text
stringlengths 144
682k
|
|---|
Neophyte meaning - Greek Vocabulary
Meaning neophyte neophyte: Meaning
Meaning neophyte Neophyte Ritual
When does a Neophyte become a Prophyte?
Meaning neophyte Neophytes
Meaning neophyte Neophyte (botany)
Meaning neophyte Neophytes
Meaning neophyte What does
Meaning neophyte Word of
What does neophyte mean? definition, meaning and audio pronunciation (Free English Language Dictionary)
Meaning neophyte Neophyte Ritual
neophyte translation in French
Meaning neophyte neophyte
Meaning neophyte Neophyte (botany)
Each as he passes the throne of the East salutes and lowers insignia, except the Hierophant.
• There are two contending Forces and One always uniting them.
• The invasive attribute invasive species are assigned that displace native species in their new habitat.
Word of the Day
Well I am not a member of Delta Sigma Theta or any other greek letter organization; however as an interestee I was under the impression, and please correct me if I'm wrong, but isn't a prophyte the previous line that crossed and the neophyte is the newly initiated member of any organization.
• The editor of New Advent is Kevin Knight.
• All members present clap hands.
|
The Auschwitz of the Balkans
Belongings of newly arrived prisoners are seized by the Ustasha in Jasenovać, circa 1940. The Ustasha (Croatian Revolutionary Movement) was a fascist organization, active between 1929 and 1945.UNIVERSAL HISTORY ARCHIVE/UNIVERSAL IMAGES GROUP VIA GETTY IMAGES
The Auschwitz of the Balkans
The Croatian concentration camp Jasenovać is the site of fierce ongoing controversy, muddled by extremists and cover-ups, about the extent of its horrors
In every country in Europe where the Holocaust took place—meaning the entire continent with the exception of Great Britain and the six neutral states—there are iconic sites that have come to symbolize the Shoah. Outside of Eastern Europe, where the systematic mass murder of Jews occurred, these sites are generally transit camps and places where large numbers of Jews were murdered or rounded up. In France for example, two such places are the Paris Vélodrome d’Hiver cycling stadium, and the Drancy transit camp. In July 1942, 13,000 Jews were held in the stadium for days under awful conditions, prior to their transfer to the transit camp for deportation to Auschwitz-Birkenau. In the Netherlands, this site is the Hollandsche Schouwburg and the Westerbork Dutch transit camp. Tens of thousands of Dutch Jews were held in the former before being sent to Westerbork, from which they were deported to the Auschwitz and Sobibor death camps. In Belgium, there is the Mechlen (Malines) transit camp, from which the local Jews were sent to their deaths.
In Eastern Europe, where the Nazis systematically implemented the Final Solution, initially by shooting and later by asphyxiation in gas vans and gas chambers, the most significant sites are invariably sites of mass annihilation. There is Auschwitz in Poland, Babi Yar (Kyiv) in Ukraine, Maly Trostinec (Minsk) in Belarus, Ponar (Vilna) in Lithuania and Rumbula (Riga) in Latvia. Such sites usually host the official state memorial ceremonies throughout Europe, and some also include educational centers.
Besides the differences between the nature of the crimes committed in the iconic sites of Western and Eastern Europe, there is another issue that has plagued the history of the former Soviet and communist-ruled countries. Unlike the notorious sites in Western Europe, where the histories of the crimes committed and the figures of the victims have been meticulously researched, and are universally accepted as accurate, the sites in Eastern Europe often are the subject of intense controversy and highly disparate historical narratives.
These discrepancies, which are the product of ideological communist Holocaust distortion, manifest themselves regarding three very important subjects: the identity of the victims, the identity of the perpetrators, and the number of victims. As far as the latter is concerned, I will never forget my shock when I first visited Auschwitz in 1978 and came across plaques in many languages at the foot of the memorial at Birkenau commemorating the “4 million victims.” By that time I was a doctoral student in Holocaust studies at the Institute of Contemporary Jewry at the Hebrew University, and it was obvious to me that that figure was grossly inflated. Indeed, not long after the transition to democracy in Poland, a commission of reputable historians established that approximately 1.3 million people were murdered in Auschwitz, among them 1.1 million Jews. Also shocking were the Soviet monuments in sites such Ponar, Rumbula and Babi Yar dedicated “To the victims of fascism,” which hid the identities of both the victims and the perpetrators—although following the transition to democracy in Lithuania, Latvia, and Ukraine more accurate inscriptions replaced them.
Unfortunately, to this day, such accurate corrections have not been made at every Eastern European mass murder site, a situation that has had extremely grievous consequences in one particular region. I am referring here to the Croatian concentration camp of Jasenovać, which was nicknamed “the Auschwitz of the Balkans.” Jasenovać was neither the largest camp in Europe, nor the site where the largest number of victims were killed, but it did have four unique characteristics. One is that it was the operational center of three genocidal campaigns orchestrated by the government of the Independent State of Croatia (NDH-Nezavisna Država Hrvatska in Croatian) against Serbs, Jews, and Roma. Another is that it was the only concentration camp established by a Nazi satellite state which had a very high death toll. A third unique characteristic is that it was the only concentration camp with a separate subcamp especially for children. And the fourth is that to this day, the approximate number of its victims is being fiercely debated by Serbs, Jews, Roma, and Croats, with huge discrepancies between the figures presented by the extremists on both sides. While some Serbs continue to quote the communists’ original figure of 700,000 or perhaps even more, Croatian Ustasha apologists and extreme nationalists quite recently have claimed that Jasenovać was actually only a labor camp during the Ustasha regime of World War II, but became a death camp after the war, where the Yugoslav communist regime murdered its opponents.
A memorial ceremony for victims who were killed at the Jasenovać camp, in Jasenovać, 2015. The Stone Flower memorial was erected in 1966.A memorial ceremony for victims who were killed at the Jasenovać camp, in Jasenovać, 2015. The Stone Flower memorial was erected in 1966.AFP/GETTY IMAGES
In order to understand this ongoing controversy, it is important to examine the history of the territory of Yugoslavia during World War II, as well as the history of the camp itself. Yugoslavia (the Kingdom of the Southern Slavs) was one of the many countries established in the wave of post-World War I self-determination, which led to the dismemberment of the czarist empire in Russia and the Austro-Hungarian empire. Unlike most of the other new countries, Yugoslavia was not the nation-state of a particular people, but rather a country whose population was composed of several ethnic groups. The Serbs were the largest, but there were also demographically significant groups of Croatians, Bosnian Muslims, Slovenes, Macedonians, Albanians, and Montenegrins. Germany and Italy invaded Yugoslavia in early April 1941, and quickly occupied the entire country, which was cut up into several pieces, each of which had a different fate.
On April 10, 1941, Germany and Italy established the Independent State of Croatia, whose territory consisted of what is today Croatia, Bosnia-Herzegovina, and a small part of Serbia (Syrmia). Its population numbered 6.3 million inhabitants, barely half of whom were Catholic Croats. The largest minority was the 1.9 million Orthodox Serbs, and there were also 40,000 Jews and 30,000 Roma, besides hundreds of thousands of Croat Muslims, and smaller communities of Germans and Hungarians. Rule over this new entity was entrusted to the Ustasha movement headed by Ante Pavelić, who became the head of state (Poglavnik), a position modeled after Hitler and Mussolini, whom he admired. The Ustasha were a Croatian ultranationalist, fascist, racist, and terrorist movement founded in Italy in 1929, which sought to establish an independent Croatian state. Much of its ideology was based on Nazi racial theory that considered Jews, Roma, and Slavs (in their case Serbs), to be subhuman. Thus it was hardly surprising that from the very beginning of their rule, the Ustasha began to discriminate against minorities and within months began the mass murder of Serbs, Jews, and Roma.
The Jasenovać concentration camp played a key role in the mass murder of those considered subhuman enemies of the state. Established in August 1941, near a village of the same name at the confluence of the Sava and Una rivers, it was a complex of five different compounds spread over an area of about 80 square miles on both banks of the two rivers. The camp was constructed and run by Department III of the “Ustasha Supervisory Service,” a special police force. The majority of the inmates in Jasenovać were Serbs, many of whom were deported to the camp after refusing to convert to Catholicism. They were also the largest number of victims, with the lowest estimates (based on the more than 80,000 names collected after the war) ranging from at least 60,000. Jews were the second-largest group of victims, with estimates ranging from 13,000 to 25,000, though almost all were murdered before August 1942, when the deportations of Croatian Jews to Auschwitz began. The number of Roma victims was similar to that of the Jews, and several thousand anti-fascist Croatians were also murdered in Jasenovać. Among the 83,145 victims whose fate was documented after World War II, more than half were women (23,474) and Serb, Jewish, and Roma children (20,171).
Jasenovać did not have the apparatus for mass annihilation, but it nonetheless is often referred to, especially by survivors, as an “extermination camp,” a term usually reserved only for camps with gas chambers or gas vans. This is easily explained by the large numbers of murders that took place at the camp, and the exceptional cruelty of the Ustasha guards, who were notorious for the tortures they devised to increase the suffering of the inmates. For example, in the case of men, they plucked out eyeballs, inserted hot nails under fingernails, and tightened chains around heads until the skull fractured and the inmate’s eyes popped out. Their treatment of female inmates was even worse and included rape, cutting off breasts, and cutting out wombs of pregnant women. To these horrors, one must add the living conditions of the inmates, who were systematically starved and lived without the slightest condition of sanitation, while conducting difficult forced labor 11 hours a day, all under the constant threat of random torture and execution. Staying alive often depended on one’s physical strength and the duration of punishment. Anyone who arrived in Jasenovać with an indeterminate sentence, of one or three years or more, was immediately slated to be executed.
The executions were carried out in various ways. Some victims were killed by cremation while alive (in some cases after being drugged) in the ovens of the brick factory in Jasenovać, or were poisoned in the Stara Gradiska subcamp, which had gas chambers that used the cyanide-based poison Zyklon B. Other inmates were slaughtered by manual means, using knives, saws, hammers, and other blunt instruments. One of the locations for these executions was “Granik,” a dock on the Sava River used to unload goods. The notorious Vjekoslav “Maks” Luburić, who was in charge of all the Ustasha concentration camps, devised a way to use the crane as a gallows so that the bodies of the victims would fall into the river and be carried away by the current. Weights were attached to the arms of the victims, their intestines and necks were slashed, and they were pushed into the river with a blow of a blunt tool to the back of their heads. Later victims were tied in pairs back to back and tossed into the Sava alive. Another site of numerous murders was Gradina, where the Ustasha set aside empty areas near the villages of Gradina and Uštica for mass murders and graves. The victims were murdered with knives, or had their skulls smashed with mallets. Many Roma were worked to death at these two sites; and some Roma were used as gravediggers who participated in the crimes. Over 100 mass graves have already been found in Gradina, and 21 in Uštica. All these crimes were carried out under the direction of Luburić and the five commanders of the camp: Ljubo Miloš, Miloslav Filipović, Ivica Matković, Ante Vraban, and Dinko Šakić.
Toward the end of the war, the Ustasha tried to destroy the evidence of their crimes and began digging up and burning the corpses of the victims of Jasenovać. Nonetheless, the murders continued—in early April 1945, civilian survivors from Sarajevo and 1,590 inmates from Lepoglava prison were brought to Jasenovać, where they were killed. On April 19, Luburić commanded his soldiers to destroy the camp, and the Ustasha murdered the remaining medical staff, the sick inmates, and skilled workers who until then had been spared. Two days later, the remaining 700-900 women were executed. On April 22, 600 male prisoners (out of the remaining 1,073) revolted, but only 92 survived. All the rest were murdered and the structures in the camp were set on fire and destroyed.
Since the end of World War II, the precise number of victims murdered in Jasenovać has been a subject of fierce debate fueled by ideological agendas. Part of the problem is, as noted by historian Ivo Goldstein, one of the leading scholars on the Holocaust in Croatia and on Jasenovać, that the Ustasha tried very hard to hide their crimes. Thus many victims were taken directly to execution sites like the Sava River to be murdered, without being registered at the camp, and the registration files that existed were later destroyed by the Ustasha. In addition, much evidence was destroyed by them with the massive excavation and burning of corpses in the final months of the camp’s existence.
Internal Yugoslav politics also played an important role in crafting the accepted postwar historical narrative of World War II within the country. The major emphasis was initially on commemorating the victorious partisans, not on the civilian victims. The authorities identified the Nazi and fascist occupiers as the major villains and at first did not focus much attention on the Ustasha. Seeking to avoid ethnic strife, they did not emphasize the national identity either of the Ustasha or of the Chetniks (Serbian guerrilla units that initially fought against the occupiers, but later joined forces with them against Tito’s communist partisans). Given the Serbian political domination of postwar Yugoslavia, however, it was only natural that when dealing with the issue of the civilian victims of World War II, their version of the events would be adopted as the official narrative of the country’s history. Thus, for example, a November 1945 investigation of Ustasha crimes assessed the number of victims at Jasenovać as between half a million and 600,000, a figure which also was cited by Israeli scholars as late as 1990. During the 1980s, Serbian researchers, such as Dr. Milan Bulajić, who was the director of the Belgrade Museum of Genocide Victims, estimated the number of Jasenovać victims at between 700,000 and 1 million. A decade later, Antun Miletić, the director of the Belgrade Military Archives, claimed that the death toll in Jasenovać was 1.1 million victims.
Dinko Šakić, former commander of the Jasenovać concentration camp during the World War II regime, during his trial in Zagreb, Croatia, 1999ANTONIA BAT/POOL/AFP VIA GETTY IMAGES
By this time, Croatia had broken away from Yugoslavia and established its independence, a development that had a highly significant influence on a wide range of issues concerning Jasenovać—the main camp and state memorial of which were in Croatia, while the killing fields of Dona Gradina were in what became Republika Srpska, the Serbian part of Bosnia-Herzegovina. Initially, the status of the memorial was reduced to that of a nature park and its funding was cut. But revisionist views began to surface, often with the support of the Catholic Church, and in 1996, Croatian President Franjo Tudjman proposed to rebury Ustasha perpetrators alongside camp victims in Jasenovać, an initiative which was thwarted by strong protests from the United States, Israel, world Jewry, and Croatian leftists. In the same year, the English version of Tudjman’s book Horrors of War: Historical Reality and Philosophy was published, in which he not only accused the Jews of inflating the number of Holocaust victims from 1 million to 6 million, but also claimed that the Jews ran Jasenovać until 1944, and that the number of Jasenovać victims was actually somewhere between 30,000 and 40,000. In response, Israel refused to establish full diplomatic relations with Croatia, which might have been one of the main reasons why Croatia prosecuted Jasenovać commandant Dinko Šakić not long afterwards.
It was Šakić‘s trial in Zagreb in 1999 that, for the first time since independence, put Jasenovać on the center stage in Croatia. Dinko Šakić, one of its six commanders, had joined the camp administration in spring 1941, became assistant commander in 1942, and served as chief commandant from April to November 1944. After the end of the war, he fled together with other Ustasha criminals to Argentina, where together with my colleague Sergio Widder and local journalist Jorge Camarasa, we were able to find and expose him on national television. At the time of his trial, he was the last living concentration camp commander. The testimonies of the witnesses, survivors of the camp, were a stark reminder of the horrors of Jasenovać, and an important history lesson for Croatian society. Šakić‘s arrogant lack of repentance (“I am proud of what I did and would do it again … I regret that we hadn’t done all that is imputed to us, for had we done that then, today Croatia would not have had problems. There wouldn’t have been people to write these lies.”) also helped convince the government that Jasenovać had to be able to convey the horrors of the triple genocide, but none of these factors could settle the dispute about the number of victims.
Thus Croatian society remained divided and ambivalent about Ustasha crimes, which was clearly reflected in the new exhibition launched at the Jasenovać Memorial Museum in 2006. Missing from the display were all of the Ustasha killing instruments, which had been shown in previous exhibitions, but even more significant was the lack of any explanation of the Ustasha movement, its bloody history, and horrific ideology. Nor was there a single photograph of any of the commanders of Jasenovać who were personally responsible for the mass murders. And last but not least, there was no mention at all of the trial of Dinko Šakić, the most important step taken by an independent democratic Croatia to fight against Holocaust denial and distortion.
More recently, the dispute over the number of victims of Jasenovać has again been ignited by extremists on both sides. In 2016, filmmaker Jakob Sedlar released his revisionist documentary, Jasenovać—The Truth, which drastically minimized the death toll during World War II and claimed that the camp was used by the communist regime after the war to murder its political opponents. Despite protests about the content, and proofs that he had staged false scenes, Sedlar was given awards and honors. On the other side of the debate, Israeli historian Gideon Grief recently produced a coffee-table album on Jasenovać, which claims that the camp took 700,000 victims.
If there is any hope for a solution, it might come from a very recent academic conference on Jasenovać held virtually at Uppsala University in Sweden this past December, with the participation of many of the top scholars in the field. Their conclusion was that the number of victims of Jasenovać was between 90,000 and 130,000. One can only hope, that at least for the sake of the victims and their families, this issue will finally be resolved convincingly and be accepted by Serbs, Jews, Roma, and Croats alike.
Dr. Efraim Zuroff is the Simon Wiesenthal Center’s chief Nazi-hunter and Director of its Israel Office and Eastern European Affairs. His most recent book is Our People; Discovering Lithuania’s Hidden Holocaust.
|
What Are The Causes And Diagnosis Of Vitiligo?
What are the causes of the skin disease?
White patches of skin appear on different parts of the body in a condition called vit-ill-EYE-go.
The cells that make color in the skin are destroyed when this happens.
TheMA-LAN-o-sites are the cells that are called melanocytes.
The tissue in the mouth and nose can be affected by Vitiligo.
There is no known cause.
The disease may be caused by an immune system problem.
Your immune system attacks part of your body.
The melanocytes in the skin can be destroyed by the immune system.
The melanocytes destroy themselves, according to some researchers.
Some think that a single event can cause the skin condition.
The events have not been proven to cause the skin disease.
It can happen at any age, but it is more common in people in their twenties.
Dark skinned people are more likely to be affected by the disorder than other people.
People with certain diseases are more likely to get a skin disease.
Scientists don’t know why vitiligo is linked to diseases.
Most people with vitiligo don’t have any other diseases.
It may run in families as well.
Children are more likely to be affected by the disorder if their parents have it.
Most of the children are.
There are white patches on the skin.
In areas where the skin is exposed to the sun, these patches are more frequent.
There could be patches on the hands, feet, arms, face, and lips.
White patches can be found in other common areas.
The legs meet the body in the groin and armpits.
The mouth is around it’s owner.
Rectal areas.
People with the skin disease tend to have gray hair early in their lives.
Dark skinned people may lose their color inside their mouths.
There is no way of knowing if it will spread.
White patches don’t spread for some people.
White patches can spread to other parts of the body.
For some people, it takes a long time for the disease to spread.
Spreading occurs quickly for other people.
White patches have been reported by some people.
A family history, physical exam, and tests will be used by the doctor to diagnose the disease.
Questions may be asked by the doctor.
Do you have any family members with the skin condition?
Do you or your family members have any diseases that are related to the immune system?
Did you have a problem with your skin before the white patches appeared?
Did you suffer from stress or illness?
Did you have gray hair before you were 35?
Is it possible that you are sensitive to the sun.
A doctor will perform a physical exam to rule out other problems.
The tests could include:
A small sample of the affected skin will be used for thebiopsy.
Blood tests
There is an eye exam.
It is possible that treatment will make the skin look better.
The choice of treatment is dependent on the situation.
There are white patches.
What percentage of the patches are widespread?
The person uses the treatment that they prefer.
Some treatments don’t work for everyone.
There are unwanted side effects of many treatments.
Sometimes treatments don’t work.
Medical, surgical, and other treatments are available for vitiligo.
Treatments aim to restore.
A skin biopsy is a procedure in which a small portion of the skin is removed to look for melanocytes.
There are no at- home tests that can be used to diagnose the disease.
There is no cure and it is usually a lifelong condition.
The cause is not known, but it may be due to an illness.
Vitiligo is not a disease that can be spread.
Exposure to UVA or UVB light may be used for treatment.
It’s a lifelong condition and there is no cure.
The cause may be due to an illness or a virus.
Vitiligo is not a disease.
Exposure to UVA or UVB light can cause depigmentation of the skin.
There are a number of local and systemic conditions that can cause depigmentation of the skin.
The damage to the skin can be partial or full.
It can be temporary or permanent.
What are the causes of the disease?
Sun protection is important because avoiding getting a tan can make vitiligo patches less noticeable and some treatments can be disrupted by sun exposure.
Some people with the skin condition seek treatment to cover up or repigment their skin, but others don’t.
People with the skin disease lose their skin color and other body parts.
According to the American Academy of Dermatology, Vitiligo is a condition that causes the skin to lose its color.
Dr. Skotnicki says that it can be hard for people with darker skin.
There is a lamp that is useful for people with fair skin.
More testing is what some dermatologists want to do.
If your doctor wants to know if melanocytes are present in the skin, he or she can order a skin biopsy.
People may become more accepting of those living with the condition as a result of this raised awareness.
She is all for the inclusion of the skin disease in the body positive movement.
It’s good news for people with vitiligo, but it doesn’t mean they should rely on their condition to give them absolute protection against the sun.
Testing compounds and treatments that may interrupt the autoimmune response, inflammation and the destruction of melanocytes are being examined by promising research.
There is a long-term problem with vitiligo.
There are patches of skin that lose their color over time.
When mylanocytes die off, the patches appear.
Flares, dry skin, and itching are some of the effects of side effects.
Skin damage can be caused by tattooing.
The causes of the skin condition are not known.
Depending on the depth of the original skin tone, depigmentation can take between 12 and 14 months.
Steroids are contained in Corticosteroid Ointments or Creams.
It may be helpful to connect with others with the same disease.
A drug increases the skin’s sensitivity to UV light.
The original skin color has been restored by others.
The risk of scarring is lower.
The skin ispigmented during surgery.
What are the causes of the disease?
The patches on your body can be depigmented and can affect you.
Vitiligo causes patches of skin to lose their color.
Treatments can help the skin tone appear more even.
People with a skin condition are more likely to have other diseases.
Researchers are studying how genes and family history may play a role in causing a skin condition.
The white patches can start in early childhood for many people with the disease.
Family members of a person with the disease may also have it.
Scientists think it may be an auto immune disease in which the body’s immune system attacks and destroys melanocytes.
The immune cells attack the body’s own tissues in people with autoimmune diseases.
Your body’s immune system works to fight off infections.
Your skin is made of skin cells called melanocytes.
The melanocytes that make melannin give your skin its color.
There isn’t enough melanocytes in your skin to make enough melanin.
The patches are usually white.
The patch is pink if there are blood vessels under the skin.
The patch’s edges may be irregular or smooth.
There is a white center of a patch.
The lack of melanin in the skin causes Vitiligo.
A group in your area may be suggested by a doctor.
The page was last reviewed on November 5th, 2019.
Some areas may regain their normal color, while other areas may lose their color.
Some areas may regain normal color, but others may lose it.
There is a loss of color from areas of skin in a condition called vitiligo.
The skin feels normal despite the white patches that don’t have any color.
The cells that make the brown pigment are destroyed by immune cells.
Some families have an increase in the condition.
Flat areas of normal-feeling skin are associated with other autoimmune diseases.
The surrounding skin may be lighter than that of the regimented skin.
It’s helpful for the condition to be less noticeable because unaffected skin won’t be affected by the sun.
The last option is a permanent change.
It’s important to remember that the risk of sun damage is higher for skin that isn’t colored.
The body’s immune system attacks healthy body tissue instead of protecting it from infections.
There is no known cause of the skin condition.
At any age, the vitiligo can appear.
There is a pathology for Weedon’s skin.
What are the causes of a skin disease?
vit-ill-EYE-go is a skin disorder that causes the skin to lose its color and non essential surgeries in Ohio have been postponed through January 30.
It is possible that Vitiligo is not an inheritable trait.
It is possible that counseling may be recommended.
No one can tell you how to prevent it because no one knows what causes it.
A smooth white area on a person’s skin is called a molecule.
Light patches of skin can get sunburned.
Finding a doctor who knows about the disease and treatment options is important.
The cells that produce it are called melanocytes.
The cells that produce it are called melanocytes.
The skin gets its color back occasionally.
If you need safe in-person care, we are open for it.
There is sometimes a symmetrical loss of color.
Your skin is made of melatonin.
The color of hair and skin is determined by the amount of melanin in it.
It can make you feel bad.
The affected skin may be restored to its original color.
Any part of the body can be affected by the condition.
Light or white patches of skin are involved.
These patches are caused by the destruction of the skin cells that make melanocytes.
Your doctor may want to know more about your skin cells.
Depigmented patches on both sides of the body can be spread over time in generalized vitiligo.
In families, the vitiligo may have a genetic component.
A physical examination is what our dermatologists use to diagnose vitiligo.
What are the causes of a skin condition?
There is a child on the right.
The subtype tells you the amount of the skin disease.
The only person with these credentials is a board-certified dermatologist.
Your skin color is affected by vitligo.
Many people say they have expertise when it comes to treating the skin.
How long doesBotox last?
Some children with chronic skin conditions can’t attend summer camp.
Some people can see that patches are getting bigger.
This type causes scattered patches on the body and most people develop it.
The skin on the affected person can turn white.
There are a limited number of spots or patches on the body.
Which one do you know?
Generally agreed principles, what are the causes and diagnoses of vitiligo?
The principles are that there is no melanocytes in the skin of people with the disease.
Various types of medications, phototherapy, laser therapy, and surgical therapy are used in the treatment of vitiligo.
White macules and patches on the body are caused by a skin disorder called vitiligo.
Patients with vitiligo have a lower quality of life because of the distress and stigmatization associated with visible lesions.
The genes associated with the production of melanin, the regulation of autoantibodies, and the response to oxidative stress may be associated with the inheritance of vitiligo.
There are three different types of vitiligo.
There is a strong reason to believe that segmental and nonsegmental vitiligo have a unique genetic mechanism.
Due to the cell-mediated process that destroys the melanocytes, superficial perifollicular and perivascular lymphocytic infiltrates may be present at the margin.
In most cases, the diagnosis of vitiligo is based on clinical findings, but detailed history and examination is needed for the severity of the disease.
People with dark skin are more likely to see white spots on their body.
Read About The Natural Vitiligo Treatment
Doctors Don't Want You To Know About
|
Nerve Conditions
Acoustic Neuroma
Acoustic neuroma, also called vestibular schwannoma, is a noncancerous tumor usually seen in middle-aged people. It develops gradually on the main nerve leading from the inner ear to the brain. This nerve controls hearing and balance. So, as the acoustic neuroma grows, it leads to hearing loss and problems with balance.
The symptoms of acoustic neuroma are subtle and therefore, tend to be overlooked. The most prominent symptom is loss in hearing in one ear accompanied by a ringing sensation in the ear, called tinnitus. Other symptoms include loss of balance, dizziness, facial weakness and numbness.
There are no established causes for this condition, except for a malfunctioning gene. The reason for the malfunctioning has not been found till date.
Risk Factors
The chances of acquiring this condition are high if either of the parents has neurofibromatosis (a rare genetic disorder). Yet another risk factor is child-hood exposure to low-dose radiation of the head and neck.
As the symptoms develop slowly over a period of time and resemble middle ear and inner ear problems, detection of the tumor becomes difficult. Your doctor may order a hearing test (audiometry) and scans (CT or MRI) to confirm the diagnosis.
Treatment method to be adopted depends on factors such as size and growth of the tumor, its location, patient’s age, and physical health. If the tumor is small, then the doctor may conduct only a regular checkup. He may decide to monitor the tumor by ordering regular imaging and hearing tests at intervals of 6 to 12 months.
Other treatment methods include stereotactic radiosurgery (non-invasive treatment that delivers gamma radiation at the tumor site without making an incision) and surgical removal of the tumor.
Amyotrophic Lateral Sclerosis (ALS)
Amyotrophic lateral sclerosis (ALS) is a disease characterized by the gradual breakdown and eventual death of nerve cells (motor neurons), leading to muscle weakness and impaired physical functionality. The cause of amyotrophic lateral sclerosis is mostly unknown. Genetic abnormalities, chemical imbalance and autoimmune diseases (where the body’s defense system attacks itself) have been suggested as causes.
Symptoms of ALS may begin as muscle weakness, cramps or twitching in a limb, clumsiness and tripping. Gradually, more muscles are affected and the weakness becomes more severe, leading to loss of important functions like speech, swallowing and breathing. These symptoms are similar to other neurological disorders and in order to rule out these conditions your doctor may perform blood and urine tests, MRI, electromyogram (EMG) and nerve conduction studies (tests the activities of muscles and nerves), and muscle biopsy.
There is no cure for ALS and treatment is based on slowing the advancement of symptoms, preventing complications, and improving your survival, independence and quality of life.
Your doctor may prescribe medication to treat any chemical imbalance present to alleviate symptoms. Your treatment plan includes physical therapy, to help with mobility, occupational therapy, to help you in your daily activities, and speech therapy. As breathing becomes more difficult, you may require mechanical ventilation for assistance.
Bell’s Palsy
Bell’s palsy is a condition that leads to sudden loss of control, paralysis or weakness of the muscles of the face. It is caused by damage to the facial nerve that is responsible for the movements of the facial muscles or facial expressions. The exact reason is not very clear, but the nerve damage is usually associated with infection by viruses such as herpes virus, adenovirus, influenza and mumps viruses. Bell’s palsy is more common in pregnant women, diabetics and those having upper respiratory tract infection.
The condition is usually one sided, resulting in the drooping of one half of the face with the eye on the affected side remaining open. Other symptoms may include drooling, dry eyes or excessive tearing, headache, and loss of taste sensation. The symptoms are usually temporary, improving after a few weeks to six months. Rarely symptoms may persist.
Complications of Bell’s palsy occur rarely and may include:
• Permanent damage to facial nerve, producing paralysis of half of the face
• Speech problems
• Involuntary muscle contraction (synkinesis) due to regrowth of nerves in the wrong direction
• Damage to the eye because of the dryness, leading to partial or complete blindness
Bell’s palsy is diagnosed by physical examination, tests to check the functioning of the facial nerve, and tests to rule out conditions that may exhibit the same symptoms, such as stroke. Further tests including electromyography (EMG) and imaging scans such as MRI and CT scan may be ordered if diagnosis is unclear or symptoms persist.
To treat Bell’s palsy, your doctor prescribes corticosteroid medication to reduce inflammation. It is best started within 3 days of symptoms. Facial exercises may speed up the recovery process. In case of dry eyes, artificial tears are prescribed.
Charcot-Marie-Tooth Disease
Charcot-Marie-Tooth Disease (CMT) is a hereditary neurological disorder characterized by damage to the peripheral nervous system, especially the nerves that carry signals from the brain to and from the hands and legs. CMT is caused either by defects in the gene that codes for axons (nerve fibers) or myelin sheath (covering the axon).
Some of the symptoms of CMT include:
• Muscle weakness and wasting
• Loss of sensation in the hand, feet, legs and forearms
• Stiffening of joints
• Abnormal tightening of muscles
• Scoliosis (curving of spine)
• Respiratory impairment (when the nerves of the diaphragm are affected)
• Curled toes
• Frequent falls
CMT can be diagnosed by evaluating your medical history and performing a thorough physical examination. Your doctor checks for signs of sensory loss, reduction in reflexes, muscle weakness and deformities in your feet. Other tests such as nerve conduction tests and electromyography (measures the electric activity of nerves and muscles), nerve biopsy (laboratory examination of a piece of nerve tissue) and genetic tests, may also be performed to confirm the diagnosis.
CMT cannot be completely cured; however, it can be managed with physical therapy (exercises to prevent muscle tightening), occupational therapy (treatment to help in your day-to-day activities), orthopedic devices (use of braces or splints for mobility and to prevent leg injuries) or surgery to correct deformities. Though CMT progresses with time, it is not known to reduce your normal life span.
Foot Drop
Guillain-Barre Syndrome
Guillain-Barre syndrome is a rare disorder in which your immune system attacks the nervous system. The cause of Gullian-Barre syndrome is unknown, but it often develops suddenly after a respiratory or gastrointestinal infection, surgery or vaccination (rare). Symptoms begin as weakness and tingling in your legs which spreads to your arms and upper body, and may progress into paralysis as the severity increases when certain muscles stop functioning. It may affect your gait, bowel and bladder control, ability to speak, chew, swallow and even breathe (a medical emergency). The syndrome may produce pain and cramping, and can affect heart rate and blood pressure.
To diagnose this condition your doctor performs a detailed history and physical examination. You may be asked to undergo an electromyography (measures the electrical activity of muscles), nerve conduction studies (measures speed of nerve impulses) or a spinal tap (cerebrospinal fluid surrounding the spinal cord is collected and examined).
Guillain-Barre syndrome cannot be cured; however, the following treatment may be suggested to lessen severity of the symptoms and speed-up the recovery process:
• Plasmapheresis: Plasma (component of blood), which contains the self-attacking antibodies is removed from blood.
• Immunoglobulin therapy: High doses of healthy antibodies from donors are injected into the body.
• Medication: Medication may be prescribed for pain and to prevent blood clots, which tend to form when you are immobile.
• Physical therapy: Physical therapy is ordered during the recovery period to help you regain strength.
Recovery from Guillain-Barre Syndrome is a long process and can take months or even years. Some patients have residual weakness after resolution of the syndrome and a small percentage of patients may experience a relapse many years later.
Muscle tone (tension) is controlled by signals that travel from the brain or spinal cord to the muscles. It regulates how much a muscle should contract or relax. When motor nerve pathways become compromised or the parts of the brain and spinal cord responsible for this function get damaged, it results in a condition known as hypertonia. Hypertonia is characterized by increased tension in the muscles causing rigidness and stiffness, and difficulty in movement. Motor nerve damage may be caused by a blow to the head, brain tumors, stroke, toxins, or conditions such as cerebral palsy, multiple sclerosis and Parkinson’s disease. Spasticity is a type of hypertonia in which muscles react in an exaggerated manner by spasming to stimulus received by movement.
Hypertonia may be mild or severe, and may sometimes progressively worsen. In cases of moderate hypertonia, there are increased incidents of falls or accidents due to lack of muscle control. More severe cases of hypertonia lead to joint contracture (frozen joints) and immobility, and may lead to problems such as bed sores, infection and bone fragility.
If left untreated hypertonia can result in loss of function or deformity. Treatment for hypertonia involves the administration of muscle relaxants. Your doctor may also give Botulinum toxin (Botox) injections to treat hypertonia of a specific body part. Exercise and physical therapy are recommended to preserve movement.
Myopathy is a group of neuromuscular disorders, characterized by muscle weakness and dysfunction of muscle fibers, caused by abnormalities in the structure and metabolism of muscle cells. Myopathy may be associated with inflammatory conditions, endocrine and infectious diseases, drugs or toxic causes. There are many types of myopathies and they may be either acquired (such as muscle cramps) or inherited (muscular dystrophy).
Symptoms may also include muscle pain, fatigue, dark colored urine and muscle atrophy (breakdown). Myopathy in children may show symptoms such as cardiac abnormalities, dyspnea (breathlessness), contractures (stiffness of muscle and joints) and skeletal deformities.
To diagnose myopathy your doctor will collect a detailed medical history and perform a thorough physical examination. Blood tests, urine studies and thyroid tests may be ordered. Genetic studies may be suggested. You may have to undergo a muscle biopsy (sample of muscle tissue is removed for microscopic examination) and electromyogram (electric activity of muscle is measured).
If you have inherited myopathy your treatment is mostly supportive and may include medications, occupational therapy, physical therapy (to improve strength and flexibility of muscles and prevent muscle contractures), nutrition and genetic counseling. In cases of acquired myopathy, the underlying condition is treated with medication. You will be asked to withdraw from any medication causing your myopathy.
Myotonia is a condition characterized by delayed relaxation of muscles. Any muscle group can be involved. Myotonia is associated with trouble releasing the grip on objects, difficulties in gait and getting up from a seated position. Repeated contraction or “warm up” is required to relax the muscles. Myotonia occurs as a result of an abnormality in the muscle membrane. It is associated with inherited neurological disorders such as myotonic muscular dystrophy and myotonia congenita, and channelopathies, in which the regulation of the muscle membrane is affected. Cold exposure can also trigger myotonia.
To diagnose myotonia, your doctor reviews your medical history and performs a thorough physical examination. An electromyography may be ordered to test the electric activity in muscles and blood samples are taken for a genetic test to confirm the diagnosis. Treatment for myotonia includes the administration of anticonvulsant drugs, physical therapy and rehabilitation. Myotonia is a chronic condition though symptoms may improve later in life.
Neurofibromatosis is an inherited disorder characterized by the formation of tumors on nerve tissue as a result of a disturbance in cell growth. Any part of your nervous system may be involved. The tumors are usually benign and can form in children to young adults. Symptoms depend on the nerves that the tumors compress, and may include loss of motor or sensory function.
Neurofibromatosis is of three types:
• Neurofibromatosis 1 (NF1): NF1 is usually accompanied by characteristic light brown skin lesions, freckling in the armpits or groin, small bumps on/under the skin or in the eyes, bone deformities, large head, short stature and learning disabilities.
