 10 allied war crimes of world war ii and were replaced with members of the waffen-ss, were a collection of 19 us-built prisoner of war camps. Ss athenia, first british ship lost in ww2 fearing it would draw america into the war the u 'extreme right infiltrating politics' says former met terror. Acts of terrorism and atrocity by japanese in ww2 ww2: merchant lifeboats from ss richard hovey and machine future war more likely with the us than. World war ii: german u-boat attacks april 8, 1942 - st simons island the nazis brought world war ii to georgia, when a german u-boat sank three ships off the. 20 disturbing conspiracy theories about world war ii by today’s standards of the war on terror, (including by ex-ss officers themselves after ww2). Editor's note: on tuesday, reports began flowing out of afghanistan that a us army general had been killed general and flag officers killed in war robert s rush. Uss terror (cm-5) was a fleet and treatment for the survivors of lst-447 and ss logan victory post-war, 1945–1947 her repairs completed,. The text was in dutch and also encouraged the viewer to read the dutch nazi-paper storm-ss - american jingoism and war fervor kultur-terror / liberators ww2. How do the casualties from ww1 and ww2 compare and contrast ww2 was like the civil war in that it brought terror and death to how did ww1 and ww2 compare and. Online shopping for world war ii from a great selection at books ten weeks of terror killing the ss: the hunt for the worst war criminals in history. Start studying ss ww2 learn vocabulary, terror, and technology -united states declares war on japan and their allies. A commander of a nazi ss-led unit accused of torching nazi ss commander lives in minnesota showing unfiltered media from the global war on terror and. Ww2 propaganda onsdag 17 augusti the original with the title kultur-terror (miss victory waves the reverse side of 48-star us flag, and the ww2-era army. Tag: war on terror david swanson discusses the use of camps during ww2 for enemy as the war on terror wages on and the threat of isis seems to constantly. A convoy in the caribbean (us national archives #104063) on these pages you can view the most famous convoy battles, read about the convoy routes and see the entire list of convoys hit by u-boats in the war. Hitler and the nazi regime also resorted to simple and extra-legal terror to intimidate opponents nazi paramilitary formations, (schutzstaffel or ss),. Little known attacks and threats on the us sunk by sawfish (ss-276 by the time the us entered ww2, the war had been going on for over two. u ss war on terror and ww2 The u-boat war in world war two grey wolves world war ii submarines ww2 boating german germany boating holidays world war two victory in spite of all terror. Download u ss war on terror and ww2` U ss war on terror and ww2 Rated 4/5 based on 16 review
Babies prefer human voices to other sounds and are especially drawn to the voices of their caregivers. After 1 month, they can identify primary caregivers by voice, even if they're in another room. By the second or third month of life, babies begin smiling in response to the sound of familiar voices. They engage in "smile talk," which can include gurgling or making other noises to attract attention and then beaming enthusiastically to their caregivers.
Tag Archives: sleep apnea Sleep Disturbance Facts 5 Breathing Disorders You Might Be Suffering From Many different disorders affect the human respiratory system. Most of these cause serious health complications for the patient and are often chronic conditions. These can happen to anyone, but genetic pre-disposition and environmental factors also play a role. At times, people tend to neglect signs of breathing disorders simply because they’re not aware of the symptoms. To help you in this regard and to live a healthy life, given below are some tips: (1) Asthma Asthma is a chronic condition that causes inflammation of the airways. The breathing passages get narrow because of the inflammation, ultimately leading to limited airflow and breathing problems. Signs and Symptoms ▪ Tightness feeling in the chest ▪ Shortness of breath ▪ Wheezing ▪ Dry, irritating cough ▪ Coughing that is made worse by seasonal flu, colds The exact cause of Asthma has not been determined; medical experts believe it is a combination of genetic and environmental factors that lead to Asthma. Early life exposure to allergens, a genetic predisposition to allergies all are contributing factors. There is no cure for Asthma, but the symptoms can be controlled effectively. ▪ Avoid asthma triggers– Most common ones are: exposure to pollen, dust, chemicals, pollution, and pet fur. ▪ Inhaled corticosteroids–Use an inhaler that delivers medicine directly to the lungs ▪ Theophylline ▪ Leukotriene modifiers (2) Sleep Apnea A serious sleep disorder, sleep apnea causes irregular breathing patterns during sleep. People with sleep apnea can have higher risks of cardiovascular problems such as, high blood pressure, heart attack, stroke, and obesity. Signs and Symptoms Often goes undiagnosed because it only occurs during sleep. ▪ Shallow breathing or breathing pauses ▪ Loud snoring ▪ Morning headaches ▪ Sore throat or mouth dryness after waking ▪ Trouble focusing on intensive tasks ▪ Irregular sleep patterns Brain signals that cause repeated interruptions during sleep cycles. This is a chronic condition and has to be managed properly. These have to be used while sleeping ▪ Use of breathe assisting devices – continuous positive airway pressure (CPAP) ▪ Mouth guards which lower jaw position during sleep and open up the airway ▪ Lifestyle changes (such as losing weight or quitting smoking) are helpful (3) Emphysema Categorized as a Chronic Obstructive Pulmonary Disease (COPD), emphysema damages the fragile air sacs of lungs and the body fails to get the oxygen it needs. Signs and Symptoms ▪ Persistent cough ▪ Frequent respiratory