text stringlengths 144 682k |
|---|
Basics: Plants & Chameleons
Summary: Chameleons & Plants
• Plants create a living environment for your chameleon to live in
• Plants provide drinking surfaces, hiding spots, and humidity
• A fully planted cage is a beautiful piece of natural art
Introduction to Plants
maranta chameleon plant
In the design phase we used green clouds to plan where we wanted our plants to go. Now it is time to replace those green clouds with actual plants! If you are an enthusiastic plant person you may have already decided which variation of Pothos you want and have that Manjula on special order. Others are still figuring out the difference between pothos and ficus and why in the world do we call it pothos when that isn’t its real name anymore?!?!? Well, we won’t be uncovering the secrets of the universe in this module, but you will have a working knowledge of plants.
We’ll start by acknowledging an obvious truth. Plants are living things and need food and water like every living creature. And like every living creature, they have their own way of getting what they need. We need to provide that to them so they can thrive. There are many varieties of plants that will live in our chameleon cage light and humidity conditions so keeping a vibrant living environment is not that hard with a basic understanding.
Live vs. Plastic Plants
In our cage build project here we will work only with live plants. Philosophically, plastic plants take us in the opposite direction from being naturalistic. Our goal of matching our chameleon’s home environment requires live plants. So we will not be using them here. That said, plastic plants have been used for decades. They are cleaned easily and have a valuable spot in breeding projects that require frequent and/or thorough cage cleaning (such as in a quarantine situation). There are cautions though. If you are using fake plants, use only ones designed for the reptile industry. Fake plants produced for the art industry or interior decorating are not designed to be non-toxic or even stay intact when sprayed with water and it will be difficult for you to check how safe they are. I would especially caution the use of plastic plants with veiled chameleons who are known to take bites out of leaves. Swallowing plastic introduces a host of complications that we can only speculate at here. I advocate live plants and will guide you step by step into how to make them work. Follow the guidelines in this course and fake vs. plastic is not even a consideration you need to have on your plate.
Basic Plant Care
plants being misted in a chameleon cage
A common complaint amongst chameleon keepers is that they cannot keep a plant alive. We definitely need to change this! Not only are plants a beautiful part of the chameleon environment, but if the environment is suitable for a chameleon, plants should thrive with almost no additional effort from you. Plants really need just light and water from you and the right temperature range. The most common houseplants are well suited for the cage conditions of the most common chameleons. The biggest problems with keeping plants alive are lack of light and lack of water. Although there are a number of other reasons why a plant could die, a good indication that your cage is a healthy environment for your chameleon is a lush, thriving community of plant life.
Dangerous Plants
We are rightfully concerned about the plants we put in our cage and we should be careful in our choices. Dangers from plants come in three main sections: thorny plants, poisonous plants, and pesticides. Some may say that there is a fourth danger, and that is of the plants eating your chameleons, so we will just have to call out carnivorous plants specifically!
Thorns and Rough Edges
Bromeliad not good for chameleon cage
It is obvious to most that we do not want to put plants with thorns or any other cutting surface in our chameleon cage. Roses, Stinging Nettle, select bromeliads, and bougainvillea are examples of plants that are not on the top of our use list. It is true that that we want to make our chameleon’s environment match their wild environment as closely as possible and that chameleons negotiate thorns just fine in the wild. Some chameleons live in bushes with some very nasty thorns and enjoy the protection they offer. In reality, including a thorny vine in the cage is more of a danger to you trying to maintain the space! Regardless of their ability to negotiate the thorns, thorns and sharp edges do take space which your chameleon can not use. So including them is restricting our chameleon’s perching choices in an already relatively small space.
Beyond this, just be observant. Sometimes plants that look fine are actually hiding thorns. Some bromeliads have saw-tooth leaf edges. And some plants that are advertised as “thornless” such as Lady Banks roses or thornless blackberry will end up with thorns despite the grower’s best intentions.
Poisonous Plants
We in the chameleon community are handicapped when it comes to determining what plants are poisonous to chameleons. Most poison charts available are for humans, dogs, cats, birds, and horses. The closest charts we can get are for tortoises, but those do not usually include ornamentals. The problem with charts that are put together for other animals is that chameleons are different. Even on the charts we have there are difference in what is okay for humans, but will kill birds or be poisonous to dogs. The fact is that we do not know what is poisonous to chameleons and these charts are not much help. The only thing they truly do is give us a false sense of security if we decide to use them to guide our plant selection. Something that may be fine for dogs could kill a chameleon and we already know that Pothos, one of the most widely used plants in chameleon cages, has oxalates which land them on the poisonous list for dogs. Decades of use and direct observations of veiled chameleons eating Pothos leaves with no reported issues has us concluding that Pothos are not poisonous to veiled chameleons in the amount that they eat.
The reason this is so tricky is that even if a plant would be dangerous to ingest, it would poison the chameleon only if the chameleon ate enough to be an effective dose. Almost all chameleons, the Veiled Chameleon being the most notable exception, have little interest in chewing up a leaf. Thus a plant which is known to have cyanide in its leaves has, anecdotally, shown itself to be okay to use with chameleons over decades of my personal use in my cages. This does not mean that there will never be an issue with a poisonous plant in a chameleon cage, but it does mean that we should keep perspective. I would consider the modern chameleon keeping era to have started in the early 1980s. Since that time people have been grabbing any plant they could find and using them in chameleon cages. There is no shortage of plants poisonous to humans being used in cages for long periods of time. We have enough time under our collective belts to draw conclusions from the fact that there is no rash of plant poisoning incidences in the beginner community from putting the wrong plants in their cages. Chameleons tend to reward wrong decisions by dying. There is still much to learn about chameleons and plants so I would never say that we know the absolute answer. But I can say that not seeing an obvious trend with the number of people who have used Pothos, Ficus, and Schefflera, which are supposedly poisonous, is a data point in itself. Whether they are poisonous to chameleons or not, we currently have no evidence of danger and decades of evidence of safety. That said, we should always use common sense. For example, when a Ficus bejamina tree breaks a branch or leaf a milky white substance is leaked out. Wipe it up quickly if that happens. Poison or not, there is no need to allow that to accidentally get in your chameleon’s eye or on its skin. It is always worth determining what is poisonous about the plant in question. For example, pothos and schefflera are on poison lists because they have oxalates in their leaves which causes mechanical damage as they are chewed and go down the throat. For a chameleon that only licks water off the surface the poison nature of this plant will not be an issue.
Regardless of what we know or don’t know, the community just wants a safe plant list. I will provide on this website recommended plants, but since there is little in the literature to point to any poisoning and there is no community tribal evidence of any poisoning, there is no relevant list. This does not mean there aren’t people taking the dog/cat lists and rebranding them chameleon safe plant lists. And there is no shortage of social media “experts” that embrace these lists as a guide for how they can police and “correct” new keepers. But when you dig back through all their references you will find their confidence is vastly out of balance with their evidence.
That said, there also is also no evidence that following a dog/cat list is dangerous either. So it is okay to decide to play it safe even if it is a false sense of security.
The plants on the Chameleon Academy Chameleon Plant list is not exhaustive, but have been tested.
pesticide warning for plant in chameleon cage
There are two types of pesticides: Contact and systemic. A contact insecticide would be sprayed on the surface of the plants to be protected and the systemic would be one that is internal to the plant. In our ornamental plants, the insecticide of choice is systemic. These will affect only the plant eating bugs and not the predatory bugs .
It is a good idea to gently wash the leaves of the plant you bring in to your chameleon cage to wash off whatever may be sitting on there. And the community has long recommended that the leaves be washed with mildly soapy water to remove the insecticides. Unfortunately, since the most common pesticide in use is the systemic type, washing does not remove the poison.
The most common systemic insecticide in house plants up until 2017 has been neonicotinoides. “Neonics” are said to not pass through the blood/brain barrier in vertebrates. I have been unable to find any report of reptiles being poisoned in relation to neonics. The fact that we have had veiled chameleons chewing on houseplants that almost certainly have contained neonics and have shown no signs of poisoning suggests that it could be true that it will not affect chameleons. Of course, this is speculative, but the fact that we do not experience mysterious deaths or sicknesses commensurate with the number of home improvement store plants used in veiled chameleon cages tells us something.
There is good and bad news on the horizon. Due to US consumers connecting neonics to bee deaths, the major home improvement chains are working on phasing out neonics from their plant offering. The good news of one less pesticide for us to worry about is tempered by the bad news that whatever systemic pesticide is used to replace neonics, it may or may not be toxic to chameleons. We have lived with neonics, whether we knew it or not, for two decades and we have a fairly good idea that they are, at least, some what safe to be used with chameleons. Any new systemic will start us having to test all over again. While I am sure the new systemic will have all the assurances of safety that neoics did, nothing beats having two decades of field testing to back up assurances from companies wanting to protect their interests.
The bottom line is that it doesn’t hurt to be careful and cautious, but, also, there is no record of poisoning from insecticides on/in plants.
Uses For Plants
As chameleons live in and around plants and leaves all their life they have developed a strong relationship with them and depend on them for their environment. We can break the use and benefit of plants into four main functions.
Drinking Surface
maranta leaf providing water for chameleon
As arboreal creatures, chameleons have had to learn to get water up in the trees. Although a chameleon will drink from any surface and even let water flow down their face into their mouth, leaves are the primary drinking surface. Thus we will want to provide plants that have wide leaf surface either with large leaves or else a tight enough density of leaves that water collects.
Exposure Gradient
Parson's Chameleon Hiding
Plants are our main tool in providing an exposure gradient. The exposure gradient allows the chameleon to choose how visible to the outside world he or she is. Simply put, your chameleon needs at least one chameleon appropriate hiding place. Ideally, they have variety to choose from that have varying levels of exposure. Plants are ideal to create this effect due to their natural appearance and the fact that plants are what (most) chameleons are used to when it comes to environment.
Humidity Pockets
Parson's Chameleon male hiding
One of the gradients we strive to create in our chameleon cage is a humidity gradient. Creating a humidity gradient is tricky as you tend to have a level of relative humidity and the changes in humidity tend to be over time and not over space. That just means that humidity fluctuates over the course of the day and is not a linear progression from one point in space to another like distance from a spot light can provide for heat. But there are microclimates in nature where humidity spikes. And it is in our best interests to create areas in our cage where our chameleon may find increased humidity if they need it. Live plants provide humidity by transpiration, which is the release of water into the air by leaves, and by the wet soil.
Chameleon and orchids
And finally, please don’t forget the importance of the chameleon environment being beautiful to the human eye or even just fun. Create an environment that is pleasing to you and the people visiting your home whether physically or digitally. A beautifully planted cage will be a source of peace and wonder to you and will be a great introduction to anyone stumbling across your hobby. If you have family members who are skeptical of your new hobby, a lushly planted environment that you maintain to a beautiful standard can go a long ways to their acceptance or even interest. Once you lay the foundation of functional plants you can include plants that add color, are of interesting shape, or even need to be fed with insects themselves!
Soil controversy
Chameleon on moss
Having open soil in a cage with a chameleon tends to be controversial. Some people are hyper vigilant that there is no exposed soil surface. They cover any potted plant soil with large rocks or marbles so a chameleon has no opportunity to bring back dirt or anything else that may be harmful when they hunt for insects. Then there are the breeders that keep their chameleons in soil floor cages and can’t understand what the fuss is about.
The concern with soil is that there could be components to the soil that could be harmful to your chameleon if accidently ingested. Small rocks, wood chips, and fertilizer balls top the list of concerns. Then there is the situation where the chameleon will go down and literally eat the soil. Geophagia, or the ingestion of soil, is done to supplement a diet that is lacking in some mineral. Although an appropriate response would be to cover the bare soil, the real solution is to fix the diet and supplementation so that the chameleon is not driven to eat soil.
There is no harm in covering the soil top with rocks. But, also, with the proper husbandry, there is really no need.
Fertilizer balls are a real concern, though. These are the small BB sized capsules that are put into soil as a slow release fertilizer. This would not be a good thing to be ingested. If your plant has these readily available a repotting to a completely organic soil would be appropriate.
Chameleon keeping is more than just keeping an animal breathing. It is creating the environment where that animal can thrive and feel at home. A strategically and densely planted cage provides that natural living space. We can take this further and further. We can add a bio-active substrate and then we can research plants that may come from the chameleon’s natural environment. But, for now, a well planted cage using our commonly available house plants will provide an excellent living space for our chameleon.
This seminar is part of the introductory course Chameleon Basics which, in turn, is a module within the even larger Term 1: Getting Started With Chameleons.
In our next module we take a look at the basics of feeding chameleons. What does it take to keep these guys fueled?
Chameleon Basics Home Room
Jackson's Chameleon Male
Next Module: Feeding Chameleons
Female Panther Chameleon |
• Menu
• Menu
Does it Snow in Washington?
Washington, or the Evergreen State, is a state located in the pacific northwest region of the U.S. The state stretches from the rugged Pacific coastline, traverses the peaks of the Cascade ranges, and ends in the fertile fields of the Columbia Basin, effectively covering a 172,587 square kilometers landmass. With close to 8 million inhabitants, Washington is ranked as the 13th most populous city in the U.S. But does it snow in Washington?
Washington climate varies from west to east. Western Washington predominantly experiences a Mediterranean climate, while Eastern Washington experiences a semi-arid climate. Snowfall is predominant in eastern Washington during the winter season, which runs from December through February.
When does it snow in Washington?
Snowfall in December
December is the first month of significant snowfall in Washington. Temperatures are cold and range between highs of 36.2 degrees Fahrenheit (2.3 degrees Celsius) to lows of 25.7 degrees Fahrenheit (-3.5 degrees Celsius). The frequency and amount of snowfall vary from place to place, and regions east of the cascades receive significant snowfall while the west coast receives traces. On average, Puget Sound on the west coast records 2 snowfall days and an accumulation of 2.6 inches (66 millimeters) of snow in December. On the other hand, the Cascade Mountains receive the heaviest snowfall in the state, accumulating over 20 inches (508 millimeters) of snow.
Snowfall in January
January is the coldest month in Washington, with temperatures fluctuating between highs of 34.8 degrees Fahrenheit (1.6 degrees Celsius) and lows of 23 degrees Fahrenheit (-5 degrees Celsius). The west coast receives traces of snow, with Puget Sound accumulating 1.9 inches (48 millimeters) of snow after 1.1 snowfall days. Snowfall is still heavy in the high elevation regions of the state and can pass the 15 inches (381 millimeters) mark in the Cascades.
Snowfall in February
February experiences a slight rise in temperatures as the winter season winds up. Average temperatures in the city range from highs of 40.6 degrees Fahrenheit (4.8 degrees Celsius) to lows of 26 degrees Fahrenheit (-3.3 degrees Celsius). The west coast doesn’t receive substantial snow during the month, while snowfall is still heavy in the mountain areas.
Where does it snow in Washington?
Snow in Olympia
Olympia, the capital city of Washington, has over 52,000 inhabitants and is ranked as the 24th most populous city in the state. Despite its low elevation of 95 feet (29 meters) above the Pacific, the city still experiences freezing temperatures in winter, which can fall as low as 32.7 degrees Fahrenheit (0.4 degrees Celsius). Throughout the winter season, snow pelts Olympia for an average of 6.3 snowfall days and can aggregate up to depths of 10.8 inches (274 millimeters).
Snow in Seattle
Seattle, having close to 800,000 inhabitants, is the largest and most populous city in Washington and all of the North Pacific Region. Due to its low elevation of 520 feet (158 meters) above sea level, it experiences mild winters where temperatures rarely fall below freezing point. Every year, Seattle witnesses snow for 3 snowfall days and records an accumulation of up to 5 inches (127 millimeters) of snow.
Snow in Spokane
Spokane is a unique city in that it experiences a dry summer continental climate despite its high elevation of 1,843 feet (562 meters) above sea level. The city experiences freezing temperatures in winter which can reach lows of 27 degrees Fahrenheit (-2.8 degrees Celsius). Spokane sees snow for 34.4 snowfall days throughout the year and records an accumulation of 44.9 inches (1,140.5 millimeters) of snow.
Ski Resorts in Washington
The Summit at Snoqualmie Ski Resort
Snoqualmie ski resort is located near Seattle, on Baker Mountain. The resort’s summit is one of the snowiest places in Washington, receiving an impressive 435 inches (11,049 millimeters) of snow annually. Snoqualmie ski resort is popular among skiing and snowboarding enthusiasts in Washington, thanks to its massive 1,994 acres of skiable terrain. The resort features 65 trails that cater to all skiing difficulty levels and is served by 20 lifts.
Mt Baker Ski Area
Mt Baker ski area is located in the North cascade of Washington. The resort has 1000 acres of skiable terrain, with 31 trails that cater to all skiing difficulty levels. Mount Baker ski resort is equipped with ten ski lifts that transport guests up the slopes.
Crystal Mountain Resort
Crystal Mountain Resort is located on the foot of Mount Rainier National Park on a massive 3,600-acre ski area. The resort caters to all skiing difficulty levels and is equipped with 10 chairlifts and one gondola for transporting guests.
Learn more about the city
Leave a reply |
Income Tax Return Filing
Income Tax in India: Taxes in India can be categorized as direct and indirect taxes. Direct tax is a tax you pay on your income directly to the government.
This tax is, in turn, passed down to the government. Direct Taxes are broadly classified as :
1. Income Tax – This is taxes an individual or a Hindu Undivided Family or any taxpayer other than companies, pay on the income received. The law prescribes the rate at which such income should be taxed
2. Corporate Tax – This is the tax that companies pay on the profits they make from their businesses. Here again, a specific rate of tax for corporates has been prescribed by the income tax laws of India
Income Tax Slabs in India
income tax slabs in India 2020
Translate »
Powered by WhatsApp Chat
× How can I help you?
%d bloggers like this: |
On the Lookout
On the Lookout
On a map created in 1590, the area was labeled Promontorium tremendum: horrible headland, or cape terrible. Four centuries later, these barrier islands along the North Carolina coast are better known as havens for turtles and wild horses and for humans seeking a bit of tranquility by the sea.
Cape Lookout National Seashore stretches 56 miles (90 kilometers) from Okracoke Inlet to Beaufort Inlet, near the towns of Beaufort and Morehead City. The park is made of three barrier islands—North Core Banks, South Core Banks, and Shackleford Banks—that separate the Atlantic Ocean from Pamlico Sound and extensive marshlands. There are no bridges or roads to the islands; the only way to get there is by ferry or private boat.
Above the water line, the islands are mostly low dunes, wide sandy beaches, and some coastal grasses and trees. Below the water surface, the infamous shoals, converging currents, and natural sand movement around barrier islands make for a dynamic environment that remains a danger to ships.
On February 18, 2016, the Operational Land Imager (OLI) on the Landsat 8 satellite acquired this image of Cape Lookout National Park. Note how the swirling sediments and shallow bottoms appear as faint green, tan, and blue areas around the islands. The yellow line around the islands notes the official boundaries of the park.
“It is striking how narrow the barrier islands are, and yet they do such an important job for the developed areas of the mainland,” said Karen Duggan, a park ranger at Cape Lookout National Seashore. “I really like being able to see the shoals: from the long, Cape Lookout Shoal sticking out into the ocean to the smaller, erosional shoal coming off the eastern end of Shackleford Banks. You can really tell that it is trying to close off Bardens Inlet between the lighthouse and Shackleford Bank.”
Those infamous shallows led the U.S. government to build a wood-frame, 96-foot tall lighthouse at the southern tip of the islands in 1812. With many a vessel still having trouble in these waters, the U.S. Lighthouse Board authorized construction of a much taller (163 foot or 50 meter) brick lighthouse in 1859. That structure still stands today, having survived the Civil War and World War II. Visitors to the park can climb the 207 steps from ground level to the light.
At the north end of the park, near Ocracoke Inlet, the historic village of Portsmouth still attracts visitors. In years past, the village served as a “lightering” port; that is, heavy, ocean-going ships would stop in Portsmouth to unload their cargo into smaller ships that could navigate the shallower sounds and waterways between the barrier islands and the mainland.
Cape Lookout has in recent decades become a haven for loggerhead sea turtles, a threatened species that nests on the islands. More than 275 species of birds can be spotted in the area, and one of the islands—Shackleford Banks—is home to a herd of feral horses that are rumored to be descendants of Spanish mustangs that survived shipwrecks in the area.
Cape Lookout National Seashore was first authorized on March 10, 1966, and celebrates its 50th anniversary this week.
References & Resources |
common vampire bat attacks on humans in a village of the amazon region of brazil.many people in amazonian communities have reported bat bites in the last decade. bites by vampire bats can potentially transmit rabies to humans. the objective of this study was to analyze factors associated with bat biting in one of these communities. a cross-sectional survey was conducted in a village of gold miners in the amazonian region of brazil (160 inhabitants). bats were captured near people's houses and sent to a lab. of 129 people interviewed, 41% had been attacked by a bat at least o ...200111784915
bat-transmitted human rabies outbreaks, brazilian amazon.we describe 2 bat-transmitted outbreaks in remote, rural areas of portel and viseu municipalities, pará state, northern brazil. central nervous system specimens were taken after patients' deaths and underwent immunofluorescent assay and histopathologic examination for rabies antigens; also, specimens were injected intracerebrally into suckling mice in an attempt to isolate the virus. strains obtained were antigenically and genetically characterized. twenty-one persons died due to paralytic rabie ...200616965697
molecular epidemiology of rabies virus isolated from different sources during a bat-transmitted human outbreak occurring in augusto correa municipality, brazilian amazon.we genetically characterize rabies virus (rabv) strains isolated from human cases, domestic and wild animals during a human outbreak of bat-transmitted rabies in augusto correa municipality, pará state, brazilian amazon in 2005. partial nucleotide sequences of the n gene (491 bp) were obtained for all strains, and phylogenetic analysis grouped these into two major clades (pará and central-southeast) and identified them as bat-related viruses genotype i, desmodus rotundus antigenic variant 3 (agv ...200817996263
geographical analysis for detecting high-risk areas for bovine/human rabies transmitted by the common hematophagous bat in the amazon region, brazil.the common hematophagous bat, desmodus rotundus, is one of the main wild reservoirs of rabies virus in several regions in latin america. new production practices and changed land use have provided environmental features that have been very favorable for d. rotundus bat populations, making this species the main transmitter of rabies in the cycle that involves humans and herbivores. in the amazon region, these features include a mosaic of environmental, social, and economic components, which toget ...201627388498
rabies: knowledge and practices regarding rabies in rural communities of the brazilian amazon basin.the occurrence of outbreaks of human rabies transmitted by desmodus rotundus in brazil in 2004 and 2005 reinforced the need for further research into this zoonosis. studies of knowledge and practices related to the disease will help to define strategies for the avoidance of new cases, through the identification of gaps that may affect the preventive practices.201626927503
human rabies transmitted by vampire bats: antigenic and genetic characterization of rabies virus isolates from the amazon region (brazil and ecuador).since 2004, the main transmitter of human rabies in latin america has been the vampire bat (desmodus rotundus). based on the nucleoprotein of the rabies virus (rv), we analyzed antigenic and genetic profiles of isolates from 29 samples taken from humans living in different areas of the amazon region. two isolates were from ecuador and 27 from the northern and northeastern regions of brazil, which were obtained during outbreaks in various municipalities in the states of pará and maranhão in the y ...201020637811
serological investigation of rabies virus neutralizing antibodies in bats captured in the eastern brazilian 2004 and 2005 a total of 38 cases of human rabies transmitted by the hematophagous bat desmodus rotundus were registered in the brazilian state of pará; 23 (60.5%) cases occurred in the northeastern region. because of this, a serological investigation for the antibodies of rabies virus was performed in municipalities of the northeastern state of pará, in order to assess whether the virus was circulating among different bat species.201324100701
first detection of leishmania spp. dna in brazilian bats captured strictly in urban areas.leishmania spp. is a protozoan that maintains its life cycle in domestic and wild animals and it may include bats, a population that has increased in urban environments. this study aimed to investigate the presence of leishmania spp. in bats captured strictly in urban areas that are endemic for visceral leishmaniasis. the spleen and skin samples of 488 bats from 21 endemic cities in northwestern são paulo state, brazil, were tested for the presence of leishmania kdna using real-time pcr. differe ...201526209107
Displaying items 1 - 8 of 8 |
I came across 柄にもない once while reading and since the immediate look-up didn't feel like a full explanation of the phrase, I've been motivated to try and understand it connotations better.
In a quick jisho.org look up, 柄にもない means unlike oneself, uncharacteristic. Thesaurus lists it as 'words/actions which are not suitable for one's natural personality or impression', with alternatives such as 'not the type to do that' 'not that kind of character' etc. which seemed straightforward enough for me at first glance.
However, two things about that definition made me pause. First, the usage of ふさわしくない. 'Unsuitable, inappropriate' is used rather than 'dissimilar, contrastive'. This speaks to personal opinion having a play here rather than pure logical contrast. Second, the word 'impression' included along with personality, which, again, speaks to personal opinion rather than reality.
This made me start to think that 柄にもない wasn't so much 'against one's true self' as it was 'against the expectations of one's self'.
This opinion further strengthened when I looked it up on goo, where it's worded as 'something which isn't suitable for one's position, status or abilities, personality.' The part about not suiting one's status is a new usage, but again, it speaks more to expectations rather than intimate knowledge of a person.
While it may be a simple nuance, I think it really makes a difference in how one understands the term, especially while reading.
For example,
'Don't speak out of turn.' is the given translation on jisho and the impression of the wording, but that given translation doesn't fit into the literal meaning of 'don't say something unlike you'. It only works if you take '柄にもない' to have added connotations of expectations upon you. In this case, it isn't 'unlike you' but 'unsuitable for you [with your position etc.]'
There's no given translation for this on goo. I'd translate it as 'To say something uncharacteristically admirable', and I think it would be correct. But again, even this doesn't work if you read it with a nuance of being truly unlike yourself. If it's truly unlike you, then those admirable words are by default insincere, and likely lies. But, if it's just unlike what people expect of you, then the words are still sincere, if surprising and unexpected.
I think it's that word, the 'unexpected' nuance that 柄にもない speaks to the most.
For comparison, using らしくない for 'unlike you' is a wording that feels more intimate and accurate, as I feel like it implies the speaker really knows person. 'This isn't like you', 'it doesn't feel like a you-ish thing to do', 'it isn't something that seems like you'. The impression there is that the speaker has a deep and accurate knowledge of the person's character, and knows when something does not fit.
柄にもない, on the other hand, feels more like a general impression of going against a stereotype. It speaks more to expectations than knowledge. 'Not the type to do that', 'it's not their character', 'it doesn't suit your personality'. Like how you expect a Sergeant to speak according to their rank, you expect a dishevelled person to be irresponsible, you expect a studious person to be punctual, etc. The speaker is surprised the person is going against what they expect from them, rather than actually feeling like this goes against intimate knowledge of their character.
So yeah, that's my current impression, that the the meaning of 柄にもない doesn't seem to read as 'acting unlike oneself' so much as 'acting unlike the expectations of one's self'. But of course I could be wrong, which is why I'm turning to those more experienced and knowledgeable. I'd really appreciate other opinions from those who can confirm/joss the connotations, nuances, and usages for this word.
柄 is an old word; Murasaki Shikibu wrote '人のためしにしつべき人柄なり' 1000 years ago. Today 柄 is used in phrases like お日柄、 人柄、銘柄、柄が悪い、お国柄、お家柄、大柄、小柄.
The concept has not changed from the old days. 柄 itself is rather about social stereotype than personal impression.
When it comes to 柄にもない, the connotation varies depending on whose 柄 is mentioned.
If it was my 柄, it is a humble way of contradicting other's suggestion, "~だなんて柄でもないですよ。" or an excuse not to do so. "~をするのは柄じゃないんで。"
Or if it was your 柄, it sounds slightly scornful/despising. "you are not supposed to do that. I'm astounded/disappointed."
Or if it was his/her 柄 it can be badmouthing. "あんな柄にも無いことやるから~"
Googling 柄にも無い/柄でもない you mainly get results in which people refer to themselves, so it has became a herikudari expression much like 愚息/拙宅/弊社.
Your Answer
|
When eating a high-protein diet hunger can be kept at bay and the person consumes less food. Diets such as this are filled with protein which makes digestion slower while using energy to break down food.
By increasing the amount of protein and reducing carbohydrates, blood sugar levels can be regulated. Consuming lean protein can lead to the building of lean muscle mass which burns fat. Overall calorie consumption can be reduced by eating protein because dieters can avoid foods that are high in sugar and overconsuming carbohydrates. A number of studies on high-protein diets are based on raising protein intake to 30% of the daily calories. The average woman should consist of somewhere between 40 and 200 grams of protein each day. This does, however, depend on the current consumption of calories and weight. Lean protein choices, like dairy, vegetables, lean meat, and seafood are preferred as fat and cholesterol tend to be found in many non-lean protein options.
Foods to include in high-protein diets:
• Beans
• Fish
• Poultry
• Meat
• Fruit
• Vegetables
• Dairy
Foods to avoid:
• White potatoes
• All grains
• Sweet potatoesPros:
• Stabilizes blood sugar so reduces binge eating
• Can lead to easy and fast weight loss
• An increase in energy Cons:
• Some people may gain a lot of weight from excess protein
• Excess protein may lead to an unhealthy liver
• Avoiding sweet vegetables may possibly lead to stronger sugar cravings
How much protein should I eat?
For most people, depending on their BMI, a daily dose of between 0.8 to 1g of protein per 1kg of each person’s body weight is recommended by nutritionists. However, people who incorporate a lot of activity or sports in their daily routine, like strength athletes, 1.2 to 1.7g per kg of body weight is recommended every day. Nutritionists recommend 1.2 to 1.4g per kg of body weight every day for endurance athletes.
After exercise, a person should have a good protein portion because muscles need it to recover and grow. A portion of protein weighing 15 to 25g is best consumed within 30 minutes of exercise because the muscles are particularly receptive to protein synthesis.
Protein requirements can be easily reached when a person has a balanced diet. While consuming proteins can be beneficial to the body, studies advise adults against consuming more than two times the recommended daily intake of protein (average man–55.5.g, average woman–45 g).
Consuming more than the recommended amounts of daily protein can lead to an increased risk of osteoporosis and further complicate existing kidney problems. Many current diets are filled with carbohydrate-rich foods throughout the day, ending with a protein-filled meal. This can lead to many issues and it is recommended that meals be spread out and balanced during the entire day.
Good Protein Sources
Whole eggs are among the healthiest and most nutritious foods on the planet. Eggs are full of vitamins, healthy fats, brain nutrients and even antioxidants. All these nutrients are contained in only 6g of protein. The most nutritious part of an egg is the yolk. Most of the folate, iron, and vitamins are contained here. This being the reason whole eggs have the highest amount of protein while egg whites barely contain any of it. An omelet is one of the best ways for a person to being the day. It contains a lot of nutrients from the numerous vegetables that can be used to prepare it.
Protein content: 1 large egg contains 6 grams of protein, with 78 calories. One whole egg is about 35% of calories.
Milk is highly nutritious and a person can get high-quality protein from it.Milk is particularly high in phosphorus, calcium, and riboflavin (vitamin B2). It also contains almost every single nutrient needed by the human body.Chocolate milk is highly nutritious and can best be described as the age-old recovery food after exercise because it contains carbohydrates that replenish energy and a blend of both fast and slow release whey and casein proteins. A person can get the same nutrients from a milk-based fruit smoothie such as a cranberry or raspberry smoothie.
Protein content: 1 cup of whole milk contains 8 grams of protein, with 149 calories. It makes up 21% of all calories.
Yogurt is a great protein-rich food. It can be a great snack, including those who are lactose intolerant because most of the lactose is removed. Fruit yogurt may also contain some vitamins. This makes yogurt a nutritious option in a person’s daily intake and is a combination of casein and whey protein.
Protein content: Non-fat Greek yogurt has protein at 48% of calories. One 170 gram (6 ounces) container has 17 grams of protein and only 100 calories.The best type of yogurt is the one that does not contain sugar. Full-fat Greek yogurt is also very high in protein, but it contains more calories.Similar OptionsRegular full-fat yogurt (24% of calories) and kefir (40%).
Fish and Seafood
Fish is incredibly nutritious due to the fact that it combines healthy fats, acids, and nutrients all in one. Fish and seafood are not only good sources of protein but also low in fat. Salmon is higher in fat than other types of fish. It packs in heart-healthy omega-3 fatty acids which help reduce inflammation and joint stiffness. Protein content: Highly variable. Salmon is 46% protein, with 19 grams per 3
Protein content: Highly variable. Salmon is 46% protein, with 19 grams per 3 ounces (85 g) serving, with 175 calories
Tuna is a very popular type of fish. It a good option because it is low in calories and fat, and very rich in protein.Like other fish, tuna also contains very high amounts omega-3 fatty acids and many nutrients as well.
Almonds are very popular because of their sweet flavoring for a tree nut. They are loaded with important nutrients, including, vitamin E, fiber, manganese, and magnesium.
Protein content: 13% of calories. 6 grams per 1 ounce (28 g) serving, with 161 calories.Other High-Protein Nuts – Pistachios (13% of calories) and cashews (11% of calories).
Lean Beef
Lean beef is not only delicious, but it also contains a lot of protein. It is loaded with vitamin B12, Iron, and other nutrients.
Protein content: 53% of calories. One 3 ounce (85 g) serving of cooked beef with 10% fat contains 22 grams of protein, with 184 calories.If you are on a low-carb diet, the best type of beef would be fatty cuts of beef instead of lean beef.
Chicken and Turkey
Chicken breast is one of the most popular protein-rich foods.The skin contains a lot of fat and calories but when eaten skinless, the majority of the calories in it come from protein.Chicken breast is delicious, nutritious and easy to cook. Protein content: 80% of calories. 1 roasted chicken breast without skin contains 53 grams, with only 284 caloriesTurkey
Turkey breast is almost the same as the chicken breast. It is similar to chicken breast in many ways. Turkey consists mostly of protein, with very little fat and calories and is very flavorful. Protein content: 70% of calories. One 3 ounce (85 g) serving contains 24 grams, with 146 caloriesBroccoli Broccoli is an incredibly healthy vegetable loaded with fiber, vitamin K, vitamin C and potassium. It is also loaded with some bioactive nutrients that are believed to help protect against diseases like cancer. Broccoli is higher in protein compared to most vegetables.Protein content: 20% of calories. 1 cup of chopped broccoli (96 grams) contains 3 grams of protein, with only 31 calories.
Brussels Sprouts
Brussel sprouts is another high-protein vegetable and it is highly related to broccoli.It is very high in vitamin C, fiber, and other nutrients.
Peanuts are delicious and high in protein, magnesium, and fiber. Many studies show that they can aid in weight loss. Unfortunately, there are many people who dislike the taste of peanuts, while others are allergic to it. However, the most delicious form of this food is peanut butter. It is also high in protein.
Pumpkin Seeds
Pumpkins offer a good amount of fiber and they also contain edible seeds called pumpkin seeds. Pumpkin seeds are also high in many nutrients, including iron, magnesium, and zinc. They can be ground and added to food as a spice or they can be eaten whole, depending on a person’s preference.
Other High-Protein Seeds are: Flax seeds (12% of calories), sunflower seeds (12%) and chia seeds (11%)All health content on JesslynLimHealthWellnessCoach.com is provided for general information only, and should not be treated as a substitute for the medical advice of your own doctor or any other
Pin It on Pinterest
Share This
STEP 1: Please Enter Your Information To Register Below
STEP 2: Please make your payment via PayNow or PayLah!
$450 per pax
9678 9565
$450 per pax
9678 9565
Your Information is kept private.
|
Finite-state machine
A finite-state machine (FSM) or finite-state automaton (FSA, plural: automata), finite automaton, or simply a state machine, is a mathematical model of computation. It is an abstract machine that can be in exactly one of a finite number of states at any given time. The FSM can change from one state to another in response to some inputs; the change from one state to another is called a transition.[1] An FSM is defined by a list of its states, its initial state, and the inputs that trigger each transition. Finite-state machines are of two types—deterministic finite-state machines and non-deterministic finite-state machines.[2] A deterministic finite-state machine can be constructed equivalent to any non-deterministic one.
Classes of automata
The finite-state machine has less computational power than some other models of computation such as the Turing machine.[3] The computational power distinction means there are computational tasks that a Turing machine can do but an FSM cannot. This is because an FSM's memory is limited by the number of states it has. A finite-state machine has the same computational power as a Turing machine that is restricted such that its head may only perform "read" operations, and always has to move from left to right. FSMs are studied in the more general field of automata theory.
Example: coin-operated turnstile
State diagram for a turnstile
A turnstile
An example of a simple mechanism that can be modeled by a state machine is a turnstile.[4][5] A turnstile, used to control access to subways and amusement park rides is a gate with three rotating arms at waist height, one across the entryway. Initially the arms are locked, blocking the entry, preventing patrons from passing through. Depositing a coin or token in a slot on the turnstile unlocks the arms, allowing a single customer to push through. After the customer passes through, the arms are locked again until another coin is inserted.
The turnstile state machine can be represented by a state-transition table, showing for each possible state, the transitions between them (based upon the inputs given to the machine) and the outputs resulting from each input:
Current State Input Next State Output
Locked coinUnlockedUnlocks the turnstile so that the customer can push through.
Unlocked coinUnlockedNone
pushLockedWhen the customer has pushed through, locks the turnstile.
The turnstile state machine can also be represented by a directed graph called a state diagram (above). Each state is represented by a node (circle). Edges (arrows) show the transitions from one state to another. Each arrow is labeled with the input that triggers that transition. An input that doesn't cause a change of state (such as a coin input in the Unlocked state) is represented by a circular arrow returning to the original state. The arrow into the Locked node from the black dot indicates it is the initial state.
Concepts and terminology
• an entry action: performed when entering the state, and
• an exit action: performed when exiting the state.
Fig. 1 UML state chart example (a toaster oven)
Fig. 2 SDL state machine example
Fig. 3 Example of a simple finite-state machine
State/Event table
Several state-transition table types are used. The most common representation is shown below: the combination of current state (e.g. B) and input (e.g. Y) shows the next state (e.g. C). The complete action's information is not directly described in the table and can only be added using footnotes. An FSM definition including the full action's information is possible using state tables (see also virtual finite-state machine).
State-transition table
State AState BState C
Input X .........
Input Y ...State C...
Input Z .........
UML state machines
SDL state machines
• send an event
• receive an event
• start a timer
• cancel a timer
• start another concurrent state machine
• decision
SDL embeds basic data types called "Abstract Data Types", an action language, and an execution semantic in order to make the finite-state machine executable.
Other state diagrams
In addition to their use in modeling reactive systems presented here, finite-state machines are significant in many different areas, including electrical engineering, linguistics, computer science, philosophy, biology, mathematics, video game programming, and logic. Finite-state machines are a class of automata studied in automata theory and the theory of computation. In computer science, finite-state machines are widely used in modeling of application behavior, design of hardware digital systems, software engineering, compilers, network protocols, and the study of computation and languages.
Finite-state machines can be subdivided into acceptors, classifiers, transducers and sequencers.[6]
Fig. 4: Acceptor FSM: parsing the string "nice".
Fig. 5: Representation of an acceptor; this example shows one that determines whether a binary number has an even number of 0s, where S1 is an accepting state and S2 is a non accepting state.
Acceptors (also called detectors or recognizers) produce binary output, indicating whether or not the received input is accepted. Each state of an acceptor is either accepting or non accepting. Once all input has been received, if the current state is an accepting state, the input is accepted; otherwise it is rejected. As a rule, input is a sequence of symbols (characters); actions are not used. The start state can also be an accepting state, in which case the acceptor accepts the empty string. The example in figure 4 shows an acceptor that accepts the string "nice". In this acceptor, the only accepting state is state 7.
A (possibly infinite) set of symbol sequences, called a formal language, is a regular language if there is some acceptor that accepts exactly that set. For example, the set of binary strings with an even number of zeroes is a regular language (cf. Fig. 5), while the set of all strings whose length is a prime number is not.[7]:18,71
An acceptor could also be described as defining a language that would contain every string accepted by the acceptor but none of the rejected ones; that language is accepted by the acceptor. By definition, the languages accepted by acceptors are the regular languages.
The problem of determining the language accepted by a given acceptor is an instance of the algebraic path problem—itself a generalization of the shortest path problem to graphs with edges weighted by the elements of an (arbitrary) semiring.[8][9]
S1 (which is also the start state) indicates the state at which an even number of 0s has been input. S1 is therefore an accepting state. This acceptor will finish in an accept state, if the binary string contains an even number of 0s (including any binary string containing no 0s). Examples of strings accepted by this acceptor are ε (the empty string), 1, 11, 11..., 00, 010, 1010, 10110, etc.
Classifiers are a generalization of acceptors that produce n-ary output where n is strictly greater than two.[10]
Fig. 6 Transducer FSM: Moore model example
Fig. 7 Transducer FSM: Mealy model example
In control applications, two types are distinguished:
Moore machine
Mealy machine
Sequencers (also called generators) are a subclass of acceptors and transducers that have a single-letter input alphabet. They produce only one sequence which can be seen as an output sequence of acceptor or transducer outputs.[6]
A further distinction is between deterministic (DFA) and non-deterministic (NFA, GNFA) automata. In a deterministic automaton, every state has exactly one transition for each possible input. In a non-deterministic automaton, an input can lead to one, more than one, or no transition for a given state. The powerset construction algorithm can transform any nondeterministic automaton into a (usually more complex) deterministic automaton with identical functionality.
A finite-state machine with only one state is called a "combinatorial FSM". It only allows actions upon transition into a state. This concept is useful in cases where a number of finite-state machines are required to work together, and when it is convenient to consider a purely combinatorial part as a form of FSM to suit the design tools.[11]
Alternative semantics
There are other sets of semantics available to represent state machines. For example, there are tools for modeling and designing logic for embedded controllers.[12] They combine hierarchical state machines (which usually have more than one current state), flow graphs, and truth tables into one language, resulting in a different formalism and set of semantics.[13] These charts, like Harel's original state machines,[14] support hierarchically nested states, orthogonal regions, state actions, and transition actions.[15]
Mathematical model
In accordance with the general classification, the following formal definitions are found.
A deterministic finite-state machine or deterministic finite-state acceptor is a quintuple , where:
• is the input alphabet (a finite non-empty set of symbols);
• is a finite non-empty set of states;
• is an initial state, an element of ;
• is the state-transition function: (in a nondeterministic finite automaton it would be , i.e. would return a set of states);
A finite-state machine has the same computational power as a Turing machine that is restricted such that its head may only perform "read" operations, and always has to move from left to right. That is, each formal language accepted by a finite-state machine is accepted by such a kind of restricted Turing machine, and vice versa.[16]
A finite-state transducer is a sextuple , where:
• is the output alphabet (a finite non-empty set of symbols);
• is a finite non-empty set of states;
• is the initial state, an element of ;
• is the state-transition function: ;
• is the output function.
If the output function depends on the state and input symbol () that definition corresponds to the Mealy model, and can be modelled as a Mealy machine. If the output function depends only on the state () that definition corresponds to the Moore model, and can be modelled as a Moore machine. A finite-state machine with no output function at all is known as a semiautomaton or transition system.
Optimizing an FSM means finding a machine with the minimum number of states that performs the same function. The fastest known algorithm doing this is the Hopcroft minimization algorithm.[18][19] Other techniques include using an implication table, or the Moore reduction procedure.[20] Additionally, acyclic FSAs can be minimized in linear time.[21]
Hardware applications
In a Medvedev machine, the output is directly connected to the state flip-flops minimizing the time delay between flip-flops and output.[22][23]
Software applications
The following concepts are commonly used to build software applications with finite-state machines:
• Automata-based programming
• Event-driven finite-state machine
• Virtual finite-state machine
• State design pattern
Finite-state machines and compilers
See also
• Abstract state machines (ASM)
• Artificial intelligence (AI)
• Abstract State Machine Language (AsmL)
• Behavior model
• Communicating finite-state machine
• Control system
• Control table
• Decision tables
• DEVS: Discrete Event System Specification
• Extended finite-state machine (EFSM)
• Finite-state machine with datapath
• Hidden Markov model
• Homing sequence
• Low-power FSM synthesis
• Petri net
• Pushdown automaton
• Quantum finite automata (QFA)
• Recognizable language
• Semiautomaton
• Semigroup action
• Sequential logic
• Specification and Description Language
• State diagram
• State pattern
• Synchronizing sequence
• Transformation monoid
• Transition monoid
• Transition system
• Tree automaton
• Turing machine
• UML state machine
• Unique input/output sequence (UIO)
1. Wang, Jiacun (2019). Formal Methods in Computer Science. CRC Press. p. 34. ISBN 978-1-4987-7532-8.
2. "Finite State Machines – Brilliant Math & Science Wiki". Retrieved 2018-04-14.
3. Belzer, Jack; Holzman, Albert George; Kent, Allen (1975). Encyclopedia of Computer Science and Technology. 25. USA: CRC Press. p. 73. ISBN 978-0-8247-2275-3.
4. Koshy, Thomas (2004). Discrete Mathematics With Applications. Academic Press. p. 762. ISBN 978-0-12-421180-3.
5. Wright, David R. (2005). "Finite State Machines" (PDF). CSC215 Class Notes. David R. Wright website, N. Carolina State Univ. Archived from the original (PDF) on 2014-03-27. Retrieved 2012-07-14.
9. Jacek Jonczy (Jun 2008). "Algebraic path problems" (PDF). Archived from the original (PDF) on 2014-08-21. Retrieved 2014-08-20., p. 34
10. Felkin, M. (2007). Guillet, Fabrice; Hamilton, Howard J. (eds.). Quality Measures in Data Mining - Studies in Computational Intelligence. 43. Springer, Berlin, Heidelberg. pp. 277–278. doi:10.1007/978-3-540-44918-8_12. ISBN 978-3-540-44911-9.
11. Brutscheck, M., Berger, S., Franke, M., Schwarzbacher, A., Becker, S.: Structural Division Procedure for Efficient IC Analysis. IET Irish Signals and Systems Conference, (ISSC 2008), pp.18–23. Galway, Ireland, 18–19 June 2008.
12. "Tiwari, A. (2002). Formal Semantics and Analysis Methods for Simulink Stateflow Models" (PDF). Retrieved 2018-04-14.
14. "Harel, D. (1987). A Visual Formalism for Complex Systems. Science of Computer Programming, 231–274" (PDF). Archived from the original (PDF) on 2011-07-15. Retrieved 2011-06-07.
16. Black, Paul E (12 May 2008). "Finite State Machine". Dictionary of Algorithms and Data Structures. U.S. National Institute of Standards and Technology. Archived from the original on 13 October 2018. Retrieved 2 November 2016.
19. Almeida, Marco; Moreira, Nelma; Reis, Rogerio (2007). On the performance of automata minimization algorithms (PDF) (Technical Report). DCC-2007-03. Porto Univ. Archived from the original (PDF) on 17 January 2009. Retrieved 25 June 2008.
20. Edward F. Moore (1956). C.E. Shannon and J. McCarthy (ed.). "Gedanken-Experiments on Sequential Machines". Annals of Mathematics Studies. Princeton University Press. 34: 129–153. Here: Theorem 4, p.142.
21. Revuz, D. (1992). "Minimization of Acyclic automata in Linear Time". Theoretical Computer Science. 92: 181–189. doi:10.1016/0304-3975(92)90142-3.
23. Slides Archived 18 January 2017 at the Wayback Machine, Synchronous Finite State Machines; Design and Behaviour, University of Applied Sciences Hamburg, p.18
24. Aho, Alfred V.; Sethi, Ravi; Ullman, Jeffrey D. (1986). Compilers: Principles, Techniques, and Tools (1st ed.). Addison-Wesley. ISBN 978-0-201-10088-4.
Further reading
Finite-state machines (automata theory) in theoretical computer science
• Arbib, Michael A. (1969). Theories of Abstract Automata (1st ed.). Englewood Cliffs, N.J.: Prentice-Hall, Inc. ISBN 978-0-13-913368-8.
• Bobrow, Leonard S.; Arbib, Michael A. (1974). Discrete Mathematics: Applied Algebra for Computer and Information Science (1st ed.). Philadelphia: W. B. Saunders Company, Inc. ISBN 978-0-7216-1768-8.
• Brookshear, J. Glenn (1989). Theory of Computation: Formal Languages, Automata, and Complexity. Redwood City, California: Benjamin/Cummings Publish Company, Inc. ISBN 978-0-8053-0143-4.
• Davis, Martin; Sigal, Ron; Weyuker, Elaine J. (1994). Computability, Complexity, and Languages and Logic: Fundamentals of Theoretical Computer Science (2nd ed.). San Diego: Academic Press, Harcourt, Brace & Company. ISBN 978-0-12-206382-4.
• Hopcroft, John E.; Motwani, Rajeev; Ullman, Jeffrey D. (2001). Introduction to Automata Theory, Languages, and Computation (2nd ed.). Reading Mass: Addison-Wesley. ISBN 978-0-201-44124-6.
• Hopkin, David; Moss, Barbara (1976). Automata. New York: Elsevier North-Holland. ISBN 978-0-444-00249-5.
• Papadimitriou, Christos (1993). Computational Complexity (1st ed.). Addison Wesley. ISBN 978-0-201-53082-7.
• Sipser, Michael (2006). Introduction to the Theory of Computation (2nd ed.). Boston Mass: Thomson Course Technology. ISBN 978-0-534-95097-2.
• Wood, Derick (1987). Theory of Computation (1st ed.). New York: Harper & Row, Publishers, Inc. ISBN 978-0-06-047208-5.
Abstract state machines in theoretical computer science
Machine learning using finite-state algorithms
• Mitchell, Tom M. (1997). Machine Learning (1st ed.). New York: WCB/McGraw-Hill Corporation. ISBN 978-0-07-042807-2.
Hardware engineering: state minimization and synthesis of sequential circuits
Finite Markov chain processes
|
Health & Wellbeing
New evidence linking high iron levels with shorter lifespan
New evidence linking high iron...
Research suggests healthy individuals without a clinically diagnosed iron deficiency should not take iron supplements
View 1 Image
Hot on the heels of a recently published genomic study correlating blood iron levels with healthy aging, more research is suggesting high systemic iron levels can be linked with reduced life expectancy. The current research does not prove a causal relationship between high iron levels and shorter lifespans, but it does support advice recommending iron supplementation is only necessary in people with a diagnosed iron deficiency.
The new study builds on a growing body of research linking irregular systemic iron levels with a number of different diseases. The majority of prior study on the topic has been epidemiological, highlighting correlation but not demonstrating causation. The new research deployed an increasingly popular statistical technique called Mendelian randomization, designed to better investigate possible causal connections in observational studies.
The researchers first investigated genetic data from 48,972 subjects to find correlations between gene variants and systemic iron levels. Three specific gene variants were implicated in abnormal systemic iron homeostasis.
The researchers then looked at a much larger genomic dataset, encompassing over one million subjects, to measure the association between these genetic markers and overall life expectancy. The results revealed a consistent association between reduced life expectancy and a genetic predisposition to higher iron levels.
"We have known for a long time that having too much or too little iron in your system can have serious impacts on your health, and that effectively modifying iron levels can help many people with underlying conditions,” says Dipender Gill from Imperial College London, and supervisor on the research. “Our findings build on previous work to clarify that picture further, showing that people who have genetic predisposition to slightly raised levels of iron in the body have reduced life expectancy on average.”
Iyas Daghlas, co-author on the new research from Harvard Medical School, stresses these findings should not be applied directly to clinical practice at this stage as plenty more work is needed to understand the relationship between iron levels and general health. Plus, there is an urgent need to investigate whether iron supplementation is dangerous if people are boosting their levels when they do not need to.
"These findings should not yet be extrapolated to clinical practice, but they further support the idea that people without an iron deficiency are unlikely to benefit from supplementation, and that it may actually do them harm,” says Daghlas. “We emphasize that these results should not be applied to patient populations with a compelling reason for iron supplementation, such as patients with symptomatic iron deficiency anemia, or in patients with heart failure."
The new research was published in the journal Clinical Nutrition.
Source: Imperial College London
Well, I'm getting my yearly blood draw this week, I'll make sure they measure Iron...
It is so interesting the number of articles written to inform the public yet there is so little or no information about the key, common sense, question: How much does this shorten one's life? Put another way, as it is often stated: Taking this drug or eating this food or not enough sleep or.... doubles your chance of some negative outcome. But nowhere does a typical article tell you that by going from a risk of 1 in 900,000 you now have a risk of 1 in 450,000, which in fact, does represent a doubling of risk of death. Let's get hard numerical data please. We can handle the numbers.
Many years ago, in the weekly magazine Science News, I read about a study that showed that pre-menopausal women had half the heart attack rate of men the same age. Post-menopausal women had the same heart attack rate as men of the same age. Now, here's the kicker- men who were regular blood donors had the same rate as pre-menopausal women, and post-menopausal women who were regular blood donors did not increase their rates! I confirmed this with my primary care physician who told me that giving blood was the best thing you could do for your heart, after giving up smoking (assuming you were a smoker, which I am not). I subsequently had a DVT and PEs, which required me to take Warfarin (or equivalent), and I had to stop donating. After ten years, I was able to convince my hematologist to take me off the anti-coagulant, si now I am looking forward to donating again. I wonder why the blood banks do not advertise this, as they are always looking for more donors?
This is only meant to confuse the public into complacency. Remember Coffee, grains, eggs?; good for you, bad for you, bad for you good for you, good for you bad for you. Who gave the info? Pharmaceuticals "informing" the masses. I CALL B.S. JUST ENJOY LIFE!
Donate blood as often as allowed, especially men, and men tend to have excess iron!
Dumps off some excess iron.
There goes my chance to keep enjoying kale, collard green, broccoli..... |
Yale study solves mystery of how stress triggers inflammation
Yale study solves mystery of h...
In a new study, stress was seen to trigger the release of an immune cell called IL-6 from brown fat cells
View 1 Image
A new Yale University-led study has solved a long-standing mystery of how acute stress seems to amplify inflammatory disease despite the fact many stress hormones actually suppress the immune system. The research reveals a particular immune cell is released by fat cells when an organism faces systemic stress.
For several decades a link between stress and inflammatory disease has been clear, with many chronic diseases obviously triggered into flare-ups by acute periods of stress. However, underlying this clear observation has been an unexplained paradox; hormones released by the body in the face of stress, such as cortisol and adrenaline, confer distinctly immunosuppressive effects, yet stress somehow still seems to stimulate inflammation.
“In the clinic, we have all seen super-stressful events that make inflammatory disease worse, and that never made sense to us,” explains corresponding author on the study, Andrew Wang.
The new study stemmed from a novel laboratory observation. Taking blood samples from mice is an inherently stressful procedure and the researchers noticed this correlated with an increase in interleukin-6 (IL-6) levels. Increased IL-6 levels have previously been implicated in autoimmune conditions and acute stress, but exactly how it is released has not been studied.
The results of the new research, described as “completely unexpected” by one of the authors, reveal IL-6 is secreted by brown fat cells in the face of acute stress. It’s this immune mechanism that amplifies inflammation when we face a stressful situation. And, when signaling between the brain and brown fat cells was blocked in mice, the animals no longer showed inflammatory responses when presented with stressful situations.
But one question still remained unanswered – what evolutionary function explains why stress triggers such a damaging immune system mechanism?
Here, the researchers discovered IL-6 plays a fundamental role in mediating hypoglycemia. Essentially, this helps prepare the body for increases in glucose production necessary as fuel for our “fight or flight” response. The study explains, from an evolutionary perspective, “this adaptation comes at the cost of enhancing mortality to a subsequent inflammatory challenge.”
Therefore, these findings offer compelling and novel research pathways, not only for a number of autoimmune conditions, but also for many mental health disorders. When IL-6 was blocked in the mice the animals displayed significant reductions in signs of agitation, suggesting the immune mechanism may play a role in anxiety and depression.
IL-6-inhibiting drugs already exist, and have been used to treat autoimmune conditions such as rheumatoid arthritis. Tocilizumab, the first FDA-approved IL-6 inhibitor, is already being trialed as an anti-depressant therapy.
The new research was published in the journal Cell.
Source: Yale University
Stoep Tegel
The study only mentions acute stress. I would love to learn if this interleukin-6 (IL-6) also gets released during times when stress is continuous.
I would classify the current state of the world as continuous stress. In my direct environment I see many people suddenly developing all sorts of inflammatory pain. Text like this makes me wonder if IL-6 is causing their inflammation.
Thank you this was a good read!
Stoep Tegel
Also interesting to know is if the amount of IL-6 that gets released is proportional to the amount of (brown) fat cells. That would justify the leap that body composition is a factor in this process. |
Europe is a large densely populated area where there are few free lands. Consequently, relatively small solar energy projects are traditionally implemented. The largest solar power plant in Europe today is called Cestas, which is located in Bordeaux, France with a capacity of 300 MW.
As you know, there are far more objects in other parts of the world – in China, India and the United States. Now the Europeans want to build a solar garden with more than 1 GW. Particularly, it is planned to build a photovoltaic power plant with a capacity of 1.2 GW which will be divided into several land plots that will be located directly between the administrative units of Allons, Boussès, Sauméjan and Pompogne.
Source: Here. |
Timber Rattlesnake (Crotalus horridus)
Other Names
Canebrake Rattlesnake
Species of Greatest Conservation Need (SGCN)
Timber rattlesnakes have wide heads and narrow necks—a typical distinction of all venomous snakes except coral snakes (Micrurus fulvius). Timber rattlers are the second largest venomous snake in Texas and third largest in the United States. Adult timber rattlesnakes reach a length of 36 to 40 inches (91 to 101 cm), and weigh 1.3 to 2 pounds (0.58 to 0.9 kg). They have a heavy, light yellow, gray or greenish-white body with a rust-colored strip along the length of their bac and a black tail is tipped with rattles. Timber rattlesnakes have yellow eyes with elliptical or cat-like pupils. Twenty to 29 dark, V-shaped crossbars with jagged edges form a distinctive pattern across their back.
Life History
Rabbits, squirrels, rats, mice and occasionally birds, other snakes, lizards, and frogs are the timber rattlesnake's prey. Coyotes, bobcats, skunks, foxes, hawks and owls, and snake-eating snakes such as king snakes, indigo snakes and cottonmouths feed on timber rattlesnakes. Sexual maturity is reached at three years for males and up to four years for females. Mating season is in early spring; only once every two to three years for females.
Timber rattlers, like other pit vipers, do not lay eggs. Instead the eggs are kept inside the female's body until they are ready to "hatch." The egg have an estimated incubation time of six months. Litters consist of between five and 20 young, which are 10 to 17 inches long (25 to 43 cm). Young may remain near their mother for seven to ten days after birth, but no parental care is provided. Timber rattlesnakes live up to ten years.
Although diurnal (active during the day) during spring and fall, timber rattlesnakes become nocturnal (active at night) during the oppressive heat of the summer. They will coil beside a fallen tree or log and wait for their quick-moving prey to pass. Pit vipers can develop an appetite for certain prey—some spend their lives eating only birds or chipmunks while others will eat a variety of foods. Their interest and appetite seems to be shaped by killing a particular prey early in life.
Highly venomous, timber rattlesnakes are sometimes slow to defend themselves and rely on their ability to blend into their surroundings to avoid confrontation. They seek to escape rather than risking danger and will remain silent, and if possible, will hide before revealing their position to a predator. Despite their large size and reputation, they are difficult to provoke into rattling or biting. Still, it does happen. It is best not to take any chances with such a potentially deadly snake. If one is bitten, seek immediate medical attention.