• Neurofibromatosis 2 (NF2): Tumors form on the auditory, visual, cranial, spinal and peripheral nerves, causing hearing loss, balance issues, pain, weakness and numbness in the arms or legs, facial drop as well as cataract formation and other problems with vision. It is less common than NF1.
• Schwannomatosis: Tumors develop on the cranial, spinal and peripheral nerves causing pain, but not on the auditory nerve that carries information on balance and sound. It is a rare form of neurofibromatosis.
Your child’s doctor performs a thorough medical and family history and physical examination to diagnose neurofibromatosis. Your vision and hearing are examined, and imaging tests may be ordered to study deep tumors and bone deformities. Genetic tests may also be performed.
There is no cure for neurofibromatosis. The doctor monitors your child’s condition and treats complications as they arise. If pain is present, your child’s doctor may prescribe appropriate medication. Surgery may be recommended to remove tumors compressing nerves and surrounding tissue. Stereotactic radiation may be helpful for removing tumors in the ear without affecting hearing and balance. In case of hearing loss, your child’s doctor may recommend implanted or external hearing aids. If the tumors are cancerous and have spread to other parts of the body, a combination of surgery, chemotherapy and radiation is performed.
Central Pain Syndrome
Central pain syndrome is a neurological condition where you experience pain in a particular part of your body, but is not related to any injury to that part. It occurs as a result of damage to your brain, brainstem or spinal cord, brought about by trauma, stroke, seizures, infection or a tumor. The syndrome can show immediately, or after months or even years.
The pain can be of different types: aching, burning, numbing or sharp shooting pain. It is usually constant and increases with touch, temperature (cold), stress and change in emotions. You may experience pain in a restricted region or a larger area of the body. The ends of the hands and feet are common areas of complaint. Diagnosis of central pain syndrome is difficult as it may be unrelated to injury or trauma. Your doctor will perform a thorough medical history review and physical examination to identify and diagnose central pain syndrome.
Your doctor may prescribe pain, muscle relaxing, antiepileptic and antidepressant medications to treat symptoms of central pain syndrome. Surgery involving deep brain stimulation may be recommended if conservative treatments fail to relieve symptoms.
Paresthesia is a tingling sensation described as “pins and needles”, which is usually felt in the arms, hands, legs and feet. Other symptoms include itching, burning or numbness. It may be associated with spasms, sensitivity to touch and frequent urination. Paresthesia is usually temporary, occurring due to pressure applied on a nerve, as when you sit or lie down in a certain position for a prolonged period of time. However, if the sensation is persistent, it may indicate an underlying neurological condition such as stroke, multiple sclerosis and encephalitis. Other causes of paresthesia include tumors that compress nerves, nerve entrapment (carpel tunnel), alcoholism, diabetes, and Vitamin B12 deficiency.
To diagnose the cause of paresthesias, your doctor reviews your medical history and performs a thorough physical examination. Laboratory, imaging tests and nerve conduction studies (measures nerve activity) are ordered.
Your doctor will determine treatment based on your underlying condition. In mild cases, your doctor may prescribe pain medication and Vitamin B12 supplements, and may suggest acupuncture and massage therapy.
Periodic Paralyses
Periodic paralyses are a group of neurological disorders characterized by episodes of muscles weakness, flaccidity and paralysis. Muscle function returns to normal after the episode of weakness. Periodic paralysis is mostly hereditary and caused by a disruption in the ion channels of the nerve cells which are required for nerve impulses to travel. Attacks may occur following strenuous exercise, eating a diet rich in carbohydrates or following epinephrine or insulin injections. It may also be associated with high levels of thyroid hormone in the blood (thyrotoxicosis).
Periodic paralyses are of 2 types:
• Hypokalemic form: low potassium levels in the blood. The symptoms appear during the teen years, may be mild or severe, and can last from a few hours to many days. You may develop persistent muscle weakness as you grow older.
• Hyperkalemic form: high potassium levels. It is seen in infants and children and the symptoms occur for shorter and more frequent durations, and are less severe. Muscle spasms are more common.
When you present with the above symptoms, your doctor will study your history and perform a physical examination. Blood tests and urine tests may be ordered to assess for change in potassium levels. Electrocardiography may be performed, as it shows characteristic findings of periodic paralyses.
Treatment is aimed at reducing the severity of your symptoms and frequency of further attacks. Your doctor may prescribe medications, and advise you to avoid strenuous physical activity and avoid a carbohydrate-rich diet.
Primary Lateral Sclerosis
Primary lateral sclerosis is a slowly progressing degenerative disease of the nerve cells that control your voluntary muscles, causing them to weaken. It occurs mostly between the ages of 40 to 60 and is more prevalent in men. The cause is unknown, but a subtype called juvenile primary lateral sclerosis develops due to an inherited genetic mutation.
Symptoms first start in the legs then progress upwards to the trunk, hands, tongue and jaw. Movement requires effort and is slow. There may be muscle tightness, spasms, clumsiness, and problems with gait and balance. Later, muscles of speech and swallowing may be affected.
Diagnosis of primary lateral sclerosis is difficult because its symptoms are similar to that of other conditions such as amyotrophic lateral sclerosis, which has a more aggressive course. Your doctor reviews your medical and family history, performs a physical and extensive neurological examination. Tests may include MRI, electromyography (assess muscleactivity), nerve conduction studies (assess nerve activity), lumbar puncture (assess spinal fluid for diagnostic significance) and PET scans (identify brain degenerative changes).
In order to treat primary lateral sclerosis, your doctor will focus on alleviating your symptoms as there is no cure for this condition. You may be prescribed medication to reduce your spasms. Antidepressants may be administered. Physical therapy is advised to improve muscle strength and prevent joint stiffness. Speech therapy and the use of a wheelchair and other assistive devices may be necessary as the condition progresses.
• Increased age
• Poor physical fitness or inactive lifestyle
• Occupational risks
• Genetics
• Poor nutrition
• Smoking
It is important to know sciatica is a symptom but not a medical diagnosis. Some medical conditions that can cause sciatica include herniated discs, lumbar spinal stenosis, piriformis syndrome, Spondylolisthesis, degenerative disc disease, diabetes, tumors, and trauma.
• Pain in the buttock area and leg
• Sharp, intense, shooting pain down the leg
• Numbness, burning or tingling sensation in the leg or foot
• Weakness of the leg or foot
• Low back pain that radiates down to the buttock and leg
• Pain increases with coughing, sneezing or straining
• Pain increases with bending backward and with prolonged sitting or standing
To diagnose spasticity your doctor reviews your family and medical history, and performs a thorough physical examination to identify associated muscular or neurologic disorders. Your doctor may order tests to assess muscular activity, range of motion, and movement of your arms and legs.
It is necessary to seek treatment early as spasticity can lead to contractures (hardening of the muscles), joint stiffness, and pressure ulcers from immobility. Spasticity treatment includes medication, Botulinum toxin injections, occupational and physical therapy, use of braces, or surgery. In rare cases, your doctor inserts a pump into the spinal fluid to directly administer medications to the nervous system.
|
Skip to content
bi·o·feed·back, noun the use of electronic monitoring of a normally automatic bodily function in order to train someone to acquire voluntary control of that function
Types of Neurofeedback
Neurofeedback is a science of measuring brainwaves on an EEG and feeding that information back to the brain so it can learn to better regulate itself. At Brain and Body Solutions, we are proud to offer a variety of neurofeedback training assessments, analyses, and training protocols. We determine which system and type of training is the most effective based upon our over 20 years combined clinical experience. We utilize various manufacturers and systems including: NeuroGuide NF2, NeuroField pEMF, BrainAvatar, Coben Coherence Protocols, BrainMaster, BrainCore, BioExplorer, Synapse, and HeartMath.
EEG Traditional Neurofeedback
By using sensors on various parts of the scalp, we can see the brainwave amplitudes in real time. If the brain has become stuck in an unhealthy pattern of making too much or too little of certain brainwaves, we can ask it to change that pattern and give it a reward when it does that task. It is a type of brain exercise and a learning modality. Over a course of treatments, the brain quickly learns how to better self-regulate and restore balance and flexibility. This better allows for adaptation to stress and better function and performance. It is typically performed with 1, 2 or 4 sensors/channels.
19 Channel Neurofeedback
This type of training requires wearing a QEEG cap with 19 sensors or channels rather than individual sensors. By using 19 Channels, we can either train the surface of the brain by training all locations at the same time using Z-Scores, or we can create a 3 dimensional image and train deep brain structures with sLORETA training.
Z Scores and Normative Database
Z-Scores are statistical data which help us determine how your brain performs compared to what has been established as “normal.” A normative database is a collection of data from the brains of thousands of individuals thought to be of normal functioning in the same sex and age groups as you. This tells us if you are average, high, or low in certain frequencies compared to the norm. It can be seen as training into a balanced or comfortable brain state.
LORETA 3D Neurofeedback
LORETA (Low Resolution Electromagnetic Tomography) uses a full 19 sensor cap array. We are able to create a 3-D functional map of the brain, enabling us to train any number of surface or deep brain areas known as Brodman areas. We can train entire networks (brain highways), coherence (connectivity), processing speed (phase) and more; these are all crucial factors in optimum brain functioning.
Slow Wave Alpha-Theta Training
Alpha-Theta is a unique type of neurofeedback performed while eyes are closed rather than open. It is often called Deep States by practitioners for its similarities to hypnosis. Its main purpose is to create lasting changes in your life by helping you resolve deep issues in your subconscious mind. This type of training often makes you feel like you are floating in a dream state without allowing you to fall asleep. It is typically used for trauma, sleep disorders, peak performance, addiction, and spiritual growth.
NeuroField is a type of energy biofeedback using pEMF (pulsed electromagnetic field therapy). Remembering that we are systems composed of chemicals, electricity, and magnetic fields, this therapy is used to add energy for healing into the mind-body system through the magnetic field. The human body emits a field of energy that exists outside the body. The NeuroField uses a tiny electric field much less than your headphones, does not induce any current into the brain, but rather pulses very low frequency through magnets into the external field.
Heart Rate Variability Coherence Biofeedback
Over 20 years of research has told us that it is the quality of the emotion that affects how our body responds. The heart is, in fact, a highly complex information-processing center with its own functional brain. Utilizing HeartMath emWave technology, we measure the beat-to-beat changes in heart rate, called Heart Rate Variability (HRV). HRV training reduces stress, improves health, enhances focus, improves interpersonal communication, and increases creativity. It brings balance into your being to improve your interactions with others which in turn improves your relationships. It is often a precursor to neurofeedback to create coherence of the heart and emotions as well as increase oxygenation of the brain.
|
How satellite can help achieve digital transformation in Africa: Es’hailSat
14 5675 img ext 30 1Broadband access is seen as the key element in achieving digital transformation in Africa
Spearheaded by the World Bank Group in complement to the Africa Union’s vision, the Digital Economy for Africa (DE4A) initiative has listed its digital infrastructure goal to achieve universal affordable and good quality broadband access in Africa by 2030.
In GSMA report on Closing the Coverage Gap 2019, sub-Saharan Africa has the highest percentage of population not covered by mobile broadband i.e. 31% as compared to global average of 10%. By separating urban and rural data, it reveals that up to 38% of the rural population in Africa have access only to 2G or no mobile coverage, referencing data from the International Telecommunication Union (ITU) in Measuring digital development: Facts and figures 2020.
This is way higher than the global average of 16% rural population with 2G only or no mobile coverage. On the perspective of internet access at home, the number is even lower, where only 6% of the rural population have access to internet in comparison to 37% on global average.
While mobile broadband remains the easiest way for the rural community to access the internet, such gaps between the urban and rural population in Africa show the need to deploy mobile broadband access in rural areas. However, with the huge land mass across Africa, the cost to deploy mobile broadband in rural areas can be prohibitive due to long distances that not only limit the material and logistics requirement but also the terrestrial backhaul connection needed to delivery connectivity to the last mile.
Through deployment of VSAT communication via satellite, direct backhaul connectivity to mobile base station can be established without the need for terrestrial backhaul deployment. This offers savings in cost of deployment as well as time to deploy, as VSAT can be deployed rapidly within a short period of time.
Coupled with a hub and spoke architecture of VSAT, the data usage can be shared across all base stations within the data pool and this offers further cost savings in terms of unused or overprovisioned bandwidth. From the user experience perspective, Quality of Service (QoS) can be applied on the VSAT link to ensure comparable user experience with terrestrial connectivity.
Other than mobile backhaul, the VSAT technology can be coupled with other terrestrial access technologies such as WiFi, to create Rural WiFi community access which will increase internet penetration into rural areas. Satellites being an agnostic connectivity medium, will be the enabler for application deployment such as distance learning and remote healthcare to serve rural areas through servers hosted in teleports or designated data centres. For specific areas such as mining zones, point to point connectivity via satellite can be established to provide required connectivity to support operation and worker welfare need.
All the above can be made possible with satellite connectivity. With continued increase of satellite bandwidth supply and innovation in satellite technology such as adoption of High Throughput satellite design and movement towards Ka-band usage, satellite will play a pivotal role in enabling affordable broadband access to the rural community in Africa.
By Hamad Al Mannai, Vice President Commercial, Es’hailSat
|
How have digital transactions become safer?
December 10, 2020 | Devin Morrissey
couple shopping
Image Source: Andrea Piacquadio from Pexels
This blog was written by an independent guest blogger.
With the emergence of cryptocurrencies and massive online marketplaces, keeping your financial information private is a bigger concern than ever. In addition to these new and developing areas, in-person purchasing with debit and credit cards continues to grow. From debit transactions to cryptocurrency, millions of transactions are made daily, and it is cybersecurity experts’ jobs to keep us safe.
The symbiotic nature of technology and digital transactions means that as we develop more ways to spend money, experts find more ways to make transactions safe. Improvements in blockchain technology, decision analytics, and even debit and credit cards have made this more possible than ever. The creation of alternative currencies has pushed blockchain development forward, helping to ensure the safety of not only online transactions but financial transactions in general.
The implementation of EMV chip technology is a major step in the world of digital and in-person transactions. With the use of EMV chips, using credit and debit cards become more secure than ever. So how have all of these advances combined to make digital transactions safer?
Security and cryptocurrency
Bitcoin, the first cryptocurrency, was developed in 2009. Other types of currency have emerged online in the last decade, but all of them exist within a volatile market, with its value and applications fluctuating at a high rate. Existing only in the realm of online markets, cryptocurrency and its ever-increasing popularity have had a distinct effect on security for all digital transactions.
Blockchain technology is the basis for creating a cryptocurrency. Blockchain databases are built so that each new piece of data that is added — such as financial data and personal details — is put into its own “block.” When the next piece of data is added, it makes a new block, which is “chained” to the previous one. This creates a clear chronological timeline with securely stored pieces of information. Information stored this way is accessible, transparent, and easily tracked. This increased security and high-trust technology make cryptocurrency transactions safe and secure.
The use of high-trust, high-security blockchain technology in financial transactions has contributed to the future of cryptocurrency as it becomes more available to the general public. Already, cryptocurrency has given more people access to safe, secure money. When this is combined with other cybersecurity tactics and theories, experts are in an excellent position to secure digital transactions.
PINs and EMV chips
PINs and signatures have been the mainstay of US transaction security for a long time. For credit cards, signatures are required, and with debit cards, a private PIN is needed. However, if someone could fake your signature, or they got a hold of your card and PIN, you could have a security breach in your bank account. The implementation of EMV chips added an extra level of security.
EMVs, the chips that are now standard issue in both credit and debit cards, are a relatively new invention. Released as a standardized feature in the United States between 2014 and 2015, EMV chips offer an additional level of security to both debit and credit transactions. In Europe, where the chips have been in use for much longer, PIN and signature systems are standard operating procedure.
As chip technology develops, we may be seeing a combination of these two security systems for future credit cards. Chip-and-PIN credit cards would not require a signature but would require the use of not only a smart chip but a personal identification number. By not relying on a signature — an easily faked security measure — the safety of digital transactions can be improved greatly.
Decision analytics and emergency response
With the mass of data that is available for analysis regarding digital transactions, spending habits, and many other factors, the prediction of security risks is more advanced than ever. Artificial intelligence has begun to integrate more and more into high-risk technology, such as financial transaction tech, to predict and prevent crises. Projections and analyses that use decision analytics are being implemented not only in reaction to crisis situations but as they occur.
Some forms of decision analytics are best for preventative purposes. These include visual sorting and analysis, and user-friendly tools for managers and analysts who are less well versed in the specifics of decision analytics. Automated machine learning, on the other hand, has been implemented in Google’s BigQuery software that allows real-time analysis and highlighting of anomalies in the gathered data.
Financial data and yearly prediction analysis are tools that are useful for companies and individuals alike. By again utilizing the mass of data available, predictions of economic growth or decline allow cybersecurity professionals to focus on areas where they are most likely to see security breaches or increased attacks.
These efforts not only protect consumers by predicting scamming, hacking, and theft opportunities before they occur, they allow companies to build safeguards into their systems based on both past performance and future concerns.
Digital transactions have an array of security measures, from signatures to smart chips. As the way we use our money has changed, shifting from cash to cards, from cards to cryptocurrency, security has worked to stay one step ahead. By combining analytics and the combined strength of smart technologies, our digital transactions are safer than ever.
Share this with others
Get price Free trial
|
MIT Technology Review on CoVid-19 Origin
WIV virus research concept
How China emulated US techniques to construct novel coronaviruses in unsafe conditions (
“In 2013, the American virologist Ralph Baric approached Zhengli Shi at a meeting. Baric was a top expert in coronaviruses, with hundreds of papers to his credit, and Shi, along with her team at the Wuhan Institute of Virology, had been discovering them by the fistful in bat caves. In one sample of bat guano, Shi had detected the genome of a new virus, called SHC014, that was one of the two closest relatives to the original SARS virus, but her team had not been able to culture it in the lab.
“Baric had developed a way around that problem—a technique for “reverse genetics” in coronaviruses. Not only did it allow him to bring an actual virus to life from its genetic code, but he could mix and match parts of multiple viruses. He wanted to take the ‘spike’ gene from SHC014 and move it into a genetic copy of the SARS virus he already had in his lab. The spike molecule is what lets a coronavirus open a cell and get inside it. The resulting chimera would demonstrate whether the spike of SHC014 would attach to human cells.
“In 2014, the NIH awarded a five-year, $3.75 million grant to EcoHealth Alliance to study the risk that more bat-borne coronaviruses would emerge in China, using the same kind of techniques Baric had pioneered. Some of that work was to be subcontracted to the Wuhan Institute of Virology.
“Two years later, Daszak and Shi published a paper reporting how the Chinese lab had engineered different versions of WIV1 and tested their infectiousness in human cells. The paper announced that the WIV had developed its own reverse-genetics system, following the Americans’ lead. It also included a troubling detail: the work, which was funded in part by the NIH grant, had been done in a BSL-2 lab. That meant the same viruses that Daszak was holding up as a clear and present danger to the world were being studied under conditions that, according to Richard Ebright, matched “the biosafety level of a US dentist’s office.”
“Ebright believes one factor at play was the cost and inconvenience of working in high-containment conditions. The Chinese lab’s decision to work at BSL-2, he says, would have “effectively increas[ed] rates of progress, all else being equal, by a factor of 10 to 20”—a huge edge.
“The WIV had continued to unearth dozens of new SARS-like coronaviruses in bat caves, and it reported making chimeras with eight of them by fusing the spikes of the new viruses to the chassis of WIV1. Two of them replicated well in human cells. They were, for all intents and purposes, brand-new pathogens.”
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this:
|
From Wikipedia, the free encyclopedia
(Redirected from Hill Myna)
Jump to navigation Jump to search
Diversity and distribution within the genus
Scientific classification e
Kingdom: Animalia
Phylum: Chordata
Class: Aves
Order: Passeriformes
Family: Sturnidae
Genus: Gracula
Linnaeus, 1758
Type species
Gracula religiosa (common hill myna)
Linnaeus, 1758
see text
• Eulabes
Gracula is a genus of mynas, tropical members of the starling family of birds found in southern Asia and introduced to Florida in the United States.
The genus Gracula was introduced in 1758 by the Swedish naturalist Carl Linnaeus in the tenth edition of his Systema Naturae.[1] The genus name is from Latin graculus, an unknown bird sometimes identified as the western jackdaw.[2] Of the seven species listed by Linnaeus, George Gray designated the common hill myna (Gracula religiosa) as the type species.[3][4]
Until recently only two species were recognised, G. religiosa and G. ptilogenys. Previously, all Gracula were considered to belong to a very variable species commonly called the hill myna. Three additional subspecies of G. religiosa are increasingly being considered as distinct species. Formerly, the Sri Lanka hill myna was considered to be a subspecies of the common hill myna, but today all major authorities recognise them as separate. Comparably, the Enggano, Nias and southern hill mynas have traditionally been treated as subspecies of the common hill myna; a treatment still preferred by some authorities.
Five extant species are recognized:[5]
Image Scientific name Common Name Distribution
GraculaPtilogenysLegge.jpg Gracula ptilogenys Sri Lanka hill myna Sri Lanka.
Gracula religiosa robusta-01.JPG Gracula religiosa Common hill myna Nepal, Sikkim, Bhutan and Arunachal Pradesh, the lower Himalayas
KG SHM.jpg Gracula indica Southern hill myna southwest India and Sri Lanka
Gracula robusta - Annali del Museo civico di storia naturale di Genova (1886) (17788287234) (cropped).jpg Gracula robusta Nias hill myna Nias and other nearby islands off western Sumatra.
Gracula enganensis Enggano hill myna Enggano Island, off southwest Sumatra.
A 2020 study found that the subspecies G. religiosa miotera or Simeulue hill myna, which is endemic to Simeulue, Indonesia and has not been recognized in recent taxonomic arrangements aside from HBW (Handbook of the Birds of the World), also likely represents a distinct species and was likely driven to extinction in the wild in the late 2010s due to unsustainable collecting for the wildlife trade. The paper recommends rescuing the last genetically pure captive individuals for the purpose of captive breeding.[6]
Former species[edit]
Formerly, some authorities also considered the following species (or subspecies) as species within the genus Gracula:
Distribution and habitat[edit]
Behaviour and ecology[edit]
Food and feeding[edit]
2. ^ Jobling, James A. (2010). The Helm Dictionary of Scientific Bird Names. London: Christopher Helm. p. 176. ISBN 978-1-4081-2501-4.
3. ^ Gray, George Robert (1840). A List of the Genera of Birds : with an Indication of the Typical Species of Each Genus. London: R. and J.E. Taylor. p. 39.
4. ^ Mayr, Ernst; Greenway, James C. Jr, eds. (1962). Check-list of birds of the world. Vol. 15. Cambridge, Massachusetts: Museum of Comparative Zoology. p. 118.
6. ^ Ng, Dominic Y. J.; Švejcarová, Tereza; Sadanandan, Keren R.; Ferasyi, Teuku Reza; Lee, Jessica G. H.; Prawiradilaga, Dewi M.; Ouhel, Tomáš; Ng, Elize Y. X.; Rheindt, Frank E. (2021). "Genomic and morphological data help uncover extinction-in-progress of an unsustainably traded hill myna radiation". Ibis. 163 (1): 38–51. doi:10.1111/ibi.12839. ISSN 1474-919X.
7. ^ Butterfield, Kathy. "Owning a Mynah". The AACC Homepage. Archived from the original on 2015-07-12. Retrieved 2015-09-21.
External links[edit]
|
Helene Waldhorn
Helene Waldhorn
Born: March 19, 1922
Yasinya, Czechoslovakia
1933-39: Helene is glad that her parents moved to Paris. Life here is more comfortable and more exciting for her than in Yasinya. Her mother speaks broken French, but Helene, her younger sister and brother speak French fluently because they've grown up here. In her high school they also learn German. The French history lessons make her think that the French won't let themselves be pushed around by Hitler, and so they'll be safe from the Nazis.
1940-44: Helene has been deported to the Ravensbrueck concentration camp for women. After Germany defeated France in 1940, she managed to avoid the deportations of 1942 by hiding her Jewish identity with false papers. With her new identity and her high-school German she got an office job with the German military stationed in the town of Alencon. She also began collaborating with the French resistance, but was denounced for this by an informant in 1944. Now Helene is a political prisoner--the Germans still don't know she's Jewish.
Thank you for supporting our work
|
Superworm Care Sheet
Common Name Superworm
Scientific Name Zophobas morio
Size 1" - 2"
Like mealworms, superworms are the larvae of a darkling beetle, Zophobas morio. Not to be confused with giant mealworms, which are mealworms sprayed with a juvenile hormone, superworms are a great source of calcium, fat and fiber. Compared to mealworms, superworms yield much higher amounts of those three, mostly due to the hard chitin that superworms have. This rather thick chitin can make it harder for your pet to eat, so be sure when buying them your pet can handle chomping through it. The chitin makes the biggest difference when it comes to nutrition, so here’s an analysis of our superworms at Fluker’s:
Analysis of a Superworm
Moisture 61.92%
Fat 14.19%
Protein 19.06%
Fiber 2.6%
Calcium 173 ppm
Superworms are much more active than mealworms, which makes them more desirable in some cases, specifically, if your pet enjoys hunting or is a picky eater. Many insectivorous creatures are attracted to movement, which makes superworms a desirable choice. Superworms also last longer than mealworms in the pupae stage; superworms stay as pupae for upwards of three months while mealworms only last a few weeks. However, superworms do not last in a refrigerated environment, unlike mealworms, as cold temperatures don’t send them into hibernation.
Caring for Superworms:
A one thousand count bulk of superworms can be kept in a large plastic container, with air holes in the top. You should cover the superworms with a thick layer of wheat middling, oatmeal, or Fluker's mealworm bedding to provide bedding and a food source.
Superworms are relatively easy to keep, just keep them at room temperature. Place slices of potato on the top for water.
As said before, Do NOT refrigerate the superworms. Unlike other feeder insects, refrigerating superworms does not cause a hibernation.
|
Looking at the Jewish view of what 'Hell' is (something spiritual), how are physical places like Sheol, Tophet and Gehinom connected/related to it?
What do their names mean, and how do those meanings reflect what 'Hell' is?
1 Answer 1
The Gemara in Eruvin 19a lists several names for Hell:
א"ר יהושע בן לוי ז' שמות יש לגיהנם ואלו הן שאול ואבדון ובאר שחת ובור שאון וטיט היון וצלמות וארץ התחתית...ותו לא והאיכא תפתה
Says R' Yehoshua ben Levi: There are seven names for Gehennom/Hell: She'ol, Avdon, Be'er Shachas, Bor Sha'un, Tit HaYavan, Tzalmaves, and Eretz HaTachtis. ... Are there no more? But there is Tafteh.
According to that Gemara, the name "Gehennom" comes from "גיא שעמוקה (בגיהנם) שהכל יורד לה על עסקי (הנם)" - a deep pit in Hell for those who committed sexual sins (translation follows Rashi). It seems that it could also be related to one of its entrances, discussed earlier in that Gemara, which is between two palm trees in גיא בן הינם, the Valley of Son of Hinnom, a valley in Jerusalem opposite the Jaffa Gate. See my answer to another question of yours on the topic for more on how it got that name.
"She'ol" is derived from the verse in Jonah 2:3, "מִבֶּ֧טֶן שְׁא֛וֹל שִׁוַּ֖עְתִּי שָׁמַ֥עְתָּ קוֹלִֽי" - from the belly of She'ol I cried out, and You heard my voice.1
"Tafteh" is derived from Isaiah 30:33, "כִּֽי־עָר֤וּךְ מֵֽאֶתְמוּל֙ תָּפְתֶּ֔ה" - Tafteh was prepared from yesterday. In context it's very obvious this refers to Hell. JPS translates Tafteh in the verse as Topheth, which I assume is where you got Tophet from. The Gemara also explains that the name is related to the word for being persuaded, מתפתה ("mispaseh" or "mitpateh"), as one who is persuaded by the evil inclination to sin falls into Hell.
1As @DanF was alluding to in the comments (at least, this is how I understood it, hence my reply), the way the Gemara gets this name, and others, out of their respective verses is unclear, and it still doesn't explain why they are called as such. But those questions are for another time.
• "The Gemara there brings sources and reasons for each of these names" - Don't go there ;-) ;-)
– DanF
Mar 22, 2017 at 2:09
• @DanF I didn't. That's why I just made the point that the Gemara addresses it without quoting that bit of the Gemara. ;)
– DonielF
Mar 22, 2017 at 2:11
• 1
@DonielF thank u, but I'm not looking for other names of Hell, but a reason as to why their connected to Hell.
– Levi
Mar 22, 2017 at 3:29
• 1
@Levi So you want the other half of the Gemara that explains the names? Your question seems a bit unclear that that's what you were looking for. Can you edit your question?
– DonielF
Mar 22, 2017 at 3:34
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged .
|
#5: Design Your Own Shabbat
(Adapted from the work of The Rev. Jennifer Nichols)
The Prompt:
As a personal experiment, design and observe your own Shabbat or Day of Rest:
1. Think about what would constitute a challenging, and yet realistic, Shabbat day. Could you plan ahead in order to spend a whole day without doing work? If that is too difficult, is there some other way you could mark this day as special? Could you spend a day away from electronic devices? Could you spend a day in a natural setting? Could you devote a day to another person, such as a grandparent or sibling? Is there a religious service or practice you would like to attend? (e.g., church, synagogue, temple, yoga class).
2. In your journal, write down the rules of your Shabbat. What is the time frame? (e.g., twenty-four hours, sunrise to sunset, or after sundown). What are you allowed to do? What are you not allowed to do? What are you encouraged to do?
3. Observe your day of Shabbat.
4. Wait until the day after the experience and then write about it. Describe what you did and why you did it. Did your Shabbat meet your expectations? What did you observe? What did you learn? What would your life be like if you forced yourself to disengage from your everyday responsibilities and concerns occasionally or regularly? How would it change your view of yourself and your life? Why do you think such a practice has endured for so long?
The Context:
“The heaven and the earth were finished, and all their array. On the seventh day God finished the work that He had been doing, and he ceased on the seventh day from all the work that He had done. And God blessed the seventh day and declared it holy, because on it God ceased from all the work of creation that He had done.” –Genesis
It is safe to say that, at least until very recently, the vast majority of Jews and Christians have observed what is called a Shabbat or “Sabbath” day each week. This practice is rooted in one of the creation stories or “cosmogonies” in Genesis, the first book of both the Jewish Torah and Christian Bible. In the first creation story, God creates the cosmos in six days and then rests on the seventh. This day of rest has been seen as holy, and has been observed in various ways by different groups. Whatever the details of the Shabbat—whether it is observed on Saturday or Sunday, whether it is marked by worship, or study, or by refraining from work—it has been a fixture in the rhythm of the calendar for centuries in these cultures. In the last few decades, this practice has become less prominent, as stores and businesses have begun to stay open on weekends and even on holidays. However, there has been a recent resurgence in the idea of observing some kind of a special day each week, coming from religious and secular sources alike. After this exercise, I am sure you can imagine some of the personal, family, communal, and spiritual benefits it can have. (See William Powers’ Hamlet’s Blackberry, Walter Brueggemann’s Sabbath as Resistance: Saying No to the Culture of Now, Thich Nhat Hanh’s Present Moment Wonderful Moment, or www.sabbathmanifesto.org, for examples.)
|
Improving Mental Health Treatment for Low-Income Individuals
Image Source: Pexels
People often talk about how mental illness is something that affects a lot of us, with the statistics usually coming in at around 1 in 5 adults who will experience it in their lifetime. Yet, our approach to addressing this is still relatively casual. While it’s important to normalize the presence of mental illness to reduce the stigma attached to it, it’s just as vital to accept that it is a serious societal issue of epidemic proportions in the U.S.
The truth is that mental illness can detrimentally disrupt lives, and there is a medical and ethical responsibility to make certain that everyone who needs treatment to improve the quality of their existence has access to it. Unfortunately, the healthcare system in the U.S. is not designed to provide this. Rather, we have cultivated an approach in which help is not provided to those who need it but to those who can afford it. There is no possible way for this commercially-focused method to come close to adequately addressing a mental health epidemic.
Let’s take a look at a few areas where mental health treatment needs to be improved for those low-income individuals in particular.
Access to Information
One of the most important elements in improving mental health treatment doesn’t necessarily begin with the treatment itself. Rather, there is a need to make sure that those experiencing mental illness or its symptoms have access to adequate informational resources. Those in higher income brackets tend to have greater access to information and advice than people who are on the lower end of the socio-economic scale or who are experiencing poverty. As such, the quality of treatment and indeed their wellness is impacted accordingly.
Medicare is, of course, a vital aspect in making sure people with lower incomes have access to healthcare and health education. However, even when they do qualify for this service, patients can still have difficulty with navigating its use. There needs to be greater emphasis placed on helping these service users to understand what coverage their Medicare provides for mental health, what services they have access to as a result, and even the extent to which medications might be covered. When the healthcare system is built on an insurance process, there needs to be focus placed on making sure there is clarity in its use.
More importantly, though, public health departments need to be able to undertake mental health educational outreach in their lower-income communities. Many people don’t fully understand how mental illness can present, how it can impact their lives, and what they can do about it. Health departments should be connecting with schools, universities, workplaces, and community leaders to identify where education is most needed. This way, relevant literature and visiting nurse practitioners trained in public health education can be deployed effectively.
Affordable Therapy
In an ideal world, there would be a system of universal healthcare in which the subject of whether patients could afford therapy wasn’t an issue. It’s still a goal that it’s important to push toward, as one of the tragedies of the society we live in is that we are allowing people to suffer intensely — and at times even die — because they are unable to pay for the treatment that could help them. In the meantime, we need to also identify and expand more affordable access to long and short-term therapies.
To some extent, the regular Medicare program allows for therapeutic services. However, patients must understand that the area can be quite nuanced — there are differences between mental health therapy and counseling, and there are limitations to coverage for each, including potential deductibles. For instance, while Medicare B covers visits to therapists’ offices for individual treatment, non-psychotherapy support groups that can be a vital tool in mental health therapy are not covered. This creates a gap for service users, and rather than simply stating what is not covered, there needs to be a system that directs them toward other affordable options.
Telemedicine, for instance, has become an important tool in more affordable mental health services. As doctors aren’t subject to as many overheads as in-person practices, there are opportunities to offer therapeutic appointments both at lower prices and taking place in an accessible form for the user. Indeed, some private services such as BetterHelp offer a sliding scale pricing program based on income. Raising awareness of these types of alternatives can be valuable on the path to securing improved Medicare for all.
Better Research for Intervention
There is undoubtedly a connection between poverty and mental illness. However, there is unlikely any time soon to be any kind of intervention that would solve either of those problems, let alone both. In the meantime, our society needs to use smarter methods to identify those in need and place resources where they are most needed.
This is where using the tools of our contemporary digital landscape can be effective. We live in an increasingly data-rich world. We often hear about how this is detrimental to privacy, but it can also be a positive route to better understanding the changing needs for affordable mental health services. Data science is already being used to assist diagnoses and in suicide prevention following outpatient treatment. But it can also be employed to analyze the raw information about populations, including trends in therapeutic service requests, and other patterns that would otherwise be difficult to detect. Professionals can then create predictive models about where gaps in care are likely to exist and make recommendations to public health authorities.
It’s a frustrating truth that there is a solution to better mental health treatment for low-income individuals — universal healthcare — but it is not being employed. In the meantime, it’s important to utilize alternative methods that can help bridge the gap. As a community, we must work to provide quality health education, highlight affordable therapy options, and utilize data to more efficiently identify areas of need.
Show More
Back to top button
|
How do I change the layout of a swing in Java?
How do I change the layout of a JFrame in Java?
To use it you will need to set JFrame layout by using JFrame. setLayout(layout) and to pass flow layout as a parameter.
How do I change the layout of a JPanel in Java?
Call setLayout() to change the layout. JPanel p = new JPanel(); p. setLayout(new FlowLayout()); You can optionally specify the layout in the JPanel constructor call.
What are the layouts available in Java Swing?
AWT Layout Manager Classes
The borderlayout arranges the components to fit in the five regions: east, west, north, south, and center. The CardLayout object treats each component in the container as a card. … The GroupLayout hierarchically groups the components in order to position them in a Container.
What is layout manager in Java Swing?
In Java swing, Layout manager is used to position all its components, with setting properties, such as the size, the shape, and the arrangement. Different layout managers could have varies in different settings on their components.
What is grid layout in Java?
The GridLayout class is a layout manager that lays out a container’s components in a rectangular grid. The container is divided into equal-sized rectangles, and one component is placed in each rectangle.
What is set layout in Java?
The setLayout(…) method allows you to set the layout of the container, often a JPanel, to say FlowLayout, BorderLayout, GridLayout, null layout, or whatever layout desired. The layout manager helps lay out the components held by this container.
How do I change the current layout manager for a container?
You can change the layout manager of a container using its setLayout(LayoutManager) method. (It is possible to set the LayoutManager of a container to be null.
What is the difference between GridLayout and GridBagLayout?
A GridLayout puts all the components in a rectangular grid and is divided into equal-sized rectangles and each component is placed inside a rectangle whereas GridBagLayout is a flexible layout manager that aligns the components vertically and horizontally without requiring that the components be of the same size.
