text stringlengths 144 682k |
|---|
Hibernating bats mount a partial immune response against white nose fungus
Hibernating bats mount a partial immune response against white nose fungus
A hibernating little brown myotis bat affected by white-nose syndrome with a background of the results from next generation RNA sequencing of bat wing tissues. Expression levels are shown for 3729 genes that were identified as differentially expressed in 6 bats with white-nose syndrome and 5 unaffected bats. Credit: Field et al (2015)
White-nose syndrome (WNS), an invasive skin infection caused by the Pseudogymnoascus destructans (Pd) fungus has killed millions of bats since it was first seen in North America in 2007. A analysis of gene expression in hibernating bats infected with the destructive fungus published on October 1st in PLOS Pathogens reveals how the resting animals' immune system fights the infection.
During hibernation when the conservation of energy is critical, certain parts of the immune system—at least in rodents where most studies have been done—are downregulated. The low body temperature and energy consumption protects hibernating mammals against many pathogens as they are adjusted to their hosts' regular body temperature. Because Pd grows at temperatures between 2 and 18 degrees C it overcomes this barrier.
Based on the rodent studies, Ken Field, from Bucknell University in Lewisburg, USA, and colleagues hypothesized that may keep Pd in check by relying on non-specific (or innate) immune responses and memory immune responses. If those animals are immune naïve—that is, if they have not encountered and survived the Pd pathogen before—they have no immune memory to fight back strongly and might therefore succumb to the disease.
To study the actual host response, including the immune response, to Pd in hibernating bats, the researchers did a detailed analysis of all the genes active in the wing tissues of six hibernating little infected with Pd—including active genes of the fungus itself—and compared this to the pattern of non-infected little brown bats hibernating in captivity without Pd exposure.
(They selected North American little brown bats because they are highly susceptible to Pd. Mortality rates from WNS vary by species, ranging from over 90% in colonies of little brown bats to little or no mortality in some North American species that—like bats in Europe where the fungus has long been present—survive even though their skin gets infected.)
The changes in gene expression the researchers observed suggest that the bats' host initial responses to fungal skin infection remain intact during hibernation and are similar to those seen during such infections at regular body temperature, including acute inflammation and wound healing. In contrast, the influx of white blood cells into infected tissue that normally follows the initial immune response appears to be missing, but it is unclear whether this is a consequence of hibernation or whether Pd is able to prevent recruitment of these immune cells.
Besides these -response-related patterns, the researchers also saw changes in genes involved in metabolism which might be related to the more frequent warming-up periods seen in bats with WNS that cause them to use up their energy stores more rapidly. Overall, there were considerable differences in gene expression (both pathogen and host genes) among the six Pd-infected bats, suggesting different individual host-pathogen interactions that could affect the course of the disease.
The researchers conclude that "hibernation does not prevent a host response to infection and a better understanding of the differences between host and pathogen responses in bats susceptible to WNS and those resistant may lead to ways for increasing survival". Specifically, they suggest that " could be protected from WNS if the missing responses could be established prior to hibernation or if treatments could block the virulence factors expressed by the Pd pathogen".
Explore further
How does white-nose syndrome kill bats?
More information: Field KA, Johnson JS, Lilley TM, Reeder SM, Rogers EJ, Behr MJ, et al. (2015) The White-Nose Syndrome Transcriptome: Activation of Anti-fungal Host Responses in Wing Tissue of Hibernating Little Brown Myotis. PLoS Pathog 11(10): e1005168. DOI: 10.1371/journal.ppat.1005168
Journal information: PLoS Pathogens
Citation: Hibernating bats mount a partial immune response against white nose fungus (2015, October 1) retrieved 11 May 2021 from https://phys.org/news/2015-10-hibernating-mount-partial-immune-response.html
Feedback to editors
User comments |
Revolutionary War Propaganda
Most of the founding fathers where enlightenment thinkers. A handful were (based on their writings and actions) believing Christians such as Noah Webster, Patrick Henry, Samuel Adams.
Others were sympathetic to Christianity, however they mixed the holy (God’s wisdom from scripture) with the profane (Greek, humanist, pagan, and enlightenment philosophy). They would pick and choose from various wisdom literature sources including the Bible, Voltaire, John Locke, Rousseau, Montesquieu, Freemasonry, etc.
You will often find men such as Gouverneur Morris, Thomas Jefferson, George Washington, Benjamin Franklin, and John Adams making public comments, speeches, and legislation that would include Christian friendly terminology. Then their private letters would reveal their condescending ridicule and even open hostility toward the Christian faith.
To reconcile this difference, you only need to realize that human nature has not changed over the last 6,000 years. Politicians back then are the same as politicians today. They will say whatever it takes to get people to follow them.
It is not strange that their public and on record remarks are very carefully worded so as not to offend Christians. The vast majority of the colonists at the time of the Revolution were Christian. The Puritans and Pilgrims were Christian and purposefully came to the new continent for the purpose of spreading the Gospel and living out their Christian faith. They wanted a Christian Nation, and this is evident by the charters of the various colonies and constitutions of the various states. They intended to establish Christianity as the official religion of their colonies.
The Enlightenment thinkers, however, leveraged the differences between the various denominations to include language in the founding documents of the federal government for “religious freedom”. In the minds of the general Christian populace, this meant that not one denomination would be superior or enforce it’s distinctions over another. In the minds of the Enlightenment philosophy, religious freedom meant freedom for all religions with the ultimate goal of freedom from religion.
Some were openly hostile to Christianity such as Thomas Paine. Yet, Thomas Paine used very Christian language in Revolutionary War propaganda such as “Common Sense”. Yet in his other works such as “The Age of Reason” it is very clear that he is very anti-Christian. It is interesting to note that Thomas Paine was a Mason and lived with a man who was a member of the Bavarian Illuminati. Paine was not out to inspire a Christian revolution, he was motivating Christians to support and participate IN the revolution.
Now don’t think that I’m trying to say that our country is bad or the Constitution is a bad thing, etc. As far as human governments go, it is about as good as it could possibly get. I support the Constitution and believe that it is the only thing (besides God’s intervention) standing between us and a socialist tyrannical government. However, I do not need to “Christianize” the Constitution or our federal government system in order to believe that it is worth protecting. There are good and valuable things in our founding documents, but they are not scripture. The Founding Fathers are great men who risked (and lost) much, and we owe them a debt gratitude, but they are not saints or demigods.
Leave a Reply
|
An update on the distribution of the COVID-19 vaccine
Liam Regan, Contributing Writer
The COVID-19 vaccines have been a topic of interest over the past few weeks, for good reason. The virus’ ubiquitous impact has caused millions of deaths, vast unemployment, and worldwide suffering and shutdown. Many people are excited about the new vaccines and the possibility of ending the suffering our world is going through. While some remain skeptical, the majority of people are relieved to see that the end of the pandemic is now in sight. The Pfizer-BioNTech and Moderna vaccines are both approved for use in the United States, and in the UK, the Oxford-Astra Zeneca vaccine is also approved.
The Pfizer-BioNTech and Moderna vaccines are unique in that they function through the use of messenger RNA (mRNA). Two doses are required, spaced 21 days apart for the Pfizer vaccine, and 28 days apart for Moderna’s. Additionally, only people older than 16 can receive the vaccine, as testing was not performed on people below this age. Further testing must be conducted on younger children before they can receive the vaccine. When a person is given these vaccines, they are actually receiving mRNA that codes for the main part of the COVID-19 virus. The cells in one’s body begin to produce viral protein, and in response, antibodies are created to combat this intruder. In the past, most vaccines have instead used weakened forms of a virus, but despite the lack of extensive testing, the new technology has proven to be highly efficient. Pfizer’s vaccine achieved a rate of over 94% effectiveness and Moderna’s results displayed a rate of 95% effectiveness.
“Despite how fast the vaccine was produced, it is impressive how effective the results are,” said junior Kayla Caplin.
The high efficacy of these vaccines gives hope that the end of the pandemic is near, but there is still a major obstacle preventing a swift ending: distribution. The two leading vaccines must be stored at very low temperatures, making distribution difficult. Each company can only produce so much of its vaccine at a given time, so recipients are being prioritized based on certain factors. The CDC recommends that healthcare workers should be the first priority, as they are most exposed to the virus, along with elderly and immuno-compromised citizens.
The limited supply of vaccine doses makes selective allocation necessary. Data from the CDC shows that around 13.6% of the US population is already fully vaccinated. Both Pfizer and Moderna have just recently released statements promising substantial increases in the amount of doses they produce. To reach the promised number, they would have to send out 28 million doses every week, so if the companies are able to maintain their pledge, we should start to see tremendous increases in the three statistics from the CDC.
“Vaccine distribution has been slow; however, through great advertising and widespread awareness, the distribution of the COVID-19 vaccine has improved,” said sophomore Talia Sinclair.
Each state has different rules regarding vaccine eligibility. In New York, anyone above the age of 65 can schedule an appointment, but it has proven to be difficult because doses are prioritized and most places are booked for the next few months. Certain types of essential workers, such as taxi drivers and food delivery workers, are able to get the vaccine, in addition to public transportation workers, school faculty, correctional facility workers, people in homeless shelters, and people with underlying medical conditions.
The plan for the future aims to make all essential workers and those who are vulnerable eligible by March or April, while the rest of the adult population should hopefully be able to receive the vaccine by summer, if all goes according to plan. While this might seem like a long way off, it is certainly a step in the right direction and should signify the beginning of the end of the pandemic.
“After so many months of waiting, we can now see the light at the end of the tunnel. The vaccine is a massive step forward and hopefully we can return to normalcy within the coming months,” said sophomore Sammy Kassan. |
Tag Archives: learning techniques
Table Rounds: Gamifying Med Ed, ft. Paulius Mui, MD
How Gaming Can Help You Learn Medicine Better
• Rote memorization is part of medical education, but drawing deeper connections between concepts is what makes you a physician.
• Medical school emphasizes finding the correct answer, but when you begin to practice medicine you’ll find that the answers are much more complex than that.
• Although moving from med school to residency can be scary–as with any transition–Paulius found it to be easier than he expected.
Dr. Paulius Mui is a first-year family medicine resident in Virginia, and a long-time listener (since before med school!). He wrote to Dave not long ago because he had published a game called Table Rounds. It’s a game he and his friends in med school had made up, and now he’s working to bring it into the world as an actual product.
Paulius sent Dave a copy of the game [for free, he’s not a sponsor. –Dave], and M1s AJ Chowdhury, Alex Belzer, Nolan Redetzke, and M4 Joyce Wahba play the game. Players use cards–each with a medical term or concept on it–to draw connections between them. The connections can be deep or they can be spurious, but if you can make your case you’re a winner. But perhaps more importantly, it’s a game that you can make your own, coming up with rules that make it even more interesting and helpful.
Paulius also gives his advice to Joyce, who’s about to start her residency in Emergency Medicine, and discusses his first-year as a resident beginning while the pandemic raged.
We Want to Hear From You
What an AI thinks we said
Continue reading Table Rounds: Gamifying Med Ed, ft. Paulius Mui, MD |
Give Bugs a Chance
SERIES 29 Episode 11
"You can't have butterflies if you keep killing all the caterpillars"
"I think if all the bugs got on a spaceship tomorrow and went to another planet, we'd see our ecosystem starting to collapse probably in a matter of weeks - certainly months," Kristen Messenger tells Sophie. Kristen is an environmental educator. She visits schools, shopping centres and garden clubs with her menagerie of insects.
"They're pollinators, recyclers, cultivators"
"I think people don't really understand the amazing secret lives that a lot of the invertebrates lead and it leads them to be scared when there's often really no need to be. I reckon I've got the perfect example here Sophie - a few of them in fact - my friend, the old cockroach. It's not one that smells. This is a native cockroach (Bark Cockroach, Laxta sp.) and it's a pretty good example of a wood cockroach. There are more than 450 different species of cockroaches in Australia, but a few introduced cockroaches give all our native cockroaches a really bad name. They're pollinators, they're recyclers, they're food for other animals, they're cultivators. They get down and dig around in the soil."
"So, if people find cockroaches in their compost bins, they should actually be excited?" Sophie asks.
"Oh yeah. If I saw something like this in my compost, I'd stop and say hello and thank it for its kind work in my garden.
"They eat cockroaches, earwigs, slaters and whiteants"
"Here's another one, Sophie. Centipedes (Orangefooted Centipede, Cormocephalus aurantiipes) can bite, so you don't play with them and they are a bit venomous but they're really good predators. They eat cockroaches, earwigs, slaters and especially whiteants. They're a gardener's friend and I just love them."
"Beetles are another group of animals that I think are a little but misunderstood. Here's one here - this is a larvae from a Pie-Dish Beetle (Pie-Dish Beetle Larvae, Helea sp.). It looks like a mealworm," says Kristen. "These curl grubs (Scarab Beetle Larvae, Family Scarabaeidae) are beetle larvae as well, but these are really important pollinating beetles. They're saproxylic (wood-dwelling), so they have a relationship with dead wood and they can't complete their life-cycle without it. My rule of thumb is if you find them in your compost, if you find them in dead wood, leave them - they could be something important. If you find them eating the roots of your lawn, they're probably cockchafers - feed them to your chooks!"
Sophie says it's a reminder to gardeners to leave some old rotten logs or bark mulch to break down in the garden to encourage diversity. "Dead wood," agrees Kristen, "it's like biodiversity in the bank."
"One of the best predators in a home garden"
Next, Kristen introduces some Praying Mantis (Archimantis sobrina) to Sophie's garden, as a form of integrated pest management. "They're your local species so they're the ones that should occur here, but of course, because this was a paddock not so long ago, they haven't had a chance to get here yet."
They are often confused with Stick Insects, which are in the same animal Order - Phasmatodea. Kristen says there's an easy way to tell the difference. "If you look at their front pair of legs, Stick Insects hold them out straight. Praying Mantis have raptorial arms, so they hold them in this praying shape."
They're used by farmers for biological control, and have an equally important role in the home garden. "They're probably one of the best predators in a home garden that you could possibly get! The 'oothecae' or egg sack of the Praying Mantis can produce up to 300 mosquito-sized Praying Mantis."
"I've reared these ones until they're big enough to survive. They'll eat bugs up to half their own size and they're really motivated by flying insects, so all of your white fly, mosquitoes, blow flies, little moths - anything that's sort of flying past, they'll have a go at."
"People ask me all the time about bugs and I always come back to this connectedness," Kristen ends. "You know, you can't have butterflies if you keep killing all the caterpillars, so i just want to say, put your pesticide down and give the bugs a chance." |
This article was written by Prashant Gupta.
One of the major aspects of training your machine learning model is avoiding overfitting. The model will have a low accuracy if it is overfitting. This happens because your model is trying too hard to capture the noise in your training dataset. By noise we mean the data points that don’t really represent the true properties of your data, but random chance. Learning such data points, makes your model more flexible, at the risk of overfitting.
The concept of balancing bias and variance, is helpful in understanding the phenomenon of overfitting.
One of the ways of avoiding overfitting is using cross validation, that helps in estimating the error over test set, and in deciding what parameters work best for your model.
This article will focus on a technique that helps in avoiding overfitting and also increasing model interpretability.
This is a form of regression, that constrains/ regularizes or shrinks the coefficient estimates towards zero. In other words, this technique discourages learning a more complex or flexible model, so as to avoid the risk of overfitting.
A simple relation for linear regression looks like this. Here Y represents the learned relation and β represents the coefficient estimates for different variables or predictors(X).
Y ≈ β0 + β1X1 + β2X2 + …+ βpXp
The fitting procedure involves a loss function, known as residual sum of squares or RSS. The coefficients are chosen, such that they minimize this loss function.
Now, this will adjust the coefficients based on your training data. If there is noise in the training data, then the estimated coefficients won’t generalize well to the future data. This is where regularization comes in and shrinks or regularizes these learned estimates towards zero.
Ridge Regression
Now, the coefficients are estimated by minimizing this function. Here, λ is the tuning parameter that decides how much we want to penalize the flexibility of our model. The increase in flexibility of a model is represented by increase in its coefficients, and if we want to minimize the above function, then these coefficients need to be small. This is how the Ridge regression technique prevents coefficients from rising too high. Also, notice that we shrink the estimated association of each variable with the response, except the intercept β0, This intercept is a measure of the mean value of the response when xi1 = xi2 = …= xip = 0.
When λ = 0, the penalty term has no effect, and the estimates produced by ridge regression will be equal to least squares. However, as λ→∞, the impact of the shrinkage penalty grows, and the ridge regression coefficient estimates will approach zero. As can be seen, selecting a good value of λ is critical. Cross validation comes in handy for this purpose. The coefficient estimates produced by this method are also known as the L2 norm.
The coefficients that are produced by the standard least squares method are scale equivariant, i.e. if we multiply each input by c then the corresponding coefficients are scaled by a factor of 1/c. Therefore, regardless of how the predictor is scaled, the multiplication of predictor and coefficient(Xjβj) remains the same. However, this is not the case with ridge regression, and therefore, we need to standardize the predictors or bring the predictors to the same scale before performing ridge regression.
Lasso is another variation, in which the above function is minimized. Its clear that this variation differs from ridge regression only in penalizing the high coefficients. It uses |βj|(modulus)instead of squares of β, as its penalty. In statistics, this is known as the L1 norm.
Lets take a look at above methods with a different perspective. The ridge regression can be thought of as solving an equation, where summation of squares of coefficients is less than or equal to s. And the Lasso can be thought of as an equation where summation of modulus of coefficients is less than or equal to s. Here, s is a constant that exists for each value of shrinkage factor λ. These equations are also referred to as constraint functions.
Consider their are 2 parameters in a given problem. Then according to above formulation, the ridge regression is expressed by β1² + β2² ≤ s. This implies that ridge regression coefficients have the smallest RSS(loss function) for all points that lie within the circle given by β1² + β2² ≤ s.
Similarly, for lasso, the equation becomes,|β1|+|β2|≤ s. This implies that lasso coefficients have the smallest RSS(loss function) for all points that lie within the diamond given by |β1|+|β2|≤ s.
To read the whole article, with illustrations, click here. For another article on the same topic, follow this link
Views: 1500
Join Data Science Central
© 2021 TechTarget, Inc. Powered by
Badges | Report an Issue | Privacy Policy | Terms of Service |
From iCulturalDiplomacy
Jump to: navigation, search
Wastes discharged into surface water, sometimes considered to be water pollution. In physics/nuclear physics, Effluent is the radioactive waste released from a factory or nuclear plant. In earth sciences, the term refers to a stream that flows out of another body of water. For example, the Mississippi River’s effluent of fresh water is between 200, 000 to 709, 000 ft3, making a plume of fresh water detectable from space.
External links and references[edit] |
Pat Mora Immigrants
838 Words4 Pages
The Thorough Breakdown of Poem Immigrants
After reading and studying the poem “Immigrants” by Pat Mora, one can see and identify a few literary symbolisms that are used to express the fearful tone of the poem. This poems three literary symbols that can be seen are, a sense of pride, acceptance, and of course sacrifice. The tone of this poem show how much an immigrant has to sacrifice in this country, in order to gain acceptance and, therefore, be proud Americans. Although, they can’t ever stop being who they are, they must try and sacrifice their own culture in order to be Americans. The first symbol that this family shows in this poem is pride. These people are so proud to be here in America, that they are willing to let go of their
…show more content…
There are plenty of examples of sacrifices that this family has to make in order to gain our acceptance. A good example of this is seen, when the family decide to name their child accepted American names, instead of traditional names from which ever place they happen to be from, as show in line number three “name them Bill and Daisy”. This family is even willing to feed them junk American food, such as hot dogs and sweets and talk to them about sports, that they may not even understand in order to be more American as an example show in the line number (two, five) “feed them mashed hot dogs and apple pie” and “football and tiny cleats before the baby can even walk”. Even the facts shown in the previous paragraphs are sacrifices that an immigrant parents has to make. Can one imagine your kids not being able to speak our native tongue? These people are willing to speak to the in a foreign langue and only whisper their native language in order to be accepted by the people in their new adopted homeland. Immigrants are willing to give up their culture, give them foreign toys, teach them different sports, learn new languages, change their names and these are just a few of the sacrifices these people make to be here. This whole poem is filled with sacrifices that a parent has to make to their native culture in order to fit in and even with everything
Open Document |
Snow Queen Identity
1523 Words7 Pages
Nowadays, our society has made astonishing technological advances in communication, such as social media. However, social media frequently distorts our identity, because often we pretend to be someone we are not . Therefore, the true identity occurs when we preserved and respect our primitive beliefs and ideals about good and evil. So we must always defend our identity, because that is who we are.
In the story the “The Snow Queen” written by Hans Christian Andersen, the main characters Gerda and Kay are two teenagers living in harmony as brothers. In fact, Gerda and Kay loved spring and all the flowers. However, one day while playing a piece of glass entered the eye of Kay, and instantly, he turned wicked and evil against Gerda. In addition,
…show more content…
For example, in the film “List of Faerie Tale Theatre The Snow Queen” they display a scene “ when a piece of glass enters the eye of Kay and immediately he becomes furious and evil against Gerda. After this Kay is carried by the Snow Queen to her palace, where Greda cleans his madness with her tears” (List). This suggests that in the moment that the glass enters Kay eye his identity begins to change to a more adult independent identity, because in the film as well in the story Kay begins to forget his friendship with Gerda. Even worse, he argues with his Grandmother, and tries to imitate her. Due to this reason, Kay becomes a heartless person because now he no longer can experience emotions. Alternatively, when the Queen kisses Kay, half of his heart becomes ice, this could signify that as evil enters Kay heart; his emotions and feelings for others Vanished. On the other hand, when Gerda learns that Kay has had gone, she was the only person that decides to look for him, developing the identity of a protector of Kay. Furthermore, as the story continues the identity of Gerda transforms to a hero, because her love and innocence made her a special person with superpowers to make a change. Finally, in the end, we can see that Gerda rescues Kay from dying frozen and Kay eyes and heart are cleansed by the tears of Gerda. Overall, the main characters developed distinct identities with the utilization of binary oppositions with the intention to create meaning to the story. For example, the binary opposition of good and evil could be interpreted in correlation to a bible reference with the idea of sin and temptation. In other words, the troll and the snow queen could represent sin and temptation which divert Kay from seeing the truth and the right way. Moreover, Gerda could represent Jesus in the way she saves Kay from dying frozen
Open Document |
[AN #142]: The quest to understand a network well enough to reimplement it by hand
Ω 21
Audio version here (may not be up yet).
Circuits Thread (Various people) (summarized by Rohin): We’ve previously (AN #111) summarized the three main claims of the Circuits thread. Since then, several additional articles in the series have been published, so now seems like a good time to take another look at the work in this space.
The three main claims of the Circuits agenda, introduced in Zoom In, are:
1. Neural network features - the activation values of hidden layers - are understandable.
2. Circuits - the weights connecting these features - are also understandable.
3. Universality - when training different models on different tasks, you will get analogous features.
To support the first claim, there are seven different techniques that we can use to understand neural network features that all seem to work quite well in practice:
1. Feature visualization produces an input that maximally activates a particular neuron, thus showing what that neuron is “looking for”.
2. Dataset examples are the inputs in the training dataset that maximally activate a particular neuron, which provide additional evidence about what the neuron is “looking for”.
3. Synthetic examples created independently of the model or training set can be used to check a particular hypothesis for what the neuron activates on.
4. Tuning involves perturbing an image and seeing how the neuron activations change. For example, we might rotate images and see how that impacts a curve detector.
5. By looking at the circuit used to create a neuron, we can read off the algorithm that implements the feature, and make sure that it makes intuitive sense.
6. We can look to see how the feature is used in future circuits.
7. We can handwrite circuits that implement the feature after we understand how it works, in order to check our understanding and make sure it performs as well as the learned circuit.
Note that since techniques 5-7 are based on understanding circuits, their empirical success also supports claim 2.
The third claim, that the features learned are universal, is the most speculative. There isn’t direct support for it, but anecdotally it does seem to be the case that many vision networks do in fact learn the same features, especially in the earlier layers that learn lower-level features.
In order to analyze circuits, we need to develop interpretability tools that work with them. Just as activations were the primary object of interest in understanding the behavior of a model on a given input, weights are the primary object of interest in circuits. Visualizing Weights explains how we can adapt all of the techniques from Building Blocks to this setting. Just as in Building Blocks, a key idea is to “name” each neuron with its feature visualization: this makes each neuron meaningful to humans, in the same way that informative variable names make the variable more meaningful to a software engineer.
Once we have “named” our neurons, our core operation is to visualize the matrix of weights connecting one neuron in layer L to another in layer L+1. By looking at this visualization, we can see the “algorithm” (or at least part of the algorithm) for producing the layer L+1 neuron given the layer L neuron. The other visualizations are variations on this core operation: for example, we might instead visualize weights for multiple input neurons at once, or for a group of neurons together, or for neurons that are separated by more than one layer.
We then apply our machinery to curve detectors, a collection of 10 neurons that detect curves. We first use techniques 1-4 (which don’t rely on circuits) to understand what the neurons are doing in Curve Detectors. This is probably my favorite post of the entire thread, because it spends ~7000 words and many, many visualizations digging into just 10 neurons, and it is still consistently interesting. It gives you a great sense of just how complex the behavior learned by neural networks can be. Unfortunately, it’s hard to summarize (both because there’s a lot of content and because the visualizations are so core to it); I recommend reading it directly.
Curve Circuits delves into the analysis of how the curve detectors actually work. The key highlight of this post is that one author set values for weights without looking at the original network, and recreated a working curve detection algorithm (albeit not one that was robust to colors and textures, as in the original neural network). This is a powerful validation that at least that author really does “understand” the curve detectors. It’s not a small network either -- it takes around 50,000 parameters. Nonetheless, it can be described relatively concisely:
Gabor filters turn into proto-lines which build lines and early curves. Finally, lines and early curves are composed into curves. In each case, each shape family (eg conv2d2 line) has positive weight across the tangent of the shape family it builds (eg. 3a early curve). Each shape family implements the rotational equivariance motif, containing multiple rotated copies of approximately the same neuron.
(Yes, that’s a lot of jargon; it isn’t really meant to be understood just from that paragraph. The post goes into much more detail.)
So why is it amenable to such a simple explanation? Equivariance helps a lot in reducing the amount we need to explain. Equivariance occurs when there is a kind of symmetry across the learned neurons, such that there’s a single motif copied across several neurons, except transformed each time. A typical example of equivariance is rotational equivariance, where the feature is simply rotated some amount. Curve detectors show rotational equivariance: we have 10 different detectors that are all implemented in roughly the same way, except that the orientation is changed slightly. Many of the underlying neurons also show this sort of equivariance. In this case, we only need to understand one of the circuits and the others follow naturally. This reduces the amount to understand by about 50x.
This isn’t the only type of equivariance: you can also have e.g. neuron 1 that detects A on the left and B on the right, and neuron 2 that detects A on the right and B on the left, which is a reflection equivariance. If you trained a multilayer perceptron (MLP), that would probably have translational equivariance, where you’d see multiple neurons computing the same function but for different spatial locations of the image. (CNNs build translational equivariance into the architecture because it is so common.)
The authors go into detail by showing many circuits that involve some sort of equivariance. Note that equivariance is a property of features (neurons), rather than the circuits that connect them. Nonetheless, this is reflected in the structure of the weights that make up the circuit. The post gives several examples of such circuits. These can be of three types: invariant-equivariant circuits (building a family of equivariant features starting from invariant features), equivariant-invariant circuits, and equivariant-equivariant circuits.
High-Low Frequency Detectors applies all of these tools to understand a family of features that detect areas with high frequencies on one side, and low frequencies on the other. It’s mostly interesting as another validation of the tools, especially because these detectors were found through interpretability techniques and weren’t hypothesized before (whereas we could have and maybe did predict a priori that an image classifier would learn to detect curves).
Rohin's opinion: I really like the Circuits line of research; it has made pretty incredible progress in the last few years. I continue to be amazed at the power of “naming” neurons with their feature visualizations; it feels a bit shocking how helpful this is. (Though like most good ideas, in hindsight it’s blatantly obvious.) The fact that it is possible to understand 50,000 parameters well enough to reimplement them from scratch seems like a good validation of this sort of methodology. Note though that we are still far from the billions of parameters in large language models.
One thing that consistently impresses me is how incredibly thorough the authors are. I often find myself pretty convinced by the first three distinct sources of evidence they show me, and then they just continue on and show me another three distinct sources of evidence. This sort of care and caution seems particularly appropriate when attempting to make claims about what neural networks are and aren’t doing, given how hard it has historically seemed to be to make reasonable claims of that sort.
I’m pretty curious what equivariance in natural language looks like. Is it that equivariance is common in nearly all neural nets trained on “realistic” tasks, or is equivariance a special feature of vision?
Multimodal Neurons in Artificial Neural Networks (Gabriel Goh et al) (summarized by Rohin): CLIP is a large model that was trained to learn a separate embedding for images and text, such that the embedding for an image is maximally similar to the embedding for its caption. This paper uses feature visualization and dataset examples to analyze the vision side of the model, and shows that there are many multimodal neurons. For example, there is a Spiderman neuron that responds not just to pictures of Spiderman, but also to sketches of Spiderman, and even the word “spider” (written in the image, not the caption). The neurons are quite sophisticated, activating not just on instances of the concept, but also things that are related to the concept. For example, the Spiderman neuron is also activated by images of other heroes and villains from the Spiderman movies and comics. There are lots of other neurons that I won’t go into, such as neurons for famous people, regions, facial emotions, religions, holidays, abstract concepts, numbers, and text.
Unsurprisingly, many of these neurons encode stereotypes that we might consider problematic: for example, there is an immigration neuron that responds to Latin America, and a terrorism neuron that responds to the Middle East.
The concepts learned by CLIP also have some notion of hierarchy and abstraction. In particular, the authors find that when they train a sparse linear classifier on top of the CLIP features, the resulting classifier has a “hierarchy” that very approximately matches the hierarchy used to organize the ImageNet classes in the first place -- despite the fact that CLIP was never trained on ImageNet at all. (I’m not sure how approximate this match is.)
As mentioned before, the neurons can respond to text in the image, and in a few cases they can even respond to text in different languages. For example, a “positivity” neuron responds to images of English “Thank You”, French “Merci”, German “Danke”, and Spanish “Gracias”. The fact that the model is so responsive to text in images means that it is actually very easy to influence its behavior. If we take an apple (originally correctly classified as a Granny Smith) and tape on a piece of paper with the word “iPod” written on it, it will now be classified as an iPod with near certainty. This constitutes a new and very easy to execute “typographic” adversarial attack.
However, not everything that CLIP is capable of can be explained with our current interpretability techniques. For example, CLIP is often able to tell whether an image is from San Francisco (and sometimes even what region within San Francisco), but the authors were not able to find a San Francisco neuron, nor did it look like there was a computation like “California + city”.
Read more: Distill paper
Rohin's opinion: The “typographic adversarial attack” is interesting as a phenomenon that happens, but I’m not that happy about the phrasing -- it suggests that CLIP is dumb and making an elementary mistake. It’s worth noting here that what’s happening is that CLIP is being asked to look at an image of a Granny Smith apple with a piece of paper saying “iPod” on it, and then to complete the caption “an image of ???” (or some other similar zero-shot prompt). It is quite possible that CLIP “knows” that the image contains a Granny Smith apple with a piece of paper saying “iPod”, but when asked to complete the caption with a single class from the ImageNet classes, it ends up choosing “iPod” instead of “Granny Smith”. I’d caution against saying things like “CLIP thinks it is looking at an iPod”; this seems like too strong a claim given the evidence that we have right now.
Pixels still beat text: Attacking the OpenAI CLIP model with text patches and adversarial pixel perturbations (Stanislav Fort) (summarized by Rohin): Typographic adversarial examples demonstrate that CLIP can be significantly affected by text in an image. How powerfully does text affect CLIP, and how does it compare to more traditional attack vectors like imperceptible pixel changes? This blog post seeks to find out, through some simple tests on CIFAR-10.
First, to see how much text can affect CLIP’s performance, we add a handwritten label to each of the test images that spells out the class (so a picture of a deer would have overlaid a picture of a handwritten sticker of the word “deer”). This boosts CLIP’s zero-shot performance on CIFAR-10 from 87.37% to literally 100% (not a single mistake), showing that text really is quite powerful in affecting CLIP’s behavior.
You might think that since text can boost performance so powerfully, CLIP would at least be more robust against pixel-level attacks when the sticker is present. However, this does not seem to be true: even when there is a sticker with the true class, a pixel-level attack works quite well (and is still imperceptible).
This suggests that while the text is powerful, pixel-level changes are more powerful still. To test this, we can try adding another, new sticker (with the same label). It turns out that this does successfully switch the label back to the original correct label. In general, you can keep iterating the text sticker attack and the pixel-change attack, and the attacks keep working, with CLIP’s classification being determined by whichever attack was performed most recently.
You might think that the model's ability to read text is fairly brittle, and that's what's being changed by pixel-level attacks, hence adding a fresh piece of text would switch it back. Unfortunately, it doesn't seem like anything quite that simple is going on. The author conducts several experiments where only the sticker can be adversarially perturbed, or everything but the sticker can be adversarially perturbed, or where the copy-pasted sticker is one that was previously adversarially perturbed; unfortunately the results don't seem to tell a clean story.
Rohin's opinion: This is quite an interesting phenomenon, and I'm pretty curious to understand what's going on here. Maybe that's an interesting new challenge for people interested in Circuits-style interpretability? My pretty uneducated guess is that it seems difficult enough to actually stress our techniques, but not so difficult that we can't make any progress.
Ω 21
4 comments, sorted by Highlighting new comments since Today at 10:10 AM
New Comment
Yes, it's already been solved. These are 'attacks' only in the most generous interpretation possible (since it does know the difference), and the fact that CLIP can read text in images to, arguably, correctly note the semantic similarity in embeddings, is to its considerable credit. As the CLIP authors note, some queries benefit from ensembling, more context than a single word class name such as prefixing "A photograph of a ", and class names can be highly ambiguous: in ImageNet, the class name "crane" could refer to the bird or construction equipment; and the Oxford-IIIT Pet dataset labels one class "boxer".
Ah excellent, thanks for the links. I'll send the Twitter thread in the next newsletter with the following summary:
Last week I speculated that CLIP might "know" that a textual adversarial example is a "picture of an apple with a piece of paper saying an iPod on it" and the zero-shot classification prompt is preventing it from demonstrating this knowledge. Gwern Branwen [commented](https://www.alignmentforum.org/posts/JGByt8TrxREo4twaw/an-142-the-quest-to-understand-a-network-well-enough-to?commentId=keW4DuE7G4SZn9h2r) to link me to this Twitter thread as well as this [YouTube video](https://youtu.be/Rk3MBx20z24) better prompt engineering significantly reduces these textual adversarial examples, demonstrating that CLIP does "know" that it's looking at an apple with a piece of paper on it.
Related: Interpretability vs Neuroscience: Six major advantages which make artificial neural networks much easier to study than biological ones. Probably not a major surprise to readers here.
I really like this article. Just a bit of brainstorming, something that has almost certainly been tried:
a. You can feed in all your examples of a specific class into these image detectors and get a list of which neurons have non-negligible activations
b. You can then break a trained and effective [multi-class image detector] into separate [single class detectors] from just the neurons that 'matter'
c. Some of these detectors may have 'evolved' a better way to detect their class than others. You can then do a variety of mixing and matching by architecture transfer from a 'good' detector to a weak detector.
Essentially my thought is that while it may be exhaustive in human effort to really 'understand' how a given subsystem is done, you should be able to get closer to true global maxima in performance by taking the best examples of a repeating element that gets rediscovered over and over, and basically plugging it in everywhere this element will help.
It seems like there are many different instances of 'duplicated function' in networks, and like duplicated code, some of the code is going to be better than others.
Moreover, these methods would be general-purpose. |
Jump-shooting and flushing have slightly different connotations. Jump-shooting generally refers to putting ducks and geese up off the water and then taking flying-away shots at the birds. Flushing implies upland game, “flushed” out of heavy cover. But despite these casual differences, the concepts are very similar in practice.
In the above scenario, a hunter and her lab are working some old clearcuts and abandoned farmstead properties for ruffed grouse and woodcock in late September. The hunter has yet to hit this location this year. She has no idea where the birds might be hanging around.
So rather than working just one type of cover, she’s going to sample around and hit as many different micro-habitats as possible in hopes of kicking up a couple birds. If she gets one, she can examine the crop to see what it’s been eating. This will help her better narrow down the search for more birds, because all she has to do is find more sources of the chosen food — something that’s easier than searching for birds from scratch.
There are still some leaves on the trees, which makes it difficult to see any appreciable distance. She tries to stay out in the open as much as possible, where it’s more likely for her to actually catch a glimpse of a flushing bird. Meanwhile, her dog thick edges of cover that she’s paralleling. If the dog flushes a grouse or woodcock, the bird will likely escape by flying out through more open cover rather than trying to blast deeper into the thickets where it’s been feeding.
The hunter’s route takes her along the cut edge of a powerline, along a brushy creek channel, along the edges of an old apple orchard, and around a forgotten Christmas tree plantation. All are likely places for a game bird to hide, and hopefully, flush. |
A bus is moving with a constant velocity 10m/s on a straight road. A scooterist wishes to overtake the bus in 100s. If the bus is at a distance pf 1km from the scooterist, then the velocity with which scooterist should chase the bus is?
Asked by adityaahuja099 | 11th Oct, 2017, 07:01: PM
Expert Answer:
t= 100 s , d= 1000m Vbus =10m/s
Relative speed with respect to the bus
V = d/t = 1000/100= 10m/s
bus & scooter are moving along same direction
V = Vscooter-Vbus
10= Vscooter-10
10+10 = Vscooter
Answered by Gajendra | 27th Nov, 2017, 06:30: PM |
Cancer cells have a parasitic propensity in the primary host but
Cancer cells have a parasitic propensity in the primary host but their capacity to transit between individuals is severely restrained by two factors: a lack of a route for viable cell transfer and immune recognition in allogeneic, secondary recipients. can be seen as an evolutionary legacy [4]. But there is more to being a successful parasitic entity than simply Arranon reversible enzyme inhibition exploiting a bunch. Survival or durability like a parasitic lineage takes a collection of features: immune system evasion [5] and exploiting a practical route for transmitting between specific hostscoupled with proliferative immortality and maintenance of genome integrity. To get a cancer clone, probably the most stringent bottleneck can be transmission. The other traits are selected during cancer progression in the principal host or patient frequently. For instance, genetically unstable malignancies can evade defense assault via immuno-editing or lack of histocompatibility locus antigens (HLA) or neoantigens [6]. The capability of tumor cells to eliminate their identification tags can be even more evident under the strong selective pressure of targeted immunotherapy [7, 8]. Given appropriate selective pressures, enough cells and a high mutation rate, it is perhaps to be expected that cancer clone evolution should, at least very occasionally, enable between-host transmission? The answer to this question is yes, as it has happened in several animal species. We now have several unambiguous examples of transmissible cancers in animal species (Table 1) (reviewed in [9, 10]). In these examples, cancer cells are transferred between hosts by biting, sex or, possibly (for bivalve molluscs), filter-feeding. These Arranon reversible enzyme inhibition well-researched examples of contagious animal cancers are very instructive in terms of immune escape mechanisms and we may be under-estimating the number of examples that exist. Nevertheless, the eight clear examples we have are clonal and it seems reasonable to conclude that the emergence of an immortal lineage of transmissible cancer cells is an extremely rare event. Table 1. Transmissible cancers in animal species renders transmission of cancer between humans, unlike in CTVT and DFTD, highly unlikely? Two unbreachable barriers? Several decades ago, cancer cells were deliberately transplanted between human individuals in experiments conducted in the 1950s and 1960s that would now be considered unethical. Chester Southam and colleagues at Memorial Sloan Kettering Cancer Center inoculated cancer cells between cancer Arranon reversible enzyme inhibition patients and from cancer patients into volunteers from a State Penitentiary [14]. With one exception [15], no injected tumours grew beyond a nodule stage, presumably because of immune rejection. In a less fortunate case, melanoma cells from a patient were injected into her 80-year-old mother, in an attempt to elicit anti-tumour immunity. The recipient died with disseminated melanoma some 15 months later, presumed to be originating from the injected cells [16]. Allogenic organ or MMP19 blood transplantation into immuno-suppressed individuals has inadvertently offered an iatrogenic path for tumor cell transfer between people (Desk 2). Desk 2. Types of inter-person transfer of tumor (with monochorionic placentas).Identical Genetically.[58]Cross placental from mom to foetus.Deletion of disparate HLA loci.[33C35]Choriocarcinoma: embryonic trophoblast cells to mom.Modified HLA expression about trophoblast cells.[70]Defense silencing by trophoblasts.[25] Open up in another window aOnly grew as nodules at site of injection, aside from one case of allogeneic cancer used in another cancer patient that metastasized [15]. bIncludes a transfer from individual to cosmetic surgeon during a surgical procedure [95], unintentional inoculation in the tactile hand during biopsy [97] and transfer to a laboratory worker from a cell line [96]. In two of the complete instances, the transferred malignancies grew in recipients as nodules and didn’t disseminate probably reflecting immune system, HLA disparate, control. Nevertheless, in a single case [97], the tumor metastasized. Tumor continues to be sent between people consequently, albeit, and luckily, very rarely. Which can be under extremely contrived circumstances where in fact the two main restraints are breached: a bloodstream route for transmitting provided or can be naturally available immune system recognition can be evaded (Desk 2). The just natural route designed for.
Leave a Reply
|
Writing >
Respect Your Audience
A writer who wants to lead an audience towards a conclusion must refrain from clipping on a leash and pulling too hard. Being human, the audience is likely to resist being told what to think unless already perfectlyin tune with the writer's thinking ... and how often does that happen?
A writer who is very close to a subject being written about may fail to notice that the facts presented are open to alternative interpretations. If the writer's interpretation is presented as the only logical or only possible view, readers whose interpretations differ—possibly a considerable majority of the audience—could be irritated, or offended, or worse. As Sherlock Holmes said, in A Study in Scarlet, "I ought to know by this time that when a fact appears opposed to a long train of deductions it invariably proves to be capable of bearing some other interpretation."
Techniques to Use and to Avoid
A good approach is to lay out the facts in the most logical and cogent manner possible, then trust the reader to draw the appropriate conclusions. This technique is particularly applicable to fiction writing, in which character and setting are demonstrated by description, conversation, and situation. One hallmark of a less-developed fiction writer is dependence on narrative that bluntly tells the reader—in a sentence or two—what to think of a character or living space, instead of providing evidence to draw the reader to the desired conclusion in longer descriptive or situational passages. For example, rather than say "The Smiths had low-class tastes", the writer might describe how the Smith family's house was decorated.
When conclusions must explicitly be stated, make sure that the presentation is neutral and respects the independence of the reader to take them or to leave them. Trust to both your power of persuasion and your audience's common sense.
Avoid making value judgements based on certain facts or conclusions. Values are best judged by each reader independently. For example, a newspaper story leads off with the statements: "Students at Smith High School achieved the highest test scores of all the high schools in town. The school is also consistently rated "better than most" by a majority of its graduates." Do not follow up by a statement such as: "Smith High School is the best in the city." The question that is sure to be asked is: "Best at what?" Smith may be the best academically (or maybe it is simply located in an affluent neighbourhood). Maybe other schools have better remedial reading programs, sports participation, or drama and chess clubs. Value, like beauty, is in the eye of the beholder.
Avoid placing the reader on your side of an us-versus-them statement: "We now can see that....", "We recommend that...." Statements like these vaguely imply the superiority of the "we" (author) who is dictating to the "they" (reader). Rewrite the statements to emphasize the benefits of agreeing with the conclusions or advice being presented. For example, rather than use "We recommend that the Whizzbang be placed on a hard, flat surface", try "For best operation, place the Whizzbang on a hard, flat surface."
When to Force the Issue
Finally, ignore most of the preceding advice when writing cautions or warnings about hazardous materials, products, or processes. In these cases, you must be blunt and explicit about the hazard; you must ensure that the reader will understand the consequences of failing to heed the good advice being provided (value judgement); and you must emphasize the credibility of the "we" (expert) who is giving advice to the "they" (assumed novice) by stating credentials, as appropriate.
YouTube Video |
Úvodní stránka » Advertising & Marketing » What is ETC Transponder?
What is ETC Transponder?
ETC (Electronic Toll Collection) transponder is a small wireless communication device installed in a vehicle for electronic tolling purpose. When the vehicle passes the toll point, roadside transceiver reads out data stored in the transponder, and then the system automatically deducts the toll payable.
At present, the electronic tolling technologies vary from country to country. What are the pros and cons of ETC transponders that adopt different technologies?
1. Dedicated Short Range Communications (DSRC): It is the mainstream technology for electronic toll collection, applied in countries such as China, Japan, Korean, Singapore and most European countries. DSRC technology has higher vehicle identification precision and is mature in tolling application, but it costs relatively high in terms of in-vehicle transponder (DSRC on-board unit/OBU).
1. Radio Frequency Identification (RFID): The world’s first large-scale RFID-based tolling system opened in Taiwan in 2012. The RFID tollsystemis easier to be promoted on a large scale due to the low cost of RFID transponder/tag. Currently, many countries adopted or are considering using RFID technology for electronic tolling. However, RFID technology is relatively low in identification accuracy, which requires much human efforts to check and correct errors manually at the back-office system.
1. Satellite Positioning: At present, satellite tolling is rarely observed worldwide, only with a few cases in countries like Germany. The system locates vehicles via satellite, which requires no additional roadside investment. But the cost of in-vehicle transponder (GNSS on-board unit/OBU) is so high that it is difficult to promote satellite tolling on a large scale. In addition, satellite positioning accuracy is relatively low, unable to cope with complex road conditions, and is heavily affected by external factors. When encountering adverse weather, tunnels and other unfavorable circumstances, satellite signal will be blocked or too weak to be tracked, thereby resulting in positioning failure.
As one of a leading intelligent transportation systems companies, we bring people convenient intelligent road system.
Napsat komentář
osm − 3 = |
Rahul Sharma (Editor)
Poly(A) binding protein
Updated on
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit
Poly(A)-binding protein
Poly(A)-binding protein (PAB or PABP) is a RNA-binding protein which binds to the poly(A) tail of mRNA. The poly(A) tail is located on the 3' end of mRNA and is 200-250 nucleotides long. The binding protein is also involved in mRNA precursors by helping Polyadenylate polymerase add the Poly(A) nucleotide tail to the pre-mRNA before translation. The nuclear isoform selectively binds to around 50 nucleotides and stimulates the activity of Polyadenylate polymerase by increasing its affinity towards RNA. Poly(A)-binding protein is also present during stages of mRNA metabolism including Nonsense-mediated decay and nucleocytoplasmic trafficking. The poly(A)-binding protein may also protect the tail from degradation and regulate mRNA production. Without these two proteins in-tandem, then the poly(A) tail would not be added and the RNA would degrade quickly.
Poly(A) Binding Protein Structure
Cytosolic Poly-A Binding Protein (PABPC) is made up of four RNA recognition motifs (RRMs) and a C-terminal region known as the PABC domain. RRM is the most common motifs for RNA recognition and is usually made up of 90-100 amino acids. Previous solution NMR and X-ray crystallography studies have shown that RRMs are globular domains, each composed of 4 anti-parallel β sheets that are backed by 2 α-helices. The central two β-strands, connected by a short linker, of each RRM forms a trough-like surface that’s thought to be responsible for binding to the poly(A) oligonucleotides. The polyadenylate RNA adopts an extended conformation running the length of the molecular trough. Adenine recognition is primarily mediated by contacts with conserved residues found in the RNP motifs of the two RRMs. In vitro studies have shown the binding affinities to be on the order of 2-7nM, while affinity for poly(U), poly(G), and poly(C) were reportedly lower or undetectable in comparison. This shows that the poly(A)-binding protein is specific to poly(A) oligonucleotides and not others. Since the two central β-strands are used for poly(A) oligonucleotide binding, the other face of the protein is free for protein-protein interactions.
The PABC domain is approximately 75 amino acids and consists of 4 or 5 α-helices depending on the organism – human PABCs have 5, while yeast has been observed to have 4. This domain does not contact RNA, and instead, it recognizes 15 residues sequences that are a part of the PABP interaction motif (PAM-2) found on such proteins as eukaryotic translation termination factor (eRF3) and PABP interacting proteins 1 and 2 (PAIP 1, PAIP2).
The structure of human Poly-A Binding Protein found in the nucleus (PABPN1) has yet to be well determined but it has been shown to contain a single RRM domain and an arginine rich carboxy terminal domain. They are thought to be structurally and functionally different from Poly-A Binding Proteins found in the cytosol.
Expression and binding
The expression of mammalian Poly(A)-binding protein is regulated at the translational level by a feed-back mechanism: the mRNA encoding PABP contains in its 5' UTR an A-rich sequence which binds Poly(A)-binding protein. This leads to autoregulatory repression of translation of PABP.