According to popular belief, one can tell the age of a rattlesnake by the number of rattles present at the end of its tail. A baby rattlesnake is born with the first segment of its rattle, called a "button". As the snake grows (and with each molting of its outer skin) an additional segment is added to its rattle. Younger snakes shed more often than older snakes, but on average, free-ranging snakes may molt three to six times a year. Another clue to a snake's age is its color: timber rattlers darken as they age, and the darkest are old males. The scientific name, Crotalus horridus, is formed from two Latin words: crotalum, meaning "bell or rattle," and horridus, for "dreadful"—which makes reference to its venom.
Timber rattlesnakes prefer moist lowland forests and hilly woodlands or thickets near permanent water sources such as rivers, lakes, ponds, streams and swamps where tree stumps, logs and branches provide refuge.
Timber rattlesnakes are found in upland woods and rocky ridges in the eastern United States; the eastern third of Texas.
Although many timber rattlers meet their deaths at the hands of people or by automobiles, the fastest way to kill timber rattlesnake populations is by destroying or altering the places they need to hunt, hibernate and live. Today, every state inhabited by timber rattlesnakes has laws protecting the species, including Texas. In Texas, it is listed as a threatened species. This means that people cannot take, transport, have in their possession or sell timber rattlesnakes. |
Fires in the Amazon: Everything you need to know
By Nyra Pasha, News editor
Recent news has amplified the horrifying fires occurring in the Amazon rainforest. Brazil has had 40,341 fires, the highest number since 2010, according to the country’s National Institute of Space Research Agency. Many assume that these fires are the result of climate change; however, this is not the case. This summer, Brazil has seen an increase in man made fires that are set by farmers in order to clear the land for a new growing season.
Climate change can make the fires worse by making the fire burn hotter and spread faster. As a result, over sixty percent of trees are dying after every fire. The Amazon rainforest holds 100 billion tons of the world’s
carbon in its millions of trees. If these fires continue to rage on, the once bountiful rainforest could transform into a dry savanna, which could contribute to an extreme reduction in Earth’s oxygen levels. Another effect would be a great output of carbon dioxide into the air since savannas are unable to maintain vast quantities of the gas.
Scientists have declared that the Amazon could face severe deforestation
that will not be reversible. The Amazon rainforest fires have garnered a great amount of attention and global response. Thousands have shared posts about the devastating fires on social media like Twitter and Instagram. Pictures of Sao Paulo, Brazil’s capital, covered in smog with a black sky have circulated through the internet causing great concern.
Many celebrities have also spread awareness on social media. Most significantly, Leonardo DiCaprio pledged to donate 5 million dollars to help aid relief efforts in the rainforest. Brazil’s president Bolsonaro originally rejected 20 million dollars in foreign aid through the G7 aid program, but has since reversed his decision and is now accepting the money. |
Traveling Green
School of Management Associate Professor Michelle Millar discusses sustainability in the hospitality industry and what it means to be a responsible traveler.
Image credit: sloth by henryalien, via flickr. This work is licensed under a CC BY-NC 2.0.
In 2005, my life changed when I took a trip to Costa Rica, a country well known for its natural beauty, wildlife, and commitment to sustainability and ecotourism. During my adventure, I found my way into the jungle and ended up in a small ecolodge (but that’s a story for another time!).
It was at this lodge, that my eyes were opened to the minimal impact that one business can have on the environment. For example, lunch and dinner orders were taken in the morning so that the only food ingredients purchased that day were for our meals that day, which eliminated waste from unused ingredients.
Prior to that trip, my concept of ecotourism was traveling to Oklahoma every year in a ‘67 Country Squire Station wagon– with no air conditioning, staying on a farm with my family, and taking a bath in a washtub with my sister because there was no running water.
I have learned quite a bit since then.
In 2015, just over one billion people traveled the world. That number is expected to increase to 1.7 billion by 2025. That is a lot of people moving around the world, which will no doubt have a major impact on our planet. While some of those travelers might consider themselves environmentally conscious travelers, their behavior while traveling often says otherwise.
How about you?
Are you a responsible traveler? Do you practice the same behavior when traveling as you do at home? Do you turn that water off when brushing your teeth in a hotel? Re-use your bath towels in your hotel? Or, do you “conveniently” forget all of that behavior because it’s easier when on vacation? These are the kinds of questions I like to answer with my research in the hospitality and tourism industry.
When I started researching this topic about 10 years ago, existing work focused on sustainable tourism, but no one was studying it operationally for hotels. This was at a time when the term “greening” was creating quite a buzz for hoteliers who scrambled to make their hotels environmentally friendly, but no one was talking to the guests.
Did guests even care about a green hotel? Did they even know what that meant? The hospitality industry revolves around providing quality service and exceptional experiences for its guests, but no one was even talking with them to see if staying at a green hotel was something they wanted.
Well, it turns out that guests are interested in staying in a green hotel, but they have their limits.
• They do not mind recycling, linen-reuse programs, or efficient lighting.
• Low-flow fixtures are okay, as long as the shower pressure is good.
• Soap and shampoo dispensers save hugely on waste, yet guests do not want them because they are reminded too much of going to a gym.
• They also do not want to be inconvenienced in any way to participate in a hotel’s environmentally friendly programs.
• Recycling bins in the room are good, but bins only in the hallways or hotel lobby are an inconvenience.
It turns out travelers are picky– and despite the fact that they may say they are environmentally conscious travelers, their behaviors often do not support their attitudes. It seems that many travelers become different people when they travel.
Fortunately, hoteliers are moving forward and forging change in the industry, and as a result, traveler behavior. It saves hoteliers money and saves the environment, and at the same time, it gives them the opportunity to educate guests about environmental impact. As my research has shown, this education and change is carrying over into other sectors of hospitality. They are “training” us to be better travelers, even if it may not be top-of-mind initially. Education, education, education is what it’s all about; but then, of course I would say that!
So—the next time you travel, I challenge you to think about the type of traveler you are. Is the environment “top-of-mind” just as it might be at home? Do you elect to stay in green hotels? If so, what would you expect when staying in one? |
Skip to main content
L-BSE experimentally transmitted to sheep presents as a unique disease phenotype
Apart from prion protein genotype, the factors determining the host range and susceptiblity for specific transmissible spongiform encephalopathy agents remain unclear. It is known that bovine atypical L-BSE can transmit to a range of species including primates and humanised transgenic mice. It is important, therefore, that there is as broad an understanding as possible of how such isolates might present in food animal species and how robust they are on inter- and intra-species transmission to inform surveillance sytems and risk assessments. This paper demonstrates that L-BSE can be intracerebrally transmitted to sheep of several genotypes, with the exception of ARR/ARR animals. Positive animals mostly present with a cataplectic form of disease characterized by collapsing episodes and reduced muscle tone. PrP accumulation is confined to the nervous system, with the exception of one animal with lymphoreticular involvement. In Western blot there was maintenance of the low molecular mass and glycoform profile associated with L-BSE, irrespective of ovine host genotype, but there was a substantially higher N-terminal antibody signal relative to the core-specific antibody, which is similar to the ratio associated with classical scrapie. The disease phenotype was maintained on experimental subpassage, but with a shortened survival time indicative of an original species barrier and subsequent adaptation. Passive surveillance approaches would be unlikely to identify such cases as TSE suspects, but current statutory active screening methods would be capable of detecting such cases and classifying them as unusual and requiring further investigation if they were to occur in the field.
The transmissible spongiform encephalopathies (TSE), fatal neurodegenerative diseases of animals, have been recognised for nearly three hundred years. Despite similar diseases occurring in man (e.g. [1]) the animal TSE were not regarded as zoonotic until the emergence in 1996 of variant Creutzfeldt-Jakob Disease (vCJD), linked to bovine spongiform encephalopathy (BSE) [24] which was first described in cattle in the 1980s [5]. The subsequent BSE epidemic, driven by the recycling of the agent in feedstuffs, affected nearly 200 000 cattle in the UK and, to a lesser extent, elsewhere, particularly in Europe [6]. It is thought to have been attributable to a single strain of agent [79], now referred to as classical BSE (C-BSE).
Following the implication of BSE as the origin of vCJD in man, substantial effort and expense has gone into ensuring the safety of the animal feed and human food chains. It was established through experimental challenge that sheep and goats were susceptible to C-BSE [10, 11] and a formal component of disease surveillance currently requires the classification of all TSE positive small ruminant isolates as “BSE-like” or “non-BSE-like” [EC TSE surveillance regulations (999/2001 as amended 36/2005)]. This reflects the hypothetical risk that would have been posed to the sheep population through exposure to BSE-contaminated concentrate feeds prior to the banning of mammalian protein in mammalian feedstuffs. These concerns have since been reinforced by the identification of two naturally-occurring cases of classical BSE in goats, one in France [12] and one in Scotland [13, 14].
Since its introduction in 2001, systematic EU-wide active surveillance for TSE in cattle and small ruminants [EU reg 999/2001] has resulted in the detection of two additional forms of BSE in cattle, commonly referred to collectively as “atypical”, that affected mainly cattle eight years of age or older (for reviews see [15, 16]). These cases were characterised as different from C-BSE, and designated H-BSE and L-BSE (also referred to as bovine amyloidotic spongiform encephalopathy (BASE) [17]), based on molecular features of the disease-associated form (PrPSc) of the host PrP, or prion protein, which is the marker recognised by all current surveillance tests [18, 19]. To date, none of the “atypical” BSE cases diagnosed in various countries in cattle (Bos taurus) have been reported as clinical TSE suspects, and most cases have been identified through the surveillance of fallen stock. Given the rarity of these cases, and their widespread geographical distribution it has been speculated, but not yet established, that these atypical forms of disease are genetic in origin and/or arise spontaneously, and that they may be the origin of classical BSE [20, 21]. Even if there is no evidence of natural spread between animals in the field, these variants have been shown (like C-BSE) to transmit experimentally into a range of host species.
There is still no robust understanding of what makes a particular host susceptible, or a TSE isolate zoonotic [22], and it has been demonstrated that atypical BSE can transmit to a range of species including primates [2325] and humanised transgenic mice [26, 27]. It is important, therefore, that there is as broad an understanding and awareness of how such isolates present in food animal species, how robust they are on inter- and intra-species transmission, and that they are characterised as fully as possible to assist with the maintenance of robust surveillance sytems and the assessment of risk to both human and animal health.
The susceptibility of sheep to scrapie and BSE is strongly influenced by different polymorphisms of the PRNP gene that encodes for prion protein (PrP), with polymorphisms at codons 136 (A or V), 141 (L or F), 154 (R or H) and 171 (R, Q or H) demonstrated to be of major importance (for recent review, see [16]). Therefore, when investigating the transmissibility to sheep of any non-ovine isolates, it is important to consider a range of host genotypes, to account for potentially variable susceptibility.
This paper presents a study of the transmissibility and characterisation of L-BSE in sheep of various genotypes, and assesses whether the current surveillance requirements would be sufficient to detect and classify such cases if they were to occur in the field.
Materials and methods
Animal experimentation
All inoculations were carried out under general anaesthesia and in accordance with the United Kingdom (UK) Animal (Scientific Procedures) Act 1986, under license from the UK Government Home Office (Project licence no: 70/6781). Such license is only granted following approval by the internal Animal and Plant Health Agency (APHA) ethical review process as mandated by the Home Office.
Inoculum (10% w/v brain homogenate in normal saline) was prepared from an Italian L-BSE field case (141387/02), and stored at −80 °C prior to use. TSE negative bovine brain, previously sourced from New Zealand, was used as a negative control inoculum with the kind agreement of the New Zealand authorities.
All recipient sheep were supplied from the Defra New Zealand-derived flock [28] and were 4–6 months old at inoculation. For the primary passage, five sheep of each of five PRNP genotypes A136F141R154Q171/AFRQ, ARR/ARR, ARQ/ARQ; ARQ/VRQ, VRQ/VRQ [the amino acid at codon 141 (L in wild-type, F when polymorphic) is only indicated when it deviates from the wild type] were inoculated intracerebrally (IC) with 1 mL of inoculum. All sheep were housed for the duration of the study in biosecure accommodation that had never previously housed any TSE affected animals, and was fully cleaned and disinfected (20% Chloros) prior to use. Each pen had separate equipment and personal protective clothing. Animals were handled and observed daily as part of routine husbandry procedures, until clinical disease developed, or until a pre-determined experimental endpoint of approximately 5 years post-inoculation (pi). A further two sheep of each genotype were inoculated with negative control brain material and housed in the same building but separated by a concrete wall so that they only shared the same air space.
Following the identification of the first positive animals in the primary passage study, inoculum for sub-passage was prepared from two positive sheep, one AFRQ/AFRQ and one ARQ/VRQ. These animals were selected to reflect the two slightly different clinical presentations that had been observed in the animals that had succumbed to disease at that time. Each ovine source was used to inoculate five AFRQ/AFRQ and five ARQ/VRQ recipients. Both inoculation groups were housed in separate pens, similar to the primary passage study.
Clinical monitoring
All sheep were examined neurologically prior to inoculation, then monitored daily during routine husbandry procedures (feeding, bedding changes) and weighed monthly. Weight loss prior to cull was expressed in percent of the previous body weight determined prior to weight loss. Routine clinical examinations [29] were conducted quarterly from 8 months pi (primary passage) and 6 months pi (sub-passage), increasing to weekly for any formal suspect animal. Additional neurological examinations [30] were conducted prior to cull (with the exception of the first culled sheep, which was last examined 2 months prior to death), or if animal husbandry staff noted any signs suggestive of a neurological disease. Inoculated animals were also monitored during the daytime by CCTV.
The clinician was unaware of the genotype of specific challenged animals but the identity of the control group in the primary passage was known because these animals were always examined first.
Clinical end-point was considered to have been reached when sheep displayed progressive abnormalities in sensation (positive scratch test with or without alopecia, absent menace response) and movement (ataxia, limb weakness, tremor). In addition, the display of signs likely to result in permanent recumbency or death, such as seizures or collapse not triggered by human intervention, was considered to be a clinical end-point, which resulted in cull using quinalbarbitone sodium (Somulose, Arnolds) intravenously. Animals, including the controls, that remained healthy throughout the study, were killed at the end of the study. One control animal from each genotype pair was killed after the last animal in the matched genotype challenged group succumbed, and the others were kept until the endpoint of the study, approximately 5 years post challenge.
Pathology and immunohistochemistry
Postmortem, the whole brain was removed from each sheep and hemisected longitudinally. One half of the brain was placed into 10% formal saline for histology, and the other half stored at −80 °C. Samples representative of the trigeminal, nodose, cranial cervical, stellate and coeliaco-mesenteric ganglia, the lateral retropharyngeal and mesenteric lymph nodes, the recto-anal mucosa-associated lymphoid tissue (RAMALT), the spleen, the distal ileum (with Peyer’s patches) and the extraocular muscles were also collected into 10% buffered formalin.
All brain tissue was routinely fixed, blocked to represent the major levels of the neuraxis and processed, sectioned and stained with haematoxylin and eosin as described in detail elsewhere [31]. Immunohistochemical detection of PrPSc was performed on adjacent sections from the same brain blocks, and on the other tissues, using mouse monoclonal antibody (mAb) 2G11 (ABD Serotec), raised against the ovine PrP peptide sequence 146-R154 R171-182, as described in detail elsewhere [32]. Sections from the obex were also immunolabelled with the mAb P4, which can be used to discriminate ovine BSE from scrapie [33]. Vacuolation and immunohistochemistry profiles were created using standard subjective methods as previously described [31, 34] in which the severity of vacuolar lesions, or the type of PrP immunolabelling, is assessed in a standard range of precise neuroanatomical areas. Some modifications were made to the original method [34] to accommodate the range of morphological PrPSc immunolabelling types first identified in atypical scrapie.
Western immunoblot
All samples were subjected to the BioRad TeSeE™ Western immunoblot (according to the manufacturer’s instructions) and, run on two replicate gels (18.75 mg tissue equivalent per well). The primary antibodies were Sha31 (prepared according to the kit protocol) and P4 (0.2 µg/mL, RIDA®, r-Biopharm). The signal was developed using ECL detection blotting reagents, detected and analysed with exposure times of 1 and 10 min using Biorad Quantity One vers. 4.6.9 software on Fluor-S Max imager. Where Sha31 and P4 antibody ratio calculations were performed the images for both antibodies were obtained at the same time and 1 min exposure times were used.
The original bovine donor animal, a classical bovine BSE field case, an ovine classical scrapie field case, an experimentally transmitted ovine BSE [35] and a negative ovine sample were used as controls alongside the primary passaged samples. The same field case bovine BSE and ovine scrapie controls were used as controls alongside the sub-passaged samples.
Western immunoblots were also performed on retropharyngeal lymph node from the single primary passage pre-clinical VRQ/VRQ animal which displayed peripheral tissue involvement. Brain tissue from the same animal, lymphoid and brain tissue from experimentally transmitted ovine classical BSE and brain tissue from the field case bovine BSE and field case ovine BSE were used as comparative controls.
Samples from all positive animals from the primary passage were subject to four commercially available ELISA tests—IDEXX Herdchek™ with bovine conjugate, IDEXX Herdchek™ with ovine conjugate, BioRad TeSeE™ and BioRad S&G™. For each test, samples were extracted and the tests carried out in accordance with the manufacturers’ instructions.
Details of all inoculated animals can be found in Table 1. There was a wide range of overlapping incubation periods for each affected genotype in the primary passage.
Table 1 Summary of inoculation outcomes with survival times and rates
The survival periods for the sheep in the sub-passage study were substantially shorter than those of the donor animals.
Using the two-sample Kolmogorov–Smirnov tests of the equality of distributions, pairwise comparison of the sub-passage groups revealed that the survival period in the ARQ/VRQ homologous transmission group was significantly different to those of the other three groups (ARQ/VRQ donor to AFRQ/AFRQ recipient: p = 0.007; AFRQ/AFRQ donor to AFRQ/AFRQ recipient: p = 0.05; AFRQ/AFRQ donor to ARQ/VRQ recipient: p = 0.05.) The ARQ/VRQ donor into AFRQ/AFRQ recipient group, and the AFRQ/AFRQ donor into the ARQ/VRQ recipient group were also significantly different from each other (p = 0.05).
Clinical observations
The 10 control animals inoculated with normal brain survived to the relevant endpoint of the study; three (one AFRQ/AFRQ, one ARQ/ARQ and one ARQ/VRQ) were killed after the last challenged animal in the relevant challenge group succumbed to clinical disease, at 1678 ± 20 days post challenge (dpi). Neurological signs indicative of a vestibular disease were seen in one sheep (39/13, AFRQ/AFRQ) from 1376 dpi. A positive scratch test [29] was displayed irregularly by seven sheep between 915 and 1681 dpi attributable to hay in the fleece and/or lesions suggestive of Chorioptes mange. Neither wool loss nor weight loss was recorded in any of the control animals prior to cull. The remaining seven control animals were culled at 1978 ± 1 dpi.
From the primary passages, only two VRQ/VRQ animals and the five ARR/ARR animals survived to the pre-determined cull point at approximately 5 years post challenge. None of the ARR/ARR sheep displayed signs suggestive of a neurological disease, but both VRQ/VRQ sheep inconsistently displayed fore limb hypermetria and circled when blindfolded, from 1225 and 1713 dpi respectively. Both sheep were considered clinically healthy at cull. At post-mortem, one of the VRQ/VRQ animals (48/13) was found to be positive by all diagnostic methods, while the other clinically normal animals were negative by all tests.
One AFRQ/AFRQ sheep developed changes in behavior and mental status (confusion, separation from others, pica) from 860 dpi and subsequent ataxia, hypermetria, circling and loss of balance when blindfolded, but no weight loss. This sheep was culled at 867 dpi as a TSE suspect, but TSE was not confirmed by postmortem testing.
In the primary passage study, two clinical syndromes were described based on the major presenting clinical sign (Table 2). Pruritic behaviour (rubbing, scratching and nibbling itself) resulting in wool loss and later ataxia, which was indistinguishable from the pruritic form of classical scrapie, or experimental ovine classical BSE [35] was displayed by two sheep. These sheep also presented with a positive scratch test that could later be elicited by merely applying firm pressure on the back (see Additional file 1: pruritic form). More frequently, affected animals presented with a cataplectic form of disease, characterized by collapsing episodes with reduced muscle tone, often with low head carriage and initially triggered by lifting of the head or more stressful events (e.g. foot trimming, restraint for clinical examinations), although in the later stages this occurred during feeding time or in the absence of any obvious stimulus. Initially these episodes were usually very brief, with loss of muscle tone in the limbs causing sheep to drop suddenly to the ground but get up again immediately. With disease progression, complete loss of muscle tone led to lateral recumbency and a complete lack of response, suggestive of narcolepsy (see Additional file 2: cataplectic form). Pruritus was not evident in these cases although some displayed a positive scratch test the significance of which was difficult to interpret given the similar observations in the control sheep.
Table 2 Clinical syndromes in sheep challenged with L-type BSE
The clinical classification was equivocal in the first sheep culled with confirmed TSE (1591/10) because it displayed a positive scratch test without any other signs of pruritus at a time when none of the controls showed this sign but was culled after being observed dropping to the floor with limb muscle contraction, similar to a seizure and contrary to the atonia seen in the cataplectic form (see Additional file 3: seizure-like disorder).
Weight loss of 2.1–14.6% (mean 6.8%) prior to cull was recorded in 15 primary passage sheep (88%).
In the subpassage study, one ARQ/VRQ sheep inoculated with the AFRQ/AFRQ donor inoculum was found dead at 461 dpi without any premonitory signs being observed. Minor weight loss (1.7%) was present prior to death. This sheep was confirmed positive by postmortem examination.
All the other subpassage animals, regardless of the donor/recipient combination, presented with the cataplectic syndrome. Five sheep of one inoculation group also displayed a positive scratch test, probably attributable to the chorioptic mange that was diagnosed in this group.
Nine of the 19 subpassage recipients (47%) that succumbed to clinical disease lost weight prior to cull (0.8–20.4%, mean 7.0%). All 19 sheep were positive by all diagnostic methods.
Vacuolar pathology consistent with TSE was present in all positive cases, with a distribution in the brain that was similar in all L-BSE recipient genotypes (Figure 1) regardless of the clinical presentation or passage history, and distinctly different from animals of the same genotypes infected with classical scrapie or C-BSE [31]. There was limited vacuolation in the brainstem, and the intensity of vacuolation increased markedly in more rostral areas, with high scores for the thalamic areas, the basal ganglia and the cerebral cortex (frontal lobes).
Figure 1
Vacuolar lesion profiles. A Primary transmission of bovine L-BSE to sheep. Square = AFRQ/AFRQ recipients (n = 4), diamond = ARQ/ARQ recipients (n = 5), triangle = ARQ/VRQ recipients (n = 5), circle = VRQ/VRQ recipients (n = 3). B Subpassages of ovine L-BSE to sheep. Square = ARQ/VRQ recipient, ARQ/VRQ donor (n = 5), diamond = AFRQ/AFRQ recipient, AFRQ/AFRQ donor (n = 5), triangle = ARQ/VRQ recipient, AFRQ/AFRQ donor (n = 5), circle = AFRQ/AFRQ recipient, ARQ/VRQ donor (n = 5). X-axis: brain areas from Ligios et al. [31]. 1–11 brainstem areas, 12, 13 the cerebellum, 15–19 midbrain and thalamus, 20–22 the basal ganglia and frontal cortex. Y-axis: mean vacuolation score. Vacuolation is consistently greater in the more rostral brain areas than in the brainstem, regardless of genotype or passage history, with a slight but consistent increase in the intensity of vacuolation throughout the brain following sub-passage.
Widespread immunolabelling was present at all levels of the brain and spinal cord with antibody 2G11. In every case, the predominant labelling type was fine particulate in the neuropil (Figure 2), with intraneuronal and glial labelling also present, and some linear forms and small aggregates. Stellate forms were rarely seen. All of the intraneuronal labelling, and most of the neuropil labelling was lost with antibody P4 (Figures 2A and B), which would be diagnostically consistent with a discriminatory interpretation of “BSE-like” [33]. Distinctive perineuronal labelling was seen in the basal ganglia (Figure 2D). Intracellular labelling was also present in the oligodendrocytes.
Figure 2
Immunohistochemistry representative of ovine L-BSE. All figures illustrate labelling with mAb 2G11, except B. Neuronal and particulate labelling is present in the DNV with mAb 2G11 (A), but absent with mAb P4 (B) (case 455/11). Particulate labelling and small aggregates are abundant in many areas, such as the thalamic nuclei (C) (case 1591/10). Perineuronal labelling in the putamen is a consistent and striking feature of ovine L-BSE (D) (case 1591/10), as is intracellular labelling of oligodendrocytes, seen here in the spinocerebellar tract (rostral medulla) (E) (case 58/11). Intraneuronal labelling is also present in the DRG (F) (case 4/12). Heavy labelling in muscle spindles is also visible (G) (case 267/11) and also in occasional myocytes (H) (case 98/11). Labelling was also present in the LRS (I) and ENS (J) of one VRQ/VRQ recipient (case 48/13).
Detailed mapping using 2G11 revealed no obvious difference in immunolabelling patterns between animals of different genotypes or clinical presentation groupings. Figure 3 shows the mapping of labelling type distribution in one case (455/11) as representative of the central nervous system pathology seen in all the positive sheep in this study. The one VRQ/VRQ sheep that was identified as pre-clinically affected at the 5-year cull point (48/13) demonstrated positive immunolabelling throughout the brainstem, but was negative in the cerebellum and cortical regions. The immunolabelling patterns identified in this case were similar to those seen in the other positive animals, but with the addition of stellate forms in several neuroanatomical nuclei.
Figure 3
Schematic non-quantitative representation of the neuroanatomical distribution of PrP immunolabelling. Every area that was positive contained particulate labelling, so this has been omitted from the figure to make the presence and distribution of the other labelling types easier to see. This map is based on a single case (case 455/11) as representative of all positive animals.
A range of peripheral tissues from each case was systematically screened by IHC (Table 3). In seventeen of the eighteen positive animals, no immunoreactivity was detected in liver, spleen, lymph nodes, distal ileum or RAMALT. Labelling was consistently seen in the neuronal cell bodies of the trigeminal and nodose ganglia, but not in the cranial cervical or stellate ganglia, or the coeliaco-mesenteric plexi. Labelling of the muscle spindles was seen consistently, and in some cases, occasional labelled myocytes were also observed.
Table 3 Peripheral tissue immunolabelling following primary passage of sheep with L-BSE
In the one pre-clinical VRQ/VRQ animal, there was positive labelling present in all the lymphoid tissues examined, together with the enteric nervous system and the coeliaco-mesenteric ganglion in addition to the muscle spindles (Figures 2I and J). Unlike the other cases, labelling with P4 was retained in the brainstem, which would be diagnostically consistent with a discriminatory interpretation of “scrapie-like”. However, P4 labelling was lost in the lymphoid tissue, which would be consistent with a BSE-like interpretation.
The vacuolar profiles (Figure 1B) and immunohistochemical PrP distribution patterns in the sub-passage animals (not illustrated) were the same as those of the donor animals.
No histological lesions or PrP accumulation were detected in any of the control sheep.
All the clinical cases from the primary passage tested positive using all four different ELISA formats (Table 4).
Table 4 Comparative ELISA results for primary challenge animals
The L-BSE recipients that succumbed to clinical disease were subjected to comparative Western immunoblotting (Figures 4A–D). The samples were grouped according to genotype—those which were ARQ/ARQ, with either F or L at codon 141 (Figures 4A and B) and those which carried one or two VRQ alleles (ARQ/VRQ or VRQ/VRQ) (Figures 4C and D).
Figure 4
WB images from primary passage samples. A and B Nine representative recipients, homozygous for alanine (codon 136) detected by Sha31 (A), or P4 (B). (Lane 1, 63/11; lane 2, 3/11; lane 3, 457/11; lane 4 26/12; lane 5 112/12; lane 6, 182/12; lane 7, 3/13; lane 8, 98/11; lane 9, 455/11; AB + , donor bovine L-BSE; B + , bovine C-BSE; S + , ovine Scrapie; BS + , experimental ovine CBSE; S-, negative sheep; M, molecular mass markers. A 1 min exposure, B 10 min exposure). C and D Eight representative recipients homozygous or heterozygous for valine (codon 136), detected by Sha31 (C) or P4 (D), (Lane 1, case 1591/10; lane 2, case 58/11; lane 3, 140/11; lane 4, 267/11; lane 5, 456/11; lane 6, 113/12; lane 7, 4/12; lane 8, 167/12; markers and controls as for A and B. C 1 min exposure, D 10 min exposure). There is low molecular mass migration of the unglycosylated band (arrow), similar to that of the donor bovine L-BSE (AB+), for all but one of the ovine recipients (VRQ/VRQ Lane 8 C, D) regardless of genotype. Similar di-;mono-glycosylated band ratios are also seen in all cases when detected by mAb Sha31 (see Additional file 4). All recipient samples, irrespective of genotype, are also detected with mAb P4 (B, D). In contrast the donor L-BSE case (AB+) is not. Following extraction with a Proteinase K digestion step, may contain a mixture of varying molecular mass fragments, partly due to multiple cleavage sites and variability in resistance of PrPSc to the concentration of the enzyme. The two additional lower bands observed in these profiles are regularly observed in diagnostic samples processed in this way. For diagnostic analysis they are disregarded. Only the standard three bands pertaining to the di, mono and un-glycosylated forms of PrPSc are considered relevant.
The donor profile exhibited the three visual characteristics that are associated with L-BSE: a low molecular mass migration, a glycoform ratio where the di- and mono-glycosylated bands contain a more equal proportion of PrPSc than classical BSE when detected with the core mAb (Sha31), and a lack of detection with the N-terminal mAb (P4).
In affected animals the overall trend observed was maintenance of the low molecular mass and a glycoform profile similar to L-BSE or classical scrapie, irrespective of genotype (representative cases are illustrated in Figure 4 and Additional file 4), although in one VRQ/VRQ sheep (167/12; Lane 8, Figures 4C and D) the molecular mass migration of the unglycosylated band was slightly higher than for the other cases. There was a substantial increase in the detection by the N-terminal antibody relative to the bovine L-BSE donor, thereby giving an antibody detection ratio for the recipient animals closer to that obtained with classical scrapie. This was more consistent in ARQ/ARQ animals (Figure 4B; Additional file 4) than in those with valine at codon 136. This molecular profile was maintained on sub-passage (Figure 5; Additional file 5).
Figure 5
WB for ARQ/VRQ subpassage recipients. A Sha31 and P4 blots of the ARQ/VRQ donor and its ARQ/VRQ recipients. (Lane 1, case 1591/10 (ARQ/VRQ Donor), Lane 2, case 6/14; Lane 3, case 73/14; Lane 4, case 76/14 Lane 5, case 78/14; Lane 6, case 79/14 M, Molecular marker; B+, Bovine BSE; S+, Classical Ovine Scrapie. This panel comprises a mixture of 1 and 10 min exposures). B Sha31 and P4 blots of the AFRQ/AFRQ donor and its ARQ/VRQ recipients (Lanes 1 and 2, case 98/11 (AFRQ/AFRQ Donor); Lane 3, case 80/14; Lane 4, case 81/14; Lane 5, case 82/14; Lane 6, case 75/14; M, molecular marker; S+, classical ovine scrapie; B+, bovine BSE. This panel comprises a mixture of 1 and 10 min exposures). In contrast the donor L-BSE case (AB+)molecular characteristics described for primary passage (Figure 4; Additional files 4 A–E) are retained on subpassage for all recipient animals regardless of the donor.
In two VRQ/VRQ animals the molecular mass of the unglycosylated band was higher than that observed in the other L-BSE samples (Figures 4C (lane 8) and 6). These samples also showed strong affinity with P4. In contrast to all other affected animals, one of these VRQ/VRQ sheep (48/13) had lymphoid tissue involvement showing a molecular profile with overall higher molecular mass for each band compared to the brain samples and was similar, but not identical, to the profile observed in the LRS of sheep affected with classical BSE (Figure 6; Additional file 6). However, strong detection with mAb P4 was still evident in contrast to ovine classical BSE where mAb P4 detection was absent (lymphoid tissue) or markedly reduced (brain tissue). On this blot, the brain tissue from the L-BSE case had a molecular mass migration similar to the classical scrapie control when detected with Sha31.
Figure 6
WB of brain and LRS from 48/13 (the VRQ/VRQ recipient with LRS involvement). A Detection with mAb Sha31; B detection with mAb P4. (M, molecular markers; B+, bovine C-BSE control; S+, ovine classical scrapie control; Lane 1, ovine C-BSE brain; Lane 2, ovine C-BSE lymphoid tissue; Lane 3, ovine L-BSE lymphoid tissue (case 48/13); Lane 4, ovine L-BSE brain (case 48/13). 1 min exposure). The lymphoid tissue from the ovine C-BSE sample (lane 2) and L-BSE recipient (lane 3) show similar but not identical molecular profiles to each other with an overall higher mass migration pattern. However only the L-BSE sample is detected by mAb P4. The ovine C-BSE brain sample exhibits the expected profile characteristics of a low molecular mass migration, predominant diglycosylated band and mimimal detection with mAb P4. The ovine L-BSE brain sample (lane 4) exhibits a molecular mass migration that is higher than expected when compared to the primary and sub passaged results (Figures 4 and 5), appearing similar to the ovine scrapie control. However, the equal intensity of di and monoglycosylated bands can be observed. The sample was also detected by mAb P4.
L-BSE can transmit experimentally, generally by the intracerebral route, to a wide range of hosts. These include cattle [3639], sheep [4042] and this report, lemurs [43], macaques [23, 24], hamsters [25, 44, 45] and transgenic mice overexpressing bovine, ovine or human PrP [20, 2527, 39, 42, 44, 4648]. In contrast to classical BSE, L-BSE does not transmit to wild type [20] Spiropoulos and Simmons, unpublished data] or transgenic mice that overexpress murine PrP [45, 47], although exceptions have been reported [20].
There is evidence that, unlike classical BSE [49], L-BSE [20, 25, 42, 44, 45, 47], and H-BSE [21, 47, 50] do not always remain stable after intra- or inter-species experimental transmission. In some of these transmissions a phenotype shift from both L-BSE and H-BSE towards C-BSE has been reported [42, 47], on occasions only after sub-passage [25, 44, 45]. Such phenotype shifts have also been observed with other animal TSEs [46, 51].
The present study suggests that L-BSE remains stable on serial passage through sheep with a partial phenotype shift, associated with overt lymphoreticular involvement, observed only in one animal. The observation of a BSE-like labelling pattern in the LRS of this sheep, together with the biosecurity measures that were in place, and the absence of similar observations in any of the other VRQ/VRQ sheep, including the two genotype matched controls, would argue against the otherwise “scrapie-like” phenotype in this sheep being attributable to infection with extraneous classical scrapie.
The disease phenotype observed after intracerebral inoculation of sheep with L-BSE does not resemble any previously known TSE in this species, but is very consistent regardless of ovine host PrP genotype. The two animals selected for sub-passage were chosen because of differences in clinical presentation, most notably that one (1591/10) was positive on the scratch test, while the other one (98/11) was not. This was not in itself sufficient for them to be considered as different phenotypes, and all other phenotypic parameters in these animals were the same, but they represented the only diversity seen at that time in the study. The predominant clinical cataplectic syndrome reported in the primary challenge animals was present in all of the animals challenged in the subpassage study, regardless of which donor was used. All other phenotypic characteristics were also the same, indicating the presence of a single strain, stable on subpassage.
The substantial reduction in survival time between the primary challenges and the subpassages is indicative of an initial transmission barrier between cattle and sheep. In the absence of any other phenotypic differences the differences in survival time between the different recipient genotype groups following subpassage is most likely an effect of host genotype.
There is no data available on whether this species adaptation might alter the host range or virulence of the isolate, as has been reported previously for classical BSE [5255]. Previous reports on the transmission of L-BSE to sheep have only described the inoculation of animals that are ARQ/ARQ [40, 41] or ARQ/ARR [41]. This present study extends the range of sheep genotypes inoculated experimentally, to include the VRQ, and AFRQ haplotypes. In contrast to the unusual but consistent clinical signs reported here, no specific neurological signs have been described in the other studies.
Certain phenotypic parameters, such as survival times, vacuolation profiles and PrPSc distribution patterns are not directly comparable between different species. However, Western blots are more specific to each TSE agent and are generally less affected by the host species.
In this study the WB profiles indicate that the molecular mass migration and glycoform ratio of the L-BSE donor isolate remained unchanged after passage in ARQ/ARQ sheep, regardless of the codon 141 polymorphism, in agreement with those reported for other ARQ/ARQ L-BSE ovine challenges. In addition we have observed an increased reactivity with the N-terminal antibody which is not reported in other ovine L-BSE transmissions [40, 41]. This particular characteristic, normally associated with classical scrapie, is also observed on transmission of classical BSE to sheep but seen as a more gradual N-terminal antibody detection that increases after serial subpassage [56]. It is possible that on the cross species transmission the atypical forms of BSE drive conversion of host PrPc to a form more closely resembling classical scrapie faster than classical BSE does.
Other host genotypes result in more variable Western blot characteristics, as demonstrated by the molecular mass migration shift towards a scrapie profile seen in two of the four VRQ/VRQ animals in this study and in one of the ARQ/ARR animals reported elsewhere [41].
Therefore it can be assumed that the species dependent phenotypic parameters, with the possible exception of survival time, which may be prolonged during interspecies transmission as a result of the transmission barrier, are specific for the L-BSE phenotype in sheep. However, concrete evidence that the strain identity has not changed during passage of the agent in sheep can be obtained by comparing bovine and ovine L-BSE sources after bioassay in mice. These bioassays are currently ongoing and will be reported separately.
There is an apparent susceptibility effect of host genotype which mirrors that seen for ovine C-BSE, with ARR/ARR sheep appearing most resistant, and with longer incubation periods associated with VRQ/VRQ animals [5759]. This is not surprising as ovine PrP polymorphisms play an important role not only in classical scrapie, where their effect on susceptibility was first identified, but also in atypical or Nor98 scrapie. It is reasonable to assume that PrP polymorphisms in sheep would influence susceptibility, and in some cases phenotype, to almost any TSE exposure/challenge in these species.
The absence of detectable PrP in lymphoid tissues in 37/38 positive animals, and the involvement of peripheral ganglia and muscle spindles concurs with the peripheral tissue distribution of L-BSE in cattle. This differs from the widespread lymphoreticular involvement seen in sheep challenged with C-BSE either orally [58] or following intracerebral inoculation ([60], Simmons, unpublished observations) and suggests that L-BSE affected animals are unlikely to readily disseminate the agent in the environment.
The identification of LRS involvement in one inoculated VRQ/VRQ animal, in which there was also stellate PrP deposition in the brain, might suggest the emergence of a new phenotype as a result of this interspecies transmission, or a stochastic event. To resolve this issue, mouse bioassays are ongoing to compare the biological phenotype of this isolate relative to the other inoculated animals. In this study, differences in WB characteristics were also observed between the CNS and LRS from this animal and the ovine C-BSE control. However, this observation is consistent with previous reports for classical scrapie in which it has been speculated that this reflects tissue-specific differences in glycosylation [61, 62].
Pruritus and weight loss are common features in sheep experimentally infected with classical BSE [35]. Although weight loss was also recorded frequently in sheep infected with L-BSE, clear evidence of pruritus was only seen in two ARQ/ARQ sheep whilst other sheep displayed the cataplectic form despite having the same prion protein genotype and being inoculated with the same inoculum. We have previously described similar divergent clinical syndromes in cattle [38, 63]. Testing the response to scratching as an indicator of pruritus was less useful in this study because a response was also seen in control animals and a positive scratch test was only considered to be indicative of pruritus if it was progressive (e.g. mere pressure on the back elicited a response) and accompanied by wool loss.
The display of cataplexy, defined as sudden and transient episodes of loss of motor tone, (often subsequent to intense emotion in humans) in most of the sheep, sometimes accompanied by apparent narcolepsy, was unusual because it preceded other neurological signs suggestive of a TSE, e.g. ataxia or tremor. Although collapsing episodes have been reported in classical scrapie, these are usually seen infrequently and often at late-stage disease, when other signs associated with scrapie (e.g. pruritus, abnormal behaviour) are already present. There are only a few reports of collapsing episodes in scrapie-affected sheep, triggered by stress [6466] but they are usually accompanied by pruritus, and not described as cataplexy-narcolepsy-like. There is a single report of cataplexy-narcolepsy in a lamb, which was associated with possibly impaired hypocretin function although the cause was not determined [67]. When initially presented with this sign in the first sheep, alternative diagnoses such as cardiac or neuromuscular disorders were considered but excluded based on the absence of abnormalities in heart rate, rhythm and electrocardiogram and the abrupt onset of and recovery from the collapse.
Given the unusual clinical presentation of these animals, any such cases occurring naturally would be unlikely to present as TSE suspects. From a surveillance perspective, we would therefore be reliant on the rapid screening tests applied to fallen stock and/or healthy slaughter populations to detect such cases should they arise. It is reassuring that ovine L-BSE presents with positive test results using all currently approved screening and confirmatory tests, indicating that such cases would be detected as positive within routine active surveillance activities. It is also reassuring that the existing confirmatory and discriminatory tests should identify these cases as unusual, and in some regards BSE-like in presentation, and they should result in referral for further investigation. However, caution should be exercised if Western immunoblot is the only confirmatory test applied since it has been observed here that a low molecular mass suggestive of L-BSE may not always be observed. As these cases are also strongly detected by the N-terminal antibody they could present as very similar to scrapie in a field situation. For diagnostic purposes, when TSEs in small ruminants present a Western immunoblot profile that contains mixed characteristics of BSE and scrapie they are more readily visually identified as unusual when detection with an N-terminal antibody is reduced or absent. Otherwise it can be more difficult to determine subtle differences in glycoform ratios and molecular mass migration, particularly when the overall signal strength is high.
No cases presenting with such phenotypic characteristics have been identified to date through the EU surveillance systems. However, given the growing trend to view and treat atypical BSE differently from classical BSE, it is important to know that L-BSE in sheep could be detected, should relaxation of the current preventative measures applied to the ruminant feed chain occur in the future.
1. 1.
Ironside JW (1998) Prion diseases in man. J Pathol 186:227–234
CAS Article PubMed Google Scholar
2. 2.
CAS Article PubMed Google Scholar
3. 3.
Hill AF, Desbruslais M, Joiner S, Sidle KCL, Gowland I, Collinge J, Doey LJ, Lantos P (1997) The same prion strain causes vCJD and BSE. Nature 389:448–450
CAS Article PubMed Google Scholar
4. 4.
Scott MR, Will R, Ironside J, Nguyen HO, Tremblay P, DeArmond SJ, Prusiner SB (1999) Compelling transgenetic evidence for transmission of bovine spongiform encephalopathy prions to humans. Proc Natl Acad Sci U S A 96:15137–15142
CAS Article PubMed PubMed Central Google Scholar
5. 5.
CAS Article PubMed Google Scholar
6. 6.
Ducrot C, Arnold M, de Koeijer A, Heim D, Calavas D (2008) Review on the epidemiology and dynamics of BSE epidemics. Vet Res 39:15
Article PubMed Google Scholar
7. 7.
Bruce ME, Boyle A, Cousens S, McConnell I, Foster J, Goldmann W, Fraser H (2002) Strain characterization of natural sheep scrapie and comparison with BSE. J Gen Virol 83:695–704
Article PubMed Google Scholar
8. 8.
Green R, Horrocks C, Wilkinson A, Hawkins SA, Ryder SJ (2005) Primary isolation of the bovine spongiform encephalopathy agent in mice: agent definition based on a review of 150 transmissions. J Comp Pathol 132:117–131
CAS Article PubMed Google Scholar
9. 9.
Stack MJ, Moore SJ, Davis A, Webb PR, Bradshaw JM, Lee YH, Chaplin M, Focosi-Snyman R, Thurston L, Spencer YI, Hawkins SA, Arnold ME, Simmons MM, Wells GA (2011) Bovine spongiform encephalopathy: investigation of phenotypic variation among passive surveillance cases. J Comp Pathol 144:277–288
CAS Article PubMed Google Scholar
10. 10.
CAS Article PubMed Google Scholar
11. 11.
Bellworthy SJ, Hawkins SA, Green RB, Blamire I, Dexter G, Dexter I, Lockey R, Jeffrey M, Ryder S, Berthelin-Baker C, Simmons MM (2005) Tissue distribution of bovine spongiform encephalopathy infectivity in Romney sheep up to the onset of clinical disease after oral challenge. Vet Rec 156:197–202
CAS Article PubMed Google Scholar
12. 12.
Article PubMed Google Scholar
13. 13.
Jeffrey M, Martin S, Gonzalez L, Foster J, Langeveld JP, Van Zijderveld FG, Grassi J, Hunter N (2006) Immunohistochemical features of PrP(d) accumulation in natural and experimental goat transmissible spongiform encephalopathies. J Comp Pathol 134:171–181
CAS Article PubMed Google Scholar
14. 14.
Spiropoulos J, Lockey R, Sallis RE, Terry LA, Thorne L, Holder TM, Beck KE, Simmons MM (2011) Isolation of prion with BSE properties from farmed goat. Emerg Infect Dis 17:2253–2261
CAS Article PubMed PubMed Central Google Scholar
15. 15.
Seuberlich T, Heim D, Zurbriggen A (2010) Atypical transmissible spongiform encephalopathies in ruminants: a challenge for disease surveillance and control. J Vet Diagn Invest 22:823–842
Article PubMed Google Scholar
16. 16.
EFSA Biohaz Panel (EFSA Panel on Biological Hazards) (2014) Scientific Report: Protocol for further laboratory investigations into the distribution of infectivity of Atypical BSE. EFSA J 12:3978
Google Scholar
17. 17.
Casalone C, Zanusso G, Acutis P, Ferrari S, Capucci L, Tagliavini F, Monaco S, Caramelli M (2004) Identification of a second bovine amyloidotic spongiform encephalopathy: molecular similarities with sporadic Creutzfeldt-Jakob disease. Proc Natl Acad Sci U S A 101:3065–3070
CAS Article PubMed PubMed Central Google Scholar
18. 18.
Biacabe AG, Laplanche JL, Ryder S, Baron T (2004) Distinct molecular phenotypes in bovine prion diseases. EMBO Rep 5:110–115
CAS Article PubMed Google Scholar
19. 19.
Jacobs JG, Langeveld JP, Biacabe AG, Acutis PL, Polak MP, Gavier-Widen D, Buschmann A, Caramelli M, Casalone C, Mazza M, Groschup M, Erkens JH, Davidse A, Van Zijderveld FG, Baron T (2007) Molecular discrimination of atypical bovine spongiform encephalopathy strains from a geographical region spanning a wide area in Europe. J Clin Microbiol 45:1821–1829
CAS Article PubMed PubMed Central Google Scholar
20. 20.
Capobianco R, Casalone C, Suardi S, Mangieri M, Miccolo C, Limido L, Catania M, Rossi G, Di Fede G, Giaccone G, Bruzzone MG, Minati L, Corona C, Acutis P, Gelmetti D, Lombardi G, Groschup MH, Buschmann A, Zanusso G, Monaco S, Caramelli M, Tagliavini F (2007) Conversion of the BASE prion strain into the BSE strain: The origin of BSE? PLoS Pathog 3:e31
Article CAS PubMed PubMed Central Google Scholar
21. 21.
Torres JM, Andreoletti O, Lacroux C, Prieto I, Lorenzo P, Larska M, Baron T, Espinosa JC (2011) Classical bovine spongiform encephalopathy by transmission of H-type prion in homologous prion protein context. Emerg Infect Dis 17:1636–1644
CAS Article PubMed PubMed Central Google Scholar
22. 22.
EFSA Biohaz Panel (EFSA Panel on Biological Hazards) (2015) Scientific Opinion on a request for a review of a scientific publication concerning the zoonotic potential of ovine scrapie prions. EFSA J 13:4197
Article Google Scholar
23. 23.
Comoy EE, Casalone C, Lescoutra-Etchegaray N, Zanusso G, Freire S, Marce D, Auvre F, Ruchoux MM, Ferrari S, Monaco S, Sales N, Caramelli M, Leboulch P, Brown P, Lasmezas CI, Deslys JP (2008) Atypical BSE (BASE) transmitted from asymptomatic aging cattle to a primate. PLoS One 3:e3017
Article CAS PubMed PubMed Central Google Scholar
24. 24.
Ono F, Tase N, Kurosawa A, Hiyaoka A, Ohyama A, Tezuka Y, Wada N, Sato Y, Tobiume M, Hagiwara K, Yamakawa Y, Terao K, Sata T (2011) Atypical L-type bovine spongiform encephalopathy (L-BSE) transmission to cynomolgus macaques, a non-human primate. Jpn J Infect Dis 64:81–84
PubMed Google Scholar
25. 25.
Nicot S, Bencsik A, Morignat E, Mestre-Frances N, Perret-Liaudet A, Baron T (2012) Differentiation of prions from L-type BSE versus sporadic Creutzfeldt-Jakob disease. Emerg Infect Dis 18:2028–2031
CAS Article PubMed PubMed Central Google Scholar
26. 26.
Beringue V, Herzog L, Reine F, Le Dur A, Casalone C, Vilotte JL, Laude H (2008) Transmission of atypical bovine prions to mice transgenic for human prion protein. Emerg Infect Dis 14:1898–1901
CAS Article PubMed PubMed Central Google Scholar
27. 27.
Kong Q, Zheng M, Casalone C, Qing L, Huang S, Chakraborty B, Wang P, Chen F, Cali I, Corona C, Martucci F, Iulini B, Acutis P, Wang L, Liang J, Wang M, Li X, Monaco S, Zanusso G, Zou WQ, Caramelli M, Gambetti P (2008) Evaluation of the human transmission risk of an atypical bovine spongiform encephalopathy prion strain. J Virol 82:3697–3701
CAS Article PubMed PubMed Central Google Scholar
28. 28.
Simmons HA, Simmons MM, Spencer YI, Chaplin MJ, Povey G, Davis A, Ortiz-Pelaez A, Hunter N, Matthews D, Wrathall AE (2009) Atypical scrapie in sheep from a UK research flock which is free from classical scrapie. BMC Vet Res 5:8
Article CAS PubMed PubMed Central Google Scholar
29. 29.
Konold T, Phelan L (2014) Clinical examination protocol for the detection of scrapie. Vet Rec 174:257
Article PubMed Google Scholar
30. 30.
Wells GAH, Hawkins SA (2004) Animal models of transmissible spongiform encephalopathies: Experimental infection, observation and tissue collection. In: Lehmann S, Grassi J (eds) Techniques in prion research. Methods and tools in biosciences and medicine. Birkhäuser Verlag, Basel, pp 37–71
Chapter Google Scholar
31. 31.
Ligios C, Jeffrey M, Ryder SJ, Bellworthy SJ, Simmons MM (2002) Distinction of scrapie phenotypes in sheep by lesion profiling. J Comp Pathol 127:45–57
CAS Article PubMed Google Scholar
32. 32.
Simmons MM, Konold T, Simmons HA, Spencer YI, Lockey R, Spiropoulos J, Everitt S, Clifford D (2007) Experimental transmission of atypical scrapie to sheep. BMC Vet Res 3:20
Article PubMed PubMed Central Google Scholar
33. 33.
Gonzalez L, Martin S, Jeffrey M (2003) Distinct profiles of PrP(d) immunoreactivity in the brain of scrapie- and BSE-infected sheep: implications for differential cell targeting and PrP processing. J Gen Virol 84:1339–1350
CAS Article PubMed Google Scholar
34. 34.
CAS Article PubMed Google Scholar
35. 35.
Konold T, Bone G, Vidal-Diez A, Tortosa R, Davis A, Dexter G, Hill P, Jeffrey M, Simmons MM, Chaplin MJ, Bellworthy SJ, Berthelin-Baker C (2008) Pruritus is a common feature in sheep infected with the BSE agent. BMC Vet Res 4:16
Article CAS PubMed PubMed Central Google Scholar
36. 36.
Balkema-Buschmann A, Ziegler U, McIntyre L, Keller M, Hoffmann C, Rogers R, Hills B, Groschup MH (2011) Experimental challenge of cattle with German atypical bovine spongiform encephalopathy (BSE) isolates. J Toxicol Environ Health A 74:103–109
CAS Article PubMed Google Scholar
37. 37.
Fukuda S, Iwamaru Y, Imamura M, Masujin K, Shimizu Y, Matsuura Y, Shu Y, Kurachi M, Kasai K, Murayama Y, Onoe S, Hagiwara K, Sata T, Mohri S, Yokoyama T, Okada H (2009) Intraspecies transmission of L-type-like bovine spongiform encephalopathy detected in Japan. Microbiol Immunol 53:704–707
CAS Article PubMed Google Scholar
38. 38.
Konold T, Bone GE, Clifford D, Chaplin MJ, Cawthraw S, Stack MJ, Simmons MM (2012) Experimental H-type and L-type bovine spongiform encephalopathy in cattle: observation of two clinical syndromes and diagnostic challenges. BMC Vet Res 8:22
Article PubMed PubMed Central Google Scholar
39. 39.
Lombardi G, Casalone C, D’Angelo A, Gelmetti D, Torcoli G, Barbieri I, Corona C, Fasoli E, Farinazzo A, Fiorini M, Gelati M, Iulini B, Tagliavini F, Ferrari S, Caramelli M, Monaco S, Capucci L, Zanusso G (2008) Intraspecies transmission of BASE induces clinical dullness and amyotrophic changes. PLoS Pathog 4:e1000075
Article CAS PubMed PubMed Central Google Scholar
40. 40.
Matsuura Y, Iwamaru Y, Masujin K, Imamura M, Mohri S, Yokoyama T, Okada H (2013) Distribution of abnormal prion protein in a sheep affected with L-type bovine spongiform encephalopathy. J Comp Pathol 149:113–118
CAS Article PubMed Google Scholar
41. 41.
Nicot S, Bencsik A, Migliore S, Canal D, Leboidre M, Agrimi U, Nonno R, Baron T (2014) L-type bovine spongiform encephalopathy in genetically susceptible and resistant sheep: changes in prion strain or phenotypic plasticity of the disease-associated prion protein? J Infect Dis 209:950–959
CAS Article PubMed Google Scholar
42. 42.
Migliore S, D’Agostino C, Marcon S, Di Bari M, Vaccari G, Esposito E, Sezzi E, Chiappini B, Conte M, De Grossi L, Casalone C, Agrimi U, Nonno R (2011) Experimental BASE in sheep displays molecular PrPSc variations depending on the PrP genotype. Prion 5:67–68
Google Scholar
43. 43.
Mestre-Frances N, Nicot S, Rouland S, Biacabe AG, Quadrio I, Perret-Liaudet A, Baron T, Verdier JM (2012) Oral transmission of L-type bovine spongiform encephalopathy in primate model. Emerg Infect Dis 18:142–145
CAS Article PubMed PubMed Central Google Scholar
44. 44.
Nicot S, Baron T (2011) Strain-specific barriers against bovine prions in hamsters. J Virol 85:1906–1908
CAS Article PubMed Google Scholar
45. 45.
Shu Y, Masujin K, Okada H, Iwamaru Y, Imamura M, Matsuura Y, Mohri S, Yokoyama T (2011) Characterization of Syrian hamster adapted prions derived from L-type and C-type bovine spongiform encephalopathies. Prion 5:103–108
CAS Article PubMed PubMed Central Google Scholar
46. 46.
Espinosa JC, Herva ME, Andreoletti O, Padilla D, Lacroux C, Cassard H, Lantier I, Castilla J, Torres JM (2009) Transgenic mice expressing porcine prion protein resistant to classical scrapie but susceptible to sheep bovine spongiform encephalopathy and atypical scrapie. Emerg Infect Dis 15:1214–1221
CAS Article PubMed PubMed Central Google Scholar
47. 47.
Beringue V, Andreoletti O, Le Dur A, Essalmani R, Vilotte JL, Lacroux C, Reine F, Herzog L, Biacabe AG, Baron T, Caramelli M, Casalone C, Laude H (2007) A bovine prion acquires an epidemic bovine spongiform encephalopathy strain-like phenotype on interspecies transmission. J Neurosci 27:6965–6971
CAS Article PubMed Google Scholar
48. 48.
Baron T, Bencsik A, Biacabe AG, Morignat E, Bessen RA (2007) Phenotypic similarity of transmissible mink encephalopathy in cattle and L-type bovine spongiform encephalopathy in a mouse model. Emerg Infect Dis 13:1887–1894
CAS Article PubMed Google Scholar
49. 49.
Torres JM, Espinosa JC, Aguilar-Calvo P, Herva ME, Relano-Gines A, Villa-Diaz A, Morales M, Parra B, Alamillo E, Brun A, Castilla J, Molina S, Hawkins SA, Andreoletti O (2014) Elements modulating the prion species barrier and its passage consequences. PLoS One 9:e89722
Article CAS PubMed Google Scholar
50. 50.
Bencsik A, Leboidre M, Debeer S, Aufauvre C, Baron T (2013) Unique properties of the classical bovine spongiform encephalopathy strain and its emergence from H-type bovine spongiform encephalopathy substantiated by VM transmission studies. J Neuropathol Exp Neurol 72:211–218
Article PubMed Google Scholar
51. 51.
Article CAS PubMed Google Scholar
52. 52.
Espinosa JC, Andreoletti O, Castilla J, Herva ME, Morales M, Alamillo E, San Segundo FD, Lacroux C, Lugan S, Salguero FJ, Langeveld J, Torres JM (2007) Sheep-passaged bovine spongiform encephalopathy agent exhibits altered pathobiological properties in bovine-PrP transgenic mice. J Virol 81:835–843
CAS Article PubMed Google Scholar
53. 53.
CAS Article PubMed PubMed Central Google Scholar
54. 54.
Plinston C, Hart P, Chong A, Hunter N, Foster J, Piccardo P, Manson JC, Barron RM (2011) Increased susceptibility of human-PrP transgenic mice to bovine spongiform encephalopathy infection following passage in sheep. J Virol 85:1174–1181
CAS Article PubMed Google Scholar
55. 55.
Vickery CM, Lockey R, Holder TM, Thorne L, Beck KE, Wilson C, Denyer M, Sheehan J, Marsh S, Webb PR, Dexter I, Norman A, Popescu E, Schneider A, Holden P, Griffiths PC, Plater JM, Dagleish MP, Martin S, Telling GC, Simmons MM, Spiropoulos J (2014) Assessing the susceptibility of transgenic mice overexpressing deer prion protein to bovine spongiform encephalopathy. J Virol 88:1830–1833
Article CAS PubMed Google Scholar
56. 56.
Stack M, Gonzalez L, Jeffrey M, Martin S, Macaldowie C, Chaplin M, Thorne J, Sayers R, Davis L, Bramwell J, Grimmer S, Bellworthy S (2009) Three serial passages of bovine spongiform encephalopathy in sheep do not significantly affect discriminatory test results. J Gen Virol 90:764–768
CAS Article PubMed Google Scholar
57. 57.
McGovern G, Martin S, Jeffrey M, Bellworthy SJ, Spiropoulos J, Green R, Lockey R, Vickery CM, Thurston L, Dexter G, Hawkins SA, Gonzalez L (2015) Influence of breed and genotype on the onset and distribution of infectivity and disease-associated prion protein in sheep following oral infection with the bovine spongiform encephalopathy agent. J Comp Pathol 152:28–40
CAS Article PubMed Google Scholar
58. 58.
Bellworthy SJ, Dexter G, Stack M, Chaplin M, Hawkins SA, Simmons MM, Jeffrey M, Martin S, Gonzalez L, Martin S, Hill P (2008) Oral transmission of BSE to VRQ/VRQ sheep in an experimental flock. Vet Rec 162:130–131
CAS Article PubMed Google Scholar
59. 59.