What is no layout manager in Java?
It means that no layout manager is assigned and the components can be put at specific x,y coordinates. It is useful for making quick prototypes. But it is not recommended for production because it is not portable.
What code would be the correct to change to another layout manager?
What code would bethe correct to change to another Layout Manager? setLayoutManager(new GridLayout()); B.
What is the best layout in Java?
Most common layouts: GridBagLayout – excellent when many components involved. BoxLayout (and associated Box class) – “glue” and “struts” (defined in Box , not BoxLayout ), combined with proper alignment and equalization of sizes, produce results pleasing to the eye. BorderLayout – often suitable for a top level …
IT IS INTERESTING: What is my SQL database in cPanel?
How do you handle events in Java?
Java event handling by implementing ActionListener
1. import java.awt.*;
2. import java.awt.event.*;
3. class AEvent extends Frame implements ActionListener{
4. TextField tf;
5. AEvent(){
6. //create components.
7. tf=new TextField();
8. tf.setBounds(60,50,170,20);
What is need of layout manager in Java?
Layout Manager in Java. A layout manager is an object that controls the size and position of the components in the container. Every container object has a layout manager object that controls its layout. Actually, layout managers are used to arrange the components in a specific manner.
What is purpose of JTree Mcq?
The JTree class is used to display the tree structured data or hierarchical data. JTree is a complex component. It has a ‘root node’ at the top most which is a parent for all nodes in the tree. It inherits JComponent class.
Categories SQL
|
The Volokh Conspiracy
Mostly law professors | Sometimes contrarian | Often libertarian | Always independent
Volokh Conspiracy
The United States Is Both a Republic and a Democracy
"Democracy" has long included representative democracy as well as direct democracy; and "Republic" was used by the Framers to refer to regimes that were not representative.
|The Volokh Conspiracy |
[A couple of items I read in the last several days -- including one I'll blog about later this week -- lead me to write again about this question, adapting some items I wrote up when we were at the Washington Post site.]
[1.] I often hear people argue (often quite militantly) that the United States is a republic, not a democracy. But that's a false dichotomy. A common definition of "republic" is, to quote the American Heritage Dictionary, "A political order in which the supreme power lies in a body of citizens who are entitled to vote for officers and representatives responsible to them" — we are that. A common definition of "democracy" is, "Government by the people, exercised either directly or through elected representatives" — we are that, too.
The United States is not a direct democracy, in the sense of a country in which laws (and other government decisions) are made predominantly by majority vote. Some lawmaking is done this way, on the state and local levels, but it's only a tiny fraction of all lawmaking. But we are a representative democracy, which is a form of democracy.
[2.] And the same two meanings of "democracy" (sometimes direct democracy, sometimes popular self-government more generally) existed at the founding of the republic as well. Some framing-era commentators made arguments that distinguished "democracy" and "republic"; see, for instance, the Federalist (No. 10), as well as other numbers of the Federalist papers. But even in that era, "representative democracy" was understood as a form of democracy, alongside "pure democracy": John Adams used the term "representative democracy" in 1794; so did Noah Webster in 1785; so did St. George Tucker in his 1803 edition of Blackstone; so did Thomas Jefferson in 1815. Tucker's Blackstone likewise uses "democracy" to describe a representative democracy, even when the qualifier "representative" is omitted.
Likewise, James Wilson, one of the main drafters of the Constitution and one of the first Supreme Court justices, defended the Constitution in 1787 by speaking of the three forms of government being the "monarchical, aristocratical, and democratical," and said that in a democracy the sovereign power is "inherent in the people, and is either exercised by themselves or by their representatives." Chief Justice John Marshall — who helped lead the fight in the 1788 Virginia Convention for ratifying the U.S. Constitution — likewise defended the Constitution in that convention by describing it as implementing "democracy" (as opposed to "despotism"), and without the need to even add the qualifier "representative."
Sir William Blackstone, who was much read and admired by the framers, likewise used "democracy" to include republics: "Baron Montesquieu lays it down, that luxury is necessary in monarchies, as in France; but ruinous to democracies, as in Holland. With regard therefore to England, whose government is compounded of both species, it may still be a dubious question, how far private luxury is a public evil …." Holland was of course a republic, and England was compounded of monarchy and government by elected representatives; Blackstone was thus labeling such government by elected representatives as a form of "democrac[y]." The same is so today. America is a democracy, in that it's not a monarchy or a dictatorship. (Some people claim it is too oligarchic, in which case they'd say America isn't democratic enough — but again they'd be distinguishing democracy from oligarchy.) America is not a democracy in the sense of being a direct democracy.
[3.] And the Framers didn't just refer to representative government as democratic -- they referred to direct democracy as a republic.
One way to get at this is to ask: What is the first nation that you think about when you hear the word "Republic" today, and that the Framers likely thought about? What is the most famous historical Republic, indeed the one that gave us the word "Republic"?
Why, the Roman Republic, of course, which The Federalist and many others discussed as a republic. And yet in the Roman Republic, there was no representative legislature.
The Senate (which wasn't elected or representative) did have considerable interpretive and advisory authority, and the elected praetors could interpret the law in important ways. But the laws themselves were made by direct vote of the citizens (or just by the plebeians), in the comitia centuriata, the comitia tributa or the concilium plebis. (If someone suggests that the Senate was Rome's elected representative legislature, you can point out that it was not elected, not representative, and not a legislature.)
Roman lawmaking was thus direct lawmaking, though with a voting system that heavily favored the rich, not representative lawmaking. The laws had to be proposed by a magistrate, such as a consul or a tribune of the plebs, so it wasn't precisely like an American initiative. But the laws didn't have to first be passed by some elected legislative body first (again, remember that there were no elective legislative bodies); in principle, they just had to be proposed by one elected magistrate — such as one of the 10 tribunes of the plebs — and enacted by popular vote in the assembly. You can think of it as something between the modern American referendum and the modern American initiative. But it was direct popular lawmaking, not representative lawmaking.
And the Framers routinely called Rome a republic — indeed, they labeled Athens a republic, even though Golden Age Athens famously involved direct democracy. Hamilton in Federalist No. 6 states that "Sparta, Athens, Rome, and Carthage were all republics." Hamilton in Federalist No. 34 specifically talked about the Roman legislative assemblies, yet called Rome a republic. Federalist No. 63, generally attributed to Madison, labeled Rome as an example of a "long-lived republic." (Profs. Akhil Amar and Rob Natelson have written more extensively on this.)
[4.] Today, "republican" does tend to refer more to representative systems, but "democratic" often refers to following the will of the people, whether through direct democracy or representative democracy -- the precise meaning differs depending on the context. If you're asking whether to do something by direct ballot or by representative processes, you might ask whether we should be more democratic or more republican. If you're asking whether China would be better off giving more power to Chinese voters, you might ask whether it should be more democratic or less democratic, quite apart from whether you think the democracy should be direct or representative.
But where one word is used, with all the oversimplification that this necessary entails, "democracy" and "republic" both work. Indeed, since direct democracy — again, a government in which all or most laws are made by direct popular vote — would be impractical given the number and complexity of laws that pretty much any state or national government is expected to enact, it's unsurprising that the qualifier "representative" would often be omitted. Practically speaking, representative democracy is the only democracy that's around at any state or national level. (State and even national referenda are sometimes used, but only for a very small part of the state's or nation's lawmaking.)
|
Chevron Left
Вернуться к How Computers Work
Отзывы учащихся о курсе How Computers Work от партнера Лондонский университет
Оценки: 448
Рецензии: 133
О курсе
Computers are everywhere, they aren't just the desktops and laptops we use for work but the phones in our pockets and even the watches on our wrists are also computers. You probably use a computer every day and in fact you are reading this on a computer! Just because we use computers all the time, doesn't mean that we understand them, or find them easy to use. Computer Science is the science of computers, it is the field of knowledge that experts use to understand computer systems. Knowing a little computer science will help you understand the computers all around you. This isn't a how-to course for a particular piece of software, instead you will learn some fundamental concepts that you can apply to any software or computer system. You'll apply these concepts to the kind of computer systems we use every day, including word processing applications, e-commerce, the internet and web sites. You will learn how to apply computer science concepts to solve problems in daily computer use and generally be a better computer user. Taking this course could be the start of your career in computer science, and the course is an introduction to the Bachelors in Computer Science from University of London, but it is also for you if you just want to learn a little computer science to help you better understand the computers you use in your ordinary life....
Лучшие рецензии
24 сент. 2020 г.
Good Course for a person who is not in the field of computer science and who wants to get deep knowledge in computer science.Thank You the University of London for that wonderful course.
11 окт. 2019 г.
A great course. Although I have come from a background in website development, I still picked up many useful tips and information about the fundamentals of computers and how they work.
Фильтр по:
126–129 из 129 отзывов о курсе How Computers Work
автор: Simon J K
4 апр. 2022 г.
The presentation of the videos isn't very good. The teacher is just reading from a script making the whole course feel flat and dull. It leaves you with the feeling he doesn't know his subject. I am sure that he does. There is some cool information in this course. But, it is presented badly, and the quizzes are not enjoyable challenges. The quizzes sometimes contain questions that weren't covered in the content. And as always, with this kind of course, the questions are worded to trip you up, not test if you understood the content covered.
автор: Rudnitskaya T I
17 апр. 2020 г.
не понимаю за что платить и вводить карту. еще и идентифицировать себя по паспорту - полный бред.
автор: drake
18 окт. 2021 г.
A bit superficial course not explaining any topic in details
автор: Shweta V
3 окт. 2020 г.
Too bad. I completed the course 3 days ago and till now i didnt get the certificate. I did id verification. But i cant get the certificate.
|
Here in the United States, nuclear power is usually looked at in a negative light. As a result, America‘s nuclear power plants tend to be rather old, inefficient and expensive. The newest nuclear power plant in the United States was powered on sometime in the 1990s. There are others that have been in operation since the late 1960s. But despite America‘s distaste for nuclear power, fission remains an essential part of our electrical ecosystem. Currently, our long-outdated nuclear power plants account for around two-thirds of America‘s renewable energy. This means that as these nuclear dinosaurs age out of use, our reliance on things like coal to meet our power demands will only go up in the years to come.
There are a number of things about nuclear power that make Americans reluctant to embrace it: the concern about large-scale disasters similar to the ones seen in Fukishima and Chernobyl; concerns about the storage of nuclear waste (significantly exacerbated by America‘s refusal to employ a MOX fuel approach); and the immense expense associated not only with operating such a plant, but with adhering to safety regulations established to mitigate the risks presented by massive, 1960s era reactors. These are all issues, however, that an energy startup out of Oregon believes they’ve found solutions to. Their new reactors aren’t something out of science fiction — they’re simply the organic extension of nuclear reactor technology finally leveraged for 21st century deployment.
NuScale’s new “nuclear-reactor/” target=”_blank” rel=”noopener noreferrer”>next generation” nuclear reactor is significantly smaller than the reactors currently employed by America‘s power grid — but that’s by design. These highly efficient reactors are designed with safety in mind, so they’re compact and contained. Simultaneously, they’re designed to be installed in clusters to support the energy needs of the community they’re intended to power. This modular approach to nuclear power, coupled with 21st century safety and efficiency, mean that these nuclear power plants can be installed closer to the communities they will be supporting (current regulation requires nuclear plants are at least 10 miles from the cities they power), will cost less to operate, and can even be added to over time to increase a plant’s total power output.
NuScale’s smaller reactors are kept cool in the same way as the mammoth reactors of olde: by circulating fresh water over them. The massive towers visible at nuclear power plants today are largely dedicated to this effort, whereas the NuScale systems rely on gravity and buoyancy in the smaller containers to help circulate the water with a much higher degree of efficiency. The result is more power out of the same amount of space while also offering a higher degree of safety.
How much more power? The average existing containment chamber in a large nuclear power plant is about the size of two school bused stacked end to end. In that amount of space you could fit around 100 NuScale reactors. If each NuScale reactor is good for about 60 MWe (Megawatt electrical) as NuScale claims, then you could get around 6,000 MWes out of that space. It’s not uncommon for existing reactors to produce closer to 2,500 MWes in a similar space.
A diagram of a NuScale small modular reactor (SMR). (NuScale)
But that’s the thing: these NuScale plants wouldn’t need to be installed as direct replacements for the massive plants that exist — as many of them are relaying power hundreds of miles from the reactor in support of far-off communities. These smaller and safer nuclear reactors could be installed in more places around the country, limiting the distance electrical charges need to cover before use and dramatically reducing the overhead costs associated with power bleed0ff, storage and transmission. In other words, it would not only be safer and more efficient to run these smaller reactors around the country, it would eventually result in lower energy costs as well.
These small reactors could also feasibly be used to power military installations that are currently woefully dependent on the commercial power grid. Under current electrical models, a cyber attack on America‘s power grid could dramatically affect the American military‘s ability to conduct defensive operations during an attack — but a grid supported by a wider variety of smaller, safer plants could mitigate an attack’s ability to affect it. These small reactors could also support other military endeavors, like the Army’s Project Dilithium, which aims at deploying small, stable nuclear reactors nuclear-reactors-into-combat-zones/”>into combat zones.
There are still some significant hurdles left between NuScale’s reactors and the re-emergence of nuclear power in the United States: chief among them is the Nuclear Regulatory Commission, who take their job, of ensuring that America doesn’t have its own Fukishima, rather seriously. They’re currently reviewing more than 12,000 pages of technical information provided by NuScale.
|
This term Year 2 have been learning about living things and their habitats. Today they went to investigate the living things that are in our school grounds. They used an app to help identify plants they did not know the name of. The children were very surprised by some of their findings.
Tags: Science , Year 2
|
Cottonwood trees grow along streams and moist areas at elevations from 150 to 6,000 feet and are used by beavers for food and damn-building. Traditionally, cottonwood leaves are boiled and placed on sprains, bruises, and broken bones to reduce swelled. Further, cottonwood leaves can be boiled and used as medicine to clean the eyes. This tree also commonly used to make raised platforms and to protect food stores from animals and flooding.
|
Object Serialization in Python
Photo by @joyfulcaptures on unsplash.com
Imagine you are working as a backend developer. After a bunch of logic operations and database queries, you get an object type Person, which you want to return to frontend. However, you have to return it as a JSON object instead of a Person object, since it is the standardized protocol in transferring data.
Without external libraries, you will have to do it this way:
class Person:
def __init__(self, name, age):
self.name = name
self.age = age
person = Person(name='Bill', age=19)
return_value = {
'name': person.name,
'age': person.age
You might also come across this problem when working with databases. For example, some relational databases and NoSQL databases only allow inputs of certain basic types, such as text, integer, float, ... and not objects. Therefore, in order to store objects in those databases, you first have to convert them into text or string before inserting.
To do this, you would have to loop through the object and get all of its attributes one by one. This is fine for objects with few attributes, but as this number increases, your work gets tiring and repetitive.
In contrast, there are situations when you have to convert a dictionary into a predefined object, like Person. For instance, when backend receives a request from frontend and wants to convert the request payload back to the original object, the process would look something like this:
request_payload = {
'name': 'Bill',
'age': 19,
'job': 'student'
bill = Person(
name = request_payload['name'],
age = request_payload['age']
You would have to loop through the request payload and pick the attributes you need for your object.
These processes are called Serialization and Deserialization, which you often encounter when dealing with the storage and transfer of data.
1. Serialization and Deserialization
1.1. Serialization
Serialization is the process of converting app-level objects to primitive types, such as dictionary, text, string,… The serialized objects can then be rendered to standard formats such as JSON for use in an HTTP API. This technique is often used in database management where we need to convert custom objects into dictionaries and then to texts before storing into the database.
1.2. Deserialization
Deserialization is the reverse process of serialization, in which data, typically dictionaries or JSON objects, are converted back into app-level objects. This is often used in web development when backend receives input data from frontend or get data from the database and convert them back into custom objects.
There are several libraries in Python that support serialization and deserialization, including pickle, json, cattrs, and most notably, marshmallow, which we are going through in the second part of this article.
2. Marshmallow
2.1. What is Marshmallow?
marshmallow is an ORM/ODM/framework-agnostic library for converting complex data types, such as objects, to and from native Python data types. It can be used for three main functions:
• Validate input data
• Deserialize input data to app-level objects
• Serialize app-level objects to primitive Python types
In reality, one of the most prominent use cases of marshmallow is to deserialize JSON objects to Python objects or serialize Python objects to JSON objects to be used in web APIs, especially in the communication between backend and frontend.
To accomplish all of the usabilities above, marshmallow introduces the definition of a schema which can be used to apply rules to validate the data being deserialized or change the way data are being serialized. A schema defines the rules that guides deserialization, called load, and serialization, called dump. It allows us to define the fields that will be loaded or dumped, add conditions on the fields, and inject computation to perform transformation between load and dump.
2.2. How to use Marshmallow?
We can install marshmallow with pip:
pip install marshmallow
Define a Schema
In order to do serialization and deserialization, we need to define a Schema which set the rules for those operations.
from marshmallow import Schema, fieldsclass PersonSchema(Schema):
name = fields.Str()
age = fields.Int()
For example, we want to define a Schema for class Person defined at the beginning of this article, which includes two fields name and age. To do that, we import Schema from marshmallow then inherit it in our custom schema. Then we list the attributes under our schema, including name and age since we want to use it for objects of class Person, along with the type for each attribute. In this case, name is a string and age is an integer.
Validate inputs
The first and most basic thing you can do with a Schema is validating input data. To do this, we use marshmallow's load function.
data = {
'name': 'bill',
'age': 'nineteen'
person = PersonSchema().load(data)
This will throw a validation error, as we are passing age as a string ('nineteen') instead of an integer as we defined earlier in our schema.
ValidationError: {'age': ['Not a valid integer.']}
By correcting age to 19, the object will be successfully deserialized to {'name': 'bill', 'age': 19}.
Serialize objects
To serialize app-level objects in marshmallow, we use dump.
person = Person(name='bill', age=19)
serialized_value = PersonSchema().dump(person)
# {
# 'name': 'bill',
# 'age': 19,
# }
After serializing with dump, we get a dictionary with keys and values corresponding to the original object, which could then be converted to a text easily and stored in the database.
Pass arguments into Schema fields
When creating schemas, we can pass optional arguments to each fields:
• many (boolean): whether the resulting schema is an array of the instantiated schema
• load_only (boolean): to be considered only during load
• dump_only (boolean):to be considered only during dump
• required (boolean): specify whether the field is required in deserialization
• data_key (string): specify the alternative field key in input data
• allow_none (boolean): whether None is allowed for the field's value
• validate (validator): used as function for value validation
• default: value used in serialization (dump) when the value is missing
• missing: value used in deserialization (load) when value is missing
• error_messages (dictionary): error messages to override the default messages on errors
from marshmallow import Schema, fields, validateclass EmployeeSchema(Schema):
name = fields.Str(
"required": "Name is missing.",
"type": "Name must be a string."
age = fields.Int(required=True, validate=validate.Range(min=18))
skills = fields.Str(many=True, allow_none=True)
home_address = fields.Str(data_key='address', default='Hanoi')
In the snippet above, we have a schema for class Employee, where:
• name is a required string and has customized error messages in cases when it is missing or has invalid data type.
• age is required and must be at least 18 (no child labor allowed)
• skills is an array of strings and can be None, as an employee can have many skills or no skills at all (though in the later case, it is questionable why he still remains at the company)
• home_address is a string, of which input can be received under address key, and has the default of 'Hanoi'
Nest schemas
In marshmallow, we can nest a schema inside another so that the new schema inherits attributes of the one being nested.
from marshmallow import Schema, fields
class PersonSchema(Schema):
name = fields.Str()
age = fields.Int()
class HouseSchema(Schema):
address = fields.Str()
class FamilySchema(HouseSchema):
people = fields.Nested(PersonSchema, many=True)
As you can see:
• FamilySchema inherits HouseSchema, which means that beside field people, it will also include field address added by HouseSchema.
• Field people in FamilySchema nests the schema PersonSchema, signaling that this field contains an array of Person objects. You know, people = many person(s), obviously.
With nesting schemas, handling complex and nested data structures is no longer a headache.
Perform transformation before and after dump or load
marshmallow allows us to perform transformation before or after serialization and deserialization by using a number of hooks. These hooks register a method to invoke before or after deserializing or serializing an object.
• @pre_load: before deserializing
• @post_load: after deserializing
• @pre_dump: before serializing
• @post_dump: after serializing
from marshmallow import Schema, fields, post_loadclass PersonSchema(Schema):
name = fields.Str()
age = fields.Int()
def make_person(self, data, **__):
return Person(**data)
In the example above, we made some changes to our previously-defined PersonSchema by adding a post_load method to it. By doing this, when deserializing, we get back directly to an instance of class Person.
2.3. Why should we use Marshmallow?
marshmallow makes no assumption about web frameworks or database layers. It will work with just about any ORM, ODM, or no ORM at all.
Concise, familiar, and reusable syntax
marshmallow uses classes. This allows for easy code reuse and configuration. It also allows for powerful means for configuring and extending schemas, such as adding post-processing and error handling behavior.
High configurability
It’s easy and convenient to customize and configure marshmallow schemas. Customized configuration can be achieved either by passing arguments into fields, using class Meta paradigm, nesting and extending schemas, etc.
This article covers a really brief introduction to serialization and deserialization in Python, as well as a quick tutorial on marshmallow, one of the current best tools for these jobs. This tutorial is just a glimpse of what marshmallow is capable of, so please refer to the official documentation for more advanced usage. Happy coding!
CS Student, Engineer, Math Nerd, Writer
Recommended from Medium
Thunder Sountracks for Video Making Pack 28
Thunder Sountracks for Video Making Pack 28
Why you should not ignore this feature in Visual Studio
In Visual Studio, right click on solution explorer and choose Analyze and Code cleanup and then choose Calculate Code Metrics
Do you know what is LicenseMain task failure in Gradle?
Exploring the economics of decision making in SAFe® through gamification
Create our Personal VPC using NAT Gateway and Integrate it with EC2.
Deploy AWS Amplify Python Lambda from MacOS with Docker
Get the Medium app
Bill Tran
Bill Tran
CS Student, Engineer, Math Nerd, Writer
More from Medium
Sorting Algorithms in Python — Bucket Sort
Powershell Scripting Guide to Python
Install Python3 From SourceCode in Ubuntu20.0.4
Python Features: 10+ Key Features of Python Language
|
Diatonic Chords and Rock Piano
Share on facebook
Share on twitter
Share on linkedin
When learning to play rock piano one of the most important skills you can acquire is learning to play all of your major triads (and later minor triads) in each of the 12 keys. The major and minor triads that can be found within a particular key are referred to as the “diatonic” triads. This is a term that you may have heard before but perhaps not fully understood. In this article, we’ll do three things:
1. make sense of the term diatonic;
2. I’ll show you a great exercise that you can use to practice this diatonic major/minor triad concept; and,
3. I’ll show you a couple of the most popular rock tunes of all-time that are built almost entirely on these triad exercises.
This term often confuses students but is actually quite easy to understand once explained. Think of any major scale (for example, D major). The notes contained in that D major scale are diatonic to D major (ie, the notes D, E, F#, G, A, B, C#). The notes not contained in the scale (ie, the notes outside of the key, meaning D#, F, G#, A#, and C) are called chromatic. That’s it. Pretty simple, right?
D major
Diatonic Chords
Diatonic chords refer to the chords which can be created within a key by following a few easy steps.
Step #1: Number each note of the scale in order.
Step #2: Stack 3rds on each note of the scale to build triads (3-note chords).
Step #3: Identify and play (and memorize) these diatonic chords.
Steps 1-3
Notice anything different about Steps 2 and 3 above? We switched from using regular numbers to Roman numerals when we labeled the diatonic chords. In music theory, we talk about individual notes by using regular numbers and chords by using Roman numerals. We also talk about chords by their Roman numeral name. So, if someone asks you to play a IV chord in the key of D, you would play a G major chord. (We also use upper and lower-case for major and minor, respectively).
Diatonic Chord Exercise
Here’s a great exercise that gets you playing through many (not all) of the diatonic chords in a given key. In your left hand you will simply play a descending major scale one note at a time. In your right hand you will play various inversions of the diatonic chords. Check it out!
Diatonic Chord exercise
This exercise gets you playing through many of the diatonic chords AND the various inversions of those chords. If this chord progression sounds familiar it’s because it’s the same chord progression that Billy Joel uses in his hit song “Piano Man” (although he plays it in the key of C major). This progression is also very similar to the chord progression used for the intro of Elton John’s song “Goodbye Yellow Brick Road.” It’s an often-used progression in rock music and an excellent exercise for learning your diatonic chords and their inversions. In order to get the most bang for your buck, be sure to practice this progression in a few different keys and use your metronome!
More to explore...
Jazzedge Teachers
Welcome Paul Buono
Read More »
Your email address will not be published.
1. Thanks Willie, it is really helpful information using these patterns in Roman Numerials as well as concentrating on only 3 note triad cords at a time instead of just getting overwhelmed by trying to use other notes of the major scale all at once.
2. Wow. I took lessons for 10 years and have never received a simple explanation of diatonic and chromatic. I’ve never understood it. I just read the notes as written. Thank you!
3. Thanks Willie for that. I’d mention the following as well.
1. Diatonic scale tone chords are not just the basis for rock but for all tonal music – classical, country, pop, etc. Another useful term basically the same as this is “Nashville notation”. A guitarist friend of mine once mentioned to me “feel the chords”. I had no idea what he was talking about. Eventually I did which is for each key, play the living daylights out of it and get to “feel the changes”. So on stage for instance, you’re not at that point thinking numbers 1-7 but feeling and hearing those 7 chords. Takes a lot of practice to get there to accomplish this.
2. Every music textbook in the world always mentions the triads. As a pianist, you also want to double the root note for each chord, turning them into tetrads. So usually, thumb and pinky in right hand. Doing this for each inversion is also very useful.
3. The fun part! In actuality, then for each of the seven chords, you can really assume you have 84 chords as a minimum by adding to the left hand, the 12 chromatic tones. So 7 chords times 12 = 84. This produces awesome sounds that everyone has heard in pop/rock. Also, do the same process only 12 against all the inversions too including the 4 note tetrads.
In closing: These steps separate the beginners and propel you into the pro-style of pop piano playing, the way the pros do it!
4. It’s good to learn that this exercise is used in popular songs too. More fun to practice.
The comment on it being used in other genres is good to know & the “Nashville Notation has peaked my interest too.
5. you have a knack of making concepts simple in your articles. thanks willie
6. Hi willie.you are a star.i would like you to explain to us as well the reharmonization.thanks
7. David Seagal: I don’t quite understand point #3. Could you elaborate?
8. Kirk, I’d reread #3, pretty straightforward. The left hand in essence becomes the bass line. If you have a C maj chord C E G over (left hand) a C that’s simply a C Major. Now put that Right hand CEG over a B in the left hand, it becomes basically a C major seventh now because of the B but you could also notate it in the sheet music as also C/B. Simply created by putting a B in the left hand, not a C which is the root for C major. Thing is there’s 12 tones in music
C C# D D# E F F# G G# A A# B. Therefore, you have 12 tones that you can substitute for simply a C in the left hand to support that right hand C major chord. So 99% of beginners only put the root, in this case C, in the left hand. To derive very cool sounds try those other 11 choices. Some result in really nice sounds, some are dissonant! But this is what real pro pop pianists do! Plus, even an inversion in the right hand for C like g c e still gives you the opportunity to put any of the 12 tones in the left hand! By the way, we’re only speaking of single tones in the left hand but it gets more interesting when more than one tone is used, like root plus fifth tone!
9. Excellent practice exercise and chord change inversion,dexterity.
Thanks Willie.
|
Industry Article
Choosing the Right TSN Tools to Meet a Bounded Latency
As automotive moves from domain to zonal networks, many different kinds of data end up sharing the same wires. This article looks at IEEE 802.1’s Time-Sensitive Networking (TSN) standards as a solution.
TSN may be new to many people even though the IEEE 802.1 Work Group has completed more than a dozen TSN standards over the last decade and some are already supported in HW, e.g. by NXP’s new SJA1110 Ethernet Switch. Many of these TSN standards are targeted at bounding the latency of a steam. With so many standards or “tools” available, the challenge of knowing what the proper “tool” to use and when is increasingly harder. This is especially true when considering that the TSN tools are intended to work together on the same port at the same time!
The Shaper Standards
Strict Priority Shaper
The first IEEE 802.1 shaper was standardized in IEEE 802.1p-1998 and it defines the Strict Priority Selection algorithm used to select the next frame to be transmitted out a port for ports with multiple queues. These priority queues are referred to as Traffic Class (TC) queues in the standard. Today, there are many supported mechanisms in 802.1 that can be used to determine which TC a frame gets enqueued to. While most of these mechanisms are beyond the scope of this article, the original mechanism of using the per-port mapping of the frame’s 3-bit Priority Code Point (PCP) field contained in 802.1 Tagged frames is an integral part of TSN – as this is the mechanism used to indicate that some frames need to be treated differently.
Strict Priority was created to solve the problem of effective network management. Simply put, a network can’t be managed using the same wires that “data” traffic uses if the “data” traffic is using all of the wire’s bandwidth and there is no preference (i.e., a higher priority) given to the network management traffic.
Figure 1 shows the solution via an egress queue structure typically used in the transmit path of bridges and end station’s NICs (Network Interface Controller).
Figure 1. Basic Egress Queue Model with Strict Priority.
The 1998 standard supports 1 to 8 TC queues and the figure shows the default mapping of a frame’s 3-bit PCP value to TC queue for an 8-queue design ( PCP 0 being a higher priority than PCP 1 is as it is in the standard). The highest TC (8) is labeled Network Management as this is the queue where these frames need to go in order to solve the network management problems.
Credit-Based Shaper
More than 10 years passed before a new shaper was standardized in IEEE 802.1. That new shaper, the Credit-Based Shaper (CBS), was targeted to solve issues associated with audio and video streams, but it can also be used for other data types as well. Why? Because CBS was designed to solve the generic problem of bursting, which occurs regardless of the data type. Bursting (the transmission of multiple back-to-back frames) occurs naturally in bridges on bridge ports that are congestion points and in end-stations as a result of the way end-station (NIC) hardware and software are designed.
NICs are optimized to get the highest data throughput possible and use bursting to attain this goal.
If the network congestion point is in a bridge, that bridge could drop packets. Examples of congestion points are a Gigabit port switching data to a 100 Mb/s port, or two 100 Mb/s ports switching data to a single 100 Mb/s port. In both cases, the output data rate is less than the potential input data rate.
CBS addresses the packet dropping problem at the network congestion points and NICs by de-bursting the flows in hardware. It is configurable on a per TC basis, so flows mapped to a queue where CBS is enabled automatically have their transmit bursts removed without any changes to the “optimized” NIC drivers or bridge enqueueing mechanisms.
Figure 2 shows where CBS resides (along with other shapers discussed later).
Figure 2. Example of Simultaneous TSN Shaper Egress Queue Model.
In this example, it is important to note that the Network Management flows are moved to TC 6 and the CBS flows are in TC queues above Network Management. This works because the Audio Video Bridging (AVB) profile specification (IEEE 802.1BA) limits the total transmission rate of the CBS flows to be no more than 75% of the port’s output data rate. Network Management is the top priority of the remaining (non-reserved) bandwidth ensures that it can perform its original function.
Time-Aware Shaper
After the AVB set of standards was completed for the plug-and-play audio/video use case, it was clear that there were use cases that required lower latency from what AVB could provide. And these users were willing to engineer the network if needed in order to get lower latencies.
The Time Aware Shaper (TAS) started out as an exercise by the author to find the theoretically lowest possible latency and TAS is what was proposed and standardized (IEEE 802.1Qbv). TAS works best in applications that are cyclical, i.e., there are fixed periodic intervals when critical sensor data is transmitted and processed, and the resulting critical actuator commands are issued. Most industrial machines work on this concept as do many other systems.
TAS minimizes the latency for time-critical flows by ensuring that the port a frame is egressing (bridge or end-station) is idle at the time the critical flow is scheduled to egress the port. This minimizes the latency since the critical flow can start transmitting precisely at its scheduled time, as the port is not busy transmitting anything else. The timing of the packet transmission is accomplished by the addition of transmission gates to the output of each TC queue (the orange boxes in Figure 2). A timing schedule of gate opening and closings for each TC is also needed. If a gate is closed on a queue that TC cannot transmit any data.
The TAS schedule becomes easier to solve by minimizing the number of critical flows and TC queues that use this extremely lowest latency mechanism and by minimizing the number of gate opens and closes per cycle. This is shown in Figure 2 as only one TC is shown as “Scheduled” and this is TC 2 indicated by a PCP value of 0. How can a very low priority queue get lower latency than the TC queues above it? If it is the only TC with a gate open, it is by definition the highest priority during that transmission window.
Preemption was developed as a standard at the same time as TAS. It was seen as an alternative for networks that were not Time Aware and it too gets very low latency, but not as low. Preemption is easier to use as there are no “Schedules” to work out. But it cost a lot in hardware, only works if its link partner also supports preemption, works best at 100 Mb/s or slower links, and the standard supports only one level of preemption, all of which minimizes its potential use cases.
Preemption interrupts a “preemptable” frame in the middle of its transmission. It then allows the “express” frame or frames to egress the port. Only then does it resume the transmission of the “preempted” frame where it left off. This interruption can occur multiple times on the same frame.
Preemption is a combination of two standards. The MAC mechanism and the codes sent down the wire is standardized in IEEE 802.3br. It defines two MACs, a pMAC (Preemptable MAC) and an eMAC (Express MAC). These can be seen on the right-hand side of Figure 2. Preemption has the following restrictions:
• Minimum fragment size is 64 bytes but can be negotiated by the link partner to be 128 or 256
• Fragment padding is not done so a fragment could be nearly twice the min fragment size
The partner standard for preemption (IEEE 802.1Qbu) defines which TC queue or queues are connected to the two MAC types. In Figure 2, TC 1 is the only TC connected to the eMAC. That means that any frame enqueued to TC 1 will preempt all the other TC queues (i.e., any data that is currently transmitting). Even though TC 1 is the lowest priority queue, it is effectively above all the other queues since it can preempt them! But only if its TAS gate is open.
Metrics for the Shaper Standards
The IEEE 802.1 Working Group designs their standards so they can work together at the same time, as each TC queue on a port can be configured with a different shaper. To make it easier to determine which shaper is the best one for a given job, metrics need to be evaluated. The ones addressed here are cost and performance. Availability is also an important metric as the perfect tool can’t help you if you can’t get it at any price. In general, the newer IEEE standards are less available and are not discussed.
Shaper Costs
The costs examined are:
• Engineering Complexity: The expected user difficulty or effort needed to get proper results.
• Wire Efficiency: The amount of data can go down the wire, including both the critical data and the background data.
Shaper Performance
It is quite difficult to get to the absolute worst-case numbers for a shaper as network topology or other parameters may come into play. Instead, using first-order approximations resulting in slightly larger latency numbers are used. Once the network is fully configured with all the expected streams, a network analysis tool needs to be used to calculate the accurate worst-case latency numbers.
Per hop latency equations for each shaper are shown below as these are easier to evaluate as a flow may traverse many hops. Only the network designer knows how many hops and what the maximum bounded latency target is for each flow.
Credit-Based Shaper (Multiple Classes are Supported)
• Class A ≈ tInterval + tMaxFrameSize
• tInterval: The observation interval of the Class (125 uSec as specified in AVB – but this can be changed for engineered networks!)
• tMaxFrameSize: The maximum size of an interfering frame + gaps, etc.
• Class B ≈ tInterval + tMaxFrameSize + tTimeForAllHigherFrames
• tTimeForAllHigherFrames: The time to transmit all Class A frames (+ gaps, etc.) for the duration of Class B’s tInterval (which is typically a multiple of Class A’s tInterval)
• Class C ≈ tInterval + tMaxFrameSize + tTimeForAllHigherFrames
• tTimeForAllHigherFrames: The time to transmit all Class A and Class B frames…
• Etc.
Time-Aware Shaper
• Store and Forward with Traffic Class Gate Open ≈ tDevice + tFrameSize
• tDevice: The delay through a Store and Forward bridge
• tFrameSize: The size of the frame passing through the bridge
tDevice is product specific. To advance the latency discussions in IEEE 802.1, a “rule-of-thumb” default was proposed, which works out to be ≈ 10.5 uSec for 100 Mb/s and 1.5 uSec for Gb/s.
• Store and Forward Preemption ≈ tDevice + tFrameSize + tFramelet
• tDevice: The delay through a Store and Forward bridge
• tFrameSize: The size of the frame passing through the bridge
• tFramelet: 127 bytes + overhead if 64 byte fragmentation is enabled
tFramlet, is the largest part of a frame that can’t be preempted. If 64-byte fragmentation is being used then 127 bytes cannot be further fragmented as it would result in a fragment smaller than the minimum 64-byte requirement
Link speed affects some of these parameters, but not the observation interval (tInterval). Therefore, results will be calculated for both Fast Ethernet (FE) and Gigabit Ethernet (GE). For easy comparison between shapers, the following parameters are used for all the shaper equations: tMaxFrameSize is 1542 (1522+20) bytes, tFrameSize is 64 bytes, tInterval is 125 uSec and all numbers are rounded up to the next highest uSec or 10th of a uSec.
