text stringlengths 144 682k |
|---|
[an error occurred while processing this directive]
BBC News
watch One-Minute World News
Last Updated: Thursday, 1 July, 2004, 23:33 GMT 00:33 UK
How the brain feels false limbs
Dr Henrik Ehrsson
Which limbs are real?
Scientists have shown how the brain can be fooled into feeling sensations in a fake limb.
They recorded changes in brain activity during an experiment in which volunteers were made to think a rubber hand was their own limb.
The University College London team hope their work will shed light on self-perception disorders such as schizophrenia and stroke.
Their work is published in Science Express Online.
In the study, funded by the Wellcome Trust, volunteers hid their right hand under a table and a rubber hand was put in front of them at an angle to make it look like part of their body.
The rubber hand and hidden real hand were stroked simultaneously with a paintbrush while the volunteer's brain was scanned using magnetic resonance imaging.
You could argue that the bodily self is an illusion being constructed in the brain.
Dr Henrik Ehrsson
It took just 11 seconds for volunteers to start feeling the rubber hand was their own.
The stronger the feeling, the greater the activity recorded in the brain.
Volunteers were later asked to point towards their right hand. Most pointed towards the rubber hand instead of the real one, showing how the brain had readjusted.
The researchers found one area of the brain, called the premotor cortex, recognises the body by accepting information from three different senses - vision, touch and proprioception (position sense).
Mixed messages
But if there are inconsistencies, the brain "believes" visual information as it is the strongest sense.
Lead researcher Dr Henrik Ehrsson said: "The feeling that our bodies belong to ourselves is a fundamental part of human consciousness, yet there are surprisingly few studies of awareness of one's own body.
"If the distinction fails, the animal might try to feed on itself and will not be able to plan actions that involve both body parts and external objects, such as a monkey reaching for a banana.
Phantom limb syndrome is a disorder which can arise after amputation.
Greg Vines, spokesman for the Stroke Association, welcomed the research.
He said: "It's a great step forward. We want to look at widening research out and testing on more cases and developing rehabilitation services to help make people more aware of spatial perception."
White false limb 'unfair'
27 Aug 03 | Lincolnshire
Living with a dead man's hand
22 Oct 00 | Health
Sources of amputee pain revealed
16 Oct 01 | Health
The BBC is not responsible for the content of external internet sites
Americas Africa Europe Middle East South Asia Asia Pacific |
What Causes the Pink Color of Rose Quartz?
Rough Rose quartz.
Rose quartz is commonly found in the quartz cores of pegmatites and is believed to form at high temperatures, but it has also been found in hydrothermal veins. They are found as a late formation in pegmatite pockets, often overgrowing smoky quartz crystals in groups of parallel-grown crystals.
star rose quartz.
Star rose quartz. Credit: Martin P. Steinbach
Rose quartz from some localities shows asterism when cut as spheres or cabochons, much like that seen in certain sapphires. It is sometimes called star rose quartz. The six-rayed star is caused by reflections of the light from embedded fibers that intersect at an angle of 60°.
The term "rose quartz" has also occasionally been used for quartz that is colored by other inclusions. Pale amethyst may be confused with euhedral rose quartz/pink quartz. Amethyst and euhedral rose quartz/pink quartz are both occasionally found overgrowing smoky quartz and may show similar sheet-like surface patterns.
Rose Quartz is the South Dakota state mineral.
See also:
What Is Faden Quartz, and How Does It Form?
What Causes the Purple Color of Amethyst?
Crystal Formations and Their Meanings |
Nathaniel Clark
Date Approved
Document Type
Degree Name
M.S. Engineering
Electrical and Computer Engineering
Henry M. Rowan College of Engineering
First Advisor
Krchnavek, Robert
Nanoimprint lithography
Electrical and Computer Engineering
Innovations are being researched, using materials science, in the areas of sub- 100nm feature production. Current methods such as electron beam lithography (EBL), Extreme Ultra-Violet Lithography (EUV), and Nano-imprint lithography (NIL) are currently being studied to deliver a high throughput, low-cost process, and high field size for nano-lithography. EBL is a technique which can generate very small features (sub-10nm) but is a serial process which has undesirable time constraints. EUV is the latest generation of photo-lithography which can produce 35nm features, but has a limited area of exposure. NIL is a high resolution high throughput process, but still has time constraints with imprinter fabrication and pattern predictability. Important aspects of NIL are the creation of imprinters and the anti-adhesive layers used to protect the imprinters. Hydrogen silsesquioxane (HSQ) is a spin on dielectric with properties of a negative e-beam resist which can generate a SiO2 like material. This can then be used as an imprinter for NIL work with significant process advantages over the standard technique for fabricating imprinters. HSQ has been observed to also have a time dependency factor during the electron beam process. For NIL to work effectively anti-stick layers are needed to ensure the correct designs are imprinted. Anti-stick layers such as F13, and Nanonex create a monolayer of atoms designed to reduce the effects of surface bonding on the nano-scale. |
Koga, K., Groner, M. T., Bischof, W. F., and Groner, R. (1998). Motion trajectory illusion and eye movements. Swiss Journal of Psychology,
We describe a visual illusion where a moving target produces an illusory trajectory. Previously it has been suggested that this illusion is related to eye movements, but the exact nature of the relation, as well as relevant stimulus conditions and eye movements were unknown. In two experiments, we varied critical stimulus conditions, recorded eye movements and judgment of trajectories. In experiment 1, a visual cue lead to a reduction of the illusion; however if a saccadic eye movement preceded the targets change of direction within a critical interval, assessed by SacOA (Saccade Onset Asynchrony). In experiment 2, an analogous result was found under conditions of sudden velocity changes. The results are explained by a critical timing between smooth pursuit and different phases of saccadic eye movements.
Back to publications. |
Send to
Choose Destination
Physiol Biochem Zool. 2011 Jan-Feb;84(1):43-53. doi: 10.1086/657147.
The evolution of cold tolerance in Drosophila larvae.
Author information
Department of Biology, University of Western Ontario, London, Ontario N6G 1L3, Canada.
Temperature is a primary determinant of insect and other ectotherm distribution and activity. Physiological and behavioral adaptations allow many insects to survive at subzero temperatures, yet the evolutionary influences on insect cold tolerance are unclear. Supercooling points, basal cold tolerance, cold-tolerance strategy, and inducible cold tolerance from rapid cold-hardening or acclimation were measured in a phylogenetically independent context in larvae of 27 phylogenetically diverse Drosophila species acquired from stock collections. Supercooling capacity is attributed primarily to physical factors, such as dry mass and water mass. Species of the obscura group were more resistant to acute cold tolerance than species of other groups within the genus, and plasticity in cold tolerance is constrained by phylogeny rather than by basal cold tolerance. The more cold-tolerant freeze-avoiding species appear to have arisen multiple times in Drosophila and are distinct from chill-susceptible species, which likely indicate the ancestral state. A phylogenetic influence is apparent on several measures of cold tolerance, which show considerable interspecific variation and indicate varying physiological mechanisms among Drosophila species when temperature limits are met.
[Indexed for MEDLINE]
Supplemental Content
Full text links
Icon for University of Chicago Press
Loading ...
Support Center |
7 stories
Microsoft partners with Adaptive Biotechnologies to decode human immune system using AI
Microsoft today announced a new partnership with the Seattle-based company, Adaptive Biotechnologies. The two companies will be working together and combining the latest advances in AI and machine learning in order to build a technology to help map and decode the human immune system. According to Microsoft, it all boils down to one common goal, creating a “universal blood test that reads a person’s immune system to detect a wide variety of diseases.”
The Redmond giant deeply believes in the potential of the partnership and mentions that they have made a “substantial financial investment” in Adaptive Biotechnologies. Top researchers at Microsoft are also already working with scientists at Adaptive Biotechnologies, using sequencing technology and Microsoft machine learning and cloud to help make the universal blood test a reality.
Microsoft expanded on this in a press release:
We’re incredibly excited to collaborate on this project with our partners at Adaptive, who have developed unique immunosequencing capabilities and immune system knowledge, along with very large data sets of TCR sequences. Classifying and mapping this data represents a large-scale machine learning project for which we’ll lean heavily on Microsoft’s cloud computing capabilities and our elite research teams.
We know this partnership and the resulting work represent a big challenge. But we believe in the impact technology can have in healthcare, specifically how AI, the cloud and collaboration with our partners can come together and transform what is possible.
You can learn more about the scientific technicalities of the partnership by checking here. It’s all a part of Microsoft’s Healthcare NExT program, which helps empower those in the science and healthcare fields to accelerate the diagnosis and treatment of autoimmune disorders, cancer, and infectious disease.
Further reading: , , , ,
Do you think this is good for the future of healthcare? |
O'Reilly logo
Start Free Trial
No credit card required
Hands-On Unsupervised Learning Using Python
Book Description
Many industry experts consider unsupervised learning the next AI frontier, one that may hold the key to general artificial intelligence. Armed with the conceptual knowledge in this book, data scientists and machine learning practitioners will learn hands-on how to apply unsupervised learning to large unlabeled datasets using Python tools. You’ll uncover hidden patterns, gain deeper business insight, detect anomalies, perform automatic feature engineering and selection, and generate synthetic datasets.
Author Ankur Patel—an applied machine-learning researcher and data scientist with expertise in financial markets—provides the concepts, intuition, and tools necessary for you to apply this technology to problems you tackle every day. Through the course of this book, you’ll learn how to build production-ready systems with Python.
Chapters for this Early Release edition will be available as they are completed, including the first five chapters in this initial release:
• Examine the difference between supervised and unsupervised learning, and the relative strengths and weaknesses of each
• Set up and manage a machine learning project end-to-end—everything from data acquisition to building a model and implementing a solution in production
• Explore dimensionality reduction algorithms that learn the underlying structure of a dataset’s most salient information
• Build a credit card fraud detection system using dimensionality reduction methods
Table of Contents
1. Preface
1. A brief history of machine learning
2. AI is back, but why now?
3. The emergence of applied AI
4. Major milestones in applied AI over the past 20 years
5. From narrow AI to general AI
6. Objective and approach
7. Prerequisites
8. Roadmap
9. Other Resources
10. Conventions Used in This Book
11. Using Code Examples
12. O’Reilly Safari
13. How to Contact Us
14. Acknowledgments
2. 1. Fundamentals of Unsupervised Learning
3. 2. Unsupervised Learning in the Machine Learning Ecosystem
1. Basic machine learning terminology
2. Rules-based versus machine learning
3. Supervised versus unsupervised
1. The strengths and weaknesses of supervised learning
2. The strengths and weaknesses of unsupervised learning
4. Using unsupervised learning to improve machine learning solutions
5. A closer look at supervised algorithms
1. Linear methods
2. Neighborhood-based methods
3. Tree-based methods
4. Support vector machines
5. Neural networks
6. A closer look at unsupervised algorithms
1. Dimensionality reduction
2. Clustering
3. Feature extraction
4. Unsupervised deep learning
5. Sequential data problems using unsupervised learning
7. Reinforcement learning using unsupervised learning
8. Semi-supervised learning
9. Successful applications of unsupervised learning
10. Conclusion
4. 3. End-to-End Machine Learning Project
1. Environment setup
1. Version control: Git
2. Scientific libraries: Anaconda distribution of Python
3. Neural networks: TensorFlow
4. Gradient boosting, version one: XGBoost
5. Gradient boosting, version two: LightGBM
6. Interactive computing environment: Jupyter notebook
2. Overview of the data
3. Data preparation
1. Data acquisition
2. Data exploration
3. Generate feature matrix and labels array
4. Feature engineering and feature selection
5. Data visualization
4. Model preparation
1. Split into training and test sets
2. Select cost function
3. Create k-fold cross validation sets
5. Machine learning models - Part One
1. Model One - Logistic Regression
6. Evaluation metrics
1. Confusion matrix
2. Precision-recall curve
3. Receiver operating characteristic
7. Machine learning models - Part Two
1. Model Two - Random Forests
2. Model Three - Gradient Boosting Machine (XGBoost)
3. Model Four - Gradient Boosting Machine (LightGBM)
8. Evaluation of the four models using the test set
9. Ensembles
1. Stacking
10. Final model selection
11. Production pipeline
12. Conclusion
5. 4. Unsupervised Learning using Scikit-Learn
6. 5. Dimensionality Reduction
1. The motivation for dimensionality reduction
1. The MNIST digits database
2. Dimensionality reduction algorithms
1. Linear projection versus manifold learning
3. Principal component analysis (PCA)
1. PCA the concept
2. PCA in practice
3. Incremental PCA
4. Sparse PCA
5. Kernel PCA
4. Singular value decomposition
5. Random projection
1. Gaussian random projection
2. Sparse random projection
6. Linear discriminant analysis (LDA)
7. Isomap
8. Multidimensional scaling (MDS)
9. Locally linear embedding
10. t-distributed stochastic neighbor embedding (t-SNE)
11. Other dimensionality reduction methods
12. Dictionary learning
13. Independent component analysis
14. Conclusion
7. 6. Anomaly Detection
1. Credit card fraud detection
1. Prepare the data
2. Define anomaly score function
3. Define evaluation metrics
2. Normal PCA anomaly detection
1. PCA components equal number of original dimensions
2. Search for the optimal number of principal components
3. Sparse PCA anomaly detection
4. Kernel PCA anomaly detection
5. Gaussian random projection anomaly detection
6. Sparse random projection anomaly detection
7. Non-linear anomaly detection
8. Dictionary learning anomaly detection
9. Independent component analysis anomaly detection
10. Fraud Detection on the Test Set
1. Normal PCA anomaly detection on the test set
2. Independent component analysis anomaly detection on the test set
3. Dictionary learning anomaly detection on the test set
11. Unsupervised Learning Anomaly Detection
8. 7. Clustering
1. MNIST Digits Dataset
1. Data preparation
2. Clustering algorithms
3. K-means
1. K-means inertia
2. Evaluating the clustering results
3. K-means accuracy
4. K-means and the number of principal components
5. K-means on the original dataset
4. Hierarchical clustering
1. Agglomerative hierarchical clustering
2. The dendrogram
3. Evaluating the clustering results
5. DBSCAN
1. DBSCAN algorithm
2. Applying DBSCAN to our dataset
3. HDBSCAN
6. Conclusion
9. 8. Group Segmentation
1. Lending Club Data
1. Data preparation
2. Goodness of the Clusters
3. K-means Application
4. Hierarchical Clustering Application
5. DBSCAN Application
6. Conclusion
10. 9. Unsupervised Learning using TensorFlow and Keras
11. 10. Autoencoders
1. Neural networks
2. TensorFlow
1. TensorFlow Example
3. Keras
4. Encoder and decoder
5. Undercomplete autoencoders
6. Overcomplete autoencoders
7. Dense versus sparse autoencoders
8. Denoising autoencoder (DAE)
9. Variational autoencoder (VAE)
10. Conclusion
12. 11. Hands-on Autoencoder
1. Data Preparation
2. A basic autoencoder
1. Choosing the right activation function
3. Two layer complete autoencoder with linear activation function
4. Two layer undercomplete autoencoder with linear activation function
1. Increasing the number of nodes
2. Adding more hidden layers
5. Non-Linear Autoencoder
6. Overcomplete Autoencoder with Linear Activation
7. Overcomplete Autoencoder with Linear Activation and Dropout
8. Sparse Overcomplete Autoencoder with Linear Activation
9. Sparse Overcomplete Autoencoder with Linear Activation and Dropout
10. Working with Noisy Datasets
11. Denoising autoencoder
1. Two-layer Denoising Undercomplete Autoencoder with Linear Activation
2. Two-layer Denoising Overcomplete Autoencoder with Linear Activation
3. Two-layer Denoising Overcomplete Autoencoder with ReLu Activation
12. Variational Autoencoders
13. Conclusion
13. 12. Semi-supervised Learning
1. Data preparation
2. Supervised model
3. Unsupervised model
4. Semi-supervised model
5. The power of supervised and unsupervised
6. Conclusion
14. 13. Deep Unsupervised Learning using TensorFlow and Keras
15. 14. Recommender Systems using Restricted Boltzmann Machines
1. Boltzmann Machines
1. Restricted Boltzmann Machines
2. Recommender Systems
1. Collaborative Filtering
2. The Netflix Prize
3. MovieLens Dataset
1. Data Preparation
2. Define the Cost Function: Mean Squared Error
4. Matrix Factorization
1. One Latent Factor
2. Three Latent Factors
3. Five Latent Factors
5. Collaborative Filtering using RBMs
1. RBM Neural Network Architecture
2. Set up RBM Recommender System
3. Train RBM Recommender System
6. Conclusion |
Bipolar Disorder
By: Cristina Ruiz
Bipolar Disorder is one of the most highly investigated neurological disorders. The National Institute of Mental Health (NIMH) estimates that it affects over 2% of adults in the U.S. Of the 2% nearly 83% have "severe" cases of the disorder. Only 40% receive "minimally adequate treatment." Bipolar Disorder is highly recognized as treatable.
Symptoms/Description of Bipolar Disorder
Bipolar Disorder, formerly called Manic Depression, causes extreme mood swings that include emotional highs and lows. Mood shifts may only occur a few times a year, or as often as several times a weeks. Symptoms of Bipolar Disorder include mood swings, sadness, elevated mood, anger, anxiety, apathy, euphoria, general discontent, guilt, hopelessness, inability to feel pleasure, loss of interest.
How Bipolar Disorder Impacts the Brain
Scientists believe that two neurotransmitters, or chemical messengers in the brain- serotonin and non adrenaline may at least partly explain the connection between genes and mood. Serotonin and non adrenaline play a role in mood regulation.
How Bipolar Disorder Impacts the Central Nervous System
Bipolar Disorder is a serious illness of the nervous system. The nervous system of people with bipolar disorders frequently make specific types of regulatory errors.
How Bipolar Disorder Impacts the Endocrine System
The thyroid, an endocrine organ located in the neck which produces thyroid hormones, has been the focus of much mood disorder research. Depression is linked to low levels of the thyroid hormone, a condition known as Hypothyroidism. While mood elevation is often associated with high levels of thyroid hormone.
Genetics and Bipolar Disorder
Between 20 and 25% of the people with mood disorders have a family member who is affected by a similar disorder. Identical twins of affected individuals are more likely to be be affected than fraternal twins.
Percentage of People with Bipolar Disorder
Approximately 2.6% of the U.S population is affected with Bipolar Disorder.
Interesting Facts
Demi Lovato, Catherine Zeta-Jones, Vivien Leigh(Gone with the Wind), and Van Gogh are famous people known to have Bipolar Disorder. |
Not a member yet?Register now and get started.
lock and key
Sign in to your account.
Account Login
The Costs of Sprawl: Looking beyond the numbers
It is easy to get caught up in a numbers game like costs per-capita when talking about suburbia also known as sprawl or low-density development. One example is that many homebuyers like to point out that the suburbs offer “more house for your money” when compared to many neighborhoods in or on the skirts of a city. This may be true, but like so many things today there are many hidden costs to our lifestyles. Even more importantly there are other factors that play an even greater role in our neighborhood decisions. For example, having a sense of community or belonging, convenience, safety or security, employment and “sustainability”. All of these factors need to be taken into consideration when we look at what kind of neighborhood we want to keep developing and living in.
Although numbers and costs are not everything, let us take a quick look at what some are saying about the difference between sprawl and higher-density living. A 1998 NRDC study found that the costs of wastewater collection systems were greater in low-density compared to high-density areas around Chicago and Cleveland. Therefore the cost of utility services is likely higher and affected by land-use or low-density sprawl. Residents in both low and high-density areas appear to pay similar rates for services; implying residents living in high-density areas are supplementing utility costs in low-density areas.
Others claim that the overall costs per capita are lower in suburbs, but this depends on who or what organization does the analysis. Many factors can be taken into consideration [or left out] such as road construction and maintenance, sewage systems, electricity and water pipes. Costs of living may even be taken into account in studies, or left out. In some studies, real numbers are used from specific areas like the study above using waste management costs of the Chicago and Cleveland areas, whereas predication models that predict the future costs of both low and high-density areas are used in other studies. Confused yet? Well, keep in mind professionals are debating about the significance of all this data and it will end up affecting your current neighborhood, town and state.
Other concerns for sprawl include commuting, traffic, pollution and health factors. Commuting can be considered wasteful in the sense of the amount of time many Americans spend in their cars, the energy or fuel burned and land consumed by roadways. Two and three hours spent commuting a day take up 10 to 15 hours each week. This time could have been spent working; with family or friends; or enjoying a hobby. Commuting and suburbs with roadways as lifelines, creates a disconnect between the residents of different neighborhoods, too.
Ask yourself this, “When was the last time you knew the name of the waitress or cashier at a restaurant or grocery store?” Think about it. A sense of belonging and knowing each other on a personal level is missing in too many of our suburbs. When we know the people who own local businesses, provide local services or live next door, it usually creates a greater sense of personal investment in a community. But today it is not uncommon to hear people “outgrowing” their current neighborhood and therefore leave for the benefits of another one. What kind of community do you want?
Sitting for hours at work and in the car during long commutes does not help the obesity epidemic either. In the name of improving our quality of living and reducing physical hardship, we have merely created different health problems that decrease quality of living just the same. We can address these health problems such as the obesity epidemic much more affectively by working together as a community. As a community, we have a much better chance of making significant changes in our environment and lifestyles compared to doing it on an individual basis.
Creating more little suburbs, highway lanes and strip malls with Starbucks and Blockbusters are not the answer to our current national problems - the real estate crisis, crumbling infrastructure, unemployment, national debt, obesity epidemic and climate change. We need to learn from our mistakes and lack of foresight. We need to stop corporations from randomly building for short-term profits, especially when it does not uphold what we want in our communities. A house is not a home just because it was built. Similarly, a sub-division is not necessarily a neighborhood or community because it is developed.
Although suburbs have created challenges for us to overcome, they are not all "bad". They do in part represent our prosperity as a nation and many call the suburbs their home. But the suburb along with its counterpart the city are frequently run by people who have little insight to what residents need, and these same people are far too focused on the profits to be made. So, do we just continue with business and our lives as usual? I say no. We, the residents and community members, need to evaluate our community development patterns, invest in long-term goals and promote sustainable living.
Call To Action:
Attend town hall meetings
Get involved with community organizations
Secondary Category:
Post new comment
Plain text
• No HTML tags allowed.
• Lines and paragraphs break automatically.
By submitting this form, you accept the Mollom privacy policy. |
test company
test tagline
test street
test address
test fortw, Indiana 46804 usa
E 40° 0" N 30° 0"
Telephone: (260) 436-0259
What is an anal abcess?
What is an anal fistula?
An anal fistula (also called fistula-in-ano) is frequently the result of a previous or current anal abscess, occurring in up to 50% of patients with abscesses. Normal anatomy includes small glands just inside the anus. Occasionally, these glands get clogged and potentially can become infected, leading to an abscess. The fistula is a tunnel that forms under the skin and connects the infected glands to the abscess. A fistula can be present with or without an abscess and may connect just to the skin of the buttocks near the anal opening. Other situations that can result in a fistula include Crohn’s disease, radiation, trauma and malignancy.
How does someone get an anal abscess or a fistula?
The abscess is most often a result of an acute infection in the internal glands of the anus. Occasionally, bacteria, fecal material or foreign matter can clog the anal gland and create a condition for an abscess cavity to form. Other medical conditions can make these types of infections more likely.
After an abscess drains on its own or has been drained (opened), a tunnel (fistula) may persist, connecting the infected anal gland to the external skin. This typically will involve some type of drainage from the external opening and occurs in up to 50% of abscesses. If the opening on the skin heals when a fistula is present, a recurrent abscess may develop.
What are the specific signs or symptoms of an abscess or fistula?
A patient with an abscess may have pain, redness or swelling in the area around the anal area. Fatigue, general malaise, as well as accompanying fever or chills are also common. Similar signs and symptoms may be present when patients have a fistula, with the addition of possible irritation of the perianal skin or drainage from an external opening.
Is any specific testing necessary to diagnose an abscess or fistula?
No. Most anal abscesses or fistula-in-ano are diagnosed and managed on the basis of clinical findings. Occasionally, additional studies such as ultrasound, CT scan, or MRI can assist with the diagnosis of deeper abscesses or the delineation of the fistula tunnel to help guide treatment.
What is the treatment of an anal abscess?
The treatment of an abscess is surgical drainage under most circumstances. An incision is made in the skin near the anus to drain the infection. This can be done in a doctor’s office with local anesthetic or in an operating room under deeper anesthesia. Hospitalization may be required for patients prone to more significant infections such as diabetics or patients with decreased immunity.
Are antibiotics required to treat this type of infection?
Antibiotics alone are a poor alternative to drainage of the infection. For uncomplicated abscesses, the addition of antibiotics to surgical drainage does not improve healing time or reduce the potential for recurrences. There are some conditions in which antibiotics are indicated, such as for patients with compromised or altered immunity, some cardiac valvular conditions or extensive cellulitis. A comprehensive discussion of your past medical history and a physical exam are important to determine if antibiotics are indicated.
What is the treatment of an anal fistula?
Surgery is almost always necessary to cure an anal fistula. Although surgery can be fairly straightforward, it may also be complicated, occasionally requiring staged or multiple operations. Consider identifying a specialist in colon and rectal surgery who would be familiar with a number of potential operations to treat the fistula.
The surgery may be performed at the same time as drainage of an abscess, although sometimes the fistula doesn’t appear until weeks to years after the initial drainage. If the fistula is straightforward, a fistulotomy may be performed. This procedure involves connecting the internal opening within the anal canal to the external opening, creating a groove that will heal from the inside out. This surgery often will require dividing a small portion of the sphincter muscle which has the unlikely potential for affecting the control of bowel movements in a limited number of cases.
Other procedures include placing material within the fistula tract to occlude it or surgically altering the surrounding tissue to accomplish closure of the fistula, with the choice of procedure depending upon the type, length, and location of the fistula. Most of the operations can be performed on an outpatient basis, but may occasionally require hospitalization.
What is the recovery like from surgery?
Pain after surgery is controlled with pain pills, fiber and bulk laxatives. Patients should plan for time at home using sitz baths and attempt to avoid the constipation that can be associated with prescription pain medication. Discuss with your surgeon the specific care and time away from work prior to surgery to prepare yourself for post-operative care.
Can the abscess or fistula recur?
If adequately treated and properly healed, both are unlikely to return. However, despite proper and indicated open or minimally invasive treatment, both abscesses and fistulas can potentially recur. Should similar symptoms arise, suggesting recurrence, it is recommended that you find a colon and rectal surgeon to manage your condition.
What are anal warts?
Anal warts (also called "condyloma acuminata") are a condition that affects the area around and inside the anus. They may also affect the skin of the genital area. They first appear as tiny spots or growths, perhaps as small as the head of a pin, and may grow quite large and cover the entire anal area. Usually, they do not cause pain or discomfort to afflicted individuals and patients may be unaware that the warts are present. Some patients will experience symptoms, such as itching, bleeding, mucus discharge and/or a feeling of a lump or mass in the anal area.
What causes anal warts?
They are caused by the human papilloma virus (HPV), which is transmitted from person to person by direct contact. HPV is considered a sexually transmitted disease (STD). You do not have to have anal intercourse to develop anal warts.
Do anal warts always need to be removed?
Yes. If they are not removed, the warts usually grow larger and multiply. Left untreated, the warts may lead to an increased risk of cancer in the affected area.
What treatments are available?
If warts are very small and are located only on the skin around the anus, they may be treated with a topical medication. They may also be treated by freezing the warts with liquid nitrogen or removed surgically. Surgery typically involves cutting or burning the warts off. While this provides immediate results, it must be performed using either a local anesthetic - such as novocaine - or a general or spinal anesthetic, depending on the number and exact location of warts being treated. It is important that an internal anal examination with an instrument called an anoscope be done by your treating physician to ensure you do not have any inside the anal canal (internal anal warts). Internal anal warts may not be as suitable for treatment by topical medications, and may need to be treated surgically. Additionally, your physician may wish to examine the entire pelvic region to include the vaginal or penile area to look for other warts that may require treatment.
Must I be hospitalized for surgical treatment?
Surgical treatment of anal warts is usually performed as outpatient surgery.
How much time will I lose from work after surgical treatment?
Most people are moderately uncomfortable for a few days after treatment and pain medication may be prescribed. Depending on the extent of the disease, some people return to work the next day, while others may remain out of work for several days to weeks.
Will a single treatment cure the problem?
When warts are extensive, your surgeon may wish to perform the surgery in stages. Additionally, recurrent warts are common. The virus that causes the warts can live concealed in tissues that appear normal for several months before another wart develops. As new warts develop, they usually can be treated in the physician's office. Sometimes new warts develop so rapidly that office treatment would be quite uncomfortable. In these situations, a second and, occasionally, third outpatient surgical visit may be recommended.
How long is treatment usually continued?
Follow-up visits are necessary at frequent intervals for several months after all warts appear to be gone, to be certain that no new warts occur.
What can be done to avoid getting these warts again?
What are the symptoms?
Symptoms vary from a small dimple to a large painful mass. Often the area will drain fluid that may be clear, cloudy or bloody. With infection, the area becomes red, tender, and the drainage (pus) will have a foul odor. The infection may also cause fever, malaise, or nausea.
How is pilonidal disease treated?
What care is required after surgery?
What causes this to happen?
• Coffee, Tea
• Carbonated beverages
• Milk products
• Tomatoes and tomato products such as Ketchup
• Cheese
• Chocolate
• Nuts
Does Pruritus Ani result from lack of cleanliness?
What can be done to make this itching go away?
1. AVOID MOISTURE in the anal area:
• Avoid all medicated, perfumed and deodorant powders.
2. AVOID FURTHER TRAUMA to the affected area:
How long does this treatment usually take?
|
Why Raw Milk
Heathy Freshness
Creamy news
Raw milk is a living, unprocessed, whole food, rich in important fats and fat-soluble vitamins. Like any other food product, raw milk is perfectly safe when produced under humane and sanitary conditions. Our raw milk is not pasteurized or homogenized- straight from the cow. It's milk how it used to be on grandpa's farm, fresh with thick cream rising to the top. Yum! Not only does it taste good but it's easier to digest and the health benefits of raw milk are significant. |
World Economic Forum: A Stronger Nuclear Industry Should be Part of Japan’s Future
New Energy Architecture: Enabling an effective transition, a recent report by the World Economic Forum, offers policymakers across the globe a methodology for evaluating and developing country-specific energy goals. The chief mission of the report is to provide a guideline for countries as they transition away from carbon-heavy resources to meet climate goals. Natural gas, renewable energy and nuclear technology are all identified as the most promising resources.
The report notes that [w]hile many countries have moved forward with their plans to address climate change, more needs to be done. Significantly, it argues Japan must maintain its nuclear energy program and should look to continue (R&D) in an effort to build a stronger nuclear industry.
One of Japans primary challenges will be rebuilding the trust and confidence of its public, according to the report. Recommendations for mitigating the countrys confidence issue include establishing a fully independent regulatory agency, increasing stakeholder involvement and developing an effective communication system. The report also recommends Japan communicate the lessons its learned to the international community.
Despite the events of Fukushima Daichii, the report notes that nuclear expansion in several countries remains unaffected. Countries such as China and India are still on track with their nuclear energy plans.
Any hasty decision-making could lead to negative consequences, the report warns. For example, Germanys quick decision to shut down half its nuclear fleet in response to Fukushima will have significant economic and environmental consequences in the short term. This includes at least 11,000 lost jobs, higher carbon emissions and increased electricity costs.
View the full report (PDF file) |
Thursday, February 12, 2015
What are Smart Fabric and e-Textiles?
At Tech the Year 8s are learning about what Smart Fabric is and also what e-Textiles are and how they can be utilised in the design process.
Do you know what these are? Add your ideas and thoughts in the comments below. You might have ideas for the designs we have to create. We are allowed to create two different products or combine the two fabrics into one.
There are some links and videos below to show you what these are and how they can be used. You also have a PREP FOR LEARNING task with this...
• Find out how a circuit works and what knowledge you need to have to create your product. Post your ideas and any links in the comments below.
Where are we headed with this amazing technology?
So how do you work with e-Textiles??
A little something extra...
1. Circuits are like a pathway of wire that electrons pass through to power a light, or a buzzer, or a computer. They have to be circular, so that the electrons have somewhere to go. Circuits normally consist of a power source, however many things that it is powering, and a switch. Switches disconnect the wire and and open the circuit, and because the electrons have nowhere to go, the light or buzzer or whatever th cicuit is powering will turn off.
2. This is the link for The Mind Lab in Auckland. It's an awesome learning space. |
A denture is a removable dental structure used to replace missing teeth and neighboring tissues. The loss of teeth and oral tissues can be because of an accident, old age, or illness. When this loss occurs, the ability to chew properly is lost, and the person develops low self-esteem due to the negative way the loss affects speech and facial features.
Depending on the level of the loss, your dentist will recommend either a complete denture, or a partial one. A complete denture is useful when there is a loss of all the teeth, while a partial denture takes care of a situation when there are still some natural teeth left. Either of the two types of dentures aims to achieve the same goals, which are:
• Improved speech
• Better chewing ability
• Better cosmetic look
• Improved general oral health
A ceramic-based material is used for the construction of the tooth part of denture, while the base part is made of synthetic polymer fiber, which fits snugly over the gums.
Complete and Partial Denture Treatment Procedures
Though the goals for both types of dentures are the same, the methods used for getting their procedures done differ.
First, in all cases, your dentist will create a dental impression of your teeth and the positioning of your jaw. He will then need to select a denture that offers a perfect match to the shape and color of your teeth. A patient moving from weak teeth to dentures uses temporary dentures until a permanent one is constructed.
Complete Dentures
For complete dentures, the making of an impression and creating of a permanent denture does not hold until the extraction of all the teeth, and the proper healing of the gums. This is because the gums will shrink as they heal, and any denture made before the gums heal will not fit comfortably. The healing process lasts for about 3 months.
Partial Dentures
For partial dentures, replacement teeth are secured to a gum-colored base, which is anchored on a metal structure secured to the natural teeth on both sides of the gap created by the missing teeth. This type of partial denture that utilizes a metal structure is rigid and offers less flexibility.
Flexible Partial Dentures
Another type of partial dentures is the flexible partial denture. This discards the use of a metal attachment to the natural teeth on either side of the gap. It offers a more comfortable fit, has better aesthetic values, lasts longer, and is faster to make than the other is. |
Seattle Dive Tours
Giant Pacific Octopus Protect Their Eggs
• Giant Pacific Octopus on eggs by Steve Zedekar
Giant Pacific Octopus on Eggs by Steve Zedekar
Giant Pacific Octopus on Eggs by Steve Zedekar
Spring in the Pacific Northwest means that our female giant Pacific octopus are tending to their eggs. Divers can see this behavior at many of our most popular dive sites, including Redondo Beach, Three Tree Point, and Alki Seacrest Park (Cove 2).
The giant Pacific octopus (Enteroctopus dofleini), also known as the North Pacific giant octopus is the largest species of octopus in the world and can weight up to 150 pounds and can have an arm span up to 20 feet. The largest ever measured weighed about 600 pounds and stretched 30 feet across! Unfortunately, they are also short lived with a life span of 2-3 years.
Giant Pacific Octopus Reproduction
After about two years, the female will seek out a male for her one time to reproduce and lay eggs. Once she finds a male, he will deposit a sperm packet into the female’s mantle. The female will then store the sperm packet until she is ready to fertilize eggs. The Seattle Aquarium has observed a female waiting seven months between mating and laying fertilized eggs. A typical female giant Pacific octopus can lay between 120,000 and 400,000 eggs.
Once the eggs have been laid, the female attaches them to a hard surface. She continuously blows nutrient rich water over the eggs, fanning and grooming them to remove algae and other growths. While she is tending to her eggs (typically around 6 months) the does not leave the den to hunt or eat. After the incubation period, the eggs hatch and tiny baby giant Pacific octopus leave the nest to and begin a period where they float freely in the ocean.
For the female giant Pacific octopus, she will die shortly after her eggs hatch. In the video below, skip to about 0:35 seconds to see a female tend and groom her eggs.
Ready to schedule your guided dive tour, to see giant Pacific octopus? Book your tour online, call us at (206) 265-0006, or e-mail to get started today!
Olga the Giant Pacific Octopus tends to Eggs
Giant Pacific Octopus Time!
Giant Pacific Octopus (Enteroctopus dofleini) sightings in Puget Sound are on the rise right now, as we transition to our beautiful fall season. Our autumn weather includes bright sunny days and cool, clear nights, with excellent visibility underwater and even nighttime bioluminescence. Below is a video of a Giant Pacific Octopus taken at the Seattle Aquarium.
Giant Pacific Octopus
Go To Top |
See also
Hugh (c. 1030-1101)
1. Hugh de Clermont, son of Renaud de Clermont Creil (c. 1000- ), was born circa 1030 in Northampton. He married Margaret de Montdidier circa 1064. He died in 1101.
Margaret de Montdidier and Hugh de Clermont had the following children:
Count Renaud II of Clermont (c. 1108-1162). Count was born circa 1108 in Clermont, Oise. He died in 1162 in Beauvaises.
Adeliza de Clermont (c. 1066- ). Adeliza was born circa 1066.
Ermentrude de Clermont (c. 1066- ). Ermentrude was born circa 1066.
Second Generation
2. Renaud de Clermont Creil was born circa 1000 in Creil, Oise, France.
Renaud de Clermont Creil had the following children:
Hugh de Clermont (c. 1030-1101) |
Nov 22
Just how to Publish a Reading Response Essay with Sample Forms
Revise Article How-to Write an HTML Page HTML (HyperText Markup Language) is really a fundamental language for developing web pages. It was intended to be a versatile and easy programming language. Almost every page on the Internet was developed with some form of this signal (ColdFusion, XML, XSLT). HTML is simple to pick up, but could retain you mastering for a very long time if you’re considering its complete functions. To incorporate enthusiasm and more color for your website pages, you may study standard CSS when you’re confident with a basic html-page. Ad Actions Trial HTML Websites Sample HTML Page with Colors Trial HTML-Page with Hyperlinks Part 1 of 4: Establishing a Doc Open an easy text-editor. NotePad is a good solution that may be downloaded for free. You’ll be able to publish HTML with most text editing software, but more technical software with automatic format can make it tougher to prepare your HTML page. [1] TextEdit is not proposed, since it will frequently save the record in a format your browser may not acknowledge as HTML.
Quite simply talk disadvantages and about the advantages of the task.
You can also employ an HTML editor that is online. Particular HTML editing packages are not recommended for [2] Ad Save a document being a website. Select Document Save As in the top menu. Alter the extendable to “Web-Page,” “. html” or “. htm”. Save it in a spot where you can easily discover the report. There’s no difference between these three choices.
Stay glued to three fonts or less to your brochure.
Open the report in a. Double click the report, plus it should instantly open as a blank website in your browser. Instead, you’ll be able to open a visitor, such as Firefox or Internet Explorer, and use Report Open File to choose the report. This web page isn’t online. It might simply be looked at on your desktop. Renew rescued alterations to be seen by the internet site. Kind this into your clear report: Hello. Save the record.
Producing an essay paper is really a process that is creative.
Renew the website that is blank and you ought to begin to see the term “Hello” appear at the site in bold’s top. You would like to check your HTML in this article, save the document that is. html, subsequently renew your browser screen to determine how the HTML is viewed. If you see the terms “” and “” can be found in your visitor, your record isn’t being properly construed as HTML. Try perhaps a browser that is different or a different text editing system. Realize labels. HTML directions are created in “tags” that tell the visitor how exactly to understand and show your web site. They are not exhibited on the net page, and are often created between angle brackets.
You’ve previously utilized them within the example above: is really a “begin tag” or ” tag “. Something composed next label is likely to be understood to be “solid wording” (frequently indicated in bold on the website). Is an ” end tag ” or ” closing tag,” which you may identify from the symbol that is /. Where the sturdy wording ceases, this shows. Many labels (though not totally all) need a conclusion draw to function, therefore be sure you contain it. Put up. Erase everything in your HTML file. Begin again with all the subsequent text, exactly as written (dismissing the topic items). This HTML code informs the visitor what sort of HTML you will be using, which all your HTML is likely to be covered inside the and tags.
They have to set out ground-rules to assist their research is owned by the kids..
[3] Include head and body tags. HTML documents are split into two portions. The “head” area is for data that is specific, like the subject of the site. The “physique” portion involves the main content of the site. Include these equally for your document, recalling to include end tickets. The new text to include is in bold: Welcome to My Web Page. I am hoping you enjoy the website!
There is a small business account the total and priciest -highlighted type of paypal account.
It was made by me simply. Part One HTML was Identified by me I’ve been studying HTML for one twohours today, so Iam a professional. Advertising Part 3 of 4: Adding Links and Pictures Understand features. Tags may have extra information written in the individual, termed “qualities. ” These appear as additional terms within the label itself, inside attribute’s kind -name=” benefit “. As an example, just about any HTML label can have the concept credit: Introductory passage goes below. Provides passage a title, “Launch,” which looks if you mouse over the passage in the web-page. Link to another website. Use the draw to make a url to another website.
Choose whether to impose a fee for gis to personnel that are new.