Saunders GC, Lantier I, Cawthraw S, Berthon P, Moore SJ, Arnold ME, Windl O, Simmons MM, Andreoletti O, Bellworthy S, Lantier F (2009) Protective effect of the T112 PrP variant in sheep challenged with bovine spongiform encephalopathy. J Gen Virol 90:2569–2574
CAS Article PubMed Google Scholar
60. 60.
Houston F, Goldmann W, Foster J, Gonzalez L, Jeffrey M, Hunter N (2015) Comparative susceptibility of sheep of different origins, breeds and PRNP Genotypes to challenge with bovine spongiform encephalopathy and scrapie. PLoS One 10:e0143251
Article CAS PubMed PubMed Central Google Scholar
61. 61.
Madec JY, Groschup MH, Calavas D, Junghans F, Baron T (2000) Protease-resistant prion protein in brain and lymphoid organs of sheep within a naturally scrapie-infected flock. Microb Pathog 28:353–362
CAS Article PubMed Google Scholar
62. 62.
Everest SJ, Ramsay AM, Chaplin MJ, Everitt S, Stack MJ, Neale MH, Jeffrey M, Moore SJ, Bellworthy SJ, Terry LA (2011) Detection and localisation of PrPSc in the liver of sheep infected with scrapie and bovine spongiform encephalopathy. PLoS One 6:e19737
CAS Article PubMed PubMed Central Google Scholar
63. 63.
Konold T, Nonno R, Spiropoulos J, Chaplin MJ, Stack MJ, Hawkins SA, Cawthraw S, Wilesmith JW, Wells GA, Agrimi U, Di Bari MA, Andreoletti O, Espinosa JC, Aguilar-Calvo P, Torres JM (2015) Further characterisation of transmissible spongiform encephalopathy phenotypes after inoculation of cattle with two temporally separated sources of sheep scrapie from Great Britain. BMC Res Notes 8:312
Article CAS PubMed PubMed Central Google Scholar
64. 64.
Scott PR, Henshaw CJ (1995) Increasing the accuracy of the provisional antemortem diagnosis of scrapie. Agri-Practice 16:21–25
Google Scholar
65. 65.
Spengler D (1992) Bericht über den Ausbruch der Traberkrankheit [An outbreak of scrapie]. Tierarztl Prax 20:579–583
CAS PubMed Google Scholar
66. 66.
Konold T, Moore SJ, Bellworthy SJ, Terry LA, Thorne L, Ramsay A, Salguero FJ, Simmons MM, Simmons HA (2013) Evidence of effective scrapie transmission via colostrum and milk in sheep. BMC Vet Res 9:99
Article PubMed PubMed Central Google Scholar
67. 67.
White EC, de Lahunta A (2001) Narcolepsy in a ram lamb. Vet Rec 149:156–157
CAS Article PubMed Google Scholar
Download references
Competing interests
The authors declare that they have no competing interests.
Authors’ contributions
Designed and managed the study: MMS, JS; executed the study, generated and analysed data: MMS, MJC,TK, CC, KEB, LT, SE, TF, DC, JS; drafted the manuscript: MMS, MJC,TK, CC, JS. All authors read and approved the final manuscript.
The authors are indebted to past and present staff of the Animal Sciences Unit and the Pathology Department, and in particular Jon Cooper, Laura Konold and Peter Bellerby for excellent technical support. This work was funded by Defra (projects SE1860 and SE1868). The New Zealand-derived scrapie-free recipient sheep were provided by Dr Hugh Simmons (Defra project SE1931). Statistical advice was provided by Dr Angel Ortiz-Pelaez.
Author information
Corresponding author
Correspondence to Marion M. Simmons.
Additional files
Additional file 1.
Pruritic syndrome. Case 63/11 (ARQ/ARQ). This clip demonstrates progression in pruritic activity. Initially at 690 dpi there are some head movements in response to scratching (inconclusive scratch test response). The scratch test is clearly positive at 865 dpi when the sheep responded to scratching with lip licking and nibbling. There are no obvious gait abnormalities at this stage. Pruritic activity, such as rubbing and nibbling self, can be observed subsequently on CCTV from 840 dpi, which culminates in wool loss next to the tail head, indicated in the inset picture. Hind limb ataxia is now present at 949 dpi, which is most obvious when the sheep walks towards the other sheep, the wool loss subsequently remained but no skin lesions developed. Prior to cull at 956 dpi, a positive scratch test can merely be elicited by applying pressure on the back.
Additional file 2.
Cataplectic syndrome. Case 3/11 (ARQ/ARQ). When all sheep are penned up for spray marking, this sheep is seen collapsing briefly when restrained at 924 dpi. A similar response is elicited when the handler attempts to catch the sheep and although the animal is getting up immediately, general ataxia and low head carriage with apparent loss of muscle strength in the neck (“floppy neck”) is evident. CCTV images show lack of muscle tone when nudged by other sheep at the hay rack at 954 dpi. Scratching of the back result in lip and head movements (positive scratch test) although there is no evidence of wool loss. Following a collapse after the examination, the sheep is seen lying in the corner as if asleep and rises shortly after stimulated by hand clapping.
Additional file 3.
Seizure-like syndrome. Case 1591/10 (VRQ/ARQ). The sheep displays a positive scratch test at 746 dpi, the last examination prior to cull. At 803 dpi it is found dropping to the floor, and after walking slowly around the pen division it suddenly runs forward and drops to the floor, briefly vocalising, to end up in lateral position with all four limbs extended and trembling whilst the head is held between the front limbs. This episode only lasts a few seconds and the sheep gets up and runs away but drops down again at the edge of the pen division. Although the animal recovered from this episode it was culled on the same day.
Additional file 4.
Antibody and glycoform ratios and molecular masses based on WB in Figure 4. A) Antibody detection ratios [Sha31 (Figure 4A): P4 (Figure 4B)] for L-BSE in animals that are homozygous for alanine at codon 136 (samples 1-9). It can be seen that the ratios in all of the challenged animals are very similar to that obtained from the classical scrapie control. Ratios calculated using the 1 min exposure for both antibodies. B) Antibody detection ratios [Sha31 (Figure 4C): P4 (Figure 4D)] for L-BSE in animals that are homozygous or heterozygous for valine at codon 136 (samples 1-8). The ratios in all of the challenged animals are generally higher than those in animals homozygous for alanine at codon 136 (A) but lower than that obtained from any of the bovine samples, with variable values sitting between the ovine classical scrapie and ovine BSE controls. This variability was not attributable to the codon 136 polymorphism, with samples 5, 6 and 8 being the homozygous animals. C) The glycoform profiles (relative quantity of the mono- versus di-glycosylated bands as observed in Figures 4A and 4C, using mAb Sha31). It can be seen that all of the sheep challenged with L-BSE have profiles which cluster with that of the bovine L-BSE donor, while bovine and ovine classical BSE are separate. D) Molecular masses for Sha31 based on Figure 4A. E) Molecular masses for Sha31 based on Figure 4C.
Additional file 5.
Antibody and glycoform ratios and molecular masses based on WB in Figure 5. A) Antibody detection ratios (Sha31 and P4 (Figure 5A)). All ratios are calculated using the 1 min exposure for both antibodies. The codon 136 alanine/valine heterozygous ovine L-BSE donor (sample 1) and similarly heterozygous recipients (samples 2-6) are variable, but consistently lower than that for ovine classical BSE, and higher than the classical scrapie control. B) Antibody detection ratios [Sha31 and P4 (Figure 5B)]. All ratios are calculated using the 1 min exposure for both antibodies. The codon 136 alanine homozygous ovine L-BSE donor (sample 1) and alanine/valine heterozygous recipients (samples 2-6) are variable, but consistently lower than that for ovine classical BSE, and higher than the classical scrapie control. C) The glycoform profiles (relative quantity of the mono- versus di-glycosylated bands as observed in Figure 5A, using mAb Sha31). All the donor and recipient animals cluster with the classical scrapie control, and away from the ovine classical BSE. D) The glycoform profiles (relative quantity of the mono- versus di-glycosylated bands as observed in Figure 5B, using mAb Sha31). All the donor and recipient animals cluster with the classical scrapie control, and away from the ovine classical BSE. E) Molecular masses for Sha31 based on Figure 5A. F) Molecular masses for Sha31 based on Figure 5B.
Additional file 6.
Antibody and glycoform ratios and molecular masses based on WB in Figure 6. A) Antibody detection ratios (Sha31 (Figure 6A): P4 (Figure 6B)) show that the ovine BSE control samples (samples 1 (brain) and 2 (lymphoid tissue)) match the classical BSE control, whereas the lymphoid tissue (sample 3) and brain (sample 4) from the L-BSE challenged animal show ratios closer to that of the classical scrapie control. All ratios are calculated using the 1 min exposure for both antibodies. B) The glycoform profiles (relative quantity of the mono- versus di-glycosylated bands as observed in Figure 6A, using mAb Sha31) demonstrate that the ovine L-BSE samples (3 and 4) are quite distinct from both the ovine classical BSE samples (1 and 2) and the classical scrapie controls. C) Molecular masses for Sha31 based on Figure 6A.
Rights and permissions
Reprints and Permissions
About this article
Verify currency and authenticity via CrossMark
Cite this article
Simmons, M.M., Chaplin, M.J., Konold, T. et al. L-BSE experimentally transmitted to sheep presents as a unique disease phenotype. Vet Res 47, 112 (2016).
Download citation
• Bovine Spongiform Encephalopathy
• Scrapie
• Transmissible Spongiform Encephalopathy
• Classical Scrapie
• Atypical Scrapie |
Category: health news
What Happens When A Hygienist Cleans Your Teeth?
Does Getting Your Teeth Cleaned Hurt?
Even though you brush after meals and floss daily, dentists still recommend getting your teeth cleaned every six months by a dental hygienist. Regular cleanings can help prevent cavities, catch diseases early and save you money.
The Cleaning Process
Getting your teeth cleaned has several steps. First, the hygienist performs an examination of your teeth. Next, he or she removes any plaque or tartar that has built up since your last cleaning. The hygienist will also look for signs of disease, and then she or he will use a tool, like a midwest dental high speed handpiece, to polish your teeth.
Getting an Exam
When you sit down in the dentist’s chair, the hygienist will use a mirror and a set of instruments to take a look at your teeth, noting anything that needs to be examined more closely.
Removing Plaque and Tartar
Next, the hygienist will scrape around your teeth and gums to remove plaque and tartar. Plaque is a film on the teeth that is formed when bacteria mix with food particles. If the plaque sits on the teeth for a while, it turns to a hard mass called tartar. The hygienist scrapes around the base and in between the teeth to remove the calcified substance.
Looking for Signs of Disease
Another part of a regular dental cleaning is an examination for tooth and mouth diseases. The hygienist will search for cavities, pockets in the gums, red or sore spots or swelling on the tongue and mouth. Catching issues like gum disease early can help you save your teeth, plus it saves you money.
Polishing the Teeth
Finally, the hygienist uses a high speed tool and some extra gritty toothpaste to clean your teeth. This process leaves your mouth feeling clean and your breath fresh. After the cleaning, the dentist often comes in to examine your teeth and discuss any findings and treatment recommendations.
Dental cleanings are necessary to maintain the health and appearance of your teeth and gums. Your smile is the first thing many people notice, so it is important to protect it.… Read More..
3 Ways To Pamper Yourself
10 Ways To Pamper Yourself On A Budget | Clever Girl Finance
After a long week at work, you deserve some pampering. If it has been a while since you spent a day indulging in self-care, there is no better time than now. Consider these three ways to rejuvenate your mind and body over the weekend. You will feel refreshed and ready for whatever comes your way in the following week.
1. Massage
deep tissue massage Bowling Green might be exactly what you need to release tension in your tired muscles. This massage technique is perfect for those who have a lot of pent-up stress. Choose a massage therapist who is specially trained in this technique. Ask your massage therapist how often you should be getting massages; the frequency will depend on your specific needs.
2. Manicure and Pedicure
There is nothing quite like a manicure and pedicure to boost your mood. You can pick a bright, fun color that will instantly give you a confidence boost. Ask your friends and family for recommendations for the best nail spa around. To reduce your wait time, consider making an appointment before you go. This way, you will be able to enjoy your day of pampering without having to wait in a long line.
3. Facial
If your skin is looking tired from all the long hours you have been putting in, consider getting a facial. This procedure can be incredibly relaxing. There are several types of facials for your specific needs, whether it be acne treatment or redness reduction. Ask your esthetician what skincare products he or she recommends for your skin type.
If you are overdue for a day of total relaxation, consider these three ways to make up for the lost time. When you prioritize self-care, you will be able to reduce stress. This can lead to a happier and healthier life. … Read More..
Some Handy Information About Carpal Tunnel Syndrome
Carpal Tunnel Syndrome Test - Precision Medical Group
Although humans are not alone in having opposable thumbs, humans are unique in their ability to move their thumbs entirely across their hands to their ring fingers and little fingers. Being able to forcefully grasp and skillfully manipulate objects thus becomes possible, and people can thank their hands for giving them the ability to perform many tasks. Because individuals rely so much on their hands, it can be very problematic when difficulties arise in the functioning of these appendages.
Defining Carpal Tunnel Syndrome
One condition that can significantly impact a person’s ability to function is carpal tunnel syndrome. On the palm side of the hand, there is a passageway, or narrow tunnel, through which the median nerve passes. If pressure is put on the median nerve, carpal tunnel syndrome can result.
Identifying the Symptoms
Those individuals who develop carpal tunnel syndrome typically experience weakness, numbness, or tingling in their hands and arms. People might begin to drop objects due to the weakness in their hands. The sensation of tingling and numbness, which is sometimes described as an electric shock in the affected fingers, might extend from the wrist up the arm. If the symptoms interfere with a person’s ability to participate in daily activities and cause disrupted sleep patterns, he or she may want to make an appointment with practitioners such as Hand Surgery Houston professionals.
Preventing the Condition
Despite the fact that carpal tunnel syndrome is a very common nerve disorder, affecting 4 million to 10 million Americans, questions about the condition still persist. For instance, proven strategies that can prevent carpal tunnel syndrome’s development have yet to be determined. There are, however, various methods that can be employed to minimize the stress that is placed on wrists and hands.
Some of these methods include taking frequent, short breaks, and possibly alternating tasks, when doing work that involves prolonged use of the hands and wrists. Paying attention to proper posture, using a computer mouse that does not cause discomfort, and working in a warm environment can be helpful as well. Simply giving someone a thumbs-up can also relieve stress!… Read More..
19 Is Altering Retirement Plan Savings
covid 19
It appears to have grow to be an article of religion to those who, for whatever strange motive, really feel an obligation to underplay the seriousness of the Covid-19 pandemic, that however the apparent resurgence of the virus it is by some means much less threatening or less deadly this time around. Before COVID-19, some companies didn’t also have a social media web page. And when the immune system is lower than snuff as they say we develop into very prone to all kinds of sickness and viruses like Covid-19. The church buildings fumigate the premises towards the Coronavirus as usually as they should. Also, they provide handwashing factors at the entrances with sanitizers.
Folks on dialysis can have weaker immune techniques, making it more durable to struggle infections. Nonetheless, ever one particular person out of six infected folks turn out to be significantly sick and require critical medical intervention as they develop breathlessness. However, a latest study published in the journal Cell Metabolism exhibits that sufferers who’ve good control over their blood glucose ranges have a much better chance of surviving a bout of an infection with COVID-19.
19 On The Indian Insurance Sector
covid 19
Our world continues to get shocked with pandemic illnesses causing the lack of thousands and even tens of millions of people. Banks, stores and different buyer facing companies have innovated by installing Plexiglas shields, creating a safer setting, lowering the chance for workers or clients to transmit airborne contaminants, not simply the COVID-19 virus but in addition these for the flu and common chilly.
If you’re still within the process of saving in your retirement now is perhaps a good time to consider rising your pension contributions. If the host physique is wholesome, it stays there dormantly with out creating any unwanted health repurcussions. The COVID-19 had its origin in the Chinese metropolis of Wuhan in the last month of 2019 when the local health staff acknowledged that this viral illness was handed from the animals to humans.
The human mind is powerful! Nonetheless, some people with the virus might never have signs, but still be capable of transmit the virus to others. A COVID-19-contaminated individual on a mean might pass on the virus to 2 or more individuals. For the reason that disease was found in the year 2019, the World Health Organization (WHO) has christened it as COVID-19.
Enhance Your COVID
covid 19
The Covid-19 epidemic is among the main disasters within the history of pandemics. Healthy people needn’t put on a masks. Despite the fact that the immune system is restricted in its capacity to suppress stealth adapted viruses, these viruses and certainly probably all viruses, can still be suppressed offering the infected cells have adequate cellular vitality.
Covid-19 is a illness caused by SARS-CoV-2 that can trigger what docs call a respiratory tract infection. The least we can do because the residents of this world is to heed the recommendation of our leaders and follow the well being directive of our authorities by … Read More..
10 Ideas To Keep Mentally Healthy
mental health
The difficulties that occur for the various who carry inside themselves extreme psychological or emotional disturbance are legion, occurring on many levels of expertise. Jimi’s biographers (Hendrix 1999) focus on the way it was clear to Jimi that his youthful brother Leon had a different father than him, and though Al definitely cherished and cared for Leon, he must have felt some resentment from having to raise another man’s little one.
Nevertheless, if somebody had psychological and emotional problems, it is unlikely that one other individual would be capable to fix them. 1) Stay Physically Active: the human thoughts developed in an surroundings requiring one travels the equal of 12 miles per day for sheer survival (and no that does not mean leaping in the automotive and flooring it!).
Mental Health Services
mental health
After persevering with Carl Jung’s research into the unknown area of the human psyche I may uncover that every one psychological illnesses are generated by the wild conscience we have inherited into the most important part of our brain and psyche. Nonetheless, there are also obligatory admissions made under the Mental Health Act in order to shield the individual themselves or these around them. This is critically essential when you consider that melancholy and nervousness have an effect on so many, not to mention more severe psychological illness diagnoses.
This was already a topic in the media, visibility within the UK with the “Virgin Media psychological well being marathon” in London 2017, supported by the charitable work of the Royal Household, promoting mental health charities reminiscent of THOUGHTS, Samaritans, CALM and plenty of more.
With 71,874 fresh cases on Feb 18, 2021, COVID-19 is simply not able to go away. The analysis workforce have additionally found that stress at work is associated with a 50 per cent extra risk of coronary coronary heart illness, and there may be consistent evidence that jobs with high demands, low control, and effort-reward imbalance are threat factors for psychological and bodily well being problems (main depression, anxiety problems, and substance use problems).
Psychological Health Vs Physical Well being
mental health
Do you assume the world goes crazy or going mad? Extreme or more extreme sorts of mental sickness equivalent to schizophrenia, bipolar, personality dysfunction, multiple persona disorder, psychosis are brought on by numerous demon and earthbound spirits entering the soul of the individual concerned.
Psychological sickness is just as devastating to a household as an addiction is. The difference between the two is, Mental Sickness just isn’t as easy to elucidate in some households as an dependancy to drugs or alcohol can be. Society accepts the drunken habits of an alcoholic far easier than it does the characteristics of the mentally unwell.
mental health in education, move for mental health artinya, mental health article titles, mental health indonesia, mental health articles for students
Even when addressing problems that are psychological in origin, reminiscent of alcohol or tobacco dependence, PSAs focused on the social or bodily well being penalties and options.… Read More.. |
Downsizing and Rightsizing
views updated
Downsizing and Rightsizing
Downsizing refers to the permanent reduction of a company's workforce and is generally associated with corporate reorganization, or creating a leaner, meaner company. For example, a sluggish U.S. economy forced several American companies to downsize in 2008. General Motors was forced to lay off about 3,500 workers at its pickup truck and large sport utility vehicle plants in several locations throughout the United States. High gasoline prices decreased consumer demand for trucks, shifting their preference to cars. Simultaneously, a housing slowdown and tight credit market forced Citigroup, a company with more than 300,000 worldwide employees, to plan layoffs of more than 13,000 jobs throughout 2008.
Downsizings such as these are also commonly called reorganizing, reengineering, restructuring, or rightsizing. Regardless of the label applied, however, downsizing essentially refers to layoffs that may or may not be accompanied by systematic restructuring programs, such as staff reductions, departmental consolidations, plant or office closings, or other forms of reducing payroll expenses. Corporate downsizing results from both poor economic conditions and company decisions to eliminate jobs in order to cut costs and maintain or achieve specific levels of profitability. Companies may lay off a percentage of their employees in response to these changes: a slowed economy, merging with or acquiring other companies, the cutting of product or service lines, competitors grabbing a higher proportion of market share, distributors forcing price concessions from suppliers, or a multitude of other events that have a negative impact on specific organizations or entire industries. In addition, downsizing may stem from restructuring efforts to maximize efficiency, to cut corporate bureaucracy and hierarchy and thereby reduce costs, to focus on core business functions and outsource non-core functions, and to use part-time and temporary workers to complete tasks previously performed by full-time workers in order to trim payroll costs.
The following sections discuss trends in downsizing, the growth of downsizing, downsizing and restructuring, criticisms of downsizing, support for downsizing, and downsizing and management.
As a major trend among U.S. businesses, downsizing began in the 1980s and continued through the 1990s largely unabated and even growing. During this time, many of the country's largest corporations participated in the trend, including General Motors, AT&T, Delta Airlines, Eastman Kodak, IBM, and Sears, Roebuck and Company. In the twenty-first century, downsizing continued after a sharp decline in the stock market early in the century and followed by continued pressure on corporate earnings in the aftermath of the September 11, 2001, terrorist attacks. Skyrocketing gas prices, a housing slowdown, and a market credit crunch were factors in 2008 layoffs. Downsizing affects most sectors of the labor
Table 1
Number of U.S. Unemployed Workers by Month
Adapted from: U.S. Department of Labor, Bureau of Labor Statistics. 2008. Unemployed Persons by Reason of Unemployment. Employment Situation Summary.
Type of DownsizingDecember 2007January 2008February 2008March 2008April 2008May 2008June 2008July 2008August 2008
Temporary downsizing1,061,0001,614,0001,351,0001,341,0001,053,000856,000949,0001,134,0001,126,000
Permanent downsizing2,066,0002,110,0002,204,0002,276,0002,114,0002,220,0002,341,0002,512,0002,656,000
market, including retail, industrial, managerial, and office jobs, impacting workers in a wide range of income levels. Table 1 compares the number of temporarily downsized workers with the number of permanently downsized workers.
While layoffs are a customary measure for companies to help compensate for the effects of recessions, downsizing also occurs during periods of economic prosperity, even when companies themselves are doing well. Consequently, downsizing is a controversial corporate practice that receives support and even praise from executives, shareholders, and some economists, and criticism from employees, unions, and community activists. Reports of executive salaries growing in the face of downsizing and stagnant wages for retained employees only fan the flames of this criticism. In contrast, announcements of downsizing are well received in the stock markets. It is not uncommon for a company's stock value to rise following a downsizing announcement.
However, economists remain optimistic about down-sizing and the effects of downsizing on the economy when the rate of overall job growth outpaces the rate of job elimination. A trend toward outsourcing jobs overseas to countries with lower labor costs is a form of downsizing that affects some U.S. employees. These jobs are not actually eliminated, but instead moved out of reach of the employees who lose their jobs to outsourcing. Some economists, however, suggest that the overall net effect of such outsourced jobs will actually be an increase in U.S. jobs as resulting corporate operating efficiencies allow for more employment of higher-tier (and thus higher-wage) positions. Regardless of whether downsizing is good or bad for the national economy, companies continue to downsize and the trend shows few signs of slowing down. For some sectors, this trend is projected to be particularly prevalent through 2012, as shown in Table 2.
The corporate downsizing trend grew out of the economic conditions of the late 1970s, when direct international competition began to increase. The major industries affected by this stiffer competition included the automotive, electronics, machine tool, and steel industries. In contrast to their major competitorsJapanese manufacturersU.S. companies had significantly higher costs. For example, U.S. automobile manufacturers had approximately a $1,000 cost disadvantage for their cars compared to similar classes of Japanese cars. Only a small percentage of this cost difference could be attributed to labor costs, however, but labor costs were among the first to be cut despite other costs associated with the general structure of the auto companies and their oversupply of middle managers and engineers. Auto workers were among the first to be laid off during the initial wave of downsizing. Other U.S. manufacturing industries faced similar competitive problems during this period, as did some U.S. technology industries. Companies in these industries, like those in the auto industry, suffered from higher per-unit costs and greater overhead than their Japanese counterparts due to lower labor productivity and a glut of white-collar workers in many U.S. companies.
To remedy these problems, U.S. companies implemented a couple of key changes: They formed partnerships with Japanese companies to learn the methods behind their cost efficiencies and they strove to reduce
Table 2
Projected Job Decline in Selected Occupations, 2006-2016
OccupationProjected Decline
Adapted from: U.S. Department of Labor, Bureau of Labor Statistics. 2007. Occupations With the Largest Job Decline, 2006-2016.
Photographic processing machine operators-50%
File clerks-41%
Electrical and electronic equipment assemblers-27%
Sewing machine operators-27%
Computer operators-25%
Bindery workers-22%
Prepress technicians and workers-21%
costs, and expedite decision-making by getting rid of unnecessary layers of bureaucracy and management. Nevertheless, some companies began simply to cut their workforce without determining whether or not it was necessary and without any kind of accompanying strategy. In essence, they downsized because they lacked new products that would have stimulated growth and because their existing product markets were decreasing.
Downsizing generally accompanies some kind of restructuring and reorganizing, either as part of the downsizing plan or as a consequence of downsizing. Since companies frequently lose a significant number of employees when downsizing, they usually must reallocate tasks and responsibilities. In essence, restructuring efforts attempt to increase the amount of work output relative to the amount of work input. Consequently, downsizing often accompanies corporate calls for concentration on core capabilities or core businesses, which refers to the interest in focusing on the primary revenue-generating aspects of a business. The jobs and responsibilities that are not considered part of the primary revenue-generating functions are the ones that are frequently downsized. These jobs might then be outsourced or handled by outside consultants and workers on a contract basis.
Eliminating non-core aspects of a business may also include the reduction of bureaucracy and the number of corporate layers. Since dense bureaucracy frequently causes delays in communication and decision making, the reduction of bureaucracy may help bring about a more efficient and responsive corporate structure that can implement new ideas more quickly.
Besides laying off workers, restructuring efforts may involve closing plants, selling non-core operations, acquiring or merging with related companies, and overhauling the internal structure of a company. The seminal work on restructuring or reengineering, Reinventing the Corporation, by Michael Hammer and James Champy, characterizes the process as the fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance such as cost, quality, service, and speed.
Reengineering was envisioned as a mechanism for transforming bureaucracy-laden organizations into productive market leaders. The goal of the movement is to create lean, streamlined organizations. Reengineering has introduced many process management principles into the workplace: Workflows are more efficient, cross-functional operations are better coordinated, and overhead costs have been reduced. For example, the introduction of the personal computer into the office has facilitated instantaneous communication and has reduced the need for office support positions, such as secretaries.
Reengineering has had a significant effect on the airline industry. Midwest Airlines, a midsized provider, has followed the lead of several large airlines, reengineering its company with the goal to make it easy for the customer to do business. With information technology, the airline has provided the ability to redeem frequent flyer miles and find the best deals on fares. Midwest also offers services like web check-in and loading flight schedules on PDAs. The airline takes advantage of technology to optimize several business processes, including revenue management, pricing, and crew scheduling. With wireless communications, dispatchers quickly send critical information to pilots, and mechanics obtain engine performance data and access systems right from the aircraft. These IT enhancements have changed the way Midwest does business and how people there do their jobs. Unlike many other airlines, Midwest has been successful in the early 2000s with a major acquisition closing in 2008.
Done right, business reengineering positively transforms the workings of an office. Often, the reengineered office does require fewer, but more highly skilled people with more complex jobs.
While companies frequently implement downsizing plans to increase profitability and productivity, downsizing does not always yield these results. Although critics of down-sizing do not rule out the benefits in all cases, they contend that downsizing is over-applied and often used as a quick fix without sufficient planning to bring about long-term benefits. Moreover, downsizing can lead to additional problems, such as poor customer service, low employee morale, and bad employee attitudes. Laying workers off to improve competitiveness often fails to produce the intended results because downsizing can lead to the following unforeseen problems and difficulties:
• The loss of highly-skilled and reliable workers and the added expense of finding new workers.
• An increase in overtime wages.
• A decline in customer service because workers feel they lack job security after layoffs.
• Employee attitudes that may change for the worse, possibly leading to tardiness, absenteeism, and reduced productivity.
• An increase in the number of lawsuits and disability claims, which tends to occur after downsizing episodes.
• Restructuring programs sometimes take years to bear fruit because of ensuing employee confusion and the amount of time it takes for employees to adjust to their new roles and responsibilities.
Some studies have indicated that the economic advantages of downsizing have failed to come about in many cases, and that downsizing may have had a negative impact on company competitiveness and profitability in some cases.
Downsizing has repercussions that extend beyond the companies and their employees. For example, governments must sometimes enact programs to help displaced workers obtain training and receive job placement assistance. Labor groups have reacted to the frequency and magnitude of downsizing, and unions have taken tougher stances in negotiations because of it.
Through downsizing and reengineering, it can be argued that many companies have lost some of their critical, long-term capabilities that did not seem essential to short-term survival. Intangible assets such as employee commitment, productivity, innovation, and risk-taking have been weakened. Too often, reengineering becomes a catch-all term used to describe any and all corporate change programsincluding downsizing. The result, then, of reengineering for some companies has been overworked and demoralized employees, bad customer service, and poor quality products.
Instead of laying employees off, critics recommend that companies eliminate jobs only as a last resort; not as a quick fix when profits fail to meet quarterly projections. Suggested alternatives to downsizing include early retirement packages and voluntary severance programs. Furthermore, some analysts suggest that companies can improve their efficiency, productivity, and competitiveness through quality initiatives such as Six Sigma, empowering employees through progressive human resource strategies that encourage employee loyalty and stability, and other such techniques.
Advocates of downsizing counter critics' claims by arguing that, through downsizing, the United States has maintained its position as one of the world's leading economies. Economists point out that despite the downsizing that has become commonplace since the 1970s, overall U.S. standards of living, productivity, and corporate investment have grown at a healthy pace. They reason that without down-sizing, companies would not remain profitable and hence would go bankrupt when there is fierce competition and slow growth. Therefore, some executives and economists see downsizing as a necessary albeit painful task, and one that ultimately saves the larger number of jobs that would be lost if a company went out business.
Advocates of downsizing also argue that job creation from technological advances offsets job declines from downsizing. Hence, displaced workers are able find new jobs relatively easily, especially if those workers have skills that enhance the technological competence of prospective employers. In other words, despite the admitted discomfort and difficulties that downsizing has on displaced workers, some workers are able to locate new jobs, and companies are able to achieve greater efficiency, competitiveness, and profitability. Moreover, even though downsizing may not solve all of a company's competitive problems or bolster a company's profits indefinitely, downsizing can help reduce costs, which can lead to greater short-term profitability. In addition, advocates of downsizing contend that staff-reduction efforts help move workers from mature, moribund, and obsolete industries to emerging and growing industries, where they are needed. Economists argue that this process strengthens the economy and helps it grow. This process also enables companies with growing competitive advantages to maintain their positions in the market in the face of greater domestic and global competition, and it is the difficult but necessary result of the transition toward a global economy.
Downsizing poses the immediate managerial problem of dismissing a large number of employees in a dignified manner in order to help minimize the trauma associated with downsizing. Employees who are laid off tend to suffer from depression, anxiety, insomnia, high blood pressure, marital discord, and a host of other problems. A 2007 Finnish study showed that those most at risk of mental health problems were men who had left their jobs. This group was 64 percent more likely than the average person to be given a drug prescription for anxiety problems.
Thus, when companies decide that downsizing is the best course of action, managers should do so in a way that does the least harm to employees and their families. This includes taking the time to allow dismissed employees to air their thoughts, instead of laying them off quickly and impersonally, and providing assistance in finding new jobs.
Because of the possible negative effects that occur after downsizing, managers may have to implement measures to counteract employee apathy, improve customer service, and restore employee trust. Analysts of downsized companies argue that managers should take steps immediately after workforce reductions to provide the remaining workers with the support and guidance they need. Staffs who survive a round of corporate downsizing run a significantly increased risk of suffering mental health problems because of the increased workload they face once colleagues have left. The Finnish study mentioned
above also found that men who continue to work for a downsized company are 50 percent more likely than those whose had not been through downsizing efforts to be given a prescription for drugs such as antidepressants or sleeping pills.
Managers, aware of the possible outcomes, should provide employees with clear indications of what is expected of them and how they can meet increased productivity goals. Managers should confer with employees regularly to discuss performance and strategies for meeting the goals. In addition, managers should encourage employee initiative and communication and provide employees with rewards for excellent work. By promoting employee initiative and even employee involvement in decision-making, managers can help restore employee trust and commitment and help increase employee motivation.
The aftermath of downsizing also places greater demands on managers to make do with less. In other words, managers must strive to maintain or increase productivity and quality levels despite having a smaller work-force. Since downsizing often brings about a flatter corporate structure, the flow of information and communication no longer requires the effort needed prior to restructuring. Therefore, reports used for communication between layers of the old corporate hierarchy, for example, can be eliminated. If redundant but nonessential work cannot be completely eliminated, it perhaps can be reduced. By studying particular tasks and determining their essential components, managers can get rid of unnecessary tasks and eliminate unnecessary jobs altogether.
Southwest Airlines, which historically has had a culture of trust between management and employees, provides a good example of effective organizational down-sizing. Growth in online bookingsa technological event outside of management controlnecessitated the need for layoffs. In its reduction, Southwest focused on both the employees who were being let go and employees who were keeping their jobs, hoping to keep the latter group motivated and committed to the company. Management did not make the cuts until all employees could see that the move was necessary, and then offered employees the choice of moving to a different call center, or taking a severance package and leaving the company.
Downsizing appears to be an ongoing practice for the foreseeable future. Top managers with responsibility for making downsizing decisions are in a difficult predicament. Failure to downsize may result in inefficiencies, while downsizing clearly has a number of potentially negative effects on individuals and communities. Finding the balance between these outcomes is the primary challenge facing these managers.
SEE ALSO Divestment; Quality and Total Quality Management; Strategic Planning Failure
Battles, Matthew. How Business Can Save the World. Boston Globe 28 Feb 2008. Available from:
Champy, James. People and Process. Workflow Systems 4, No. 2. (March 2006). Available from:
Continental Airlines Cuts Jobs, Capacity. Denver Business Journal 5 June 2008. Available from:
Dash, Eric. Citigroup Records a Loss and Plans 9,000 Layoffs. International Herald 18 Apr 2008. Available from:
Downsizing a Threat to Mental Health, Management Issues 18 Jan 2007. Available from:
Hammer, Michael, and James Champy. Reengineering the Corporation: A Manifesto for Business Revolution. Harper Business Publications, 2004.
Karoub, Jeff. GM to Lay Off 3,550 at SUV and Pick-Up Factories. The Auto Channel 29 April 2008. Available from:
Mandel, Michael J. Jobs: The Lull Will Linger. Business Week 25 Oct 2004, 3842.
Marks, M.L., and K.P. DeMeuse. Resizing the Organization: Maximizing the Gain While Minimizing the Pain of Layoffs, Divestitures, and Closings. Organizational Dynamics 34, no. 1 (2004): 1935.
Menn, Joseph. Series of Layoffs Begins at PeopleSoft. Los Angeles Times 15 Jan 2005, D1.
Vanden Plas, Joe. CIO Leadership Series: Alex Yarmulnik and IT Lift Midwest Airlines. 5 Dec 2007. Available from:
Weber, Joseph. More Jobsand More Layoffs. Business Week Online 16 June 2004. Available from:
Wiesenfeld, Batia. The Analysis: The Upside of Downsizing. Business Week 8 Apr 2008. Available from: |
Myassignmenthelp submit now
plagiarism checker
Capital Expenditure Course Help
What is expenditure?
An expenditure is incurred the payment is made in cash or is settled to be a credit in exchange for goods or services. Whenever an expenditure is incurred there is an evidence which proves that expenditure is incurred and are called sales receipt or an invoice. Organizations tend to maintain tight controls over expenditures, to keep from incurring losses.
Difference between expense and expenditure
The major difference between an expense and an expenditure is that an expense is cost which has expired or was necessary to incur in order to obtain revenue for the time period as mentioned in the income statement where as an expenditure is a payment or disbursement and may be incurred while purchasing an asset, reducing a liability, distribution to owners or just an expense.
Difference between capital expenditure and revenue expenditure
Capital expenditure - these expenditures are incurred while acquiring a fixed asset which are expected to be productive for a long period of time.
Revenue expenditure - these expenditures are incurred for costs related to specific revenue transactions or operating periods, such as the cost of goods sold or repairs and maintenance expense.
For more information about expenditures and their contact us at we are available 24/7 for your help. Our excellent tutors will help you out with everything and will clear all your doubts and queries regarding revenue expenditure, capital expenditure and any other topic which you wish to know about. will also help you with your accountancy assignment.
Capital expenditure or capex is an expense or the use of funds or assumption of a liability to acquire a long term asset to obtain productive purposes for more than a year. Such expenditure has a non-recurring nature.
Capital ExpenditureThese are funds can also be used by a firm to upgrade physical assets such as property, industrial buildings or equipment. It is often used to undertake new projects or investments. These are also made by companies to maintain or increase the scope of one's operations.
A capital expenditure is not treated as an expense, rather it is treated as an asset. The fixed asset is then depreciated and is treated as an expense over the useful life of the assets. For example, if we acquire an asset worth $5,000 and expect its useful life to be five years, we charge $1,000 to depreciation expense every year for the next five years.
In accounting, capital expenditure is included in the asset account, thus increasing the value of the asset after tax appropriations. Capital expenditure is normally found in the cash flow statement under "Investment in Plant, Property, and Equipment" or something similar in the Investing subsection.
There are two types of Capital expenditures
1. Invested in assets used to maintain existing levels of operation within a company
2. Invested in something new to initiate future growth.
Examples of capital expenditure
1. Buildings (including depreciation that extends the useful life of a building)
2. Capital leases
3. Computer equipment
4. Office equipment
5. Furniture and fixtures
6. Intangible assets
7. Land (including the cost of upgrading the land)
8. Machinery (including the costs required to bring the equipment to its intended location and for its intended use)
9. Software
10. Vehicles
Amounts included in capital Expenditure
The following amounts are included in capital expenditure:
1. Acquiring fixed, and sometimes, intangible assets
2. Repairing an existing asset to increase its useful life
3. Upgrading an existing asset if it results in a superior fixture
4. Preparing an asset so that it can become functional and be used in business
5. Restoring property or adapting it to a new or different use
6. Starting or acquiring a new business
Accounting rules for Calculation of Tax
Capital expenditure is a cost which can't be deducted in the year in which it is incurred and therefore it must be capitalised. This is done for tax as The general rule says that if the acquired asset's useful life is longer than the taxable year, then the cost must be capitalized. After that only can the cost of capital expenditure be depreciated over the life of the asset in question.
Calculation of Capital Expenditures
1. Obtain the financial statements of two companies of the past two years.
2. Subtract the net amount of fixed asset of the past year from the net number of fixed assets of the year just ended so we get the net result of change in fixed assets between two years.
3. Subtract total amount of accumulated depreciation for the first year preceding year from the total amount of accumulated depreciation for the year just ended. The result is the total amount of depreciation for the year just ended. An alternate to find depreciation expense is to look it up in the income statement for the year just ended. This figure does not include any amortization, nor any depreciation associated with acquired assets.
4. Now to calculate the final capital expenditure add the change in the fixed asset with the depreciation for the year ended.
Thus preparing financial accounts is highly reliable on the knowledge of basic concepts of accounting and its terminologies. Without understanding them properly we cannot make financial statements. The calculation and analysis of different parts is a complex task to d without any guidance. So is here to help you, where you can contact us at anytime and we will help you with your queries and helping you out with your assignments. Myassignmenthelp respects that you can’t lose on marks and that is why we are here to provide you with the best facilities and qualitative results. You can also take online classes from the best tutors. We believe in providing the best services for your satisfaction. We serve our clients with good and satisfying work and with complete dedication. |
Wi-Fi Router Charts
Click for Wi-Fi Router Charts
Mesh System Charts
Click for Wi-Fi Mesh System Charts
Cloud vs. Shared
Cloud computing is getting a lot of attention today, much more than hosting ever did during the dot-com boom of the 1990s. But for small businesses using these services, what does it mean? How is cloud any different or better than shared hosting? And what can you use cloud computing for?
Dedicated Hosting
The first type of hosting that data centers provided was dedicated. This is simply hardware that the provider leases to you that runs outside your business environment in a data center that has better economies of scale for power, backup power, cooling, and physical hardware security.
Since the dedicated provider standardizes on the hardware and racks, it can achieve the cost and performance capabilities in operating the hardware. This makes it more affordable to small customers who would otherwise attempt to purchase, install, and maintain the hardware in a data center.
Unlike shared and cloud computing, no one but you is running software on the dedicated server. Dedicated hosting is still expensive, typically starting at a few hundred dollars per month for a low end configuration.
Shared Hosting
The dot-com boom saw a Cambrian explosion of web sites, and an increasing need for hosting. Dedicated hosting was too expensive for most small and medium companies to host just a simple web site. It was also overkill, since dedicated servers would be idle for web sites that did not have a lot of traffic.
Shared hosting is a way for hosting providers to create segments on a dedicated server. A single instance of an operating system, web server, application server, and file storage is partitioned so that a dedicated server can support 2 or even 20 customers. The figure below shows customer partitions created on a single physical dedicated server.
Traditional shared hosting architecture
Each instance of shared hosting has some limited configuration capabilities for the web server, application server and database schema in the database. Access to the operating system is usually extremely limited. Each customer has a file directory with a predefined amount of storage that is part of an array of disks used by all other users.
Shared hosting provides some operational effeciencies compared to dedicated hosting. Instances are easy to manage by the provider, and it is easy to provision new customers with a pre-defined package of capabilities, such as 2 GB of storage, 20 GB of network transfer, an Apache web server, PHP application server, and MySQL database schema.
The cost savings for customers versus dedicated makes shared hosting ideal and common for sites like web hosting where there was not a lot of contention for resources among the customers.
Security - Shared
Security for shared hosting is based on applications, the file system and the database, and managed by the operating system. Hackers have an easier time infiltrating customers on shared hosting versus dedicated because they only need to access one shared hosting instance in order to get logical proximity to the other customers.
Performance - Shared
The cost of shared hosting can be as low as $5 per month up to around $50 per month. Prices generally increase with performance and options The main problem with shared hosting is that applications and databases are only good at partitioning disk space. Shared hosting is completely ineffective at allocating and partitioning CPU, memory, and network bandwidth.
Shared hosting customers usually see performance issues caused by heavier users on a shared hosting server. This cannot be easily resolved without sophisticated monitoring tools that throttle applications and databases for one customer in the case of heavy load, in order to maintain performance for all of the other customers. Shared hosting also does not provide a lot of options or custom configurations. Providers needed to create pre-defined segments that can quickly be provisioned.
Failures are also a problem with shared hosting. If there is a failure of a physical device, such as a motherboard, CPU, or disk, all of the customers on the shared hosting server are impacted. Most providers create application clusters and database clusters to reduce the impact of outages.
Another strategy is to maintain system backups and migrate customers to standby servers. But this still takes time and performance is still severely impacted. Recovery from outages can be as quick as 20 minutes or as long as a few hours. Providers might invest in higher quality hardware, backup software, and standby servers. But this cost is passed on to the customers.
Support Us!
Don't Miss These
• 1
• 2 |
Significant Digits: Introduction
Our next series of posts will be about the concept of significant digits (also called significant figures), which are important in scientific or engineering calculations to keep track of the precision of numbers (although, as we’ll see, they are not what you would use when you need to be especially careful). We’ll start with the general concept and how to count “sigdigs”, and next time move into how they are used.
What are significant digits?
Let’s start with a very simple question from 1998:
Significant Digits
What are significant digits?
Doctor Mitteldorf answered in terms of the need for them, which is an important place to start:
Whenever you make a measurement, the measurement isn't precise. Scientists like to compare their experiments with a theory, and the measurement never agrees completely with the theory. But if the difference between the measurement and the theory is small, maybe the theory can still be right, and the error in the measurement accounts for the mismatch. This is the reason scientists are always thinking about error estimates when they make a measurement.
So significant digits are one way to keep track of how much accuracy you can expect in a calculation based on measurements, so that you can tell if an observation differs significantly from the theory being tested.
Say you measure the length of your classroom with a meter stick. You line up the meter stick and do it by eye, and you get 10.31425 meters. That last 25 represents a quarter of a millimeter.
When you think about the size of the error you could have made, you have to admit that you could be as much as 5 millimeters off. After all, the line you measured on might not have been exactly straight; the room isn't completely square, you eyeballed the ruler when you placed it end to end...
So you could say your measurement is 10.31425 meters with an uncertainty of .005 meters. It could be as much as 10.319 or as little as 10.309. That means that the 10.31 are the 4 significant digits; the fifth digit, the 4, is only slightly significant (since it could be as much as a 9) and the remaining digits aren't significant at all, and should be dropped, by convention, when you report your result. The 2 and the 5 don't really have any experimental meaning; they are not significant digits. The 4 is optional in this case.
As a result of this, we only want to write that measurement as 10.31 or 10.314; anything more implies that we are more certain than we really are, leading to possible false conclusions. We only want to write the digits that are significant, in the sense that they should be taken seriously.
As a result, when scientists or engineers write numbers, they mean something more than they mean to pure mathematicians: not only a value, but a level of precision as well. Mathematically, we would say that 10.310 means the same thing as 10.31, but in the context of measurements, the former implies a more precise measurement.
How are significant digits counted?
Many questions we get involve how to decide which digits are called “significant”, particularly when some of them are zero. It can be surprisingly difficult to answer that question clearly without digging deeply into the reasons for the answer (as we will be doing in a later post). Here is a question from 1999:
Significant Digits and Zero
What is the best way to explain significant digits? When are zeros significant and when are they not significant? What is the meaning of significant in regard to this concept? Certainly the zeros in the number 5,000 are important, but apparently not significant. How about 508? How about 23.0? How about 0.05? How about 46.50?
As we’ll see, 5000 is a special case; the other zeros are more clear-cut. I answered, focusing on how to distinguish significant from non-significant:
A digit is significant if it contributes to the value of the number. Since zeroes on the left (if they are to the left of the decimal point) can be dropped without affecting the number, they are insignificant. Zeroes on the right (if they are to the right of the decimal point) are considered significant because they tell you that that digit is not some non-zero value, as do zeroes between digits. Zeroes between the decimal point and non-zero digits, however, are present only to keep the other digits in the right place, and are not significant - they're certainly important to the number, but are there only as a scaffolding, not as part of the building.
We’ll be looking later into just what we mean by “contributing to the value of the number”. At this point, I’m giving a very informal description.
How about that 5000, where there is no decimal point?
In the case of a number like 5000, the zeroes are really ambiguous, since they might be there for either reason; when we pay attention to significant digits, we usually write numbers in scientific notation so that we don't have to write any zeroes in that position, and can avoid the ambiguity. On the other hand, if you wrote 5000.0, we would assume all the digits were significant, since decimal places are included that aren't just required to show place value. If you write 5000., it is generally taken to mean that all the zeroes are significant.
So, I might have measured only to the nearest thousand, so that only the 5 is significant; or I might have measured to the nearest ten, so that the first two zeros are significant. In the former case, in scientific notation (called “standard form” in some countries) I would write \(5\times 10^3\), and in the latter \(5.00\times 10^3\).
In your examples, the significant digits are
5000 (1 - though the zeroes
= COULD be significant)
508 (3 - everything between
=== first and last nonzero digits)
23.0 (3 - zero could have been
== = omitted, must have a purpose)
0.05 (1 - zero couldn't be dropped,
= has no significance)
In general, significant digits are:
000xx0xx000 Between first and last
===== non-zero digits
000xx0xx000.000 Between first non-zero
============ digit and last decimal
000xx0x.x0xx000 Between first non-zero
000.000xx0xx000 Between first non-zero
======== digit and last decimal
Placeholders as scaffolding
The next question, from 2001, gave me a chance to elaborate on that “scaffolding” image:
Significant Digits in Measurement
I understand that there are rules to determine the significant digits in measurement; however, I do not comprehend the basic concept behind the use of significant digits. It seems to me that all digits are significant, especially zeros for place value. An example of my confusion would be: How can 3000 have only one significant digit (3)? or How can 0.0050 have only two significant digits (50)?
We need to think more about what “significant” means, especially for zeros. I replied:
The basic idea is that all digits that are not there ONLY for place value purposes are significant.
Suppose I built a building that rose 10 stories high, but the first two stories were just columns holding the rest up above a highway. The first two "stories" would be important, certainly; but they wouldn't really count as part of the building, because they only hold it in place, without actually containing anything useful. The building has only eight "significant stories"! Zeros used only for place value at the right of a number are mere scaffolding holding it "above" the decimal point, and don't really contain any information.
I’ll have more to say about this below. But the main idea is that in my building, the highest floor is 7 stories above the lowest, and that would still be true if we removed the columns at the bottom to make an 8 story building.
It's a lot easier to talk about significant digits when you write numbers in scientific notation, which is designed to neatly separate significant digits from the size of the number, by ensuring that no extra zeros are required in order to write it.
If we write 3000 as 3 * 10^3, we can see we have only one significant digit. If I write it instead as 3.000 * 10^3, it has four, because I am explicitly telling you all four digits. When I write it as 3000, you can't tell whether the 0's are there because I know they are correct, or just because I had to put them there to write the number (placeholders). You really can't say just from looking at the number what I meant.
Similarly, if we write 5.0 * 10^-3, we clearly have two significant digits. In this case, that is just as clear from 0.0050, because you know the zeros before the 5 are there only as placeholders. If those digits were non-zero, I would have had to write their correct values, whereas if the zeros in 3000 were really non-zero, I have the option of writing them or rounding them off.
Scientific notation eliminates the need to write any digits as mere placeholders, so all the digits you see are significant (unless you write unnecessary zeros on the left, which would be silly).
This is one reason that serious science is commonly done entirely using scientific notation.
Going beyond rules
Now let’s jump to a 2007 question that asks the $1,000,000 question: What’s really going on here? It’s a long question, so I’ll quote it piece by piece. First:
Explanation of Significant Figures
My Physical Sciences teacher introduced our Honors class to the concept of "Significant Figures". At first it wasn't a problem. She made us take notes and include the book-given definition. But then we got a graded worksheet back, and almost everyone got a certain question on significant figures wrong. So, for the past two days, there has been a heated debate going on over significant figures.
Ultimately, here's my question: How can 1,000,000 have only one significant figure, but 1,000,000. have 7? I understand that it's the decimal point, but saying that 1,000,000 has only one significant figure is coming across to me the same as saying that 1 = 1,000,000 because none of the zeros are important or "significant". Also, my teacher asked two other teachers for information, and one mentioned the Atlantic-Pacific rule which "works most of the time", and the other said it works "only some of the time".
What's going on here? And what's up with the whole 1,000,000 thing? And how many significant figures does .0549 have, and how about 0.0549?
To me, saying that 1,000,000 has only 1 SF, but 1,000,000. has 7 SF seems to me to mean the same as 1 = 1,000,000; but this doesn't make sense to me. Having $1,000,000 is a lot different than having one dollar.
I wasn’t familiar with the “Atlantic-Pacific Rule”; it turns out to be a common mnemonic (in America only!), exemplified by this page:
It agrees with the descriptions I’ve given; but like many mnemonics, it may distract students from thinking about the meaning of what they are doing, by focusing on the mechanics. And it entirely overlooks any ambiguity.
I started with the essential meaning of significant digits:
A significant digit is one that we can properly assume to have been actually measured. We make such an assumption based on a set of conventions about how to write measurements: we only write digits that we have actually measured, unless the digits are zeros that we just have to write in order to write the number at all. For example, if I use a ruler that shows millimeters (tenths of a centimeter), then if I wrote 12.34 cm I would be lying, because I can't really see whether that 4 (tenths of a millimeter) is correct. If I wrote 12.30 cm, I would still be lying, because I would be claiming that I know that last digit is exactly zero, and I don't. I have to write it as 12.3 cm. All three of these digits are significant--they really represent digits I measured. They are still significant if I write it as 0.123 m (just changing the units to meters), or as 0.000123 km (using kilometers this time). Here, the zeros I added are there ONLY to make it mean millionths; they are placeholders.
So the concept is based on trusting that the writer would only write what is known. It is, of course, zeros that complicate this …
It isn't really quite true, as far as I am concerned, that 1,000,000 has one significant digit. It MIGHT have only one, or it might have seven. The problem is that you can't be sure; the rule of thumb that is being used doesn't allow you to indicate that a number like this has 2, or 3, or 6 significant digits. Maybe I know that it's between 95,000 and 1,005,000, so that the first three digits are all correct, but the rules don't let me show that just from the way I write it. I'd have to explicitly tell you, the value is 1,000,000 to three significant digits.
So someone who writes 1,000,000 has no way to indicate, within the numeral itself, how much of it to trust; so the convention is that we don’t trust the zeros. But someone could write 1,000,000 and tell us on the side that it is accurate to, say, the nearest ten-thousand (three significant digits), and that wouldn’t contradict the way it was written. This is what we mean by ambiguous. And this may be why some teachers said the rule doesn’t always “work”.
How to avoid the ambiguity? Use scientific notation:
Significant digits are really best used only with scientific notation, which avoids this problem. We can write 1,000,000 with any number of significant digits:
1: 1 * 10^6
2: 1.0 * 10^6
3: 1.00 * 10^6
4: 1.000 * 10^6
5: 1.0000 * 10^6
6: 1.00000 * 10^6
7: 1.000000 * 10^6
The trick is that we don't need any "placeholders" in this notation; every digit written is significant.
The ultimate point: relative precision
There was more to Forest’s question:
Is there a decent, constant rule about significant figures that I can remember? And what makes "placeholders" unimportant, and what makes a number a "placeholder"? 0.0008 is a lot different than 0.08. Again, how are these zeros unimportant??? I'm very confused on a lot of this, and right now I'm so confused that I can't even explain everything that I'm confused about!
I understand this:
1) That 0.435 has only three significant figures.
2) That 435 has three significant figures as well.
3) That 4.035 has four significant figures because the zero has a
digit of a value of one or higher on each side.
I'm not sure about the rest of the significant figures thing...If you have time, in your answer, would it be out of your way to touch on all "combinations" at least a little? (By this I mean: 0.03 has ___ amount of SF because______, and 3.03 has... and 303 has... and try to get all of those? Thanks!)
Good questions! I continued, talking about the real purpose of the convention:
The main idea of significant digits is as a rough representation of the RELATIVE precision of the number; that is, it is related to the percentage error that is possible. For example, 0.08 indicates that the measurement might be anywhere between 0.075 and 0.085; a more sophisticated way to indicate this is to write it as 0.08 +- 0.005, meaning that there might be an error of 0.005 in either direction. This error is 0.005/0.08 = 0.0625 = 6.25% of the nominal value. If you do the same thing with 0.0008, you get the same relative error; although the value itself is very different, the error is proportional to the value. Both have one significant digit, which likewise indicates the relative error, NOT the actual size of the error.
This is the reason the zeros between the decimal point and the first non-zero digit are not significant: They don’t affect the relative error, because they change both the size of the number (each zero dividing it by 10) and the size of the possible error, in proportion.
We can also see this in terms of scientific notation. My example numbers are \(0.08 = 8\times 10^{-2}\) and \(0.0008 = 8\times 10^{-4}\), which both have one significant digit.
Rules and examples
He wanted rules, so I gave him rules (essentially the same as his Atlantic-Pacific rule, with the addition of ambiguity):
The significant digits of a number are all the digits starting at the leftmost non-zero digit, through the rightmost digit, if there is a decimal point. If there is no decimal point, then you count only through the rightmost nonzero digit, because zeros beyond that MIGHT be there only to give other digits the correct place value. (Zeros to the left of the first nonzero digit serve a similar purpose, but aren't counted anyway.)
Here are the cases I can think of:
Decimal point to the left of all nonzero digits: Count from the leftmost nonzero digit all the way to the end.
.103 0.103 0.00103 0.0010300
\_/ \_/ \_/ \___/
3 3 3 5
Decimal point in the middle: Count from the leftmost nonzero digit all the way to the end.
10.305 00103.0500
\____/ \______/
5 7
Decimal point on the right: Count from the leftmost nonzero digit all the way to the end.
10305. 1030500.
\___/ \_____/
5 7
No decimal point: Count from the leftmost nonzero digit to the rightmost nonzero digit.
10305 1030500 [here we don't know whether
\___/ \___/.. the last 2 zeros are
5 5? measured or just placeholders]
Listing all the cases helped to reassure me that I wasn’t oversimplifying anything; in each case the rule agrees with the required meaning.
Forest replied,
Thank you so much for the help on Significant Figures! I think I understand it now completely, and I liked the way you described everything...especially the examples. Oh, and sorry for making you write all of those out...that probably took up a lot of your time. But thanks again for the help! The Dr. Math service is amazing and I always come out understanding whatever I had a problem with completely. Great job!
It’s always encouraging when we can know we succeeded.
I’ll be looking deeper into the relative error interpretation in a later post, after we first look at how significant digits are used in calculations.
Leave a Comment
|
Welcome to Pregnancy Channel.
Search Language:
Trying to Conceive - Illustrated Article
• Fertility Awareness
• Infertility
• Reasons for Infertility
• Treating Infertility
• More Fact Sheets and Resources
Fertility Awareness and The Menstrual Cycle
Being aware of your menstrual cycle and the changes in your body that happen during this time can be key to helping you plan a pregnancy, or avoid pregnancy. During the menstrual cycle (a total average of 28 days), there are two parts: before ovulation and after ovulation.
• Day 1 starts with the first day of your period.
• If the egg is not fertilized, it will break apart.
Charting Your Fertility Pattern
Basal body temperature method - Basal body temperature is your temperature at rest as soon as you awake in the morning. A woman's basal body temperature rises slightly with ovulation. So by recording this temperature daily for several months you'll be able to predict your most fertile days.
You are most fertile and most likely to get pregnant:
• 12 to 24 hours after ovulation.
• drinking alcohol the night before
• smoking cigarettes the night before
• getting a poor night's sleep
• having a fever
Calendar method - This involves keeping a written record of each menstrual cycle on a calendar. The first day of your period is Day 1. Circle Day 1 on the calendar. Do this for eight to 12 months so you know how many days are in your cycle. The length of your cycle may vary from month to month. So write down the total number of days it lasts each time. To find out the first day when you are most fertile, check your list for the cycle with the fewest days. Then subtract 18 from that number. Take this new number and count ahead that many days on the calendar. Draw an X through this date. The X marks the first day you're likely to be fertile. To find out the last day when you are fertile, subtract 11 days from your longest cycle and draw an X through this date. This method always should be used with other fertility awareness methods, especially if your cycles are not always the same lengths.
Reasons for Infertility
There are many different reasons why a couple might have infertility. One is age-related. Women today are often delaying having children until later in life, when they are in their 30s and 40s. A couple of things add to this trend. Birth control is easy to obtain and use, more women are in the work force, women are marrying at an older age, the divorce rate remains high, and married couples are delaying pregnancy until they are more financially secure. But the older you are, the harder it is to become pregnant. Women generally have some decrease in fertility starting in their early 30s. And while many women in their 30s and 40s have no problems getting pregnant, fertility especially declines after age 35.
As a woman ages, there are normal changes that occur in her ovaries and eggs. All women are born with over a million eggs in their ovaries (all the eggs that they will ever have), but only have about 300,000 left by puberty. Then of these, only about 300 eggs will be ovulated during the reproductive years. Even though menstrual cycles continue to be regular in a woman's 30s and 40s, the eggs that ovulate each month are of poorer quality than those from her 20s. It is harder to get pregnant when the eggs are poorer in quality.