Table 1 summarizes the cost and the calculated performance data for each of the TSN Shapers discussed with a proposed ranking.
Table 1. Latency TSN Tool Comparison in Lowest Latency Order
Table 1: Latency TSN Tool Comparison in Lowest Latency Order.
Both TAS and Preemption are much faster compared to CBS, but CBS is ranked first for the following reasons:
• It’s fast enough for a large number of applications
• It’s the only shaper on the list that is easy to use
• It’s the only shaper on the list that allows 100% of the wire’s bandwidth to be used
• And more than one TC can be used with different observation intervals/latencies. The other shapers are best limited to a single TC or their ease of use becomes hard.
CBS being easy to support more than one TC makes it quite is interesting. For example, standard AVB Class A audio traffic can be used in one TC, while at the same time as other TC can be configured for longer latency CAN and/or LIN traffic data types (or data with equivalent message bandwidth and latency requirements) all together on the same wire.
TAS is ranked above Preemption for the following reasons:
• It has the absolute lowest attainable latency
• Both shapers have an impact on the other flows, but TAS’s effect is deterministic while preemption’s is not as easy
• Preemption can’t be used unless both sides of the wire support it
• Preemption is not as widely available
Tool Usage Order
Based on the ranking of the TSN Shaper tools, the following is a proposal for a shaper selection order to be used for each of the streams in a network. The goal is to use multiple CBS queues with different observation intervals/latencies for all the flows and only use the other shapers if absolutely necessary.
The first step is to know what is going on in the network.
• Create a sorted list of all the critical flows in the network. Place them in order from their smallest to highest allowed end-to-end latency needed for their target application.
• Best effort flows don’t need to be considered, by definition.
• Verify the bandwidth from the critical flows through any link does not exceed 75%.
• If it does, something must be done. Move flows out of the problem link to a link or links with much less load. If this is not possible you have to increase the link’s speed.
• Calculate the CBS observation interval needed to meet the end-to-end latency for each flow. The number of hops and their speeds needs to be taken into account. Re-sort the list in lowest to highest observation interval order.
Examine your re-sorted list to find any natural groupings of similar observation intervals. Four or five sets is a great number as a lot of devices support enough TC queues for this quantity. Some interesting cut-off limit possibilities are 125 uSec, 250 uSec, 1000 uSec, 2000 uSec, etc. The 125 uSec cut-off point for the observation interval is an important one. Are there any flows that require less than this number? If so, these will need some more work as follows:
• If the flow passes only through GE links, the observation interval can be reduced down to 31.25, or 62.5 uSec.
• If the flow passes through any FE links, can the number of hops be reduced and/or can any of the link speeds be increased? If no, then use TAS next and then Preemption as last resorts.
• Remember, these options are limited resources that are less wire efficient and work the best supporting the fewest number of flows.
• Subtract any wire efficiency loss from TAS and Preemption as used bandwidth against the 75% critical flow limit that is allowed on a port.
After finding solutions for the very few ultra-low latency flows, process the remaining groupings in lowest to highest observation interval order.
• For each grouping select an observation interval that is as large as possible but that is lower than what all of the flows in that grouping require.
• Start by loading each Class with no more than 20% of the links remaining bandwidth. Adjust this if needed, but remember the total for ALL critical flows and their frame overhead (IFG and preamble) along with any bandwidth and overhead used for TAS and/or Preemption on the port, must not exceed 75% of any single link’s bandwidth!
• If this happens, try an alternate path.
• Increase the observation interval where possible as this may allow more flows.
Don’t forget to reserve a TC for Network Management (it must be the highest non-CBS Traffic Class) and one for best-effort flows.
The IEEE TSN standards are designed with the intent that they can work together and that they are applicable well beyond their initial target application. The Credit-Based Shaper is a prime example of this as the standard supports more than the two traffic classes that are called for in the AVB profile (i.e., CBS is not limited to just audio and video data and it’s not limited to the AVB profile’s plug-and-play parameters).
Automotive networking has many new data delivery/latency requirements and TSN has been designed to support them all together on the same wire within the bounds of physics. Even though Automotive networks are engineered, the TSN tools enable the hardware to enforce the needed guarantees to make the engineering job much simpler. With products like NXP’S new SJA1110 Ethernet switch, the tools are at hand, ready to use.
A proposed queueing model is shown in Figure 3.
Figure 3. Proposed TSN Egress Queue Model.
In IEEE 802.1 there is a current limit of only eight priority code Ppints (PCP) that can be indicated in tagged frames. Thus this very limited resource needs to be used with extreme efficiency. In TSN, each PCP value becomes more of a Class-of-Service label instead of a priority value. Their assignment in the figure reflects this approach and it is consistent with the AVB standards so the audio and video data types can be supported too.
|
Which EU Countries Don’t Use the Euro?
EU Countries That Don’t Use the Euro
While 19 of the 27 EU member states have adopted the euro as their currency, as of 2022, 8 have not. These countries are:
• Denmark
• Sweden
• Hungary
• Poland
• Czech Republic
• Bulgaria
• Romania
• Croatia
EU Countries That Do Use the Euro
The 19 EU member states that have adopted the euro are:
• Austria
• Belgium
• Cyprus
• Estonia
• Finland
• France
• Germany
• Greece
• Ireland
• Italy
• Latvia
• Lithuania
• Luxembourg
• Malta
• the Netherlands
• Portugal
• Slovakia
• Slovenia
• Spain
As well as the 19 EU member states that use the euro, Andorra, Monaco, San Marino, and Vatican City all use it under formal agreements made with the EU, despite not being EU member states.
Why Don’t These Countries Use the Euro?
Most countries that join the European Union are required to adopt the euro as part of their membership and have done so. EU countries that don’t use the euro as their currency falls into 3 categories:
1. Countries that are working towards adopting the euro but have not yet done so
2. Countries that despite being expected to adopt the euro have avoided doing so
3. Countries that are exempt from adopting the euro. Denmark is now the only EU country that is not officially required to join the euro, although the UK was also exempt from joining the euro before its departure from the EU
Importantly, while many EU countries have seen the euro as beneficial, there has not been universal acceptance.
Currency: Danish Krone (DKK)
As we just said, Denmark is officially exempt from the requirement to join the eurozone and adopt the euro as its currency.
Following a referendum held in Denmark in the year 2000, in which the Danish public voted not to use the euro, the government of Denmark negotiated an exemption from doing so. As a result, Denmark still uses the Danish Krone as its currency.
While Denmark doesn’t use the euro, it does still participate in the European Exchange Rate Mechanism (ERM II). As part of its participation in this, the value of the Danish Krone is pegged to the value of the euro. This means that the Danish government is required to control the value of the Danish Krone so that it stays at a certain level of value relative to the euro. What this does is fix the exchange rate between Danish Krone and the euro.
Having a fixed exchange rate is helpful in many ways. However, one important result is that, with a stable exchange rate, trade between Denmark and countries that use the euro is far smoother.
Participation in ERM II and having a fixed exchange rate against euros does in some ways emulate membership of the eurozone (use of the euro). However, the situation is complicated with much debate taking place about whether it would be better to just join the euro or to maintain the current position.
Should Denmark Join the Euro?
Under the ERM II system, some argue that Denmark is able to enjoy many of the benefits that eurozone countries have while still maintaining an important level of independence in monetary policy.
While Denmark, under normal conditions, benefits in a similar way to being a eurozone country from the ERM II system, the independence it maintains is particularly useful in times of financial crisis. If Denmark was a eurozone member it would be forced, in times of financial strife in Denmark, to rely on the monetary policies of the eurozone, which may not work in its favour.
Others argue that participation in the ERM II system just puts Denmark in a weak position.
Under the ERM II system, Denmark is effectively forced to follow the monetary policies of the EU without having any influence on what they are. If Denmark adopted the euro and became a eurozone member, it would be able to actively participate in eurozone monetary policy according to the eurozone rules. The argument on this side is essential that Denmark would be able to benefit from eurozone membership and also manage its currency effectively as well.
Since 2011, polls conducted in Denmark have consistently shown opposition to joining the euro, although historically they have been quite variable.
Currency: Swedish Krona (SEK)
Sweden is, in many ways, in the same position as Denmark without having negotiated exemption from joining the euro.
Like Denmark, Sweden (in 2003) also held a national referendum on whether the country should adopt the euro, in which the public voted against it. However, instead of negotiating exemption, Sweden has simply avoided joining the euro. They have done this by failing to fulfill the criteria that countries are required to meet before they adopt the euro.
Before adopting the euro as the national currency, EU countries are required to meet certain criteria which are known as the convergence criteria. These criteria were originally set out in the Maastricht Treaty of 1992. Under the convergence criteria, before adopting the euro, EU member states must meet certain requirements related to:
• Price stability. Importantly, the rate of inflation must be kept at a certain level
• Public finances. The country should not have an excessive national debt
• Interest rates. Long term interest rates should be kept at a certain level
• Exchange Rate Stability. Importantly, countries must participate in the European Exchange Rate Mechanism (ERM) II for at least two years before joining the eurozone.
Sweden and the European Exchange Rate Mechanism (ERM II)
Sweden meets all of the criteria for adopting the euro but has chosen not to participate in the ERM II system. This has been done so that Sweden is not obliged to join the Euro in order to uphold the result of the 2003 referendum.
Instead of actually participating in ERM II, Sweden has, through its central bank, followed a monetary policy that has tied the value of the Swedish Krona closely to the value of the euro. Sweden is effectively in a similar position to Denmark without actually being part of ERM II.
Sweden keeps a stable exchange rate with the euro and by enlarge follows eurozone monetary policies without being able to contribute to them. However, they maintain a potentially important level of monetary independence.
In Sweden, as in Denmark, public opinion is mixed about whether it would be more sensible to join the eurozone or to maintain the current position.
Currency: Hungarian Forint (HUF)
Hungary has failed to adopt the euro primarily due to an inability to fulfill the convergence criteria.
After joining the EU in 2004, Hungary’s then socialist government had planned to adopt the euro in a short period of time. However, a high budget deficit, a high level of inflation, and a high level of public debt meant that they were unable to do so. Despite austerity measures being introduced and other attempts being made to solve the financial problems that the country has, Hungary has been unable to join the eurozone.
As well as this, there has more recently been reduced public support for adopting the euro.
Currency: Polish Zloty (PNL)
Poland has never held a referendum on whether the country should adopt the euro, but there have traditionally been very mixed opinions on whether it would be beneficial or not for Poland to do so. As a result, Poland has avoided fulfilling the convergence criteria that would qualify the country to use the euro.
Notably, like other countries that have failed to adopt the euro, many argue that it would be detrimental for Poland to lose its monetary policy independence. Also, some believe that the low value that Polish Zloty has gives Poland a competitive advantage which would be lost if the euro were adopted.
Others point out that a deeper level of financial integration with Europe would open up a huge number of trading opportunities within the EU.
Czech Republic
Currency: Czech Koruna (CZK)
After the Czech Republic joined the EU in 2004 there was initially a high level of support for adopting the euro. Adoption of the euro was generally seen as a beneficial move for the country and measures were put in place to work towards fulfilling the convergence criteria so that it could join.
Initially, there were delays in the process of the country adopting the currency that was expected to be overcome. However, following the eurozone crisis, support from within the country for adopting the euro has dramatically decreased. One recent poll, conducted in April 2019, found that 75% of the population opposed the adoption of the euro as the country’s official currency.
As a result, the Czech Republic has actively failed to meet the convergence criteria and, as a result, has not been obliged to adopt the euro.
Currency: Bulgarian Lev (BGN)
Despite decreasing levels of public support for adopting the euro, Bulgaria is persisting with plans to do so and looks set to meet its target of joining in 2024.
Currently, Bulgaria meets four of the five convergence criteria, with the only exception being that the country’s currency (the Bulgarian lev) has not been part of the ERM II system for two years. It did, however, join the system in July 2020 and once it has been a member for two years Bulgaria will qualify to adopt the euro.
Currency: Romanian Leu (RON)
Public support in Romania for adopting the euro has consistently been in favour of its adoption. Despite efforts being made to meet the convergence criteria, the country has so far failed to do so and, as a result, has been unable to adopt the euro.
Currency: Croatian Kuna (HRK)
Traditionally, although it has wavered in recent years, there has been a good level of support for the adoption of the euro in Croatia. On top of this, the country’s current currency, the Croatian Kuna, has been pegged against the euro for a long period of time meaning that Croatia has been closely tied economically to the eurozone for some time.
The country is actively working towards fulfilling the convergence criteria and officially intends to adopt the euro in 2023.
Sign up to our Newsletter
Thanks for subscribing!
Want to know more?
Preview the product demo now.
Bound can integrate directly with your accounting platform.
|
Today in 1942 was the birthday of the guy who created the flag of the United States.
Yes, I know the stars and stripes are actually much older than 1942, but remember, the flag has changed over the years.
Originally there were thirteen stars and thirteen stripes.
And while the stripes have mostly stayed at thirteen, the number of stars has been rising for much of the country’s history.
That’s where Bob Heft comes in.
In 1958, Heft was a high school junior in Ohio.
Heft had to create a project for his U.S. history class, and the assignment gave him an idea.
There had been 48 states since 1912, so there were 48 stars on the U.S. flag.
But by the late 1950s, the push was on to make Alaska and Hawaii states as well.
Heft decided his class project would be to design the first flag representing 50 states.
He took a 48-star flag his parents had gotten as a wedding present and redesigned the field of stars.
There were five rows of six stars, and in between them, four rows of five stars.
Not bad for a guy who said he’d never sewn anything before in his life.
But his teacher gave him a B minus, saying he’d added too many stars to the flag.
Heft protested, explaining the concept, and the teacher said, if you can get the government to accept the flag design, maybe I’ll change the grade.
And that’s exactly what Heft did: for two years he called and wrote the White House over and over, explaining that he’d created a flag that they’d need with two new states in the Union.
One day the phone rang.
It was President Dwight Eisenhower, inviting Heft to watch his flag being raised over the U.S. Capitol for the first time on July 4, 1960.
And that history teacher changed Heft’s grade to an A.
Today in 1809 was the birthday of Edgar Allan Poe.
Interesting side note: there was once an effort to make a biopic about the great writer that would have starred none other than Sylvester Stallone.
He eventually decided he wasn’t right for the part, but not before doing a costume test.
How about Poe vs. Clubber Lang instead?
A Boy Scout designed the 50-star American flag (Scouting Magazine)
Robert G. Heft (Ohio History Central)
Stallone Shows Why He Was Wrong for Edgar Allan Poe, But Vows to Finish Script (Movieweb)
We salute our Patreon backers for making this show possible
Photo by jnn1776 via Flickr/Creative Commons
|
Why Your Digestive Health Is Important Than You Think (8 Science Backed Reasons)
Do you wish to fine-tune your health and happiness? If yes, it is essential to learn about your gut health and how you can nourish it. Our gut is the epicenter of our body. It takes part in many critical body functions; hence it is imperative to keep it balanced.
The digestive system controls almost everything from the immune system to brain health, body weight, and whatnot. Facts state that 90 percent of the happy hormones, serotonin, are produced in the gut. So if you have a bad mood, you can easily direct it to gut imbalance.
We all believe the digestive system’s role is to break food into tiny particles, absorb the essential components, and shuttle the waste out of your body. However, recent studies have proven that it is beyond that, and it performs a more complex job.
Our digestive system is linked with other parts of the body, directly or indirectly. A healthy gut means your physical, as well as mental health, is up to the mark. So this article serves as a guide why it is essential to have a healthy digestive system:
1. Improved absorption of nutrients:
Feeling bloated after having your meal or running to the bathroom feels terrible because you can’t digest. The life of such an individual revolves around buying antacids to relieve the condition—several antacids like omeprazole over the counter are available. But reducing the symptoms is not the only way out.
They are an indication of an unhealthy digestive system. When your gut is healthy, whatever you consume is adequately digested. The beneficial nutrients immerse in the bloodstream and reach the target organ.
In addition to that, when your gut lining is healthy, the intestine gets more surface area to absorb the nutrients.
1. Heightened mental clarity:
You more likely get to know what life is when you are sleep-deprived. You get cranky, increase in food cravings, and you end up relying on caffeine. You might not know, but your gut has a significant impact on your sleeping pattern.
It is just like a vicious cycle. When your sleep is disturbed, it affects your stomach, and when the gut is not healthy, it affects your sleep. It continues until you fix one or the other end. Research has proven that the beneficial bacteria in our digestive system produce neuropeptides that regulate the brain’s functions.
1. Improved defense system of the body:
Our immune system and digestive system work in collaboration to keep the body in tip-top shape. Both the systems regulate and support each other. It is a fact that the digestive system produces the majority of immune cells.
So when dysbiosis, which is an imbalanced gut, occurs, it puts the person at risk of developing infections, chronic diseases, even cancers. So the best way to fend off sickness is to maintain a healthy digestive system.
1. Enhanced elimination of toxins:
Digestive Health
The digestive system does an excellent job of eliminating the toxins and the waste we build up. There are different portals for the release of toxins. Every time we urinate, blow our nose, cry, sweat, or defecate, we release tons of toxins that can be harmful to our bodies.
Removing the toxins also improves the health of the skin. A healthy digestive system reduces acne, improves eczemas, and nearly disappears rosacea.
1. Relief from mood disorders:
Did you know our gastrointestinal system is known as the second brain of the human body? Our daily diet is mainly responsible for our mood. It entirely depends on what we eat. We can uplift our spirit with the diet; we can also depress it.
The connection is so strong that there is an entire branch of psychology known as nutritional psychology. The theory behind diet affecting the mood is that the food we eat feeds the bacteria in our gut, releasing happy hormones. Hence, it impacts our mood.
1. Healthy gut leads to a healthy heart:
There is a complex interplay between our heart and the digestive system. Microbes have a significant impact on the cardiovascular system. Different researches have proved that lack of gut diversity which means not having enough healthy bacteria, leads to high blood pressure.
There are more chances of developing atherosclerosis due to plaque accumulation in the arteries.
1. Increased energy and stamina:
When you clean out the junk from your gut, your body has to spend less energy to digest your food. So this energy is now saved to live your life to the max. A healthy digestive system improves your stamina.
You feel less sluggish after a hectic day. Because the gut utilizes the food best, each organ gets the optimum nutrients to function efficiently.
1. Regular and consistent bowel movements:
Maintaining good colon health is very easy yet highly important. A healthy digestive system means bowel movements one to three times per day that is not too soft or too hard. It helps in preventing colon diseases.
It also helps in well being of the heart, kidneys, brain, skin, and overall wellbeing. Hence maintaining a healthy colon is highly recommended, even for those who find it awkward to talk about it.
1. Healthy weight loss:
Digestion starts in our mouth with the assistance of saliva when we are enjoying our favorite nutritious food. Upon swallowing, it reaches the esophagus and then the intestine, where final digestion takes place.
The most obvious reason a healthy digestive system aids in weight loss is that digestion utilizes calories. It means that the whole process of absorbing and excreting takes energy. Hence, digestion burns calories, and there is less chance of fat deposition.
Takeaway message:
Our gut puts our body into working order. It may not have a literal voice, but it communicates its message in the form of codes. From complete silence to hunger grumbles and bathroom habits, it clearly shows what is going on inside.
So if you haven’t heard from your gut for a while, you are defecating regularly, and there is no bloating or abdominal pain, you are doing just fine. If your stomach could talk, it would probably thank you for keeping it healthy, fully nourished, and in a stress-free environment. So be kind to your gut and be kind to yourself.
Read Also:
Related Articles
|
The Wild and Raw Beauty of Denali
Alaska's vast national park is a varied landscape of glacier-fed streams, tundra, and dense forests patrolled by hosts of indigenous fauna
Come to Alaska, and a zoo or wildlife park will never seem quite the same.
Human beings have been in the area for thousands of years. But our species remains vastly outnumbered by others that have been here longer and that move more naturally throughout the vast wilderness that makes up much of the state.
"From the road, most visitors see more wildlife in Alaska than they do in a lifetime elsewhere," back country trekker Jim DuFresne has written. "From the trails, such encounters are often the highlight of an entire trip."
Nearly 200 species of mammals and birds are in Denali National Park and Preserve alone. Hundreds of bears. Thousands of caribou. Moose, Dall sheep, wolverines, lynxes, wolves - the "charismatic mega-fauna" as conservationists call them, that draw us to the wild, that at once attract and make wary.
Coming from the lower-48 states, one is astonished to see an abundance of animals considered endangered elsewhere. Salmon as long as your arm fight upstream to spawn, their numbers so thick it's barely an exaggeration to say that one could walk across their backs. Bald eagles hang around towns and pulp mills as well as forests.
It's not the numbers that stay with you however, but the individual animal encounters.
A lone wolf loping along, headed for a rendezvous with pack or prey, stops to lock eyes on the two-legged mammal transfixed at the sight. The black bear, cub at her side, rises on back legs - tall and powerful in her patch of muskeg - to get a better look at the helicopter intruding noisily overhead. Such species-to-species communications, however brief, can leave a profound impression.
Alaska is beautiful, and it can be harsh. It stimulates. It invigorates. It makes us more aware of our surroundings. And its natural inhabitants help put our daily routine into perspective.
You've read of free articles. Subscribe to continue.
|
Last edited 13 Apr 2021
Urban exploration UE
An urban explorer under Hobart, Tasmania, Australia.
[edit] Introduction
Urban exploration (UE) - sometimes referred to as urbex or building hacking - is a term associated with the action of individuals who enter built (and sometimes hidden or abandoned) structures. It is loosely referred to as a hobby and is associated with other daredevil acts - such as parkour - that are encouraged through social media.
Some urban explorers undertake these activities for the purpose of photographing and documenting their actions. These explorers generally treat the sites with respect. Others do it to apply graffiti (particularly in difficult to reach locations) or undertake other forms of vandalism or theft (particularly on derelict sites). It is also believed that some individuals simply seek the adrenaline rush associated with the thrill of being put in physical danger or the risk of being in a legally dubious situation.
[edit] Infiltration: structures in use
One form of UE involves partially completed construction projects or building renovation sites (particularly those that are actively under construction or even partially in use). This is generally referred to as infiltration. One of the goals of infiltration is to explore a restricted area.
Common sites for UE infiltration include mechanical rooms, elevator rooms, abandoned floors and other normally unseen parts of working buildings. Roof infiltration is sometimes referred to as rooftopping or skywalking and can include cranes, antennas, smokestacks and so on.
The term roof-and-tunnel hacking is a specific type of UE referring to rooftops or transit tunnels. Draining is UE associated with storm drains or sewers.
[edit] Abandonment: condemned sites
When associated with derelict structures – often condemned or otherwise deemed unsafe – UE may be referred to as urban spelunking, urban rock climbing (or buildering), urban caving or mousing. The general term for this type of UE is abandonment.
Common sites for abandonment UE include unused amusement parks, grain elevators, factories, power plants, missile silos, fallout shelters, churches or abandoned public facilities (such as hospitals, asylums, schools, poor houses or sanatoriums).
[edit] Legalities of UE
UE is generally considered to be a form of trespass. Being caught may result in significant penalties including fines and/or imprisonment.
It can also be extremely dangerous, resulting in injuries from contact with toxic substances or broken glass. In some cases, it has the potential to cause death from electrocution, suffocation (as a result of entrapment) or falls from height.
Keeping UE trespassers off of a property may require legal action, as was the case in 2014 when Canary Wharf Investments (CWI) sought to remove several urban explorers who had been repeatedly trespassing on buildings and cranes to take photographs of their adventures.
In the article, ‘Urban exploration: a trend that’s going through the roof’, Olivia Vice of the Real Estate Blog reported, “CWI made an application for an injunction against them and ‘Persons Unknown’ to prevent future trespass and to require them to deliver up their media materials. There was significant evidence to show that, without the injunction, the defendants would continue to trespass. The High Court was ultimately satisfied that the injunction was suitable and that its terms were correctly formulated to be proportionate and only capture those engaging in the undesirable conduct.”
Unwanted visits can not only endanger the trespassers, but may jeopardise the safety of those who are meant to be on the property. These activities may also compromise productivity on the site if it causes damage to equipment or equipment is stolen.
Preventive measures may include the installation of physical barriers and deterrents such as gates, hoarding, CCTV and even anti-climbing measures on equipment and scaffold. Site guards and regular site inspections are additional safety measures.
In some instances, it may also be the legal responsibility of owners to prevent unauthorised intrusions.
In January 2020, DB Cargo (UK) Ltd was fined after being convicted of an offence under the Health and Safety at Work Act. In the 2017 incident, two boys were electrocuted after climbing through a hole in the company’s fence which was situated next to playing fields. “Two of the three boys climbed on top of a train, and while standing on the roof, one suffered a devastating electric shock from the 25,000 V overhead power lines. He sustained 40% burns and life changing injuries. The second child sustained burns to his hand and a broken arm.”
The Health and Safety at Work etc Act 1974 requires that employers take reasonable steps to ensure the health and safety of persons other than their employees, which implies a duty to ensure people are safe from activities on construction sites. In addition, the Construction (Design and Management) Regulations (the CDM Regulations) require the prevention of access to construction sites by unauthorised persons, and that ‘… where necessary in the interests of health and safety, a construction site must, so far as is reasonably practicable, and in accordance with the level of risk posed, comply with either or both of the following; have its perimeter identified by suitable signs and be arranged so that its extent is readily identifiable; or be fenced off.'
[edit] Seeking permission
In some instances, it may be feasible to seek permission for UE. While this may remove the thrill associated with a forbidden adventure, it may deliver photographic opportunities in hidden areas - but in a safe and informed manner.
For abandoned sites with historic value, approved UE should be undertaken in a manner that protects and respects the physical properties of the site.
[edit] Related articles on Designing Buildings Wiki
[edit] External resources
Designing Buildings Anywhere
Find out more Accept cookies and
don't show me this again
|
Carpal Tunnel Syndrome (CTS) and Surgery at a Glance
Carpal Tunnel Syndrome (CTS) and Surgery at a Glance
Carpal Tunnel Syndrome (CTS) and Surgery at a Glance
Carpal tunnel syndrome is the cause of apparent symptoms, like tingling and numbness in your fingers (except for pinky fingers), wrist, and hand. This pain is caused by pressure or irritation being placed frequently on your median nerve that runs from your forearm through the carpal tunnel in your wrist to your ring finger, middle finger, index finger, and thumb.
Causes of carpal tunnel syndrome
“Carpal” means wrist, while “tunnel” refers to a protective tube that houses your median nerve as it passes through your wrist. When your carpal tunnel is compressed, it causes pressure on your median nerve. People suffering from carpal tunnel syndrome are traditionally those who have occupations requiring heavy use of their fingers and arms, like those working all day in front of a computer.
However, carpal tunnel syndrome can easily develop from other things, like hand swelling from pregnancy fluid retention. Physical therapy and at-home treatments can be a solution for mild cases of carpal tunnel syndrome. Still, in other cases, surgery is the only solution to prevent permanent disability and relieve chronic symptoms of CTS. During the operation, an orthopedic surgeon in Deland cuts open and widens the carpal tunnel to release median nerve pressure. Next, we will discuss some of the symptoms that might indicate a need for surgery on your carpal tunnel.
Carpal tunnel syndrome symptoms
Doctors recommend orthopedic surgery when chronic symptoms of carpal tunnel syndrome are not improving after conservative treatments. It is crucial to act quickly. Otherwise, the muscles and nerves could have irreparable damage. This means that if you are still experiencing tingling, numbness, and pain after following your physician’s recommendations closely and your CTS symptoms are not improving in any way, you should let your physician know as quickly as possible. An orthopedic surgeon may recommend CTS surgery to avoid permanent damage to the nerves in your fingers, wrist, and hand.
How long you should wait before deciding to have the surgery.
Six months is plenty of time to exhaust any conservative treatment options and determine whether they produce lasting and desired results. It is far too long if you wait a year in most cases. Weakening of the fingers and hands is a marked sign of progressing nerve damage. Patients often find difficulty gripping objects like computer mouses, phones, and doorknobs.
Carpal tunnel release surgery in Deland.
Carpal tunnel syndrome release surgery to open up the space in your carpal tunnel is a relatively fast procedure and typically takes less than an hour to perform. This procedure requires a commonly short recovery period before you start to notice symptom improvement and regain your hand’s function. It will help prevent future disability and allow you to have relief from CTS symptoms to live a normal lifestyle and continue doing the things you love.
If you are suffering from carpal tunnel syndrome symptoms that are not relieved by conservative treatments like wearing a wrist brace, contact an orthopedic surgeon in Deland. Our specialists help alleviate your pain and get you back to enjoying everyday life again. Call us today for more information.
|
COVID-19: Air quality is a major factor, if not the principal cause of death
by Br. Alexis Bugnolo
The latest statistics on the mortality resulting in occasions of COVID-19 infection are proving the hype is hype: that is, there is now no statistical reason to consider the Wuhan Virus any reasonable cause of mortality. This is a bold claim, but I will prove it with proven statistics.
As we all know, inasmuch as a virus is a organic organism — it is not living, because it cannot reproduce of itself, it only multiplies by causing the disintegration of living cells — the mechanisms for infection and mortality should be the same in all members of the same species accross the globe. This is because each species of animal has the same body temperatures and genetic make up.
Yes, in human beings, there are some genetic variations by race which might contribute to having an advantage to surviving an infectious disease: genes for the immune system, for example. Of these, those ethnic groups outside of sub-saharan Africa have 60-70 more genes and thus are less likely to succumb. Ebola was a perfect example. Few victims have every been of those races.
But for Coronavirus the statistics tell a different picture. Infection rates from the most reliable sources per nation are telling a different story. Let’s take a look at the worse cases: those nations with the highest claimed rates of infection per million:
978 ITALY
1665 ICELAND
1462 ANDORRA
What do all those nations have in common? The ones in blue are tiny countries, so it could be argued that the numbers of total citizens are too low to be statistically accurate, or since they are so small, the concentration of persons are extremely high. But that does not explain Switzerland and Iceland or even Luxembourg. Italy’s cases are nearly all in Northern Italy.
What they all have in common, excluding Vatican City, is that they are mountainous regions with frigid air or regions with heavy fog humidity in the Winter and Spring.
But such climates heavily tax the lungs and health of patients. That is why there is normally a higher mortality among the weak in January to March each year.
But to see how much climate might be the principal factor in your chances of contracting the Wuhan Virus, let us look at large nations with large populations:
China has 56 infections per million. Though clearly that statistic is meaningless because only the province of Hubei, of which Wuhan is the capital, is heavily infected. Hubeai province has 58.5 million persons according to a 2015 estimate, and that represents 4.2% of the population. So the real infection rate of Hubei province is probably more like 1300. Wuhan has lots of pollution in the air. Its air quality today was 127 compared to Hong Kong which was 50. A quality of 127 is considered unhealthy, according to, which reports live air quality statistics for cities round the world.
Spain has 640 infections per million. In the winter, the air in Spain is generally very damp, due to the storms which blow in off the Atlantic Ocean. Most of Spain is also at high altitude.
Germany has 312 infections per million. In the winter the air in Germany is damp, though most of the country is not at high altitude, the Germans have the custom of opening the windows of their homes for a hour or more each day, even in winter. They believe fresh air is good for the health.
Iran has 258 infections per million. But this statistic is not reliable, because nearly all the infections have been in the capital, Tehran, which has only 8.649 million people, whereas Iran has 80.28 million. Both these statistics are for 2016. That means that the rate of infection for Tehran is more like 2,400 per million. Tehran has lousy weather in the winter, with humidity levels on average over 50% for the entire winter. But smog is worse, giving Tehran one of the worst ratings for air quality in all the world (source).
While these statistics are not entirely determinative — due to the fact that it may be that the virus spread to these places before others — nevertheless they raise serious questions whether those who are alleged to be dying from the Wuhan Virus are in fact dying from respiratory stress from a variety of causes, especially climate or air quality, of which only the Wuhan Virus is being faulted for political reasons.
For the latest statistics on the Wuhan Virus around the globe, see Worldometers.Info, from which the stats on infection rates have been taken for this article.
+ + +
[simple-payment id=”5295″]
4 thoughts on “COVID-19: Air quality is a major factor, if not the principal cause of death”
1. Yes, certain climates and air quality are surely contributive to CV. Where does New York City stand? One thing for sure is that the statistics ‘Communist Party Virus (CCP) are fogged as implied below:
Also note interesting article in Epoch Times.’21 Million Fewer Cellphone Users in China May Suggest a High CCP Virus Death Toll’
1. There are no way 21 million dead in China, it would be all over the dark web social media sources used by dissidents. It is more likely that the trade restrictions placed on China by trump and now by the whole world for Corona Virus have cause many Chinese to lose their jobs. At $2,50 a day, you have to dump your cell phone immediately if you lose your job, or fear to go to work.
2. Br. Alexis–Yes the 21 million may be a stretch but so are the numbers the Chinese report. The real CV death number is surely some multiple of the reported ones. I suggest factoring it up by 10.
3. The “Hype” is so ridiculous. No gov’t has ever shut down because of the 65 million innocent babies aborted since Roe v. Wade or the harvesting of baby body parts occurring legally in the United States. This infanticide is worthy of total global annihilation were it not for the Mercy of God.
Comments are closed.
|
Skeiðarársandur is the name of the Black Sand area south of the glacier Skeiðarárjökull, the area is between the mountain Lómagnúpur in the west and Skaftafell in the east and it covers up around 600 square kilometres.
Skeiðarársandur is the floodplain from many glacier rivers flowing from down under Skeiðarárjökull glacier like the river Skeiðarár and Gígjukvísl, it is also the floodplain of glacier outburst (jökulhlaup) from some of the volcanoes located underneath the south part of Vatnajökull ice cap, like volcano Grímsvötn and Volcano Gjálp. The big glacial rivers were hard to cross in the old days when there were no bridges across so people had to ride across on horses. And if it was not possible they sometimes went across the Skeiðarárjökull glacier instead.
The bridge across the Skeiðarár river was built in the year 1974 and was the last bridge that was to complete the main road around Iceland. This bridge across the Skeiðarár river was around 1000 meters long and the longest bridge in Iceland. The bridge will be taken down in the next couple of years because of changing in the water flow from underneath the glaciers. Now all the water goes to the west side of the glacier and flows down another glacier river called Gígjukvísl, all this is because of global warming.
In 1996 there was a big subglacial volcanic eruption in the volcano Gjálp in the centre of Vatnajökull glacier that melted a lot of glacial ice so there came a big glacial outburst (jökulhlaup), estimated to be around 50.000 cubic meters per second from underneath the glacier.
It destroyed a part of the main road and the bridges across Skeiðarár river and Gígjukvísl river so they needed to rebuild the bridges and the roads. Since that time many things have changed because of melting of Skeiðará the river has no water anymore, now flowing different ways then before and the black sand area is growing quite fast with moss and birch trees.
The area is the home of birds like Great Skua as many others.
Note: Do not park or stop the car on the main road! Be careful when turning off the main road, slow down in time and give indicators.
Read more about Driving in Iceland.
|
Breaking News
IPU BCA Semester 6: Linux Environment - Linux Boot Sequence
Linux Boot Sequence
IPU BCA Semester 6: Linux Environment - Linux Boot Sequence
Question: Describe the Linux Boot process.
Answer: Following figure shows the sequence of booting process in Linux environment.
1. When the machine is powered on, the ROM chip (firmware) executes BIOS (Basic Input/Output System) or UEFI (Intel’s Unified Extended Firmware Interface). BIOS detects the hardware and initializes the basic input output devices.
2. It looks for master boot record (MBR) a 512 byte image stored at the first sector and first track of the hard disk system. The MBR stores partition table and a boot.img file called GRUB (Grand Unified Boot Loader) which loads the kernel and the filesystem as located by the partition table.
3. The filesystem executes the initrd process which loads the kernel of the Linux and mounts the root filesystem.
4. Init process then executes run level process which prompts the user to log in.
Question: Name the log files that would help troubleshooting booting errors or failure.
Answer: The three log files exist at /var/log directory are:
• dmesg or /var/log/messages
• kern.log
• boot.log
No comments
|
Las Pilitas Nursery
California Native Plants are all we grow!
Blog Contact Us Directions
3232 Las Pilitas Rd
Santa Margarita, CA 93453
Shop For Plants Cart Contents
California Native Insect Pollinators
Creating a Pollinator Habitat
This is only a partial list and it's not in any order as we keep adding to it.
We're developing a list of insects that pollinate native plants and non-native fruit crops. Native insects were found to be 100 times more efficient than honeybees as pollinators in an almond orchard. Creating habitat for native bees does not have to be a big deal. They require limited use of insecticides, weed- free, uncultivated ground, areas of mulch, a few old logs, and some native bushes.
Most of the native insects only live for a couple of months, but because of the many numbers of different species, a variety of plants need to be grown that will provide pollen and nectar throughout the year. Within the field, planted as a hedge row every 100-200 meters (one or two football fields), at the field edges and corners should be enough to complement the honeybees' pollination services. In a garden situation, planting the native pollinator habitat around the edges of the vegetable or fruit garden seems to work best.