Put the URL of the web site to URL to utilizing the href attribute. Here’s an example that links for the page you’re reading now: this text to follow the hyperlink cans click. Include an identity attribute to tags. Another attribute that almost any HTML label may use will be the “id” factor. Inside any tag, compose id=”example” or employ any label that doesn’t contain [7] This will not have any consequence that is noticeable, but it’ll be used by us next action. For instance, incorporate this for your document: This section will undoubtedly be used as an example to exhibit how a id feature works. Url to a component having a certain identity. Today the url tag can be used by us,, to link to another spot on the identical page.
If nothing see the variation and otherwise, try shifting your furniture their look is made on by it.
In the place of a website, we’ll use the # image, followed closely by the identification importance weare linking to. to the part using the “example, This text can URL for example. ” All values are event-insensitive. [8] “#EXAMPLE” and “#example” and the same spot can link together. In case your site is not long enough to produce all at once, you might not notice something occur if you click the link within your browser. Resize the window until a search bar looks, then try. Incorporate a graphic. The tag is definitely a draw that is empty, meaning no closing tag is important. Most of the info the visitor must display the image will be added utilizing attributes.
[9] Here Is an example that can exhibit the wikiHow logo, followed closely by a description of each credit: The src=” ” attribute informs the browser where you should find the image. (observe that it truly is typically considered obnoxious to show an image from somebody elseis site? and the impression may disappear if that website previously goes offline. ) The ” ” attribute can perform several things, but most importantly it really is used-to set the size and elevation of the graphic in pixels. (you are able to alternatively utilize the distinct width=” ” and height=” ” features, but this may result in bizarre resizing problems if you are utilizing CSS. [10]) The alt=” ” credit is actually a quick information of the graphic, that your person might find when the image doesn’t weight. This can be deemed a necessity, since it’s utilized by screen readers for blind [11] Advertising Part 4 of 4: Learning More and Getting Your Site Online Examine your HTML. HTML validation assessments for errors within your rule.
Quite simply talk disadvantages and about the advantages of the task.
Approval will help you find the oversight causing problems if your web page isn’t currently displaying precisely. Additionally, it may teach you by identifying code that seems wonderful on your show, but isn’t recommended due to upgrades within the standard. Employing invalid HTML does not make your internet site unusable, nevertheless it could cause difficulties or sporadic show in browsers that are different. Get one of these free online affirmation service from W3C or search for another HTML 5 validator online. Discover more tags and qualities. There are numerous more HTML tags and capabilities, and many areas to master them: Try w3schools and HTML Dog for more courses and extensive lists of tags. Locate a web site you like the look of, and use your browseris “Watch Site Source” purpose to view the HTML yourself. Copy- stick it and enjoy with-it to determine how it works. Examine additional articles to master about using metatags to enhance your internet search engine presence building HTML tables, or applying div and course to greatly help with design.
Put your web site online. Pick a web-hosting support, when you want to your individual website site, and you can upload as many HTML pages. To do this, you’ll need to make use of FTP importing application, but several internet hosts present this assistance as well. You may not should use the entire address, when relating to pages or photographs on your own site. As an example, if your domain name is www. superskilledhtmlcoder. com the text inside these labels will link to ” diary /monday.
As it pertains to choosing some detailed essay topics, don’t be afraid of these simple topics.
html ” Add design. If your html-page is not hunting just a little finished, attempt studying some CSS that is fundamental so as to add distinct fonts colour, and larger control over factor positioning. Connecting a CSS “stylesheet” towards the html-page allows you to create strong adjustments swiftly, automatically changing the design of all text in just a tag that is specific. You can play around having a stylesheet that is simple here, or look into a far more comprehensive article at HTML Dogis CSS manual. Include JavaScript to your page. JavaScript is actually a coding terminology used-to incorporate more functionality to your HTML websites. JavaScript orders are placed involving the finish and start labels, and certainly will be used to include interactive keys, assess math difficulties. Discover more from the cases that are w3c. Advertisement Your support could be actually used by us!
The appliance may also add a backup of instructional work of physique or any encouraging essays.
Can you inform US about haircare? Yes No haircare Just how to acquire wild hair Can you inform US about baking? Yes No baking HOWTO pipe icing on desserts Can you tell us about Babysitting? Yes No Babysitting How to become a sitter that is better Can you reveal about Interactions? Yes No Connections Just how to perform mind games For helping thanks! Please tell us everything you find out about. . . Tell whatever you realize below to us.
The success declared and will be randomly selected on september 3, 2003.
Remember, increased detail is better. Guidelines Provide Particulars. Please be as detailed as possible inside your description. Don’t be worried about format! We will care for it. For example: Don’t state: Eat more fats. Do claim: Include fats with a few vitamins and minerals towards the ingredients you currently consume. Attempt coconut oil avocado. Submit Methods The doctype used in this training is “shed HTML 4.
You will want a far more powerful method, if you need more efficiency.
0. 1 transitional”, a straightforward structure for newbies to use. [12] Use () rather for the visitor to understand it as rigorous HTML-5 style, that will be the recommended (however less widely used) standard. Warnings HTML is supposed to put on information in a format that was general. It is not supposed to control the speech of the web page, like the background color and precise keeping things. Applying CSS is strongly suggested to create a more controllable, constant web page, though you can find tags that enable you to handle these specific things. Things You Will Need A straightforward texteditor, such as NotePad A, including Firefox or Ie (Recommended) An HTML editor including Adobe Dreamweaver, Aptana Facility, or Microsoft Expression Website |
An Archaeological Dig in Israel Provides Clues to How Feasting Became an Important Ritual
File 20171213 27588 121rjcv.png?ixlib=rb 1.1
LightField Studios/
By Natalie Munro, University of Connecticut, The Conversation
This holiday season millions of families will come together to celebrate their respective festivals and engage in myriad rituals. These may include exchanging gifts, singing songs, giving thanks, and most importantly, preparing and consuming the holiday feast.
Archaeological evidence shows that such communally shared meals have long been vital components of human rituals. My colleague Leore Grosman and I discovered the earliest evidence of a ritual feast at a 12,000-year-old archaeological site in northern Israel and learned how feasts came to be integral components of modern-day ritual practice.
First, what are rituals?
Rituals involve meaningful, often repeated actions. In modern-day practices they are expressed through rites such as the hooding of a doctoral student, birthdays, weddings or even sipping wine at Holy Communion or lighting Hanukkah candles.
Pompeii family feast painting, Naples.
Unknown painter before 79 AD, via Wikimedia Commons
Ritual practice may have emerged along with other early modern human behaviors more than 100,000 years ago. However, proving this with material evidence is a challenge. For example, researchers have found that both Neanderthals and early modern humans buried their dead, but scholars weren’t certain whether this was for spiritual or symbolic reasons and not for something more mundane like maintaining site hygiene. Likewise, the discovery of 100,000-year-old symbolic artifacts like pierced shell ornaments and decorated chunks of red ochre in caves in South Africa, was not sufficient to prove that they were part of any ritual activities.
It was only when archaeologists found these artifacts, placed in graves going back 40,000-20,000 years, that it was confirmed they were part of ritual practice.
The first feasts
We had a similar experience during our research. When Leore Grosman and I first embarked on the excavations at Hilazon Tachtit in the late 1990s, we were only hoping to document the activities of the last hunter-gatherers in Israel, at what appeared to be a small campsite. It was only over several seasons of excavation that it slowly became clear to us that this was not a site where people had lived. Rather it was a site for rituals.
Hilazon Tachtit cave interior.
Naftali Hilger, CC BY-NC-ND
No houses, fireplaces or cooking areas were recovered. Instead the cave yielded the skeletal remains of at least 28 individuals interred in three pits and two small structures.
One of these structures contained the complete skeleton of an older woman, who we interpreted as a shaman based on her special treatment at death. Her grave stood apart due to its fine construction – the walls were plastered with clay and inset with flat stone slabs. Even more remarkable was the eclectic array of animal body parts buried alongside of her. The pelvis of a leopard, the wing tip of an eagle, the skulls of two martens and many other unusual body parts surrounded her skeleton.
The butchered remnants of more than 90 tortoises buried in the grave and the leftovers of at least three wild cattle deposited in a second adjacent depression excavated in the cave floor represent the remains of a funeral feast.
Hilazon Tachtit cave.
Naftali Hilger, CC BY-NC-ND
The outstanding preservation of the grave enabled us to detect multiple phases of a ritual performance that included the consumption of the feast, the burial of the woman, and the filling of the grave in several stages, including the intentional deposition of garbage from the feast.
Feasting at the beginning of agriculture
Archaeologists have found other sites that show evidence of ritual feasting. Many of these date to the time when humans were beginning to farm.
Site of Göbekli Tepe.
Teomancimit (Own work) , via Wikimedia Commons, CC BY-SA
One of the most striking is the site of Göbekli Tepe in southeastern Turkey, dating slightly later than Hilazon Tachtit. It includes multiple large structures adorned with benches and giant stone slab carved with exquisite animal depictions in relief dating to 11-12,000 years ago. Perhaps, these were very early communal buildings. The archaeologists who excavated Göbekli Tepe argue that massive quantities of animal bones associated with the structures represent the remains of feasts.
Rituals that bind
The simultaneous appearance of feasting, communal structures and specialized ritual sites suggest that humans were seeking to solve this problem by engaging the community in ritual practice.
One of the central functions of ritual in these communities was to provide a kind of social glue that bound community members by promoting social cohesion and solidarity. Feasts generate loyalty and commitment to the community’s success. Sharing food is intimate and it builds trust.
Communal rituals would have provided a shared sense of identity at a time when social circles were increasing in scale and permanence. They reinforced new ideologies that emerged out of a dramatic reorganization of economic and social life.
Role of feasts today
What’s the role of feasting today?
Yuganov Konstantin
Feasting plays the same essential role today. Like the earliest feasts, our holiday celebrations are replete with actions that are repeated year after year.
The ConversationThe holiday feast today builds family traditions. By cooking and sharing food together, telling stories of past holidays and exchanging intergenerational wisdom, holiday rituals bond extended families and give them a shared identity.
Natalie Munro, Professor, University of Connecticut
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
|
NewsFix in Space: Asteroid whizzes by Earth, ISS astronauts go spacewalking, and fastest-growing black hole ever seen!
Today's adventure takes us beyond Earth's orbit.....where the people of Earth just dodged a major space bullet!
Well, okay it wasn't that big, but an asteroid the size of a city block came whizzing by Earth on Tuesday night.
It wasn't close enough to see-- but by NASA's standards it was a close shave!
NASA indicates the giant space rock came within 126,000 miles of Earth.
Astronomers in England tracked the wayward asteroid known as '2010 WC9' from the Northolt Branch Observatories.
Scientists say the space rock never posed a serious threat.
Luckily, we didn't need a NASA mission to go kick some asteroid this time!
Meanwhile, over on the International Space Station, a couple of astronauts went for a little walk.
These two NASA engineers aren't building a rocketship, but they still have their hands full!
The astronauts spent 6 1/2 hours in space trying to fix the station's cooling system and install some new communications equipment.
Actually, the mission came off without a hitch, and NASA says they'll do another spacewalk next month.
Finally, astronomers down under in Australia have spotted the fastest-growing black hole ever seen in the universe!
Researchers at Australian National University say the supermassive black hole is growing so fast it can gobble up a star the size of our sun every two days!
Scientists say the bright quasar is about 12 billion light years away, and it could even shed some light on the whole big bang theory.
That is, if it doesn't gobble us up first!
|
The Etymology of “Misdemeanor”
The crime of the century is not going to be a misdemeanor, but the history of the word itself may be more interesting than some of the crimes it describes. Looked at the right way, it could be construed to mean “misconducting animals by threatening them,” which might be poetic or might not, I haven’t decided.
Wiktionary gives the etymology of misdemeanor by breaking the word down into two pieces: “mis” (against, opposing) and “demeanor.” Demeanor comes from the latin de + mener + or. Mener was latin for “to conduct” or “to lead.” Mener may also have come from minari, which meant, “to threaten.”
The Online Etymology Dictionary has “demeanor” a little differently. They say that Middle English had a now-obsolete word demean, which meant “handle, manage, conduct” and by the 14th Century came to mean “behave in a certain way.” They trace this word by to the latin de + mener, just like Wiktionary does, and like Wiktionary, they trace that word to the latin “minare” meaning “to threaten,” in the way that a person might lead a herd of animals by threatening them.
According to Merriam Webster, the first known use of the word “misdemeanor” was in the 15th Century. How we got from there, to the word’s modern meaning, which a lesser criminal act in some common law systems, is anyone’s guess. Misdemeanors are often contrasted with their more serious cousins, felonies, a word that has an etymology that is much more surprising and raunchy than you might guess.
A misdemeanor in its original sense.
Missy “Misdemeanor” Elliot got her nickname from rapper Magoo, according to Jet magazine. “Magoo gave is to me. He said it would be cute. It doesn’t mean anything. He just thought it would b e cute for me.” Her name Missy is actually another nickname for her birth name, Melissa.
The word appears occasionally in popular music. The band Sweet has a song called “Miss Demeanor” on their album Desolation Boulevard. Foster Sylvers also has a song called Misdemeanor. British band UFO has an album called Misdemeanor. And finally, according to Wikipedia, there is a female stoner rock band from Sweden called Misdemeanor.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
Create a free website or blog at
Up ↑
%d bloggers like this: |
LA Riots or Uprising?
I was reading a real estate blog, when I noticed a story about a community garden. The garden had been planted on a lot that had been empty for 25 years. The lot started out 1992 occupied by a structure, which was destroyed by arson during the civil unrest that followed the Rodney King verdict. The blog described the structure as having been destroyed in the 1992 Uprising. This is a term that I keep hearing more and more. When the riots happened, they were called riots.
If you believe that words have whatever meaning we want to give them, then there’s no controversy over this issue. People can use any word to describe any thing, up can be down, left can be right. But if you believe words have a shared meaning that is not up to any one person’s interpretation, then you might be interested in which word fits this situation more. Merriam Webster defines uprising as “an act or instance of rising up; especiallya usually localized act of popular violence in defiance usually of an established government.” It defines a riot as “public violence, tumult, or disorder.”
Changing the description of something is often a political act rather than a descriptive act. We may sympathize with the racial grievances of some of the rioters. Some people may agree that the Rodney King jury got it wrong. But we all know, since childhood, that two wrongs don’t make a right. Legitimate racial grievances can’t be resolved through violence. They can’t be resolved through arson, like the one described in the article. They certainly can’t be resolved by looting, which only victimizes the rioter’s own community.
I can’t help think about what happened to Reginald Denny, who was pulled from his car, beaten, robbed and hit with a brick. The man who did it, Damian Williams, was a gang member. The other men involved in the attack were a convicted robber and two drug addicts. Damian Williams would be convicted, released from prison early, and then go on to murder a man.
Uprisings are more noble than riots. Some black journalists have described an uprising as “a group of people saying ‘enough is enough.'” Uprising includes definitions that describe its purpose as overthrow of the political order. Liberal opposition to President Trump is often described that way. The use of the word uprising to describe noble behavior is the reason that it is being applied to the riots. It reflects a retroactive attempt to burnish the image of the rioters from thugs to tragically failed revolutionaries. Hijacking the facts to fit a political theory is dishonest, especially when the facts include death and destruction.
It makes me especially angry to think that we might be turning these rioters into heroes in some kind of anti-racist class struggle. That could not be further from the truth. You can’t fight racism by committing crimes. Indeed, many racists probably saw confirmation of their racists views during the riots. American history is full of examples of successful non-violent movements against racism. Non-violent protesters are heroes. The people that attacked Reginald Denny and burned down all those buildings are villians in this story. As time passes, we shouldn’t forget that.
Six people died from arson during the riots, out of 53 total deaths. The article I read does not say whether this community garden was built where one of those people died. But those people who view the riots as an understandable or even justified response to racism, should read this list, containing a short accounting of each of those deaths. The riots were nothing more that the sum of each of these crimes. We do a disservice to these victims when we try to polish or politicize that fact away.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
Blog at
Up ↑
%d bloggers like this: |
10 tips for learning spanish or any other n.
Skip this Video
Loading SlideShow in 5 Seconds..
10 Tips for Learning Spanish PowerPoint Presentation
Download Presentation
10 Tips for Learning Spanish
Loading in 2 Seconds...
play fullscreen
1 / 7
10 Tips for Learning Spanish - PowerPoint PPT Presentation
• Uploaded on
http://www.spanish4mastery.com/\n\n10 Tips for Learning Spanish\n
Download Presentation
PowerPoint Slideshow about '10 Tips for Learning Spanish' - bradclarmett
Presentation Transcript
10 tips for learning spanish or any other
10 Tips for Learning Spanish
(or Any Other Language)
By Mike McGuire
Congratulations! You have decided to learn another language.
Learning another language is not as difficult as it seems. Anyone can learn a language, right? After all,
you have learned at least one so far. Maybe your goal is to become a polyglot and speak several
languages. So, let's begin.
In this report, you will learn 10 tips that will help make your language-learning journey effective.
1. Select a language
That seems self-explanatory. Consider what your options are. One of the most spoken languages in the
world is Mandarin, spoken by roughly 1 billion people. (Source: https://www.ethnologue.com/statistics/size).
The second most widely spoken language is Spanish.
My journey with Spanish started with my having to prepare for college entrance requirements. My high
school offered three options: Latin, French, and Spanish. I figured, why spend time learning Latin if I
wanted to speak a language? Few if any people speak Latin. Don't get me wrong, Latin has its value, but
it is limited in speaking.
Next was French. Where I grew up in Texas, no one spoke French.
Spanish was my choice. Many people in Texas speak some form of Spanish. By learning Spanish, I would
be able communicate with Spanish-speaking people. At the time, I was not aware of the subtle
Copyright 2017—Mike McGuire
pg. 1
differences between say mexican spanish colombian
differences between, say, Mexican Spanish, Colombian Spanish, and Cuban Spanish. These differences
are not insurmountable, however, in fact, that is one of the things that makes speaking Spanish so much
2. Determine why you want to learn it.
What motivates you to learn this language? What do you want to accomplish with it?
This will help you determine which kind of program you need to purchase. Do you want to travel to a
Spanish-speaking country? Do you want to shop and get the best bargains? Do you need to be able to
negotiate for business, or do you need more technical language skills?
Knowing what you hope to accomplish will help you select an appropriate program. People often ask me
which program is the best. I answer, "It depends on what you want to achieve." Some programs are
better than others, but a program that you do not follow is good for nothing.
3. Determine how you learn best.
Discover what your learning style is. Psychologists and educators have identified four basic learning
a) Visual--This type of learning involves a great deal of demonstration. Learners with this method find
learning through descriptions to be easy. They often use lists to organize their thoughts. They may also
recognize words by sight rather than sounding them out. They may also forget names, but they can
remember faces. About 60% of students fall into this category.
b) Auditory--These students prefer verbal instructions. They also enjoy dialogs and discussions of the
topic. They may tend to try to "talk out" their problems. These students tend to remember names, but
forget faces.
c) Tactile--This type of learning involves touch. These students may prefer to write notes while listening
to a lecture or reading from a text book. They may also tend to doodle while they are processing
information. This group likes hands-on demonstrations.
d) Kinesthetic--This learning involves activity. These students learn through moving. They exhibit high
energy levels, and may experience problems when asked to sit and read. They would rather do than
(Source: http://web.peralta.edu/dualenrollment/files/2016/03/learning_styles_the_four_modalities.pdf)
What style are you? Fortunately, good language learning programs can, and should, incorporate several
different learning styles. So, which is the best learning style? None, they are just different.
Copyright 2017—Mike McGuire
pg. 2
4 understand the language development process
4. Understand the language development process.
Language acquisition skills take time. You do not remember how you learned your first language. The
Mayo Clinic states that by week 18 of pregnancy, a baby's ears have formed, and he or she might be
able to hear. Perhaps language acquisition begins even in the womb.
There are four areas of language acquisition skills:
a) Listening--if not before birth, then at least after birth, a child begins to listen. Parents start speaking to
the child as soon as he or she is born. As the child develops, it appears he or she is not making progress.
He or she is just absorbing the language. Children can learn to comprehend a language before being able
to speak it. For example, your child is trying to stand up in her high chair. You say, "Sit down," and she
instantly does even though she cannot say the words "sit down." This action demonstrates she has
heard and comprehended.
b) Speaking--Children mimic or imitate the people around them. At first, they begin just making noises,
then they start making monosyllabic sounds like ma and da. Next, they begin to put them together and
say "mama" or "dada." (I'm speaking here of English, of course.) Then they begin to build longer words,
then phrases, then sentences. Then they ask why, why, why?
c) Reading--Parents who read to their children from an early age give them an advantage in school.
Reading to them gives them the idea that reading is valuable. If you enjoy reading to your children, they
will want to pick up that skill. You can teach them the alphabet long before they attend school.
d) Writing--Unfortunately this is a highly complex and difficult skill to master. Some never master it even
in their native language, much less a second or third language. Written Language composition skills are
often overlooked in language learning. it does not mean that you should not attempt it, just do not be
dismayed if you do not become a prolific author in your other language.
Language acquisition takes a long time, and you should never stop learning your languages. Work on
your language skills every day.
The Japanese have a term called "Kaizen," which means to change slowly and wisely. (Source:
https://www.youtube.com/watch?v=9DbvSl_C_kY&t=140s). That video explains the one-minute
principle where you practice whatever skill or habit you want to develop for one minute at the same
time every day. For language skills, you should work up to at least thirty minutes a day. Try working on
some of the skills in tip 4 above.
5. Start talking with someone as soon as possible.
Preferably a native speaker. I will never forget the thrill I had on my first trip to Mexico and trying to talk
to the people there. I had already studied Spanish for a little more than two years. Although I had done
well in school, I was disappointed in how little I could communicate. Unfortunately, the high school
Copyright 2017—Mike McGuire
pg. 3
curriculum did not emphasize conversation as much
curriculum did not emphasize conversation as much as it did drills. Nevertheless, I was so hyped up after
that trip, I returned to class with a new desire to learn even more.
You do not need to wait until you have studied for two years or more before you are ready to speak the
language. Use what you know, as much as you know, as often as you can. Technology today means that
you could learn something in class this morning, and then put it to use this evening on the internet.
There are several programs that allow you to communicate in real time, face-to-face if you want.
If you live in a large city, you can find places where people meet. You might try shopping in a market
where the target language is spoken. That way instead of the shop worker struggling to speak English
with you, you can struggle trying to speak that language. You may be surprised as to what bargain you
can reach that way. You can also try going to a deli or a coffee shop to practice. People often enjoy
helping someone out who is trying to learn their language.
You also don’t have to understand every word to be able to understand the conversation. Even in our
native language, we don’t focus on every single word in a conversation. You will be able to get the main
idea. Success comes with practice.
6. Read the target language out loud
You may want to go where no one can hear you if you might feel uneasy at first. Reading out loud will
help you to hear how you sound. You might even want to record yourself to hear what you sound like to
others. Don’t worry, no one likes the sound of their own voice in a recording. The reason is that you
usually hear yourself on the inside of your head. Sound waves travel through your skull and sound
different when your voice comes back to you only through your ears. It is normal to feel this way about
your recorded voice.
Focus on your pronunciation. Try to mimic the accent of the language you are trying to learn.
Make it conversational. This will help you to begin thinking in the target language. You will never achieve
mastery without this. If you always have to translate in your head, you will never be able to keep up
with a conversation.
A good reading website, at least at the time of this publication, is: www.allyoucanread.com. There you
will find newspapers and magazines from countries all around the world. You pick the country of your
target language, then you select a newspaper and begin reading. Pictures there will help you get the
idea. Also, you can learn using context clues as to the meanings of the words. Best of all, on this website,
the news is free.
7. Learn 30 new words or phrases every day.
The key here is “every day.” In the same way that you learned to speak your native language by using it
every day, so you must work on your target language every day, although you will have to make a
conscious effort to do so. You do not have the time to absorb another language. You will need to focus.
How many words do you really need to know?
Copyright 2017—Mike McGuire
pg. 4
now you can get by in spanish with just 138 words
Now you can get by in Spanish with just 138 words.
Make flash cards of the objects around your home and office. Placing the target language on the object
will help you to start thinking in the language. If you put the flash card “silla” on your chair, you will not
have to think of the English word “chair.” You will simply associate the word directly with the object as
you did in your first language.
Use picture dictionaries. Particularly if you are a visual learner. Focus on the pictures rather than the
definitions of the word.
8. Discover the similarities between the languages
Spanish is a Romance Language (not necessarily a romantic language). That simply means that it finds its
roots in Rome. French, Portuguese, Italian, Romanian and Catalan all stem from Vulgar or Common
Latin. That means mastering one language in that family group will make it easier to learn another from
that group.
I am fluent in Spanish, but I can read in several of those languages, and I can understand much of what is
said even though I have never formally studied them. Some time back as I was waiting to board a plane,
I observed a tall distinguished-looking man in a white suit speaking on his cell phone while waiting in line
to board. He boarded the plane before I did and sat in first class. While making my way to my seat, I had
to stand near him for about a minute. I could overhear his conversation. He was speaking in Italian, and I
could understand every word he said. (I was not eavesdropping on him. He was speaking in public.)
Russian, Ukrainian, and Belorussian are Slavic languages in eastern Europe, while Polish, Czech, and
Slovak are in the west. Slovenian, Bosnian/Croatian/Serbian, Macedonian, and Bulgarian to the south.
Once you account for the differences between the alphabets, you can learn several of them once you
master one of them.
Then there are the Germanic languages such as German, English, Dutch, Icelandic, Norwegian, Danish,
Afrikaans and Swedish. If you study from this group, you will notice similarities, however, English may
seem far removed from the rest due to its influence from other languages and cultures.
One thing you should look for are cognates. In this word, you see the root for the word “recognize.” You
learn to recognize words from one language to another language. Be careful, though, because languages
also contain “false cognates.” That is, you think it means something and may not even be related at all.
For example, the Spanish word “embarazada” does not mean “embarrassed.” It means “pregnant.’ You
can see how this might lead you to an embarrassing situation if you mistake the two words.
Additionally, you can learn language roots. This works particularly well with English and Romance
languages. This is because Latin and Greek made great impacts on the English language, as well as the
French influence after the Norman Conquest of 1066. (Language learning may also help you with
Using “word attack” skills, you learn to break words down into their roots, prefixes and suffixes. In many
other languages, speakers use verb endings when speaking and writing. These endings tell you the
person, number, tense, voice and mood of the verbs. Some languages also have case endings on
Copyright 2017—Mike McGuire
pg. 5
adjectives nouns and pronouns as well these terms
adjectives, nouns and pronouns as well. These terms will make more sense as you delve into your
9. Listen to the language
The internet can stream movies and videos to your screen from virtually any place on earth. You can
watch news casts in other languages, and you can learn much from the context.
You may also have some foreign language channels on your television subscription plan. If you are
learning Spanish, you may not even have to pay additional fees for them as you might with Russian, for
Several years ago, I taught an English language course in Ukraine. Usually I teach the very beginners
because I love the challenge of helping them overcome language barriers. You can see more rapid
development in the earlier stages than the later ones.
One of my students I’ll call Vika came to me with virtually no English-speaking skills at all. She started
the course late, and I feared she would not do well. She struggled through it. I returned to the same city
a year later, to the same program. One of my fellow teachers approached me during the registration
process and asked me if I remembered a student named Vika. “Yes,” I said. “Why?” He told me that he
had just tested her level of English, and she tested out at a high intermediate level. “She said you were
her teacher last year. Am I missing something?” he asked.
That got my curiosity up. I located her in the commons area and greeted her. I was surprised at her new
level of fluency. She had gone from a basic beginner level to high intermediate in one year. “How did
you do it?” I asked her. “American movies,” she replied. She started watching American movies with
Ukrainian or Russian subtitles at first, then she progressed to watching them without subtitles. Her
progress was tremendous.
Listen to your target language every chance you get.
And finally:
10. Have fun
Warning: People may laugh at you. You must overcome this fear. That is one reason why some people
live in a foreign country, but never learn the language. They are paralyzed by the fear of making
mistakes, and others finding humor in it. Turn that “laughing at” into “laughing with” and learn to laugh
at yourself as well. Those humorous times may be some of your best and most memorable learning
Warning: You will always have a foreign accent in your new language. Unless you grow up speaking
multiple languages, you will probably have an accent in your other language. Although I am fluent in
Spanish, I will never sound like a native speaker. I have learned to accept this accent. Just think of how
quaint Americans think English spoken with a foreign accent is. Think about your favorite foreign actors
Copyright 2017—Mike McGuire
pg. 6
and how much you love their accent americans
and how much you love their accent. Americans are particularly fond of British or Australian accents,
however, Spanish, Italian and French accents are also sexy. I particularly love trying to identify accents in
public. I enjoy recognizing people and the effort they have made to learn English.
Don’t be afraid to use gestures and pantomime to communicate ideas or ask questions. Act situations
out in a child-like manner. Play with the language. Also learn how to ask, “What is this?” in the target
language. One question that helped my Spanish development was the question “¿Qué es esto?” while
pointing at an object. I learned many words this way. (Another invaluable question to learn in your
target language is, “Where’s the Bathroom?” for obvious reasons.)
So, enjoy the language you have chosen to learn. It will become a lifelong experience, one that will
enrich your life if you let it. Never stop learning.
Start here to learn with just 138 words.
Who is Mike McGuire?
Mike is a lifelong language learner, not just of foreign languages, but of his native language as well. He is
curious about words and how languages work. He loves talking to anybody about just about any topic.
He is an ordained minister and an educator. He has taught Spanish and English as a Second Language on
the high school and university level through contractual agreements. He does language workshops to
teach people language-learning skills.
He started studying Spanish as a high school student and continued all through the university to become
a teacher. He began travelling internationally at age sixteen. While his first “international” trip was just
across the border, that trip was the impetus to become a fluent speaker. Mike has traveled to Canada,
Mexico, Brazil, Colombia, Ecuador, Cuba, Honduras, El Salvador, Spain, Portugal, Morocco, Ukraine,
Belorussia, Poland, Lithuania, Thailand, Kenya, and most recently, Peru.
In those countries, he as often served as an interpreter, translator, and teacher. Mike has also written
several articles and two books.
Mike also does training workshops in industrial safety in both English and Spanish. He is an authorized
OSHA Outreach trainer, and has traveled across the United States teaching the OSHA 30 Hour safety
training for General Industry.
He and his wife, Linda, have three grown children and five grandchildren. Mike and Linda live in
southeastern New Mexico.
Copyright 2017—Mike McGuire
pg. 7 |
CM7 - C, E, G, B
C7 - C, E, G, Bb
Cm7 - C, Eb, G, Bb
Caug7 - C, E, G#, Bb
Cdim7 - C, Eb, Gb, A.
Why Does Cdim7 contain an A and not a Bb?
• 3
The other answerers have already addressed the question more than adequately so I won't duplicate them, but I will just point out additionally that there does exist a chord "C Eb Gb Bb" and that it's called the "half diminished" chord, because it has a diminished five but a non-diminished 7th. It's often written as Cø and is also a useful chord (it's really pretty). – Some_Guy Oct 19 at 14:58
C°7 actually includes a B doubleflat.
A major seventh above C is B and a minor seventh above C is B♭. This means that a diminished seventh above C is actually B♭♭, which is enharmonic to A.
But the seventh is not A, because A is just a sixth above C. A is enharmonic to B♭♭, but since we want the seventh above C, it must be B♭♭, not A.
But it gets more interesting: since fully diminished sevenths are just stacked minor thirds, they can be spelled four different ways, with each pitch as root; we say that these chords are enharmonic, just like we say that A is enharmonic to B♭♭.
This then means that C–E♭–G♭–A is a diminished seventh chord, but with A as the root: A–C–E♭–G♭. If E♭ is the root, we'd rather spell it as D♯–F♯–A–C. If G♭ is the root, we'd spell it as F♯–A–C–E♭.
These chords all sound the same as C°7, but they are spelled differently.
• 'We'd rather spell Ebo as D#o'. Because Ebo would be Eb--Gb--Bbb--Dbb. Good reason! – Tim Oct 20 at 10:55
Other answers have pointed out that it's a B♭♭, not an A. To answer the question "why not a B♭":
The chord in question is the chord of the diminished 7th. As David Bowling and Richard have stated, if the root is C, the diminished 7th is B♭♭.
The chord is also called the "diminished 7th chord". This name and its chord symbol Cdim7 are perhaps confusing. I don't know if this is what you thought, but, just for the record, "Cdim7" does not mean
• the diminished triad C-E♭-G♭ as indicated by "Cdim"
• the pitch B♭ as indicated by "7", just as C7 means a C triad plus B♭
It's not a [ diminished triad ] with a seventh. It's a chord of the [ diminished seventh ].
• 1
Except it has a diminished triad. It has a m3 and a dim5. Then on top, a dim7. If it was a chord with a dim7 only, it'd sound like a M6. – Tim Oct 20 at 10:48
A Cdim7 chord is actually spelled C-Eb-Gb-Bbb, where the interval from C to Bbb is called a diminished seventh. The interval from C to A is a major sixth, but sometimes you do see people spell Cdim7 as C-Eb-Gb-A for convenience to avoid the double flat, it is just technically incorrect. This chord is sometimes called a fully-diminished chord, in contrast to a half-diminished chord. A half-diminished C chord (Cmin7b5, C-7b5, or C) is spelled: C-Eb-Gb-Bb. These are often found in ii-V-i progressions in jazz.
• C-E♭-G♭-A is also the correct spelling of the pitches in Adim7. And it's OK to put the C (or indeed E♭ or G♭) in the bass. – Rosie F Oct 19 at 13:24
• 2
@RosieF -- not sure I understand your point; Adim7 and Cdim7 are enharmonically spelled the same way, but are not the same chords. – David Bowling Oct 19 at 13:28
• Indeed. I just didn't want anyone reading your answer to think the spelling with an A is as you say "technically incorrect". A composer may write an A and yet be technically correct. It's just that the technically correct chord symbol would then be Adim7. When it comes to deciding how to spell a dim7 chord, let voice leading be your guide. And yes, perhaps simplify for convenience if you feel that's right. The chord symbol comes later. The music determines the chord symbol, not the other way around. The composer needn't let the symbol determine the spelling. – Rosie F Oct 19 at 13:45
• 2
@RosieF -- it is a technically incorrect way to spell Cdim7; it is only a correct spelling for Adim7. – David Bowling Oct 19 at 15:34
It actually contains a Bbb (double flat). Often (mis)spelt as A for convenience. You'll also often see it notated as C, Eb, F#, A.
A dim7 chord is a pile of minor 3rds. A minor 3rd up from Gb is Bbb.
Adding a little to the others. Cdim7 cannot contain a Bb note. Bb only produces a minor 7th from the root. To make it a diminished 7th, the space between root and m7 needs to be one semitone smaller. That's the reason it gets called Bbb. It sounds just like A, but since C>A is a M6, that wouldn't be correct if the chord was to be called dim7.
Your Answer
|
Cuba and Venezuela seem to share a lot in common. Both are effectively Socialist dictatorships. Cuba's government has been Communist for many years, while Venezuela has been socialist for much less.
I would like to know why Venezuela's socialist economy has failed so catastrophically, while Cuba's has endured for so long? Both nations have governments which own the largest corporations, subsidise food, and limit private enterprise. It seems like these reasons cannot explain the disparity.
• 23
It is an oversimplification to describe Venezuela as a socialist dictatorship. There are many worrying autocratic tendencies, but there is also still a major open opposition-controlled press which almost by definition does not tend to exist in dictatorships, and certainly does not exist in Cuba or any former European communist-party-led countries. – gerrit Sep 10 at 12:03
• 14
@gerrit There is a term which may be relevant: "illiberal democracy"... as Viktor Orban terms it. But given Maduro's defacto power, I did say they were "effectively" dictatorships. Elections, a political opposition, and opposition press, sometimes occur in political systems where power is effectively dictatorial. Russia, Syria, Jordan, Venezuela all have some political diversity... but whether any of that is meaningful is another question. So I don't think it's unfair to characterise Maduro's Venezuela as defacto dictatorship. Especially given allegations made in the last election. – inappropriateCode Sep 10 at 12:32
• 3
Illiberal democracy may be the correct term. I don't know if Maduro has more domestic power than, say, Erdoǧan or Putin. – gerrit Sep 10 at 13:25
• See "Venezuela Defense of Human Rights and Civil Society Act of 2014" for reasons why Venezuela has been having trouble selling their oil. American hegemony is certainly not helping Venezuelans. – Max Vernon Sep 11 at 13:01
up vote 90 down vote accepted
The reason Venezuela's economy collapsed was its over-reliance on oil exports. In the last half of the 20th century, the Venezuelan economy focused on growing its oil industry, while relying on imports for most other products. This worked quite well while the oil prices were exceptionally high.
It stopped working in 2014 when the global oil price plummeted and the oil industry was no longer generating enough revenue to maintain the imports of critical goods from abroad. This chart shows you the imports and exports of Venezuela over the years (there is a huge gap between 2013 and 2016, but you can see two dots at the right edge which show you the numbers from 2016). Exports went down from 144B to just 26.6B and in turn imports were reduced from 44.5B to 15.1B (in US$).
See the Wikipedia article on the economic crisis in Venezuela for details.
Cuba did suffer a similar crisis in the 90s, which was caused by the dissolution of the Soviet Union which back then was Cuba's main trade partner. Cuba responded with diversifying their import and export sources and by becoming more self-sufficient in the agrarian sector. Today's Cuba does not suffer from an over-reliance on any one product like Venezuela does. Well, the Cuban sugar industry is important, but not as important as the oil industry is for Venezuela.
• 10
Just curious; the magic word "corruption" is not present in this answer. Is it not a factor? – RedSonja Sep 10 at 12:16
• 44
@RedSonja Cuba and Venezuela are both pretty corrupt countries. So no, this isn't really an important factor if you compare these two countries to each other. – Philipp Sep 10 at 12:28
• 6
I'm not sure this is the right answer. Oil prices "crashed" in 1998, and have been rising ever since. It's not "oil", it's "Venezuela's Oil Production" that's messed up - which begs the question: why is their oil production messed up? – Kevin Sep 10 at 14:50
• 9
@inappropriateCode "Venezuela's exports however are worth almost twice their imports. Surely this means they should be fine?" Not really. Venezuela is a planned economy that was foolishly designed to produce almost exclusively oil. They produce almost nothing else. Every single need they have, whether food, technology, clothing, has to be imported. A trade balance isn't enough to predict whether all of a country's needs are met. A favorable trade balance + producing one's own food will yield a different result than a favorable balance but no production of own food. – John Sep 10 at 16:53
• 8
While I don't agree with this answer, it doesn't make sense to post, "No, the real answer is X" comments here. If you think the answer's something else, post it as an answer – Kevin Sep 11 at 14:28
Wait up a minute. Who says Cuba didn't fail spectacularly?
Miami (and Florida in general) have a huge Cuban population. Generally, because Cubans did anything they could to leave that country during the 90's - even to the extent of risking their lives trying to boat/raft/etc their way up north.
Here is the story of a person who grew up in Cuba after the fall of the Soviet Union. There aren't any pets in Venezeula because starving people have killed them for food. Well, that happened in Cuba as well.
This story is a bit less depressing. Basically, Cuba imposed price controls on food, and all of a sudden, the people had less to eat and started losing weight. Funnily, the newspaper presents it as, "Hey, everyone got to go on a diet, and got healthier!" even though it admits the people themselves hated it and thought of it as a crisis.
(Other stores I found have details about the zoo being raided so that the animals could be eaten; I hadn't realized that the same zoo-raids that have plagued Venezuela also occurred in Cuba.)
Anyway, the issue is largely one of price controls. Basically, when someone in power says, "Product X is too expensive; from now on, it will only cost Y!" what they're really saying is "If you make product X, you're no longer going to be able to sell it for a price that covers your expenses and your cost of living!" - which understandably leads to shortages on Product X since people that produce it stop doing so. Venezeula has very good farmland - yet they can't farm. Why? Because between trying to obtain/purchase supplies, and dealing with corruption at all levels, they're not going to make enough money with the sale of their crops.
Both Cuba and Venezuela tried to deal with the issue of 'food prices are high' by imposing price controls. Which spiraled into shortages. It's not that Cuba didn't fail - it's just that it's had time to try to recover a bit from what happened in the 90's.
• 10
"Who says Cuba didn't fail spectacularly?" I was wondering the same thing. Good to see your answer! – Lan Sep 10 at 17:15
• 6
Re "...dealing with corruption at all levels..." is it really "corruption" when the obstacles are official government policies, rather than individuals seeking bribes? Indeed, if the level of bribery is reasonable and fairly predictable, so that a business can factor it into its costs, why would it be an obstacle to a decently-functioning economy? – jamesqf Sep 10 at 18:53
• 4
@jamesqf - I debated even whether to add corruption in there, since it doesn't really have anything to do with Cuba vs Venezuela. But, yeah, it's not just state corruption or state policies. A great example are military units that seize incoming cargo ships with imports into Venezuela. The individual unit doesn't allow the ship to unload its cargo until they've received a kickback.… – Kevin Sep 10 at 20:46
• 2
@Kevin: And how does that differ (to the business) from a tariff? If for instance the business imports automobiles and the military unit always seizes 20% of the cars, or wants to be paid 20% of their value, seems like the effect on the business is exactly like the government suddenly imposing a 20% tariff on imported autos. (Not to be topical at all, oh my no :-)) – jamesqf Sep 11 at 5:09
• 2
When someone in power says, "Product X is too expensive; from now on, it will only cost Y!" what they're really saying... depends on many other things (do they intend to simply punish you for setting a price higher than Y? are they going to subsidize the difference? is everything already owned by the state, so you, as a "hired worker", don't give a damn?) – Headcrab Sep 11 at 6:36
Venezuela made a headlong rush into state ownership of businesses, at the direction of Chavez and Maduro. Consequently, the businesses saw their experienced executives replaced by friends of Chavez and Maduro, with more of an eye on loyalty than competence.