Ovarian reserve is the number and quality of eggs in your ovaries and how well the ovarian follicles respond to hormones in your body. As you approach menopause, your ovaries don't respond as well to your hormones, and in time they may not release an egg each month. A reduced ovarian reserve is natural as a woman ages, but young women might have reduced ovarian reserves due to smoking, a prior surgery on their ovaries, or a family history of early menopause. Also, as a woman and her eggs age, if she becomes pregnant, there is a greater chance of having genetic problems, such as having a baby with Down Syndrome. Embryos formed from eggs in older women also are less likely to fully develop, a main reason for miscarriage (early pregnancy loss).
Health Problems
Some people also have diseases or conditions that affect their hormone levels, which can cause infertility in women and impotence and infertility in men. Polycystic Ovarian syndrome (PCOS) is one such hormonal condition that affects many women, and is the most common cause of anovulation, or when a woman rarely or never ovulates. Another hormonal condition that is a common cause of infertility is when a woman has a luteal phase defect (LPD). A luteal phase is the time in the menstrual cycle between ovulation and the start of the next menstrual period. LPD is a failure of the uterine lining to be fully prepared for a fertilized egg to implant there. This happens either because a woman's body is not producing enough progesterone, or the uterine lining isn't responding to progesterone levels at some point in the menstrual cycle. Since pregnancy depends on a fertilized egg implanting in the uterine lining, LPD can interfere with a woman getting pregnant and with carrying a pregnancy successfully.
Certain lifestyle choices also can have a negative effect on a woman's fertility, such as smoking, alcohol use, weighing much more or much less than an ideal body weight, a lot of strenuous exercise, and having an eating disorder.
Unlike women, some men remain fertile into their 60s and 70s. But as men age, they might begin to have problems with the shape and movement of their sperm, and have a slightly higher risk of sperm gene defects. They also might produce no sperm, or too few sperm. Lifestyle choices also can affect the number and quality of a man's sperm. Alcohol and drugs can temporarily reduce sperm quality. And researchers are looking at whether environmental toxins, such as pesticides and lead, also may be to blame for some cases of infertility. Men also can have health problems that affect their sexual and reproductive function. These can include sexually transmitted diseases (STDs), diabetes, surgery on the prostate gland, or a severe testicle injury or problem.
If you or your partner has a problem with sexual function or libido, don't delay seeing your doctor for help.
Treating Infertility
You should talk to your doctor about your fertility if you:
• are under age 35 and, after a year of frequent sex without birth control, you are having problems getting pregnant, or
• are age 35 or over and, after six months of frequent sex without birth control, you are having problems getting pregnant, or
Your doctor can refer you to a fertility specialist, a doctor who focuses in treating infertility. This doctor can recommend treatments such as drugs, surgery, or assisted reproductive technology. Don't delay seeing your doctor because age also affects the success rates of these treatments.
There are many ways to treat infertility. They include:
The first step to treat infertility is to see a doctor for a fertility evaluation. He or she will test both the woman and the man, to find out where the problem is. Testing on the man focuses on the number and health of his sperm. The lab will look at a sample of his sperm under a microscope to check sperm number, shape, and movement. Blood tests also can be done to check hormone levels. More tests might be needed to look for infection, or problems with hormones. These tests can include:
• an x-ray (to look at his reproductive organs)
• a mucus penetrance test (to see if sperm can swim through mucus)
• a hamster-egg penetrance assay (to see if sperm can go through hamster egg cells, somewhat showing their power to fertilize human eggs)
Testing for the woman first looks at whether she is ovulating each month. This can be done by having her chart changes in her morning body temperature, by using an FDA-approved home ovulation test kit (which she can buy at a drug store), or by looking at her cervical mucus, which changes throughout her menstrual cycle. Ovulation also can be checked in her doctor's office with an ultrasound test of the ovaries, or simple blood tests that check hormone levels, like the follicle-stimulating hormone (FSH) test. FSH is produced by the pituitary gland. In women, it helps control the menstrual cycle and the production of eggs by the ovaries. The amount of FSH varies throughout the menstrual cycle and is highest just before an egg is released. The amounts of FSH and other hormones (luteinizing hormone, estrogen, and progesterone) are measured in both a man and a woman to determine why the couple cannot achieve pregnancy. If the woman is ovulating, more testing will need to be done. These tests can include:
• an hysterosalpingogram (an x-ray to check if the fallopian tubes are open and to show the shape of the uterus)
• a laparoscopy (an exam of the tubes and other female organs for disease)
• an endometrial biopsy (an exam of a small shred of the uterine lining to see if monthly changes in it are normal)
Other tests can be done to show whether the sperm and mucus are interacting in the right way, or if the man or woman is forming antibodies that are attacking the sperm and stopping them from getting to the egg.
Drugs and Surgery
Different treatments for infertility are recommended depending on what the problem is. About 90 percent of cases are treated with drugs or surgery. Various fertility drugs may be used for women with ovulation problems. It is important to talk with your doctor about the drug to be used. You should understand the drug's benefits and side effects. Depending on the type of fertility drug and the dosage of the drug used, multiple births (such as twins) can occur in some women. If needed, surgery can be done to repair damage to a woman's ovaries, fallopian tubes, or uterus. Sometimes a man has an infertility problem that can be corrected by surgery.
Assisted Reproductive Technology (ART)
Assisted reproductive technology (ART) uses special methods to help infertile couples, and involves handling both the woman's eggs and the man's sperm. Success rates vary and depend on many factors. But ART has made it possible for many couples to have children that otherwise would not have been conceived. ART can be expensive and time-consuming. Many health insurance companies do not provide coverage for infertility or provide only limited coverage. Check your health insurance contract carefully to learn about what is covered. Also, some states have laws for infertility insurance coverage. Some of these include Arkansas, California, Connecticut, Hawaii, Illinois, Maryland, Massachusetts, Rhode Island, Texas, and West Virginia.
In vitro fertilization (IVF) is a type of ART that is often used when a woman's fallopian tubes are blocked or when a man has low sperm counts. A drug is used to stimulate the ovaries to produce multiple eggs. Once mature, the eggs are removed and placed in a culture dish with the man's sperm for fertilization. After about 40 hours, the eggs are examined to see if they have become fertilized by the sperm and are dividing into cells. These fertilized eggs (embryos) are then placed in the woman's uterus, thus bypassing the fallopian tubes. Gamete intrafallopian transfer (GIFT) is similar to IVF, but used when the woman has at least one normal fallopian tube. Three to five eggs are placed in the fallopian tube, along with the man's sperm, for fertilization inside the woman's body. Zygote intrafallopian transfer (ZIFT), also called tubal embryo transfer, combines IVF and GIFT. The eggs retrieved from the woman's ovaries are fertilized in the lab and placed in the fallopian tubes rather than the uterus.
ART sometimes involves the use of donor eggs (eggs from another woman) or previously frozen embryos. Donor eggs may be used if a woman has impaired ovaries or has a genetic disease that could be passed on to her baby. And if a woman does not have any eggs, or her eggs are not of a good enough quality to produce a pregnancy, she and her partner might want to consider surrogacy. A surrogate is a woman who agrees to become pregnant using the man's sperm and her own egg. The child will be genetically related to the surrogate and the male partner, but the surrogate will give the baby to the couple at birth.
A gestational carrier might be an option for women who do not have a uterus, from having had a hysterectomy, but still have their ovaries, or for women who shouldn't become pregnant because of a serious health problem. In this case, the woman's eggs are fertilized by the man's sperm and the embryo is placed inside the carrier's uterus. In this case, the carrier will not be related to the baby, and will give the baby to the parents at birth.
Counseling and Support Groups
If you've been having problems getting pregnant, you know how frustrating it can feel. Not being able to get pregnant can be one of the most stressful experiences a couple has. Both counseling and support groups can help you and your partner talk about your feelings, and to help you meet other couples like you in the same situation. You will learn that anger, grief, blame, guilt, and depression are all normal. Couples do survive infertility, and can become closer and stronger in the process. Ask your doctor for the names of counselors or therapists with an interest in fertility.
Source: The National Women's Health Information Center
U.S. Department of Health and Human Services
Office on Women's Health
Medical/Legal Disclaimer
Recent Comments
No comments have been posted.
Post a Comment |
CS312 Course Software Installation Guide
You will need to make use of three different software packages for this course:
Because sml-mode provides a fairly good indenting algorithm, we will require that you use Emacs until later in the course. Emacs will also give you warnings when exceeding the 80-character line limit -- something you will certainly find useful.
Installing SML and Emacs
1. Download the self-installing .exe for Windows (5.3 MB) and run it.
2. After installing SML/NJ, download this ZIP archive (9.3 MB) Emacs with SML Mode installed, plus a few minor CS 312 customizations.
3. Extract the contents of the archive to the C:\Program Files\ directory. Be sure to extract preserving the directory tree structure (options depend on your software). For the next step to work, you will need to put it in that location. (If you really object to C:\Program Files\Emacs\, ask for assistance.)
4. You should now have a directory, C:\Program Files\Emacs\. Go to this directory and double-click either sethome.bat (for Windows 95/98/ME) or home.reg (for Windows NT/2000/XP). This will add an environment variable HOME required for Emacs to work correctly.
5. Go to the C:\Program Files\Emacs\bin\, and double-click the addpm.exe file. This will add some necessary registry entries and place the appropriate items in your Start Menu. If when starting Emacs you get an error about fonts, you must read the directions at the bottom or the rest of your configuration will be incorrect.
6. Restart your computer.
Note: For installation of SML/NJ on Windows 2000 or Windows XP, you may experience some difficulties after installing. The problem is that the system path variable is not being set correctly. Here is a workaround: Follow the instructions above. Click Start -> Run and type "cmd". If you get a command window, you are ok. Otherwise do the following: Right click on My Computer -> Properties -> Advanced tab -> Environment Variables -> System Variables -> Path -> Edit. Cut the value of the path variable and paste it back again. Click OK to close everything and try Start -> Run -> cmd again. You should be ok.
Setting up your newsreader
1. You may use any news reader you like, but you need to have at least one. These instructions are for Outlook Express. To set up a news account in Outlook Express, first start up Outlook Express and exit out of the myriad wizards that start up.
2. Once at the main screen, choose Accounts... from the Tools menu.
3. Choose to make a new News... account from the Add button.
4. Enter your name, click next.
5. Enter your e-mail address, click next.
6. Enter newsstand.cit.cornell.edu for the name of the news server, check the authentication box, click next.
7. Enter your Cornell netid for the account name and your CIT password, click next.
8. Click finish and close.
9. Choose Newsgroups... from the Tools menu to select the newsgroups you want to read. The newsgroups for this course are cornell.class.cs312 and cornell.class.cs312.talk.
Working versions of SML/NJ are available for Macintosh under OS X (download here). The install instructions are located in file INSTALL of each version's FTP directory. We don't recommend a specific version (anything after 110.33 will work on OS X) nor do we provide detailed installation instructions. The working versions differ from the release version in various ways, particularly regarding Compilation Manager, library use, and error messages. Therefore you should expect to have a bit of difficulty with this as the course progresses.
You can use another SML implementation as well. MoscowML is a good option; however, all assignments must compile and run with SML/NJ on PCs, so if you develop your assignment on your Mac, be sure to test it out under SML/NJ on a PC before submitting.
Follow the instructions for installing SML/NJ version 110.0.7. Here are step-by-step instructions for both SML/NJ and Emacs installs.
Installing CS 312 Software on Linux
## Download smlnj:
## For Debian or Redhat:
wget ftp://ftp.research.bell-labs.com/dist/smlnj/release/110/RPMS/smlnj-110.0.7-4.i386.rpm"
## For other linux distributions (or if you prefer to compile from source),
## visit http://cm.bell-labs.com/cm/cs/what/smlnj/install/ for SML/NJ.
## Make a Debian package (skip this step if using Redhat):
alien smlnj-110.0.7-4.i386.rpm
## Install (choose one of the following two commands)
## Debian:
dpkg -i smlnj_110.0.7-5_i386.deb
## Redhat:
rpm -i smlnj-110.0.7-4.i386.rpm
## Get the mode for emacs (Note, if you use Vim, it is already there
## and the colorization looks better)
wget ftp://ftp.research.bell-labs.com/dist/smlnj/contrib/emacs/sml-mode-3.3.tar.Z
## Put it somewhere :)
mv sml-mode-3.3.tar.Z /usr/share/emacs/site-lisp
cd /usr/share/emacs/site-lisp
## And extract it.
tar -xvzf sml-mode-3.3.tar.Z
## Modify your .emacs to take sml into account. You might need to comment
## or modify the first lines regarding SML in the CS312 .emacs to have:
(setq load-path (cons "/usr/share/emacs/site-lisp/sml-mode-3.3/" load-path))
(setq sml-mode-info "/usr/share/emacs/site-lisp/sml-mode-3.3/sml-mode.info")
(setq sml-program-name "sml")
As Emacs is included with almost every Unix distribution these days, you only need to get support for sml-mode 3.3. Download and unpack the archive to some location on your computer. If you do not already have an .emacs file (in other words if you don't normally use Emacs), download this .emacs file and put it in your home directory. Make sure you modify the paths in the .emacs file so that they point to the location of the sml-mode files. If you already use Emacs, you should look through our .emacs file and take what parts of it you find useful.
Emacs fonts under Windows
The .emacs file we distribute tries to pick a font for you. If you have an odd system configuration, you may get an error message about not finding a good font to use. This will interrupt the emacs startup sequence, so you have to fix it even if the default font looks ok. To fix it, type in the scratch buffer (the first thing you see when it starts) (w32-select-font) and hit C-j (control-J). Pick a font you like and edit your .emacs (using Notepad or Emacs itself) to change the lines for picking font -- look for Courier New -- to whatever you selected. |
The IT Certification Resource Center
Featured Deal
Learn More ❯
Work On Your Wellness: What's Your Hobby?
It's important for any IT professional to take care of Number One. If you haven't got your health, then everything else in your life tends to suffer. In Part 5 of our multipart series, we focus on hobbies.
Hobbies can help improve your mental and physical well being.Given the long hours they put in, it’s not surprising that IT professionals have little time for pursuits that they love and would benefit from. It’s typical to slip into some passive purposeless diversion such as watching TV at the end of each stressful workday. Most are too exhausted to engage in a creative hobby, such as playing an instrument, painting, creative writing, or drawing, all of which require active participation.
Professionals who are not able to devote time and energy to doing something they enjoy, however, may be losing out. Pursuing a hobby might just be what stressed minds need. It is believed to rejuvenate the mind. Focusing on an activity that you enjoy takes your mind off all the pressure and problems at work, puts you in a good mood, gives you a sense of satisfaction, and can boost confidence.
Benefits of a Hobby
A number of studies conducted in different parts of the world have shown that engaging in a hobby or creative endeavour regularly can make you happier, healthier, and even enhance productivity. According to a post on, research undertaken by the Australian Psychological Society demonstrated that spending time on a hobby contributed positively to stress management.
Another study by a health psychologist, Matthew Zawadzki, at the University of California, Merced, found that concentrating on a hobby can relieve stress, enable you to focus better, and make you a happier person. Mind and body are related. A hobby needn’t be a physical activity, such as gardening, rock climbing, or dancing, to do your health good.
Studies have found that even making music, art, knitting, and other physically undemanding hobbies can make people healthier. Because one’s mental state affects bodily functions. A happy, positive, and relatively relaxed individual is likely to eat and sleep better.
Choose a Hobby
Hobbies can help improve your mental and physical well being.Most IT workers have to cope with long workdays, so it makes sense to identify a hobby that you don’t have to struggle to find time for. You want a creative activity that you can manage to do a few times a week, ideally.
Choose something that you love, have an interest in, are capable of doing though you don’t have to be very good at it, and is accessible in your circumstances. What’s important is that you really want to do it. Unlike work projects, you’re not under any pressure to meet performance targets.
If achieving a tangible outcome is important to you, then you might want to take up an activity that is focused on producing or creating. This could be something like gardening, writing, pottery, or puzzles — anything that yields an end-result. Whatever you choose, your hobby needs to be sustainable, something that fits your ability and circumstances.
Quite often, people have hobbies that are not related to their work. You don’t want to be thinking about your work and all its attendant stresses in your free time. A hobby should enable you to detach yourself from your job, relax, and focus on exploring your creativity. If you are an outdoor person, you might prefer gardening, rock climbing, or nature walking and hiking.
Another point to consider while deciding on the right hobby, is companionship. Do you like to be by yourself when pursuing a creative activity, or would you rather engage in something that involves others, such as team sports or performing in a band of musicians.
Don't Overdo It
The right amount of time to devote to a hobby differs from person to person. You don’t want to be spending so much time on your creative endeavour that you fail to meet deadlines at work or neglect your family, friends, and other commitments.
If long hours at work as well as family responsibilities make it unviable to spend several hours every week on a hobby, then don’t fret. You can benefit even from devoting a little quality time a few days a week. In a Harvard Business Review article, Gaetano DiNardi, director of demand generation at Nextiva in February 2019, refers to a study that found that just 45 minutes spent creating art can improve an individual’s confidence and capacity to accomplish tasks.
Hobbies can help improve your mental and physical well being.According to the same article, hobbies can help people perform better in their professional roles. He believes a creative pursuit can lift one above the din of company goals, business metrics, and target dates, and give one the leeway to explore one’s emotions and rekindle creativity. Creative workers help companies come up with innovative ideas that have the promise to interest potential customers.
Practice, Not Perfection
No, it’s not necessary to be adept at whatever creative hobby you decide to take on. It’s a hobby after all, not a profession. It’s important, however, to choose something that you really like to do, not something that requires you to push yourself.
When you do something solely because you want to, you immerse yourself in the process of creating or discovering something. You’re under no pressure to produce a professional outcome. The value lies in the positive emotions generated by creative activity, sense of fulfilment that comes from making something original, and the confidence that grows as you progress with your creative endeavour.
Many business heads, as well as career advisers, believe that pursuing a hobby helps workers manage stress and give themselves the space to realize their creativity. According to an article by Kevan Lee posted on, a creative hobby can make employees more productive.
Hobbies can help improve your mental and physical well being.He refers to a study by Dr. Kevin Eschleman and his colleagues at San Francisco State University, which evaluated the influence of creative pursuits on more than 400 workers. The results of the study led Dr. Eschleman to suggest that it might be beneficial for organizations to encourage their employees to engage in creative hobbies as a way to recover from work-related stress.
According to Dr. Eschleman, creative activities might enable professionals to develop a sense of control and discover their creative ability. Even if you're not self-actualizing or improving your ability to perform on the job, however, a hobby is still beneficial. The most important thing, after all, is that you're spending time doing something you enjoy, and not thinking constantly about work.
|
First Ornamental Calamity by stephen hastings-king
1. The plastic sphere snow does not stop falling through glycerine onto the model New England village, center of a permanent storm into which no people venture.
2. In a glycerine temporality places set for lunch lift from shaking tables to describe peculiar drifting orbits just above which are visible in their intricacies from viewpoints framed by doorways through which guests never walk.
3. In a glycerine temporality a body splayed beneath a bed can hover a short distance above the floor.
4. When the inhabitants of the model village from under beds or pinned in doorways shout to see if others are OK each sends sound waves that ripple across the interminable unfoldings of the apparent dissonance of an earthquake in winter.
5. Outside the snow does not fall. The ground rushes up to meet it.
Leave a comment
Filed under Stephen Hastings-King
Leave a Reply
You are commenting using your account. Log Out / Change )
Google photo
Twitter picture
Facebook photo
Connecting to %s |
If you’re working in Ruby you’ve definitely heard the term “self”. Ruby is an arrogant program and likes to talk about itself an awful lot. Unfortunately, we need to indulge our friend Ruby because it makes our life a whole lot easier. What it does essentially is the exact opposite of this gif:
In short, self gives you access to the object you’re currently working in. It is a reference to the code basically asking “Right this moment while this code is running….. who am I?” That’s it! Why does it require a blog post? Because there’s a lot of cool stuff you can do with it.
Here’s a base-level example of how self works.
class BoomBaby
def boom
Here we have a class aptly named BoomBaby and an instance method within this class simply called boom that returns self. We can go even simpler than that and keep self at the top-level of your code:
def boom_baby
p self
What’s happening is we’re defining an instance method without a class. Since we’re not currently couched in a class, self will refer to something called the main object, or simply “main”. All Ruby is object-oriented, so when we’re not referring to an object specifically, we are referring to “main”.
module BoomGoesTheModule
def self.look_at_me_please
p self
And look at that! The self here is referring to either the class we defined or the module we defined earlier, depending on what it’s couched in. This is simply showing that self is a versatile little tool and knows what to refer to.
Self is an incredibly useful tool that will do for you the most important thing something can do for a programmer: make your code shorter. You’ll hear this a lot in your coding journey (like…. seriously you’ll hear it a lot): coders are lazy. If there’s an easier way to do something they will do so. And that’s a good thing! Even in the simple examples above, the code would look much more muddled and harder to read if instead of self we wrote out what self is referring to each time.
And we’ve barely scratched the surface of what self can do for you. You can interpolate it into all sorts of things within instance methods and it will always know that it’s talking about the specific instance at hand or if you’re working with a single source of truth you can initialize a class with certain attributes and then shovel those attributes into that source upon initialization. Here’s an example of the latter:
class BoomestOfBabys
You can come in to clean up other people’s code and they’ll always say :
In conclusion, even though it can be a bit of a confusing concept, I promise it will make your code both more readable and easier to write. If I’m perusing through code I don’t know and my eyeballs pass the word “self”, it’s MUCH easier figuring out what that must be referring to, than seeing a class/instance/module name and having to suss out where that’s coming from.
Self when able. Self responsibly. Self often.
Full time software engineering student at Flatiron School |
We thought we’d finally discovered The Big Heavy: we received an ad for a 2 ton air conditioning unit. It’s common knowledge that most window units are hardly featherweight, but still! We wondered how large, exactly, was this behemoth of a cooling system? Visions of stories-tall machinery danced in our heads.
And then we researched it a bit, which put that 2-ton unit into perspective (you might even say it cooled our jets). Rather than the marvel of machinery we’d envisioned, the image of that unit was rather pedestrian. Boring, even. It was precisely the kind of cooling system you’d see outside any home or small office. In fact, it looked something like this:
So where does the “ton” measurement come from? Surely it can’t indicate the weight of this thing, right?
Ton is a measurement of the cooling capability of an air conditioning or refrigeration system; in fact, it works out to be the equivalent of 12,000 BTU/hour (we talked about what BTU means a few months ago). But why use the word ton? Well, it’s a bit of a holdover from the days when technology was making the transition from using actual stored ice (!) to mechanical systems. It’s the same amount of cooling power that would be generated by melting a ton of ice in a 24-hour period.
Which, actually, is pretty cool. In every sense of the word. |
Let's face it, many dogs bark at other dogs on walks. If you walk often enough, you have likely encountered at least once a Reactive Rover barking at every dog he encounters, what gives?
Whether you are a dog owner embarrassed by your dog's unruly behaviors or a simple observer wondering why dogs do the things they do, one thing is for sure: dogs who bark at other dogs on walks often look angry.
Dog trainers and behavior consultants call it "barrier frustration" but don't take this as a sure diagnosis, dogs may bark at other dogs on walks for different reasons.
Let's take a peek at some common reasons why your dog goes on a barking frenzy the moment he sees another dog on walks.
A Matter of Frustration
In a dog's dream land, dogs would be free to roam and go greet as many people and other dogs as they want and everybody would be friends. In a real life scenario though things are very different.
Dogs are walked on leashes to keep everyone safe and out of trouble. This restriction though may lead to what's known as "barrier frustration." Barrier frustration takes place in predisposed dogs who are eager to go meet every single dog they see, but are restrained by a leash.
The result is a big barking explosion, a dog's version of a toddler's tantrum that may make your dog seem aggressive. Yet, those who know your dog well, know for a fact that your dog is the friendliest dog on earth who plays well at the dog park and is eager to make friends.
Because puppies and young dogs are very excitable and have little frustration tolerance, you may see this behavior rake place from a young age. This behavior is likely to persist if you don't tackle it in a timely fashion.
A dog barking at other dogs on walks may be frustrated
A dog barking at other dogs on walks may be frustrated
Reactive Rovers
Not all dogs who bark at other dogs on walks are eager to go meet other dogs. Some dogs don't want to have anything to do with the other dog and their barking is a distance-increasing signal telling the other dog "stay away!"
Often seen in puppies who weren't socialized enough, fearful dogs or dogs with a history of undergoing a negative experience with other dogs, this type of reactive barking isn't that uncommon either.
Negative Associations
Dogs are masters in forming associations, whether they are positive or negative. If you have been using aversive dog training methods such as delivering leash corrections, spraying your dog or delivering shock the moment your dog barks, these methods can backfire.
Here the thing: through conditioning, dogs tend to form associations with the unpleasant happening and their triggers. On top of forming negative associations with certain stimuli or events, consider that, through a phenomenon known as "generalization" dogs may generalize their anxiety to other similar stimuli or events
So if your dog barked on walks upon spotting a dog and you delivered a correction right then, there are risks that your dog may come to associate dogs with the correction, or even you or the place in which the correction occurred, leading to more problems down the road.
Intrigued? Discover the 13 negative effects of aversive dog training methods.
Resource Guarders
Last but not least, some dogs see their owners as a valuable resource that is worthy of guarding. Just as if guarding a big bag of food or a bone, some dogs will bark and lunge at any dogs who dare coming near their valuable owners.
This form of "jealous" dog barking can be quite problematic, especially when meeting dogs who are off leash or not under good control by their owners.
Discover More
Are Miniature Schnauzers Hyper?
dog flowers
puppy in the grass
Are Puppies Born With Parasites?
These dogs typically do well being around other dogs until the owner is around. When the owner is around, they suddenly turn into snarling and growling creatures who are telling other dogs to stay away.
Often these dogs may not care much about other dogs on walks until other dogs come too close, and invade these dogs' personal "bubble."
Now That You Know...
As seen, dogs may bark at other dogs on walks for various reasons. Now that we have identified several, let's take a closer look at to how we can tackle these different forms of barking.
How Do I Stop My From Barking at Other Dogs on Walks?
The method used to stop your dog from barking at other dogs on walks will vary based on the underlying cause. One thing though that is recommended in all cases is avoiding to use corrections or aversion-based training tools such as choke collars, prong collars, bark collars and shock collars.
Work under threshold. The threshold is an imaginary line under which your dog is relatively in a calmer state, while past it he turns reactive and barks and possibly lunges. When a dog is over threshold, that is often a sign that your dog is exposed to other dogs at a level of intensity that is too overwhelming,
Your dog's threshold level can be lowered by simply increasing distance and working initially from a distance your dog is less overwhelmed so that he can re-gain a thinking state and become more responsive to you.
For barrier frustration: as much letting your dog meet all dogs on walks may seem like an easy fix, not all dogs are willing to meet a dog who is barking his head off. And even if the other dog doesn't mind, you'll be rewarding your dog's barking behavior by letting him meet and greet any dog he wants. Next time, all bets are off that he'll be pulling and barking even more!
The best way to tackle this type of barking is making sure your dog has the opportunity to vent all his energy before going on walks and upping his obedience training.
This means every time your dog sees another dog, ask him to heel and heavily reward your dog’s attentiveness to you. This makes for a more polite dog and a flashy attention heeling that will make other dog owners remark how well trained your dog is! A win-win!
For Reactive Rovers: If you are finding yourself walking your dog more and more at the wee hours of the night to avoid other dogs, you may be wondering what to do about it. Here are a few options.
To better control your dog, invest in a front-attachment harness and use it in place of a collar. This piece of equipment will help you gain more control so you feel less vulnerable about being dragged down the street. Then, work on creating positive associations with other dogs starting at a distance from where your dog doesn't react.
With your dog under threshold, he'll be better able to respond to you. Every time he sees a dog from a distance, make a smacking sound with your mouth and pop him a tasty treat. With time, your dog will get the idea that seeing a dog equals treats which should help reduce the barking episodes. Here is a helpful behavior modification technique for Reactive Rovers: the Look at that Dog Game
For Resource Guarders: One way to approach dogs who act protective of owners on walks is teaching the "Otello" dog that good things happen every time another dog approaches.
The jealous dog is therefore fed treats when the other dog comes near. When the other dog is away, the dog is ignored and no more treats are given.
With time, the jealous dog should learn that great things happen when another dog approaches which should reduce the barking, growling and lunging behavior over time.
Caution: When working on dog behavior and its associate emotions, treatment falls under behavior modification more than training. This requires a certain level of skill.
Also, behavior modification comes with risks. For safety and proper implementation of behavior modification, consult with a dog trainer or dog behavior consultant using force-free behavior modification.
Related Articles |
Agile Project Management
Agile project management (APM) is a strategy that breaks large projects into smaller, more manageable tasks. In the APM methodology, each project is completed in small sections – often referred to as iterations. Each iteration is completed according to its project life cycle, beginning with the initial design and progressing to testing and then quality assurance.
Understanding agile project management
In a dynamic and complex world, businesses must be able to change direction and adapt quickly.
While the software and marketing industries are perhaps most associated with APM, all businesses can benefit from adopting agile methodology. Indeed, it is now being utilized in car manufacturing, universities, and also for military purposes to name a few.
The time that it takes for an iteration to be completed is called a sprint, and sprints typically run for a few days or as many as four weeks. Ultimately, this approach to project management allows iterations to be released as they are completed.
Upon release, each iteration is then critiqued by a review team composed of key stakeholders. These stakeholders gain insights from the current iteration to guide the direction of the next iteration (step) in the process.
The four key values of the agile project management
The APM framework is based on the Agile Manifesto which was originally written to guide software development. However, the four key values listed in the manifesto can be applied to almost any industry that has a focus on meeting consumer needs.
They are:
1. Individuals and interactions over processes and tools. In the face of advanced technology, the APM framework still recognizes the importance of human input.
2. Working software over comprehensive documentation. When project teams avoid being bogged down by small, insignificant details, they can focus on delivering results.
3. Customer collaboration over contract negotiation. Traditionally, customers are only involved at the beginning and end of project management. However, in APM the customer is involved with every step of the process to ensure their input is incorporated.
4. Responding to change over following a plan. Agile project management works with change instead of actively trying to resist it. It emphasis creating a minimum viable product (MVP) at regular intervals as the process moves from iteration to iteration.
Advantages of the agile project management approach
• Early error detection. By allowing faults to be detected as they occur, agile project management negates the need for expense fixes once a product has gone to market. When travel company Thomas Cook found that their slow website left customers unable to purchase, they switched to APM. Over the next 3 months, the company was able to detect loading errors early and recouped an estimated $190,000 in lost business.
• Empowerment. The APM approach increases trust, builds accountability, and encourages a diverse range of ideas. As a result, projects are delivered efficiently with a focus on continuous improvement and user experience.
• Increased sales and profits. Businesses who adopt a more agile approach spend less time and thus less money developing products. But perhaps the single biggest cost-saving lies in the decreased reliance on expert consultation to guide the development process. In the APM approach, the experience level of junior engineers and developers is fast-tracked through hands-on learning.
Key takeaways:
• Agile project management is an iterative development framework that breaks large projects into smaller parts, known as iterations.
• Agile project management advocates human over machine input and a focus on delivering results. It also focuses on customer collaboration and continuous product improvement.
• Agile project management allows businesses to develop products efficiently without an over-reliance on expensive consultation fees.
Related Business Frameworks
Business Model Canvas
Blitzscaling Business Model Innovation Canvas
The jobs-to-be-done (JTBD) framework defines, categorizes, captures, and organizes consumer needs. The jobs-to-be-done framework is based on the premise that consumers buy products and services to get jobs done. While products tend to come and go, the consumer need to get jobs done endures indefinitely. This theory was popularized by Tony Ulwick, who also detailed his book Jobs To Be Done: Theory to Practice.
Customer Obsession
Customer obsession goes beyond quantitative and qualitative data about customers, and it moves around customers’ feedback to gather valuable insights. Those insights start with the entrepreneur’s wandering process, driven by hunch, gut, intuition, curiosity, and a builder mindset. The product discovery moves around a building, reworking, experimenting, and iterating loop.
Value Proposition Canvas
value proposition is about how you create value for customers. While many entrepreneurial theories draw from customers’ problems and pain points, value can also be created via demand generation, which is about enabling people to identify with your brand, thus generating demand for your products and services.
Business Design
business designer is a person that helps organizations to find and test a business model that can be tested and iterated so that value can be captured by the organization in the long run. Business design is the discipline, set of tools and processes that help entrepreneurs prototype business models and test them in the marketplace.
Design Sprint
design sprint is a proven five-day process where critical business questions are answered through speedy design and prototyping, focusing on the end-user. A design sprint starts with a weekly challenge that should finish with a prototype, test at the end, and therefore a lesson learned to be iterated.
Agile started as a lightweight development method compared to heavyweight software development, which is the core paradigm of the previous decades of software development. By 2001 the Manifesto for Agile Software Development was born as a set of principles that defined the new paradigm for software development as a continuous iteration. This would also influence the way of doing business.
Read Next: MVP, Lean Canvas, Scrum, Design Thinking, VTDF Framework.
Read More:
Published by
Gennaro Cuofano
|
Why Are My Chives Turning Yellow After Transplanting Them?
A common herb with a mild onion and garlic flavor, chives (Allium schoenoprasum) tolerate cool temperatures as well as warm weather. Perennial in U.S. Department of Agriculture plant hardiness zones 3 through 10, chives can be transplanted in early or late spring, and, when healthy, come back year after year. Chives are simple to grow and care for, but yellowing leaves after the plants were transplanted may be a sign of stress from the transplant.
Transplant Stress
If you transplant your chives plants in less than optimal conditions, the tips of their leaves may turn yellow, wilt or even die. Although some stress, or shock, is expected after a transplant, chives often recover quickly from transplantation. If your chives continue to turn yellow weeks after being transplanted, then the plants may not be adapting well to their new growing conditions and are dying.
Transplant Preparation
Getting your chives and their outdoor garden ready before the transplant will help the plants survive being moved. Start chives from seeds indoors eight to 10 weeks before your location's average last spring frost date. The plants need to be at least several inches tall when they are transplanted. The outdoor soil temperature should be 60 to 70 degrees Fahrenheit, and no chance of frost should exist before the transplant. Ensuring the outdoor garden's soil drains well and is fertile before the transplant will further help your chives adapt well to their new growing environment. Add either a 4- to 6-inch-thick layer of compost to the garden soil or 2 to 3 tablespoons of a granular, 16-16-8 fertilizer per every 1 square foot of garden soil surface. Mix either the compost or fertilizer with the garden soil to a depth of 6 to 8 inches.
Transplant Technique
When being transplanted, chives must be removed carefully from their containers so their roots aren't damaged. Place each plant in its own pre-dug hole, with the plant's base sitting 1/4 to 1/2 inch below the soil surface that surrounds the hole. Gently pat soil around each plant, and cover the soil with mulch to keep it moist and to reduce weed growth. After transplanted chives become established, they need very little additional care.
Harvest Time
Chives plants can be 12 to 24 inches in height and more than 12 inches across when full grown, but the plants can be harvested 30 days after being transplanted. Because chives continue to proliferate as they grow, with their purple flowers producing seeds that wind scatters, the plants needs to be divided every three to four years. When a chives plant runs out of growing space or some of its leaves get old, those leaves may yellow at the tips and die. Harvest those leaves first. If leaves turn entirely yellow, cut them off and use them for compost. |
Practice Relating to Rule 14. Proportionality in Attack
Section C. Information required for judging proportionality in attack
Upon ratification of the 1977 Additional Protocol I, Spain declared with regard to Articles 51 to 58 inclusive:
It is the understanding [of the Spanish Government] that the decision made by military commanders, or others with the legal capacity to plan or execute attacks which may have repercussions on civilians or civilian objects or similar objects, shall not necessarily be based on anything more than the relevant information available at the relevant time and which it has been possible to obtain to that effect.
Spain, Interpretative declarations made upon ratification of the 1977 Additional Protocol I, 21 April 1989, § 5. |
Quick Answer: Is Igbo Language Endangered?
What is the Igbo tribe known for?
Igbos are well known for their variety of soups, made from locally grown vegetables, fruits and seeds.
The most popular Igbo soups are oha, nsala, akwu, okazi and ofe owerri..
What language is Igbo?
Is Igbo language dying?
In Nigeria, the language spoken by one of the largest ethnic groups, the Igbo, is in danger of dying out – which is odd because the population is growing.
What is considered an endangered language?
What does it mean to say a language is endangered? An endangered language is one that is likely to become extinct in the near future. Many languages are failing out of use and being replaced by others that are more widely used in the region or nation, such as English in the U.S. or Spanish in Mexico.
Why is language endangered?
Language loss occurs when the language has no more native speakers and becomes a “dead language”. … Although languages have always become extinct throughout human history, they are currently dying at an accelerated rate because of globalization, imperialism, neocolonialism and linguicide (language killing).
What is the most endangered language in the world?
8 Endangered Languages That Could Soon DisappearIrish Gaelic. Irish Gaelic currently has over 40,000 estimated native speakers. … Krymchak. Also spelled Krimchak and known as Judeo-Crimean Tatar, this language is spoken by people in Crimea, a peninsula of Ukraine. … Okanagan-Colville. … Ts’ixa. … Ainu. … Rapa Nui. … Yagan. |
International Journal of Soil Science 1816-4978 xxxx-xxxx Academic Journals Inc. 10.3923/ijss.2008.83.91 Handayani I.P. Prawito P. 2 2008 3 2 Understanding folk knowledge of soil offers broader insight to help design more appropriate participatory agricultural research programs and facilitate better communication with farmers. To address this issue, semi-structured interviews were conducted with 90 farmers (age > 20 years) from three villages in Bengkulu Province, Sumatra, Indonesia. The objective of this study was to explore the folk knowledge toward soil classification, soil fertility, soil degradation and soil management. Farmers used 11 criteria to classify the soils. They described nine soil classes based on color and texture. Common colors for fertile soils are black, brown and mixed brown-black, but infertile soils are red and red-yellow. To better manage the soils, farmers recognized the importance of manures, crop residues and compost as soil amendments and legumes in cropping systems. Two-year fallow was commonly applied by farmers to restore soil fertility after five years of cultivation. This study suggests that there is a need to maximize the benefits of local knowledge of soil by combining it with scientific knowledge to enhance rural development projects, help precision farming and better manage natural resources.
Altieri, M.A., 1990 Why Study Traditional Agriculture? 1990 pp: 551-564 pp: 551-564 Barrios, E., R. Herrera and J.L. Valles, 1994 Agrofor. Syst., 28 143 157 Bellon, M.R. and J.E. Taylor, 1993 Econ. Dev. Cult. Change, 41 763 786 Corbeels, M., A. Shiferaw and M. Haile, 2000 Farmers’ knowledge of soil fertility and local management strategies in Tigray, Ethiopia. 2000 De Foresta, H. and D. Schwartz, 1991 Chromolaena odorata and disturbance of natural succession after shifting cultivation: An example from Mayombe, Congo, Central Africa.]]> BIOTROP Spec. Publ., 44 23 41 Fujisaka, S., G. Escobar and E.J. Veneklaas, 2000 Agric. Ecosyst. Environ., 78 175 186 Habarurema, E. and K.G. Steiner, 1997 Geoderma, 75 75 87 Handayani, I.P., P. Prawito, Z. Muktamar and M.S. Coyne, 2006 Soil Survey Horizons, 47 79 80 Hecht, S.B., 1990 Indigenous Soil Management in the Latin American Tropics: Neglected Knowledge of Native Peoples. 1990 pp: 151-157 pp: 151-157 Hiernaux, P., C.L. Bielders, C. Valentin, A. Bationo and S. Fernandez-Rivera, 1999 J. Arid Environ., 41 231 245 Karlen, D.L., C.A. Ditzler and S.S. Andrews, 2003 Geoderma, 114 145 156 Kerven, C., H. Dolva and R. Renna, 1995 Indigenous Soil Classification Systems in Northern Zambia. 1995 pp: 82-87 pp: 82-87 Mango, N.A.R., 2000 Integrated soil fertility management in Siaya District, Kenya. 2000 Mundy, P. and J.L. Compton, 1991 Dev. Commun. Rep., 74 1 4 Murage, E.W., N.K. Karanja, P.C. Smithson and P.L. Woomer, 2000 Agric. Ecosyst. Environ., 79 1 8 Pawluk, R.R., J.A. Sandor and J.A. Tabor, 1992 J. Soil Water Conserv., 47 298 302 Reij, C., I. Scoones and C. Toulmin, 1996 Sustaining the Soil: Indigenous Soil and Water Conservation in Africa. 1996 Sandor, J.A. and L. Furbee, 1996 Soil Sci. Soc. Am. J., 60 1502 1512 Schmidt, M., H. Schreier and P.B. Shah, 1993 Eur. J. Soil Sci., 44 417 425 Sharma, G.P., A.S. Raghubanshi and J.S. Singh, 2005 Weed Biol. Manage., 5 157 165 Smalling, E.M.A. and A.R. Braun, 1996 Commun. Soil Sci. Anal., 24 365 386 Steiner, K.G., 1998 Agric. Ecosyst. Environ., 69 191 200 Talawar, S. and R.E. Rhoades, 1998 Agric. Hum. Values, 15 3 14 Wezel, A., J.L. Rajor and C. Herbrig, 2000 J. Arid Environ., 44 383 398 William, B.J. and C.A. Ortiz-Solorio, 1981 Ann. Assoc. Am. Geogr., 71 335 358 Winklerprins, A.M.G.A., 1999 Soc. Nat. Resour., 12 151 161 Esse, P.C., A. Buerkert, P. Hiernaux and A. Assa, 2001 Agric. Ecosyst. Environ., 83 55 63 |
Discussion Board
DirectionsAnswer the following questions using your textbook and/or outside resources. Be sure to cite any outside resources. Answer the questions thoroughly, and start a new paragraph for each question. You can single-space, and no MLA heading required. DO NOT UPLOAD a document; cut and paste or use the word processor in Blackboard. This makes it easier for your classmates.1. What lesson might there be for us in the Roman aptitude for absorbing and assimilating external cultures?2. What other cultures, civilizations, and/or governments have overtly modeled themselves on the Roman Empire? What facets of Roman culture have they emulated?3. In which civilization, Greece or Rome, would you have preferred to live? Why?To get full credit, respond to at least two other people by asking or answering questions or sharing experiences. This assignment will be graded holistically, meaning 10 is excellent, 9 is very good, 8 is good, etc. Remember to use Standard English at all times; this is academic writing.
Don't use plagiarized sources. Get Your Custom Essay on
Discussion Board
From $8/Page
Order Essay
Order NOW For A 10% Discount!
Pages (550 words)
Approximate price: -
Why Choose Us
Quality Papers
Professional Academic Writers
Affordable Prices
On-Time delivery
100% Originality
Customer Support 24/7
Try it now!
Calculate the price of your order
We'll send you the first draft for approval by at
Total price:
How it works?
Follow these simple steps to get your paper done
Place your order
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Our Services
Essay Writing Services
Admission and Business Papers
Editing and Proofreading
Technical Papers
|
Bald Faced Hornet
Bald Faced Hornet
What is a Bald-Faced Hornet?
The bald-faced hornet is a relative of the yellowjacket and gets its common name from its largely black color and mostly white face. This stinging insect is named a hornet because of its large size and aerial nest.
What Do Bald-Faced Hornets Look Like?
Bald-faced hornets greatly resemble their yellowjacket relatives, with black bodies and a predominantly white-patterned face. They also have two slanted lines running from their midsection towards their head and on the latter part of their abdomen. Like yellowjackets and paper wasps, the surface of their upper-midsection almost looks triangular from the side.
Queen bald-faced hornets are larger in size than their adult-worker counterparts. Their aerial nests are grey and paper-like, but they are enclosed unlike the open cone structure of other stinging hornets and insects, like yellowjackets and paper wasps.
Signs of an Infestation
A bald-faced hornet infestation is clearly visible with the presence of a nest, which would be suspended above the ground. There will also be worker bald-faced hornets flying around the nest and nearby area if there is an infestation.
Avoiding contact with these insects is key to prevent getting stung. Homeowners should seal up any tiny openings like cracks where bald-faced hornets would be able to enter when seeking shelter. Keeping food covered, especially when outdoors, will also help keep these insects at bay. When spending time outside, people should avoid wearing strong fragrances and opt for unscented hygienic products. Likewise, they should wear shoes that cover and protect their feet from rogue hornets. |
By listening, sharing stories & connecting on shared values, we can overcome the issues that divide us & move forward together.
Here's how it works
Climate change, conservation and energy problems are not environmental problems, they are people problems. For too long we’ve been divided on how to move forward on solutions to big problems that affect people everyday.
To get enough people wanting the same solutions, we need to do something we haven’t done before.
We need to listen to people who disagree with us.
We need to connect as humans and find our common ground to move forward together.
Deep community engagement, or deep canvassing, is a practice for having vulnerable, emotional, and nonjudgmental conversations in person or over the phone that last 10-25 minutes with someone who feels differently about an issue.
Deeply listening and asking curious questions to understand why someone feels a certain way is at the core of this practice.
By sharing vulnerable stories and truly getting at the emotional heart of the issues that divide us, we can overcome polarization and prejudice.
If we deeply engage with enough people in small towns and rural communities on their door steps, then we’ll find common ground and overcome partisanship and tribalism, because deep engagement is proven to make great and lasting change.
Living together in community is about listening, understanding, and sharing — even when it’s hard.
Deep engagement is how we build a populist climate movement. It makes real and lasting change by engaging new people in our common struggle.
Since early 2020, our team has knocked on hundreds of doors and made thousands of calls to deeply engage with people in our community we don’t typically talk with.
You can join us today to talk with your neighbours.
Volunteer for Deep Engagement
Current Deep Engagement Projects
Neighbours UnitedLiving Here |
Foreword Reviews
Admiral Aardvark's Fantastic Menagerie
Or Why the Best Name for a Rhinoceros Is Pinocchio
Clarion Rating: 4 out of 5
Admiral Aardvark leads his ark of animals on an adventure through children’s dreams in this winsome picture book filled with humorous poems.
In Admiral Aardvark’s Fantastic Menagerie, a charming picture book by Jack R. Knutson, poetic language and soothing images set the stage for the ten poems that introduce various animals on Admiral Aardvark’s ark as it sails through “childhood’s rainy day window.” The mirth-filled poems will delight children ages four and up.
The simple yet bewitching illustrations are set in muted tones and depict adorable animals, often with a hapless or dreamy look in their wide eyes. The book introduces friendly creatures such as a tiger named Purr and zebras named Licorice and Candy.
The language in the poems offers humor, enticing descriptions, and parodies of human emotions. For example, vivid imagery is revealed in the poem “What’s the Purpose of a Hippopotamus?”: “Drawbridge mouth opens like a castle gate / Showing ivory teeth like a portcullis grate.” In “I’d Rather be a Rhinoceros,” a “rhinoceros lady” laments her weight: “It is hard to be dainty / When you’re three thousand pounds / Heavy and weighty.”
The rhyme scheme (aa, bb, cc, dd, etc.) is pretty consistent, but sometimes the construction of a line is awkward as it forces accommodation of a rhyme, as seen in “Crocodile Smile”: “I would reply so politely, ‘If you’d like to know / Take a look in my mouth and you I will show!’” The scarcity of punctuation also causes the flow to falter; the lines read like run-on sentences until the pattern of rhyming couplets becomes familiar. Take, for example, the introduction of Admiral Aardvark: “His favorite meal a bowl of ants / His tail lassos around his pants / With golden buckle and telescope / He keeps special magic in an envelope.”
While the illustrations, the poems’ fun language, and the plethora of animal information are alluring and engaging, the pièce de résistance in this children’s book is the concluding song, “Alone After School.” The poet shares his experience of solitude on the playground, waiting for friends to come along, and his realization that he is his own best company: “But no matter how lonely I might feel / I have inside me what is most real / And the best that can ever happen to me / Is having myself to know and to be.” While the inclusion of this touching ditty is somewhat curious since it doesn’t fit in with the theme of animals, it contains a positive message to boost the self-esteem of solitary children, and offers inspiration to find enjoyment and wonder in the company of their own imaginations.
Admiral Aardvark’s Fantastic Menagerie is a cheerful, alluring adventure into the realm of words and imagination.
Reviewed by Maya Fleischmann
Load Next Review |
A medical assistant performs many of the tasks that doctors, physician assistants, and registered nurses do. They will collect vital information about a patient’s condition and vital signs by asking questions and performing essential physical examinations. They also document this information in patients’ medical records. Medical assistants can prepare patients for examination or treatment by washing or disinfecting wounds, removing sutures, inserting ear drops, applying bandages to minor lacerations, assisting with casts or splints, changing dressings on burns, helping with ostomy appliances (such as colostomy bags), moving an injured person onto a stretcher or into an ambulance gurney/stretcher/chair seat; preparing equipment for X-ray images; positioning patients before X-ray images are taken; holding devices that keep patients immobile during X-ray images.
Medical assistants can be found in all medical settings, but most work in physicians’ offices, hospitals, community health clinics, nursing homes, and home healthcare services. They are also employed by the federal government, pharmaceutical companies, insurance companies making case management decisions for their clients receiving medical care outside the country. Medical assistants may work part-time or at night to accommodate another job they have during regular business hours.
The primary duty of a medical assistant is to assist doctors and nurses with various tasks such as answering patient questions and preparing them for examinations. Other duties include taking vital signs such as temperature and blood pressure and updating patients’ charts on their conditions and progress throughout their stay at the clinic. Medical assistants prepare the room by sterilizing equipment and moving patients to surgery suites in a surgery setting. They also monitor vital signs and alert nurses to any changes.
Medical Assistants need to perform well under pressure as they will often have multiple tasks that must be done quickly for one patient or during surgery to serve as an extra pair of hands for nurses and doctors. As such, good multitasking skills are essential in these roles.
General Requirements
To become a medical assistant, you would typically require a high school diploma before studying further at a community college or vocational school that offers programs accredited by the American Association of Medical Assistants (AAMA). You can find out if your program is AAMA-accredited by contacting the AAMA. Once you graduate and pass the AAMA certification exam, you will be ready to become a medical assistant in most states.
To stay competitive, aspiring medical assistants should consider earning additional certifications such as Certified Medical Assistant (CMA) or Registered Medical Assistant (RMA). Earning these credentials can increase your employment prospects and earning potential by adding skills to your resume that set you apart from other job applicants. In addition to the CMA and RMA certifications offered by the American Association of Medical Assistants, other organizations also provide medical assistant certifications, including American Medical Technologists (AMT), National Center for Competency Testing (NCCT), and National Healthcareer Association (NHA). Many employers will also look favourably on candidates with experience in their field, particularly those who have taken part in some form of continuing education.
As of 2018, Medical assistants can expect to earn a median salary of $30,000 per year. The employment of medical assistants is projected to grow by 30 percent from 2016 to 2026, much faster than the average for all occupations. The need for more medical assistance with an ageing population will contribute to this growth as people live longer but need increased health care services.
Other factors contributing to the demand for these positions include insurance companies wanting specific clinical knowledge before making case management decisions that affect clients receiving medical treatment outside of the country and state laws requiring particular paperwork be completed with each visit by medical staff, including registration and insurance forms.
Medical Assistant Requirements differ from state to state
Generally speaking, you would require a high school diploma before attending medical assistant training at a community college or vocational school. These would change as you move through all the states, as every state has its own Health body. Accredited programs are preferred by employers and can be found through the AAMA website, along with the certification requirements for graduates.
You’ll find more information on becoming a Medical Assistant on the MedAssistantEdu website. |
1924 was a fascinating year in history. The Roaring Twenties were fully underway, but countries were still recovering from the devastating effects of the First World War. This timeline shows you some of the biggest events of the year, taking you chronologically through the history of 1924.
1924 was the year that Adolf Hitler was sentenced to prison for his involvement in the failed coup d’état by the Nazi Party, and J. Edgar Hoover was appointed head of the FBI. It was also the year that the United States introduced immigration laws, and Stanley Baldwin became Prime Minister of Britain for the second time after winning a landslide victory.
You can read about these events and discover even more for yourself in an original 1924 newspaper
1924 Timeline
Turn the page to:
January 6: Poulenc and Nijinska’s ballet Les Biches premiers in Monte Carlo.
January 11: In Greece, King George II is deposed and Eleutherios Venizelo is named Prime Minister of the Greek National Assembly as a republic is proclaimed.
January 16: Stanley’s Baldwin’s British government resigns.
January 21: One of the biggest 1924 events – Russian Revolutionary and Premier leader Vladimir Lenin dies of a stroke at the age of 53.
January 21: Vladimir Lenin’s Testament is handed over to the Communist Party. His testament calls for changes to the Soviet governing structure and criticizes Joseph Stalin, Leon Trotsky and other party members.
January 23: Following the resignation of Stanley Baldwin, Ramsay MacDonald forms the first Labour government in Britain, climaxing 24 years of Labour Party struggle.
January 24: Italian dictator Benito Mussolini disallows the non-fascist work union.
January 24: St Petersburg, a city in Russia, is renamed Leningrad. This remained the name of the city until 1991 when it was changed back.
January 25: The first Winter Olympic Games open in Chamonix, France.
January 25: The French government signs a treaty of mutual aid with Czechoslovakia in light of the possibility of an unprovoked attack by a third country.
January 26: Charles Jewtraw, American skater, claims the first ever Winter Olympic gold medal. He wins the 500m speed skating event in 44.0 seconds at the Chamonix games in France.
January 27: The mausoleum of Lenin is placed in Red Square, Moscow. Millions of mourners from across the U.S.S.R had waited in line for hours to see his body, which was put on display at the House of Trade Unions. Lenin’s head and hands will still be visible to visitors.
January 31: The Congress of Soviets ratifies a treaty that embodies separate nations – Belorussian, Ukranian, Transcaucasian – into the Union of Soviet Socialist Republics.
Vladimir Lenin
Image: Wikipedia
February 1: Ramsay MacDonald’s incoming Labour government in Britain formally recognizes the Soviet Union.
February 2: In Turkey, the Turkish National Assembly abolishes the caliphate that had been claimed by sultans of the Ottoman Empire for more than four centuries. Ultimately, the Ottoman Empire comes to an end and the caliphate’s authority and property are transferred to Turkey’s Grand National Assembly.
February 3: 28th President of the United States, Woodrow Wilson, dies in his home in Washington at the age of 67. He had battled a long illness and his former political opponent Calvin Coolidge and his wife attend his funeral.
February 7: Benito Mussolini’s Italian government exchanges diplomats with Soviet Union.
February 10: Bucky Harris, at the age of 27, becomes the youngest baseball manager, managing the Washington Senators.
February 17: Johnny Weissmuller, American swimmer, sets the 100m world freestyle record at 57.4 seconds in Miami, Florida.
February 17: The American architect Henry Bacon, who famously created the Lincoln Memorial in Washington D.C., dies at the age of 57.
February 18: Due to the Teapot Dome scandal, U.S. Secretary of the Navy Edwin Denby resigns.
February 21: Zimbabwean revolutionary and first black President of Zimbabwe Robert Mugabe is born.
February 24: Mahatma Gandhi is released from jail. He served less than two years of a six year sentence and was released due to ill-health. Gandhi decides to write about improvements for India instead of taking part in political action.
February 26: The trial against Hitler for treason in the Beer Hall Putsch in Munich begins.
February 28: U.S. begins intervention in Honduras.
March 1: Germany’s prohibition of Communist Party KPD is lifted.
March 5: The Computing-Tabulating-Recording Corp becomes IBM.
March 5: Frank Carauna becomes the first to bowl 2 successive perfect 300 games.
March 6: The British government cuts its military budget.
March 8: A coal mine explosion occurs near Castle Gate, Utah, killing all 171 miners. The explosion was so powerful that the steel gates of the mine were ripped from their concrete foundations.
March 15: Horacio Vásquez Lajara wins a presidential election, which ends the eight-year American occupation of the Dominican Republic.
March 16: The free port of Fiume is formally annexed by Mussolini’s fascist regime.
March 21: The first foreign language course is broadcast on U.S. radio.
March 31: The London public transport strike ends.
Fiume in 1909
Image: Wikimedia
April 1: Adolf Hitler is sentenced to 5 years of labor for Beer Hall Putsch, but General Ludendorff is acquitted.
April 1: The Royal Canadian Air Force is formed.
April 3: American actor Marlon Brando was born in Omaha, Nebraska (d. 2004).
April 6: Four planes leave Seattle on the first successful around-the-world flight.
April 11: The first US Men’s College Swimming Championship takes place.
April 11: Socialists win the election in Denmark.
April 14: Louis Sullivan, American architect and father of skyscrapers that became iconic architecture of the 1920s, dies at the age of 67.
April 15: One person dies in riots in Belgium.
April 17: Metro Pictures, Goldwyn Pictures & Louis B Mayer Co merged to form Metro Goldwyn Mayer (MGM).
April 18: The first crossword puzzle is published by Simon & Schuster.
April 21: The 28th Boston Marathon is won by Clarence DeMar for the third year in a row, with a time of 2:29:40:2.
April 22: The Hague Chamber of Commerce is formed.
April 27: A group of Alawites kill many nuns in Syria, and French troops retaliate and kill Alawites.
April 28: 119 people die in a coal mine disaster in Benwood, West Virginia. The majority of miners killed were recent immigrants from Europe.
adolf hitler
Adolf Hitler
Image: Wikimedia
May 1: Paul Koudouriotis becomes President of Greece.
May 2: The Netherlands refuse to recognize the USSR.
May 4: The Summer Olympic Games begin in France.
May 4: Communists and fascists win the election in Germany.
May 10: J. Edgar Hoover is appointed head of the FBI.
May 11: Cartel des Gauches wins the election in France.
May 11: The Pulitzer Prize is awarded to Robert Frost.
May 11: Daimler-Motoren-Gesellschaft and Benz & Cie begin their first joint venture, later merging into Mercedes Benz.
May 12: English comedian and actor Tony Hancock is born in Birmingham, England (d. 1968).
May 21: Nathan Leopold and Richard Loeb kidnap and kill Bobby Franks to demonstrate their supposed intellectual superiority by committing a “perfect crime”.
May 26: U.S. President Calvin Coolidge signs an immigration law to restrict immigration to the United States. The law includes the Asian Exclusion Act banning the entry of Asian peoples to the United States from a variety of countries. This was one of the most famous events in 1924.
May 29: AEK Athens F.C. is established on the anniversary of the siege of Constantinople by the Turks.
May 30: Lora L. Corum and Joe Boyer win the Indianapolis 500.
May 31: China formally recognizes the USSR.
June 2: U.S. President Calvin Coolidge signs the Indian Citizenship Act, which declares all Native Americans to be American citizens.
June 6: Cyril Walker wins the US Men’s Golf Open.
June 7: Mountain climber George Mallory disappears 245m from Everest’s summit.
June 10: The first political convention is broadcast on radio-Republicans in Cleveland.
June 12: George H. W. Bush, 42st President of the United States is born in Milton, Massachusetts (d. 2018).
June 12: Ho Chi Minh leaves Paris to visit Moscow and attends the Fifth Comintern Congress, urging Communists from West European countries to agitate more against the evils of colonialism.
June 13: Gaston Doumergue is elected as the first protestant French president.
June 15: Ford Motor Company manufactures its 10 millionth automobile.
June 15: J. Edgar Hoover assumes leadership of the FBI.
June 18: George Milkan, American Basketball Hall of Fame centre and 4-time NBA All Star 1951-54 is born in Joliet, Illinois (d. 2005).
June 19: Paavo Nurmi runs the world record 1500m in 3.52.6.
June 23: US troops leave the Dominican Republic.