The predatory flies also use the nectar and pollen of the flowering bushes to sustain them. Increasing the predators should reduce the need for the use of insecticides.
So, if you can maintain native flowers all year that should provide the maximum pollinators, predators, and parasites for the ecosystem and your crop. This would seem to be a natural solution anywhere in the world. Use native plants from your regional area, to attract the most numbers of beneficial insects.
A female gasteruption wasp, prey on Mason Bees - grid24_6
Many of the predators of bees are also pollinators.This wasp is visiting California buckwheat.
Sand Wasp, Bembix on a California Buckwheat. - grid24_6
Many of the wasps are also pollinators. This Sand Wasp, Bembix is on a Buckwheat.
Liometopum occidentale - Velvety Tree Ant - grid24_6
Some ants are decent pollinators. This Velvety Tree ant , Liometopum occidentale, stings (bites) freely, but also spends a great deal of care grooming each flower part; here visiting a Montmorency sour cherry (Prunus cerasus).
Anthophorula is a little digger bee. Maybe 6mm (1/4 inch) long that appears white to the naked eye. Busy little thing. Here on a California Buckwheat. - grid24_6
Anthophorula is a little digger bee. Maybe 6mm (1/4 inch) long that appears white to the naked eye. Busy little thing. Provide weed free open ground and some California Buckwheat. to maintain this bee.
Hemaris diffinis, Snowberry clearwing is a very fast flier that mimics a bumblebee. - grid24_6
Bumblebee Moth or Snowberry Clearwing, Hemaris sp. is a fast pollinator. This moth is visiting a Monardella lanceolata flower.
American painted Lady on a milkweed flower. - grid24_6
Many Butterflies are excellent pollinators. Too bad the larvae can eat the same plants to the ground.
Many crops worldwide are pollinated by honeybees with the help of wild insect pollinators, with a corresponding great increase in yield. Many of these crops grow in California. Generally, the major wild insect pollinators are mostly bees, then flies.
Some examples are berries, melons, cucumbers, squash, apple, pear, almond, apricot, cherry, peach, avocado, guava, kiwi, and beans.
Many wild bees are solitary; that is, they do not form a colony in which there is division of labor, with workers, queens, etc., but some are eusocial; they nest in abandoned mice, vole, gopher dens, or under tussocks of grass (bumblebees), in tunnels in dead trees, or tiny tunnels in the ground or within hollow stems, or twigs (solitary bees).
Don't forget wild flies. In many crops flies are minor major pollinators! Flies are still very important because, if the major pollinators are absent, then flies become the major pollinators. Flies are the backup system for pollination, in many cases. The best way to conserve and attract pollinating flies is to conserve their habitat.
Create a Pollinator Habitat
To create a habitat for pollinators, growing a variety of plants, so that there is something flowering almost all year round, works best. The best habitats to attract these wild pollinators are: heterogeneous as possible, edge habitats, lots, with high density of flowers, some bare soil between plants, with no soil disturbance (this means no tilling, no shovels, no hula hoes, etc.). They need well-drained, undisturbed soil, and soil not compacted by vehicles or machinery.
To increase yields in agricultural crops via wild insect pollinators, limited inputs are best; best practices are microspray or overhead irrigation, limited use of low-toxicity herbicides, insecticides, or inorganic fertilizers. For vegetable and fruit gardens, if possible, place compost as a mulch on top of the ground, instead of tilling the compost into the soil.
Unfortunately, in order to have a food-producing garden or crop, activities such as fertilizing, weeding, harvesting, and tilling have to be done every season for some crops, and every few seasons for other crops, depending on your location in the state. Thus, the wild pollinator habitat should be located away from the field/orchard/garden proper, to protect the area from disturbance. Since many wild insect pollinators nest underground, especially bees, common gardening and farming activities will destroy or damage their nests. To reiterate, this pollinator habitat is best located on the edges of the crop or garden area, where no regular gardening/farming activities are going on, such as tilling, weeding, fertilizing, watering, harvesting, etc.
Female Melissodes, on a Salvia clevelandii Alpine. Melissodes are pollinators that some claim are specialized. But we've found them on numerous native genera. - grid24_12
Long Horned Bees are also good pollinators on Asters and some other flowers. On long flowers they'll steal nectar. This one is stealing from a Salvia clevelandii..
Because the range of many wild insect pollinators in California is very small, like 450 ft. to 1800 ft, compared to a honeybee which can be up to 5 miles, putting the pollinator habitat as close as possible to the garden or crop will usually increase yields.
The more variety of California native plants you grow that support wild pollinators, the more variety of wild pollinators will be present, and according to researchers, there is a positive correlation between pollinator diversity, and crop yield.
Plant List and Design for Pollinator Habitat
More pollinators have been found in linear habitats. So I have created an example of a roadside/gardenside, or cropside if you will, pollinator habitat, utilizing a variety of California native shrubs, and perennials that should produce flowers throughout the year, in most areas of California. Since there are some species that are wide-ranging, those have been listed below. Some of the plants of certain genera have different species in different parts of the state, and so those species are not listed for every microclimate.
Roadside or Field or Garden or Orchard Edges
If you set out the plants at 100% spacing, there will still be bare soil between plants, and you can use mulch on top of the ground under the drip line of each plant.
Different types of plants need different types of mulch. The planting guide will give information on which type of mulch to use, and how to best plant, water, and maintain the California native plants for the pollinator habitat. Annuals in sun need no mulch, annuals in shade will utilize the mulch of the shrub or tree shading them.
Shrubs, 6' to 12' high, in a row: Adenostoma species, Ceanothus species, Arctostaphylos species, Prunus species, Heteromeles arbutifolia, Cercocarpus species, Rhamnus species
Another example in a moister area (depending on where you are) could be: Mahonia species, Cercis occidentalis, Salix species, Sambucus mexicana, Rosa species, Ribes species.
Subshrubs, in a row, individually offset, in front of the shrub row: Salvia species, Eriogonum species, low Baccharis pilularis varieties, Baccharis douglasii, Lotus scoparius, Isomeris arborea (drier areas of the state).
California native wildflowers - grid24_12
A variety of annual wildflowers can increase wild pollinator diversity.
Perennials, in a row, in front of the subshrubs: Monardella species, certain Penstemon species, Erigeron species, Hazardia squarrosa, Isocoma menziesii, Eriophyllum species, Grindelia species, Achillea millefolium, Heterotheca species, Lessingia species, Astragalus species, Nassella species, Leymus condensatus, Scrophularia californica, whew! I could go on, but you get the picture.
Another example in a moister area could be: Muhlenbergia rigens, Horkelia cuneata, Verbena lasiostachys, Potentilla glandulosa, Aster chilensis, Solidago species, Bidens laevis.
Annual Wildflower Patch should be separate from the linear hedgerows of perennials, and shrubs, and only as large as you can handle (for purposes of weeding, labor wise). A good spot is sunny, no hose nearby, and a spot you don't know what to do with. For a garden or orchard, putting the annual wildflower patches at the corners of the garden work really well.
Plant the annuals in a dense patch, 3' by 3' is a good start. The reason for the small size is the labor and time involved to weed, which will overcome you if you are not careful.
Some Examples: Dichelostemma (technically a perennial) Lupine species, Eschscholzia species, Agoseris species, Trifolium species, Lotus species, Monardella species, Gilia species, Astragalus, species Phacelia species, Chaenactis species, Hemizonia species, Stephanomeria species, Trichostema species, Heterotheca species, Lessingia, Gnaphalium, Salvia species, Lasthenia species, Layia species, and etc., etc., etc.
Examples for Limited Space or Shade Gardens
If your space is limited, these plants seem to attract the most variety of pollinators: Arctostaphylos species, Ceanothus species, Salvia species, Baccharis species, and Achillea millefolium, for the long-term plants, and annuals in the legume, (Fabaceae), mint (Lamiaceae), waterleaf (Hydrophyllaceae), poppy (Papaveraceae), phlox (Polemoniaceae), mallow (Malvaceae), buckwheat (Polygonaceae), daisy (Asteraceae) families and more!
If your garden is shady (light shade, as in, under pine trees, widely spaced) you can try shrubs like Arctostaphylos hookeri, A. edmundsii, Ribes species, Spiraea, Ceanothus thyrsiflorus repens, Rhamnus species, Heteromeles arbutifolia, Berberis species (one of the best for the deepest shade), Venegasia carpesioides, , Salvia sonomensis (with or under the Arctostaphylos), Achillea millefolium (sunniest spot you have, but naturally grows in the shade of deciduous oaks), Calystegia species, Carpenteria californica, Cornus species, Ceanothus hearstiorum, Scrophularia californica, Monardella species, Rosa gymnocarpa, Potentilla species, Solidago species, and for annuals, Collinsia species, Trifolium species, Phacelia species, and Clarkia species.
Andrena bee on Calystegia macrostegia. These small little bees are very efficient native.pollinators. - grid24_12
A variety of California native plants is the best means for attracting the largest variety of wild insect pollinators. Vines, plants that flower in February, plants that flower in May, and plants that flower in August.
Underwing moth, Pyrausta dapalis on Arctostaphylos Austin Griffin - grid24_12
Moths need the nectar of flowers too. Not just pollen your leg.
California native bee pollinator ground nests - grid24_12
This is a section of bare ground, containing wild bee pollinator nest sites. Bee Holed, Pollinators Ahead!
Achillea millefolium, Californica Yarrow with Hair Streaks pollinators. - grid24_12
Bees and flies are not the the only ways plants get pollinated. There are moths, butterflies, beetles, wind, birds, even bats.
|
Definition: Abstraction is the reasoning or thought process by which ideas, concepts or terms are considered apart from their concrete, real, literal, or specific instances or manifestations.
It is typical for A, that less important characteristics or properties of something are left out or are removed from consideration in order to reduce it to a set of essential characteristics, enabling further analysis.
An A is also the result of such a derivation and simplification process.
Also called reduction.
More on reasoning: Abduction, Analogy, Argumenting, Deduction, Design Thinking, more...
© 2022 MBA Brief - Last updated: 24-5-2022 - Privacy | Terms
|
Why watching a sad film can relieve stress and boost your mood
But only if you shed a few tears...
Woman crying
i love imagesGetty Images
We all know that shedding a few tears can sometimes feel cathartic, especially if you get a little emotional watching a sad TV show or film.
And now, researchers seem to have confirmed that weeping in this way really can have a positive effect on your wellbeing.
In fact, the team from Siena University Hospital say that it can be compared to giving yourself a hug, Mail Online reports
The reason? It looks like weeping may trigger the release of natural anti-stress hormones.
'Tears that gently and slowly run over the cheeks have a sort of gentle massaging effect, causing stress-relieving compounds [called] endorphins to be produced by the body, leading to a feeling of wellbeing. In other words, tears are self-cuddles,' the researchers explain in the journal New Ideas In Psychology.
'Weeping is an appeal to others for empathy and can also improve people's moods. The mood-stabilising effect of weeping can happen during an intense positive emotion such as a romantic film, the birth of a child, or when receiving an Olympic medal,' they add.
After reviewing previous studies on the function and significance of weeping the team concluded that it is very different from crying...
'Crying is the immediate reaction to pain or anger, it is not always associated with shedding tears, and indicates a peculiar and shocking change in behaviour,' the say, adding that weeping is unique to humans.
'Weeping is a more complex phenomenon: it is a behaviour that induces empathy perhaps with the mediation of the mirror neurons network, and influences the mood through the release of hormones elicited by the massage effect made by the tears on the cheeks, or through the relief of the sobbing rhythm.'
The team concludes that weeping is 'a strong behaviour with positive effects on health and social interaction'.
So, go ahead and feel free to weep away at that film! It might just be good for you...
Advertisement - Continue Reading Below
More From Health
|
Paper or Plastic?
Convenient? Yes. Horrible for the environment? Yes.
This post is sponsored by Edge Web Consulting, your go-to consultants for the best SEO Birmingham AL has to offer.
Just within the last couple of months, Americans have seen reports of large companies and individual states developing plans to get rid of plastic drinking straws. Perhaps you are wondering if ridding ourselves of these tiny pieces of plastic will make much difference in our world today. The answer probably lies somewhere between “yes and no” at this point.
Plastic Pollution Coalition CEO Dianna Cohen recently stated that, “They’ve (straws) been designed to be used for a very short amount of time, and then tossed away. We look at straws as one of the gateway issues to help people start thinking about the global plastic pollution problem”.
Basically, our world does have a significant amount of plastic that goes to waste and ends up contaminating our land and water sources. By banning the use and production of plastic straws, citizens and large corporations begin a transition of using less, and hopefully less, plastic substances.
Generally, plastic items can take approximately 1000 years to decompose. This number can vary depending on the type of plastic, but 1000 years is the general rule-of-thumb. According to a scientific report in 2017, only about 9% of the world’s plastic is actually recycled and reusable. That leaves an amazingly high amount of plastic that is left to decompose. Many believe that we are all in a plastic threat, if we don’t start taking more precautions and change the habits that we have formed over the last several decades.
The first plastic was created in 1907. It was developed as an inexpensive, flexible alternative to glass, wood, and many other materials. It has quickly risen to fame due to its cheapness, pliability, and ease of production. People around the world use it in almost every arena: in their homes, offices, sports equipment, medical devices, grocery stores, and so on. Plastic has proved to be a very useful substance.
The problem falls when we are finished with our plastic product and we toss it in to the trash. Since it decomposes at such an achingly slow rate, plastic items have overtaken our landfills, and have creeped into our oceans, lakes, and other similar resources.
So, today, you may wonder why have we started working on this environmental problem with the small object of the drinking straw? It all began in 2015 when a video was posted on the Internet of a sea turtle with a straw sticking through its nose. This sea turtle became a symbol of how we all need to do a better job of taking care of the world around us.
With this small change that Americans will soon have to partake in, perhaps our plastic awareness will become more robust and we can adapt more easily to future changes.
|
Manufacturers of smaller and smarter computer chips for consumer electronics such as smartphones and tablets, and 3D chips for brain-inspired computing applications.
The thinnest memory storage device with dense memory capacity was developed using 2D nanomaterials — called “atomristors” — that improve upon memristors, an emerging memory storage technology with lower memory scalability. Atomristors enable the 3D integration of nanoscale memory with nanoscale transistors on the same chip for advanced computing systems. Memory storage and transistors have always been separate components on a microchip, but atomristors combine both functions on a single, more efficient computer system. Using metallic atomic sheets (graphene) as electrodes and semiconducting atomic sheets (molybdenum sulfide) as the active layer, the entire memory cell is a sandwich about 1.5 nanometers thick, which makes it possible to densely pack atomristors layer by layer in a plane. This is a substantial advantage over conventional flash memory, which occupies a much larger space. In addition, the thinness allows for faster and more efficient electric current flow.
This illustrates a voltage-induced memory effect in monolayer nanomaterials that are layered to create “atomristors,” the thinnest memory storage device that could lead to faster, smaller, and smarter computer chips. (Cockrell School of Engineering)
University of Texas at Austin, Cockrell School of Engineering, Austin, TX
The memory storage device is ready for commercialization.
The sheer density of memory storage that can be made possible by layering the synthetic atomic sheets onto each other, coupled with integrated transistor design, could result in computers that learn and remember the same way as the human brain. The atomristors also are the smallest radio frequency memory switches to be demonstrated with no DC battery consumption, which can ultimately lead to longer battery life.
Contact: Adrienne Lee, Cockrell School of Engineering, at This email address is being protected from spambots. You need JavaScript enabled to view it.; 512-471-7541.
|
Cloud seeding in Dubai, Abu Dhabi and rest of UAE: how does it work?
A version of this article first appeared in March 2020
But even academics who have been working on rain-enhancement techniques for years admit that they still do not fully understand how best to encourage the heavens to open.
What is cloud seeding?
First of all, it is not nearly as simple as sending up planes to inject chemicals into clouds.
Cloud seeding is a very complicated operation that needs a lot of scientific investigation to really understand the fundamentals of it,” said Lulin Xue, chief scientist at the Hua Xin Chuang Zhi Science and Technology group in China, who is carrying out research on cloud seeding in the UAE.
“Especially for the convective cloud [formed by the process of warmer air rising], the cloud itself is very dynamic, which means if you change certain things of the cloud, it can have consequences that are very complicated to understand and using observation itself, it’s very difficult to quantify these effects.
“We try to use experiments both in the laboratory and in models to really understand what's going on and then we can translate that knowledge into operation and help the UAE's cloud seeding.”
How effective is cloud seeding?
One of the major problems, Mr Lulin said, is that no two clouds are the same.
Clouds that form over mountains are different from those that appear over low-lying areas, meaning they react differently to cloud-seeding efforts.
The size of the seeding particles — usually consisting of salt crystals — can have an effect on rainfall, while the quantity of the material also has a bearing.
Delivering more material into clouds, however, does not necessarily translate into more rain.
In fact, the whole process can backfire, meaning less rain would fall than would have otherwise occurred if there had been no intervention.
Scientists are working on complicated computer simulations to better understand the optimum intervention for different cloud types.
However, they are unsure if they will ever fully master cloud seeding, not least because they have no way of knowing how much extra rain they have helped produce.
“I don't know how the technology will advance in the near future,” said Mr Lulin, who has been conducting research on rain-enhancement methods for around a decade.
“But in the foreseeable future I would say it’s very difficult to completely quantify and completely understand.”
How does cloud seeding in the UAE work?
Mr Lulin said the UAE has particularly “complicated” clouds.
“UAE clouds, when they develop, are harder to predict because you have so many components to fit in,” he said.
“If the cloud forms close to a mountain, they are static, and you can observe them more carefully.
“The moving cloud here … it's so complicated. We also have a lot of sea salt, aerosol and dust. These affect how clouds form and develop, in ways which may not be so obvious.
“So with these complications, we do need a lot more effort to understand.”
Cloud seeding has been going on in the Emirates for decades. It is hoped that within 18 months the work of Mr Lulin and others will provide a more comprehensive understanding of the process in the country.
But for now, the scientist is reluctant to put a figure on how effective the research is, or how much extra rain the programme produces.
Provided photo of cloud seeding operations in the UAE
Courtesy National Centre for Meteorology and Seismology *** Local Caption *** D3S_3778.JPG
He said storms like the ones seen in the UAE in early January, which caused widespread flooding, were not caused by cloud seeding.
“In my opinion, it is difficult for just cloud seeding alone to generate huge amounts of precipitation,” he said.
“It must be natural conditions that are suitable. Maybe cloud seeding can enhance a bit of that, but how much, we don’t know.”
Not all countries have the same problems as the UAE, which is usually arid.
Edward Graham, a meteorologist at the University of the Highlands and Islands in the UK, is based on Stornoway on the Isle of Lewis, off the north-west coast of mainland Scotland.
There, it rains three days out of every four and it is getting even wetter, for reasons that have yet to be understood.
“If you’re feeling it’s a little too dry here, a little bit too sunny, I’m certainly feeling it’s a little bit too wet in Scotland,” Dr Graham told delegates.
“We have something you want, you have something we want, so let’s do some business.”
|
New Russian history: Yes, people died, but ...
Posted in Russia | 16-Aug-07 | Author: Andrew E. Kramer| Source: International Herald Tribune
Josef Stalin.
MOSCOW: Stalin has undergone a number of transformations of his historical image in Russia, interpretations that say as much about the current leaders as about the dictator himself.
In the West, Stalin is remembered for the number of people he executed or allowed to die in famines or the gulag: about 20 million, largely his own citizens. They included a generation of peasant farmers in Ukraine, former Bolsheviks and other political figures who were purged in the show trials of the 1930s, Polish officers executed at Katyn Forest, and Russians who died in the slave labor economy. Stalin's crimes have been tied to his personality, cruelty and paranoia, as well as to the circumstances of Russian and Soviet history.
While not denying that Stalin committed the crimes, a new study guide in Russia for high school teachers views his cruelty through a particular lens, if a familiar one. It portrays Stalin not as an extraordinary monster who came to power because of the unique evil of communism, but as a strong ruler in a long line of autocrats going back to the czars. Russian history, in this view, at times demands tyranny to build a great nation.
The text reinforces this idea by comparing Stalin to Otto von Bismarck, who united Germany, and comparing Russia in the 1930s under the threat of Nazism to the United States after Sept. 11, 2001, in attitudes toward liberties.
The history guide, "A Modern History of Russia: 1945-2006," was presented at a conference for high school teachers where President Vladimir Putin spoke; the author, Aleksandr Filippov, is a deputy director of a Kremlin-connected think tank. Excerpts from the guide follow. The text was translated by Nikolai Khalip and Michael Schwirtz in Moscow.
As a result of the "Big Purge" of the late 1930s, practically all members and candidates to become Politburo members elected after the 17th Party Congress suffered from reprisals to a certain degree. Postwar reprisals were quite similarly addressed. The number of victims of the Leningrad case reached about 2,000 people. Many of them faced firing squads. Studies by Soviet and foreign historians confirmed that the ruling class was the priority victim of the repressions in 1930-1950.
Stalin followed Peter the Great's logic: demand the impossible from the people in order to get the maximum possible. The result of Stalin's purges was a new class of managers capable of solving the task of modernization in conditions of shortages of resources, loyal to the supreme power and immaculate from the point of view of executive discipline.
Thus, just like Chancellor Bismarck, who united German lands into a single state by "iron and blood," Stalin was reinforcing his state by cruelty and mercilessness. Strengthening the state, including its industrial and defensive might, he considered one of the main principles of his policy.
Indirect evidence of this can be found in the memoirs of his daughter Svetlana Alliluyeva. Every time he looked at her dress, he always asked the same question, making a wry mouth: "Is this foreign-made?" and always cracked a smile when I answered, "No, it was made here, locally."
A chapter ends with a brief broadening of the interpretation that hints at ways to discuss Stalin's personal flaws, and the fate of the millions of Soviet citizens who suffered and perished under his rule. But little detail is supplied on that last point, nor does the guide suggest how teachers might conduct more research on it.
It is common knowledge that power corrupts. Absolute power corrupts absolutely. It is well known from Russian history how corrupting a long term in power is. Biographies of such outstanding rulers as Peter the First and Catherine the Second prove it.
The leader's closest associate, V. M. Molotov, admitted that at the beginning Stalin struggled with his cult, but later on he developed a liking for it: "He was very reserved in the first years, and then he put on airs."
As to what people think of Stalin, we can judge by an opinion poll conducted in February 2006 by Public Opinion Fund: If we speak as a whole of the role of Stalin in Russian history, was he positive or negative? Positive: 47 percent; negative: 29 percent; did not answer: 24 percent.
Thus, there are grounds for controversial assessments of Stalin's role. On the one hand, he is considered one of the most successful leaders of the U.S.S.R. During his leadership the territory of the country was expanded and reached the boundaries of the former Russian Empire (in some areas even surpassed it). A victory in one of the greatest wars was won; industrialization of the economy and cultural revolution were carried out successfully, resulting not only in the great number of educated people but also in creating the best educational system in the world. The U.S.S.R. joined the leading countries in the field of science; unemployment was practically defeated.
But there was a different side to Stalin's rule. The successes - many Stalin opponents point it out - were achieved through cruel exploitation of the population. The country lived through several waves of major repressions during his rule. Stalin himself was the initiator and theoretician of such "aggravation of class struggle." Entire social groups were eliminated: well-off peasantry, urban middle class, clergy and old intelligentsia. In addition, masses of people quite loyal to the authorities suffered from the severe laws.
The study guide pointedly refers to U.S. restrictions on liberties, ostensibly to fight terrorism.
Political and historical studies show that when they come under similarly serious threats, even "soft" and "flexible" political systems, as a rule, turn more rigid and limit individual rights, as happened in the United States after Sept. 11, 2001.
|
Play Live Radio
Next Up:
Available On Air Stations
U.S. Army Will Not Be Changing The Names Of Army Bases Named For Confederates
The U.S. Army will not be changing any of the names of army bases named for Confederate officers. In a tweet this afternoon, President Trump said, quote, "my administration will not even consider the renaming of these magnificent and fabled military installations." The tweets come after some former military officers, notably retired Gen. David Petraeus, said it's time to rename these posts.
Pentagon leaders say they are open to what they call a bipartisan discussion over the issue. NPR's Tom Bowman has been looking into the history of these bases and the controversy over the names, and he joins us now.
Hi, Tom.
SHAPIRO: So, Tom, 10 bases are named after Confederate leaders. How did this come about?
BOWMAN: Well, Ari, this all started during the outbreak of World War I. When the U.S. entered the war, tens of thousands of recruits were headed to bases. They needed more training areas and so forth. And it was decided by the war department that the bases in the north would be named after federal commanders and those in the South after Confederate commanders. And the names had to be short. They had to be Americans. They had - again, the names had to be short to avoid what they called clerical labor.
And the backdrop of this, Ari, was this is during a time of what was known as a lost cause theme. The Civil War soldiers at the time were very old, and some lawmakers and historians wanted to memorialize them and their leaders by focusing on states' rights, northern aggression, Southern way of life, military ability of the commanders and downplaying slavery as a key component of the war. Of course, these generals fought to preserve slavery and were traitors as well. And here's another thing that's interesting, Ari, is that it wasn't just during World War I. But other bases named for Confederate generals occurred during World War II, including Fort Hood, Texas, which is named after Gen. John Bell Hood.
SHAPIRO: And has the idea to rename them come up before?
BOWMAN: You know, it has several times. Back in 2015, after white supremacist Dylann Roof slaughtered black churchgoers in South Carolina, it came up. At the time, state officials, remember; decided to remove the Confederate flag from the statehouse. But nothing really happened. The Army was against changing the names. And here's the thing. The spokesman for the Army at the time said naming the bases was about individuals and not ideology. And again, three years ago, it came up after a white supremacist march in Charlottesville, Va. At that time, the Army had no comment. But this week, both the Army secretary and the defense secretary said they were open to a, quote, "bipartisan discussion" of changing the names of these bases. But here's the thing, Ari. It's never been bipartisan. The bill in the House three years ago had only 29 Democratic sponsors, no Republicans. And it never made it out of the subcommittee.
SHAPIRO: What do military leaders you're talking to say about it?
BOWMAN: Well, active duty officials - not much about the bases. A number of retired officers like retired Gen. Dave Petraeus are speaking out, calling for - it's a time to rename these bases. But it's a very sensitive issue. More conservative voices say it's an attempt to erase history. Ari, in my own town of Alexandria, Va., it took a number of years of discussion and debate in the city council and also at the statehouse in Richmond to remove a statue of a Confederate soldier that's been on Washington Street since 1889. It was just lifted off its pedestal a few days ago.
SHAPIRO: That is NPR Pentagon correspondent Tom Bowman.
Thank you very much.
BOWMAN: You're welcome, Ari.
|
How To Prevent Food Poisoning | 4 mins read
Tips to Preventing Food Poisoning
tips to preventing food poisoning
Mary Kate Morrow
By Mary Kate Morrow
With 48 million cases of foodborne illness reported to the Center for Disease Control and Prevention each year it is essential food industry professionals understand how to prevent food poisoning and firmly implement food safety protocol to prevent it.
An Overview of Foodborne Illness
Foodborne illness is a food safety public health issue that can result in severe illness and even death. No one is safe from foodborne illness and some people are even more at risk than others. For this reason, understanding how to prevent food poisoning is crucial for both food industry professionals and consumers to understand.
A pregnant woman or someone with a weak immune system could be affected more severely than the general population. Additionally, elderly people and young children can get sick more easily or get sicker than an adult with an immune system that is healthy.
The most common causes of foodborne illness are from bacterias like E.coli and viruses like norovirus poisoning food and attacking the human immune system critically. Food industry professionals must make sure to prevent food poisoning by following food safety tips from both their local department health professionals and the Center for Disease Control and Prevention.
Tips on Preventing Food Poisoning
There are many tips that can help prevent food poisoning and foodborne illness including-
1. Hand washing- Prevent food poisoning through handwashing. Make sure to wash your hands thoroughly with lots of soap and warm water. Some examples of when you should wash your hands include while-
• Handling raw meat
• Handling cooked food and ready eat food
• Checking internal temperature
• Cleaning cutting board and other tools
• While preparing food
• After blowing your nose or coughing
• After using the restroom
2. Raw meat storage- Bacteria grow most rapidly on raw meat and proper raw meat storage is a top priority to prevent food poisoning and adhere to food safety guidelines. Make sure to store raw meat separately and on the bottom shelf to avoid cross-contamination.
3. Cook properly- Raw food must be cooked thoroughly and its internal temperature should be checked before serving. When cooking, do not wash raw meat to reduce risk of food poisoning caused by spreading harmful raw meat bacteria across your kitchen.
4. Monitor temperature- Both internal temperature and fridge temperatures are crucial to monitor to avoid foodborne illness transmission. Avoid time spent in the danger zone which is between 40 and 140 degrees Fahrenheit. Bacteria grow rapidly in the danger zone and can double in as little as 20 minutes.
When storing cooked food leftovers always aim to do so by the two hour mark from when the food was prepared. Keep cold food cold and hot food hot while preparing food and always keep time spent in the danger zone as limited as possible.
If you are not going to serve hot food immediately, make sure to keep it at 140 degrees Fahrenheit or warmer. If you are not going to serve cold food immediately, make sure to keep it at or below 40 degrees Fahrenheit.
The Economic Impact
the economic impact 1596651733 8163
There is a very real economic cost to foodborne illness according to research compiled by the Center for Disease Control and Prevention. Analysis of five common bacterial pathogens alone cost America $6.9 billion each year in medical expenses and productivity lost.
Even when analyzing the money lost from lack of productivity and medical expenses does not account for significant outside costs that affect both industry and government.
Not only are billions spent treating foodborne illness and studies find doctor intervention is not always enough to save someone's life, particularly if they have a compromised immune system or a pregnant woman is the patient. Tragically, 128,000 hospitalizations and 3,000 deaths each year are traced back to foodborne illness pathogens.
Unfortunately, there is no way to completely avoid food poisoning and foodborne illness transmission. People will get sick and those who are the most at risk including those with low immune system capabilities and an otherwise healthy pregnant woman should take extra care.
Make sure to understand any symptom food poisoning manifests as so you can find doctor intervention as soon as possible. Do not risk food poisoning resulting in death and reduce risk of serious long term complications by getting medical help if you feel ill.
The good news is that there are solid steps that can be taken to increase food safety and prevent food poisoning across the nation. Health human service professionals and the Center for Disease Control and Prevention are aggressively looking for ways to further combat the spread of food poisoning and foodborne illness in all stages of the food industry.
|
Sunday, October 08, 2017
Just saying
In case you didn't know, the average opera singer has a vibrato that causes the pitch to waver for about a half step, or the distance between c and c# if you don't know what a half step is. It waves half of this pitch above and the other half below the intended pitch. Listeners generally imagine the pitch to be somewhere in the middle of the wavering sound. It is only your imagination that makes this a precise pitch. So making comments about the singer being sharp for the whole aria may only indicate that your ear is interpreting the vibrato sharp. Is she sharp? Yes. Is the exact same note also flat? Yes. Some singers push energy to the upper part of the vibrato or the lower part. Pitch wavering is the same but energy is unbalanced. Maybe your ear hears this as sharp or flat. They aren't giving up their vibratos.
A vibrato becomes a wobble when the speed of wavering slows down. If the vibrato becomes too wide in pitch, the mental integration can disintegrate and the note can actually sound like two notes.
No comments:
|
Are Your Kids Spoiled or Overindulged? by Jean Illsley Clarke
The difference between too little and enough is obvious. Too little hurts; enough feels satisfying. More than enough can be a feast, and a feast is an experience of abundance! But if there is always more than enough, the feast becomes meaningless. It becomes too much or overindulgence.
How do we learn what is enough?
So, how do we learn about how much is enough? I never saw a college class labeled Enough 101. Or a high school option (and it would be an option, wouldn’t it?) called Learn About Enough. We didn’t have Tuesday morning modules on Enough in grade school. So, how do we learn?
Enough is one of those concepts that is taught informally, when the occasion arises, often outside of awareness. Ask ten different people how they learned about Enough and you will probably get nine blank stares and one story about the discomfort of a time when having had way too much was distressing.
So, there it is. We picked up the concept of Enough here and there along life’s journey. But not all of us got it. Adults who had been overindulgence as children were surveyed in the ten studies of the Overindulgence Project. Their most frequent complaint about being overindulged was not knowing what was enough. They reported not knowing what was enough food, clothing, recreation, cars, work, alcohol, excitement, sleep, money, sex, amounts to put in recipes, you name it. Some said, “There were too many things but not enough love.”
This is a very debilitating situation. One interviewee stated plaintively that she hopes before she goes to her grave that she has one afternoon when she knows what is enough of just one thing. Anything. This is not the impact parents plan to have on their children’s lives. But it is a result of having had too much.
You have to be carefully taught
In part, the concept of Enough is learned, and one that parents teach as children grow. At times, it is easy to let a child have too much in order to avoid dealing with the child’s frustration. But teach about Enough we must. So, in the car on the way to the toy store we say, “You may choose one toy today. I will decide if the price is right and if you may have it.” When our child begs for another, we say matter-of-factly, “You already have your toy. That is enough. If you continue to beg we will put this one back.” And if that happens, we carry through. Lucky is the child whose parent is not swayed by tears, begging, pouting, or shouting.
What to do?
Sometimes this is hard for parents to do. The media and other people are constantly telling your child she will be more okay if she has more and newer. But parents need to be in charge of the family. If it’s hard for you, you can practice the following.
• In front of a mirror, practice saying no without looking mad or scared or guilty. Find a firm look, not critical, but with no smile or laughter. Smiles encourage children to continue misbehaving.
• Still in front of the mirror, practice saying, “That is all, and “You have had enough for now.
• March around the house saying, “I am the parent.” Children do not need parents who are friends, they need parents who are friendly. Say, “I am more powerful than the media. I am firmly in charge. I am teaching my child about Enough.”
• Make lists of things your child wants or you want to give and then you decide what is too little, enough, abundance, or too much. Give enough always in so far as you can, give abundance sometimes. Remember that too much is not better than abundance. It is worse. Much worse.
All photos from MorgueFile free photo.
© David J. Bredehoft, Jean Illsley Clarke & Connie Dawson 2004-2022;,
|
All posts by StenBlog
Silent Earth
Noise pollution is a serious matter that can affect not only how well you sleep at night, but also your health and even psychological state. None of this should surprise you, but as our planet becomes more urbanized, the expanding cloud of man-made noise from jets, traffic and even leaf-blowers can penetrate even remote forests and habitats.
Just out of curiosity, I have created a citizen science project that you can download to your phone from your app store and help me map, not the noisiest places on this planet, but the quietest places. The project can be found by downloading from your store the app called ‘Anecdata’. It will ask you to register by entering an email address, a username and your own private password. Once registered, scroll down the project page and join the one called ‘Silent Earth’. You should also join the Facebook group called ‘The Silent Earth Project’ because I post updates there and tips for taking data, as well as interesting results along the way.
This is what the project banner looks like on your phone
In time, I will be using this blog space to include article of interest on noise pollution and some of our results as we get more areas covered. Here is what you need to do to get going.
Check out the national map by the National Park Service to see how your area ranks
Step 1: Tap the bar that says ‘+Observe’ on the project window
Step 2: Tap the bar that says ‘Measure’ and click ‘OK’. Remain quiet for a few seconds.
Step 3: Tap the check boxes that apply to you and your location
Step 4: Tap the ‘save’ tab at the upper right of the screen to record your data.
Don’t be shy!! Make as many measurements as you like but certainly more than one!!! Also, if it seems noisy where you are, say above 50 decibels (dB) walk around your neighborhood or town (or use a bike or car) to find a place that is quieter than what you just measured. Numbers in the 40s are very typical of suburban locations but numbers in the 30s are exceptionally quiet and what you would find in rural locations where there is little traffic, jet, plane or other man-made noises. One of the quietest places I have encountered is deep inside Skyline Caverns in Virginia where readings in the high-20s were encountered!
What is ‘Now’?
It’s all in the mind!
Physical ‘Now’.
Perhaps we are looking in the wrong place!
Read more:
Things to do with your Smartphone!
We all have smartphones, but did you know that they are chock-full of sensors that you can access and use to make some amazing measurements?
Here is an example of a few kinds of data provided by an app called Physics Toolbox, which you can get at the Apple or GOOGLE stores.
Sensor data accessed by Physics Toolbox app
Each of these functions leads to a separate screen where the data values are displayed in graphical form. You can even download the data as a .csv file and analyze it yourself. This provides lots of opportunities for teachers to ask their students to collect data and analyze it themselves, rather than using textbook tables with largely made-up numbers!
There are also many different separate apps that specialize in specific kinds of data such as magnetic field strength, sound volume, temperature, acceleration to name just a few.
I have written a guide to smartphone sensors and how to use them, along with dozens of experiments, and a whole section on how to mathematically analyze the data. The guide was written for a program at the Goddard Space Flight Center called the NASA Space Science Education Consortium, so if you know any teachers, students or science-curious tinkerer’s that might be interested in smartphone sensors, send them to this blog page so that I can count the traffic flow to the Guide.
Here is an interview with the folks at ISTE where I talk about smartphone sensors in a bit more detail:
OK…here’s the URL for the actual Guide!