infections ▪ Reduced appetite ▪ Unexplained weight loss ▪ Fatigue and tiredness ▪ Swelling of ankles ▪ Cigarette smoking ▪ Exposure to secondhand smoke ▪ Exposure to high pollution levels ▪ Essential to stop smoking ▪ Steroids ▪ Antibiotics ▪ Bronchodilators ▪ Vaccines (4) Chronic Bronchitis Categorized as a Chronic Obstructive Pulmonary Disease (COPD), it is an inflammation of the airways (bronchial tubes) that carry oxygen to the lungs. Signs and Symptoms ▪ Cough ▪ Fever accompanied by chills ▪ Shortness of breath ▪ Chest discomfort ▪ Fatigue ▪ Smoking ▪ Air pollution ▪ Exposure to toxic gases, fumes and dust ▪ Quit smoking ▪ Use of antibiotics ▪ Humidifiers to help loosen mucus buildup ▪ Oxygen therapy ▪ Medicines- Bronchodilators, Steroids and Antibiotics (5) Pneumonia A common lung infection caused by bacteria, viruses, and fungi. More concerning when it occurs in very young children and older people (>65 years). Signs and Symptoms ▪ Labored breathing ▪ Persistent cough ▪ Bouts of severe cough ▪ Reddish and/or yellow-green sputum ▪ Low appetite and/or lack of energy ▪ Painful breathing ▪ Germs– bacteria, viruses and fungi ▪ Mycoplasma ▪ Various chemicals ▪ Oral antibiotics (for bacterial pneumonia) ▪ Viral pneumonia requires antiviral medication ▪ Non-steroidal anti-inflammatory drugs (NSAIDs) to control fever ▪ Plenty of rest and fluids People need to be aware of the most common breathing disorders, the symptoms vary but early detections of these problems can make a tremendous difference when it comes to controlling the symptoms and ensuring a healthy, productive life. Note: If you think you might be suffering from any of these diseases kindly get in touch with a doctor, and telemedicine in such a case can be of great help. Symptoms such as a persistent cough, wheezing, shortness of breath after light activities, or any other discomfort during breathing can all be signs of a serious disease.
9 foods that boost your energy better than coffee Skip the caffeine-filled options and select these healthy foods that will kick-start that energy rush. By Shweta Gandhi  #1 Kale This superfood is among the most nutrient dense foods on the planet. Member of the cabbage family, this green or purple leaf is high in vitamins A, K, C, B6, calcium, copper, potassium and magnesium—all wrapped up in 33 calories, six grams of carbs (out of which two are fibre) and three grams are protein. Also, it’s high in antioxidants and helps lower cholesterol, fight cancer and keeps your weight in check. #2 Salmon One of the known health benefits of this fish is its inclusion of omega-3 fatty acids—necessary for producing energy, increasing brain activity and blood circulation. But less commonly known benefits include its protein and amino acid content. Salmon also contains small bioactive protein molecules called bioactive peptides. These help in supporting joint cartilage, insulin effectiveness and controlling inflammation in the digestive tract. #3 Greek yogurt Yogurt is packed with probiotics—good microorganisms like bacteria and yeast—that live in your intestines and ensure healthy digestion, boost energy levels and strengthen your immune system. Greek yogurt also contains protein (makes cells grow, repairs tissues and builds muscle), vitamin B12, iodine (important for proper thyroid function) and calcium (aids in weight loss). The best part is its multipurpose use—eat as is, make a flavoured shake or add berries for some added antioxidants. #4 Lentils Lentils are a high fibre, high protein member of the legume family, found in red, brown and green varieties. They counter the risk of obesity, diabetes, cancer and heart disease (through the presence of folic acid and potassium). Legumes also stabilise blood glucose levels, help fight fatigue (as they’re a great source of iron) and reduce appetite by making you feel fuller. One cup of cooked lentils contains 230 calories, 18 g of protein, 1 g of fat and 40 g of carbohydrates. #5 Bran flakes Full of energy producing B-vitamins, iron and magnesium, bran flakes are a healthy replacement for sugar-coated cereals. Since bran fibre requires a bit of chewing, it gives your body time to realise that you’re full. The wallop of insoluble fibre keeps you full for longer, reduces the chances of constipation, stabilises blood sugar levels and also fights fat. #6 Quinoa A species of the goosefoot genus, quinoa is a highly nutritious grain rich in complex carbohydrates and protein. It is also high in healthy fats like mono unsaturated fat, small amounts of omega-3 fatty acid and alpha-linolenic acid (ALA), which reduce the risk of inflammation and obesity. Three-fourth cup of cooked quinoa contains 222 calories and is enriched with manganese, copper, phosphorus, magnesium, fibre, folate and zinc. #7 Dark chocolate This one is quite commonly known to have a good amount of antioxidants, which help in improving blood flow, lowering blood pressure and cardiovascular diseases, provided you pick a bar with more than 70 per cent cocoa. A 100 g bar with 70-85 per cent cocoa contains fibre, iron, magnesium, copper, manganese, potassium, phosphorus, zinc and selenium, all under 600 calories. A great alternative to a cup of coffee. #8 Almonds Almonds contain lots of healthy fats, fibre, protein, magnesium and vitamin E, which can lower blood sugar levels, cholesterol, blood pressure and hunger, and promote weight loss. A small handful or 28 g contains 2.5 g of digestible carbohydrates and only 161 calories. #9 Whole grains Whole grains constitute wheat, kamut, oats and brown rice, which contain complex carbohydrates, fibre, B-vitamins, iron, zinc, copper, magnesium and antioxidants. These give you enough energy to carry to till your next meal. A diet rich in whole grains lowers the risk of obesity, heart disease, type 2 diabetes and cancer.     Categories:   Lifestyle, Food & Drink, Health & Fitness Time limit is exhausted. Please reload CAPTCHA.