June 26: Following 8 years of occupation, U.S. troops leave the Dominican Republic.
June 27: At the British Golf Open, American Walter Hagen wins his second Open Championships, one stroke ahead of runner-up Ernest Whitcombe.
June 28: The test cricket umpire debut for Frank Chester occurs versus South Africa at Lords.
June 28: A tornado strikes Sandusky and Lorain in Ohio, killing 93 people.
June 30: J. B. M. Hertzog becomes Prime Minister, head of a coalition government between the National and Labor Parties in South Africa.
george mallory
George Mallory, mountaineer who disappeared from Everest’s summit in 1924
Image: Wikipedia
July 1: Direct, regular transcontinental airmail service forms between New York and San Francisco.
July 4: Kitty McKane wins her first Wimbledon title.
July 5: A military revolt begins in Brazil.
July 5: Jean Borota wins at Wimbledon.
July 7: American Robert LeGendre sets the-then long-jump world record at 25’ 5 ½” in Paris, France.
July 10: Denmark claims Greenland.
July 10: A strike of railroad workers ends in Amsterdam.
July 11: A Hindu-Muslim rebellion takes place in Delhi, India.
July 16: A conference over German recovery payments begins in London.
July 16: George Kelly of the New York Giants is the first player to hit home runs in six consecutive games.
July 20: The Federation Internationale des Echecs is formed in Paris.
July 20: Ottavio Bottecchia wins the 18th Tour de France.
July 29: Paul Runyan wins the PGA Golf Championship.
August 2: American novelist and playwright James Baldwin is born in Harlem, New York (d. 1987).
August 5: The Little Orphan Annie comic strip by Harold Gray is first published in the New York Daily News.
August 8: A British-Russian trade agreement is signed.
August 11: The first newsreel pictures of U.S. presidential candidates are taken.
August 16: A peace treaty is signed between the Netherlands and Turkey.
August 16: Helen Wills Moody wins the US Women’s National Tennis Championship.
August 17: A trade agreement is signed by France and Germany.
August 18: France begins withdrawing troops from the Ruhr.
August 23: Mars’ closest approach to Earth since the 10th century occurs.
August 28: Georgian opposition stages the August Uprising against the Soviet Union.
August 29: Germany’s Reichstag approves the Dawes Plan, which sought to solve the problems of WWI reparations. The plan provides for France ending its occupation of Germany’s Ruhr region and created a payment plan for Germany. Many French citizens believe their government is being too lenient on Germany.
August 31: Paavo Nurmi runs the world record 10,000m in 30:06:02.
james baldwin
James Baldwin, American novelist and playwright
Image: Wikimedia
September 2: Bill Tilden wins the US Men’s National Tennis Championship.
September 3: Civil War breaks out in China.
September 6: An assassination attempt on Benito Mussolini fails.
September 9: Filipino agricultural workers go on strike, demanding a $2 wage increase per day and the reduction of their working day to eight hours in the Hawaiian Islands.
September 11: American NFL player and legendary coach Tom Landry is born in Mission, Texas (d. 2000).
September 12: Bill Johnston and Bill Tilden win the International Lawn Tennis Challenge.
September 13: The US team wins the 19th Davis Cup.
September 14: Walter Johnson is selected as the American League MVP.
September 17: The Treaty of Rapallo is signed in Italy.
September 24: The airport in Boston opens.
September 28: Two U.S. Army planes end an around-the-world flight, from Seattle to Seattle with 57 stops.
September 28: Plutarco Calles becomes President of Mexico.
September 30: Monitoring of the German navy by the Allies stops.
September 30: American author Truman Capote is born in New Orleans, Louisiana.
October 1: 39th President of the United States, Jimmy Carter, is born in Plains, Georgia.
October 2: The Geneva Protocols are approved by the League of Nations.
October 4: The New York Giants become the first team to play in 4 consecutive World Series.
October 8: The British Labour government of Ramsay MacDonald falls to the Conservative Party.
October 10: The Washington Senators win the World Series for the first time.
October 11: The Bureau of Surrealist Research opens in Paris.
October 13: Mecca falls without struggle to Saudi forces, led by Abdulaziz Ibn Saud. He then declares himself the protector of the holy places in Mecca.
October 15: U.S. President Calvin Coolidge declares the Statue of Liberty a national monument.
October 15: André Breton’s Surrealist Manifesto is published.
October 19: An eight hour work day is demanded by the General Christian Workers Union in Belgium.
October 20: The first Negro League World Series takes place.
October 24: The Nobel prize for physiology or medicine is awarded to Dutchman Willem Einthoven “for his discovery of the mechanism of the electrocardiogram”.
October 27: The Uzbek SSR is founded.
October 28: A trade agreement is signed by France and Russia.
October 28: The fossil Taung child is discovered by M. de Bruin.
October 29: The British Labour party loses the British parliamentary election.
statue of liberty
The Statue of Liberty, 1920
Image: Flickr
November 2: The Sunday Express publishes its first British crossword puzzle.
November 4: California legalizes professional boxing. It had been illegal since 1914.
November 4: Nellie Tayloe Ross is elected as the first U.S. female governor. She becomes the governor of Wyoming.
November 4: Calvin Coolidge is elected to a full term as President of the United States, defeating Democrat candidate John W. Davis. Coolidge wins in a landslide, running similarly to Davis on a platform of limited government, reduced taxes, and less regulation.
November 4: Stanley Baldwin becomes Britain’s Prime Minister for a second time after a landslide victory over Ramsay MacDonald’s Labour Party.
November 8: Ignaz Seipal, Austria chancellor, resigns after an assassination attempt.
November 10: Dion O’Banion, the leader of the North Side Gang, is assassinated in his flower shop by members of Johnny Torrio’s gang, sparking the bloody gang war of the 1920s in Chicago.
November 11: The Palace of Legion of Honor is dedicated in San Francisco.
November 21: The contract between Britain and the USSR is cancelled by Stanley Baldwin.
November 22: Britain orders Egyptians out of Sudan.
November 24: Peking is seized by General Feng Yu-Hsiang in China.
November 26: Mongolia becomes a Republic.
November 27: The first Macy’s Thanksgiving Day Parade is held in New York City.
November 30: The first photo facsimile is transmitted across the Atlantic by radio from London to New York City.
November 30: The Cleveland Bulldogs win the National Football League Championship.
November 30: French and Belgium troops are withdrawn from their occupation of the Ruhr.
Palace of the Legion of Honor
Palace of Legion of Honor, San Francisco
Image: Flickr
December 1: A coup attempt in Estonia staged by communists fails. Most of them are from the U.S.S.R. and 125 out 279 participating are killed. 500 people will be arrested later on.
December 1: The first issue of La Révolution Surréaliste is published in Paris.
December 7: The Social Democrats win the election in Germany.
December 9: A trade treaty is signed by Hungary and the Netherlands.
December 9: Michael Hainisch is reelected as President of Austria.
December 11: Chiang Kai-shek occupies Hankou.
December 12: Spanish troops leave Morocco.
December 15: Winston Churchill writes a letter to Prime Minister Baldwin, considering the chance of war with Japan. Churchill claims “I do not believe there is the slightest chance of it in our lifetime.”
December 16: Noël Coward‘s Vortex premieres in London.
December 16: Hiram Bingham resigns as Governor of Connecticut after being elected to serve in the Senate.
December 17: The first diesel electric locomotive enters service in the Bronx, New York City.
December 19: The last Rolls-Royce Silver Ghost is sold in London, England.
December 20: Adolf Hitler is freed from jail early, having only served a 9 months of a 5 year sentence for Beer Hall Putsch. His earlier failed coup brought attention to his name, and he spent his time in prison writing Mein Kampf (My Struggle).
December 24: A school in Babb’s Switch, Oklahoma, catches fire killing 36 people.
December 26: Actress Judy Garland makes her show business debut at 2 and a half years old.
December 27: The U.S. signs a treaty with the Dominican Republic, superseding that of 1907.
December 27: A dictatorship is declared in Albania.
December 30: Astronomer Edwin Hubble formally announces the existence of other galactic systems at a meeting of the American Astronomical Society.
December 31: Italian fascist Benito Mussolini orders the suppression of opposition newspapers.
Hitler’s Time in and Release From Prison
In Germany, Adolf Hitler was sentenced to five years in prison for his involvement in Beer Hall Putsch. This was the Nazi Party’s attempt to seize the government by force, and Hitler had hoped that his nationalist revolution would spread to the German army, then bring down the government in Berlin. This was after the German government resumed making payments to Britain and France following their defeat in the First World War
Hitler spent nine months in Lansberg jail, where he spent his time writing his autobiography Mein Kampf. He was released early due to political pressure from Nazi Party supporters. Some people believe Hitler’s time in prison was crucial character building for him, and the main way he prepared himself to become Germany’s dictator. His autobiography helped him build his cult of personality and express his views, and he was able to assure himself of his character.
Immigration and Citizenship Acts in the U.S.
This is a very important event in our 1924 timeline, since it changed the lives of so many people! 1924 was a crucial year for immigration and citizenship acts in the U.S., introduced by President Calvin Coolidge. On May 26, President Coolidge signed an immigration law that restricted immigration to the United States from other countries, due to the huge influx of immigrants following the end of the First World War. The prosperity experienced by the United States and the devastated European countries made America a very tempting place to travel to and start a new life.
One aspect of the immigration laws was the Asian Exclusion Act, in which immigrants from particular Asian countries were banned from entering the country entirely. With European immigrants, a quota was set, in which only a certain number of immigrants could enter the country each year. A literary test had already been introduced in 1917, meaning immigrants had to demonstrate basic reading skills to be allowed in the United States.
On June 2, President Coolidge signed the Indian Citizenship Act, which declared all Native Americans to be American citizens. This meant Native Americans would be considered proper citizens of the country, but this unfortunately didn’t mean they would no longer be subject to discrimination.
The Statue of Liberty is Declared a National Monument
Ever since the Statue of Liberty was given as a gift to the United States, it has become a symbol of democracy, liberty and freedom – ideals that the American nation embodies and projects to the rest of the world. It was also given to America to commemorate the centennial of the signing of the United States Declaration of Independence, as well as the friendship between the United States and France. The statue became so symbolic of these values that in 1924 it was officially declared a national monument.
The Death of Vladimir Lenin
Vladimir Lenin was a key figure in the Bolshevik Revolution, and was the first leader of the USSR. His untimely death at the age of 53 was recorded as being a result of an incurable blood vessel disease. In his honor, Petrograd was renamed Leningrad. His embalmed body remains in a mausoleum near the Kremlin to this day, where people from around the world come to pay their respects. |
VIS270: activity 1.2 drawing from description
The basic geometric shape of this natural form is a flattened, curving ellipsoid with pointed ends. It curves upward in contour with its two ends coming to sharp points. It's long, thin and roughly symmetrical and is approximately 30cm long. The width of the object varies in gentle curves in and out, approximately 4 cm wide at it's widest point and narrowing to 1cm wide at the ends. The depth of the object also varies from less than .5cm at each end to 1.5cm through several wave-like, thicker and thinner sections of the body. It's dominant colour is brown which lightens to a reddish tan in worn areas, small gouge marks and scratches on the surface and darkens to almost black along the edges. There are both slightly concave and convex surfaces on both sides of the object, slight undulations in depth and thickness. This object has straight, lined seams along both edges that run from one pointed end to the other. There is visual contrast present in smoothed, shiny areas and rougher cracks and lines. The cracks are light and flow diagonally across the top and bottom surface of the object. The smooth, shinier areas are found on the outer edge of the top surface only where the object is thickest. The object has 4 sides, the top and bottom surfaces are roughened and fingers rise and fall as the shape undulates. One pointed end is narrow and sharp with a scratching surface while the other is round and tube-like. When running the fingers along the seams on both edges, there's a curving in and outwards motion as the edges expand and contract. When picking up the object and shaking it, one can hear rattling inside. It's hard, it's curves fit naturally into the palm of the hand hand like something one could throw. It feels good to hold.
by fellow student, Jenny.
by fellow student, Missy.
by friend, Peta. |
What is Li-Fi? – Everything You Need to Know about Li-Fi
Technologies change over the years and people tend to use what’s newest, fastest and the best, when financially applicable. Oh, and it helps if the infrastructure is there. Otherwise, you get a faulty service or device, which is never good, especially if you pay a lot of money for it.
That is why consumers often wait for the technology to be there before purchasing something new, because nobody wants to have a hassle with a company, not get their refunds and end up with more trouble than worth.
WiFi is great, but it can be really unstable. Anybody playing online multiplayer games will know what a bad WiFi connection can do to you. Getting jitter and packet loss is not what you want, and seeing how unstable WiFi can be, there have been people working on something relatively new, called LiFi or light fidelity. What is LiFi and will it replace WiFi one day?
Light Fidelity – New Wireless Options
With how limiting WiFi can be, due to it using radio waves to transmit data, anything from storms, airplanes and metal can block signals. What this means is that you need another way of transmitting signals wirelessly. This is where light comes into action. Fiber optic cables have been around a while and people use fiber internet nowadays, for much faster and better connections. A cable connection was always better and more stable, yet there is a large limit which a basic copper wire has. Light doesn’t have those limits and can transfer much more data than a basic wire can, with much fewer limitations.
LiFi began its journey in 2011 when professor Haralnd Haas coined the term during his TED Talk. LiFi can use anything from visible light to infrared and ultraviolet light. It uses optical LEDs to transmit light, and it is mostly not visible to the human eye because the diodes turn on and off at a very fast pace. It was supposed to take off, and it was planned for, but it never took off.
Will We Be Seeing More LiFi? – Probably (not)
The pun is that most LiFi will not be visible to the naked eye, but that it will be adopted. Industrial usage is most likely to be first, as it often is. BMW had a test in 2018 and LiFi passed it. Gerhard Kleinpeter, a project manager, said that in order to find more usage in cars and the automotive industry, the LEDs need to become smaller. There were tests and speeds up to 10GB/s, which is really, really fast, especially for a wireless connection. It does have its faults, needing reflective surfaces or a direct visible connection (it doesn’t go through walls, which is also a safety feature). The current faults are also short range and high initial costs (it’s bleeding edge technology), as well as low reliability.
LiFi is looking to be a part of our modern world, as soon as the technology becomes cheaper and a range solution is found. Meanwhile, WiFi will have to suffice for most wireless internet users. |
Page top
Lead Contents
Proximity Sensors: Response Frequency
FAQ No. FAQ00412
Primary Contents
What is "Response frequency"?
When the sensing object moves at high speed and it passes continuously, the response of proximity sensor is important.
The response of proximity sensor is defined by response frequency and response time, please confirm satisfaction for movement speed or interval of sensing object.
The maximum number of detection repetitions that can be output per second when the standard sensing object is repeatedly brought into proximity.
See the accompanying diagram for the measuring method. |
10 tips to look after your teethShare (show more)Listen (show more)More (show more)Good oral hygiene and regular visits to the dentist will help you maintain healthy teeth and gums. Here are some tips to help you look after your teeth.Brush at least twice a day. The best time to brush teeth is after meals. Choose a toothbrush with a small head for better access to back teeth. Soft bristles are kinder on your gums.Use fluoridated toothpaste. Fluoride helps to harden tooth enamel and reduces your risk of decay.Brush thoroughly. Tooth brushing should take between two and three minutes.Floss your teeth daily. Use a slow and gentle sawing motion.Limit acidic drinks like soft drinks, cordials and fruit juices. Food acids soften tooth material and dissolve the minerals in tooth enamel, causing holes (cavities or caries). In severe cases, teeth may be ‘eaten’ right down to the gum.Limit sugary foods. Bacteria in dental plaque change sugars into acids.Protect your teeth from injury. Wear a mouthguard or full-face helmet when playing sports.Try to save a knocked out tooth. If possible, hold the tooth back in place while you seek immediate dental advice. If this is not possible, wrap the tooth in plastic or place it in milk and seek dental advice immediately.Avoid using your teeth for anything other than chewing food. If you use them to crack nuts, remove bottle tops or rip open packaging, you risk chipping or even breaking your teeth.See your dentist for regular check-ups. You should also visit your dentist if you have a dental problem such as a toothache or bleeding gums. |
August 25, 2020
Fairness and Biases in Machine Learning and Their Impact on Banking and Insurance
In the past few months, the topic of biases and fairness in our society has become widely discussed in the media. More and more evidence started to emerge of various occurrences of discrimintation including biases in recommender systems, biases in predictive policing algorithms, and biases in risk assessment to mention just a few.
In parallel, the topic has attracted the statistical community with a number of papers (even books) published and conferences dedicated to it. While there has been an increasing interest in the statistical and computer science communities, businesses are also actively investigating this area.
JP Rangaswami comments:
Many firms use some form of predictive analytics, machine learning and even artificial intelligence in their day-to-day operations. For many, the use may be about optimisation and load balancing within the physical infrastructure and the network. Some may have ventured further and started to use such techniques in earnest in recommendation processes, both internal (eg vendor selection for commodity products, sales funnel “propensity to buy” analysis) or customer-facing (eg product or service recommendations). Some may have gone even further and explored use in pricing, in product design, perhaps even in hiring.
In each case, when it comes to designing and refining the predictive process, it is likely that some datasets are selected specifically in order to train and to test the technology. And that’s where risks can emerge caused by biases in data.
Nicolai Baldin, CEO at Synthesized and JP Rangaswami.
Nicolai Baldin, CEO at Synthesized and JP Rangaswami.
Nicolai continues:
Yet, the main confusion about this topic in the business community is driven by a common argument that statistical algorithms inherently rely on biases in data and therefore do discriminate. Is this really true? Unfortunately, there is no short answer to this question, but we aim to provide as much clarity in this post as we can to shed light on this complex issue.
Common misconceptions about biases and consequences.
Misconception 1: Removing sensitive attributes from data will make the dataset unbiased and fair.
Data and compliance officers who attempt to identify the presence or absence of bias in data typically observe an individual’s attribute (e.g. nationality) and a particular outcome (e.g., credit score) of a credit scoring model and try to determine whether that outcome would have been different had the individual had a different value of the attribute. In other words, to measure discrimination one must answer the counterfactual question: What would have happened to another individual if he or she had been Chinese?
Illustration of causality which is often hidden in data.
Illustration of causality which is often hidden in data.
Answering this question is often not enough because of the causal effects and sufficient statistics hidden in data itself. In a nutshell, often there are at first “innocent” attributes in data such as “Location ID” which may uniquely define the value of a sensitive attribute with high probability and therefore the model will factor in the bias through that causal effect.
Misconception 2: Fairness in ML is an abstract topic and doesn’t have implications to my business. Discrimination is the very point of machine learning.
JP Rangaswami comments:
Where the bias manifests itself in poor predictive or assessment capability, the loss is in efficiency and in effectiveness. There is always a cost, but at least this can be contained.
When it comes to recommendation processes, internal-facing failures are similar; there are costs but they can be contained. Inaccurate customer recommendations may be manageable when it comes to books to read or films to watch; when it comes to selection of travel route with time sensitivity there can be a cost, but again it’s manageable. But as such techniques move to the world of healthcare, diagnosis and recommended treatment, the issue of bias in training data becomes much higher-risk and can have significant adverse consequences, not just for the company but more importantly for the patient.
Bias within the structured data can also manifest itself in making incorrect decisions when it comes to vendor selection and to staff hiring, and, as mentioned before, in pricing. Each of these has consequences, particularly when it comes to regulated markets.
Nicolai Baldin continues:
Whilst we must acknowledge the difficulty of mapping the science behind algorithmic biases and the law as well as the extra complexity that country-specific legislation brings upon, regulators have already started applying impact analysis under current anti-discrimination laws.
In 2019, the US Consumer Financial Protection Bureau (CPFB) claimed jurisdiction over Upstart, a company that used alternative data and algorithms to assess lending decisions, with respect to compliance with the Equal Credit Opportunity Act. The CPFB found that the Upstart model approved more loans and lowered interest rates across all races and minority groups, thus creating no disparities that required further action under the fair lending laws.
The US Department of Housing and Urban Development brought a case against Facebook alleging that it violated the prohibition on housing discrimination because its ML algorithms selected the housing advertiser’s audience in a way that excluded certain minority groups.
The fast adoption of ML in banking, insurance and government sectors is likely to have an even more significant impact on people’s life chances in the coming years. Consequently, it is natural to expect a stricter legislation around biases in data and fairness of decisions made by vital ML models.
Misconception 3: Fairness is a property of an ML model, hence we need to ensure customer-facing models are not discriminatory.
Nicolai Baldin argues:
If there is a trend in a dataset towards one of the groups of attributes or clusters, that means there is a bias in the dataset. If the dataset has bias then a machine learning algorithm will factor it in when making a prediction. This is the nature of algorithms. For example, assume there is a bias towards a minority group committing a crime in a given dataset, as a result of not enough people being analysed and taken into account. If there is only a minority group of people present in the area the crime will naturally be higher by that group, but that doesn’t mean the minority group is actually prone to committing crime in general. The model trained on that biased data won’t be applicable to any other group.
JP Rangaswami continues:
Bias in the structured data chosen can be caused by heterogeneity of coverage, comprehensiveness of data record, longitudinal aspects, or even selection and transfer process.
Key observation from these misconceptions is that bias is a property of an underlying dataset.
In assessing the bias, the following questions are hence critical:
1. How was the dataset collected?
2. What is the quality of this dataset?
3. Has it been benchmarked against other larger samples of data, global trends and proportions?
In the second part, we will share recommendations for enterprise and discuss ideal scenarios.
Further references:
Legislation in the United States
• Race (Civil Rights Act of 1964);
• Color (Civil Rights Act of 1964);
• Sex (Equal Pay Act of 1963; Civil Rights Act of 1964);
• Religion (Civil Rights Act of 1964);
• National origin (Civil Rights Act of 1964);
• Citizenship (Immigration Reform and Control Act);
• Age (Age Discrimination in Employment Act of 1967);
• Pregnancy (Pregnancy Discrimination Act);
• Familial status (Civil Rights Act of 1968);
• Disability status (Rehabilitation Act of 1973; Americans with Disabilities Act of 1990);
• Veteran status (Vietnam Era Veterans' Readjustment Assistance Act of 1974; Uniformed Services Employment and Reemployment Rights Act);
• Genetic information (Genetic Information Nondiscrimination Act)
Legislation in the United Kingdom
Equality Act of 2010:
• age
• gender reassignment
• being married or in a civil partnership
• being pregnant or on maternity leave
• disability
• race including colour, nationality, ethnic or national origin
• religion or belief
• sex
• sexual orientation
Synthesized's DataOps Blog
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form. |
How The Power Of Persuasion Actually Works
Mastering the power of persuasion can have many advantages at work and at home. Successfully convincing an employee to work overtime can help bring an important project in before deadline, and persuading your kids to clean their room and take out the trash can help you keep your sanity.
For decades psychologists have studied a variety of persuasive techniques, and have found several seemingly successful methods.
One of the most common methods of persuasion, the door-in-the-face technique begins with one person asking another for something completely outrageous. Once that person is turned down, they ask for something considered reasonable by comparison. Say your eight year-old child asks you to extend his bedtime from nine to midnight, for example, and then after you turn him down, your child asks if he can stay up until ten instead. When compared to his original request of midnight, extending his bedtime an extra hour seems more reasonable and harder to turn down.
Another technique, known as fear-then-relief, takes advantage of someone feeling as if they just dodged a bullet, and turns their relief around to your advantage. This was a popular technique among scam artists who fake an accident, and then tell their mark they wouldn’t report the accident to the police or insurance agency if they were paid money on the spot.
Finally, one of the best understood techniques is called foot in the door. You start by asking for something simple, and once you have established a rapport with the person, you ask for your real request. Panhandlers often use this technique by asking passerby’s for the time and then following up with a request for money.
Recently, when researchers at the Warsaw School of Social Sciences and Humanities in Poland attempted to find out what the most persuasive means is for convincing someone to do what you ask, they found a surprising new result.
Through a series of experiments, researchers discovered a technique that could be described as bizarre-then-normal. In the experiment, a researcher would explain to passerby that they had suffered a back injury and asked they passerby would mind bending down and tying their shoe. A few minutes later, the same person would be stopped by another researcher who asked if the participant would mind looking after their shopping cart for a minute while they looked for their significant other.
The study found that participants were much more likely to look after the shopping cart if they had previously been asked to fulfill the unusual request of tying someone else’s shoe.
Clearly the best forms of persuasion are those that initially set a request high, and then come in underneath at the end. Now, just remember to only use this power for good.
Timothy Lemke blogs about health for Dr. Bruno da Costa, a dentist in Beaverton OR at Harmony Dental. |
4 Kinds of people who need a protein rich-diet just as much as bodybuilders
Water and protein are the two main important constituents that make up the human body. The latter has several roles and responsibilities, which include providing structure and strength to cells and tissues, as well as controlling the biochemical reactions in the body. The immune system too depends upon protein for its recovery and growth, making it essential and indispensable to the human body.
It is needless to say that protein is extremely popular with bodybuilders, but other people need protein just as much as they do. Especially the four groups of people discussed below.
Middle-aged people
Aging inevitably results in muscle loss and weight gain. The medical term for lean muscle loss is sarcopenia. The best way to combat that is to consume a protein-rich diet that comes packed with vitamins and minerals.
A research conducted in 2015 by the University of Arkansas highlighted findings that showed that people aged 55-75, when doubled their intake of the daily recommended protein, made muscles within as early as four days.
Bright Commodities has a wide-variety of protein and vitamin supplements that can be consumed by people falling within this age bracket and consume the required amount of protein.
People suffering from hypothyroidism
According to WebMD, hypothyroidism is a result of an underactive thyroid gland, as the gland does not produce the required amount of thyroid hormone needed to perform several bodily functions; the main function being absorption of energy from food or more commonly referred to as metabolism.
People suffering from hypothyroidism often experience a slowed and sluggish metabolism and are highly prone to weight gain, and slow weight loss. This puts them at the risk of several other diseases and vitamin deficiencies, including PCOD, obesity and B12 deficiency.
Bright Commodities offers several protein powders that can be consumed for people suffering from hypothyroidism, which will aid in better absorption of protein and could lead to weight loss as well.
People suffering from a B12 deficiency
A study conducted in the US shows that nearly 40% of the population or more suffer from a vitamin B12 deficiency. This vitamin is integral to protein metabolism and DNA synthesis. Protein metabolism is the function responsible for the synthesis of proteins and amino acids and the breakdown of proteins by catabolism. Sadly, not consuming enough protein is one of the reasons that lead to a vitamin B12 deficiency as B12 is essentially found in food rich in protein.
Bright Commodities offer an entire range of products that can be consumed to intake the required amount of protein and resultantly, vitamin B12.
People who consume a vegetarian diet
The vegetarian diet, as appealing as it might be just does not contain as many protein-rich dietary sources as it should, putting vegetarian people at the risk of many diseases that can easily be avoided with the help of a diet that packs a protein-full punch.
Bright Commodities offer multiple products that offer protein powders that are obtained from plant sources and are perfect for vegetarians.
Always remember that what you eat directly reflects on your body and therefore eating healthy is directly linked to living a healthy life.
Leave a Reply
|
Yellowstone Caldara Rising
As all of us who have been through Yellowstone Park know, there’s an enormous cooker below the stone that sends the geysers skyward and keeps the mud-pots burbling. Magma, from the bowels of the earth, collects in a great chamber, running uphill as it were from the tremendous pressures below. Measurements from space of the earth surface above the caldera have shown significant movement in the last year.
The surface of the Yellowstone caldera is now rising at 7 cm a year, according to a paper in this week’s Science. Wu-Lung Chang and colleagues used satellite measurements to measure uplift between 2004 and 2006 and found a rate three times faster than that measured in the 1920s. Chang thinks the results imply magma chambers below the surface are recharging.
Yellowstone Rising
Should it blow, which most are not suggesting, it would be the largest natural disaster of recorded history, scorching and burying under ash and earth all living creatures for hundreds of miles down wind. As to the silver lining, the ash suspended in the atmosphere would mask the sun and cool the earth, backing it away from the current warming trends.
You’d think enormous R&D would be turned towards sustainable use of the energies of these magma vaults, not to die out before the earth itself….
Leave a Reply
|
3DS Max/Vray/Mental Ray: Ambient Occlusion
Before checking out this post you might want to check out a few other popular 3D lighting techniques!
What is Ambient Occlusion?
On top of the methods mentioned above (which are only a few techniques), there are further ways to supplement and provide depth to lighting within an image. A frequent way of adding natural shadow falloff and density into areas of an image is ambient occlusion. Unlike Final Gather and Photon lighting, that are concerned with bounced light and multi-bounce transparency, it focuses on detailing the absence of light in order to develop a successful shading method. Created in 2001 by artists at ILM for the film Pearl Harbour after being challenged by Michael Bay, it was a natural evolution of the reflective occlusion shaders created for the proceeding film, Speed 2, “Ambient occlusion was a way of trying to address global illumination and ray tracing but with far less expense. The key to this technique is to make a single ray-traced occlusion pass that is generated independently of the final lighting and final rendering.”. The theory behind ambient occlusion is that there is an ever present light source in the scene (Irrespective of our lighting system). The amount of shading is distinguished by how much of the geometry is hidden, or blocked, “What happens internally is that the area above the point to be shaded is sampled for blocking geometry. If any is found, the percentage of blockage translates directly to an occlusion factor.” (Van der Steen 2007: 14). It therefore calculates based on their visibility how much shading the pixels should get.
Why use it?
Historically in computer graphics, Ambient Occlusion was created to solve the problem of unnatural looking indirect illumination. Specifically, its ambition was to develop a better model to ‘weight’ shadows and contact areas between geometry and complicated shaded sections of a scene. Ambient renders at the time provided environmental light, but it was very one dimensional and did not take into account the necessary falloff that occurred when light bounced around and under geometry.
But this was over ten years ago? Surely you can generate these shadows using methods now?
Yes! It is possible to achieve a very good lighting setup straight out of commercial renderers, that provide multiple methods to achieve very accurate contact and weighted shadowing. Often this occurs within a material, or directly in the renderer and ways to do both are shown both for VRay and Mental Ray later in this post.
So why still use it if this is possible?
Working in 3D graphics is never as simple as clicking a button to create a beautiful image. People might put forward that facade, especially those that do not use the software on a daily basis to justify a certain approach, but in reality the software packages, shaders and renderers are tools that are only as successful as the people that use them. Project deadlines, problems in a model, or even just a specific look, or challenge requires knowledge of a wide variety of techniques within the software and at many points during a commission constraints may arise that require the use of more than just a ‘brute force’ approach. Consequently, there are multiple reasons why you might want to make use of an Ambient Occlusion shader and an example could be the need to reduce render time during an animation. For instance, Final Gather is an approximated method of lighting, this means that creating a map with a lower point density spread over a larger ‘smoothed’ catchment area will be a very quick (And dirty) way of computing a lighting pass for Mental Ray, but it will also often lead to areas of the scene losing definition. An ambient occlusion pass can therefore be created to supplement this quicker solution and bring back contrast into the image. This allows for a much faster turn around than using a high density Final Gather pass and it puts a lot more of the responsibility for the final look in the hands of the artist. In many areas of the graphics world, having this control is absolutely vital to achieving a look, saving time or providing a professional service (Or all of these).
AO For Mental Ray
Create a separate render pass
In Mental Ray there are two native ways of bringing this shader into effect. The first, and arguably the most flexible way to do it is to place the Ambient/Reflective Occlusion material into the surface shader option of a MR material and then drag this into the material override slot, which can be found in the processing tab of the render dialog (F9). Final Gather, exposure and Global Illumination should all be turned off to allow the shader to create its independent ambient calculation. For visual feedback, this is a good way to achieve this result, although it is also possible to split the Occlusion out into a render element alongside the beauty render.
AO OptionsThe Ambient/Reflective Occlusion Shader in Mental Ray
The options for the shader include providing increased samples to smooth out the solution, specifying the colour of the bright and dark areas of the image, the sharpness of the spread and the max distance that the engine looks to sample occluded points. You can also specify object ID, reflective occlusion and the strength of the falloff. A few examples of Ambient Occlusion passes can be seen below.
LookngSouthAOExamples of ambient occlusion passes
The Arch and Design Shader
A second way of adding Ambient Occlusion is to use the Arch and Design shader, specifically created to work with Mental Ray. If you are not experienced with the historical evolution of the internal shaders, it is advised that you stick to using this material because it is has been built to manage the correct transfer of energy between the different shading parameters within Mental Ray. For example, if you were to increase the reflective nature of an A & D material, it would work out a physically possible amount to take from the diffuse to achieve this result, whilst other shaders may allow the creation of effects that are not constrained by mathematical principles. Therefore, unless you are very knowledgeable about the software (Or aiming for a specific look), it is best to stick with this shader when working in Mental Ray. To enable AO within this shader, you need to go down to the special effects dialog shown below.
AmbientOcclusionArch and Design Special Effects rollout
For Vray
In Vray, there is a very similar shader to the Ambient/Reflective Occlusion found in Mental Ray, but with slightly more features. To activate VRayDirt as an AO shader, it should be plugged into a VRayLightMtl and then in exactly the same way as shown earlier, it is possible to either achieve a scene wide ‘pass’ in the ‘override material’ section of the ‘VRay Global Switches’ window, or as an element using the ‘VRayExtraTex’. Unlike the Arch and Design materials that provide AO as an extra shading option, VRay also has a separate tab for the application of Ambient Occlusion into the native render, found in the Indirect Illumination roll out (Below).
Vray Renderer Rollout
So, why is it called VRayDirt?
It is becoming increasingly common for people to use occlusion driven shaders not just as an extra indirect light supplement, but also as a mask to mimic the effect of wear, or the accumulation of dust within the crevices of objects. VrayDirt is often primarily used for this purpose and it has therefore become a very powerful tool that allows artists to slowly deconstruct complicated materials and build them from the ground up procedurally. This use is actually quite ironic, as the standard way of applying Ambient Occlusion in post production (Multiplying it over an existing beauty render), is actually not the envisioned workflow for it and often it inadvertently creates a mix between supplementing an image and creating a ‘dirty’ look. Examples of this and how to correctly apply it are discussed below.
The ‘purist’ way to composite Ambient Occlusion?
The reason that multiplying AO onto a ‘beauty’ render is not the purist way to implement it, is due to its original purpose. When it was created by ILM (mentioned above), it was as a shader to supplement the environmental lighting. Therefore, it is not in its nature to deal with direct light, or reflection and it shouldn’t be influencing those areas of the image. Often, when people simply multiply an ambient occlusion pass in Photoshop, or After Effects, they are doing so onto elements of a shot that it was not intended to support. This can lead to it clashing with directly illuminated parts of an image and washing out, or simply having an undesired ‘dirty’ look.
AOComparing the common method of compositing AO with the ‘correct’ way
What can be seen in the image above is that when multiplied over the entire beauty pass, the result is overbearing. This often leads to people reducing the opacity of the pass to compensate for how contrasted it makes the image look, instead of simply reordering where it should be included in the compositing process. The ‘correct’ method to apply AO is to multiply it directly onto the diffuse/ambient and under everything else so that it is isolated and does not overrule the reflection, or the direct lighting. When looking at the GIF above it is clear to see the difference between the approaches in the ladder opening. In the image labelled ‘Multiply Ontop’ it has been applied as a final step, whilst in ‘Multiply Under’ it has been layered on-top of the diffuse element only. It is important to remember that when compositing it should be done in a linear fashion so that the underlying lighting adds up correctly. A common side effect of not doing this forces people to use the ‘screen’ method instead of ‘add’, which can be specifically noticed with very bright highlights (hotspots). To achieve a look similar to what you see in your render window, you will also need to apply a gamma correction curve to suit your final output and below this has been set in the adjustment layer to 2.2.
CompExample of the composite workflow
Van der Steen 2007 Rendering with Mental Ray
Leave a Reply |
The Basics of Vegetable Juicing
Vegetable juicing is excellent for your health because it offers a raw food source and a new means of getting all of the antioxidants you need on a daily basis. In fact if you do not eat enough raw foods regularly then juicing is the way to turn things around for your health!
You may wonder what benefits juicing vegetables has over eating them in their whole state? Unfortunately many individuals do not eat as nutritiously as they should and the consequences of making poor choices in food is intestines that are not as healthy as they should be. What this leads to is the intestines having to work tremendously harder to absorb all of the nutrients it receives from fruits and vegetables. Juicing makes this process simpler because the body can absorb the nutrients from a drink easier than from a food source.
Healing the Body
Juicing offers a means of healing the body in a way that is very useful for busy people with on- the-go lifestyles. If you think about your life for a moment taking the time to drink a beverage is often easier for you to do than is taking the time to sit down and eat a meal. If you want a healing means of getting the vitamins and minerals you require with as little effort as possible then juicing is for you.
Drinking Your Juice
When you make fresh vegetable juice at home it is advisable that you drink it right then and there. In this way you will receive 100 percent of the nutrients, enzymes and antioxidants that the beverage has to offer. Vegetable juice tends to be one of the most perishable forms of food and as such it should be consumed immediately upon preparation. But if you realize that you have made more than you can drink at once or if you want to make it last then it can be stored safely for up to a maximum of 24 hours. After that time it begins to suffer from a decline in the nutritional value.
Store the unused veggie juice in a glass jar that has an airtight lid. Fill the jar to the top as you want as little air in the jar as possible. It is oxygen that has the potential to deplete the nutritional value of the juice. An opaque jar is the absolute best choice of all because it serves to block out the light. Place the jar in the refrigerator and remove it approximately a half hour before you plan to drink the juice. It is best to consume it at room temperature.
Vegetable Choices for Juicing
You can juice various types of vegetables. The sky is the limit in this regard. Consider what veggies appeal the most to your taste buds and which contain the nutrients that your body requires the most. For beginning juicers celery, cucumber and fennel make up a tasty and nutritious drink.
Juicing leafy green vegetables make good choices. Some of the veggies worth mixing and matching in your kitchen include green leaf lettuce, red leaf lettuce, romaine lettuce and escarole lettuce. Other positive options include kale, spinach, and cabbage. Cabbage juices one of the healthiest choices for those who suffer from ulcers. |
3-26. I won’t care even if she is the president
Repeat after the tutor.
• I want to go there even if it rains.
• They don’t care even if you quit.
• Keep running even if you fail.
• Don’t cry even if your life treats you hard.
• Don’t run even if you are late.
• Don’t move even if the bear moves.
• Don’t give up even if it’s not easy.
• I can get an A even if I don’t study.
• I can do this even if you don’t agree with me.
• You can pass this test even if you’re stupid.
• You can’t be popular even if you try.
• I will always be your fan even if you get old.
• I will be here even if you don’t come back.
• They will dance even if you laugh at them.
• I will not study even if you teach me.
Here are some grammar tips.
Vocabulary/ Expressions
Expression Definition
treat (v) to think of an act toward someone or something in a specified way
(n) something pleasant or amusing that is unusual or unexpected
(v) The employees were treated poorly.
(n) Getting ice cream was a fun treat.
laugh at (phrasal verb) to show that you are happy or that you think something is funny by smiling and making a sound from your throat
I like it when they laugh at my jokes.
leftover (n) a thing that remains after something is finished or ended
They had leftovers from the party.
cautious (adj) careful about avoiding danger or risk
When you’re in a place you’re not familiar with, make sure you’re always cautious of your surroundings.
flu shot (n) vaccine which provides immunity to a variety of influenza viruses and is updated and recommended annually
Before winter, be sure to get your flu shot to stay healthy.
private (adj) for the use of a single person or group: belonging to one person or group: not public
Take the private drive off the main road to get to her house.
celebrity (n) a person who is famous
If you see a celebrity, try to get a picture with them.
sensation (n) a particular feeling or effect that your body experiences
The lotion had a tingling sensation on my arm.
be drawn to (phrasal verb) to be attracted to someone or something
The child was drawn to the train exhibit with fascination.
helping hand (n) help or assistance
She was always willing to give a helping hand to those in need.
Go over the following exercise with your tutors.
1. Make a sentence.
1. would / to / not / him / even / he / would / I / speak / if / apologized
2. leftover / guests / if / all / even / there / be / will / food / the / eat
3. prepared / cautious / completely / if / is / she / she / even / be / should
4. qualified / not / is / if / she / even / the / for / will / apply / Kate / job
5. tired / even / they / if / the / will / stand / people / anthem / the / for / are
2. Correct the following sentences.
1. She did not want to leave the house, even if he make her.
2. The penguins wanted to stay for the winter, even if it were cold.
3. You should got a flu shot, even if you may not be sick yet.
4. They would watch the actor’s movie, even if he wasn’t a good people in real life.
5. The lion wanted to eat his meal privately, even if there were others who wanted a bites.
3. Answer the following questions.
1. Is there anything you would eat even if you know that it was bad for you?
2. Who is the one person you would like to have a coffee with, even if they are a celebrity
3. What kind of pet would you like to have (even if it was an animal that should be a pet)
4. (Homework) Write a paragraph.
1. Write 10 sentences using the grammar you learned today.
2. Feed your senses: Write down the first sight, sound, smell, and sensation you
3. Helping hand: Tell us about the most surprising helping hand you’ve ever received.
Go over any new expressions or vocabulary that you learned today.
Leave a Reply
WordPress.com Logo
Google photo
Twitter picture
Facebook photo
Connecting to %s |
Powered By GitBook
NATS is a connective technology that powers modern distributed systems. A connective technology is responsible for addressing, discovery and exchanging of messages that drive the common patterns in distributed systems; asking and answering questions, aka services/microservices, and making and processing statements, or stream processing.
Modern distributed systems are defined by an ever increasing number of hyper-connected moving parts and the additional data they generate. They employ both services and streams to drive business value.
They are also being defined by location independence and mobility, and not just for things we would typically recognize as front end technologies. Today’s systems and the backend processes, microservices and stream processing are being asked to be location independent and mobile as well, all while being secure.
These modern systems present challenges to technologies that have been used to connect mobile front ends to fairly static backends. These incumbent technologies typically manage addressing and discovery via hostname (DNS) or IP and port, utilize a 1:1 communication pattern, and have multiple different security patterns for authentication and authorization.
Although not perfect, incumbent technologies have been good enough in many situations, but times are changing quickly. As microservices, functions, and stream processing are being asked to move to the edge, these technologies and the assumptions they make are being challenged.
What makes the NATS connective technology unique for these modern systems?
NATS manages addressing and discovery based on subjects and not hostname and ports. Defaulting to M:N communications, which is a superset of 1:1, meaning it can do 1:1 but can also do so much more. If you have a 1:1 system that is successful in development, ask how many other moving parts are required for production to work around the assumption of 1:1? Things like load balancers, log systems, and network security models, as well as proxies and sidecars. If your production system requires all of these things just to get around the fact that the connective technology being used, e.g. HTTP or gRPC, is 1:1, it’s time to give NATS.io a look.
NATS can be deployed nearly anywhere; on bare metal, in a VM, as a container, inside K8S, on a device, or whichever environment you choose. NATS runs well within deployment frameworks or without.
Similarly, NATS is secure by default and makes no requirements on network perimeter security models. When you start considering mobilizing your backend microservices and stream processors, many times the biggest roadblock is security.
Scalable, Future-Proof Deployments
NATS infrastructure and clients communicate all topology changes in real-time. This means that NATS clients do not need to change when NATS deployments change. Having to change clients with deployments would be like having to reboot your phone every time your cell provider added or changed a cell tower. This sounds ridiculous of course, but think about how many systems today have their front ends tied so closely to the backend, that any change requires a complete front end reboot or at least a reconfiguration. NATS clients and applications need no such change when backend servers are added and removed and changed. Even DNS is only used to bootstrap first contact, after that, NATS handles endpoint locations transparently.
Hybrid Deployments
Another advantage to utilizing a NATS is that it allows a hybrid mix of SaaS/Utility computing with separately owned and operated systems. Meaning you can have a shared NATS service with core microservices, streams and stream processing be extended by groups or individuals who have a need to run their own NATS infrastructure. You are not forced to choose one or the other.
Moving Forward
Today’s systems will fall short with new demands. As modern systems continue to evolve and utilize more components and process more data, supporting patterns beyond 1:1 communications, with addressing and discovery tied to DNS is critical. Foundational technologies like NATS promise the most return on investment. Incumbent technologies will not work as modern systems unify cloud, Edge, IoT and beyond. NATS does.
Use Cases
NATS can run anywhere, from large servers and cloud instances, through edge gateways and even IoT devices. Use cases for NATS include:
Cloud Messaging
Services (microservices, service mesh)
Event/Data Streaming (observability, analytics, ML/AI)
Command and Control
IoT and Edge
Telemetry / Sensor Data / Command and Control
Augmenting or Replacing Legacy Messaging Systems
Last modified 1mo ago |
scipy.stats.ttest_ind(a, b, axis=0, equal_var=True, nan_policy='propagate', permutations=None, random_state=None, alternative='two-sided', trim=0)[source]
Calculate the T-test for the means of two independent samples of scores.
This is a two-sided test for the null hypothesis that 2 independent samples have identical average (expected) values. This test assumes that the populations have identical variances by default.
a, barray_like
The arrays must have the same shape, except in the dimension corresponding to axis (the first, by default).
axisint or None, optional
Axis along which to compute test. If None, compute over the whole arrays, a, and b.
equal_varbool, optional
If True (default), perform a standard independent 2 sample test that assumes equal population variances [1]. If False, perform Welch’s t-test, which does not assume equal population variance [2].
New in version 0.11.0.
nan_policy{‘propagate’, ‘raise’, ‘omit’}, optional
Defines how to handle when input contains nan. The following options are available (default is ‘propagate’):
• ‘propagate’: returns nan
• ‘raise’: throws an error
• ‘omit’: performs the calculations ignoring nan values
The ‘omit’ option is not currently available for permutation tests or one-sided asympyotic tests.
permutationsnon-negative int, np.inf, or None (default), optional
If 0 or None (default), use the t-distribution to calculate p-values. Otherwise, permutations is the number of random permutations that will be used to estimate p-values using a permutation test. If permutations equals or exceeds the number of distinct partitions of the pooled data, an exact test is performed instead (i.e. each distinct partition is used exactly once). See Notes for details.
New in version 1.7.0.
random_state{None, int, numpy.random.Generator,
If seed is None (or np.random), the numpy.random.RandomState singleton is used. If seed is an int, a new RandomState instance is used, seeded with seed. If seed is already a Generator or RandomState instance then that instance is used.
Pseudorandom number generator state used to generate permutations (used only when permutations is not None).
New in version 1.7.0.
alternative{‘two-sided’, ‘less’, ‘greater’}, optional
Defines the alternative hypothesis. The following options are available (default is ‘two-sided’):
• ‘two-sided’
• ‘less’: one-sided
• ‘greater’: one-sided
New in version 1.6.0.
trimfloat, optional
If nonzero, performs a trimmed (Yuen’s) t-test. Defines the fraction of elements to be trimmed from each end of the input samples. If 0 (default), no elements will be trimmed from either side. The number of trimmed elements from each tail is the floor of the trim times the number of elements. Valid range is [0, .5).
New in version 1.7.
statisticfloat or array
The calculated t-statistic.
pvaluefloat or array
The two-tailed p-value.
Suppose we observe two independent samples, e.g. flower petal lengths, and we are considering whether the two samples were drawn from the same population (e.g. the same species of flower or two species with similar petal characteristics) or two different populations.
The t-test quantifies the difference between the arithmetic means of the two samples. The p-value quantifies the probability of observing as or more extreme values assuming the null hypothesis, that the samples are drawn from populations with the same population means, is true. A p-value larger than a chosen threshold (e.g. 5% or 1%) indicates that our observation is not so unlikely to have occurred by chance. Therefore, we do not reject the null hypothesis of equal population means. If the p-value is smaller than our threshold, then we have evidence against the null hypothesis of equal population means.
By default, the p-value is determined by comparing the t-statistic of the observed data against a theoretical t-distribution. When 1 < permutations < binom(n, k), where
• k is the number of observations in a,
• n is the total number of observations in a and b, and
• binom(n, k) is the binomial coefficient (n choose k),
the data are pooled (concatenated), randomly assigned to either group a or b, and the t-statistic is calculated. This process is performed repeatedly (permutation times), generating a distribution of the t-statistic under the null hypothesis, and the t-statistic of the observed data is compared to this distribution to determine the p-value. When permutations >= binom(n, k), an exact test is performed: the data are partitioned between the groups in each distinct way exactly once.
The permutation test can be computationally expensive and not necessarily more accurate than the analytical test, but it does not make strong assumptions about the shape of the underlying distribution.
Use of trimming is commonly referred to as the trimmed t-test. At times called Yuen’s t-test, this is an extension of Welch’s t-test, with the difference being the use of winsorized means in calculation of the variance and the trimmed sample size in calculation of the statistic. Trimming is reccomended if the underlying distribution is long-tailed or contaminated with outliers [4].
Yuen, Karen K. “The Two-Sample Trimmed t for Unequal Population Variances.” Biometrika, vol. 61, no. 1, 1974, pp. 165-170. JSTOR, Accessed 30 Mar. 2021.
Yuen, Karen K., and W. J. Dixon. “The Approximate Behaviour and Performance of the Two-Sample Trimmed t.” Biometrika, vol. 60, no. 2, 1973, pp. 369-374. JSTOR, Accessed 30 Mar. 2021.
>>> from scipy import stats
>>> rng = np.random.default_rng()
Test with sample with identical means:
>>> rvs1 = stats.norm.rvs(loc=5, scale=10, size=500, random_state=rng)
>>> rvs2 = stats.norm.rvs(loc=5, scale=10, size=500, random_state=rng)
>>> stats.ttest_ind(rvs1, rvs2)
Ttest_indResult(statistic=-0.4390847099199348, pvalue=0.6606952038870015)
>>> stats.ttest_ind(rvs1, rvs2, equal_var=False)
Ttest_indResult(statistic=-0.4390847099199348, pvalue=0.6606952553131064)
ttest_ind underestimates p for unequal variances:
>>> rvs3 = stats.norm.rvs(loc=5, scale=20, size=500, random_state=rng)
>>> stats.ttest_ind(rvs1, rvs3)
Ttest_indResult(statistic=-1.6370984482905417, pvalue=0.1019251574705033)
>>> stats.ttest_ind(rvs1, rvs3, equal_var=False)
Ttest_indResult(statistic=-1.637098448290542, pvalue=0.10202110497954867)
When n1 != n2, the equal variance t-statistic is no longer equal to the unequal variance t-statistic:
>>> rvs4 = stats.norm.rvs(loc=5, scale=20, size=100, random_state=rng)
>>> stats.ttest_ind(rvs1, rvs4)
Ttest_indResult(statistic=-1.9481646859513422, pvalue=0.05186270935842703)
>>> stats.ttest_ind(rvs1, rvs4, equal_var=False)
Ttest_indResult(statistic=-1.3146566100751664, pvalue=0.1913495266513811)
T-test with different means, variance, and n:
>>> rvs5 = stats.norm.rvs(loc=8, scale=20, size=100, random_state=rng)
>>> stats.ttest_ind(rvs1, rvs5)
Ttest_indResult(statistic=-2.8415950600298774, pvalue=0.0046418707568707885)
>>> stats.ttest_ind(rvs1, rvs5, equal_var=False)
Ttest_indResult(statistic=-1.8686598649188084, pvalue=0.06434714193919686)
When performing a permutation test, more permutations typically yields more accurate results. Use a np.random.Generator to ensure reproducibility:
>>> stats.ttest_ind(rvs1, rvs5, permutations=10000,
... random_state=rng)
Ttest_indResult(statistic=-2.8415950600298774, pvalue=0.0052)
Take these two samples, one of which has an extreme tail.
>>> a = (56, 128.6, 12, 123.8, 64.34, 78, 763.3)
>>> b = (1.1, 2.9, 4.2)
Use the trim keyword to perform a trimmed (Yuen) t-test. For example, using 20% trimming, trim=.2, the test will reduce the impact of one (np.floor(trim*len(a))) element from each tail of sample a. It will have no effect on sample b because np.floor(trim*len(b)) is 0.
>>> stats.ttest_ind(a, b, trim=.2) |
Low-iron formula can slow development
Originally published in The Ottawa Citizen August 12, 2003
Original Title: Low iron infant formulas
Dumb and dumber.
That’s what Dr. David Mack, chief of pediatric gastroenterology at the Children’s Hospital of Eastern Ontario, thinks about low-iron infant formulas.
“On the one hand,” he says, “formula companies are adding nutrients found in breast milk to promote the development of cognitive and visual development. Yet the lack of iron has the potential to thwart this development.”
The recent addition of two essential fatty acids, decosahexanoic acid (DHA) and arachidonic acid (ARA) into some formulas is a case in point. These fatty acids promote visual acuity and cognitive development in preterm and term infants and may be involved in other critical body functions.
It is ironic, Dr. Mack says, that these same companies would offer reduced-iron formulas. In a letter to Dr. Margaret Boland, chair of the nutrition committee of the Canadian Pediatric Society, Dr. Mack shares his concerns about this trend.
Pharmacies and grocery stores provide similar shelf space for low-iron cow milk-based formulas, he observes. Parents often do not notice that the product is low in iron content. There is also the perception that both types of formula provide equal benefit.
Parents will often change formulas either on their own accord or on the advice of their health care provider if their formula-fed child becomes more fussy, has cramping, colic, acid reflux from the stomach, flatulence or increased spitting-up. But there is no evidence that links formula-iron content with these conditions.
Dr. Mack notes that one of the first tendencies is to switch in error to a low-iron formula if there is a suspicion of an intolerance to cow-milk protein.
Within his practice, he often encounters the urban myth of iron causing infant constipation. However, this is actually rare. The infrequent bowel movements of soft stools result from inadequate intake of formula.
Switching to a low-iron formula further compounds the problem. The infant suffers an increased risk of iron deficiency anemia. This anemia, or reduction of oxygen transporting red blood cells, reduces the delivery of oxygen to the developing infant, especially the brain and nervous system. Iron-deficiency anemia is associated with problems in cognitive, behavioural and physical development in infants and children.
Some parents continue with low-iron-based formulas because hospitals stock and distribute them to parents for newborn feeds.
There are a few reasons why low-iron formula use is so common. Similar product packaging, poor labelling, a general lack of knowledge regarding the importance of iron in infancy and a lack of physician and nurse intervention are some of the reasons parents continue to use these products.
But there is no scientific evidence to support this product class.
There are no known medical contraindications to using iron-fortified formulas. Professional organizations do not advocate using low-iron formulas. Even the formula company representatives discourage its use.
“Public health policy successes include the introduction of iron-fortified infant formulas in the 1970s with the prevalence of iron-deficiency anemia being dramatically reduced,” Dr. Mack notes. However, Canadian infants and children are still at risk.
So why does this product remain on the store shelves? Dr. Mack believes sales of low-iron formula must still be significant enough to continue the product line.
With the exception of cow-based formulas, all other formula groups (i.e. soy-based, hydrolysate, amino acid) are iron-fortified.
Dr. Mack has six recommendations for the use and content of cow milk-based formulas. He asks the Nutrition Committee of the Canadian Society for Pediatrics to adopt and recommend these principles.
1. Infants who are not breast-fed or partially breast-fed should receive an iron-fortified formula.
2. Discontinue the manufacture of low-iron infant formula.
3. If low-iron infant formula continues to be available to consumers, the label must contain a health warning about the risk of iron deficiency anemia and its effects upon infant growth and development.
There must be consistent labelling practices akin to other formula groups (i.e. soy, hydrolyzed and amino acid). Manufacturers should remove the term ‘with iron’ from the front label. All listings including iron content should appear on the package nutrient content label.
4. The Hospital Association recommend to their members not to supply low-iron infant formula in their hospitals.
5. The distributors of low-iron infant formula should not provide shelf-space for low- iron infant formulas. A physician note would be required to obtain low-iron infant formula.
6. The Canadian Pediatric Society and formula manufacturers continue to provide education for the public and for health care providers regarding iron and infant growth and development.
If no one buys the product, companies will not sell it. It’s one way consumers can influence health outcomes and corporate behaviour.
Send a Comment |
Tutoriais Ubuntu
Use wput to send files through the network
You don’t have to open up your FTP client (whatever it is) to connect to the server when all you want is upload a single file or a bunch of directories.
Using wput is simple and very efficient when you want to do send files through FTP connections.
Ubuntu or Debian users can install wput using the apt-get command:
sudo apt-get install wput
Fedora users can do it with yum:
sudo yum install wput
And there’s a Windows version on sourceforge.
network connections
wput command syntax
To send all files from a local directory to the remote FTP server the syntax would be something like this:
wput *.* ftp://username:password@hostname/recipient-folder/
In the following examples I’ll assume my username is slinkydog and my password is dachshund. My server address would be (I didn’t check if it exists and it doesn’t matter. Use your own server names here). The recipient folder in the server will be called characters/.
This is the first example on how to send a single file through your FTP connection:
wput filename.txt
How to deal with wput verbosity
You can reduce the verbosity, using --less-verbose option:
wput --less-verbose filename.txt
You can use the option --verbose to increase the command output even more or the option quit to simply suppress verbosity.
I usually prefer to send wput to work in the background which sets my terminal free to run other stuffs. This is how to do it:
wput --background *.*
If you wantto know what’s happening (or happened) during the transference just read the file ./wputlog:
less ./wputlog
How to limit the bandwidth usage while sending files with wput
The option --limit-rate can be used to limit the average use of your network bandwidth. In the following example I’ll limit it to 500 K:
wput --limit-rate=500K --less-verbose about.php index.php styles.css
In the example above I limited the average rate of bandwidth usage to 500 K, decreased verbosity level and told wput to transfer the files:
• about.php
• index.php
• styles.css
You can use wildcards like *.php if you want.
How to resume incomplete uploads with wput
Wput resumes incomplete transfers by default. So you don’t need to do anything special here.
Though you can force it to do it all again by telling the program to reupload:
wput --reupload --less-verbose --limit-rate=1M *.php *.css *.html
Take a look at the man page of the command to see more options:
man wput
… and have fun!
Por Elias Praciano
Autor de tecnologia (livre, de preferência), apaixonado por programação e astronomia.
Fã de séries, como "Rick and Morty" e "BoJack Horseman".
Me siga no Twitter e vamos trocar ideias!
Deixe um comentário
|
Shop עברית
Safeguards of sanctity
Safeguards of sanctity
Is it a proper way to always be machmir on shemitah laws? Introduction to the Consumer's Guide to Shemitah.
Rabbi Yehuda HaLevy Amichay, Head of Halachah Department at Torah VeHa'aretz Institute
"But you may eat whatever the land will produce for you during its Sabbath" (Vayikra 25:6). Chazal (Yerushalmi, Shevi'it 7:1) understood from the phrase "for you" that the produce of the land during the shemitah year is permitted for all human needs: eating, drinking, bathing, and ointments. However, a different source (Torat Kohanim, Behar §1:1) understood this verse as a limitation: "for you and not for others." From here, Chazal teach us that shemitah belongs to the Jewish People only; gentiles do not have a part in this direct connection between G-d and the Jewish People.
We find an example of this in our weekly sabbatical—Chazal (Sanhedrin 58b) inform us that "A gentile who observed the Shabbat is liable to receive the death penalty;" non-Jews have no portion in our weekly Shabbat. Shabbat is a covenant between G-d and the Jewish People and not with other nations; similarly, the sabbatical year and the sacred fruit that grows during this year are meant for the Jewish people exclusively. Only the holy Jewish People can eat the holy fruit of the holy Land of Israel.
Whenever there is sanctity, there are decrees and safeguards instituted to protect its unique sanctity. The sacred Jewish People erected fences to safeguard their holiness, and the soferim decreed additional forbidden marriages (sheniyot la'arayot). Likewise, Chazal instituted ordinances and safeguards to protect the Shabbat's sanctity. So too, Chazal issued ordinances and guidelines for how to properly use and enjoy the sacred fruit of the shemitah year. While these fences and safeguards impose limitations on us in a plain, external sense, at the same time they reveal the internal sanctity of the entity in question. In this way, while the rules of muktzeh and nolad on Shabbat limit the use of certain things, at the same time we know that this is due to the sanctity of Shabbat and the holidays. Thus, we are filled with joy that we are able to live lives of sanctity.