The cytosolic isoform of eukaryotes' Poly(A) binding protein binds to the initiation factor eIF4G via its C-terminal domain. EIF4G is a component of the eIF4F complex, containing eIF4E, another initiation factor bound to the 5' cap on the 5' end of mRNA. This binding forms the characteristic loop structure of eukaryotic protein synthesis. Poly(A)-binding proteins in the cytosol compete for the eIF4G binding sites. This interaction enhances both the affinity of eIF4E for the cap structure and PABP1 for poly(A), effectively locking proteins onto both ends of the mRNA. As a result, this association may in part underlie the ability of PABP1 to promote small ribosomal (40S) subunit recruitment, which is aided by the interaction between eIF4G and eIF3. Poly(A)-binding protein has also been shown to interact with a termination factor (eRF3). The eRF3/PABP1 interaction may promote recycling of terminating ribosomes from the 3' to 5' end, facilitating multiple rounds of initiation on an mRNA. Alternatively, it may link translation to mRNA decay, as eRF3 appears to interfere with the ability of PABP1 to multimerise/form on poly(A), potentially leading to PABP1 dissociation, deadenylation and, ultimately, turnover.
Rotavirus NSP3
Rotavirus RNA-binding protein NSP3 interacts with eIF4GI and evicts the poly(A) binding protein from eIF4F. And NSP3A, by taking the place of PABP on eIF4GI, is responsible for the shut-off of cellular protein synthesis. Rotavirus mRNAs terminate a 3’ GACC motif that is recognized by the viral protein NSP3. This is the location where NSP3 competes with poly(A) binding protein for eIF4G binding.
Once rotavirus infection occurs viral GACC-tailed mRNAs are translated while the poly(A)-tailed mRNA is severely impaired. In infected cells, there have been high magnitudes of both translation induction (GACC-tailed mRNA) and reduction (poly(A)-tailed mRNA) both dependent on the rotavirus strain. These data suggest that NSP3 is a translational surrogate of the PABP-poly(A) complex; therefore, it cannot by itself be responsible for inhibiting the translation of host poly(A)-tailed mRNAs upon rotavirus infection.
PABP-C1 evicted from eIF4G by NSP3 accumulates in the nucleus of rotavirus-infected cells. This eviction process requires rotavirus NSP3, eIF4G, and RoXaN. To better understand the interaction, modeling of the NSP3-RoXaN complex, demonstrates mutations in NSP3 interrupt this complex without compromising NSP3 interaction with eIF4G. The nuclear localization of PABP-C1 is dependent on the capacity of NSP3 to interact with eIF4G and also requires the interaction of NSP3 with a specific region in RoXaN, the leucine- and aspartic acid-rich (LD) domain. RoXaN is identified as a cellular partner of NSP3 involved in the nucleocytoplasmic localization of PABP-C1.
Oculopharyngeal muscular dystrophy (OPMD) is a genetic condition that occurs in adulthood often after the age of 40. This disorder usually leads to weaker facial muscles oftentimes showing as progressive eyelid drooping, swallowing difficulties, and proximal limb muscle weakness such as weak leg and hip muscles. People with this disorder are often hindered to the point that they have to use a cane in order to walk. OPMD has been reported in approximately 29 countries and the number affected varies widely by specific population. The disease can be inherited as an autosomal dominant or recessive trait.
Mutations of Poly(A) Binding protein nuclear 1 (PABPN1) can cause OPMD (Oculopharyngeal Muscular Dystrophy). What makes the PABPN1 protein so different than all other genes with disease causing expanded polyalanine tracts, is that it is not a transcription factor. Instead, PABPN1 is involved in the polyadenylation of mRNA Precursors.
Mutations in PABPN1 that cause this disorder, result when the protein has an extended polyalanine tract (12-17 alanines long vs. the expected amount of 10). The extra alanines cause PABPN1 to aggregate and form clumps within muscles because they are not able to be broken down. These clumps are believed to disrupt the normal function of muscle cells which eventually lead to cell death. This progressive loss of muscle cells most likely causes the weakness in muscles seen in patients with OPMD. It is still not known why this disorder only affects certain muscles like the upper leg and hip. In recent studies on OPMD within drosophila flies, it has been shown that the degeneration of muscles within those who are affected may not solely be due to the expanded polyalanine tract. It may actually be due to the RNA-binding domain and its function in binding.
Current Studies
Recently, there has been a lot of effort devoted to research of OPMD and how one might treat it. Myoblast Transplantation has been suggested and is in fact in clinical trials in France. This is done by taking myoblasts from a normal muscle cell and putting them into Pharyngeal muscles and allowing them to develop to help form new muscle cells. There has also been testing of compounds, either existing or developed, to see if they might combat OPMD and its symptoms. Trehalose is a special form of sugar that has shown reduced aggregate formation and delayed pathology in the mouse model of OPMD. Doxycycline also played a similar role in delaying toxicity of OPMD in mouse models most likely due to stopping aggregate formation and reduced apoptosis. Many other compounds and methods are currently being researched and showing some success in clinical trials leading to optimism in curing this disease.
Gene Location
The PABPN1 gene is located on the long (q) arm of chromosome 14 at position 11.2. More precisely, the PABPN1 gene is located from base pair 23,320,188 to base pair 23,326,185 on chromosome 14.
There are several forms. These include:
• References
Poly(A)-binding protein Wikipedia
Similar Topics
Dust Devil (film)
Marina Berlusconi
Kazuto Nakazawa |
Our faculty continue to refine the cutting edges of research. Professor Ripan Malhi has been uncovering evidence of what caused so many Native Americans to die of disease when the Europeans arrived in the Americas, and the degree to which natural resistance enabled them to survive. DNA analysis provides evidence of distinct population dyamics among Native Americans over millenia of history (posted by C. Fennell). |
Frank Zappa In The 60s Quiz
Source: uDiscover Music Quiz.
When musical enigma Frank Zappa first appeared on the scene in the early 1960s, few people knew what to make of him. His experimental take on rock and roll that fused the avant-garde and R&B influences of his youth with risque and often political subject matter was either going to flop miserably or change music forever. Luckily for Zappa, the latter came to pass and his prolific output has influenced everyone from the biggest bands in the world to European revolutionaries. Some of his most significant work was released in the 1960s, a decade fueled by social upheaval and psychedelia, and even though Zappa was strongly opposed to drugs, his music and persona became a signifier of the era. |
Skip to main content
Crane fly
Q: I find large, mosquito looking insects in my house. What are they?
Q: I find large, mosquito looking insects in my house. They do not seem to bite but I want to know if this is really true. What can you tell me about them?
A: You are describing a crane fly from Tipulidae, which is the largest family of Diptera. Diptera has about 1,500 species in North America and 12,000 species worldwide. Crane flies are not mosquitoes at all and you are correct – they do not bite. Crane flies live in fresh water and moist soil but you can rest easy since they do not feed on humans or animals. The adult stage does not feed at all but merely is alive to reproduce.
The larval stage has chewing mouth parts and feeds on decaying leaves and other organic material. The larvae, called “leatherjackets,” because of their tough, outer skin are usually found in damp soil feeding on decaying vegetable matter. The maggots have no legs with poorly developed heads. They are about one inch long when mature and normally found in poorly-drained soils.
Even though you may see them in large numbers we generally considered them beneficial because crane fly larvae are an important part of the decomposition cycle. One other important thing to note is crane flies carry no disease and therefore it is not necessary to manage or chemically treat them. |
Carpe Diem philosophy
Description An essay bout 750 words and at least five paragraphs ,explain the positive and negative aspects of living one’s life according to the carpe diem philosophy. In the introduction , avoid giving audience the meaning of the carpe diem. Instead uses a quote, a provocative question, stating the significance of the topic or a combination of those strategies. In the conclusion avoid repeating the main ideas , offer a conclusion that is based on your essay. In addition , you must quote and cite at least two quality scholarly sources in the essay to support or expand your ideas. By “Quality” I mean that yoiu cannot cite wikipedia or ehow or sparknotes or schmoop or any other sources that have no author. The sources should have stated authors , and the authors should have the credentials that make them worthy of using in a college paper. You must use these sources in the body ,not in the conclusion or the introduction. You are required to use MLA format , which includes a proper heading and title, parenthetical documentation, and a “work cited” list following the essay. |
Courses of Study 2019-2020
May 11, 2021
Courses of Study 2019-2020 [ARCHIVED CATALOG]
Add to Favorites (opens a new window)
PHYS 1203 - Physics of the Heavens and the Earth
Spring. 3 credits. Student option grading.
For non-science majors.
N. Holmes.
This course offers opportunities to face fundamental issues in scientific thought, and to provide a sense of the profound ideas that form the modern views of our world. Physics is not a collection of laws, or dry mathematical formulas that must be painfully memorized and exercised. Astronomy is not just a collection of fascinating, disconnected facts about our universe. This course introduces physics and astronomy as the development of a basic curiosity about our world, and a grand desire to understand how it works. A significant theme of this course will be: “What and how do we know?” This will include discussions of how scientific thought and ideas have evolved over time, as well as who has been involved in that evolution.
Add to Favorites (opens a new window) |
Morphine Addiction and Abuse in South Yorkshire South Yorkshire
Knowledge Of Morphine
Morphine is the substance from which Heroin is derived and just like Heroin, it changes how the brain perceives pain
An opioid pain medication, Morphine is prescribed to alleviate moderate to severe pain. Named after Morpheus, the Greek divine force of dreams, Morphine gives sentiment elation often depicted as a dreamlike state.
The medicine can be used a tablet, syrup or injection. At times, Morphine can even be smoked.
Morphine can possibly be exceedingly addictive as resilience to it grows quickly.
Morphine Abuse And Effects
A fatally assigned chronicle II drug, Morphine is prescribed as a painkiller after major surgeries or for relief against cancer-related pain. After all, Morphine is highly potential for misuse, due to being pleasurable and relatedly more accessible.
Morphine and Heroin are quite similar since Morphine is processed from opium poppies and Heroin is processed from the resultant Morphine. Associate with us now for help fighting a Morphine obsession.
Because of it being an opioid, Morphine is frequently used by many to experience a euphoric-like state. Those with chronic pain also might start abusing it, thus raising chances of becoming dependent on Morphine for those users.
Abuse of Morphine refers to use of the drug minus a valid prescription. Morphine is one of the most highly controlled legal drugs in the world. Without a prescription, Morphine possession is a crime and severity of that offense depends on the amount someone has on its person and on that person's location.
Some of the immediate effects of taking Morphine are
• Overexcitement
• Reduced pain
• Rehabilitation
• Anxiety relief
Overdosing is a real possibility and risk for those that abuse Morphine in high amounts. A Morphine abuser showing shallow breathing, unresponsiveness, speech difficulties and extreme sleepiness is likely to have overdosed. This is on the grounds that Morphine slows down the central nervous system. Overdosing on Morphine can prompt to faintness, trance like state or reduced breathing to the point of death.
Ready to Get Help?
CALL US NOW ON 0800 772 3971
Dependence On Morphine
Morphine is a powerful drug and its repeated abuse leads to addiction. Strong desire for bigger amounts of Morphine in order to feel its effects means that tolerance has developed and that is how dependency starts.
What makes it hard to quit the drug at this point is that once tolerance and dependence set it, not taking the drug will be accompanied by withdrawal symptoms. Physical dependence will occur and psychological dependence will follow soon after.
Even while being fully aware of the negative impact, a person who's addicted to Morphine will still continue to use it.
Morphine addiction is like Heroin dependence and is one of the most troublesome addictions to overcome. Abrupt stop of Morphine use can effect making a person stressed; thus, a medically managed treatment is the only way for the drug to get rid of the person's body. Contact us to discover how to securely detox from Morphine.
Morphine And Other Substances
Blending Morphine with different drugs, particularly those with depressant qualities, can be to a great degree unsafe. Alcohol and Morphine are both central nervous system (CNS) depressants and for that reason mixing these two substances is extremely risky. Comas and extreme sedation are quite possible when these two are mixed.
Morphine Misuse And The Stats
Morphine Dependence And Overcoming It
It's not impossible to kick your Morphine addiction even if it will be challenging. Researches have demonstrated that addicts who can roll out life improvements significantly increase their chances of recuperation without backslide. Beat your Morphine dependency by finding someone to assist you in your fight. |
Genomic Diagnosis and Individualized Therapy of Highly Penetrant Genetic Diabetes
Study ID Alternative Stable ID Type
phs001771 Longitudinal
Study Description
The most common and well-known causes of diabetes are type 1 and type 2 diabetes; however, there are many other etiologies of diabetes. At least 1-2% of diabetes cases result from high penetrance single gene defects, most commonly in a gene encoding either a transcription factor involved in beta cell development and function or the enzyme glucokinase (GCK). Others have mutations in transcription factors necessary for beta cell development and function. This subset of monogenic diabetes cases is autosomal dominant and is known as "Maturity-Onset Diabetes of the Young" (MODY).
Patients with type 1 diabetes are insulin dependent, meaning they lack insulin production and therefore require multiple daily injections of insulin, as well as multiple times a day blood glucose monitoring. This can be quite burdensome. Type 2 diabetes is predominantly an insulin resistance problem and can often be managed with pills initially, but there are many who also require insulin either at diagnosis or later on in their disease course. Usually, monogenic diabetes is misdiagnosed as type 1 or ... (Show More)
Archive Link Archive Accession
dbGaP phs001771
Who archives the data?
There are no publications available |
A mathematical tool to hierarchically represent a function. Similar to the Fourier transform, but with the added advantages of multiresolution analysis, and being able to choose from a variety of wavelet basis to suit your application. Has been used a lot in signal processing. Recently, it has also started being used in computer graphics, to represent curves and surfaces. It also turns out that it is great for image compression and beats JPEG hollow.
A wavelet is a very simple class of mathematical transforms to apply to a signal or other chunk of data, typically for the purpose of compression or analysis or the like. It gets its name because the decomposition of the function looks like a single period of a wave; for example, the simple Haar transform looks like a squarewave.
The basic idea in a wavelet filter is that you have a function which, when given 2^n pieces of data, produces the average (the a - or average - channel) of the data and (2^n)-1 pieces of data needed to reconstitute the original 2^n (the d - or difference - channels). Typically the filter should make it so that if any of the d channels are lost, the overall integrity of the data is preserved. As such, typically after the transform is applied, they are stored with the a channel first and then the d channels coming afterwards. For a thorough wavelet transform, the process is repeated on the a channel until there is only one data element for a sum total a channel and then a whole bunch of d channels afterwards. This way, as more of the data is, say, downloaded, it becomes more accurate, as more of the d channels are present in order to reconstitute the original signal.
Probably the simplest wavelet transform is the Haar transform, which is quite simple; basically, given data points x1 and x2, the Haar transform produces a=(x1+x2)/2 and d=x1-a. Then to reconstitute the original x1 and x2, it is simply x1=(a-d) and x2=(a+d). Usually both channels are stored multiplied by 2 so that all of the precision is preserved. Abstracting this filter to higher dimensions is rather simple, though there are two ways to go about it (either apply the Haar transform to more points at a time, or apply it on each axis).
Now, the astute will notice that the wavelet transform itself doesn't actually compress the data - it only rearranges it. Where the compression comes in is that the d channels tend to be very compressible, especially when patterns are involved, since the d channels will tend to have a very regular pattern even if the underlying a channel does not, and so traditional windowing compression mechanisms such as good ol' LZ77 will end up compressing the resulting data very nicely. As an example, on my own CODEC (which uses a modified Haar wavelet which isn't technically a wavelet but it exhibits many wavelet properties), an image of a multilayered checkerboard pattern compresses by about 128:1. (Plain LZ77 gets a mere 43.5:1 on the same image. Okay, so it's not a very representative image in general, but it's a nice case to exaggerate the difference.)
Of course, some of the other wavelets don't work in the same way, strictly speaking. They use different numbers of samples in the various channels, and do different things to the channels. Unfortunately, Haar is about all I know about wavelets. :)
The big disadvantage to wavelets is that, if made lossless, for every big win there's a huge lose in terms of compression ratio. For example, whereas plain LZ77 doesn't break down too badly with random data (it rarely gets bigger), wavelets tend to cause the cases where LZ77 breaks down to explode - one image of just random data remains basically the same size with plain LZ77, whereas when the wavelet transform is applied to it, it expands at about 1:2. Similarly, some images which compress very nicely under LZ77 (a version of the self-portrait on my home node, for example) don't compress very well at all with the Haar transform (the wavelet CODEC gets "only" 1.95:1, but plain LZ77 gets 2.4:1).
Now, the best sort of wavelet compression is one where it adapts to the different levels and decides on a per-level basis how to compress it. Unfortunately, that is certainly non-trivial, and one of Michael Barnsley's patents probably covers it, too. :P
In the interest of establishing prior art in case nobody has thought of this (but it gets patented later), though, here's an algorithm, in pseudocode format, for doing this sort of multiresolution analysis:
1. Determine the compressed size of the current level of detail with a variety of filters; these filters may (and should) recursively call this procedure for the chunk of data passed to them. Keep track of the minimum size.
2. Split the current level into 2^n chunks (for n dimensions) and apply this algorithm to those smaller chunks
3. Write out whichever way puts out the smallest image
Now, that's kind of obtuse, but it's very black boxy in design. For example, one of the filters would be a generic "wavelet" filter, which would try various wavelet transforms on the data and then apply the sum-total compression-determination algorithm to its a channel (so that channel can try a different filter on it, or can be split up into 2^n chunks to be further processed with some other filter), or whatever.
Of course, each written-out chunk would have to be tagged with the transform applied to it so that it could be reconstituted when read back in.
Damnit, I want to implement this now. :) Unfortunately, determining the compressed size of a chunk of data is a bit non-trivial. :/
Wave"let (?), n.
A little wave; a ripple.
© Webster 1913.
|
― Richie Norton
What is Fear?
Throughout the existence of the human race, fear is an emotion that has been interspersed with other more common emotions like happiness and sadness in the minds of a human. Fear, by definition, is a very unpleasant or disturbing feeling caused by the presence or imminence of danger. There’s no one who has been spared. Everyone has a fear of something or the other. The only disparity is that in some, it is more pronounced while in others, it is less. It can be described in two different ways. In uncountable form, its caused by actual or perceived danger. In the countable form, it’s induced by something or someone.
How to Overcome Fear of the Dark?
Fear of the Dark(Achluophobia/Nyctophobia) What is Fear of the Dark? Fear of darkness (Achluophobia/Nyctophobia), is a common phobia among children, but adults can also have this phobia. It...
Fear of Domestic Violence
The Fear of Domestic Violence Fear is a negative emotion which makes a person vulnerable to many other things like mental and physical problems which leads him/her in the loop of darkness... |
Answer :
All the cells of our body produce waste of some kind. These waste products cannot be allowed to stay inside the body because they will accumulate and cause problems. Sometimes, it can even be fatal. Therefore, the waste products need to be removed from the body. This process of elimination is known as excretion.
Rate this question :
How useful is this solution?
Find out about thNCERT Science
Why is it necessaNCERT Science
In which of the fNCERT - Exemplar Science
Name the process NCERT - Exemplar Science
Arrange the folloNCERT - Exemplar Science
Boojho's uncle waNCERT - Exemplar Science
Aquatic animals lNCERT - Exemplar Science
The muscular tubeNCERT - Exemplar Science
When a person sufNCERT Science
Draw a diagram ofNCERT Science |
Quick Answer: What Is The Major Function Of Th2 Cells?
How does a th2 cell protect the host?
Metazoan parasites typically induce a type 2 immune response, characterized by T helper 2 (Th2) cells that produce the cytokines IL-4, IL-5 and IL-13 among others.
The type 2 response is host protective, reducing the number of parasites either through direct killing in the tissues, or expulsion from the intestine..
What stimulates th2?
The most efficient way to stimulate Th2 cells to produce cytokines is through their TCRs or by chemicals such as PMA and ionomycin to mimic TCR-mediated signaling. TCR stimulation activates NFAT family members in a Ca2+ dependent manner208.
What produces il10?
In humans, IL-10 is encoded by the IL10 gene, which is located on chromosome 1 and comprises 5 exons, and is primarily produced by monocytes and, to a lesser extent, lymphocytes, namely type-II T helper cells (TH2), mast cells, CD4+CD25+Foxp3+ regulatory T cells, and in a certain subset of activated T cells and B cells …
What do B cells do?
B cells are at the centre of the adaptive humoral immune system and are responsible for mediating the production of antigen-specific immunoglobulin (Ig) directed against invasive pathogens (typically known as antibodies).
Is lupus th1 or th2 dominant?
On the contrary, systemic autoimmune diseases such as systemic lupus erythematosus (SLE) and Sjögren’s syndrome(SS) are characterized by Th2 dominant imbalance of cytokine production.
What is a Type 1 immune response?
What is a th2 cell?
T helper type 2 (Th2) cells are a distinct lineage of CD4+ effector T cell that secretes IL-4, IL-5, IL-9, IL-13, and IL-17E/IL-25. These cells are required for humoral immunity and play an important role in coordinating the immune response to large extracellular pathogens.
Are th2 cells anti inflammatory?
Can the immune system kill parasites?
As with viral infections, antibody is effective only against extracellular parasites and where parasite antigens are displayed on the surface of infected cells. Antibody can neutralize parasites by combining with various surface molecules, blocking or interfering with their function.
What activates th1?
Th1 helper cells lead to an increased cell-mediated response, typically against intracellular bacteria and protozoa. They are triggered by the polarising cytokine IL-12 and their effector cytokines are IFN-γ and IL-2.
What is the th2 immune response?
The Th2 response is characterized by the release of Interleukin 5, which induces eosinophils in the clearance of parasites. Th2 also produce Interleukin 4, which facilitates B cell isotype switching. In general, Th2 responses are more effective against extracellular bacteria, parasites including helminths and toxins.
What is th2 inflammation?
Th2 responses. Th2 cell-mediated inflammation is characterized by the presence of eosinophils and basophils, as well as extensive mast cell degranulation—a process dependent on cross-linking surface-bound IgE. … In humans, Th2 cells appear to play a critical role in the pathogenesis of atopic dermatitis (Chapter 44).
How can I boost my th1 immune system?
When Th1 and Th2 are balanced, so is the immune response….In addition, there are several natural substances that have been shown to help balance cytokine production and support Th1 differentiation, including:Berberine.Broccoli sprout extract.Chinese skullcap.Ginger.Sulphoraphane.Zinc.
What is th2 dominance?
Th2 cells drive the type-2 pathway (“humoral immunity”) and up-regulate antibody production to fight extracellular organisms; type 2 dominance is credited with tolerance of xenografts and of the fetus during pregnancy. Overactivation of either pattern can cause disease, and either pathway can down-regulate the other.
What is th1 polarization?
Th1 and Th2 cells are characterized by their mutually exclusive ex- pression patterns of cytokines. Th1 cells produce IFN-, whereas Th2 cells produce IL-4, IL-5, and IL-13 (2). … Such polarizing signals induce up-regulation of transcription factors that drive the differentiation of Th1 and Th2 cells.
What does th2 stand for?
type II helper T cellsDepending on the cytokines they synthesize and secrete, CD4+ helper T cells (Th) can be divided into two subgroups, type I helper T lymphocytes (Thl) and type II helper T cells (Th2). Both types of cells are differentiated from common T cell helper precursor (Thp).
What do T helper 2 cells do?
T-helper 2 cells are a specialized population of T cells. They are important for immune responses against pathogens that do not directly infect cells, such as helminth parasites. They also promote tissue repair, but contribute to allergic disorders and diseases such as asthma. |
Cooloola City Farm reopens
City Farm - Photograph: Queensland Museum
Photograph: Queensland Museum
City Farm has been closed, but we plan to re-open on June 2, on Tuesdays and Thursdays from 8am – 2.30pm, unless governmental restrictions are re-imposed.
In recent articles, we have discussed attracting native animals into your garden. This month, we discuss lizards.
Why would you want lizards in your garden? Well, they eat insects such as cockroaches, moths, flies and beetles and spread the seeds of native plants and may pollinate flowers. They are a sign of a healthy native garden.
As with other native animals, lizards need an environment that allows for their special needs and provides food and protection. Lizards require places to hide as they are vulnerable to predators such as birds, dogs and cats. They love logs, mulch, leaf litter and twigs. Logs provide snug holes, mulch creates a humid environment that attracts insects and leaf litter and twigs give protection.
Lizards also appreciate stone walls or rocks in sunny, protected places for basking and the sanctuary provided by crevices or spaces underneath.
Lizards rely on insects for food, but will also eat fruit, so plants that produce small fruit and berries will help them survive in your garden. Grow vines up trees so lizards can scale them while remaining hidden from predators. Groundcovers will enhance survival chances too.
As with other native animals, lizards will not survive where they don’t have food sources and protection from predators, so consider providing for lizards in your garden, as it would be a pity to miss out on these helpful creatures.
City Farm is opposite the Community Centre, on Tin Can Bay Road, 07 54862304., website:
%d bloggers like this: |
Fifty key thinkers on history
Marnie Hughes-Warrington
Research output: Book/ReportBookpeer-review
"Fifty Key Thinkers on History" is a superb guide to historiography through the ages. The cross-section of debates and thinkers covered is unique in its breadth, taking in figures from ancient China, Greece and Rome, through the Middle Ages, to contemporary Europe, America, Africa and Australia; from Bede to Braudel; Marx to Michelet; Ranke to Rowbotham; Foucault to Fukuyama. Each clear and concise essay offers biographical information, a summary and discussion of the subjects approach to history and how others have engaged with it, a list of their major works and a guide to diverse resources for further study, including books, articles, films and web sites.
Original languageEnglish
Place of PublicationLondon ; New York
PublisherRoutledge, Taylor and Francis Group
Number of pages363
ISBN (Print)0415169828
Publication statusPublished - 2000
Publication series
NameRoutledge key guides
• Historiography
• Historiens--Biographies--Dictionnaires anglais
• Historiographie--Dictionnaires anglais
Fingerprint Dive into the research topics of 'Fifty key thinkers on history'. Together they form a unique fingerprint.
Cite this |
EART162: PLANETARY INTERIORS Francis Nimmo F.Nimmo EART162 Spring
EART162: PLANETARY INTERIORS Francis Nimmo F.Nimmo EART162 Spring
EART162: PLANETARY INTERIORS Francis Nimmo F.Nimmo EART162 Spring 10 Last Week Global gravity variations arise due to MoI difference (J2) We can also determine C, the moment of inertia, either by observation (precession) or by assuming a fluid planet Knowing C places an additional constraint on the internal mass distribution of a planet (along with bulk density) Local gravity variations arise because of lateral differences in density structure To go from knowing the mass/density distribution to knowing what materials are present, we need to understand how materials behave under planetary interior conditions . . . F.Nimmo EART162 Spring 10 This Week Material Properties How do planetary materials respond to conditions in
their interiors? Atomic description of matter Elastic properties Basic concepts stress and strain, Hookes law Elastic parameters Equations of state Viscous properties Basic concepts stress and strain rate Flow law See Turcotte and Schubert chapters 2,3,7 F.Nimmo EART162 Spring 10 Atomic Description Long-range attraction Energy Short-range repulsion
Binding 0 energy Lattice spacing Equilibrium spacing Equilibrium lattice spacing is at energy minimum (at zero temperature) Binding energy is amount required to increase lattice spacing to infinity To increase or decrease the lattice spacing from the eqbm. value requires work So deforming (straining) a solid requires work to be done, in other words we have to apply a stress Macro-scale properties of a solid are determined by its
atomic properties. An example: F.Nimmo EART162 Spring 10 Energy 0 Thermal Expansivity bA b0 b1 bB Above 0 K, the lattice Lattice spacing energy includes a kinetic energy component (=3/2 kT, where k is Boltzmanns constant) The lattice will disaggregate (melt) when 3/2 kT ~ the binding energy of the lattice When kinetic energy is added, the mean lattice spacing is (bA+bB)/2 = b1 > b0
So the lattice will expand when it is heated The macroscopic thermal expansivity L /L) / depends on the atomic properties of the material F.Nimmo EART162 Spring 10 Stress and Strain These are the fundamental macroscopic quantities describing deformation Stress is the applied force per unit area which is causing the deformation (units Nm-2=Pa) Strain is the relative length change in response to the applied stress (dimensionless) In general, compressional stresses and strains will be taken as positive, extension as negative (other people may use the opposite convention!) F.Nimmo EART162 Spring 10 Stress () Normal stress: = F / A (stress perpendicular to plane)
F A Example: mass of overburden per unit area = h, so pressure (stress) = gh Shear stress: = F / A (stress parallel to plane) h F A In general, a three-dimensional stress distribution will involve both normal and shear stresses F.Nimmo EART162 Spring 10 Strain ()
L L Normal strain =L / L (dimensionless) In three dimensions , the fractional change in volume, =V/V=x+y+z Shear strain xy involves rotations (also dimensionless) x wy xy 12 (1 2 ) x 1 y y 2
wx = 1 wy wx 2 x y Note that xy=yx 1 wy wx 2 x y Amount of solid body rotation is
If =0 then there is no rotation pure shear F.Nimmo EART162 Spring 10 Elasticity stress Materials which are below about 70% of their melting temperature (in K) typically behave in an elastic fashion In the elastic regime, stress is yielding failure proportional to strain (Hookes law): plastic elastic strain E
The constant of proportionality E is Youngs modulus Youngs modulus tells us how resistant to deformation a particular material is (how much strain for a given stress) Typical values of Youngs modulus are 1011 Pa (for rock) and 1010 Pa (for ice) F.Nimmo EART162 Spring 10 Uniaxial Stress 1 1 3 1 E 1 2 3 Unconfined materials will expand perpendicular to the
2 applied stress Amount of expansion is given by 2=3=0 Poissons ratio What is an example of a material 1 with a negative value of ? E 1 E Note convention: compression is positive A material with =1/2 is incompressible. What does this mean? Geological materials generally have =1/4 to 1/3 F.Nimmo EART162 Spring 10
Plane Stress If we have two perpendicular stresses, we get plane stress Results can be obtained by adding two uniaxial stress cases (previous slide) We will use these results in a while, when we consider flexure 1 2 1 2 3 1 E1 ( 1 2 ) 2 E1 ( 2 1 ) 3 Ev ( 1 2 )
Extension to three dimensions is straightforward: 1 E 1 1 v E 2 v E 3 Et cetera . . . F.Nimmo EART162 Spring 10 Pure Shear and Shear Modulus
Pure shear is a special case of plane stress in which =- and the stresses x normal to the object are zero You can see this by resolving 1 and 2 onto x or y 1 y 2 45o x y xy You can also see that the shear stresses xy = 1 = -2
From the previous slide we have 1=(1+v)1/E=(1+v)xy/E In this case, 1=xy so xy=Exy/(1+v) We can also write this as xy = 2G xy where G is the shear modulus and is controlled by E and : E G 2(1 v) F.Nimmo EART162 Spring 10 Bulk Modulus Isotropic stress state 1=2=3=P where P is the pressure If the stresses are isotropic, so are the strains 1=2=3 Recall the dilatation =1+2+3 and gives the fractional change in volume, so here =31 From before we have 1 E1 1 Ev 2 v E
3 E1 (1 2v) P E K So we can write P 3(1 2v) Here K is the bulk modulus which tells us how much pressure is required to cause a given volume change and which depends on E and (like the shear modulus) The definition of K is dV d dP V K F.Nimmo EART162 Spring 10 Example Consider a column that is laterally unconstrained i.e. in a uniaxial stress state Vertical stress = g z Strain (z) = g z / E To get the total shortening, we integrate: h
2 gh h dz 2E 0 z h E.g. Devils Tower (Wyoming) h=380m, h=2cm What kind of geological formation is this? F.Nimmo EART162 Spring 10 Summary Elasticity involves the relationship between stress and strain The two most important constants are the Youngs modulus E and Poissons ratio
Hookes law: = E Other parameters (shear modulus G, bulk modulus K) are not independent but are determined by E and xy = 2G xy The shear modulus G is the shear equivalent of Youngs modulus E d dP K The bulk modulus K controls the change in density (or volume) due to a change in pressure F.Nimmo EART162 Spring 10 Hydrostatic equation To determine planetary interior structure, we need to
understand how pressure changes with depth Consider a thin layer of material: dz We have dP = g dz This gives us P=gh (if g and are constant!) This is the equation for hydrostatic equilibrium (the material is not being supported by elastic strength or fluid motion) Hydrostatic equilibrium is a good assumption for many planetary interiors F.Nimmo EART162 Spring 10 Equations of State What is an equation of state? It describes the relationship between P, T and V (or ) for a given material Why is this useful? P and T both change (a lot!) inside a planet, so we
would like to be able to predict how varies Example ideal gas: PV P / RT Note that here V is the specific volume, so = 1/V This allows us to e.g. predict how pressure varies with altitude (scale height) Similar results may be derived for planetary interiors F.Nimmo EART162 Spring 10 EoS and Interiors (1) Recall the definition of bulk modulus K: dP dP K V dV d This is an EoS which neglects T (isothermal) Why is it OK to neglect T (to first order)? We can use this equation plus the hydrostatic assumption to obtain (how?):
2 g d dz K Does this equation make sense? F.Nimmo EART162 Spring 10 EoS and Interiors (2) 2g d dz K The problem with this equation is that both g and K are likely to vary with depth. This makes analytical solutions very hard to find. If we make the (large) assumption that both g and K are constant, we end up with:
1 0 gz 0 1 K This approach is roughly valid for small bodies where pressures are low (0gR << K) What is the maximum size planet we could use it for? K surface ~150 GPa F.Nimmo EART162 Spring 10 EoS and Interiors (3) In the previous slide we assumed a constant bulk modulus (now called K0) The next simplest assumption is that K=K0+K0P where K0=dK/dP|P=0 (~4 for geological materials) We can use this assumption to get' Murnaghans EOS: 1/ K 0 ' K0
0 1 P K0 This is more realistic but cant be used to obtain analytical solutions (why not?) F.Nimmo EART162 Spring 10 Example - Earth Dashed lines are theory, solid lines are seismicallydeduced values. Theory assumes constant g and K: 1 0 gz 0 1 K Figure from Turcotte & Schubert, 1st ed. (1982)
Note that the very simple EoS assumed does a reasonable job of matching the observed parameters What are the reasons for the remaining mismatch? F.Nimmo EART162 Spring 10 Example - Io Io bulk density 3.5 g/cc, mantle surface density 3.3 g/cc What would the density of mantle material be at the centre of Io? 1 -2 km, K~10 Pa, R~1800 0 gz g=1.8 ms so centre~3.7 g/cc 0 1 K 11 What approximations are involved in this calculation, and what is their effect? Bulk density is skewed to surface density (because of greater volume of near-surface material)
For a linear variation in , bulk=0 + (centre-0)/3 So predicted bulk density is 3.43 g/cc So what do we conclude about Io? F.Nimmo EART162 Spring 10 Summary Equations of state allow us to infer variations in pressure, density and gravity within a planet The most important variable is the bulk modulus, which tells us how much pressure is required to cause a given change in density The EoS is important because it allows us to relate the bulk density (which we can measure remotely) to an assumed structure e.g. does the bulk density imply the presence of a core? Calculating realistic profiles for P,,g is tricky because each affects the others F.Nimmo EART162 Spring 10 Flow
At temperatures > ~70% of the melting temperature (in K), materials will start to flow (ductile behaviour) E.g. ice (>-80oC), glass/rock (>700oC) Cold materials are elastic, warm materials are ductile The basic reason for flow occurring is that atoms can migrate between lattice positions, leading to much larger (and permanent) deformation than the elastic case The atoms can migrate because they have sufficient (thermal) energy to overcome lattice bonds This is why flow processes are a very strong function of temperature F.Nimmo EART162 Spring 10 Examples of Geological Flow Mantle convection Glaciers Salt domes Lava flows
~50km F.Nimmo EART162 Spring 10 Flow Mechanisms For flow to occur, grains must deform There are several ways by which they may do this, depending on the driving stress All the mechanisms are very temperature-sensitive Increasing stress / strain rate Diffusion creep (n=1, grain-size dependent) Grain-boundary sliding (n>1, grain-size dependent) Dislocation creep (n>1, indep. of grain size) Here n is an exponent which determines how sensitive to strain rate is to the applied stress. Fluids with n=1 are called Newtonian.
F.Nimmo EART162 Spring 10 Atomic Description No. of particles Atoms have a (Boltzmann) Peak = kT/2 distribution of kinetic energies Mean= 3kT/2 The distribution is skewed there is a long tail of highEnergy E energy atoms The fraction of atoms with a kinetic energy greater than a particular value E0 is: E0 f ( E0 ) 2 exp( E0 / kT ) kT If E0 is the binding energy, then f is the fraction of atoms able to move about in the lattice and promote flow of the material So flow is very temperature-sensitive
F.Nimmo EART162 Spring 10 Elasticity and Viscosity Elastic case strain depends on stress (Youngs mod. E) / E Viscous case strain rate depends on stress (viscosity ) / We define the (Newtonian) viscosity as the stress required to cause a particular strain rate units Pa s Typical values: water 10-3 Pa s, basaltic lava 104 Pa s, ice 1014 Pa s, mantle rock 1021 Pa s Viscosity is a macroscopic property of fluids which is determined by their microscopic behaviour F.Nimmo EART162 Spring 10 Viscosity in action Definition of viscosity is stress / strain rate For a typical terrestrial glacier =1014 Pa s. Typical stresses driving flow are ~1 MPa (why?) velocities
Strain rate = stress / visc = 10 -8 s-1 Centre-line velocity ~ 10-5 m s-1 ~ 0.3 km per year ~1km glacier (Velocity profile is not actually linear because of nonNewtonian nature of ice) Temperature-dependence of viscosity is very important. E.g. Do glaciers flow on Mars? How can the Earths mantle both convect and support surface loads simultaneously? F.Nimmo EART162 Spring 10 Summary Flow law describes the relationship between stress and strain rate for geological materials (Effective) viscosity is stress / strain rate Viscosity is very temperature-dependent F.Nimmo EART162 Spring 10
Recently Viewed Presentations
• Past Tense Time Frame - 長榮大學數位學習平台
Marker Words for the Past Tense . in the past. two minutes ago. a thousand years ago. last year. last Saturday. when I was a child . when I met you. Marker Words for the Present Perfect Tense (These time...
• Goal of this Chapter 20: This chapter is
Goal of this Chapter 20: This chapter is
DNA cut with BamHI 5000, 5000. DNA cut with EcoRI + BamHI 5000, 3000, 2000. Now you try…(expect to see one on exam!) DNASizes of Fragments (bp) uncut DNA 900. DNA cut with EcoRI 700, 200. DNA cut with HindIII600,...
• Humus and Composting
Humus and Composting
Feeding frenzy by decomposers, now tackling more difficult materials and producing humus. Decomposers are getting C,N,P,K from compost to build their own bodies; when they have acquired all they need, temps drop. Heat will kill weed seeds and pathogens. Lasts...
• BASIC COUNTING - Mathematics
BASIC COUNTING - Mathematics
1/26/2004 Discrete Mathematics for Teachers, UT Math 504, Lecture 03 Sets, Boolean Algebras, and Relations Sections 2.1-2.5 Introduction to Sets History and Philosophy Informally a set is a collection of objects. ... represented by curves with arrows. That is, a...
• IB BIOLOGY - Socorro Independent School District
IB BIOLOGY - Socorro Independent School District
Collection of chemical reactions involving biomolecules, that occur during living processes. Reactions occur in predictable patterns. Ex: Insulin. Insulin is a protein hormone that facilitates the movement of glucose from the blood to the inside of the cell. Binds to...
• A titanium industry for New Zealand? Paul Ewart
A titanium industry for New Zealand? Paul Ewart
MIM is a little known process in New Zealand. Why use MIM? The moulding techniques developed for the plastics industry can be offered to MIM. Complexity . MIM offers the same design freedom as plastic injection molding. The more geometrically...
• The Preterit
The Preterit
Preferir (e > ie) Prefiero ver programas deportistas. Pedir (e > I) Pedimos los espeguetis. (No change) Preterite of -ir stem-changing verbs In the preterite, -ir verbs like preferir, pedir, and dormir also have stem changes but only in the...
• Photographier un trou noir
Photographier un trou noir
L'équipe de SuviGezari de l'université Johns Hopkins, utilisant le télescope hawaïen Pan-STARRS 1, publie les images d'un trou noir supermassif à 2,7 millions d'années lumière en train d'aspirer une géante rouge. |
Book Review: Can we be happier? Evidence and ethics by Richard Layard (Penguin, 2020)
Happiness is one of the most important aspects of human consciousness, however psychological understanding is still at a preliminary stage.
What is happiness and how can we increase it?
In another week of challenging events, the task of reviewing any book on happiness offered a welcome contrast to depressing accounts of pandemic, politics and poverty. Not that Covid-19, economic decline and the threat from climate change are not important issues, but because the book title suggested solutions to many of the intractable problems we face. Indeed, Layard offers hope that ‘despite appearances, a new gentler culture is emerging’.[1] It’s not that William and Harry’s opinions don’t matter, but rather the extent to which the views of two of the most privileged men in the world reflect the day-to-day experience of life for people in general. But let me be clear, there’s much to respect in Layard’s work generally. An opinion former in the economics of happiness, he writes and speaks extensively on the subject. And as a scientist and academic committed to researching the relationship between health and happiness, I wanted to be impressed, I wanted to learn more. But unfortunately it didn’t happen.
In the book’s introductory road map, the paths to greater happiness are explained in simple terms. We inherit two genetic ‘traits’, altruism and selfishness, and by reducing selfishness and increasing happiness, we make the world a better place for ourselves and others. The omission of evidence to support this model was the core limitation of the work. I’m also concerned by the book’s tone that society’s happiness rests mainly on just one concept, ‘say no to selfishness’. There’s little acknowledgement of individual psychological differences, epigenetic limitations or the host of external factors that create variability in human behaviour. Several of the examples abandoned causality. So, while school is more influential in a child’s happiness than their grades, Layard didn’t address the evidence linking education, income and privilege. Similarly, the correlations between poverty and the mental health of school-aged children were generally understated. Psychological sciences have frequently demonstrated the link between poverty and lifelong unhappiness.
After a set of controls are added, we document that both persistent levels of poverty and transitions into poverty are strongly associated with levels of and transitions into childhood mental health problems
Emla Fitzsimons et al. [2]
If you separate the conditions most likely to cause unhappiness, it can make scientific models seem more reliable, but this reductive approach doesn’t help us get to the root causes of why people are so desperately unhappy, to begin with.
Who’s happiness?
Over 14 chapters Can we be happier? offers a view of how society might transform into a benevolent paternalistic state. It describes how each of us (parents, teachers, scientists, politicians, managers, economists, etc.) needs to act to support his (Layard’s) vision. Layard combines his manifesto for a kinder and happier society with a distinctive catalogue of happiness projects, a constellation of ideas originating from sources as diverse as the Dalai Lama and the World Economic Forum. These concepts are loosely grouped around several themes. One of the most persistent is that an increase in income accounts for a minuscule change in people’s experience of happiness (a maximum of two per cent). Leaving aside the scientific reliability of this claim, I’m unsure of its narrative function in a book based on the benefits of altruism. It also tends to the dualistic world view that dominates scientific enquiry into meditation and mindfulness. While almost all of us studying the science of meditation would agree materialism per se’ isn’t always correlated with happiness, the effects of long term poverty significantly reduce our potential for positive physical and mental wellbeing.
Relationships between poverty and happiness?
Hundreds of citations from peer-reviewed scientific papers document essential work in the field of happiness and wellbeing. But the selective use of evidence combined with personal insights didn’t coalesce; there isn’t a coherent framework. The notion that we have two competing neural networks, altruistic and selfish, mediated by choice isn’t evidenced in the book. The available science illustrates much more complex relationships between selfish and generous behaviours.
The underlying neural circuitry differs between psychopaths and altruists with emotional processing being profoundly muted in psychopaths and significantly enhanced in altruists. But both groups are characterized by the reward system of the brain shaping behavior. Instead of rigid assignment of human nature as being “universally selfish” or “universally good,” both characterizations are partial truths based on the segments of the selfish–selfless spectrum being examined.
James W.H. Sonne and Don M. Gash [3]
As a neuropsychologist, I have some concerns about using psychometrics to infer universal brain function and structure, no matter how well-intentioned the project. Layard is a knowledgeable and credible source; his motivation is to be praised. But by stretching his field of expertise to cover both Buddhism and neuroscience, his thesis becomes unstable. The reader’s main difficulties arise in understanding the vision and how the multiverse of compassionate strands form a unified cord. For clarity, I’ll highlight the two areas of most significant uncertainty.
Even in popular science, I like to see arguments for and against a hypothesis, particularly in areas of human behaviour as complex as happiness. That’s what separates evidence-led from opinion-led claims. Testing our ideas is one way to increase both our knowledge and the reliability of our thinking. But Layard fails to indicate the difference between scientifically reliable and speculative concepts. His use of contested experimental evidence lacked contrast or clarification. In extolling the virtues of mindfulness meditation, the widespread critical concerns of the scientific community are absent.
Nicholas T. Van Dam and others [4]
To promote the use of mindfulness beyond its evidential basis risks stalling the progress of this crucial human technology further. There is currently an opportunity to reset the trajectory of meditation research towards new productive areas and not repeat the mistakes from the 1970s and the 1980s. But for this to happen, we need to filter out aspirational science. We have seen over the last fifty years that merging the theoretical frameworks of Buddhism and psychological science causes critical ontological failure. If we are serious about a compassionate revolution, we must hold our nerve and face the limits of our current understandings. It’s over a century since Paul Carus embarked on his project to combine ‘the best’ of psychology and spirituality in a monistic philosophy. History shows us that this approach leads to scarcity more often than surplus.
Poverty, education and happiness
Throughout the book, Layard uses mindfulness as an example of an approach able to support his happiness revolution. But by acknowledging criticisms that mindfulness may not generate altruism; Layard creates an impasse that undermines his central claim. By failing to establish a scientific link between mindfulness, altruism and happiness, the reader is left in limbo. By the book’s end, it is still no clearer (scientifically) if mindfulness training might lead to increased or reduced happiness and if so, how? Similarly, the importance of positive psychology to health and wellbeing is highlighted. Yet, there is no mention of the extensive body of self-compassion research that promotes self-care as a route to happiness. You don’t have to be a scientist to see the potential confusions if both altruism and self-compassion lead to increased happiness. I’m not an opponent of secular mindfulness nor positive psychology, but I don’t think the selective use of evidence can be the foundation for a new, kinder era.
The lack of references to the historical development of the science of meditation is a sad omission. An analysis of the foundational studies in the field has much to tell us about secular meditation’s strengths and weaknesses. The range of sources used in Can we be happier? is commendable, but understanding their overarching theoretical frameworks is challenging. To bring people together to support the goal of collective altruism, there must be a clearer vision. Layard offers insights that signpost opportunities and challenges, but fundamental contradictions diffuses his passion. He fails to establish the scientific evidence for his central argument, that humans have trait altruism and selfishness, mediated by will alone. We are presented with a highly personal view of individuals and society. The book is dedicated to the Dalai Lama, and Buddhist ideas are present throughout the text. It’s a given that H.H. The Dalai Lama is an exemplar of kindness and compassion. But what is the conceptual relationship between ordained Buddhist monks and the dominant economic paradigms which limit happiness in the UK? If Buddhism is part of Layard’s strategy for happiness, he needs to share his thoughts of which Buddhist schools, teachers, ontologies and epistemologies he thinks will help. Buddhism isn’t one set of ideas or practices, rather like views on happiness; it’s a rich spectrum
How well does psychology measure happiness?
The title of the book, Can we be happier? reveals the underlying uncertainty present in the text. We can, of course, be happier; relative happiness is a state mediated by a range of constantly shifting internal and external phenomena. A better focus for this project would have been ‘What I know about happiness’. Millions share Layard’s wish that people become happier through altruism. His motivation and commitment to the eradication of ‘misery’ are impressive. But throughout my reading, I was longing for the voices of real people, rather than statistical aggregations of misery to emerge from the data. We are not yet at the point where science can deliver absolute truths regarding the human condition or consciousness. A key element in the training of Tibetan Buddhists and contemporary psychologists is the recognition that our own opinions are relative. As such, reflexivity (reflectivity) and a balanced approach to knowledge creation are essential qualities, both for scientists and those that would use science for the common good. I sincerely hope that Layard’s ‘compassionate dawn’ is coming. This doesn’t mean that we can’t be altruistic or work for a more compassionate society today. But we must understand more about the long term effects of brain training (meditation) before secular mindfulness becomes integrated within social policy as a universal panacea.
This review was first published on the Critical Mindfulness website in October 2020.
[1] Richard Layard, Can We Be Happier? Evidence and Ethics (London: Penguin, 2020). p1
[2] Emla Fitzsimons and others, ‘Poverty Dynamics and Parental Mental Health: Determinants of Childhood Mental Health in the U.K.’, Social Science and Medicine, 175 (2017), 43–51.
[3] James W.H. Sonne and Don M. Gash, ‘Psychopathy to Altruism: Neurobiology of the Selfish-Selfless Spectrum’, Frontiers in Psychology (Frontiers Media S.A., 2018), 575
If mindfulness works, we have to be able to produce the evidence
The longer the science of mindfulness resists reforms, the greater the risks to the technology.