[Coral-List] reef definitions Walter Goldberg goldberg at fiu.edu Wed Oct 30 13:31:49 EDT 2013 All of the terms that Doug Fenner et al. refer to concerning reefs, bioherms, etc. in the 'artificial reefs' thread are used and misused frequently enough to warrant a reference. Springer's Encyclopedia of Modern Coral Reefs edited by David Hopley (2011) is a comprehensive source of information on these matters. And if your library does not have a copy, or if you cannot afford the $600 tab for this reference, May I most modestly suggest looking at Goldberg's Biology of Reefs and Reef Organisms (University of Chicago Press, 2013) pages 1-3? On 2013-10-30, at 10:29, Szmant, Alina wrote: Hi Doug: Thanks for your clear write up, which perfectly captures my assessment of the various terms as I use them (and teach). Too many people either do not know about or have forgotten the term "bioherm" which in my mind captures structures like the deep Oculina and Lophelia structures, which are too deep to sink anything other than a submarine, and so in my book, are not 'coral reefs' shallow or deep. Dr. Alina M. Szmant Professor of Marine Biology Center for Marine Science and Dept of Biology and Marine Biology University of North Carolina Wilmington 5600 Marvin Moss Ln Wilmington NC 28409 USA -----Original Message----- From: coral-list-bounces at coral.aoml.noaa.gov<mailto:coral-list-bounces at coral.aoml.noaa.gov> [mailto:coral-list-bounces at coral.aoml.noaa.gov] On Behalf Of Douglas Fenner Sent: Tuesday, October 29, 2013 5:58 PM To: Eugene Shinn Cc: coral list Subject: Re: [Coral-List] Artificial Reefs I think one other distinction needs to be made. And that is the difference between a coral reef as a geological structure, and a coral reef as a living ecosystem. People commonly use the term "coral reef" to mean either or both. They are two quite distinct things, although the living ecosystem builds the geological structure, so the are very much connected. Since they are two distinct things, you can have both together, or just one or the other present. So you can have a geological "coral reef" which is an accumulation of calcium carbonate that was produced by a coral reef ecosystem in the past, but which no longer has a coral reef ecosystem living on it today. A Pleistocene coral reef which has almost no corals on it today, such as Gene was pointing out in Florida, would be an example. It might be called a "hardground" or a "dead coral reef." On the other hand, you can have a coral reef ecosystem, without a geological coral reef. So an ecosystem of living corals and other organisms, in which corals are abundant enough to make it a coral reef ecosystem instead of say, an algae bed, but which is growing directly on rocks that are not carbonates. So there is no carbonate buildup beneath the corals, yet there are enough corals that there is a coral reef ecosystem. As John says, that is often referred to as a "coral community." And then you can have both together, which is what most of us are most familiar with. But they are two distinct things, and are separable. I would think that something humans build and put into the water could easily become a coral reef ecosystem if enough corals settle on it, but would require a lot of time to become a coral reef geological structure, the corals would have to build so much carbonate that the coral carbonate was what the structure was mostly made of. Could certainly happen, but would take a lot of time. The other aspect is the "reef" aspect. A "reef" being a natural structure in the water that is shallow enough you can run your boat aground on it.. "Coral reefs" can be considered a type of reef that is made of coral. However, this is a relatively superficial use of terms that doesn't acknowledge the distinction above between a geological structure and an ecosystem.. Plus it gets into the problem of what to call a geological structure with a coral ecosystem on top of it, which doesn't reach shallow enough depths to run a boat aground on. There are places like that, surely plenty. In my view, they should still be called "coral reefs" even if they are too deep to run a boat aground on. Then there is the distinction that we have become aware of, that there are deep water, cold water, places that have corals growing, and a structure built by corals. Those corals do not have zooxanthellae, they have to catch food. The corals are typically thin branching species, and that ecosystem has a very low diversity of coral species, probably most are dominated by just one species on a structure. But the structures they build (I think they're called "bioherms") can be fairly large. But clearly this is a distinct, though somewhat similar, thing to the tropical, shallow water, coral reefs most of us work on. Often they are called "deep water reefs" or "cold water reefs" or something like that. Hope that helps a little. Cheers, Doug On Tue, Oct 29, 2013 at 4:04 AM, Eugene Shinn <eugeneshinn at mail.usf.edu<mailto:eugeneshinn at mail.usf.edu>>wrote: John, That is a well reasoned response to my questions, thank you and congratulations. I especially appreciate your comment about Pleistocene coral reefs. I continually rant about how little growth there is on the so-called Florida reef tract that has had 6,000 years to grow and have often suggested it be called a hard bottom coral community rather than a reef. In this case the hard bottom is slowly forming on a thick Pleistocene age coral reef so geologically speaking it could all be lumped together and called a coral reef. It is a coral reef which contains an 80 to 110 thousand year old hiatus between a Pleistocene coral reef tract that was exposed and populated by air breathing plants and animals when sea level dropped a few hundred feet below present. The mystery is how did this thick coral reefs develop during the Pleistocene in a location where where corals have been doing poorly for the past 6,000 years? I can only guess that it was warmer during the Pleistocene interglacial period. Gene No Rocks, No Water, No Ecosystem (EAS) E. A. Shinn, Courtesy Professor University of South Florida College of Marine Science Room 221A 140 Seventh Avenue South St. Petersburg, FL 33701 <eugeneshinn at mail.usf.edu<mailto:eugeneshinn at mail.usf.edu>> Tel 727 553-1158 More information about the Coral-List mailing list