If you really want to look into using smartphone sensors in a serious way, here are some articles I have written about them that you might also enjoy:
Odenwald, S., 2019. Smartphone Sensors for Citizen Science Applications: Radioactivity and Magnetism. Citizen Science: Theory and Practice, 4(1), p.18. DOI:
Odenwald, S., 2018, The Feasibility of Detecting Magnetic Storms With Smartphone Technology, IEEE Access,
Black Holes for Fun and Profit!
Well, astronomers finally did it. Nearly 100 years ago, Albert Einstein’s theory of General Relativity predicted that black holes should exist. Although it took until the 1960’s for someone like physicist John Wheeler to coin the name ‘black hole’ the study of these enigmatic objects became a cottage industry in theoretical physics and astrophysics. In fact, for certain kinds of astronomical phenomena such as quasars and x-ray sources, there was simply no other explanation for how such phenomena could generate so much energy in such an impossibly small volume of space. The existence of black holes was elevated to a certainty during the 1990s as studies of distant galaxies by the Hubble Space Telescope turned in tons of data that clinched the idea that the cores of most if not all galaxies had them. In fact, these black holes contained millions or even billions of times the mass of our sun and were awarded a moniker all their own: supermassive black holes. But there was still one outstanding problem for these versatile engines of gravitational destruction: Not a single one had ever been seen. To understand why, we have to delve rather deeply into what these beasties really are. Hang on to your seats!
General relativity is the preeminent theory of gravity, but it is completely couched in the language of geometry – in this case the geometry of what is called our 4-dimensional spacetime continuum. You see, in general relativity, what we call space is just a particular feature of the gravitational field of the cosmos within which we are embedded rather seamlessly. This is all well and good, and this perspective has led to the amazing development of the cosmological model called Big Bang theory. Despite this amazing success, it is a theory not without its problems. The problems stem from what happens when you collect enough mass together in a small volume of space so that the geometry of spacetime (e.g. the strength of gravity) becomes enormously curved.
The very first thing that happens according to the theory is that a condition in spacetime called a Singularity forms. Here, general relativity itself falls apart because density and gravity tend towards infinite conditions. Amazingly according to general relativity, and proved by the late Stephen Hawkins, spacetime immediately develops a zone surrounding the Singularity called an event horizon. For black holes more massive than our sun, the distance in kilometers of this spherical horizon from the Singularity is just 2.9 times the mass of the black hole in multiples of the sun’s mass. For example, if the mass of a supermassive black hole is 6.5 billion times the mass of our sun, its event horizon is at 6.5 billionx2.9 or 19 billion kilometers. Our solar system has a radius of only 8 billion km to Pluto, so this supermassive black hole is over twice the size of our solar system!
Now the problem with event horizons is that they are one-way. Objects and even light can travel through them from outside the black hole, but once inside they can never return to the outside universe to give a description of what happened. However, it is a misunderstanding to say that black holes ‘suck’ as the modern colloquialism goes. They are simply points of intense gravitational force, and if our sun were replaced by one very gently, our Earth would not even register the event and continue its merry way in its orbit. The astrophysicist’s frustration is that it has never been possible to take a look at what is going on around the event horizon…until April 10, 2019.
Researchers using the radio telescope interferometer system called the Event Horizon Telescope were able to synthesize an image of the surroundings of the supermassive black hole in the quasar-like galaxy Messier-87 – also known as Virgo A by early radio astronomers after World War II, and located about 55 million light years from Earth. They combined the data from eight radio telescopes scattered from Antarctica to the UK to create one telescope with the effective diameter of the entire Earth. With this, they were able to detect and resolve details at the center of M-87 near the location of a presumed supermassive black hole. This black hole is surrounded by a swirling disk of magnetized matter, which ejects a powerful beam of plasma into intergalactic space. It has been intensively studied for decades and the details of this process always point to a supermassive black hole as the cause.
Beginning in 2016, several petabytes of data were gathered from the Event Horizon Telescope and a massive press conference was convened to announce the first images of the vicinity of the event horizon. Surrounding the black shadow zone containing the event horizon was a clockwise-rotating ring of billion-degree plasma traveling at nearly the speed of light. When the details of this image were compared with supercomputer simulations, the mass of the supermassive black hole could be accurately determined as well as the dynamics of the ring plasma. The round shape of the event horizon was not perfect, which means that it is a rotating Kerr-type black hole. The darkness of the zone indicated that the event horizon did not have a photosphere of hot matter like the surface of our sun, so many competing ideas about this mass could be eliminated. Only the blackness of a black hole and its compact size now remain as the most consistent explanation for what we are ‘seeing’. Over time, astronomers will watch as this ring plasma moves from week to week. The next target for the Event Horizon Telescope is the four million solar mass black hole at the center of the Milky Way called Sgr-A*. Watch this space for more details to come!!
We have truly entered a new world in exploring our universe. Now if someone could only do something about dark matter!!!
A Life in Remission
In the midst of an active research career in astrophysics, in 2008 I was diagnosed with non-Hodgkins Lymphoma, and my world ended.
For the next eight years I learned to live with the cancer growing slowly within me like some creature out of the infamous ‘Alien’ movie series. Annual tests showed the dozens of affected lymph nodes were very slowly growing in size by the millimeter, but with luck none of them would turn dangerous for a decade or more. But no one could predict when my cancer would ‘transform’ and become dangerously aggressive, requiring immediate chemotherapy. Actuarial forecasts said that the probability of transformation increased by 5% per year, so that after 10 years I would have a 50/50 chance of my NHL becoming aggressive, but it could happen sooner. …or much later. As a scientist, this uncertain diagnosis was devastating.
A scientist conducts research based on the a priori assumption that they will live to see the end of their work and to publish the results. I just know you are going to say ‘Well, no one knows when they are going to die’, but among those of us who deal with cancer, these kinds of sentiments seem insensitive and a bit flippant no matter how well-intended.
How does one function when one does not know when the monster will spring out of hiding and put the kibosh on your current work? Many of my projects required several years of work, followed by months of writing-up the results and interacting with referees and journal editors to publish the results. You simply cannot muster the stamina to carry-on your research and deal with referees when you are on a short, emotional leash.
Coping with an uncertain future in research
I immediately began to wean myself away from the rigors of research and instead moved into the area of education where NASA had a huge footprint. I won two grants to develop my SpaceMath@NASA resource, which grew every year to become a significant mathematics resource for educators. I even became known in some circles as Dr. Space Math! This was an intensely therapeutic undertaking for me because could write new math problems and design new math books whenever I chose to on my timetable, and if I literally died tomorrow, I would have left behind a complete archive of fun math resources. It was an open-ended commitment that suited my new frame-of-mind, and still made me feel as though I was contributing, intellectually, to a Greater Good: The education of our children.
As the years began to add up, 5…6..7…8 I started to realize that I might be in this cancer frame-of-mind for the long haul. But by this time my hiatus from research, and my ‘advanced age’ of 64, precluded any re-entry into the level of research I had enjoyed in my earlier years. It was very sad to see this part of my career waste away, but considering I was in my peri-retirement years, perhaps as it is for so many other scientists, this transition was inevitable.
In 2016 my NHL became aggressive after eight years of near-dormancy. I was quickly rushed into a course of immunotherapy with a monthly infusion of Rituximab and Bendemustine for six months. At the end, a PET scan showed in November, 2017 that there wasn’t a sign of the NHL anywhere, and my oncologist, Dr. Bruce Cheson at MedStar/Georgetown University Hospital in Washington DC pronounced me in remission. For the next two years, if there was no further sign of the NHL, he would consider me cured!
All of a sudden my attitude seemed to change almost literally over-night. I was anxious to start new research projects that, at least for now, could be completed in six months or less including writing up the results and submitting to the Journals. I had been out of my own research area for too long, and besides no astronomer at the age of 65 worries about new research unless they are still employed at a stable faculty or government job…which I was not. But I did have a part-time position at NASA working on citizen science activities. I was also involved in some very fun research trying to determine how well smartphones performed as scientific data-gathering sensors. That was starting to generate a pipeline of short-term projects culminating in several papers every year. But now that I was in remission, I could start to think about more complicated projects to tackle once again.
So I, basically, have come full circle in research having wandered for eight years in the dreary and uncertain desert of non-research work.
It’s good to be back!!
Quantum Gravity – Again!
What is quantum gravity?
Why do we need quantum gravity at all?
So what is the big picture?
How does the experience of space emerge?
There are two major quantum gravity theories being worked on today.
This figure is an imaginative rendering of a ‘string’.
This figure is an imaginative rendering of a ‘loop’
Additional Reading:
Exploring Quantum Space [My book at]
Quantum Entanglement and quantum spacetime [Mark Raamsdonk]
Background-independence [Lee Smolin]
Holographic Principle [ Jack Ng]
Causal Sets: The self-organizing universe [Scientific American]
Eclipse Postscript
So I compromised.
This turned out to be a very good choice!
But how did I feel?
Thinking Visually
Spider web covered with dew drops
Thinking about Nothing
Where does this all leave us?
Spider web covered with dew drops
Misconceiving the Big Bang
The Big Bang was NOT a Fireworks Display!
Written by Sten Odenwald
Copyright (C) 1997. Published in the Washington Post Horizon education supplement on May 14, 1997.
The Big Bang wasn’t really big. Nor was it really a bang. In fact, the event that created the universe and everything in it was a very different kind of phenomenon than most people–or, at least, most nonphysicists–imagine.
Even the name “Big Bang” originally was a put-down cooked up by a scientist who didn’t like the concept when it was first put forth. He favored the idea that the universe had always existed in a much more dignified and fundamentally unchanging, steady state.
But the name stuck, and with it has come the completely wrong impression that the event was like an explosion and that the universe is expanding today because the objects in it are being flung apart like fragments of a detonated bomb.
Virtually every basic aspect of this intuitive image for the Big Bang (we ARE stuck with the name) is incorrect. To understand why, you need to understand Albert Einstein’s general theory of relativity. Or, at least, you need to have a sense of it. That may sound daunting, but general relativity is the most revolutionary scientific advance of the 20th century, and we all ought to acquire some feeling for it before the century ends.
After all, it’s been 82 years since Einstein put forth his theory. It’s been tested in scores of experiments and has always passed with flying colors and is now firmly established as our premier guide to understanding how gravity operates. Moreover, it is part of the foundation of Big Bang cosmology. And it is because of general relativity that we know the Big Bang was (and is, for the event is still going on) nothing like an explosion.
Albert Einstein developed general relativity in order to make his famous theory of special relativity include the effects of gravity. It is a better way than Sir Isaac Newton’s of understanding how gravity works. Like a hungry amoeba, general relativity ( or just GR for short) had absorbed both Einstein’s newly-minted special relativity and Newton’s physics, giving us the means to replicate ALL of the predictions from these two great theories, while extending them into unfamiliar realms of experience. One of these realms was the Black Hole. The other was the shape and evolution of the universe itself.
Big Bang cosmology says that the universe came into existence between 10 to 20 billion years ago, and that from a hot dense state has been expanding and cooling ever since, remains unassailable. Yet, Big Bang cosmology is vulnerable. It is based on GR being accurate over an enormous range of scales in time and space. Just how good is general relativity? So far, GR has made the following specific predictions:
1…The entire orbit of Mercury rotates because of the curved geometry of space near the sun. The amount of ‘perihelion shift’ each century was well known at the time Einstein provided a complete explanation for it in 1915.
2…Light at every frequency can be bent in exactly the same way by gravity. This was confirmed in the 1919 Solar Eclipse for optical light using stars near the Sun’s limb, and in 1969-1975 using radio emissions from star-like quasars also seen near the limb of the Sun. The deflection of the light was exactly as predicted by GR.
3…Clocks run slower in strong gravitational fields. This was confirmed by Robert Pound and George Rebka at Harvard University in 1959, and by Robert Vessot in the 1960’s and 70’s using high-precession hydrogen maser clocks flown on jet planes and on satellites.
4…Gravitational mass and inertial mass are identical. Most recently in 1971, Vladimir Braginsky at Moskow University confirmed GRs prediction of this to within 1 part in a trillion of the exact equality required by GR.
5…Black holes exist. Although these objects have been suspected to exist since they were first introduced to astronomers in the early 1970’s, it is only in 1992 that a critical acceptance threshold was crossed in the astronomical community. It was then that Hubble Space Telescope observations revealed monstrous, billion-sun black holes in the cores of nearby galaxies such as Messier 87, Messier 33 and NGC 4261.
6…Gravity has its own form of radiation which can carry energy. Russel Hulse and Joseph Taylor in 1975 discovered two pulsars orbiting each other, and through careful monitoring of their precise pulses during the next 20 years, confirmed that the system is loosing energy at a rate within 1 percent of the prediction by GR based on the emission of gravitational radiation.
7…A new force exists called ‘gravito-magnetism’. Just as electric and magnetic fields are linked together, according to GR, a spinning body produces a magnetism-like force called gravitomagnetism. GR predicts that rotating bodies not only bend space and time, but also make empty space spin. A NASA satellite called Gravity Probe B will be launched in the next few years to see whether this effect exists. This is a killer. If it is not found, GR is mortally wounded despite its long string of other successes.
8…Space can stretch during the expansion of the universe. This was confirmed by Edwin Hubble’s detection of the recession of the galaxies ca 1929. More recently in 1993, Astronomer Kenneth Kellerman confirmed that the angular sizes of distant radio sources shrink to a minimum then increase at greater distances exactly as expected for a dilating space. This is not predicted by any other cosmological model that does not also include the dilation of space as a real, physical phenomenon.
We have now boxed ourselves into a corner. If we accept the successes of GR, we are forced to see the world and the cosmos through its eyes, and its eyes alone, since it is the theory which satisfies all known tests to date.
So, how should we think about the Big Bang? Our mental ‘fireworks’ image of the Big Bang contains these basic elements: 1) A pre-existing sky or space into which the fragments from the explosion are injected; 2) A pre-existing time we can use to mark when the explosion happened; 3) Individual projectiles moving through space from a common center; 4) A definite moment when the explosion occurred; and 5) Something that started the Big Bang.
All of these elements to our visualization of the Big Bang are completely false according to GR!
Preexisting Space?
There wasn’t any!
The mathematics of GR state specifically and unambiguously that 3-dimensional space was created at the Big Bang itself, at ‘Time Zero’, along with everything else. It was a ‘singular’ event in which the separations between all particles everywhere, vanished. This is just another way of saying that our familiar 3-dimensional space vanished. Theorists studying various prototypes for the Theory of Everything have only modified this statement somewhat. During its earliest moments, the universe may have existed in a nearly incomprehensible state which may have had more than 4 dimensions, or perhaps none at all. Many of these theories of the earliest moments hypothesize a ‘mother space-time’ that begat our own universe, but you cannot at the same time place your minds eye both inside this Mother Spacetime to watch the Big Bang happen, and inside our universe to see the matter flying around. This is exactly what the fireworks display model demands that you do.
Preexisting Time?
There wasn’t any of this either!
Again, GR’s mathematics treats both space and time together as one object called ‘space-time’ which is indivisible. At Time Zero plus a moment, you had a well defined quantity called time. At Time Zero minus a moment, this same quantity changed its character in the mathematics and became ‘imaginary’. This is a mathematical warning flag that something dreadfully unexpected has happened to time as we know it. In a famous quote by Einstein, “…time and space are modes by which we think and not conditions in which we live”. Steven Hawking has looked at the mathematics of this state using the fledgling physics of Quantum Gravity Theory, and confirms that at the Big Bang, time was murdered in the most thorough way imaginable. It may have been converted into just another ‘timeless’ dimension of space…or so the mathematics seems to suggest.
Individual objects moving out from a common center?
GR says specifically that space is not a passive stage upon which matter plays out its dance, but is a member of the cast. When you treat both galaxies and space-time together, you get a very different answer for what happens than if you treat them separately, which is what we instinctively always do. Curved space distorts the paths of particles, sometimes in very dramatic ways. If you stepped into a space ship and tried to travel to the edge of the universe and look beyond, it would be impossible. Not only could you not reach a supposed “edge” of the universe no matter how long or how fast you traveled, in a closed universe, you would eventually find yourself arriving where you departed. The curvature of space would bring you right back, in something like the way the curvature of Earth would bring you home if you flew west and never changed course. In other words, the universe has no edge in space. There is nothing beyond the farthest star.
As a mental anchor, many have used the expanding balloon as an analogy to the expanding universe. As seen from any one spot on the balloon’s surface, all other spots rush away from it as the balloon is inflated. There is no one center to the expansion ON THE SURFACE of the balloon that is singled out as the center of the Big Bang. This is very different than the fireworks display which does have a dramatic, common center to the expanding cloud of cinders. The balloon analogy, however, is not perfect, because as we watch the balloon, our vantage point is still within a preexisting larger arena which GR says never existed for the real universe.
The center of the Big Bang was not a point in space, but a point in time! It is a center, not in the fabric of the balloon, but outside it along the 4th dimension…time. We cannot see this point anywhere we look inside the space of our universe out towards the distant galaxies. You can’t see time afterall! We can only see it as we look back in time at the ancient images we get from the most distant objects we can observe. We see a greatly changed, early history of the universe in these images but no unique center to them in space.
It is at this point that common sense must give up its seat on the bus, and yield to the insights provided by GR. And it is at precisely this point that so many non-physicists refuse to be so courteous. And who can blame them? But there’s more to come.
Projectiles moving through space?
GR again has something very troubling to say about this. For millions of years we have learned from experience on the savanas of the African continent and elsewhere, that we can move through space. As we drive down the highway, we have absolutely no doubts what is happening as we traverse the distance between landmarks along the roadside. This knowledge is so primal that we are incapable of mustering much doubt about it. But science is not about confirming our prejudices. It’s about revealing how things actually are.
What if I told you that you could decrease the distance from your house and the Washington Monument by ‘standing still’ and just letting space contract the distance away? GR predicts exactly this new phenomenon, and the universe seems to be the only arena we know today in which it naturally occurs. Like spots glued to the surface of the balloon at eternally fixed latitude and longitude points, the galaxies remain where they are while space dilates between them with the passage of time. There is no reason at all we should find this kind of motion intuitive.
If space is stretching like this, where do the brand new millions of cubic light years come from, from one moment to the next? The answer in GR is that they have always been there. To see how this could happen, I like to think of the shape of our universe as a “Cosmic Watermellon”. The fact that this is only the shape for a ‘closed’ finite universe is only a technicality. Finite watermellons are also cheaper to buy than infinite ones.
GR predicts the entire past, present and future of the universe all at once, and predicts its entire 4-dimensional shape. As we slice the 4-dimensional, Cosmic Watermellon at one end of the cosmic time line, we see 3-dimensional space and its contents soon after the Big Bang. At the other end of the Cosmic Watermellon in the far future, we see the collapse of space and matter just before the Big Crunch. But in between, our slices show the shape of space (closed, spherical volumes) and the locations of galaxies ( at fixed locations) as space dilates from one extreme to the other.
As a particular slice through an ordinary watermellon, we see that its meat has always been present in the complete watermellon. The meat is present as a continuous medium, and we never ask where the meat in a particular slice came from. Cosmologically, GR ask us to please think of 3-dimensional space in the same way. Space, like the meat of the watermellon, has always existed in the complete shape of the universe in 4-dimensions. But it is only in 4-dimensions that the full shape of the universe is revealed. It is a mystery why our consciousness insists on experiencing the universe one moment at a time, and that is why we end up with the paradox of where space comes from. There really is no paradox at all.
Space is not ‘nothing’ according to Einstein, it is merely another name for the gravitational field of the universe. Einstein once said, “Space-time does not claim existence on its own but only as a structural quality of the [gravitational] field”. If you could experimentally turn-off gravity with a switch, space-time would vanish. This is the ultimate demolition experiment known to physics for which an environmental impact statement would most certainly have to be filed.
The gravitational field at one instant is wedded to itself in the next instant by the incessant quantum churnings of the myriad of individual particles that like bees in a swarm, make up the gravitational field itself. In this frothing tumult, the gravitational field is knit together, quantum by quantum, from perhaps even more elemental building blocks, and it is perhaps here that we will find the ultimate origin for the expansion of the universe and the magical stretching of space. We hope the much anticipated Theory of Everything will have more to say about this, but to actually test this theory may require technologies and human resources that we can only dimly dream of.
Was there a definite moment to the Big Bang?
GR is perfectly happy to forecast that our universe emerged from an infinite density, zero-space ‘Singularity’ at Time Zero, but physicists now feel very strongly that this instant was smeared out by any number of quantum mechanical effects, so that we can never speak of a time before about 10^-43 seconds after the Big Bang. Just as Gertrude Stein once remarked about my hometown, Oakland, California that “There is no ‘There’ there”, at 10^-43 seconds, nature may tell us that before the Big Bang, “There was no ‘When’ there” either. The moment dissolves away into some weird quantum fog, and as Steven Hawking speculates, time may actually become bent into a new dimension of space and no longer even definable in this state. Ordinary GR is unable to describe this condition and only some future theory combing GR and quantum mechanics will be able to tell us more. We hope.
Something started the Big Bang!
At last we come to the most difficult issue in modern cosmology. In the fireworks display, we can trace the events leading up to the explosion all the way back to the chemists that created the gunpowder and wrapped the explosives. GR, however, can tell us nothing about the equivalent stages leading up to the Big Bang, and in fact, among its strongest statements is the one that says that time itself may not have existed. How, then, do we speak or think about a condition, or process, that started the whole shebang if we are not even allowed to frame the event as “This happened first…then this…then kerpowie!”? This remains the essential mystery of the Big Bang which seems to doggedly transcend every mathematical description we can create to describe it.
All of the logical frameworks we know about are based on chains of events or states. All of our experiences of such chains in the physical world have been ordered in time. Even when the mathematics and the theory tell us ‘What happened before the Big Bang to start it?’ is not a logical or legitimate question, we insist on viewing this as a proper question to ask of nature, and we expect a firm answer. But like so many other things we have learned this century about the physical world, our gut instincts about which questions ought to have definite answers is often flawed when we explore the extreme limits to our physical world.
I wrote this essay before seeing the new IMAX file at the Air and Space Museum ‘Cosmic Journey”, by far one of the nicest and most heroic movies of its kind I had ever seen. But of course it showed the Big Bang as a fireworks display. No matter. It doesn’t take a rocket scientist to accept the fact that the Big Bang was a spectacular moment in history. What is amazing is that the daring audacity of humans may have demystified some of it, and revealed a universe far stranger than any could have imagined.
Still, we are haunted by our hunches and intuitions gathered over millenia, and under circumstances far removed from the greater physical world we are now exploring. No wonder it all seems so alien and maddeningly complex.
|
The L-39 Albatros is a fighter jet trainer designed in the 1970s to replace the L-29 Delfin. The aircraft has been developed by Aero Vodochody and it was the first of the second-generation jet trainers, and the first turbofan-powered trainer produced, and was later updated as the L-59 Super Albatros and as the L-139 (prototype L-39 with Garrett TFE731 engine). The Albatros is the most widely used jet trainer in the world; in addition to performing basic and advanced pilot training, it has also flown combat missions in a light-attack role.
fly fighter jet
The low, slightly swept wing has a double-taper planform, 2½-deg dihedral from the roots, a relatively low aspect ratio, and 100 liter (26½ USgal) fuel tanks permanently attached to the wingtips . The trailing edge has double-slotted trailing edge flaps inboard of mass-balanced ailerons; the flaps are separated from the ailerons by small wing fences. The tall, swept vertical tail has an inset rudder. Variable-incidence horizontal stabilizers with inset elevators are mounted at the base of the rudder and over the exhaust nozzle. Side-by-side airbrakes are located under the fuselage ahead of the wing’s leading edge. Flaps, landing gear, wheel brakes and air brakes are powered by a hydraulic system. Controls are pushrod-actuated and have electrically powered servo tabs on the ailerons and rudder. Operational g-force limits at 4,200 kg (9,260 lb) are +8/-4 g.
The L-39 Albatros is currently being used by 44 countries and a few aerobatics teams, such as the Breitling Jet Team and the Baltic Bees. The jet fighter has been used notably in a few conflicts such as Afghanistan, Libya, Chechnya, Abkhazia and more recently in Syria. While newer versions are now replacing older L-39s in service, thousands remain in active service as trainers, and many are finding new homes with private warbird owners all over the world, such as ourselves.
fly l-39
|
No student should be aware of the political views of their teacher.
Do you have a child in the public school or university system?
Do you think the current generation – in the media, high tech, entertainment, political spheres have been brain washed to a large extent by the educational system?
Have you sent your kid to college only to have them return as a mindless foot soldier of someone else’s ideology? (Did you pay an exorbitant sum for the privilege?)
Are you concerned about the next generation of citizens being brain washed?
Are you concerned watching Communist Chinese arrogation into space, engineering, technology – and our plunging school rankings while our educators mindlessly debate pronoun protocols and how many genders there are? While our schools drop SAT and other examinations because they are supposedly racist? While our teacher’s union is focused on creating resolutions like this – during the pandemic:
NEA New Business Item 39 resolution that Manhattan Institute senior fellow Christopher Rufo characterizes as “a plan to promote critical race theory in all 50 states and 14,000 local school districts.
Did you know that whole groups of teenage girls are coming out as transgender when this was vanishingly rare a short while ago? That 3% of middle school girls say they are gender fluid? That suicide attempts by teen girls are up 51%? Welcome to the transgender craze, brought to you by the transgender movement.
Are you also concerned which County Schools are indoctrinating our own kids?
Then please sign up, below, today.
In California we have a teachers union that is highly political, extremely powerful and opposed to the interests of students and parents. It must be met head on. Activism at the local level and school choice is the antidote for indoctrination of our kids.
What Indoctrination are we talking about?
Following are some examples:
Just Plain Poor Educational Practices
1. Teaching kids what to think rather than how to think
2. Passively or actively disseminating a particular viewpoint rather than giving kids the tools to learn and make their own conclusions
3. Focus on feeling and opinion over reason and truth and reality
4. Exposing teacher’s political views to students or expressing opinions on contemporary politics or political leaders
5. Using Common Core – the idea that it’s not the answer but the process that matters
6. Anything resembling “safe spaces” or “trigger words”. See also participation trophies.
7. Teachers and staff telling kids not to tell their parents something or that their parents don’t “get it”
8. Bypassing or subverting parental authority in any way
9. Teaching students that their parents are not to be believed, or that their parents are stupid, misinformed, etc. (this happens it’s on video)
10. Spending exorbitant sums on “diversity equity and inclusion” administrators, consultants rather than education
Racial Indoctrination
1. Teaching or passively promoting “critical race theory”
2. Promoting any type of racial supremacy
3. Focus on race, presenting one or more in a negative light or making generalizations
4. Teaching “Ethnic Studies” or the California “Ethnic Studies Model Curriculum
5. Promoting “equity” of outcome rather than “equality” of opportunity
6. Advocating that correct answers or testing are racist
7. Environments where “cultural appropriation” is derided. The notion of cultural appropriation is Un-American
8. Schools lowering or removing standards to achieve some sort of “equality”
9. Promoting toxic concepts like white fragility, systemic racism and victimhood a’ la Robin DiAngelo and Ibram X. Kendi
10. Mandatory “anti racism“, equity or social justice classes that are really just CRT
11. Application of any of the delivery mechanisms of CRT, such as outlined in this paper, including DIE – Diversity, Inclusion and Equity (also known as DEI) – which is simply verbal gymnastics and another name for CRT.
Ideological Indoctrination
1. Promoting extreme nationalism
2. Teaching based on relativism, post modernism
3. Advocating, glorifying serial failure political / economic systems such as Marxism, Socialism, Communism
4. Promoting radical Marxist and anarchist groups
5. Labeling rioting, looting and vandalism as “peaceful demonstration” for some groups
6. Teaching that tends to promote disunity, villainization of American history and historical figures
7. Promoting “wokeness”
8. Promoting, supporting any sort of “cancelling” of people with particular viewpoints
9. Removing history, books, classical works from curricula or libraries
10. Removing the American flag, the Pledge of Allegiance or National Anthem from facilities, public ceremonies
11. Schools that refuse to teach American values, civics
12. Allowing or encouraging kneeling or disrespect for the flag or national anthem
13. Teaching or passively promoting the “1619 Project”
14. Limiting of free speech or expression of unpopular or “politically incorrect” opinions, including limiting to “free speech zones” No one has a right to not be offended
15. Presence of “cancel culture” in the school
Social Contagions – Biological & Sexuality Indoctrination
1. Promoting Intersectionality
2. Allowing biological males to compete against biological females in sports
3. Teaching or promoting “gender ideology” in school, the primacy of “gender identity” over biological sex
4. Teaching or promoting the “Transgender Movement”:
5. Radical ideological attacks and distortions upon the reality of sex difference and upon human nature as a species of male and female beings
6. Advocating for medicinal and surgical remedies to “gender dysphoria” at extremely early ages
7. Favoring affirmation of a delusion that some kids have regarding their sex or gender, instead of helping them overcome that delusion
8. Attacking natural views of sexual morality and sexual identity
9. Bathroom rules allowing biological males and females to share locker rooms, bath rooms, showers
10. Enforcement of rules for which pronouns people are addressed with
11. Teaching which promotes promiscuity, sexual dysphoria or gender confusion, or tends to normalize LGBTQ and marginalize “straightness”
12. Teaching kids that their basic identity—as male or female—is something fluid or changeable. That’s not science.
13. Using explicit photos and drawings of sexual nature, such as “Positive Prevention Plus Sex Ed Curriculum” or “The California sex and gender “health” curriculum
14. Allowing minor children access to medical services, counseling, hormone therapy, puberty blockers, etc. without parental notification, as described in California Teachers Association (CTA) proposals currently in the works
15. Allowing students to assume a different identity at school (happens)
16. Allowing students to change identity documents
17. Schools allowing kids to act as a different gender during the school day (this happens)
18. Infringing on the rights of the parent in deciding what’s best for their child’s health, education and upbringing (Florida H.B.241 – Parent’s Bill of Rights)
19. Hosting “Drag Queen Story Hours” for middle and grammar school kids.
It’s not about what people think about these topics, the point is schools should not be pushing a particular ideological viewpoint. They should be teaching. People on all sides should be able to agree on that.
See our Resources page for more information and links.
Take Action
Join our mailing list to stay aprised We are volunteers, support our efforts
Report an Indoctrination Incident View summary report of indoctrination cases
|
Deep venous thrombosis remains a major medical problem, affecting a large segment of the population and resulting in significant mortality and morbidity.
Current techniques available for detecting deep venous thrombosis present limitations that may mitigate their potential benefit to the patient. Invasive techniques, such as ascending contrast venography, carry risks to the patient with regard to complications such as an allergic reaction to an iodine dye, adverse effects to renal function, and clot formation in a normal vein. Noninvasive techniques, such as Doppler ultrasound and impedance plethysmography, evaluate only a limited segment of the venous bed. The need remains for a diagnostic technique that is safe, accurate, and widely accessible.
A readily available noninvasive scintigraphic technique utilizing radiolabeled monoclonal anti-fibrin antibody may overcome some of these shortcomings. This imaging examination is quite effective in detecting clots in the lower extremities. Compared to contrast venography, 111In-labeled anti-fibrin antibody imaging appears to be as sensitive in identifying acute venous thrombosis. In addition, the preliminary data indicate that anticoagulation with heparin may interfere with adequate visualization of the clots with this technique.
This content is only available via PDF.
|
South Africa: Reserve Bank Celebrates 100 Years Since First Banknote
The South African Reserve Bank on Tuesday celebrated 100 years since issuing its first banknotes.
The banknotes were issued 10 months after the SARB was established on 30 June 1921, the Bank said in a statement.
"Prior to that, South Africa had no monetary authority. However, the commercial banks were responsible for issuing banknotes into circulation.
"From 19 April 1922, the SARB was granted the sole authority to produce, issue and destroy South African currency, and is entrusted with ensuring the availability and integrity of the South African currency," the SARB said.
It said it has invested significantly in the currency's design and security features to protect the public from counterfeiting, noting that its banknotes are highly regarded globally.
The security features embedded in South Africa's currency represent the most innovative advancements in global design and technology.
"For South Africa, its currency is a symbol of national pride and reflects the country's cultural heritage, economic industries and the big five animals," said the bank.
In 1961, the rand replaced the South African pound.
"The rand takes its name from the Witwatersrand (white waters' ridge), the ridge where most of South Africa's gold deposits were found in Johannesburg," said the bank.
From time to time, the SARB issues banknotes and coins to commemorate key events or milestones in the country. In 2018, the SARB was the first central bank to issue commemorative banknotes in all five denominations. These commemorative banknotes and coins are placed into circulation for everyday use and maintain their face value.
|
How to Write Executive Summary for Term Paper
02/07/10 1:18 PM
Executive summary is the one which previews the merely important points of comprehensive written material; either it is a term paper or an in-depth report. The purpose of this summary is to make a term paper easy and interesting for nontechnical people, who don’t have enough time to read detailed one. Although the executive summary is precise, it manages to cover essential information for the reader.
Writing an executive summary of term paper is technically similar to writing any sort of summary, which has the main theme to condense a larger document in to simple and short one. Here mentioned are the tips to write an executive summary for a term paper:
1. The foremost tip in writing an executive summary is to think about the corresponding audience and write according to their needs and interests.
2. Maintain the length of the summary; it should not be more than 10% of the term paper.
3. As the summary should be precise, be sure that it includes the main theme of term paper, methods of research, results, conclusion and recommendations at any cost.
4. Do emphasize on the main theme to convince the reader in this short reading material towards your opinion.
5. Clear the goals and objectives of your term paper; ask recommendation and justify them as well.
6. Another thing to consider is that executive summaries are demanded by some of the teachers with the term paper. Don’t scurry, you should not write it, until you have researched it completely.
7. Once you have completed term paper, review it thoroughly, highlight the main points and then write an executive summary of the document.
8. You can help with bullets, bold font and subtitles to make your summary easy to understand and good organizational structure.
9. Try to write in your own words.
10. Re-read the summary for any type of positive modification, like elimination of irrelevant information, grammatical and spelling error etc.
11. Now read it for the personal judgment, to make sure that it is clear, understandable, precise and informative, it should be interesting to the reader too.
12. Now, it would be better that if you ask a nontechnical person (your friend, spouse or parents) to read the term paper’s executive summary. Ask them for comments whether they find it boring or interesting, informative or useless. If they feel it boring or non-informative, try to modify it accordingly.
Do your best to write a standard executive summary, it will surely attract the readers. Best of luck!
Posted by Janele Frederick | in Writing Tips | Comments Off on How to Write Executive Summary for Term Paper
Comments are closed.
|
Cliff and Cave Swallows
Two of our summer swallows, Cliff Swallow and Cave Swallow, look really similar and can be a challenge to separate, especially if you don’t see them well. These voracious insect eaters both build nests made of mud, but here too there are subtle differences. Read on to learn about these two swallows and how to separate them.
Cliff Swallows have dark throats and a light beige foreheads.
Cave Swallows have light buffy throats but are otherwise similar to Cliff Swallows. Photo Becky Matsubara, licensed under CC BY 2.0.
The key to separating these two species is the facial pattern, particularly the throat. Cliff Swallows have dark, almost black throats with a dark chestnut face that usually looks black too. The forehead is bright and buffy. Birders sometimes refer to it as their “headlights.”
Cave Swallows on the other hand have pale throats and light brown foreheads that aren’t as bright or contrasting. Sometimes, if backlit, Cave Swallows just look pale on the throat and its hard to see any color.
In Flight
Cliff Swallows (like those pictured here) and Cave Swallows look similar in flight with pale breasts and square tails.
In flight, you again need to see the throat to determine which species you’ve got, but the shape of the tail will narrow down the swallow to Cliff or Cave. In contrast to other species, both have square tails. Barn Swallows have deeply forked tails, while birds like Tree Swallows and Bank Swallows have notched tails, which is like a hint of a fork.
Above, the rump is buffy orange. It’s common to see this patch of color and know you have a Cliff or Cave Swallow but not know which one as the bird flies directly away and never gives a good look at the throat.
Two Ways to Build a Mud Nest
Cliff Swallow nests are domes made of little balls of wet mud.
Cliff Swallow nests are made of little mud balls, which they collect from the edges of rivers and ponds. The shape is distinct—a dome with a small entrance on the side. You can often see their bright foreheads sticking out this hole. The species does indeed like sheer walls of cliffs and canyons, though they will also use bridges and overpasses.
Cave Swallows also built mud nests but their shape is a wide open cup. Historically, this species nested largely in the openings to caves. However, in recent years, they’ve expanded their choice of nest sites to also include the underside of bridges and culverts. Natural caves if you will.
I’ve always found it kind of cool that you can tell what species nested in a location just by looking at the shape of their nests.
Status in Taylor County and Beyond
Cliff Swallow is definitely the more widespread of the two species, nesting across almost the entire continental United States, up into Canada and even into Alaska. The species is largely absent as a breeder from the southeast, but does migrate through this region in spring and fall.