Buddhism and mindfulness
Making sense of mindfulness research
Leading UK economist Richard Layard has drawn further attention to the growing controversy surrounding mindfulness meditation. In his recent book Can we be happier?, Layard sends a number of uncertain messages about the role and benefits of mindfulness. The central premise contained in the Introduction is that by increasing levels of altruism, a new age of increased happiness can be established. Throughout the book, mindfulness and meditation are used as examples of technologies able to support the ‘happiness revolution’. But confusingly, Layard highlights concerns that the altruism present in traditional meditation methods, has been erased from secular forms of mindfulness. According to Layard’s hypothesis, if mindfulness decreases altruism it might reduce happiness. The same problem may be present with any self-focused form of mind training, self-compassion or CBT for example.
man wearing black crew neck top
Can we be happier? also misses the opportunity to discuss the lack of replicated data in mindfulness research. Several scientific reviews have argued that revisions to the methodologies used to study meditation are required.1 Given the status of Layard as a leading authority in the science of happiness, his failure to mention this growing problem is surprising. Leaving the book open to accusations of a lack of scientific objectivity.2 A tendency to ignore critical reviews from academics and scientists is causing increasing damage to the reputation of the contemplative sciences. If action isn’t taken by the scientific and clinical communities, there is a danger that the progress of mindfulness will be stalled further. There are three pressing issues that need to be addressed by professionals working in this field.
• The body of research needs to be reviewed and a distinction made between reliable (fully replicated studies) and unreplicated (unreplicable) work.
• Any systemic problems must be acknowledged and a plan of action to eliminate them agreed.
• Robust theoretical frameworks need to be established.
“Those of us with a long experience of meditation, know how valuable a technology it is. But if we wish that meditation and mindfulness are treated as scientifically reliable, we must meet the required standards of evidence. Including a need for extensive replication.”
Stephen Gene Morris
Choose happiness! Is mind wandering unwelcome?
Choose happiness!
Does mind wandering inevitably lead to unhappiness?
Is mind wandering unwelcome?
Is mind wandering unwelcome?
Authors: Killingsworth, M. A., & Gilbert, D. T.
Year: 2010
Title: A wandering mind is an unhappy mind.
Summary: I’ve taken a step back with this study (chronologically speaking) because it predates the Jazaieri et al. paper that I recently reviewed. According to Google Scholar, this investigation has been cited by other researchers over 1500 times. If you read any scientific study linked to mind wandering since 2010 you can expect to find Killingsworth & Gilbert referenced. Three reasons why this work is so popular, firstly it was a big study, recruiting 2250 participants. Secondly, it took an innovative approach to the use of technology, using an iPhone app to track and record mind wandering in ‘real world’ scenarios. Finally, the study made some very strong statements which with hindsight, have perhaps oversimplified mind wandering. In particular, the idea that “a human mind is a wandering mind, and a wandering mind is an unhappy mind”.
The full purpose of mind wandering is not yet understood, its activity is largely observed in the Default Mode Network (DMN). The DMN is a collection of anatomically separate regions that are most active when we are not engaged in a specific externally focussed task, hence our ‘default state’. The research concludes that mind wandering is a cause of unhappiness and (staggeringly) even mind wandering to positive subjects doesn’t appear to improve self-reported happiness. Provided with this kind of context it’s no wonder that the idea of suppressive mind wandering approaches maintained popularity across experimental and clinical psychology. Killingsworth & Gilbert even supported their case by claiming that many religious and philosophical traditions link happiness to living in the here and now.
Buddhism and mind wandering
Many forms of meditation and mindfulness do work on training consciousness to rest in the present moment. But from the Tibetan Buddhist perspective to equate this with a conclusion that mind wandering is a cause of unhappiness is somewhat misleading. Traditional meditation is often set in a wider context, undertaken for the benefit of all beings (self and other). Any merit that is accumulated from resting in the present moment is typically dedicated to others, rooting the practice in the past present and future. The idea that a thought, rather than the reaction (attachment or aversion) to the thought is the cause of unhappiness isn’t supported by the theoretical frameworks of traditional meditation systems.
Abnormally high levels of mind wandering are likely to be clinically problematic, but even today we don’t know all the functions mind wandering might have. It’s considered to be linked to the narrative we make to understand ourselves in the wider world. There isn’t evidence that the process itself brings unhappiness, it may be that the quality of our self-generated narrative rather than mind-wandering per se might be the problem. For example, 1 in 4, 14-year-old girls in the UK demonstrate symptoms of depression, and that teenage depression is correlated with social media use. Can we say that mind wandering to social media content, rather than emotions linked to social media content is the root cause of any reported unhappiness? |
Biography, Event, Politics, Women's History
In becoming Australia’s first woman Prime Minister, Julia Gillard broke through the barrier recognised by Eleanor Roosevelt. Yet Eleanor Roosevelt saw more than simply gaining office as the goal. For her, it was necessary to make something of it, through implementing a policy programme of the leader’s own making. This, for Roosevelt, was a major barrier. ‘Age-old prejudice’ was the key. |
One of the most readily observed bee communications. Look for one bee holding another bee with its front legs and shaking:
Notice how the held bee stands still while the signal is performed.
The behaviour is generally correlated with a need for more foragers, and possibly serves as an invitation for inactive or non-foraging bees to look for waggle dances and prepare for foraging. It is performed most often by foragers after their first few trips to a nectar source before they start waggle dances.
It has also been suggested that the shake signal might really represent a more general "it's time for a new activity" message, which is then interpreted according to context.
Bees have also been observed to perform the shaking signal on queens. Performing the signal than ceasing to do so just prior to a swarm, mating flight or on mature queen cells particularly after one queen has emerged and before an after swarm.
This behaviour has also been referred to as the vibration signal and once upon a time as the joy dance. |
Jump to content
Recommended Posts
HMS Zulu
Atlantic Models 1:350
By the mid-1950s, the wisdom of building specialist frigate types was being questioned, particularly on cost grounds and the problems associated with getting the right ships, in the right place, at the right time. Design work was initiated on a ship that could integrate most of the specialist functions of the Type 12, 41 and 61 frigates. The outcome of the design study was the Type 81 (Tribal class) Frigate and the first of the new class was ordered in February 1956, despite the design not being finalised until February 1957. The first keel was subsequently laid down in January 1958.
The new design incorporated gas turbines as part of the main propulsion, in the COSAG (combined steam and gas turbine) system which was also used in the 'County' class destroyers. Main propulsion was provided by a 12,000hp steam turbine that could drive the ship at over 20 knots and could be augmented by a G-6 gas turbine (7,500shp) to boost the speed to around 28 knots. The main advantage of this system was that the main steam turbine could be used to give optimum fuel efficiency at normal cruising speeds and the gas turbine could be brought in to give extra power on demand. This meant that less boiler capacity was required with resultant savings on space, manpower and cost. With a gas turbine, the ship could still be powered up and manoeuvred at very short notice while the steam system was still warming up. The disadvantage of the system was that a second funnel was required to carry the gas turbine exhaust, which took up deck space. As a result, the Type 81 was the only frigate design to feature two funnels. The advantages clearly outweighed the disadvantages though and the Royal Navy gained valuable experience in the operation of gas turbines in a wide variety of operational environments and showed that the gas turbine could be reliable enough to run for extended periods. This led to the eventual development of improved models, which were installed as the only propulsion system on later classes.
The new ship also incorporated guided missiles as part of the main armament for the first time. Space was provided for a quadruple Seacat launcher and its associated GWS21 control system. The launchers were positioned either side of the foremast while the directors were on platforms either side of the second funnel. The missile was steered by radio command guidance and the target could be tracked visually or by the Type 262 radar in the director. Due to delays in the development and procurement of the Seacat, all the ships except Zulu had single 40mm AA guns installed in place of the launchers and were gradually refitted as the equipment became available. In addition to this the vessels were also designed with facilities to carry and operate a helicopter as part of the ship's equipment, which, due to the space, meant that the ship could only be provided with a single Limbo mortar.
The Type 81 had a displacement of 2,300 tons as standard, and 2,700 tons if fully loaded. It was 360 feet long, had a beam of 42.5 feet and a draught of 17.5 feet. The ship had a completely flush deck with considerable sheer with the superstructure block extending the entire width of the ship, supporting the bridge and mast. Both funnels were set aft and raked back slightly with the small hanger and flightdeck being towards the very rear of the ship.
The Type 81 had a main gun armament of two single 4.5in guns (Mk V mounting), one being just forward of the main bridge (that had three 2in rocket flare launchers mounted), the other on the quarterdeck. These had come from scrapped 'C' group destroyers but had been modified to improve sighting and loading arrangements before they were fitted to the new ships. They had a maximum range of around 19km, and while the 50-degree elevation would only give them limited effectiveness against aircraft, they were really meant to engage surface and land targets. Fire control was by means of a MRS3 director that was mounted behind and just above the main bridge and incorporated a Type 903 radar for tracking targets. The ship also had a Type 965 radar fitted with a AKE1 'Bedstead' aerial, a Type 993 radar with a 'Cheese' aerial and a Type 978 navigation radar on a small platform projecting forward from the main mast. The Seacat system provided a simple but effective close-range air defence system that was subsequently fitted to almost all British and some foreign warships. Two four missile launchers were fitted on either beam and had a maximum range of 4.75km. Anti-submarine weapons consisted of a single Limbo mortar and a Wasp helicopter, and while the inclusion of six torpedo tubes was dropped, the ship had a comprehensive sonar suite with Type 177, 170 and 162 sonars being fitted.
The ships were a giant step forward in terms of crew comfort and facilities. It was the first ship to have cafeteria-like messing facilities and bunk sleeping. Full air conditioning for all accommodation, working and operational areas was provided which meant that the class could operate in a wide variety of environments without being specially modified. A detachment of Royal Marines was carried with their weapons and equipment, the concept being first tried out with HMS Loch Killisport and having proved a success, was adopted on the Tribal and most other frigates as well.
The class was named after the 'Tribal' class destroyers that had served with distinction in the Second World War. These destroyers had represented a major change in design philosophy and so it was thought fitting that the new class of frigates was named after them. The lead ship of the class, Ashanti, was commissioned in late 1961 and put through extensive trials to test the new propulsion system and to develop operation procedures for using light helicopters on frigates. The last vessel in the class was Zulu, which was completed in April 1964. As a class, the ships saw service all around the world, with considerable time spent in the Persian Gulf, Middle East and West Indies, due to their high level of accommodation and air conditioning.
Modifications were limited - those vessels that initially had 40mm anti-aircraft guns had them replaced by the Seacat. All ships had two single 20mm guns mounted on each beam just forward of the bridge that could be used in peacetime or low intensity conflict situations where the use of the main guns or Seacat missiles might be inappropriate. This was a lesson learnt in the Indonesian Confederation in 1962 - 3 where many patrolling frigates had found that they had no effective armament to engage small boats and fishing vessels used for gun-running. Also, two Knebworth / Corvus multiple rocket launchers (that fired chaff to confuse incoming radar-guided missiles) were mounted, one each side of the bridge from 1970 onwards. Ashanti (1968) and Gurkha (1969) were fitted with the new Type 199 variable depth sonar, which was installed on the quarterdeck.
These ships were very useful for peacetime patrolling and low intensity conflict operations (what today would be called Peace Support Operations) as well as 'showing-the-flag' visits. Their limited armament and low speed made them unsuitable to be combined with the remainder of the fleet in Task Force situations and mostly operated on detached duty. With the introduction of new frigate classes and the run down in naval strength, they were relegated to first the Standby Squadron and then listed for ultimate disposal in the 1981 Defence Review, Ashanti having been mothballed in 1979 and Tartar, the last operational ship of the class, being decommissioned in December 1980. Vosper Ship Repairers actually proposed a modernisation programme, with a view to selling them abroad where the two 4.5in guns would be replaced by a single automatic 76mm gun mounted forward. The Mk 10 mortar and existing hangar and flightdeck facilities would be removed and new facilities installed that extended to the stern so the ship could operate a Lynx helicopter. A large streamlined funnel would replace the two separate ones and a new Fire Control system installed. Although there were rumours that Venezuela was interested in buying some of the class, the deal never materialised and it's a shame that the modernisation could not have gone forward with the ships being retained in Royal Navy service as the ships had been relegated to disposal well before the end of their useful lives. The Falklands conflict saw three of the ships (Tartar, Gurkha and Zulu) being recommissioned into service to cover for combat losses and ships being laid up due to battle damage. This showed the value of keeping a number of ships in reserve so that they can be activated should the need arise. The remaining four 'Tribal' class ships were not recommissioned and were stripped of any serviceable equipment to keep the other three going. By 1987, all four had been disposed of, Mohawk being scrapped in 1982, while Eskimo, Nubian and Ashanti were all sunk as targets in 1986, 1987 and 1988 respectively. The other three had another two years of service, after which they were bought by Indonesia, refitted by Vosper Thorneycroft at their Woolston yard and commissioned into the Indonesian Navy as Martha Kristina Tiyahahu (Zulu, 1985), Wilhelmus Zakarias Yohannes (Gurkha, 1985) and Hasanuddin (Tartar, 1986).
The Model
The model comes in the standard plain cardboard box with just a large sticker on the front depicting HMS Zulu at sea. On opening you are faced with a sea of polystyrene peanuts which protect the parts from rattling around. The two parts that make up the hull are wrapped very carefully in bubblewrap. The smaller resin parts are further protected by having the zip lock bags they are in surrounded by bubblewrap. The metal parts are also contained in a zip lock bag, whilst the decals, instruction CD and etch are in a separate envelope. As with the HMS Cleopatra kit, reviewed HERE, the instructions are in pdf format on a CD, so you will need either a colour printer or a laptop/computer at your workbench. Although doing both is a good idea, as having them on a screen allows you to zoom in to confirm parts placement and able to read the useful text that accompanies each section of the build, whilst having the printed version for general use. The two hull sections are beautifully moulded and matched, in fact on the review example they virtually clicked together once the leftovers of the pour stubs are removed. There are no signs of mould imperfections, air bubbles or flash on the main parts, but the smaller parts do have a small amount of flash that will need to be carefully removed. The metal parts are a different matter, they do have quite a lot of flash and on some parts it’s difficult to see where the flash stops and the part starts. But since this model is for the more expert modeller this shouldn’t cause too many problems. The etch is well up to the standard we come to expect from the man who did all the White Ensign etch which is a good job really as there is a lot of etched parts and looks like they’ll be some very complicated assemblies. Lastly, and quite importantly there is a small decal sheet, which is a great addition to these kits.
I’ll go through the build as per instructions, but, if you’ve built these sorts of kit before then you may wish to do it your own way. The first choice to whether to build it full hull or waterline, if you choose waterline you can dispense with the lower hull, otherwise check fit and glue to the upper hull. There may be a slight gap around the joined, but you should only need a smear of fill before sanding back. Careful when sanding though as you wouldn’t want to damage the beautiful resin. I generally paint the hull and deck first before adding anything other than the propshaft, shaft support and rudders then adding the main resin parts. The resin bridge, shelter deck superstructures, midships superstructure, with funnels, hanger are then fitted along with the quarterdeck mounted metal winch. Then it’s a matter of building the sub-assemblies.
The first sub-assembly is the two turrets of the main armament. Each turret consists of resin shield, metal gun barrel and in the case of the forward turret, a pair of etched rocket rails, one on each side of the turret. The Seacat launchers are next and each main unit is made of metal and detailed with the four guard rails. The Seacat missiles themselves are made up of three etched parts, which look quite good in this scale. Each of the Corvus decoy launchers are fitted with an etched falre tube folded to give more depth. The Mk10 Limbo launcher is assembled from the separate base and the triple barrelled launcher. One of the more complicated assemblies is that of the Type 965 radar, also known as the bedstead. This is made up form twenty two separate etched parts, including the front and rear faces, individual dipoles, plus the IFF interrogator array and support beams, alignment is paramount for it to look right, so care and patience are the order of the day. This goes for the other complex assembly, that of the lattice mast. This is made up of one etched part which is folded so that it forms three sides and the top of the mast. Within the mast structure there is a small platform with sensors that fit poking out of the sides, the separate fourth side is then glued into place. The mast is then detailed with the two waveguide conduits, Type 978 radar and its associated platform, top sensor arrays, which can be left off if building a later period ship, two yards and their supports midway up the mast, followed by four more yards/supports further up. The completed bedstead aerial is then fitted to the top of the mast via a short piece of rod provided by the modeller.
The bridge superstructure is detailed with etched DF antenna attached to the forward edge of the bridge roof, whilst the platforms, complete with railings and supports for the Type 993 radar and the MRS-3 Fire Control Director are attached to their respective positions on the bridge roof, followed by the radar array and director. The bridge is completed with the fitting of the two resin aldis lamps. There liferaft canister racks for single, two and four canisters, each from etched brass, which, once folded are fitted with the required number of metal liferafts.
With the bridge superstructure glued to the hull, the various railings can be fitted around the bridge, along with the inclined ladders, liferaft assemblies, both single and twin, chaff launcher enclosure, whip aerial mounts, two 20mm Oerlikon mounts, each made up of a double thickness gun and separate shield, the spare anchor and the two Seacat sub-assemblies. On the fo’c’s’le the side railings are fitted, followed by the anchors and jack staff plus its associated supports. The midships superstructure, with the two funnels attached, is further detailed with the railings, inclined ladders, two liferaft racks, with four rafts on each, and the Seacat directors which have been moulded with their gazebo roofs in the closed position. There are also two petrol tank containers fitted, one per side on the rear edge just behind the Seacat directors. Each one is made up of a folded cage into which three shelves are fitted so that they slope outboards. The rear funnel is fitted with its rear intake grille, two floodlight frames, complete with three separate floodlights, and three wire antenna masts are attached to the front of the funnel top. Forward of the superstructure deck two more whip aerial bases are attached, whilst at the rear the RAS sheerlegs are fitted.
Just aft of the midships superstructure is the Limbo well. Into this, the Limbo sub-assembly is fitted along with all the associated railings. On the outside ledges of the well structure the modeller has the choice of fitting the panels that go over the hanger roof if the Wasp is to be posed on the flightdeck. If the Wasp isn’t going to be used on the ship, then the complete cover moulding can be used. The flightdeck also has a full array of netting to be fitted around the outside. Each of the two ships boats is fitted to their respective davits, each of which are made from two parts folded to shape, the completed davits and boats are then fitted into their positions either side of the fore funnel.
On the quarterdeck the small paravane crane is fitted to the moulded base on the deck, along with the rear main gun mounting plus all the railings. If you wish to build either HMS Ashanti or HMS Gurkha you can fit the Variable Depth Sonar. This will entail quite a bit of modification to the rear of the quarterdeck, which needs to have the carved out to the correct shape and depth, the dimensions of which are given in the instructions. The VDS frame is assembled from a single etched part folded to shape, then fitted with the four piece pit wheel. The VDS body is provided as a single piece metal part, which, when fitted with its cradle, is fitted into the well. The stern is fitted with an extension plate which needs to be level with the well opening.
The single Wasp helicopter is made up from a resin airframe, to which the spider like undercarriage is attached. The undercarriage consist of the cross frames attached to each undercarriage leg, so that when fitted they all mesh on the underside. The flotation canisters are attached to the top of the cab and fitted with two support frames. The main rotor is fitted with the two control linkages, one above and one below the rotor head, then attached to the rotor mast, whilst at the rear the tail rotor is attached to its shaft. Unfortunately there is no option to show the helicopter with rotors and tail folded unless the modeller wishes to tackle a rather fiddly conversion.
The smallish decal sheet is very nicely printed, and even in this scale you can read the names on all the nameplates, two provided for each ship of the class. The sheet also included all the required numbers to produce the correct pennant numbers for the ships sides and stern, plus their respective ID letters for the flight deck, as well as the flightdeck markings. There is also a full ships worth of depth markings, a Union Jack, large White Ensign and a smaller White Ensign for use at sea. The ships helicopter also has the codes, correct for each ships flight, for each side and the nose, as well as the Royal Navy titles and roundels. Get you magnifiers out as the helicopter codes are white and therefore difficult to read, and you wouldn’t want to put the wrong ones on now, would you?
At last we have Tribal class frigate in 1:350, who’d have thought it? The standard is as high as ever, with the exception perhaps of the metal parts which seem to have more flash than I remember on other Atlantic Models kits. The resin is flawless and fits together beautifully with only the finest of fettling. From a conversation I have had with Peter it will be a challenging build, even he thinks so, so what chance mere mortals have is anyones guess. But with buckets loads of patience, care and a fair amount of experience working with these materials you should be fine. If you’d like it and it’s your first attempt at a multi-media kit like this, then I would suggest trying something simpler out first. This is one great all round package, and one Peter should be proud of; I just can’t wait to see what else is in the Atlantic Models pipeline.
Review sample courtesy of Peter Hall of logo.gif
• Like 5
Link to post
Share on other sites
• 3 weeks later...
• 1 year later...
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Register a new account
Sign in
Already have an account? Sign in here.
Sign In Now
• Create New... |
fresh, homemade pink lemonade with raspberry syrup
Ever wondered what exactly pink lemonade is, and how it’s made? Find out everything you need to know, including how it might have been invented—and how to make it at home.
What Is Pink Lemonade?
It’s a rose-tinted beverage made from lemon juice, sugar, water, and some sort of red or pink dye (natural or artificial) for coloring.
Is It Ever Made from Pink Lemons?
Real pink lemons, called variegated pink-fleshed Eureka lemons, do exist. But pink lemonade usually isn’t made with their juice.
How Do You Make Pink Lemonade?
You can make pink lemonade by adding your food coloring of choice to regular lemonade. Natural food colorings typically used include cranberry juice, grenadine, and crushed raspberries or strawberries. You can even use beets for a naturally pink lemonade on the more vibrant end of the color spectrum!
Related Reading: This Easy Pink Hummus Is the Perfect Snack to Serve Alongside
Our Easy Pink Lemonade recipe uses raspberry syrup (so you get a bonus sweet-tart boost of flavor along with the blushing color):
Who Invented Pink Lemonade?
The pink drink first appeared in the United States around the mid-1800s, though its origins and inventor are sometimes disputed. In one story, red cinnamon hearts accidentally were added to a batch of lemonade at a carnival concession (in which case, they’d have something in common with candy apples).
But according to carnival historian Joe Nickell in his 2005 book “Secrets of the Sideshows,” a man named Pete Conklin who ran a circus lemonade and peanut concession actually was the one who invented the drink. One day in 1857, while Conklin was making regular lemonade, he ran out of water. In desperation, he used the pink water from a tub that one of the bareback riders had used to wash her red tights. Unfazed, Conklin added some lemon slices and sold the concoction as “strawberry lemonade,” promptly doubling his sales. As they say, when life gives you lemons…
It’s a good (if gross) story, but regardless of the actual origin of pink lemonade, it remains a delightful summer refresher today, and is easy to make with far more palatable ingredients!
Related Reading: 11 Lemonade Cocktails for Summer Sipping | How to Make the Best Fresh Lemonade
Drink Pink
15 Pink Drink Recipes to Make You Raise Your Rose Colored Glasses
See more articles |
How to Properly Clean Your Computer
by Dusty
(San Luis Obispo, CA)
A Dusty Processor (CPU) Cooling Fan
A Dusty Processor (CPU) Cooling Fan
If you have noticed the dust creeping from inside the ventilation ducts of your computer to the outside, then you need to physically clean your computer to ensure no damage comes to it eventually.
Whether you are skilled with everyday tools such screwdrivers and the like or rarely use them, it doesn't matter as cleaning your computer is actually fairly simple.
In no time at all, your computer will appear as clean as it did when you originally powered on your computer for the first time!
With that out of the way, you can go forth with cleaning your computer like-new. Before you begin, you will need the following:
• Flat-tip and/or Phillips screwdriver (your mileage may vary)
• Can of compressed air
• Cotton swabs
• Soft yet lint-free cloths
• Water
• Rubbing alcohol
• You also may want safety goggles and/or a dust mask if dust irritates your allergies
For desktop computer owners:
Look at the back panel of your desktop's case. If you own a modern computer, you will likely be able to open your case via two or more small knobs you can turn manually, or a set of buttons that you can press in to release a side of the panel (or in some cases: the entire shell of the case).
Other cases may require you to remove a set of slotted or Phillips screws. If you are ever in doubt of how to remove the case, consult your owner's manual as it will instruct you how to remove it.
For laptop owners:
Place the computer upside down on a stable surface. Remove the battery then remove the small screws from the removable panel (this is usually around the vents).
These screws tend to be small, Phillips-like screws with many of them being at different lengths. To keep track of the screws, you may want to place them in a small glass as you remove them.
Inside the Case...
Once you are looking inside the case, ensure that you keep your fingers away from the interior of the case as you may have static electricity built inside your fingers.
Look for dust bunnies, large dust particles, and more that may be hiding inside the nooks of your case. Carefully grab these pieces of dust with a cotton swab until you have grabbed the last large piece of dust.
Next, take your can of compressed air and blow around all the components and across the bottom of the case, always ensuring the nozzle is four inches away from the machine itself.
Additionally, blow quick bursts of air rather than constantly blowing the air, as not only will this help you from wasting compressed air but will also keep you from damaging your computer.
When blowing the dust, aim the air, so it blows the debris away from the crevices of the case. Additionally, when cleaning the fan, ensure you do not overspin the fan blades as this can damage the bearings and even crack a blade.
Finally, blow air into your computer's disc drive, USB ports, and the like. Once finished, wipe the inside of the case with your light cloth and dry it with another cloth before placing the case back together.
Outside the Case
Dip one end of a cotton swab in rubbing alcohol around the openings of your case. Once finished, wipe the other end of the cotton swab around the openings of your case.
Your Keyboard
With your keyboard upside down, gently shake it and allow the dust and particles that have accumulated over time to fall out. Next, blow into the keyboard and around the keys with compressed air.
Afterward, dip another end of a new cotton swab into rubbing alcohol and run it outside each key. Rub the tops of the keys as well, throwing away cotton swabs when they appear to have excess dirt on them and using a new one.
Your Mouse
If you notice gunk on your mouse, remove the gunk via your fingernail if possible. If you use an optical mouse, ensure that lint or debris is not obscuring the lens in any way.
For mechanical mouse users, remove the ball from underneath the mouse and wash the ball with water then allow it to air dry.
Dip another cotton swab into rubbing alcohol and rub the interior components from inside the mouse, then blow compressed air into the bottom opening and allow it to dry. Finally, replace the ball and cover when dried.
Your Monitor
For monitors, a lint-free cloth will suffice. You can also purchase monitor cleaning products at computer-supply stores - something you will want to do if you want your monitor to shine as good as possible at all times.
However, keep this in mind: never use ordinary household cleaning products to clean your monitor, as this could severely damage the screen of your monitor.
In Conclusion
Cleaning your computer isn't hard to accomplish, but it is something that we rarely consider when keeping our computers in excellent shape.
It isn't time consuming either, meaning there is no reason why you should never clean your computer regularly.
Thus, make a habit of cleaning your computer once every few months, and prolong the life of your computer in the process!
Click here to post comments
Just a quick note to let you know the Computer-Help forum has lots of knowledgeable articles written by site visitors on all subjects technology-related.
Also, browse through the previous eBits N ByteZ newsletters for details on all new site articles and news updates. |
Analysis of qualitative research
Analysis of qualitative research
Question One
Statistical power is a common term in quantitative research since it encompasses measuring events involving objective observations assigned numerical values especially in cases that involve a causal relationship. Since qualitative research often concentrate in understanding rather than pinpointing the cause or the reason, this particular approach enables the discovery of a phenomenon to naturally occur so that to validate the information for use in other scenarios.
Triangulation refers to the technique of applying more than one method of collecting and analysis of data on the same phenomena. Since the researcher is the main “instrument” of measure in qualitative inquiries, the triangulation of data through applying various data collection techniques such as interviews, observations, archives, and focus groups among others may go a long way to strengthen the integrity of the research (Josen & Jehn, 2009). Moreover, a researcher can collect different perceptions by collaborating with other researchers, peers, scholars or other individuals with extensive expertise in the field with the intention of gaining alternative impressions. The processes associated with the triangulation of data by applying various data collection techniques and increasing alternate explanations from different sources allow the research to determine where ideas converge and diverge. It is important to acknowledge that the purpose of triangulation is not necessarily to cross-validate the study but rather capture different perceptions of the same phenomenon.
Therefore, we can argue that triangulation offers qualitative methodologist similar reduction as the increased statistical significance in efforts of reducing the likelihood of overlooking essential results in the study. The main point of triangulation is to gain a good understanding of different perspectives rather than cross-checking if data from two different sources correspond (Golasfshani, 2003). Therefore, like the effect of increasing the sample size to improve the statistical power and subsequently reduces chances of overlooking essential results, triangulation increases the level of knowledge of the researcher about the phenomenon and thus strengthens the researcher’s perception on various aspects and scenarios associated with the phenomenon.
Question Two
Qualitative research is grounded in subjective, interpretive and contextual data, which illustrates that the findings and the conclusions of such studies are likely to be scrutinized and questioned. As such, it is vital for the researcher to take the necessary steps to ensure the validity of the research. Validity describes the appropriateness of the techniques, process, tools, and data in the study. Indeed, the term validity questions whether the research question(s) is valid for the hypothesized outcome if the methodology applied is appropriate, if the design is valid and if the conclusions are valid for both sample and context. To ensure validity, it is necessary to assess and confirm the ontology and epistemology of the issue being investigated (Noble & Smith, 2015). For instance, the concept of “a person,” is perceived differently between the humanistic and positive psychologists because of the different philosophical views of the individual. Indeed, where the positive psychologists hold the idea that the individual exists together with the formation of any human being, humanistic psychologists perceive an individual as a product of social interaction. Therefore, due to the different opinions, any qualitative research validity depends on the regard of the person.
Moreover, to ensure validity, it is necessary for the choice of methodology to facilitate and support the investigation of the phenomenon in the most appropriate way. The sampling techniques, data collection methods, and the procedures must also correspond to the research paradigm and showcase distinctiveness between different researches from systematic, purposeful or theoretical research procedures. Systematic sampling describes a situation where there is no prior theory, purposeful analysis, on the other hand, is used when there is a distinctive while the approach is applied when the research is grounded on ongoing processes.
Additionally, the techniques applied in data extraction and analyses are essential in ensuring the validity of the research. For instance, research may apply tier triangulation of the researchers as well as of the resources and theories to increase efficacy through utilizing different opinions (Leung, 2015). Other processes that ensure validity include but are not limited to well-documentation of the audit trail of materials and methods, participant verification and application of multidimensional analysis.
Question Three
The literature review reviews books, surveys, reports or any other sources that are relevant to a particular issue under investigation. Therefore, a literature review provides a description, summary and a critical analysis of the references in regards to the research problem under investigation. The three sources concentrated on the issues associated with the teaching and learning experience in addition to an analysis of the case study as a research methodology. Case study methodology is applied when the focus of the research is contemporary rather than historic when the research question focuses on how and why and if the study focuses on behavior (Yin, 2010).Huang, Strawderman, and Usher (2013)asserts that there is little literature on ways to train graduate students how to teachand suggests an excellent mentoring system between professors and graduate students is necessary. Utilizing a sample of more than 220 adolescents, one research examined intentional and unintentional incivility in the classroom and concluded although many adolescents who take part in classroom incivility share temperament traits, a disposition for specific subtypes may differ based on particular temperament characteristics (Spadafora, Farrell, Provenzano, & Marini, 2016).
The three sources applied in the literature review offers insight into how the research will be designed and how the results are analyzed. For instance, in the analysis of the issues associated with teaching and learning, it is evident that the case study methodology might be preferred since the techniques applied in teaching and learning is a contemporary issue not to mention that both actions are considered behavioral. The article prompts the researcher to acknowledge the aspect of individual differences in classroom behavior, particularly in both temperament and incivility. Moreover, the articles pinpoint that good mentoring system is vital in facilitating education training. Therefore, the materials applied in the literature review provide knowledge that guides the current research.
Question Four
The central unit of analysis in this particular situation is the way that the medical providers interact with their patients since the research focuses on the investigation on how best doctor-patient associations can be managed and incorporated in the curricula. Undeniably, the study wants to document any instance that a patient and the doctor have a positive and satisfying interaction. Therefore, the research will focus on what the doctor does and how each patient reacts to the doctor’s specific actions. Entailing the help of the patients’ perception of their interactions provides a clear picture of what the majority of the patients prefer when they visit healthcare. This is done using both the questionnaire and interviews. In the questionnaire, the research will utilize a Likert scale to analyze the perceived behaviors of medical providers that are considered satisfactory. The video, on the other hand, provides both visual and audio evidence of patients’ reactions from their smiles to their laughs or any other response that can be perceived and categorized as a happy interaction.
Since it is an acknowledged fact that majority of the patients are unlikely to enjoy their time in the doctor’s office, the research assumes that the majority of the excellent experience either comes before or after the procedure. Therefore, it is necessary to get the readings on the level of satisfaction before and after the process. Taking the ten video recordings and assuming the readings are four at the Likert scale, the total amount is twenty points which seem inadequate to make conclusions. Therefore, it is necessary for the research to get more data on what makes physician-patient interactions pleasing. The interviews and the questionnaires provide additional information. The triangulation process involves correlating the data from different sources to conclude (Heale & Forbes, 2013). While it is unlikely that the results will be similar, it is likely that they will supplement and complement each other to provide a single conclusion.
Golasfshani, N. (2003). Understanding reliability and validity in qualitative research. The Qualitative Report.
Heale, R., & Forbes, D. (2013). Understanding triangulation in research. Evidence-based Nursing, 16(4).
Huang, Y., Strawderman, L., & Usher, J. (2013). A new model for mentoring graduate students: Teach them how to teach. Proceeding of the American Society for Engineering Education(ASEE) Conference.
Josen, K., & Jehn, K. A. (2009). Using triangulation to validate themes in qualitative studies. Qualitative Research in Organizations and Management: An International Journal, 4(2), 123-150.
Leung, L. (2015). Validity, and generalizability in qualitative research. Journal of Family Medicine and Primary Care, 4(3), 324-327.
Noble, H., & Smith, J. (2015). Issues of validity and reliability in qualitative research. Evidence-based Nursing, 18(2).
Spadafora, N., Farrell, A. H., Provenzano, D. A., & Marini, Z. (2016). Temperamental differences and classroom incivility: Exploring the role of individual differences. Canadian Journal of School Psychology, 33(1).
Yin, R. (2010). Case study research: Design and methods. Los Angeles: Sage.
Do you need high quality Custom Essay Writing Services?
Custom Essay writing Service |
3 Signs That Mean Your COVID-19 Vaccination Is Working
If you've gone through the process of getting the COVID-19 vaccine, or plan to do so soon, you want to know that it will work for you. After all, even a 95 percent success rate means a few people likely won't be protected by the vaccine. Thankfully, there are a few things that will indicate to us that the COVID-19 vaccine is working.
First though, it's helpful to understand what's going on in your body after you receive the vaccine. Both the vaccines in use in the United States, Pfizer and Moderna, are created using messenger RNA (mRNA) technology. When you get the shot in your arm, the muscle cells where the shot is delivered begin creating spike protein, according to the Cleveland Clinic. Your body believes you've been infected with the coronavirus and will rush immune system defenses into action to combat the invader.
Immune cells will be delivered both to the injection site and throughout your body, so side effects may be both local or systemic. It's important to know, however, that as many of 50 percent of people don't experience any side effects at all, but the vaccine is still working.
Symptoms should be mild and short-lived
There are three specific side effects to watch for after getting the vaccine, according to Amanda Cohn, M.D., a member of the Centers for Disease Control's National Center for Immunization and Respiratory Diseases. Cohn spoke to BestLife, and said all three should be mild.
Pain at the injection site is the first thing to expect. As with most immunizations, your arm is likely to be sore for a day or two. Though you can use a pain reliever after you get the shot to ease soreness, the Centers for Disease Control and Prevention recommends not to take one in advance of your vaccination as it may interfere with the vaccine's effectiveness.
Fatigue is another common side effect, and it's an indication that your immune system is working hard. Try to plan a simpler schedule for the day or two after the shot, and remember that your body needs rest to do its important work.
You may also experience a low-grade fever, which is anything under 100.4 degrees Fahrenheit. Though this fever may make you feel uncomfortable, it should only last 24 to 48 hours, according to the Mayo Clinic. You can take a fever-reducing medication like Tylenol to help with discomfort.
Try to remember that these side effects, while frustrating, are an indication that your body is doing it's job well, and protecting you against this potentially deadly disease. |
How does drowsiness cause crashes?
| May 2, 2021 | Firm News |
As a driver, you are likely aware of most of the major dangers that drivers face on the daily. Unfortunately, many of these dangers continue to pose real threats despite the fact that campaigns continually push for more awareness and harsher laws.
Drowsiness is one of these dangers. But it may surprise you to know exactly how much of a risk it really is.
Signs of exhaustion
The Sleep Foundation discusses the way drowsiness can cause crashes. Sleep deprivation and exhaustion actually act in a way similar to intoxication. It prevents your brain and body from functioning at peak form. In fact, drowsy and drunk drivers often share many of the same symptoms. This can include:
• Slow or delayed reflexes
• Trouble concentrating and focusing
• Difficulty identifying threats and reacting to them
• Poor physical coordination or hand-eye coordination
In addition to these standard issues, drowsy drivers also risk falling asleep while driving. This can last anywhere from seconds (known as microsleeping) to minutes. Needless to say, when unconscious, a driver is completely incapable of spotting or reacting to any dangers they might approach.
Risks of falling asleep
Many of the most deadly crashes related to drowsy driving happen when a driver falls asleep. They can run off the road, slam into stopped vehicles or drift across the dividing line and into oncoming traffic.
Unfortunately, drowsy driving incidents continue to rise in recent years. To combat it, many organizations launch campaigns to bring awareness to the issue. But ultimately, the best thing you can do is not get behind the wheel when exhausted and do your best not to normalize it when other people do.
Share This |
Energy Efficiency Through Energy Financing Districts Essay
Submitted By maxd3210
Words: 3302
Pages: 14
OVERVIEW OF ENERGY EFFICIENCES There has been much focus over the past decade by the Government and the media regarding the benefits of renewable energy. All across the Midwest and Western United States, utility companies are benefiting from federal subsidies and tax credits to build wind farms and installing solar panel systems. Unfortunately, wind and solar still have major limitations. The unpredictability of wind farms force Utility companies to “cycle” coal plants, making them operate inefficiently. The other option is add natural gas power plants to handle the variations in loads, increasing the demand for natural gas. Also, the current renewable energy sources require extreme amounts of land to produce just a fraction of the electricity of conventional methods. As an example; the Roscoe wind farm in Texas occupies 100,000 acres for 800 MW of installed capacity; the Palo Verde nuclear power plant in Arizona occupies 4,050 acres (approximately 4 percent of the space of the Texas wind farm) and has a 500 percent larger power capacity (almost 4,000 MW.) In the United States, wind power barely exceeds one percent of energy output, yet government wind subsidies are $23 per megawatt hour, about 60 times of the $0.44 per megawatt hour that go to the mainstay of US electrical power output, coal and 100 times the $0.25 per megawatt hour that go to natural gas. Both coal and natural gas account for over 70 percent of US power supply. Once, these subsides run out, most wind farms won’t be able to afford the regular maintenance required to stay in operation. A more practical approach to reducing our carbon footprint is reducing energy consumption. Improvements in energy efficiency represent a significant untapped reserve of potential low cost reduction in the amount of coal and oil used in the United States. (Choi Granade et al. 2009) The economic benefits of reducing energy consumption are typically felt at both the end-user and regional levels. (Bernstein et al. 2000) In the United States, the commercial and residential sectors account for 72% of electricity use, and over 36% of total greenhouse gas emissions (EIA 2008; EPA 2009). The McKinsey Global Institute identifies building efficiency measures as among the most cost-effective greenhouse gas abatement measures with significant potential for emissions reductions that can be realized immediately with a comprehensive policy and support (Choi Granade et al. 2009). Reducing energy demand in buildings includes sealing leaks in walls, floors, attics, ducts and windows; upgrading lighting; installing more efficient heating and cooling systems, and other improvements (Buildings Energy Data Book September 2007: 1.1 Buildings Sector Energy Consumption). Since 1978, California has been the leader in the implementation of energy efficient strategies directed towards new construction. According to the California Public Utilities Commission, “California’s building and appliance standards have saved the State’s consumers over $56 billion in natural gas and electricity costs since 1978 and averted building 15 large power plants” (CPUC 2006).
While regulatory standards in efficiency will be important for new homes, as homes are used for decades the majority of the existing building infrastructure we have today will remain through 2020 (Fuller 2008). Over 7 million homes or more than half of the total building stock in California is dated before 1975, when energy efficiency standards were passed into law. Supporting programs that promote retrofits of existing building stock will be crucially important in achieving the ambitious greenhouse gas reduction goals laid out by state agencies. Energy efficiency gains globally have the potential to reduce end use energy demand in 2020 by 20-24%; 36% of this potential lies in the residential and commercial sectors through building efficiency improvements (Beinhocker et al. 2008). The McKinsey Global Institute report |
8 little unknown facts about shipping containers
Have you ever asked yourself how the coffee or tea that you drink get to your table? Your coffee, your laptop, and your mobile phone were all very likely shipped in a container. Containers carry a massive percentage of the goods that impact our daily lives.
One cannot full understand globalization without understanding containerized supply chain. The importance of these steel boxes is clearly undeniable, so we have put together some fun and interesting facts about shipping containers.
Infographic: shipping container facts
infographic shipping container
You can use the infographic also online, but you have to link back to us.
The 8 container facts summary
1. 95% of the world’s cargo is currently moved by ship.
2. 97% of all containers are made in China.
3. 50% of all containers are owned by shipping lines. The other 50% is leased running from one to ten years.
4. Containers can last up to 20 years or more.
5. A regular container can hold up to 8,000 shoe boxes.
6. Between 2,000 and 10,000 containers get lost in the sea every year after falling off of the ships carrying them.
7. Between 5 million and 170 million shipping containers are currently belonging to our global container fleet.
8. The shipping industry has spent more than $ 236 billion on the purchase of new vessels to increase container transportation. |
In my career as a chemist, I owe a huge debt to serendipity. In 2012, I was in the right place (IBM’s Almaden research lab in California) at the right time—and I did the “wrong” thing. I was supposed to be mixing three components in a beaker in the hope of systematically uncovering a combination of chemicals, meaning to replace one of the chemicals with a version that was derived from plastic waste, in an effort to increase the sustainability of thermoset polymers.
Instead, when I mixed two of the reagents together, a hard, white plastic substance formed in the beaker. It was so tough I had to smash the beaker to get it out. Furthermore, when it sat in dilute acid overnight, it reverted to its starting materials. Without meaning to, I had discovered a whole new family of recyclable thermoset polymers. Had I considered it a failed experiment, and not followed up, we would have never known what we had made. It was scientific serendipity at its best, in the noble tradition of Roy Plunkett, who invented Teflon by accident while working on the chemistry of coolant gases.
Today, I have a new goal: to reduce the need for serendipity in chemical discovery. Nature is posing some real challenges in the world, from the ongoing climate crisis to the wake-up call of COVID-19. These challenges are simply too big to rely on serendipity. Nature is complex and powerful, and we need to be able to accurately model it if we want to make the necessary scientific advances.
Specifically, we need to be able to understand the energetics of chemical reactions with a high level of confidence if we want to push the field of chemistry forward. This is not a new insight, but it is one that highlights a major constraint: accurately predicting the behavior of even simple molecules is beyond the capabilities of even the most powerful computers.
This is where quantum computing offers the possibility of major advances in the coming years. Modeling energetic reactions on classical computers requires approximations, since they can’t model the quantum behavior of electrons over a certain system size. Each approximation reduces the value of the model and increases the amount of lab work that chemists have to do to validate and guide the model. Quantum computing, however, is now at the point where it can begin to model the energetics and properties of small molecules such as lithium hydride, LiH—offering the possibility of models that will provide clearer pathways to discovery than we have now.
Of course, quantum chemistry as a field is nothing new. In the early 20th century, German chemists such as Walter Heitler and Fritz London showed the covalent bond could be understood using quantum mechanics. In the late the 20th century, the growth in computing power available to chemists meant it was practical to do some basic modeling on classical systems.
Even so, when I was getting my Ph.D. in the mid-2000s at Boston College, it was relatively rare that bench chemists had a working knowledge of the kind of chemical modeling that was available via computational approaches such as density functional theory (DFT). The disciplines (and skill sets involved) were orthogonal. Instead of exploring the insights of DFT, bench chemists stuck to systematic approaches combined with a hope for an educated but often lucky discovery. I was fortunate enough to work in the research group of Professor Amir Hoveyda, who was early to recognize the value of combining experimental research with theoretical research.
Today, theoretical research and modeling chemical reactions to understand experimental results is commonplace, as the theoretical discipline became more sophisticated and bench chemists gradually began to incorporate these models into their work. The output of the models provides a useful feedback loop for in-lab discovery. To take one example, the explosion of available chemical data from high throughput screening has allowed for the creation of well-developed chemical models. Industrial uses of these models include drug discovery and material experimentation.
The limiting factor of these models, however, is the need to simplify. At each stage of the simulation, you have to pick a certain area where you want to make your compromise on accuracy in order to stay within the bounds of what the computer can practically handle. In the terminology of the field, you are working with “coarse-grained” models—where you deliberately simplify the known elements of the reaction in order to prioritize accuracy in the areas you are investigating. Each simplification reduces the overall accuracy of your model and limits its usefulness in the pursuit of discovery. To put it bluntly, the coarser your data, the more labor intensive your lab work.
The quantum approach is different. At its purest, quantum computing lets you model nature as it is; no approximations. In the oft-quoted words of Richard Feynman, “Nature isn't classical, dammit, and if you want to make a simulation of nature, you'd better make it quantum mechanical.”
We’ve seen rapid advances in the power of quantum computers in recent years. IBM doubled its quantum volume not once but twice in 2020 and is on course to reach quantum volume of more than 1,000, compared with single-digit figures in 2016. Others in the industry have also made bold claims about the power and capabilities of their machines.
So far, we have extended the use of quantum computers to model energies related to the ground states and excited states of molecules. These types of calculations will lead us to be able to explore reaction energy landscapes and photo-reactive molecules. In addition, we’ve explored using them to model the dipole moment in small molecules, a step in the direction of understanding electronic distribution and polarizability of molecules, which can also tell us something about how they react.
Looking ahead, we’ve started laying the foundation for future modeling of chemical systems using quantum computers and have been exploring different types of calculations on different types of molecules soluble on a quantum computer today. For example, what happens when you have an unpaired electron in the system? Do the calculations lose fidelity, and how can we adjust the algorithm to get them to match the expected results? This type of work will enable us to someday look at radical species, which can be notoriously difficult to analyze in the lab or simulate classically.
To be sure, this work is all replicable on classical computers. Still, none of it would have been possible with the quantum technology that existed five years ago. The progress in recent years holds out the promise that quantum computing can serve as a powerful catalyst for chemical discovery in the near future.
I don’t envision a future where chemists simply plug algorithms into a quantum device and are given a clear set of data for immediate discovery in the lab. What is feasible—and may already be possible— would be incorporating quantum models as a step in the existing processes that currently rely on classical computers.
In this approach, we use classical methods for the computationally intensive part of a model. This could include an enzyme, a polymer chain or a metal surface. We then apply a quantum method to model distinct interactions—such as the chemistry in the enzyme pocket, explicit interactions between a solvent molecule and a polymer chain, or hydrogen bonding in a small molecule. We would still accept approximations in certain parts of the model but would achieve much greater accuracy in the most distinct parts of the reaction. We have already made important progress through studying the possibility of embedding quantum electronic structure calculation into a classically computed environment obtained at the Hartree-Fock (HF) or DFT level of theory.
The practical applications of advancing this approach are numerous and impactful. More rapid advances in the field of polymer chains could help address the problem of plastic pollution, which has grown more acute since China has cut its imports of recyclable material. The energy costs of domestic plastic recycling remain relatively high; if we can develop plastics that are easier to recycle, we could make a major dent in plastic waste. Beyond the field of plastics, the need for materials with lower carbon emissions is ever more pressing, and the ability to manufacture substances such as jet fuel and concrete with a smaller carbon footprint is crucial to reducing total global emissions.
The next generation of chemists emerging from grad schools across the world brings a level of data fluency that would have been unimaginable in the 2000s. But the constraints on this fluency are physical: classically built computers simply cannot handle the level of complexity of substances as commonplace as caffeine. In this dynamic, no amount of data fluency can obviate the need for serendipity: you will be working in a world where you need luck on your side to make important advances. The development of— and embrace of—quantum computers is therefore crucial to the future practice of chemists.
This is an opinion and analysis article. |
What is bank reconciliation?
Bank reconciliation (definition)
There can be times when your financial records might not be the same as your bank’s. Bank reconciliation involves comparing these records and identifying any differences between the two. This is important for keeping track of your business's money.