Open main menu The numerous literary and creative devices used within fiction are generally thought inappropriate for use in nonfiction. They are still present particularly in older works but they are often muted so as not to overshadow the information within the work. Simplicity, clarity and directness are some of the most important considerations when producing nonfiction. Audience is important in any artistic or descriptive endeavor, but it is perhaps most important in nonfiction. In fiction, the writer believes that readers will make an effort to follow and interpret an indirectly or abstractly presented progression of theme, whereas the production of nonfiction has more to do with the direct provision of information. Understanding of the potential readers' use for the work and their existing knowledge of a subject are both fundamental for effective nonfiction. Despite the truth of nonfiction, it is often necessary to persuade the reader to agree with the ideas and so a balanced, coherent and informed argument is vital. However, the boundaries between fiction and nonfiction are continually blurred and argued upon, especially in the field of biography;[4] as Virginia Woolf said: "if we think of truth as something of granite-like solidity and of personality as something of rainbow-like intangibility and reflect that the aim of biography is to weld these two into one seamless whole, we shall admit that the problem is a stiff one and that we need not wonder if biographers, for the most part failed to solve it."[5] Semi-fiction is fiction implementing a great deal of nonfiction,[6] e.g. a fictional description based on a true story. Major typesEdit Common literary examples of nonfiction include expository, argumentative, functional, and opinion pieces; essays on art or literature; biographies; memoirs; journalism; and historical, scientific, technical, or economic writings (including electronic ones).[7] Journals, photographs, textbooks, travel books, blueprints, and diagrams are also often considered non-fictional.[citation needed] Including information that the author knows to be untrue within any of these works is usually regarded as dishonest. Other works can legitimately be either fiction or nonfiction, such as journals of self-expression, letters, magazine articles, and other expressions of imagination. Though they are mostly either one or the other, it is possible for there to be a blend of both. Some fiction may include nonfictional elements. Some nonfiction may include elements of unverified supposition, deduction, or imagination for the purpose of smoothing out a narrative, but the inclusion of open falsehoods would discredit it as a work of nonfiction. The publishing and bookselling business sometimes uses the phrase "literary nonfiction" to distinguish works with a more literary or intellectual bent, as opposed to the greater collection of nonfiction subjects.[8] Specific typesEdit See alsoEdit 1. ^ a b Farner, Geir (2014). "Chapter 2: What is Literary Fiction?". Literary Fiction: The Ways We Read Narrative Literature. Bloomsbury Publishing USA. 3. ^ "Non-fiction". Oxford Dictionaries. Oxford University Press, 2015. 7. ^ Susan B. Neuman and Linda B. Gambrell, eds. (2013). Quality Reading Instruction in the Age of Common Core Standards. International Reading Association. p. 46. 8. ^ Archived 2014-02-13 at the Wayback Machine. External linksEdit
Children need several hours more sleep than adults do. How to Break Your Child's Waking Up Habits by Darlena Cunha It's no secret that many moms of toddlers are desperate for a good night's sleep. Night terrors, hunger, sickness and fear can all keep children up at night. However, as you drag your tired body to your little one's room for yet another request for water or a hug, you may realize that habit is the most powerful cause that wakes kids up in the wee hours. Breaking this pattern can be arduous, but it's worth it in the long run, for both you and your child. If little ones don't get enough uninterrupted sleep at night, they can be cranky and disoriented during the day and more prone to tantrums. If the problem persists, they can even start to lag behind in their development. Regulate your little one's sleep during the day. Too often parents start cutting naps during the toddler and preschool years, but being overtired can actually hinder sleep at night. Set a schedule that allows your child to get the sleep she needs during the day. If she needs a nap, have her take it at least five hours before she goes to bed at night. This way she's not being deprived of sleep, but she won't feel as if she's just woken up when it's time for bed. When your child no longer needs naps, she'll signal it by being spry and cheerful during