In contrast, Cave Swallows have a limited range. As recently as 50 years ago, they were found mostly in Mexico and further south, barely reaching south Texas. In fact, the species wasn’t discovered in the United States until 1915! Today, the birds have expanded their range north in Texas by using those new nesting sites. Still, they don’t normally make it much further north than Lubbock and the Texas-Oklahoma border. There are exceptions though. Birds rarely but regularly show up hundreds, even thousands of miles to the north, getting caught up in winds that push them as far north as Nova Scotia!
Both species nest in Taylor County, showing up in spring. Cave Swallows, however, are here for a much longer window of time. The earliest birds can show up in February. Rarely, the latest leave in November. So they could occur almost any time, and a swallow seen in winter is likely a Cave Swallow. Cliff Swallows, by contrast, are quick to leave and are mostly gone by the end of August.
They’re impressive little birds, building their own structures for nesting and gobbling up insects by the bushel. Definitely worth appreciating.
Leave a Reply
Your email address will not be published.
|
Archive by Author | petermcgill94
Bayesian View of Galaxy Evolution
The Universe is pretty huge, and to understand it we need to collect vast amounts of data. The Hubble Telescope is just one of many telescopes collecting data from the Universe. Hubble alone produces 17.5 GB of raw science data each week. That means since its launch to low earth orbit in April 1990, it’s collected roughly a block of data equivalent in size to 6 million mp3 songs! With the launch of NASA’s James Webb Telescope just around the corner – (a tennis court sized space telescope!), the amount of raw data we can collect from the Universe is going to escalate dramatically. In order to decipher what this data is telling us about the Universe we need to use sophisticated statistical techniques. In this post I want to talk a bit about a particular technique I’ve been using called a Markov-Chain-Monte-Carlo (MCMC) simulation to learn about galaxy evolution.
Before we dive in into the statistics let me try and explain what I’m trying to figure out. We can model galaxy evolution by looking at a galaxy’s star formation rate (SFR) over time. Basically we want know to how fast a particular galaxy is making stars at any given time. Typically, a galaxy has an initial constant high SFR then at a time called t quench (tq) it’s SFR decreases exponentially which is characterised by a number called tau. Small tau means the galaxy stops forming stars, or is quenched, more rapidly. So overall for each galaxy we need to determine two numbers tq and tau to figure out how it evolved. Figure 1 shows what this model looks like.
Figure 1: Model of a single galaxy’s SFR over time. Showing an initial high constant SFR, follow by a exponential quench at tq.
To calculate these two numbers, tq and tau, we look at the colour of the galaxy, specifically the UVJ colour I mentioned in my last post. We then compare this to a predicted colour of a galaxy for a specific value of tq and tau. The problem is that there are many different combinations of tq and tau, how to we find the best match for a galaxy? We use a MCMC simulation to do this.
The first MC – Markov-Chain – just means an efficient random walk. We send “walkers” to have a look around for a good tq and tau, but the direction we send them to walk at each step depends on how good the tq and tau they are currently at is. The upshot of this is we quickly home in on a good value of tq and tau. The second MC – Monte Carlo – just picks out random values of tq and tau and tests how good they are by comparing the UVJ colours and our SFR model. Figure 2 shows a gif of a MCMC simulation of a single galaxy. The histograms shows the positions of the walkers searching the tq and tau space, and the blue crosshair shows the best fit value of tq and tau at every step. You can see the walkers homing in and settling down on the best value of tq and tau. I ran this simulation by running a modified version of the starpy code.
Figure 2: MCMC simulation for a single galaxy, pictured in the top right corner. Main plot shows density of walkers. Marginal histograms show 1D projections of walker densities. Blue crosshair shows best fit values of tq and tau at each step.
The maths that underpins this simulation is called Bayesian Statistics, and it’s quite a novel way of thinking about parameters and data. The main difference is that instead of treating unknown parameters as fixed quantities with associated error, they are treated as random variables described by probability distributions. It’s quite a powerful way of looking at the Universe! I’ve left all of the gory maths detail about MCMC out but if you’re interested an article by a DPhil student here at Oxford does are really good job of explaining it here.
So how does this all relate to galaxy morphology, and Galaxy Zoo classifications? I’m currently running the MCMC simulation showing in Figure 2 over the all the galaxies in the COSMOS survey. This is really cool because apart from getting to play with the University of Oxford’s super computer (544 cores!), I can use galaxy zoo morphology to see if the SFR of a galaxy over time is dependent on the galaxy’s shape, and overall learn what the vast amount of data I have says about galaxy evolution.
Galaxy Zoo and the COSMOS Survey.
Hello present, and hopefully future volunteers!
I’m a summer research intern on the Zooniverse Project, based at the University of Oxford. I’m currently at university in London and I’ll be going into my fourth year of studying Theoretical Physics. I’m three weeks into my internship, and I want to share with you how the hundreds-of-thousands of galaxies you’ve worked hard to classify are being used in research.
I’m working with Galaxy Zoo Hubble (GZH) data, which are classifications of galaxies from the Hubble Space Telescope Legacy survey. The classifications for this data have just been submitted for publication by a group of researchers from Galaxy Zoo, and you can read about it here. Specifically I’m working with a subset of this data from the Cosmic Evolution Survey, or COSMOS. This survey is specially designed to help us understand how galaxies evolve over time, and how their local environments in the universe affect this.
Up to now I’ve been using GZH data to add morphology to data currently found in the literature, in the hope that we can learn something new about galaxy evolution. In this post I want to share with you a particular striking example of how GZH classifications have transformed current data. Figure 1 shows two rows of colour-colour plots. The vertical axis is U-V colour, which is a measure how much recent star formation is going on in a galaxy – the higher up a galaxy is in the plot the more recent star formation is going on. The horizontal axis is V-J colour which is a measure of how much Infrared light compared to visible light a galaxy is emitting – the further left a galaxy is in the plot the generally older and more ‘dead’ it is. The first row (top) is found in a paper (Muzzin et al 2013), on analysis of galaxies in the COSMOS survey, written by researchers from the US, Denmark, Netherlands, UK, and Chile. The second row (bottom) shows the same data but with GZH classifications overlaid. Red and blue points represent featured and smooth galaxies respectively. Banner image shows a featured spiral galaxy (left), and and smooth elliptical galaxy (right).
Figure 1: colour-colour plots Galaxies from the COSMOS survey (top) before (bottom) after GZH classifications data added. Red and blue points represent featured and smooth galaxies respectively.
No need to ask which one looks more interesting! Lets understand what these plots mean. Each point on each plot represents a different galaxy. On each row the plots are sorted by z or redshift; you can think of this as being different snapshots of galaxies in the universe at different times. The most recent snapshot being on the left, and the oldest on the right of each row.
The important thing to take away from this data is that there are two distinct blobs or populations of galaxies in each plot. Galaxies in the top left blob are called star forming (SF) and galaxies in the longer bottom right blob are non-star forming, or ‘quiescent’. From the overlay of GZH classifications data on Figure 1 (bottom), we can see that the nearly complete absence of galaxies with features in the top left population of SF galaxies – something that we didn’t know before!
So why do we care about analysing colour-colour plots of galaxies? As a galaxy evolves through its lifetime it moves from the SF population to the quiescent through that bit in-between the two blobs, which is called the ‘Green Valley’ (I’ll save more on that for another blog post), and the truth is nobody quite knows how this happens. Overall, we hope GZH classifications may shed some light on this, and help us understand how galaxies evolve.
To help us finally understand the evolution of galaxies, get involved right now at, we’d be happy to have you on-board!
|
Is Spanish Hard to Learn? (+ Tips to Learn it Fast!)
Click here to get your All Access Pass today
Spanish is a Romance language that originated in the Castile region of Spain. It has over 470 million speakers, making it the second most spoken language in the world. So, is Spanish hard to learn? The answer depends on your language learning experience and abilities.
Some people think that Spanish is hard to learn. They say that it’s difficult to remember all of the different verb conjugations and tenses and that the pronunciation is tricky. But with some dedication and practice, you can become proficient in Spanish!
In this post, we’ll take a look at some of the reasons why Spanish might seem hard to learn, and we’ll explore some methods for making the learning process easier. So read on if you’re curious about Spanish – you just might be surprised by how easy it can be!
two women talking and smiling
Is Spanish hard to learn?
Is Spanish hard to learn? The answer is no, Spanish isn’t hard to learn at all, but there are many reasons why it may seem so.
One reason is that the pronunciation of Spanish is much more stringent than English or other languages you may know, and that takes some practice if you’re not used to it. Once your ear gets accustomed to the sound, though, it becomes just as easy as any other language because of its logical structure.
The best way to learn the pronunciation rules would be by listening first and then trying them out yourself in words you’ve already memorized. For example: If someone were to say “Compro” (I buy), try saying “compo” instead since Compro makes absolutely no sense. “Compro” is the correct way to say it, and it’s right because that’s how it is said in Spanish.
Another common reason why people might think Spanish is hard to learn is because of the verb conjugations and many irregular verbs and nouns.
The reason why there are so many exceptions even though you’ve studied them for so long before you’d actually use them in conversation is that Spanish will not hesitate to leave out the subject, which results in a lot of confusion when we first begin learning it as a second language.
With time, this becomes easier as well as you grow accustomed to using context clues within conversations instead of memorizing everything verbatim from a book or program. Becoming fluent in any language requires immersion (listening and speaking), and with that, we’re sure you’ll catch on quickly.
Recommended courses for you
Why is Spanish not hard to learn?
Although the Spanish language is considered to be one of the more difficult languages to learn, this may not necessarily be true. There are several reasons why it isn’t as hard as many people believe.
• Learning Spanish does not have to start with memorizing verbs. It makes much more sense to learn nouns first because these are the words that you will use in everyday conversation.
• As soon as you start studying grammar, begin applying what you’ve learned. Don’t wait until you feel perfect at using every possible verb tense before feeling ready to acquire conversational skills.
• Lack of vocabulary is not a problem when learning Spanish. This is due primarily to cognates, which are words that share a common origin. These words can easily be translated into English and still retain their meaning.
• You need to speak now, not later. Don’t worry about making mistakes; this is expected as long as you’re having fun! The best way to learn how to speak Spanish is by immersing yourself in an environment filled with the language.
• It’s possible to become conversational in less time than you might think. Under ideal conditions, it should only take one month before you know enough Spanish for basic conversations. Keep practicing, and your skills will keep improving. Soon you’ll be able to hold more advanced conversations and eventually read books and newspapers written entirely in Spanish. It’s not nearly as intimidating as it sounds.
Tips to learn Spanish fast
Learning Spanish is not hard, and it can be a lot easier through these tips:
1. Always keep a Spanish dictionary at your side
Your first exposure to any language is its sound and written form which can be really tricky, especially if you are not familiar with the script of that language.
For instance, the letter ‘Y’ in Spanish might look like an upside-down ‘N’ to you, or perhaps you are confused between the sound for small ‘c’ and big C.’ Your best friend will be an English to Spanish dictionary which will provide you examples on how each word should be pronounced as well as its meaning.
2 . Use subtitles or audio files while watching TV shows or movies
Although watching an episode of Friends or House M.D in your native language is fun, it will be far more interesting if you watch the same episode with Spanish subtitles under them.
This will not only make it easier for you to follow what is taking place but will also provide you with an idea of how words are pronounced as well as their meaning.
3 . Get yourself an online tutor
If watching TV shows and movies doesn’t seem like something that would keep your attention for long, then perhaps you should start looking into other ways of learning Spanish fast. One of the best ways to pick up this language would be by asking someone who is fluent in it to provide you with lessons.
For instance, you can hire an English to Spanish online tutor, who will be able to explain words along with their meaning and pronunciation. So instead of getting lost among the 100s of words that are being used, your tutor will help by providing detailed explanations.
4 . Do not shy away from asking questions
When learning a new language, it is essential for you to have ample amounts of patience because there are bound to be some moments when you’ll feel lost during conversations despite being fully aware of the fact that people around you are speaking Spanish fluently.
One way around this would be asking questions about certain words or phrases, followed by asking them to show examples of how they are being used. This way, you’ll be able to understand the language better and will also get a chance to learn how it is being spoken in a natural manner.
two women sitting by a lake
5 . Have a Spanish-speaking friend
Sticking with learning from TV shows and movies might seem nice at first, but it’ll quickly lose its charm when watching reruns of the same episode for months on end. The one thing that can help change this mindset is having a Spanish-speaking friend who would go out with you every time you want to practice your language skills.
You can ask them about any grammatical mistakes or the meaning of specific words, followed by getting their feedback. Your friends will soon become your biggest critics, which is why it’s vital for them to have patience while going around the same topic again and again.
6 . Listen to audio but don’t rely only on them
Although listening to audio files like songs or stories can be really helpful when it comes to picking up a new language quickly, they shouldn’t be the only thing that you rely on for practicing your spoken skills.
It is also essential for you to get hands-on experience by writing short phrases followed by their translation in order to achieve this language fast within no time.
For example, if you are learning how to tell someone that you speak Spanish fluently, then practice saying these sentences aloud ‘Yo hablo Espanol muy bien’ along with their English equivalents ‘I speak Spanish very well. With thousands of apps available online, it won’t be difficult for you to find free software that can help provide real-time feedback.
7. Get yourself an app
Once you’ve acquired the basic knowledge of Spanish, it will be time for you to start testing your skills by playing games on your smartphone. There are hundreds of apps available which will help you learn new words, phrases, and sentences, followed by getting instant feedback about how well they were pronounced.
It is essential for these tools to follow a certain structure so as to provide you with accurate results that are easy to understand without making too many mistakes. For instance, if the app tells you that ‘Hola’ was pronounced incorrectly, then there are big chances that it might have been used in place of ‘a’, the word meant to be used as an indefinite article.
No language is “hard” to learn if you are up for the challenge. Anyone who has learned a new subject or skill knows that there is always a curve at first, but it gets easier with time and practice.
While there are several key areas of Spanish that you need to focus on when learning Spanish, it is not necessary for you to practice linguistic gymnastics in order to get the right pronunciation. In fact, most people find it easy to achieve a good Spanish accent in a short amount of time. It is actually far easier than most people make it out to be!
Learn to speak Spanish fast! Sign up for language courses at Skill Success.
Click here to learn more
Browse all Categories
Related Posts
Be the first to get the newest articles!
Be the first to get the newest articles!
You've successfully signed up for our newsletter!
Looking for a solution to discover,
change, or advance your career?
You've successfully signed up for our newsletter!
Your privacy is secured and your information will not be shared 2022
All rights reserved
You've successfully signed up for our newsletter!
Subscribe For Success!
Get fresh content every week to upgrade your skills today!
|
What did jesus write in the sand
What did jesus write in the sand
What did Jesus write on the ground with his finger?
What did Jesus write in the sand LDS?
Jesus comes back to his original place and writes on the ground again, and the men, “one by one,” leave. Last to go, is “the woman’s companion in evil,” who gets his own special message written in the dirt.
Why did Jesus draw a line in the sand?
Biblical link to John 8:6. Some have (perhaps erroneously) interpreted Jesus ‘ writing in the sand , as drawing a line in the sand in order to address those who are about to stone a woman caught in adultery.
What did Jesus write on the wall?
Daniel reads the words “MENE, MENE, TEKEL, UPHARSIN” and interprets them for the king: “MENE, God has numbered the days of your kingdom and brought it to an end; TEKEL, you have been weighed and found wanting;” and “PERES, your kingdom is divided and given to the Medes and Persians.
Which book did Jesus directly write?
Jesus did not write any book of the Bible , but, he did leave the disciples to write down everything that they saw concerning him and the accounts of the founding of the church of believers after his ascension into heaven.
You might be interested: Who was jesus crucified next to
Who wrote Bible?
Who helped Jesus carry the cross?
What does draw a line in the sand mean?
to set a limit beyond which someone cannot go without suffering serious consequences. The President should draw a line in the sand right here, right now.
What does the handwriting on the wall in the Bible mean?
mene, mene, tekel, upharsin in American English (ˈmiˈni miˈni tɛkəl juˈfɑrsɪn ) Bible . the writing on the wall , interpreted by Daniel to mean that God had weighed Belshazzar and his kingdom, had found them wanting, and would destroy them: Dan.
Who saw the handwriting on the wall in the Bible?
According to the accounts in the Bible and Xenophon, Belshazzar held a last great feast at which he saw a hand writing on a wall the following words in Aramaic: “mene, mene, tekel, upharsin.” The prophet Daniel , interpreting the handwriting on the wall as God’s judgment on the king, foretold the imminent destruction of
You might be interested: What hour did jesus die
What does writing on the wall mean?
(US also the handwriting is on the wall ) said to mean that there are clear signs that something will fail or no longer exist. 4 дня назад
Phil Johnson
leave a comment
Create Account
Log In Your Account
|
Handwoven Jamdani Linen Sarees: A Cultural Heritage
Jamdani sarees are an iconic part of Indian culture, representing the spirit and strength of women. Read on to find out more about this beautiful and intricate art form and the culture behind it!
History of Jamdani
Jamdani is a relatively recent textile tradition, dating back to the 18th century after the decline of the Mughal Empire. Traditionally woven with silk and cotton yarns, it became popular as a way for weavers to continue their livelihood after the decline of the empire. Jamdani was once known as ‘Nilkuthi’, meaning ‘woven by the weaver’s
Chidiyaa Chidiyaa
Chidiyaa Chidiyaa
Types of Jamdani
The traditional Jamdani saree is a highly artistic and elaborate product. It is woven in an elaborate process, which includes calendering the cloth in order to achieve a fine texture, weaving it in intricate designs, using zari threads to create patterns, combining it with other fabrics for finishing touches. The weavers now use the power looms for weaving, although handlooms are still used in some places.
Materials Used in Jamdanis
The fabric is traditionally woven on a chakla, a flat warp-histle loom. The weft thread is usually cotton or silk and there are two sets of threads at right angles to each other. Weaving is done in such a way that the cloth becomes densely packed with threads which gives it strength.
How to Wear a Jamdanis Sarees?
Jamdanis Sarees are a type of saree which can be worn in different ways. It is classified as a six-yard saree and comes in various beautiful colors and designs. The most popular way to wear this type of saree is by draping it over your head and shoulders like a shawl. Another way to wear it is by wrapping it around your waist and then pulling the end through the front of the fabric, tying it at the back like a tight skirt or simply knotting it at the back like a sari.
Chidiyaa Chidiyaa
A Conclusion
In India alone, there are over 3000 handloom producing districts. The silk industry is also a major source of income for the Indian economy, employing over 3 million people. Jamdani materials have been worn by royalty and aristocracy since ancient times. In particular, it was a favorite textile for women nobles in the Mughal empire who prized its beauty and durability. The Jamdani weaving technique has been passed down from generation to generation and is now an important cultural link to our past.
Chidiyaa Chidiyaa
|
The Back to the Future Timelines (Films, Game, and Comics)
JenniferJennifer Moderator
edited September 2016 in Back to the Future
As everyone here probably knows, I'm a huge Back to the Future fan. I've been enjoying the IDW comics, which were co-written by Bob Gale. They've answered a lot of questions that fans have had over the years, so I thought I'd try to do a timeline summary to sum it all up.
Timeline 1 - Original timeline
• 1855: Clara Clayton is born in New Jersey.
• 1885: Clara Clayton arrives in Hill Valley, but no one picks her up at the train station. She rents a horse and a buckboard, but her horse is spooked by a snake and goes over the Shonash Ravine. It is renamed Clayton Ravine in her memory.
• 1914: Emmett Von Braun is born.
• Between 1914 and 1917: Due to anti-German sentiment during World War I, Emmett's father changes their family name from Von Braun to Brown.
• 1910s or 1920s: Emmett Brown decides to get into science after reading the novels by Jules Verne.
• 1931: Emmett Brown's experiment fails at the Hill Valley Science Expo, but he decides to keep up with his dream of being a scientist.
• 1943: Emmett Brown becomes a part of the Manhattan Project after he secures an interview during his tenure as a professor at CalTech.
• 1955: Emmett Brown hits his head and comes up with the idea of the flux capacitor, which would make time travel possible. Lorraine Baines falls in love with George McFly after nursing him back to health after her father hit him with a car. George and Lorraine's love is cemented at the Enchantment Under the Sea dance.
• 1963: General Groves seeks out Emmett Brown, as he is seeking to make a time machine to stop the Cuban Missile Crisis from ever happening. Emmett built a working time machine prototype called the temporal field capacitor that can only send objects forward through time. Sending them too far back causes a build up of flux energy and causes the machine to overheat. Emmett shows his invention and agrees to work for the government, as he used almost all of his family fortune building the time machine prototype. Emmett has regrets since he doesn't want to usher in an arms race through time like he helped create the nuclear arms race while working on the Manhattan Project. He sends a note back to himself, two months in the past.
Timeline 2 - Twin Pines Timeline
• 1963: Emmett discovers the note. He and Copernicus are safe in the fireproof garage. The mansion burns down, Emmett receives the insurance (which is officially classified as cause unknown) and the government men come and leave without talking to Emmett, thinking that he is an insurance thief.
• 1960's or 1970's: Doc builds an improved time machine prototype: the temporal field generator Mk II.
• 1967: Jennifer Parker is born.
• 1968: Marty McFly and Douglas Needles are born.
• 1983: Douglas Needles breaks the fuse in Marty McFly's amp while trying to steal it. He demands that Marty get a new one, so Marty heads to the music shop to buy one. The clerk informs him that Emmett Brown has purchased them all, and warns him against going to his garage, as he is known to be a nutcase (due to his secretive work on the Manhattan Project, Emmett's reclusiveness, and the mysterious nature of the fire that burned down his mansion). Marty sneaks into Emmett's garage, getting around the traps that are set to keep intruders out. Emmett arrives, and Marty at first tries to lie about coming there to become his assistant. He then apologizes and admits that he sneaked in to get the box of fuses. Emmett tells Marty to call him Doc, and offers him the job as his assistant for real, since he was impressed with his ingenuity and his honesty.
• 1984: Doc has purchased two DeLoreans, as the stainless steel construction would aid with the dispersal of flux energy, and a box of pinball machine parts. He works on the DeLoreans in his secret lab, that is not even known to Marty.
• 1985: Doc sent the pinball machine parts to terrorists from Libya, disguised as a bomb, as he told them that he would build a nuclear bomb if they stole plutonium for him. He uses the plutonium to power the nuclear reactor that he installed in the DeLorean time machine, in order to generate the 1.21 gigawatts of energy needed to power the flux capacitor. He calls Marty and they meet at the Twin Pines Mall. He sends his dog Einstein one minute into the future, proving that the flux capacitor and the DeLorean time machine were both a success. He plans to head to 2010, but is killed by the Libyan terrorists, who tracked Doc down to the mall. Marty gets in the DeLorean and accidentally travels back to 1955 when he reaches 88 miles per hour, breaking the time barrier.
Timeline 3: Lone Pine Timeline (Einstein's one minute trip into the future didn't alter anything, so it's not included)
*1955: Marty pushes his dad out of the way of his grandfather's car, and is hit instead. Now his mom falls in love with him. He tries to reunite them at the Enchantment Under the Sea dance by telling George to punch him when Marty pretends to assault Lorraine in the car. Instead, he's captured by school bully Biff Tannen's thugs, and locked in a car. Lorraine is assaulted for real, by Biff, and George knocks him out with one punch. Marty is freed from the car, plays guitar for the injured musician, and his existence is made certain when George and Lorraine kiss on the dance floor. The lighting hits the DeLorean at the clock tower (as Marty knew that the lightning would strike, as the Hill Valley Preservation Society in 1985 was trying to restore the clock, which hadn't worked since), and Marty is sent back to 1985.
* 1985: Marty rushes to the mall (which is now known as the Lone Pine Mall, since Marty ran over one of the two pine trees in 1955), only to see Doc get shot, see himself leave to 1955, and see the terrorists crash into a photo stand. He learns that Doc survived as he kept and repaired a note that Marty had given to him in 1955 warning him of his death. Doc drops Marty off at home, and heads to 2015. Marty goes home and sees that things have changed. His dad is now more confident, Biff is no longer a bully to George, and owns his own business, rather than working in a position that he is not qualified for, where he used George to file his reports for him, and his mother Lorraine is happy in her marriage and no longer is an alcoholic. Marty also now has the truck that he has dreamed to own, and his mother is now happy with his relationship with his girlfriend Jennifer.
Timeline 4: Doc in 2015 Timeline
• 2015: Doc goes to 2015, wins an 80s car contest, and wins 10% off a hover conversion by Goldie Wilson III. He goes to the Hill Valley Public Library to surf the internet to discover what is the most valuable commodity in 2015. He then travels back to 1938 to get it.
Timeline 5: Payroll Robbery Timeline
• 1938: Doc uses one of his silver dollar heirlooms to purchase 10 copies of Action Comics #1 (the first issue featuring Superman), then travels to 2015 to sell it.
• 1985: Marty drag races Needles and crashes into a Rolls Royce, injuring his hand and ruining his future, making him in the same situation his dad was in the Lone Pine timeline (in a low paying job where his high school bully pressures him into doing things for them at work).
• 2015: Doc discovers that Marty's son is convinced by Griff Tannen to rob a Hill Valley Payroll Station. Griff and his gang blame it on Marty Jr, and he goes to jail. Then Marty's daughter, Marlene is sentenced to 20 years in prison for trying to break him out (and she then ends up committing suicide). Doc sells one of his comics for 2.5 million dollars. He purchases a hover conversion, converts his nuclear reactor to use a Mr. Fusion nuclear home energy device that runs on trash. He buys a fake identification under the alias Leroy Brown, and uses it to open a bank account to store his other comics. He also purchases bills from different eras in case he finds himself stuck in any era needing funds, goes to a rejuvenation clinic to add 30 years to his life, and puts Einstein in a suspended animation kennel. He then goes back to 1985, with his emergency money and the upgrades to the DeLorean, to pick up Marty so that he can fix his son's future.
Timeline 6: Arrest of Griff Tannen's gang timeline (the timeline went into a ripple effect when Marty and Jennifer were picked up from 1985 - and continued on as if they weren't picked up - so the 2015 to 1985 trip isn't counted as a separate timeline)
• 1985: Doc picks up Marty and Jennifer in 1985 and takes them to 2015
• 2015: Marty poses as his son and stops the robbery. He also gets into a hoverboard chase and causes Griff and his gang to be jailed for crashing into the Courthouse Mall. Jennifer is mistakenly picked up by the Hill Valley police who think that she is the 47 year old Jennifer. Jennifer discovers that Marty hit the Rolls Royce in 1985, and picks up a fax stating that the 47 year old Marty was fired from his job. While Marty and Doc head to the McFly home to pick up Jennifer, 77 year old Biff Tannen steals the DeLorean and hits the time circuits with his cane, heading to the past with a sports statistics book to make his past self rich.
Timeline 7: Jurassic Griff timeline (interestingly, this timeline actually can explain an error in the animated series - when they traveled to 3 million BC and saw the meteor that caused the extinction of the dinosaurs - Biff's interference could theoretically have changed the migration patterns of the dinosaurs - making it a different meteor that killed the dinosaurs, many millions of years later)
• Jurassic era: Biff's cane smack caused the time circuits to malfunction, and he notices that he is over the ocean. He flies towards the land, and sees that it is full of wilderness with no civilization in sight. He also sees that the nuclear reactor is flashing that it is out of fuel. When he gets out to try to find something to put in the Mr. Fusion reactor, a baby raptor takes the bag with the sports statistics book in it. Biff kills the raptor, and puts it in the Mr. Fusion, then works out how to use the time circuits and heads forward to 1955.
Timeline 8: Rich Biff timeline
• 1955: 77 year old Biff gives his 17 year old self the book. He then spends some time reminiscing in the past, and heads back to 2015.
• 2015: Biff suffers pain as he begins to fade out of existence, as he didn't live to be 77 years old in this timeline. Marty, Doc and Jennifer head back to the DeLorean, unaware that the timeline had changed. They then head back to 1985.
Timeline 9: Hell Valley timeline
• 1958: Biff wins his first million in a horserace,
• 1959: Biff continues winning in sporting events, earning the nickname "the luckiest man on Earth"
• 1973: On the way to pick up an award for one of his books, Biff shoots and kills George McFly. He then marries Lorraine, and becomes step-father to Marty and his siblings.
• 1983: Doc Brown is committed to the mental ward at the Hill Valley Hospital. He is then sent to the County Asylum and lobotomized.
• 1985: Doc, Marty, and Jennifer arrive in 1985. Jennifer, unconscious due to the shock of seeing her older self in 2015, is left on her porch swing. Marty and Doc realize that the timeline had changed, discovered that Biff had the sports almanac, and found 77 year old Biff's cane in the DeLorean. They confront Biff and discover that he had given the book to himself in 1955.
Timeline 10: Duplicate time travelers timeline
• 1955: Doc and Marty head back to 1955, and are careful not to let their other selves discover them as there are two of each of them in that time period. Marty manages to get the book back from Biff at the Enchantment Under the Sea dance but is knocked down by his other self when he leaves the school's gym. Marty then uses the hoverboard to take the book back from Biff while Biff is in his car. Marty burns the book, while Doc is in the DeLorean above him. The DeLorean is hit by lightning and sent spinning on its axis up to 88 miles per hour, sending it back to 1885. Simultaneously, the temporal disturbance makes a duplicate DeLorean, sending it forward in time to 2025.
Timeline 11: Mad Dog Tannen kills Doc timeline
*1885: Doc becomes a blacksmith. He hides the DeLorean in a mine, as the parts necessary to fix it won't be invented until the 1940s. He writes a letter to Marty telling him that alive in 1885 and gives his 1955 counterpart instructions to fix the DeLorean with parts available in 1955. Buford "Mad Dog" Tannen tries to get Doc to pay for the horse that threw a shoe. Doc refuses, and Buford tells him to watch his back. Doc volunteers to pick up Clara Clayton at the train station and they fall in love based on their mutual interest in science and Jules Verne. Buford shoots Doc in the back during the festival celebration, and he dies from his wounds two weeks later.
*1955: Marty gets the note from Doc, via a Western Union deliveryman who states that the letter was given to the office 70 years later with instructions to be delivered to a man fitting Marty's description at the exact location and exact time that Marty received it. Marty reads that Doc is alive, and heads to the clock tower where Marty's other self just left 1955 for 1985. He tells Doc that he came back from the future and needs his help. Doc and Marty head to the mine to get the DeLorean, discover Doc's grave, and fix the DeLorean using Doc's instructions. Marty heads back to 1885 to save Doc.
Timeline 12: Marty in 1885 timeline
*1885: Marty arrives in the middle of a chase between a Native American tribe and the US Calvary. He drives the DeLorean into a cave, and pulls an arrow out of it. He's spooked by a bear, and rolls down a hill, hitting his head. He's rescued by his great grandfather, who gives him a hat, so Marty can walk into town without getting heat stroke. At the saloon, Marty knocks a spittoon onto Buford Tannen, and then gets strung up in a noose. Doc arrives and shoots him free with a homemade sniper rifle. Buford tells Doc that he owes him money for the horse, and Marty explains the situation to him. When they go to get the DeLorean, they discover that it has no gas. Since the Mr. Fusion is only for the nuclear reactor, and there is no gasoline in 1885, Doc has to come up with another way to get home. He decides to use a train. In this timeline, Clara isn't picked up at the train station, and her buckboard is about to go over the cliff. However, Doc and Marty see her and Doc rescues her. They fall in love at first sight, and then their love solidifies when they learn of their shared interests. When the festival occurs, Doc keeps facing Buford so that he won't be shot in the back. Buford tries to shoot Doc with his hidden gun, but Marty throws a pie tin at Buford's gun, saving Doc. Buford sets his sights on Marty, who is going by the name Clint Eastwood, instead. The day of the arrival of the train, Marty faces Mad Dog and tries to surrender without a fight. Mad Dog shoots him, and Marty reveals that he used a trick from a Clint Eastwood movie, making a bullet proof vest out of a door from a stove. Marty and Doc steal the train while wearing bandit masks, and Clara jumps the train while it's in motion. It's too late for her to get in the DeLorean, but Doc uses the hoverboard to rescue her from the train. Marty heads back to 1985, but Doc stays behind with Clara.
Timeline 13: Time travel in the 19th century timeline
• 1886: Jules Brown is born to Emmett and Clara Brown.
• 1888: Verne Brown is born.
• 1890: Doc tries unsuccessfully to generate enough electricity for time travel
• 1893: Doc completes the time train, using a frictionless dynamo from the hoverboard to generate multiples of the 1.21 gigawatts needed for time travel. He paid to have 50 yards of track built, and improved his presto logs to burn hotter. The family went to travel to the future, but the train crashed. Doc was going to give up, but Clara told him that she had always wanted to time travel (since she's a woman, she's shunned for her interest in science and would love to be in Emmett's time, whereas Emmett is happy in hers). Doc sees a steam tricycle, and decides to use one of those instead for a time machine. He successfully builds the steam time car, using the time circuits, flux capacitor, and frictionless dynamo from the time train prototype. He has to wear a diving suit to protect himself from the pressure of the timestream, and plans to go to 2015 to pick up everything he needs to get the time train working. He also devises a method for a time parachute which can be used in case the steam time car wouldn't be up to another journey through time. However, the 19th century parts caused a diversion in the timestream, and he was sent forward to 2035 instead. When Doc doesn't show up for days, Clara sends a note through Western Union to reach Marty, addressing it with the note to be delivered when he reaches the highest level of education available before university.
• 1986: Marty receives the note while in class, and visits Doc's lab with Jennifer to try to find something related to time travel they can use to find Doc. They don't find anything, and Jennifer guesses that Doc must have a secret lab as Marty never saw the DeLorean until it was revealed at the Twin Pines Mall. They head to the hall of records, which is being overseen by Goldie Wilson Jr. who is working his way up on his ultimate goal of becoming mayor like his father. They find the secret lab, which is registered under Von Braun. At the secret lab, Marty is looking through Doc's inventions, and flips on the temporal field capacitor Mk II. He then backs away when it starts to hum. Since they didn't find anything there except for a DeLorean without any time travel enhancements, Marty writes a note to Doc telling him the date and place where they are, and that Clara wrote him a note stating that her husband was in trouble. (Marty and Jennifer mention Doc and Clara visiting them in the time train, which would mean that the story in the comic takes place in timeline 17 at the earliest - meaning that in timeline 13 - 16 Doc wouldn't have visited Marty in the time train in 1985)
Timeline 14: Doc in 2035 timeline
• 2035: Doc goes to his secret lab to get his 2015 clothes, and sees the note. Confused since he doesn't think he's in any trouble, he puts the note in his pocket. He then goes to the bank to try to withdraw his comics, but is stopped by the teller who thinks he's a cheap clone, as the scan of his DNA doesn't match the age of "Leroy Brown", as he'd need to be at least in his 90s. The Hill Valley police are called, and Griff Tannen, now an officer (as he'd had a rewrite of his bionic implants done after his arrest) comes to arrest him. Doc escapes and plans to take the steam time car back to 2015, where Doc knows that he'd be able to withdraw what he needs at the bank. Griff corners him before he can reach 88 miles per hour and ends up firing an electric pulse to short out the bionic implants in Doc, but since he doesn't have any, he ends up suffering amnesia. He finds the note in his pocket and takes the steam time car back to 1986, since that is his only clue as to why he is missing his memory.
Timeline 15: Amnesiac Doc timeline:
• 1986: Doc crashes his steam time car and walks to his secret lab. He meets Jennifer and Marty there, but reveals he is suffering amnesia when he doesn't know who they are. Marty, Doc, and Jennifer go to the crash site and see that the car has been towed. They go to the tow service and the man working there won't release the car without a bribe, so they end up climbing the fence to take the car. Needles shows up, and Marty ends up taking the whole tow truck to outrun him, since Needles threatens to smash the steam time car as he is upset that Marty won't be intimidated anymore after backing down during the attempted drag race. Needles runs into a van, and Marty, Doc and Jennifer head to the Lone Pine Mall. Marty intends to travel to the date marked on the time departed dial on the time circuits, but the steam time car is in bad shape and won't survive another trip through time. Doc's memory is slowly coming back, and he reveals the time parachute. Doc dons the diving suit and Marty dons Doc's radiation suit. They activate the included hot air balloon, which rises up high enough that the drop will have them reach 88 miles per hour while in free fall. Since the time circuits, flux capacitor, and frictionless dynamo from the steam time car are attached to the parachute, they successfully travel to 2035.
Sign in to comment in this discussion.
|
Prof_Marcos A.
By the due date assigned, post your response of at least 150-200 words to the Discussion Area. To support your comments, your discussion answers should include specific information from the readings.
By the end of the week, comment on at least two of your classmates’ submissions. Your replies to classmates should be at least a paragraph in length and made with an eye to expand, clarify, defend, and/or refine their thoughts. Consider asking questions to further meaningful conversation. Be clear and concise, referring to specific ideas and words from your classmates’ postings. Participation must be completed by the end of the week to earn credit.
Choose a poem from the assigned readings, except “The Chimney Sweeper,” which was used as an example in this week’s lecture. Post a response of at least 150-200 words, focusing on the elements below.
Identify the key images in the poem, which you believe are vital to understanding it.
Provide a detailed discussion of how those images function in the poem.
Do the images work together to form a coherent pattern?
What ideas or feelings are conveyed by the images?
How do the images contribute to the overall meaning of the poem?