As a direct result of this displacement of experienced people, not only was Venezuela hurt badly by the decrease of oil revenues, it also wrecked its economic infrastructure by disrupting formerly well run businesses. It wasn't a turn to socialism/communism that wrecked Venezuela's economy. It was sheer incompetence on the part of Chavez and Maduro.
Cuba's government has functioned in its current form for decades, and has established some meritocracy in its staff. While the Castros ran Cuba, they did make some effort to insure competence on the part of party officials.
This is essentially a replay of the Zimbabwe situation: Mugabe nationalized all of the farms, and redistributed the land to his friends... who couldn't run a farm. Consequently, Zimbabwe's farm output dropped dramatically, cutting off their chief export: food. Like Venezuela, Zimbabwe wasn't done in by an economic model, but the stupidity of the people in charge.
One of the problems with a dictator or near dictator is - no sanity checks on their decisions.
In a twist of irony, Venezuela's confiscation of foreign owned businesses actually helped out some of the foreign companies. GM had an auto plant in Venezuela that not only wasn't profitable, it had accrued a huge pension liability in excess of the value of the plant. When Maduro nationalized that plant, he also assumed responsibility for that pension liability. Surprise!
• 2
This is a good answer, but would benefit from a few links to supporting evidence! – inappropriateCode Sep 11 at 7:59
• 2
I'm not saying this is wrong per se because I may be misreading it, but you seem to be saying the problem was "wrong people in charge". Any strongly-centralized system has the potential for this. Always. It's never a question of just "putting the right people in charge". – Jared Smith Sep 11 at 17:55
• @JaredSmith: Abstoluley, the potential incompetence of decision-makers is a problem with any strongly-centralized system. The answer is pointing out that this potential actually occurred in Venezuela and Zimbabwe, to a much greater extent than it did in Cuba. – Peter LeFanu Lumsdaine Sep 12 at 14:17
• "Like Venezuela, Zimbabwe wasn't done in by an economic model, but the stupidity of the people in charge." - This sentence alone shows why centrally planned economies will always be inferior to laissez faire. – MplsAmigo Sep 12 at 15:05
• "It wasn't a turn to socialism/communism that wrecked Venezuela's economy. It was sheer incompetence on the part of Chavez and Maduro." - It was Socialism that caused the incompetence. – Adrian Bartholomew Sep 12 at 19:06
Lots of economy is about trade. If someone (external) can punish you by means of affecting your trade you will likely have a bad time regardless of what internal politics or reforms you push through. For whatever reason the global market for oil changed - to which Venezuela was sensitive. It would have been sensitive to that also if it was a democracy or whatever it was.
• @mathreader I live in Sweden. I have a pretty good insight in the Norwegian society. It is ruled by a center-right government, most of the economy is "free market", private ownership is protected by the constitution, they have freedom of contract, courts are based on rule of law and so on and so on. Norway is not socialist if you know anything about socialism. – d-b Sep 10 at 21:14
• 4
@mathreadler Your answer is bad because it doesn't have any details. You say, "Hey, trade stuff happened and it sunk Venezuela - it didn't have anything to do with democracy/socialism/etc". Okay, awesome - that's a viewpoint that hasn't been listed. So, what about some details? Which nations refused to buy Venezeulan oil? How much extra oil did Venezeula produce that other nations wouldn't buy? All you've got now is, "Hey, it could've been Reason X!", but no actual facts to support the argument. – Kevin Sep 10 at 21:14
• 2
I think people are downvoting because this seems to repeat what another answer said. Perhaps you should move this to a comment on the aforementioned answer? – can-ned_food Sep 10 at 22:26
• 4
@mathreadler Your answer has likely been down voted for a few reasons. Firstly, it is short and lacks depth. Secondly, it lacks references to supporting evidence. Answers on stack exchanges usually need depth and quality. If you can edit your answer to add more detail, and to support that with quality sources, then it will probably be fine. An unusual answer is fine so long as it is good. This is too short and unjustified right now. – inappropriateCode Sep 11 at 12:46
• @inappropriateCode yes surely I will be able to find such sources. – mathreadler Sep 11 at 12:50
protected by Philipp Sep 10 at 21:27
Would you like to answer one of these unanswered questions instead?
|
North Korean defector describes life at home through cartoons | Human Rights | Al Jazeera
North Korean defector describes life at home through cartoons
In part three of the series on North Korean defectors, Al Jazeera speaks to cartoonist Sung-guk who fled in 2010.
North Korean defector describes life at home through cartoons
It took Choi Sung-guk just 15 days to reach South Korea from the North [Faras Ghani/Al Jazeera]
Seoul, South Korea - Around 31,000 North Koreans have defected to South Korea since the end of the Korean War in 1953.
Almost 71 percent of those defectors are female, most in their 20s and 30s.
Only a few take the most dangerous route through the Korean Demilitarized Zone that a North Korean soldier took late last year.
Most of the North Koreans defect via the long and expensive journey that takes them into China after crossing the Yalu River.
This journey takes the individuals to China's southern border into Vietnam and Laos before they arrive in Thailand.
They are often flown into South Korea from Thailand. Some even opt to go to the US, according to Liberty in North Korea, an NGO based in the US and South Korea.
But their arrival into South Korea does not signal an end to their worries and problems.
Part 1 -"Korean government doesn't treat defectors as people"
Part 2 - "As a refugee, South Korea has given me everything
In part three of the series, Al Jazeera speaks to 37-year-old cartoonist Choi Sung-guk who also works as a lecturer and broker, helping more North Koreans escape the country and arrive in South Korea.
"I was under surveillance for copying and distributing South Korean movies in the North when I decided to flee in 2010.
"I actually sent out my family first - my mother, sister and my nephew - to China because I was worried. However, after they left, I was arrested and sent to a detention centre for six months. I manage to flee the country myself after that detention period was over.
"Things didn't work out well for my family in China though. They were arrested and the government tricked my sister. They sent her to North Korea as a spy to complete a mission. But she was caught and killed. I found out when I was in the detention centre.
"In North Korea, I worked at an animation company, making local versions of The Lion King, Titanic, etc. I worked as a wedding and birthday photographer and since hairstyles were tightly controlled in the country, I took photos of people and photoshopped different hairstyles on those.
"My trip to South Korea was short and easy. I fled to China, then Laos and then to Thailand before arriving in South Korea. All in 15 days.
Choi Sung-guk's sister was killed after she was sent back to North Korea from China [Faras Ghani/Al Jazeera]
"I started working as a program developer and web designers after arriving here. But I was always interested in comics and cartoons. What I saw here was really boring so I took up working at a broadcasting network, as a radio jockey and also a journalist and that's when I started to understand the South Korean society.
"I also realised the cultural differences between the two Koreas and how people had different attitudes towards unification. And that's why I started my webtoon three years ago and help towards reducing the cultural gap.
"Through my art work, I want to teach people the differences and the similarities we have. I also want to dispel the prejudice the youth has about unification.
"Out of the 32,000 defectors in South Korea, the most visible are the 100-odd that are not living well. Rest of them are not visible because they are well integrated and are able to make the money they need to survive.
"In North Korea, people have to report on each other. Whenever someone is eating meat, a neighbour, who can't have meat, will report him. I try and show stuff through my art, through scenarios that are more ordinary.
"Sometimes, I will include historical stuff or academic information in order to get people to understand why it is that North and South Koreans are different. All my work is through collected via people around me and from my work as a broker.
"There has never been anyone who has asked me to send them back permanently. I have had requests for people to go back for a few days to see their family and I have managed to get that done. But nobody wants to go there forever."
As told to Faras Ghani and Hae Ju Kang
SOURCE: Al Jazeera News
Survivor stories from Super Typhoon Haiyan
Survivor stories from Super Typhoon Haiyan
How Moscow lost Riyadh in 1938
How Moscow lost Riyadh in 1938
We Are Still Here: A Story from Native Alaska
We Are Still Here: A Story from Native Alaska
|
14/05/2014 09:33 BST | Updated 12/07/2014 06:59 BST
Keep It Real and Do It Right: Is Responsible Tourism the Key to Madagascar's Future?
Opulent in natural and cultural riches, yet one of the poorest nations in the world, Madagascar is a country of contrasts. It has a culture rooted in the traditions and legacies of its ancestors, yet struggles to preserve its current resources for this generation let alone those generations to come; 90% of its forests have disappeared, yet slash and burn farming, or 'tavy', is a key cultural activity. It is a country which could be described as undeveloping, yet its wildlife has evolved to be some of the most unique in the world. And for the traveller, the country stirs a yearning in the heart, calling to our inner explorer, as a wild, magical country only for the most intrepid. With much of the country best explored by boat or foot, Madagascar offers a real adventure through deeply interesting cultures, infectious music, delicious food and eye-widening wildlife. And with increasing tourism, these are adventures which are becoming more and more accessible, yet still feel pioneering.
Going backwards
Madagascar is poor, and getting poorer. Nearly 80% of its population lives below the poverty line of less than US$1.25 per day, dependent on livelihoods and food supplies generated by clearing precious forest for equally precious rice cultivation and livestock. This has caused widespread flooding, landslides and the extinction of mega-fauna, including 17 giant lemur species. Political instability has led this intriguing nation into even deeper poverty in recent years, resulting in yet more dependence on its ever-diminishing forests and posing an even greater threat to its remaining wildlife.
Going forwards
I believe that for the poorest communities in the world, whose only assets are their natural environments and rich cultures, tourism can provide an alternative source of income; a more benign land-use to destructive slash-and-burn farming and a way to put a value on the natural riches at their disposal. Responsible tourism, practised in partnership with, and for the benefit of local communities can not only increase local peoples' prosperity, but as a result can also reduce the pressure on Madagascar's forests, preserving habitats and the unique species found within.
Responsibletravel.com's specialist suppliers in Madagascar have found that Malagasy people are keen to be involved in conservation and tourism projects, and that tour operators engaging with communities and supporting them to develop their own sustainable ways of living have been welcomed with open arms. And with a population of 22 million, world-class hiking, stunning landscapes and some of the world's most wonderful wildlife I believe the scope for community-led sustainable tourism developments, and the potential economic benefit is huge. Tourism in Madagascar has therefore become extremely important - but it has to be done right to ensure the benefits reach those who need it most.
Do it right in Madagascar
Forget the Nosy Be bubble, with its all-inclusive beach resorts, for your visit to bring benefits to local people you need to get out into the real, authentic Madagascar. With little infrastructure and most of the country only accessible by river or on foot, your best bet is to choose a reputable, responsible tour operator who works with local communities and guides. Before booking a trip I recommend asking a multitude of questions - find out whether accommodation used is locally owned and do your research. If you come across a locally run guesthouses or activities that you'd love to include in your itinerary let your tour operator know - explain that you are keen to spread the benefits of your visit as widely as possible and they should be able to help you.
Not only does using a local guide mean your money goes directly to local people, but it will give you a much closer insight into Madagascar's unique, complex, yet fascinating system of taboos or 'fady'. Underpinning its rich culture and varying from village to village, taboos range from singing at meal times and sitting in doorways during the rice harvest, to pointing at tombs or wearing swimming goggles. A local guide can ensure you know what is and isn't acceptable in each place you stay, allowing you to interact with the local communities you visit in a much deeper way.
Responsible tourism is not a one-sided deal. Not only is it better for Madagascar's wildlife and better for the Malagasy people, it also leads to a much more enriching and memorable holiday experience for you. In return for shouldering the responsibility for ensuring your holiday brings benefits to communities and environments, you end up experiencing the authentic Madagascar in all its unique, colourful and wild ways. You taste its food, immerse yourself in vibrant cultures, visit unique communities, spot weird and wonderful wildlife and have the kind of real, out-of-the-way adventures which only exist in a handful of places on Earth. Your inner explorer will jump for joy.
Read more in responsibletravel.com's open, honest 2 minute guide to Madagascar. |
Year of the Spider: Trapdoor Spiders
Concluding N.C. State Parks’ Year of the Spider, the last group of spiderswe will explore are the trapdoor spiders. These members of the Ctenizidae family get their name from the “doors” they construct to cover their burrows. Female trapdoor spiders, like other spider species, are larger than their male counterparts. Ranging from 1-inch to nearly 3 inches in size, trapdoor spiders are heavy-bodied, with relatively short, robust legs. Trapdoor spiders are not brightly marked like our crab or jumping spiders. They are typically black and hairless, which makes them appear more like a shiny plastic toy than a live animal.
What they lack in colorful appearance, trapdoor spiders make up for in the way they hunt. Imagine walking through the forest around Lake James, searching for food, or a place to hide. You’re a forest floor cruising insect, like a beetle, or a cricket. Suddenly, a flash from the corner of your eye and something grabs you. As quickly as you were grabbed, a small door shuts and you’re plunged into darkness. You’ve been grabbed by a trapdoor spider and while you’re invited for dinner, you aren’t a guest, you’re dinner. Female trapdoor spiders construct vertical borrows in which they lay in wait for their next meal. The trick to catching their prey off-guard is a small, 1-inch round door, camouflaged with surrounding ground litter. Under this trapdoor, the spider waits for its next meal to walk close enough to pounce on.
Traditional, large web-building spiders can be easy to find as you walk the trails at Lake James. Trapdoor spiders are much harder to see. They hide underground in burrows with camouflage trapdoors after all. With that said, trapdoor spiders can be observed if you look for them at the right time. The male spiders spend most of their time hunting on the forest floor for various insects. The females are best searched for after a hard rain. Being burrowdwellers, the females are often driven from hiding when the burrow fills up with water.
Little is known about the life-cycle of the trapdoor spider. Most spider species in North Carolina live less than a year. They become sexually mature in the first half of the warm season, breeding in mid- to late summer and then dying as temperatures cool in late fall. It is theorized that because of their robust size, trapdoor spiders can live multiple years, like tarantulas.
Trapdoor spiders are arguably one of the most fascinating spiders found in North Carolina. They aren’t commonly encountered, but when they are, they are a fantastic addition to any hike. So, the next time you find yourself hiking in the park after a rain, keep an eye out on the forest floor, you may see one of these impressive spiders. |
How Can You Tell When a Quadratic Equations Has No Real Solutions by Using the Quadratic Formula?
Use the quadratic formula to solve a quadratic equation. Set the quadratic equation equal to zero. Identify the coefficient values and plug them in to the quadratic formula. Solve the equation. What? No solution. Really? Watch this video and check out how to identify that there is no real solution.
3 Views 5 Downloads
Resource Details
8th - 11th
2 more...
Resource Types
1 more...
Instructional Strategy
Flipped Classroom
Usage Permissions
Fine Print |
50 years after Grand Rapids riot, city officials focus on racial equity
GRAND RAPIDS, MI - Some racial divides in Grand Rapids have changed little since 1967.
What has changed in the past 50 years is the role local government chooses to play.
The summer of 1967 was marred by deadly race riots in Detroit and across the country -- the same unrest and sense of racial injustice fueled a three-day uprising in Grand Rapids. No one was killed in Grand Rapids, but the feeling among black residents that they were treated as "second-class citizens" was not resolved.
In 2015, Forbes ranked Grand Rapids the second-worst in the nation for economic success for African Americans. And a city-funded study released this spring showed the police department pulls over black drivers at a higher rate than non-black drivers.
City officials are owning up to disparities in Grand Rapids now more than ever. This spring has seen a renewed emphasis on police-community relations, as black, white and Hispanic residents have all demanded change from the department.
Local government is leading a charge to diversify city and police staff -- as well as to rally business and nonprofit leaders together to come up with solutions. Equitable distribution of city services is top of mind at city hall, using data from the city's 311 call center.
"We've just got to stop causing disparate impact -- government can't be part of that," City Manager Greg Sundstrom said.
The Division Avenue corridor has never fully recovered from the 1967 uprisings. In the neighborhood where the local violence caused people to sleep on their floors and keep the lights off, the population has dropped to what it was in 1960. Double-digit unemployment persists and household income continues to fall.
"The difference between 1967 and 2017: In 1967 our country was focused on basic rights for everyone. And we didn't have a lot of data about the disparities," Sundstrom said. "What's compelling today is not a group of people that are standing up and demanding equal rights. What's compelling is to see data that goes back as far as we have data to show that these problems are not getting better. That's the disturbing part."
The city is trying to bridge existing gaps and avoid conflicts. Much of that has been driven by forces outside of Grand Rapids: namely the police shooting of Michael Brown in Ferguson, Missouri, in August 2014.
In Ferguson's wake, city leaders met with the community through the Safe Alliances for Everyone -- a citizen committee that developed a long list of recommendations, which eventually evolved into a 12-point plan to improve community and police relations.
Where Grand Rapids stands in police-community relations efforts
Police Chief David Rahinsky joined the Grand Rapids force in 2014 and was quickly faced with the "watershed moment" Ferguson posed. Since then, the city has spent $1.8 million to equip every officer with a body camera. Officer-involved shootings are now investigated by outside agencies, and officers are now trained to recognize their own implicit bias.
The department believes those steps have helped Grand Rapids navigate what could have been an explosive situation May 3, when police shot and killed 18-year-old Malik Carey in the back seat of a parked car. Carey, a black man, had pulled a gun from his waistband and fired four shots at officers after the police had been talking to him.
Shots from the incident hit adjacent homes in the 1300 block of Dickinson Street SE -- though police believe they came from Carey's gun.
"That event could have resulted in a full-blown riot, based on the fact how hot it was, we had people who were upset," Sgt. Terry Dixon said. "It could have been a lot worse, and I don't think people really realize that unless you go back and you look at everything that took place, everything that's been put into place to mitigate that before it happened and we were able to withstand it."
Rahinsky has made efforts to be publicly accessible throughout challenging discussions in the community in the past three years -- giving out his cell phone number, meeting with concerned families and opening his office door to the public.
"When I came in I really thought that was my mandate post-Ferguson," Rahinsky said, explaining that he was looking for how he could add to what he saw as top-notch policing by the department.
"I thought that was what I brought: the ability to bridge either some gaps that may be real, or gaps that may be perceived in terms of what we do."
A renewed emphasis on police-community relations arose again this spring after police stopped five unarmed black youths at gunpoint March 24, as they were investigating a report of a gun. The male youths, ages 12 to 15, were innocent.
They weren't hurt, but were shaken. Many saw it as an overreach of police authority and called on the city commission for change.
"That was really tough for this community but we were able to weather it," Sundstrom said. "For us and the police department, we were able to learn from it."
Mayor Rosalynn Bliss has put racial equity out front as a priority. Her suggested reading book for the community during her first year in office was "A City Within a City: The Black Freedom Struggle in Grand Rapids, Michigan" by Todd E. Robinson.
"I believe that we have to know history - I do believe that's part of change," Bliss said. "There were very deep disparities then (in 1967) as well. It was a different time, with different social issues, but there are some parallels."
This February at her second state of the city speech, Bliss announced a racial equity initiative. She is putting together a group led by her and Grand Rapids Community College President Bill Pink. They will start meeting this October to come up with a plan for intentional changes to address economic disparities in African American and Hispanic communities in the city.
"I fundamentally believe that the city can only do so much," Bliss said. "We are one piece of this puzzle -- but I do believe that when the community comes together and says, 'This is not OK in our city,' we can do great things," Bliss said.
Internally, city hall is working with the Government Alliance on Race and Equity to see how systems and structures in local government are creating different outcomes for residents of different races and backgrounds.
For example, the city may be sending more work crews to fix streetlights and streets Grand Rapids 1967 riot: When anger, oppression erupted into 'chaos'in neighborhoods where people know how to file a complaint -- or have the free time to file a complaint, Bliss said. That may mean the city needs to move to a more proactive way of delivering services instead of just relying on complaints, Bliss said.
And as city hall and the police department continue to look for new hires to replace retiring workers, there's a great emphasis on finding diverse, local candidates. About 12 percent of the city's workers are minorities, Bliss said.
"I am not arguing that if our workforce was exactly as diverse as our community that somehow we don't have problems -- that's not the solution," Sundstrom said. "I am saying that if we have only - in the extreme - white males and we're trying to deliver services to females and family members and youth and seniors we can't possibly understand our customers as well as when we have a diverse workforce here that understands our customers from 10 different angles."
City leaders are making an effort to listen to residents. This June five forums asked residents to help the city guide its spending of $5 million in earmarks for police and community relations throughout the next five years - instead of using the money to hire 12 police officers as First Ward Commissioner Dave Shaffer proposed.
Though it may be too soon to see if the city's pains are making a difference in neighborhoods, officials feel their efforts are keeping violent conflicts at bay.
"I think any time people are held down or held back, are treated such that they have disparate outcomes, it may take a while -- but they will rise up," Sundstrom said, speaking to the uprising of the summer of 1967. "I feel pretty good and confident that even with the disparity levels that we have today - knowing that what we know about them and what we need to do to try and address them that no, that will not happen again in Grand Rapids."
Grand Rapids 1967 riot: When anger, oppression erupted into 'chaos'
'I wanted to fight back': Reflections on the 1967 Grand Rapids riot
Why Division Avenue hasn't recovered from the 1967 Grand Rapids riot |
Specific and Non-Specific Factors in the Treatment of Depression
A half century ago -- before mental health professionals began arguing over the relative benefits of biological and verbal therapies -- the battle focussed on which methods of psychotherapy worked best. Proponents of psychoanalytic schools, cognitive-behavioral therapy (CBT) and many other verbal treatments argued, as many still do, for the superiority of their approaches. Jerome D. Frank, a professor of psychiatry at Johns Hopkins, was a pioneer in applying objective research techniques to this area. When I became one of his research assistants, he was investigating shared characteristics that might account for the effectiveness of many of these competing therapies. His influential book Persuasion and Healing (1961) greatly broadened the theoretical foundation and operational framework for the approach known as Common Factors Theory.[1] In that book, he repeated the words of the Dodo Bird from Lewis Carroll’s Alice’s Adventures in Wonderland (1865) [2] “Everybody has won and all must have prizes” to embody the idea that all therapies have something to offer based on processes common to all (Table 1).[3, 4]
Table 1
Table 1
Opponents of the Dodo Bird Verdict have published numerous studies attempting to show that one type of psychotherapy is superior to others.[5,6,7,8] Common Factors advocates say these reports are usually biased by researcher allegiance to the therapy shown to be more effective.[9] Investigators without evident biases, however, have also reported differences in effectiveness between types of psychotherapy.[10] The argument still remains unresolved.[11,12] My own experience as a psychiatrist has suggested that both non-specific and specific factors play important roles in treating depression.
What about antidepressants? Does it matter which ones are prescribed or are they equally effective based on common biological and psychological factors? Until recently, the belief in non-specific factors has prevailed with generalizations like:
(1) “The effectiveness of antidepressant medications is generally comparable between classes and within classes of medications.”[13]
(2) “Antidepressant effectiveness is influenced by the therapeutic alliance” [14]
(3) “Antidepressant benefits are primarily psychological.”[15,16]
On the other hand, a growing number of psychiatrists and neuroscientists have been identifying specific factors to individualize the prescribing of antidepressants.[17] Government-funded projects like the National Institute of Mental Health’s EMBARC (Establishing Moderators and Biosignatures of Antidepressant Response in Clinical Care) study[18] are providing opportunities to validate these approaches by seeking specific therapeutic targets.[19] The field of pharmacogenetics is generating much new interest in this area.[20]
A Systematic Approach for Choosing Between Common and Specific Factors
Figure 1
Figure 1
Most likely the truth lies somewhere in between. Figure 1 presents a schematic diagram of the relationship between specific and non-specific indications for types of psychotherapy and antidepressants as suggested by clinical experience and available data. Abraham Maslow’s Hierarchy of Needs offers a classic reference for aligning treatment types with sources of dysfunction.[21] The physiological needs at the foundation of the pyramid are associated with biological depressions, the social needs at the middle with situational depressions and the psychological needs towards the top with more deeply rooted intrapsychic issues.
Both CBT and psychodynamic therapies could be applied over much of the upper four levels, although common factors might account for many of their benefits except at the extremes. For example, CBT might have specific benefits in connection with the lower part of the pyramid where comorbid anxiety, obsessive-compulsive and panic disorders have been shown to benefit from specialized behavioral treatment techniques.[22] Psychodynamic psychotherapy, on the other hand, has evidenced specific advantages in dealing with the more complex psychological issues in the upper region. Medications are often unnecessary at this level. The newer generation antidepressants like the selective serotonin reuptake inhibitors (SSRIs), norepinephrine-dopamine reuptake inhibitors (NDRIs) and serotonin norepinephrine reuptake inhibitors (SNRIs) might have usefulness everywhere except at the extremes because of increased tolerability and specific benefits such as activation and calming. Finally, the potency and lower cost of the older multi-mechanism tricyclic antidepressants (TCAs) and monoamine oxidase inhibitors (MAOIs) might confer advantages at the base of the pyramid, where other psychotropics such as atypical neuroleptics and mood stabilizers may be required as well. New discoveries in neuroscience may some day point the way to pharmacological agents with specific effects that enable treatments for mood disorders to be personalized in more optimal ways.
There are many reasons why the Dodo Bird Verdict may not be entirely true. As indicated above, the specific circumstances of every individual depressed patient require an inordinately complex series of responses, sometimes psychotherapeutic, sometimes psychopharmacological and often both. Within each of those realms the relationship between patient and professional is a dynamic field with each signaling the other in myriad ways that determine therapeutic actions. The need to respond with appropriate words, emotions and behaviors is a reality that professionals know can make the difference between success and failure in relieving depression and saving lives.
If all psychotherapies are sometimes effective in this endeavor, it may be because experienced therapists often use their "common factors" to rise above manualized protocols and favored theories at the critical moments separating good therapy from bad.[23] In the same way, knowledgable prescribers of antidepressants listen to their patients and select antidepressants with benefits and side-effect profiles most likely to meet patients’ needs. These careful processes of tracking human beings and applying pharmacological and psychotherapeutic skills in complex and dynamic ways have thus far been nearly impossible to test in any objective, reproducible way. To the extent that research studies do identify independent and dependent variables that capture these multi-faceted interactions, they are still often overly reductionistic. To measure the effect of any treatment or response has required the scaling of complex human events into formulas that computers can parse. Still, the effort to study and determine as objectively as possible what works best for depressed patients must continue with all possible energy and ingenuity.
The Dodo Bird reached its verdict in Alice in Wonderland because the "caucus-race" that it had initiated had no clear guidelines for determining success or failure. As long as the race away from depression is similarly uncertain, distinguishing the victors will be difficult. To those experiencing that race every day “up close and personal,” the winners are found to be those who are guided, encouraged and nourished across the finish line in every way humanly and chemically possible. The more tools we have to target and measure that process effectively, the more real winners there will be. Jerry Frank could have been discussing both pharmacological and verbal treatments when he spoke these words to the Association for the Advancement of Psychotherapy in New York on November 1, 1970:A major task...would be to learn to categorize patients in such a way as to be able to select the most appropriate method of therapy for them. One reason for the slowness of progress toward this goal may be that it is premature....Only as this knowledge is gained may we be able to sort out the specific contributions of different techniques from effects common to them all.[24]
1.Frank JD (1961) Persuasion and Healing. Baltimore, Johns Hopkins University Press.
2. Carroll, L (1865) Alice’s Adventures in Wonderland. D. Appleton & Co., New York.
3. Luborsky L, Rosenthal R, Diguer L, Andrusyna TP, Berman JS, Levitt JT, Seligman DA, Krause ED (2002) The dodo bird verdict is alive and well--mostly. Clinical Psychology-Science and Practice 9(1): 2-12.
4. Frank JD (1972) Common features of psychotherapy, Aust. N.Z. J. Psychiatry 6:34-40.
5. Butler AC, Beck AT (1995) Cognitive therapy for depression. 48(3): 3-5.
6. Leichsenring F, Leibing E (2003) The effectiveness of psychodynamic therapy and cognitive behavioral therapy in the treatment of personality disorders: a meta-analysis.Am J Psychiatry 160(7): 1223-32.
7. Tolin DF (2010) Is cognitive-behavioral therapy more effective than other therapies? A meta-analytic review. Clin Psychol Rev 30(6):710-20.
8. Gerber AJ, Kocsis JH, Milrod BL, Roose SP, Barber JP, Thase ME, Perkins P, Leon AC (2011) A quality-based review of randomized controlled trials of psychodynamic psychotherapy. Am J Psychiatry 168(1): 19-28.
9. Munder T, Brütsch O, Leonhart R, Gerger H, Barth J (2013) Researcher allegiance in psyhotherapy outcome research:An overview of reviews. Clinical Psychology Review 33(4): 501-11.
10. Watske B, Rüddel H, Jürgensen R, Koch U, Kriston L, Grothgar B, Schultz H (2012) Longer term outcome of cognitive-behavioural and psychodynamic psychotherapy in routine mental health care: randomised control trial. Behav Res Ther 50(9): 580-7.
11. Tsacher W, Junghan UM, Pfammatter M (2014) Towards a taxonomy of common factors in psychotherapy-results expert survey. Clin Psychol Psychother 21(1): 82-96.
12. Gee, A (2011) Couch wars: Does one form of psychotherapy work better than another? Slate.com http://www.slate.com/articles/health_and_science/medical_examiner/2011/06/couch_wars.html
13. American Psychiatric Association (2010) Practice Guideline for the Treatment of Patients With Major Depressive Disorder, Third Edition, APA Press, Washington, D.C.
14. Krupnick JL, Sotsky SM, Simmens S, Moyer J, Elkin I, Watkins J, Pilkonis PA (1996) The role of the therapeutic alliance in psychotherapy and pharmacotherapy outcome: findings in the National Institute of Mental Health Treatment of Depression Collaborative Research Program. J Consult Clin Psychol 64(3): 532-9.
15. Coyne JC (2012) Irving Kirsch: Deja vu all over again. Psychology Today, published March 8, 2012.
16. Kramer PD, (2011) In defense of antidepressants. New York Times, published July 9, 2011.
17. Metzner RJ (2013) The impact of neurochemical mediators on antidepressant effectiveness. ACS Chem Neurosci 18, 4(9): 1245-8.
18. Trivedi M (2012) Introduction to EMBARC Study. EMBARC website
19. Millan MJ (2006) Multi-target strategies for the improved treatment of depressive states: Conceptual foundations and neuronal substrates, drug discovery and therapeutic application. Pharmacology & Therapeutics 110(2): 135-370
20. Fabbri C Porcelli S Serretti A (2014) From pharmacogenetics to pharmacogenomics: the way toward the personalization of antidepressant treatment. Can J Psychiatry 59(2):62-75.
21. Maslow (1943) A theory of human motivation. Psychological Review 50, 370-396.
22. Redei EE Andrus BM Kwasny MJ Seok J Cai X Ho J Mohr DC (2014) Blood transcriptomic biomarkers in adult primary care patients with major depressive disorder undergoing cognitive behavioral therapy Translational Psychiatry 4, e442; doi:10.1038/tp.2014.66
23. Fiedler FE (1950) The concept of an ideal therapeutic relationship. Journal of Consulting Psychology 14(4): 239-245.
24. Frank JD (1972) Common features of psychotherapy. Aust. N.Z. J. Psychiatry 6:34-40. |
More Information About Autism Symptoms
Autism is not just another word. Sure, it is heard frequently, but Autism is a disorder. Most people only know Autism by word and maybe a few little facts. It is important for everyone to know more about it and learn more about the Autism symptoms. Knowing more about this disorder can help others understand someone with the condition or notice if someone has Autism, and help them get the right treatment.
It is not something that has a cure - not yet. There is not even a known cause to help prevent it. The truth is that even though so many children and adults suffer from it, information about the cause and cure is still lost to humanity.
Autism is considered to be genetic and can be noticed or often detected by those that are close to the child, including teachers, family and friends. However, it is best to notice the behavior patterns of the child and report them to the doctor correctly. Knowing the symptoms will help the doctor check if the child is autistic. Individuals with autism need supervision, along with their treatment and as a parent of an autistic child, you are feeling lost there are support groups in your local areas or online. Being a member of a support group can help deal with innumerable situations that you face, as do most of the other parents while dealing with their children.
Autism symptoms vary for each child and thus, can be difficult to identify the disorder. There are actually many symptoms, but not every child exhibits all of the symptoms, making it extremely difficult to pin-point and say that the child is autistic, if the disorder is mild. Often children need to have four symptoms and accordingly the doctor determines, if they are autistic or not.
Some Autism symptoms include:
*Prefer to be alone and often described as living in their own world
*Do not like touching or being touched by others
*Poor language skills
*Difficult expressing their thoughts into words
*Strange ways of playing compared to other children without autism
*Single focus for long periods of time
*Do not smile or lie being hugged
*Higher sensitivity to bright lights and sound
*Usually no response is visible when addressed
*Less pain sensitivity as compared to others
Treatments for Autism continue to be studied. The goal is to discover a treatment to cure or at least reduce the symptoms of Autism. Some of the studies undertaken have shown that hereditary or genetic factors may have played a role in the condition. Additionally, it has been seen that there are more boys, than girls affected by this neurological disorder.
Although there are numerous centers for autistic children all over the country, if you have a child that is autistic or know someone who has, it is best to seek assistance from a non-profit organization or a child development center. To diagnose the condition professionally requires a few specific tests including blood lead test, evaluation of hearing and a basic screen test for Autism which only a licensed and qualified physician can do. |
PERCHLORATE (C)1997 Alan M. Schwartz Chlorine forms five common acids with stable salts: chloride, hypochlorite, chlorite, chlorate, and perchlorate. Perchlorate is a terrifically powerful and oxygen-rich oxidizing agent. Tetrahedral symmetry, a tortured Cl(7+) ion cloistered at the center of a tetrahedron of oxygen ions, renders it kinetically inert. A fat wallop upside the head is required to pop the kinetic clasp and release its thermodynamic punch. Ammonium perchlorate is the favored oxidant for solid rocket fuel given this safety margin. Amateur A rockets to the Space Shuttle's badly engineered boosters depend upon thousands of tons of ammonium perchlorate annually. The stuff is otherwise mostly useless, and biologically inert short of inhibiting thyroid iodine uptake at grams/day ingestion. That something stinks of progress and works safely, cheaply, and effectively enrages Environmentalists like a red flag waived before a bull. Thus we have a December 1997 news:sci.chem post, " wrote: Perchlorate in the environment is quickly becoming one of the bigger issues in environmental circles. [snip]" (It raved and snorted for paragraph after paragraph of politically correct fire-eating blather, warned about a child-eating witch hidden in the forest, and finally solicited alms. Perhaps it was a Fundamentalist sermon with the sporadic noun changed for purposes of proximate relevance.) I hate to stand idly by while New Age Luddites discover the Earth's surface is 71% covered with saltwater, and CHILDREN CAN DROWN IN IT! Seawater contains 19.4 grams of chlorine alone in each liter, which could sustain a festival of Environmentalist hind gut fermentation all by its lonesome. Lest the great GreenSleaze engine score its cylinder walls searching for parts- per-trillion perchlorate in the environment and ghost stories to scare the panties off suburbia... Uncle Al offers a charitable donation. (No, not money - I'm not stupid. Propaganda!) First, perchlorate is unquestionably an essential nutrient for as yet undiscovered fragile and endangered species which hold the secrets of human immorality and cancer cure. The only hope for truly curing AIDS lies hidden in jungles, er, tropical rain forests where a last of its species plant (and extinction is FOREVER!) lies dying of perchlorate deficiency or poisoned by Space Shuttle perchlorate emissions, your choice. Second, perchlorate causes/co-causes/promotes/has unknown etiologies toward HUMAN CANCER! A billion dollar series of studies must be immediately launched to draw a perimeter about debilitating and disfiguring gruesome suffering statistically unavoidable downwind, upwind, hither, thither, and yon about Cape Canaveral. Protect our children! Third, perchlorate was created by evil Xeno after chaining Thetans to volcanoes. Perchlorate is the Devil incarnate! It roughens the Photon Belt. Kryon doesn't like it, Klotho is enraged, the Holy See is doing a parameterized DCF/ROI spreadsheet, Sterculious thinks it's all a bunch of crap. Fourth, immediate international jurisdiction over perchlorate production, storage, distribution, formulation, use, and combustion must be enacted and imposed (except for 225 lesser developed nations) or the EARTH WILL BE IRREVERSIBLY DESTROYED WITHIN THE NEXT 1000 YEARS! We must levy an immediate Perchlorate Tax on Everything! (Denmark has already pledged to reduce its annual perchlorate production to 1990 levels by 2001 as long as its perchlorate purchases from former Eastern Block nations remain quietly unaltered.) Fifth, irrefutable mathematical models can be obtained as required from the Institute for Institutional Analysis (hard science) or the Institute for Ethnoanthropoesy (kinder and gentler science). Can two independent think tanks be wrong? Of course not. Truth is truth, eternal and unalterable, subject to parameter tweaking as necessary to secure those really big cash grants. Contact Dr. Abfallig Matsch Schund. Sixth, SAVE OUR CHILDREN! Perchlorate is an irresistible lure tossed out by hebephiles and pederasts to ensnare our innocent youth that they might violate sacrosanct bodily orifices reserved for family values, Mom's enema nozzle, or a heterosexually celibate priests' benedictions. Special police powers must be granted and imposed to unleash jackbooted State compassion lest our babies be transformed into moral putrescences oozing at Hell's doorstep. Seventh, Ozone Hole and Greenhouse Effect! Perchlorate contains chlorine which catalytically devastates ozone, and only $billion satellite telemetries can detect the change! When renormalized satellite data is adequately horrific we must launch more and more satellites, filling the skies with heat and perchlorate, until the Earth roasts in its own juices like Cherries Jubilee! Who knows what ordeals ultramicroscopic traces of perchlorate coerce upon hemorrhoids, xenocryptophytoestrogens, Furbish louseworts, sandstone, bulemia, and the price of winter wheat in Chicago Mercantile Exchange trading pits? Environmentalists know! It is all vile - too terrible to imagine until they suffer a plate of bad tofu and wake up hallucinating frightful delusions extruding from their unwashed bellybuttons. |
A Beginner’s Tutorial on Basics of Delegates, Anonymous Functions and Lambda Expressions in C#
This article talks about the delegates and how to write delegate handlers using functions, anonymous functions and Lambda expressions. This article is written from a beginner’s perspective and contain very introductory material on the related topics.
There are many a times when we need one part/object of our application to do something when some other part/object has been changed. One way to achieve this is by having an object poll continuously to another object and act whenever the other objects state is changed. Now this approach is not elegant it involves too much of CPU usage. Also, there will be some time interval between 2 consecutive poll request and if the other objects state was changed during this period then we will get to know it later i.e. delayed information.
Now the way this problem is solved is called the Observer Pattern. Here the object who wants to listen to the state change can subscribe to the object whose state will be changed. If we need to put this mechanism in a C# application then we need to take care of both the aspects of this pattern. One is sending the state change from an object to the listener(all the listeners) and receiving the state change of the object.
Delegatesis the C# way of implementing the first part i.e. keeping a track of all the listeners and sending them the notification when any state is changed. Anonymousmethods and Lambda expressions come on the other side i.e. handling the response coming from a delegate
Using the code
Let us try to implement a simple application with a class called BatteryLevelto understand these topics in action. This class will keep track of the current battery level of a device. Other classes can subscribe to a delegateprovided by this class to listen to battery level change. Let us look at this class without any delegates introduced.
To implement delegates and its handlers there are mainly 4 steps involved:
1. Declaring the delegate
2. Creating the delegate
3. Hooking the delegate with handler functions
4. Invoking the delegates
Now before adding a delegate to this class lets get some basics clear. Delegates are types which we can define. The definition will declare the delegate and specify the method signature that this delegate can hold and call. Typical delegate declaration will look like:
[<em>Access Modifier</em>] delegate [<em>Return type</em>] [DELEGATE_NAME]([<em>Function arguments</em>]);
So to declare a delegate for our class, lets say we want the handler functions to return void and accept an integer value indicating the new battery level. The declaration will look like:
Delegates can hold reference to a number of methods and when a delegate is invoked, it will call all the methods one by one sequentially. C++ programmers can think of delegates as a list of type safe function pointers.
Now we have seen the first part of our 4 step process. Now if we move on to the second part i.e Creating the delegate, we simply need create a type of the delegate and assign some handler functions to it. if no handlers are associated with the delegate object it will be null. So lets create a delegate type first.
Now we have seen the second part of our 4 step process. Now if we move on to the fourth part i.e. invoking the delegate. The the typical way to call all the functions associated with this delegate would be to call the delegate like a function.