the day -- really! Create a consistent bedtime routine. When parents change the order or time of nighttime activities, children have trouble getting into the right mind-set to sleep. Start an hour before bedtime. Give your child a bath, something to drink, read quiet stories and brush teeth. Tell her there'll be no running around or loud play during this time, helping her body transition into sleep. Changing your activities too frequently before bed confuses your child and makes her resistant to sleep. Even if you do the same activities but vary the time at night by more than an hour, your child's body may have trouble keeping up. At bedtime, make the environment calm and consistent. Let your little one self-soothe. Overeager parents often appear at the bedroom door at every squeak or whimper. Your presence only serves to wake up your very-nearly-sleeping child, disrupting her natural rhythm. Many children just need to resettle, turn over and drift back to sleep, so give them a chance to do that. Children can get used to waking up at night just to see Mommy's face. It's important to let them find their own sleep rhythms. • Self-soothing techniques shouldn't be confused with "cry it out" techniques. You probably know and understand your child's cries and can tell whether she needs you. • Taking your child into your bed may seem like a temporary solution, but try to avoid cosleeping at the toddler or preschool stage. This can turn into a habit that prevents both parent and child from getting a good night's sleep. About the Author Photo Credits • Siri Stafford/Digital Vision/Getty Images
Test Preview 1. Alzheimer’s disease is a slow, progressive, degenerative brain disease resulting from damaged neurons in parts of the brain that control ___________. 1. Which of the following factors are known to contribute to Alzheimer’s disease? 1. The majority of Alzheimer’s disease cases are diagnosed in individuals age 65 and older. 1. Developing Alzheimer’s disease is a normal part of aging. 1. The risk of developing Alzheimer’s disease is increased in: 1. Which of the following is NOT an early sign or symptom of Alzheimer’s disease? 1. Parkinson’s disease is a health condition that is known to cause dementia. 1. Individuals who need high levels of assistance with daily activities and personal care are at the __________ stage of Alzheimer’s disease. 1. Aricept® and Exelon® are drugs that can cure Alzheimer’s disease. 1. ______________ are drugs taken to manage hallucinations, delusions, paranoia, aggression, agitation hostility, confusion, uncooperativeness, and sleep disturbances. 1. The most common oral adverse effect from medications are taken to treat the behavioral symptoms of Alzheimer’s disease is ______________. 1. There is sufficient evidence to support the use of dietary supplements to prevent Alzheimer’s disease. 1. There is sufficient evidence to support exercising and consuming a Mediterranean diet show promise in preventing Alzheimer’s disease. 1. Which of the following behavioral changes may indicate a patient diagnosed with Alzheimer’s disease is having dental problems? 1. Dysphagia can increase the risk of aspiration, choking, and pneumonia. 1. Patients diagnosed with Alzheimer’s disease should have their dental needs ____________________. 1. Research suggests that a patient’s willingness to receive dental care, during later stages of Alzheimer’s disease, is influenced by their past dental experiences. 1. Informed consent is NOT legally necessary ____________________. 1. The “medical model” of health care delivery focuses on ____________________. 1. The ______________ has resources available in 13 countries and information on their website can be provided in 14 languages.
GrassBase - The Online World Grass Flora Deyeuxia elatior HABIT Perennial. Culms erect; reed-like; 100–200 cm long. Lateral branches lacking. Leaf-sheaths glabrous on surface, or hirsute. Ligule an eciliate membrane. Leaf-blades 15–20 cm long; 8–15 mm wide; coriaceous. Leaf-blade midrib prominent beneath. Leaf-blade surface glabrous, or pubescent; hairy abaxially. INFLORESCENCE Inflorescence a panicle. Panicle open; ovate; effuse; 15–30 cm long; 10–15 cm wide. Primary panicle branches spreading; whorled at lower nodes. Panicle branches scaberulous. Spikelets solitary. Fertile spikelets pedicelled. FERTILE SPIKELETS Spikelets comprising 1 fertile florets; with a barren rhachilla extension. Spikelets lanceolate; laterally compressed; 5–5.5 mm long; breaking up at maturity; disarticulating below each fertile floret. Floret callus pilose. GLUMES Glumes persistent; similar; exceeding apex of florets; firmer than fertile lemma. Lower glume lanceolate; 5–5.5 mm long; 1.1 length of upper glume; membranous; 1-keeled; 1 -veined. Lower glume primary vein scabrous. Lower glume lateral veins absent. Lower glume apex acuminate. Upper glume lanceolate; 4.5–5 mm long; 1.1 length of adjacent fertile lemma; membranous; 1-keeled; 3 -veined. Upper glume primary vein scabrous. Upper glume apex acuminate. FLORETS Fertile lemma lanceolate, or ovate; 4–4.5 mm long; membranous; without keel; 5 -veined. Lemma surface scaberulous. Lemma apex dentate; awned; 1 -awned. Principal lemma awn dorsal; arising 0.1 way up back of lemma; geniculate; 7–8 mm long overall; with twisted column. Palea 4 mm long; hyaline; 2 -veined. Rhachilla extension pilose. FLOWER Lodicules 2. Anthers 3; 2.5 mm long. Stigmas 2. FRUIT Caryopsis with adherent pericarp. Hilum punctiform. DISTRIBUTION Asia-tropical: India. NOTES Aveneae. Fl Assam 1993.