The same holds true for the shemitah year: there are specific guidelines and limitations on how to eat and use sacred shemitah fruit. One might say: "Why do I need to concern myself with all of these problems? I'd be better off buying fruits and vegetables that aren't subject to any limitations. Then I won't need to be careful about the sanctity of the food—I can do whatever I want, and even throw away or spoil it." This is not the way of the Torah, however. The Torah wants us to eat these sacred foods; the limitations and safeguards remind us that every fruit and vegetable is infused with the sanctity of the Land of Israel.
At times, people desire to be machmir and expand the safeguards and fences that Chazal instituted, yet from this we arrive at tafastah merubeh lo tafastah (if you attempt to grab too much you will be left with nothing). This then brings people to throw it all away, since they see that the stringencies lead to negative outcomes that are far from the original mitzvot and Chazal's ordinances. In order to keep everything straight and view matters in their proper light, we need to read the words of Chazal, learn them from their halachic sources, see what Chazal instituted, and weed out the excessive stringencies that our predecessors never dreamed of.
This Shemitah Consumer's Guide, presented here to the public at large, attempts to strike this delicate balance. On the one hand, it underscores the sanctity of the produce of the land's sabbatical year and the obligation to eat sacred produce. At the same time, the handbook reviews the sources for the safeguards and shows how they were put in place to sanctify man and the produce—not to needlessly make the shemitah year difficult. In general, it is hard to know when and where it is appropriate to be cautious when striving to act righteously. It is our hope and prayer that this halachic guide will help every Jew add sanctity to the sanctity of the shemitah year, with joy and gratitude to G-d that we have merited to eat from the land's sabbatical year: "But you may eat whatever the land will produce for you during its Sabbath" (Vayikra 25:6). |
“Mount St. Helens” Written by Rowe Findley
Category: Article Critique
The article “Mount St. Helens” written by Rowe Findley is a story about the beautiful mountain that revealed its volcanic potential after a long time. The author describes the life near the mountain a week before the volcanic eruption happened (1981). He also depicts the details of the eruption itself, letting readers understand how astonishing, majestic and tragic at the same time it was. The main goal of the article is not just to tell what and where happened, but to demonstrate the pressure of each day before the explosion. It is not a report about the particular event, but rather a story about people’s emotions and impressions of those days. In fact, he could say that the mountain transformed into a volcano, erupted and led to deaths of people. However, the sense of the article is to depict the situation in the way readers can feel that they were there and could observe everything step by step.
Order now
The story about the mountain closely intertwines with the stories of people who are somehow connected with the eruption. The lives of most of them were taken by lava and volcanic ashes because of their own imprudence. Readers may sense regret in the words of Rowe Findley when he talks about Reid Blackburn, Harry Truman or David Johnston who became victims of eruption. At the same time, the construction of the article makes one feel irreversibility and gives an understanding of nature that has own rules, not subject to any of human beings.
My general impression of the article is quite positive. Most of all, I liked that the author coped with the task to recreate the atmosphere of that week and immediately of the day of volcanic eruption. As for me, many articles about various happenings tell the details of the story, so that the information is full and exhaustive; however, they do not keep the spirit of the situation the author depicts. Rowe Findley did it in the perfect way; I felt like I was spending that week next to him while reading the text. He kept the pressure of the situation and played with emotions of the reader. The story of Harry Truman touched me because there were many details about his life and inner connection with the Mount St. Helens. Of course, I felt truly sorry about what had happened to that man and assumed that not all people may like this sad aspect of the story, but Harry's story seems to be a necessary complementary element of the article.
The remark that I would like to make is that this article might have been more interesting for me if there were not so many descriptions of natural processes, but more stories of people, connected with the mountain and volcanic eruption. When I read about some happening, I prefer to know what people did and thought in that moment rather than read about the “step-by-step” details of the happening itself. Nevertheless, I understand that it is National Geographic article, and the element of description of geological object or process is essential.
It would be good if this article could reach the wide audience of different people because it touches upon the significant aspect of our life, which is called survival instinct. The example of victims of volcanic eruption who have bidden farewell to their life shows that they could have avoided such a destiny if they realized what danger that mountain could bring. The problem of the modern world is that human beings think that they are stronger than Mother Nature. People were sure that nothing would happen to them because they have lost the fear of death. It is worth remembering that natural catastrophes happen suddenly, and nature is not going to warn anybody about what happens next. Moreover, the technical progress changes the planet, and nature can react to certain events in an unpredictable way. Therefore, everyone should be cautious. Geologists and geographers still lack knowledge about what to do in some situations, such as the volcanic eruption of St. Helens. People should remember that they cannot control everything, especially nature, and precautionary measures can save a life in case of an extraordinary situation. |
what I learn is what u c
Posts Tagged ‘Organize
Organize your SQL Server 2005 tables in a better way !!
leave a comment »
When you create tables in SQLServer (2005) by default its all get created under default schema. (dbo.)
If you have too many tables then the table list could be confusing / clumsy.
Here enters Schema
(see image)
Schema Example
To organize your tables into meaningful groups (or namespaces)
First create a schema
Then Alter your existing table
TRANSFER dbo.Contact
So now that you have grouped your tables into different schemas.
How to use them ? The usual way but with schema name added to it.
SELECT * FROM Person.Contact
What is Schema ? (from MSDN)Beginning in SQL Server 2005, each object belongs to a database schema. A database schema is a distinct namespace that is separate from a
database user. Schemas can be created and altered in a database, and users can be granted access to a schema. A schema can be owned by any
user, and schema ownership is transferable.
In previous versions of SQL Server, database users and schemas were conceptually the same object. Beginning in SQL Server 2005, users and schemas
are separate, and schemas serve as containers of objects.
Written by gchandra
February 6, 2008 at 9:07 am |
History and origin of the Magyar Agár
The Magyar Agár is our national breed with a true Hungarian origin. Like the Erdélyi Kopó, the Magyar Agár is also an ancient breed. A well know fact is that sighthounds, as a dog group, is the oldest to be developed for hunting. The evidence for this conclusion includes numerous ancient paintings and other artwork that portray sighthounds being used for hunting wild game. The breed’s hunting abilities have been deeply developed over the centuries. Because of the consistent hunting methods used for over a thousand years, the Magyar Agár has become a very independent and autonomous hunting breed with a huge need to run. Over the centuries the Magyar Agár has been able to pursue and catch the running prey. The breed was used for hunting hare, fox, deer, wolf, and antelope. The Magyar Agár’s nose is not well developed, but it wasn’t ever needed; it could not be efficiently used because of the high speed required during the chase for game. It simply was not a necessity for the hunt. The eyesight, however, is very well-developed as are all sighthounds who work with their eyes. The breed’s speed was, in essence, the ancient version of the firearm – a speeding Magyar Agár being the bullet. The hunters followed the very quick hounds on horseback.
The common ancestor of sighthound breeds like the Greyhound, Borzoi, Afghan, Saluki and Magyar Agár is the ancient hound from Egypt. As the Magyars migrated from Asia to Europe, they probably hunted with Asian sighthounds, or hound-like dogs. The evidence of the Magyar hunting with sighthounds can be traced back to the Khazar Empire (7th to 10th centuries, CE). When the Magyars entered the Carpathian Basin in the ninth century the Agárs were accompanying them. The botanical and geographical circumstances in the Carpathian Basin were not ideal for hunting with the Agár when the Magyars settled. Hunting with this sighthound became easier when deforestation occurred on the Alföld. The earliest written documents about Agárs are from St. István’s era (997 to 1038, CE). According to oral tradition, the importance of using the Agárs, Kopós and falcons in hunting increased in the Árpádian era (late ninth and early tenth centuries, CE). The early history of the Agár continued through the Anjou dynasty (1308 to 1395, CE). King Matthias (1443 to 1490, CE) loved hunting with Agárs. There are written documents by Janus Pannonius (1434 to 1472, CE) and Bálint Balassi (1554 to 1594, CE) about the Agár hunting as a peculiar passion of the Hungarian nobility. During the Turkish occupation of Hungary, Agár hunting remained a fancied type of hunting. It was very popular among the nobility and became an aristocratic privilege.
As Agár hunting became an aristocratic sport, it had it’s own language and it became a favorite game in feudal Europe. For example, the phases “füzérre szoktat” and “nyeregre szoktat” are methods to teach the Agárs how to follow the horse in a calm manner. Another example, the term “Corka” is the name for the double leash used for a brace of Agárs. Agárs were not “taught” for hunting; rather the Magyars used the word “hajszol” which means “to rush”, implying that these hounds are natural hunters. Before the hunt the hare is “introduced” to the hounds. If there were more hunts on the same day, the Agár became tired and so it was “out of breath.” If the young Agár was tired and gave up the hunting, it then went back to the horse where it “went on the bust.” Agárs use their eyes by hunting. As the hare “busts” or “pulls out” from the warren, the Agárs “scamper” or “pick up”, and finally “reach” the prey. The first Agár to reach the hare is the “vág rajta”, and when the hare jumps aside the Agár is “túlhajtódik” which means “to have overrun.” If the hare will be closer to the other Agárs because the "vág rajta" has "túlhajtódik", the hunters say “reá hajlik” which means the first Agár gives the hare to the second Agár. “Forgatás” (to roll) occurs when the Agárs reach the hare and overtake it. The Agár “kertel” (shuffles as in card shuffling), if it turns in the same direction as the hare; and if the hare stumbles, the Agár overtakes the prey in which case the Agár has “átszárnyalja” (wings through) the hare. A “guard” is the Agár that does not allow the others to catch the hare. A “győzős” (the winner) is the Agár that starts the hunt with a slow run and gradually increases it speed. A “sebes” (quick) Agár is the opposite.
A brace of Agárs who are running parallel to each other are “zsinórban hajt”, and if one Agár is following the other they are said to be “kolbászt csinál” or making sausage. Orrán viszi a nyulat translates to “to bring the hare on its nose” which means the hare is caught without the Agár “rolling it.” The Agár who is tired and returns to the horse and hunter is “nyeregbe szorult” (caught in the sable). The golden ages of the Agár hunting were the 18th through the 19th centuries in Hungary when there were fantastic numbers of available prey. This era ended in the early 20th century when the Magyar Agár was cross-bred to the Greyhound. Towards the end of the century the number of purebred Magyar Agárs tragically waned as the result of warfare and political upheavals. The population was transformed to a weaker and vulnerable form of its formal self, but it still carries the characteristics of the ancient Agár. The Magyar Agár, as compared to the Greyhound, is still an cross-country breed. The years of the so-called “anglomania” (enthusiasm for the Greyhound), makes the work of modern breeders difficult to resurrect the ancient, original look and characteristics of the breed.
During World War II the Magyar Agár population was decimated. Everyone thought that the breed had become extinct, but some hounds appeared in Nagyecsed in 1963. This region was part of the Károlyi property. The breeding started up with those Magyar Agárs and in the year 1966 the FCI recognized the breed. From that time, the breed is very successful and is bred in more and more European countries. Nowadays the Magyar Agár is a strong, muscled runner. The strong front, the body proportions, the stability and the angulations enable the Magyar Agár to be a hound with speed and endurance. The general size is 65 to 75 cm. It is bigger and stronger than the Greyhound, and it has floppy ears. The skull is strong and wide, the muzzle is strong but not rude and tipped. Teeth are strong and correct, the nose is black. Eyes are dark and its expression is intelligent and alert. The body is long, deep and rather flat, the tail ends at about the hocks. The skin is firm, the hair is short but coarser during the cold winter. The traditional “yellow pea” brindle color still exists, but nowadays all the known sighthound colors are allowed, except for blue, blue-white, brown, wolf-grey, black and tan, and tricolor. Being the traditional Hungarian breed, it needs special care by all means to conserve and protect the breed. The Magyar Agár’s temperament is friendly, they are intelligent and easy to handle. They are alert and are a good guard dog for both the individual and the household.
From the book “Fergeteges Örkségünk”. |
Military Wiki
Battle of Valenciennes
Part of the Franco-Spanish War
Siège de Valenciennes.jpg
DateJuly 16, 1656
LocationValenciennes, Spanish Netherlands
Result Spanish victory[1]
Kingdom of France Spain Spain
Commanders and leaders
Vicomte de Turenne
Maréchal La Ferté (POW)
Juan José de Austria
Prince of Condé
25,000 soldiers[2][3] 20,000 soldiers[4][5]
Casualties and losses
4,000 dead or wounded
1,200 prisoners[2][6]
500 dead or wounded[7]
The Battle[]
• The Spanish and Irish infantry commanded by Don Juan José de Austria and the Marquis of Caracena.
• The nations under the command of the Prince of Ligne, the General leading the cavalry.
• Condé's troops including himself and the Duke of Württemberg.
• The new army which would be led by the Count of Marsin.
Condé came down on Marshal's section with such vigour it surprised and destroyed the French resistance.[7] Don Juan José de Austria stood out due to his brave action, unleashing his might on the French quarters.[7] Turenne then repelled a false attack from the Spanish on his quarters, and went to the aid of Maréchal La Ferté but it was in vain, so he felt obliged to retreat as far as Quesnoy, where he reorganised his forces.[7] The Spanish captured 400 French officers including Maréchal La Ferté, lieutenant of Turenne and a further 4,000 soldiers (while French sources reduce these figures to 77 officers and 1,200 soldiers)[9] including their belongings and provisions, including an assault train consisting of 50 cannons and all the correspondence of the French command with their court, which allowed the extent of their forces to be known.[7] As for La Ferté's division only 2,000 managed to escape after tossing their arms and making a run for it in total disarray.[10]
The Spanish victory at Valenciennes lifted the French siege and contributed greatly to lifting the morale of the Spanish tercios, producing "one of those thunderous achievements that Spain came up with in better days." However, Turenne had the presence of mind not to allow the French forces to be intimidated by the defeat. His rapid regrouping and redeployment of his forces prevented the Spanish from gaining a decisive advantage on the front.
Philip IV of Spain ordered a gold medal to be printed to commemorate the victory and he had it sent to Condé together with a saber, also made of gold. For the Spanish, the victory at Valenciennes proved counterproductive. Emboldened by the success, the Habsburg court at Madrid refused to compromise with French demands but Spanish forces were stretched to their limit despite the great victory.[9] The war dragged on until 1659, when the Spanish government finally signed the unfavourable Treaty of the Pyrenees.
See also[]
1. Stradling p.26
2. 2.0 2.1 Hume p.276
3. Rodríguez p.190
4. 4.0 4.1 Rodríguez p.191
5. Clodfelter p.41
6. Israel p.140
7. 7.0 7.1 7.2 7.3 7.4 7.5 7.6 7.7 Rodríguez p.192
8. Alcalá-Zamora p.59
9. 9.0 9.1 Martín Sanz p.210
10. Stanhope p.251
|
Import Photo
Get PeakVisor App
Search by GPS coordinates
° ' ''
° ' ''
Units of Length
Сontact us
White Mountains (New Hampshire)
Nestled in the heart of the Northeastern USA states of New Hampshire and Maine, the White Mountains are one of the most ruggedly beautiful mountain ranges of the US’s eastern seaboard. Home to densely packed conifer trees and tall granite cliffs, the White Mountains are an outdoor enthusiast’s paradise for hiking, skiing, climbing, and a whole host of other adventure pursuits.
There are 733 named mountains in the White Mountains of New Hampshire. The highest and most prominent of these mountains is Mount Washington, which stands at a respectable 6,288 feet (1,917 meters), making it the tallest peak in the Northeastern United States. While the peaks of the White Mountains don’t manage to break the 6,500 ft (1,981m) barrier, they are home to some of the most difficult hiking terrain and worst weather in the continental United States.
White Mountains New Hampshire
The mountains themselves cover approximately one-quarter of all of New Hampshire’s total land area, and a small portion of the western edge of Maine. They are close to the northern terminus of the larger Appalachian Mountain range and are known for their challenging terrain.
Geologists believe that the White Mountains were formed by magma intrusions approximately 124 to 100 million years ago as the North American Plate traveled westward over a location then known as the New England hotspot. These magma intrusions left behind the granitic mountains and cliffs that gave New Hampshire its nickname, “The Granite State.”
Hundreds of millions of years after the mountains were first formed, they experienced widespread glaciation, which, for the most part, rounded over their peaks and carved out the huge U-shaped valleys of the White Mountains. Today, these U-shaped valleys are affectionately known as “notches,” and include the famous Pinkham Notch and Franconia Notch in the northern parts of the range. Further evidence of this glaciation is found in the glacially-carved cirques that form the backcountry skier’s paradise of Tuckerman’s Ravine on Mount Washington and the King Ravine on Mount Adams.
Franconia Notch
The vast majority of the White Mountains are part of the White Mountain National Forest, in addition to a number of smaller state parks. All of this is good news to outdoor enthusiasts, who have plentiful access to the range’s many peaks on a fantastic network of well-maintained trails. The White Mountains also feature a system of alpine huts that are owned and operated by the Appalachian Mountain Club for use by hikers who want a more comfortable mountain experience.
These days, the White Mountains are the go-to destination for outdoor enthusiasts from the greater Boston, Massachusetts region, who flock to the area to enjoy the region’s many trails, ski resorts, and tax-free shopping. Whether you stick to the trails or take the path less traveled, the White Mountains are a fantastic place to explore and get outside.
Lafayette Lincoln Augmented Reality
Major Trails and Hiking Areas
Most of the White Mountains lie within the White Mountain National Forest, which is managed and operated by the US Forest Service. Although the motto of the US Forest Service is “The Land of Many Uses” - a nod to the Service’s propensity for leasing land for mining and logging exploits - the sheer popularity of the region as a prime place outdoor recreation, means it’s one of the best National Forests in the entire country for human-powered outdoor pursuits.
There are so many different places to hike within the White Mountains that the easiest way to conceptualize the range is to break it up into smaller “hiking areas.” There are a few different hiking areas within the National Forest, itself, as well as some others that lie within some of the smaller state parks in the region.
Pinkham Notch
Pinkham Notch is one of the most famous areas in the White Mountain Range as it forms a fantastic pass between two of the largest subranges in the region. The Notch was carved out by the Laurentide ice sheet during the Wisconsinian Glaciation, which formed the U-shaped valley that we see today.
Pinkham Notch
The two main hiking areas within close proximity to Pinkham Notch are the Presidential Range, to the west, and the Carter-Moriah Range to the East. The Ellis River (a tributary of the Saco River) and the Peabody River (a tributary of the Androscoggin River) drain from the Notch, which tends to see some fairly harsh weather. The most popular of these areas is the Presidential Range, so we’ll take a look at that here.
The Presidential Range
The Presidential Range got its somewhat odd name because the most prominent peaks in the area are all named after US presidents and other important figures from the 18th and 19th centuries. The most prominent peak in the range is the 6288ft (1917m) Mount Washington, which was named after the US’ first president.
Mountains in the range were originally given names of presidents in the order of their heights, with the tallest mountain being named after the first president (Washington) and the second tallest being named after the second president (Adams). Unfortunately, an early surveying error incorrectly calculated that Mount Madison (named after the fourth president) was taller than Mount Monroe (named after the fifth president), when actually, Mount Monroe is 22ft (6.7m) taller. Tradition won out in that battle and the peak names stuck, even though they’re not quite in the correct order.
Mounts Jefferson, Adams, Madison
Mount Jefferson (left), Mount Adams (middle), and Mount Madison
Before venturing out into the Presidential Range, however, it’s important to know that this area of the White Mountains consistently has some of the worst weather in the Eastern United States. In fact, on April 12, 1934, the Mount Washington Observatory (the weather station at the mountain’s summit) recorded a wind speed of 231 mph (372 km/h). Although that record has been superseded by other wind speeds, the mountain still holds the world record for the highest wind speed on Earth that occurred without the help of a tornado or cyclone.
The Presidential Range itself is approximately 19mi (31km long and encompasses over 8,500ft (2,600m) of elevation gain, all of which is hikeable as a single-day traverse in the summer and by very experienced winter mountaineers. The Presidential Range Traverse is one of the most challenging single-day hikes in the White Mountains, so many people choose to complete it over the course of a couple of days. The hike takes people up and over every major summit in the range, which is no easy feat. Some of the more daring among us try to do the traverse twice in a single day.
The jewel in the crown of the Presidential Range is, of course, its highest peak - Mount Washington. Although there are two ways up the mountain that require minimal human effort (the Cog Railway and the Auto Road), outdoor enthusiasts usually opt for an ascent of one of the Mountain’s many trails.
Mount Washington
Mount Washington cog railway
In the summertime, the Tuckerman (Tux) Ravine Trail is the most popular route to the top as it sneaks its way up the easiest terrain on the mountain. The Lion Head Trail is approximately the same length as the Tux Ravine Trail, but rewards hikers who take on its steeper terrain with better views. Hikers who really want to get away from the crowds in good weather will opt for the Boott Spur Trail, which provides excellent views, though it is a bit longer than the alternatives.
Winter adventurers at Mount Washington tend to find themselves in one of three parties: hikers who want to bag a challenging winter summit, skiers who want to shred some of the best backcountry skiing in the east, and mountaineers who challenge themselves on one of the mountains many ice-filled gullies. Hiking on Mount Washington (or anywhere else in the Whites, for that matter) in the winter involves special skill and equipment to effectively manage risk.
Hikers who are prepared for the challenges of winter on Mount Washington can challenge themselves to make their way up one of the peak’s winter trails. Perhaps the best-known winter hiker’s route on the mountain is the Winter Lion Head Trail, which, while sharing a name with the Summer version of the trail, actually takes a slightly different path to avoid a section of avalanche terrain. Hikers that want even more of a challenge can attempt a Presidential Range Traverse in the winter, which takes most experienced hikers a few days to complete.
Presidential Ranges
Pemigewasset Wilderness
If seclusion and rugged terrain with stunning views are what you seek, look no further than the Pemigewasset Wilderness. The Pemigewasset Wilderness is located on the western part of the White Mountain Range and is the largest wilderness area in the state of New Hampshire. It includes the Franconia, Bond, Twin, Zealand, and Hancock mountain subranges and is home to some of the most difficult terrain in the area.
Mount Pemigewasset
The range itself has a fairly unique geography, as it is characterized by the presence of two horseshoe-shaped ridges that are surrounded by low, wet river valleys. The western ridge is the more popular of the two and contains the Franconia, Twin, and Bond subranges. The most prominent peak on the range is Mount Lafayette 5,249 feet (1,600m), which can be approached by a variety of different trails.
Perhaps the most adventure-filled way to hike Mount Lafayette is to start at the Lincoln Woods Trailhead and set off on a trail affectionately known as the “Pemi Loop,” part of which is actually along the famous Appalachian Trail. After leaving the trailhead, hikers make their way up to a variety of smaller peaks, including Potash Knob 2,684 feet (818m) and Whaleback Mountain 2,586 feet (1,093m) as they ascend to the Franconia Ridge and the rocky summit of Mount Flume 4,328 feet (1,319m). From here, the ridge swells up and down, as it rises and drops below treeline.
Eventually, the trail makes its way to Mount Liberty 4,459 feet (1,359m) and Little Haystack Mountain 4,780 feet (1,457m) before it becomes more of a “knife-edge” trail, where expansive panoramic mountain views give way to significant drop-offs on either side. After ascending Mount Lincoln 5,089 feet (1,551m), the trail finally reaches Mount Lafayette 5,249 feet (1,600m).
Franconia Ridge Trail
At Mount Lafayette, hikers can choose to head back the Lincoln Woods Trailhead or continue down a shorter trail to the west. For a longer hike or backpack, hikers can continue on down the Garfield Ridge, where they’ll cross Mount Garfield 4,500 feet (1,372m) and Galehead Mountain 4,024 feet (1,227m). Weary hikers can exit the ridge from the flanks of Mount Galehead and head due south back to the Lincoln Woods Trailhead, while those who wish to carry on can make their way to the Twin Range.
Those of us still hiking will make our way down the Twin Range and climb up to the summit of South Twin Mountain 4,902 feet (1,491m) and then to the summit of Mount Guyot 4,580 feet (1,396m). Mount Bond 4,698 feet (1,432m) and Bondcliff 4,265 feet (1,300m) guard the southern part of the Twin Range and mark the start of the descent back down the the Lincoln Woods Trailhead where some well-deserved rest is warranted after a grand adventure.
Main Cities
On the top of a tall peak in the White Mountains, you might feel like you’re in the middle of a vast expanse of wilderness, but, it turns out that the hustle and bustle of city life aren’t too far away. Here are some of the main cities in the region and some of the best places to stay during your next White Mountain adventure:
Boston, Massachusetts
Just a two and a half hour drive in good weather, the bustling metropolis of Boston is the perfect launching point for your White Mountain experience. Whether you’re from Boston or looking for a place to start your adventure, this major US city is filled with all of the culture, history, and fun that you’d expect in an urban jungle.
If you’re traveling from an international destination to get to the White Mountains, or just from another part of the United States, Boston’s airport is a great place to fly into to access the wilderness. There are some shuttle buses that bring people up from the airport to the mountains, but the easiest way to get around would be to rent a car and zoom north. Boston is a bit too far of a drive for a daily commute to the Whites, but it’s a great place to start or end your stay.
Portland, Maine
Although not nearly as big as Boston, Portland has many of the same cultural and historical benefits of a big city, without the crowds. Plus, Portland’s airport is frequented by many major airlines, so it’s another great place to fly into. At just an hour and a half away, Portland is a great place to escape to if the weather in the mountains chooses not to cooperate with your hiking plans.
North Conway, New Hampshire
North Conway, New Hampshire, and the surrounding towns are the perfect gateway to the eastern White Mountains. Just a 30-minute drive to the trails of Mount Washington and Pinkham Notch, North Conway is an outdoor enthusiasts’ holiday retreat. After a day in the hills, you can enjoy a hot shower at one of the area’s many hotels, a cold beer at a local ski-town bar, or some tax-free shopping at the outlet mall.
If you’re looking for more of that New England small-town feel, you can drive around the North Conway area and check out some of the famous (and adorable) covered bridges that connect the different towns. The bridge that forms the main entrance into the town of Jackson is particularly cute and worth a visit.
Covered bridge in Conway
Lincoln, New Hampshire
Lincoln, New Hampshire is the Western White Mountains’ answer to North Conway. If your travels and plans take you to the western edge of the range, Lincoln is a great place for a basecamp, whether that be at one of the town’s many lodges or campgrounds. Lincoln provides superb access to the Pemigewasset Wilderness, which is just 10 minutes by car from the town center. Franconia Notch State Park and all of its beautiful waterfalls are just a 15-minute drive, too, so there’s a lot to see around here if you’re not out hiking or skiing in the hills.
If you’re staying in Lincoln and want to get over to North Conway, you can even take a scenic drive along the Kancamagus Highway, which traverses the Whites from East to West. This highway takes you up and over some mountain passes and offers excellent viewing points for the whole range. Just be careful as you drive, though - moose and bear love to frequent the road!
Appalachian Trail - Franconia Ridge
Register Peak
Peak Name
This 3D model of Sagarmatha National Park in Nepal was made using the PeakVisor app topographic data. The mobile app features higher precision models worldwide, more topographic details, and works offline. Download PeakVisor maps today.
Download OBJ model
The download should start shortly. If you find it useful please consider supporting the PeakVisor app. |
You are currently viewing Why Do Cats Wiggle Their Butts Before They Pounce?
Why Do Cats Wiggle Their Butts Before They Pounce?
Share This With Your Favorite Cat Lover!
If you are a cat parent, then you already know that one of the cutest quirks our cats have is the ol’ pouncing butt wiggle. Have you wondered why do cats wiggle their butts before they pounce?
It’s cute, it’s interesting, and sometimes it makes you spit out your coffee when you watch your cat engage in this type of behavior. So why do cats wiggle their butts right before they’re about to pounce?
Simply put, a cat will wiggle their butt before pouncing as a way to get ready for the attack shot.
It’s Part of Their Overall Body Language
Why do cats wiggle their butts before they pounce
The body language our cats use on a daily basis actually plays a powerful role in cat-to-cat and cat-to-human communication. Much of the butt wiggling has a lot to do with your cat’s tail.
If the tail lowers itself slightly and begins to lash back and forth, it usually means that your feline companion is about to wiggle their butt.
Why Does Your Cat Pounce?
Pouncing is an intuitive hunting instinct among both domestic cats and their wild counterparts. Tigers and lions that are out in the wild have to hunt to survive, and pouncing on their prey helps them to successfully kill their dinner.
Now obviously, your domesticated cat at home does not need to hunt for survival. Still, it is in their DNA so that’s why your four-legged friend will wiggle their butt right before they attempt to pounce on that toy mouse you bought for them.
What they are doing is simply perfecting their hunting skills. Regardless, it’s one of the cutest things you will ever see your cat do.
Try This Experiment With Your Cat
The next time you see your cat playing around with a jingling ball or a furry toy mouse, watch what your cat does after it starts the infamous butt wiggle.
Your feline companion will pounce on that “thing” which has their attention and then kick-flip the toy in the air. This is usually done with the intention of catching the toy in their mouth.
What happens next is usually a combination of shaking the “thing” to make sure it’s dead and dropping it on the ground in front of them. This process is usually repeated over and over again until your cat is satisfied.. Or “catisfied”.
What your cat is doing with its toy is the exact same thing it would do if it were out in the wild trying to survive.
The Shake Before the Pounce
This is the funniest part about this whole concept simply because it’s so gosh darn cute to watch. But did you know that pouncing actually helps your cat dash towards its prey?
When your cat is about ready to attack its “prey”, aka cheap mouse toy, it will hunker down first and get a solid balance with its paws. And then it will go in for the kill by using both front and back paws to dart at the toy mouse.
The wiggling motion is just to help your cat get some balance before it goes in to make its move.
Final Thoughts
Our feline companions do some pretty hilarious things on a daily basis. Most of the time though, our cats are not doing these funny things just to get you to laugh.
Feline behavior is so instinctive that it’s ingrained deeply into their DNA. But that doesn’t stop me from laughing or almost spitting out my coffee when I see this type of behavior. What about you? |
I want to explore the possibility of a planet that is extremely misshapen. If we were to extrapolate what we have observed from our solar system and the extra-solar planets discovered so far, we would have to be conservative about such a possibility because nothing of the sort has been discovered. Moreover, our understanding of physics tells us, all else equal, the more massive something is the more spherical it becomes (not a perfect sphere typically). This phenomenon is easily seen in asteroids since they are less massive than planets, they can take on a Siamese twin shape:
Itokawa Asteroid, discovered 1998 by LINEAR
Now if we were considering very small dwarf planets, this would be a piece of cake, because like asteroids, the mass can be small for misshapen bodies. However, I'm interested in Siamese twins that are . So with all of the aforementioned odds stacked against this idea, I still wonder if somewhere in the vast, vast universe there might be a freak accident of astronomical proportions that could allow for a planet to have a Siamese twin. A few ways I thought of to approach are below. The bold face denotes the part of the idea that I feel needs the most of a :
• the Siamese twin planets appears big, but have hollow cores, allowing for its mass to be small enough for the planets to be misshapen.
• the Siamese twin planet shape is maintained via equilibrium of forces. Something is pulling the planets apart at just the right amount against gravity for the Siamese twin shape to exist. Maybe a rogue, black-hole at just the right distance? enter image description here
Question: Can any of my ideas for my Earth mass Siamese twin planets to take form be plausible? If you so desire, feel free to hypothesize your own set of "perfect storm" circumstances.
Success Metric: Create Earth mass Siamese twin bodies (can't really call them planets any more, because they are not round) that remain so for at least 100 million years (in other words, it doesn't have to be permanent). If the solution is statistically remote, that's ok. The key is just not violating any known laws of physics. Further Clarifications:
• Mass: both twins have near Earth mass
• Fusion Onset: can be at formation or later on
• Area of Fusion: equatorial region of planets
• Fusion Degree: configurable. Could be a slight join or a deep join. Quick reference in the diagram below:
enter image description here
• Other: Other things like Planet composition, nearby objects are entirely configurable
• 6
$\begingroup$ The definition of a planet involves a body that has been rounded by its own gravity. If it is not round, it is not a planet. $\endgroup$ Jun 29 '18 at 19:55
• $\begingroup$ You might want to consider downsizing the images by adding an "m" before the file extension ("blahblah m .jpg"), minus the quotation marks and spaces. $\endgroup$ Jun 29 '18 at 20:52
• 5
$\begingroup$ Think of an earth size planet as being a big bag of molten iron with a skin the thickness of an orange peel. Slap two of them together, and they will immediately blob together into a bigger blob or molten iron and the skin will reform as it cools. The "blobbing" process will happen in hours, although it may take years for the shock waves to settle out. $\endgroup$
– pojo-guy
Jun 29 '18 at 22:13
• 1
$\begingroup$ related: worldbuilding.stackexchange.com/questions/4460/… $\endgroup$
– David Cary
Jun 30 '18 at 14:43
• 1
$\begingroup$ Possible duplicate of What would happen to the Moon if it was lowered onto the Earth? $\endgroup$
– Jasper
Jun 19 '19 at 23:55
TL;DR: Not likely. What you are looking for is called a contact binary. But you could have non-contact binaries.
Once they enter the slight join phase, any speed or other force keeping them apart will be outperformed by their mutual attraction. The effect of your rogue black hole can't be stable, and the relative speeds of the planets will slow down as they fuse.
A planet with enough mass will necessarily become rounded by its gravity in the short term (astronomically speaking). This is called hydrostatic equilibrium.
The gravitational influence of other bodies, or its own spin can make it more eccentric (a spheroid rather than a perfect sphere), but it will still be pretty round.
How much mass gets an astronomical body to hydrostatic equilibrium (HE)? It will depend on the planet's composition, but having a liquid interior helps a lot. Anyway, the answer is far less than Earth's.
As a reference, Saturn's moon Iapetus is the biggest object in the solar system known not to be in HE, but still round-ish:
enter image description here
Iapetus as seen by Cassini. Taken from Wikipedia
Its mass is 1/5000th that of Earth. About anything above that would become rounded.
Although a mass limit above which everything becomes in HE is difficult to obtain, it helps having a few ideas in consideration:
• Ceres, with half of Iapetus's mass, is in HE
• Mimas, with a 25th of Ceres's mass, has a HE shape
• The result of the collision of two planets will necessarily generate enough heat to partly liquefy them, making the subsequent HE easier.
As for non-contact binary planets, they are possible. Bear in mind the closer they get, the more likely they are to be tidally locked.
If they get close enough, tides will slow them down and make them less able to keep distance. Once they get even closer, they'll become a contact binary, but it will be short lived in astronomical scale. their atmospheres will cause friction and they'll quickly decay into a (catastrophic) collision.
There is a number of contact binary stars, almost touching, but separated by their own pressure. After several million years they start sharing a common envelope (atmosphere-analog), but they are theorized to either expel part of their envelope, losing contact, or merge within a time frame of years (not millions, sorry).
Contact binary stars seem to be less frequent as the mass of the involved stars decrease, because they become less stable.
• 1
$\begingroup$ That's HUGE! You might want to consider downsizing the images by adding an "m" or even an "s" before the file extension ("blahblah m .jpg"), minus the quotation marks and spaces. $\endgroup$ Jun 29 '18 at 20:53
• $\begingroup$ @FoxElemental, thank you. Didn't know that $\endgroup$
– Rafael
Jun 29 '18 at 22:26
No, not for an Earth mass body
the Siamese twin planets appears big, but have hollow cores
This configuration is highly unstable: the more dense material will sink toward the center of mass. So the hollow center would not last, especially after an impact which will necessarily melt part if not all of the planets
you start from a sphere. you can either get an ellipsoid because of rotation, or a bulged shape by constant pull from one direction.
• $\begingroup$ I think the external pull hypothesis could be explored further. Suppose we had two Siamese twin, Earth mass ellipsoids? Maybe they are not planets in the conventional sense of the word, but if they have Earth mass and are co-joined, that's all we need for success on my question. (I stopped using "planet" to avoid confusion) $\endgroup$ Jun 29 '18 at 20:08
• $\begingroup$ @ArashHowaida, above a certain mass you cannot escape the spherical form... $\endgroup$
– L.Dutch
Jun 29 '18 at 20:10
• $\begingroup$ Yes, I conceded that in my question. The point is rather, if Twin A is about to collide into Twin B but a rogue black hole (or something else) pulls on Twin A at just the right position and intensity that it facilitates the Siamese twin shape. I don't think this contradicts the link between mass and spherical form. It's just a lucky circumstance that results in the Siamese twin shape, no? $\endgroup$ Jun 29 '18 at 20:18
• $\begingroup$ @ArashHowaida, then it will two partially molten masses, which will reach equilibrium again (spherical shape) $\endgroup$
– L.Dutch
Jun 29 '18 at 20:24
• 1
$\begingroup$ @ArashHowaida There are very few freak accidents that "chill" planets (it's way easier to add heat than remove it). Moreover, the tidal stresses caused by the proximity of the black hole and the other mass would be more than sufficient to keep both masses molten until equilibrium was reached. $\endgroup$
– jdunlop
Jun 29 '18 at 21:25
Yes. It is called a Rocheworld, or Contact Binary
The earliest fictional example I know of is from physicist and hard-SF novelist Dr Robert L. Forward, who uses the term Rocheworld. The term Contact Binary also exists, though it is more commonly used for stars.
Here is another example made by another physicist, Dr Luke Campbell. Side-note: Vergeworlds is a quite fascinating hard-SF setting, and I recommend looking at it for both its tech, Fermi-compatible aliens, and Relativity-compatible FTL method (two words: "causality attack").
The reason it works despite being in each-other's Roche limits is because Roche Lobes and, at those scales, the fluid nature of the bodies mess things up.
There are two interesting consequences to keep in mind, on such a world. Despite the variable gravity, it is always normal to the surface: the ground is always horizontal, even in the weird region where the two lobes are touching. And the atmosphere has the same pressure everywhere: if the minimal surface gravity zone is too weak to keep atmosphere, there won't be any atmosphere on the entire surface.
Your Answer
|
Mental Health Myths
Mental health problems: Don't buy into these myths
Nearly 1 in 5 adults in the U.S. will experience a diagnosable mental health illness during their lifetime. These illnesses are widely misunderstood, which can prevent people from getting the help they need.
Here's a look at six mental health myths that need debunking:
Myth: Mental health problems are a sign of weakness.
Reality: They're never the fault of someone who has one. Mental health problems are a treatable medical disorder, not a character flaw. Many factors play a role in how and why someone develops a mental health illness, including brain chemistry, genes that may run in families, and stressful or traumatic events.
Myth: Children never experience a mental health problem.
Reality: In half of people with a mental health illness, the first warning signs appear before age 14. And even very young children can show signs of mental distress.
Myth: Therapy is a waste of time.
Reality: Research shows that therapy, which is typically short-term, is very effective at helping people recover from a mental illness. But it works best when combined with medicine. When both are part of a treatment plan, up to 90% of all people see an improvement in their symptoms.
Myth: People who are mentally ill are violent.
Reality: The vast majority of people with a mental health problem are not violent. In fact, only between 3% and 5% of violent acts are attributable to people with a severe mental illness. Chances are you know someone with a mental health illness but don't realize it. That's because mental illness is often a hidden disease—many people who struggle with it remain highly productive members of society.
Myth: There's not much you can do for people with mental health problems.
Reality: You can make a big difference is someone's life. Only 44% of adults and less than 20% of children with mental health problems get necessary treatment. So if someone you know is struggling mentally, reach out. Let them know you're available to listen and support them and to help them find the mental health services they need.
Sources: American Academy of Family Physicians; MentalHealth.gov; National Alliance on Mental Illness |
What about Solar Powered Lights?
Solar powered lighting is the safest and easiest kind of outdoor lighting to install. Each light fixture contains a scientifically designed solar collector panel that converts sunlight into electrical energy. This energy is stored in highly efficient rechargeable batteries used to light the fixture at night. Solar lights utilize the latest LED technology and provide sufficient light to mark entrances, accent walkways and steps, and to indicate the location of darkened obstacles at night
It is important to understand the limitations so as to avoid disappointment.
Solar lights must have sun during the day to charge the batteries. The length of time that the lights stay on at night are in direct proportion to the amount of sun exposure during the day. Very simply, the better the sun exposure during the day the longer the lights stay on at night. Also, it is important to realize that the fixtures need to be positioned so that the solar panel is exposed to the sun... overhanging trees, shrubbery, your house, shadows, etc. are all potential limiting factors to optimum performance. The lights are usually not as bright as most other forms of outdoor landscape lighting. Some people feel that this is a disadvantage, however, others welcome the softer more subtle light output that these fixtures were specifically designed for.
Advantages: They require no wiring, are very easy to install, and run off the sun's energy. The "Malibu" range of solar lights turn on and off automatically. When it starts to get dark. The specially designed circuitry turns the light on and it stays on until the battery is discharged or daylight reappears. "Malibu" solar lights do not utilize photo eye controls which are prone to failure in solar lighting applications.
Maintenance: The batteries are designed to withstand a minimum of 1000 deep discharges which is at least 1000 nights of light. In reality they should not have to be replaced for at least 3 years. These easily replaceable AA NICAD (Nickel Cadmium) rechargeable batteries are available at your local battery retailer. Be sure to purchase replacement batteries with the same, or higher capacity. Battery capacity is rated in milliamperes and is printed on the side of the battery. Malidu Solar products utilize LED's (Light Emitting Diodes) because of their dependability and low power consumption. The LED's themselves are not replaceable, but their life expectancy would typically exceed 25 years based on running 10 hours every night.
If you would like to chat to us more about this, feel free to contact us. |
Nordic Aliens
Ancient civilizations around the world have spoken of angelic beings that descended from the sky, sent by God to assist humanity by sharing their spiritual and emotional wisdom with Earthlings. These mythological entities appear to continue their mission to this day, and many believe they are emissaries from space, an extraterrestrial species known as the Nordic or Pleiadian race.
The Nordics are a human-like species who first began appearing to contactees in the 1950s, claiming to be from the planet Venus and later the Pleiades star cluster. Whether either is the origin planet or system of the Nordics is debatable, and it is possible that they wish to keep their true home a secret for security reasons.
Mythology and History
Nordic aliens are also known as Tall Whites and Space Brothers. They are thought to be the angelic beings represented in many religions and ancient civilizations.
These peaceful entities are believed to be the True White Brothers, foretold in Hopi prophecy, signaling the end of the fourth age.
Vril Society
Although generally considered a benevolent species, there is the possibility that the Vril Society was influenced by Nordics, and that factions exist who had strayed from the path of light, aligning with malevolent entities that are working against humanity.
Nordics are perhaps the most human in appearance of all extraterrestrials, and closely resemble people of Scandinavian descent. They tend to have blonde to reddish hair, blue or green eyes, and stand anywhere from 5-7 feet tall. Some claim that Nordics lack irises and wear contact lenses to blend in when visiting our planet.
They can easily pass as Earthlings, and those who have been in contact with this race state that their appearance allows them to freely explore our planet.
Many contactees also claim that these beings lack a sense of smell. Nordics are fourth and fifth density beings.
Modes of Transportation
Nordics are generally observers, sometimes viewing events and contactees from within their craft, which range from spherical to cigar-shaped.
Communication Methods
As a part of the Galactic Federation, Nordics often keep their distance from humanity, communicating telepathically or through dreams.
Intentions on Earth
Many contactees have claimed to receive channeled message of peace and love from these beings, and much of the information available about the species is obtained in this manner. The Nordics are concerned with the spiritual evolution of humanity, and often remind contactees that we are closely related to them, albeit humans are at a lesser development stage.
Notable Abductees
This species is less frequently associated with abduction experiences, and when involved in such episodes, there is generally a message of peace and concern relating to the Earth’s wellbeing.
Travis Walton
One of the most notable and intriguing cases of Nordic abduction occurred in the Travis Walton case.
Walton was working as a logger in Arizona when he came across a hovering alien craft with his lumber crew, and was knocked unconscious by a beam of light emanating from the object.
He was taken aboard, where he encountered several types of beings including a Nordic-like race of tall, white humanoids. The craft released him after five days and the subsequent story became a news sensation. Walton shared his experiences in his book The Walton Experience which became the basis for the 1993 film Fire in the Sky.
Billy Meier
Other notable contactees include Billy Meier, a Swedish farmer who claims to have been in contact with the Plejarans, a Nordic extraterrestrial race. Throughout his life he has photographed, filmed and been in contact with these beings, delivering their messages of peace and love to humanity.
George Adamski
George Adamski was another early Nordic contactee of the 1950s, and claimed to be in contact with a group of Nordic aliens from Venus. He wrote several books on the subject and said that his materials were cleared by the FBI and US government.
President Eisenhower
It is also rumored that President Eisenhower had a secret meeting with a group of Nordic extraterrestrial who were attempting to convince the United States to disarm its nuclear missile program in exchange for advanced technology. The event is said to have taken place in February 1954 at Edwards Air Force base under the guise of Eisenhower undergoing emergency dental surgery. It is believed that this meeting did not end with any sort of agreement.
Instead Eisenhower is thought to have entered into a treaty with the Grey aliens, a pact which ensured that the US could keep its nuclear arsenal while still receiving advanced technologies from the ETs. In exchange for this technological intel, the Greys would be allowed to abduct and experiment upon the American people without question.
Harmony and Stewardship
The message that seems to follow each encounter with the Nordic species is the importance of spiritual awareness and the stewardship of our planet. According to the Nordics, humans are a closely related species and the human ascension process involves learning how to overcome our differences in order to live as one, in harmony. Do you think humanity is close to realizing our collective ascension, or do you feel that extraterrestrial intervention is a necessary step in our evolution? Leave your thoughts in the comments below.
The Corporate Exec Who Met With an Extraterrestrial
Every day, millions gaze to the stars for signs of intelligent extraterrestrial life, but what if they’re looking in the wrong place?
Sebastien Martin, a highly successful business leader, offers insight into an alien’s life among humans on a strange planet—Earth. What is the source of this insight? His own life experience as a visitor from somewhere beyond the stars, and what he has to offer is a stark message for our little blue planet.
Martin has seen the tragedies of our world and communed with ancient beings, ranging from archangels to Sumerian gods. As revealed in his autobiography, “Inner Journey in Outer Space,” he has traveled through the cosmos in past lives and received sacred information he’s felt compelled to share with the world. All the while, Martin has lived the life of a man climbing the corporate ladder to become the CEO of a multinational corporation, while also maintaining home life as a happy husband and father.
In the sixth installment of ETs Among Us, viewers are privy to quite the unusual and compelling story of a man who is much more than your average business executive. Beginning in Martin’s childhood, random, prophetic visions came to him. At first, he was perplexed, but when he realized his visions were coming true, he knew something greater was at play. Crediting his mother with providing encouragement Martin said she taught him we are much more than a physical body.
As time marched on, Martin’s gift of psychic insight continued to strengthen until one day he had a meeting with a being from another world — a brother from an alien planet who pointed out that we are all living an illusory existence steeped in suffering. This encounter changed Martin’s worldview as he realized there was more than the temporal and self-limiting nature of reality as most earthlings perceive it.
In November 2011, he had a close encounter of the fifth kind with an interdimensional being and has been in communication with an extended celestial family ever since. From this relationship, Martin receives seemingly inexplicable downloads aimed at raising consciousness.
Read Article
Related Articles
More In Paranormal And Unexplained
Testing message will be here |
Why is French life expectancy increasing more slowly?
Population and Societies
564, March 2019
Life expectancy has progressed more slowly in France in recent years. Is this a temporary
phenomenon, or does it signal a new long-term pattern of change? Gilles Pison analyses this question and examines how trends in France compare with those observed in other developed countries.
The seasonal flu epidemics have been especially severe in recent years, but the slower increase in life expectancy may also signal a more long-term pattern of change. Cancers have become the leading cause of death in France, and cancer mortality is declining more slowly than mortality from cardiovascular diseases, which has fallen very quickly in recent decades, thereby contributing strongly to increased life expectancy.
Gilles Pison
Receive the e-alert
Same author
On the same topic |
And is this a good thing?
Test runs of self-driving cars conducted by both Uber and Tesla have recently caused some of the first fatalities associated with automated vehicles. The companies' respective responses to these tragedies were apologetic but came off somewhat cynical, as if human life were just an associated cost of progress. Still, many believe that self-driving cars can make the road a safer place, and frankly, they may have a point. 40,000 people died on the road in 2017, and human error was a factor in about 90% of these collisions. Currently, the technology just isn't there, but considering the amount of money being pumped into the idea, it's only a matter of time before self-driving vehicles take over the road. As we inch closer to the technocratic dream of super highways filled with robot cars, it's important to remember that disruptive technology–that necessarily obsolesces certain industries–has a very real impact on society.
KEEP READING... Show less
Related Articles
© 2012 All Rights Reserved. |
Hound Hunting Basics
about-hound-hunting1Hound Hunting in American History
The pursuit of mammals with dogs is a time-honored tradition in the United States, dating back to 1650. Though our Founding Fathers castigated many aspects of British society, one of the facets they firmly held to was the grand sport of hunting with hounds. President George Washington was not only the Father of his country, but was the Father of the American Foxhound. Several of our Presidents either owned or hunted behind hounds including Washington, Thomas Jefferson and the Father of American Conservation, Theodore Roosevelt.
Hound Hunting in American Culture
Many of our nation’s early explorers such as Daniel Boone and Davy Crockett hunted with hounds, and much of their discovery of what would later become the United States of America was due in no small part to the jaunts their hounds would lead them on. More notable houndsmen in contemporty times include actors Tommy Lee Jones and Kurt Russell, and singers Gene Autry and Roy Rogers. Ever hear of the sayings, “hot on the trail,” “barking up the wrong tree,” and, “threw me for a loop“? All of these expressions are derived solely from hound hunting. Hound hunting remains deeply entrenched within our culture and is in many ways more our nation’s original pastime than baseball.
Hound Hunting in Wildlife Management
Hound hunting has been legal since the inception of the California Department of Fish and Game and continues to be relied upon in order to help meet management goals.
Hound hunting is one of the most highly effective and constructive forms of wildlife management. It allows for the age and sex of the animal to be determined before any attempt to harvest the animal is made. This determination empowers the hunter to use personal discretion that favorably reinforces population dynamics such as offspring recruitment and gender ratio.
DSC09890Hound hunting is one of the very few forms of non-consumptive hunting. The ultimate goal of using hounds and other coursing dogs is not the harvest of wildlife, but the enjoyment gained in training, listening to, and interacting with the dogs during the pursuit. As such, hound hunters diligently leverage their harvest and often take fewer animals than is prescribed on an annual basis.
The use of hounds allows for the timely and accurate resolution of incidents involving threats to public safety by identifying, locating and taking only the offending animal.
Given the profound benefit that hound hunting has played in the history of this nation, and the value it continues to provide society to this day, it would be a profound tragedy if Americans were somehow prevented from enjoying this unique sport. |
2021-10-26 11:00:39 Find the results of "
knuckleball physics soccer
" for you
The Science Behind a Knuckleball | SiOWfa16: Science in Our ...
The knuckleball, however, is not exclusive to just a soccer ball or a baseball. A study by students at École Polytechnique’s Hydrodynamics Laboratory in France found that almost any ball, be it a tiny plastic bead or a 7 kg steel ball, will move similarly to a knuckleball seen in sports if dropped into a tank of water.
Knuckleball machine delivers soccer science - Phys.org
Knuckleball machine delivers soccer science. by Institute of Physics. Wind tunnel and high-speed camera data help researchers to explore the zigzag secrets of one of football's most unpredictable ...
What's behind the success of the soccer 'Knuckleball'
Physics of knuckleballs - IOPscience
In many sports, players use aerodynamic effects to lure opponents and score. For example in soccer, a free kick may get around the defensive wall thanks to a side spin . Among the different paths , one of the most intriguing paths is probably the zigzagging knuckleball.
Unraveling the Secrets of the Knuckleball | Inside Science
Since Ronaldo undoubtedly knuckles a soccer ball, the process needed another ingredient. That extra ingredient was the drag crisis. "But you need to kick the ball at a velocity close to that of the drag crisis and to do so with no spin to observe the knuckle effect," Cohen said. The make-up of the soccer ball also influences the extent of knuckling.
Knuckleball Physics Soccer - Image Results
More Knuckleball Physics Soccer images
What is the physics behind the knuckleball in football? - Quora
The only physics/science behind knuckleball goals in the game of football is simply the use of dynamic force in curvilinear motion and direction to dodge the goalkeeper at the knuckles level so that the pushback force is not equal and opposite to stop it.
Physicists May Have Finally Figured Out Why Knuckleballs Are ...
By putting spin on the ball, a pitcher or kicker can exert some control over its lift. But since a knuckleball has very little spin, it behaves more erratically.
French Physicists Unravel the Secrets of the Knuckleball
Knuckleballs are mostly associated with baseball in the United States, but this devilishly unpredictable ball motion also shows up in soccer, cricket, and volleyball.
How to Knuckle a Soccer Ball: 12 Steps (with Pictures) - wikiHow
The "knuckleball" is when the ball does not spin as it flies through the air. Spin is what gives a ball stability as it at moves, and without it your shot will snake through the air, changing directions suddenly and making it nearly... |
A Gorilla is a large mammal about 165-175 cm in height and many humans mistake a Gorilla for being a large fierce brute even though if not challenged they are clam ,playfull and extremely curious acting more like Monkeys than Gorillas
Food: A Gorilla will eat a large amount of fruit, insect and leaves, they eat up to 300kg of food every day!
If you look a Gorilla
in the eye it will
think you are challenging
to a fight!
Sex: the male is much bigger than the female the male has a shorter temper than the female also the female doesn’t have a silver back like the male
Did you know?
A Gorilla has the
exact same
amount of hair as
a human, the only
Did you know?
a silverback Gorilla
will be the troop leader
of 5-30 Gorillas
Please post any questions: |
2021-10-26 09:58:53 Find the results of "
dugout football meaning
" for you
Dugout. Meaning in football (soccer). Definition. Wiki. Terms
What is called the “dugout” in football? What does the “dugout” stand for? Dugout describes the area where the manager, coaching staff and substitutes sit on the side of the pitch. Another word used is bench. However, the dugout is used more often when describing where the manager is sitting, while the bench often emphasizes a player’s role as a substitute rather than a first team player, as in – ‘he came off the bench in the second half’.
What does dugout mean? - definitions
a sunken shelter at the side of a baseball or football (soccer) field where non-playing team members and staff sit during a game. dugout noun a device used to smoke marijuana
Dugout Meaning | Best 11 Definitions of Dugout
A sunken shelter at the side of a baseball or football (soccer) field where non-playing team members and staff sit during a game. A device used to smoke marijuana. (Canadian Prairies) A pit used to catch and store rainwater or runoff.
Dugout definition and meaning | Collins English Dictionary
dugout in American English. (ˈdʌɡˌaut) noun. 1. a boat made by hollowing out a log. 2. Baseball. a roofed structure enclosed on three sides and with the fourth side open and facing the playing field, usually with the floor below ground level, where the players sit when not on the field. 3.
Dugout - Wikipedia
In bat-and-ball sports , a dugout is one of two areas where players of the home or opposing teams sit when not at bat or in the field. Dugout (baseball) , a covered shelter near the diamond. Dugout (cricket) , an area at either end of the field. In association football, the technical area contains the dugouts.
dugout noun - Definition, pictures, pronunciation and usage ...
a shelter by the side of a football (soccer) or baseball field where a team’s manager, etc. can sit and watch the game Topics Sports: ball and racket sports c2. . (also dugout canoe) a canoe (= type of light narrow boat) made by cutting out the inside of a tree trunk Topics Transport by water c2. See dugout in the Oxford Advanced American Dictionary.
Glossary of association football terms - Wikipedia
Full-time: either (1) the end of the game, signalled by the referees whistle (also known as the final whistle), or (2) a footballer or coach whose only profession is football, and by extension a club employing such players and coaches.
Technical area - Wikipedia
The first football stadium to feature a dugout was Pittodrie Stadium, home of Aberdeen, where dugouts were introduced by trainer Donald Colman in the 1920s. He wanted a place to take notes and observe his players (especially their feet, hence the reason for being set partially below pitch level) without sacrificing the shelter provided by a grandstand. |
Southern Ground-Hornbills are primarily found south of the equator, but have a small overlap with the Northern Ground-Hornbills (Burcorvis abyssinicus) in Uganda and Kenya. They have been recorded in South Africa, Namibia, eSwatini, Botswana, Zimbabwe, Zambia, Mozambique, Malawi, Angola, Democratic Republic of Congo (DRC), Rwanda, Burundi, Kenya, Uganda, and Tanzania. Their habitat preference is in savanna, grassland, and open woodlands where there is a mixture of open areas for foraging and trees which provide them with both shade and nesting sites.
Unfortunately, over the past one hundred years Southern Ground-Hornbills have experienced a two thirds reduction in their national occurrence and their population. Sadly, these birds are now classified globally as Vulnerable and Endangered within South Africa, Namibia and eSwatini. In South Africa, most of the population occurs in the Kruger National Park (KNP), Associated Private Nature Reserves (APNR), the conservation and farming areas of KwaZulu-Natal and rural areas of the Eastern Cape.
%d bloggers like this: |
Poems MSS / layout Miracles Keywords Poncelet Bibliography Search
View poem data
For epigraphs and layout information click on the appropriate manuscript location.
Home Page
Back to list
CSM Number : 146
Short name: The Man whose Eyes and Hands were Restored Alternative: Man's eyes and hands are restored
Incipit: Quen comendar de coraçon
Refrain: Quen comendar de coraçon/ a Santa Maria o seu/ macar mal prenda, creo eu/ que llo pode dar sen lijon.
Summary of narrative
Setting: Briançon and Albesa Protagonist(s): a young man and his mother
A woman and her son were devoted to the Virgin. The son looked after his mother’s estate and managed her affairs wisely. She commended him to the Virgin and asked her to protect him from harm.
The son decided to go on pilgrimage to the shrine of the Virgin at Albesa, but his mother forbade him to make the journey. She warned him that if he went there, his enemies would kill him.
The son set off regardless, and was captured by his enemies. They gouged out his eyes and cut off his hands. Then they fled.
The injured man begged another pilgrim to take him to Albesa. He insisted that the Virgin would heal him.
His mother, hearing the news, was hysterical with grief. She went straight to Albesa and prayed to the Virgin to heal her maimed son.
The Virgin answered her prayer. She gave the son eyes like a partridge's and made a new pair of hands grow from his wrists.
Metrical data
Stanza: 8 8 8 8 8 8 8 8 Refrain: 8 8 8 8
No. of Stanzas: 12
Rhyme scheme: ABBA | cdcdcdca Zejel: Yes
MS locations:
Trec146, T146, E146
Poncelet reference
amputation, blindness, children, enemy (confrontation with), eye(s), limbs (restored), partridge, pilgrimage, Saint Denis
Click HERE for a list of recordings of this poem
El planto en la historia y en la literatura gallega
Filgueira Valverde, José
Agresión y violencia contra los peregrinos en las Cantigas de Santa Maria
Galeano, Juan Carlos
Itinéraire espagnol du conte médiéval (VIIIs-XVs)
Marsan, Rameline E. |
Equine Orthopaedics and Rheumatology Q&A 18
From WikiVet English
Jump to navigation Jump to search
Mansonlogo This question was provided by Manson Publishing as part of the OVAL Project. See more Equine Orthopaedic and Rheumatological questions
Equine Orthopaedics and Rheumatology Q&A 18.jpg
A five-year old half-bred gelding presented with a severe lameness on the right forelimb. Eight hours previously a nail had been removed from the palmar aspect of the foot, but it was assumed that this puncture was well away from any vital structures. Initially, the horse was not lame, but with time it had steadily deteriorated.