So now the BatteryLevelclass definition with the delegate will look like:
Now we have seen the invoker objects part of implementing delegates i.e. declaring, creating and invoking a delegate. Now let us see how the handing part can be written i.e. hooking the functions to the delegates and having the handler function’s body.
To hook a function to the delegate we simply need to create the delegate type with the function name passed in the constructor. We can then assign this delegate type to the delegate exposed by the class.
The above code simply creates a function and then attach that function to the delegate exposed by the class as the handler function. the function signature matches the delegate signature otherwise the code would not compile.
We are also setting the value of battery level to test the application. Whenever we call set our handler function will be invoked and it will print the message on the console.
Note: We have used += to assign the delegate because we need our function to add to the list of functions already added to this delegate. If we simply use = sign, it will wipe off the list of existing functions and have this function as the only function associated with the delegate.
So we have seen the 3rd part of our 4 step process i.e. hooking up the handler functions with the delegates. When we run the application we can see the handler function getting called via the delegate.
Anonymous functions
Anonymous functions are the functions without any function name. C# gives us the possibility of creating functions without name. But how will this function be called if it has no name. In fact there is no way to call an anonymous function via code because the name of the function is the handle to call this function.
But we have just seen that the delegates keep handles/references of all the handler functions with them. delegates don’t need the name of the function to invoke them. so the anonymous functions are useful with the delegates only.
What anonymous function does is that instead of having separate code to hook the handler to delegate and body of the handler function we can simply have the body written in place where we are hooking the function to the delegate. So if I need to achieve the above functionality using anonymous function, I simply need to write it as:
And it will produce the same result as the earlier version but it doesn’t need the programmer to write a separate function. this is very useful when the handler function has little code and using this approach gives a cleaner code compared to the earlier version.
Lambda Expressions
Newer version of C# has Lambda expression which has made the anonymous functions more or less obsolete. For the scope of this article lets understand lambda expression is one more way of creating local anonymous functions that can be used with delegates.
Note: Lambda expression has other merits over anonymous function like the can directly be assigned to expression trees but we will keep things simple in this article and will not talk about these.
A Lambda expression can be thought of as an alternative to the anonymous methods with the following syntax:
So if were to write the similar code using lambda expression we can do that in the following manner:
Note: in this above code instead of having the implicit type parameter in lambda expression, we could have specified the type in the expression too.
The result of the above code is same as the earlier versions but the code is much cleaner compared to the earlier versions(one with the handler functions and anonymous methods).
Point of Interest
In this small article we tried to look into what delegates are and how we can implement custom delegates and their handlers. Delegates have been around from quite some time and this article seems quite late or out of time. I have written this article because someone in the Codeproject Q&A section seems quite confused about the topic. This article has been written from a beginner’s perspective. I hope this has been somewhat informative.
Download sample code for this article: DelgateAnonymousLambdaSample |
Robert Dudley: Life Story
Chapter 1: Early Years
Robert Dudley was the fifth son of Sir John Dudley and his wife Jane Guilford. He was born during the early 1530s, a period where John Dudley was beginning his climb to royal favour. Robert was one of a numerous family, which remained emotionally close throughout their lives, and who were all enthusiastic religious evangelicals. Robert was brought up, so far as was consistent the law, as an early Protestant.
Robert’s birthplace is unknown but was probably in London as the Dudleys were attached to the court and Robert became one of the young men and boys who surrounded Prince Edward (born 1537), as was Sir Henry Sidney, later the husband of Robert’s sister, Mary. As a member of Edward’s household, Robert would have become acquainted with the prince’s sister, the Lady Elizabeth, who was of a similar age.
Prince Edward, like his elder sisters, was highly educated, and Robert shared some of his tutors, although, as he was four or five years the elder, not the actual lessons. Roger Ascham, later tutor to Elizabeth, referred to his skill in reading and writing in Latin. Dr Thomas Wilson, Master of the Court of Requests, said of Robert that he had a ‘careful mind even in reading not only of the Latin but also of the Italian, good and sound writers to know, and understand the best used government and the chief laws that have been made in all ages.’ Wilson further noted that Robert had a mind ‘thus godly inclined to know’ and to put his knowledge into practice.
In addition to being a competent linguist, Robert was also extremely interested in mathematics and scientific endeavour, as is borne out by his later career, and he also studied the usual military skills that nobles were expected to know.
During the latter part of Henry VIII’s reign Dudley senior, who was by now Viscount Lisle, rose in importance. He became a Privy Councillor and was a successful military commander, as well as being Lord Admiral. With the death of Henry VIII in 1547, Lisle, who was one of the 16 Privy Councillors, appointed under Henry VIII’s will, supported his friend Edward Seymour, the young king Edward VI’s uncle, in his bid to take control of the council as Lord Protector. Lisle was rewarded for his loyalty with the grant of the earldom of Warwick (once held by his Beauchamp ancestors).
As Edward’s reign progressed, the Dudley children were increasingly prominent members of the court. In 1549, Robert, by now around 17, saw his first taste of military life. In that year, there were two significant rebellions against the government of Protector Somerset. The second of these, commonly known as Kett’s Rebellion, took place in East Anglia. Warwick was instrumental in crushing the rebellion and Robert himself captained a company of foot soldiers amongst the armed force which was sent against them, and which defeated the rebels at the Battle of Mousehold Heath.
After the battle, Warwick and his sons went to Stanfield Hall, near Wymondham. Stanfield was part of the dower lands of Elizabeth Robsart, formerly Elizabeth Appleyard, whose sister-in-law, Alice Appleyard, was Kett’s wife. Elizabeth’s second husband, Sir John Robsart, was a Norfolk landowner. By her first marriage, Elizabeth had four children, John, Philip, Frances and Anne Appleyard, and by her second, one daughter, Amy, who was her father’s heir. The Robsarts, like the Dudley, were committed Protestants, and the little evidence available (her handwriting) suggests that Amy had been well-educated.
Robert’s father continued his rise to power, and was created Duke of Northumberland, becoming Lord President of the Council and King Edward’s chief adviser. Robert and his brothers, John, Henry Ambrose and Guilford, who now each had the courtesy title of ‘Lord,’ became permanent fixtures at the court. |
Children // Child health
How to treat pneumonia in children
Inflammation of the lungs or pneumonia - a disease that is contagious nature of the inflammatory process that develops in the lungs, accompanied by the violation of their basic functions.Ways of infection in the body are basically two.First - this is directly through the respiratory tract (air - drop way).And second, when the source of the infection is inside of the body, resulting in lung through the bloodstream.In this case we speak of secondary pneumonia or pneumonia is a complication of the underlying disease.How does the infection occurred, it is a very important factor in the treatment of pneumonia.Bacteria and viruses enter our airways almost constantly, why in some cases there is a lung disease, but not in others.It is directly linked to a number of reasons: first of all immunity, with the weakening of which disease occurs.In children, the immune system is not completely formed, which determines a high frequency of disease in childhood.What to do if a child is ill with pneumonia?
to suspected pneumonia in the child, there are several specific features: extending the long-term disease of the upper respiratory tract (rhinitis, angina), shortness of breath, especially when breath, coughing, high fever or a relative increase against the backdrop of breath.On the basis of these symptoms do not put a definitive diagnosis, but it is necessary to consult a doctor.
In no case do not self!The doctor will determine whether you need hospitalization or can be treated at home.Treatment of pneumonia begin to establish and correct the problem that caused the pneumonia.If this virus agent is administered antivirals if a bacterium is antibacterial, and not necessarily in the injections.Currently there are many drugs in the form of different syrups that facilitates receiving a child.Determination of the dosage of antibacterial drugs should be administered by the attending physician according to the age, weight and the severity of the underlying disease.Typically, pneumonia observed rise in body temperature.What is a protective reaction to inflammation, so take antipyretics only necessary when a significant increase in temperature.
Also, treatment is aimed at cleansing the respiratory tract of phlegm, filling the baby's lungs.When pneumonia becomes thick mucus, making it difficult released with a cough.Often engaged in self-treatment of pneumonia, parents use antitussives, trying to save the child cough.However, the types of antitussives quite a lot, there are some whose mechanism of action is aimed at suppressing the cough center in the brain that does not contribute to improvement, but rather leads to further stagnation of mucus in the lungs.For its liquefaction and speedy allocation of special drugs prescribed mucolytics and expectorants, and they can be a vegetable (mukaltin) and chemical origin (ambroxol, bronhalitin).It is necessary to drink plenty of liquids.Marvelous sredstvo- tea with honey from the hips, which is not only a source of an increasing number of vitamins, but a diuretic, which will contribute to a more rapid release of the child's body from toxins.A very important factor in sputum is the temperature and humidity in the room in which the child.The room temperature must be from 19 to 21 degrees and the humidity is not less than 50%.It is necessary to conduct daily wet cleanings facilities and ventilation.When cleaning is not advisable to use disinfectants, as they tend to lead to irritation of the bronchial mucosa.When the above conditions the child has a cough quickly become "wet" - productive that will help to cleanse the lungs of mucus.In the presence of a pronounced bronchospasm permissible use of drugs expands bronchial tubes (bronchodilators).
Power of the child shall be a full and balanced in its composition containing a large amount of vitamins and minerals.In the treatment of pneumonia it is permissible to use homeopathic remedies, but only as a supplementary, not the main type of treatment.These drugs can also be used to improve sputum, lymphatic drainage, stimulating the immune system.
While improving the state of the child it is advisable to appoint a physiotherapy and rehabilitation period in gymnastics, which will contribute to more rapid recovery of lung function.We hope that this disease will not threaten your child, but now you know exactly how to treat pneumonia in children. |
Where results make sense
Topic: Allied invasion of Italy
Related Topics
In the News (Mon 12 Nov 18)
Allied invasion of Sicily - Wikipedia, the free encyclopedia
The invasion of Sicily involved primarily the following nations: The British Commonwealth and United States as the Allied landing force and Italy and Germany as the Axis forces defending the island.
It could also act as a precursor to the invasion of Italy, although this was not agreed by the Allies at the time of the invasion, the Americans in particular resisting commitment to any operation which might conceivably delay the invasion of France.
The Allied command was forced to reconsider their use of Airborne forces after the many misdrops and the deadly friendly fire incident.
en.wikipedia.org /wiki/Operation_Husky (1432 words)
Allied invasion of Italy - Wikipedia, the free encyclopedia
Popular support in Italy for the war was declining, and he believed that an invasion would remove Italy from the war, thus removing the influence of the Regia Marina in the Mediterranean Sea and opening it to Allied traffic.
Joint Allied Forces Headquarters AFHQ were operationally responsible for all allied land forces in the Mediterranean theatre and it was they who planned and commanded the invasion of Sicily and the Italian mainland.
The invasion of Sicily in July 1943 (Operation Husky) was highly successful, although many of the Axis forces there were allowed to avoid capture and escape to the mainland.
en.wikipedia.org /wiki/Allied_invasion_of_Italy (1274 words)
Operation Avalanche (World War II) - Wikipedia, the free encyclopedia
Operation Avalanche was the codename for the landings near the port of Salerno, executed on 9 September 1943, part of the Allied invasion of Italy.
en.wikipedia.org /wiki/Operation_Avalanche_%28World_War_II%29 (483 words)
10. The Invasion of Italy, 1943-1944. 2001. The Encyclopedia of World History (Site not responding. Last check: 2007-11-07)
Allied bombing planes wrecked Naples, and, after repeated warnings, attacked railway terminals and military objectives in Rome (July 20).
Half of Sicily was occupied, the Allied front stretching from Catania to Mazzara.
The campaign had cost the Allied armies an estimated 22,000 casualties, the Axis forces 167,000.
www.aol.bartleby.com /67/2617.html (316 words)
Encyclopedia: Allied invasion of Italy (Site not responding. Last check: 2007-11-07)
Allied Forces Headquarters was the headquarters that controlled all Allied forces in the Mediterranean theatre from late 1943 to the end of the war.
At the end of 1943, following the Allied invasion of Italy Allied forces were bogged down at the Winter Line, a defensive line across Italy south of the psychologically important objective of Rome.
Allied intelligence thought that five or six German divisions were in the area.
www.nationmaster.com /encyclopedia/Allied-invasion-of-Italy (381 words)
Allied victory in Sicily had resulted in the overthrow of Mussolini's government, and the capitulation of Italy was only a matter of negotiation and time.
The Italian surrender resulted in German evacuation of the islands of Sardinia and Corsica, gave the Allies the Italian Navy, and, in effect, made Italy a co-belligerent with the Allies.
The Allied force, although reduced in strength by the necessity to relinquish some divisions for use in France, initiated a drive in September that broke the Gothic Line after a three-month campaign.
www.worldwar2history.info /Italy (939 words)
Wide Angle. Printable Pages | PBS
The next decades of politics in Italy were characterized by frequent changes in premiers and administrations, factional struggles between the country's political parties, and the prominence of the Christian Democrat party.
Though Italy's rise to become a strong manufacturing nation brought a measure of prosperity to the nation during the 1950s, the 1960s and 1970s witnessed an era of social upheaval in the country.
Though Italy's political parties were becoming polarized, the mid-1960s saw a coalition form under the Christian Democrat Aldo Moro in order to address the nation's economic downturn.
www.pbs.org /wnet/wideangle/printable/berlusconi_timeline_print.html (1114 words)
The Invasion of Italy September 9, 1943 - May 8, 1945
Italy would represent frustration and death for thousands of Allied soldiers in a bitter stagnated fight.
Allied bombers, in a controversial move, reduced the ancient landmark to rubble in an attempt to wipe out the supposed German defenders, who actually had guaranteed the abbey’s safety.
The thousands of soldiers who never returned form the mud of Italy’s battlefields are as much a testament to Allied ignorance as to their own courage and bravery.
www.worldwar2database.com /html/italy43_45.htm (905 words)
S-mine - Wikipedia, the free encyclopedia
The first Allied forces to encounter the S-mine were French soldiers who were attempting minor probes into the coal-rich German Saar region from September 7th through the 11th, 1939, during what is known as the Phony War.
Nazi Germany used the S-mine heavily during the defense of its occupied territories and the German homeland during the Allied invasions of Europe and North Africa.
S-mines were deployed on the beaches of Normandy in preparation for the D-Day invasion, as part of a general program of heavy mining and fortification.
en.wikipedia.org /wiki/S-mine (2085 words)
WWII Campaigns: Sicily
The two Allied leaders also were anxious to exploit the momentum of their impending victory in North Africa, and the mass of men and materiel that would be available in the Mediterranean at the conclusion of the North African campaign made additional operations in that theater attractive.
The failure of Allied air and naval forces to interdict the Strait of Messina was due in large part to the fact that neither Eisenhower nor his principal air, land, and sea commanders had formulated a coordinated plan to prevent the withdrawal of Axis forces from the island.
www.army.mil /cmh-pg/Brochures/72-16/72-16.htm (7851 words)
USAF Museum - WWII Combat Europe (Site not responding. Last check: 2007-11-07)
On June 11th when Allied forces began landing on Pantelleria, the military governor surrendered the island and the only Allied casualty among the assaulting troops was a British infantryman who was nipped by a local donkey.
By late afternoon, the Allies had flown some 450 bombing sorties plus four "nickeling" missions in which surrender leaflets were showered on the town and airfield.
When the invasion of Sicily began on July 10th, Allied aircraft based at Pantelleria and Lampedusa provided support to the amphibious forces and increased aerial protection to the Allied sea route from Gibraltar through the Mediterranean.
www.wpafb.af.mil /museum/history/wwii/ce7.htm (326 words)
Allied resolve to attack the Italian mainland was strengthened by the 25 July 1943 announcement that King Victor Emmanuel III had removed Benito Mussolini from power and appointed Marshal Pietro Badoglio to replace him.
Allied heavy bombers, diverted from attacks on strategic targets in Germany, interdicted German units and supplies flowing toward the beachhead and struck German units in assembly areas and attack positions.
The Allies had bases in southern Italy from which to launch strategic air attacks on the Balkans and Germany, the Mediterranean was secure, and German divisions were tied down in Italy opposing the Allied 15th Army Group and holding those areas in northern Italy, France, and the Balkans previously garrisoned by their former Italian allies.
www.army.mil /cmh-pg/brochures/naples/72-17.htm (8923 words)
Ops - Middle East_P
- The allied invasion of Southern France, 15 August 1944.
As a result of overwhelming German superiority and the failure of the Greeks to allocate suitable airfields to the RAF during the severe winter, British forces were forced to withdraw to Crete by the end of April 1941.
- The Anglo-American Invasion of Tunisia and Morroco, November 1942.
www.rafweb.org /Ops_ME.htm (425 words)
SparkNotes: World War II (1939–1945): North Africa and the Invasion of Italy
The war in North Africa was essentially an adventure initiated by Italy in an attempt to seize former colonial territories of Britain and France.
www.sparknotes.com /history/european/ww2/section11.rhtml (1335 words)
Salerno: Preparations for Invasion
If we could knock Italy out of the war, we would force the Germans to retreat north of the Alps or to use in Italy armies which might be fighting on the Russian front.
Furthermore, the invasion forces would have to establish a beachhead on the narrow Salerno plain, which is commanded by lofty mountains.
Highway 18, the coastal road, and Highway 18, which was to be the chief German route of approach from the south and cast, meet at Battipaglia on the mountain slopes north of the Sele.
www.army.mil /cmh-pg/books/wwii/salerno/sal-prep.htm (3847 words)
Italian Campaign (Site not responding. Last check: 2007-11-07)
It was clear that the Italian people were becoming less enthusiastic about their participation in the war, and it was hoped that an invasion would knock them out of the war, providing at least a major propaganda blow.
The elimination of Italy as an enemy would also enable the Royal Navy to completely dominate the Mediterranean Sea, massively improving communications with Egypt, the Far East, the Middle East and India.
The American staff however believed that a full scale invasion of France as soon as possible was necessary to end the war in Europe, and that no operations should be undertaken which might delay that.
www.sciencedaily.com /encyclopedia/italian_campaign (290 words)
What Did You Do in the War, Grandma?: Timeline
www.stg.brown.edu /projects/WWII_Women/NewTimeline.html (3310 words)
Western Front (Site not responding. Last check: 2007-11-07)
The invasion fleet, which had been assembled from all the north European ports and rivers but had suffered heavily from RAF attacks, was dispersed at the end of September and never reassembled.
The Allies, whose intelligence had brought them word of Hitler's first plan, did not press their advance from the south with all dispatch, and therefore allowed Kesselring the time he needed for his fortification of a 'Winter Line' spanning the peninsula along the Sangro and Garigliano rivers.
This was the codename for the Allied invasion of southern France, 15 August 1944.
www3.sympatico.ca /ergrenier/West.html (10287 words)
AFS in WW2. Italy. Winter '44-45. The Gothic Line. (Site not responding. Last check: 2007-11-07)
It was the Allied intention to hasten the enemy's withdrawal as much as possible and to attack the Gothic Line before he had opportunity to complete its defences.
In grand dimension therefore the Allied attack would be a straight left plus a left hook, with a ponderous right swing reaching for the left hook's mark.
In the invasion, and on the Russian front, we had the great advantage of air and armor superiority where here in the mountains this is of too little advantage.
www.ku.edu /carrie/specoll/AFS/4/e/4e4b2.html (3463 words)
WW2 German Code Names
Plan for disarming of Italians on Allied invasion of Italy, September 1943.
Alert for the Allied invasion of the Continent from either the English Channel or the Mediterranean coast
Proposed invasion of Iceland in conjunction with SEELOWE.
www.geocities.com /CapitolHill/Congress/2106/secret/codeger.htm (572 words)
CBC News Indepth: Ortona
On Sept. 3, 1943, the Allied landing force left the Sicilian ports of Catania, Augusta and Syracuse for landing beaches between Taormina and Messina.
At this point, the Allied advance ran into a heavily fortified and defended German line running across Italy from Ortona in the east to Cassino in the west, blocking all roads to Rome.
The next Allied objective was the strategic industrial heartland of northern Italy and the German's last fortified defencs there, the Gothic Line.
www.cbc.ca /news/background/ortona (1643 words)
Bookreporter.com - MIDNIGHT IN SICILY by Peter Robb
All are components of the rich and storied culture of Italy and all come together in Peter Robb's marvelously imaginative MIDNIGHT IN SICILY.
Using the criminal trial of some of Sicily's most notorious Mafiosi as his centerpoint, Robb interweaves the various strands of his subjects into a seamless tapestry that leaves the reader with a voyeuristic fascination, combining fear of what one may find with a paralyzing inability to look away.
After the Allied invasion of Italy, however, two Italian-born mobsters helped the Mafia regain power.
www.bookreporter.com /reviews/0375704582.asp (668 words)
Harold L Rinard
The next Ranger action was the allied invasion of Italy at Salerno.
While the war in Italy ground to a muddy stalemate in the hills and valleys of Italy, the Rangers were used as ordinary frontline troops and did not require the Ranger's unique skills.
To help resolve the stalemate in Italy, the invasion of Anzio, Italy, just south of Rome on the western coast, was planned.
www.flashman.com /HaroldRinard.html (1000 words)
SPWW2 random battles
Britain, Canada or the U.S. vs Germany or Italy.
ANZAC, Britain, France or the U.S. vs Germany or Italy.
Japan vs the U.S. or U.S.M.C. The Japanese invasion of the Dutch East Indies
www.geocities.com /favouritegames/spww2_battles.html (145 words)
- Battles in Italy Review - Page 1 - The Gamers Temple
Battles in Italy uses the Decisive Battles of World War II engine to provide war gamers with a chance to recreate the Allied invasion of Italy.
The invasions of Anzio, Salerno, and Sicily are all included, so you can try to recreate the Allied successes or change history by pushing the invasion back into the sea as the Axis.
Battles in Italy is a traditional war game in that it sticks closely to the turn-based chit and hexagon style of play established years ago by board-based war games.
www.gamerstemple.com /games8/001028/001028r01.asp (555 words)
channel4.com THE BATTLE FOR ITALY
Some of the Allied commanders disagreed about the whole point of the campaign in Italy, were confused and divided and, at times, badly mishandled the battle.
At the core of the fight was a bitter five-day siege of an ancient castle on the slopes of the mountain.
Well-written article by Dr Robert M Browning Jr about the Allied invasion of Italy at Salerno in September 1943, primarily from the view of the US Coast Guard contingent.
www.channel4.com /history/microsites/B/battle_for_italy (750 words)
Invasion of Italy (Site not responding. Last check: 2007-11-07)
Planning for the invasion, begun on 27 July, committed the American 5th Army under General Mark Clark, and the British 8th under Montgomery to the enterprise.
The latter was to cross the Straits of Messina and advance through Clabria o join hands witht he 5th (which also included the British 10th Corps) after it had landed at Salerno.
It was saved chiefly by the fire support of the naval bombardment force and the Allied air forces, which broke up the final German attacks on 14 September.
expage.com /page/west17 (386 words)
Try your search on: Qwika (all wikis)
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms. |
Devices & Equipments
Even Vaping Can Trigger Deadly Lung Disease, Study Claims
E-cigarette, Vaping Can Trigger Deadly Lung Disease
Electronic cigarettes have been widely marketed as the healthier and safer alternative to regular cigarettes. But a recent study has proven that, as opposed to the previous
Swallowable Gastric Balloon Can Help Lose Weight Without Surgery
swallowable gastric balloon
Scientists in Rome have suggested a simple yet effective way to curb obesity without a surgery- swallow a balloon with a glass of water! Wait, these are
“i.Con” – A Smart Condom That Measures Performance, Detects STIs
“i.Con" - A Smart Condom
A company in the United Kingdom claims to have created the first of its kind condom which has the potential to measure sex performance! What’s more, this
E-cigarettes Help Smokers Quit Their Addiction Successfully- Study
E-cigarette, Vaping Can Trigger Deadly Lung Disease
A number of studies have sought to assess the impact of e-cigarettes and their liquid ingredients on public health, with conflicting results. Earlier this year in February
This AI Software Can Predict Breast Cancer Risk Quickly and Accurately
In order to diagnose breast cancer doctors use a range of tests including mammograms, ultrasound scan, fine needle aspiration and core biopsy of the breast. Now scientists
New Smartphone App Can Detect Dangerous Heart Condition
Too Much Intake of Sweets Is Bad For Your Heart
There’s no denying that smartphone technology is getting smarter with each passing day. Several mobile app development companies are developing high performance, feature-packed software applications to run
This Flexible Wearable Electronic Stick-on Tattoo Monitors Your Booze Level
Engineers in the United States have invented a stick on tattoo that they claim will be able to measure a person’s blood alcohol concentration, accurately and quickly.
Electric Brain Stimulation During Sleep Could Boost Memory – Study
Zapping the brain with weak electric currents while asleep could enhance memory, finds a new study by the US researchers. According to the research team of scientists,
Electronic Cigarettes Contain Carcinogenic Chemicals, Study Finds
Electronic cigarettes, or e-cigarettes, are a popular high-tech alternative to smoking tobacco. Multiple research have assessed the impact of vaping on public health, with conflicting results. While
Vaginal Ring Provides Significant Protection Against HIV- Study Confirms
A vaginal ring that delivers an antiretroviral drug is highly effective at protecting women from HIV, albeit used properly and consistently for a month at a time, |
3 years
Imagine Eating to Curb Craving
Page 1 of 1
Research has found that imagining yourself eat a specific food item could actually decrease your craving for that food. You must visualise yourself smelling, tasting, chewing and swallowing the food, however, the whole hog. Carey Morewedge, PhD, of Carnegie Mellon University in Pittsburgh, and her colleagues report in Science that patients who imagined themselves eating M&Ms ate a fewer number than those who didn’t.
This is counterintuitive. Also, psychological research suggests that thinking about something actually increases the craving for that object. The researchers pushed this idea further, asking what would happen if people followed through with imagining they were actually ingesting the food. They ran five experiments to confirm their findings. In the first, 51 subjects were asked to imagine one of three scenarios: inserting three quarters into a laundry machine and eating 30 M&Ms, flipping the situation to insert 30 quarters and eat only three M&Ms, or just putting 33 quarters in the machine. They were then asked to eat from a bowl of M&Ms, told that they were preparing for a taste test. Those who imagined eating 30 M&Ms ate significantly less than those who pretended to eat just three of the candies or put quarters in the laundry machine. |
Learn about the rich heritage of parks and gardens in Topics.
Image location: Powis Castle
Image location: Cirencester Abbey
The district was originally held by the Norman families of de Gournay, de Tilly and de Harptree. Gournay Court stands on the site of an Elizabethan mansion. Sir Thomas de Gournay murdered Edward II, partially suffocating him then thrusting a red-hot poker into his bowels, so that there was no means of identifying the cause of death. He was forced to flee the country and was arrested in Spain in 1332. He escaped to Naples, but was re-arrested and died on the way home.
One hundred years later the de Gournay estate passed into the Duchy of Cornwall, and was not in private hands again until 1928. The present house was built in the time of James I, and nothing remains of the original. The land surrounding the house was farmland until relatively recently.
The house was renovated in the early 1900s, and was used as a hospital for soldiers during World War 1. Queen Mary instigated alterations for her youngest child Prince John, but the Prince died in 1919 at the age of 14.
Site timeline
1914 to 1918: The house was used as a hospital for soldiers during World War 1.
The courtyard has slab paths and steps. The planting is mostly new and includes holly and camellia.
well head
There is thought to be a well in the courtyard.
Feature created: 1930 to 1939
This feature is the walled garden, which was laid out in the 1930s. It has two stone pineapples on the gates which were taken from Coley Court. The main part of the garden is given over to vegetables, but an Elizabethan style box layout was designed in the 1930s and still remains.
pineapple finial
There are two stone pineapples on the gates of the walled garden, which were taken from Coley Court.
garden building
This feature is the tithe barn. It is an interesting grade II listed building built in a curve. It is surrounded by box hedges, holly and grass.
Designation status: The National Heritage List for England: Listed Building Designation Grade II
specimen tree
Mature mulberry. |
Combining of Indian perennial rivers
What is the perennial river ? Perennial river is the river which has the water throughout the year, is called the perennial river. The perennial rivers plays an important role in India. Rivers provide irrigation, transportation, electricity and the livelihoods for a large number of people all over the country .
There are 4 different plans to combine the perennial rivers in India. They are :-
1. The Indo-Gangetic plans
2. Ganges River system
3. Indus River system
4. The Peninsular River system
The Indo-Gangetic plan is also known as Ganga-Satluj system. There are 16 major rivers in this system. The major Himalayan rivers are the Indus, Ganges and Brahmaputra. These rivers are connected by tributaries.
The Ganges river system in this system are, Yamuna, Chambal, Betwa, Ganga, Gomti and Brahmaputra. And Hubli also getting joined in the Himalayas rivers. This provides water for irrigation in West Bengal area.
The Indus river system originates in the northern slopes of the kailash range near Lake Mansarovar in Tibet. 20% of this river water is only used by India. Punjan is a land of five rivers. Yes, the rivers Indus, Chenab, Jhelum, Ravi, Sutlej, Beas lies in Punjab only.
The good and important river system is the peninsular river system. It is formed by the Western Ghats, which run from north to south close to the western coast. The narmada and tapti are the only long rivers, which flow west and east . The rivers Mahanadi, Godavari, the Krishna and the kaveri flow from east to west.
During summer, the rivers may get dried , for that, the connection of perennial rivers is essential. Because, that is the only reliable source of all year water. Nowadays we can see lot of water scarcity issues. This is because there is not proper source of storage of water rivers in India. Water will flow in floods during some seasons, and some seasons we are facing scarcity. The government should take steps for that. The connection of perennial rivers is one among that.
If the other storage facilities is not working, this will work out throughout the year. Rivers has the impact in the Indian economy, too. Yes, the river systems provide irrigation, potable water, cheap transportation, electricity as well as the livelihoods for a large number of people all over the country. The rivers also have an important role in the Hindu mythology and are considered by all Hindus as holy by all the Hindus.
Apart from the four systems, there are lot of river systems :-
1. The Brahmaputra River system
2. The Narmada River system
3. The Tapi River system
4. The Godavari River system
5. The Krisha River system
6. The Kaveri River system
7. The Mahanadi River system
All the above systems, used in India, to connect the perennial rivers . All this keep India, still survives to make the people alive and comfort.
Popular posts from this blog
SSB Preparation Material Free Download pdf
SSB Medical Test
Body language for Interview |
Posted on
Dust mites are a common cause of asthma and allergies. The Austin Air filter does an excellent job at filtering dust and mites. The particles are captured by the true medical grade HEPA filter, the gold standard in particulate filtration.
Dust mites feed on particles shed from skin so they are often found in mattresses and bedding. This can be controlled by washing frequently in very hot water, drying at high temperatures and using allergy mattress covers. Allergy covers for pillows are especially important. .
In a survey of U.S. homes, approximately one-quarter had levels of dust mite allergens present in a bed at a level high enough to trigger asthma symptoms.
( Arbes SJ, et al. House dust mite allergen in U.S. beds: Results from the first national survey of lead and allergens in housing. J Allergy Clin Immunol. 2003; 111:408-414.)
Reducing clutter makes cleaning easier. Dry dusting spreads particles into the air. Use a damp cloth. Vacuuming can release even finer particles in the air outflow. Use a HEPA vacuum if possible . Run your air filter in the room after vacuuming.
Mold spores can use the organic matter in dust as a food source. Having dusty filters on your heating/AC systems can spread mold spores thru the house. Clean dusty storage areas and closets.
Carbon filters removes hundreds of chemicals, VOC’s , smoke , fragrances |
Following the opening of Co-operative stores in Kiama and Helensburgh, the Woonona Industrial Co-operative Society began operations in 1896 during a time of industrial unrest. It was locally referred to as “the Co-op” and one of its aims was to provide food and assistance to those either out-of-work or poorly paid.
During World War 1 food and clothing supplies were scarce and people had barely recovered from this when the Great Depression hit in the late 1920s and early 1930s. Once again the Co-op was called upon to help its members through difficult times. It did this by allowing them to ‘book up’ purchases, enabling them to pay their accounts at the end of the month, or often enough, whenever they could.
Co-op members were entitled to a dividend paid every six months, depending on how much they had spent in that time. This dividend was paid in the form of a credit to their accounts.
During World War 2 food and clothing coupons were issued to families as these items were again in short supply. These tiny coupons came in booklets and whenever items such as butter, tea, sugar and clothing were purchased, they were cut out of the book. They became more valuable than money as it was essential that they were to be used when dealing with the shopkeeper.
Woonona Coop detail Apr2018
Woonona Co-op Store Building detail, April 2018
The Head Office and largest Co-operative Store was situated in Woonona and had branches in Scarborough, Coledale, Thirroul, Corrimal, Balgownie, Wollongong and Port Kembla. There was also a large bakery which provided prize-winning bread to all these branches. This building still stands today at 20-22 Ball Street, Woonona.
The stores had many departments including groceries, usually with a screened delicatessen area, hardware, with china and other household goods, mens, ladies and children’s clothing and shoes, drapery and manchester, and all types of produce for animals and poultry. Most people kept poultry in those days.
Grocery orders were collected weekly by men who went to the customer’s home to collect the list and often to have a chat and a cup of tea. These orders were then delivered a day or two later, sometimes on a horse-drawn dray. The Co-op employed many people, all of whom knew their products well and offered much assistance to their customers. Each branch had its own area members to serve.
Woonona Coop side detail Apr2018
Woonona Co-op Store side detail, April 2018
Although the General Manager was Mr Percy Frew, in my days of working for the Co-op, each branch had a local manager and office staff to manage its accounts. Working for the Co-op was quite a social activity, as employees knew each other and spoke often on the inter-branch telephone line, even though they often never met in person.
Such was the service at the Co-op that if a particular branch didn’t have a size or colour of clothes or shoes required by the customer, staff would phone the other branches to locate the item for them. This applied to any of the goods sold at the Co-op and included stationary for the office. The required item would then be sent over as soon as possible.
The advent of Supermarkets in the 1950s began to take its toll on the stores and many branches were progressively closed, until the Co-op finally closed its doors in 1970, which meant the end of an era in shopping.
(See also Mick Roberts blog on The co-operative stores)
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s |
Tuesday, May 12, 2015
The Importance of Being Earnest by Oscar Wilde
Source: LibriVox (Act 1 | 2 | 3)
Length: 2 Hours, 11 min
Readers: multiple
The play: “I hope you have not been leading a double life, pretending to be wicked and being good all the time. That would be hypocrisy.” John Worthington, a.k.a. Ernest, has been leading a double life. In London, his friend Algernon knows him as Ernest. In the countryside, his ward Cecily knows him as Jack or John and believes that "Ernest" is Jack's black sheep brother in the city. This being a comedy, the double life comes back to bite John, and everyone tries on new identities for parts of the play, leading to more confusion. It's an old device that recalls Shakespeare's comedies, but Wilde (who knew a thing or two about putting up a false front) twists it beautifully until the false identities become more real than the actual identities.
The funniness of the piece holds up, even after almost 100 years. Although it is meant to poke fun at British upper-class society, much of the humor is in Wilde's wonderful use of language. One-liners like "To be natural is such a very difficult pose to keep up," are funny even out of context, but the mounting absurdity of the play's plot make them even better. The great lines are almost too much to keep up with at some points and I found myself relistening just to catch the full wit of the words.
Rating: 9/10
The readers: Librivox does an interesting trick of having the actors record their lines separately, then has an editor paste all the lines together to make a finished recording. It shouldn't work, but somehow in this example, it does. There are places where the sound quality noticeably changes between readers, but I didn't mind so much. The actors themselves do a remarkably good job, despite the impediment to comedic timing. I'm impressed that they were able to overcome the limitations of this style of compiling a play.
Buy a paperback copy of The Importance of Being Earnest
No comments: |
Understanding Dengue hemorrhagic fever Disease – Dengue hemorrhagic fever is an infection caused by dengue virus. This dengue virus is transmitted by Aedes aegypti mosquitoes. Dengue hemorrhagic fever can make the sufferer experience severe pain as if his bone is broken. In some patients, dengue hemorrhagic fever can be a very life-threatening disease.
Dengue Hemorrhagic Fever in Indonesia
Dengue hemorrhagic fever is still one of the public health problems in Indonesia. The extent of the outbreak is the highest among Southeast Asian countries.
Throughout the year 2013, the Ministry of Health recorded there were 103,649 patients with death toll reached 754 people. The involvement of doctors in primary health care is needed to reduce the incidence and mortality of dengue fever.
Complications of dengue hemorrhagic fever may cause damage to some organs, such as the lungs, liver, and heart. Blood pressure can also decrease drastically, to a very dangerous level and can lead to death.
Diagnosis of Dengue Hemorrhagic Fever Disease
In the laboratory examination at the beginning of the fever phase, normal white blood cells will be found. Then, that number will decrease during the fever phase.
The number of red blood cells at the beginning of the fever, in general, will also remain normal. However, the decrease in the amount is usually found between the third day to the seventh. Therefore, this red blood cell examination needs to be repeated.
Keep in mind that the increase in red blood cells is always found in dengue hemorrhagic fever. This is an indicator of the leakage of plasma, where blood cells should be stored. Chest x-rays can also be done to see the existence of leakage of fluid into the chest cavity.
Symptoms of-of Illness Dengue Hemorrhagic Fever
A sudden fever of up to 39 degrees Celsius is the main symptom of dengue hemorrhagic fever. This fever will last for 2-7 days, then drop quickly and usually follow the following signs:
• Headache
• Chills and weakness
• Pain behind the eyes, muscles, and bones
• Skin rash to redness
• Difficulty swallowing food and drink
• Nausea and vomiting
Furthermore, the above signs will be followed by signs of bleeding, such as:
• Bleeding gums
• Nosebleed
• Red spots appear on the skin
• Vomiting blood
• Black bowel movements
In the fever phase, dengue hemorrhagic fever is usually followed by a critical phase for 2-3 days. In this critical phase, the body temperature decreases, until the body parts such as hands and feet are cold and usually feel like they are healed. In fact, in this phase, you must be vigilant, because it can occur dengue shock syndrome that can be life-threatening.
Treatment of Illness Dengue Hemorrhagic Fever
The initial treatment of dengue hemorrhagic fever can be done at home. The principle is that the patient should consume plenty of fluids to prevent dehydration, which leads to a decrease in platelets and shock. Consumption of 2-3 liters per day is a must.
Dehydration can result from high fever, difficulty swallowing food and drink, and vomiting. Types of recommended beverages are fruit juice, sweet tea, syrup, milk, and oral solution. If oral fluids cannot be administered, patients should be treated with intravenous fluids.
Patients are expected to rest completely during fever as well as the phase of shock. It is also important to always monitor platelet levels and red blood cell count in the blood until it reaches the normal limit again.
To overcome the fever can be done full body compress, especially in the armpit and groin. Paracetamol may also help to reduce fever. After all done, immediately bring the patient to the hospital to prevent complications arise.
Cause of Disease Dengue Hemorrhagic Fever
Dengue hemorrhagic fever is caused by dengue virus that is transmitted to humans by Aedes aegypti mosquitoes. When the dengue virus infects mosquitoes and mosquitoes bite humans, it can deliver the virus into the body.
Aedes aegypti is generally smaller in size, thick black body with two white vertical lines on the back and horizontal white stripes on the legs. These mosquitoes usually ‘work’ from morning to evening, although sometimes also bite at night. He likes dark and cool places, so much more is found inside the house than outside the hothouse.
Prevention of Illness Dengue Hemorrhagic Fever
Basically, efforts to prevent dengue hemorrhagic fever can be made by maintaining the cleanliness of the house. Also, make sure you also maintain the cleanliness of the environment around you.
The best way to control Aedes aegypti mosquitoes is to get rid of the habitat. You must empty the open water container so that the mosquitoes can not lay their eggs inside the open containers.
To prevent mosquito bites, you can wear clothes that cover the skin completely. Using a lotion and mosquito net while resting can also help. |
Monument to the first cosmonaut
Monument to the first cosmonaut Monument to the first cosmonaut
Quite an interesting monument appeared in Moscow. Especially for the Cosmonautics Day a monument to the first dog in space was erected on the territory that belongs to the Military Medicine Institute. The death of the dog was predetermined, so the tablet was recalling the remarkable feat for 10 years.
Monument to the first cosmonaut 2
The monument to the Eskimo dog was erected in the Petrovsko-Razumovskaya alley only on the 11th of April. The decision about erecting of this monument was not a surprise, as the dog made a great contribution to the cosmonautics development. The dog was send into space in order to find out how zero-gravity affects a human body. The results were used to prepare a man for a flight into space. The life of the animal was a price for this, but there wasn't a single word about it in the newspapers. The mass media concealed the fact that the dog was alive only for 6 hours and died because of high temperatures and a nervous breakdown.
Monument to the first cosmonaut 3
The data about the dog's destiny was exposed not so long time ago, but the goal of that experiment was reached. The scientists proved that it is possible for a human being to survive in zero-gravity. The next cosmonauts were more successful. The wide-known flyers Belka and Strelka returned to the Earth with a whole skin, as it was a planned flight.
Monument to the first cosmonaut 4
The monument to the first dog in space has a form of a rocket, that turns out to be a palm. Belka is standing on it. The monument is two meters high. Many tourists and Moscow residents may have a look at the monument and enjoy a small four-legged creature, which was the first USSR cosmonaut.