When Reagan took office in 1981, he began a campaign to undertake significant increases in defense spending. By 1983 he had passed the Strategic Defense Initiative (SDI) and the Strategic Computing Initiative (SCI). While these two projects were not practically linked, they were so for political reasons. The SDI or “Star Wars” sought to protect the US from Soviet launched nuclear intercontinental ballistic missiles utilizing a variety of space and ground based technologies. The SCI sought to develop different military applications in the areas of artificial intelligence, robotics and hardware development.   Moreover, the Army’s new strategic doctrine, the AirLand Battle (1983) heavily influenced the trajectory and the development of these particular technologies. The AirLand Battle concept emerged as the way forward for the US to counter a numerically superior adversary (Russia) by utilizing a technological advantage. Here, the US began pursuing programs such as autonomous land vehicles, AI software running battle management programs, AI software allowing for situational awareness (both for pilots and ground based forces), and massive pushes for stronger computing power, as well as chemical lasers, directed energy weapons, a hypervelocity rail gun and a satellite based missile interceptor system. The Air Force desired better tactical ability for its fighters, as well as stealth technology and unmanned aerial vehicles, and the Army wanted autonomous land vehicles, battlefield and logistics management, and better stand off weapons (such as smart bombs). The Navy, at this time, was likewise pursuing similar tracks but was not as heavily funded through these initiatives.   The result was billions of dollars spent from 1983-1994 and a handful of powerful new technologies in the US military’s arsenal. The SDI and the SCI shaped military doctrine, and military doctrine shaped the pursuit of particular technologies. By 1991, the US no longer faced a threat from vast numbers soviet ground forces, and the raison d’être of the build up, the Cold War, was moot.   Yet the US possessed new technologies that it had not had the opportunity to test operationally. The Gulf War of 1991 offered the US a chance to not only come to Kuwait’s aid and thwart an Iraqi invasion of Saudi Arabia (and its vast oil fields), but also to trot out its new arsenal and prove the success of the AirLand Battle concept in action.   Relying heavily on airpower and ground forces, the US led Coalition dealt a devastating blow to Iraq. While it is outside of the scope of this brief essay to engage fully with many of the nuances of Operation Desert Storm, and the regional and geopolitics of the time, we can say that the war itself had long roots back to Reagan and the Carter administration. What is more, and for present purposes, other powers in the system—particularly China—watched how the US waged war. In particular, they observed and began thinking about ways to disrupt and deny the US’s ability to work this way.   This counterstrategy became known as A2/D2: anti access/anti denial. The A2/D2 strategy is designed to limit the US’s ability to utilize its long-range strike capability and air power. Utilizing ballistic and cruise missiles to take out air bases, as well as anti-ship ballistic missiles and subsurface vessels to seriously hinder maritime power, the US faces strong opposition in both the air and sea domains from any utilizing this approach.   Moreover, a networked system of surface to air missiles and modern fighter craft means that US air power would not face a permissive, but rather a hostile, environment. In other words, the means and supremacy the US possessed in 1991 Iraq—to even get boots on the ground—would not work in areas of A2/D2. What does this mean for Middle Eastern policies? Well, for the recent past, it means that US military capacities and how the US has fought (or decided to fight) in is highly dependent upon when it thinks it can win with AirLand Battle strategies.   While it is a gross under statement to say that Bush 43 undertook the 2003 Iraq invasion without considering long-term strategic implications, and that he more than likely was influenced by his father’s experiences with Desert Storm, the playbook for 2003 looked very similar to 1991. Where things began to unravel quickly, however, was on Land front of the AirLand strategy. Not considering the likelihood of an insurgency, the administration was infamously ill prepared. This brings us up to 2003, when Scarborough posits that Bush’s ideological fervor took over in the face of “sound reason.” This explanation is only half the story, though, and an easy half at that.   Bush’s response to the 2001 terror attacks and the subsequent NATO campaign in Afghanistan play a role in some of his decision making in Iraq, as does his unchanging belief in superior technology and the “welcoming” of liberation by Iraqi civilians.   By the time that President Obama took office in 2009, he was facing wars on two fronts, and both of those wars could not be won from the AirLand battle concept or the technological superiority of stand-off weapons and unmanned systems.   While those particular technologies offered greater surveillance capacities, as well as strike capabilities (given the permissive air environments at this point), they were not sufficient to enable the US “win” in any way, shape, or form. Moreover, the US’s shift from an AirLand battle concept to an AirSea Battle concept began with thoughts on how to counter the A2/D2 strategy in the Pacific and Persian Gulf. Initial musings around 2003 led to a report in 2009 and its formal adoption as doctrine in 2010 (Krepinevich, Watts and Work, 2003). While Obama has consistently discussed his “pivot to Asia” and the importance of the Asia Pacific region, he has had to pursue those grand strategic objectives in the face of scheduled troop drawdowns in Afghanistan and Iraq, but also multiple exogenous shocks to the system and the region. He still supports the doctrine, as is apparent in the newly released “Joint Concept for Access and Maneuver in the Global Commons,” which is a revision of 2010 AirSea Battle to include a land force option. But Obama’s support of the AirSea Battle is due to the changing strategic and technological landscape. He is not merely “reactionary” as Scarborough suggests, but choosing amongst the various bad options that continue to present themselves. In the Middle East, those bad options, however, are the result of a Cold War mindset that enabled the fist Iraq War and shaped initial strategy in the second Iraq War. Moreover, while Obama has attempted to accept the strategic shift, he does adhere to a “blind ideology,” as did his predecessor and all US presidents since Roosevelt: the ideology of technology. The ideology of technology is a belief that one can create a technological solution to any problem, while minimizing costs in both lives and monies. This ideology is the more pernicious belief than what some might ascribe to Bush 43 or his cronies. While technology has its uses, it is not value neutral. It manifests the values of its creators, and it shapes the opportunities and decisions of those who will yield it. Much as how we saw a technological itch the US desired to scratch in 1991.   Moreover, the ideology of technology can also blind its possessor, particularly in the face adversaries who will use it against them, to otherwise foreseeable outcomes, such as in the Iraqi insurgency. Understanding the “disarray” of Obama’s Middle Eastern foreign policy decisions is to understand the grand strategic setting, as well as how his presidential inheritance was bound up in a technological path dependence, a country’s war weariness, massive economic shocks to the global economy, the Arab Spring—which few if any saw coming—and the continued Cold War geopolitics of Russian allies and spheres of influence. While this is no apology for Obama’s decisions during his tenure, one can only begin to appreciate them in this larger and longer context. Additionally, through this perspective we can see Obama’s acceptance and support of the ideology of technology.  His is not merely carrying on this ideology; he is doubling down. Case in point: he has expanded the use of unmanned aerial vehicles, and his increased funding of activities for cybersecurity and CYBERCOM amidst shrinking defense budgets.   His vision is to further bolster the ideology of technology as the US’s primary means at securing its power and safety in the future. The turmoil in the Middle East and the US’s ability to effectively pursue its foreign policy there requires looking further back than Bush 43.   It requires understanding Cold War rivalries, proxy wars, arms races, family histories, military strategies and weapons capabilities, management styles, and last but not least US domestic politics. Historians, or better yet political scientists and foreign policy analysts, cannot but look beyond the last fourteen years to understand the current thinking, and if they do not, they should.