There are a few reasons the balance on your records may not be the same as the bank’s:
• When someone hasn’t yet cashed a cheque you’ve sent: The money owed from that cheque is still in your bank account – but it’s no longer yours to spend.
• Changes to bank accounts at the end of a month: This can happen when you withdraw or deposit money just before the bank sends a statement. Those changes to the account might not show until the following month’s statement.
• The bank deducts loan payments: The bank can deduct money for loans before you enter that information into your systems.
• Deposits in transit: Deposits you’ve made and recorded in your books that haven’t yet processed through the bank.
You can search for experts in our advisor directory
Find an advisor
Small business guides
How to do bank reconciliation
Find out more
See your key information on the business dashboard
Find out more |
What can municipalities do to better protect their water supply systems?
We reported recently about an attack against the water supply in Oldsmar, Florida, and worry about the potential for future and copycat attacks against other lightly defended water treatment systems in small towns worldwide and what can be done to stem such incursions.
In the Florida case, criminals used remote access tools to gain a foothold and change chemical levels in the water supply, ramping them up to potentially hazardous levels.
That’s worrisome, including because hackers would normally have to gain specific knowledge of water treatment management systems, a very specific target demographic. That’s not a “spray and pray” attack; it’s targeted and takes some time to craft and deploy. And while this incident wasn’t a super stealthy zero-day attack, chances are that somebody was interested in the target for some time.
From the attacker perspective (meaning a typical intentional attacker devising and executing a well-thought-out attack), how could such a scenario play out?
First, the attackers identify the target, they gather information and form a plan. Once access has been gained, they then need to scour the network for the control systems that interact directly with the water treatment process. Again, this can take significant time and planning.
Once potential targets have been identified, attackers need to understand what role those targets have in the chemical process and what access those systems have to the physical equipment involved in production, whether valves, relays, level sensors, thermocouples or other controls.
Then they have to craft a specific attack within the context they are able to assess along the way, and then launch at a precise time that would have the best odds of success, all while maintaining undetected access to all the systems in the chain.
In the case of Oldsmar, once the attack was launched, there were other systems in place that provided feedback that could alert staff in time to scuttle the attack. That’s the good news. The bad news would be that they might have been under silent attack for weeks or months prior to the actual poisoning attempt and didn’t know it.
My colleague Tony Anscombe wonders why the Oldsmar facility did not have a thoroughly vetted and implemented plan in accordance with CISA sector-specific guidance for water and wastewater systems, including measures like two-factor authentication (2FA) and similar controls. It’s very helpful that those guidelines are made available for small municipalities to ramp up quickly, even if they don’t have access to cybersecurity ninjas on staff – which can be very expensive with typical small-town budgets.
Meanwhile, expect to see future exploit attempts against other municipalities. Ransomware attempts would be an obvious follow-on trend.
What can small towns do? They should take the time to understand and implement the guidance available, which may be as simple as adding/enforcing 2FA, patching systems, implementing good change control processes (according to media reports, TeamViewer had been replaced as the remote access solution in use at this water treatment plant, yet it was still running, exposing the plant to the internet through a non-required interface) and training staff on cyberhygiene.
Also, do a practice drill assuming a breach and “think like a hacker” to stop them from getting in. It is a good idea as well to have a plan in place in case a ransomware attack happens; that way, small towns won’t be faced with the untenable prospect of explaining to the citizens why they just spent public money to stop an attack that shouldn’t have happened in the first place. |
When using temperature and precipitation to define climate, the two must be combined in a single method. As seen in the previous part of this lesson, the temperature designations were mostly latitudinally driven. Moisture varied through other considerations causing the B (dry) climates to vary throughout latitude bands. Another system was developed to account for differing climates based mostly on the water balance of a region rather, the temperature and precipitation specifically.
Thornthwaite developed another classification system dependent on the modified potential evapotranspiration (PET) of a region. His concern was with the amount of water available. The driving factor in this system is the water budget of a region. Regions were classified in categories ranging from being humid to arid. The main factor used in classifying climates is then what is most important in the classification. The Thornthwaite system uses temperature as a modifying factor in determining PET, but it is not the major factor as in the Koeppen system. Temperature in this system was a controller of PET, not a direct classification.
Where the index Im is based on precipitation P and Potential Evapotranspiration PE. For the US this leads to Fig. 8.6
Fig. 8.6 United States climate types based on the Thornthwaite system. |
Exercise is highly beneficial for people of all ages, and I consider getting adequate physical exercise to be a crucial element of creating and maintaining excellent health throughout life. For the older adult, exercise helps to maintain cardiovascular and musculoskeletal integrity, which is extremely important for optimal health and being able to live independently as we age.
A number of new research studies, however, are showing that physical exercise most likely also has very positive effects on our cognitive abilities as we age, and can keep the aging brain nimble and youthful, perhaps even staving off such dreaded afflictions as age-related dementia. One of these studies, recently reported by the New York Times, showed that older adults, in this case men, who were frequent, regular exercisers displayed the same cognitive abilities as younger adults under the age of forty.
Tasks involving attention, problem solving, decision-making and other kinds of high-level thinking primarily use the area of the brain called the prefrontal cortex. In younger adults, activation in the cortex is highly localized, depending on the exact nature of the task, in either the right or left hemisphere. In older adults, however, both hemispheres normally have to activate to get the task done. This phenomenon is called Harold, or hemispheric asymmetry reduction in older adults, and scientists are in general agreement that it is an overall reorganization and weakening of the brain’s functioning as we age.
The study involved a group of men aged 65-74, who did not show signs of dementia or other forms of serious cognitive decline. They were given a specialized and challenging test of cognitive ability, in which younger people would produce marked activity in the left hemisphere of the prefrontal cortex. Many of the older men tested required both the left and right hemispheres to activate in order to perform the test; in other words, they needed more of their brain to pitch in to get the job done, demonstrating the typical Harold pattern.
The fittest men, however, did not need both halves of the cortex to complete the test, and required only the left hemisphere to fire. In essence, the fit men’s brains were acting as if they were decades younger!
I encourage everyone to develop and maintain a regular program of physical activity, and keep on working out and moving as you get older. I myself am an avid exerciser, with workouts most days of the week using a variety of forms of exercise, and consider it an absolutely essential part of my life.
If you have been sedentary or inactive for a long time, I would definitely suggest you get checked by a physician before you start any exercise regime, especially if you are middle-aged or older. If you are interested in individualized nutrition and exercise advice, please call my office to make an appointment and I will work with you to tailor a program to your needs.
Make a commitment to yourself today to include physical exercise as an integral element of your life, and set the stage now for vibrant wellness (physical and mental) and vitality even into your “old” age!
|
Myanmar total Population 2016
Burma total Population 2016
Overall fertility rate, 2,183 children/woman. The total population is estimated at around 60 million. Sixteen percent of the total, compared with 25,830,068 or 48. in Kayin State, only the total number of households and population of. Likelihood of dying between 15 and 60 years m/f (per 1 000 inhabitants, 2016), 229/163.
Inhabitants and Census
of the Mekong region was 239. Six million in 2016. Ninety-five Vietnam had the biggest population. UN Population Fund (2016). in Cambodia, Laos, Myanmar, Thailand, Vietnam in 2016. If one considers the mean lifespan in the 2015-2020 predictions, the lower Mekong region is divided into two groups:
Viet Nam (76. 5 years) and Thailand (75 years) are well ahead of Cambodia (70 years), Laos (67. 5) and Myanmar (66. 5 years). In the Mekong region, the longest lifespan is for 81-year-olds, only one year less than in the United States.
In 2015, the lower Mekong had a population of 125 persons/km2 on a regional basis, slightly less than China (146 persons/km2), but significantly less than India (441 persons/km2). However, this averages the high population densities of Vietnam of 296 inhabitants/km2. It has the smallest population densities in the area, with only 29 inhabitants/km2.
With a population densitiy of 133 inhabitants/km2, Thailand is the nearest to the averaging area. UN, Population Division. Perspectives of the world population: Inhabitants by metropolitan area, regions and countries, 1950-2100 (persons per km²). Compiled by ODI, April 2016. Nevertheless, Vietnam's population is concentrated in two areas: the Red River Delta, which includes Greater Hanoi, and the Mekong Delta, which includes Greater Ho Chi Minh City.
In contrast to other parts of ASEAN and with the exceptions of Thailand, it is expected to grow further until 2050. It will raise the level and burden the resource base, contributing to urban-rural migratory flows and increasing the need for effective and sustained developing policies. Until 2006, labour from Cambodia, the Democratic People's Republic of Laos and Myanmar were brought to Thailand, while the Democratic People's Republic of Laos and Cambodia recorded an inflow of highly qualified workers from Vietnam.
A highly qualified workforce from the Yunnan and Guangxi counties of China flocked to neighbouring Laos and Myanmar, with significant Cambodia also experiencing significant China-migrations. In the years ahead, migratory trends will be shaped by educational, professional and, finally, labour mobility in the context of the ASEAN Industrial Community (AEC)11 and differences in the rate of prosperity in the Mekong area.
There is also increasing frequency of intra-country migrations. The Asian Development Bank has found that rural-city immigration is normal in third-world economies (where an aspiring metropolitan layer generates consumption that will attract migrants). The lower Mekong reflects this dynamism with an annual increase in the population of cities of 3.0 per cent in 201514 and a corresponding decrease in the proportion of the population working in agriculture.
By far, Cambodia has the highest population in the countryside (79.2 per cent of the total population in 2015) and Thailand the smallest (49.6 per cent). The other three lower Mekong states have a similar rural/urban division, with Vietnam's population being 66. 4% of the total, Myanmar 65. Burma and Laos are among the most varied nations in the whole wide range of the planet, with a high proportion of tribal groups, which together make up 35-70 people.
The other three lower Mekong states are more homogeneous, but they also have important groups of minority and tribal peoples. These include individuals who come from China's traders - who were particularly important in trade in times of colonisation17 - or from various different ethnical groups in neighbouring nations for similar causes or due to historical changes in borders.
These include important Khmer tribes in South Vietnam and Vietnamese tribes in Cambodia and Laos. In four of the five states Buddhism is the religion of the people, while in Vietnam it was the biggest fraction with 45 years. 17 Theravada Buddhism predominates in all but Vietnam, where Mahayana Buddhism predominates.
All the Mekong Lowlands except Myanmar carry out a population and residential count every ten years. The last formal Myanmar Population Survey was held in 1983 before the 2014 Myanmar Population Survey, which was published in 2015. In June 2014, Laos carried out the most recent population and residential property survey. There are also other specialised national, regional, national, regional and agriculture inventories.
Mehr zum Thema |
Page images
By Link they have been called Paraphyllia, and defined as “ foliaceous parts, in structure like the leaves, and developed before those organs."
When they are membranous, and surround the stem like a sheath, cohering by their anterior margins, as in Polygonum (fig. 61. a), they have been termed ochrea by Willdenow. Of this the fibrous sheath at the base of the leaves of Palms, called reticulum by some, may possibly be a modification. In pinnated leaves there is often a pair of stipules at the base of each leaflet, as well as two at the base of the common petiole : stipules, under such circumstances, are called stipels.
What stipules really are is not well made out. De Candolle seems, from some expressions in his Organographie, to suspect their analogy with leaves; while, in other places in the same work, it may be collected that he rather considers them special organs. I am clearly of opinion that, notwithstanding the difference in their appearance, they are really accessory leaves: first, because they are occasionally transformed, in Rosa bracteata, into pinnated leaves ; secondly, because they are often undistinguishable from leaves, of which they obviously perform all the functions, as in Lathyrus, Lotus, and many other Fabaceæ: and, finally, because there are cases in which buds develope in their axils, as in Salix, a property peculiar to leaves and their modifications. De Candolle, in suggesting, after Seringe, that the tendrils of Cucurbitaceæ are modified stipules, assigns the latter a tendency to a transformation exclusively confined either to the midrib of a leaf, or to a branch; and they cannot be the latter. It is, however, more probable that the tendril in this order is an accessory bud, a little out of its place, as the Bravais' have suggested. (Ann. Sc., n. S., VIII. 20.)
It is sometimes difficult to distinguish from true stipules certain membranous expansions, or ciliæ, or glandular appendages of the margin of the base of the petiole, such as are found in Ranunculaceæ, Apocynaceæ, Apiaceæ, and many other plants. In these cases the real nature of the parts is only to be collected from analogy, and by comparing them with the same part differently modified in neighbouring species.
Link regards the scales of leafbuds (called by him tegmenta) as a kind of stipule, and such they, no doubt, sometimes are, as in Liriodendron ; but then he unites with them the primordial ramentaceous leaves of Pinus, which have no analogy with stipules.
De Candolle remarks, that no Monocotyledonous plants have stipules; but they certainly exist, at least in Naiadaceæ and Araceæ. It is also said that they do not occur in the embryo; but then there are some exceptions to this statement, as well as to Miquel's remark, that they never occur upon radical leaves, e.g. Strawberry.
Turpin considers them of two kinds.
1. Distinct, but rudimentary, leaves, when they originate from the stem itself, as in Cinchonaceæ, &c.
2. Leaflets of a pinnated leaf, when they adhere to the leafstalk, as in Roses, &c.
The ligula of grasses, at the apex of their sheathing petiole, a membranous appendage, which some have considered stipulary, should rather be considered an expansion analogous to the corona of some Silenaceous plants.
It has been already noted, that when stipules surround the stem of a plant they become an ochrea; in this case their anterior and posterior margins are united by cohesion; a property which they possess in common with all modifications of leaves, and of which different instances may be pointed out in Magnoliaceæ, where the back margins only cohere, in certain Cinchonaceæ, in which the anterior margins of the stipules of opposite leaves are united, and in many other plants.
[blocks in formation]
All the parts hitherto made the subject of inquiry are called organs of vegetation; their duty being exclusively to perform the nutritive parts of the vegetable economy. Those which are about to be mentioned are called organs of fructification ; their office being to reproduce the species by a process in some respects analogous to that which takes place in the animal kingdom. The latter are, however, all modifications of the former, as will hereafter be seen, and as the subject of this division is in itself a kind of proof; bracts not being exactly either organs of vegetation or reproduction, but between the two.
Botanists call Bracts either the leaf from the axil of which a flower is developed, such as we find in Veronica agrestis; or else all those leaves which are found upon the inflorescence, and are situated between the true leaves and the calyx. There are, in reality, no exact limits between bracts and common leaves; but in general the former may be known by their situation immediately below the calyx, by their smaller size, difference of outline, colour, and other marks. They are often entire, however much the leaves may be divided; frequently scariose, either wholly or in part; sometimes deciduous before the flowers expand; but rarely very much dilated, as in Origanum Dictamnus, and a few other plants. It is often more difficult to distinguish bracts from the sepals of a polyphyllous calyx than even from the leaves
of the stem. In fact, there is in many cases no other mode than ascertaining the usual number of sepals in other plants of the same natural order, and considering every leaf-like appendage on the outside of the usual number of sepals as a bract. In Camellia, for example, if it were not known that the normal number of sepals of kindred genera is five, it would be impossible to determine the number of its sepals. When the bracts are very small, they are called bractlets; or, if they are of different sizes upon the same inflorescence, the smallest receive that name. It rarely occurs that an inflorescence is destitute of bracts. In Cruciferæ this is a general character, and is observed by Link to indicate an extremely irregular structure. When bracts do not immediately support a flower or its stalk, they are called empty (vacue). As a general rule, it is to be understood, that whatever intervenes between the true leaves and the calyx, whatever be their form, colour, size, or other peculiarity, comes within the meaning of the term.
Under particular circumstances bracts have received the following peculiar names :
When they are empty, and terminate the inflorescence, they form a coma, as in Salvia Horminum. In this case they are generally enlarged and coloured.
If they are verticillate, and surround several flowers, they constitute an involucre. In Apiaceous plants, the bracts which surround the general umbel are called an universal involucre ; and those which surround the umbellules a partial involucre, or involucellum. In Compositæ, the involucre often consists of several rows of imbricated bracts, and has received a variety of names, for none of which there appears to be occasion. Linnæus called it calyx communis, Necker perigynandra communis, Richard periphoranthium, Cassini periclinium. There is often found at the base of the involucre of Compositæ an exterior rank of bracts, which Linnæus called calyculus ; and such involucres as were so circumstanced calyx calyculatus. Cassini restricts the term involucre to this; but it seems most convenient to call these exterior bracts bractlets, and to say that an involucre in which they are present is basi bracteolatum, bracteolate at the base.
Another form of the involucre is the cupula (fig. 66.). It consists of bracts not much developed till after flowering, when they cohere by their bases, and form a kind of cup. In the Oak the cupula is woody, entire, and scaly, with indurated bracts : in the Beech it forms a sort of coriaceous, valvular, spurious pericarp: in the Hazel Nut (fig. 65.) it is foliaceous and lacerated.*
In Euphorbia the involucre is composed of two whorls of bracts, consolidated into a cup, and assumes altogether the appearance of a calyx, for which it was for a long time mistaken.
The name squama or scale is usually applied to the bracts of the catkin; it is also occasionally used to indicate any kind of bract which has a scaly appearance.
The bracts which are stationed upon the receptacle of Compositæ, between the florets, have generally a membranous texture and no colour, and are called palea, Englished by some botanists chaff of the receptacle. The French call this sort of bract paillette, Cassini squamelles.
In Palms and Araceæ there are seated, at the base of the spadix, large coloured bracts, in which the spadix, during æstivation, is wholly enwrapped, and which may perhaps perform in those plants the office of corolla. This is called the spathe (fig. 83.). Link considers it a modification of the petiole. (Elementa, p. 253.)
* What has been called the cupula of the Yew is said by Schleiden to be a late developement of the primine of the ovule.
« PreviousContinue » |
Non-Programmer's Tutorial for Python 3/Who Goes There?
From Wikibooks, open books for an open world
Jump to navigation Jump to search
Input and Variables[edit | edit source]
Now I feel it is time for a really complicated program. Here it is:
user_input = input("Who goes there? ")
print("You may pass,", user_input)
When I ran it, here is what my screen showed:
Who goes there? Josh
You may pass, Josh
Note: After running the code by pressing F5, the python shell will only give output:
Who goes there?
You need to enter your name in the python shell, and then press enter for the rest of the output.
Of course when you run the program your screen will look different because of the input() statement. When you ran the program you probably noticed (you did run the program, right?) how you had to type in your name and then press Enter. Then the program printed out some more text and also your name. This is an example of input. The program reaches a certain point and then waits for the user to input some data that the program can use later.
Of course, getting information from the user would be useless if we didn't have anywhere to put that information and this is where variables come in. In the previous program user_input is a variable. Variables are like a box that can store some piece of data. Here is a program to show examples of variables:
a = 123.4
b23 = 'Spam'
first_name = "Bill"
b = 432
c = a + b
print("a + b is",c)
print("first_name is",first_name)
print("Sorted Parts, After Midnight or",b23)
And here is the output:
a + b is 555.4
first_name is Bill
Sorted Parts, After Midnight or Spam
Variables store data. The variables in the above program are a, b23, first_name, b, and c. The two basic types are strings and numbers. Strings are a sequence of letters, numbers and other characters. In this example b23 and first_name are variables that are storing strings. Spam, Bill, a + b is, first_name is, and Sorted Parts, After Midnight or are the strings in this program. The characters are surrounded by " or '. The other type of variables are numbers. Remember that variables are used to store a value, they do not use quotation marks (" and '). If you want to use an actual value, you must use quotation marks.
value1 == Pim
value2 == "Pim"
Both look the same, but in the first one Python checks if the value stored in the variable value1 is the same as the value stored in the variable Pim. In the second one, Python checks if the string (the actual letters P,i, and m) are the same as in value2 (continue this tutorial for more explanation about strings and about the ==).
Assignment[edit | edit source]
Okay, so we have these boxes called variables and also data that can go into the variable. The computer will see a line like first_name = "Bill" and it reads it as "Put the string Bill into the box (or variable) first_name". Later on it sees the statement c = a + b and it reads it as "put the sum of a + b or 123.4 + 432 which equals 555.4 into c". The right hand side of the statement (a + b) is evaluated and the result is stored in the variable on the left hand side (c). This is called assignment, and you should not confuse the assignment equal sign (=) with "equality" in a mathematical sense here (that's what == will be used for later).
Here is another example of variable usage:
a = 1
a = a + 1
a = a * 2
And of course here is the output:
Even if the same variable appears on both sides of the equals sign (e.g., spam = spam), the computer still reads it as, "First find out the data to store and then find out where the data goes."
One more program before I end this chapter:
number = float(input("Type in a number: "))
integer = int(input("Type in an integer: "))
text = input("Type in a string: ")
print("number =", number)
print("number is a", type(number))
print("number * 2 =", number * 2)
print("integer =", integer)
print("integer is a", type(integer))
print("integer * 2 =", integer * 2)
print("text =", text)
print("text is a", type(text))
print("text * 2 =", text * 2)
The output I got was:
Type in a number: 12.34
Type in an integer: -3
Type in a string: Hello
number = 12.34
number is a <class 'float'>
number * 2 = 24.68
integer = -3
integer is a <class 'int'>
integer * 2 = -6
text = Hello
text is a <class 'str'>
text * 2 = HelloHello
Notice that number was created with float(input()) ,int(input()) returns an integer, a number with no decimal point, while text created with input() returns a string(can be writen as str(input()), too). When you want the user to type in a decimal use float(input()), if you want the user to type in an integer use int(input()), but if you want the user to type in a string use input().
The second half of the program uses the type() function which tells what kind a variable is. Numbers are of type int or float, which are short for integer and floating point (mostly used for decimal numbers), respectively. Text strings are of type str, short for string. Integers and floats can be worked on by mathematical functions, strings cannot. Notice how when python multiplies a number by an integer the expected thing happens. However when a string is multiplied by an integer the result is that multiple copies of the string are produced (i.e., text * 2 = HelloHello).
Operations with strings do different things than operations with numbers. As well, some operations only work with numbers (both integers and floating point numbers) and will give an error if a string is used. Here are some interactive mode examples to show that some more.
>>> print("This" + " " + "is" + " joined.")
This is joined.
>>> print("Ha, " * 5)
Ha, Ha, Ha, Ha, Ha,
>>> print("Ha, " * 5 + "ha!")
Ha, Ha, Ha, Ha, Ha, ha!
>>> print(3 - 1)
>>> print("3" - "1")
Traceback (most recent call last):
Here is the list of some string operations:
Operation Symbol Example
Repetition * "i" * 5 == "iiiii"
Concatenation + "Hello, " + "World!" == "Hello, World!"
Examples[edit | edit source]
# This program calculates rate and distance problems
print("Input a rate and a distance")
rate = float(input("Rate: "))
distance = float(input("Distance: "))
time=(distance/ rate)
print("Time:", time)
Sample runs:
Input a rate and a distance
Rate: 5
Distance: 10
Time: 2.0
Input a rate and a distance
Rate: 3.52
Distance: 45.6
Time: 12.9545454545
# This program calculates the perimeter and area of a rectangle
print("Calculate information about a rectangle")
length = float(input("Length: "))
width = float(input("Width: "))
Perimeter=(2 * length + 2 * width)
print("Area:", length * width)
Sample runs:
Calculate information about a rectangle
Length: 4
Width: 3
Area: 12.0
Perimeter: 14.0
Calculate information about a rectangle
Length: 2.53
Width: 5.2
Area: 13.156
Perimeter: 15.46
# This program converts Fahrenheit to Celsius
fahr_temp = float(input("Fahrenheit temperature: "))
celc_temp = (fahr_temp - 32.0) *( 5.0 / 9.0)
print("Celsius temperature:", celc_temp)
Sample runs:
Fahrenheit temperature: 32
Celsius temperature: 0.0
Fahrenheit temperature: -40
Celsius temperature: -40.0
Fahrenheit temperature: 212
Celsius temperature: 100.0
Fahrenheit temperature: 98.6
Celsius temperature: 37.0
Exercises[edit | edit source]
Write a program that gets 2 string variables and 2 number variables from the user, concatenates (joins them together with no spaces) and displays the strings, then multiplies the two numbers on a new line.
string1 = input('String 1: ')
string2 = input('String 2: ')
float1 = float(input('Number 1: '))
float2 = float(input('Number 2: '))
print(string1 + string2)
print(float1 * float2)
Non-Programmer's Tutorial for Python 3
← Hello, World Who Goes There? Count to 10 → |
Soaring numbers of American children are being prescribed drugs for Attention Deficit Disorder (ADD), and Attention Deficit Hyperactivity Disorder (ADHD), and there aren’t enough child psychiatrists to treat these kids. There are an estimated 4 million children being medicated with potent drugs even though we know (Ambulatory Pediatrics, March-April, 2006),that these medications are being used for large numbers of children for whom they don’t work.
ADD and ADHD were not even diseases in the official psychiatric diagnostic manual (DSM IV) 30 years ago. Either lots of doctors missed this “disease” or it’s a creation of our culture which tries to explain every uncomfortable manifestation of human behavior, as representing a disease. From fidgeting to bullying, you may be suffering from a disease caused by a genetic, traumatic, infectious, or autoimmune problem, but one that cannot be defined by any laboratory test or genetic marker. As soon as you declare some behaviors a disease, you take what is an ordinary manifestation of our humanity and create an epidemic. How can there be, in just one generation, 4 million kids suffering from a disease that requires them to take dangerous drugs with serious side-effects. By labeling these behaviors as illnesses, it also implies that we know how to treat them, which legitimizes prescribing drugs.
It’s not just “Big Pharma” that’s pushing this model of treatment. Psychiatrists are deeply involved in creating this epidemic. They rate the diagnostic manual that defines behavioral disease. The Diagnostic and Statistical Manual for Mental Disorders (DSM), is the basis for disease diagnosis, insurance payments and psychiatric treatments including drugs. The DSM is written by 107 medical experts who are members of 18 DSM preparation panels. In a study in the last months journal, Psychotherapy and Psychosomatics (April, 2006), researchers discovered that over the last 20 years, 56% of those DSM experts had one or more financial ties to the pharmaceutical industry from whom they received research funds, consultancies, patents, and other gifts or grants.
The ADD/ADHD epidemic is the result of creating a disease that is not well-defined and therefore indiscriminate in its application. We need to get away from a culture that defines unacceptable behaviors as psychiatric diseases, and then promotes drug taking and chemical straitjacketing to set limits.
The shortage of child psychiatrists is not the crisis, the crisis is the:
. legitimization, easy access and demand for drugs in our culture
. absence of extended families and supportive communities that help set limits and enforce them
. shortage of teachers to whom we pay pittance salaries |
kids encyclopedia robot
Management information system facts for kids
Kids Encyclopedia Facts
A management information system is a system that allows a company to run efficiently, by providing the relevant information the company needs. Nowadays, management information systems use specialized software that runs on a computer. A management information system is usually targeted at economic aspects of running a company, while an executive information system is usually designed for managing staff. The first such systems were built in the 1960s.
kids search engine
Management information system Facts for Kids. Kiddle Encyclopedia. |
Grade 6
What is home, what does it mean? Well today I am going to be sharing what home means to me. Home could be anywhere, it could be at the beach, could be in your tree house out in the backyard, or it could be in your room . Home could be with your family and friends but whatever home is to you it will always have a spot in your heart. Today I am going to be talking about what home is to me. First I am going to talk about the five senses and how they are a part of my home. The first sense is smell, home smells like dinner or lunch. Whenever my parents are cooking i can smell it from almost anywhere in the house. The second sense is taste, home taste like when you eat something whether it is a homemade meal or we are eating out i enjoy spending time with the family and to me spending time with the family is home. The third sense is sight, sight would probably be seeing the messy house because the house is normally a mess from playing games with the family. Sense number four is touch, home feels warm and cozy because when the family watches movies everybody has their own fuzzy blanket so we cuddle up and watch a movie with warm popcorn and ice cold ginger ale. Last but not least is sound, home sounds like laughter when we play games or screams when we watch movies or cheering when we go to a family member’s race or game. when my dad goes for biking trips the family goes with him to cheer him on or when one of the kids has hockey the rest of the family comes to cheer us on. |
What causes oily skin? There can be several factors:
1. Genetics. When oily skin runs in the family, chances are that every member will have larger sebaceous glands that produce excess oil. Any skin that’s genetically oily is more likely to include clogged pores and breakouts.
2. Overuse use of skin care products. In the quest for younger-looking, smoother, clearer skin, patients may overcleanse, overexfoliate, or scrub with too much pressure.
3. Seasonal changes. A rise in heat and humidity during spring and summer can cause skin’s oil production levels to increase. In contrast, when the air becomes dry in winter, skin can get dehydrated, and excess oil may occur when it overcompensates for what’s missing.
4. Medications. Hormonal birth control and hormone replacement medications can cause an increase of oil production. Likewise, virtually any medication can cause dehydration and lead to a production of excess oil when skin overcompensates for the lack of oil.
5. Use of incorrect products. For example, if a patient uses a cleanser for oily skin when they has combination skin, their skin will become over-stripped of the oil it needs. It will then produce even more oil in response to compensate.
6. Hormonal changes. In women, fluctuations of hormone androgens throughout life (i.e., pregnancy, peri- and pre-menopause) can kick sebaceous glands into high gear.
7. Stress. In response to stress, the body produces more androgen hormones, which leads to more oil production.
8. Sun tanning. Tanning is BAD for reducing oil. In fact, although it may temporarily dry out the skin, it actually triggers an injury response, which causes the sebaceous glands to surge production of oil in order to protect the skin’s surface.
How do you treat oily skin?
It is important to cleanse the skin both morning and night with a cleanser containing either a glycolic, salicylic, or another beta hydroxy acid. Pads medicated with any of the previously mentioned oil-cutting acid ingredients are another option to incorporate into your regime. When it comes to moisturizer people with oily skin often make the mistake of skipping this step when in fact oily skin still needs to be moisturized to look and function at its best. It’s best to look for an oil free moisturizer with antibacterial properties.
Know your skin!
It’s important to be aware of how your skin varies so that you can adjust your regimen accordingly. A cleanser with glycolic acid or beta-hydroxy acid might be just fine every day during the summer but beneficial only now and then during the winter. Balance and knowing how to use these ingredients at the right time is important since overusing these products can cause skin to dry out which will cause a counterintuitive cycle of over production of sebum to make up for the lost oils in the skin.
Professional in office treatments that are effective in treating oily skin include salicylic peels which kill acneic bacteria and unplug pores, as well as physician strength glycolic peels such as our 70% glycolic based Refinity Peel which deep cleans the pores, helps to reduce acne, and helps smooth rough skin. As with any skin condition and it’s treatment, it is important to stay on a regular regime both at home and professionally to yield the best long term results. |
An introduction to paranoid personality disorder
Causes[ edit ] A genetic contribution to paranoid traits and a possible genetic link between this personality disorder and schizophrenia exist. A large long-term Norwegian twin study found paranoid personality disorder to be modestly heritable and to share a portion of its genetic and environmental risk factors with the other cluster A personality disorders, schizoid and schizotypal.
An introduction to paranoid personality disorder
The common language and practices help children quickly adopt the Tools and use them with autonomy, resilience, and self-mastery. A person with PPD will have paranoia and an extreme mistrust of others, even when there is no reason to be distrustful.
This article outlines some of the symptoms of PPD, as well as treatment options and outcomes. This article is intended as a reference, not a diagnostic tool. Please seek professional medical advice. Under no circumstances should you attempt to diagnose yourself or a loved one.
What is Paranoid Personality Disorder? The disorder appears to be more common in families with psychotic disorders, such as schizophrenia and delusional disorder.
Browse by Subject
This would seem to indicate that there is a genetic component to PPD and other personality disorders. However, environment and upbringing may also play a factor. Childhood abuse, neglect, and negative experiences in relationships can potentially contribute to the development of PPD.
Other Issues that Relate to Paranoid Personality Disorder People who suffer from PPD are incredibly likely to suffer from a co-occurring disorder such as depression or anxiety. Due to their lack of trust in others, people with PPD have a difficult time forming meaningful relationships and may self-isolate.
This isolation can exacerbate symptoms of depression.
Free USMLE Step1 Videos
The stress of having to be perpetually vigilant can cause general anxiety as well. A person with mild PPD symptoms may be able to lead a relatively normal life.
More severe symptoms may be debilitating, preventing a person from being able to work or have any meaningful interaction with others. They do not feel that there is anything abnormal about the way they view the world and believe that they have good reason for their distrust of others.
As a result, many people with PPD go untreated. Those who do seek treatment usually do so at the request of friends or family members, but often still do not believe that they have a problem. However, in order for psychotherapy to work, the therapist must be able to establish trust with the client.
Unfortunately, a person with PPD may not be able to trust his or her doctor or therapist. Therefore, many people with PPD do not follow through with their treatment, leading to a return of symptoms.
Medication is not typically given for PPD except in cases in which symptoms are severe. Antidepressants and anti-anxiety medication are most commonly the choice to help manage symptoms of PPD.
An introduction to paranoid personality disorder
Antipsychotics are sometimes the case, but again, this is only in severe occurances. Psychology Today notes that medications are often ill-advised for people with PPD, as medications… …may contribute to a heightened sense of suspicion that can ultimately lead to patient withdrawal from therapy.
Therefore, medications should be used only when necessary, and for only a short time whenever possible.
It is estimated that between 2. Men are more likely than women to develop PPD, and symptoms typically emerge by early adulthood. While there is no cure for PPD, there is treatment available.Identify the treatment for borderline personality disorder.
Introduction. Everybody has their own unique personality; that is, their characteristic manner of thinking histrionic, paranoid, and/or schizoid personality disorder.
People typically lack insight into the maladaptivity of their personality. Many people with personality disorders. Borderline personality disorder is the most common personality disorder in clinical settings, and it is seen across different cultures [2].
An introduction to paranoid personality disorder
Unfortunately, it is often misunderstood and misdiagnosed by health care providers including registered nurses and nurse practitioners [3, 4]. Personality Disorders and Psychopathy. Authored by Dr Laurence Knott, Introduction.
This article refers to the International Classification of Diseases 10th edition (ICD) which is the official classification system for mental health professionals working in NHS clinical practice.
Patients with paranoid personality disorder voice. Paranoid Personality Disorder (PPD) Introduction Paranoid personality disorder is a serious mental health condition in which the sufferer has a chronic mistrust of friends, strangers and authority figures.
PPD sufferers often have a heightened sensitivity to the actions and words of others, and. Borderline Personality Disorder: An Overview of History, Diagnosis and Treatment in Adolescents INTRODUCTION The diagnosis of borderline personality disorder (BPD) has been used for over 30 with histrionic personality disorder, paranoid personality disorder, antisocial personality.
Nov 23, · Paranoid Personality Disorder is basically characterized by the tendency, persistent and unjustified, to perceive and interpret the intentions, words and behaviors of others as malicious, degrading or threatening: the world is experienced as hostile and always looked in the most varied contexts with distrust and suspicion, with the consequent and compulsory choice of a solitary lifestyle.
Cultural Aspects of Personality Disorder - Oxford Handbooks |
Peru + 1 more
Peru: RMRP 2021 and the Environment Part I: Water scarcity, its impact in the sectorial response - wash, shelter, integration (livelihoods), nutrition and health
Originally published
View original
Peru is the second country of arrival for refugees and migrants from Venezuela and the first in asylum applications, hosting some 1,043 million persons according to the Superintendence of Migration. Following an increasingly challenging journey, most refugees and migrants from Venezuela arrive in dire need of humanitarian assistance to meet their most basic needs, including shelter, food and water, sanitation and hygiene (WASH).
Peru’s remarkable economic success between 2000 to 2013 and economic stability up to 2019 opened a great opportunity for the improvement of the living conditions of many within its national population, including 6.4 million people climbing above the poverty line and a decrease of extreme poverty from 31 to 11 per cent. These advances also provided the conditions to receive the increasingly vulnerable Venezuelan flows. However, despite these economic achievements and stability, the country continues to face many structural challenges on the provision of basic services and on the sustainable management of its natural resources to support its growing population, economic activities and development.
Peru’s commitment to development, particularly to the achievement of the sustainable development goals (SDGs), represents its biggest opportunity to attain sustainable economic growth. In this context, human mobility benefits and boosts this growth. According to a macroeconomic analysis made by the BBVA, refugees and migrants from Venezuela have a positive net fiscal impact, improve the human capital with highly qualified professionals in key areas where the local labour market requires it, and increases the availability of labour force, thus boosting the productive capacity of the Peruvian economy. Moreover, this analysis further demonstrated that the positive impacts to the potential Gross Domestic Product (GDP) could be heightened if the Venezuelan population is employed according to their education level, given that a substantial part of this community is highly educated, and as a result would contribute to a larger extent to increase the aggregate demand (internal consumption), essential for the country’s overcome of the current economic contraction.
Nevertheless, Peru like the rest of Latin America and the world, face increasing challenges, including economic and development ones, as a result of climate change and the mismanagement of natural resources.
Today more than ever, development and durable solutions to humanitarian needs cannot come if not hand in hand with environmental responsibility. This is the only path to ensure that the benefits of human mobility will harness sustainable economic growth and livelihoods and will prevent further humanitarian and governance crises. While the current pandemic has proven that all countries face significant challenges when economies and services derail in the response to emergencies, it has also shown that regions with high inequality, like Latin America and its already vulnerable communities, may struggle the most. As the effects of climate change affect everyone directly or indirectly, by 2070 more than three billion people may find themselves living outside optimum climate for human life, displacing tens of millions of persons due to droughts, desertification, flooding, unbearable heat, disruption of economies and livelihoods, climate driven conflict over resource scarcity and staggering food insecurity.3 |
Selected Poetry of Norman MacCaig -
Selected Poetry of Norman MacCaig -
Selected Poetry of Norman MacCaig National 5 - Specified Texts Visiting Hour by Norman MacCaig Whats Happening? The poet is visiting a dying friend or relative in hospital, and tries to avoid his emotions on his way to the
ward. When he arrives, he is overcome by grief and anguish, and leaves the visit feeling it has been pointless. Key Themes Facing Death (either the dying person, or the relative) Isolation surrounding death/emotion The overall structure of the poem
contributes to the atmosphere and mood Verse 1-3 are short, staccato and create a sense of place, atmosphere and the poets feelings Verse 4 sense of busy hospital Verse 5 main action, sense of hush in the presence of dying woman. Verse 6 opening of floodgates of poets emotions in face of his inevitable loss. Useful Terms Synecdoche - A figure of speech in which a part is
used to represent the whole (for example, ABCs for alphabet) or the whole for a part (Spain won the World Cup"). Synaesthesia - an attempt to fuse different senses by describing one in terms of another (Example: the sound of her voice was sweet) Free verse - lines with no prescribed pattern or structure Enjambment - the continuation of a sentence over a line-break. Enjambment is one way of emphasising a particular word or phrase Useful Terms
Connotation - the implied or suggested meaning connected with a word Caesura - a strong pause within a line. It is often found alongside enjambment. If all the pauses in the sense of the poem were to occur at the line breaks, this could become dull; moving the pauses so they occur within the line creates interest. Guttural - Produced in the throat; harsh-sounding Plosive - consonant produced by stopping the flow of air at some point and suddenly releasing it (as `p'' and `d'' in `pit'' or `dog'') Oxymoron - joining contradictory terms (as in `deafening
Imagery nostrils/ as they go bobbing along Synecdoche is used, since not just his nostrils are moving along, as the image would suggest. This emphasises the overpowering nature of the hospital smell, since it has blocked out his other senses. white cave of forgetfulness Metaphor, suggesting the white curtains or sheets are cave-like (impenetrable). This conveys the isolation of the woman, and the poets exclusion from her. withered hand/ trembles on its stalk Metaphor, suggesting the womans body is brittle and frail, by comparing it to a dying flower. The image suggests the
womans body has deteriorated, but contains hope for regrowth (afterlife), as well as showing the love with which the poet looks on the woman. Imagery glass fang Metaphor, suggesting the intravenous drip is vampire-like. The horror in this image is shocking, which shows the poets grief and distress at seeing the womans condition, and being unable to help her. black figure in her white cave Metaphor, referring to the universal image of Death, figure also suggesting the womans blurred vision. This emphasises the
isolation of the woman, as well as her impending and unavoidable death. the round swimming waves of a bell Synaesthesia, as a visual image describes a sound (signalling the end of the Visiting Hour?). swimming could suggest the poets dizziness (confusion) or tears. This is from the womans point of view, so further shows her isolation, and the poets isolation from her. Structure Free verse is used throughout, which reflects the poets confusion and suits the narrative style of the text (there is an introduction to the character and
setting, followed by development, climax, and an epilogue) The verses deal with the poets progression through the visit, from his entering the hospital and making his way to the ward, up to him leaving after the visit. Also, each verse reveals more of the poets emotions. The first line of the poem is effective in grabbing the readers attention, by referring to a very vivid and distinctive sensory image; The hospital smell which the reader can associate with. Structure
What seems a corpse/ is trundled into a lift and vanishes/ heavenward Enjambment is used here to emphasise the last words of the lines, carefully chosen to suggest a finality in death; corpse containing very little connotation of life, and vanishes further stressing the poets view that death is absolute. heavenward therefore seems incongruous, although this is simply an example of MacCaig trying to avoid the seriousness of the visit by creating whimsical images. I will not feel, I will not/ feel, until/ I have to. Repetition is used to suggest the poet is chanting
under his breath in order to avoid his emotions. Structure here and up and down and there the unusual word order is another example of the poet trying to lighten the mood, while also emphasising the number of nurses he sees. It suggests MacCaig is looking all around to find a distraction from his thoughts. so much pain, so/ many deaths / so many farewells Repetition of so stresses the frequency of the nurses unpleasant dealings, which supports the high esteem, perhaps envy, with which he regards the ability of the nurses to cope. Ward 7. The abruptness of this non-sentence jolts
the reader, just as we can imagine it affected MacCaig; this effect is heightened by the caesura it causes. This is the turning point of the poem, as he has now reached his relative and must face his emotions. Structure A withered hand/ trembles on its stalk Use of the pronoun diminishes the humanity of the woman, suggesting the poet does not feel the relative is truly alive; her body is merely an empty shell, while she is effectively dead. There are further examples in the rest of the verse, which
serve to emphasise his point. books that will not be read/ and fruitless fruits Enjambment causes the last line to seem like a bitter addition, which summarises the poets despair at the hopelessness of his situation, and the Word Choice combs my nostrils gives a sense of the pervasive power of the smell, and his feeling of being invaded; showing his discomfort. green and yellow corridors colours have connotations of sickness, which further stresses the poets discomfort in
these surroundings. corpse holds little relation to life, suggesting the finality of death. The harshness of the sound; with a guttural c and plosive p, shows the poets distress and the painful emotions he is facing. heavenward incongruous with the poets beliefs, expressed in the previous lines; simply an example of MacCaig using humour to avoid his emotions. miraculously suggests MacCaigs admiration for the nurses abilities, while showing his own worry about the way Word Choice farewells the ending of the verse on this draws
attention to the word, which underlines the purpose of his visit. Defined as good wishes on parting, the word is suggestive of the possibility the people will meet again, and that those departing are going on some kind of journey this perhaps shows the poets desire to believe in an afterlife, especially at such troubling times. white cave holds connotations of isolation through confusion or sensory blankness (e.g. white noise) not guzzling but giving the horror of the glass fang image is continued in the word guzzling, but is reversed by the positive word, giving. The use of the guttural g sound in the alliteration conveys the harshness of the poets interpretation; he clearly sees
the process as intrusive and pointless. Word Choice clumsily dizzily shows the poet is overcome by his emotions, leaving him confused and dazed. fainter showing the womans vision is blurred; she can see him getting fainter with distance. Also a pun, since the poet may be so upset he is starting to feel faint. fruitless fruits the final words are an oxymoron: how can a fruit be fruitless? This captures the poets despair at the
pointlessness of the womans death being prolonged, and his inability to help bringing Class Discussion Think about Is it less of an ordeal for the dying person than the one left behind? Dying is something we have to do alone, despite being surrounded by loved ones? How realistic do you find the poets Practice Critical Reading
Individual Task On the next slide are some textual analysis questions all about Visiting Hour by Norman MacCaig. You should answer these questions, referring to the text in your answers. Remember you should attempt ALL the questions The hospital smell combs my nostrils as they go bobbing along (lines 1 3) 1. Comment on the poets use of imagery in these opening lines.
Why is it effective? (2) 2. What seems like a corpse is trundled into a lift and vanishes heavenward (lines 5-7) Comment on the poets use of word choice in these lines. What do these words tell you about the poets mood at this point? (3) 3. In verse 5, the poet finally reaches he ward where his relative lies. What is the effect of the sentence Ward 7.? (2) 4. Re-read verse 5. Identify ONE image used by MacCaig and
Placemat Activity Compare and Contrast Part of the Critical Reading exam will include a section in which you have to COMPARE and CONTRAST. You will now work in your groups to discuss the two poems that we have studied so far (Assisi and Visiting Hour) and think of ways that they are similar and different. You can comment on ideas, imagery, word choice, theme etc.
Higher Order Thinking Skills cc I can remember facts about the information. Why did Norman? MacCaig write Visiting Hour? Who was St. Francis of Assisi? How would you describe the beggar in
Assisi? Remembering I can explain the ideas in the information. ? What was Assisi about? Why didnt the speaker want to go into the hospital ward in Visiting Hour?
Understanding I can use the information in a new way. Can you show?that the speaker in Visiting Hour was overwhelmed when he entered the hospital? How do you know that the speaker was disappointed in the priest? Applying I can break down the information to understand it better.
? How did the speaker feel in Assisi? Why do you think that? c What might have happened if the tourists had not had ignored the beggar? Analysing I can say what I think about the information and back up
my opinion. Would you have ? ignored the beggar? Why was the speaker impressed by the nurses in the ward? Evaluating I can use the information to build new ideas. What other ending could there have ?
been Assisi? What could we do to help the beggar who is sat outside the church? Creating
Recently Viewed Presentations
• The Earth, the Moon, and the Sun What
The Earth, the Moon, and the Sun What
The Earth, the Moon, and the Sun We learned about the moon when: Astronauts collected rocks and soil from the moon Astronauts set up experiments on the moon We learned about the moon when: Astronauts collected rocks and soil from...
• Distance, Midpoint, Pythagorean Theorem
Distance, Midpoint, Pythagorean Theorem
Distance, Midpoint, Pythagorean Theorem Distance Formula Distance formula—used to measure the distance between between two endpoints of a line segment (on a graph). x1 and y1 are the coordinates of the first point x2 and y2 are the coordinates of...
OBSTETRICS EMERGENCIES Post-partum haemorrhage Shoulder dystocia Cord prolapse Eclampsia Uterine rupture Uterine inversion Fetal distress APH Delivery of the 2nd twin
• PowerPoint-presentatie
Invariant 8 Nul n'aime tourner à vide, agir en robot, c'est à dire faire des actes, se plier à des pensées qui sont inscrites dans des mécaniques auxquelles il ne participe pas. Invariant 9 Il nous faut motiver le travail....
• MRI_Brain_Hubbard
MRI of Brain/Head and Neck labeling by Amanda Butcher, MD JCE SOM Class of 2008 Insula Lateral Sulcus Cerebral Peduncle Olive Crus of Fornix Middle Cerebellar Peduncle Caudate Nucleus Third Ventricle Hippocampus Pons Corpus Callosum Thalamus Cerebral Peduncle Parahippocampal gyrus...
• Hey! What's Cooking? A Kitchen Curriculum for Parents of ...
Hey! What's Cooking? A Kitchen Curriculum for Parents of ...
Let's feel comfortable there! When in use, the kitchen has smells, sounds, tastes, and numerous gadgets to explore. Successfully putting a meal on the table, a brownie in a lunch box, or preparing a casserole for a pot luck -...
• Asuransi Dan Reasuransi Syariah
Asuransi Dan Reasuransi Syariah
Sebelum teori Invisible Hand Adam Smith dan dibukanya pintu pemikiran ekonomi kaum markantilis pada abad ke 17, ternyata Joseph Shumpteter (1954) dan Speigel (1991) menemukan adanya benang putus diantara kedua masa tersebut yang dinamakan masa Great Gap, kondisi ini sebenarnya...
• Intrepid - Tamaqua Area School District
Intrepid - Tamaqua Area School District
Importune Verb To insist; to request repeatedly The entire Tamaqua Area High School importuned for a half day before Easter break. Putative Adjective Assumed; supposed The putative father was vindicated after the DNA test came back negative. |
SajidTrainer Stories
The Microwave
1. The Microwave
Inventor: Percy Spencer
Year: 1946
Big Discovery: The magnetron worked even better on popcorn.
As a Result: Orville Redenbacher became very rich.
1. Saccharin
Inventors: Constantin Fahlberg and Ira Remsen
Year: 1879
What Happened: After spending the day studying coal tar derivatives, Fahlberg left his Johns Hopkins laboratory and went for dinner.
Big Discovery: Something he ate tasted particularly sweet, which he traced to a chemical compound he’d spilled on his hand. Best of all, it turned out to be calorie-free.