Monument to the first cosmonaut 5
Yuri Gagarin's flight owes a lot to its predecessors that proved the possibility to stay alive in space. The Eskimo dog was a pathfinder and it deserves to be respected and to remain memorable.
Comments (0)
There are no comments posted here yet
Leave your comments
Attachments (0 / 3)
Share Your Location
back to top
Read also
Interesting Places America
Soreq Cave at the Avshalom Beit Shamesh
Travelers and fans to visit various caves can hardly something to surprise. However, there is a cave, which can cause...
Interesting facts
Temple of Queen Hatshepsup
In the history of Ancient Egypt, the period of the woman's rule in honor of which the Temple of Queen...
Interesting Places Europe
The eco-clean house - Nest
With the development of modern technologies such as direct construction of buildings and building materials themselves, a growing number of...
Interesting Places America
City skeletons or necropolis Chowchilla
Tourism and winter trips
Tourism and spring trips
Tourism and summer trips
Tourism and autumn trips |
By Suzanne Laurie, Nutritionist
Who doesnt suffer from a little flatulence every now and again Not many of us, however it can become a slightly embarrassing problem if every now and again becomes every time you eat! So what causes flatulence and is there anything we can or should be doing..or is it a matter of suffering in what we hope is silence!!!
The good news is no one is immune so there is no need to be embarrassed! Gas in the digestive tract (that is, the oesophagus, stomach, small intestine, and large intestine) comes from two sources:
1. swallowed air
2. the breakdown of food
Everyone creates gases in their digestive tract during the breakdown and metabolism of food. These gases then need to be eliminated by burping or passing it through the rectum. However most of the gas produced should be odourless and go unnoticed. If the gases emerging your digestive tract are a little less innocuous this may be because undigested food is passing into the large intestine, where bacteria will ferment it with the release of gases that contain sulphur (a highly odorous substance, which gives garlic its characteristic smell).
Therefore the most common cause of flatulence is indigestion, although chronic flatulence may indicate more serious intestinal health problems and should be investigated further with the help of a healthcare professional.
Facts about Flatulence
1. Most people produce 1 to 4 pints of gases in their digestive tracts per day
2. On average we will relieve ourselves of excess gases a staggering 14 times a day!
3. he gases are a concoction of carbon dioxide, oxygen, nitrogen, hydrogen and methane
Prevention of Flatulence
Most cases of excess or odorous flatulence can be prevented by slight dietary and lifestyle change. Here are a few hints for reducing your emissions:
1. Eat slowly and chew your food thoroughly undigested pieces of food are more likely to pass through to the large intestine if they are not broken down adequately in the mouth.
2. Keep an eye on your portion sizes eating large quantities of starchy carbohydrates and/or protein in one meal can overload the digestive system and lead to indigestion
3. Avoid eating large portions of foods with a high sulphur content these include red meat, beans and pulses, garlic and onion
4. Try adding some natural live yoghurt to your diet this will help ensure a healthy bowel and prevent overgrowth of bad bacteria that can increase flatulence, particularly the smellier kind!
5. Consume a healthy balanced diet - The diet should consist of adequate amounts of fresh, raw green vegetables with low levels of sugar, hydrogenated fats and oils, and processed, chemicalized foods.
6. Drinking peppermint tea after meals can aid digestion and reduce flatulence
7. Ensure you have a regular bowel movement do not resist the urge to have a bowel movement as this will hold gases in the intestines and lead to further fermentation and sulphur production
Seek help if
1. You suffer from flatulence after every meal
2. You suffer from excessively smelly flatulence
3. You often feel bloated after eating
4. Your flatulence is accompanied by other symptoms of indigestion such as stomach cramps, diarrhoea and constipation
5. You suffer from rectal itching or bleeding |
Today in New Delhi, India
Nov 13, 2018-Tuesday
New Delhi
• Humidity
• Wind
Talking about your feelings really does help
Talking about your feelings with someone will really help you feel better, a new study has claimed.
health and fitness Updated: Jun 30, 2007 18:59 IST
If you're feeling sad or angry, then you need to talk about your feelings with someone, for a new study has found that doing so really will help you feel better.
The study found that talking things over with a therapist, or a pal, or even putting your feelings down on paper, produces a therapeutic effect in the brain, thereby helping us feel better.
Psychologists at UCLA, led by Dr Matthew D Lieberman, conducted the new brain imaging study.
The study was conducted on thirty people, 18 women and 12 men between ages of 18 and 36, who viewed images of individuals making different emotional expressions. Below the picture of the face they either saw two words, such as "angry" and "fearful," and chose which emotion described the face, or they saw two names, such as "Harry" and "Sally," and chose the gender-appropriate name that matched the face.
The findings showed that while the amygdala was less active when an individual labelled the feeling, another region of the brain was more active: the right ventrolateral prefrontal cortex. This region is located behind the forehead and eyes and has been associated with thinking in words about emotional experiences. It has also been implicated in inhibiting behaviour and processing emotions, but exactly what it contributes has not been known.
"What we're suggesting is when you start thinking in words about your emotions -labelling emotions - that might be part of what the right ventrolateral region is responsible for," Lieberman said.
Many people are not likely to realize why putting their feelings into words is helpful, Lieberman said.
"People don't do this to intentionally overcome their negative feelings; it just seems to have that effect. Popular psychology says when you're feeling down, just pick yourself up, but the world doesn't work that way. If you know you're trying to pick yourself up, it usually doesn't work - self-deception is difficult. Because labelling your feelings doesn't require you to want to feel better, it doesn't have this problem," he said.
The study appeared in the current issue of the journal Psychological Science.
First Published: Jun 30, 2007 16:11 IST |
The Pimlico History Of Western Philosophy
Richard H Popkin
Editore: Random House
Formato: EPUB con DRM
Testo in en
Cloud: Scopri di più
Compatibilità: Tutti i dispositivi (eccetto Kindle) Scopri di più
Dimensioni: 1,12 MB
• EAN: 9781446444283
pagabile con 18App pagabile con Carta del Docente
Articolo acquistabile con 18App e Carta del Docente
€ 12,99
Venduto e spedito da IBS
13 punti Premium
Scaricabile subito
Aggiungi al carrello Regala
THE PIMLICO HISTORY significantly broadens the scope of Western philosophy to reveal the influence of Middle Eastern and Asian thought, the vital contributions of Jewish and Islamic philosophers, and the role of women within the tradition. Popkin also emphasizes schools and developments that have traditionally been overlooked. Sections on Plato and Aristotle are followed by a detailed presentation on Hellenistic philosophy and its influence on the modern developments of materialism and scepticism. Another chapter considers Renaissance philosophy and its seminal influence on modern humanism and science. Turning to the modern era, the contributors give equal attention to both sides of the current rift in philosophy between continental and analytic schools, charting the development of each right to the end of the twentieth century. Each chapter includes an introductory essay, and Popkin provides notes that draw connections among the separate articles. The rich bibliographic information and the indexes of names and terms make the volume a valuable resource. Combining a broad scope and penetrating analysis with a keen sense of what is relevant for the modern reader, the book provides an accessible intro for students and general read. |
Dismiss Notice
Join Physics Forums Today!
Homework Help: Percent error and vectors
1. Jun 26, 2011 #1
What will happen to the percent error of graphical or force table method as the number of vectors to be added increases? Give proof.
3 vectors
A = 400 g
B = 450 g
C = 427 g
2. Relevant equations
3. The attempt at a solution
First, I computed for the percent error of 2 vectors. I used vectors A & B:
% error = [(400 - 425)/425] x 100 = 5.88%
Then, I computed for the percent error of 3 vectors:
% error = [(400 - 425.67)/425.67] x100 = 6.03%
I concluded that as the number of vectors to be added increases, the percent error also increases. I'm not really sure about my answer.
2. jcsd
3. Jun 26, 2011 #2
User Avatar
Science Advisor
Homework Helper
Gold Member
I am not sure what you are doing, you seemed to have taken an average of two or three numbers and then compared the first with the average? This is not correct. The percent error is the
((experimental value determined from the graph or force table - theoretical value determined from calculations)/theoretical value)) times 100 , or,
% error = 100(Experimental - Theoretical)/Theoretical.
The theoretical value is always the same. What about the experimental value as you increase the number of vectors in a given experiment? |
Enacting It with Legislation
Ratifying It
The resolution has only allotted two years for ratification, and 3/4 of the states must ratify within that time period for the amendment to become part of the Constitution. But most amendments have been ratified faster, and most Americans know how important this is.
We are in a time of extraordinary change. Civic engagement is more important than ever. Focus on our future: help remake the system to work better for us. This is the kind of future our kids deserve.
To ratify, we'll have to bypass our state legislatures. When this amendment passes Congress they will propose it to the states. When it comes to the state level, each state will use state Ratification Conventions with delegates nominated by popular petition and elected by popular ballot. Remember that opponents will have their petitions ready.
Law or political science classes can teach what is needed in your state, and how to draft the proposal and nominations for the Ratification Conventions and get them to your state legislature. Take care to find delegates who will be effective and faithful to the public's needs. The public can file to have the budget made constitutional from the date of ratification on.
None of this will happen overnight,
but our system is going through a transformation
that will play out for a generation.
The difficulty of passage isn't the only reason amendment is a last resort. While the Constitution is law itself, it's mainly used as a source of legislation and can be hard to enforce without it.
Enacting legislation is discussed repeatedly in this proposal, but nothing it recommends is mandatory and legislators can extrapolate from the amendment's text. Some of it will be determined at the state level (see Redistricting for State Offices). But the Information Age is making it much easier for the public to take part in the legislative process, bringing us back almost to the town-hall environment of the early federal period.
To ensure smooth, immediate and nondefeating enactment, enacting legislation should be drafted in advance of ratification and posted online to be checked by the public. Ask any members of Congress or state legislatures who are interested, but knowledgeable members of the public can also draft it.
America will always act to assure free and fair elections. It's who we are. A new national effort to make our political process work better for us will get it done.
Image, George Hodan
big black clockface with roman numerals |
Get the latest from TODAY
Sign up for our newsletter
/ Updated / Source: TODAY
About 4 million American households include at least one adult suffering from increasing memory loss or confusion, according to a recent report from the Centers for Disease Control and Prevention. Yet many people are unaware of how to protect or improve their memory. Neurologist Dr. Majid Fotuhi of the NeurExpand Brain Center, author of "Boost Your Brain: The New Art and Science Behind Enhanced Brain Performance," explains how to use his memory test:
The Fotuhi Brain Fitness Calculator is based on my 25 years of research, clinical and teaching experience at Harvard and Johns Hopkins. I have published several articles about factors that shrink or expand the brain. In my book, I have put together an odometer-type scale that indicates the strength of each of risk factors and each protective factor. I call them "brain meters."
The questionnaire is my attempt to put all this information in a simple format so people can get a general idea of how they can improve their brain health.
• This questionnaire is intended as a general screening tool for brain health issues and should not be used for diagnosing or treating any specific medical conditions.
• A person with a perfect score may still have significant undiagnosed heart disease (without any symptoms) that could result in stroke and dementia in the future.
• A person with a poor score needs to double-check his or her answers with a health care professional. For example, a person with depression may post unreasonably low scores that could be unduly alarming.
• This questionnaire is not intended to be fully comprehensive and should not be used as a medical diagnosis.
To calculate the test, add the selected numbers from each question. Scoring is explained at the end.
1. High stress, daily
2. Occasional stress, not daily
3. Rare stress, only once in a while (with deadlines, etc.)
1. Rarely laugh, usually grumpy
2. Occasional laughter
3. Cheerful and smiling most of the time
Blood pressure
1. Usually 140/90 or higher
2. Usually between 120/80 and 140/90
3. Usually 120/80 or lower
1. Smoke daily
2. Occasional smoke (or quit smoking)
3. Never smoke
Alzheimer’s in the family
1. More than 2 members of the family have been diagnosed with Alzheimer’s disease
2. Only one member of the family has been diagnosed with Alzheimer’s disease
3. Nobody in the family has been diagnosed with Alzheimer’s disease
1. Usually less than 6 hours a night
2. Usually 6 to 7 hours a night
3. Usually about 7 to 8 hours a night
Snoring 1. Snore all night, feel sleepy during the day
2. Occasional snoring, mild sleepiness during the day
3. Quite and restful sleep
Activity level
1. Couch potato
2. Usually active, but no formal exercise
3. Keep an active lifestyle and exercise regularly
Brain safety
1. No seat belts, no helmets during biking or contact sports
2. Occasional use of seat belts and helmets
3. Conscious about safety, regular use of seat belts and helmets
Fitness level
1. Compared to people my age, I am out of shape
2. Compared to people my age, I am in average shape
3. Compared to people my age, I am in great shape
Social engagement
1. Usually isolated and alone
2. Occasional social activities, 1-2 months
3. Regular social activities every week
Alcohol use
1. Three or more glasses of alcohol per day
2. No alcohol at all
3. 1-2 glasses of alcohol per day
Food quantity
1. Eat large portions, enjoy second servings
2. Eat occasional large portions, no second servings
3. Small and reasonable portions, no second servings
Food quality
1. Junk food (such as French fries, doughnuts or salty foods)
2. Occasional junk food, usually heart-healthy diet
3. Heart-healthy diet, zero junk food
DHA (Docosahexaenoic acid, an omega-3 fatty acid)
1. No DHA or nutritional supplements
2. Occasional DHA supplements
3. Daily use of DHA supplements
1. Sad, irritable and/or depressed most of the time
2. Occasional irritability, but generally pleasant
3. Upbeat, cheerful, and agreeable most of the time
Mindfulness Meditation
1. Never practice any form of meditation or relaxation
2. Occasional meditation or relaxation
3. Daily mediation and/or relaxation
1. Usually pessimist, negative, and hopeless
2. Occasional negative thoughts, usually positive attitude
3. Always optimist and positive attitude
Memory Stimulation
1. No effort in memorizing names, facts, or stats
2. Occasional efforts in memorizing names, facts, or stats
3. Always eager to memorize names, facts, or stats
Sense of curiosity
1. No interest in learning new things or exploring the world
2. Occasional interest in learning new things and exploring the world
3. Usually eager and enthusiastic to learn new things and explore the world
Your Score:
Green: 50-60: Good news: You have a brain-healthy lifestyle. There’s always room for improvement, though, so please start working on areas where your score was not perfect.
Yellow: 31 to 49: Your lifestyle needs a checkup. You need to identify key weaknesses and devote a strong effort to strengthening them, while maintaining brain-healthy habits in other areas.
Red: 20 to 30: Your brain is need of some TLC. Your goal should be to improve your scores across the board. This may involve some major lifestyle changes. Think about which changes you can realistically make and which will have the biggest impact. You need to discuss areas in which you have a low score with your doctor or a health care professional.
This article was originally published Mar. 9, 2015 at 9:21 a.m. ET. |
Collusion, Self-Plagiarism and Contract Offense
Table of Contents
academic offences
We have already talked about the four common types of Plagiarism and how you can get involved in them, intentionally or unintentionally or both. This guide will help you understand the three more serious academic offences, which many students are not completely aware of. It is important for you to clear your confusion between these three because you may assume that they are ethical. But, the reality is that you could get into more trouble without knowing their consequences. So, let us dig a little deeper and get to know what Collusion, Self-Plagiarism and Contract Cheating actually are.
Working in groups to complete an academic assignment is perfectly fine. There are lots of activities that will require a student to work in a group of more than two students. Different ideas arise because of unique mindsets. But, one should know when the collaboration with his friends, turns into collusion. It means that they are using someone else’s ideas in their work, and, act like they have produced it on their own. Here, it is clear that with collusion, a student is trying to deceive his teacher by submitting unacceptable assignments.
Plagiarism bitstrips
This is a fairly new type of academic offense which was earlier unknown to many students and teachers. Self-plagiarism is the act of re-using your own work by adding parts of it in the new assignment that needs to be submitted. Many students assume that it is acceptable to re-use their own work. And by doing this, they believe that the submission is entirely original. But Turnitin will eventually detect that a student has used recycled work. So, you need to be aware of this new concept and clear your confusion.
Contract Cheating
contract cheating
Sometimes, students may come across challenging assignments that are beyond their capability. Or, they do not have enough time to do their work because of some other important tasks. This is when they indulge in Contract Cheating, which is a serious concern for the teachers. There are a few ways that a student can get an assignment written illegally. The first being bribing or paying another person to write his assignment and the second is by submitting a stolen assignment and claiming that it is their original work.
Every university treats Collusion, Self-Plagiarism and Contract Cheating as a serious and punishable academic offense. It is because of the above three types of academic misconducts, that a University has to modify and stricken the guidelines frequently. There are ways by which the faculty can detect whether your work is plagiarised or not. So, to stay safe, it is always better to submit original assignments. However, you can always ask your friends and teachers for any guidance that you may require. Indulging in illegal acts will only get you in trouble and severely affect your academic performance. So, why not get respectable grades ethically? |
Manipur & Manipuri Dance
Manipur, the small North-eastern state of India is formed together by nine hills. It is an oval-shaped alluvial valley which tilts gradually towards the south. Manipur is best known today for its unique classical dance form, the Manipuri Dance. Of all the 7 classical dances of India, Manipuri is probably the most graceful for its soft, suitable, flowing body movements. Like most other classical Indian dance forms, Manipuri Dance also began in the temples and is still performed today in the temples as a part of rituals.
The dance form reflects the scenic beauty of the place, myths related to Manipur, the religion and social life of its people, the Manipuris.
The Manipuris had their own Tibeto-Burman religion till 17th century, but since 18th century with the advent of Vaishnavism (worship of Vishnu) in Manipur, the Manipuris adopted Vaishnavism as their religion and even today they maintain a unique harmony between the two religion in their daily lives. And the daily life is inseparable from dance and music as every occasion of their lives is incomplete without dance and music. Dance and Music are an integral part of lives of Manipuris.
The history of Manipuri dance is very old and dates back even before 33 AD with the creation of Heaven and Earth. The Classical Manipuri Dance has four aspects , namely Thang-ta (the rutualistic Martial Art-form of Manipur ) , Lai - Haraoba (the Tantric form) , Sankirtan (the collective prayer) and Rasleela (the divine love-play of Lord Krishna withRadha and gopis the milk-maids of Vrindavan) . The Thang-ta and Lai-Haraobatradition belong to Pre-Vaishnavite period of Manipur ie ,the period till 17th century , while Sankirtan and Rasleela belong to Vaishnavite period ,ie the period starting from 18th Century onwards" .
All rights reserved. |
What Are Some Mild Autism Treatments?
The symptoms of mild autism are far less severe than those associated with more severe forms of this condition. Unfortunately, this will often result in many children being undiagnosed for several years, and the treatment process being delayed. In many cases of children having mild autism, if they perform a sequence of different therapies and treatments they can recover.
Individuals with a mild form of autism will often develop very well and have a normal speaking ability. Regular therapy at a young age can have incredible results, and can help to cure the child of all signs of autism. Treatments will typically fall into two different categories, and will need to be tailor made to the individual child.
Every single autism case is unique; therefore, the child will need to be assessed before treatment should begin. Both educational and medical treatments can be successful, depending on the child and how mild the autism symptoms are. Although drugs are diagnosed for some forms of autism, many people prefer to use other methods and treatments. Speech therapy, physical therapy and animal assisted therapy, are all extremely popular.
Speech therapy is one of the most common treatments available and many children with mild autism will need to perform this. Children with mild autism will often develop their speech differently, and their necessary communication skills may be lacking. Therefore, spending the time to re-educate the child and encourage them to speak appropriately is essential. If the child is struggling to communicate correctly, other methods such as picture exchange may be used.
Animal assisted therapy is becoming a very effective form of treatment for mild autism sufferers and can be highly effective with children. The daily routine that is needed with animals can help children come to terms and deal with their autism. The daily interaction with an animal can have remarkable healing and therapeutic benefits. Feelings of loneliness and stress will vanish when a unique bond is formed between the child and the animal.
Massage therapy has been found to help people with developmental issues and mild forms of autism. Regular massage therapies can help to relieve stress, increase attention spans and help with the overall aversion to being touched. Many children with mild autism will not know how to show affection, and will be unsure of appropriate touching and hugging. Therefore, the massage and touch therapy can help to relax and guide them.
Music therapy is a controlled experience that can help with autism in many different ways, and help positive changes to be achieved. Through planned sessions that should be developed to suit the child, many different things can be achieved. Music is an extremely powerful tool and can be used in several different forms. This can include singing, playing instruments, listening to music and moving to the sounds.
Sensory integration is particularly beneficial especially to children who find it difficult to cope with their surroundings. Many children with autism will not adapt to the environment they are in, which can cause disruptive behavior. By teaching the children more regarding their senses and how to cope with the feelings they are experiencing, they will develop far better. By including several of the different techniques it is possible to take positive steps to curing mild autism. |
Stalin. Game without rules
Historical and journalist detective story
Annotation, background and main ideas of the book
Thirty years in the darkness of Stalinism — is a severe lesson for Russia and all the mankind. Following step-by-step the methodology and psychology of Stalin’s jump to the heights of power and adoration, we shall try to reveal the real ‘strings’ of his seizure of the power, the genocide of the Bolshevik’s party and of the army, his alliance with Hitler and the bitter defeats in the first year of the Great Patriotic War, the technology of “the Pyrrhic victory”, the mystery of Stalin's birth, private life and death. Detective plots turned into reality during the rule of Stalin — undereducated, physically and mentally ill man — and brought the whole country to the edge of extinction: its science, culture, people’s health and human rights. The mechanism of insidious lie, the propagation of fear, communist fanaticism and the cult of Stalin led to bloodcurdling repressions, terror, and death of millions of people during “raskulachivanie” (the Bolshevik’s policy aimed at eliminating wealthy farmers), in GULAG, during the World War II. Psychological analysis of the incredible fusion in time and space of the people historically used to slavery and obedience and the cruel tyrant who went the way from a criminal and provocateur to a dictator seeking the world power. The possible repetition of the past points to the real danger for Russia and all the mankind in the present and the future. No detective plot invented by the most sharp-witted writer can be compared to the paradoxical reality of Stalinism, and yet the number of murders and corpses would suffice a million of detective stories.
For the first time this book is provides some data compilation of which with the known versions of Stalin's biography, his entourage and victims, psychological features of these “characters”, allows the author to offer a plausible explanation of the “the Stalin mysteries”. Nowhere in the book I refer to paranoia or schizophrenia, as some authors do trying to explain what a sensible man would seem as irresoluble behavior of the “genius of all times and peoples”. Everything is accounted for by natural psychological reasons rooted in the live-style, sexual and ideological features, the relations formed through the leadership of the country, the mentality and intellectual level of Stalin and his supporters. The book is called a “detective story” intentionally, and not only due to the large (multimillion) number of corpses. We reveal the true reasons of the genocide of the army leaders in 1937—1941, the seizure of power by Stalin, the alliance with Hitler, trust in him, the illusion of a “sudden attack”, the suicide of Nadezhda Allilueva, the “confessions” made by the old party members without obvious reasons, the assassination of Kirov, etc.
The solution of the genetically paradoxical emergence of the unique personality in the family of an alcoholic farther and a dull peasant mother originating from serfs was that Stalin was neither “a brilliant scientist”, nor a great military leader or a cunning diplomat. He was a great criminal basher, a brazen and unprincipled bandit, a remarkable organizer of the system of impudent lie and cruel terror, who usurped the power due to a fortunate (for him) circumstances and the support of semiliterate people. Having eliminated the intellectuals in Russia, he entangled the remaining crowd with a false propaganda. The lie gradually transformed into self-deceit — a suitable form of surviving, making a career and a good living by means of obedience to the tyrant and eulogy of his role to the extent of sincere trust in his divine mission. This trust prompted by the instinct of self-preserving substituted religion, conscience, common sense and economic expediency in Russia.
The mankind is not guaranteed from the emergence of a new dictatorship claiming the world’s dominance by means of terror and deceit of the crowd. The proof of it is not only the genocides at the end of the XX century, but also the appearance of new terrorist regimes such as, for example, Taliban. It is necessary to know about the phenomenon of Stalinism for better understanding of the past and future, and not only in Russia.
While working on this book I came across a large number of publications about Stalin, almost all new ones, including those accessible via Internet and at the library of Toronto. As a result a new book has emerged which is unlike any other on the subject. It appears to be the most negative in evaluating Stalin and the consequences of Stalinism among all those I have encountered. The peculiarities of my monograph are as follows:
The book is an interesting reading because of its detective nature. Among other stories it tells about Soviet intelligentsia, the disclosure of such “mysteries” as genocide of the command before the war, Stalin's trust in Hitler, the suicide of Allilueva, the blockade of Leningrad, the date of Stalin's birth, his ascent to power, the nuclear bomb, the suicide of Stalin’s eldest son Jakov, the assassination of Kirov, the decline of industry, science and agriculture in USSR, the internal strings of the assassination of Trotsky, the doctors' prosecution, the Moscow trials, etc.
Not many documents of that period have managed to survive as Stalin tried to destroy them all mercilessly. But taking into account the characters of Stalin and his associates, impossibility of alternative explanations of the well-known events and the documents and testimonies, which have survived accidentally, I bring the reader to the logic of the real events.
The literary component of the book is formed by description of events and persons, first of all, the characters of Stalin and his supporters as well as (I beg your pardon) of the people submitted to him. A great deal of attention is paid to the problem of transformation of a dictator's nature including the danger of degradation of any sovereign, even a “good” one.
Although a great deal of information is known from other sources, yet not everything. My book offers a step-by-step description of the tyrant’s ascent to power from his birth till death, which and it allows me to give a comprehensive picture and to explain all the details not obvious from separate fragments.
Lev Barskii |
Little Known Facts About r programming homework help.
No additional problems and Determined queries online. We're going to resolve your issue and include explanations the place required.
Contemporary systems in other languages also generally use equivalent methods, Even though much less demanding, and only in specific areas, so that you can minimize complexity, Commonly together with complementing methodologies for example knowledge structuring, structured programming and object orientation.
This has brought about several programmers who developed their software on Unix devices only to ignore the distinction completely, resulting in code that is not moveable to distinctive platforms.
The help() function and ? help operator in R provide use of the documentation internet pages for R functions, facts sets, and other objects, the two for deals inside the standard R distribution and for contributed offers.
Since all prospect expenditures are destructive or zero, the initial assignment of Vogel’s Remedy is optimal with complete cost of Rs. 9350.
In like that you'll have an understanding of more quickly what has actually been done and strategy your subsequent significant methods. It’s our mission to help for every pupil at the the best possible prices. That’s why pupils appreciate our service.
Single assignment is really an illustration of identify binding and differs from assignment as explained in this article in that it could only be done when, commonly if the variable is established; no subsequent reassignment is permitted.
Linear programming can be a mathematical system for pinpointing a way to accomplish the most effective consequence (which include highest earnings or cheapest Value) inside a supplied mathematical model for many listing of requirements represented as linear interactions.
There are lots of advantages of employing R language, because it employs open up source programming and is also extensible. It is actually used for econometrics and economics. The look selections for illustrations or photos are created and the user has full control about these functionalities. A good selection of utilities and intelligible instruments are available for exact and reliable information Investigation. The many capabilities of programming can also be accessible in this article including conditional statement, looping and breaking down into reusable modules of programs.
The Java I/O libraries tend not to transparently translate these into System-dependent newline sequences on input or output. Alternatively, they provide features for producing a full line that automatically include the indigenous newline sequence, and capabilities for studying traces that accept any browse around here of CR, LF, or CR+LF for a line terminator (see BufferedReader.
Prior to now, R has basically been slammed for providing sluggish analyses when used to large info sets, on the other hand a lot more present-day versions of your language are trying to take care of this challenge.
Instance: Assuming that a is a numeric variable, the assignment a := two*a signifies that the information of your variable a is doubled once the execution with the statement.
When *args seems as a operate parameter, it truly corresponds to each of the unnamed parameters of
The reserve gives an introduction to statistical knowledge Investigation implementing the absolutely free statistical application R, likely the most powerful statistical application right now. The analyses are carried out and mentioned utilizing serious info. Right after a short description in the statistical software package R, significant parameters and diagrams of descriptive statistics are released. Subsequently, suggestions for creating diagrams are supplied, in which special consideration is specified to the selection of acceptable colours.
Leave a Reply
|
The BC-304, also known as the Daedalus-class warship, is a class of deep space carrier built by the Tau'ri, and the most advanced series of vessels in the Tau'ri fleet capable of rivaling even the most powerful alien spaceships. As of 2010, six Daedalus-class warships have been built. These 304s are the DaedalusOdysseyKorolevApolloSun Tzu, and George Hammond. Five are known to be in active service. All but two are operated by the United States Air Force. One 304, the Korolev, was given to the Russian Federation, and subsequently lost in a battle with the Ori, while another 304, the Sun Tzu, is operated by the Chinese Government.
Overview Edit
Although referred to as "sister ships" to the BC-303 Prometheus, the 304s differ significantly in their design and technology. While the Prometheus was originally built with reverse-engineered Goa'uld technology and salvaged equipment such as the Transportation rings, the 304s incorporated Asgard technology in their original design. All 304 class ships are equipped with Asgard shields, sensors, transporters, as well as intergalactic hyperdrivetechnology that allow the ships to carry supplies to Atlantis in the Pegasus galaxy.
However, the Asgard initially refused to install any of their weapons on the 304s, changing their minds only when faced with their extinction as a species. In 2007, they equipped Earth's flagship, the Odyssey, with their most advanced technology, including plasma beam weapons. Later, the Daedalus and Apollo were also updated with these weapons. It is assumed that all future ships will be provided with these weapons as well.
History Edit
Originally, the Prometheus proved itself to be a capable warship, with several more ships of the BC-303-classplanned for construction. However, in a show of gratitude for the Tau'ri's help in battling the Replicators, the Asgardprovided a technological retrofit for the Prometheus.
With the Asgard upgrades, and whatever knowledge and fine-tuning that the Prometheus went through during her shakedown, the current BC-303 class became obsolete. Therefore, a new spaceship, intended to be built from the ground up with these upgrades, was designed. It immediately became one of Stargate Command's most important projects. Currently, seventy percent of the SGC's operating budget has been transferred to the construction of Daedalus-class vessels. The first vessel of the class was the Daedalus, which was introduced in 2005. Upon its completion, the ship was immediately assigned to the Pegasus galaxy to assist the Atlantis expedition in the Tau'ri-Wraith war.
The following year, in 2006, the second Daedalus-class ship, the Odyssey, was constructed. The ship's initial mission was to deal with the Lucian Alliance and, foremost, the forces of the Ori, which had invaded the galaxy.
The first two Daedalus-class ships were commanded by the United States Air Force. However, when the Ori invaded the Milky Way a third Daedalus-class ship was near completion. The Korolev was given to the Russians as a "trade agreement" for the United States of America to continue running the SGC with the Alpha Gate, which was on lease from Russia. The Korolev was destroyed during the Battle of P3Y-229 soon after being rushed into service.
In 2007, when faced with the extinction of their race, the Asgard gave the Tau'ritheir complete knowledge base in the form of the Asgard computer core. They also gave the Tau'ri vessel, Odyssey, a mass-upgrade. Since that historic event all Daedalus-class warships have been outfitted with Asgard advancements, in the form of Asgard plasma beam weapons. These weapons have given the Tau'ri a military superiority over most other known races in the universe.
Another Daedalus-class ship, the Apollo was constructed later in 2007. It was stationed around Earth in defense against a potential Ori attack. The attack never took place however, and it was subsequently assigned to the Pegasus galaxy to fight the Asurans in the Asuran-Tau'ri-Wraith war.
The next 304 in line, the Sun Tzu, was put into service by China in early 2009. In its first mission, the Sun Tzu and the Apollo jointly engaged the Super-hive, which had found the location of Earth. The attack was a failure and both the ships were crippled in battle. The Hive ship was subsequently destroyed over Earth.
Additionally, Earth's sixth 304, the George Hammond (introduced in an alternate timeline as the "Phoenix"), was completed in 2009 and is placed under the command of Colonel Samantha Carter. It later took part in the defenseof Icarus Base and other Lucian Alliance conflicts.
While talking with Sheppard and Teyla, Carter tells them that while the George Hammond brings the number of 304's available to Earth up to four, there are no more hulls being laid out for other members of the class currently. Carter explains that building the ships costs seven billion dollars and with the economy, there simply isn't the money to build anymore. The Russians are also not attempting to replace the Korolev given how a short a period it lasted and the Sun Tzu still has to be recovered if its even possible to salvage it after all the damage the ship took against the super-hive.
Following the appearance of Queen Death, both the Daedalus and the George Hammond are dispatched to the Pegasus galaxy. However, after a battle that results in severe damage to both ships, the Daedalus returns to Earth as Atlantis no longer has a ZPM to contact home. The Hammond is left to defend Atlantis alone and participates in several battles with the Wraith, including the final battle with Queen Death. While its considered to recall the Daedalus, its determined to be pointless as the Daedalus is simply too far away to make it to the battle. The Hammond survives the battles it engages in in the Pegasus galaxy and later returns to Earth to help battle the Lucian Alliance. |
Features and structure of argumentative essay
Thus, the main goal of writing an expository essay is to give a good description of the problem basing your discussion on factual data. Here, the arguments supporting your thesis are presented.
More and less skilled writers Recent research shows that skilled writers are sensitive to their audiences. There are 4 things that writers do while composing: Exposition means informing, describing, and clarifying.
This type of writing usually refers to logic and discourse, and is biased and subjective. From the first stages of making notes and headings, through various drafts, to the final version. An expository piece is writing where you have to estimate and describe a specific problem. Writing and thinking When people write something, sometimes may affect the way they think.
The argumentative text. Structure and features.
If you want to impress the reader, this is best done by choosing examples that are less well-known or examples that are not in the books, etc. In this part of the article, we will get to know the definitions of two common types of writings so to understand how each of them needs to be written.
The act of revision Any model must take into account the act of revision. However, do not give more tan two or three, you are not showing off how much you know. This is a promising field of research: To add or to expand material. Differences Between Expository and Argumentative Essays, pt.
In real life, writing is usually undertaken in response to a demand of some kind. Writer based prose Less skilled writers produce what can be called? The presentation of ideas and arguments is less clear. The handwritten product gives very little information, and if we think about our writing activity, we destroy its naturalness.
The whole essay should be written in an impersonal and indifferent manner; writers better avoid expressing their own ideas and beliefs and concentrate on providing all the necessary information for better understanding of the origin of the chosen issue.
Coolessay in Other No secret that in order to be an excellent student you have to understand the definitions, the common features, and differences between various types of writing. Argumentative writing is a piece where you have to persuade your readers that your point of view concerning the specific issue is correct.
These chapters can involve characterizing, comparing, categorizing, etc. It is a clear sense of audience that enables a writer to select appropriate content and express it in an appropriate form and style: Students have to imagine contexts for their writing and motivate themselves to produce for the imaginary reader.When writing an argumentative essay, the primary objective is to show your audience that you have a valid argument.
The reader is then able to decide to be sway over to your position, or they may end up disagreeing with your argument entirely. 5 Main Features Of An Argumentative Essay: Tips For Students.
When writing an argumentative essay, the primary objective is to show your audience that. strongest analytical points for the end of your essay, and use them to drive your conclusion o Vivid, concrete language is as important in a conclusion as it is elsewhere--perhaps more essential, since the conclusion determines the reader's final ARGUMENTATIVE PAPER STRUCTURE.
5 Main Features Of An Argumentative Essay: Tips For Students
The main textual features in argumentative texts are given by textual and lexical items, that is, textual devices which are words used to enhance the effectiveness of the argument (i.e. declarative verbs, adversative, summative, concluding connectors, syntactic structures).
Differences Between Expository and Argumentative Essays, pt Differences Between Expository and Argumentative Essays, pt 03 October Structure Introduction introduce your readers to the topic of your assignment and describe the main goal of your essay; Argumentative: lead your audience into the topic and debates around it.
Features and structure of argumentative essay
Rated 0/5 based on 80 review |
Actions of Monoids and Automata
Posted on March 19, 2015
In theoretical computer science there are a lot of related concepts of automata, each with a slight variation in their definition. Most of them can be unified to one conceptual framework using monoid actions:
Actions of Monoids and Transition Functions
Given a category \(\mathcal{C}\), an object \(X\) in \(\mathcal{C}\) and a monoid \(M\), an action of \(M\) on \(X\) is a monoid homomorphism \(\phi: M \to \text{End}_\mathcal{C}(X)\) with reverse function composition. In other words, each element \(m \in M\) determines a map \(\phi(m) : X \to X\) in \(\mathcal{C}\). Allowing \(\mathcal{C}\) to vary will allow us to vary the type of transition functions we allow.
If we slightly tilt our head, we can view this as a transition function on a state space \(X\), given inputs in \(M\). Requiring the action to be a monoid homomorphism gives us a really handy property: When we have two consecutive inputs, we can concatenate the two transition functions and arrive at the same transition we get from feeding the entire input into the action. In formulas:
\[\forall m, m' \in M. \phi(m \cdot m') = \phi (m') \circ \phi (m)\]
An important special case arises when we restrict the monoid to be the free monoid \(\Sigma^*\) generated by an alphabet or character set \(\Sigma\). That way we can derive the simplest form of automaton: If we consider an action of the free monoid \(\Sigma^*\) for an alphabet \(\Sigma\) in \(\mathcal{Set}\) on a set \(X\), we recover the type of deterministic transition functions (modulo currying), \(\Sigma^* \times X \to X.\) If \(X\) is finite, these are transition functions for finite deterministic automata.
But why monoids in the first place? Considering monoids and monoid homomorphisms, we can capture the essence of non reversible dynamic processes; a lot of computation will fall into this category so this might be the most interesting case for computer science. But of course this is amenable to generalization: By using group actions on the automorphism group the resulting processes must be reversible. Topological group actions are useful in algebratic topology and Lie group actions find various applications in physics (e.g. general relativity).
Effectful Transition Functions
There are a lot of automatons out there that have effectful transition functions, e.g. non-deterministic automata, probabilistic automata, stack automata and mealy machines. If you are familiar with Haskell, you probably know that most effects can be modeled using monads. A monad \(T: \mathcal{C} \to \mathcal{C}\) gives rise to a Kleisli category \(\mathcal{C}_T\) in which the objects are the objects of \(\mathcal{C}\) and the arrows \(X \to Y\) correspond to arrows \(X \to TY\) in \(\mathcal{C}\); composition of these arrows is called Kleisli composition, as modelled by >=> in Haskell, and corresponds to executing the actions encapsulated by \(T\) in sequence.
We can define a monad \(N : \mathcal{Set} \to \mathcal{Set}\) to model non deterministic computation by
\[ N(X) = \mathcal{P}(X)\\ N(f)(S) = \bigcup_{x \in S} f(x)\\ \eta_N(x) = \{ x \}\\ \mu_N(x) = \bigcup x \]
Monoid actions \(M \to \text{End}_{\mathcal{Set}_N}(X)\) in the Kleisli category for \(N\) exactly model non deterministic transition functions. In Haskell, one could use the list [] monad or one of the monads in logict to achieve a similar result.
A similar feat can be accomplished using a probabilistic monad and yields something akin to a Markov model of some sort. Also stack machines and Turing machines can be recovered with a refined state monad that carries a stack or a tape respectively. Using a writer monad we get a mealy machine.
This allows for a nice intuition: We can choose a basis category \(\mathcal{C}\) to denote the type of functions we consider as computable (every function, primitive recursive functions, functions on finite sets etc.) and add extra features to that category by considering the Kleisli category on \(\mathcal{C}\) for a particular monad.
Start States
Most formulations of automata include a starting state and a set of substates. We can generalize this notion to fit into our framework. Throughout this section, let \(\mathcal{C}\) be a category with a terminal object \(1\), \(X\) an object in \(\mathcal{C}\) and \(M\) a monoid. Note that when a category \(\mathcal{C}\) has a terminal object, its Kleisli category might not neccessarily (is this true? E.g. for IO in Hask, we have several inhabitants of A -> IO ()).
In usual automata theory, a starting state \(q_0\) is an arbitrary element \(q_0 \in Q\), where \(Q\) is the set of states. To model this generally, first observe that this is equivalent to a map \(\phi_0: 1 \to Q\) in \(\mathcal{Set}\). Generalizing, a starting state is just a map \(1 \to X\) in \(\mathcal{C}\).
Note that this allows us to choose a starting state with an effect in a Kleisli category: Using a probabilistic monad this formalizes the notion of a starting distribution, a monad that models non determinism lets us begin at multiple states at once, etc.
Accept States
Accept states usually are a subset \(F \subseteq Q\) of the state set. Subsets in a more general setting are called subobjects and are modelled by classes of monomorphisms: In a category \(\mathcal{C}\) a subobject is a monomorphism \(A \to T\) up to isomorphism in the slice category \(\mathcal{C}/T\). In the special case of \(\mathcal{Set}\), these subobject maps are the canonical inclusions for subsets. In our setting, we consider subobjects \(F \to X\) of the state object \(X\).