The Pilgrims discovered crabapples had preceded them to America, but the fruit was not very edible. The Massachusetts Bay Colony requested seeds and cuttings from England, which were brought over on  later voyages of the Mayflower. Other Europeans brought apple stock to Virginia and the Southwest, and a Massachusetts man, John Chapman, became famous for  planting trees throughout Ohio, Indiana, and Illinois (his name became "Johnny Apple seed"). Seeds from an apple given to a London sea Capitan in 1820 are sometimes said to be the origin of the State of Washington apple crop (now the  largest in the U.S.). As the country was settled, nearly every farm grew some apples. Although some were very good, most of the early varieties  would be considered poor today. Of nearly 8000 varieties known around the world,  about 100 are grown in commercial quantity in the U.S., with the top 10  comprising over 90% of the crop. Our modern orchards combine the rich heritage of apple growing with research and field trials to grow an annual U.S. crop exceeding 220,000,000 bushels. New varieties are still being discovered and  cultivated, with the best eventually becoming "household words" like McIntosh Apple,  Delicious apples, Empire apples, Rome apples, Spartan apples, Cortland apples, Granny Smith apples, etc.. Recent arrivals  include Honeycrisp apples, Gala apples, Fortune apples, Fuji apples, Braeburn apples, Liberty apples, and more than a few "throwbacks" to antique apple varieties now enjoying a resurgence. Arkansas Black Apple, Blushing Golden Apple, Braeburn  Apple, CandyCrisp® Apple,  Cortland Apple, Earliblaze  Apple, Empire Apple, Enterprise Apple, Fireside Apple, Fortune Apple, Freedom Apple, Fuji Apple, Gala Apple, Gibson Apple, Golden Delicious Apple, Golden Supreme Apple, GoldRush Apple, Granny Smith Apple, Grimes Golden Apple, Honeycrisp™ Apple, Honeygold Apple, Idared Apple, Idared Apple, Jonafree Apple, Jonagold Apple, Jonagold Apple, Jonalicious Apple, Jonathan Apple, Liberty Apple, Lodi Apple, Macoun Apple, McIntosh Apple, Mollies Apple, Mutsu Apple, Northern Spy Apple, Ozark Apple, Pristine® Apple, Red Delicious Apple, Redfree Apple, Rome Apple, Royal Empire Apple, March Wonder Apple, Shizuka Apple, Stayman Apple, SummerMac Apple, SunCrisp® Apple, Sweet 16 Apple, UltraGold Apple, Williams’ Apple, Winesap Apple, Wolf River Apple, York Apple, Zestar!™ Apple. Honey Crisp still the most popular. We supply some of the hardest freshest McIntosh, Cortland, Empire, Fuji, Macoun Galas, Red Delicious, Stayman, Winesap, and Rome Apples All rights reserved 1999 - 2018 Explosively Crisp® & CandyCrisp® &  SnappyMac® are registered trademarks under license of EC Marketing USA, Inc.. Apple Site Contents Updated February 2018
Hougen Group Yukon Flying Squirrel My Dad used to say that this or that would happen when pigs fly. Pigs can't fly, I'd tell him. "It's just an old expression," he would say, frowning at my naiveté. But squirrels can. Really? Yep, some can, and today we'll explore the lifestyle of a tiny creature whom you will seldom see. Just like flying pigs. On the limb of a tall spruce tree in the dense Yukon forest, a tiny rodent - not much bigger than a mouse - prepares for a 50-metre journey through the air to a landing spot on another chosen tree. As it leaps into space, its four limbs spread wide, withloose fur-covered skin stretched out to create a parachute, the Northern Flying Squirrel glides along, twisting and turning through the trees. The squirrel steers by adjusting the tightness of the skin flap and position of its front legs. The tail acts as a stabilizer, like the tail of a kite. As the long journey nears its finale, the squirrel swoops up at the last moment, reducing its speed with air brakes - like a just-landed 737 - and settles gently on the branch. It turns out this miracle of squirrel flying is not really flying. Instead, the Yukon Flying Squirrel is an accomplished glider. The tiny mammal is common in Yukon forests, but because it's a nocturnal owl, few Yukoners have ever seen one. Because biologists have not studied the flying squirrel much in the Yukon, its distribution is not well known. Still, they say there are plenty of them around. You've all seen red squirrels. Well, the flying guy is about half that size, weighing in at about 100 grams, the size of a big chocolate bar. Brown-grey fur on the top of its body contrasts sharply with the pale, cream-coloured underparts. The loose skin that runs from the wrist to ankle means the little guy is not very agile on the ground, but a thing of beauty in the air. With the help of its flattened tail, the flying squirrel can bank and turn in mid-glide. The large bright eyes help give the flying squirrel a unique appearance. Like all squirrels, the young are born in a tree in spring. Sometimes a mother will glide while holding one of the young in her mouth. Unlike red squirrels, flying squirrels are very sociable. As many as twenty flying squirrels have been found sleeping in a single communal winter nest. So you ask, how can I see this tiny creature that only comes out at night. Well, usually you don't, but some observers have reported seeing flying squirrels as they land softly on a bird feeder. I saw one in the small forest above the clay cliffs many years ago. What kind of bird looks like a mouse, I later asked my Dad. Dunno know, he said, but if you think you saw such a creature, the next thing you'll be telling me is that pigs can fly. A CKRW Yukon Nugget by Les McLaughlin See also: Ground Squirrels Source: National Geographic. Ground Squirrels Spring has sprung, the grass has riz, I wonder where the ground squirrel is? Well, by mid-April or early May, these indicators of Yukon spring will be everywhere - along the roadsides, standing straight up watching and talking. Most people call them gophers and that's OK, but they really are squirrels. You'll be happy to see them too, because they have been well hidden in their burrows under the deep snow since mid-September. Ground squirrels live all over the Yukon, from southern meadows to the Arctic coastal plain