1. Anaesthesia
Inventor: Horace Wells
Year: 1844
Big Discovery: The friend hadn’t realized he’d hurt himself.
As a Result: Nitrous oxide became an early form of anaesthesia.
1. Penicillin
Inventor: Alexander Fleming
Year: 1928
What Happened: Halfway through an experiment with bacteria, Alexander Fleming went on a vacation. Slob that he was, he left a dirty petri dish in the lab sink.
As a Result: That discovery led to two things: penicillin and Mrs. Fleming hiring a maid.
So, these were the 4 inventions that were invented accidentally and changed the vision of the world.
Sajid Mostaque
About Author: Sajid Mostaque has total work experience of 3 years in corporate world. He is a Program Implementation Associate. He is working with STEM Learning from last 9 months.
Leave a Reply
|
A note on terminology
Module 1 highlights some of the complications and confusing messaging within the phrase “human trafficking”. These complications, and the impacts of misinformation, will be explored more thoroughly in Module 4. In order to keep our discussions and intentions clear from these complications, we have shifted away from “trafficking” terminology. Instead, we opted for language that felt the most inclusive, sex-positive, anti-racist, and based in equity.
We always try to center youth’s experience as youth and individuals before their experience of exploitation. To do this, we have chosen to use the terminology ‘youth who experience exploitation,’ and variations like ‘youth who may be exposed to exploitation.’ This training program is not about supporting youth because their experience fits into the legal definition of “human trafficking” or because they choose to report ‘traffickers.’ Instead, we hope to equip service providers with the awareness, skills, and tools to support youth regardless of legal definitions and complicated or unclear terminology.
When centering youth, we want to maintain space for self-identification. Outside of this training, the terms victim or survivor may be used to describe a person who has experienced exploitation. However, a person who has experienced exploitation may not identify with the term victim, survivor, or even as someone who has experienced exploitation. Despite using a particular terminology, we will always respect an individual’s choice to identify as they see fit.
In the same line of thought, we use the phrase “people who exploit for personal or financial gain,” instead of the term “trafficker.” Humanizing people who cause harm, despite the fact that they cause harm, is an aspect of non-disposability that will be explored in this module. Together, these phrases seek to challenge the victim/perpetrator binary. The victim/perpetrator binary is the idea that we can only be a victim or a perpetrator, and not both at once or someone who moves between the two experiences. Our intention is to uphold that we all experience harm and we all have the capacity to cause harm. Moving away from either/or thinking enhances our ability to be more equitable, compassionate, and anti-oppressive.
Most importantly, and as we will discuss, exploitation does not occur because a person is inherently bad. The systems of oppression and violence we live in create an environment and culture that allow, and often encourage, exploitation to occur. While individuals should be held accountable for the harm they cause, our work does not stop there – we must dismantle these systems and create systems that value and uplift all our communities. Focusing only on individuals makes it harder for us to create the widespread change necessary to end exploitation.
Personally, I am working to root the word “predator” out of my vocabulary because we aren’t hunting for predators in an otherwise pristine forest. The forest itself is on fire.
Kelly Hayes, Punishing “Predators” Will Not Save Us
Skip to content Click to listen highlighted text! |
Tag Archives: reactive printing
Mercerizing of cotton fabric || Methods of Mercerizing Process
Mercerizing is done after bleaching operation. Bleaching is enough for prepared the fabrics for dyeing and printing but mercerizing is done for adding some advantage to the fabric. Luster and strength of the fabric increases for mercerizing process. Cotton mercerizing is the most popular operation.
Mercerizing of cotton is done in three basic stages of materials. They are as:
• Yarn stage
1. Hank form
2. Package form
3. Beam form
• Fabric stage
1. White fabric
2. Woven fabric
3. Knitted fabric
• Dyed fabric stage
Methods of application: Yarn or fabric can be mercerized by J-Box. Mercerizing is a continuous process. At first fabric is hanked by the roller in a J-Box. Fabric is passed through a solution which contains 23% NaOH at room temperature. Fabric is passed for 4-5 minutes. Then fabric is squeezed by the squeezed roller and washing is done in a bath at 85 degree Celsius. Then it also immersed in an acid solution bath which contain 5% CH3COOH. After that is washed in another bath at 85 degree Celsius. By this way we can get a mercerized fabric.
For white finished goods, mercerizing is done by the following sequence:
Fabric after scouring and bleaching process
Padding in alkaline liquor
Neutralization in acid solution
A marketable fabric can be produced by different way. But day by day man wants to wear that’s type of fabric which has all possible facilities. Mercerizing is done in different types of machine. Generally mercerizing is done in dyeing machine. Yarn and Fabric Mercerizing is near similar.
Different well known buyer wants to get mercerized products. They strictly follow the qualities of product. After mercerizing fabrics become more suitable for dyeing or printing or for white goods it ready for delivery to buyer.
Reactive Dyes | Definition-Classification-Properties and Influencing Factors
Dyeing operation is performed by the reaction between fiber and dyes. Some dyes are water soluble and some are water insoluble. Some fiber has affinity to dye; some have no affinity to dyes. So dyeing depends on both fiber and dyes chemical properties. Before dyeing we have to consider this factor.
Reactive dyes are the most common and huge uses dyes all over the world. Most of the dyeing operation of natural fiber is done by reactive dyes. Reactive dyes have a worldwide acceptance to the dyeing technologist for dyeing cotton. This article is about reactive dyes.
Reactive dye is only class of dyes which makes co-valent bond with the fiber and becomes a part of it. This can be described as:
Reactive dyes + Fiber = Reactive dye-Fiber (Co-valent bonding)
If the general structure of a reactive dye is “R-B-X” then,
R-B-X + Fiber = R-B-X-Fiber (Dyed fiber)
R = Chromophore Group (Azo, Anthaquinone, Phthalocyanine, Metal complex group)
B = Bridging Group ( Imino, Ethyl & Methyl, Oxide, Sulphide group)
X = Reactive Group (-Cl, -Br, -SH, -OCH, etc)
Examples of reactive dyes:
Classification of Reactive Dyes:
• By depending on chemical constitution reactive dyes can be classified as:
1. Chlorotriazine Dyes (MCT)
2. Vinyl Sulphone Dyes (VS)
3. Heterocyclic Helogen Containing Dyes (HHC)
4. Mixed Dyes (MCT-VS)
• By depending on application methods of temperature, reactive dyes can be classified as:
I.Cold brand reactive dyes: This type of reactive dyes is applied in very low temperature. Temperature lies between 25 -50 degree Celsius. They are highly reactive with fiber on this temperature.
II.Medium brand reactive dyes: This type of dyes is applied in a medium temperature range is 40 – 60 degree Celsius. Their reactivity is medium with fiber.
III.Low brand reactive dyes: This type of dyes has very low reactivity properties with fiber with comparison with medium and high brand reactive dyes. Dyeing is carried out on 60 -90 degree Celsius.
Properties of reactive dyes:
1. Reactive dye is anionic in nature.
2. Reactive dye is a water soluble dye.
3. They have better wash and light fastness properties.
4. They have better substantivity.
5. They form strong co-valent bond with the cellulosic fiber.
6. Alkaline condition is must required for dyeing.
7. Electrolyte is must for exhaustion of dyes in the fiber.
8. A certain amount of dyes are hydrolyzed during application.
9. Wide range of color can be produced with reactive dyes.
10. Comparatively cheap in price.
Influencing factors: Dyeing of cellulosic fiber with reactive dyes is influenced by some factor. Following factors should consider during dyeing operation.
1. pH: Reactive dyeing is done in an alkaline conditon for this reason pH of the dyeing bath should control. pH should be between 11.5 -11.
2. Temperature: Temperature should fix depending on the brand of reactive dyes.
3. Concentration of electrolyte: Concentration of electrolyte depends on the type of shade.
4. Time: Dyeing time should be between 60 – 90 minutes.
5. Liquor ratio: Huge amount of water is use during dyeing operation. Higher the liquor ratio betters the efficiency of dyeing.
Reactive dyes have some advantage and disadvantage to use. Different famous dyes manufacturing companies produce reactive dyes with different characteristics. So, select your ones depending on your demand. |
Natural pond surrounded by decking area with buildings in the background
Manage water in the landscape
A big effect of climate change is unpredictable rainfall, causing both droughts and floods. This is an acute threat to crops and livelihoods. Adapt by improving how you collect and store water on your land. Slow it down and harvest it with ponds, tanks, wetlands, swales and trees.
Patch of dried, cracked earth
Adapted from Andrew Millison, Permaculture Design Tools for Climate Resilience
Assess your risks
An historical survey of the last century should reveal local risks from floods and droughts (though bear in mind that many places are seeing unprecedented extremes). Assess your site to work out where water collects and moves through the site, and where is at risk from flooding or drying out. Recent experience may guide you. What is the watershed of your site? What are the impermeable surfaces and places where water is running off? Where does water enter and leave the site? Where can water be slowed, spread, sunk and stored?
Designing for drought
Drought is a slow motion disaster; it builds as rains fail, heat increases, and supplies are exhausted. It may last for one year but will often last for several, with each year worse than the one before.
This list of simple drought resilience strategies provides a design checklist for a drought mitigation plan:
• Save surplus to get you through bad times. Stockpile surplus water, food, seeds, or money. Remember in a good year (or season) that drought is likely to return, and store or invest accordingly.
• Store water from all precipitation and surface flows in ponds, tanks and wetlands. Swales, ditches, hedges and mulched areas built along contours will hold moisture on site.
• Reduce irrigation using pumped up groundwater. If the hydrologic cycle is broken, then pumping deep groundwater can deplete aquifers and degrade water resources.
• Reduce crops requiring frequent irrigation. Water intensive crops are being grown in places that do not have the long term water resources to support those crops.
• Reduce soil erosion and build soil health. The healthier and deeper the soil, the more water it can hold. Enhance the water holding capacities of soil to improve productivity and structure, and reduce the need for tillage and aeration. A healthy soil biology will accomplish all these things.
• Reduce bare soil surfaces. Covered soil is more biologically active, and can thus hold more moisture. Soil that is exposed to the sun, wind, and falling raindrops is more prone to erosion and dehydration.
• Cultivate tree products. Perennials are more resilient to yearly fluctuations of water availability because of their established root systems, especially if those trees, shrubs, herbs and grasses are climatically appropriate species.
Graphic depicting water retention in a swale
Designing for torrential rain
Unpredictable and extremely heavy rain events are becoming more common. Resulting floods are a fast motion disaster that can can destroy crops, houses and livestock and cause catastrophic soil erosion. Flooding can be managed through several strategies:
• Harvest water as it passes through the site in ponds, tanks and marshy areas. Overflows on water harvesting structures should be robust and sized for large scale rain events.
• Water flow within ploughed fields should be channelized so flood flow does not spread out within fields and damage crops and soils.
• Outside of ploughed fields, the passage of water should be slowed as much as possible through the building of permeable dams, meanders, overflow ponds and the creation of marshes, flood meadows and wooded areas.
• Water flows can be brought into a field at the embankment at the bottom of the field, so water can back flood into the field, avoiding damaging flows across the field.
• Man-made channels will help direct water. Swales, ditches and mulched areas built along contours will catch and hold water safely, while ditches running down the slope will carry it to a stream or storage area.
• Field drains should be mapped, cleaned and improved. But don't use them to direct water off the site, send it to a storage point instead.
• Plantings of trees will slow water flow, take up excess water, catch washed away nutrients, and stabilise soil against erosion.
Watershed level planning
True resilience does not happen within the boundaries of one site. It happens by planning at the scale of communities and regions. Water harvesting structures need to be interlinked between farms and villages, and there needs to be a recognition that upstream is intimately linked to downstream; too much water harvesting upstream can lead to drought downstream, too little water capture can lead to flooding. The perspective that needs to be adopted is water resource development at the watershed scale.
Another important aspect of restoring the hydrologic cycle and stabilizing the climate is reforestation. Trees and shrubs can provide food security, and forests help to increase rainfall by transpiring water into the atmosphere which produces precipitation.
Picture credits: 1)Permaculture Association 2) 3) Adrian Buckley -
Install a water barrel or tank to harvest rainwater from your roof
Introduce a phased programme of water harvesting features
Campaign for greater government awareness about climate risks
Support a charity that improves clean water supply in the developing world
Earth Care icon
Improving how we collect and store water helps to preserve this natural resource
Fair Share icon
Conserving rainwater means less water from the tap used on your land
People Care icon
Water is crucial for food production, so collecting it and storing it wisely is key |
16-Apr-2021 - University of Tokyo
Concrete without cement?
Simple chemistry will enhance the sustainability of concrete production
Researchers at the Institute of Industrial Science, a part of The University of Tokyo, have developed a new method of producing concrete without cement. They have directly bonded sand particles via a simple reaction in alcohol with a catalyst. This may help both to slash carbon emissions and to construct buildings and structures in desert regions, even on the Moon or Mars.
Concrete consists of two parts: the aggregate (typically made of sand and gravel) and cement (responsible for 8% of total global CO2 emissions). Despite there being a huge amount of sand in the world, the availability of sand for concrete production is fairly limited because sand particles must have a specific size distribution to provide flowability to concrete.
"In concrete, cement is used to bond sand and gravel. Some researchers are investigating how more cement can be replaced with other materials, such as fly ash and blast furnace slag, to reduce CO2 emissions, but this approach is unsustainable because the supply of these materials is decreasing owing to reduced use of thermal power systems and increased use of electrical furnace steel," explains Yuya Sakai, lead author. Therefore, a new approach is required to produce concrete from inexhaustible materials with less environmental load. "Researchers can produce tetraalkoxysilane from sand through a reaction with alcohol and a catalyst by removing water, which is a byproduct of the reaction. Our idea was to leave the water to shift the reaction back and forth from sand to tetraalkoxysilane, to bond the sand particles with each other."
The researchers placed a cup made of copper foil in a reaction vessel with sand and materials, and systematically varied the reaction conditions, such as the amounts of sand, alcohol, catalyst, and dehydration agent; the heating temperature; and the reaction time. Finding the right proportion of sand and chemicals was critical to obtain a product with sufficient strength.
"We obtained sufficiently strong products with, for example, silica sand, glass beads, desert sand, and simulated moon sand," says second author Ahmad Farahani. "These findings can promote a move toward a greener and more economical construction industry everywhere on Earth. Our technique does not require specific sand particles used in conventional construction. This will also help address the issues of climate change and space development."
Additionally, the product is likely to have better durability than that of conventional concrete because cement paste, which is relatively weak against chemical attack and exhibits large volume changes due to temperature and humidity, is not included in the product.
• "Production of Hardened Body by Direct Bonding of Sand Particles"; Seisan Kenkyu, Vol. 75, 2021
Facts, background information, dossiers
More about University of Tokyo
• News
Sustainable chemical synthesis with platinum
Researchers used platinum and aluminum compounds to create a catalyst which enables certain chemical reactions to occur more efficiently than ever before. The catalyst could significantly reduce energy usage in various industrial and pharmaceutical processes. It also allows for a wider rang ... more
How does your computer smell?
A keen sense of smell is a powerful ability shared by many organisms. However, it has proven difficult to replicate by artificial means. Researchers combined biological and engineered elements to create what is known as a biohybrid component. Their volatile organic compound sensor can effec ... more
Tips for making nanographene
Nanographene is a material that is anticipated to radically improve solar cells, fuel cells, LEDs and more. Typically the synthesis of this material has been imprecise and difficult to control. For the first time, researchers have discovered a simple way to gain precise control over the fab ... more |
Psychosocial Disability (Mental Illness)
What is 'psychosocial disability'?
Psychosocial disability is a term used to describe a disability that may arise from a mental health issue.
Not everyone who has a mental health condition will have a psychosocial disability, but for people who do, it can be severe, longstanding and impact on their recovery. People with a disability as a result of their mental health condition may qualify for the NDIS.
Source: https://www.ndis.gov.au/understanding/how-ndis-works/mental-health-and-ndis |
Home Previous TOC Next Switch
One of the busiest parts of the busy thoroughfare of Broadway, in the city of New York, is the point of its intersection with Fourth Street. Thousands and tens of thousands of people pass and repass there daily, but few ever pause to look at the curious machine which stands in the window of the shop at the north-west corner of these two streets. This machine, clumsy and odd-looking as it is, nevertheless has a history which makes it one of the most interesting of all the sights of the great city. It is the first sewing-machine that was ever made.
Elias Howe, its maker, was born in the town of Spencer, Massachusetts, in 1819. He was one of eight children, and it was no small undertaking on the part of his father to provide a maintenance for such a household. Mr. Howe, Sen., was a farmer and miller, and, as was the custom at that time in the country towns of New England, carried on in his family some of those minor branches of industry suited to the capacity of children, with which New England abounds. When Elias was six years old, he was set, with his brothers and sisters, to sticking wire teeth through the leather straps used for making cotton cards. When he became old enough he assisted his father in his saw-mill and grist-mill, and during the winter months picked up a meager education at the district school. He has said that it was the rude and imperfect mills of his father that first turned his attention to machinery. He was not fitted for hard work, however, as he was frail in constitution and incapable of bearing much fatigue. Moreover, he inherited a species of lameness which proved a great obstacle to any undertaking on his part, and gave him no little trouble all through life. At the age of eleven he went to live out on the farm of a neighbor, but the labor proving too severe for him, he returned home and resumed his place in his father's mills, where he remained until he was sixteen years old.
When at this age, he conceived an ardent desire to go to Lowell to seek his fortune. One of his friends had just returned from that place, and had given him such a wonderful description of the city and its huge mills, that he was eager to go there and see the marvel for himself. Obtaining his father's consent, he went to Lowell, and found employment as a learner in one of the large cotton-mills of the city. He remained there two years, when the great financial disaster of 1837 threw him out of employment and compelled him to look for work elsewhere. He obtained a place at Cambridge, in a machine-shop, and was put to work upon the new hemp-carding machinery of Professor Treadwell. His cousin, Nathaniel P. Banks, afterward governor of Massachusetts, member of Congress, and major-general, worked in the same shop with him, and boarded at the same house. Howe remained in Cambridge only a few months, however, and was then given a place in the machine-shop of Ari Davis, of Boston.
At the age of twenty-one he married. This was a rash step for him, as his health was very delicate, and his earnings were but nine dollars per week. Three children were born to him in quick succession, and he found it no easy task to provide food, shelter, and clothing for his little family. The light-heartedness for which he had formerly been noted entirely deserted him, and he became sad and melancholy. His health did not improve, and it was with difficulty that he could perform his daily task. His strength was so slight that he would frequently return home from his day's work too much exhausted to eat. He could only go to bed, and in his agony he wished "to lie in bed forever and ever." Still he worked faithfully and conscientiously, for his wife and children were very dear to him; but he did so with a hopelessness which only those who have tasted the depths of poverty can understand.
About this time he heard it said that the great necessity of the age was a machine for doing sewing. The immense amount of fatigue incurred and the delay in hand-sewing were obvious, and it was conceded by all who thought of the matter at all that the man who could invent a machine which would remove these difficulties would make a fortune. Howe's poverty inclined him to listen to these remarks with great interest. No man needed money more than he, and he was confident that his mechanical skill was of an order which made him as competent as any one else to achieve the task proposed. He set to work to accomplish it, and, as he knew well the dangers which surround an inventor, kept his own counsel. At his daily labor, in all his waking hours, and even in his dreams, he brooded over this invention. He spent many a wakeful night in these meditations, and his health was far from being benefited by this severe mental application. Success is not easily won in any great undertaking, and Elias Howe found that he had entered upon a task which required the greatest patience, perseverance, energy, and hopefulness. He watched his wife as she sewed, and his first effort was to devise a machine which should do what she was doing. He made a needle pointed at both ends, with the eye in the middle, that should work up and down through the cloth, and carry the thread through at each thrust; but his elaboration of this conception would not work satisfactorily. It was not until 1844, fully a year after he began the attempt to invent the machine, that he came to the conclusion that the movement of a machine need not of necessity be an imitation of the performance of the hand. It was plain to him that there must be another stitch, and that if he could discover it his difficulties would all be ended. A little later he conceived the idea of using two threads, and forming a stitch by the aid of a shuttle and a curved needle with the eye near the point. This was the triumph of his skill. He had now invented a perfect sewing-machine, and had discovered the essential principles of every subsequent modification of his conception. Satisfied that he had at length solved the problem, he constructed a rough model of his machine of wood and wire, in October, 1844, and operated it to his perfect satisfaction. His invention is thus described:
"He used a needle and a shuttle of novel construction, and combined them with holding surfaces, feed mechanism and other devices, as they had never before been brought together, in one machine One of the principal features of Mr. Howe's invention is the combination of a grooved needle, having an eye near its point, and vibrating in the direction of its length, with a side-pointed shuttle for effecting a locked stitch, and forming, with the threads, one on each side of the cloth, a firm and lasting seam not easily ripped. The main action of the machine consists in the interlocking of the loop, made by the thread carried in the point of the needle through the cloth, with another thread passed through this loop by means of a shuttle entering and leaving it at every stitch. The thread attached to this shuttle remains in the loop and secures the stitch as the needle is withdrawn to be ready to make the next one. At the same time the cloth, held by little projecting pins to the baster plate, is carried along with this by what is called the 'feed motion' just the length of a stitch, the distance being readily adjusted for finer or coarser work. .... The cloth is held in a vertical position in the machine, and the part to be sewed is pressed against the side of the shuttle-race by a presser plate hinged on its upper edge, and capable of exerting any required pressure on the cloth, according as the adjusting screw that regulates it is turned. A slot, or perforation through the plate, also extended through the side of the shuttle-race near the bottom, admits the passage of the needle; and when this is pushed in the shuttle can still pass freely over it. The shuttle is pushed one way and then the other through its race or trough by picker staves. The thread for the needle is supplied by a bobbin, the movement of which is checked by a friction band, this securing the proper tension, and the slack of the thread is duly taken up by a suitable contrivance for the purpose. Thus, all the essential features of the most approved sewing-machine were first found in that of Mr. Howe; and the machines of later date are, in fact, but modifications of it."
At this time, he had abandoned his work as a journeyman mechanic, and had removed to his father's house. Mr. Howe, Sen., had established in Cambridge a machine-shop for the cutting of strips of palm-leaf used in the manufacture of hats. Elias and his family lived under his father's roof, and in the garret of the house the half-sick inventor put up a lathe, where he did a little work on his own account, and labored on his sewing-machine. He was miserably poor, and could scarcely earn enough to provide food for his family; and, to make matters worse, his father, who was disposed to help him, lost his shop and its contents by fire. Poor Elias was in a most deplorable condition. He had his model in his head, and was fully satisfied of its excellence, but he had not the money to buy the materials needed in making a perfect machine, which would have to be constructed of steel and iron, and without which he could not hope to convince others of its value. His great invention was useless to him without the five hundred dollars which he needed in the construction of a working model.
In this dilemma, he applied to a friend, Mr. George Fisher, a coal and wood merchant of Cambridge, who was a man of some means. He explained his invention to him, and succeeded in forming a partnership with him. Fisher agreed to take Howe and his family to board with him while the latter was making the machine, to allow his garret to be used as a workshop, and to advance the five hundred dollars necessary for the purchase of tools and the construction of a model. In return for this he was to receive one-half of the patent, if Howe succeeded in patenting his machine. About the first of December, 1844, Howe and his family accordingly moved into Fisher's house, and the little workshop was set up in the garret. All that winter he worked on his model. There was little to delay him in its construction, as the conception was perfectly clear in his mind. He worked all day, and sometimes nearly all night, and in April, 1845, had his machine so far advanced that he sewed a seam with it. By the middle of May the machine was completed, and in July he sewed with it the seams of two woolen suits, one for himself and the other for Mr. Fisher. The sewing was so well done that it outlasted the cloth.
It has been stated by Professor Renwick and other scientific men that Elias Howe "carried the invention of the sewing-machine further on toward its complete and final utility than any other inventor has ever brought a first-rate invention at the first trial." Those who doubt this assertion should examine the curious machine at the corner of Broadway and Fourth Street, and their doubts will be dispelled; for they will find in it all the essentials of the best sewing-machine of to-day.
Having patented his machine, Howe endeavored to bring it into use. He was full of hope, and had no doubt that it would be adopted at once by those who were so much interested in the saving of labor. He first offered it to the tailors of Boston; but they, while admitting its usefulness, told him it would never be adopted by their trade, as it would ruin them. Considering the number of machines now used by the tailoring interest throughout the world, this assertion seems ridiculous. Other efforts were equally unsuccessful. Every one admitted and praised the ingenuity of the machine but no one would invest a dollar in it. Fisher became disgusted, and withdrew from his partnership, and Howe and his family moved back to his father's house. Thoroughly disheartened, he abandoned his machine. He then obtained a place as engineer on a railroad, and drove a locomotive until his health entirely broke down.
With the loss of his health his hopes revived, and he determined to seek in England the victory which he had failed to win here. Unable to go himself, he sent his machine by his brother Amasa, in October, 1846. Upon reaching London, Amasa sought out Mr. William Thomas, of Cheapside, and explained to him his brother's invention. He found Mr. Thomas willing to use the machine in his business, but upon terms more favorable to himself than to the inventor. He offered the sum of twelve hundred and fifty dollars for the machine which Amasa Howe had brought with him, and agreed to pay Elias fifteen dollars per week if he would enter his service, and adapt the machine to his business of umbrella and corset making. As this was his only hope of earning a livelihood, Elias accepted the offer, and, upon his brother's return to the United States, sailed for England. He remained in Mr. Thomas's employ for about eight months, and at the end of that time left him, having found him hard, exacting, and unreasonable.
Meanwhile his sick wife and three children had joined him in London, and he had found it hard to provide for them on the wages given him by Mr. Thomas; but after being thrown out of employment his condition was desperate indeed. He was in a strange country, without friends or money, and often he and his little family went whole days without food. Their sufferings were very great, but at length Howe was able (probably by assistance from home) to send his family back to his father's house. He himself remained in London, still hoping to bring his machine into use. It was in vain, however, and so, collecting what few household goods he had acquired in England, he shipped them to America, and followed them thither himself in another vessel, pawning his model and patent papers to pay his passage. When he landed in New York he had half a crown in his pocket, and there came to him on the same day a letter telling him that his wife was dying with consumption in Cambridge. He could not go to her at once, as he had no money, and was too feeble to undertake the distance on foot. He was compelled to wait several days until he could obtain the money for his fare to Cambridge, but at length succeeded in reaching that place just in time to see his wife die. In the midst of his grief he received the announcement that the vessel containing the few household goods which he had shipped from England had been lost at sea. It seemed to him that Fate was bent upon destroying him, so rapid and stunning were the blows she dealt him.
But a great success was now in store for him, and he was to rise out of his troubles to the realization of his brightest hopes. Soon after his return home he obtained profitable employment, and, better still, discovered that his machine had become famous during his absence. Facsimiles of it had been constructed by unscrupulous mechanics, who paid no attention to the patents of the^inventor, and these copies had been exhibited in many places as "wonders," and had even been adopted in many important branches of manufacture. Howe at once set to work to defend his rights. He found friends to aid him, and in August, 1850, began those famous suits which continued for four years, and were at length decided in his favor. His adversaries made a bold resistance, but the decision of Judge Sprague, in 1854, settled the matter, and triumphantly established the rights of the inventor.
In 1850, Howe removed to New York, and began in a small way to manufacture machines to order. He was in partnership with a Mr. Bliss, but for several years the business was so unimportant that upon the death of his partner, in 1855, he was enabled to buy out that gentleman's interest, and thus become the sole proprietor of his patent. Soon after this his business began to increase, and continued until his own proper profits and the royalty which the courts compelled other manufacturers to pay him for the use of his invention grew from $300 to $200,000 per annum. In 1867, when the extension of his patent expired, it is stated that he had earned a total of two millions of dollars by it. It cost him large sums to defend his rights, however, and he was very far from being as wealthy as was commonly supposed, although a very rich man.
In the Paris Exposition of 1867, he exhibited his machines, and received the gold medal of the Exposition, and the Cross of the Legion of Honor, in addition, as a compliment to him as a manufacturer and inventor.
He contributed money liberally to the aid of the Union in the late war, and enlisted as a private soldier in the Seventeenth Regiment of Connecticut Volunteers, with which command he went to the field, performing all the duties of his position until failing health compelled him to leave the service. Upon one occasion the Government was so much embarrassed that it could not pay the regiment of which he was a member. Mr. Howe promptly advanced the money, and his comrades were saved from the annoyances which would have attended the delay in paying them. He died at Brooklyn, Long Island, on the 3d of October, 1867.
Mr. Howe will always rank among the most distinguished of American inventors; not only because of the unusual degree of completeness shown in his first conception of the sewing-machine, but because of the great benefits which have sprung from it. It has revolutionized the industry of the world, opened new sources of wealth to enterprise, and lightened the labor of hundreds of thousands of working people. Many a pale-faced, hollow-eyed woman, who formerly sat sewing her life away for a mere pittance, blesses the name of Elias Howe, and there is scarcely a community in the civilized world but contains the evidence of his genius, and honors him as the benefactor of the human race. |
Quick Answer: What Are Conventional Ideas?
What is conventional source of energy?
4.1 Introduction.
Conventional energy sources such as natural gas, oil, coal, or nuclear are finite but still hold the majority of the energy market.
However, renewable energy sources like wind, fuel cells, solar, biogas/biomass, tidal, geothermal, etc.
Wind power is a clean, emissions-free power generation technology..
What are called conventional signs and symbols?
The signs and symbols use in a map are called as Conventional symbols. Conventional symbols are widely accepted signs or sign systems which signify an idea or concept. They represent different features on a map and are not drawn to scale.
What is the difference between conventional and traditional?
Conventional: refers to what is generally expected by people based on what is common, at a specific time, in a specific culture. Traditional: refers to customs and usages that have been handed down from past generations to present time. … Conventional is closer to meaning “adhering to old or accepted customs”.
What is non conventional thinking?
Non-conventional thinkers eschew tidy, neat thinking. They like messy ideas. They go looking for them. They are not taken in by common human crutches such as the desire for symmetry.
What are the conventional symbols?
A conventional symbol is a symbol that is widely accepted interpretation. The various features shown on a map are represented by conventional signs or symbols. For example, colors can be used to indicate a classification of roads.
What is non conventional business?
not established by accepted usage or general agreement; non-traditional. a nonconventional lifestyle. 2. (of weapons, warfare, etc) nuclear or chemical.
What is a conventional loan?
What is a conventional job?
Conventional people like structure and order in their lives. They like to work with data, pay attention to detail, and often have good organizational skills. … People who tend to be practical, neat, and well-organized gravitate to conventional work. Conventional work environments are structured, orderly environments.
What is conventional treatment?
(kun-VEN-shuh-nul TREET-ment) Treatment that is widely accepted and used by most healthcare professionals. It is different from alternative or complementary therapies, which are not as widely used. Examples of conventional treatment for cancer include chemotherapy, radiation therapy, and surgery.
What is the meaning of conventional?
adjective. conforming or adhering to accepted standards, as of conduct or taste: conventional behavior. pertaining to convention or general agreement; established by general consent or accepted usage; arbitrarily determined: conventional symbols. ordinary rather than different or original: conventional phraseology.
What is the example of conventional?
Conventional is defined as someone or something widely accepted, or something related to a convention. An example of conventional is a bride wearing white on her wedding day. An example of conventional is the use of pesticides when growing fruits and vegetables.
What is the opposite of conventional wisdom?
The term conventional wisdom typically refers to the common or accepted understanding of a given topic. There are no categorical antonyms for this word. However, one could loosely use terms describing concepts which run counter to conventional wisdom as antonyms, e.g., counterculture, nonconformity, etc.
What’s the meaning of conventional wisdom?
the generally accepted belief: the generally accepted belief, opinion, judgment, or prediction about a particular matter.
What does conventional thinking mean?
Conventional thinking is the usual way of thinking and doing things in your organisation and in your industry; in your family and your community; in your society and your culture. Conventional thinking tends to lead to conforming to cultural norms in behaviour and thinking.
What is an example of conventional wisdom?
For example, conventional wisdom tells us that if we’re trying to use the stovetop and it doesn’t ignite right away, to turn the igniter off and try again in a minute or two before too much gas is released that could result in a fire. You can also find conventional wisdom in all major areas of human inquiry.
How many conventional symbols are there?
Colours are used to make map symbols more clear and they are used to put map symbols into groups. There are three types of map symbols: Point Symbols= buildings, dipping tanks, trigonometrical beacons. Line Symbols= railways, roads, power lines, telephone lines.
What are the 5 map symbols?
Maps contain lots of information. Most maps will have the five following things: a Title, a Legend, a Grid, a Compass Rose to indicate direction, and a Scale. The Title tells you what is being represented on the map (i.e. Austin, Tx).
What is a conventional value?
Value attributed to a particular quantity and accepted, sometimes by convention, as having an uncertainty appropriate for a given purpose. Examples are the CODATA recommended values of fundamental physical constants. Sources: PAC, 1996, 68, 149. (
What is another word for conventional?
Some common synonyms of conventional are ceremonial, ceremonious, and formal.
What are conventional items?
2 adj A conventional method or product is one that is usually used or that has been in use for a long time.
What is mean by non conventional?
: not conventional : not conforming to convention, custom, tradition, or usual practice : unconventional nonconventional teaching methods nonconventional energy sources Ten years ago, the alternative press was hard to find but easy to define. |
Ravenna, Italy
Basilica di San Vitale, Copyright Waspa 69 at WikiCommons, Creative Commons Attribution-Share Alike 4.0 International license.
Ravenna, the northern Italian city where Dante was invited to live in 1318 and ended his days in three years later, has a long, rich history stretching back to the Roman Empire. Historians and archaeologists disagree on just which tribe settled Ravenna—Etruscans, Thessalians (from Thessaly, Greece), or Umbrians. There’s also a theory that the city’s name comes from Rasenna, or Rasna, the word Etruscans called themselves.
The Senones, a Gallic tribe, later settled in Ravenna, and laid it out very similarly to Venice, on a series of small islands in a lagoon. Initially, the Roman conquerors ignored Ravenna during their campaign in the Po River Delta, but eventually made it a Roman town in 89 BCE.
Ruins of Port of Classis, Copyright Trapezaki, Creative Commons Attribution-Share Alike 4.0 International license.
In 49 BCE, Julius Caesar gathered his troops in Ravenna before they crossed the Rubicon, and in 31 BCE, Octavian established a military harbour with defensive walls in nearby Classis. This harbour was an important part of the Roman Imperial Fleet.
Ravenna continued to go from strength to strength under Roman rule, and had a population of 50,000 by the time it became capital of the Western Roman Empire in 402. The Western Roman Empire fell in 476, and Ravenna became capital of the Ostrogothic Kingdom in 493. In the sixth century, it was chosen as the seat of the Exarch, Italy’s Byzantine governor. The Archbishop of Ravenna was second only to the Pope in Italy.
Porta Serrata gate, Copyright Ludvig14, Creative Commons Attribution-Share Alike 4.0 International license.
Apse mosaic of San Michele in Afrisco Church
Byzantine rule of Ravenna ended in 751, and gradually came under Papal authority. The city suffered a terrible loss when Pope Adrian I let Charlemagne rob Ravenna of anything he pleased, and an unknown amount of Roman mosaics, statues, columns, and other treasures were taken to Charlemagne’s court in Aachen.
In 1198, Ravenna led other cities in the Romagna region against the Holy Roman Emperor, but the Pope put down their rebellion. The noble Traversari family ruled the city from 1218–40. In 1248, Ravenna rejoined the Papal States, and later was returned to the Traversaris.
Finally, in 1275, the da Polenta family established their rule, which lasted till 1441. That year’s Treaty of Cremona annexed Ravenna to the Venetian territories.
Dante’s tomb, Copyright Congolandia.g at WikiCommons, Creative Commons Attribution-Share Alike 4.0 International license.
Vault interior of Archbishop’s Chapel, Copyright Anelhj at WikiCommons, Creative Commons Attribution-Share Alike 4.0 International license.
Venetian rule lasted till 1509, when the region was invaded during the Italian Wars. The French sacked Ravenna in 1512 during the Holy League Wars. Yet another period of Papal States rule followed, interrupted by another brief Venetian rule from 1527–29.
A huge flood severely damaged the city in May 1636. To prevent such a tragedy from recurring, authorities spend the next 300 years draining swamps and redirecting rivers.
Ravenna Art Museum, Copyright Mac9 at Italian Wikipedia
Banca di Romagna, Piazza del Popolo, Copyright Marie Thérèse Hébert & Jean Robert ThibaultCreative Commons Attribution-Share Alike 2.0 Generic license.
In 1796, the Cisalpine Republic, a French puppet state, annexed Ravenna. Predictably, it returned to the Papal States in 1814. Piedmontese troops occupied the city in 1859. Ravenna didn’t win her freedom till the unified Kingdom of Italy was created in 1861.
Miraculously, Ravenna suffered very little damage during WWII.
Arian Baptistry, Copyright Georges Jansoone, Creative Commons Attribution 2.5 Generic license.
Biblioteca Classense, Copyright Domenico Bressan at WikiCommons, Creative Commons Attribution-Share Alike 4.0 International license.
Ravenna is gut-loaded with beautiful historic buildings, including many churches and tombs from the Early Middle Ages. Eight of its churches are UNESCO World Heritage Sites. The city also has many museums, art galleries, theatres, gates, and towers, as well as two amusement parks.
Dante’s tomb was built in 1780–81 at the Basilica di San Francesco. The Supreme Poet’s bones are in a Roman sarcophagus which was embellished with a bas-relief in 1483.
Florence (Firenze) has been begging for the return of their illustrious native son’s remains since 1396, but Ravenna has continually refused to send them home. Several times, the bones have been hidden to prevent this. Dante’s empty tomb in the Basilica di Santa Croce is still patiently waiting to be occupied.
Copyright Opi1010 at WikiCommons, Creative Commons Attribution-Share Alike 4.0 International license.
Vegetation mound which protected Dante’s bones from 23 March 1944–19 December 1945, © José Luiz Bernardes Ribeiro / CC BY-SA 4.0
Florence (Firenze), Italy
My IWSG post is here.
Copyright bongo vongo, Creative Commons Attribution-Share Alike 2.0 Generic license.
Florence, called Firenze in Italian, is known as the Athens of the Middle Ages, and was the birthplace of the Renaissance. Because the Florentine dialect of Tuscan Italian was used by so many literary luminaries, it became the basis of Modern Standard Italian. The city was also the capital of the Kingdom of Italy from 1865–71.
The first Florentine settlement is believed to have been between the tenth and eighth centuries BCE. Then Etruscans moved in between the seventh and sixth centuries.
The city’s written history began in 59 BCE, upon the arrival of the Romans.
Porta San Frediano wall, Copyright Sailko
Porta Romana wall, Copyright Sailko
Firenze went from strength to strength under Roman rule. The cityscape quickly grew to include a military camp, a theatre, spas, an aqueduct, an amphitheatre, a forum, city walls, and a river port. Sadly, few of these structures have survived into the modern era. The city walls are a notable exception.
Starting in the fourth century CE, Firenze went back and forth between Ostrogothic and Byzantine hands. These two rivals were constantly fighting one another, laying siege to the city, losing power, and doing it all over again.
The Lombards took over in the sixth century, and then Charlemagne conquered Firenze in 774. Under Charlemagne’s rule, as part of the March of Tuscany, the city’s population and wealth grew exponentially.
Montalbano Castle, Copyright Joe Sapienza at WikiCommons, Creative Commons Attribution-Share Alike 3.0 Unported license.
Copyright Sailko
Around 1000, Ugo (Hugh) the Great, Margrave of Tuscany, chose Firenze as his residence. This led to the Golden Age of the Florentine School of art, a naturalistic style which reached its heights in the 14th and 15th centuries. A lot of new construction also started.
In 1115, the people revolted against the Margrave of Tuscany. In its place arose the Republic of Firenze, officially the Florentine Republic. The city-state soon grew wealthy from trade with other countries, and the population swelled yet again. Even more new churches and palaces were built.
Ospedale di Santa Maria Nuova, Firenze’s oldest hospital still in existence, Copyright Mongolo1984
Garden of Palazzo di Gino Capponi, Copyright Sailko
The city was beset by internal strife during the 12th through 14th centuries, when rival political factions the Guelphs and Ghibellines constantly, violently fought for power. Guelphs supported the Pope, and Ghibellines supported the Holy Roman Emperor. Firenze was one of the pro-Guelph cities.
After the decisive Guelph victory at the 1289 Battle of Campaldino, the Guelphs began infighting and split into White and Black factions. The Black Guelphs seized control of the city in 1301, destroying much of it in the process. Dante, a White Guelph, was tried on false charges in absentia, ordered to pay a huge fine (which he never did), and condemned to exile.
Basilica di Santa Croce, Copyright Sailko
Dante’s empty tomb in the Basilica di Santa Croce, Copyright Sailko
In the 14th century, a groundswell of artistic, literary, architectural, musical, and scientific talent in Firenze heralded the birth of the Renaissance. All the political, moral, and social upheavals which had plagued the city on and off for the last few centuries halted under this new humanistic atmosphere. People also began rediscovering and falling in love with writers, philosophers, and scientists from Classical Antiquity.
Uffizi Gallery, Copyright Chris Wee, Creative Commons Attribution 2.0 Generic license.
Firenze became the capital of the unified Kingdom of Italy in 1865. In attempts to modernise the city, many Medieval houses and the historic Piazza del Mercato Vecchio market were razed. New houses took their place, along with a more formal street plan.
The population grew to over 230,000 during the 19th century, and was over 450,000 by the 20th century.
Grand Synagogue of Firenze, Copyright CEphoto, Uwe Aranas
Synagogue interior, Copyright Sailko
The city was occupied by Germans from 1943–44, after the Italians defected to the Allied side and refused to deport their Jewish community. Eighty percent of Italian Jews survived the Shoah, due in large part to righteous Italian Gentiles hiding them and smuggling them to safe territories.
The Nazis packed the beautiful Grand Synagogue with explosives before retreating, but brave resistance fighters diffused almost all of them. Very little damage was sustained, and the building was restored after the war. There are, however, still bayonet blows on the Ark.
Casa di Dante museum (not the original house), Copyright Photo20201 at WikiCommons
Fireworks over Ponte Vecchio, Copyright Martin Falbisoner
Firenze has more tourists than locals every year from April–October, thanks to its wealth of museums, historic architecture, churches, art galleries, theatres, bridges, monuments, gates, walls, and many other treasures.
Copyright Fuzheado
Zabar’s is a specialty food store which opened in 1934 and moved to Broadway between 80th and 81st Streets in 1941. The building started life as the Calvin Apartments, four three-story structures erected in 1882, and stood out like a sore thumb among the elegant, freestanding mansions which characterized upper Broadway at the time.
In 1890, developer Christian Blinn sold it to real estate investor Julia Schwarz, and in 1892, he entered a loonybin. He filed suit against her in 1901, claiming he’d been insane and had no knowledge about the sale.
The jury couldn’t decide, so the judge ruled in favor of Ms. Schwarz.
Copyright Fuzheado
In 1919, Ms. Schwarz leased the building for $30,000 a year to the C&L Lunch Company, and commissioned architects Whinston & Whinston to remodel and combine the four buildings into one complex. A small apartment on the next lot north, built 1890, was also included.
The Tudor-style Calvin Apartments opened in 1920. In addition to being beautifully decorated both inside and out, they promised on-premise dining. They were very expensive, with two-room apartments going for $165 a month ($2,134.09 today).
In the 1920s, the average NYC rent was only $40 a month, and houses sold for $15 a square foot. Not exactly apartments intended for normal people!
Enter Louis and Lillian Zabar.
Louis Zabar was born in Ukraine in 1901 and came to the U.S. via Canada in the early 1920s, after his dad was murdered in a pogrom. Lillian Teit was probably born in 1902 or 1903, though she pretended to be younger when she immigrated from Ukraine in the mid-Twenties, fearful she’d be deported for being too old.
Lillian lived with relatives in Philadelphia, and Louis lived in Brooklyn, where he rented a stall in a farmers’ market. Later, Louis became head of a grocery’s smoked fish section. When Lillian moved to NYC, she and Louis renewed their old acquaintance from their hometown and married 2 May 1927.
They started a deli in Brooklyn, selling Lillian’s wonderful homemade foods, among them stuffed cabbage, blintzes, coleslaw, and potato salad. When the couple moved to Manhattan, they set up shop in the third building north from 80th St. in the old Calvin Apartments. By that time, the complex had become a hotel.
By the time of his death in 1950, Louis owned ten Manhattan markets.
Oldest son Saul (born 1929), a med student at the University of Kansas, came home to help the family business. He thought he’d only be there for a few years, but it turned into the rest of his life. Saul became the store’s president, and middle brother Stanley became vice-president after graduating the University of Pennsylvania.
Youngest brother Eli operates his own food businesses.
In 1953, entrepreneur Murray Klein (1923–2007) joined Zabar’s and began transforming it from a small deli to one of the city’s most renowned specialty markets. He started as a floor sweeper and stock clerk, and quit several times, but eventually became a full partner in 1960.
In the 1970s, there were plans to buy a building on the west side of Broadway between 82nd and 83rd Streets, but hashgacha pratit (Divine Providence) enabled them to buy the entire former Calvin Apartments instead and expand that way. They also gained the rooms upstairs, which were once the Cedar Hotel.
Copyright Nate Steiner
Mr. Klein knew the store’s core clientele and most loyal customers were Ashkenazic Jews who went there for things like lox, pastrami, bagels, and babka, but he also knew good businesses need to draw more than one demographic.
To gain the patronage of a wider patronage seeking sophisticated food, he offered things like brie, caviar, white truffles, and gourmet chocolate. He also began selling household wares. Even more unusually, he sold at below-market prices and at a loss, even for luxury foods.
Copyright Rob Young
Zabar’s hasn’t yet featured in my books, but I look forward to including it.
More information:
Yonah Schimmel’s Knish Bakery
Yonah Schimmel’s Knish Bakery is a culinary staple of the Lower East Side. Like many other proletarian businesspeople of the era, Romanian immigrant Rabbi Yonah Schimmel used a pushcart to hawk his wares (made by his wife) when he started in 1890. He originally worked on Coney Island.
Locals loved his offerings, so much so Rabbi Schimmel and his cousin Joseph Berger were soon able to rent a little store on Houston St. (It’s pronounced HOUSE-ton, not like the Texas city.) Rabbi Schimmel left to teach Hebrew two years later, but Mr. Berger kept the bakery’s name the same.
Copyright Nbarth
In 1910, the bakery moved to the south side of Houston, between First and Second Avenues. By this time, Mr. Berger’s wife Rose (also Rabbi Schimmel’s daughter; no comment!) co-ran the business. Back then, the bakery was on the ground level of a five-story tenement.
There were soon so many knisheries on the Lower East Side, a price war erupted in 1916. This was such a serious matter, state investigator William Groat held hearings regarding a knish cartel in 1928. One of the traditional knish fillings is kasha, buckwheat groats, so his surname was quite appropriate!
Copyright Urbankayaker
According to Milton Glaser and Jerome Snyder’s 1968 “Underground Eats” column in New York Magazine, “No New York politician in the last fifty years has been elected to public office without having at least one photograph taken showing him on the Lower East Side with a knish in his face.” To this day, that declaration is taped above a counter.
Just to give a few examples, Theodore Roosevelt came for kasha knishes when he was the city’s police commissioner, and Eleanor Roosevelt made many campaign stops at Schimmel’s on her husband’s behalf.
In addition to offering delicious knishes, Schimmel’s has also been the subject of several artworks. Jewish–Irish artist Harry Kernoff painted it in 1939, and the Museum of the City of New York has a 1976 oil painting by Hedy Pagremanski on permanent display.
Over the last 110 years, the menu has largely remained the same, and the recipe is unchanged, though prices have naturally risen. Knishes aren’t the only thing on the menu either. Schimmel’s also offers matzah ball soup, kugel, latkes, bagels, borshcht, and egg creams.
Traditional knish fillings are kasha, onion and mashed potatoes, and cheese. Though they’re still the most popular, modern diners can also choose from jalapeño, blueberry, apple, chocolate, cabbage, broccoli, spinach, sweet potato, cherry, and mushroom.
Copyright Eric Hunt
Schimmel’s is still a family business, now run by Alex Wolfson and his daughter Ellen Anistratov. On his second day in America in 1979, Mr. Wolfson (Rabbi Schimmel’s great-nephew) began working as a busboy.
My characters Igor Konev and Violetta Likachëva go to Schimmel’s on some of their dates. It’s casual without being a hole in the wall, and conveniently located. Violetta lives in Greenwich Village, and Igor lives in the northern part of the Lower East Side (the area which later seceded and rebranded itself the so-called East Village).
More information:
St. Francis Xavier Church and Xavier High School
In the summer of 1847, English-born Jesuit priest John Larkin was dispatched to create a church and school in New York City. He initially worked in Fordham, the Bronx, but Archbishop John Hughes thought he had what it took to survive that “rough, extraordinary city.”
It took an entire day to travel to downtown Manhattan, and Father Larkin only had fifty cents ($15.77 today).