When \(\mathcal{C}\) is an (elementary) topos, we get the characteristic map \(X \to \Omega\) of the subobject \(F \to X\). In \(\mathcal{Set}\) this would be a function \(X \to 2\) which checks whether a state \(x \in X\) is in \(F\). This captures the computational meaning of checking for an accepting state, so it might be worthwhile to use this notion even when not in a topos by the definition: Accept states are a map \(X \to 2\).
This definition, again, allows us to incorporate effects: In a probabilistic setting, a map \(X \to 2\) is a Bernoulli distribution for each state in \(X\) that determines whether a process ends at that point or doesn’t. This might provide a worthwhile generalization of the geometric distribution which then models the special case when there is only one state in \(X\). In the case of stack machines, we can also check the state of the stack, like in the usual requirement that the stack must be empty in order for the process to complete. Unfortunately, it doesn’t seem to make much sense with non-determinism and writers.
There are multiple questions I would like to defer at the moment, but that might be interesting to investigate: How much structure is required in a category in order to compose a transition map, an initial state and accept states into one well-behaved function \(M \to 2\) that “runs” the automaton? Maybe CCC? Do automata in this formulation form some kind of algebraic structure (like categories) on their own? Is there a compositional theory? How does Krohn-Rhodes theory relate to this formulation?
We have seen that using a bit of category theory it is possible to bring together various types of automata and machines and build a conceptual framework for all sorts of computation. This might be useful from a theoretical viewpoint (theorems for large classes of automata) as well as a very practical one in languages like Haskell that embrace category theory quite thoroughly. |
Winds of Change…
Turbines creating green energy from West Texas winds
by: NICOLE TRUGILLO/Editor-in- Chief
Electricity is an everyday necessity.
Electricity is so important that scientists are developing ways to produce energy without harming the planet. Wind energy is one of those developments.
According to Salvador Molinar, Title V instructor in Wind and Solar Energy at the Plainview campus of South Plains College, the program teaches students everything they need to know about wind energy.
“Our program basically contains starting the students off with simple electronics and digital electronics where they get the basics on how electricity starts to work and produced,” says Molinar. “Then we go a little a higher, such as working with electricity. We teach them how the motors are hooked up and the contactors. We teach them things that have to be used to make that motor run. We go over it in great detail and get the students to understand how the motor is going to run with all the components.”
Molinar explains that he also takes his students through troubleshooting classes, which will help the students fix a turbine when they are working on one.
“We teach them how to fix motors and find the faults that are causing the turbines to go haywire,” Molinar says. “ELPT (Electrical and Power Transmission Technology) is a class that we teach about electronic controllers, the sensor, and the motors, everything that is going to be operational. ELPT does read anything that might be going wrong with that turbine.”
The ELPT will read it, and as the technician looks at it, he or she can actually go to the turbine, find the problem and fix it, according to Molinar.
“With the ELPT, they also call it escape assistance,” Molinar explains. “They can actually control the turbines miles away from where it is. So, that’s another reason why we teach the ELPT program. That way the students know how to interface those ELPT with the turbine, and not only that, but let’s just say the students decide to go to another company. In a different type of industry, they use the ELPT towards that.”
The wind energy program also teaches students a networking program, which is the communication in the ELPT, according to Molinar. The networking deals with trying to connect the headquarters of the wind energy farm to communicate to the turbine or any other equipment.
“We will even take them through a climbing scenario out at the Reese campus,” explains Molinar. “We take them there. That way they know that climbing a wind turbine is actually for them or not. Because some people are scared of heights, we take them through those scenarios to let them decide if the wind industry is right for them, or they figure out and think,‘This may not be for me. You have to climb.’ We kind of get them ready for the climbing part of it. We get the students ready for all the aspects of it.”
This slideshow requires JavaScript.
According to Molinar, the instructors only let the students climb the little tower, which is located near Building 6 on the Reese Center campus.
“It’s about 30 feet, and we take them through the scenarios and they have to actually repel off of it and do a climb rescue,” says Molinar. “So, they can get the hang of it. If you’re going to be scared of 30 feet, there is no reason why you should be going 200 feet up in the air. Because of safety reasons, we don’t let students go up to the turbine, because there is a lot of liability things that can happen.”
The wind energy program teaches the students how to tie their equipment to themselves.
“We show them how to use the equipment, and when they do go to work, even when they do go through some training on their own, each company will train them on how they want, at least they will know what’s going on,” says Molinar.
Molinar explains that wind energy is produced by magnets rubbing against a wire that is in the generator of the turbine.
“What wind energy does is inside on top of the tower there is a little square box, and then you have the blades right in front of it,” says Molinar. “Inside that square box, there is a generator. When the wind is blowing and making those blades turn, the generator is turning and the generator has magnets in it. When those magnets are turning, they are producing electricity, which is passed on to some transformers. From there, the transformer pushes it up to the electrical lines and sends it and distributes it to different areas.”
According to Molinar, when someone rubs magnets around a piece of wire, they will get some type of electricity.
“That generator has magnets in it, and it has wires inside of it,” explains Molinar. “When you turn those magnets around, the wire will produce some type of electricity. But that’s a lot of magnets and a lot of wires, which produces a lot of electricity. That wind is what’s making that turbine turn.”
Molinar believes that wind energy is becoming more popular, and more companies are trying to build bigger and taller wind turbines.
“The bigger the turbine is, the more wind mass it will capture, and the more energy it will produce,” explains Molinar. “Some companies look into building 500-foot wind turbines. There is also new inventions that they are trying to figure out, such as sending some in an air balloon. They put the turbine way up in the atmosphere, and they produce electricity that way.”
According to Molinar, wind energy is mostly profitable, meaning electric companies won’t lower the electric bill. But there are other ways to benefit from it.
“You can have a small turbine in your yard that will produce electricity for your house,” says Molinar. “A lot of those wind turbines you can get a grant to help pay for it. You can also get the government to help out, and you can get tax breaks. If they put a wind turbine on your property, then you will get a check for them to have it there on your property.”
Molinar says that the reality is that fossil fuels can’t be replenished, and our society needs something to fall back on.
“We probably won’t see it in our life time when the fossil fuels deplenish,” Molinar explains. “For right now, they are thinking of ways ahead of time to produce electricity for our household and our needs. We will always have the wind. Whether it’s 10-mile-per-hour wind or 50-mile-per-hour wind, we will always be producing some type of electricity. It is something that is going to stay here for a long time, and we’re not going to see it go away anytime soon. It’ll be here for the long haul.”
Author: Plainsman Press Staff
The student newspaper of South Plains College.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s |
Skip to main content
Set OS X hostname from the commandline
05-12-2012 | Remy van Elst | Text only version of this article
Table of Contents
This little snippets helps you change all the computer names of a computer running Mac OS X. OS X has 3 computernames, and if you want to change all three you need to use the following commands (as root or via sudo):
scutil --set ComputerName "ChangeMe"
scutil --set HostName "ChangeMe"
scutil --set LocalHostName "ChangeMe"
Where you change "ChangeMe" to the computer name you want to set.
ComputerName is the so-called "user-friendly" name for the Mac, it's what will show up on the Mac itself and what will be visible to others when connecting to it over a local network. This is also whats visible under the Sharing preference panel.
HostName is the name assigned to the computer as visible from the command line, and it's also used by local and remote networks when connecting through SSH and Remote Login.
LocalHostName is the name identifier used by Bonjour and visible through file sharing services like AirDrop
Tags: apple apple-remote-desktop ard hostname mac os-x snippets |
BOR Storyboard
BOR Storyboard
More Options: Make a Folding Card
Storyboard Description
This storyboard does not have a description.
Storyboard Text
• The First Amendment
• This is a free country! I can say whatever I want, whenever I want. The government can't stop me from practicing my religion! This is the best!
• Hey, you, right next to me. I heard the First Amendment has the right for you to make peaceful demonstrations against the government. How about we do that in protest of the new bill? I am so happy that that is one of our rights. LET'S GO!!
• The Second Amendment
• We have the right to keep and bear arms!!! We must have a standing, perfect Militia to against the cruel people! It's apart of the government. How do you not know this?!
• What is your problem? Just get back to work and we can discuss that later!
• The Third Amendment
• I have the right to be in your house if I get permission from you! Just please give me a bed in your home for now, and I'll leave if my commander tells me to.
• GET OUT OF MY HOUSE YOU SICK FREAK! You don't have a right to be here. BYE BYE! Or If you don't leave, I will call the police!
• The First Amendment has it illegal to make a law to establish a religion. The people of the U.S. have the right to freedom of speech, and can say whatever they want. It is also illegal to stop people from practicing their religion and to stop the press from printing what they want. It also illegal to stop people from exercising their rights to peacefully demonstrate against the government.
• The Fourth Amendment
• If you are going to search my house, you must have a good reason to do so. If you don't I won't allow you to come into my home! Why are you even searching my house?! There's nothing to see here.
• The Second Amendment, also called Amendment II, of the United States Constitution says that people have the right to keep and bear arms. The people also have the right to have a standing Militia.
• The Fifth Amendment
• I stand here before the Court. Now, you will have a fair trial and we will protect you until further notice. You've been accused of robbery, and murder, is that correct? I will also respect your legal rights during this process. Now, please speak.
• The Third Amendment, also called Amendment III, of the United States in which it prohibits soldiers from temporarily residing in private homes. This applies to during the peacetime and they can’t reside without getting the permission and consent of the owner. However, the only time when it is legal is during wartime. Still, even if they want to, they have to still follow the law.
• The Sixth Amendment
• Standing in front of me is the accuser and the witnesses. You have a fair trial without an unnecessary delay, and a fair jury. Now, the defendant please speak.
• The Fourth Amendment, also called the Amendment IV, is apart of the Bill of Rights which states that people cannot be searched or having their things taken away without a good reason. It also states that if in fact the government wants to do that (or any law enforcement) they must have reasons to do so.
• Ma'am, I have to search your house because you've been accused of murdering someone. Now, I must enter.
• The Fifth Amendment, also called Amendment V of the United States Constitution, is the section where it protects people from being held for committing a crime unless you have been indicted correctly by the police. In this Amendment is where there is the guarantee of due process. This means that the state and the country have to respect your legal rights.
• Thank you for respecting my legal rights. I will go ahead and start speaking.
• The Sixth Amendment, also called Amendment VI, is the section that for citizens, they are guaranteed a speedy trial (a public one without unnecessary delay) and a fair jury. The people also have the right to know who your accusers are and the nature of the charges and evidence against you. They also have an attorney if the accused person wants one and the chance to confront the witnesses who is accusing the defendant of a crime.
• Thank you judge. Yes, no it's time for me speak. I am grateful that I have all these rights so I can be happier.
More Storyboards By 63eea772
Explore Our Articles and Examples
Try Our Other Websites!
|
importance of print media essay
of enemies, character moves, character weight classes, and so on are also considered inappropriate. Every user is expected to interact with others civilly, calmly, and in a spirit of cooperation. 35 Retailer and consumer goods manufacturers quickly recognised radio's potential to reach consumers in their home and soon adopted advertising techniques that would allow their messages to stand out; slogans, mascots, and jingles began to appear on radio in the 1920s and early television. Particularly since the rise of "entertaining" advertising, some people may like an advertisement enough right to privacy in india essay to wish to watch it later or show a friend.
Now students dont need to carry heavy books: they can browse collaborative media sources like Wikipedia anytime, and get to know about. The White or Yellow Pages. Citation needed However, usage tracking, customer profiles and the growing popularity of niche content brought about by everything from blogs to social networking sites, provide advertisers with audiences that are smaller but much better defined, citation needed leading to ads that are more relevant. Birth of a Salesman (Harvard University Press, 2005 In the United States Jacobson, Lisa. Coca-Cola advertisement from the 1890s, advertising is an audio or visual form of marketing communication that employs an openly sponsored, non-personal message to promote or sell a product, service or idea. 5 Advertising's projected distribution for 2017 was.4 on TV,.3 on digital, 9 on newspapers,.9 on magazines,.8 on outdoor and.3 on radio. Eric Partridge, Paul Beale, A Dictionary of Catch Phrases: British and American, from the Sixteenth Century to the Present Day, Routledge, 1986,.164. As students use Facebook nowadays, so teachers have come up with this idea of making a common page for all the students to share the updates regarding any changes in class schedule, dates due for assignment submission and quizzes, etc.
The answer is: Nothing will work, but everything might. What no one would have told you, could have told you, was what actually happened: craiglist became a critical piece of infrastructure.
Persuasive essay power point
Significance of the handkerchief in othello essay
Computer games introduction essay
The Rise of the Tea Party: Political Discontent and Corporate Media in the Age of Obama. Although there are debates about the encyclopedic merits of several classes of entries, consensus is that the following are good examples of what Wikipedia is not. Archived from the original on March 16, 2006. Wikipedia is not a soapbox or means of promotion "WP:promotion" redirects here. Ayer Son was founded in 1869 in Philadelphia. Its primary (though not exclusive) means of decision making and conflict resolution is editing and discussion leading to consensus not voting ( voting is used for certain matters such as electing the Arbitration Committee ). The resulting ads were among the most-watched and most-liked Super Bowl ads. Archived from the original on December 20, 2014. Wikipedia:Articles for deletion/Common outcomes is not official policy, but can be referred to as a record nike inc essay of what has and has not been considered encyclopedic in the past.
Essay writing on the importance of Social media in Education!
importance of print media essay |
News, Culture & Society
Make-up and skincare contain a cocktail of chemicals that could cause breast cancer
Make-up and skincare products contain a cocktail of chemicals that could leave women infertile and even cause breast cancer.
These chemicals include parabens and BPA, which are considered ‘gender benders’ due to them encouraging male breast growth.
After analysing more than a 100 women, US scientists found those who have these chemicals in their urine produce abnormal amounts of the reproductive hormones oestrogen and progesterone.
Excessive oestrogen has been linked to fibroids and polycystic ovary syndrome, while too little prevents eggs maturing and being released from the ovary. Too much progesterone is associated with both breast cancer and unusual vaginal bleeding.
Previous research suggests parabens, which are used as preservatives in cosmetics and skincare, mimic oestrogen and may cause cancer, while Bisphenol A (BPA), which is added to perfumes to make scents last longer, has been linked to infertility.
Make-up and skincare products contain chemicals that could leave women infertile and even cause breast cancer. These chemicals include parabens and BPA, which are considered ‘gender benders’ due to them encouraging male breast growth (stock)
Researchers from George Mason University, Virginia, analysed the urine samples of 143 healthy women, all of which were pre-menopausal and not taking birth control.
What are parabens?
Parabens are hormone-disrupting chemicals, which are used as preservatives in skincare, cosmetics and hair products.
They mimic oestrogen and may cause cancer, weight gain and reduced muscle mass.
What is BPA?
The so-called ‘gender-bending’ chemical Bisphenol A (BPA) is added to receipts to make their writing appear darker without using ink.
Health fears prompted BPA to be replaced with its ‘healthier alternative’ Bisphenol S (BPS), however, evidence suggests BPS disrupts babies’ development in the womb.
What is triclosan?
Triclosan, a chemical added to personal-care products to prevent bacterial contamination, has been linked to reduced heart health and an underactive thyroid.
It is added to antibacterial soaps, body washes, toothpastes and cosmetics, as well as some clothing, furniture and toys.
Triclosan also stops infections responding to antibiotics, which may contribute towards the resistance crisis.
The chemical was banned in soaps in the US two years ago. No such ban exists in the UK.
The FDA declared antibacterial soaps containing triclosan are no more effective than hot water and regular cleansers at killing bugs.
Lead author Dr Anna Pollack said: ‘This study is the first to examine mixtures of chemicals that are widely used in personal care products in relation to hormones in healthy, reproductive-age women, using multiple measures of exposure across the menstrual cycle, which improved upon research that relied on one or two measures of chemicals.’
Each woman provided between three and five urine samples over two menstrual cycles. These were assessed for the chemicals BPA, parabens, chlorophenols and benzophenones.
Chlorophenols are used as preservatives in cosmetics and have been linked to acne, liver injury and cancer.
Benzophenones are added to products like lip balm and nail varnish to protect them against UV light. They also prevent products like soap losing their colour and scent. Studies have linked benzophenones to cancer and infertility.
Blood samples were taken from all of the participants to determine their levels of the following hormones – oestrogen, progesterone, FSH and LH.
FSH stimulates an egg to grow in the ovary, while LH causes the egg to be released. Oestrogen stop FSH production so only one egg matures per cycle and also stimulates LH’s production. Progesterone thickens the uterus wall to prepare for a fertilised egg.
Results, published in the journal Environment International, suggest exposure to all of the studied chemicals increases a woman’s progesterone levels.
Those with higher levels of chlorophenols in their urine also produce more oestrogen and FSH, while parabens and BPA increase oestrogen.
Too much ostroegen is linked to the condition oestrogen dominance, which can lead to non-cancerous growths in the uterus and PCOS.
Chlorophenols are associated with reduced ostrogen, FSH and LH production. Low FSH levels suggests a woman is not producing eggs, while reduced LH can be a sign of PCOS.
Dr Pollack said: ‘What we should take away from this study is that we may need to be careful about the chemicals in the beauty and personal care products we use.
‘We have early indicators that chemicals such as parabens may increase oestrogen levels. If this finding is confirmed by additional research, it could have implications for oestrogen dependent diseases such as breast cancer.’
Comments are closed. |
Name: tonkori.
Type: Box Lyre > Chordophone.
Hornbostel-Sachs No#:
Country: Hokkaido Japan Sakhalin Islands Russian Federation.
Region: Far East Asia.
Description: The tonkori (トンコリ) is a plucked string instrument played by the Ainu people of Hokkaidō, northern Japan and Sakhalin. It generally has five strings, which are not stopped or fretted but simply played “open”.
The instrument is believed to have been developed in Sakhalin. By the 1970s the instrument was practically extinct, but is experiencing a revival along with the increased interest in Ainu heritage. |
Page 15 - Pearson English
Page 15 - Pearson English
P. 15
Is a bilingual world a better one?
Text: Marcos Mendonça
Bilingualism can benefit people both professionally and cognitively, and it can also benefit
them socially. It stands to reason that a person who is able to speak two or more languages is
better equipped to socialize with others who are also bilingual.
A bilingual person is more likely to have friends from others: They have to think about who speaks which language
foreign countries, so they’re usually more understanding to whom, who understands which content, and the times
of other cultures. Several studies show that bilingual and places in which different languages are spoken.
children can be better at communication than monolin- Interestingly, they also found that children who were not
gual children. One of the experiments was published in bilingual but had been exposed regularly to another langua-
the journal Psychological Science: ge were just as talented as the bilingual children at this task.
"We took a group of children in the United States, ages 4 to 6, Bilingual children also develop better global and multicultu-
ral perspectives.
from different linguistic backgrounds, and presented them
with a situation in which they had to consider someone else’s Learning a language often means learning about the culture
perspective to understand her meaning. For example, an associated with it. Children who are familiar with several
adult said to the child: cultures will become familiar with the strengths and weaknes-
“Ooh, a small car! Can you move the small car for me?” ses of each. In turn, they’ll likely find it easier to understand
and be more accepting of people from other cultures.
Children could see three cars — small, medium and large —
but were in position to observe that the adult could not see According to a research paper from Osaka Jogakuin College,
the smallest car. Since the adult could see only the medium children who are bilingual and bicultural from a young age
and large cars, when she said “small” car, she must be may not adopt exactly the same proportions of each culture;
referring to the child’s “medium.” rather by trial and error, they’ll decide what works best for
them. This process may not always be a conscious decision
They found that bilingual children were better than mono- — they’ll choose which cultural elements to adapt simply by
lingual children at this task. If you think about it, this experiencing the elements of both.
makes intuitive sense. Interpreting someone’s utterance Bilingual children maintain a strong sense of their own
often requires attending not just to its content, but also to identity while developing sensitivity towards other people
the surrounding context. What does a speaker know or and cultures. Since bilinguals need to be aware of which
not know? What did she intend to convey? Children in language to speak in which situation, a bilingual child is
multilingual environments have social experiences that more aware of the needs of the listener. Personally, I believe
provide routine practice in considering the perspectives of
10 11 12 13 14 15 16 17 18 19 20 |
IV. Channel Variables
1. Channel or Message Modality
1. Means of transmission
2. Mediated (print, audio, video) to human
3. But what distinguishes one type from another: Feedback, control, focus?
4. You can mix text and image in print or video
5. A messy and confused variable when you inspect it
2. Effects of Modality
1. Good evidence for modality as elaboration moderator
2. Arguments stronger in human and print
3. Cues stronger in audio and video
3. An ELM Analysis of Modality (Booth-Butterfield & Gutowski, 1993; CQ)
1. Editorials on Ambiguous Topic of Senior Comps
2. Strong and Weak Arguments (Text claims)
3. Strong and Weak Cues (Source Credibility)
4. Print, Audio, and Video Modalities
5. Results
6. Interpretation
4. Channel Conclusions
1. Functions most often as elaboration moderator
2. Another reason why TV uses so many cues
3. Still not exactly sure what distinguishes various channels/media
Attitude by Arg, Cue, and Modality
Back to VAR Main Page
Updated March 21, 1996; Copyright © SBB, 1996 |
The A-Z on net neutrality
Headlines have been buzzing around about something called ‘net neutrality.’ The Quaker Campus would like to answer some of the Frequently Asked Questions about net neutrality so that the College community has a better understanding of what is at stake with repeals.
Net Neutrality info.jpg
What is net neutrality?
Net neutrality means that all internet content is treated equally by your Internet Service Provider (ISP). For example, net neutrality protections have kept AT&T from slowing down Facetime calls to try and increase sales for high speed data packages.
Who protects net neutrality?
The Federal Communications Commission (FCC) passed Title II of the Communications Act in 2015, which prohibits ISPs from giving preferential treatment to certain websites, or creating separate packages based on internet speed.
What would it mean for net neutrality to be repealed?
Rolling back protections for net neutrality would mean the open internet would no longer be open. Your ISP could introduce what are called ‘fast lanes,’ where you pay more for fast, strong connections. They could also block access to certain websites, or substantially slow down access. In countries like New Zealand, which does not have net neutrality, websites are broken down into categories and consumers must pay for each category separately. For example, Netflix and CNN are two different kinds of websites, so access to both would cost more money.
Who would be affected by net neutrality repeals?
Everyone in the United States. If you have a laptop, tablet, smartphone, or a television that accesses the internet, you will be affected by net neutrality rollbacks. Right now, every American who connects to wifi receives the same internet experience regardless of their ISP, and if net neutrality precautions are overturned this will not be the case.
Why does this matter?
Net neutrality has allowed for open communication around the country. The open internet has revolutionized small business ownership, social justice movements, and the way underserved communities are able to access information. Imagine not being able to freely search the internet to do your homework or research for a project. Removing net neutrality will make access to the internet an elitists’ game, and dramatically change the way we use the internet.
What can I do to stop net neutrality rollbacks?
The FCC will vote on Dec. 14 on whether or not to repeal Title II and net neutrality with it. Three out of the five members of the FCC are Republicans, and the measures are supposed to pass. Call your Senators today to let them know net neutrality is important to you, and you advocate for open internet for all. |
Jacque Fresco - The Mechanistic Point of View
3 (3 Likes / 0 Dislikes)
• Embed Video
• Embed normal player Copy to Clipboard
• Embed a smaller player Copy to Clipboard
• Advanced Embedding Options
• Embed Video With Transcription
• Embed with transcription beside video Copy to Clipboard
• Embed with transcription below video Copy to Clipboard
• Embed transcript
• Embed transcript in:
Copy to Clipboard
• Invite a user to Dotsub
People have a name for things. If they see a child draw pretty pictures, right away, they think the child is gifted. That means "I haven't the slightest idea how a six-year-old could draw a profile of a human being that looks so accurate." That's what they're saying when they say he's gifted. "I have no idea of how that occurs." When the fish migrates thousands of miles to the spawning grounds without [the] mother fish opening up a map of the world showing the fish how to get to the spawning grounds, they invented a word for that: 'instinct'. It means "I haven't the slightest idea of how these fish do that." Instinct is a dead word, noise. It tells us nothing. But a word that says "I'm gonna try to find out how it is that fish can do that." So they studied the magnetic currents under the Gulf Stream which fish follow. Once you begin to know that birds can follow Earth's magnetic currents because if you strap a small magnet to the bird's head he doesn't migrate. It becomes confused. So, it was called years ago 'A Mechanistic Point of View' and people hated that word. "Mechanistic?! I'm not a machine. I'm flesh and blood! I'm a thinking, feeling [being]." They loved that and they moved away from the mechanistic point of view which hurt society no end. It's a mechanistic point of view. All that it says is, look: You can't roll your eyes to the right unless there's a muscle and the nerve cells that feed that muscle. You can't twist your arm unless muscles run in that direction. That's all that a mechanistic point of view stated: that nothing occurs-... The mechanists also stated this: that nothing is self-activating. That's the most difficult thing for people to grasp. Trying to simplify that: A sailboat cannot sail. It is moved by the wind. A plant cannot grow, all that's nonsense, [and] still exists today. A plant requires warmth, temperature, moisture, gravity all of those things. Although you don't see the connection they're all connected. That living beings do not acquire knowledge or information through ethereal means. They acquire it by banging their head against the wall, slipping on ice ... then they design anti-slip systems. First you have to slip on the ice. No government to my knowledge ever anticipated the future. "This is the direction we're heading in, let's prepare for social change." No, they try to keep things as they are.
Video Details
Duration: 2 minutes and 37 seconds
Country: United States
Language: English
Producer: William Gazecki
Director: William Gazecki
Views: 320
Posted by: ltiofficial on Jul 27, 2011
From outtakes of "Future by Design".
Note: This 'working location' is currently open for translation into all languages. Once acknowledged, all completed and proofread 'official' translations can be found at the Repository location at: http://dotsub.com/view/c6532f5f-3b62-4fb5-aab3-bfc37eb6134c. To join/help with these efforts: http://tinyurl.com/LTcontacts
Caption and Translate
Sign In/Register for Dotsub to translate this video. |
Statutory auditor
From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Statutory auditor (1762)
Statutory auditor is a title used in various countries to refer to a person or entity with an auditing role, whose appointment is mandated by the terms of a statute.
World usage[edit]
In India, the term "statutory auditor" refers to an external auditor whose appointment is mandated by law. A "statutory audit" is a legally required review of the accuracy of a company's or government's financial records. The purpose of a statutory audit is the same as the purpose of any other audit - to determine whether an organization is providing a fair and accurate representation of its financial position by examining information such as bank balances, bookkeeping records and financial transactions.[1] The European Union has also made efforts to mandate statutory audits and statutory auditors on an EU-wide level.[2]
Japanese usage[edit]
A statutory auditor (監査役, kansayaku) is an official found in Japanese kabushiki gaisha (business corporations). Similar roles are also found in Taiwan and South Korea, which use modified forms of Japanese corporate law, although the English translation most commonly employed for the role in these countries is supervisor or supervisory board.[3]
Statutory auditors are elected by shareholders and hold a position in the hierarchy alongside the board of directors. A kabushiki kaisha must have at least one statutory auditor, unless the transfer of shares is restricted in the articles of incorporation. If the company is classified as a "large" company (i.e. with more than ¥500 million in paid-in capital or ¥20 billion in liabilities), it must have three statutory auditors, or an audit, compensation and nominating committee system similar to that used by public companies in the US.
Statutory auditors have several functions:
1. They initiate derivative suits against the board of directors on behalf of the shareholders, and represent the company in those suits. This right was once reserved for the auditor; however, following precedent from a recent lawsuit against Daiwa Bank, groups of shareholders can now file suits themselves without going through the auditor.
2. In "mid-size" and "large" companies (i.e. with more than ¥100 million of paid-in capital), they have the right to attend board meetings to monitor the directors' actions.
3. In "mid-size" companies, they audit the financial reports submitted by the company.
4. In "large" companies, they oversee auditing performed by external certified public accountants, i.e. external auditors.
Statutory auditors are often selected from among the senior management of the company, or are former directors of related companies (such as suppliers or keiretsu partners).
The role of the statutory auditor in Japan is distinct from the role of an external auditor or internal auditor as understood in English-speaking countries, which has led to some confusion when discussing their role in internationally prominent cases such as the Olympus scandal.[4] The Japanese association of statutory auditors has recommended adopting the English title "audit & supervisory board member" to avoid such confusion.[3]
1. ^ "Register of Statutory Auditors". Retrieved 21 August 2013.
2. ^ "Green Paper: The Role, The Position and the Liability of the Statutory Auditor Within the European Union" (PDF). European Union. Retrieved 21 August 2013.
3. ^ a b "Background and Goals: New Recommended English translation of "Kansayaku" and "Kansayaku-kai"" (PDF). Japan Audit & Supervisory Board Members Association. Retrieved 21 August 2013.
4. ^ Chambers, Richard. "Setting the Record Straight: The Real Internal Auditors at Olympus Have Not Been Implicated". Retrieved 21 August 2013. |
Sub Saharan Africa
Originally published in xxx
Benin 1989-1991
From 1974 to 1989, dictator Mathieu Kérékou ran Benin as a socialist state, earning it the nickname “Africa’s Cuba.” After 17 years of rule by the Marxist-Leninist Kérékou, an economic crisis and massive social unrest spurred a civic movement consisting of students, teachers, university faculty, and union leaders that called for a paralyzing nationwide strike in January 1989. As suppression efforts failed and French political and economic pressure increased, Kérékou was forced to legalize the oppositional parties. He called for the holding of a National Conference in February 1990. Delegates to the conference included leaders from the opposition parties, unions, universities, religious associations, the army, and women’s groups. A new constitution was drafted despite Kérékou’s protests (Karatnycky and Ackerman, 2005). Free elections were reestablished in 1991, and Kérékou was defeated by Nicéphor Soglo.
South Africa 1994
The struggle against apartheid went on for many decades. During this period, the view on nonviolence as the means to change the system changed several times. The struggle included an armed ingredient most of the time, but nonviolence was always a central factor for the resistance and the building a new society. In the following, only a few of the many nonviolent activities are mentioned.
In June 1977 in the township of Soweto, a number of leading citizens and representatives from several organizations met to elect a “Committee of Ten.” These included people with experience from earlier African National Congress (ANC) campaigns. The aim was to develop a nonviolent strategy for democratic self-government in Soweto. The police arrested all of them, obviously very afraid of such ideas. Two years later, the Soweto Civic Association was created, and it planned for the use of several nonviolent techniques. Some tried to learn from history by reading about foreign revolutionaries. Especially influential was a manual written by Filipino activists in 1974, “Organizing People for Power.” The Filipino activists said that success would come from helping people win modest but real improvements in their lives. After a terrible crackdown in 1977, many Africans were afraid of getting involved in political groups. Townships organizing in South Africa in the early 1980s succeeded in doing what Polish dissidents had done in the 1970s. Instead of directly defying a regime steeped in its own orthodoxy and capable of repression, they opened space for independent action within the system, through which they could organize people to help themselves (Ackerman and DuVall, 2003, pp. 343-347).
In August 1983, more than 500 organizations joined forces to form the United Democratic Front (UDF). This was a wide coalition of churches, trade unions, students, women, and many other groups. African people stood side by side with whites and Indians, with the goal being a peaceful and just future. The UDF arranged a number of nonviolent demonstrations and other actions.
An important test for the UDF was the government’s decision to create a new parliament with separate chambers for whites, Coloreds, and Indians. Africans were not to be represented, but would be given greater independence in their towns. Prime Minister P.W. Botha’s motives were to present a better international image and to weaken resistance to apartheid in the country. The UDF called for a boycott of the elections, and the turnout was down a third from the previous election. In elections for Colored and Indian representatives to the racially segregated parliament, less than 20 percent of those eligible voted.[1]
Apartheid depended on the support of the white population, but white-owned businesses also depended on the support of blacks. Several middle-aged women in Port Elizabeth came to their civic committee with a plan to boycott businesses. In the summer of 1985, civic leader Mkhuseli Jack spoke to a large crowd at a funeral, which was the only type of public gathering the government then allowed. “We won’t buy in town on Monday,” he told the crowd. “We won’t even buy a box of matches on Monday!” Though Jack and other leaders were jailed, the boycott cost white business owners 30 percent of their business. Store owners pleaded with government officials to give in to the boycotters. Chief DuPlesssis said, “If they don’t want to buy, what sort of crime is it? . . . You can’t shoot all these people. You can’t lock them all up” (Ackerman and DuVall, 2000, p. 357).
Many whites supported the struggle against apartheid. Young men drafted into in the South African Army started South Africa’s End Conscription Campaign (ECC), which became an important force within that country’s white community to oppose not only obligatory military service but also apartheid minority rule. Many outside South Africa saw the ECC as a way to concretely demonstrate that work against militarism and racism could and should be part of the same movement (Meyer, 2000).
In Alexandra, the Alexandra Action Committee (AAC) also fought apartheid with a consumer boycott targeting black officials who collaborated with the white government. Stores and taxis turned them away. Churchgoers would not listen to their priests. The people of Alexandra demonstrated that if they refused to cooperate with white oppressors or black collaborators, the apartheid system could not remain in power. Under the leadership of the AAC, townspeople proceeded to elect their own town executive and establish their own criminal justice system. As much as possible, they would govern themselves.[2]
Global opposition to apartheid grew in the late 20th century, leading to widespread sanctions and divestment abroad and growing unrest and oppression by the National Party within South Africa. Sanctions, protests, and brutal police and military interventions in demonstrations made South Africa an international outcast. In 1990, after a long period of resistance, strikes, and unrest by various anti-apartheid movements, most notably the ANC, the National Party government took the first step toward relinquishing power when it lifted the ban on the ANC and other left-wing political organizations, and released Nelson Mandela from prison after 27 years. Apartheid legislation was gradually removed from the statute books, and the first multiracial elections were held in 1994.[3] When Mandela was elected president, he asked former white leader De Klerk to be his vice president. The first government had representatives from both the former apartheid regime and the ANC as ministers.
The role of the ANC’s military wing, Umkhonto we Sizwe (MK), in the liberation of South Africa is highly debated. Some say that MK was more important for the leaders of the apartheid regime than for the ANC. MK made it easier for them to justify the brutal use of violence against all ANC members. They could label all activists potential terrorists. But MK was also important as a symbol of resistance for many Africans, although it was never a military threat to the South African government. An interesting analysis of the ANC’s operational strategy in 1976-1986 is found in Howard Barrell’s Ph.D. dissertation “Conscripts to their Age.”[4] Gail Presby’s recent research on the realities of MK and nonviolent tactics in the ending of apartheid also suggest the need for a more nuanced analysis of the road to revolution in South Africa. (Presbey, 2006)
Madagascar 2002
The outcome of the 2001 presidential election was disputed, as both President Ratsiraka and Marc Ravalomanana both claimed victory. This was the background for Madagascar to be the next scene of a nonviolent revolution. Massive protests with more than half a million people on the streets every day for a week eventually forced Ratsiraka to resign. On January 28, 2002, a several-week-long general strike began. Banks, shops, and other businesses closed. The daily demonstrations began when the island’s High Constitutional Court announced the results of a recount. It declared that Ravalomanana had received 46 percent of the vote, versus 40 percent for Ratsiraka, and that neither candidate had an overall majority. The court ordered a runoff to be held within 30 days. This only strengthened the opposition, and led to what Financial Times described as “daily public demonstrations over the past two weeks not seen since independence from France in 1960.”
For a time Ravalomanana and his supporters controlled the capital Antananarivo and Ratsiraka set up a rival government in the eastern port city of Tamatave. Roadblocks set up around the capital prevented transport of people and goods.
The old rivalries between highland and coastal people were used by both sides to support their case. Propaganda was played every day on the television and radio stations that backed Ratsiraka, but these stations were attacked by students and eventually forced to stop their broadcasting of what the students called propaganda.
For a long time the armed forces refused to take sides, but small groups of supporters on both sides were armed, and around 70 people were killed altogether. Most of the violence came from supporters of Ratsiraka.
In May 2002, the constitutional court declared that Ravalomanana had won the election. He became the new president of Madagascar and then moved to decentralize government power.[5]
Tagged with: , , , , , , , , ,
Posted in In English, Political comment and analysis
Leave a Reply
You are commenting using your account. Log Out / Change )
Google+ photo
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this: |
Print This Page Print This Page
Fully Developed Flow
Fully developed flow is when the viscous effects due to the shear stress between the fluid particles and pipe wall create a fully developed velocity profile for a fluid as it travels through the length of a straight pipe. The velocity of the fluid for a fully developed flow will be at its fastest at the center line of the pipe (equation 1 laminar flow), and the velocity of the fluid at the walls of the pipe will be at its slowest. Due to the change of velocity across the velocity profile it is common to describe the fluid velocity as an average velocity.
(Eq 1) $v_C = \frac{2Q}{πR^2}$
vc = Maximum Velocity
Q = Flow Rate
R = Pipe Radius
As mentioned earlier the viscous effects are caused by the shear stress between a fluid and the wall of a pipe. This shear stress is always present despite how smooth the pipe is. Also, the shear stress between the fluid particles moving past one another is a product of the wall shear stress and the distance from the wall. Refer to equation 2 to calculate the shear stress between fluid particles for laminar flow.
(Eq 2) $τ=\frac{2τ_wr}{D}$
τ = Shear Stress
τw = Shear Stress at the Wall
r = radial distance from the center of the pipe to point of interest
D = Pipe Diameter
Due to the shear stress on the fluid particles as the fluid moves past the pipe wall a pressure drop will occur as can be seen in equation 3.
(Eq 3) $P_2=P_1-ΔP$
The viscous effects, pressure drop, and pipe length will affect the flow rate. To calculate the average flow rate, taking these into account, equation 4 would be used to calculate the flow rate for laminar flow.
(Eq 4) $Q=\frac{πD^4ΔP}{128μL}$
L = Pipe Length
μ = Dynamic Viscosity
Entrance Length
When fluid first enters a pipe its flow is not fully developed. Instead the fluid has to travel a certain distance undisturbed before it becomes fully developed. This is also true when a fluid goes around a curve in the pipe system. The curve in the pipe will disrupt the velocity profile of the fluid, and it will need to travel a certain distance in a straight pipe to have a fully developed flow again. Refer to equation 5 to calculate the entrance length for laminar flow, and equation 6 to calculate the entrance length for turbulent flow.
(Eq 5) $\frac{L}{D}=0.06·Re$
L = Entrance Length
D = Pipe Diameter
Re = Reynolds Number
(Eq 6) $\frac{L}{D}=4.4(Re)^{1.6}$
Notice from the diagram that a boundary layer starts to form as the flow becomes developed. The boundary layer represents where the viscous effects are produced along the pipe wall to create the velocity profile. Also notice while the flow is developing there is a region where there is no viscous effects; this is called the inviscid core.
Leave a Reply |
Main Menu
Alcohol Use and Abuse
Alcoholism is a disease that includes the following four symptoms:
Problems with Alcohol Without Being an Alcoholic
Finding Out If You Have a Drinking Problems
Risk of Developing Problems with Alcohol
About l in every 12 adults abuse alcohol or are alcohol dependent. In general, more men than women are alcohol dependent or have alcohol problems. And alcohol problems are highest among young adults ages 18-29 and lowest among adults ages 65 and older. People who start drinking, at age 14 or younger, are at much higher risk of developing alcohol problems at some point in their lives compared to someone who starts drinking at age 21 or after.
The risk for developing alcoholism tends to run in families. The genes a person inherits partially explain this pattern, but lifestyle is also a factor. Your friends, the amount of stress in your life, and how readily available alcohol is also are factors that may increase a person's risk for alcoholism.
It is important to remember that risk is not destiny. Just because alcoholism tends to run in families doesn't mean that a child of an alcoholic parent will automatically become an alcoholic too. Some people develop alcoholism even though no one in their family has a drinking problem. Similarly, not all children of alcoholic families get into trouble with alcohol. Knowing you are at risk is important, though, because then you can take steps to protect yourself from developing problems with alcohol.
What is a safe level of drinking?
Certain people should not drink at all, however:
Is it safe to drink during pregnancy?
No, alcohol can harm the baby of a mother who drinks during pregnancy. Although the highest risk is to babies whose mothers drink heavily, it is not clear yet whether there is any completely safe level of alcohol during pregnancy. The damage caused by prenatal alcohol includes a range of physical, behavioral, and learning problems in babies.
Babies most severely affected have what is called Fetal Alcohol Syndrome (FAS). These babies may have abnormal facial features and severe learning disabilities. Babies can also be born with mild disabilities without the facial changes typical of FAS.
Does alcohol affect women differently?
Is alcohol good for your heart?
Studies have shown that moderate drinkers are less likely to die from one form of heart disease than are people who do not drink any alcohol or who drink more.
When taking medications, must you stop drinking?
Reference: National Institute on Alcohol Abuse and Alcoholism
Last updated May, 2017 |
Print Article
Childhood Obesity is a Serious Epidemic
The little munchkin that you are holding in your arms today is at a greater risk of obesity than you were at that age. The world has changed, and there is less emphasis on leading a healthy lifestyle for many people. Because of the ease of fast food and because people would rather have the convenience and taste of processed food, the obesity levels are rising. This is happening with more than just children though. Adults are at risk as well, but if the children do not start changing, the future of humanity will look rather bleak.