Question Answer Article
Describe the investigation which has been undertaken to produce the picture illustrated in the radiograph. Link to Article
What is the likely explanation for the deterioration in the horse’s condition? Link to Article
How could you confirm this? Link to Article
What treatment would you recommend? Link to Article
Next questionNext Question.png |
The Covid-19 vaccines have not only been tested on healthy people as claimed
28 May 2021
What was claimed
People who were undergoing chemotherapy have been told that they should not receive vaccines, and should stay away from people who had received vaccines, and now because of Covid-19 this has all changed.
Our verdict
People who are immunosuppressed are advised not to have live vaccinations and not to be in close contact with people who have received certain live vaccinations, but the Covid-19 vaccines in use in the UK are not live vaccines and people undergoing chemotherapy have been prioritised to receive them.
What was claimed
The Covid-19 vaccine was only tested on completely healthy people.
Our verdict
Incorrect. The trials of the Covid-19 vaccines did include groups of people with certain medical conditions. We are also finding out more about this through post authorisation monitoring.
What was claimed
The Covid-19 vaccines have been authorised on an emergency licence, because they are still in clinical trials.
Our verdict
Two of the vaccines have received temporary authorisation, and the Moderna vaccine has been issued conditional marketing authorisation. These classifications are regulatory tools to allow approval at the earliest time possible during an emergency situation, as soon as there is robust data to show that the benefits outweigh the risks.
A widely shared video on Facebook makes a number of claims about vaccines which are wrong or need more context.
This article does not discuss all of them, but here are a few of the biggest claims made in the video.
“Up until now people who were undergoing chemo, not only were they told they could not receive vaccines, they had to keep well away from the newly vaccinated”
People who are undergoing or have recently had certain treatments, such as chemotherapy, or who are immunosuppressed for other reasons, are generally advised not to have ‘live’ vaccinations, or to be in close contact with people who have recently been immunised with certain live vaccinations.
Live vaccines contain whole bacteria or viruses which have been “weakened” so that they trigger an immune response without causing disease in healthy people.
In clinically immunosuppressed people, however, there is a potential risk of infection if live vaccines are used. Similarly, immunosuppressed people are sometimes advised not to have close contact with other people who have recently had certain live vaccines because of a risk that they may be able to spread viral particles. We have written about this process, which is sometimes colloquially known as ‘vaccine shedding’, before.
The Pfizer, AstraZeneca and Moderna Covid-19 vaccines that have received authorisations in the UK so far are not live vaccines, and therefore can be given to people who have recently received chemotherapy. In fact, people who are immunosuppressed have been included in priority groups for the Covid-19 vaccines.
“It was only tested, for a very short time on completely healthy people. No polypharma users in the tests.”
The studies for all three of the Covid-19 vaccines currently authorised for use in the UK included cohorts of people with underlying health conditions, as well as ‘completely healthy people’ in the trials.
Approximately 21% of the people included in Pfizer’s phase three trial, published in The New England Journal of Medicine, for example, had background comorbidity (meaning they had other medical conditions). These included a wide range of medical conditions such as cancer, cardiovascular problems and diabetes.
A significant number of people given the AstraZeneca vaccine in phase three trials had underlying cardiovascular disease, respiratory disease, or diabetes. The Moderna trial also included people with underlying health conditions.
Based on the research, and the increased risk that Covid-19 poses to people with certain underlying medical conditions, the World Health Organisation (WHO) has said that the Covid-19 vaccines are safe and effective for people with conditions such as high blood pressure; diabetes and asthma amongst others. People with underlying health conditions have also been included as a priority group for vaccination by the UK government.
“The [Covid-19] vaccine has only been authorised by the MHRA on an emergency licence, which means it is in phase three clinical trials until 2023.”
Of the three Covid-19 vaccines that have been authorised for use in the UK, the Pfizer/BioNTech and Oxford-AstraZeneca vaccines have temporary authorisation (sometimes known as a regulation 174 authorisation) while the Moderna vaccine has conditional marketing authorisation.
All three of these vaccines (Pfizer, AstraZeneca and Moderna) have had analysis of safety and efficacy data from phase three trials (involving tens of thousands of participants) published in peer-reviewed articles in medical journals such as The Lancet and the New England Journal of Medicine. The collection of long term protection and safety data will continue over the next couple of years, and so the completion dates for the trials are in 2022 and 2023.
Normally, vaccines go through a process called marketing authorisation (also known as a licence). In certain scenarios, however, for example in response to “pathogenic agents”, the Medicines and Healthcare products Regulatory Agency (MHRA) may use different types of authorisation.
The MHRA told Full Fact that temporary authorisation and conditional marketing authorisations are “regulatory tools that enable medicines to be approved at the earliest time possible during an emergency situation, as soon as there are robust data to show that the benefits outweigh the risks [...]”
The MHRA also expanded on the differences between the two types of authorisation. It explained that a regulation 174 or temporary authorisation is not the same as a licence, instead “it authorises the emergency supply of an unlicensed medicine in response to an unmet public health need [and is] triggered by the Government, whereas conditional authorisation is applied for by the company.”
It also explained that a conditional marketing authorisation (CMA), which the Moderna vaccine has, “is an early, temporary licence for a medicine where there is an unmet health need [...] CMAs are reviewed on an annual basis and can be converted into a full marketing authorisation but authorisations under Regulation 174 cannot,” though that doesn’t mean Pfizer or AstraZeneca would be prevented from applying for a change to the authorisations for their Covid-19 vaccines in the future.
Ultimately, the MHRA said: “Our rigorous review of the safety, quality and effectiveness of COVID-19 vaccine candidates is the same for both routes and no vaccine would be authorised via a CMA or R174 unless the expected high standards are met.”
The MHRA has said that the trials for the Covid-19 vaccines have proceeded “without compromising any of the usual, high standards of scientific rigour [...] tens of thousands of subjects have been included in trials and all are subject to very close safety follow-up over several months.”
This article is part of our work fact checking potentially false pictures, videos and stories on Facebook. You can read more about this—and find out how to report Facebook content—here. For the purposes of that scheme, we’ve rated this claim as partly false because people who are receiving chemotherapy can in general receive the Covid-19 vaccines that are authorised at the moment (and more generally, vaccines that aren’t live), and the vaccine trials did include trialists with medical conditions.
Full Fact fights bad information
|
A proposed mechanism for high pathogen-caused mortality in the seed bank of an invasive annual grass
Open book with lines simulating text on left and right pages
View paper.
Pyrenophora semeniperda can infect nondormant Bromus tectorum seeds under optimal germination conditions, but most escape mortality. This reduces pathogen fitness relative to infection of dormant seeds, which are almost always killed. However, field experiments showed that a large proportion of seeds killed following inoculum addition were not accounted for as dormant seeds, but instead were likely nondormant seeds that would have germinated without inoculum addition. We hypothesized that widely fluctuating water availability to seeds would favor pathogenesis by delaying germination and allowing disease progression at water potentials below those that permit radicle emergence. With dehydration at -4 MPa, mortality increased with dehydration duration after short or long imbibition. At -40MPa, mortality increased with dehydration duration only after long imbibition. At -150MPa, there was no effect of dehydration duration on generally low mortality. These results illustrate that fluctuating moisture can cause high nondormant seed mortality, explaining how this pathogen kills nondormant seeds.
Find a Resource
Can't find what you need?
Stay Connected |
Co-management of Traditional Foods: Opportunities and Limitations for Food Security in Northern First Nation Communities
food security; traditional food; First Nations; Indigenous; co-management; governance; North; Yukon; Canada
Traditional foods that First Nations peoples harvest or gather from the land remain critically important for achieving and sustaining food security for many communities. In Canada’s North, land claim agreements include provisions for First Nations to participate in the governance of their traditional territories, including the co-management of important traditional (wild-harvested) food species. Because such agreements only specify the broad contours of co-management governance, their actual functioning evolves out of a complex interplay among the co-managing organizations over the course of time. This paper aims to deepen our understanding of how First Nations communities can enhance food security as participants in co-management. Our study connects research on food security with research on co-management and is the first to analyze how First Nations can improve their food security by influencing decision-making that affects traditional foods through co-management arrangements. Following a succinct review of the Indigenous food security and co-management literatures, we analyze the experiences of Kluane First Nation in enhancing community food security through the co-management of its traditional territory with Yukon Government and Parks Canada, interpreting the data in light of the theories and evidences offered by research on co-management. The analysis of data collected from semi-structured interviews and from First Nations and government resources shows that, while the co-management system is imperfect, it does offer a mechanism through which First Nations can exert influence on decisions that affect their food security. The three key themes emerging from the excerpts confirm the importance of co-management as an evolutionary and long-term process, in which trust- and relationship-building are ongoing activities that are fundamental to beneficial collaboration involving the sharing of information and power. The analysis also highlights the role of context, or situational factors, in facilitating or hindering collaboration.
Additional Files |
Why the Score is Like the Musicians’ Gospel
Piano Lessons / music theory / Why the Score is Like the Musicians’ Gospel
Welcome to LivingPianos.com, I’m Robert Estrin. Today’s subject is about why you must revisit the score of your music periodically. It’s so important! For example, religious scholars go back to the Gospel again and again because they’re living a certain type of life. They want to reinforce the Scripture. Well, as a musician, you must do the same thing with your music. It’s vital for keeping things fresh and learning your music on a deeper level.
Don’t play telephone with your music.
Think about the game telephone. You have a message you whisper into the ear of the person next to you. They whisper it into the ear of the person next to them, and so on. At the end of the line, you have a whole different message! If you play your piece again and again, eventually you could end up with a whole different piece if you never go back to the original. Little things will change. Not only that, but if you’re playing a sophisticated piece of music, there are so many nuances of phrasing and expression, where a slur ends, where a crescendo starts, etc. It’s really tough just to learn the notes, the rhythm, and the fingering. It’s far more difficult to understand every aspect of phrasing and expression. Even if you’ve really studied a piece, you can always learn more.
Over time your memory degrades.
Here’s another example. This may be tough for young people to relate to because we now have perfect digital reproductions of everything. But not that long ago we used tape for recording. I grew up with tape. I owned recording studios that were tape-based. If you had a cassette tape or a reel-to-reel tape and you made a copy, the copy was always just not quite as good as the original. It wasn’t replicating it, the way digital technology does. It was actually just rerecording it. And if you recorded a tape of a tape of a tape, it was noisy. It was distorted. You could hear fluctuations of pitch, referred to as wow and flutter. You would end up with all sorts of artifacts that you didn’t notice in the original recording. The only way to get a really first-class recording was to go back to the original master tapes. That’s why you’ll see remastered versions of CDs and other digital recordings. What does that mean?
The way tapes and records were made, is from a master multitrack tape. That master tape would be mixed down to stereo tape. Then a copy of that stereo tape would be sent to the record company. So it’s already third generation by the time the record company has it. When they remaster an album, they can go back to the original multitrack tape and mix it down to 2-track digital. This gets the quality of sitting in the studio and listening to the original multitrack master tape, which is so much cleaner than what you ended up with on records and tapes years ago.
Refer Back To The Source!
The score is your musical gospel! It’s the original message. It’s the master tape. By revisiting the score again and again, no matter how many times you studied a piece, you will always learn more. That’s the message for today. I hope this is helpful for you! Thanks so much for joining me, Robert Estrin here at LivingPianos.com, Your Online Piano Resource.
2 thoughts on “Why the Score is Like the Musicians’ Gospel”
1. Thank you, Mr. Estrin! I’ve been meaning to ask you: what kind of piano do you use in your videos? How is the sound produced?
I ho[e this finds you well!
Carol Crumlish in Eugene, Oregon
1. The piano I use in many of my videos is my second prototype modular piano system. It is a 9-foot concert grand action with optic sensors for the keys and pedals which sends information over USB to a computer running physical modelling piano software from PianoTeq. The systems provides a virtual concert grand playing experience.
Leave a Reply
18 − six = |
What Is Breakthrough Bleeding and Why Does It Happen?
What Is Breakthrough Bleeding and Why Does It Happen?
Breakthrough Bleeding Condition Explained
Breakthrough bleeding is spotting that women experience throughout the normal menstrual cycle or even during pregnancy. This is common in the fertilization process especially.
If you have started taking birth control pills or other forms of contraception recently, then you may get a temporary breakthrough bleeding as well.
Although this is all normal, you should pay attention to any drastic changes in bleeding, pain, or any other symptom that may be a sign of additional underlying issues.
Here we will talk about identifying breakthrough bleeding or spotting, the causes for it, and how to know it’s time to see a doctor. But first, let’s start with the women’s normal periods.
The Regular Cycle Explained
The typical length of the menstrual cycle for women is 28 days long. Of course, this will depend on many medically reviewed lifestyle variables, affecting that period to be either as short as 21 days or as long as 35 days.
Day 1 of your cycle starts with your period, which lasts about 5 to 7 days. Then, when menstruation passes, an egg in your uterus is produced and prepared to be fertilized by the 14th day. Ovulation happens around this time, and you gear up towards conception all until the 20th day.
If not fertilized, the hormones prepare to shed the uterus lining to get rid of the egg. This results in another period that ends the current cycle and starts the next in about a week.
During menstruation, you lose about 2 to 3 tablespoons of blood. Teenagers and women nearing menopause will experience heavier bleeding, but this shouldn’t worry you.
However, if you have severe pain or bleed abnormally heavy, visit a health care professional to give you more information on your specific case.
When Does Breakthrough Bleeding Happen?
Breakthrough bleeding is any bleeding that you notice outside of your menstrual period. Technically, after the 7th day in your period.
This bleeding can be characterized by a heavy flow that can fill a pad or a tampon or be as small as spotting.
Here are some of the reasons why you might experience breakthrough bleeding.
• Patients are adjusting to hormonal contraception
• You got pregnant
• Experienced a miscarriage
Although light spotting may go away within a few days or in a matter of hours, it is still recommended to see your doctor and report the changes you are experiencing. Especially if you have never had a breakthrough bleeding before.
You are Adjusting to the Birth Control Pills
Women may bleed between cycles if taking any hormonal birth control pills or just had an IUD installed.
Such changes in the body will induce spotting that may last for a few months before resolving itself.
Pills like Ethinyl-estradiol-levonorgestrel, Seasonique, or Quartette, may also cause breakthrough bleeding. Unless it is significant quantities, rest assured that it will get resolved by itself without taking any pills.
When on the pill, you may experience such bleeding if you miss taking a pill throughout your period, if you start any new medications or supplements while taking it, or have diarrhea. The last one is especially prevalent since it can make your body unable to absorb the hormones from the pill.
Continuously taking birth control pills to skip your period effectively will also cause temporary bleeding that should resolve after several months.
You have nothing to worry about if you see that the blood you are experiencing is dark brown. This means that it isn’t new but old blood that needs clearing up from your system.
To know what to expect once you are on a birth control pill, we will review the side effects shortly. In the following content, you will find information on why you may experience bleeding or the spots when taking birth control pills and how to take care of it.
Combination birth control pills can cause some of the following side effects:
• Breakthrough bleeding or spotting. This is more common when the amount of the taken pills increases
• Breast tenderness
• Elevated blood pressure
• Headaches
• Nausea
• Bloating
Rest assured, because data shows that you can expect some of the side effects from the birth control pills, such as nausea, headaches, breast tenderness, and bleeding, to decrease with continued use.
To take better care of your health, it is essential to know that some people should not take birth control pills.
• You should not take a birth control pill if you are in breast-feeding
• Data shows, women who are older than 35 and smoke should also find an alternative for the pill
• Have poorly controlled high blood pressure
• You should not take any version of the birth control pill if you have a history of or current deep vein thrombosis or pulmonary embolism
• Have a history of stroke or heart disease
• If you have a history of breast cancer, you should not take a birth control pill
• If suffering from migraines with aura, then you should substitute the pill for another method
• Have diabetes-related complications, such as nephropathy, retinopathy, or neuropathy
• Women who have liver disease should not take any birth control pill
• If you have unexplained uterine bleeding, then stay off the pill
IUDs and Breakthrough Bleeding
IUDs as birth control methods will cause changes in your menstrual flow that need to clear up while your body adjusts to the influx of new hormones.
If you use a copper IUD, you will not get any new hormones, but you should expect some changes in your menstrual flow.
Vaginal bleeding between periods will be present with both types of IUDs as a side effect, but it will resolve in a few weeks up to a couple of months.
Usually, people bleed less from IUDs than when taking the birth control pill. Still, in the beginning, even their periods may get heavier until the body restores balance.
See your ob-gyn if your periods become uncommonly heavy, you experience pain in the lower part of your stomach, or you notice spotting or bleeding after sex.
• Sharp abdominal pain shortly after the installation of the IUD
• Chest pain
• Very heavy bleeding like menstruation but between your cycles
• Eyesight or vision changes
• Severe leg pain
STDs and Vaginal Bleeding
STDs or other inflammatory conditions can cause breakthrough bleeding if left untreated for too long. Chlamydia and gonorrhea are often the cause of this, and women can go even 30 days before noticing that they have something.
Always have safe sex to protect yourself from getting and spreading STDs.
Other inflammatory conditions that can cause breakthrough bleeding or vaginal bleeding are:
• Cervicitis
• Endometritis
• Vaginitis
• Pelvic inflammatory disease (PID)
You may also experience sharp pelvic pain and burning and see cloudy urine in the toilet. Also, with such symptoms, abnormal vaginal discharge appears when the breakthrough bleeding decreases or simultaneously. Foul odor and itchiness may be present too.
If you have any of the described symptoms appropriated by vaginal bleeding, you should immediately see your doctor. Your doctor can effectively treat many of these conditions with over-the-counter antibiotics. However, if left untreated for too long, they may cause infertility and other serious health issues.
The Sensitive Cervix Issue
Any bleeding outside the normal cycle may worry you, especially if you are pregnant at the moment. Making sure all is well with your baby is your number 1 priority.
Although breakthrough bleeding during pregnancy may be a bad sign, sometimes it is caused by a sensitive cervix. If your cervix gets easily irritated or injured, then the vaginal bleeding is nothing to worry about except being more mindful and protect your intimate parts better.
The cervix is located at the base of your uterus. So, whenever you experience bleeding, it may mean that a recent irritation or injury has caused this and should go away pretty soon if not repeated.
A sensitive cervix is particularly common during pregnancy. It is because, at this particular period, the cervix becomes very soft. So, if you just had sex or went for a vaginal exam, breakthrough bleeding is expected and nothing to worry about.
Some women experience cervical insufficiency. This is a condition that happens when the cervix opens up earlier than your due date.
Breakthrough Bleeding Due to Subchorionic Hematoma
Subchorionic hematoma during pregnancy is also called hemorrhage and is a condition that may cause excessive vaginal bleeding.
When a woman has a subchorionic hematoma, her chorionic membranes separate from the sac, this occurs between the placenta and uterus and causes clots and bleeding.
The newly formed hematomas may be large or small hence cause breakthrough bleeding or spotting.
This condition isn’t serious in most cases, but you should schedule an appointment with your doctor to treat it.
Miscarriage or Ectopic Pregnancy and Breakthrough Bleeding
Isolated horizontal picture of frustrated upset young European lady with blonde wavy hairstyle frowning, feeling worried and scared, having positive pregnancy test, not sure about her decision.
Not too often, women who experience breakthrough bleeding may be going through a miscarriage. The fetus may die in the first 19 weeks of the pregnancy, which will cause miscarriage. The causes of this may be numerous, and a definitive cause isn’t yet known.
Ectopic pregnancy is when the implantation occurs in the fallopian tube instead of the uterus. This pregnancy isn’t viable and has to be detected on time and, unfortunately, aborted. It may cause long-term damage to the mother’s health, especially the reproductive system, so taking action on time is of utmost importance.
These two conditions will have the following symptoms:
• Heavy bleeding
• Dizziness
• Severe pain or cramping in your abdomen
During a miscarriage, you may experience vaginal bleeding that lasts for 2 weeks or longer. If your uterus does not empty, you may need a dilation and curettage (D&C) or even a surgical procedure to remove the remaining tissue. Ectopic pregnancy, on the other hand, usually requires surgery.
Fibrous Masses or fibroids in your uterus will cause breakthrough bleeding. Anything from genetics to misbalanced hormones may cause this tissue to grow.
Apart from breakthrough bleeding, fibroids will also cause:
• Periods that last more than 7 days
• Very heavy bleeding
• Frequent urination
• Pain or pressure in your pelvis
• Trouble emptying your bladder
• Constipation
• Backache or pain in your legs
If you feel any of these symptoms, see your doctor as soon as possible.
Progestin-only Birth Control Pill
Apart from taking a regular contraceptive pill, there is another type for people who can’t take estrogen for health reasons.
These reasons can be anything from deep vein thrombosis (DVT) to age-related causes and smoking habits.
Namely, the type of pill you are using combined with other medications you may be taking can cause your bleeding.
Combination pills are the most commonly prescribed form of contraceptive. They combine progestin and estrogen and regulate your cycle.
However, if you are only taking the progestin pill, the bleeding may be more common and depend on the frequency of usage. This is because low doses of estrogen with higher amounts of progestin are associated with more bleeding episodes.
The breakthrough bleeding will occur in the first three to six months of use in 30% to 50% of the women. Then it drops to about 10 to 25% after the fourth month.
To keep the bleeding in check, you need to take the pill regularly. Research shows that missing your pill by just three hours significantly increases the risk of bleeding and the risk of pregnancy.
Breakthrough Bleeding Vs. Implantation Bleeding: How to Know?
How to know what you are experience is breakthrough bleeding or implantation bleeding?
Indeed this is sometimes even difficult for doctors to differentiate before examining you but knowing the difference can help you long-term.
You can mainly spot the difference because of the timing. Namely, bleeding or spotting 10 to 14 days after conception will be implantation bleeding. A normal condition that almost any woman experiences.
On the other hand, both the breakthrough and the implantation bleeding will occur between regular menstrual cycles. These two may come as spotting, for which you won’t need anything but a daily pad.
However, breakthrough bleeding may happen to you at any point in your life, while implantation bleeding only occurs a few days before a missed period. Consider it as a sign of pregnancy.
To quickly find which one it is, you can take a home pregnancy test or schedule an appointment at your doctors’ office for a blood test.
Note that when taking the pregnancy test, you should not have any blood in your urine. This will give you a false positive even if you aren’t pregnant.
Managing and Care: Medically Reviewed Advice
Whether caused by hormonal birth control pills, uterine fibroids, sexually transmitted infections, imbalanced hormones, breakthrough bleeding is an annoyance, and you will have to manage it somehow.
Firstly, you should visit your ob-gyn and get reliable health information on what’s causing you to bleed or have spotting between your periods. When you find out the reason behind this condition, depending on the causes, you can either wear a tampon or a pad.
For instance, if you have an overly sensitive cervix and the entire area down to the outer part of the vagina is inflamed, it is best to wear a pad.
On the other hand, if you are bleeding because of the hormonal birth control pill, you can wear a tampon. If the vaginal bleeding occurred because of a recent miscarriage, then pads on your underwear are better suited.
No matter the intensity of the bleeding, you should consult with a doctor. They will also give you some medically reviewed guidance on managing the bleeding in your particular case.
Breakthrough Bleeding Bottom Line
Woman’s body dressed in white panties holding yellow flower in her hands on white background
Vaginal bleeding is an unpleasant experience that needs medical attention. If you are experiencing this due to the birth control you’re taking or the irritation to your cervix, then you can wait it out for it to resolve on its own.
If, on the other hand, you have a genetic predisposition for fibroids, you suspect an STD or other medical issues, it is best to see a healthcare professional asap.
Women reaching menopause or recently in that period of their life will need to pay close attention to breakthrough bleeding. If you haven’t had a period in 12 months yet, you notice some bleeding at the moment, it is important to see your doctor. An infection or hypothyroidism may cause such symptoms in your situation. |
Wet noses, sleek coats and healthy joints
A next-generation active ingredient based on a pure collagenous protein is now available to stimulate joint cartilage metabolism and improve mobility in our trusted companions
Osteoarthritis (OA) affects more than 20% of all dogs aged one year and older and is the most common osteoarticular disease in dogs. It’s a degenerative joint disease characterised by the progressive destruction of normal articular cartilage and subchondral bone, and is typically manifested by pain and lameness.
Cartilage is composed of specialised cells called chondrocytes that produce a large amount of extracellular matrix containing two major components: collagen (type II) and proteoglycan (aggrecan). The chondrocytes play a central role in the development of OA because they are responsible for the anabolic and catabolic balance of cartilage metabolism.
When this equilibrium is disturbed, degenerative joint diseases are prone to develop. Currently, treatments that directly address the cause of joint pain in dogs are scarce in the marketplace. Most treatments focus on anti-inflammatory effects.
Figure 1: Problems when sitting and laying decreased statistically significantly after 12 weeks of daily ingestion of 5 g of PETAGILE (n=22)
The consequences for the pets affected are pain and reduced joint mobility, which results in lameness or stiffness and leads to a reduced quality of life. It is, therefore, important to identify and manage the disease effectively: 31% of dog owners state that bone and joint problems are an issue for their pets, and around 10 million dogs in the United States have been diagnosed with OA.
Apart from age, the main risk factors are body size, obesity, genetic predisposition and injury trauma, which can contribute to osteoarthritic joint formation.
Perhaps less widely known is that cats also suffer from (OA). The number of arthritic cats is more difficult to assess, however, as they exhibit more subtle signs of the disease. Nevertheless, 90% of cats older than 7 years show X-ray evidence of joint degeneration. The most common symptom seen in cats with OA is a reluctance or an inability to jump. Further symptoms are reduced mobility, difficulties in sharpening their claws, grooming and increased irritability when touched, especially around the affected joints.
Likewise, there is also a high incidence of OA among horses. More than 60% of equine lameness stems from OA. It can occur early on in sports horses or later in ageing animals. Risk factors include abnormal physical stress levels, joint congruence changes, fractures and microfractures in subchondral bone.
Given that joint complaints are not a human-only issue and that many pet owners would do everything they can to help their domestic companions to stay physically mobile and healthy, GELITA has developed an innovative ingredient for the regeneration of joint cartilage of animals.
The specially optimised bioactive collagen peptides in PETAGILE promote joint cartilage growth and thereby counteract the wear on joints caused by ageing and excess load. As such, oral supplementation with PETAGILE can contribute to the maintenance of joint health and keep pets mobile for longer.
In fact, the effect of PETAGILE has been studied in several preclinical and clinical trials. Taken orally, PETAGILE is partially absorbed as intact peptides. These Bioactive Collagen Peptides stimulate the cartilage cells (chondrocytes) to increase the production of new cartilage matrix (collagen and proteoglycans), which acts as a buffer between bones.
Clinical research
Based on seminal research by Weide and Hesse and wishing to enhance the effectiveness and reduce the effective dosage, GELITA’s new product, PETAGILE, consists of specific bioactive collagen peptides that are optimised for the treatment of joint health in pets and horses.1,2
To assess the efficacy of orally administered PETAGILE in senior dogs with OA, 22 medium-sized animals without discrimination by sex, age, weight or breed were included in an observational study and treated with 5 g of PETAGILE per day (administered in regular dog food for a period of 12 weeks).
The mean age of the dogs was 9 years and the mean weight 28 kg. The degree of lameness was evaluated by a veterinarian at baseline using a 5-point visual score (0 = no symptoms, 4 = high degree of lameness) and was, on average, 1.7 ± 0.2.
Lameness, pain in motion, observation at rest, crepitus, mobility and swelling of the ankles were examined by the veterinarian at the beginning and after weeks 3, 6 and 12 of intake. Changes in vitality, climbing stairs, standing up and contact sensitivity were evaluated by the dogs’ owners on a weekly basis.
Figure 2: The degree of lameness, evaluated by a veterinarian, decreased statistically significantly after 12 weeks of daily ingestion of 5 g of PETAGILE
Based on the trial results, it was concluded that the oral administration of Bioactive Collagen Peptides (BCPs) has beneficial effects on OA in dogs and contributes generally to the maintenance of joint health in preserving mobility and the quality of life (Figures 1).
Owing to the product optimisation of BCPs, the daily dosage of 20 g (as used in the Weide study) could be reduced. The previous results were, however, confirmed for medium-sized OA dogs treated with 5 g per day, wherein the clinical situation of the dogs was statistically and significantly improved. A 5 g dose of PETAGILE for 12 weeks leads to a significant reduction in lameness and improvements in further parameters such as problems in sitting and discomfort in getting up (Figure 2).
In further research by Schunk et al., the impact of specific collagen peptides (PETAGILE) on cartilage metabolism was tested in canine chondrocytes.3 In addition to the biosynthesis of various matrix molecules (type II collagen, aggrecan and elastin), the RNA profile of inflammatory cytokines and degenerative matrix molecules was also examined.
The results clearly showed that the supplementation of specific collagen peptides reduced catabolic processes, as indicated by a statistically significant decrease in inflammatory cytokines and proteases in canine chondrocytes compared with untreated control experiments (Figure 3).
In addition, a statistically significantly enhanced biosynthesis of type II collagen, elastin, and aggrecan was observed. As such, the authors concluded that “the current data supports the suggested anti-inflammatory effect of specific collagen peptides … but also clearly demonstrates a pronounced stimulatory impact on matrix molecule synthesis.”
From the horse’s mouth
Proving its efficacy in larger animals, Dobenecker et al. set out to evaluate the clinical efficacy of specific bioactive collagen peptides (BCPs) — administered orally as PETAGILE — on horses with mild to moderate, naturally occurring osteoarthritis.4 Data from a two-centred pilot study were used for the meta-analysis.
Figure 3: Change in joint cartilage after 3 months (tissue sections)
Thirty eight privately owned horses of various breeds were available. In one centre, 18 of these patients (6 ± 3 years; 519 ± 100 kg BW) received either 25 g (n = 6) or 50 g (n = 12) of BCPs/day orally for 12 weeks. In the second centre, 20 horses (18 ± 4 years; 413 ± 94 kg BW) received either a placebo (control; n = 10) or 25 g of BCPs/day.
Attending veterinarians performed an orthopaedic examination, including flexion tests and evaluated the degree of lameness, rotation pain, step length and arc of foot flight during trot (8 parameters) at the beginning and after 6 and 12 weeks.
The horse owners answered a weekly questionnaire about their perception of lameness, mobility and the horses’ willingness to run. In the 50 g group, in six of eight parameters, a strong effect was detected with two parameters (lameness and flexion pain) significantly improving after 6 weeks.
In the 25 g group, a moderate effect was seen in six parameters (three improved after 6 weeks). The owners reported a strong effect on mobility and willingness to run and a moderate effect on the development of lameness in the 50 g and 25 g groups compared with the placebo treatment.
The study revealed promising effects of the safe oral-specific supplementation with BCPs on symptoms of osteoarthritis in horses after 3 months, with the higher dosage (50 g) having a greater impact. Further long-term investigations on the specific efficacy of BCPs in horses with osteoarthritis, preferably in blinded and placebo-controlled studies, should be performed to confirm these first positive results, note the authors.
Product definition, compliance and safety
PETAGILE’s BCPs are specific, highly purified hydrolysed collagen peptides with a neutral taste and odour. The average molecular weight is approximately 6.0 kDa. They are suitable for protein enrichment in pet food applications such as treats or complete pet foods (wet and dry).
The product complies with Regulation (EC) No. 852/2004 on the hygiene of foodstuffs, Regulation (EC) No. 853/2004 and Regulation (EC) No. 999/2001, which lays down rules for the prevention, control and eradication of certain transmissible spongiform encephalopathies, including amendments regarding country classification and specified risk material.
Various international bodies have declared collagen peptides to be safe. GELITA collagen peptides are food and non-food additives and therefore carry no E-number. The Swedish National Veterinary Institute (SVA) has performed virus risk assessments and demonstrated that collagen peptides are safe. In the US, collagen peptides have been granted “Generally Recognized as Safe (GRAS)” status by the FDA (Docket Number 77N-0232).
In summary
The oral administration of PETAGILE has beneficial effects on dog mobility and generally contributes to the maintenance of joint health in preserving flexibility and quality of life. In elderly animals, for example, it increases activity, promotes mobility and flexibility, and augments well-being.
In active animals, it supports mobility and flexibility, optimises joint health, function and comfort, and increases performance. Furthermore, PETAGILE exhibits excellent solubility, is easy to formulate and contains no fat, purines, cholesterol, additives, colourants or synthetic aromas. And, in a palatability test with dogs, PETAGILE showed great acceptance.
1. N. Weide, “Der Einsatz von Gelatinehydrolysat bei Klinisch-Orthopädisch Gesunden Hunden und Hunden mit Chronischen Erkrankungen des Bewegungsapparats,” PhD thesis, Tierärztliche Hochschule Hannover, Germany (2004).
2. K.J.F. Hesse, “Supplementation by Collagen Hydrolysate in Dogs Suffering from Osteoarthritis,” Kleintiermedizin 1, 17–22 (2006).
3. Michael Schunck, et al., “The Effectiveness of Specific Collagen Peptides on Osteoarthritis in Dogs-Impact on Metabolic Processes in Canine Chondrocytes,” Open Journal of Animal Sciences 7, 254–266 (2017).
4. B. Dobenecker, et al., “Specific Bioactive Collagen Peptides (PETAGILE) as Supplement for Horses with Osteoarthritis: A Two-Centred Study,” J. Anim. Physiol. Anim. Nutr. 102(Suppl. 1), 16–23 (2018). |
chapter twelve
Storing Data
Almost all applications involve storing data of some kind. This can be data about users, products, videos, or even page visits. Used correctly, this data can be a powerful tool in the decision-making process. That’s why companies like Google and Facebook try to collect as much data as they can about their users and their behaviors.
html5_badge.psd Web applications that handle a lot of data have traditionally used databases for storage. These databases are stored on servers that are often hundreds, if not thousands, of miles away from the user (hence the term server-side storage). An alternative option is client-side storage. Storing data on the client side means that it is stored on the user’s computer or device—the client—as opposed to being stored on a web server. In this chapter, you learn about the strengths and weaknesses of using client-side storage. You explore two new technologies that HTML5 introduces for storing data on the client side and learn how these technologies can be used in modern web applications and websites to boost performance and make websites function offline.
More pros and cons of using client-side storage are discussed in the last portion of this chapter.
Why Use Client-Side Storage?
There are many reasons why you might want to store data ...
Get HTML5 Foundations now with O’Reilly online learning.
|
Skip to content ↓
What is History?
History is narratives. From chaos comes order. History is the study of people, actions, decisions, interactions and behaviours. It is so compelling a subject because it encapsulates themes which expose the human condition in all of its guises and that resonate throughout time: power, weakness, corruption, tragedy, triumph … Nowhere are these themes clearer than in Political History, still the necessary core of the field and the most meaningful of the myriad approaches to the study of History.
What will I study?
Paper 1: Britain Transformed 1918-1997
This option comprises a study in breadth, in which students will learn about the extent to which Britain was transformed politically, socially, economically and culturally in the years 1918–79. They will consider responses to the challenges of war, fluctuations in the economy, technological advancement and the desire for greater social equality.
Paper 2: The USA challenge and conformity 1955-1992
This option comprises a study in depth of the USA in the years 195592, from post-1945 affluence, through racial and political protests in the 1960s, to the rise of right-wing groups in the 1980s and the development of bitter divisions between Democrats and Republicans.
Paper 3: The British experience of warfare 1790-1918
Together, the breadth and depth topics explore the British experience of war in different aspects of major overseas conflicts and the changing relationship between the state and the people as the government attempted to create an effective fighting machine and prepare the people for war. Within the primarily military focus on the experience of warfare, this option also gives students the opportunity to explore its political, social and economic dimensions and their part in generating pressure for change.
Coursework: The study of the Cold War
How will I be assessed?
External assessments take place at the end of Year 13 for Paper 1, 2 and 3 and the coursework to be assessed throughout the academic year
Who should study A Level History?
If you are intrigued by our past and want to learn how it will shape our future, you should consider studying History. History is a multifaceted discipline that will increase your cultural awareness and moral understanding of the world we live in.
By studying History you’ll gain a range of transferable skills, from informed citizenship and critical thinking, to research and general awareness. What’s more, the knowledge acquired through the study of History is relevant in a wide range of disciplines and can lead to diverse employment opportunities. |
Bat detectivies
Share this article
We've teamed up with North West Kent Countryside Partnership and our Nature Forum to find out which species of bats call Thamesmead home.
A couple of days in advance of International Bat Night (which is on the 27 August), we met at Tump 53 nature reserve for a bat walk led by North West Kent Countryside Partnership.
In true detective style, everyone was given a 'bat detector', which is a device which translates bat’s ultra-sonic calls into lower frequency sounds that we can hear. Using our 'bat detector' devices our walk leader, Lucy, was able to identify different species of bats by the frequency of their calls and then the group was able to ‘tune in’ to the bats on their devices.
The bats were a little shy - it took a little while for them to come out after the sun had set. The group walked around the nature reserve while learning about bats, their habitats and how to use the detectors. Then the bats came out and the group watched them flying over the pond at the entrance to the reserve, and listened to their calls through the bat detectors.
As it grew darker, we left Tump 53 to explore the surrounding area. We took a short walk to a nearby hotspot of bat activity where the bats were visible as they flew in and out of pools of light, cast by streetlamps and attracting small insects for the bats to feed on.
As we made our way back to Tump 53, we came across four different species of bat- the Noctule, the Common Pipistrelle, the Soprano Pipistrelle and the Nathusius’ Pipistrelle.
We will be holding future bat detective walks to find out if we have other species of bats in Thamesmead. Please keep an eye on our 'What's on' section for upcoming walks. We hope to see you there! |
Causes and Risk Factors of Celiac Disease
Table of Contents
View All
Table of Contents
It's not entirely clear what causes celiac disease. In fact, most researchers believe multiple factors are involved, including your genes, your environment, and the foods you eat. You need some or even all of these factors to be present in order to develop celiac disease.
Bread and pasta
Common Causes
Celiac disease is an autoimmune disease in which gluten in your diet triggers your white blood cells to attack the tiny, finger-like projections called villi that line your small intestine and normally help you digest food. The lining is eroded until it's worn smooth. Without villi, you can't absorb vitamins, minerals, and other nutrients from food.
Your genes play a strong role—if you don't have one of the two specific genes that have been linked to celiac disease, your odds of developing the condition are very low (although they are not zero; medical research has found people who have celiac but not those genes). However, because 30% of the population has one of the genes, and only 3% of the population with one or both of these genes develop celiac disease, genetics isn't the only factor.
To develop celiac disease, you must be eating gluten. When you have celiac disease, gluten spurs your immune system to attack your small intestine. Gluten is common in the Western-style diet, so it would be unusual to avoid it when not following a strict gluten-free diet.
Finally, for you to develop celiac disease, certain factors in your environment must help to cause it. It's these factors that aren't clear; some people can consume gluten every day for decades without a problem and then develop severe celiac disease symptoms very suddenly, while some young children exhibit celiac symptoms as soon as gluten-containing grains are introduced into their diets.
Many women begin to experience celiac symptoms following pregnancy and birth, and other people find their symptoms begin following a seemingly unrelated illness—or even following a stressful time in their life. There is also research into whether a virus might trigger the condition.
Besides having first-degree family members with celiac disease, health-related risk factors include having:
• Lymphocytic colitis
• Down syndrome
• Turner syndrome
• Type 1 diabetes
• Autoimmune (Hashimoto's) thyroiditis
• Addison's disease
The two main genes for celiac disease are HLA-DQ2 and HLA-DQ8. About 96% of those diagnosed with celiac disease (via biopsy) have one or both of those genes. Certain subsets of the HLA-DQ2 gene can increase or decrease your risk. It's likely, too, that there are other genes involved that haven't yet been identified.
Genes are inherited. As a result, celiac disease can run in families. If you have a first-degree relative (parent, sibling, or child) with celiac disease, you have a 5% to 22% chance of having it too.
HLA-DQ2 is common among people with European heritage (up to 40% of that population have it). HLA-DQ8 is most common in people from Central and South America, but it also appears in about 10% of the population overall.
There's some evidence that carrying two copies of one of the genes (either DQ2 or DQ8) may increase your risk. You would have two copies if you inherited one copy from each parent.
Genetic testing for the genes associated with celiac disease is done by collecting cells from your mouth with a swab or by spitting into a vial. This can be done by your healthcare provider, by specialized laboratories, or even by commercial genetic profile companies.
Gluten Exposure
Again, even if you are prone to developing celiac disease, you won't without exposure to gluten (which is, essentially, inevitable).
Gluten is found in wheat and some other grains. There is conflicting research as to whether the hybridized wheat of today has more gluten than wheat from a century ago. That aside, wheat, gluten, and other gluten-containing grains are found in many processed foods (and even products like toothpaste), which may result in people having more exposure to gluten now than decades ago.
Myth Buster
Some have theorized that the rise in celiac disease and non-celiac gluten sensitivity is tied to genetically modified wheat. However, since genetically-modified wheat isn't on the market anywhere, it can't be causing the increase.
There is ongoing research into whether feeding patterns in the first year of life make a difference in developing celiac disease. These studies have not found any effect associated with whether or not a child was breastfed and when gluten was first introduced to the diet.
There is weak evidence that having a high amount of gluten at the time of weaning might increase the risk of celiac disease in children who have a high familial risk.
A Word From Verywell
Celiac disease is caused by having specific genes, eating gluten, and possibly by some sort of trigger. However, medical science still doesn't know much about any of these potential factors, even though they seem to be the keys to why some people with certain genes develop celiac disease while others do not. In fact, researchers have only begun to explore various possibilities.
Frequently Asked Questions
• What role do the HLA-DQ2 andHLA-DQ8 genes play in celiac disease?
Certain variations of these genes are associated with celiac disease. They are part of what is called the human leukocyte antigen (HAL) complex—a group of genes that help the immune system tell the difference between proteins produced by the body and those made by viruses and other infectious microbes. In celiac disease, these genes are involved in an inappropriate immune response to a protein in gluten called gliadin.
• Does stress cause celiac disease?
There's evidence stress may play a role in autoimmune disorders including celiac disease. In one study, people with celiac disease reported experiencing a stressful life event a year before they were diagnosed. Pregnancy, for example, was a significant stressor.
• What causes celiac disease in adults?
The pathophysiology of celiac disease is the same in adults as in children: irreparable damage to the small intestine. However, when celiac disease develops in an adult, the symptoms are likely to be different than those of a child. For example, celiac disease causes diarrhea in only a third of people who develop the condition as an adult.
• What triggers celiac disease?
For someone who has a predisposition to celiac disease, eating foods that contain gluten will damage the cilia of the small intestine. Over time, this damage will bring on symptoms of celiac disease.
• What foods cause celiac disease?
Any food containing gluten can cause celiac disease. Bread, pasta, pizza, and other foods made with wheat or other grains are the most familiar sources of gluten, but gluten turns up in less obvious foods as well, such as malt (in beer and vinegar) and brewer's yeast. Gluten is also found in non-food products including lip balm, vitamins and other nutritional supplements, and play dough.
Was this page helpful?
10 Sources
1. National Center for Advancing Translational Sciences. Celiac disease. Updated December 6, 2017.
2. Admou B, Essaadouni L, Krati K, et al. Atypical celiac disease: from recognizing to managingGastroenterol Res Pract. 2012;2012:637187. doi:10.1155/2012/637187
3. Mashayekhi K, Rostami-Nejad M, Amani D, Rezaei-Tavirani M, Mohaghegh-Shalmani H, Zali MR. A rapid and sensitive assay to identify HLA-DQ2/8 risk alleles for celiac disease using real-time PCR methodGastroenterol Hepatol Bed Bench. 2018;11(3):250–258.
4. Dennis, M. Celiac genes. National Celiac Association.
5. Kasarda DD. Can an increase in celiac disease be attributed to an increase in the gluten content of wheat as a consequence of wheat breeding?J Agric Food Chem. 2013;61(6):1155–1159. doi:10.1021/jf305122s
6. Vajpayee S, Sharma SD, Gupta R, Goyal A, Sharma A. Early infant feeding Practices may influence the onset of symptomatic celiac diseasePediatr Gastroenterol Hepatol Nutr. 2016;19(4):229–235. doi:10.5223/pghn.2016.19.4.229
7. MedlinePlus Genetics. Celiac disease. Aug 18, 2020.
8. Ciacci C, Siniscalchi M, Bucci C, et al. Life events and the onset of celiac disease from a patient's perspectiveNutrients. 2013;5(9):3388-98. doi:10.3390/nu5093388
9. Celiac Disease Foundation. Symptoms of Celiac Disease.
10. Celiac Disease Foundation. Sources of Gluten.
Additional Reading |
Plants, Animals, Water, Soil
What is P.A.W.S
Lesson Plans
1. Acts as liaison between all parties.
2. Establishes an agenda.
3. Obtains presenters for subject matter.
4. Makes sure all activities are coordinated.
5. Insures information is shared with all parties.
6. Acts as a rover on the day of event .
7. On the day of the activity, keep everyone on schedule, adjust to the agenda as necessary, and keep everyone informed of changes.
1. Acts as a role model.
2. Provides students with an opportunity to learn about a subject matter using a hands-on technique.
3. Avoids lecturing.
4. Presents topic matter in an interesting way. Avoids talking over student's heads, and boring them.
5. Provides group activities so all students can participate.
School District Representative
1. Provides students.
2. Provides supervision of students - High School - 1 adult / 10 students, Elementary - 2 adults / 10 students.
3. Provides transportation.
4. Provides liability in case of an accident.
5. Acts as liaison between Coordinator and teachers.
1. Stays with their assigned students at all times.
2. Corrects disruptive or unacceptable student behavior.
3. Sets example for students.
4. Encourages students to participate.
5. Insures students are dressed appropriately.
6. Insures the bus leaves on time to meet after school commitments.
1. Wears clothes appropriate for the weather. Minimum requirements: Socks, sturdy shoes ( No sandals), long pants ( jeans preferable) and long sleeve shirt.
2. Treat the presenters as guests-show an interest in the subject matter be attentive, be respectful and be courteous .
3. Demonstrate a willingness to participate.
Home - What is RC&D? - RC&D Projects - P.A.W.S.-On - Water/Snow Report - Site Map - Contact Us |
Today the world has gone through ample amount of changes. There are numerous inventions of science which have taken the world to an advance stage. The progressive scenario is the nothing but the result of scientific discoveries and inventions. Chemistry is one of the branches of science. There is a high demand of studying chemical engineering among the students. They often choose this stream for doing specialisation as it provides a bright career to the students. Basically, the chemical engineering focuses on the conversion or transformation of raw materials into the end or final products. The chemical technology consists of three separate stages in it. The beginning step involves the treatments of raw materials. Following the first stage the next step comes in the process. In the second stage the chemical reaction plays an important role. The chemical transformation of the raw materials is done in this stage. In the third and final stage the final products are separated from each other. The students who are pursuing the graduate degree in chemical engineering or attending postgraduate programmes can avail the assistance of the experts in their assignments. It is very evident that the students of chemical engineering are assigned with ample amount of practical field work and the project assignments on the respective subject.
Functions of a chemical engineer
There are plenty of jobs that a chemical engineer has to conduct. Those duties of a chemical engineer are stated below,
1. A chemical engineer has to do a vast research on the features of a raw material and what kind of chemical reaction will be conducted by it. All these researches are conducted by the chemical engineer for the sake of improving and developing the manufacturing process. Without a proper research the manufacturing of any particular product may get interrupted or the final product may not be accurate as it was supposed to be.
2. The chemical engineers have to take care of the safety of the workers who are working with the heinous chemicals. The safety caution is very important for the workers failing which the workers may get hurt or injured by any accident.
3. The chemical engineers have be concern about a proper planning and scheduling of the manufacturing steps. The arrangements of the machineries and equipments used for the manufacturing purpose also come under the duty of a chemical engineer.
4. The chemical engineers needs to develop different processes and has to incorporate those in the manufacturing process in order to make it more improved. These processes mainly help in separating the liquid form of materials from the gases and generating the electrical currents.
5. It is very natural that in the manufacturing process various issues and problems may arise. The duty of a chemical engineer is to identify them and resolving all the problems for a fluent workflow.
6. The chemical engineer has to be careful enough about the environmental pollution. They ensure the use of only those equipments in the manufacturing process which will affect the environment very less and the damages will be minimal.
7. Another important function of a chemical engineer is to give an approximate estimation of the product to the management team.
Studying Chemical Engineering
It has mentioned above that studying Chemical Engineering is very popular among the students. It is an appreciable stream for the students who love to study science. It will help them to make their knowledge more vast and polished. In the study of chemical engineering the students has to study other branches of science as well. It is the summation of physical science, mathematics and chemistry. In many cases it also involves the biochemistry and microbiology. The chemical engineering is all about the chemical reaction of the raw materials and their transformation through these reactions. After the completion of the manufacturing process, the final or finished products are very important. These are the products for sell.
All the steps of manufacturing process involve so many things about the chemical engineering. Naturally the several aspects regarding this have to be cover up by the students of chemical engineering in the respective courses. In order to make the knowledge more polished the students have to engulf both the practical and theoretical disciplines regarding the course chemical engineering. DMG Solution is proud to help the students who are pursuing the chemical engineering courses. It provides assistance in doing the assignments and project of the students. With this kind of assistance, DMG Solution raises its helping hand to academic study of the students. The assignments on chemical engineering provided by DMG Solution reduce the workload and stress of study. The students can get relief and trust on the DMG Solution for their chemical engineering assignment help. DMG Solution maintains a consistent record in providing the best service to its clients.
End products of chemical engineering
The end products of the chemical engineering play an important role in our daily life. Most of the daily used products are the result of chemical engineering. These daily life products are manufactured on the basis of chemical reaction of the raw materials with the help of chemical engineering. Some of the products are as follows:
• Toilet Paper
Toilet Paper is an essential thing which is used almost in every household. In the manufacturing of the toilet paper the basic needed material is the new paper or recycled paper. The other essential materials are water and chemicals. The uses of the chemicals are mainly done for the disintegration of the raw materials into fibers. In any case if the recycled paper is used in the manufacturing of the toilet paper then a different process is being followed here. At first all kinds of paper are mixed together and then air is injected in the pulp of paper for the removal of the ink. As the ink particles come at the top of the paper pulp, the ink is being separated from the mixture. In the manufacturing of toilet paper from the new paper follows a separate process. The cut and chipped wood is boiled in a pressure cooker. After the evaporation of excess water the wood takes the shape of pulp and heated for decreasing the moisture. Then it is bleached and finally with the help of some machinery the toilet paper is made.
• Hairspray
The demand of the recent market reveals that a lot of people use the hairspray for attaining several hairstyles. In order to maintain their fashion statement people make use of it. The function of the hairspray is to hold the hairstyle throughout the day. The components used for manufacturing of hairspray are complexed polymers. One of the chemical elements used in hairspray is dimethyl ether gas.
• Toothpaste
Another most important and essential thing is toothpaste which is need of daily routine. Toothpaste helps to prevent the gum infection and protect teeth from cavity. The most crucial ingredient of toothpaste manufacturing is fluoride. It helps to make the teeth strong enough. Among the different kinds of fluoride, sodium fluoride is most commonly used in toothpaste. Foaming agents, binders and abrasives are few more ingredients which are used in the toothpaste manufacturing. The toothpastes are usually manufactured in batch process. There comes around ten thousand tubes in one batch.
Apart from these three products used in daily life there are lots of products that are chemical- based. The end products are manufactured with the help of chemical reaction. It is needless to say that the manufacturing of the chemical products needs a vast knowledge on the chemical engineering and the all the chemical processes that the products goes through. The chemical engineers have to do numerous plans and develop various processes for the development of the manufacturing process of the raw materials. The chemical transformation of the raw materials is important to get the final and end products. All these process demands huge research on the chemical functions and tendencies of raw materials used in the manufacturing process. The chemical engineers have to do a lot of study regarding these matters while pursuing the study course on chemical engineering. DMG Solution provides the helps regarding the assignment of chemical engineering. It also assists the students of chemical engineering students when they face difficulties in doing their assignments.
DMG Solution also takes care of the deadline of the assignments that are to be delivered to the students on time. The aspect of plagiarism is also checked thoroughly after the completion of the job. The plagiarism is checked through some software like The students can claim the plagiarism report by paying an extra amount. The quality of the assignment is maintained from first to last as the writers have specialized degrees in chemical engineering. DMG Solution assures the students about the originality and the quality of the work as there are more than 1000 experts and professors for doing the assignments. Even the students can get in touch with the particular professor who is doing the assignment on chemical engineering for any further assistance in the assignment until the job is done and delivered to the student. |
Modelling benthic invasion by the colonial gastropod Crepidula fornicata and its competition with the bivalve Pecten maximus . 1. A new 0D model for population dynamics of colony-forming species
Type Article
Date 2018-01
Language English
Author(s) Menesguen Alain1, Gregoris Thomas1
Affiliation(s) 1 : IFREMER, Ctr Bretagne, Unite DYNECO, Lab LEBCO, F-29280 Plouzane, France.
Source Ecological Modelling (0304-3800) (Elsevier Science Bv), 2018-01 , Vol. 368 , P. 277-287
DOI 10.1016/j.ecolmodel.2017.12.005
WOS© Times Cited 1
Keyword(s) Crepidula fornicata, Invasive species, Benthic gastropod, Colony model, Matching matrix, Pecten maximus, Competition, Population dynamics, Limit cycle
The north-American marine gastropod Crepidula fornicata (Linné 1758), commonly called slipper limpet, has been introduced accidentally in Great Britain, along with American oysters (Crassostrea virginica) at the end of the 19th century. Its spreading, enhanced by oyster transport and international shipping, turned into invasion of a lot of benthic grounds along the North-European coasts. When local conditions are favorable to larval confinement and adult growth, the invasion by very dense populations may deeply change initially sandy or muddy benthic communities into similar “slipper limpet communities”. Competition for space eliminates several species of native infauna, and hampers the survival of some epibenthic bivalves such as the scallop Pecten maximus. As the clogging of dredges by superabundant slipper limpets drastically limits scallop fishing, some insight in the future distribution and abundance of both species (Crepidula and Pecten) seems necessary, especially in the English Channel where the scallop is intensively harvested. An original model, storing in a “intraspecific matching matrix” the numbers of pairs of aged animals present in the slipper limpet chains, has been developed to take into account the year-class association and stack formation specific to Crepidula fornicata. Then, an “interspecific matching matrix” component has been added to that “intraspecific matching matrix” in order to describe the simple year-class structure of the scallop along with the age distribution of slipper limpets stuck on scallop shells and forming the base of chains. Such a model can explore the dynamics of both populations at a secular time scale. This first part of work details the 0D-behavior of the populations, alone or together, on 1 m2 benthic area. As far as the scallop is concerned, the fact that class 1 cannot recruit in dense populations until the death of old animals has freed some place induces a limit-cycle, with a 11 years period, and a large amplitude. On the contrary, in the case of the slipper limpet, because of the constant possibility for class 1 to recruit on the top of existing colonies, even if the bottom coverage is total, the population reaches a stable steady state abundance, without significant oscillations. Competition for space between the two species does not alter significantly the slipper limpet, whereas it lowers the mean abundance and alters (by damping and slowing down) the limit cycle of the scallop.
Full Text
File Pages Size Access
11 2 MB Access on demand
Author's final draft 34 1 MB Open access
Top of the page |
Digging is not the end of the story, but the beginning...
Dr Mohamed Gamel Rashed discusses the disconnect between artefacts and contextual records.
While many objects are left in their countries of origin, the people who dug them up have kept the records of the excavations in their own archives or have gifted them to institutions that are not of the country of origin. A few of these recipient museums have partially published on these objects, but their archival records largely remain unpublished, separated from the objects that they pertain to.
It's a huge problem for Egyptologists: how to understand objects and their place in the wider context of ancient Egypt without detailed excavation records.
In simple terms: objects separated from their original sites lose meaning. Without context we are severely limited in our ability to understand the significance and function of objects because they can carry less meaning when considered in isolation.
But there is good news. Institutions are increasingly making efforts to consolidate information about their collections, and to document dispersed collections more fully and make them available online.
Some of these projects are huge and difficult to realise, requiring the participation and cooperation of various institutions to complete and document fully. Here's an example of one such project that's on my radar as an alumnus of the University of Manchester:
"The first Archaeological Survey of Nubia (1907-1911) is the subject of a new joint project between the KNH Centre for Biomedical Egyptology at The University of Manchester and the Natural History Museum, London. When it began in 1907, the Archaeological Survey of Nubia represented one of the earliest surveys into the demographics of health and disease in an archaeological population. Under the guidance of Sir Grafton Elliot Smith, the project’s anatomical advisor, around 8000 bodies were carefully excavated, studied and preserved for future generations.
Now, over a hundred years since the survey began, we are seeking to reaffirm the importance of this collection and begin a reinterpretation of the outcomes of the project in light of modern archaeological and palaeopathological research into ancient Nubia.
Since the completion of the survey, the artefacts and related documentation have become widely dispersed, across several continents including Africa, Europe, North America and Australia. This dispersion now poses a significant threat to the collection: as time goes on damage to the artefacts becomes more likely, as does the risk of artefacts being separated from their provenance.
One of the major aims of the current project is to locate the surviving human and animal remains from the Archaeological Survey of Nubia and to bring them back together electronically in an online database. We hope to produce a valuable research resource for those studying the ancient Nubian population, reaffirming the desire of the original excavators to conserve this collection for the future." (http://www.knhcentre.manchester.ac.uk/research/nubiaproject/)
I'm looking forward to more institutions making their records available online for both scholars and an interested public; and for the trend in the analysis and publication of information about the materials they already have in their collections continuing.
By sharing knowledge there is great potential for many more gaps in our understanding about ancient Egypt will be 'filled in' at last.
h/t: @chrisnaunton Christopher Naunton
1. Pues en todos lados los que excavaban o los ladrones de tesoros por conservar solo para ellos distintos objetos, no han permitido que se inventigue correctamente las diferentes culturas antiguas, en América sucede lo mismo, cuando descubren una nueva pirámide primero se llevan todo los tesoros que pueden y ya luego dan a conocer lo que para ellos tiene menos valor. Tan así, que muchos arqueólogos estadounidenses o europeos tiene piezas en sus museos personales.
2. I was in Egypt ! Amazing country !
Ancient Beauty & History !!!!!!
Post a Comment
|
Neural Network vs Students: Who Can Write a Better Essay?
Photo by Andrea Piacquadio from Pexels
Students often find themselves struggling with research, creative writing, essay citations, essay structures, and bibliographies, with some invoking clichés to complete their essays. Neural networks use the principle of artificial intelligence to create software solutions to solve problems.
Some students are now turning to Neural networks for essay writing because they are not confident enough or are not prepared for the task. This blog gives a comparative analysis of neural networks and students and answers the question of who can write a better essay.
How Neural networks operate
Neural networks simulate densely interconnected cells of the brain in a computer system to enable users to recognize patterns and get things right. There is no need to program the network to learn explicitly- it does self-learning just like the human brain.
Neural networks can use AI for writing papers by working traditionally to complete the tasks. The difference between neural networks and the human brain is like the way weather’s computer model differs from sunshine, snowflakes, or clouds. In other words, computer applications constitute mathematical equations and algebraic variables that ate linked together.
When the network is trained with examples, it becomes possible to present it with some inputs to initiate a response. Students are leveraging neural networks such as GPT-3 to enhance essay paper writing despite being tool awkward and vague. In some cases, GP-3 does not provide citations, although it has also resulted in good papers guarantying good grades.
The risk element and human error
Using neural networks to write assignments helps to eliminate human errors that could influence the output. Students can make errors when writing essays due to fatigue or lack of preparedness, so they may end up presenting poor-quality essays.