and from sea level to above 2000 meters - or 6000 feet. They like ground that has sandy soil because it makes digging easy and quickly drains spring flood waters and the heavy summer rain. The ground squirrel is built for life close to the land, with stubby legs and powerful claws which makes them natural diggers. These digs or burrows are their colonies, where the dominant male controls the territory. A colony's burrow may have fifty entrances and a maze of tunnels that are used year after year. In winter, arctic ground squirrels go into deep hibernation and their body temperature falls to near 0°C. They are the only mammals known to allow their body temperatures to drop below freezing. By super cooling in hibernation, they save lots of energy needed for the long winter snooze and early spring romps when food is scarce. In the spring mating season, encounters between males gets downright nasty and can turn into a boundary brawl. The fighters roll around in a ball and sometimes can be hurt quite badly. The winner earns the right to mate with the females residing in their hard-won space. Females come out one to two weeks after males do, and are ready to mate within a few days. The young are tiny, but grow up fast. At twenty days, their eyes are open. Soon after, the young squirrels make their outside debut. Female Arctic ground squirrels produce a single litter of five to ten young each year. To protect their offspring, mothers move them to different burrows and forcefully defend them from marauding predators, including strange squirrels. A Yukon study proved that male intruders from other colonies sometimes kill the young. If a coyote comes by, the ground squirrel exhibits its native name by chattering "sik-sik-sik". They often sit on rocks or brush piles, always on the lookout. So keep an eye out for them, and take some time to enjoy their antics. They are a hoot to watch as one of the Yukon's natural summer treasures. A CKRW Yukon Nugget by Les McLaughlin See also: Yukon Flying Squirrel
The Reclassification of Pluto plutoThe International Astronomical Union met in 2006 to discuss reclassifying our solar system, and as a result Pluto was deemed to be a dwarf planet, the former asteroid Ceres was promoted to planetary status, and the newest planet, formerly named UB313, was named Eris after the goddess of discord. Because the astrological Pluto deals with the transformation that comes from looking death in the eye and annhilation of the personal ego, it stands to reason that the reclassification of Pluto could open a door to how this process operates. The last “planet” to be discovered in our lifetime was the comet/planetoid Chiron, and it took some time for its astrological signficance to become known. Through the magic of synchronicity, the name of the planet itself reveals the god whose energy manifests through that planet. You can read more about Ceres here. Pluto’s discovery in 1930 brought with it the introduction of the atomic bomb and the fear of ultimate annhilation, the ultimate power. In these days of terrorism when a single individual with a toiletry bottle can potentially wipe out thousands of people, our concept of power is changing. In centuries past, whichever country had the biggest guns had the most power. When the US was the only nation with the bomb we were the only superpower. When Russia developed the bomb, they were the other superpower. At this time nine nations have nuclear weapons, with several more to attain that status soon (including Iran). The whole concept of power, as embodied in the archetype of Pluto, is changing and this will become very clear in the 2010-2013 square of Uranus in Aries to Pluto in Capricorn. The power of Pluto hasn’t lessened one iota, but it has become universalized rather than being owned by just a few countries and individuals. Perhaps this is symbolized by the reclassification of Pluto as a dwarf planet, a status shared by many others. Perhaps too the introduction of Ceres into the Plutonic archetype offers hope for resurrection and regeneration from Pluto’s threat of total destruction while calling on us to nurture each other and the earth on which we live. After her daughter Proserpine (Persephone) was abducted by Pluto, Ceres searched for her throughout the land and in her grief caused famine and destruction that caused the death of her people. Ultimately a negotiation with Pluto brought the return of the crops, but also meant that Prosperpine would remain in the underground for half the year. Ceres represents the harvest and the food that sustains us; a process which has been endangered by the technological advances of the last 100 years. Eris is the other new addition to the Pluto complex, and you can read more about her here. She is the one who threw the golden apple into a room at a party, causing the Trojan War which lasted for ten years and decimated the population on both sides. As the goddess of discord, Eris throws a monkey wrench in our plans and causes havoc that uncovers areas that need to be transformed. The modern mystic Andrew Harvey says it best in this passage from an interview he gave last year: [I]f you know the wisdom of the dark night, then you are looking out for protection. You’re aware that through this terror, protection will be given. This is the universal testimony. They mystics have gone through this process. It’s the testimony of Rumi. It’s the testimony of the great shamans. You are given tremendous divine protection, because as the human is being destroyed, the divine consciousness comes up. So one side of you is being annihilated, but the other side is stronger than ever in the ashes. So great dreams will come and light will become more and more vibrant. The divinity of life will become more and more naked to you. Miracles will take place to protect you. To anybody who comes to this path, the divine is both extremely ferocious and extremely tender. Ferocious to destroy the illusions, but tender to give the human being the courage to hang in there and do the work. By | 2017-04-02T09:41:14+00:00 August 24th, 2013|Planets|0 Comments