Some Disturbing Facts on Childhood Obesity
Approximately 20 percent of the children in the United States are obese, and many millions more are overweight and creeping ever close to obesity. One out of every seven children who is in a low-income family is obese. These statistics do not seem as though they are going to be getting any better. In fact, as each year passes, the children of the world seem to be putting on more and more weight. This is going to cause some serious problems in the future.
Obese children are at a higher risk of getting heart disease and other serious diseases as they get older. Asthma and sleep apnea levels are higher in these children. Type 2 diabetes hits at a much younger age now. The medical problems are countless, and they will increase the medical costs for your child as he or she grows and well into adulthood. Of course, more than just the medical problems can affect the child.
The psychological factor is something that you can't ignore. Children who are obese often have lower self-esteem, and they have a higher change of developing anxiety and depression. The obese children tire easily, and that can affect their concentration in school.
What Causes the Problem?
The main factors are the diet and the lack of exercise. When parents provide their children with only unhealthy snacks, fast food and processed food, the child comes to crave these items. Instead of reaching for an apple when they are available, the child will go for the chips. The instilling of these unhealthy eating habits is detrimental, and is one primary reason that children are getting fatter.
The other reason is the lack of activity. Children today are content to spend their time inside and in front of the computer or television. They do not want to get out and experience the world and have fun running and playing. The sedentary life is one that breeds more obesity into the world. The "big boned" excuse of the past just isn't going to work. You need to make changes for the health of your child.
Help the Children!
You need to take charge and change the way that you eat in your household. Take all of the unhealthy foods out of the house and replace it with fresh, tasty and healthful alternatives. Get out there and exercise with the kids. Let the youngsters join teams and get outside where they can run around in the real world rather than their videogame worlds! |
Posted in
When we think about where tea came from, China often comes to mind. China has a long history associated with tea, and it was where we British bought our tea for a while. Tea was not limited to China however. Its specific origin is unknown, though general consensus says it started in the area where the borders of Burma, India and China meet. Though barely any ancient documented evidence exists, what little does survive shows that historically Indians were aware of the potential of the plant, particularly those living in the north east near the country's modern borders. Rather than indulging overly in tea back then, Indians used various plants and spices to produce herbal teas, as they were interested in their wide variety of medicinal benefits.
The widespread cultivation and commercialisation of tea in India occurred when the British East India Company decided to create their own tea source, in order to compete with the Chinese monopoly. China demanded payment in silver for goods such as tea. Being able to only pay in silver, Britain started to trade in opium as a way to offset losses, and in cases resulted in outright piracy and smuggling. Initially Chinese authorities turned a blind eye to the trade as it was to their benefit, but eventually the amount of opium coming into the country was affecting the treasury along with the well being of the people, with a rise in opium addiction. They banned opium and started impounding and destroying opium shipments. This led to the First Opium War of 1839-42 and the Second Opium War of 1856-60, in which Britain and China fought over differences of opinion on diplomacy and trade.
The appearance of the British East India Company's tea plantations in India ran parallel to the rising tensions and eventual fallout with China. At first the planters tried to use seeds from Chinese tea plants to begin the plantations, but many failed. They turned to the hardier native variety, which quickly proved their worth. By the time of the Second Opium War, there were several dozen acres of tea trees growing in North East India, and by the end of the 19th century, tens of thousands of tons of tea were being produced and exported. Last year, India produced around 1.2 million tons of tea, putting it in second place behind China for tea production worldwide.
Despite the large quantities available to the Indian people, they never took to it with the same gusto that the British did. In the 1950s, the India Tea Board embarked on an advertising campaign to try and boost tea use within the country, which was successful in a way. Despite the fairly low amounts consumed per capita, India's large population means that roughly 70% of the tea now produced in India is consumed within the country.
Check back soon for a look at some of the teas India is famous for!
Previous Story
Next Story |
Usage Notes
I Before E Except After C
The famous rhyme is wrong. Here's why.
One question we get asked a lot is why so many English words don't follow the "i before e" rule: i before e except after c. Well, the English language can be inconsistent. This is what makes English such a vibrant and expressive language, but it can also make it a nightmare to learn. We've been influenced by languages with such different spelling paradigms that we don't have tidy orthography.
That look you give your teacher when she explains all of the exceptions to the 'I Before E' rule.
This bothered grammarians, so they tried to create rules to make English tidier and easier to learn. I before e is one of those rules. Unfortunately, it was created after most of the 'ie' words were. Oops.
Smart people tried to adapt the rule to actually follow English spelling. That's where we got this variant:
i before e except after c
or when sounded as 'a' as in neighbor and weigh
Nice try, but it's still full of exceptions. To make the above jingle accurate, it'd need to be something like:
I before e, except after c
Or it appears in comparatives and superlatives like 'fancier'
Or 'i' as in 'height'
Or in compound words as in 'albeit'
And that doesn't even rhyme.
Love words? Need even more definitions?
|
<< Chapter < Page Chapter >> Page >
• Define electric current, ampere, and drift velocity
• Describe the direction of charge flow in conventional current.
• Use drift velocity to calculate current and vice versa.
Electric current
Electric current is defined to be the rate at which charge flows. A large current, such as that used to start a truck engine, moves a large amount of charge in a small time, whereas a small current, such as that used to operate a hand-held calculator, moves a small amount of charge over a long period of time. In equation form, electric current I size 12{I } {} is defined to be
I = Δ Q Δ t , size 12{I = { {ΔQ} over {Δt} } ","} {}
where Δ Q size 12{ΔQ} {} is the amount of charge passing through a given area in time Δ t size 12{Δt} {} . (As in previous chapters, initial time is often taken to be zero, in which case Δ t = t size 12{Δt=t} {} .) (See [link] .) The SI unit for current is the ampere (A), named for the French physicist André-Marie Ampère (1775–1836). Since I = Δ Q / Δ t size 12{I = ΔQ/Δt} {} , we see that an ampere is one coulomb per second:
1 A = 1 C/s size 12{"1 A "=" 1 C/s"} {}
Not only are fuses and circuit breakers rated in amperes (or amps), so are many electrical appliances.
Charges are shown as small spheres moving through a section of a conducting wire. The direction of movement of charge is indicated by arrows along the length of the conductor toward the right. The cross-sectional area of the wire is labeled as A. The current is equal to the flow of charge.
The rate of flow of charge is current. An ampere is the flow of one coulomb through an area in one second.
Calculating currents: current in a truck battery and a handheld calculator
(a) What is the current involved when a truck battery sets in motion 720 C of charge in 4.00 s while starting an engine? (b) How long does it take 1.00 C of charge to flow through a handheld calculator if a 0.300-mA current is flowing?
We can use the definition of current in the equation I = Δ Q / Δ t size 12{I = ΔQ/Δt} {} to find the current in part (a), since charge and time are given. In part (b), we rearrange the definition of current and use the given values of charge and current to find the time required.
Solution for (a)
Entering the given values for charge and time into the definition of current gives
I = Δ Q Δ t = 720 C 4.00 s = 180 C/s = 180 A.
Discussion for (a)
This large value for current illustrates the fact that a large charge is moved in a small amount of time. The currents in these “starter motors” are fairly large because large frictional forces need to be overcome when setting something in motion.
Solution for (b)
Solving the relationship I = Δ Q / Δ t size 12{I = ΔQ/Δt} {} for time Δ t size 12{Δt} {} , and entering the known values for charge and current gives
Δ t = Δ Q I = 1.00 C 0.300 × 10 - 3 C/s = 3.33 × 10 3 s.
Discussion for (b)
This time is slightly less than an hour. The small current used by the hand-held calculator takes a much longer time to move a smaller charge than the large current of the truck starter. So why can we operate our calculators only seconds after turning them on? It’s because calculators require very little energy. Such small current and energy demands allow handheld calculators to operate from solar cells or to get many hours of use out of small batteries. Remember, calculators do not have moving parts in the same way that a truck engine has with cylinders and pistons, so the technology requires smaller currents.
[link] shows a simple circuit and the standard schematic representation of a battery, conducting path, and load (a resistor). Schematics are very useful in visualizing the main features of a circuit. A single schematic can represent a wide variety of situations. The schematic in [link] (b), for example, can represent anything from a truck battery connected to a headlight lighting the street in front of the truck to a small battery connected to a penlight lighting a keyhole in a door. Such schematics are useful because the analysis is the same for a wide variety of situations. We need to understand a few schematics to apply the concepts and analysis to many more situations.
Questions & Answers
Damian Reply
absolutely yes
Akash Reply
characteristics of micro business
Do somebody tell me a best nano engineering book for beginners?
s. Reply
what is fullerene does it is used to make bukky balls
Devang Reply
are you nano engineer ?
what is the actual application of fullerenes nowadays?
Abhijith Reply
is Bucky paper clear?
s. Reply
Do you know which machine is used to that process?
how to fabricate graphene ink ?
for screen printed electrodes ?
What is lattice structure?
s. Reply
of graphene you mean?
or in general
in general
Graphene has a hexagonal structure
what is biological synthesis of nanoparticles
Sanket Reply
what's the easiest and fastest way to the synthesize AgNP?
Damian Reply
types of nano material
abeetha Reply
many many of nanotubes
what is the k.e before it land
what is the function of carbon nanotubes?
I'm interested in nanotube
what is nanomaterials and their applications of sensors.
Ramkumar Reply
what is nano technology
Sravani Reply
what is system testing?
preparation of nanomaterial
Victor Reply
Himanshu Reply
good afternoon madam
what is system testing
what is the application of nanotechnology?
silver nanoparticles could handle the job?
not now but maybe in future only AgNP maybe any other nanomaterials
I'm interested in Nanotube
Smarajit Reply
Privacy Information Security Software Version 1.1a
Berger describes sociologists as concerned with
Mueller Reply
Got questions? Join the online conversation and get instant answers!
QuizOver.com Reply
Practice Key Terms 3
Get the best Algebra and trigonometry course in your pocket!
Source: OpenStax, Abe advanced level physics. OpenStax CNX. Jul 11, 2013 Download for free at http://legacy.cnx.org/content/col11534/1.3
Notification Switch
Would you like to follow the 'Abe advanced level physics' conversation and receive update notifications? |
You are on page 1of 5
American Life in the 17th C
Chapter 4 Theme: In the Chesapeake region, seventeenthcentury colonial society was characterized by diseaseshortened lives, weak family life, and a social hierarchy that included hardworking planters at the top and restless poor whites and black slaves at the bottom. Despite the substantial disruption of their traditional culture and the mingling of African peoples, slaves in the Chesapeake developed a culture that mixed African and new-world elements ,and developed one of the few slave societies that grew through natural reproduction.
I. Southern Plantation Society
A. Despite Challenges, Chesapeake flourished
1. 2. 3. Difficult Living
a. Disease and family life
Tobacco increased Indentured Servants
a. b. Headright System (+50) Bacon’s Rebellion, 1676
Background of Slavery
1. 2. 3. Immigration of Slaves increased after 1670’s Middle Passage to West Indies to SC or RI. Limitations on freedom
a. No literacy, chattels are slaves, no freedom with conversion
II. Two Groups: Ebony or Ivory?”
A. African-Americans
1. 2. 3. Many hardships Developed mixed culture Ultimate goal: Freedom
a. b. c. Buy freedom NY Revolt, 1712 Stono Revolt, 1739
1712 NY Slave Revolt
1733 St. John Slave Revolt
1739 Stono Rebellion
1741 NY Conspiracy 1791-1804 Haitian Revolution
B. White Americans
1. 2. Strict social structure
a. Planters, yeoman, landless
1760 Tacky’s War (Jamaica)
Unique lifestyle
III. New England Society
A. Puritan townships evolve
Structured and ordered government. Congregationalist Half-way Covenant Salem Witch Trials
Benefit of fast rivers Rocky soil discouraged Ag. Lots economic activities Slavery diminishes Middle or lower class
B. Economic Diversity
C. Mono-cultural
Review Questions
Compare and contrast the ways in which economic development affected politics in Massachusetts and Virginia in the period from 1607 to 1750 (2005, A). Analyze the impact of the Atlantic trade routes established in the mid 1600’s on economic development in the British North American colonies. Consider the period 1650-1750. (2002, B) Analyze the cultural and economic responses of TWO of the following groups to the Indians of North America before 1750.
a. b. c. British French Spanish
a. b. c. New England Chesapeake Middle Atlantic Bacon’s Rebellion Pueblo Revolt (1680) Salem witchcraft trials (1692) Stono Rebellion (1739)
Compare the ways in which TWO of the following reflected tensions in colonial society (2003, A).
a. b. c. d. |
Road Safety
Alcohol, teenagers and the safety of our roads
Alcohol and Driving
Alcohol is a mood changing drug that slows down your central nervous system. After just a few drinks your blood and alcohol concentration rises and so does the probability of being in a fatal crash.
Drinking driving is a factor in about one in every five crashes in NSW where someone loses their life. Although you might feel normal, no one drives well after drinking alcohol. NSW has three blood alcohol limits for drivers: zero, under 0.02 and under 0.05. It is illegal for you to drink alcohol while you are driving, even if your blood alcohol concentration stays below your legal limit.
Road Safety Awareness Week
Monday, May 4th, 7am to Sunday, May 10th, 11pm
Around 186 300 children under 18 years die from road traffic crashes annually, and rates of road traffic death are three times higher in developing countries than in developed countries. This week is about raising awareness to the dangers of driving and how we can keep ourselves and others safe.
- One in 10 teens in high school drinks and drives.
- Factors that help to keep teens safe include parental involvement, minimum legal drinking age and zero tolerance laws, and graduated driver licensing systems. |
US election systems more secure, but voting problems persist
By |
ATLANTA (AP) — Tuesday's midterm elections will mark the first nationwide voting since Russia targeted state election systems in the 2016 presidential race, with federal, state and local officials seeking to reassure the public their voting systems are secure.
The Department of Homeland Security has been working over the last year to improve communication and intelligence-sharing with state and local election officials who were largely left in the dark about Russian activities in 2016. Federal agencies including Homeland Security and the FBI have opened a command center to help state or local election offices with any major cybersecurity problems that arise.
"Things are running pretty smoothly around the country," said Matt Masterson, senior cybersecurity adviser with the Department of Homeland Security.
The same can't be said about early voting and the voter registration process in some states.
Voters casting ballots early have encountered faulty machines in Texas and North Carolina, inaccurate mailers in Missouri and Montana, and voter registration problems in Tennessee and Georgia. In other states, including Kansas, Election Day polling places have been closed or consolidated.
Some of the problems have prompted lawsuits, and there is concern that last-minute court rulings on voter ID requirements in a handful of states will sow confusion among voters and poll workers.
The challenges come amid a surge of interest, with registrations and turnout running well ahead of what is typically seen during a midterm election.
Wendy Weiser, who oversees the democracy program at the Brennan Center for Justice at NYU, said she believes efforts to restrict voting access have been "more intense" than in previous elections but said efforts to combat them also have increased dramatically.
"These hurdles often work because people aren't willing to go to the trouble of going through the various hoops that the state puts in front of them," Weiser said. "Really motivated voters can overcome these kinds of hurdles."
The issue of election security is clearly on the minds of voters. A recent Chicago Harris/AP-NORC poll found that nearly eight in 10 Americans are at least somewhat concerned about potential hacking of election systems, with 45 percent saying they are extremely or very concerned.
A key concern is that five states exclusively use electronic voting machines that do not produce a paper trail that can be used to verify election results if questions about the final tally arise.
Georgia, where the governor's race is among the most closely watched elections in the country, is one of the states where voting rights groups have been raising numerous concerns about election security and voter access.
Over the weekend, reports of security vulnerabilities within the state's online voter registration portal prompted a flurry of accusations from the Secretary of State's office, which is overseen by Republican gubernatorial candidate Brian Kemp. His office claimed without providing evidence that Democrats had tried to hack into the system. Democrats dismissed that as an effort to distract voters from a problem in a system he oversees.
Kemp is one of two Republicans who are overseeing elections this year while also running for governor. Former President Jimmy Carter is among those who have called for him to step down, but Kemp has insisted that he will continue to do the job while warning of the potential for voter fraud.
While experts have said voter fraud is exceedingly rare, Republicans have used it to justify strict voter ID laws, purging of voter rolls and other measures that make it more difficult to vote.
President Donald Trump has often cited voter fraud as a reason he lost the popular vote two years ago and has raised the issue during his recent campaigning. On Monday, he was asked what proof he had of people attempting to vote illegally in the midterms.
"All you have to do you is go around, take a look at what's happened over the years and you'll see," he said outside Air Force One on his way to a rally. "There are a lot of people, a lot of people, my opinion and based on proof, that try and get in illegally and actually vote illegally."
Nationally, some 6,500 poll watchers are being deployed by a coalition of civil rights and voting advocacy groups, including Common Cause, to assist people who encounter problems at the polls. That is more than double the number sent to polling places in 2016, while the number of federal election monitors has declined.
The U.S. Justice Department announced Monday that it is sending personnel to 35 jurisdictions in 19 states, which is less than the 67 jurisdictions in 28 states that received assistance in 2016.
Long reported from Washington. |
Abert's Towhee, or Pipilo aberti, is a large, stocky, shy sparrow. The Abert's Towhee has one of the smallest total distributions of any U.S. birds species, making it much sought after by birders who travel to the Southwest desert to observe it.
Abert's Towhee perches on a fencepost near a pond.
It has a distinct black face, pale gray bill, gray-brown upperparts, paler gray-brown underparts, and a rust-brown vent. The tail is long and darker than upperparts with rust-brown undertail coverts.
This sparrow is found primarily in the Colorado and Gila River valleys in Arizona and parts of California, Nevada, Utah, and New Mexico. It generally prefers desert riparian and desert wash habitats. The preferred habitat includes dense vegetation, including thickets of willow, cottonwood, mesquite, and saltcedar. But, Abert's Towhee is also found in cities or suburbs in exotic plantings.
This bird lays two to five blue white eggs with dark brown speckles. They are laid in a nest made of forbs, bark pieces, leaves, and vines lined with dead grass and mammal hair. The nest is usually built in a tree or bush, often 25 to 30 feet above the ground. The female towhee incubates eggs for about 14 days.
The Abert's Towhee primarily eats seeds and insects. |
Wine villages
In France, depending on the region, the rural wine-growing habitat is spread amongst villages, sometimes fortified, hamlets or estates surrounded by vineyards. A village is very often associated with a community, with its secular and religious social functions, as well as its wine-related functions (brotherhood, syndicalism, promotion, collective management of spaces).
There are numerous factors in the historic or recent process of grouping together in a village: access to water, defence imperatives, planned development, relief and the nature of the soil.
If the traditional wine villages fit harmoniously into the landscape, it is because they are mainly constructed from local materials (limestone or chalk, schist, wood, clay, etc.). Sometimes the villages or towns have managed to conserve vineyards, contained within their boundaries, which is the origin of the interesting urban or peri-urban wine-growing landscape. |
A Zoroastrian Liturgy A Zoroastrian Liturgy - keaton.ga
glossary of zoroastrian terms avesta - aban phl pers water name of a yazad presiding over water name of the tenth day of the month according to the zoroastrian religious calendar name of the eighth month ab zohr phl lit libation to the waters a section of the yasna y62 11 y70 achaemenian the dynasty which ruled iran from the time of cyrus the great 559 b c to the invasion of alexander the great 330 b c, avesta zoroastrian scripture britannica com - avesta avesta sacred book of zoroastrianism containing its cosmogony law and liturgy the teachings of the prophet zoroaster zarathushtra the extant avesta is all that remains of a much larger body of scripture apparently zoroaster s transformation of a very ancient tradition the voluminous, zoroastrianism new world encyclopedia - this image known as a faravahar is one of the most common symbols of the zoroastrian religion once frequently used on persian royal inscriptions as a sign of divine authority it has come to represent the human soul or guardian angel and is still used in modern zoroastrianism, zoroastrianism overview zoroastrian zoroaster - the rock engraved image to the right is called a fravahar or farohar also spelt faravahar fravahar farohar is the modern word for the united fravashi, catholic encyclopedia the avesta new advent - originally the sacred scriptures of the parsees were of far greater extent than would appear from the avesta in the form in which we now possess it only a relatively small portion of the original has in fact been preserved and that is collected from several manuscripts since no single codex, the three magi were zoroastrian priests not kings or - the magi were educated in bactria modern afghanistan and sent out as missionaries visits from the magi were a time of celebration they often brought new sciences and ways of building the magi began at a time when zarathustra s people were still nomads violently raiding villages, zoroastrianism introduction simplified zoroastrian - the rock engraved image to the right is called a fravahar or farohar also spelt faravahar it is an image found on rock inscriptions and carvings commissioned by the ancient persian achaemenian kings the image is usually portrayed above the image of a king and the figure in the farohar is identical to the king below in features as well as clothing, evidence for jesus and parallel pagan crucified saviors - the prominent three parallel pagan gods appear to be dionysos spelled dionysis or dionysus in the dvd mithras and osiris so i want to pay special attention to these three they are mentioned in short interview clips with unsuspecting christians leaving a billy graham crusade, byzantine theology holytrinitymission org - excerpts from byzantine theology historical trends and doctrinal themes by john meyendorff please get the full version of this book at your bookstore, amazon com customer reviews the mysteries of mithras - this was a very informative book about faith of mithras the faith of mithras is one the religion which may have influence on zoroastrian faith and the zoroastrian doctrines may influenced judaism christianity as well as islam |
Back Up Next
Continue digital year indicator and calendar readout control levers and - May 2015
This is Buchanan's 'first draft' for the design for a mask of the decimal year counter. The faceted wheels compliment this arrangement nicely. One can see that such a mask is necessary to cover the spaces between the decimal wheels. Given the need to have the drive pinions between the wheels there is no way around the space needed between the wheels and so a mask is necessary to give the counter a clean look.
Someone who likes to see the details of a particular mechanism might ask why we are hiding the decimal and carry pin assemblies. The simple answer is that we are only masking these features from the front angle view. If one looks above or below these features are completely visible. The mask is no different from the enamel rings we employ for the dials. One needs some type of background to make sense of the various data readouts from the machine.
We see here an overall front elevation of the movement with the calendar continuing to take shape.
Buchanan now begins to flesh out his concepts to drive the counter and the evolution is illustrated below. The individual drawings are shown below. These serve as both an illustration of how Buchanan develops his ideas for the design of a component as well as the the way it would have been done by the master clockmakers centuries ago before the aid of computer design.
As is the case in much of the rest of this project, accomplishing the power feed was not straight forward. One cannot simply have a drive coming from a constant source, say the time train since this is part of the calendar which is driven from the celestial train. Either way, the year has to change over in accordance with the perpetual calendar in which it resides. So it must follow the lead of the perpetual module. The problem here is that we have the drive train actuated daily within the calendar works. But only the day and date dials are driven daily and the date is also controlled through the perpetual module. Therefore we need a series of levers and detents that act as ‘logic gates’ to allow the other dials to change at the appropriate time even though the drive gears behind them move daily. This is one of the reasons why the Burgess clutch was chosen over conventional friction clutch work. In the latter, the clutch would be acted upon daily leading to premature wear. In the Burgess design the friction is next to none. Why not simply connect the year counter directly to the calendar drive train? Here we have two issues. The first is the fact that the drive train is initiated daily without regard to the variances of the leap years. So while the rest of the calendar would be correct since it is controlled by the perpetual module, the year counter would, after a few years, be seriously out of step with the New Year. The next reason is that we need the year to ‘flip over’ instantaneously at twelve midnight on December 31st. A direct drive would cause the year digit to slowly move throughout the year. While other makers might have compromised on this last issue, we will not.
First Buchanan has to outline the functionalities required. Next the first drive concepts are fleshed out. The four vertical rectangles represent the year counter digit disks.
The first sketch is an overview of the clutch design. Next a detail of the clutch release is sketched. The pivoted lever design was later modified to a cam.
Now tooth and pinion counts are assigned to turn the concept into a practical design that can be made into the actual components. Yet even at this point, we really do not see any actual recognizable components. These are all made ‘as we go’. This is another testament to Buchanan’s incredible abilities as they apply to design and fabrication. Next a few of the parts are realized upon the stylized drawing.
Here we have the drive train to the year counter being fabricated. The last photo shows the combination drive/bevel wheel set.
The first photo shows a staking tool to insert the arbor that will connect both the bevel and standard drive wheel. Next a jig is set upon the movement plate to position the thread tapping tool perfectly parallel to the plate in which it will create a threaded hole.
Here holes for the jewels are drilled in the cock that will hold the drive/bevel wheel. These are drilled simultaneously from above to give exact perpendicularity. The next two photos show this gear set connected to the leap year drive.
The drive to the year counter is fabricated. It is a bevel wheel that is driven from the drive bevel wheel shown above.
These two videos demonstrate the bevel drive to the digital year counter.
Here we have a view of another interesting and unique wheel. This eight sided cam serves the same purpose as what a ‘star wheel’ does in conventional clockwork. It will ‘click-over’ the digital counter in a discrete movement once per year at midnight rather than in a continuous motion throughout the year as what would be encountered a conventional odometer. For people who are very observant and have closely followed this project over the years you will notice that the jeweled roller wheel looks familiar. It is, in fact, a repurposed part that was originally designed for our grasshopper escapement back in January of 2009. That design was later changed and this part became unnecessary. There were four of these, so maybe Buchanan will find another location in the future for the other three?
These photos show the major components of a clutch that will control when the year counter is engaged. As with many other systems in this machine, the way the counter is engaged is a bit more involved than one might expect in a conventional application. The drive wheels behind each dial are all meshing together and when being driven under normal conditions, that is when the clock is not in demonstration mode, are briefly driven once daily at midnight through the remontoire. A full explanation of this will be made later as the calendar is developed, but at this point suffice it to say that one cannot simply have a direct drive to the year counter from the calendar wheel drive train. If it was it would be activated daily instead of yearly, hence the need for the clutch which will allow the counter to be driven by the calendar drive once per year.
The first photo shows a jeweled roller that will act upon a cam seen in the next photo. When the clutch is activated at midnight on December 31st, the horizontal arbor will rotate the attached cam by one revolution, (arrow 1). The cam allows the dog tooth clutch to engage for just the right amount of revolution to advance the year by one digit, (arrow 2).
In this video the cam control for the dog clutch is demonstrated. In practice the clutch would drive the digital counter once per year at midnight. The digit turn over will be perfectly aligned with its neighbor once the eight-sided cam on the right is completed.
The completed digital year counter. It looks a bit like the year counter in the time travel vehicle from the 1960 movie based on Jules Verne's book, The Time Machine
We now return to the calendar control assemblies
This is a roller which controls the time when the dog clutch is allowed to engage. In the second and third photos one can see the roller partially pushing against the flange of the left hand side of the dog clutch resulting in those teeth being pried halfway apart. This is just for demonstration purposes. In reality the roller will hold the clutch open and thus disconnect the counter for all but one day of the year. Then on December 31st it will snap leftward via a momentary connection to a lever which will be controlled by the logic machinery of the rest of the calendar work; allowing the clutch to turn the output wheel to the counter to advance the year digit by one. The logic machinery accounts in perpetuity when the year should change.
The part cut out forms the center section of the slave connector between the leap year detent and the year counter so when the counter is tripped the leap year detent is also lifted.
The matchstick gives an indication of how small this part is. The arrow points out the roller, described earlier, which holds the clutch open preventing the counter from advancing except once yearly. The center bridge in the second photo is the slave connection to the leap year detent.
These photos show the fabrication of what will eventually be six dual armed cams that will form the basis of a controller actuating the various levers connected to the detents on the crenulated dial wheels and others that will read pin positions. These cams will be mounted to the arbor of the drive input wheel which is fed directly from the calendar remontoire. In the parlance of computer design the drive input acts as the ‘clock controller’. In other words all of the functions of the rest of the calendar are performed during each cycle of the input drive. In this case one-half revolution per day. The combination of the various rotating cams, rockers, levers; bias springs, detents and crenulated wheels compose the ‘logic circuits’ of this mechanical analog computer complete with cycle clock controller, a fixed program and memory (in the form of the perpetual modul). These are represented diagrammatically in the realm of computer programming by logic gates which in turn are connected to form the circuits. The basic logic gates were described in the April 2015 segment.
The first photo shows the initial milling of each part. These parts are one of the first times that Buchanan has employed a computer aided milling machine. The fact that we will need six identical complex parts made this a good choice. Now the question is, how does one remove these parts from the surrounding material? Here Buchanan employs a clever technique. He fills the milled out sections with car body repair filler, known here in the United States by the generic name, Bondo and this can be seen in the second photo. Next the parts are milled from the opposite side until enough material is shaved away to meet where the Bondo is filling the spaces from the part from the front, third photo and first one below.
Next heat is used to soften the Bondo and the parts fall cleanly away.
A rocker part being prepared for milling. There were three of these identical parts needed.
Of course a part made by a CNC mill still needs many additional machining and finishing steps before completion. Here we have the cam’s collect being decoratively shaped. Next the rest of the cam profile is filed by hand. This cleans up the machine marks but also gives the part a hand-made finish by introducing the subtle imperfections in the part’s shape that would be absent from a computer generated part. I can’t speak for others, but I know that I can spot a clock made entirely from a CAD-CAM design and production. Only a handful of parts in this project will be made in this fashion since there are few areas where a number of identical parts are needed.
This part is an example of one of the lever rocker arms and pair of one-way impulse paddles. The impulse paddles are shown by the black arrows. Each is a compound paddle made of two parts. The paddle itself, arrow 1, is mounted loosely on the arbor and can move back and forth leaving the arbor to which it is mounted unaffected. The paddle is actuated by one of the rotating input cams mounted in what was described previously as the ‘clock controller’ in the mechanical logic circuitry of the calendar. The area of contact is near the tip of arrow 1. The input cam can rotate in either forward or reverse. If the paddle is pushed in one direction, upwards in this photo, the paddle will push the pin connected to the curved part next to it. That piece is fixed to the arbor and will cause the entire arbor will rotate in a small arc. If the cam encounters the paddle in the opposite direction, the paddle swings away from the curved piece and nothing happens. The occurs for the second paddle but in the opposite direction, arrow 2. The part below that is a lever rocker and is fixed to the arbor. This basically converts the rotary motion of the input cams into a back and forth motions. The two pins located by arrows 3 and 4 will push against the various levers that will ultimately control the outputs of each dial in the calendar. The spring acts as a return bias for the rocker as soon as the rotating cam has passed the point of contact on the paddle. The calendar will require three of these units, but the configurations and locations of the paddles on each one is different.
In this video we see a single pair of rotating cams out of what will be three pairs as well as one of three lever rockers. Each lever rocker is actuated in either forward or reverse of the rotating cam depending upon whether it is contacting an active or passive paddle. The rotating cams provide the impulse timing for all of the interactions of the rest of the components forming the logic circuits in the calendar. The calendar moves ahead or in reverse depending upon the rotation of clock's drive and the cams which are mounted to it.
The month wheel in the first photo shows a straight bar with a pin on the upper arm. This is the year select pin mounted to the month dial drive and which will come into play once per year in December. When another lever senses a pin on the perpetual date mechanism immediately above indicating that it is the first day of the month, then together these will signal the slave connector lever to allow for the year counter to advance.
The calendar is now taken to pieces for the next phase of construction. The second photo shows two of the three rocker assemblies having compound impulse paddles. One can see the differences in the parts configuration between them.
Above is a photo of many, but not yet all, of the connecting levers that bridge the mechanical circuit from the timing cams mounted on the input clock drive to the detents that control the output to the calendar dials. This photo brings to mind what Buchanan had said when beginning the complex set of connecting linkages for the strike train back in December 2010. He said making wheels is easier and rather straight forward in their fabrication, positioning and depthing. But levers have a far more complex set of criterion than a simple wheel center. They move in two dimensions while wheels remain fixed in one position. Any small change in their shape or displacement in relation to the object they act upon or are being acted upon whether that be a cam or another lever becomes a complex problem to solve. Long levers that have compound movements in relation to each other will, by the very nature of their geometry, magnify any error in the design of their shape or the positioning on their respective arbors.
This three-quarter view shows some of the complexity of the calendar components. The logic clock drive is represented by the drive wheel, B and arbor A. The wheel just barely visible below the circular opening in the brass plate belongs to the remontoire. Upon arbor A are mounted the six rotating timing cams which begin the logic circuitry of the calendar numbered 1 through 6. The first cam is largely obscured by the upper temporary plastic plate. The two circled areas show two of the three rocker assemblies, the third being obscured by components in the foreground.
These two photos show a side and top view of the clock drive arbor with the timing cams. Notice in the second photo how the stack of timing cams appears to be closely matched one on top of the other but they are not precisely aligned in the vertical plane. There are subtle differences in the timing of the actuating levers to the various calendar components. If these were indeed perfectly aligned there would be no need for six individual cams, only three would suffice.
Today Buchanan begins another lever for the calendar as seen in the first photo. This oversized piece is fitted into the existing assembly to test for clearances, next photo. The same procedure as has been done countless times before when a lever is made. This exercise was especially prevalent in the strike train.
These photos show the development of a triple compound lever for the year select function. First a paper pattern is made to the largest size that can be fitted into the available space. This allows maximum flexibility for Buchanan to create what he calls “the prettiest form to connect all the vital parts”.
The third and fourth photos show the three rough forms, 1, 2, and 3, layered one upon the other and these are pivoted on a pair of pivot points, 4, and 5. The entire set is supported by and rotates in a small arc around arbor, 6, (out of field of view, second photo).
Here is a pair of great before and after shots of the year select lever. What a lovely transformation! I think Buchanan succeeded in finding the prettiest from to connect all the vital parts. The numbers are referring to the same parts as before. The names reflect the lever's function. The month select lever checks for the month of January. The date select checks for the first day of the month. When both of these inputs get a positive signal, the output lever will allow the year counter to advance an example of an AND logic function.
Here the compound lever is installed. 1 is where the date select lever is positioned, 2, the month select lever and 3 is the output or operand lever. In other words if the levers represented by 1 AND 2 are both correctly encountering a pin, these will deliver a signal, (a push) to the output (operate) lever that will connect to the year unlatch lever allowing the year counter to advance. This is an example of a mechanical AND gate where if two conditions are met, there will be a positive output.
The year select lever now has its impulse connector installed. The push this lever will give to the compound set of levers will allow them to detect if the pins for the first of the month as well as December are in their correct positions. That impulse is given by the logic cams attached to the input rotating arbor, the ‘clock’ for the calendar logic circuitry. The next photo shows the select lever with its impulse lever installed, yellow circle.
The year select lever is now installed. It reaches diagonally from the upper right hand corner to the lower left where it connects with the rotating logic cams. This view shows clearly the complexity of parts that have been installed so far within the calendar.
In this video the year select lever is demonstrated under all conditions of its function. First with the lever touching (reading) both the day and month pins resulting in a positive push - output (operative) to actuate the year counter release. Next with only the day pin read, next only the year pin read, and next with neither pin read; under all of which there is no operative. And finally back to both date and month pins read. This compound lever assembly is one example of the logic gates used in the calendar. In this case it is an AND gate where both conditions of reading the date and month pins must be met for there to have an output.
The second video shows the year select lever controlling the year counter under a demonstration drive. The year counter is now equipped with the star wheel and roller giving the year rotation accurate positioning. The year select lever is now reading from the perpetual calendar module and controlling the release of the counter. The year for this demo advances at each half rotation of the cam pack, but in reality this is not the case. The cam pack normally rotates one half revolution per day the year counter will advance only when the logic circuitry through the perpetual calendar module permits it to change.
These two photos show the installation of bias springs on various parts.
This shows a good view of some of the actuating levers. These follow the same curvilinear, organic ivy and spur design developed throughout this project and also demonstrated extensively in the strike train control systems.
Perhaps this side elevation will give the viewer a bit more appreciation for the calendar subsystem’s complexity. The calendar module with its remontoire drive and safety clutch components requires a quadruple plate structure which is easily seen in the first three metal plates and then completed by the temporary plastic front plate. When the plates are finished there will be very little left of the two rearmost plates. The entire calendar and its remontoire are completely removable from the rest of the clock via one fastener.
This photo gives an additional impart as to the overall complexity that the machine has taken on so far.
Back Up Next |
Wednesday, 17 March 2010
Armenian Genocide Recognition
On the 4th of March 2010, a US Congressional Committee was given the task of deciding whether or not to recognise the Armenian Genocide. They voted 23 to 22 in conviction that the killings were in fact an act of genocide despite discouragement from the Obama government. The question arising here is why nearly 100 years after the events; governments are only just recognising what happened in Armenia as genocide. So why are they reluctant to speak up and label the massacres as genocide?
During the years of 1915-1917 it is estimated that around 600,000 Armenians were massacred through acts such as death marches, mass burnings, deportations, drowning and poisoning. This does not include the 25 concentration camps set up to exterminate the Christian population of the Ottoman Empire. It is also forgotten that the Armenians were not the only victims within this genocide; it is the conviction of the International Association of Genocide Scholars that the Ottoman campaign against Christian minorities of the Empire between 1914 and 1923 constituted genocide against Armenians, Assyrians, and Pontian and Anatolian Greeks. The Turkish government still refuses to acknowledge the killings as genocide on the basis that ‘there was no systematic attempt to destroy the Christian Armenian people’. So what does constitute an attempt to destroy a people?
20 Countries have recognised the killings as genocide including Argentina, Belgium, Canada, France, Italy and Russia, yet controversially the European Union has said Turkish acceptance of the Armenian genocide is not a condition for Turkey's entry into the bloc. America has also not wanted to recognise the killings as genocide, despite one of Obama’s election campaign promises being to identify the killings.
So why are countries reluctant to acknowledge the genocide? Many countries are reluctant to recognise the events as genocide for diplomatic reasons as Turkey takes offence to any country that recognises the events officially as genocide. In 2006, France held a parliamentary vote which would make it a crime to deny that the Armenians suffered genocide. The bill never became law, but Turkey consequently cut off all military ties with France.
The decision that has now been taken by the US Congressional Committee on the 4th of March 2010 has led to Turkey now withdrawing their ambassador from Washington, despite the fact that the Obama government recognised that the decision of the Congressional Committee to acknowledge the events as genocide could not only jeopardise USA and Turkish relations but also the fragile peace between Armenia and Turkey.
The fragile relationship between Turkey and Armenia is also a significant factor within this debate. After years of hostility and war, the two countries signed a pact (which is not binding and has not been ratified) in 2006 to open diplomatic ties and their shared border and some countries fear recognising the genocide could increase hostility between the two countries.
What does the British government say? Britain’s stance is currently that ‘the events of 1915 should be left to historians.’ The regional assemblies of Wales, Scotland and Northern Ireland all now recognise the genocide which begs the question why not the national parliament? The same argument lies within the USA; as 42 out of 50 states have officially recognised the genocide, why is it so difficult for the federal government?
It would be unthinkable for any country not to recognise the Holocaust, Rwandan Genocide or the Srebrenica Massacres, so who decides what constitutes a genocide? Should it be about governments and diplomacy, or about people and victims? And why in this modern age are politicians still disinclined to use the ‘G’ word when addressing conflicts such as Darfur?
By Chloe Smith
1. A joint declaration by Britain, France & Russia in May 1915 vowed that all members of the Ottoman government would be personally liable for what was then described as a "crime against humanity".
Parliament at the time commissioned a study in the genocide referred to as the Blue Book
In 1919 at the Paris peace conference Britain demanded the indictment of the Turkish Leaders.
Winston Churchill would have been astounded at the current governments position when in 1929 I quote "Whole districts were blotted out in one administrative Holocaust"
The term Holocaust was used first in relation to the Armenians in the Ottoman empire by the New York Times.
Raphael Lemkin coined the term genocide with the Armenian's upper most in his mind.
The above facts have been conveniently overlook
by HMG to responses received over the past 15 years.
HMG's responses cannot stand up to scrutiny as has been shown by the eminent human right lawyer Geoffrey Robertson QC.
The independent review has shown how parliament has been misled.
History has been manipulated. The consequences are many, future generations are denied the truth and the lessons to be learned, it demeans the memories of the victims and because there has been no "closure" the problems fester within all the parties involved, thus making political settlement on other issues even more difficult.
John T
2. John:
It's interesting that in this case, if "History has been manipulated", it has been manipulated for the benefit of current political relationships (extraneous to the actual event), rather than out of a genuine desire by the UK government to cover up what happened. I wonder how many UK ministers and civil servants would, if removed from their political context, be fully supportive of efforts to gain recognition for the Genocide.
3. Hope for this cause lies within the fact since America have publically declared the acts as genocide others have followed. Due to previous political ties hopefully the UK will fall into line and start to acknowledge these tragedies for what they are. Genocide.
Sweden and Catalonia have both declared the acts genocide since the USA have- this gives the cause hope, after all these years of silence from governments that their cause will be recognised and blame will be rightfully placed. |
Lack Of Exercise Poor Eating Habits
Lack Of Exercise Poor Eating Habits
Lack Of Exercise Poor Eating Habits Or Maybe Health Issue
Being overweight is one of the main problems first world nations face in today’s society. People are not as physically active as they were in the past, and when you couple this with bad eating habits you end up with an extreme and potentially deadly condition called obesity.
There are many reasons why people are overweight. It can only be a lack of exercise and poor eating habits as mentioned above, and more often than not this is indeed the case. However, there are those rare cases where a person is overweight when they have no reason to be.