Neural networks are not prone to errors, especially when well-programmed. They can take decisions from previously available information by using algorithms and machine learning capabilities. This helps to reduce the chances of errors in writing and the system achieves a higher degree of precision. When a student writes an essay, they still need to rely on automated tools to fix grammatical errors and mistakes. Relying on Neural networks is good because it helps in reducing human errors and produces relevant text based on predictions.
Read free essays to improve your writing
If you are one of those students desiring to learn how to write compelling essays, consider a reliable source of inspiration and motivation. Instead of relying on AI for your essays, read some free essays by Eduzaurus to gather insights on how to write. Reading a free essay sample and understanding is a smart way to acquire writing skills and create essays independently. You will be able to have an easier life in college when pursuing education, having known how to use grammar and to structure your essays.
Neural networks make use of expert systems to work without breaks and with higher levels of efficiency. However, learners should be careful not to rely so much on Neural networks; otherwise, it will be difficult for them to learn how to write essays.
The human brain is created to work for some specific number of hours daily with regular breaks in between. They need to create time for relaxation and energizing to become more vibrant and productive.
Quick decisions
Neural networks can do things that human beings do, including writing scientific papers much faster. The networks could help writers, scientists, and editors to scan papers and make some sense of what the papers are about. They can interpret the content in papers to gather data and do research faster than students. In addition to doing research, neural networks could be applied in machine translation, speech recognition, and language processing.
People must analyze different factors, practically and emotionally, before arriving at decisions. Learners take time to analyze essay topics and inquiring from their professors in case they need clarifications.
With proper guidance, students can manage to write essays independently and score high grades. They can do so by finding essay samples for educational purposes on WritingBros to get inspired. The company provides a database of essays covering different subjects in a college or university curriculum. Their purpose is to assist students to succeed in academic writing and attain their degrees in preparation for their careers. By going through the free sample essays, learners will be able to find inspirations and new ideas.
Despite reducing human error, being available 24/7, and making quicker decisions, Neural networks cannot think outside the box. Machines are designed to perform tasks that they are programmed to deal with.
Anything beyond that could crash or yield irrelevant output that may not serve its purpose. The systems also tend to make students lazy due to heavy reliance on them. Students may be addicted to network inventions and this may be a threat to future generations. When learners write essays, they can come up with creative ideas on how to tweak the topic and solve problems. Additionally, they can formulate further topics from the original one and proceed with further research to boost their knowledge.
They can also brainstorm with their peers to generate ideas and solve problems differently. So, in addition to attaining good grades by writing quality papers, they can face real-life situations to solve problems. Developing creative thoughts makes learners more effective in expressing their opinions and thoughts.
Neural networks are not prone to human error, so they can create quality essays for students. They are also available to make decisions faster, meaning that they can complete essays without delays. However, they cannot think outside the box and the heavy reliance on them makes students lazy. Students should weigh the benefits of using Neural networks before deciding to use them in essay writing.
Author’s Bio:
James Collins is a top-rated freelance essay, thesis, homework and term paper writer and has gained success in the writing field in a quick time. His expertise comes from the top writing training programs he attends from time to time. His hobbies include reading superhero comic books and playing beach volleyball.
About the author
David Huner
Add Comment
Click here to post a comment |
Remembering the Iran Hostage Crisis
Logan Holmes, Contributing Writer
JACKSONVILLE, Fla.— It was more than just a spontaneous act of civil disobedience.
The tensions between Iran and the United States have been brewing for decades and over a multitude of issues.
Although oil is one of these reasons, one incident has influenced the world’s perception of Iran since 1979.
The Iran Hostage Crisis from 1979 to 1980 was an incident where American citizens were held captive at the U.S. Embassy in Tehran for 444 days.
“The optics of the crisis, innocent civilians being held captive for 444 days on foreign soil, allowed the beginning of a negative view of Iran to take hold in the United States,” says Anthony Trantham, an assistant professor of political science.
Even now, during the 40th anniversary of the crisis, Iran exceeded the amount of nuclear power previously agreed on in the 2015 Nuclear Iran Deal in opposition to President Trump, says Trantham.
The crisis initially started on Nov. 4, 1979, but the circumstances that led to the crisis began in 1953 with the installation of the Shah, a title for kings or rulers of Iran, backed by the U.S. according to the “Iran Hostage Crisis” article by History.
The U.S. backed the new Shah because he was in favor of nationalizing the country’s oil, which was in the interest of the U.S. at the time.
“When a new leader, Muhammad Mossadegh, wanted to nationalize a large percentage of the county’s petroleum that had been formerly under British and American control, political forces worked to install the Shah, who was much more receptive to U.S. interests,” says Trantham.
Under the new Shah, Mohammad Reza Pahlavi, the Iranian people suffered under a strict dictatorial rule that restricted any form of opposition to his authority.
There was only one place to assemble without fear and that was the mosque. It is here that the Iranian Revolution would begin and would become intertwined with the politics of the time.
“The hostage crisis is part of the bigger Iranian Revolution of 1979, when the Iranian people come together to overthrow the Shah and create a new government that’s organized around Islamic politics,” says Matthew Unangst, who is an assistant professor of history here at JU.
Student demonstration against Iranian students at Miami-Dade Community College during hostage crisis.
It was the harsh treatment of the people that created strong feelings of anger towards the Shah. This anger would shift to the United States after President Carter allowed the Shah to receive medical treatment for progressing cancer in the United States.
After this news was received, students overtook the U.S. Embassy in Tehran, demanding the Shah be returned to Iran.
The hostages would be held for 444 days. Coincidentally, they were released the day of former President Reagan’s inauguration.
The Hostage Crisis did not just affect U.S. Iranian relations but possibly changed the outcome of an election. Many believe this crisis cost President Jimmy Carter his re-election to office in the election of 1980.
“Failed diplomatic efforts and rescue attempts, ‘Operation Eagle Claw,’ by Jimmy Carter allowed the public to perceive the president as ineffective in foreign policy— an area where presidential power is typically quite expansive,” says Trantham.
It may not have been a deciding factor in the election, but it swayed public opinion.
Although Iran already holds a less than favored image in the political view and in that of public opinion, after the timing of the election and the release of the hostages, many speculate it was a planned deal.
While it is not certain whether it was a planned event, since it is just a speculation, this notion still took a toll on their image.
After a recent Revolution, Iran is still trying to navigate international politics as well as their own internal politics.
“For diplomacy more generally, Iran is still this kind of Pariah state that other countries are trying to figure out how to negotiate,” says Unangst.
In the future, Iran may become more of a solidified power on the world stage.
As for relations between the United States and Iran, the question of what is the best outcome for this relationship remains.
“A state of simple coexistence may be the most optimistic outcome,” says Trantham. “The thawing of relations between the two countries does not appear likely in the short-term, as the Trump administration has spent much of this year continually threatening to impose new sanctions on Iran.” |
Alpha particle
Alpha fragment \(\alpha\) - is a helium nucleus, 2 protons and two neutrons. It has a huge mass, moment-g.commpared to other ionising radiations, and also a strong positive charge.
You are watching: Which type of emission has the highest penetrating power
Beta particle
Beta fragment \(\beta\) - is a rapid moving electron. It has a very tiny mass and a an unfavorable charge.
Gamma ray
Gamma beam \(\gamma\) - is a high-energy electromagnetic wave. Gamma light ray are resulted in by alters within the nucleus. Lock are part of the electromagnetic spectrum and so travel at the speed of light. They have actually no mass and also no charge.
Penetrating power
Each type of radiation has a different capacity to permeate materials. The material is said to have took in the radiation.
Alpha radiation stopped by paper, beta radiation passes through record but quit by aluminium, gamma radiation passes through document and aluminium however stopped through lead.
The power of the 3 radiations is took in by the material through i beg your pardon the radiation passes. The amount of energy which is took in depends on the form of radiation and the form of the absorbing material.
Beta radiation is more penetrating than alpha radiation. It have the right to pass through the skin, however it is absorbed by a few centimetres of body organization or a couple of millimetres the aluminium.Gamma radiation is the many penetrating the the 3 radiations. The can conveniently penetrate body tissue. It calls for several centimetres of lead or around 1 metre the moment-g.comncrete come absorb it.The table below shows the properties of each kind of ionising radiationRadiationRange (cm)Ionising powerCan pass with paper?Can pass v 5mm of aluminiumCan pass v 5cm the lead?Electrical ar deflection
Alpha3-5Highly ionisingNoNoNoDeflected towards an adverse plate
Betaabout 15IonisingYesNoNoDeflected towards hopeful plate
Gammamuch longerWeakly ionisingYesYesNo - although some will still acquire throughNone
Each kind of radiation is caused by a decay (either voluntarily - herbal - or induced - a reaction has caused the decay).
See more: Five Letter Words That Start With Q And End With H Q And Ending In H
The nuclei of some atoms space unstable, and will naturally undergo 'radioactive decay'. This reasons the release of ionising radiation which permits the nucleus to bemoment-g.comme an ext stable. |
Pre zlepšovanie vášho zážitku na našich stránkach používame cookies. OK
/ /
Men and women- differencies
This accounts for women's ability to have better verbal skills and intuition. Men, on the other hand, have greater brain hemisphere separation, which explains their skills for abstract reasoning and visual-spatial intelligence. Different habits of men and women are explained by different roles in the process of evolution. Although life conditions have changed, both men and women tend to follow their biological programs.
Men tend to retain a firm sense of direction – they need to trace the game, catch it, and find the way home, while women have a better peripheral vision that helps them to see what’s happening around the house, to spot an approaching danger, to notice changes in the children’s behavior and appearance. Men’s brains are programmed to hunting, which explains their narrow range of vision, while women’s brains are able to decipher a wider range of information When entering a room, men look for exits, estimating a possible threat, and ways of escape, while women pay attention to the guests’ faces to find out who they are and how they feel. Men are able to sort out information and archive it in their head. Women tend to ‘rewind’ the information over and over again.
The only way to stop thinking of the problems is to talk it over. When a woman shares her problems with a man, she is not looking for solutions – she needs someone to listen to her. Men prefer strident noises, hard handshakes, and red color. They are better at solving technical problems. Women have a sharper ear, they use more words while talking, and are better at completing tasks independently.
Based on these biologically explained differences, some psychological distinctions between men and women can be established: - Men grasp a situation as a whole and think globally, while women think locally, relying on details and nuances. - Men are builders and creators. They take risks and experiment, while women select the most valuable knowledge and pass it over to the next generation. - Women’s self-appraisal is lower than that of men. Women tend to criticize themselves, while men are more satisfied with their own performance. - Men and women have different sources of satisfaction.
For men it’s career and prosperity, while women value family and kids. - Men have a pronounced need to fulfill their goals, and women rank relationships with others first. - Men get sick twice as often as women, although women tend to be more concerned about their health. - Women endure pain and monotonous work better than men. All the above gets even more confusing, if we take into account that 15 to 20% of men happen to have a female type of brains, and about 10% of women have a male type of brains, which means that some percentage of men and women, no matter how small it seems, are partially programmed to the behavior and way of thinking of the opposite gender.
Women are better than men at remembering the appearance of others, a new study shows. Women are nearly five times more likely to show an automatic preference for their own gender than men are to show such favoritism for their own gender, according to a study in the October issue of the Journal of Personality and Social Psychology.
Pridať k obľúbeným
Poslať referát
Kľúčové slová
men women |
Project OutFox Wiki
Anatomy of a screen
A screen generarly consists of 4 separate elements, and 3 special transitional elements, which are its layers. These can contain any kind of object, so they can be Lua scripts, images, video, you name it. These follow a draw order rule to display them.
From draw on top to last (Marked red are the transition-specific layers):
graph LR
In:::Transition --> Out:::Transition --> Cancel:::Transition --> Decorations --> Overlay --> Underlay --> Background;
classDef Transition fill:#f55
To create a file for a specific layer, just name the file as [ScreenName] [layer kind], so for example a Lua file that will control the Overlay layer from ScreenTitleMenu.
ScreenTitleMenu overlay.lua
An important thing to mention with screen layers is: every layer MUST return a table. This is needed so the screen manager can create the screen, so either an empty table or an ActorFrame with any kind of content will do. For in-depth information on how to create an ActorFrame base, check ActorFrames and how to build them.
Due to this draw order, keep in mind that objects created on higher levels will always be shown first before the others.
This layering rule also has rules on how objects behave on those layers, with Decorations being the one more reserved for specific elements.
Background Layer
The lowest drawn layer, being the first drawn. Can be used to elements that will contain visual glare for movement. A rule for this layer is its method for loading, which is cached. This means that any moment that changes are applied, they will not be shown until the user goes to a different screen that does not contain the same background file.
Underlay / Overlay
The middle layers, where most objects will reside. This can be used for main elements that the user can interact with, or crucial information. No special rules are in these layers, so they can used for all general Lua scripting.
A specifically-visual layer, where objects can be placed for decorations. Most actions are limited on this layer:
• Lua based input is not available on this layer, as no input is ever sent.
• Transitional commands are not allowed. Instead, only the initial Init, On and Off commands are allowed.
In / Out / Cancel
Pure visual layers that serve as entrace, exit and backing out of a screen respectively. They are run as soon as the screen has to perform a change that will end up unloading itself.
• For Cancel, the transition command to run the animation uses StartTransitioningCommand. Using OnCommand or InitCommand will make the animation run as soon as the screen is loaded. |
Though the hot topics of automated vehicles, fintech apps and artificial intelligence are game-changing, below the surface is where we find what is revolutionary. It’s called the blockchain.
Wait, don’t go! Let’s try to explain
On top of being such a cool term to say out loud, it’s even cooler when you actually know what it is and how it works. So, let’s try to get on the same page.
Blockchain is popularly used as the foundation for digital currency, such as Bitcoin and Ethereum. To give a faint comparison: Blockchain is to Bitcoin like the Internet is to Facebook.
Blockchain is a database that is publicly shared and maintained by a large network of computers through a cryptographic mechanism. This mechanism is used to give the thumbs up (or thumbs down) on transactions within that database. For digital currencies, that database is a ledger that is shared between all nodes participating in the digital currency network verifying every transaction that happens.
Remember when our parents or grandparents would sit at the kitchen table with their checkbooks open balancing their checkbooks? Now, imagine there is a web of computers that all have access to this same ledger, kind of like a Google Doc, making sure that all the transactions are correct and true. It’s like having a notary present with every Bitcoin transaction.
These transactions are all grouped into “blocks” and are protected with complex encryption technology. Anonymous folk in the network with high levels of computing power, called miners, then compete to verify these transactions by solving the complex coded problems. The first to solve them is rewarded. For example, in the Bitcoin network, they receive Bitcoins as rewards.
After the block of transactions have been verified by the miners, they are timestamped and thrown into a chain in chronological order that are connected to older blocks. This way, everyone knows who paid who, who received what, and when it all went down. It’s like the Venmo newsfeed, where you see all the transactions your friends did, except it’s everyone in the network, and all the transactions have been verified by strangers with high-capacity computers. Keep in mind, this is all instantaneous as there are currently 6,793 nodes making this happen.
OK, here’s a video if you still don’t get it.
The new kids on the block
In the paper-money world, we all know that our money doesn’t physically sit in the bank. It goes off in the form of loans to strangers that need money. Crazy, right? So, when we give our money to the bank, we inherently trust them to keep an accurate ledger so that our money doesn’t get lost somewhere. The bank, namely the Federal Reserve, is a middleman that facilitates and verifies transactions of some people giving money to others and keeping track of it.
What’s revolutionary about the blockchain mechanism is that this middleman is decentralized and virtually impossible to defraud, unlike a bank, which is centralized and managed behind closed doors. By storing the encrypted data publicly across its network, the blockchain lacks the centralized points of entry in which hackers can easily exploit and needs consensus of the network to approve anything that’s happening. No trickery is possible.
This enhanced digital security is appealing in the modern economy. Blockchain will be applied in sectors way beyond just the transfer of digital currencies. We will soon see it embedded in education, healthcare, real estate and the public sector to protect, store and transfer information with each other.
It’s not terribly important to understand the minute details of blockchain technology. However, understanding the main gist of blockchain can be helpful.
Blockchain, like other technologies, are meant to make life a little bit better and cheaper for consumers. The decentralized aspect of the technology will decrease the cost of doing business with other people by getting rid of centralized middlemen like a government agency or a big bank. What’s more is that we can find comfort in knowing that this technology not only makes transactions between people more efficient, but it makes it safer. With the rising concern of cybersecurity in a highly digital interconnected world, everyone in the network is essentially a watchdog.
What blockchain really brings to the table is a better way for people to trust each other when engaging in any kind of business. That, in and of itself, is revolutionary.
Previously posted at GenFKD.
Leave a Reply
|
4a // Citadel Hill
4 // Citadel Hill
5410 Spring Garden Rd., Halifax
// Hartung + Trenz
// Caitlind Brown + Wayne Garrett
Citadel Hill is a hill that is a National Historic Site in Halifax, Nova Scotia, Canada. Four fortifications have been constructed on Citadel Hill since 1749, and were referred to as Fort George—but only the third fort (built between 1794 and 1800) was officially named Fort George. General Orders of October 20, 1798, ordered it named after Prince Edward’s father, King George III. The first two and the fourth and current fort, were officially called the Halifax Citadel. The last is a concrete star fort.
The Citadel is the fortified summit of Citadel Hill. The hill was first fortified in 1749, the year that the English founded the town of Halifax. Those fortifications were successively rebuilt to defend the town from various enemies. Construction and leveling have lowered the summit by ten to twelve metres. While never attacked, the Citadel was long the keystone to defence of the strategically important Halifax Harbour and its Royal Navy Dockyard.
Today, Parks Canada operates the site as the Halifax Citadel National Historic Site of Canada and has restored the fort to its appearance when built in the Victorian era. |
Brainstorming is basically a technique used to create creative ideas or ” out of the box ” through cooperation. It usually happens when two or more people sit down and think about a single idea, then different though related ideas come together. However, even people can brainstorm by themselves, which is particularly useful in creative writing.
Ask Your Question?
The brainstorming idea was first developed by a Madison Avenue, New York advertising executive: Alex Osborn. Osborn introduced a new creative method in his book Applied Imagination to find innovative solutions to problems in a company. Osborn described this new idea as ” using the brain to overcome a creative problem, ” in which everyone focuses on a single problem and works together to find a solution. The gradual common use of the word we know today as ” brainstorming ” came from the infancy of storming a problem with one’s brain.
Brainstorming is one of the most common forms of the invention of informal ideas. Brainstorming is useful in many situations in which creative, cognitive thinking is necessary. Whether you come up with an idea for a new product for your company or you want a concept for your next oil painting, this article can help you to make these creative juices flow.
Warm up
Don’t just try a cold start to brainstorm. This is like first breaking into a complete run without a light jog! Do a quick exercise that gets your head in that space, such as a menu for dinners next week, or comes up with a wish list of things you would like to do at work, in school or whatever you do.
Change your perspective.
Put yourself in your competitor’s shoes, look at what you’re doing now and see how to be better than you are. How are they going to look at what you do and do better? What were they going to change? Where are you going next?
Implement roadblocks
Giving yourself new roadblocks to achieving your objectives, such as a lower budget, a new deadline or a specific material, can make you more creative and innovative. You might even have an idea if you couldn’t get one before.
Mind maps
Mind maps are one of the most popular brainstorming methods. Where you write an idea (or more!) on a notecard. Pin the note card against a wall and build on the idea. Write down every little thing you think about and get the ideas connected.
READ ALSO: Short Essay on First Aid for Children
Create categories of ideas.
Create three categories: simple ideas, hard ideas and insane ideas. Try to find a minimum of five ideas for each category. Usually, when we come up with ideas that we don’t think we can or should n’t really do, we have ideas that we can actually use.
Write up
Write a poem, a review or an analysis. Write a poem describing what you are trying to do. You can also write a theoretical analysis or review what you want to do. By describing what you hope to get out of the project, you can think more easily about how to do it.
Innovate Old Techniques
Bring an old technique into a new age. Take a long time ago something you did and find a way to update it. You can also take old concepts and find a way to bring them into this age. Twitter was essential telegraphs for the Internet, for example. Some of the most popular products use classic designs nowadays.
Use an online idea generator.
Online idea generators can help you get started even if they are only used as a warm-up. Do not feel burdened or attached to the ideas it gives you, but try to use them as a way out. Try this:
Keep asking questions.
Questions always. Ask yourself questions. Ask the people with whom you brainstorm. Ask your friends and family members questions. Questions really lead us to think about things we could have glazed in our minds. Put detailed questions and questions at the heart of the problem. And don’t go for the obvious, short answer.
Brainstorming techniques
Why should I paint with oils?
Why is my customer looking for this product?
You can even add these issues to your mind map. You’re not going to have all the answers yet, because you’re just starting your project, but you can plot your ideas.
Don’t waste time.
There are lots of small exercises that can be very useful, like mind maps. But they’re also a distraction a lot of time and can keep you from really getting a job done. Do not waste too much time on brainstorming and try to get into business as soon as possible.
Free Writing
Free writing is where you begin to write and you just don’t stop. This also involves a free association, in which you naturally follow the course your thoughts take rather than trying to direct the current. Just write a sentence about the subject you are trying to brainstorm and then follow your brain and write down every word that ambulates through your internal dialogue without stopping thinking. You never know where you’re going to be!
READ ALSO: Essay on The Butterfly for Children and Students
More Techniques Of Brainstorming
Look at your objective. Think about what you want to achieve before you look at what you want to do. This can give you a good starting point at the end of the tunnel, a kind of light.
Would you like to brainstorm your business?
Are you trying to make a big choice or change your life?
Are you seeking an idea for your next work of art?
Perhaps you’re trying to get an idea for an article you’ve got to write?
Understand any requirements. If you have a teacher, boss, customer or someone who evaluates your work, find out what you expect or need. If not, just think about the limits within which you have to work and what the end product should achieve. Although breaking requirements can sometimes lead to better experience and a finished product, knowing all the limitations gives you a good framework to get started.
For instance, have you to keep to a certain budget?
Do you only need certain materials?
Should the project be completed by a certain time?
Do you need more research to better understand the project’s needs and limitations?
List your assumptions and evaluate them. You will, of course, assume some things about your project.
What people are seeking?
What are your constraints?
What is normal or acceptable?
What should it look like in general?
List these assumptions so you can spend time on them. For example, with an art project, we could assume that people are looking for a specific colour scheme that corresponds to a gallery show theme.
For a business project, we could assume that customers want something that the product of our competitor doesn’t provide. If you focus on changing your life, list the things you want to change and why. This can help you reach the heart of what you want or really need.
Evaluate what you have to work with. Look hard at what you’ve done in the past, what you’ve already done and what resources you have at your disposal. This will help you to work with some limits.
What types of tools do you use?
What materials or people you haven’t used in a long time?
What you tried last year and how might it be better.
READ ALSO: Kill Bill Hides a Male Adolescent Taste for Violence
Do some research. Do some research on what people have done with similar projects. In this adventure, Google is your friend. You should not check what other people are doing to copy them. You should instead see where your ideas are short or what parts of your project might fit into yours.
Some Brainstorming Techniques 1
Look at what the innovators do. When you see what run-of-the-mill people do, see what the innovators do. Seek the cutting – edge ideas and techniques with which other people experiment. You might want to experiment similarly! This innovation can distinguish you and make what you are doing unique, memorable and attractive.
Go somewhere. Take out your routine environment. This is one of the great ways to break away from the standard creation loop and think about things you never had before thought of. Take a walk, visit a local artisan or farmer’s market or work in a café for a while. Any change in the environment can help you think in different ways.
Keep a diary next to your bed. Keep a diary near your bed. You can also keep a waterproof note in your shower area. Good ideas often sneak on us when we do these other activities, but then get lost when we distract ourselves from anything else we do. With a pen and paper nearby, you can quickly pick up the things you think about before they fly away!
Take breaks! It is important to take breaks in order to avoid negative response loops. Many times, when you think and come up with nothing, you focus too much on the fact that you don’t come up with anything, making it impossible to think really. Try a healthy snack, catch a coworker or do a quick job (such as cleaning up your dinner mess).
Shut out criticism. Criticism is not helpful during the brainstorming process. You will need the freedom of minimal borders to come up with new ideas. For once you have a long list of options, leave criticism. If you brainstorm with others, you may need to remind some people to hold negative opinions until the brainstorming activity is complete.
Try to put your brainstorming together as your time to gather new ideas and materials. You can and should sort them out later, but just allow your brainstorming time to take them.
Ask Your Question?
Have something to say
|
What’s the big deal about the pairing of two people with opposite sexual identities? Since the Supreme Court now requires same-sex couples to be married just like opposite sexed couples, what’s the big deal about the sexuality of couples anyhow? Actually it’s surprising no one has asked that question so it’s no surprise there’s no answer either. No answer until now, that is.
Heterosexuals are half of a pair. That’s quite a bit different than having two gay people each of whom can offer the gay perspective but neither can offer the opposite one. Lets not get in the weeds about gay’s having a dominant and a submissive. Those are gay positions. Hetero’s on the other hand can learn from the opposite sex. Perhaps that’s the reason nature required two different sexes to mate. Gays can’t mate. They can have a different kind of intercourse but they cannot mate. They do not mate and intrinsically they cannot mate. Nature took care of that.
Look. Being gay is not a choice. Neither is being straight. And it’s not just the difference between same and opposite partners. The most opposite gay couple is far more similar than any hetero couple. Male-male is close. Male-female is opposite. That’s just the way nature did it.
Here’s an example. A gay couple goes to the opera. Presume they are well bonded. They have two different male reactions to the opera. Compare that to a hetero couple. They have a different set of reactions to the opera. The male uses the male attributes to analyse the opera. The female does the opposite. She brings the female set of attributes. Two gay people cannot do that. They can only bring the attributes of a male because gay men are men. It’s not that one way is right or one way is better. They are vastly different.
How different? Take the more masculine of the gay couple. Since that individual is gay, the full set of male attributes is somewhat changed to include some female attributes. Same for the submissive gay partner who has presumably more female attributes than the dominant male partner who has fewer female attributes. Compare that to a hetero couple where the male partner has no female attributes. that’s in the definition and the nature of a human male. The opposite holds for the hetero female. No masculine traits.
Well, you say there are plenty of hetero’s who exhibit some attributes of the opposite sex. Yes but. the but is a big exception. A male who has feminine attributes remains a male while a gay male has a very different set of attributes. That is after all why a gay male is identified as gay. Gay is not hetero and hetero is not gay regardless of how far in the direction of the opposite sex the hetero’s attributes go.
It’s explained by the bell curve that summarizes the sexuality of a large sample of people. At one end would be gay’s and at the opposite end would be hetero’s. Most of the population would be in the middle meaning somewhere between the extremes but a clear division exists between gay males and hetero males.
According to wikipedia, about 5% of the population is gay and slightly more than 5% is lesbian. That means 95% of the males are heterosexual. Nature does that. So nature makes the number of hetero’s far, far greater than the number of gay men. That means nature favors heterosexuality by a huge amount. Note the absence of morality in figuring out the difference between homo and heterosexuality. Morality is not the correct way to evaluate homosexuality. That also means religion should not be involved with homosexual practices because sexuality is an attribute of nature, not a gift from a deity pr a matter for philosophy. It’s strictly nature. It also nature that’s the graveman for identifying the attributes of males and females.
There is no such thing as a third sex, at least not until one becomes apparent at the birth of each baby. Yes there are abnormalities but the abnormalities about sexuality are insignificant. It’s either male of female. There’s no third sex.
Hits: 33 |
Gold Reserves & Money
Gold Reserves & Money
HostIan Punnett
GuestsAndrew Gause, Peter Bogdanovich
Monetary historian Andy Gause joined Ian Punnett to talk about America's gold reserves, which are reportedly stored at Fort Knox and other secure facilities. Texas Rep. Ron Paul has recently called for an independent audit of the country's estimated 260 million ounces of gold (related article). According to Gause, the issue is not how much gold is stored in places like Fort Knox, but who actually owns it. He believes an audit would show the bulk of U.S. gold reserves is 'encumbered,' which essentially means it has been pledged to someone else. "[The Federal Reserve Bank of New York has] used some of the gold that's really earmarked for belonging to the national gold reserve in order to prop up their increasingly diluted money supply," he suggested.
When the gold reserve was first established, there was .25 cents worth of gold for every dollar in circulation, Gause explained, noting that the government was required to increase their gold reserves whenever they increased the money supply. So much money has been pumped into the system since then that the current ratio is only .025 cents for every dollar, he added. But why should this matter for a currency no longer tied to gold? Gause believes gold provides the nation with a basic level of economic protection in case of an international currency crisis. However, if the gold in Fort Knox no longer belongs to America, this protection is lost, he said.
Gause recommended individuals buy U.S. Mint issued gold coins as a means of protecting their own wealth against currency falls caused by the continuous printing of fiat money. He expects the Fed will soon need to double the money supply and halve the value of the dollar in order to effect a statistical recovery. Gause predicted robust economic activity within the next five years due to the new money in circulation and programs designed to eliminate consumer/mortgage debt. He also commented on the a proposed North American currency called the 'Amero', advocated the purchase of silver coins, and warned against a potential government confiscation of gold, similar to what occurred in the 1930s.
Film Talk with Peter Bogdanovich
In the first hour, Ian spoke with acclaimed filmmaker, critic, and teacher Peter Bogdanovich about his career and trends in movie making. Bogdanovich said he learned the craft by watching several thousand movies during the period between ages twelve and thirty. He commented on the seeming dearth of quality contemporary films, noting that effects-driven escapist movies with weak story lines almost completely dominate the cinematic landscape. "I think there are kids today who have never seen a good [classic] movie," Bogdanovich lamented. He briefly discussed shooting on film versus digital video, fast cut editing, and the current 3D movie fad. He also spoke about his work on The Last Picture Show, They All Laughed, and Noises Off, as well as his appearance in the movie Abandoned, the last film made by actress Brittany Murphy before her untimely death.
Related Articles:
The United States Bullion Depository, commonly referred to as Fort Knox, is considered among the most secure facilities in the world. It is thought to contain more than $100 billion in gold reserves. A video clip from history.com takes a peek inside, using eyewitness reports and information from other sources to reveal the secrets of this heavily guarded structure.
Bumper Music: |
Environmental Change Institute, University of Oxford
Pathways to a Zero Carbon Oxfordshire
Photo by Simon Godfrey on Unsplash
Tackling climate change has become an urgent priority for governments, businesses and citizens around the world. In 2019, the UK Parliament passed legislation committing to a target of net-zero carbon emissions by 2050. In response, local authorities around the country have been scaling up their ambitions to tackle climate change. In Oxfordshire, all local authorities have acknowledged and responded to the climate emergency, and are developing plans to achieve net-zero carbon emissions by 2050 or sooner.
A consortium of local stakeholders, including Oxfordshire Local Enterprise Partnership and all six local authorities asked the ECI to investigate how the county can eradicate carbon emissions from its economy.
Produced in collaboration with Bioregional and colleagues from the Transport Studies Unit and Engineering Department, the Pathways to a Zero Carbon Oxfordshire report begins by reviewing recent progress on climate goals. It highlights successes in decarbonising electricity and reducing energy demand over the last decade - a period which has seen rapid economic and population growth in the county. It also showcases the considerable sustainability expertise that exists in Oxfordshire, underpinned by a thriving world-class innovation ecosystem.
This report addresses the question of how Oxfordshire can sustain the momentum of the last decade to achieve net-zero emissions. There remains a significant way to go to decarbonise transport, reduce reliance on fossil fuels for heating, and protect and enhance carbon stored in the natural environment. Maintaining the same rate of emissions reduction in Oxfordshire will require relatively greater investment locally, in building retrofit, cleaner heating systems and electric vehicles; and cultural and behavioural changes such as active travel, dietary changes and reduced energy demand.
Our analysis shows that there are different routes to net-zero, and in presenting scenarios for the next three decades, the report outlines three distinct pathways to eradicating emissions from the economy.
Project details |
Earthworms might be a little harmless for your bearded dragon. However, they carry a wide variety of parasites and bacteria such as Platyhelminthes, Protozoa and Nematodes. Such microscopic creatures can harm a bearded dragon’s intestines and they could even lead to severe ailments that can lead to your bearded dragon’s demise. So, in case you’re thinking, ‘can bearded dragons eat earthworms‘, the answer is yes!
Bearded dragons can definitely eat earthworms, but it’s not really wise to give your dragon earthworms. Moreover, it’s never a great idea to provide bearded dragon insects to them as they have been collected from your backyard or the wild. Make sure to continue reading the article to get all the information about the reasons why you should not give earthworms to bearded dragons.
Some alternatives of earthworms include:
Other than worms, ask your local pet stores for what insects they have in stock for bearded dragons other than earthworms. Some famous food treats for bearded dragons are:
1. Mealworms
2. Crickets and dubia roaches
can leopard geckos eat earthworms
You can also give them fruit treats along with their regular green vegetables as a treat? The fruit options include:
1. Apples and strawberry
2. Grapes
3. Bell peppers
Finally, some dragon owners provide their bearded dragons with even larger prey, including baby mice and smaller lizards directly from the pet store. These are their special treats for thanksgiving, birthdays, and for days when they behave nicely.
The answer to this question is a NO. The geckos won’t really get hurt by ingesting the earthworms, but they will definitely turn their noses to them as they won’t really like the taste. The geckos do not love the fact that earthworms secrete when they are pressurized and they would definitely deny eating it. In case you wish to feed your leopard gecko with an earthworm, remember to not pick the ones that you have found in the wild or in your backyard. Earthworms that you have found in nature might have contacted certain heavy metals and chemicals and could be very injurious to your pet.
Also, you should also be extra careful about the fact that earthworms in nature consume huge amounts of organic materials. They consume almost everything, and some of those things might have been infected with bacteria, parasites, mold, and more.
Some Alternatives To Earthworms for Geckos are:
• Crickets are a great alternative for leopard geckos. You can easily seek them at any of the pet stores, as reptiles love crickets. You have to feed a lot of insects to them before you give them to your geckos. It is a procedure that lets you provide your geckos the maximum number of nutrients and proteins to your reptile pet as they consume it. You can do so by providing the crickets with a favorable cricket food, or a good slice of potato
• Waxworms and Mealworms are also a good option for leos. All you are required to do is put the mealworms into a feeding dish. And then let your leopard gecko eat them whenever they feel hungry. You just need to ensure that the bowl is clean and smooth so that the mealworms cannot try to go away
When your bearded dragons are 18 months old or more, they clearly know how to digest those mealworms properly. But during this time, your dragons should consume more green vegetables as compared to the times when they were young. So, one can definitely give them mealworms once every week and you can even blend mealworms with their regular meals.
Mealworms can not be included in your dragon’s regular diet. Adult dragons can easily eat 4 to 6 mealworms every meal but not regularly. Giving bearded dragons with huge amounts of mealworms makes them fat. However, female dragons who are pregnant can be offered more food than normal.
Well, super worms are very healthy and nutritious for bearded dragons. They are very rich in proteins and hydration. But, make sure to feed them in limited quantities as the phosphorus and fat content can be a matter of concern. They can be your beardie’s favorite treat if given in the right quantity. Some benefits of super worms for dragons are:
• Bearded dragons love to munch on super worms. Hence, they can be utilized to lure these picky eaters to consume their greens properly, and they’re also a great way to feed your pet with a special treat. However, due to their fat richness, they can be used to help the undernourished dragons to put on some healthy weight
• With 50% moisture, super worms are an amazing source of hydration for your pet dragon. Good hydration channel can assist in preventing diarrhea, gut impaction, dehydration, and other serious ailments present
• Super worms contain a lot of calcium and phosphorus. Moreover, they have about 13 times more phosphorus as compared to calcium. This can create a serious health risk for your pet dragons
Pro Tip: To stop gut impaction of your dragon caused due to the exoskeleton buildup, ensure that the feeder insects are not closer to your bearded dragon’s eyes.
superworms for bearded dragons
Before feeding super worms to your bearded dragons, clean them with calcium powder first, as it’s a great habit to practice any time before you provide your dragon with live insects. To give super worms to your bearded dragon, you are required to utilize tweezers and then feed them one after one, or you can simply put them into the feeding bowl. As an owner, you can also put the super worms in a trap so that your pet bearded dragon can easily hunt them. However, do not let the worms roam here or there as super worms can easily and quickly hide themselves in the substrate present and it can be then super tough to find them.
The only goal is to create a happy and a peaceful life for your pets. Show them how much you actually care for them.
Please follow and like us: |
The English Civil War was a seventeenth-century battle between the Parliamentarians and the Royals over the future of England’s government and the degree to which the monarchy and representatives would hold power.
Click here to see more posts in this category. Scroll down to see more articles about the figures involved in the English Civil War, the most important battles, and the weapons used.
Below is a comprehensive English Civil War timeline, featuring the events leading up to the war, the most important battles, and the events signaling the end of the war.
13th June 1625 King Charles Marries King Charles I married Henrietta Maria, daughter of Henry IV of France at St Augustine’s Church, Canterbury, Kent. The marriage was not popular because she was a Catholic.
May 1626 Parliament Dismissed Parliament were unhappy with the activities of Charles’ chief minister, George Villiers, 1st Duke of Buckingham. Buckingham had led a failed mission to Cadiz and it appeared that he was planning to help the French to put down the Protestant Huguenot uprising. Parliament moved to have Buckingham dismissed from office. Charles retaliated by dismissing parliament.
13th March Parliament Recalled Charles needed money to finance the war with France and Spain and reluctantly recalled Parliament.
1628 Thirty-Nine Articles Charles re-issued the Thirty Nine Articles into the Church of England. This was seen as a move towards Rome and evidence of the King’s Catholic leanings.
7th June 1628 Petition of Right Parliament formed a committee of grievances and prepared a Petition of Right which was presented to the King. The Petition was designed to protect subjects from any further taxation unauthorised by Parliament.
Charles signed the document reluctantly.
22nd August 1628 Buckingham Assassinated George Villiers, 1st Duke of Buckingham, was stabbed to death by naval lieutenant John Felton.
March 1629 The Three Resolutions There were outbursts in Parliament when the Petition of Right was debated and the doors were locked to keep royal guards out. The Speaker, who wanted to adjourn the proceedings, was held in his chair. Parliament passed three resolutions:
1.That they would condemn any move to change religion.
2. That they would condemn any taxation levied without Parliament’s authority.
3. That any merchant who paid ‘illegal’ taxes betrayed the liberty of England.
Charles dismissed Parliament.
March 1629 MPs Arrested Charles arrested nine members of the Commons for offences against the state. Three were imprisoned. This action by the King made him more unpopular. The King, defended his action by stating his belief in his own divine right saying that ‘Princes are not bound to give account of their actions, but to God alone.’
1632 Thomas Wentworth Known as ‘Black Tom Tyrant’ by the Irish, Thomas Wentworth, Lord Deputy of Ireland, ruled Ireland with a firm hand. However, his rule alienated the planters of Ulster and antagonised the landowners of Connaught.
August 1633 Archbishop Laud Charles appointed William Laud as Archbishop of Canterbury. Laud was known to have Catholic leanings and Charles hoped that his appointment would help to stop the rise of the Puritans.
18 June 1633 King of Scotland Charles was crowned King of Scotland at Holyrood Abbey, Edinburgh.
1634 – 1636 Ship Money This tax was paid by coastal towns to pay for the upkeep of the Royal Navy. In a bid to raise more money, Charles now imposed the tax on inland towns as well.
June 1638 Ship Money John Hampden, challenged the King’s right to impose such a tax but he lost the case and the court ruled that the King was the only authority that could impose such a tax.
February 1638 National Covenant and Book of Common Prayer Charles demanded that the Book of Common Prayer be used in the Scottish Kirk. The Calvinist-dominated Scottish church resisted the move. There were riots and a National Covenant was formed which protested against any religious interference in Scotland by England. The Scottish Kirk was so incensed that it expelled the Bishops installed in Scotland by James I.
1639 Pacification of Berwick Thomas Wentworth’s had led a scratch army against the Scots but had been defeated on the border and had been forced to sign a temporary truce at Berwick. Wentworth told the King that in order to raise an efficient army he must recall Parliament. Charles, who had enjoyed his eleven years tyranny, was forced to recall Parliament.
13th April 1640 Short Parliament The new Parliament refused to authorise any new taxes until the King agreed to abandon ‘ship money’. The King said that he would only abandon ship money if Parliament would grant him enough money to re-open the war with Scotland. Parliament refused and was dismissed after three weeks.
1640 Oliver Cromwell Oliver Cromwell was elected to Parliament for the second time. He openly criticised Charles taxes and the level of corruption in the Church of England.
Oct 1640 Scotland Thomas Wentworth, Earl of Strafford, set out for the Scottish border with a makeshift army. However, the army mutinied and the Scots seized English land. The Scots demanded a daily rate be paid until a satisfactory treaty was put in place.
21 Oct 1640 Treaty of Ripon This treaty between Scotland and England allowed the Scots to stay in Durham and Northumberland until a final settlement was concluded.
Nov 1640 Long Parliament Charles had to have money to pay for an efficient army with which to defeat the Scots. However, he couldn’t have the money until he agreed to Parliament’s demands which included an Act which stated that parliament should meet once every five years and the arrest for treason of Strafford. Charles had no choice but to comply.
20 May 1641 Wentworth Beheaded Thomas Wentworth, Earl of Strafford, was executed on Tower Hill.
Summer 1641 Triennial Act This act allowed Parliament to be summoned without royal command and declared ‘ship money’ to be illegal.
Late Summer 1641 Revolt in Ireland A revolt broke out in Ireland. Parliament critical of the King’s handling of matters in both Ireland and Scotland, passed propositions that the Parliament and not the King should be responsible for the country’s defence.
22 Oct 1641 Catholic Rebellion in Ireland A Catholic rebellion broke out in Ulster and quickly spread across the country. Many Protestant settlers were driven from their homes and the rebellion became war.
November 1641 Grand Remonstrance This document, put together by Pym, listed parliament’s grievances against the King since his reign began.
4 Jan 1642 Charles Arrests five MPs Charles instructed his attorney-general to issue a charge of treason against one peer and five members of the Commons including Pym and Hampden. When Parliament refused to recognise the charge, Charles sent a troop of horsemen to make the arrests. However, Parliament had been warned and the five men had fled. this move by Charles was extremely unpopular and across the country people declared themselves for Parliament and against Popery. Charles removed himself and his family from Whitehall to Hampton Court.
Jan 1642 Preparations for War Charles sent his wife Henrietta Maria to the Continent to enlist Catholic support for his cause against Parliament. She was also to pawn the crown jewels to buy arms. Although both sides were now preparing for war, negotiations continued.
March 1642 Militia Ordinance This allowed Parliament to take control of the Militia, virtually the only armed body in the country.
April 1642 Charles – Hull Charles tried to secure an arsenal of equipment left in Hull from his Scottish campaign. He was blocked by Sir John Hotham, with parliamentary and naval support and was forced to retire to York. Charles made his headquarters in York.
June 1642 Nineteen Propositions The Nineteen Propositions were issued by Parliament in the hopes of reaching a settlement with the King. They called for a new constitution recognising their own supremacy; demanded that ministers and judges should be appointed by parliament not by the King and also that all Church and military matters should come under the control of Parliament.
22 Aug 1642 Civil War – Standard raised Charles raised his standard at Nottingham formally declaring war. However, both sides hoped that either war could be averted or that one decisive battle would put an end to the matter.
7 Sept 1642 Portsmouth falls to Parliament The vital port and fortress of Portsmouth surrendered to Parliament.
23 Oct 1642 Battle of Edgehill In the early afternoon, Charles sent his army down the hill to meet the Parliamentary army commanded by Essex. On the royalist right was Prince Rupert who broke Essex’s left flank. In the centre, reinforcements arrived and they managed to push forward putting the lives of the King’s sons, Charles and James, in danger. The battle was a stalemate with neither side able to advance.
12, 13 Nov 1642 Small Battles The Royalists led by Prince Rupert managed to surprise and capture Brentford. However, the following day Rupert was surprised to find his route to the city of London barred at Turnham Green by Essex and an army of some 24,000. The Royalist commander decided to retire rather than fight.
Jan 1643 Royalist Victories The Royalists had victories over Parliament at Braddock Down and Nantwich
1643 Skirmishes and Battles Parliament took Lichfield, Reading, Wakefield, Gainsborough,
Royalists took Ripple Field, Tewkesbury, Chewton Mendip, Chalgrove Field, Landsdowne Hill, Bristol and Yorkshire. Re-took Lichfield and Gainsborough, and held Cornwall, Newark and Devises
30 June 1643 Battle of Adwalton Moor the Royalist commander, William Cavendish decided to try and enclose the Parliamentarian army in Bradford. However, Fairfax, the Parliamentary commander decided that his army had a better chance of survival if they fought the Royalists in a battle rather than being surrounded and forced to surrender. The Royalists won the battle.
13 July 1643 Battle of Roundaway Down The Royalists were the first to charge but there was no counter-charge. After two more charges the Parliamentary cavalry had fled. Waller then turned his attention to the Parliamentary infantry who stood firm until a force led by Hopton attacked them from behind. Caught between two Royalist armies the majority of Parliamentarian soldiers simply fled from the battlefield giving the Royalists victory.
Aug 1643 Solemn League and Covenant This document swore to preserve the Church of Scotland and reform the religion of England and Ireland ‘according to the word of God and the example of the best reformed churches’ and to protect ‘the rights and liberties of parliaments’. It was accepted by the English Parliament in September.
20 Sept 1643 First Battle of Newbury Essex’s force of tired wet and hungry Parliamentarians intended to rest at Newbury, a town sympathetic to the Parliamentarians. However, Rupert had arrived there first and Essex had no choice but to fight.
Essex moved the Parliamentarians before daybreak and secured the ‘Round Hill’, just south of Newbury. The surrounding countryside was criss-crossed with lanes and hedgerows which offered excellent cover for the foot soldiers but was quite unsuitable for horse. Parliament won the battle
June 1644 Battle of Marston Moor This was the largest single battle of the Civil War involving 45,000 men. Although the Royalists were outnumbered, they decided to fight. They were defeated by Parliament. For the first time since the Civil War had began Rupert’s cavalry were beaten by a Parliamentarian cavalry charge.
27 October 1644 Second Battle of Newbury The Royalists were sandwiched between two Parliamentary forces. Each time Parliament made some gain they were beaten back by the Royalists. The battle, which lasted all day, ended in a draw.
14th June 1645 Battle of Naseby The Parliamentarians broke their siege on Oxford and forced the Royalists into battle. Initially the Royalists took up a defensive stance but later the order to attack was given. The battle lasted just three hours and saw the death of most of the Royalist foot soldiers. It was a decisive victory for Parliament. Charles fled the battlefield as soon as it was apparent that he had lost both the battle and the war.
6th May 1646 Surrender to the Scots Charles I surrendered to the Scots
24th June 1646 Surrender Oxford, Charles I’s capital surrendered to Parliament
30th January 1647 Charles I Imprisoned The Scots handed Charles over to parliament. He was imprisoned in Holdenby House, Northamptonshire
November 1647 Putney Debates This was a series of debates held by different Parliamentarian forces to try to decide on a new constitution.
November 1647 Charles Escaped Charles I escaped imprisonment and fled to Carisbrooke Castle, Isle of Wight
December 1648 Charles Recaptured Charles was recaptured and sent to Windsor Castle
6th January 1649 Rump Parliament The Rump Parliament began. All members of Parliament who were in favour of negotiating with the King had been expelled. The Rump Parliament gave parliament the right to make new Acts of Parliament without the king’s approval
20th January 1649 Trial of King Charles began King Charles was tried for treason by a High Court of Justice specially set up for the trial. The court found Charles guilty and sentenced him to death.
30 Jan 1649 Execution King Charles I was executed by beheading, outside Whitehall Palace, London. He was buried in St George’s Chapel, Windsor.
Charles I – The Slide to War
Charles I came to the throne in 1625 after the death of his father, James I. Like his father, he believed in the Divine Right of Kings. Although only parliament could pass laws and grant money for war, because they refused to do as he wished, Charles chose to rule without them.
Charles made repeated mistakes throughout his reign that took the country into Civil War and ultimately led to his death on January 30th 1649.
In the first year of his reign, Charles married Princess Henrietta Maria of France, a Catholic. Parliament were concerned about the marriage because they did not want to see a return to Catholicism and they believed that a Catholic Queen would raise their children to the Catholic faith.
Instead of listening to the advice of his Parliament, Charles chose the Duke of Buckingham as his main advisor. Parliament disliked Buckingham and resented his level of power over the King. In 1623 he had been responsible for taking England to war with Spain and parliament used this to bring a charge of treason against him.
However, the King dismissed parliament in order to save his favourite. In 1627, Buckingham led a campaign into France which saw the English army badly defeated. In 1628, while preparing for a naval invasion of France, Buckingham was assassinated.
The monarch’s income was paid out of customs duties and when a new King or Queen came to the throne parliament voted for their income to be paid for life. In Charles I’s case, though, it was only granted for one year. The members of parliament wanted to make sure that Charles did not dismiss them. Their plan did not work, Charles chose to rule alone and found his own way of getting money.
Ship Money
It had always been the custom that in times of war, people living on the coast, would pay extra taxes for the defence of the coastline by naval ships.
In 1634, Charles decided that ‘ship money’ should be paid all the time. One year later he demanded that people living inland should also pay ‘ship money’. The people were not pleased and a man named John Hampden refused to pay the tax until it had been agreed by parliament.
The case went to court and the judge found Charles’ actions to be legal. The people had no choice but to pay.
In 1639, Charles needed an army to go to Scotland to force the Scots to use the English Prayer book. A new tax was introduced to pay for the army. People now had to pay two taxes and many simply refused. Many of those jailed for not paying the taxes were released by sympathetic jailors. By 1639 most of the population was against Charles. ‘Ship Money’ was made illegal in 1641.
The Protestants had been upset by Charles’ marriage to Catholic Henrietta Maria of France. They were even more upset when Charles, together with Archbishop Laud, began making changes to the Church of England. It was ordered that churches be decorated once again and that sermons should not be just confined to the Bible. A new English Prayer Book was introduced in 1637.
Charles also demanded that the new English Prayer Book be used in Scottish Churches. This was a very big mistake. The Scots were more anti-Catholic than the English and many of them were Puritans. There were riots in Scotland against the new service and Charles was forced to raise an army to fight against the Scots. The English army was defeated by the Scots and Charles foolishly agreed to pay Scotland ?850 per day until the matter was settled. Money he did not have!
The Irish Catholics were fed up with being ruled by English Protestants who had been given land in Ireland by James I.
In 1641, news reached London that the Catholics were revolting. As the news travelled it was exaggerated and Londoners learned that 20,000 Protestants had been murdered. Rumours spread that Charles was behind the rebellion in a bid to make the whole of the United Kingdom Catholic.
An army had to be sent to Ireland to put the rebellion down but who was to control the army. Parliament was worried that if Charles had control of the army he would use it to regain control over Parliament. In the same way, if Parliament controlled the army they would use it to control the King. It was a stalemate.
One of Charles I’s major mistakes was that he was unable to gain the co-operation of his parliament. His determined belief in the Divine Right of Kings led to his dismissing parliament in 1629 and ruling without them. The fact that he did not have a parliament to grant him money meant that he had to tax his people heavier and introduce unpleasant taxes such as ship money (see above). It was only when Charles needed an army to fight against Scotland that he was forced to recall parliament in 1640. This parliament remained in office for so many years that it is known as the Long Parliament.
The Long Parliament
Having been dismissed from office for eleven years, this parliament was determined to make the most of being recalled and Charles’ favourite, Thomas Wentworth, Earl of Strafford, of treason. Strafford was executed in May 1641.
In November 1641, parliament presented the King with a list of complaints called the Grand Remonstrance that asked for the power of bishops to be reduced and for Charles’ councillors to be men trusted by parliament. Not all members of parliament were in favour of it and it was only passed by 159 votes to 148.
In January 1642 Charles made what was the most foolish move of his reign. He burst into the Houses of Parliament with 400 soldiers and demanded that the five leading MPs be arrested. The five MPs had had advance warning and had fled.
Charles dismissing Parliament
In June 1642 the Long Parliament passed a new set of demands called the Nineteen Proposals that called for the King’s powers to be greatly reduced and a greater control of government to be given to parliament. This move divided parliament between those who supported the Nineteen Proposals and those who thought parliament had gone too far.
Both Parliament and Charles began collecting together their own armies. War was inevitable. People were forced to choose sides and on 22nd August 1642, the King raised his standard at Nottingham.
Oliver Cromwell
Oliver Cromwell was born on April 25th 1599. His family had become wealthy following the dissolution of the monasteries by Thomas Cromwell and had changed their name from Williams to Cromwell in recognition of the man that had made their fortune.
He attended Cambridge University where he gained a reputation for his commitment to Puritanism. In 1620 he married Elizabeth Bourchier and the couple had two sons. In 1628 he became Member of Parliament for Huntingdon. In 1640 he was elected to the Long Parliament as Member for Cambridge, although he played no prominent part in the government.
Oliver Cromwell and the English Civil War
When the Civil war began in 1642, Cromwell was sent to organize the defense of Norfolk. He was noted for his organizational skills and bravery and when the East Anglian counties formed the Eastern Association, Cromwell was put in charge of the cavalry. His reputation was further enhanced when his cavalry made a notable contribution to the Battle of Marston Moor. When the New Model Army was formed, Cromwell was made General of the Horse and he played an important part in the defeat of the King in the Battle of Naseby.
charles 1 execution
When the Civil War ended with Parliament victorious, Cromwell played a part in trying to keep Parliament united. He also tried to smooth things between Parliament and the army in 1647 when the army mutinied and refused to disband. He played a prominent part in the second Civil War.
Here are the most important changes that Oliver Cromwell instituted.
• He was the prime mover behind the decision to execute the King in 1649 and the establishment of the Commonwealth.
• Having stabilized England, Cromwell left for Ireland to put down the Irish Civil War. As an extreme Puritan, he hated the Catholics and had never forgiven them for their alleged massacre of Protestants in 1641.
• He therefore felt he was justified in seeking revenge and was responsible for the Massacre of Drogheda in September 1649.
Oliver Cromwell Takes Command
Cromwell was becoming increasingly frustrated with the members of the Rump Parliament who had not passed reforms in either the political or religious sphere. In 1653, at the head of an army, Cromwell marched into Parliament and dismissed the members. It was replaced by the Barebones Parliament, a select parliament of committed Puritans who elected Cromwell as Lord Protector.
English Civil War: Royalist or Parliamentarian?
From the moment that Charles I raised his standard at Nottingham in August 1642, ordinary people throughout the land were forced to choose which side they were on. In the majority of cases this choice was made for them as they simply joined the army that reached their city or town first.
Support remained much the same throughout 1642 and 1643, but during 1644 and 1645 people began to change sides.
For the King
Catholics, most of the Nobles and gentry, about half of all Members of Parliament, the poorer areas of the North and West.
The supporters of the King were called Cavaliers because many of them fought on horseback. The term comes from the French ‘chevalier’ meaning ‘horse’. Cavaliers had long hair and wore fancy clothes.
For Parliament
Puritans, the more militant Members of Parliament, merchants, the richer areas of the South and East.
Parliamentarians were nicknamed ’roundheads’ because they cut their hair very short. They also wore very plain and simple clothes.
Cavalier roundhead soldier
These maps show how Charles gradually lost control of England and Wales as the Parliamentarians gained more and more support.
Civil War Support 1642-1643 Civil War Support 1644 Civil War Support 1645
The overall outcome of the English Civil War was the trial and execution of Charles I, then the exile of Charles II, and finally the replacement of the English monarchy with the Commonwealth of England and the Protectorate under the rule of Oliver Cromwell and his son Richard. This ultimately led to Parliament as the ruling power of England, being formally legally established as part of the Glorious Revolution in 1688.
The wars left England as one of the few countries in Europe without a monarch, and many of the factions of the war were sidelined.
English Civil War Battles
English Civil War battles were significant in the scope of British history but they were not arrayed in the manner of a typical war. Although this was a civil war, and the whole country was affected, there were remarkably few major battles.
Edgehill 23rd October 1642
Both the Royalist and the Parliamentary armies were on the move. Charles’ army, commanded by the King himself, was marching from Shrewsbury to London while Parliament’s army, under Robert Devereux, third Earl of Essex was marching from London to Worcester. When the armies were a few miles apart, Prince Rupert persuaded Charles to take to the high ground at Edgehill. Essex realised that the Royalist army was close and formed his men for battle. Both commanders deployed their troops in the same way with infantry in the middle and cavalry to the flank.
Adwalton Moor 30th June 1643
Roundaway Down 13th July 1643
Newbury battle map
First Battle of Newbury 20th September 1643
Marston Moor Battle Map
Marston Moor 2nd July 1644
Prince Rupert was marching across the North of England to relieve a Royalist army trapped in York. News of Rupert’s position in the North reached Oliver Cromwell, the Parliamentary Lieutenant General, and an army was sent to meet the Royalists.
Second Battle of Newbury 27th October 1644
The Battle of Naseby 14th June 1645
The Parliamentarian New Model Army then took to the field concentrating mainly on the Royalist infantry. Charles’ army were unable to withstand this new attack and many foot soldiers surrendered.
English Civil War Weapons
The seventeenth-century English Civil War witnessed the evolution of personal and portable firearms. However, the simple pike still had its purposes, as edged weapons were wielded alongside mortars, cannons, and muskets. Below is a description of English Civil War weapons.
Primary English Civil War Weapons
The Mortar
This device is easy to maneuver and can be used by one man alone. An explosive shell is fired high into the air and explodes on impact. Although it was difficult to aim, this weapon was the most destructive of those used in the Civil War.
The Cannon
The cannons used in the Civil War were very heavy and difficult to move. The largest needed a team of 16 horses to move them. More commonly, smaller cannon were used but even these required at least 4 men to move them. For this reason they had to be put into position before a battle began. The missiles fired from the cannon were usually balls of iron, but sometimes stones were used. After the cannon had been fired the soldiers operating it had to go through a strict procedure of cleaning, loading the weapon and loading the gunpowder before it could be fired again. Aiming was difficult and the cannon were more effective as a means of instilling fear into the enemy than actually causing damage.
The Musket
There were two types of musket; the matchlock and the flintlock, which could be as long as five feet and had a firing range of up to 300 yards. They were both loaded in the same way; gunpowder was poured into the barrel and packed in hard with a stick. Then the lead ball would be put in followed by wadding to hold the ball in place.
The Pike
The Pike was one of the most commonly used weapons on the Civil War battlefield. The pike was a long wooden shaft with a steel point on the end. They were cheap to make, soldiers required very little training to use them and they could be very effective especially when used in a group. Pikes were supposed to be sixteen feet in length but often soldiers sawed a few feet off the ends to make them easier to carry.
The Pikemen often formed the front line of an army. Operating together they had to lower their pikes to prevent a cavalry charge from breaking the ranks. The cavalrymen’s horses would be injured by the pike and would fall to the ground unseating his rider who would then be an easy target for the musketmen or for the sword. If the army was surrounded then the pikemen would form a circle and lower or raise their pikes to provide a ‘hedgehog’ of cover.
English Civil War Bibliography
Battles of the Civil War – Owen Crossby
Castles of Wales and the Civil War – Castles of Wales
Charles I – Britannia
Civil War Re-enactment – The Sealed Knot
The English Civil War – History Learning Site
The English Civil War – Dr E. L. Skip Knox
The English Civil War – Encyclopedia.com
The English Civil War – P. H. Vickers
The English Civil War in the West – BBC
The English Civil War Society
History of the Civil War – Owen Crossby
Cite This Article
"English Civil War: (1642–1651)" History on the Net
© 2000-2021, Salem Media.
October 26, 2021 <https://www.historyonthenet.com/english-civil-war-1642-1651>
More Citation Information. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.