The next day, Mass was offered for the success of this mission. In attendance was a newly-immigrated French muralist who wanted to thank God for his family’s safe journey. After Mass, he told Father Larkin he’d heard U.S. banks weren’t reliable, and asked how to keep his money safe.
This was no small sum of money, but $5,000 ($157,730.49 today).
Copyright Kwok-Chi Ng
Divine Providence continued shining for Father Larkin. A Protestant church between Bowery and Elizabeth Streets had just gone on sale for $18,000 ($567,829.76 today) after a big schism, and asked $5,000 as a down payment.
Father Larkin promised the good Frenchman security for his money in return for a mortgage on that church, and the church was dedicated in October. Sadly, it burnt to the ground in January, and Father Larkin was asked to return to Fordham.
Despite this tragedy, the congregation rallied behind him to rebuild their church. A surprising source of spiritual fortitude also came from a seemingly chance encounter in The Bowery.
Copyright Scry Photo
Shortly after the fire, a woman selling apples approached him and said, “Well, Father Larkin, so your church is burnt; the Lord be praised!”
Not quite sure what he was hearing, he said, “‘The Lord be praised!’ Are you then glad of it?”
“Oh, God forbid! But then we must give God glory for everything.”
Father Larkin realized she was right, as painful as this situation was, and resolved to take this lesson to heart. The apple seller then lamented being unable to donate any money, since she was a poor widow with five kids, but insisted he take her two finest apples.
And from that moment on, the congregation endeavoured to give God glory for everything, good things as well as bad.
Copyright Beyond My Ken
Father Larkin refused to abandon his congregation, and held Mass in borrowed spaces till 1851, when a new church, designed by William Rodrigue, opened on West 16th St., next to the old church. During this time, Father Larkin declined an offer to become Bishop of Toronto.
Tragedy struck again on 8 March 1877. During a women’s mission, a fire erupted in the packed sanctuary, and panic broke out. Six women and one child died, and the church was gutted.
This happened in part because the church had become too small to comfortably accommodate the entire congregation, since so many people from Catholic countries were immigrating in that era. A new building was needed anyway.
Copyright Steven Bornholtz
In May 1878, the cornerstone for a new church was laid immediately to the west, with 5,000 in attendance. Famous architect Patrick Charles Keely designed it in Roman Basilica style, with a bluish-grey Neo-Baroque façade and gabled portico. His frequent collaborators the Morgan Brothers designed the stained-glass windows in Pre-Raphaelite style.
William Lamprecht, the country’s leading ecclesiastical painter of the era, made almost 50 murals. The beautiful marble, in a rainbow of colors, came from Italy; the onyx came from Mexico; Massachusetts provided granite; and New Hampshire gave the cornices and columns.
This new building could hold 2,000. The total cost was $600,000 ($15,216,352.94 today).
Archbishop Michael Corrigan dedicated the completed church on 3 December 1882.
Copyright Americasroof at English Wikipedia
Every Catholic church has a school, and St. Francis Xavier Church has Xavier High School, also founded by Father Larkin. When he founded what was originally called the College of St. Francis Xavier, he only had five cents left ($1.58 today).
At the time, Father Larkin was also a professor at St. John’s College in Rosehill Manor, now Fordham University in the Bronx. His two schools played the first collegiate baseball game in 1859. Fordham won 33-11.
In 1861, after Father Larkin’s death, the high school was chartered by the state.
Copyright Ajay Suresh
The National Guard began military training at Xavier High School in 1886, and membership became mandatory in 1892. In 1897, collegiate and secondary studies were separated into different departments. The former closed in 1912.
In 1935, the student regiment became Junior ROTC, and the school was declared a military institute in 1968. Not till 1971 did participation in ROTC become optional.
I’ve not used either school nor church in my writing to date, but now I’m quite eager to make St. Francis Xavier the church of my Novak family when they move to New York in 1952.
More information: |
Maybe this is just not included in my course, but I still wonder how to calculate the binding energy of an electron .at a certain electron orbital.
Intuitively,The ionization energy of an element should vary depending on which orbital the valence electron is in.
PS: I only know how to calculate ionization energy using principle level.
• $\begingroup$ I think we'd need to know what course you're taking. This can be determined from quantum mechanics, but in general the numbers are tabulated because the equations get extremely complicated. $\endgroup$ – Geoff Hutchison Nov 23 '14 at 1:20
• $\begingroup$ High school general Chem $\endgroup$ – most venerable sir Nov 23 '14 at 1:21
You are correct that the ionization energy of an electron depends on the orbital. There is no easy formula, because the electrons in atoms are governed by quantum mechanics and for multi-electron atoms, the equations are un-solvable algebraically.
That said, there are some reasonable tabulations, which have been verified by calculations and by spectroscopy, e.g., http://www.colby.edu/chemistry/PChem/notes/AOIE.pdf (from a quick Google search).
Both ultraviolet photoelectron spectroscopy and x-ray photoelectron spectroscopy can be used to eject electrons from various materials, and you can thus identify elemental composition (and other properties) from the known orbital energy levels
• $\begingroup$ What is name of the name of the equation and why proposed it? $\endgroup$ – most venerable sir Nov 23 '14 at 1:28
• 2
$\begingroup$ If you'd like to read more about quantum mechanics you would want to read about the Schrödinger model of the hydrogen atom. But it helps to have some familiarity with differential equations first. $\endgroup$ – Geoff Hutchison Nov 23 '14 at 1:30
I just stumbled across this question ... a little late....
A common approximation in XPS to solve this question is Koopmans theorem (frozen-orbital approximation). If the remaining (those were not photo-electron was removed) orbitals of the exited atom after photo-ionisation do not change between the initial and final state (no relaxation) the experimental binding energies are than taken to be equal to the respective negative Hartree-Fock/KS orbital energy. A good way to start reading is this Book: Book See also: Link Link2
Your Answer
|
Best answer: Why you shouldn’t give your child melatonin?
Another concern about using melatonin for children is that its effects on the body go beyond sleep. It also plays a role in the way a person’s body matures sexually. Melatonin levels have an impact on how the ovaries and testes function.
Is it bad to give your child melatonin?
The Bottom Line
Most short-term studies show that melatonin is safe with little to no side effects and may help kids fall asleep faster and sleep longer. However, its long-term use is not well studied in children. For this reason, it’s not advised to give your child melatonin unless instructed by your doctor.
Can kids take melatonin every night?
Both the American Academy of Pediatrics and the National Institutes of Health say that children should not take melatonin long-term, but neither organization defines what long-term means. Some children naturally fall asleep later than parents might like, but that doesn’t mean they need melatonin.18 мая 2020 г.
Can melatonin cause bad behavior?
Study researchers concluded that melatonin increased levels of reactive aggression (aggression in response to provocation) and that “the adverse effect of melatonin on human social functions is worth noting given the wide use of melatonin in clinical practice.” The study was published in the October 2017 issue of …
ЭТО ИНТЕРЕСНО: Why do so many babies need helmets now?
What are the negative effects of melatonin?
How much melatonin can a 10 year old take?
Many children will respond to a low dose (0.5 mg or 1 mg) when taken 30 to 90 minutes before bedtime. Most children who do benefit from melatonin―even those with ADHD―don’t need more than 3 to 6 mg of melatonin.
Will 5mg of melatonin hurt my child?
Most children who benefit from melatonin – even those with diagnoses of ADHD or Autism Spectrum Disorders – don’t need more than 3 to 6 mg of melatonin. Some children benefit from as little as 0.5 mg before bedtime. Younger children tend to be given 1 to 3 mg and older children/teens a little more.
Can 2 year olds take melatonin?
In general, melatonin should not be given to healthy, typically developing children under age 3, as difficulties falling and staying asleep in these children are almost always behavioral in nature.20 мая 2019 г.
Can melatonin calm a child down?
Research suggests that melatonin supplements help some autistic children fall asleep faster. Research also suggests that ‘prolonged-release’ melatonin can help children sleep for longer and/or wake up fewer times in the night. Melatonin might help improve daytime behaviour in some autistic children.
Why is melatonin banned in the UK?
ЭТО ИНТЕРЕСНО: Your question: Can breastfeeding cause vitamin b12 deficiency?
Can melatonin cause psychosis?
Does melatonin cause weight gain?
Is it bad to take melatonin every night?
What food has the most melatonin?
Is 10 mg of melatonin too much?
Doses between 1 and 5 milligrams (mg) may cause seizures or other complications for young children. In adults, the standard dose used in studies ranges between 1 and 10 mg, although there isn’t currently a definitive “best” dosage. It’s believed doses in the 30-mg range may be harmful.
ЭТО ИНТЕРЕСНО: How long do babies stay under Bili Lights?
My baby |
In the last lesson we learned about relational operators and how they can be applied in if statements. In this lesson, we are going to go over increment and decrement operators and how they can be used in our code. First, let’s go over the increment operator.
The increment operator is basically nothing more than a way to add 1 to a variable of our choosing. The typical use of it is directly after an int variable’s name. Let’s look at the example below.
In the example above, we can see that the if statement will execute because the boolean isMarried is true. Then, looking at the if statement, we see that the numInHousehold has the increment operator attached at the end. Therefore, we know that the increment operator inside of our if statement will be executed and Java will print out 2. Now that we have an idea of how increment operators work, let’s go over decrement operators.
As you can probably guess, decrement operators do the opposite of increment operators. Instead of adding to a variable, they subtract by 1. Look at the example below.
In our example, we can see that the if statement will execute. This is because the relational operator “not equal” is in the conditional statement. Consequently, when the code inside of our if statement executes, the java will print out our numOfSnickers as 0.
Both of these coding examples we have gone over are referred to as postfix. Postfix means that the code executes and then the variable is incremented or decremented by 1.
However, if we wanted to use it as a prefix (before the code is executed), we would simply place the increment sign ++, or decrement sign -- before the variable name instead of after.
For example, the prefix versions of the examples above would be ++numOfHousehold and --numOfSnickers. Let’s look at the example below for a better understanding of how prefixes work.
Although it seems a little confusing at first, let’s look at what Java prints.
Instead of printing out i = 10, it instead tells us that i = 11. That is because we used the prefix increment operator that skipped ahead and incremented int i. Afterwards, it then went and multiplied our i value by 2 and printed the results.
It seem like a lot to remember, but just remember that the operator ++ adds by 1, and the operator -- subtracts by 1.
Also, remember that that prefix increment operators execute before the rest of the code, and that postfix increment operators execute after our other code.
GitHub link. |
Adventure to the New World
Within the various uses of the word today, “nature” often refers to geology and wildlife. Nature can refer to the general realm of living plants and animals, and in some cases to the processes associated with inanimate objects – the way that particular types of things exist and change of their own accord, such as the weather and geology of the Earth.
This more traditional concept of natural things which can still be found today implies a distinction between the natural and the artificial, with the artificial being understood as that which has been brought into being by a human consciousness or a human mind. Depending on the particular context, the term “natural” might also be distinguished from the unnatural or the supernatural.
The interior remains active, with a thick layer of plastic mantle and an iron-filled core that generates a magnetic field. This iron core is composed of a solid inner phase, and a fluid outer phase. It is the rotation of the outer, fluid iron core that generates an electric current through dynamo action, which in turn generates a strong magnetic field.
Source: Wikipedia
Leave a Reply
|
Detailed explanation of building nginx website server based on centos7 (including configuration of virtual web host)
1、 Nginx service foundation
Nginx (engine x) is specially developed for performance optimization. It is characterized by less memory, stability, low system resource consumption, and high processing capacity for concurrent connections (a single physical server can support 5000 concurrent requests). In fact, nginx’s concurrent capability really performs well in the same type of web server. Chinese mainland users use Baidu website: Baidu, Jingdong, Sina, NetEase, Tencent, Taobao, etc. IMAP / POP3 / SMTP service is also provided.
Advantages of nginx:
***Can be highly concurrent connection**
According to the official test, nginx can support 50000 concurrent connections. In the actual production environment, nginx can support 20000-40000 concurrent connections.
***Low memory consumption**
Nginx + PHP (fastcgi) server, under 30000 concurrent connections, starts 10 nginx processes, consumes 150MB of memory, 15MB * 10 = 150MB, opens 64 php-cgi processes, consumes 1280 memory, 20MB * 64 = 1280mb, plus the memory consumed by the system itself, consumes less than 2GB of memory.
***Low cost**
The purchase of f5big-ip, NetScaler and other hardware load balancing switches costs more than 100000 yuan to several hundred thousand yuan. Nginx is open source software, which uses 2-clause BSD like protocol, and can be used for free trial and commercial purposes.
***The configuration file is very simple**
The network is as easy to understand as the program, even the non dedicated system administrator can understand it.
***Support rewrite**
HTTP requests can be divided into different back-end server groups according to different domain names and URLs.
***Built in health check function**
If a web server at the back end of nginxproxy goes down, the access to the front end will not be affected.
***Save bandwidth**
Gzip compression is supported, and the header of browser local cache can be added.
***High stability**
For reverse proxy, the probability of downtime is very small.
** * support hot deployment**
Nginx supports hot deployment. Its automation is particularly easy, and it can run continuously for almost 7 days * 24 hours. Even if it runs for several months, it does not need to be restarted, and it can also upgrade the software version without interruption of service.
The following figure shows the performance comparison of nginx, Apache and lighttpd
So much has been said in order to highlight the powerful performance of nginx. How to build nginx website server (including the configuration of virtual web host) based on CentOS 7? Let’s continue to explain the configuration of nginx and its application in virtual machine
2、 Preparation:
1. One CentOS 7 server;
2. One CentOS 7 system disk;
3. Software packages and links needed
4. It can also be downloaded from the official website download
3、 Start to build the nginx website (mount the system disk and install the required dependency package.) :
1. All the dependent packages required for installation are provided by the system disk
2. Compiling, installing and optimizing nginx
[ [email protected] Media] # useradd - M - S / SBIN / nologin nginx # create system users
[ [email protected] media]# tar zxf nginx-1.12.0. tar.gz -C / usr / SRC # unpacking
[[email protected] media]# cd /usr/src/nginx-1.12.0/
[[email protected] nginx-1.12.0]# ./configure --prefix=/usr/local/nginx
--user=nginx --group=nginx --with-http_stub_status_module
&& make && make install
#Compile and install nginx
[[email protected] ~]# ln -s /usr/local/nginx/sbin/nginx /usr/local/sbin/
#Create link file of main program
In order to make the start, stop and overload of nginx service more convenient, you can edit the nginx service script. The script is compiled as follows:
[ [email protected] ~]#VIM / etc / init.d/nginx # edit service script
# chkconfig: - 99 20
case "$1" in
kill -s QUIT $(cat $PIDF)
$0 stop
$0 start
kill -s HUP $(cat $PIDF)
echo "USAGE:$0 {start | stop | restart | reload}"
exit 1
exit 0
[ [email protected] ~]#Chmod + X / etc / init.d/nginx # add execution permission
[ [email protected] ~]#Chkconfig -- add nginx # add as system service
[ [email protected] ~]#Systemctl start nginx # start nginx service to confirm the normal operation of the script
[ [email protected] ~]# vim /usr/local/nginx/conf/ nginx.conf #Adjusting configuration files to optimize web services
worker_ Processes 2; # number of work processes
#error_ log logs/ error.log ; # error log file location
#error_log logs/error.log notice;
#error_log logs/error.log info;
#pid logs/ The location of the PID file
events {
Use epoll; # add this row to even {} to improve performance
worker_ Connections 4096; each process handles 4096 connections
The above optimizations are implemented based on the global configuration, and the meaning of each optimization is as follows:
• worker_ Processes: indicates the number of work processes. If the server has multiple CPUs or uses multi-core processors, the number of work processes can be specified by referring to the total number of CPU cores. The specific meaning lies in worker_ It is reflected in the connections configuration item,
• worker_ Connections: this configuration item specifies the connections processed by each process, which are generally less than 10000 (default is 1024). It is associated with the configuration item of the number of working processes above. For example, if the number of working processes is 8 and each process processes 4096 connections, the number of connections that nginx is allowed to normally provide services has exceeded 30000 (4096 * 8 = 32768). Of course, it depends on the performance of server hardware, network bandwidth and other physical conditions.
3. Build a virtual web host based on domain name
1. HTTP configuration:
The configuration file of nginx uses the “http {}” delimitation mark to set the HTTP server, including access log, HTTP port, web directory, default character set, connection maintenance, virtual web host, PHP parsing and other website global settings, most of which are included in the sub delimitation mark “server {}”. “Server {}” represents a specific website setting.
http {
include mime.types;
default_type application/octet-stream;
'$status $body_bytes_sent "$http_referer" '
'"$http_user_agent" "$http_x_forwarded_for"';
#Remove the "#" sign at the beginning of the three lines above
access_ log logs/ access.log Main; # access log location
Sendfile on; enable efficient file transfer mode
#tcp_nopush on;
#keepalive_timeout 0;
keepalive_ Timeout 65; # connection holding timeout
#gzip on;
server {
Listen 80;? Web server listening port, which can be in the form of "IP address: Port"
server_ name; #Website domain name
Charset UTF-8; # the default character set of the website, and the "#" sign in front of it must be removed
access_ log logs/test1. access.log Main; # access log file name
Location / status {# add location / status to enable status statistics. The access location is / status
stub_ Status on; # turn on the status statistics function
access_ Log off; # turn off logging at this location
location / {
Root / var / www / test1; # website root directory
index index.html index.php Change the default home page to index.php To support PHP web pages
error_ Page 500 502 503 504 / 50x. HTML; # internal error feedback page
Location = / 50x. HTML {# wrong page configuration
root html;
The above configuration only builds a website service. If you want to run more than one website service, you can copy the template provided at the end of the configuration file and paste it onto the “server {}” configuration. Because there are too many “{}” in the configuration file, you need to copy it onto the original “server {}” to avoid errors, as follows:
server {
listen 80;
charset utf-8;
access_log logs/test2.access.log main;
location /status {
stub_status on;
access_log off;
location / {
root /var/www/test2;
index index.html index.php;
server {
listen 80;
So far, the virtual host construction has been completed, and the service needs to be restarted to verify the normal operation of the web server (DNS needs to be set by itself)
4、 Access status statistics virtual host application
[ [email protected] ~]#Nginx - t # use this command to check the configuration file before restarting the service,
#If there is an error in the configuration file, the error line will be prompted,
#If yes, OK will be displayed. If there is an error, no error will be reported when restarting the service, but the configuration file will not take effect.
nginx: [emerg] unexpected ";" in /usr/local/nginx/conf/nginx.conf:44
#There is an error on line 44
nginx: configuration file /usr/local/nginx/conf/nginx.conf test failed
[ [email protected] ~]#Nginx - t # the following display is OK, indicating no problem.
#Next, prepare the website directory and test files, establish the root directory for the two virtual web hosts, and prepare the test home page to facilitate the distinction during the test
[[email protected] named]# mkdir -p /var/www/test1
[[email protected] named]# mkdir -p /var/www/test2
[[email protected] named]# echo "" > /var/www/test1/index.html
[[email protected] named]# echo "" > /var/www/test2/index.html
Client verification:
① Visit Home page of
② Visit Status statistics page of:
The above meanings are as follows:
Active connections indicates that the current number of active connections is 2;
Server accepts handled requests represents the processed connection information, three numbers represent the number of processed connections, three successful handshakes and six processed requests.
① Visit Home page of
② Visit Status statistics page of:
Access status statistics and application of virtual host
The above is the whole content of this article, I hope to help you learn, and I hope you can support developer more.
Recommended Today
Large scale distributed storage system: Principle Analysis and architecture practice.pdf
Focus on “Java back end technology stack” Reply to “interview” for full interview information Distributed storage system, which stores data in multiple independent devices. Traditional network storage system uses centralized storage server to store all data. Storage server becomes the bottleneck of system performance and the focus of reliability and security, which can not meet […] |
26 January – Peanut Brittle Day
Peanut Brittle Day - Elizabeth Place
It’s Peanut Brittle Day! Brittle was one of the first types of sweets ever made. Many ancient cultures that had access to molasses, honey, or sugar, produced some form of it.
The first peanut brittle recipe appeared in an American cookbook, but the exact origin of the confection is uncertain. According to one account, peanut brittle was a Celtic dessert. The Celts covered peanuts in sugar and baked them, and this eventually evolved into a caramel bark.
Peanut brittle can be a little tricky to make. Most recipes call for a candy thermometer to allow the baker to regulate the exact temperature, and the results can be affected by weather! If brittle is made on a humid day it will not hold its shape.
To celebrate Peanut Brittle Day, try making your own brittle or pick some up at your favourite sweet shop!
(Source: punchbowl.com) |
Begin typing your search above and press return to search.
Who can save Congress from redundancy?
Iran and the revival of JCPOA
A model mosque in Gujarat
Towards a digital emergency?
The slaughter of democracy in Puducherry
Populist Fascism
Homechevron_rightTechnologychevron_rightMachine turns sweat...
Machine turns sweat into drinking water in Sweden
Machine turns sweat into drinking water in Sweden
London: Drinking another person's sweat may sound obnoxious, but a machine that takes sweat-laden clothes and turns the moisture into drinking water has been launched in Sweden.
The device spins and heats the material to remove the sweat and then passes the vapour through a special membrane designed to only let water molecules get through, BBC reported.
Since its launch, its creators said more than 1,000 people have "drunk other's sweat" in Gothenburg city. The experts said the liquid was "cleaner" than local tap water.
The device was built for the Unicef to promote a campaign highlighting the fact that 780 million people in the world lack access to clean water.
The machine was designed and built by engineer Andreas Hammar, known locally for his appearances on TV tech show "Mekatronik".
Hammar said the critical part of the sweat machine was a water purification component developed by the HVR company in collaboration with Sweden's Royal Institute of Technology.
"It uses a technique called membrane distillation," he told BBC.
"We use a substance that only lets steam through but keeps bacteria, salts, clothing fibres and other substances out."
"They have something similar on the International Space Station to treat astronaut's urine - but our machine was cheaper to build.
"The amount of water it produces depends on how sweaty the person is - but one person's T-shirt typically produces 10 ml, roughly a mouthful," he said.
Mattias Ronge, chief executive of Stockholm-based advertising agency Deportivo - which organised the event - told BBC the machine helped raise awareness for Unicef, but in reality had its limitations.
He said the machine "will never be mass produced... there are better solutions out there such as water purifying pills".
Show Full Article
Next Story |
how many atoms are in a drop of water
The Mole
Amedeo Avogadro (1776– 1856), an Italian researcher, provided simply such a number. He is accountable for the counting unit of measure called the mole. A mole is the amount of a material that contains 6.02 × depictive fragments of that compound. Just like the dozen and the gross, it is a name that stands for a number. There are for that reason 6.02 × water particles in a mole of water molecules. There additionally would certainly be 6.02 × bananas in a mole of bananas, if such a huge variety of bananas ever existed.
There are 5.01 x 1021or regarding 5 sextillion atoms in a decline of water. Or, there are about 5 sextillion atoms in a drop of water. Rephrase, there are1.67 sextillion water molecules in a water decline.
how many atoms are in a drop of water
But water molecules are extremely small; every one is just about 0.3 nanometers broad. These are strange numbers– we have no real experience of them so it’s tough to obtain much sense of scale. Because water has a chemical formula of #H _ 2O #, there will certainly be # 2 # moles of hydrogen in every mole of water. Use each element’s molar mass to convert the grams of each aspect to moles. If you look at a typical container of copper sulfate, it will be a bluish-green. If someone tells you that copper sulfate is white, you won’t believe them. You are both right; it simply depends upon the copper sulfate.
There are many particles and atoms in a decrease of water. Have you ever asked yourself the number of particles or atoms are in a drop of water? The molar mass of any kind of substance is the mass in grams of one mole of that compound. One mole of carbon dioxide particles has a mass of 44.01 g, while one mole of sodium sulfide formula systems has a mass of 78.04 g. The molar masses are 44.01 g/mol and also 78.04 g/mol specifically. In both cases, that is the mass of 6.02 × representative bits.
The depictive fragment for these aspects is the particle. Also, all molecular compounds such as H 2 O and Carbon Monoxide 2 exist as particles therefore the particle is their depictive particle. For ionic compounds such as NaCl as well as Ca 2, the representative particle is the formula system. A mole of any material consists of Avogadro’s number (6.02 ×) of depictive bits. |
The Legacy of Slavery in Canada
Excerpt from August 10, 2020 post
The 1783 Act to Limit Slavery was the first legislation to limit slavery in the British Colonies and celebrated by abolitionists in Upper Canada. British abolitionists had been engaged in protests against transatlantic trade in African people since the 1770’s. In 1833, Britain passed the Slavery Abolition Act in Parliament which was targeting slavery in tropical countries. Slavery was abolished in most British colonies, freeing more than 800,000 enslaved Africans in the Caribbean and South Africa, as well as a small number in Lower Canada. By 1934, Canada became a destination for black people trying to escape slavery in the United States via The Underground Railway. As a Canadian, this has been a point of pride.
Slavery has been present since ancient times and has been sustained in one form or another throughout history. The British, French, Spanish, Portuguese, Dutch and Belgian empires-built empires based primarily on plantation agriculture using people abducted from Africa. Slavery in the plantation economies of the United States, Brazil and Cuba came later and flourished under slavery. Today slavery continues with human trafficking and in sweat shops. Clearly there is no one country or civilization that has moral high ground. Slavery in one form or another has plagued us all. The point here is not that we all need to feel guilty. It is to understand that through-out history, people have been making judgements that some people are less than. Who decides? For what purpose?
David Livingstone (1813-1873) in his explorations / mapping of central Africa documented in his journals and spoke in Britain of the cruelty of the slave trade in destroying African lives but also the devastating impact on the British character:
“No one can understand the effect of the unutterable meanness of the slave-system on the minds of those who, but for the strange obliquity which prevents them from feeling the degradation of not being gentlemen enough to pay for services rendered, would be equal in virtue to ourselves. Fraud becomes as natural to them as ‘paying one’s way’ is to the rest of mankind.”
He points out that slavery has a double-edged sword. It is devasting to the life of the person being enslaved. It also has a devastating impact on the character of the person involved in the enslavement. I would propose that racism also has a double-edged sword. It hurts the recipient of racism. It also damages the character of the racist. A world based on equity and respect is the only avenue forward.
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
Mayan Facts
The Mayans and the Maya Empire are widely discussed, but little known is about them. Many people may wonder exactly where the Mayans existed in the world even.
In general, the Mayans lived and occupied the lowlands of present day Guatemala and Mexico that expanded in the direction of the Yucatan Peninsula, Belize and parts of Honduras and El Salvador.
Let’s learn more about the incredible world of the Mayans below. The Maya people have helped develop early views and research on astronomy, calendar types, and even hieroglyphic writing. This list of facts and nuggets of information will really surprise most anyone.
Mayans thought human sacrifice was an important and accepted part of life
Human sacrifice
Before the 1700s, human sacrifice in Mayan culture was accepted and regularly practiced in the Maya territories. For example, the ritual sacrifice offering or nourishment to the gods was performed by priests. Human and animal sacrifice had been more common in pre-modern societies with the intent to appease the gods in other worlds.
All in all, the Mayans viewed blood as a powerful source of nourishment for the Maya gods, and the sacrifice of a living creature or human being was a symbolic and symbolic blood offering. IN terms of duration, Human sacrifice was practiced by the Mayans in the Classic period around 250 AD until the Spanish conquest in the 17th century.
back to menu ↑
Mayans played a game of life and death that was known as the Mesoamerican ball game
Mesoamerican ball game
Games that were played by the Mayans were serious and meant life and death. The competitive level of sports meant you may lose your life. The Mesoamerican ball game has origins from around 1800 BC.
Competitors who lost may have been sacrificed if it was for a ritualistic event or game. Images of art in Chichen Itza depict beaten up competitors or even some who are shown decapitated.
The rules of the game were similar to racquetball, where the goal was to keep the ball in play. The biggest issue was that there would be an addition of mixing competition with human sacrifice for religious reasons. The ritualistic features of this ballgame are what made this game deadly.
back to menu ↑
Healers in the Mayan world were called Shamans and were powerful
DThe idea of a healer let alone a shaman is very powerful. And the Mayans had healers that were special and had a special quality. A Shaman today and in the past is a keeper of sacred knowledge. The Shaman would use dreams, trances, and even try to contact spirits to bring about change and cures.
Shamans in the Mayan world would use plants for medicinal purposes and even do cures and healing. The method of healing and curing was natural and in a way supernatural. Many would claim that this practice of herbal cures existed to save people and villages.
In general, the Mayans had this view that the Shamans were divine and above everyone else of course. The idea of a Shaman today is less believable but the Mayans saw life and healing differently.
back to menu ↑
Mayans enjoyed getting out of their mind and hallucinogenic drugs
Getting out of their mind
It may not be well known, but the Mayans enjoyed altered states of consciousness.This meant that Mayans loved to get “high” and take and consume drugs that would give them hallucinations.
The reason why the Mayans did this was to prepare and be involved in rituals as well as participate in ceremonies.
One particular trance for Mayans involved having to lick the backside of cane toads to get into an altered state. Ritual included psychoactive substances that included and were similar to Aztec used peyote. All in all, the Mayans had a lot of ways to escape reality and be adventurous.
back to menu ↑
Mayans loved and used saunas like other places around the world
Finland or Russia may be places with saunas but add as well the Mayan people. In general, Mayans were fond of similar things to what people may know Finland for as well. The baths for the Mayans were viewed as an element of purification and cleansing. All in all, these things were seen as a vital thing for priests and rulers to enjoy and feel transformation.
In the Mayan world, the saunas played a major part in society. For example, new mothers who recently gave birth would seek a way to stay strong and revitalized, so saunas were key. Also, people who were ill visited saunas for improvement and well being.
In summary, it was the Mayan rulers or kings who enjoyed the saunas or baths most and regularly. The sauna is usually not associated with Mayans but has much more importance than many realize.
back to menu ↑
The Mayans believed chocolate was otherworldly and powerful
Around 300 AD, the Ancient Maya were given credit for discovering the divine in cacao i.e. chocolate. Cacao, i.e. chocolate, was included in many significant events within the religion, social, and economic of the Mayans. The simple reason was that chocolate was viewed in the same light as gold today.
Mayans thought that chocolate, cacao, was from the gods of the Mayan world, so they would baptize babies and celebrate major occasions with cacao water. Lastly, The Mayans would drink something called Xocoatl, which is a thick, frothy mix of cacao, seeds, chili, cinnamon, water and more.
back to menu ↑
Mayans would change their appearance in ways that was unique for the time
Change their appearance
Mayans would change or enhance their facial features to bring out or have a special type of beauty. In a way, the Mayans were one of the first to do plastic surgery. The Mayans believed they could use and make their idea of beauty by using their own bodies as a piece of art for everyone to see.
For example, the Mayans would flatten their foreheads or sharpen their teeth to make them pointier and sharper. The reason the Mayans did this was to appease the Mayan gods. So, they would go through various transformations where the body was the central vehicle to show and offer to the gods.
back to menu ↑
The largest cities in the Maya world were Tikal and Chichen Itza
Chichen Itza
Chichen Itza was one of the largest Mayan cities in the Maya world. This city is located near Mexico City. However, the biggest city or settlement was called Tikal, which was quite expansive.
The famous and iconic Mayan pyramids commonly seen are from Chichen Itza in Mexico. Tikal existed in its grandeur and biggest conception from 200 to 900 AD and had at one point a population of 100,000 to 200,000 people.
Tikal, which you can visit in Guatemala features 6 very large pyramids or temples. Today Tikal is one of the biggest archaeological sites in Mesoamerica and the world at this point.
back to menu ↑
The Mayans used a complex form of hieroglyphs for writing
The Mayans hieroglyphs
Mayans used a fairly complex form OF HIEROGLYPHS, which meant that some words were formed with combinations of up to 26 letters. Moreover, the language or writing itself featured more than 800 hieroglyphs. Each hieroglyph or picture/character represented what would be a syllable sound.
The language and structure of the Mayan writing originates more or less from the late Preclassic period. This historical period is from 300 BCE to 100 CE roughly.
If you are curious to see some of these very mysterious writings or hieroglyphs you can still see some at some sites in present day Mexico or Guatemala. You can see this form of writing still in its authentic form as you see it on buildings, variable monuments., ancient books, and even pottery and different artifacts and artwork.
back to menu ↑
Mayan pyramids and artifacts are still being discovered today
Mayan pyramids and artifacts
Still to this day, many Mayan artifacts and even pyramids are still being discovered and explored from Mexico to Honduras in Central America. Archaeologists are still discovering incredible history that can be up to 1000 years old in places like Chiapas. For example, just in 2015, there was a discovery of Mexico’s tallest pyramid that is bigger than the pyramids of the sun at Teotihuacan.
For example, the ruins of two Maya cities were hidden by overgrown vegetation and only recently discovered in Campeche of Mexico. In 2018, a massive Maya city was discovered in Guatemala’s Peten region, which included lots of relics, artifacts, and various ancient historical items.
back to menu ↑
Mayans used up to three different calendars at one time!
Mayans made use of three separate and different calendars. However, the basic structure of the Maya calendar is based on a system dating back to the 5th century BC. The Mayan Calendar is similar to other American civilizations like the Mixtec and Aztec.
The other two calendars they used were more similar to modern day time and date recording. For example, the Mayans would use the Gregorian calendar that has 365 days. But, the most spectacular and most infamous or popular calendar was the Mayan one that predicted the end of the world or a reset in 2012. The Mayan Long Count calendar, which they devised included cycles or years every 2,880,000 days!
Login/Register access is temporary disabled |
one of the best Japanese name searches for a baby!
• Gender:Unisex
• Hiragana Hiragana is a syllabary used in written Japanese,
which originated from the cursive style of Kanji.
• KatakanaKatakana is also a Japanese syllabary.
Basically, the characters don't have any meaning by themselves,
they only represent the sounds.
Japanese try to express the words came from foreign languages
with the most similar sounds in Japanese using Katakana.
Meanings by Kanji - 5 variations
For Yuasa, Kanji choices are listed below, sorted by the total number of good.
• 有麻- Yuasa -
有 means "have". 麻 means "hemp".
• 結彩- Yuasa -
結 means "tie". 彩 means "vividness, colour, color".
• 結歩子- Yuasa -
結 means "tie". 歩 means "step". 子 means "a word that comes after a woman's name, child".
• 優愛紗- Yuasa -
優 means "superiority". 愛 means "love". 紗 means "gauze".
• 優明咲- Yuasa -
優 means "superiority". 明 means "bright". 咲 means "bloom".
Share this name
Explore names by Tags
Similar names to Yuasa
Names that have the same gender and start with Y.
Japanese Names .info Recommend |
Spatterdock Nuphar advena: A Yellow Water-lily
Spatterdock, Nuphar avenda
Spatterdock, Nuphar avenda, a yellow water lily in Lake Poygan, Wisconsin
Other Name: Yellow Water-Lily, Bull-head lily, Yellow Pond-Lily
Synonym: Nuphar lutea
Family: Water-Lily, Nymphaeacea
Wetland Indicator Status: OBL
Spatterdock, (Nuphar avenda), sometimes referred to as yellow water-lily (which is actually a different species), can be differentiated between our other common species– white water-lily— when not in flower, by its heart-shaped leaves and stems more oval in cross-section. White water-lily leaves are more circular, as are their stems. All water-lily leaves have a cleft. Water lilies are some of those pretty “weeds” that most people like, or at least are more likely to tolerate. People tolerate and even love water lilies because they often hold largemouth bass, northern pike, and other gamefish. Lily pads are home to many species of insects, and later in the summer, you can see holes where they have been feeding. Water-lilies are sometimes confused with American lotus, which often emerges out of the water on its stalk, and its leaves have no cleft. Water-lilies are not related to true lilies.
Muskrats and American Beavers consume the thick rhizomes (roots) of spatterdock, which resemble tubers and look like long pineapples. Some Native American tribes ate the rhizomes, and the Iroquois hung dried up rhizomes to keep witches away. The roots and other parts of this lily were used in folk medicine to treat various ailments.
Spatterdock Flower
Closeup of a Spatterdock Flower |
Why We Do This
Over 275 million people are estimated to have moderate to profound hearing loss in both ears worldwide. 80% of the hearing-impaired live in low and middle-income countries.
The impact of a hearing loss or a hearing-impairment is especially harmful in children because it delays cognitive development which usually results in slow progression of speech, language, education, and social integration.
Hearing loss is consistently ranked as one of the 10 most significant health conditions worldwide in terms of cost and human suffering. Adults with hearing deficiencies have greater difficulty obtaining, performing, and retaining employment.
50% of deafness and hearing impairment is avoidable through education, prevention, early diagnosis and appropriate management. The remaining 50% of hearing impairment in developing nations can be addressed through treatments and the application of emerging technologies.
Damaging effects of ear infections have been significantly reduced with drugs and surgery, which are not readily available to developing nations.
Detecting and responding to hearing impairment in babies and young children is vital for the development of speech and language
World Health Organization, Fact File
Why Dominican Republic
42.4% of the Dominican Republic population live below the poverty line. The economy of the country is characterized by a marked income inequality; the poorest half of the population receives less than one-fifth of GDP, while the richest 10% enjoys nearly 40% of GDP.
The access to medical treatment is relatively low. The high cost of private health programs and the low health expenditure by the government leads to find people who had have to live with an ear infection for long periods of time this has resulted in things like not find a job or not have a normal school process.
The Future
We expect to build a new-born screening program in the Dominican Republic. The early detection is a key factor for a successful treatment. Implementation of this program which allows Project Ear to identify the problem in a quick and efficient way. We also hope to bring screenings into schools so that children with a disorder or disease that were overlooked at birth may receive help before the problem gets out of hand.
The sustainability of our project is one of our main concerns. We want to make sure that our efforts are not in vain so that expansion does not hinge on the time available to the American surgical team. The erection of a hospital in the Dominican Republic is necessary as a it will serve as a home base for ear, nose, and throat healthcare. Not only will there be a concrete space for the local underserved population to receive continuous medical treatment, but the hospital will also allow the Project Ear team to educate international residents so that they can take their knowledge with them back to their home countries. |
Tikalon Header Blog Logo
Algorithmic Music
January 19, 2011
Musical composition is a lot like theorem generation in mathematics. You have a set of rules, and you turn the crank to generate something interesting within that rule set. It sounds mechanical and not at all creative; but it's the "something interesting" part that differentiates good composers and good mathematicians from mere hacks. The idea that you can generate music algorithmically has been with us longer than computers. A method of generating music by stringing together short musical phrases randomly, usually by casting lots, was popular in the eighteenth century. This technique was known as Musikalisches Würfelspiel, or the Musical Dice Game.
Joseph Haydn composed such an algorithmic composition, called the Philharmonic Joke, in 1790; but the most famous example of this type of composition is ascribed to Mozart. Mozart's method was sold as a game by his publisher in 1792, although we're not sure that Mozart approved. In this game, musical phrases were randomly selected by dice throws to piece together musical compositions. You can try Mozart's game using an online implementation,[1] or you can hear a minuet that was generated for me, now.
I was interested in electronic music from an early age, and I designed and built several electronic music synthesizers in the 1970s. Recently, I was surprised to find that one of my experimental circuits has seen a revival on the Internet. I dabbled with algorithmic computer composition in my graduate schools days when I had access to a nice mainframe, but a turning point was the publication of the article, "1/f-noise in music and speech," by Richard F. Voss and John Clarke in a 1975 issue of Nature.[2] Voss subsequently communicated to Martin Gardner a simple algorithm for generating 1/f-noise via dice throws. This was essentially a low pass filter applied to the casting of multiple dice. A simple C language implementation that generated the data shown in the figure can be found here.
1/F noise from Voss algorithm
A thousand samples of 1/F noise calculated by the Voss dice-throwing algorithm. See Ref. 3.[3]
Not only was the Voss algorithm, which I generalized to dice with n faces, useful for generating music, but I wrote a program that used it to simulate my typing on a daisy-wheel printer. When my office door was closed, the cadence sounded so human that everyone believed I was actually hard at work on a manuscript while I was really elsewhere, playing in my lab. With the demise of impact printers and the transition from actual typing to electronic word processing, you'll need to find some other technique. I hear that the fake teleconference works just as well.
I was reminded of all this when I read a review of an exhibit at the Los Angeles Museum of Contemporary Art, Pacific Design Center, about the work of composer, Iannis Xenakis (May 29, 1922 - February 4, 2001).[4] Xenakis is known for his use of algorithmic composition techniques, but few know that he worked originally as an architect and was employed by Le Corbusier in Paris. He left Le Corbusier in 1959 in a dispute about Le Corbusier's taking too much credit for Xenakis' designs, including the very geometrical Philips Pavilion of the Brussel's Expo-58. This pavilion was composed of hyperbolic paraboloids, a shape that Xenakis realized would diffuse echoes.
Iannis Xenakis
Iannis Xenakis
(Courtesy of Friends of Xenakis).
While working as an architect, Xenakis studied musical composition, but he had a difficult time finding a teacher who ascribed to his different ideas about music. Xenakis wanted to transform geometrical drawings into music, something quite out of the mainstream in the fifties. He went through a veritable laundry list of Parisian music teachers, including Nadia Boulanger, Arthur Honegger and Darius Milhaud, before settling with Olivier Messiaen. It's not surprising that Messiaen also tutored Karlheinz Stockhausen. Messiaen told Xenakis to forget the usual curriculum of harmony and counterpoint and concentrate on application of his geometry and mathematics training to music. His training with Messiaen emphasized rhythm.
Xenakis was drawn to computing from its earliest days. His main contribution to computer music was UPIC, a tablet-based system in which the composer can draw waveforms and sketch the temporal and timbral parameters of a composition. Xenakis completed his UPIC system in 1977 at the Centre d'Etudes de Mathématique et Automatique Musicales, Paris. UPIC was used in composition by Jean-Claude Risset and Curtis Roads. There have been attempts to port the system to personal computers, one of which is HighC.[5]
1. John Chuang, "Mozart's Musikalisches Würfelspiel - A Musical Dice Game for Composing a Minuet," 1995.
2. Richard F. Voss and John Clarke, "'1/fnoise' in music and speech," Nature, vol. 258, no. 5533 (November 27, 1975), pp. 317-318.
3. Martin Gardner, "Fractal Music, Hypercards and more...," W.H. Freeman and Company, New York, 1992, pp. 12-18.
4. Jonathon Keats, "How an architect took music back to mathematical roots," New Scientist, December 6, 2010.
5. HighC web Site.
6. Squidoo - Experimental Computer Music and Electronic Music Creation Web Site.
Permanent Link to this article
Linked Keywords: Musical composition; theorem; mathematics; algorithmic composition; Musikalisches Würfelspiel; Joseph Haydn; Mozart; minuet; electronic music; electronic music synthesizer; vosim; algorithmic computer composition; IBM System/360; Nature; Martin Gardner; low pass filter; Diablo 630; daisy-wheel printer; typewriter; electronic word processing; teleconference; Los Angeles Museum of Contemporary Art, Pacific Design Center; Iannis Xenakis; architect; Le Corbusier; Paris; Philips Pavilion; Expo-58; hyperbolic paraboloid; Nadia Boulanger; Arthur Honegger; Darius Milhaud; Olivier Messiaen; Karlheinz Stockhausen; harmony; counterpoint; geometry; mathematics; rhythm; UPIC; timbre; Jean-Claude Risset; Curtis Roads. |
529 Basics
A 529 plan is a tax-advantaged investment plan designed to help families to save for a beneficiary’s (typically one’s child or grandchild) future higher education expenses. While commonly referred to as 529 plans, they are formally known as “Qualified Tuition Programs,” as defined in Section 529 of the Internal Revenue Code, and are administered by state agencies and organizations.
Why State Plans Differ
Each state that offers a 529 plan determines how its plan is structured and which investment options are offered. While many plans allow investors from out of state, there can be significant state tax advantages and other benefits for in-state residents. These can include state tax deductions, matching grants, and scholarship opportunities, protection from creditors and exemption from state financial aid calculations. Click here to Compare 529 Plans by State.
Types of 529 Plans
There are two types of 529 plans:
Prepaid Tuition Plans
There are currently 13 prepaid tuition plans (sometimes called guaranteed savings plans) offered by 12 states and the Private College 529 Plan (PC529). These plans allow participants to pre-purchase future tuition at a predetermined rate today. Typically, an account owner will purchase somewhere between one and four years of tuition for a young child, and when that child reaches college age, the plan pays out based on tuition rates at that time. Investment performance is often based upon tuition inflation. Prepaid plans may be administered by states or by higher education institutions.
College Savings Plans
College savings plans are different in that your account earnings are based upon the market performance of the underlying investments, which typically consist of mutual funds. Savings plans may only be administered by states. Forty-nine states and Washington, D.C. offer a savings plan. Most 529 savings plans offer a variety of age-based investment options where the underlying investments become more conservative as the beneficiary gets closer to college-age. They also offer risk-based investment options where the underlying investments remain in the same fund or combination of funds regardless of the age of the beneficiary. In addition, many savings plans offer an FDIC/NCUA insured, money market or guaranteed option designed to protect an investor’s principal while providing for some investment growth, while others offer investments in certificates of deposit.
Learn more about 529 plan benefits. |
SOCIAL MEDIA: The Underground Press
Telegram? Radio? Newspapers? Nah.
We are living in a time where the world is very much open to us. We can just contact anyone around the world at any time, with just a few keystrokes. Or we can just get our Smartphones and search for the latest issues whenever we feel like we’re missing out on something and too busy to even turn the TV on. Or we can just bid that newspaper boy goodbye and log in to our accounts and be informed of the latest news. The Internet, more so the social media, was originally just one ultimate constellation of ideas our predecessors have worked on long before it became the commercialized mass information and entertainment blitz it is today.
The roots of social media stretch far deeper than anyone can imagine. Although it seems like an ordinary trend to most people especially today’s generation, sites like Facebook and Twitter are the natural outcome of many decades of social media development.
Now we may ask the question, what impact and change has social media imparted for the world and the people in it?
Through the years, we have seen at how the internet and social media have been enjoyed by people to do various things and bring extraordinary joy to the world. One of the most advantageous things the internet has done for the people is that it provides as a vessel for the awareness campaigns of nonprofit organizations. Social networking sites like Facebook, Twitter and Youtube are a cost-effective means of spreading the message and getting support. It has raised concerns on certain issues reaching millions of people around the world.
Social media is also a very effective medium for teaching the youth. Children are growing up in an unusual time. This is the generation who have lived and grown up with a ubiquitous Internet. Surely, the interest of these school kids in learning is much greater as the Internet is involved and utilized. Teachers have also been influenced in getting much needed information from the Internet, making their job easier than doing manual research in the library. In a survey conducted by the Pew Research Center, 69% of the teachers say that the Internet has a ‘major impact’ on their ability to share ideas with their students as well as with their co-teachers. To a classroom connected to the Internet, no place is more than a few clicks away, expanding the opportunities for mentoring.
The social media has also made it superbly possible for individuals to discuss very crucial topics, widen their personal knowledge about certain issues, and discover and unravel things they have not known long before the advancement of technology. Say for example, young adults around the world, who are the major users of the Internet, are now more involved than ever in their respective country’s politics. These teenagers can just take a research of the biography of an aspiring candidate and judge whether they would vote for that certain person or not. With just little effort on pressing buttons. We are provided by these social networking services an accessible and powerful toolkit for acting on issues that affect the economy and the welfare of the country. Debating and discussing are just two of the things young people do, be it in a local, national, or international context.
On a not-so-serious note, the Internet also helps us in getting what we want without exerting much effort. It meant online shopping. It has become a popular shopping method ever since the Internet had a takeover. People can save time, save fuel, and save energy. Admit it, we all get tired walking around and choosing the best dress in approximately seven stalls. Majority of the online stores also offer prices that are much cheaper than what you will find in the mall.
Social media has taken over our lives. What’s shocking is that fifteen years ago, we were still bulging on the library and taking out the massive encyclopedias to search for something. Fifteen years ago, we were still waiting for the mailman on our front porch to give us the awaited letters from our dear friends. Fifteen years ago, we would go to the market and spend five pesos just to know the latest buzz. Now, we can just do all these just by pressing certain buttons and Voila! Our questions have been answered within five seconds.
The Internet has really given us an opportunity to see things from various perspectives, voice out our own opinion to the whole world, and even send love to the people who we miss from the other side of the globe. There may be good changes, but not all consequences of technology are good ones too. We just have to remember that in the end, we still have to keep our life centered in reality and use social networking and the Internet as a small portion of it and all would be fine. And if we cannot, maybe it would be time for us to turn off our Smartphones and personal computers and go outside our house and smell the scent of real life happenings.