Some people may exercise and eat right, yet still gain weight. For people like this, it may be a physical condition called hypothyroidism. Iodine Plus 2 for weight loss is used if your thyroid is the problem. The reason for this is because your thyroid is an essential gland that creates hormones called T3 and T4, these hormones help regulate various bodily functions, the main of which is your metabolism.
As I am sure everyone is aware, your metabolism is what burns off the calories you take in when you eat. When you suffer from hypothyroidism, your metabolism can slow down to a crawl, so it is burning almost no calories, even if you are eating healthily and exercising, you are still taking in more calories than your metabolism is burning off.
One of the causes of hypothyroidism is a deficiency in iodine. Iodine is a trace chemical produced in your body, and it is used by your thyroid to allow it to function. In some cases, your body does not provide iodine as it should which then causes problems for your thyroid and thus, your metabolism.
Iodine Plus 2 for weight loss works by supplementing your body’s ability to produce iodine. By getting extra iodine, you give your thyroid the fuel it needs to keep operating at peak efficiency. You can get this excess iodine from a variety of sources, either naturally by eating seafood such as fish or kelp (which has a high amount of natural iodine, making it an excellent choice).
Or you can take artificial iodine supplements prescribed by your doctor. While iodine is most often the cause of hypothyroidism, it is not always the cause. So if you think your thyroid is to blame do not just start taking iodine and thinking that is sufficient. Not only may it not work, but too much iodine is just as bad as too little.
So before turning to Iodine Plus 2 for weight loss, go to your doctor and ask them what is going on. They can check to see if your thyroid is the problem and find out the cause for it as well. If it is something as simple as an iodine deficiency, then that is easily overcome by dietary changes or those supplements I mentioned.
On the rare occasion, it is something more serious your doctor will be able to help you through it. Also keep in mind that the sooner they catch the problem, the better the chances are that they can fix it before it becomes something significant.
About the author
Willie DeJarnette
Add Comment
Click here to post a comment |
English to Swedish: more detail...
1. fathers:
2. father:
3. Wiktionary:
Detailed Translations for fathers from English to Swedish
fathers [the ~] nom
1. the fathers
Translation Matrix for fathers:
NounRelated TranslationsOther Translations
fäder fathers
Related Words for "fathers":
father [the ~] nom
1. the father
– a male parent (also used as a term of address to your father) 1
far; fader
2. the father (priest; padre)
präst; fader
3. the father (daddy; dad; papa)
farsa; pappa; far
1. father
2. father (pater)
Translation Matrix for father:
NounRelated TranslationsOther Translations
fader father; padre; priest
far dad; daddy; father; papa
farsa dad; daddy; father; papa
pappa dad; daddy; father; papa dad; daddy
präst father; padre; priest assistant minister; chaplain; clergyman; curate; minister; pastor; preacher; priest; shepherd; spiritual caretaker; vicar
- begetter; beginner; don; forefather; founder; founding father; male parent; sire
VerbRelated TranslationsOther Translations
- beget; bring forth; engender; generate; get; mother; sire
OtherRelated TranslationsOther Translations
Fader father
pater father; pater
Related Words for "father":
Synonyms for "father":
Antonyms for "father":
Related Definitions for "father":
1. the head of an organized crime family1
2. a male parent (also used as a term of address to your father)1
• his father was born in Atlanta1
3. a person who holds an important or distinguished position in some organization1
• the tennis fathers ruled in her favor1
• the city fathers endorsed the proposal1
4. the founder of a family1
5. a person who founds or establishes some institution1
• George Washington is the father of his country1
6. make children1
• Men often father children but don't recognize them1
Wiktionary Translations for father:
1. male parent
Cross Translation:
father far; fader vader — een mannelijke ouder
father far; fader VaterSoziologie, familiär: männlicher Elternteil
Related Translations for fathers |
The Forging Of The Modern State Early Industrial Britain 1783 1870 By Eric J Evans -
history of the united kingdom wikipedia - the kingdom of great britain came into being on 1 may 1707 as a result of the political union of the kingdom of england which included wales and the kingdom of scotland under the treaty of union this combined the two kingdoms into a single kingdom and merged the two parliaments into a single parliament of great britain queen anne became the first monarch of the new great britain, bbc history overview victorian britain 1837 1901 - naval supremacy when britain really ruled the waves in good queen bess s time was the assessment of the late victorian age s leading satirist ws gilbert, economic history of the united kingdom wikipedia - the economic history of the united kingdom deals with the economic history of england and great britain from 1500 to the early 21st century for earlier periods see economy of england in the middle ages and economic history of scotland after becoming one of the most prosperous economic regions in europe between 1600 and 1700 britain led the industrial revolution and dominated the european, the food timeline history notes restaurants chefs - personal chefs private cooks the rich and famous have long enjoyed the services of personal chefs until recently personal chefs were retained by wealthy families royalty top government officials prosperous businessmen and the like, loot co za sitemap - 042282274427 0042282274427 little drummer boy harry chorale simeone harry simeone 9780321456922 0321456920 the effective reader d j henry 9781552504031 1552504034 competition and development the power of competitive markets susan joekes phil evans 9780078908354 0078908353 algebra 1 study guide and intervention workbook mcgraw hill education, social science history bibliography andrew roberts web site - academy of social sciences ass the united kingdom association of learned societies in the social sciences formed in 1982 gave rise to the academy of learned societies for the social sciences incorporated 24 9 1999 which became the academy of social sciences on 5 7 2007 ass 15 12 2000 commission on the social sciences notes from the meeting on 15 12 2000 by ron johnston, historical movies in chronological order vernon johns - what do the x s mean the x s just indicate the ones i either have not watched or i have watched but have no review or a puny review it s just a way to keep me from buying two copies of the same movie, eurasc new members www eurasc org - professor giancarlo sangalli universit di pavia italy giancarlo sangalli born 1973 is full professor of numerical analysis at the mathematics department of the university of pavia and research associate of cnr imati e magenes, enews aide gov tw - |
A Curious American is a Patriotic American
Jeff Gates2018-02-04
Chamomile Tea Party
Chamomile Tea Party
--Timothy Snyder in On Tyranny
These posters started with an interest in propaganda and how it's used to sell ideas. According to Timothy Snyder, an historian who has studied 20th century fascism in central and eastern Europe, today we are experiencing a "crisis of responsibility." Those in power say they are blocked from taking action by the opposition. Yet, in reality, the internet allows us to effectively target our messages to very specific groups. Russia successfully used the net to influence the 2016 presidential election. The reaction by the students to the massacre at of Stoneman Douglas High School in Parkland, Florida was so effective, the gun lobby was forced to mobilize to counter and discredit them. And, just as quickly, when conservative pundit Laura Ingraham mocked shooting survivor David Hogg's college rejections, within a day, this 17-year-old successfully called for a boycott of Ingraham's sponsors on Twitter. This is a new and more efficient propaganda from that practiced by the Nazis and Soviets of the 20th century.
Snyder suggests that Factuality is one of our most threatened institutions. If we don't believe in facts, he says, we can't cooperate, leading to a breakdown of our society. This is happening in America now. His book, On Tyranny offers twenty ways we can mitigate the technological changes that have made this so easy and potentially so dangerous.
Seek different opinions, question our own biases, and find ways to engage the opposition in dialogue. A curious American is a patriotic American.
For more information, watch a dialogue with Timothy Snyder that took place at the Carnegie Council for Ethics in International Affairs on February 21, 2018.
Show lessRead more
• Title: A Curious American is a Patriotic American
• Creator: Jeff Gates
• Date Created: 2018-02-04 |
Lesser known dance forms of the world that can blow your mind!
Scroll this
The world is full of so many hidden features. Be it dance, be it culture, exquisite monuments, a beauty of nature, be it anything else where the list may go on and on.
Dance is the form of expression of one’s soul, culture, traditions, and way of expression of feelings from one individual to another. It is a perfect language which relates various cultures of this world into a single thread.
The most amazing dance forms of the world which are still hidden, but can blow you mind are:
Flamenco Dance Form
Flamenco is one of the most characteristic dance forms of the Spanish culture. Especially throughout the southern region of Andalucía. It is like brushing the surface of the flamenco dance form. But if we look at stomping feet it’s all about the fiery passion. Flamenco has a very deeper history which relates to the tales of the development of Spain itself. It is the dazzling results of centuries.
Of absorbing and sewing together elements of this myriad of diverse cultures. It is this that have made flamenco dance and music that we see today. In a flamenco dance performance, the dancer – or bailor(a) – will often stand motionless for the first few moments. Absorbing the strums of the guitar, the clapping, and the singing until the inspiration hits him/her. Then he or she will launch into a flamenco dance every bit as passionate as the song being belted out by the cantor. You can see the explosion of emotions in every step and even on the dancer’s facial expressions throughout the performance.
Duets, performed by a man and a woman, are often the most mesmerizing, yet noteworthy flamenco dances. The dancers keep their eyes locked each other. Consistently and aggressively building off one another in what becomes a competition of passion, sexual tension, and emotion.
Tap Dance
Tap dance is a form of dance characterized by using the sounds of tap shoes striking the floor as a form of percussion. Rhythm and Broadway tap are the two most interesting variations that exist in the dance form. Broadway focuses on dance moves and is widely performed in musical theater.
Whereas, Rhythm focuses on musicality, and practitioners consider themselves to be a part of the jazz tradition. There’s a metal “rap” on the heel and toe of the shoe worn by the performers. Which brings out beautiful music when danced to! There are different brands of shoes which sometimes differ in the way they sound.
Polka Dance
The polka was the second to be introduced as the couple dance to the world, first being the waltz. The word polka is Czech meaning “Half-step” about the quick movement from one foot to another. Dances were often combined depending on the venue and the region.
Of all the regional dances, polka survived them all and combined elements of all their steps, rhythms, and style. Now it has become a competitive form of dance. Incorporating many of the traditional folk forms. And emphasizing on skill and precise movements!
Swing Dance
Swing dancing is a type of group dance form which has originated from the roots of Harlem, New York with afro-American roots. The feel of the dance is like “swinging”. As it developed to the swing style of jazz music from the 1920s to the 40s or 50s.
The most shared and known style of the swing dance form is the “lindy hop”, that is danced all around the world. Swing is danced not in competitions but socially as well. Which makes it fun and introduces you to many people and dance and have fun outside lessons too.
Cancan Dance
The cancan dance form is a lively and risqué dance form, originated from the French or Algeria. It is usually performed onstage by four women.
In the modern world, the dance form is getting famous. And is known for its high kicks in unison that expose both the leg and the petticoat. The cancan is in a lively 2/4 time and was at first danced to quadrille or gallop music.
Cossack Dance
The Cossack dance is also referred to as Hopak dance form. It is a Ukrainian dance form. And performed most often as a single concert dance by amateur and professional Ukrainian dancers.
This magnificent dance is popularly referred to as the “National Dance of Ukraine.”
Much of the improvised parts of the ancient hopak involves solo dancers, usually male. Performing visually and technically amazing acrobatic feats. These include jumps and spins, and are the highlight of the performance.
Shaolin monk Dance
Shaolin monks come from Hunan, China, and are well known for their martial arts skills. With the tradition of over 1500 years, the monks have combined knowledge. Along with it discipline, and kung fu to make a very unusual dance form of their own.
Celestial Dance
The Cambodian dance depicts the sagas that have prevailed in the country for hundreds of years. It had been even graven into some components of the Angkor war. Cambodian dances of this tradition are known as their princes and princesses. All exist, male and female deities, Giants and monkeys.
While some works are complex dance dramas of love and war and magic. Whereas others are considered as pure dance pieces, meant to evoke a sense of reverence.
Dance to your favorite tunes and forms!
Find yourself a dancing partner at Friend Colony.
Submit a comment
%d bloggers like this: |
NES 2601
NES 2601
Course information provided by the Courses of Study 2018-2019.
The pyramids and mummies of Egypt, the ziggurats of Babylonia, and the armies of Assyria are all part of the legacy of the ancient Near East. This course serves as a basic introduction to the history, societies, and cultures of the major civilizations of the ancient world from c. 3300-300 B.C., focusing on Egypt and Mesopotamia but including lesser-known groups such as the Hittites in Anatolia and the Elamites in Iran. Students will learn how these states were organized, how each culture related to their gods, and how they chose to be remembered, as well as many other mysteries of the ancient world.
When Offered Fall.
Breadth Requirement (GHB)
Distribution Category (HA-AS)
Course Attribute (CU-ITL)
View Enrollment Information
Enrollment Information
Syllabi: none
• Combined with: JWST 2601
• 3 Credits Stdnt Opt
• 16549NES 2601 LEC 001 |
A. Surface
B. Cylinder
C. Cluster
D. All of the above
You can do it
1. An approach that permits the computer to work on several programs instead of one is
2. Which of the following memories allows simultaneous read and write operations?
3. The difference between memory and storage is that memory is _____ and storage is __
4. Computers with 80286 microprocessor is
5. A datum that indicates some important state in the content of input or output is
7. Which of the following was a special purpose computer?
8. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
9. In a computer_____ is capable to store single binary bit.
10. Which of the following does not affect the resolution of a video display image?
11. Which unit converts user data into machine readable form?
12. The first firm to mass-market a microcomputer as a personal computer was
13. EEPROM stands for
14. Which of the following is not an XT microprocessor?
15. Napier's Bones were invented in
16. Which of the following is not the classification of computers based on application?
17. Which of the following memories allows simultaneous read and write operations?
18. Operating system, editors, and debuggers comes under?
19. The scrambling of code is known as:
20. Which of the following is the 1's complement of 10?
21. Word length of a Personal Computer is ___
22. ASCII stands for
23. Which network is a packet switching network?
24. When was vacuum tube invented?
26. Which device is required for the Internet connection?
27. Which access method is used to access cassette tape?
28. The notable features like keyboards, monitors, GUI were developed in
29. Which statement is valid?
30. Basic is _____ language. |
Open main menu
A chamfer with a lark's tongue finish
A chamfer /ˈæm.fər/ is a transitional edge between two faces of an object. A form of bevel, it is created at a 45° angle to two adjoining right-angled faces. A lark's tongue is a chamfer which ends short of a piece in a gradual upward curve, leaving the balance as a right angle. Chamfers may be formed in either inside or outside adjoining faces of an object or room. They are also used to "ease" otherwise sharp edges, both for safety and to prevent damage to them.
By comparison, a fillet[a] is the rounding-off of an interior corner, and a "round" (or "radius") the rounding of an outside one.[1]
Chamfers are commonly employed in mechanical and manufacturing engineering, and in poured-in-place concrete formwork. They are used in furniture such as counters and table tops to ease their edges; when the edges are rounded instead they are called bullnosed. Special tools such as chamfer mills and chamfer planes are used.
Chamfers are necessary in parabolic glass mirror manufacture[citation needed] and desirable in certain printed circuit boards.
Chamfers are commonly used in architecture, both for functional and aesthetic reasons. The base of the Taj Mahal is a cube with chamfered corners, thereby creating an octagonal architectural footprint. Its great gate is formed of chamfered base stones and chamfered corbels for a balcony or equivalent cornice towards the roof.[2]
Other usesEdit
In parabolic glass mirror designEdit
In printed circuit board (PCB) designEdit
Right angled and chamfered intersections of a PCB track
In printed circuit board (PCB) designing, a chamfer may be applied to a right-angled edge of a conductive junction in order to strengthen that location. Chamfering of junctions may also be applied in high-frequency PCB design in order to reduce reflections.[4]
See alsoEdit
1. ^ Pronounced /ˈfɪlɪt/ FIL-ət, like "fill it"
2. ^ "Interior Decoration". Government of UP, Uttar Pradesh. Retrieved 2014-04-05.
3. ^ "How to Build a Telescope ?". IUCAA SciPOP. Retrieved 2017-12-31.
External linksEdit |
Math and Science Art Series: Visualising Pi with a HTML5 canvas
I was inspired by a friend to do some art using the math/scientific world as a basis, so I decided to start with the classic: pi.
I’ll be looking at some different ways of visualising the digits of pi visually using HTML5 and the canvas element to iterate over the digits. If you have any cool or interesting ideas regarding Math, Science and Art visualisations, especially concerning pi and other interesting numbers, then leave a comment below and we’ll feature your thoughts or works in our next post!
Technologies Used:
Fullscreen version here.
Libraries used in this demonstration:
• A tiiiny bit of jQuery (definitely not needed)
Browser support:
• All modern browsers should support this
Step 1: Get pi
The first thing to do for this is to establish a reliable method for generating digits of pi. There are several methods you could use to do this:
• Use the JS internal Math.PI constant
• Generate the whole of pi to a certain accuracy then read off the digits one by one
• Generate digits successively using a spigot algorithm such as the BBP algorithm
• Store the digits of pi in a pre-generated variable
I used the last method, as the internal constant isn’t really long enough for our purposes and generating either each consecutive digit or the whole number can take some time when we want a lot of digits.
A quick Google search came up with a million digits of pi (though you’ll have to work out the actual page it’s contained on for yourself!) of which I took the first 100,000 or so and just stuck it in a variable at the top of my source code.
An interesting fact, just thirty-nine digits of pi are sufficient to perform most cosmological calculations, because that is the accuracy necessary to calculate the volume of the known universe with a precision of one atom. [source]
Step 2: Make our canvas
Using javascript, it’s easy to make our canvas element and inject it into the page. Here I’ve used a little bit of jQuery, but you could just as easily use vanilla javascript to accomplish this:
// our onload event callback
// create a canvas and append it to the body
var canvas = document.createElement('canvas');
// set the dimensions to the window dimensions (or whatever)
canvas.width = $(document).width();
canvas.height = $(document).height();
// grab the 2D context
var ctx = canvas.getContext('2d');
// fill it with black
ctx.fillStyle = "#000000";
ctx.fillRect( 0, 0, canvas.width, canvas.height);
// here we use requestAnimationFrame to create
// an animation loop. It just calls our mainLoop
// function (nice and clean this way). This is
// repeated in mainLoop so that it repeats.
I think it’s pretty self explanatory, we’re just injecting our canvas into the document body and making a call to requestAnimationFrame to start our main animation loop function mainLoop.
Step 2: Make our animation
So now we can start building the steps for our main animation loop. What I’m going to do for this first part is have a scrolling canvas that will create different size bubbles depending on the digit of pi we’re on.
We’ll need a counter to keep track of which digit we’re on, which I’ll call i. We’ll also need a few rendering functions to keep things nice and modular. So, for this example we have our mainLoop, a function for rendering circles drawCircle and a function for scrolling our canvas moveCanvas. Here is our mainLoop:
// pi to 106,785 digits.
var PI = "3141592653..."
// our counter variable
var i = 0;
// for changing the rate at which circles are produced
var mod = 15;
function mainLoop(canvas){
// move the canvas left 5 pixels and replace the
// background with black
moveCanvas(canvas, "#000000", -5, 0);
// The rate at which we draw bubbles is determined
// by this if loop. We do this because we want the
// scrolling to be smooth but the bubble production
// to be every mod frames.
if(i % mod == 0) {
// We calulte the actual digit we want as we are
// only drawing a circle every mod digits.
var digit = i/mod
// Here we generate our colour for our circle
// using digits of pi. I'm using the consecutive
// 3 digits because otherwise they would be all
// grey!
var color = "rgba(" +
Math.floor(PI.charAt(digit)*(255/9)) +
"," + Math.floor(PI.charAt(digit+1)*(255/9)) +
"," + Math.floor(PI.charAt(digit+2)*(255/9)) +
",0.5)"; // Opacity of 0.5 for nicely overlayed bubbles
// Here we set our radius using the next two digits of pi.
// There is a scaling factor of the canvas height / (9*9*4)
// so that they fit on our canvas (the maximum radius is 9).
var radius = (PI.charAt(digit) + PI.charAt(digit+1)) * (canvas.height/(9*9*4));
// we draw our circle given the radius and colour above.
drawCircle(canvas, {radius: radius, color: color});
// increment our counter
// reset our counter if we run out of digits
if( (i * mod) > PI.length + 2) i = 0;
// repeat the animation loop
It’s all nicely commented so it should be self explanatory, however, I have used a few tricks here that I’ll explain.
requestAnimationFrame gives us a good way of creating looping animations without having to use a fixed setInterval. In this example we want smooth scrolling, so I am moving the canvas every frame, however, we only want to make a bubble every n frames (which I’ve stored in the mod variable). We can achieve this using a simple if statement that only creates a bubble every mod frames using the % operator.
Step 3: Create our rendering functions
We have two rendering functions, one that moves the canvas and one that draws a circle. These are pretty simple. Here is our function for moving the canvas:
// Takes the canvas, replacement colour and distance to move in x and y
function moveCanvas(canvas, color, dx, dy){
// get our canvas' 2D context
var ctx = canvas.getContext('2d');
// grab our current background
var bg = ctx.getImageData(0,0, canvas.width, canvas.height);
// make our canvas the colour of the color given
ctx.fillStyle = color;
ctx.fillRect(0,0,canvas.width, canvas.height);
// and now put our old background back on the canvas in the correct place.
Pretty simple, and here is our function for drawing circles:
// Takes the canvas and a few options
function drawCircle(canvas, options){
// get our canvas' 2D context
var ctx = canvas.getContext('2d');
// these are our default options
var dftoptions = {color : "#ff0000", radius: 20};
options = options || {};
// using jQuery's extend function to add to our
// default options
var options = $.extend(dftoptions, options);
// This draws our bubble on the right hand side - the bubble radius
// so that the bubble doesn't appear off the edge of the screen.
options.x = options.x || canvas.width - options.radius;
options.y = options.y || canvas.height/2;
// and now we draw our bubble according to radius and color
ctx.fillStyle = options.color;
ctx.arc(options.x, options.y, options.radius, 0, Math.PI*2, true);
Again, pretty simple.
If you run this code you should now get a nice smooth animation that scrolls from right to left creating bubbles whose colour and size is set according to the digits of pi.
While you’re running your simulation look out for a few cool patterns, such as the six consecutive 9’s occurring at the 762nd digit (on our animation they should be biiiig white circles!).
Step 3.141…: Another visualisation
Note: This example definitely looks better in fullscreen so it’s not constantly getting cut off, take a look at the fullscreen version here.
Here is another popular method of visualising pi known as a random walk. In this visualisation we loop through digits of pi and assign each number a direction, for example 1 = up, 2 = up and right, 3 = right, and so on. Obviously we only have 8 cardinal directions so we can ignore 0 and 9 for this example (importantly, it’s still a random walk).
I’ve re-used the code for generating the colours of the lines and the function for moving the canvas but I’ve modified our main loop and added a function for drawing lines. Here is my drawLine function:
function drawLine(canvas, options){
var ctx = canvas.getContext('2d');
options = options || {};
var options = $.extend(dftoptions, options);
options.x = options.x || canvas.width/2;
options.y = options.y || canvas.height/2;
options.dx = options.dx || 0;
options.dy = options.dy || 0;
ctx.fillStyle = options.color;
ctx.strokeStyle = options.color;
ctx.moveTo(options.x, options.y);
ctx.lineTo(options.x + options.dx, options.y + options.dy);
and the mainLoop is fairly similar, this time though we have a switch statement that assigns an x and y direction to move in depending on the digit and we’ve changing our moveCanvas call to move the distance drawn by the line, so that we’re always centered on where we’re currently drawing:
var linelength = 10;
function mainLoop(canvas){
if(PI.charAt(i)*1 !== 9 && PI.charAt(i)*1 !== 0) {
var color = "rgba(" + Math.floor(PI.charAt(i)*(255/9)) +
"," + Math.floor(PI.charAt(i+1)*(255/9)) +
"," + Math.floor(PI.charAt(i+2)*(255/9)) +
var x = 0, y = 0;
switch(PI.charAt(i) * 1){
case 1:
x = 0;
y = 1;
case 2:
x = 1;
y = 1;
// etc...
case 8:
x = -1;
y = 1;
x = x * linelength;
y = y * linelength;
moveCanvas(canvas, "#000000", x, y);
drawLine(canvas, {color: color, dx: x, dy: y});
if(i > PI.length + 2) i = 0;
We can keep everything else the same (this is the beauty of breaking our code down functionally).
• How many bytes does it take to store 100,000 digits of pi? What about 1,000,000?
• For the random walk, how could we eliminate the need to skip digits? (hint: think about number bases)
• Can you give the animations user controls, such as bubble size, line length, play, pause, fast forward, rewind, etc?
• For the both the examples, if the animation reaches the edge, the image is lost, how can we stop this from happening?
• How could you create a visualisation that creates bubbles in a spiral, instead of moving along a fixed right-to-left path?
I’d love to hear your answers to these exercises in the comments section below, if you come up with some good answers I’ll use them in this post or create a new post with some of your extensions and ideas with credit to you and a link to your website.
We can create some pretty cool visualisations using the really simple methods above, but this opens up a world of possibilities. People have used pi in the past to create some awesome visualisations, for example, this work by Martin Krzywinski visualises the progression of Pi, Phi (the golden ratio) and e:
There’s this cool Kickstarter project about visualising pi with a big mural:
Here’s a list of pi visualisations on the wolfram alpha page (including random walks). Here’s their random walk in base 10:
Random walk base 10
And there’s even someone who has turned pi into music (from the numberphile YouTube channel, be sure to subscribe to them):
I’d love to hear about any ideas you have about visualising pi, use the comment box below to suggest any ideas or if you have done any visualisations of your own or even used the code above to create your own, then share them with us and we’ll feature your visualisation on our next instalment of Math and Science Art: Visualising Pi.
Alternatively, you can use this contact form to reach me privately to share your thoughts:
Leave a Reply |
++ed by:
1 PAUSE user
Ben Morrow
Perl - embed a perl interpreter in a Perl program
use Perl;
my $p = Perl->new;
print $p->eval(q/"Hello" . " " . "world" . "\n"/);
A Perl object represents a separate perl interpreter that you can manipulate from within Perl. This allows you to run other scripts without affecting your current interpreter, and then examine the results.
This creates and initialises a new perl interpreter, and returns an object through which you can manipulate it. Paramaters are
This sets the arguments for the perl interpreter, as passed to "perl_parse" in perlembed. An initial argv[0] of "perl" will be added automatically, so don't try and include one. If no arguments are passed, a single argument of -e0 will be used.
This will add appropriate -M arguments to the argv of the new interpreter. These will be added before any args given with ARGV.
This will pass appropriate -I arguments to the interpreter, before those from either ARGV or USE. If the ARRAYREF is not specified, it will pass in the current @INC, omitting entries that are references.
If the creation fails, it returns undef.
This invokes "perl_run" in perlembed on the interpreter, which will run the program given on the command line in Perl->new, if any. END blocks will be run at the end of this, so if you install any you must make sure to call this.
This evals EXPR in the other interpreter, and returns the string value of the result.
This returns the result of evaluating EXPR in the other interpreter. Results are passed back using Data::Dumper, and if anything is returned that cannot be frozen an exception will be thrown. Any exceptions thrown will be caught in $@ and undef returned, as with normal eval.
The EXPR will be evaluated in the same context (list, scalar, void) as eval is called in.
This will croak if Data::Dumper cannot be required in the sub-interpreter.
Note that you may wish to use _eval instead for more control over the other interpreter.
This will construct an expression that evaluates to a deep clone of EXPR, suitable for interpolating into a string to pass to $perl->eval.
EXPR will be evaluated in scalar context.
This is a tied hash which returns the result of calling Perl::make_expr on the given key: it makes it easier to interpolate into strings.
This is used to determine whether or not Data::Dumper should attempt to deparse CODE refs. Note that you need a new enough version of Data::Dumper for this to have any effect.
If this variable is set in the environment, copious amount of debugging info will be produced on STDERR. This is almost certainly of no use to anyone but me.
Anything that can't be Dumped, in particular filehandles, can't be passed between interpreters.
There are crashes in t/6threads.t with both AS Perl and MinGW perl. I don't fully understand why they occur, but I suspect a bug in perl.
Gurusamy Sarathy <gsar@umich.edu>
Modified and updated for 5.8 by Ben Morrow <ben@morrow.me.uk>
This program is distributed under the same terms as perl itself. |
The Percentage of Black Teachers Declined in Nine U.S. Cities. That’s a Big Problem.
American classrooms are getting more diverse. Are American teachers?
A study released Wednesday by the American Federation of Teachers found that, just as American schools are getting more and more segregated, teachers in several major American cities, including the nation’s three largest school districts, are getting progressively less diverse, particularly when it comes to black teachers.
Nationwide, the percentage of nonwhite teachers increased from 12 to 17 percent between 1987 and 2012, but the minority population of students has increased at a much faster rate. Minority students now constitute more than half of the public school student population in the United States, up from 31 percent in 1993 and 41 percent in 2003.
The State of Teacher Diversity in American Education,” released Wednesday by the American Federation of Teachers–affiliated Albert Shanker Institute, studied teacher hiring and retention patterns in nine major U.S. cities—Boston, Chicago, Cleveland, Los Angeles, New Orleans, New York, Philadelphia, San Francisco, and Washington, D.C.—and concluded that achieving the ideal of teacher diversity remains an uphill slog. “As a general rule,” the report found,
minority teachers—especially minority male teachers—are underrepresented in these urban workforces, with substantial representation gaps between minority teachers and minority students.
Most distressing of all, the report, which looked at black, Hispanic, Asian, and American Indian teachers, found that, in all nine cities, the “Black share of the teacher workforce declined, at rates from the very small to the quite large.” D.C. saw the largest drop in black teachers, from 77 to 49 percent between 2003 and 2011. As Liz Davis, the president of the Washington Teachers Union, said at the press conference announcing the report, “the District of Columbia is seriously hemorrhaging teachers of color.” Los Angeles Unified District, by contrast, represented a “rare bright spot,” with significant increases in Hispanic teachers at both district and charter schools.
The “diversity gap” between students and their teachers is nothing new: Teaching—which, as Richard Ingersoll from the University of Pennsylvania pointed out at the press conference, represents the “largest occupation in nation”—has long been a white-dominated profession. The real difference is in the changing demographics of the U.S. student population, and the increasing need for the adults at the head of the classroom to reflect that shift.
Teacher diversity matters for several reasons: because minority teachers tend to have higher expectations of minority students than white teachers; because minority students benefit from “relatable” role models; and because a diverse teaching force prepares all students for the realities of life in 21st-century America.
So what’s the problem? It’s not recruitment: Minority teachers are being hired at similar rates as white teachers. But they’re also leaving the profession at much higher rates than white teachers. The attrition is generally attributed to the “working conditions” at the mostly high-poverty schools where minority teachers are disproportionately employed. These schools also tend to be harder to staff, schools where teachers, whatever their color, are more likely to quit.
The solution is that there’s no solution, except to make teacher diversity more of a priority, both at the national and the district level. Randi Weingarten, president of the American Federation of Teachers, asked at the press conference, “If, 60 years after Brown vs. Board of Education, you don’t have a real intentional commitment to integration in our teaching force, how are we going to have it in our housing and our schools?” Weingarten ended her remarks by calling on the president to hold a summit on teacher diversity: “Let’s see what we can do to create a comprehensive strategy to diversify the teaching force.” |
Flat field images are used to remove uneven illumination from images. Primarily this means removing vignetting, which darkens the corners of an image. With larger-format cameras, including digital SLRs, the fast focal ratio of the HyperStar lens can cause some vignetting. This is easily removed using flat field images.
Why Flat Field Images Are Needed
Flat field images are captured by imaging an evenly illuminated source. Imaging this source reveals the uneven illumination introduced by the optical system. In DSLR cameras this includes not only vignetting but also some slight darkening along the top or bottom edge due to clipping of the fast light cone by the viewfinder mirror in the camera. The effects are slight, but improvements in image quality can be gained from flat field images. Smaller-format cameras do not suffer as much from uneven illumination and will not see much benefit from flat field images, so this processed is not entirely necessary for these cameras.
Above: A flat field image taken with a HyperStar C14 and Canon EOS 20Da
The images below show the effects of vignetting on a HyperStar image taken with a large-format camera. When the image is displayed normally, the effect is minimal. An strong contrast stretch shows the vignetting more clearly, but obviously an image would never be enhanced to this extreme.
Above: Vignetting in a wide-field image
Below is the same image before and after a flat field image is applied. The same extreme contrast stretch is applied, showing how a flat field easily removes uneven field illumination.
Above: Before and after flat fielding is applied
Taking Flats
The most common way to capture flat field images is to image the twilight sky. The evening sky provides a relatively even light source. This is an easy method, but there are a few things to bear in mind. First, there is a narrow window of opportunity for taking sky flats due to the fact that a sensitive CCD camera will begin picking up stars well before they are visible to the unaided eye. Second, because the light changes so rapidly after sunset, flats must be captured relatively quickly to avoid much change in illumination between the first and last flat field image. (Multiple images are usually taken to avoid noise and random variations, just like with regular images or dark frames. 6-8 frames are usually sufficient.)
Flat field images need to have a specific background brightness value. This number can be determined in a program like MaxIm DL by moving the cursor over the image. The proper value can be calculated from the properties of the camera being used. For the most common HyperStar camera, the Starlight Xpress SXVF-H9C, the background value should be around 26,000. For other cameras, check out the Flat Field Value Calculator. Set the exposure time to yield this value. Typical exposure times will be between a fraction of a second and a few seconds. For digital SLRs, the process is even easier. Just set the camera to automatically meter the sky and the exposure value will be correct.
The temperature at which the flats are taken does not need to match that of the main images. However, dark frames must be taken for the flats themselves if your camera normally requires darks. For cameras such as the Starlight Xpress SXVF-H9C, dark frames are not necessary (although they can be used), so dark subtracting flats is not needed either. If you shoot binned images, the flats must match in this respect.
Note: For flats taken with one-shot color CCDs, be sure to process images using the flats before converting the images to color. |
Money order
A money order is a financial instrument that is used to pay the person or organization named on the instrument a specific amount of money. A money order typically takes the place of a check payment, especially when the recipient wants to be assured of the transfer of funds. The person paying with a money order usually buys it from a financial institution by prepaying it, after which the institution guarantees payment of the full amount of funds stated on the instrument. The institution issuing the money order earns a profit by charging a small fee to the person using it to make a payment.
A money order can provide some security to the paying person, because the instrument does not contain any personal information about the payer; that is, there is no checking account routing number or account number on the document, as would be the case with a check.
Related Courses
Corporate Cash Management
Payables Management |
Infrared Emitter
An infrared emitter is an electrode on a transistor from which a flow of electrons or holes enters the region between the electrodes. This device operates at 940nm and work well for generic IR systems including remote control and touch-less object sensing. Using a simple ADC on any microcontroller will allow variable readings to be collected from the detector. The emitter is driven up to 50mA with a current limiting resistor as with any LED device. LED IR emitters enhance night vision capabilities for military personnel for infrared vehicle lighting, security lighting applications and covert general area IR lighting. Magnalight LED IR emitters can be configured for 850nm IR light, 940nm IR light or a combination of visible and IR LED lighting. Magnalight LED based infrared lighting generates light energy only in the configured wavelength. More traditional covert IR lighting utilizes cut off lenses to block the visible light, while enabling only specific wavelengths to pass through the filter lens. LED infrared lighting is more efficient because all of the light energy from the LEDs is utilized. Finally, with IR LED lighting, there is no possibility of visible light leakage that occur if a cut off lens or related seals are broken.
Each infrared LED light is manufactured with an extruded aluminum housing, machined aluminum mounts and stainless steel hardware for strength, durability and weather resistance (IP67). Low profile LED infrared LED lights are applicable for mounting in tight spaces where traditional lights would not fit or where larger format lights would block mounted equipment. Magnalight emitter bars are unique because of the patent pending technology that pairs a reflector with each LED. Typically LEDs are mounted against a surface and "glow". This glow is often effective at close range, but the light energy drops off rapidly. By pairing each LED with a proprietary optic, the emitted light energy is projected outward, so that the "drop off" in light energy does not occur until much greater distances. This IR emitter produces a wide spot pattern (or a modified spot pattern) which falls in between a narrow spot and a flood pattern.
Supplied by CEM Tech, CEM World USA provides the infrared emitter within the in the range of 0,4-1,2 microns (IR) spectrum of the thermal effects. While the Infrared Emitter does not does not possess properties of waves EHF, it only works in direct mode. This device offers several health benefits such as:
• Improvement of the rheological properties of blood
• Improvement of microcirculation
• Stimulation of the immune system
• Capability of cell regeneration
Modern electronic devices like televisions and DVD players come equipped with remote controls that rely upon Infrared (IR) technology for operation. The devices are fitted with IR sensor windows which receive a signal from the remote control. While this system works in the majority of applications, some custom home stereo and theater applications require specialized IR equipment as the devices are hidden in closets or cabinets. IR emitters allow for the control of devices that otherwise would be out of the range of remote controls.
LED infrared emitter
can work in certain points and areas preparing like "warm up" before their subsequent exposure specialized emitters (Green and Red - in diabetes mellitus and impaired carbohydrate metabolism, which ultimately lead to increased development of insulin cells of the pancreas, its transport to target organs, reducing the body's need for insulin, the normalization of making adrenalin, insulin estrogen-androgen hormones, etc.
no comments found |
We kindle these lights
There is something very frightening and foreboding about darkness.
December 13, 2006 11:18
4 minute read.
We kindle these lights
lit menorah 88. (photo credit: )
Dear Reader,
• A user experience almost completely free of ads
• Access to our Premium Section
Help us grow and continue telling Israel’s story to the world.
Thank you,
Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief
There is something very frightening and foreboding about darkness. According to rabbinic lore, Adam, the first human being, knowing nothing about the way in which the world works, was terrified when the autumn equinox came and he saw the days becoming shorter and shorter and the period of darkness longer and longer. "Woe is me!" he said. "Perhaps because I sinned the world around me is turning dark and returning to its state of chaos and confusion. This, then, is the 'death' that was decreed upon me from heaven!" He then fasted for eight days. However when the solstice came and he saw that the days were becoming progressively longer, he said, "This is the natural course of the world." He then observed eight days of festivity. He created these days for the honor of heaven, but the pagans appointed them for idolatrous worship (Talmud, Avoda Zara 8a). In this way the sages explained the origins of the pagan holidays known as Kalenda and Saturnalia that were celebrated in the Roman world at the time of the winter solstice. It is also well known that the date of Christmas was simply an adaptation of these Roman holidays, so that, in a sense, they are still celebrated today. It would seem that Hanukka, although it commemorates a specific event that, according to historical records, took place at a specific date, also continues this tradition of marking the darkest time of the year by celebrating the importance of light. One of the common names for it is Hag Ha'urim - the Festival of Lights. As a matter of fact, the only real mitzva of the holiday is the kindling of light. Although we are accustomed to ascribe these lights to the legend of the oil that burned miraculously for eight days, this story is a late addition to the holiday, found for the first time in the Talmud. The Books of Maccabees make no mention of it nor does the special prayer, Al Hanisim - "Because of the miracles" - that we recite on Hanukka. That prayer, in a sense the official rabbinic explanation of Hanukka, specifies that the "miracle" was the victory of the small band of Jews against the might of the Syrian-Greeks, a victory that was marked by the rekindling of the menora in the Temple. The lights we kindle are an imitation of that act and are lit for eight nights because that was the number of days on which the rededication ceremony was held, patterned after the eight days of Succot. The ancient name for Hanukka was "the Succot of the month of Kislev." Once, many years ago, we spent Hanukka at the very tip of South America, where the seasons are reversed. There was no sunset and no darkness. The lighting of the Hanukka lights seemed to lose its significance. If there was no darkness to dispel, what was the point of kindling a flame? The symbolism of light, however, goes deeper than that. The idea that light represents the Divine is rampant in Judaism. It is no accident that the Torah begins the story of creation with the Lord saying "Let there be light!" Even before there is a sun, light is created. When God appears to Moses, He does so in the flames of the burning bush. When God appears later at Mount Sinai, it is in fire and flame. A pillar of fire accompanies the Israelites in the desert. When the Tabernacle is built, the menora is its central object, a candlestick that is shaped like a tree or a bush, lit every evening to represent the presence of God in that structure. In the words of the prophet, read on Shabbat Hanukka, the lights of the menora come to represent the power of God, "Not by might, nor by power, but by My spirit, said the Lord of Hosts" (Zechariah 3:6). No wonder that the menora has always been the most potent and powerful symbol of Judaism and was chosen by the State of Israel as its official symbol. "The commandment is a flame and the Torah is light," says the book of Proverbs. Thus physical light becomes a symbol of the enlightenment that is brought by the observance of mitzvot. The task of human beings is to imitate God by bringing light into the world through their lives and through their actions. The popular Hanukka song has these lyrics: We have come to banish darkness. Light and fire are in our hands. Each of us is one small light, but together we are a mighty flame. Let the darkness flee before the light! There is much darkness in the world. There is much suffering and pain, ignorance and poverty, war and violence. The purpose of religion, true religion, is to alleviate the darkness and bring light, to encourage each of us to kindle flames that will bring God into the world. God is in the light, God is the Divine power that brings light and dispels darkness and we, human beings, are God's agents, entrusted with that task. The writer is the head of the Rabbinical Court of the Masorti Movement and the Rabbinical Assembly of Israel.
Related Content
Joan Rivers
August 28, 2014
Joan Rivers rushed to hospital following throat surgery |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.