8 views0 comments
Recent Posts
See All |
Marie of Rumania (1875–1938)
views updated
Marie of Rumania (1875–1938)
Queen of Rumania and English princess who married the heir to the Rumanian throne and played an important role in the affairs of her adopted country during and immediately after World War I . Name variations: Marie of Romania; Marie of Roumania; Mary of Saxe-Coburg; Marie of Saxe-Coburg-Gotha; called Missy by her family. Born Marie Alexandra Victoria of Saxe-Coburg on October 29, 1875, at the family country home in Eastwell Park, Kent, England; died on July 18, 1938, at Castle Pelesch, Sinaia, Rumania, of an intestinal hemorrhage; daughter of Prince Alfred Saxe-Coburg, duke of Edinburgh (who was the son of Queen Victoria) and Grand Duchess Marie Alexandrovna (daughter of Tsar Alexander II of Russia); sister of Alexandra Saxe-Coburg (1878–1942), Beatrice of Saxe-Coburg (1884–1966), duchess of Galliera, and Victoria Melita of Saxe-Coburg (1876–1936); educated by governesses and private tutors; married Ferdinand I of Hohenzollern-Sigmaringen (1865–1927), king of Rumania (r. 1914–1927), on January 10, 1893; children: Carol II (1893–1953), king of Rumania (r. 1930–1940); Elisabeth (1894–1956); Marie (1900–1961, also known as Mignon); Nicholas (1903–1978); Ileana (1909–1991); Mircea (1913–1916).
Spent portion of early years in Malta (1885–89); moved with family to the Duchy of Coburg in Germany, where Prince Ferdinand of Hohenzollern-Sigmaringen became heir to the Rumanian throne (1889); attended coronation of Tsar Nicholas II of Russia (1896); while Ferdinand was ill with typhus, began first extramarital love affair (1897); began friendship with Waldorf and Pauline Astor (1902); during Rumanian peasant revolt, began longstanding love affair with Barbo Stirbey (1907); performed relief work when Rumania fought Second Balkan War against Bulgaria (1913); with outbreak of World War I, Rumania declared its neutrality; following German invasion, performed relief work when Rumania entered war (1916); continued relief work until Rumania left the war, German occupation began (1917); Prince Carol eloped and Rumania reentered the war against Germany (1918); conducted mission to Paris Peace Conference (1919); coronation (1922); toured U.S. (1926); widowed by death of Ferdinand (1927); Carol returned from exile to take the throne (1930); published her autobiography (1934).
Queen Marie of Rumania was one of the most colorful and influential monarchs of the early 20th century. Her physical beauty, her vast energies and talents, and her vibrant personality combined with her sense of style to set her apart from most members of Europe's royal houses. Moreover, in contrast to royalty in most other countries, Rumania's monarchs wielded crucial influence in political affairs. Marie's qualities of leadership came to the fore during World War I.
The country that became Marie's adopted homeland was one of the most turbulent nations in the troubled Balkan peninsula. Rumania was freed from Turkish domination to become an independent nation only in the middle of the 19th century. Shortly after independence, Rumania's political leaders called in a member of a reigning German family to become the country's monarch. Monarchy was still the normal form of government in Eastern Europe, and Prince Karl of Hohenzollern-Sigmaringen, who became King Carol I of Rumania, turned out to be a forceful and intelligent ruler. In 1889, he turned to his nephew Prince Ferdinand (I) of Hohenzollern-Sigmaringen to become crown prince and heir to the Rumanian throne.
The country, despite its vast agricultural and mineral wealth, faced numerous problems. Its relations with its neighbors were particularly difficult. The adjoining great power, Austria-Hungary, had a large number of Rumanians within its territory in the province of Transylvania. The desire of most Rumanians to obtain Transylvania meant strained relations with a country Rumania could not hope to challenge militarily. In its internal affairs, Rumanian stability was threatened by a large, impoverished peasantry presided over by a small, wealthy, and privileged native aristocracy. The periodic persecution of Rumania's Jewish minority made the country the target for bitter criticism from abroad, both from Western governments and from public opinion. The political system was notoriously corrupt, with leaders using public office to enrich themselves with impunity.
The future queen of Rumania was born into the most rarefied levels of European society. Her father Prince Alfred Saxe-Coburg was the second son of Britain's Queen Victoria , the most eminent monarch of the 19th century. Her mother was Marie Alexandrovna , daughter of Tsar Alexander II, the Russian emperor who reigned from 1855 to 1881 and the author of the reform movement that ended serfdom.
In the style of British royalty, the young princess was given a nickname, Missy, which her relatives in Britain used throughout her life. Her childhood included visits to her imposing grandmother Queen Victoria, as well as trips to see her mother's family, the ruling Romanov dynasty in Russia. She acquired vague memories of her maternal grandfather, Tsar Alexander II, and she was shocked in March 1881, at age seven, when her tearful mother told her the tsar had just been assassinated. A crucial friendship dating from childhood linked Marie to her younger sister, Princess Victoria Melita of Saxe-Coburg , who was known as Ducky.
Marie's father had made his career in the Royal Navy, and thus her childhood included a long stay in Malta, starting in 1885 and lasting until 1889. An active and athletic young teenager, she spent much of her free time using her vast skills as an equestrian riding around the island. There, she had a first romance with her cousin, Prince George, who would take the British throne as King George V in 1910. At the close of their stay in Malta, Marie moved to a German environment. Her father, the heir to the duchy of Coburg, moved to that small region of southern Germany.
She loved being a queen. She gave herself to the Rumanians with exuberance and played her role with drama and humor.
—Hannah Pakula
In the custom of European royalty, Marie's mother sought a suitable spouse for the girl while she was still a teenager. Already strikingly beautiful with blonde hair, blue eyes, and an attractive figure, the exuberant young princess seemed destined for a brilliant marriage. Prince George of England, an old companion from her Malta days who had just become heir to the throne upon the death of his older brother, tried and failed to get Marie's parents to accept him as her future husband. Marie's Russian-born mother had found her life in England uncomfortable and wished her daughter to marry a German.
Marie's family now turned their efforts to securing Prince Ferdinand of Rumania, heir to the Rumanian throne, as Marie's husband. Ferdinand was a tall, painfully shy young man, totally dominated by the force of his uncle's personality. In 1892, King Carol had compelled Ferdinand to give up his hopes of marrying a young Rumanian noblewoman. Carol welcomed the diplomatic advantages of a marriage between Marie and Ferdinand: it meant closer ties for Rumania with both Britain and Russia.
Beatrice of Saxe-Coburg (1884–1966)
Duchess of Galliera . Born Beatrice Leopoldine Victoria on April 20, 1884, in Eastwell Park, Kent, England; died on July 13, 1966, in Sanlucar de Barrameda, Andalusia, Spain; daughter of Alfred Saxe-Coburg, duke of Edinburgh, and Marie Alexandrovna (1853–1920); sister of Marie of Rumania (1875–1928); married Alphonso Bourbon, 5th duke of Galliera, on July 15, 1909; children: Alvaro (b. 1910); Alonso (b.1912); Ataulfo (b. 1913).
Even during their courtship a cloud came into the relationship between the two young members of European royalty. Ferdinand gave his bride-to-be hints of both the country's primitive nature as well King Carol's dominant presence in family affairs. Despite her fiance's only middling good looks, Marie was enchanted with the prospects of marriage. In her memoirs, she described how "the love I read in Nando's eyes meant nothing to me but a promise of perfect happiness." In an emotional farewell meeting with her father, he told her how he had hoped for a different kind of happiness for her, and how he regretted her departure for such a distant country.
The marriage took place at Sigmaringen in 1893. As with many weddings involving European royalty, monarchs and their representatives gathered from throughout the Continent. Among the guests were Kaiser Wilhelm II of Germany and Prince Albert (I), the heir to the Belgian crown. Like her peers, Marie had been sheltered from any detailed knowledge of the physical side of marriage, and after the wedding she was shocked by her husband's passionate overtures.
A few weeks after the wedding, the young couple made their way to Rumania. Marie was surprised by the primitive appearance of the capital city, Bucharest, and the modest royal palace. Under Carol's orders, she was not permitted to have extensive contact with the Rumanian aristocracy, and she soon found herself isolated and lonely. In short order, she discovered she was pregnant. Her first child, Carol, was born in October 1893.
As Marie's biographer Terence Elsberry notes, King Carol "regarded his Crown Prince and Princess as necessary, but potentially dangerous" to his rule. Thus, he kept them both isolated and under close control. Marie was particularly disappointed to find that she could only travel abroad on infrequent occasions, even for family weddings. Her lively and spirited nature did not mix well with Ferdinand's quiet and shy personality. Marie also learned that Ferdinand was often unfaithful to her.
She had a rare moment of freedom in May 1896, when she attended the coronation of her cousin Tsar Nicholas II. In a memorable event in her life, she rode to victory in a horse race against a Russian cavalry officer. Upon her return to Rumania, she insisted on a new measure of personal freedom, epitomized by rides in the countryside. She also became the honorary commander of a distinguished Rumanian cavalry regiment.
In the summer of 1897, Ferdinand fell seriously ill with typhus. He was for a time feared to be dying. His recovery was a prolonged one, and it left him physically weakened. While Ferdinand was convalescing, Marie of Rumania had her first extramarital relationship, a romance with an aristocratic young army lieutenant. Word of the liaison spread in Rumanian society, and Marie fled for a time to visit her family in Germany. She returned in November 1899 upon hearing that her eldest child, Prince Carol, was ill with typhoid. The boy recovered, and she and Ferdinand responded to the emergency with a personal reconciliation.
While visiting England in 1902, Marie began a lifelong friendship with Waldorf Astor and his sister Pauline Astor , the children of an American millionaire who had settled in England. The friendship with the young Astor developed into an intense, albeit platonic, love affair. The birth of a fourth child, Nicholas, her second son, in 1903 led to a wave of gossip in Rumania that the boy was Waldorf's son, although his physical resemblance to Prince Ferdinand, his legal father, was striking.
By the start of the new century, Marie of Rumania had developed into a confident as well as a physically attractive woman. She had shaken off much of the confining supervision of the early years of her marriage and widened her circle of friends. A symbol of her growing freedom was her extensive contact with the wealthy, often dissolute, members of the Rumanian aristocracy.
In 1907, her life took a new turn in several ways. The oppressed peasantry rose in revolt, and thousands marched on the capital city of Bucharest. Marie and her children left the city to guarantee their safety. In her refuge at the mountain resort of Sinaia, she began her longstanding romantic attachment to Barbo Stirbey, a Rumanian noble and a prominent leader in the country's economy. As a longtime student of Rumanian politics, he provided Marie with her first serious introduction to the nation's problems. Word of their personal tie spread through European aristocratic circles, and rumor had it that the last of her six children, Ileana , born in 1909, and Mircea, born in 1913, were the offspring of their relationship.
When Rumania participated in the Second Balkan War in 1913, sending its army to invade Bulgaria, Marie of Rumania took on a public role for the first time. She visited the dismal and poorly equipped Rumanian military hospitals. Appalled by what she saw, she took the initiative in setting up an emergency center for treating soldiers with cholera. "Devoid of physical fear herself," writes Hannah Pakula , "the Crown Princess obtained permission from the King to
personally administer one of the cholera camps." It was a preview of one of her roles in World War I.
That same year, Stirbey received an important royal appointment when Carol made him superintendent of the crown's estates. It was a significant sign of royal influence; it also meant Stirbey would have daily contact with Marie.
In July 1914, when World War I began, Marie's relatives in Germany and Russia were rulers on opposite sides of the battle lines. King Carol, now suffering from severe illness, tried to bring Rumania into the war on the side of Germany and Austria, the Central Powers. He found his efforts blocked: all the major political leaders called for neutrality, a position that in fact reflected sympathy for the side of Britain, France, and Russia. Rumanian public opinion was virulently hostile to Austria-Hungary, since that country held Transylvania with its large Rumanian population. Marie, with her close ties to both Britain and Russia, shared the sympathies of most Rumanians, but she was tormented by the course of events. As she wrote a friend at the time, "One cannot know where or how we shall all be when this horrible nightmare is ended."
The death of King Carol less than two months after the start of the war placed Ferdinand and Marie on the throne as rulers of Rumania during this precarious era. The war came steadily closer to Rumania as Turkey entered the conflict on the side of Germany in late 1914, while Bulgaria did the same at the close of the following year. As monarch, Ferdinand remained the timid and indecisive figure he had always been. Personally inclined to favor Germany's side, he was swayed by those around him, notably the prime minister Ion Bratianu. Marie's influence too promoted sympathy for the Entente (Britain, France, and Russia). At Bratianu's request, she corresponded with King George V of Britain and Tsar Nicholas II of Russia, asking for future territorial concessions to Rumania, especially the acquisition of Transylvania. Notes Pakula, "Being everyone's relative warmed diplomatic waters."
In the spring and summer of 1916, the position of the Entente seemed increasingly favorable in Eastern Europe. The key event was the successful offensive by Russia's General Aleksei Brusilov against the Austro-Hungarian army. Pushed by Marie, Stirbey, and Bratianu, Ferdinand declared war on Austria-Hungary in late August. Germany immediately joined its ally against Rumania.
In short order, the military situation shifted. Brusilov's offensive stalled; the Rumanian offensive into Transylvania brought early successes but at the cost of stripping Rumania of its own defenses. By mid-September, powerful German armies were pouring into Rumania from the north and the south. Meanwhile, the German air force bombed Bucharest. In November, as German armies approached the nation's capital, personal tragedy struck Marie's family: her young son Mircea died of typhus. The Rumanian government and the royal family fled to Jassy, in the unoccupied area in the country's northeastern corner.
Marie of Rumania now became a heroine-queen, one of few effective leaders in her country. She directed the Rumanian Red Cross, worked long hours setting up relief efforts, and personally worked in the nation's bulging military hospitals. Dying soldiers held her photograph, and, when she visited the wounded, she was greeted with the cry of "Mamma Regina," the mother queen.
The new year brought worse news. The March 1917 Revolution in Russia, led by V.I. Lenin, toppled the Romanov monarchy and threatened to remove Rumania's large neighbor from the war. Marie's sister Victoria Melita, married to a Russian grand duke, seemed to be in great personal danger. A partially restored Rumanian army was able to hold defensive positions against an attack by the Central Powers at the battle of Marasesti in August 1917, but Russia's departure from the war threatened to isolate Rumania completely. In November, the Bolsheviks came to power in Russia and the threat became reality. Russia made peace with the Central Powers at Brest-Litovsk in March 1918; Rumania was forced to do the same.
The international public soon heard that Marie refused to accept the peace settlement. These difficult months brought both a new romantic interest and new personal difficulties into her life. She became the firm friend, and perhaps the lover, of Joe Boyle, a representative of the Canadian Red Cross, who heroically delivered supplies from Russia into Rumania. Meanwhile, her eldest son Carol, the heir to the throne, caused deep personal and political embarrassment. He abandoned his duties as an officer in the Rumanian army and eloped to marry a young society woman, Jeanne Lambrino , nicknamed Zizi. Marie fought successfully to have the marriage annulled and to permit Carol to retain his right to succeed his father someday as king.
In the closing days of the war, Austria-Hungary collapsed, a pro-Entente government took power in Rumania, and the country re-entered the war on November 9. Marie was overjoyed at the turn of events. At the close of the month, the royal couple, accompanied by their French military adviser, General Henri Berthelot, returned in triumph to Bucharest. They soon discovered that the Germans had looted and devastated much of the country. Russian troops in Rumania, undisciplined in the aftermath of revolution, had also used their stay in Marie's realm to pillage.
At the request of Bratianu, who was serving as Rumania's delegate at the Versailles Peace Conference, Marie came to France to aid her country's diplomatic efforts. Bratianu was pursuing a policy of gaining vast territories for Rumania, but he found the representatives of the major victorious powers unsympathetic. Marie of Rumania answered Bratianu's call with enthusiasm, and received a warm welcome in Paris. Supplied with information and talking points by Bratianu, the queen applied her charm. She held press conferences, lobbied leaders like Prime Minister Georges Clemenceau and President Woodrow Wilson, and visited military hospitals. Marie was also able to renew her longtime friendship with the Astor family. The Peace Conference ended with Rumanian success in gaining a vast amount of territory at the expense of the defeated powers. Due mainly to the strength of the Rumanian army and the power vacuum in Eastern Europe, her country's success was attributed by many, nonetheless, to Marie's personal efforts. Said Marie, "I had given my country a living face."
Marie of Rumania's life in the postwar period contained glamorous elements, many of them which she herself fostered. She continued to be famous for a flamboyant style of dressing, featuring wide hats, long gowns, fur wraps, capes, and turbans. She saw to it that her image was distributed throughout the world on millions of postcards. Rumania's queen even wrote a syndicated column for the newspapers of North America. In 1926, she toured the United States, beginning with a ticker-tape welcoming parade in New York. There, one newspaper greeted her as "the world's first ultra-modern queen." She visited with President Calvin Coolidge and General John Pershing, Sioux Indians, and the cadets at West Point. She was even fodder for the wit of Dorothy Parker :
Oh, life is a glorious cycle of song.
A medley of extemporanea;
And love is a thing that can never go wrong;
And I am Marie of Roumania.
Despite Marie's long-standing success in the public eye, the trip soon became an embarrassment to the government back home due to her lavish style of travel, her occasional verbal indiscretions, and the unrelenting curiosity of the press. Word of her husband's illness encouraged her to cut the visit short.
These years were burdened by the disreputable behavior of her oldest son. Carol continued romantic attachments with unsuitable women and refused to fulfill his duties as an army officer. Although he married Princess Helen of Greece in February 1921 and their child Michael was born in late October, the marriage soon broke down. To Marie's consternation, he soon took up a scandalous relationship with a commoner from a Jewish family, Elena Lupescu . In 1925, Carol left the country, renounced his rights to the throne, and set up housekeeping with his mistress in Paris.
On a happier note for Marie, she saw one daughter, Marie , known as Mignon, married to Alexander (I), the crown prince of Yugoslavia, and another, Elisabeth , married to George, the crown prince of Greece. A signal event in these postwar years was the formal coronation of Ferdinand and Marie on October 15, 1922, as monarchs of the newly expanded Rumania.
Marie's own troubled marriage was transformed into a more serene tie in the postwar years. She and Ferdinand each accepted the other's extramarital alliances. They found common ground in devotion to their children and their royal responsibilities. Marie's skilled hand in public ceremonies complemented the shy Ferdinand's behind-the-scene political influence.
Ferdinand died of cancer in July 1927. In the last months of the monarch's life, Marie moved frantically to get Carol to return to Rumania. Like many politically astute figures in the country, she knew that it would be dangerous to have Carol's child Michael take the throne under a regency. Rumania's neighbors like Hungary might seize on such an opportunity to retake territory they had lost to the Bucharest government after World War I. But Carol had little interest in returning to Rumania without Elena Lupescu. The death soon afterward of Ion Bratianu, the country's only powerful political leader, only heightened her anxiety.
Marie soon witnessed even more political difficulty. The onset of the Depression struck Rumania's farm-based economy with stark force. Marie was frozen out of the regency council and became frustrated by her lack of political influence. She busied herself with her relationship with Barbo Stirbey; she also wrote a number of romantic novels and started work on her memoirs.
Carol returned in a successful coup in June 1930. He flew to Bucharest and soon received majority support from the regency council. Marie received word of these events while in Germany. She was well acquainted with her son's personal failings, but she accepted his return. The country, in her view, needed the kind of leadership that would restore national unity. She herself hoped to play a role in the new political environment.
Events soon disappointed Marie. King Carol II exiled Barbo Stirbey, whom he had disliked for years. He scandalized Rumanian opinion when he brought his mistress, Elena Lupescu, back home from France. Marie found her own activities restricted, and the new monarch cut off a substantial part of her income. A solitary bright spot in Marie's life was the marriage of her daughter Ileana to an Austrian noble.
Meanwhile, the political scene in Rumania grew uglier. Opposition to the power of Elena Lupescu spurred the growth of a Fascist movement. Led by the attorney Corneliu Codreanu, it was first called the Legion of the Archangel Michael, then renamed the Iron Guard. In 1933, the movement claimed a prominent victim when a member assassinated Marie's friend, Prime Minister Jean Duca. The following year, Marie was shaken by another assassination: her son-in-law, King Alexander of Yugoslavia, was murdered by a Croatian in Marseilles. Marie's daughter Mignon was a widow at the age of 34.
In 1934, Marie published the first portion of her autobiography and received favorable reviews as well as a prestigious British literary prize the following year. She then marked her 60th birthday, still a strikingly attractive woman as a number of portraits painted by Sir Philip de László have recorded. The sadness in one of them reflects her grief at the death of her sister and oldest friend Victoria Melita. At Victoria's deathbed in 1936, Marie had a final reunion with all of her sisters.
Her final illness became evident in March 1937. Marie collapsed at her home in Rumania, and her doctors discovered she suffered from repeated bouts of internal bleeding, possibly due to liver disease. King Carol seemed indifferent to her suffering; it took an angry confrontation between him and his sister Mignon to make the monarch call in noted specialists. Marie was able to continue writing her memoirs, but suffered a relapse at the end of the year. Her last months were filled with political pain as King Carol abolished the existing constitution in 1938 and declared himself the country's dictator.
Marie died at Sinaia on July 18, 1938. Her last words to her son were a plea that he be "a just and strong monarch." She was buried at the royal tomb at Curtea de Arges. Following her own typically romantic request, her heart was cut out and placed in the chapel at Balcic, her private retreat on the Black Sea.
Marie of Rumania remains a complex and fascinating figure to students of her time. In an era when European royalty seemed a useless anachronism, her personality was striking, and she played a significant, at times heroic, role for her country both in World War I and at the Peace Conference.
Blanch, Lesley. Pavilions of the Heart: The Four Walls of Love. NY: Putnam, 1974.
Elsberry, Terence. Marie of Roumania: The Intimate Life of a Twentieth Century Queen. NY: St. Martin's, 1972.
Pakula, Hannah. The Last Romantic: A Biography of Queen Marie of Roumania. NY: Simon and Schuster, 1984.
suggested reading:
Blanch, Lesley. Under a Lilac-Bleeding Star. NY: Atheneum, 1964.
Marie, Queen of Roumania. The Story of My Life. NY: Scribner, 1934.
Seton-Watson, Hugh. Eastern Europe between the Wars, 1918–1941. 3rd ed. Hamden, CT: Archon Books, 1962.
Stavrianos, Leften. The Balkans since 1453. NY: Holt, Rinehart and Winston, 1958.
Neil M. Heyman , Professor of History, San Diego State University, San Diego, California
About this article
Marie of Rumania (1875–1938)
Updated About content Print Article
Marie of Rumania (1875–1938) |
A lost city has now been discovered near Luxor in Egypt. Dating back to 3500 years ago, the city, according to experts, was supposedly part of a palace that was built for the jubilee of Amenhotep III, the pharaoh at Malqata. He had ruled somewhere between 1386 and 1353 BCE.
The city was uncovered back in September of last year near the Colossi of Memnon. Apart from the palace, you also have administrative buildings, a temple that was dedicated to Amun, the god, and also a desert altar, Kom al-Samak. It has been discovered that there also used to be a ceremonial lake here known as Birket Habu, along with a settlement of homes, and workshops.
Built mostly with unbaked mud bricks, the discovery of this lost city is being compared to an ancient Egyptian Pompeii. The village street can still be seen, and walked on, just how it used to be 35000 years ago. According to Peter Lacovara, director of Ancient Egyptian Heritage and Archaeology Fund, the city has been very well preserved, and is therefore a delight for explorers.
In fact, some houses were preserved up to three metres, with its contents still intact. So you can see tools, pottery vessels, and even kitchens. The pots have inscriptions that name the settlement as Rise of Aten. Other inscriptions include the name of the domain of the dazzling Aten, which is the temple that was built by Amenhotep’s son, Akhenaton.
With such a lot of discovery, it indicates that the archaeology of this area used to be really rich, but all of that needs to be protected and preserved to a great extent.
Source Article |
The Doomed Fly: a kinematic teaser
Article Summary
In this article we use a variety of analytical and graphical methods to determine the remaining lifespan of a doomed fly trapped between two moving walls.
Our scenario begins with two facing vertical walls 100 metres apart and the fly standing on one of the walls. At this instant the walls start to approach one another at a speed of 100 m per sec. Simultaneously, the fly takes off with a constant horizontal speed of 200 m per sec in the direction of the opposite approaching wall.
In modelling this situation, we will also make the following assumptions:
i) the fly reaches the speed of 200 m per sec instantaneously from take-off; and
ii) during its subsequent fight, whenever the fly reaches an oncoming wall, it instantaneously reverses its horizontal direction towards the other approaching wall and flies at a constant speed of 200 m per sec.
The problem is to determine the duration and total length of the fly's flight, before the fly gets unceremoniously squashed between the two walls?
You can read the full Doomed Fly article by clicking here.
Article written by:
Ian Tame
Senior Tutor |
One of the biggest challenges for people with dementia is retaining a sense of identity and meaning in life. How do people do this when they lose the ability to learn and retain new information, are confused about time and place, and have to rely on others to do things they once did independently? Researchers in the Netherlands conducted interviews with 14 people having mild to moderate dementia in order to answer this question.
Personal dignity reflects people’s sense of having value and worth. It comes from our own feelings about theself and it also comes from how we are treated by others. People who say they have lost the feeling of personal dignity say they feel worthless and of no use to others.
What contributes to a sense of personal dignity? The people with dementia interviewed for this research stated that they felt they had lost important parts of their identity, mostly because they no longer felt they could fully exercise autonomy in the way they had before dementia set in. They now needed others for guidance in decision-making and in performing various tasks of everyday living. Nevertheless, most of these individuals with dementia still felt they had meaning in their lives and thus were holding onto dignity, largely because they continued to do some worthwhile activities in their homes. For example, one woman talked about how she could still dig in her garden.
All of the people in this study had experienced growing dependency on others but the ones who maintained a sense of personal dignity had learned to accept and respect the help their partners gave. One man talkedabout how he uses his wife’s memory. He said, “I consciously use her memory, or at least I realize that I make clever use of her memory.” Thus, although he recognizes that he is increasingly dependent on his wife, he stillis able to maintain his own dignity by describing it as a choice he has made to rely on her memory.
An important component of personal dignity noted in this research was having the opportunity to give back to others. This reminds us that dementia-friendly communities should not just focus on doing things for people with dementia and their care partners, but these communities should also enable people living with dementia to feel like they can be helpful to other people. In addition, people commented on how important it was for them to feel that others in their community respect them. Outside of the safety of the home, people with dementia sometimes worry about losing their dignity in front of strangers. This is one reason why it is so important to create dementia-friendly communities that include Purple Angel training so employees in places like restaurants, shops, banks, dental practices, etc., treat people with dementia with patience, understanding, and kindness.
Being able to continue to perform daily routines and chores at home, while feeling safe and comfortable insituations outside the home, all contributed to people’s feelings that life still could be meaningful and thatpersonal dignity could be maintained. For most of the people in the study, their partners made a good life possible by keeping some semblance of normalcy even in the midst of the changes and challenges of dementia.
A major take-home message in this research on personal dignity is that it is relational. In other words, the social context in which a person with dementia lives is a key contributor to personal dignity. In order to help the ones they love who have dementia keep their sense of dignity and meaning, care partners need the support of a dementia-friendly community just as much diagnosed persons.
Susan McFadden
Van Gennip, I. E., Pasman, H. R. W., Oosterveld-Vlug, M. G., Willems, D. L., & Onwuteaka-Philipsen,B. D. (2016). How dementia affects personal dignity: A qualitative study on the perspective of individuals with mild to moderate dementia. Journals of Gerontology: Social Sciences, 71, 491-501.
Leave a Reply
• Archives
• Categories
• Archives
• Categories |
Government Data: Understanding the Barriers to Citizen Access and Use
Richard Heeks
In almost every country in the world, government remains the single largest repository of data. It stores data on a vast array of topics; data that can be of immense value not just to organisations but also to individual citizens. That value may be economic - helping citizens improve their employment or income-generation potential - or it can be personal/social - helping the citizen to improve their home or community.
Citizen access to government data can therefore be seen as an important component of both economic and social development. Yet that access can be a problematic process. This paper analyses the barriers that need to be understood and addressed if citizen access to government data is to become a more widespread reality. It starts by recognising that, for individuals to access the data that is held about them or other public sector data, two groups of resources must be available: the data itself, and the other resources - particularly technology - to access that data.
Freedom of information legislation is reviewed, but appears to have had a relatively limited effect on citizen access. Finally, a model of both access and use is presented that helps to understand the broad range of factors that affect the interaction between citizens and government data.
View/download options
Educator's guide
Synopsis questions
1. What different views do governments hold about public sector data? [part A]
2. What resources do citizens require in order to access government data? [part B]
3. What is the 'digital divide'? What are its dimensions? How are governments attempting to close it? [part B]
4. What is 'freedom of information' legislation? How does it vary between countries? [part C]
5. What other resources do citizens need in order to make use of government data? [part D]
Development questions
1. Can IT solve problems of citizen access to and use of government data?
2. Will the digital divide ever be closed? In the most wired countries, should governments more focus more on the majority who have IT access or on the minority who do not?
3. In the UK Public Records Office, some of the oldest data is that from William the Conqueror's Domesday Book, recording England's national assets in the late 11th century. Over 900 years later, it can still be accessed and read. What fate awaits government data being recorded electronically today? What should government do about this?
4. Analyse freedom of information legislation in relation to the access factors outlined in parts A and B.
5. Imagine you are running a community development programme. How much of a priority would you give to data access and to IT access initiatives? |
Fossil Galaxy Discovered in Milky Way
Journey into the Heart of the Milky Way
Source: Milky Way Stock Image
Space Mysteries and Wonders
Astronomers have discovered a fossil galaxy buried deep inside the Milky Way. They've named the fossil galaxy Heracles and believe that it collided with the Milky Way 10 billion years ago. It is very large and accounts for 1/3 of the Milky Way's spherical halo. So, why wasn't it discovered before now? Scientists say it wasn't discovered before because it is so deeply buried inside the Milky Way. Highly advanced technology was utilized to make the discovery.
APOGEE Technology
Highly advanced technology known as APOGEE was used to discover the fossil galaxy. The team, led by astronomer Ricardo Schiavon of the Liverpool John Moores University in the UK worked with data from the Sloan Digital Sky Survey's Apache Point Observatory Galactic Evolution Experiment, or APOGEE.
A Needle in a Haystack
APOGEE provided the scientists with 10 years worth of tracking tens of thousands of stars in the Milky Way. It is capable of piercing the interstellar dust that obscures the Milky Way stars and brought the team deeper into the Milky Way than ever before. They say finding Heracles was like finding a needle in a haystack. The discovery of the fossil galaxy is yet another example of the mysteries and wonders that the universe holds.
Popular posts from this blog
Robot Lawn Mowers
Important Innovations Collection: New Water Sport - Wheeebo |
The notes is based on the book RxJS in Action, the official RxJS document and the Learn RxJS gitbook .
1 A New Async Paradigm
The existing sync loop, conditional statements and exception handling strategies are not async aware. They are oblivious of wait time or latency between operations. Nesting calls are not only hard to understand but also bring clousures with them. Cancel long-running operation is hard, if not impossible. Throtting is missing. Composing of nested asyn flows is difficult.
RxJS is an API for asyn programming with observable streams. A stream is a sequence of event over time. Everything is a stream in RxJS. RxJS uses an observer design pattern that involves an object (the subject), which maitains a list of subscribers (each is an observer). RxJS adds features such as completion signal, lazy initialization, cancellation, resource management and dsiposal.
In RxJS, data is not stored in variables. It flows through the streams. RxJS follows a declarative design inspired by functional programming. Operations can be chained. Streams can be composed. RxJS combines ideas from the observer pattern, the iterator pattern and the functional programming.
Rx is good for
• composing multiple events together
• adding delay
• clientside rate limiting
• coordinating asyn tasks like drag and drop
• when cancellation is required
Don’t use Rx for simple tasks such as button click. Angular uses RxJS in its HttpClient, AsyncPipe, reactive forms and routers.
2 Introduction
2.1 Basic Concepts
RxJS abstract over time under the same programming model regardless of source. It has the following components:
• Producer: a source of data. It’s also called an observable that is in charge of pushing notification – a bahvior called fire-and-forget.
• Consumer: an observer to process data. A stream of data travels from the producer to the consumer.
• Data pipeline: using operators to process the data when it passes from the producer to the subscriber.
• Time: there is always a time factor in data stream. Time passes when data flows from the producer to the subscriber with a pipeline between them.
RxJS introduces the following concepts:
• Observable: is a core type that represents a collection of future values or events. It takes a function as the only constructor argument – the function takes an observer and optionally returns a subscription. The function is called in the observable’s subscribe method. The Observable has some static methods that generates data from different data sources such as promise or event soruces. Essentially an observable connects a proudcer (a data source) to a consumer (an observer). The observable starts to push data to the observer when its subscribe method is called.
• Observer: is an interface for a collecton of callbacks (next, error, complete) that handles values pushed by an observable instance.
• Subscription: represents the execuation of an Observable, is primarily useful for cancelling the execution. It has a teardown function named unsubscribe. Cancelling a subscription will not call complete.
• Cancellation: the subscribe method can return a function that can be called to cancel the subscription. The execution may or may not change the observable source.
• Operators: are pure functions that transforms an observable to another observable.
• Subject: is both an observable and a observer. It can multicast a value to multiple observers.
• Schedulers: are dispatchers to control concurrency.
In implementation, an Observable is a class that represents a set of values over any amount of time. It is constructed (initialized) with an observable function that uses an observer to process a set of inputs. The class has a subscribe method that executes the observable function. The method may return an object that has an unsubscribe() mehtod used to clean the data stream. An Observable instance behaviors like a funciton that can push values synchronously or aynchronously.
An observer is registered to an observable. An observer has three methods: next(val: any): void, error(error: any): void, and complete(): void.
If there is an error, the observable is gone. To isolate errors, use switchMap() and use catchError() inside the pipe method of the inner observable. Any error only cancels the inner obserable.
Subscriptions can be put together by using add(child) method to add a child subscription to a parent. When the parent subscription is unsubscribed, all its children are unsubscribed. unsubscribe() is called automatically when observable is completed (complete() is called, take(n), or takeUntil(notifier)) or there is an error. You should call the unsubscribe() method when an observable is no longer used. If a component subscribes to an observable that lives longer than the component, you should call the unsubscribe() method when the component is destroyed.
There are four types of data sources and four different ways to create an Observable instance.
• Single-value, synchronous: use simple sync operation to process the data. An observalbe wrapper is only used when they combine with other streams. Use of(value) to wrap it.
• Multi-value, synchronous: is better processed by pull-based iterator. Use from(values) to wrap an array, or array-like data source.
• Single-value, asynchronous: it’s often wrapped in a promise. A promise is execuated eagerly and asynchrounously. Use from(promise) to wrap it.
• Multi-value, asynchronous: the typical solution is an EventEmitter. Use fromEvent() to wrap it. RxJS uses push-based notifications.
2.2 Imports
To import types, creation methods, schedulers and utilities, use import { Observable, Subject, asapScheduler, pipe, of, from, interval, merge, fromEvent } from 'rxjs'. To import pipeable operators, use import { map, filter, scan } fro m 'rxjs/operators'. To import specific tools: use import { webSocket } from 'rxjs/webSocket' for web socket subject, import { ajax } from 'rxjs/ajax' for ajax utitlity and import { TestScheduler } from 'rxjs/testing' for testing utilities.
2.3 Multicasted Observables
A Subject works as both an observable and an observer. It supports multicasting.
A BehaviorSubject stores the latest value emitted to its consumers. When a new Observer subscribes, it gets the latest value immediately.
A ReplaySubject stores multiple recent values by counter or window time and emit them to the new subscribers.
An AsyncSubject only push the last value when it completes.
3 Operators
RxJS avoids premature allocation of data in two ways: using of a lazy subscription and, by default, pushing data as soon as the event is emitted without holding it in memory.
An operator is a pure, higher-order, lazily-evaluated function that is injected into an observable’s pipeline. Operators subscribe to a source observable and return a new observable. The source observable stays unmodified. A subscribe to the result observable will cause the source observable to be subscribed. This is called an “operator subscription chain”.
Instance operators are defined in the Observable.prototype and is called as an instance method.
Static operators are pure functions attached to the Observable class and usually are used to create an observable or work with multiple observables.
Since V5.5, all operators are also defined as an independent function in rxjs or
• pipeable operators in rxjs/operators. It is recommend to use these two types of operators to make the app size smaller.
3.1 Pipeable Operators
Mutiple pipeable operators can be composed and applied sequentially in an observable’s pipe() method. The result of pipe() is another observable. A function defined in the pipe() may return nothing (tap), return plain values (map or filter) or return an observable (catchError), all is determined by the operator itself.
The pipeable oprators may be called in different phases of processing: most are executed when a value is emitted, catchError is called when an error occurs, finalize is called after an error or completion.
The map operator transforms data from one type to another.
The filter removes unwanted items from a stream via a selector function, also called the predicate.
The reduce(accumulatorFunction, [initialValue]) operator turns a stream into a single value observable. The accumulatorFunction takes two parameters: the current result and the new steam element.
The scan() applies an accumulator function over an observable sequence but returns each intermediate results.
The take(count) operator returns a specified amount of contiguous elements. The first and last return the first or the last element, repsectively.
The min and max operator turens the minimum or maximum value of a finite stream.
The tap utitlity operator invokes an action for each element to perform some type of side effect, mostly for debugging or tracing purposes. It can be plugged into any step in the pipeline.
The pluck(propertyName) gets the value for a named-property from each element.
The debounceTime(millisecond) emits a value only after the specified time span has passed without another source emission. The values emitted during the time span are discarded except that the last emitted one is used. It is used to emit a value when it is stablized for the specified time span.
The distinctUntilChanged only emits a value if it is different from the previous one.
If a pipeline is side effect-free, it is said to be self-contained. It’s called operator chaining or fluent programming.
An observable must always produce the same results given the same events passing throught it. It’s a qulaity known in FP as referential transparency.
3.2 Custom Pipeable Operators
A pipeable operator is basically any function that returns a function with the signature: <T, R>(source: Observable<T>) => Observable<R>. The following example is copied from RxJS pipeable doc:
import { interval } from 'rxjs'
import { filter, map, take, toArray } from 'rxjs/operators'
* an operator that takes every Nth value
const takeEveryNth = (n: number) => <T>(source: Observable<T>) =>
new Observable<T>(observer => {
let count = 0
return source.subscribe({
next(x) {
if (count++ % n === 0)
error(err) {
complete() {
3.3 Flat Combination
The merge() method merges one observable with others. The elements are in the order of their original sources.
The concat() method appends all element of a source to another one. It begins emitting data from a second observable only when the first one completes.
3.4 Nested Observables
Observables manage and control the data that flows through them via data containerizing. Therefore, there are cases of observables whose values are observables. This software pattern is the FP paradigm called monad. A monad exposes an interface with three methods: a unit function to lift values into the monadic context (of()), a mapping function (map()), and a map-with-flatten function (mergeMap()).
Use mergeMap if you want to keep all inner subscriptions and the ordering doesn’t matter. There are multiple active inner subscriptions. To avoid memory leak, use take or takeUntil or limit the number of active innner subscriptions at a time with the concurrent parameter.
Use concatMap if you want to process all inner subscriptions serially. Their order are kepts. When the inner observable emits a value, it processes the value into an observable and subscribe to it (outer subscription). Only when the outer sbuscription is completed that it starts processing the next value emitted by the inner observable.
Use exhaustMap if you want to ignore on-going source values until the current inner subscription completes. Values emitted before the inner subscription completes are ignored. It’s an opposite of switchMap.
Use switchMap if you want to cancel on-going inner subscription when the source emits, allowing only one active inner subscription.
3.5 Coordinating Observalbes
The startWith() emits a value before other observalbe values emitting.
The combineLatest() emits an array of the latest values of multiple independent observalbes.
The forkJoin() emits only the last value of each forked stream.
Use zip() to combine streams that happen synchronously.
4 Scheduler
A Scheduler defines the execution context in which an Observable pushes data to its Observer. It may have a data structure to store and queue tasks based on priority or other criteria. I may have a virtual clock that denotes time for task sheduling. There are three types of schdulers: queue, asap (next tick), and async (setInterval or setTimeout). If not passing any scheduler, data are pushed synchronously and recursively.
RxJS uses a lest concurrency policy. For a finite and small number of data, RxJS uses no Scheduler. For a loarge or finite number of data, queue scheduler is used. For operators that use timers, async is used.
Static creation operators usually take a Scheduler as argument. Use subscribeOn(scheduler) to specify a scheduler. Use observeOn to schedule the context for pushing data. Time-related operators like bufferTime, debounceTime, delay, etc. take a Scheduler as the last argument.
5 Time Management
Functions that deal with time are inherently impure because time is global to the entire applicatonand forever changing. JavaScript functions like and Math.random() are impure because their returns are inconsistent. An async event brings two challenges:
• It may or may not happen in the future.
• It’s conditional that it depends on the result of a previous task.
Callbacks and event handlers have implicit timing in the process.
5.1 Timing Methods
The Rx.Observable.timer(offset) creates an observable that will emit a single event after a given period of time. Similarly, interval(span) emits a sequnece of natural numbers starting from 0 at the fixed interval. They also accept an additional scheduler parameter that makes testing easy. The timeInterval() instance method gives both a count as well as the time intervals between two events. The delay(offset) time shifts the entire observable sequence.
There are two important characteristics of RxJS timing:
• Each operator only affects the propagatin of an event, not its creation.
• Time operators act sequentially.
debounceTime(period) triggers only if a certian period has passed without it being call. The last value will be emitted.
throttleTiem(period) emits at most once every period.
5.2 Buffering
buffer(closingObservable) buffers data until a closing observable emits an event.
bufferCount(number) buffers the number of events.
bufferTime(period) buffers for a specific period.
bufferWhen(selector) buffers when the selector call emits a value.
6 Error Handling
RxJS implements a functional error-handling technique. It abstracts errors and exception handling via several strategies.
6.1 Error Propagation
At the end of the observable stream is a subscriber waiting to pounce on the next event to occur. The subscriber implements the Observer interface that consisting of three methodsd: next(), error(), and complete(). Errors occur at the begining of the stream or in the middle are propagated down to any observer, finally resulting in a call to error(). The first exception that fires will result in the entire stream being cancelled.
6.2 Catching and Reacting to Errors
The catch() operator intercepts any error in the Observable and give you the option to handle by returning a new Obseervable or propogating it downstream.
The catch() operato is passed a function that takes an error argument as well as the soruce observable that was caught. Therefore you can return the source observable to retry from the begining.
RxJS provides retry() operator to reexecuting the source obserbale a number of retries. Be carful when use it with an observalbe creaetd from a promise because a promise alway return a settled value (success or failure). You can control retry strategy using retryWhen().
RxJS provides throw() and finally() operators to throw exception or run cleanup code. The finally() runs when a stream compleetes or when it errors.
7 Hot and Cold
The hot and cold category determines the stream behavior, not just the subscription semantics, but also the entire lifetime of the strea.
7.1 Cold Observables
A cold observable doesn’t begin emittting until an observer subscribes to it. It is typically used to wrap bounded data resource types such as numbers, ranges of numbers, strings, arrays and HTTP requests, as well as unbounded types like generator functions. These resources are known as passive in the sense that their declaration is independent of their execution. They are truly lazy in their creation and execution.
Being cold means that each new subscription is creating a new independent stream with a new starting point for that stream. Each subscriber will always independently receive the exact same set of events. A cold observable can be thought of as a function of an object factory that takes input data and return an output to the caller.
The declaration of a cold observable frequently begins with the static operators such as of(), from(), interval(), and timer().
7.2 Hot Observables
Hot observables produce events regardless of the presence of subscribers. Hot observables are used to model events like clicks, mouse movement, touch, or any other vents exposed via event emitters.
Simialarly, an HTTP request is cold where a Promise is hot – a promise is not reexecutable once it’s been fulfilled.
A hot observable shares the same subscription to all observers that listen to it. It emits ongoing sequence of events from the point of subscription and not from the beginning.
7.3 Change Temperature
The default resubscription behavior of RxJS is code observable subscription: each subscriber gets its own copy of the producer. It is the case for synchronous data sources as well as async data sources wrapped created within an observable context. An implication is that anything subscribing to a cold observable creates an one-to-one unicast comunication between the proudcer and the consumer. Subscribing to a hot observable creates an one-to-many shared/multicast communication between the producer and its consumers.
By moving a hot source producer such as a promise or a websocket creation into an observer context, you make a hot source cold.
By moving a cold source producer out of an observable context and let the observable to subscribe the producer event can make a cold source hot.
The share() operator turns a cold stream to hot by managing the underlying stream’s state thus the stream can be shahred by all subscribers. |
• Oscar Wilde's story of a fashionable young man who sells his soul for eternal youth and beauty is his most popular work. Written in Wilde's characteristically dazzling manner, full of stinging epigrams and shrewd observations, the tale of Dorian Gray's moral disintegration caused something of a scandal when it first appeared in 1890. Wilde was attacked for his decadence and corrupting influence. He responded that, while he was 'quite incapable of understanding how a work of art can be criticized from a moral standpoint,' there is, in fact, 'a terrible moral in Dorian Gray.' A few years later the book and the aesthetic/moral dilemma it presented became issues in the trials occasioned by Wilde's homosexual liaisons, trials that resulted in his imprisonment.
• Napoleon Hill, America's most beloved motivational author, devoted 25 years to finding out how the wealthy became that way. After interviewing over 500 of the most affluent men and women of his time, he uncovered the secret to great wealth based on the notion that if we can learn to think like the rich, we can start to behave like them. By understanding and applying the thirteen simple steps that constitute Hill's formula, you can achieve your goals, change your life and join the ranks of the rich and successful.
In this updated edition, Dr. Arthur R. Pell provides examples of men and women who, in recent times, exemplify the principles that Hill promulgated. With the success stories of top achievers such as Bill Gates and Steven Spielberg, he proves that Hill's philosophies are as valid today as they were then.
If you're looking to become the next Bill Gates, this is the book for you. |
Church legally defined
From PreparingYou
Jump to: navigation, search
Jesus went to the government Temple to teach the ministers and the people about Pure Religion and to end the Corban of the Pharisees that made the word of God to none effect. audio.
The word Church
People use the word Church all the time, but it may mean different things to different people and different things at different times.
When you think of a church are you thinking of a place or building as if it was somewhere that Jesus went to?
Was there a place called a church during Jesus' time here on earth?
During the time of Jesus, there was something called a synagogue or a temple. Originally neither a synagogue nor a temple were buildings.
At the first synagogue, Jesus went to, they tried to throw Him over a cliff.
Have you ever thought or considered the fact that the Temples were actually government institutions?
What were the actual purposes of the different temples?
What were the functions and services in society were these temples providing?
What was the Christian conflict with the Temples of Rome?
Why did Jesus drive out the moneychangers from the temple?
What were the apostles doing when they worked daily in the temple?[1]
After the Temple in Jerusalem was destroyed how was the early Church still able to provide a daily ministration?
The word Church is often translated from the Greek word ekklesia, which meant "called out". Moses had called out the Church in the wilderness.
Jesus also called men out to be "in the world but not of the world". He appointed those men to be His government, but they were not to be like the governments of the other nations who exercise authority one over the other.
These ministers appointed by Christ worked daily in the temple, providing government services like welfare for the people, by the charity of the people. This was, and still is, the temple of His body ... the body of Christ who continues doing 'greater works than these'.[2] And in Acts 2, it says they went from house to house; they were rightly dividing both bread and the Word in a system of Daily ministration through faith, hope and charity by The Way of the Perfect law of liberty.
The world which these "called out" ministers were "not of" also had ministers, and they called themselves Benefactors, but they exercised authority one over the other. They used force to extract funds from the people to provide another type of welfare that included free bread and provisions. They were able to do this because the state had taken on the role of being the Father of the people in what was called the Roman Imperial cult. Jesus had said that they should call no man Father upon the earth and that the government He appointed was not to operate like the governments of the other nations who exercised authority in their own system of government-provided Corban.
That system used by Rome and the Pharisees was in conflict with Jesus and John the Baptist.
Legal definition
The Church can only be defined by Christ, but a legal definition is available:
The Church as "A body or community of Christians, united under one form of government..." Anyone claiming to be a Christian should be sitting down in free assemblies with ministers who are servants of the people, taking care of one another through charity or else they are not really seeking the kingdom of God nor His righteousness. That was the conflict between the kingdoms of the world and the early Church. Nimrod to Now Series: Part 10: The Church] ~8 min
Black's Law Dictionary 3rd, 4th, 5th, 6th... eds.
The term church may be used in several senses.
While many institutions may call themselves a church, to meet consistent legal definition it must be established by Jesus Christ.
The Church as a body is a corpus or corporate, and it would not include the people, except through charity.
The church as a community does include the people or laity in a communion of that charity.
You cannot get near God without what is sometimes called Sacrifice.
The manner of that sacrifice is where the Christian conflict is seen.
Related definitions
Bouvier's Law Dictionary 1856 Edition
CHRISTIANITY. The religion established by Jesus Christ.
2. Christianity has been judicially declared to be a part of the common law of Pennsylvania; 11 Serg. & Rawle, 394; 5 Binn. R.555; of New York, 8 Johns. R. 291; of Connecticut, 2 Swift's System, 321; of Massachusetts, Dane's Ab. vol. 7, c. 219, a. 2, 19. To write or speak contemptuously and maliciously against it, is an indictable offence. Vide Cooper on the Law of Libel, 59 and 114, et seq.; and generally, 1 Russ. on Cr. 217; 1 Hawk, c. 5; 1 Vent. 293; 3 Keb. 607; 1 Barn. & Cress. 26. S. C. 8 Eng. Com. Law R. 14; Barnard. 162; Fitzgib. 66; Roscoe, Cr. Ev. 524; 2 Str. 834; 3 Barn. & Ald. 161; S. C. 5 Eng. Com. Law R. 249 Jeff. Rep. Appx. See 1 Cro. Jac. 421 Vent. 293; 3 Keb. 607; Cooke on Def. 74; 2 How. S. C. 11-ep. 127, 197 to 201.
Bouvier's Law Dictionary 1856 Edition
CHURCH. In a moral or spiritual sense this word signifies a society of persons who profess the Christian religion; and in a physical or material sense, the place where such persons assemble. The term church is nomen collectivum;[3] it comprehends the chancel,[4] aisles, and body of the church. Ham. N. P. 204.
2. By the English law, the terms church or chapel, and church-yard, are expressly recognized as in themselves correct and technical descriptions of the building and place, even in criminal proceedings. 8 B. & C. *25; 1 Salk. 256; 11 Co. 25 b; 2 Esp. 5, 28.
3. It is not within the plan of this work to give an account of the different local regulations in the United States respecting churches. References are here given to enable the inquirer to ascertain what they are, where such regulations are known to exist. 2 Mass. 500; 3 Mass. 166; 8 Mass. 96; 9 Mass. 277; Id. 254; 10 Mass. 323; 15 Mass. 296 16 Mass. 488; 6 Mass. 401; 10 Pick. 172 4 Day, C. 361; 1 Root 3, 440; Kirby, 45; 2 Caines' Cas. 336; 10 John. 217; 6 John. 85; 7 John. 112; 8 John. 464; 9 John. 147; 4 Desaus. 578; 5 Serg. & Rawle, 510; 11 Serg. & Rawle, 35; Metc. & Perk. Dig. h. t.; 4 Whart. 531.
The Church Defined in the World
The acceptable definition of the Church offered in the world is found in Black’s Law Dictionary:
This “one form of government” has been a predominant form of government for society. It is a unique form of government in that it maintains freedom of the individual by placing the responsibilities upon the people and ministers as individuals, and recognizes offices of service only, dependent on the way of Christ.
The Church can only be as generous as the hearts and minds of the people in the exercise of the charity of the people. This is the thanksgiving[6] of Christ. This is done by the practice of charity in the granting of the substance needed for maintaining the daily ministration. This is a system based on hope not entitlements. This giving to Christ through ministers of the Church creates sacred purpose trust between the People and God. The gift given upon the living altars literally belongs to God. It is important that the overseers of such trust also belong to God to maintain its exclusive nature. Of the Levites, who could own no property in their own name, God said they are mine. Also, the apostles and other ordained ministers were called bondservants. They were also required to sell all they have as a personal estate and own all things in common. This is called today a vow of poverty.
The Church is “not of the world” although it is “in the world”. The ordained ministers cannot be “citizens entitled” (to social benefits) of any other government. The Church is one form of government and it is separate from other forms of government, especially authoritarian benefactors. It is literally separate, even foreign, to other forms of authoritarian benefactors. This doctrine is magnified in the statement by our founder, Jesus the Christ, that we are to be in the world but not of it.[7]
The ordained Church is established by Christ the king and not by any other power of incorporation.[8] As an example, according to the Oregon Department of Justice, “All corporations organized under the laws of the state of Oregon for charitable purposes must register. This includes, but is not limited to, any corporation registered with the Oregon Secretary of State as a nonprofit, public benefit corporation.” [9]
This clearly allows for the presumption that a body corporate organized under the laws of God and the authority of Jesus Christ and not of the State, as a nonprofit, public benefit corporation, does not have this same registration requirement.
The same source goes onto say, “Charities operating in Oregon will likely maintain relationships with at least three government entities: the Internal Revenue Service, the Corporation Division of the Oregon Secretary of State’s Office, and the Charitable Activities Section of the Oregon Department of Justice. The Internal Revenue Service will provide an initial determination of tax exemption, and require the filing of informational returns each year.”
Many Churches assume that this is the case with them because they are to be charitable institutions but the question arises who may determine who the Church is, or is not?
Join The Living Network of The Companies of Ten
Contact Minister | Fractal Network | Audacity of Hope | Network Links
Early Church | Religion | Corban | Storehouse | Daily ministration |
The Way | Rituals and ceremonies | The Blessed Strategy |
The Free Church Report | Church Study course online | Unchurched |
Ministers | Christians | Modern Christians | Christians check list |
Theology | Lady Godiva | Whosoever believeth | Worship | Salvation |
Christian conflict | Fathers | Patristic | Ambrose | Jerome |
3. NOMEN COLLECTIVUM. This expression is used to signify that a word in the singular number is to be understood in the plural in certain cases.
The term nave is from navis, the Latin word for ship, an early Christian symbol of the Church as a whole, with a possible connection to the "ship of St. Peter" or the Ark of Noah.]
5. Black's Law Dictionary 3rd ed. Page 325. also 4th, 5th 6th Ed.
6. The Greek word for thanksgiving is Eucharist |
User experience research might be a relatively new profession, but the work behind the role has always been important to the development of new products and services. From companies asking customers for feedback to developers observing how their products are used to designers relying on their own experiences and intuition in order to inform their creative decisions, data from user testing and understanding of human behavior have shaped how things are made, bought, sold, and shared.
Because of the importance of this work, user experience researchers play an increasingly important role in organizations, helping stakeholders understand user behavior, addressing usability problems, and assisting in the design process of new products or services.
Trained UX researchers have a variety of tools at their disposal to help take the guesswork out of UX design. Their methods generally fall into one of two categories:
• Qualitative research, which helps them understand user attitudes and behaviors; and
• Quantitative research, which helps them understand the statistical significance behind experiences
One way to think of qualitative research is that it answers the “why?”—why are users struggling to complete tasks? Why does the number of users fall off after a certain time? Why is the conversion rate so low?
In comparison, qualitative research helps in answering the question “How much and how many?”—it’s based on math, web analytics, and big data, and is primarily focused on measuring the size and scale of a problem.
Most UX researchers are capable of working with both qualitative and quantitative research methods, although it’s not unusual to specialize in one or the other.
What Is Qualitative UX Research?
Qualitative research, also referred to as “qual,” is the process of collecting and analyzing non-numerical data to understand user attitudes and motivations, and developing an in-depth understanding of a problem. Using qualitative research methods, UX researchers try to answer questions such as, “why?” and “how?”
Qualitative research generates insight into how users experience a product or service, and researchers will often use tools such as open-ended customer surveys, focus groups, interviews, and observational field studies.
Unlike quantitative UX research, qualitative research doesn’t require as many respondents because, instead of focusing on statistical significance, it seeks to understand the experiences of users and formulate theories or hypotheses that can then be tested.
What Is Quantitative UX Research?
Quantitative research, also referred to as “quant,” is the process of collecting and analyzing numerical data to identify patterns and averages, measuring data points, and producing results that, as the name suggests, are quantifiable. Using quantitative data, UX researchers answer questions such as “how many?”, “how much?”, and “how often?”
Quantitative research provides hard data, and researchers working with quantitative methods often use resources like Google Analytics to track information such as user clicks, completion rates, and conversion rates, time spent on a platform, and the results from A/B testing, etc.
In order for this type of research to be effective, it requires a large number of research participants so that enough data points can be generated and conclusions can be drawn about the statistical significance of the findings.
Qualitative vs. Quantitative UX Research Methods: Which Should You Choose When?
Both qualitative and quantitative user research methods have their own strengths and weaknesses, and it’s important to choose the right method in order to maximize relevant data collection and glean the most useful qualitative and quantitative insights.
Qualitative user research methods are best used to discover problems, investigate what is causing those problems, and find ways to fix them. Research methods such as focus groups, interviews, open-ended surveys, and observations can be done with as few as eight research participants and can help researchers identify problems that might not be evident from quantitative studies and big data. For example, an interview can shed light on why a particular web feature isn’t as popular as the design team thought it would be; an open-ended survey or observational study can explain why users stop short of checking out on an e-commerce platform, and small focus groups can tell researchers the reasons for a high or low click-through rate.
Quantitative user research methods are best used to measure usability metrics. Research methods such as analytics, A/B testing, quantitative surveys, and quantitative usability testing can help researchers determine the priority or scale of a problem. For example, where a qualitative interview might reveal that a few people don’t click through to sign-up for service because they find the navigation inaccessible, quantitative research helps determine what proportion of users are affected by a particular problem and whether it’s widespread enough to warrant a design overhaul. Quant research is ideal for benchmarking and drawing comparisons, helping companies differentiate between trends and outliers.
How Is Data Collected in Qualitative and Quantitative UX Research Methods?
User experience researchers will often employ both qualitative and quantitative research methods in order to provide the most accurate assessment possible of how users are experiencing a product or service. Below are some of the common research methods used.
Quantitative methods
1. Technical analysis. One of the most common types of quantitative user research is the process of diving into user analytics to see whether any problems show up in the data. For example, Google Analytics collects troves of data ranging from when people visit a website to the time spent on a site, pages visited, referral details, task times, browser type, scroll depth, and errors, when users try to fill out a form. From this information, UX researchers can quickly identify trends and pinpoint where a problem might exist.
2. Mouse tracking analysis. Mouse tracking follows a user’s movement on a website. With enough research participants, this methodology can be used to generate a heat map that shows parts of a website where there is lots of activity and parts that get ignored. This is useful in identifying basic usability issues, such as whether users are mistaking certain graphics for clickable buttons, or whether they are trying to enter text into non-existent fields. It can also help researchers determine scroll depth—understanding how far most users scroll can help them figure out where they need to place the most important information.
3. Funnel analysis. Similar to technical analysis, funnel analysis focuses on how many users complete a workflow and drop-off percentages for each stage of the funnel. For example, when applied to an e-commerce platform, the funnel may include steps such as visiting the shopfront, browsing, adding items to a virtual shopping cart, filling out a check-out page, and completing an order. Funnel analysis allows UX researchers to zero in on where users might be falling off, which can lead to more specific analysis.
4. User testing. This method, which invites real users to offer feedback, can be used to collect both qualitative and quantitative data. In the latter, a researcher might record a user as they perform certain tasks, measuring how long it takes for them to complete a task and noting where a user runs into problems. The quantitative data collected can be used for benchmarking and determining whether a redesign is necessary, or whether recent changes made are an improvement.
Qualitative methods
1. User interviews. One-on-one interviews or focus groups with users are an effective way of gathering qualitative data that sheds light on user attitudes and behaviors. Where quantitative methods might pinpoint that a problem exists in the user funnel, speaking directly with users can explain the nature of that problem—are shoppers stopping short of checking out because of a glitch? Does the shipping cost cause them to change their mind? Is there something about the check-out page’s design that disrupts their shopping experience? Interviews give researchers the opportunity to go deep into the user experience.
2. User surveys. Surveys can be used in both qualitative and quantitative user research depending on the nature of the questions. Open-ended surveys are often used in qualitative research because the questions tend to be broad and invite users to go into detail about their experiences. In this sense, they are similar to user interviews and focus groups, with the added benefit of researchers being able to send them to a large number of people.
3. User testing. Where quant user testing might focus on how long it takes users to complete tasks, qualitative user testing asks users to narrate their experience as they navigate a website, platform, or app, offering their thoughts about how difficult it is to complete a task and how they perceive the website (e.g. Are they trying to click on a graphic because they think it’s a URL? Are they abandoning their shopping cart because of load times? Do they keep canceling a transaction because they are accidentally interacting with pop-ups?)
4. Diary studies. Diary studies track user behaviors over a period of time and allow researchers to collect data even when they are not actively interviewing or recording a user. Some of the upsides of diary studies are that they minimize the bias that comes with a researcher looking over a participant’s shoulder, they allow the user to participate in the study in their own time, and they provide data points collected from a longer period of time. Possible use cases of diary studies include having participants track each time they use an app to order take-out—what was their motivation for using Seamless or Grubhub instead of calling the restaurant directly? Why did they decide to get takeout instead of dining in or doing an in-restaurant pick-up? Participants might also track every time they order running shoes from a retailer—was the purchase inspired by a seasonal change? Does it align with a new year’s resolution? Is it intended as a gift? Understanding these kinds of user motivation can help a business better serve its customers.
4 Common Mistakes In Qualitative and Quantitative UX Research
Qualitative and Quantitative UX Research: Common Mistakes
User experience research can play a critical role in guiding the development of products and services toward success. But the wrong methodology, a biased researcher, or lack of data can also lead design and development teams astray. Some of the more common mistakes include:
1. Not having enough information. Quantitative UX research requires a large number of participants in order to generate enough data to show an accurate, statistical significance. If there are too few participants, it runs the risk of skewing research results. A similar idea applies to qualitative UX research—although fewer participants are required, it’s important for researchers to not assume that the few participants interviewed represent all users because that can also skew research findings and recommendations.
2. Asking leading questions. While researchers do their best to be as unbiased as possible, sometimes bias can sneak into a study through the form of leading questions. For example, if a qualitative UX researcher begins with a hypothesis that an e-commerce platform’s conversion is low because the site’s design is confusing, they might make the mistake of asking participants “What do you find confusing about this page?”, which would prompt the respondent to think negatively about the page. This kind of biased questioning can lead to researchers getting a result that simply reinforces their hypothesis, without actually addressing the real problem.
3. Using the wrong method. There’s a time and place for every kind of UX research methodology, but choosing the wrong one can lead to unusable results. For example, if an app user agrees to complete a survey on their phone, it’s better to keep the survey short and sweet because a person responding on a mobile device probably doesn’t want to spend too much time answering questions. Saddling a respondent with too many questions could result in user frustration, which could prompt the participant to input random responses just to get it over with.
4. Asking the user what they want. There’s an episode of The Simpsons where Homer is given free rein to design his dream car. When the carmaker asks him what he wants, he lists every feature under the sun. The result is The Homer—a disastrous invention that bankrupts the fictional automaker. UX researchers can run into a similar risk when they ask users what they want. Instead, researchers should come in with a hypothesis that they can test with participants, keeping their research as focused as possible.
Qualitative vs. Quantitative Research Methods: Which Is Better?
Instead of thinking of qualitative and quantitative research as being in competition with each other, it’s more accurate to think of them as serving different purposes. For example, if an organization wants to better understand the motivations behind user behaviors and attitudes, which in turn drive time spent on a page, devices used, referral links clicked, or user drop-offs, qualitative user research methods such as interviews and open-ended surveys are more likely to yield in-depth insights.
Meanwhile, if an organization wants to quantify the user experience and measure load times, conversion rates, average time spent on pages, the kind of devices or browsers in use, referral links, or user drop-offs, quantitative user research methods such as analytics and user testing are more conducive to getting useful and relevant results.
Why Use Both Qualitative and Quantitative Research Methods?
It’s not unusual for UX researchers to use both qualitative and quantitative research methods because they often complement each other. Quantitative research might reveal that a certain design becomes unusable at a certain point, but qualitative research is then required to drill into the kinds of problems users encountered. Quantitative research can show that a particular problem isn’t a random outlier and is statistically significant enough to warrant fixing, but qualitative research will shed light on what changes should be made to improve the user experience.
“It is always good to use both qualitative and quantitative,” according to UX researcher, Dominic Rogers. “By using both, you can identify [a] hypothesis and then find measures and metrics that can then prove that hypothesis.”
We hope this blog post would help you in selecting research methods for your future study/project depending on the objectives, requirements, settings, and constraints. If you’re interested in learning more about qualitative and quantitative research methods and build a career in UI/UX design, check out Springboard’s UI/UX design career track. This 9-month program offers comprehensive learning across all the required UI/UX design skills along with a 1:1 mentorship, personal career coaching, and did we mention a job guarantee? Apply today!
This post was written by Tracey Lien. |
You are here
The first comprehensive single-cell atlas of human teeth
ZURICH (CH), May 2021 — During the last 30 years, medical and dental research has attracted a large number of scientists and practitioners working on aspects of high medical relevance that involve a combination of genetic and tissue regeneration approaches. These developments in stem cell and tissue engineering have provided medical and dental researchers with new insights and given rise to new ideas as to how everyday clinical practice can be improved. Many research groups are dealing with questions like: How can we help injured tissues and organs heal? Can lost tissue be regenerated? How can we create solid protocols that apply across all stem cell therapies?
A team of researchers led by Thimios Mitsiadis, D.D.S., Ph.D., professor at the Institute of Oral Biology at the University of Zurich, and Andreas Moor, M.D., Ph.D., professor at the Department of Biosystems Science and Engineering at ETH Zurich, has now created the first-ever single cells atlas of the human teeth. By using advanced single-cell sequencing technology, they were able to distinguish every single cell that is part of the dental pulp and the periodontium.
“Our study provides an unprecedented understanding of the composition of these two tissues, which are subject to tooth-specific and bacterially linked pathologies such as caries and periodontitis. Both the dental pulp and the periodontium contain stem cells that possess a great regenerative potential,” stated first co-author Pierfrancesco Pagella, Ph.D., senior researcher on Dr. Mitsiadis’ team.
The study identified great cellular heterogeneity in the dental pulp and the periodontium. Unexpectedly, the team found that the molecular signatures of the stem cell populations were very similar. “We think their different behavior is possibly brought about by their distinctive microenvironment,” said Dr. Pagella. The findings suggest that the microenvironmental specificity is the potential source of the major functional differences of the stem cells located in the various tooth compartments.
New cell-based dental therapies possible
The study demonstrates the complexity of dental tissues and represents a major contribution to a better understanding of the cellular and molecular identity of human dental tissues. “Single-cell approaches can help us understand the interactions of dental pulp and periodontal cells involved in immune responses upon bacterial insults. Therefore, single-cell analysis could be useful for diagnostic purposes to support the early detection of dental diseases,” explained Dr. Mitsiadis, who was also last author of the paper. The findings thus open up new avenues for cell-based dental therapeutic approaches.
According to Dr. Mitsiadis, these advances in dental research can lead to more appropriate therapies, successful regeneration of damaged parts of the teeth and even more precise diagnostic tools in case of dental pathologies. “These innovations are the consequence of the fusion between bioinformatics and modern dentistry,” he concluded.
Learn more:
DOI: 10.1016/j.isci.2021.102405 |
How to help in the George Floyd protests and beyond
Worldwide demonstrations against police violence are being met with brutal violence and political indifference. Here’s how to make a difference right now, and when the world is no longer watching.
June 02, 2020
How to help in the George Floyd protests and beyond KEREM YUCEL/AFP via Getty Images
Sunday was the 99th anniversary of the beginning of the Tulsa Race Massacre: on May 31, 1921, white rioters took to the streets of Tulsa, Oklahoma to raze a section of the town known as "Black Wall Street," where middle-class Black families lived and worked. Hundreds were killed, lynched on bridges, burnt in the streets, or cut down with machine guns. Thousands were left homeless. Seventy years later, a report commissioned by the state of Oklahoma would conclude that city officials had deputized many of the white men before they brought death to Tulsa's Black population, making them de facto agents of the state.
The anniversary has taken on new significance as peaceful protests continue around the world. These marches were sparked by the murder of George Floyd, a 46-year-old Black man killed by Minnesota police officer Derek Chauvin. Hundreds of thousands of people in cities around the world, from London to Amsterdam to Toronto and all across the United States, chant Floyd's name as they take a non-violent stand against police brutality and systemic racism in their countries. In the United States, these demonstrations have been met by a show of police force unprecedented in scale in modern times.
As each day unfolds, troubling clips from each protest are uploaded, shared, and go viral. Over and over, we see police forces displaying its capacity for violence with a demonic vibrance: they emulate a white supremacist killer in Charlottesville using an automobile to disperse a crowd, they pluck people off the street unprompted, shoot journalists with less-lethal rounds. For me, the most disturbing video that did not include any physical violence was one of a heavily armed officer bouncing on his feet as he clutched his weapon and licked his lips at the prospect of bloodshed.
Media can continue to blast out copaganda of officers kneeling with protestors in ostensible displays of solidarity, or focus on isolated instances of looting, but it all seems a bit feeble; it feels like we go past the point of no return several times each day. If this moment is to be an inflection point for real, positive change, it's going to take a lot of work and organizing to see it through. If that sounds good to you, we've collected some resources below.
Donate to bail funds for protestors
Organizations in cities across the United States have set up bail funds for protestors detained during marches. Deciding which ones to contribute to can be tough, but ActBlue has created a helpful option. This fundraising page offers donors around the world the option of splitting a single donation between 38 different groups raising bail funds. Alternatively, you can decide just how much goes where if you want to contribute to a handful of cities. More funds, as well as links to legal help in different American cities, can be found in this Google Document compiled by Instagram's @patiasfantasyworld.
And of course, if you go out to protest, make sure you stay safe.
Urge institutions and politicians to divest from police
Last Thursday, the University of Minnesota announced that it would "no longer contract with the Minneapolis Police Department for additional law enforcement support" or use the department's "specialized services" for events at the campus. To put pressure on the police, they need to be isolated not just politically but financially — @_erichu on Instagram has offered a simple guide for New York City residents to cut the NYPD's funding. The institutions and officials may change from city to city, but the tactics are similar: find out when your city is passing a budget, and organize to prevent it from passing without massive cuts to police.
You might ask what the endgame is. The abolition of police? Well, the Minneapolis-based activist group MPD150 has assembled a short explainer on why that's not such a radical idea. They've got more resources, including a reading list, here. An exciting and plausible future for Black communities without police is described in-depth in the manifesto Let Your Motto Be Resistance: A Handbook on Organizing New Afrikan and Oppressed Communities for Self-Defense.
There's also personal divesting you can do in your everyday life. For example, is that Amazon Prime account really worth supporting a company that is licensing facial recognition software to police around the United States?
Do the reading
For white people interested in becoming allies, there are thousands of books by Black authors that are incredibly relevant to this moment, whether it's science fiction that imagines a tenable future or non-fiction that cuts to the core of our current problems. In the latter sphere, Ibram X. Kendi, author of How to Be an Anti-Racist, has compiled a list of books spanning different topics that further the cause of anti-racism. As for sci-fi, start with Octavia Butler and N. K. Jemisin, throw on some Sun Ra, and go from there.
Keep that same energy
White people: what's your plan for when the protests fade from the news? What does normal look like to you? Do you have a stronger desire to escape the anxiety and discomfort you feel when you see videos of Black death and police violence than you do to actually try to stop that death and violence from happening?
June is Pride Month, a celebration that would not have been created without the radical leadership of Black transgender woman named Marsha P. Blackburn, who was on the frontlines of the Stonewall Uprising. At the end of the month, will you have donated any money to the Marsha P. Johnson Institute, or the Black Trans Homeless Fund?
You might have a fear that any activism you share on social media could be perceived as self-gratifying, or more for clout than any sense of solidarity. For tips on how to be an effective ally, Mireille Cassandra Harper has "10 Steps for Non-Optical Allyship."
How to help in the George Floyd protests and beyond |
vim modes - the three modes of vi/vim
The vi editor can be a little difficult to learn, so I've been writing some vi tutorials here recently. One of the first things to know about vi is that it typically functions in three different modes:
1. Command mode
2. Insert mode
3. Last line mode
Here's a quick description of each vi mode.
vi command mode
When you first start editing a file with the vi editor you will be in vi command mode. In this mode you can issue many vi commands, including commands like insert, append, and delete, and other search and navigation commands that let you move around your file.
Possibly the most important thing to know is that when you're in command mode you can't insert text immediately. You first need to issue an insert, append, or open command to insert text. These commands are actually fairly simple, and I've documented them in this vi insert commands tutorial.
vi insert mode
Once you issue a vi insert, append, or open command, you will be in vi insert mode. If you're working with a modern vi or vim implementation, your vi editor is typically configured to show the current mode of operation, so when you go into insert mode, you'll see a text string like this on the last line of your vi editor window:
-- INSERT --
At this point you can (a) type text into your file and (b) use the arrow keys to navigate around your file just as you would do with any other text editor. (There may be some complications with older Unix systems, like HP-UX systems, but this statement is generally true.)
A very important concept to know is that when you're in vi insert mode, but you want to switch back to vi command mode, you easily move back to command mode by pressing the [Esc] key. This command is so important, I'll show it again:
This command is very common, and I often see expert vi users press the [Esc] key several times in a row. They usually do this (a) to be sure they hit the key and they're really back in command mode, and (b) to hear the beep from the computer, which happens when you press the [Esc] key when you're already in vi command mode. This seems to serve as a form of feedback which assures them that they're in command mode.
vi last line mode
The last vi mode is known as vi last line mode. You can only get to last line mode from command mode, and you get into last line mode by pressing the colon key, like this:
After pressing this key, you'll see a colon character appear at the beginning of the last line of your vi editor window, and your cursor will be moved to that position. This indicates that vi is ready for you to type in a "last line command".
From this vi command prompt you can do all sorts of really amazing things. You can do simple things, like quitting your vi session, like this:
or this:
or this:
From last line more you can also perform some amazing vi search commands or vim search and replace commands. Another cool thing is that you can issue Linux or Unix commands from within your vi editor session, like this simple ls command:
It's really handy sometimes to be able to stay in your vi editing session but still be able to run Unix or Linux commands.
And finally, you can also issue many vi configuration commands, such as this command that tells vi to show lines numbers in your current editor window:
:set shownumber
There is a ton of power in this vi last line mode, and I've tried to share pieces of this power in a variety of different vi tutorials. (Just search this blog for "vi" or "vi editor" and you'll find a wealth of vi tutorials.)
One last note about the vi last line mode: If you're in last line mode, and you want to switch back to command mode, there are several different ways to do this. For consistency, one way to do this is to press the [Esc] key twice, like this:
(This is consistent with the method of moving from insert mode back to command mode, except you have to press the [Esc] key twice.)
A second way is to press the [Backspace] key until anything you typed and the initial ":" character are gone. At this point you'll be back in command mode.
Finally, if you haven't typed anything at all, and you're just looking at the ":" prompt on the last line, you can just press [Enter], and you'll be placed back in vi command mode.
Last note: Showing your current vi mode
As a final vi/vim note, if you're working on an older Unix system, or your current system doesn't show the "-- INSERT --" prompt when you switch to insert mode, you can issue a vi configuration command to show the current mode of operation. This is a typical "vi set" command, and you issue it like this:
:set showmode
As you can see, this is a vi last line mode command, and it tells vi to show its current mode of operation. Really, all this does is show the "-- INSERT --" line when you're in vi insert mode, but that little piece of information is surprisingly helpful.
This little piece of information makes it easy to distinguish the three vi modes, because in insert mode you see that text on the last line; in command mode you see nothing on the last line; and in last line mode you see the ":" on the last line.
If you find that you need to issue this command, I need to note that it only takes effect for your current vi editing session. If you want to have vi always work like this, you'll need to save this command in a configuration file, which I begin to describe in this vi vimrc map macros tutorial. |
What my students taught me about reading: old books hold new insights for the digital generation
Sophie Elvis/Unsplash
Kate Flaherty, Australian National University
Every year about 150 students enrol in the introductory English literature course at the Australian National University, which I teach. The course includes works by Shakespeare, Austen, Woolf and Dickens.
I know what these books did for me as a student 20 years ago, but times have changed. I am curious to discover what reading these old books does for young people today.
Last year, 2019, saw the first cohort of students who were born in or beyond 2000 – the so-called digital generation. These students have grown up in a world where you can read a book without holding the physical object.
Read more:
Love, laughter, adventure and fantasy: a summer reading list for teens
I decided to introduce the option of a bibliomemoir – an increasingly popular form of creative non-fiction – into their final year assignment. This would allow me to tease out the particular connections students were making between literature and their own lives.
My first year students have grown up in a world where you can read a book without holding the physical object.
Dexter Fernandes
The idea for a bibliomemoir was sparked in a workshop run by our then writer-in-residence, celebrated Australian teen novelist and author of Puberty Blues, Dr Gabrielle Carey.
Carey described bibliomemoir as a piece of writing that shows literary criticism is “best written as a personal tale of the encounter between a reader and a writer”.
Written with flair and precision the students’ bibliomemoirs revealed the formative effects of reading on their lives. Many of their insights related directly to challenges of growing up in the digital age.
They wrote about responding to distraction and cultivating compassion, connection, concentration and resilience.
Why a bibliomemoir?
A bibliomemoir might be an account of how one book or author has shaped a person’s life. Or it might be the memoir of a life structured by reading books. In Outside of a Dog, for instance, Rick Gekoski tells his life story through 25 books that have influenced him, including authors from Dr Seuss to Sigmund Freud.
Gekoski pointed out in an interview that bibliomemoir reveals the formative effects of reading. I saw immediately that I could adapt bibliomemoir to help me understand how my students saw books as shaping their lives.
Read more:
So, for the final essay of the introductory English course, Carey and I designed a new essay question. It invited students to write a brief bibliomemoir based on one of the novels in the course. Like a traditional essay this would allow me to evaluate their skills of written expression, argument and technical analysis of literary language.
Students who write the bibliomemoir can still be assessed on technical aspects of their writing style.
Unsplash/Christin Hume
Unlike a traditional essay, it would allow me to see inside their individual reading experience. I would be able to understand how these books were influencing my students’ view of the world and their understanding of themselves.
Here’s what the students wrote
One student shared how reading Virginia Woolf’s Mrs Dalloway prompted a conversation with his flatmate about experiences of digital distraction and strategies for concentration:
Soon we came to the subject of Big Ben, which Woolf uses as a motif through the book. [My friend] said that the way Big Ben interrupted the characters’ thoughts reminded her of how a notification from your phone can interrupt your stream of thought.
I had also noticed the motif of Big Ben, however I appreciated it as an element of structure and pacing in a book that had no chapters, in fact I had sometimes structured my reading sessions around the ringing of Big Ben in the book.
Another student, reading of the mental torment experienced by the returned soldier Septimus in Mrs Dalloway, gained a new perspective on people who don’t seem to fit in. Reflecting on her initially judgemental perception of a dishevelled man boarding her bus the student asked: “was he so different from Septimus? Wise and lost?”.
She then explained she gained a new and unexpected perspective on life:
[Woolf] gave me glasses I never knew I needed – lenses smeared with multiple fingerprints that enhanced rather than hindered the view.
She concluded that
to be a reader is to suspend rigid views, to consider and honour the perspectives of the characters one meets.
A third student reflected on the challenges of reading itself, and on the rewards of persisting when structure and characterisation are unfamiliar. The student said she set out wanting to be an “inspired reader” but confessed to feeling “frustrated” by Woolf’s “merciless indifference” to her characters in Mrs Dalloway.
In noting this frustration, the student had registered the novel’s lack of clear protagonist or plotline. The novel is difficult to read because, while we do see individual characters trying to interpret their lives as coherent stories, Woolf refuses to impose an artificial grand narrative.
After sticking with it, however, the student recognised the novel’s achievement:
There lies the beauty of it: the ordinary day captured in time and words as a novel.
This student’s bibliomemoir was a story of the dividends paid by sustained concentration and a flexible mindset.
One student wrote about how the ringing of Big Ben in Mrs Dalloway was similar to a phone alert.
Nick Fewings/Unsplash
A fourth student used the bibliomemoir to analyse how Jane Austen’s Northanger Abbey showed her the value of observing people closely, and has equipped her with resilience as a student facing the challenge of dyslexia:
I could not work out how to do the exact things my teachers wanted me to do. What I could do was learn to understand my teachers. By learning to watch them, like Austen watched people, and learning to understand them as people, I began to understand how to jump through their hoops.
While she couldn’t quantify the competencies reading books had given her, the student said she just knew books had formed who she was:
I cannot list the strategies that I employ when reading and writing […] I give all the credit to reading literature, to books like Northanger Abbey and writers like Jane Austen and so volunteer myself as an example of how reading literature is valuable in our era.
These examples revealed some of the many reasons new readers, even of the digital age, return to old books and old ways of reading them. The readers expressed an urgency for connection with narratives more complex than a news feed.
Read more:
If you can read this headline, you can read a novel. Here’s how to ignore your phone and just do it
They recognised that truthful self-reflection can be prompted by sustained engagement with fiction. They proved that connection with others, compassion and resilience are nurtured through a deepened understanding of story in the study of literature.
I can only conclude that for this group of readers, taking a book into their hands is a very deliberate act of identification with the bigger, shared story of reading.The Conversation
Kate Flaherty, Senior Lecturer (English and Drama) ANU, Australian National University
Why do teachers make us read old stories?
Teachers often assign older books.
Elisabeth Gruner, University of Richmond
Why do teachers make us read old stories? Nathan, 12, Chicago, Illinois
There are probably as many reasons to read old stories as there are teachers.
Old stories are sometimes strange. They display beliefs, values and ways of life that the reader may not recognize.
As an English professor, I believe that there is value in reading stories from decades or even centuries ago.
Teachers have their students read old stories to connect with the past and to learn about the present. They also have their students read old stories because they build students’ brains, help them develop empathy and are true, strange, delightful or fun.
Connecting with the past and present
William Shakespeare wrote plays in the 1600s that are still read today.
Martin Droeshout/Yale University, CC BY
In Shakespeare’s “Romeo and Juliet,” for example, teenagers speak a language that’s almost completely unfamiliar to modern readers. They fight duels. They get married. So that might seem to be really different from today.
And yet, Romeo and Juliet fall in love and make their parents mad, very much like many teens today. Ultimately, they commit suicide, something that far too many teens do today. So Shakespeare’s play may be more relevant than it first seems.
Additionally, many modern stories are based on older stories. To name only one, Charlotte Brontë’s “Jane Eyre” has turned up in so many novels since its original publication in 1848 that there are entire articles and book chapters about its influence and importance.
For example, I found references to “Jane Eyre” lurking in “The Princess Diaries,” the “Twilight” series and a variety of other novels. So reading the old story can enrich the experience of the new.
Building brain and empathy
Reading specialist Maryanne Wolf writes about the “special vocabulary in books that doesn’t appear in spoken language” in “Proust and the Squid.” This vocabulary – often more complex in older books – is a big part of what helps build brains.
The sentence structure of older books can also make them difficult. Consider the opening of almost any fairy tale: “Once upon a time, in a very far-off country, there lived …”
None of us would actually speak like that, but older stories put the words in a different order, which makes the brain work harder. That kind of exercise builds brain capacity.
Stories also make us feel. Indeed, they teach us empathy. Readers get scared when they realize Harry Potter is in danger, excited when he learns to fly and happy, relieved or delighted when Harry and his friends defeat Voldemort.
Older stories, then, can provide a rich depth of feeling, by exposing readers to a broad range of experiences. Stories featuring characters from a diverse range of backgrounds or set in unfamiliar places can have a similar effect.
Lewis Carroll’s ‘Alice’s Adventures in Wonderland’ has been retold many times.
John Tenniel/Wikimedia Commons
Reading can be fun
Old stories are sometimes just so weird that you can’t help but enjoy them. Or I can’t, anyway.
In Charles Dickens’ “Great Expectations,” there’s a character whose last name is “Pumblechook.” Can you say it without smiling?
In Lewis Carroll’s “Alice’s Adventures in Wonderland,” a cat disappears bit by bit, eventually leaving only its smile hanging in the air. Again, new stories are also lots of fun, but the fun in the older stories may turn up in those new stories.
For example, that cat returns in many newer tales that aren’t even related to Alice in Wonderland, so knowing the cat’s history can make reading that new story more pleasurable.
I won’t deny that some old stories contain offensive language or reflect attitudes that we may not want to embrace. But even those stories can teach readers to think critically.
Not every old story is good, but when your teacher asks you to read one, consider the possibility that you might build your brain, grow your feelings or have some fun. It’s worth a try, at least.
Elisabeth Gruner, Associate Professor of English, University of Richmond
|
The secondary metabolism of bacteria and fungi constitutes a rich source of bioactive compounds of potential pharmaceutical value, comprising biosynthetic pathways of many chemicals that have been and are being utilized as e.g. antibiotics, cholesterol-lowering drugs or antitumor drugs. Interestingly, the genes encoding the biosynthetic pathway responsible for the production of such a secondary metabolite are very often spatially clustered together at a certain position on the chromosome; such a compendium of genes is referred to as a 'secondary metabolite biosynthesis gene cluster'. This genetic architecture has opened up the possibility for straightforward detection of secondary metabolite biosynthesis pathways by locating their gene clusters. In recent years, the costs of sequencing bacterial and fungi has dropped dramatically, and many genome sequences have become available. Based on profile hidden Markov models of genes that are specific for certain types of gene clusters, antiSMASH is able to accurately identify the gene clusters encoding secondary metabolites of all known broad chemical classes. antiSMASH not only detects the gene clusters, but also offers detailed sequence analysis. |
(Redirected from Position fix)
Geopositioning, also known as geotracking, geolocalization, geolocating, geolocation, or geoposition fixing is the process of determining or estimating the geographic position of an object.[1][2][3][4][5][6][7][8]
Principles of geolocation using GPS
Geopositioning yields a set of geographic coordinates (such as latitude and longitude) in a given map datum; positions may also be expressed as a bearing and range from a known landmark. In turn, positions can determine a meaningful location, such as a street address.
Specific instances include: animal geotracking, the process of inferring the location of animals; positioning systems, the mechanisms for the determination of geographic positions in general; internet geolocation, geolocating a device connected to the internet; and mobile phone tracking.
Geopositioning uses various visual and electronic methods including position lines and position circles, celestial navigation, radio navigation, and the use of satellite navigation systems.
The calculation requires measurements or observations of distances or angles to reference points whose positions are known. In 2D surveys, observations of three reference points are enough to compute a position in a two dimensional plane. In practice, observations are subject to errors resulting from various physical and atmospheric factors that influence the measurement of distances and angles.
A practical example of obtaining a position fix would be for a ship to take bearing measurements on three lighthouses positioned along the coast. These measurements could be made visually using a hand bearing compass, or in poor visibility, electronically using radar or radio direction finding. Since all physical observations are subject to errors, the resulting position fix is also subject to inaccuracy. Although in theory two lines of position (LOP) are enough to define a point, in practice 'crossing' more LOPs provides greater accuracy and confidence, especially if the lines cross at a good angle to each other. Three LOPs are considered the minimum for a practical navigational fix. The three LOPs when drawn on the chart will in general form a triangle, known as a 'cocked hat'. The navigator will have more confidence in a position fix that is formed by a small cocked hat with angles close to those of an equilateral triangle. The area of doubt surrounding a position fix is called an error ellipse. To minimize the error, electronic navigation systems generally use more than three reference points to compute a position fix to increase the data redundancy. As more redundant reference points are added the position fix becomes more accurate and the area of the resulting error ellipse decreases.
The process of combining multiple observations to compute a position fix is equivalent to solving a system of linear equations. Navigation systems use regression algorithms such as least squares in order to compute a position fix in 3D space. This is most commonly done by combining distance measurements to 4 or more GPS satellites, which orbit the earth along known paths.
Visual fix by three bearings plotted on a nautical chart
The result of position fixing is called a position fix (PF), or simply a fix, a position derived from measuring in relation to external reference points. In nautical navigation, the term is generally used with manual or visual techniques, such as the use of intersecting visual or radio position lines, rather than the use of more automated and accurate electronic methods like GPS; in aviation, use of electronic navigation aids is more common. A visual fix can be made by using any sighting device with a bearing indicator. Two or more objects of known position are sighted, and the bearings recorded. Bearing lines are then plotted on a chart through the locations of the sighted items. The intersection of these lines is the current position of the vessel. Usually, a fix is where two or more position lines intersect at any given time. If three position lines can be obtained, the resulting "cocked hat", where the three lines do not intersect at the same point, but create a triangle, gives the navigator an indication of the accuracy. The most accurate fixes occur when the position lines are perpendicular to each other. Fixes are a necessary aspect of navigation by dead reckoning, which relies on estimates of speed and course. The fix confirms the actual position during a journey. A fix can introduce inaccuracies if the reference point is not correctly identified or is inaccurately measured.
See alsoEdit
1. ^ "geopositioning". ISO/TC 211 Geolexica. 2020-06-02. Retrieved 2020-08-31.
2. ^ Keating, J.B.; United States. Bureau of Land Management (1993). The Geo-Positioning Selection Guide for Resource Management. BLM technical note. Bureau of Land Management. p. 5. Retrieved 2020-08-31.
3. ^ Nait-Sidi-Moh, A.; Bakhouya, M.; Gaber, J.; Wack, M. (2013). Geopositioning and Mobility. ISTE. Wiley. p. 71. ISBN 978-1-118-74368-3. Retrieved 2020-08-31.
4. ^ Zamir, A.R.; Hakeem, A.; Van Gool, L.; Shah, M.; Szeliski, R. (2016). Large-Scale Visual Geo-Localization. Advances in Computer Vision and Pattern Recognition (in Romanian). Springer International Publishing. ISBN 978-3-319-25781-5. Retrieved 2020-08-31.
5. ^ Progri, I. (2011). Geolocation of RF Signals: Principles and Simulations. Springer New York. ISBN 978-1-4419-7952-0. Retrieved 2020-08-31.
6. ^ Gentile, C.; Alsindi, N.; Raulefs, R.; Teolis, C. (2012). Geolocation Techniques: Principles and Applications. Springer New York. ISBN 978-1-4614-1836-8. Retrieved 2020-08-31.
7. ^ Laurie Tetley; David Calcutt (7 June 2007). Electronic Navigation Systems. Routledge. pp. 9–. ISBN 978-1-136-40725-3.
8. ^ B. Hofmann-Wellenhof; K. Legat; M. Wieser (28 June 2011). Navigation: Principles of Positioning and Guidance. Springer Science & Business Media. ISBN 978-3-7091-6078-7.
Further readingEdit |
Durkheim and the foundation of sociology
This psychic reality is sometimes although especially in Division referred to by Durkheim with the term conscience collective, which can alternately be translated into English as collective conscience or collective consciousness. Through these rituals, society maintains its existence and integrates individuals into the social fold, exerting pressure on them to act and think alike.
According to Durkheim, moral rules do not need to be blindly followed by individuals. The second class of social facts is of a morphological, or structural, order. In this sense, externality means interior to individuals other than the individual subject.
History of sociology
His writings on the subject, therefore, lack the consistency he would have liked to give them. Durkheim strongly refuted such accusations. Here Durkheim was not denying the idealistic nature of Roman Catholicism by contrast, for example, with Greco-Latin polytheism and Hebrew monotheism; rather, he was arguing that Protestantism stresses religious individualism and freedom of personal interpretation, while "all variation is abhorrent to Catholic thought" b: As time went on and specific gods were found to be more effective at producing military victory and economic prosperity, those gods grew in prominence and monotheism became more dominant.
Auguste Comte was so impressed with his theory of positivism that he referred to it as "the great discovery of the year A Communitarian Defense of Liberalism: Both the theory has a role to play in defining the relation between sociology and education. For Durkheim, the changes in European society were taking place too quickly and no new institutions had been able to form in the absence of the old ones.
This "stood Hegel on his head" as he theorized that, at its core, the engine of history and the structure of society was fundamentally material rather than ideal. Ward was selected to serve as the first President of the new society. This can be partly explained by the fact that the Durkheimian school of thought was greatly reduced when many of his most promising students were killed in WWI, that Durkheim went to such great lengths to divorce sociology from philosophy, or by the fact that his thought has been, and continues to be, simplified and misunderstood.
Their goal in creating the institute was to produce a place that people could discover and be informed of social life as a whole. Early in his career Durkheim wrote dissertations about Jean-Jacques Rousseau and Montesquieu, both of whom he cited as precursors to sociology. Comte had very vigorous guidelines for a theory to be considered positivism.
These are the two conditions that Durkheim believes characterize the moral situation of modern European society: Naturally this change produces others, this novelty engenders other novelties, phenomena appear whose characteristic qualities are not found in the elements composing them.
Both types of suicide result from a weakness of social solidarity and an inability for society to adequately integrate its individuals. This would have an important impact on the religion of medieval society, Christianity.
Some consider Ibn Khalduna 14th-century Tunisian, ArabIslamic scholar from North Africa, to have been the first sociologist and father of sociology; his Muqaddimah was perhaps the first work to advance social-scientific reasoning on social cohesion and social conflict.
Émile Durkheim (1858—1917)
They simply represent the attempt to explain the larger structures and patterns that are observable in every culture through out history.
Critics argue that he is a deterministic thinker and that his view of society is so constraining towards the individual that it erases any possibility for individual autonomy and freedom. It is a sui generis reality, meaning that it is irreducible to its composing parts and unable to be explained by any means other than those proper to it.
As Durkheim argues, the categories are the natural, sui generis result of the co-existence and interaction of individuals within a social framework. From top to bottom of the ladder greed is aroused without knowing where to find ultimate foothold. InDurkheim published his first major work, The Division of Labor in Society, in which he introduced the concept of "anomie", or the breakdown of the influence of social norms on individuals within a gabrielgoulddesign.comhe published The Rules of Sociological Method, his second major work, which was a manifesto stating what sociology is and how it ought to be done.
What is sociology? This lesson covers a basic definition of the field, identifies major themes or questions studied by sociologists, and identifies. Émile Durkheim (—) Émile Durkheim was a French sociologist who rose to prominence in the late 19 th and early 20 th centuries.
Along with Karl Marx and Max Weber, he is credited as being one of the principal founders of modern sociology. The member's area of the ASA website will be under routine maintenance and not accessible Thursday, August 30 from approximately 1am - 2am Eastern time.
The sociology of Emile Durkheim Patricia Chewning Young investigation, but also to be the foundation of an intc:r,rated social philosophy which men could use to raise social standards.
Durkheim was attracted to sociology because it dealt with the.
Émile Durkheim
David Émile Durkheim (French: [emil dyʁkɛm] or; April 15, – November 15, ) was a French gabrielgoulddesign.com formally established the academic discipline and—with W.E.B. Du Bois, Karl.
Durkheim and the foundation of sociology
Rated 5/5 based on 3 review
Sociology - Wikipedia |
Organic Burial Pods Could Replace Coffins and Transform Gravestones Into Trees
These egg-shaped, biodegradable burial pods allow your body to become the “seed” of a new tree when you die
Every year Americans cut down 4 million acres of hardwood forest to bury our dead.
Once our bodies are “preserved” and sealed into wooden or metal caskets, they are buried in vast fields of granite tombstones, along with nearly a million gallons of formaldehyde per year.
These cemeteries or “memorial parks” — which together use up a million acres of otherwise fertile U.S. land — are typically covered in heavily watered and synthetically fertilized lawns.
But dying doesn’t have to take such a toll on the environment.
Italian artists have designed eco-friendly, biodegradable “coffins” that essentially allow you to turn yourself into a tree when you die, instead of cutting one down:
The Capsula Mundi is an egg-shaped pod into which the body is placed in the fetal position and then planted with a seed, ideally chosen by the deceased before they die.
The pod then germinates and grows into a tree; “a living memorial to the person we’ve lost,” designers Anna Citelli and Raoul Bretzel say.
Citelli and Bretzel hope that one day their pods will transform the cold, grey landscape of cemeteries today into vibrant, green forests for the future.
These human-fertilized forests would sequester carbon, rather than releasing it, as cemeteries and land clear-cut for coffins do, creating a healthier environment for future generations.
As our population continues to double in size, natural, woodland burials might become more popular. They are currently legal in much of Northern Europe.
In places where they aren’t, there is a mini Capsula Mundi available for burying a loved one’s ashes, It should be noted, however, that cremated ashes are sterile and do not supply nutrients back into the earth, the way a body left to decompose in the soil does.
If you’re wondering whether a human can really feed a tree, consider the story of an apple tree found growing on top of the graves of Roger Williams, the founder of Rhode Island, and his wife Mary Sayles. The roots of the tree were found to have grown around their bodies and assumed the shape of human skeletons.
The tree literally “ate the humans,” writes Lierre Keith in her book The Vegetarian Myth: Food, Justice, and Sustainability, explaining that the bones provided a good source of calcium for the roots.
If you’re interested in a biodegradable casket or Carrier before the Capsula Mundi’s become available, there are some nice ones on Amazon:
Organic, biodegradable seagrass casket for green / natural burial
Facebook Comments
Like it? Share with your friends! |
The 5,000-Year-Old Puzzle: Solving A Mystery of Ancient Egypt
When King Tut’s tomb was discovered in Egypt in 1922, the world was abuzz. What would be the next big, newsworthy archaeological find? Might it be Giza 7000X, a secret Egyptian tomb buried deep within the earth?
Claudia Logan and Melissa Sweet (with the cooperation of The Museum of Fine Arts in Boston) answer that question and ask a few more in The 5,000-Year-Old Puzzle, their truly splendid picture book for older readers. Readers follow a fictional family to Egypt in 1924 to an actual expedition led by Dr. George Reisner.
Written in diary form from the perspective of young Will Hunt, who joins the expedition, the book is immediate and engaging, communicating the mystery and excitement of an archaeological dig like nothing we’ve seen. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.