Remember to provide evidence for your claims in the form of quoted passages from the poem. Quotations, paraphrases, and summaries should be cited according to APA rules of style, including in-text and reference citations. Quoted material should not exceed 25% of the document.
Use the APA Citation Helper resource for properly citing resources.
Post directly to the discussion; do not attach a document. Make sure you check spelling and grammar, and use APA style for citations.
Example APA Reference from the eBook
Blake, W. (2013). The chimney sweeper. In X.J Kennedy and D Gioia (Eds.) The Literature Collection: An E-Text [VitalSource digital version] (p. 239). Boston, MA: Pearson Education, Inc.
|
Biomarkers for Alzheimer's disease
Published on April 4, 2013 23 min
Other Talks in the Series: Drug Discovery and Development in the Neurosciences
Other Talks in the Series: Biomarkers
In this talk, I will tell you about biomarkers for Alzheimer's disease.
First, I will recapitulate the key features of the disease, in this picture you see the first patient described with the disorder. Her name was Auguste Deter, and she was a German patient, rather young, suffering from a progressive memory condition. In the next picture you see Alois Alzheimer, the physician who took care of Auguste Deter at the end of her life. He described her symptoms, and he also described the neuropathology that he saw upon autopsy examination.
Here is a picture of what Alois Alzheimer saw in the brain of Auguste Deter. There are three neuropathological changes that he described. 1. Senile plaques, these are dispersed throughout the brain, they are extracellular aggregates of a protein called β-amyloid. 2. Alois Alzheimer also described neurofibrillary tangles, which are intraneuronal protein inclusions. 3. Finally, he described general neuronal loss, and also synaptic loss.
These brain changes start to occur in the medial temporal lobe, then they spread throughout the temporal lobe, up through the parietal cortex, and eventually to the frontal lobe. This correlates with the symptoms of the patient. The first symptoms are often mild memory disturbances, patients may be described as suffering from mild cognitive impairment. Eventually these problems may get so severe that they fulfil dementia criteria, that is when the memory problems are so severe that they affect daily living. As the brain changes spread over the brain, the symptoms get worse. Eventually, behavioral symptoms will occur, when the disease strikes the frontal lobes. The molecular pathology of Alzheimer's disease was described in the 1980s.
|
Reason, Effect, How To Tackle
Spread the love
Antibiotic Resistance: Reason, Effect, How To Tackle
Antimicrobial resistance (AMR) claimed a staggering 12.7 lakh lives across 204 countries in 2019, as per a research published in The Lancet. It’s more than the deaths caused by cancer and malaria. Not just that, an estimated 49.5 lakh deaths that year were linked to this phenomenon. As the term loosely explains, AMR is when microorganisms such as bacteria, viruses, and fungi develop resistance to drugs, developed to kill them. The result: the infections caused by these either become too difficult or impossible to cure. Among the AMR-caused deaths, 70% were due to antibiotic resistance. Not just that, out of the 23 bacteria studied, just 6 were linked to over 35 lakh deaths. So what is antibiotic resistance? How does it develop? And what can we do to prevent it? To seek answers to these questions, Onlymyhealth spoke to Dr Mohit Mathur, Principal Consultant, and Head, Dept of Critical Care Medicine, Max Hospital, Gurugram.
What Is Antibiotic Resistance?
Penicillin, developed in 1928, was the first antibiotic the world saw. Since then, antibiotics have revolutionised the field of medicine and saved countless lives. However, due to “indiscriminate and injudicious use”, several bacteria developed resistance to these drugs, rendering them ineffective, leading to the phenomenon called antibiotic resistance. The issue is compounded by the fact that very few antibiotics are in the pipeline of pharma companies, Dr Mathur said.
How Do Bacteria Develop Resistance To Antibiotics?
Antibiotic resistance is a cause for major concern
(Photo Credit: Unsplash)
Whenever bacteria is exposed to an antibiotic:
• They develop and activate various defense strategies against the drug to survive.
• Their DNA instructs them to make specific proteins that either do not allow the antibiotic into the cell, pump it out of the cell, or destroy the drug.
• It’s not uncommon for the bacteria to employ more than one defense mechanism against the antibiotic.
• Not just that, bacteria have also developed ways to share their resistance mechanisms with other bugs that haven’t even been exposed to the drug.
Antibiotic Resistance: Effect On Health
It is wrong to think that antibiotic resistance wouldn’t affect us, Dr Mathur said. It would just be a matter of time when we would be exposed to this “nightmarish” situation when a loved one admitted to a hospital for a simple infection would find it hard to recover as available drugs might not work against the bug. Also, antibiotics kill the good bacteria in your body that help us with many vital functions of the body.
How To Prevent Antibiotic Resistance?
Antimicrobial resistance, especially antibiotic resistance, is a cause for concern
(Photo Credit: Unsplash)
‘Using antibiotics the right way’ is the key to preventing resistance. Many times antibiotics are prescribed for treating infections. But do you know, most common infections like the common cold, flu, most sore throats, many ear infections, coughs, or bronchitis are caused by viruses, and antibiotics are ineffective against them? Hence, taking antibiotics for these might do you more harm than good. It might also increase your chance of getting an infection later that might not be cured with an antibiotic. Hence, when sick, seek early medical care and take medicines as prescribed by the doctor. Do not self-medicate.
Right Way To Use Antibiotics To Save Yourself & Community From Antibiotic Resistance
Here is what Dr Mathur recommends:
• Take antibiotics as prescribed by a certified doctor.
• If you have concerns regarding antibiotic resistance, communicate that to your doctor.
• When your doctor prescribes a drug, take it as per the prescription and complete the full course.
• Throw away leftover pills and don’t save them for future use.
• Never take antibiotics prescribed for someone else.
Also, take proper care of your hygiene to prevent catching infections in the first place. It will save you from taking drugs, thus preventing antimicrobial resistance
Also read: Antimicrobial Resistance Simplified: Here Are 3 Things You Should Know
How Do Doctors Tackle Antibiotic Resistance?
Antibiotic resistance is a major menace that can put several lives at risk. There are ways we can prevent it from happening. Similarly, doctors too take steps to prevent it. Such steps include monitoring rationale antibiotic prescription, stopping antibiotics as soon as the infection is cured, antibiotic stewardship programs, among others.
(With inputs from Dr Mohit Mathur, Principal Consultant and Head, Dept of Critical Care Medicine, Max Hospital, Gurugram)
Photo Credit: Unsplash
Source link
Related Posts
Leave a Reply
Your email address will not be published.
indian fitness care
|
PTSD Pearls
We often focus on the down-side. There is a reason. According to research, a negativity bias starts showing up in your baby brain. While infants initially pay attention to positive facial expression and tone of voice, this changes with the approach of a first birthday. Brain responses to negative stimuli begin showing a surge in activity in information processing, as if some gagging voice in one’s cranial theater sputters, “Fire!”
People consistently overemphasize negative aspects of an event rather than positives. Survival for our ancestors depended upon being on high alert and we carry a defensive negativity bias forward. We constantly tinker with imagined “what if” scenarios. This ancient survival part of our personality keeps kicking up dust storms. What if _________________? Fill in the blank. Your “what ifs” may be different from mine.
The purpose of “what if-ing” is to preempt disaster from delivering us into Neverland. Remember Peter Pan, leader of the “Lost Boys?” His band of boys were lost from parents, living independently in Neverland. What was Peter’s disaster? Peter looked through a window and saw his parents with a new baby; he assumed his parents did not want him. To make matters worse, in the book version Peter Pan killed the “lost” boys to prevent them from aging!
This drama may represent Scottish author J. M. Barrie’s real-life issues. His early history shows a tragic legacy. When he was 6, his 13-year-old brother died while ice-skating. This brother was his mother’s favorite child. The dear 6-year-old tried, as children often do, to comfort his Mum to no avail. Barrie never grew taller than 5 feet and had a notion that leaving childhood was disastrous.
Whatever your child-speak connotation to Neverland might be, a catch in your throat from feeling “on the outside” of some “window” can linger in your body for a long time. Today we might label such lingering malaise PTSD or post-traumatic stress disorder.
Instead of calling PTSD a “disorder,” I’d label it post-traumatic stress development. When you encounter a developmental phase in your life there is a hope for growth. PTSD is rampant in war times, but I see PTSD as a developmental possibility. We sometimes grow most when we are seriously challenged. However, with a focus primarily on negatives (like disorders and pathology), it can seem like a lengthy search to locate positive outcomes.
This reframing in no way takes away from the reality of PTSD as frequently mind-numbing and a difficult staging in any person’s growth efforts. Calling something developmental implies that eventually one has a strong possibility of progressing beyond the initial trauma. Israeli psychologist Amos Tversky warned, “When you are a pessimist and the bad thing happens, you live it twice.”
Become aware of your negativity searchlights. Rediscover inner lightness in thinking, relating, and overall wellbeing. No rose-colored glasses are needed, but you might smell more roses in your life.
Pearls of Peace (PoP) Quiz:
78. When have you experienced PTSD?
79. How did you grow from that experience?
By Janis Johnston
Leave a comment
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Connecting to %s
%d bloggers like this:
|
The History of the Blood Chit
A “blood chit” is a piece of paper or cloth issued to soldiers and (especially) airmen operating in areas where the local population speaks a language other than the serviceman’s own. The chit usually states, in the local language, that the soldier or pilot is working on their behalf, and to please give him food, water, shelter and\or medical attention, then give him any assistance in getting back to his or her military base. So if an airman was shot down in a strange land, he or she could simply find a local and hand them the chit. The civilian would then (hopefully) take care of the pilot and get him back an an American base. As an incentive for the local, rewards were usually offered for the safe return of the serviceman.
Here’s an example of a chit from the early days of World War II:
This was particular chit was issued to the Flying Tigers, a group of American pilots who volunteered to fly missions against the Japanese in China. This chit says: “[t]his foreign person has come to China to help in the war effort. Soldiers and civilians, one and all, should rescue, protect, and provide him medical care“. Another Flying Tiger chit read: “I am an American airman. My plane is destroyed. I cannot speak your language. I am an enemy of the Japanese. Please give me food and take me to the nearest Allied military post. You will be rewarded.
Chits were later used in Korea, Vietnam and are still used even today. Modern chits include a piece of paper with pleas for help written in many languages, and most chits also include a small amount of local currency.
The most interesting thing about blood chits is their history, as they were invented by none other than… George Washington!
Jean-Pierre Blanchard was a French inventor, known mostly for his work with balloon aircraft. Blanchard’s first flight took off from Paris on March 2, 1784, barely three months after the first ever balloon flight was made by Pilâtre de Rozier and the Marquis d’Arlandes. Although most folks think of the Montgolfier brothers when it comes to “hot air” balloons (many early balloons used hydrogen, not hot air), Blanchard is actually the one that popularized the “sport” all around Europe. To this end, Blanchard moved to London in August of 1784, and by October of that year, he was taking flights in England as well. Blanchard was the first to cross the English Channel in a balloon, which he did on January 7, 1785 with the company of Dr John Jeffries, a Boston doctor… who was also a star witness for the defense in the trial of British soldiers accused in the Boston Massacre… and who were defended by future American president John Adams.
At any rate, Blanchard would later travel to Germany, the Netherlands, Belgium and Poland to demonstrate the new balloon technology. And in January, 1793, he came to Philadelphia to demonstrate the marvelous new technology for President George Washington, with future presidents John Adams, Thomas Jefferson, James Madison and James Monroe also in attendance. He became the first person to take a balloon flight in North America when took off from Philadelphia on January 7, 1793. He landed that same day in Deptford Township, New Jersey.
Because Blanchard spoke no English, and because (for whatever reason) no English speaker accompanied him on his flight, Washington gave Blanchard a letter to hand to anyone he found on the ground to assist him in getting back to Philadelphia. The letter read, in part: “to all citizens of the United States, and others, that in his passage, descent, return, or journeying elsewhere, they oppose no hindrance to the said Mr. Blanchard; and that on the contrary, they receive and aid him with…humility and goodwill“.
Blanchard ended up needing the letter. The farmers in the area fled when they saw a strange object falling gently out of the sky… and a man emerged from it speaking some strange language. It must have been like something out of the X-Files for those poor farmers! Blanchard was eventually able to get a couple of farmers to calm down enough to read the chit, and afterward the farmers did, in fact, assist Blanchard in getting back to Philadelphia.
The first blood chit was something of an isolated incident. They wouldn’t become something issued to airmen on a regular basis until World War I, when members of the British Royal Flying Corps were issued “goolie chits” when flying over India and Mesopotamia. “Goolies” is a British slang term for “testicles”, while “chit” is a slangy word for “note”. The term came into use because in many areas where the British pilots operated, hostile tribesmen would capture the pilots and give them to their wives, who would castrate the pilots and use them as household servants (eeeeek!). Whereas later chits would appeal to the local’s altruistic sense, these early chits were all about reward money offered for the return of the British pilots. Amusingly, the term “goolie chit” is still used by the Royal Air Force today.
Read everything you could ever want to know about blood chits here.
Leave a Reply
Your email address will not be published.
|
Key Relations in Electronic Broadcast Syndicate Daily
Gravity’s Six Most Important Facts!
Gravity is something we rarely think about until we slip on ice or fall down the stairs. Gravity wasn’t even a force to many ancient thinkers—it was simply the natural tendency of items to gravitate toward the center of the Earth, whereas planets were subject to other, unconnected laws.
Of course, we now know that gravity is capable of far more than just causing things to fall. It controls the motion of planets around the Sun, keeps galaxies together, and shapes the structure of the universe as a whole. We also understand that, together with electromagnetism, the weak force, and the strong force, gravity is one of the four fundamental forces of existence.
Einstein’s general theory of relativity, the contemporary theory of gravity, is one of the most successful theories we have. At the same time, we don’t know everything there is to know about gravity, including how it interacts with the other fundamental forces. But there are six important truths regarding gravity that we do know.
1. Gravity is the weakest force we are aware of.
Gravity just attracts; there isn’t a counter-force to push objects apart. While gravity is strong enough to hold galaxies together, it is so weak that you have to fight it every day. When you take up a book, you are defying the gravitational pull of the entire planet.
The electromagnetic force between an electron and a proton within an atom is around one quintillion (that’s a one followed by 30 zeroes) times stronger than the gravitational pull between them. Gravity is so weak that we don’t even know how weak it is.
Read more: What Happened on Black Saturday Holy Week?
2. The terms “gravity” and “weight” are not interchangeable.
Astronauts aboard the International Space Station float, and we casually refer to them as being in zero gravity. That, however, is not the case. An astronaut experiences around 90% of the force of gravity that they would experience on Earth. Astronauts, on the other hand, are weightless since weight refers to the force that the ground (or a chair, or a bed, or whatever) imposes on them on Earth.
Take a bathroom scale into a posh hotel elevator and stand on it while traveling up and down, disregarding any suspicious stares you might get. Even when your weight changes and the elevator accelerates and decelerates, the gravitational pull remains constant.
Astronauts, on the other hand, travel with the space station in orbit. There’s nothing to push them against the spaceship’s side to help them gain weight. General relativity was born from this idea and Einstein’s special theory of relativity.
3. Gravity creates waves that travel at the speed of light.
Gravitational waves are predicted by general relativity. When two stars, white dwarfs, or black holes are locked in mutual orbit, gravitational waves transfer energy away, bringing them closer. In truth, when Earth is around the sun, it emits gravitational waves, but the energy loss is insignificant.
Gravitational waves had been suspected for 40 years, but the Laser Interferometer Gravitational-wave Observatory (LIGO) only confirmed the phenomenon in 2016. A burst of gravitational waves created by the collision of two black holes more than a billion light-years apart was detected by the detectors.
Nothing can travel faster than the speed of light in a vacuum, according to relativity. That also applies to gravity: if something catastrophic happened to the sun, the gravitational influence would arrive at the same time as the sunset light.
facts about gravity
Read more: Know 10 Amazing Facts About Jesus Christ in 2022 on Good Friday!
4. Researchers have been stumped by the tiny behavior of gravity.
Quantum theories, notably the Standard Model, describe the other three fundamental forces of existence at the tiniest scales. Even though academics are working on it, we still don’t have a completely functional quantum theory of gravity.
One line of inquiry is loop quantum gravity, which uses quantum physics techniques to describe the structure of space-time. It suggests that on the tiniest scales, space-time is particle-like, just as matter is made up of particles.
On a flexible, mesh-like structure, the matter would be limited to hopping from one place to another. This enables loop quantum gravity to represent the action of gravity on a scale far smaller than an atom’s nucleus.
String theory is a more well-known concept, in which particles, including gravitons, are thought to represent vibrations of strings coiled up in dimensions too small for tests to reach. At the moment, neither loop quantum gravity nor string theory, nor any other theory, can give testable specifics regarding gravity’s microscopic behavior.
facts about gravity
Read more: Utah’s 20 Most Interesting Facts
5. Gravity might be transported by gravitons, which are massless particles.
Particles interact with one another in the Standard Model via other force-carrying particles. The photon, for example, is the electromagnetic force’s carrier.
Gravitons are the hypothetical particles for quantum gravity, and general relativity gives us some ideas about how they should work. Gravitons, like photons, are most likely massless. Experiments should have revealed something if they had mass—but that doesn’t rule out an extremely little mass.
6. Quantum gravity manifests itself at the shortest length possible.
Gravity is weak, but it becomes stronger as two objects move closer together. It eventually achieves the strength of the other forces at a minuscule distance known as the Planck length, which is many times smaller than an atom’s nucleus.
Quantum gravity’s effects will be powerful enough to quantify there, but it will be far too minuscule to be probed by any experiment. Some theories have been developed that would allow quantum gravity to appear at millimeter scales, however, these effects have yet to be observed.
Others have experimented with employing vibrations in a massive metal bar or collections of atoms stored at ultracold temperatures to intensify quantum gravity effects.
Gravity appears to be catching scientists’ attention at all scales, from the smallest to the greatest. Maybe that’ll give you some comfort the next time you fall and gravity grabs your attention as well.
Leave A Reply
Your email address will not be published.
|
‘How Did Civilization Start?’ (2019)
See the source image
Ruins on Potbelly Hill
I’ll return to this topic later today, when I have more time. Rodney Stark has some intriguing insights into how we ought to view the remains of extinct civilizations.
Anyhow, where did civilization come from? What got it started in the first place?
How Did Civilization Start?
That Potbelly Hill site in Turkey, Gobekli Tepe, is a gold mine–but we don’t know yet how to evaluate the treasure. It’s so far off what was expected, scientists are still trying to wrap their minds around it.
Maybe they ought to read Genesis.
2 comments on “‘How Did Civilization Start?’ (2019)
1. The Flood and the Babel event loom large. Recent DNA studies would indicate that the Americas were populated by a large group of people, before the “American Indians” arrived. The reason this conclusion was reached is that the genetic haplogroups of American Indians didn’t branch off from Asians until relatively recently, which means that the builder of the Central and South American pyramids, etc. were not who we think of as Native Americans.
We know very little about these people, other than the stone structures which were left behind. They built ziggurats, right and left, and in at least some cases sacrificed humans to their gods, but whatever the case, those civilizations were pretty much over and done with by the time the Asian people we think of as being the first Americans arrived.
That’s just one example of how the narrative of history which we were taught as children turns out not to be so accurate. The biblical timeline, combined with DNA analysis provides a completely different perspective from the mainstream historical narrative.
I recently read Dr. Nathaniel Jeanson’s Traced, and found it quite interesting. Dr. Jeanson is a believer in creation who feels that, instead of simply playing defense against the theory of evolution, believing scientists should be making scientific predictions, based upon the biblical timeline. His earlier book, Replacing Darwin, started that ball rolling. The recent discovery of rapid speciation among finches supports his contention that species derive from created kinds quite rapidly, and not through a lengthy process of evolution. This aligns completely with the Bible and shows our Creator’s wisdom, in designing animals to be able to survive in changing conditions.
Leave a Reply
|
The FAA just released new rules for the operation of UAVs, regulating drones overflying people and night flights. But of course these allowances will come with some strict conditions.
Regulations for Unmanned Aerial Vehicles (UAVs) have been long overdue around the world. Most people hear about drones when one (or more) of them flies near aircraft. But professional drone operators have been asking for more rules. Their absence until now made wide use of UAVs for professional reasons very difficult, or in some cases impossible.
Drones Over People – Coming Soon Near [Or Over] You!
Until now rules permitted flying drones over people only if the people involved were part of the operation. Think actors and a film crew, for example. But it wasn’t OK to take any drone and fly over a crowded beach. And in most cases, this still won’t be OK. But if the drone is small enough, it could be (privacy rules non-withstanding).
Drones flying over crowds of people will need something called Remote ID. This will also be a requirement for drones heavier than 0.55 lb (0.25 kg). In simple terms, Remote ID has the role of a transponder. The alternative would be a system that transmits the drone’s location using a 3G/4G phone network. Such systems do exist in other parts of the world, but of course require internet access.
Freight companies have been trialing drone projects with pharmaceutical stores. Here UPS and CVS’ project
Remote ID will make professional use of drones, over people or at night, more practical. This has been a hurdle, for those wishing to use drones for cargo. FedEx, UPS and other companies have been trialing such projects for some time. But until now actual operations were very difficult. Operators could fly only to specific destinations, using specific routes that kept them away from people.
Drones, People And Safety
There were exceptions to the above, and the FAA gave waivers for specific tests. But the new rules should allow drone operations at night, over people, in more parts of the United States. It’s worth pointing out that there are many more rules and conditions for all of this. Training, equipment for the drones and other specific restrictions apply. For instance, new rules state that the propellers of small drones must not be capable of lacerating skin.
FedEx – E-Commerce Boom Drives Air Freight
FedEx is working on a drone project with Walgreens
Also, large drones will face more strict rules, to operate near people. And since it’s really these drones that operators like UPS, FedEx and others want, there is more to come. They will use them for “last mile” operations in their delivery networks, for time-critical items, like medicine. FedEx has been working with Walgreens in such a project for over a year. UPS has partnered with CVS.
In Europe, EASA is also in the process of of regulating drone operations. Here, too, drones operating near people would need to satisfy strict conditions, for size and other features. And as we have seen, there is interest for use of drones in cargo, in “last mile” but also “middle mile” operations.
Cargo Drones – Are They Coming?
Dronamics is working on a very promising “middle mile” drone concept
If all this sounds a bit worrying to you, don’t worry. Never mind drones, aircraft and helicopters can fly over people – and have scarier propellers. Note also that for now at least, cargo drone designs generally aim to replace the min-van used for deliveries. NOT cargo aircraft. But of course as the framework for these operations expands, delivery drones will eventually get bigger
For a more detailed look into the specifics on FAA’s new rules, go here.
Signup to the Mentour Pilot Leadership and Decision making course newsletter!
|
WorldThere are still 3 countries that have not received a dose of...
There are still 3 countries that have not received a dose of Covid-19 vaccine yet
Currently, a total of more than 6 billion doses of Covid-19 vaccine have been administered globally, of which high-income countries have given an average of 124 doses per 100 people, compared with only 4 doses per 100 people in low-income countries. low input.
In terms of volume, nearly 2.18 billion doses of the vaccine, or 40% globally, have been administered in China, followed by India (826.5 million doses) and the United States (386.8 million doses).
In terms of per capita rate, among countries with a population of over 1 million, the United Arab Emirates (UAE) leads with 198 injections per 100 people, with more than 81% of the population having received 2 injections. Uruguay ranked second with 175 noses per 100 people, followed by Israel (171), Cuba (163), Qatar (162) and Portugal (154).
The US started injecting a booster dose of Covid-19 vaccine from September
Meanwhile, the number of Covid-19 cases globally continues to decrease. The total number of global Covid-19 infections is now more than 232 million infections and more than 4.7 million deaths.
This was also the first decrease in more than two months, with the number of new infections falling in almost all regions, with the Middle East down 22% and Southeast Asia down 16%.
In the week from September 13 to 19, the number of deaths was recorded below 60,000, down 7% from the previous week, of which Southeast Asia decreased by 30% and the Western Pacific region decreased by 7%.
Countries that have recorded more Covid-19 infections include the US, India, UK, Turkey and the Philippines. According to WHO, the Delta variant has appeared in 185 countries in all regions.
Delta variant makes the US frontline medical force ‘psychological trauma’
|
Search for Museums
United States
The United States of America , commonly known as the United States or America, is a country mostly located in central North America, between Canada and Mexico. It consists of 50 states, a federal district, five major self-governing territories, and various possessions. At 3.8 million square miles , it is the world's third- or fourth-largest country by total area. With a population of over 328 million, it is the third most populous country in the world. The country's capital is Washington, D.C., and its most populous city is New York City. Paleo-Indians migrated from Siberia to the North American mainland at least 12,000 years ago, and European colonization began in the 16th century. The United States emerged from the thirteen British colonies established along the East Coast. Disputes with Great Britain led to the American Revolutionary War , which established independence. In the late 18th century, the U.S. began vigorously expanding across North America, gradually acquiring new territories, oftentimes conquering and displacing Native Americans, and admitting new states; by 1848, the United States spanned the continent. Slavery was legal in the southern United States until the second half of the 19th century, when the American Civil War led to its abolition. The Spanish–American War and World War I established the U.S. as a world power, a status confirmed by the outcome of World War II. During the Cold War, the United States and the Soviet Union engaged in various proxy wars, but avoided direct military conflict. They also competed in the Space Race, culminating in the 1969 spaceflight that first landed humans on the Moon. The Soviet Union's collapse in 1991 ended the Cold War and left the United States as the world's sole superpower. The United States is a federal republic and a representative democracy with three separate branches of government, including a bicameral legislature. It is a founding member of the United Nations, World Bank, International Monetary Fund, Organization of American States , NATO, and other international organizations. It is a permanent member of the United Nations Security Council. The U.S. ranks high in international measures of economic freedom, government corruption, quality of life, and quality of higher education. Despite income and wealth disparities, the United States continues to rank high in measures of socioeconomic performance. It is one of the most racially and ethnically diverse nations, and its population has been shaped through centuries of immigration. A highly developed country, the United States accounts for approximately a quarter of global gross domestic product and is the world's largest economy by nominal GDP. By value, the United States is the world's largest importer and the second-largest exporter of goods. Although its population is only 4.3% of the world total, it holds 29.4% of the total wealth in the world, the largest share held by any country. Making up more than a third of global military spending, it is the foremost military power in the world, and is a leading political, cultural, and scientific force internationally.
Smithsonian American Art Museum
Washington, D.C.
The Smithsonian American Art Museum is a museum in Washington, D.C., part of the Smithsonian Institution. Together with its branch museum, the Renwick Gallery, SAAM holds one of the world's largest and most inclusive collections of art, from the colonial period to the present, made in the United States. The museum has more than 7,000 artists represented in the collection. Most exhibitions take place in the museum's main building, the old Patent Office Building , while craft-focused exhibitions are shown in the Renwick Gallery. The museum provides electronic resources to schools and the public through its national education program. It maintains seven online research databases with more than 500,000 records, including the Inventories of American Painting and Sculpture that document more than 400,000 artworks in public and private collections worldwide. Since 1951, the museum has maintained a traveling exhibition program; as of 2013, more than 2.5 million visitors have seen the exhibitions.
National Portrait Gallery (United States)
Washington, D.C.
The National Portrait Gallery is a historic art museum between 7th, 9th, F, and G Streets NW in Washington, D.C., in the United States. Founded in 1962 and opened to the public in 1968, it is part of the Smithsonian Institution. Its collections focus on images of famous Americans. The museum is housed in the historic Old Patent Office Building, as is the Smithsonian American Art Museum.
Hirshhorn Museum and Sculpture Garden
Washington, D.C.
Metropolitan Museum of Art
New York City
The Metropolitan Museum of Art of New York City, colloquially "the Met", is the largest art museum in the United States. With 6,479,548 visitors to its three locations in 2019, it was the fourth most visited art museum in the world. Its permanent collection contains over two million works, divided among 17 curatorial departments. The main building at 1000 Fifth Avenue, along the Museum Mile on the eastern edge of Central Park in Manhattan's Upper East Side, is by area one of the world's largest art galleries. A much smaller second location, The Cloisters at Fort Tryon Park in Upper Manhattan, contains an extensive collection of art, architecture, and artifacts from medieval Europe. On March 18, 2016, the museum opened the Met Breuer museum along Madison Avenue on the Upper East Side; it extends the museum's modern and contemporary art program. The permanent collection consists of works of art from classical antiquity and ancient Egypt, paintings, and sculptures from nearly all the European masters, and an extensive collection of American and modern art. The Met maintains extensive holdings of African, Asian, Oceanian, Byzantine, and Islamic art. The museum is home to encyclopedic collections of musical instruments, costumes, and accessories, as well as antique weapons and armor from around the world. Several notable interiors, ranging from 1st-century Rome through modern American design, are installed in its galleries. The Metropolitan Museum of Art was founded in 1870 for the purposes of opening a museum to bring art and art education to the American people. The Fifth Avenue building opened on February 20, 1872, at 681 Fifth Avenue.
National Gallery of Art
Washington, D.C.
The National Gallery of Art, and its attached Sculpture Garden, is a national art museum in Washington, D.C., located on the National Mall, between 3rd and 9th Streets, at Constitution Avenue NW. Open to the public and free of charge, the museum was privately established in 1937 for the American people by a joint resolution of the United States Congress. Andrew W. Mellon donated a substantial art collection and funds for construction. The core collection includes major works of art donated by Paul Mellon, Ailsa Mellon Bruce, Lessing J. Rosenwald, Samuel Henry Kress, Rush Harrison Kress, Peter Arrell Browne Widener, Joseph E. Widener, and Chester Dale. The Gallery's collection of paintings, drawings, prints, photographs, sculpture, medals, and decorative arts traces the development of Western Art from the Middle Ages to the present, including the only painting by Leonardo da Vinci in the Americas and the largest mobile created by Alexander Calder. The Gallery's campus includes the original neoclassical West Building designed by John Russell Pope, which is linked underground to the modern East Building, designed by I. M. Pei, and the 6.1-acre Sculpture Garden. The Gallery often presents temporary special exhibitions spanning the world and the history of art. It is one of the largest museums in North America. For the breadth, scope, and magnitude of its collections, the National Gallery is widely considered to be one of the greatest museums in the United States of America, often ranking alongside the Metropolitan Museum of Art and Museum of Modern Art in New York City, the Art Institute of Chicago in Chicago, Illinois, and the Museum of Fine Arts, Boston in Boston, Massachusetts. Of the top three art museums in the United States by annual visitors, it is the only one that has no admission fee. It ranks 2nd in American museums behind the Met for number of annual visitors and 10th in the world.
Museum of Fine Arts, Boston
The Museum of Fine Arts in Boston, Massachusetts, is the 17th largest art museum in the world, measured by public gallery area. It contains more than 450,000 works of art, making it one of the most comprehensive collections in the Americas. It is home to 8,161 paintings, surpassed among American museums only by the Metropolitan Museum of Art in New York City. With more than 1.2 million visitors a year, it is the 52nd most visited art museum in the world as of 2019. Founded in 1870 in Copley Square, the museum moved to its current Fenway location in 1909. The museum is affiliated with the School of the Museum of Fine Arts at Tufts.
Detroit Institute of Arts
The Detroit Institute of Arts , located in Midtown Detroit, Michigan, has one of the largest and most significant art collections in the United States. With over 100 galleries, it covers 658,000 square feet with a major renovation and expansion project completed in 2007 that added 58,000 square feet . The DIA collection is regarded as among the top six museums in the United States with an encyclopedic collection which spans the globe from ancient Egyptian and European works to contemporary art. Its art collection is valued in billions of dollars, up to $8.1 billion according to a 2014 appraisal. The DIA campus is located in Detroit's Cultural Center Historic District, about two miles north of the downtown area, across from the Detroit Public Library near Wayne State University. The museum building is highly regarded by architects. The original building, designed by Paul Philippe Cret, is flanked by north and south wings with the white marble as the main exterior material for the entire structure. The campus is part of the city's Cultural Center Historic District listed in the National Register of Historic Places. The museum's first painting was donated in 1883 and its collection consists of over 65,000 works. With about 677,500 visitors annually for 2015, the DIA is among the most visited art museums in the world. The Detroit Institute of Arts hosts major art exhibitions; it contains a 1,150-seat theatre designed by architect C. Howard Crane, a 380-seat hall for recitals and lectures, an art reference library, and a conservation services laboratory.
Art Institute of Chicago
The Art Institute of Chicago in Chicago's Grant Park, founded in 1879, is one of the oldest and largest art museums in the United States. Recognized for its curatorial efforts and popularity among visitors, the museum hosts approximately 1.5 million people annually. Its collection, stewarded by 11 curatorial departments, is encyclopedic, and includes iconic works such as Georges Seurat's A Sunday on La Grande Jatte, Pablo Picasso's The Old Guitarist, Edward Hopper's Nighthawks, and Grant Wood's American Gothic. Its permanent collection of nearly 300,000 works of art is augmented by more than 30 special exhibitions mounted yearly that illuminate aspects of the collection and present cutting-edge curatorial and scientific research. As a research institution, the Art Institute also has a conservation and conservation science department, five conservation laboratories, and one of the largest art history and architecture libraries in the country—the Ryerson and Burnham Libraries. The growth of the collection has warranted several additions to the museum's 1893 building, which was constructed for the World's Columbian Exposition. The most recent expansion, the Modern Wing designed by Renzo Piano, opened in 2009 and increased the museum's footprint to nearly one million square feet, making it the second-largest art museum in the United States, after the Metropolitan Museum of Art. The Art Institute is associated with the School of the Art Institute of Chicago, a leading art school, making it one of the few remaining unified arts institutions in the United States.
Philadelphia Museum of Art
The Philadelphia Museum of Art is an art museum originally chartered in 1876 for the Centennial Exposition in Philadelphia. The main museum building was completed in 1928 on Fairmount, a hill located at the northwest end of the Benjamin Franklin Parkway at Eakins Oval. The museum administers collections containing over 240,000 objects including major holdings of European, American and Asian origin. The various classes of artwork include sculpture, paintings, prints, drawings, photographs, armor, and decorative arts.The Philadelphia Museum of Art administers several annexes including the Rodin Museum, also located on the Benjamin Franklin Parkway, and the Ruth and Raymond G. Perelman Building, which is located across the street just north of the main building. The Perelman Building, which opened in 2007, houses more than 150,000 prints, drawings and photographs, along with 30,000 costume and textile pieces, and over 1,000 modern and contemporary design objects including furniture, ceramics and glasswork. The museum also administers the historic colonial-era houses of Mount Pleasant and Cedar Grove, both located in Fairmount Park. The main museum building and its annexes are owned by the City of Philadelphia and administered by a registered nonprofit corporation.Several special exhibitions are held in the museum every year, including touring exhibitions arranged with other museums in the United States and abroad. The attendance figure for the museum was 793,000 in 2017, which ranks it among the top one hundred most-visited art museums in the world. The museum is also one of the largest art museums in the world based on gallery space.
|
Black and white photo of two women standing beside a car with a red cross on the side.
“Not being a man, I wanted to do the next best thing”: Female Gentlemen and the First World War
Vera Brittain worked as a voluntary nurse in France and Malta during the First World War. After the armistice, she went back to university, but by 1920 she wrote that the memories of the war “and its extraordinary aftermath had taken full possession of my warped and floundering mind.”[1] She was, she exclaimed, “Nothing but a piece of wartime wreckage, living on ingloriously in a world that doesn’t want me!”[2] Brittain was one of many British female medical volunteers who nursed or drove ambulances on the Western Front. She and others witnessed the carnage of the war under similar circumstances as male soldiers, and they too suffered psychological damage as a result. Because of the predominance of the shell-shocked soldier in cultural and literary history, very little attention has been paid to the psychological trauma of front-line nurses and ambulance drivers.
Black and white photo of a woman wearing a white head kerchief.
Vera Brittain, around the time of the First World War. (Courtesy Wikimedia)
In 1914, there were two official volunteer organizations that British women could join: the Red Cross as Voluntary Aid Detachments or the elite First Aid Nursing Yeomanry (FANY). Because both the VAD nurses and the FANY ambulance drivers had to fund themselves and were not paid wages, these organizations tended to attract economically privileged women.[3] Though privileged, however, these women were also seen by contemporaries as disrupting gender boundaries. Women in uniform attracted derision as well as fascination, and the volunteers had to prove that they were capable of working in a war zone.
To do so, they held fast to class-appropriate “gentlemanly” concepts of duty, self-control, and honor, which enabled them to continue to function under the pressures of providing medical care to soldiers. Though they attempted to align themselves with their male counterparts, the women and their writings have been analyzed usually through the trope of the plucky and resilient “Rose of No Man’s Land,” a caring and selfless figure tending the wounds of British men.[4] This repeats contemporary depictions of women as somehow untouched and unsullied by the violence around them and positions them as the recorders and observers of male suffering.
The conditions under which the female volunteers experienced the war, however, were not so different from those of male soldiers: “both groups suffered loss of autonomy, performed exhausting work in cramped conditions, underwent bombardment and were continually exposed to death and mutilation.”[5] The FANY and the VADs served under perilous conditions, risking their lives to transport and nurse the wounded and dying. These women understood themselves to be under the same code of moral obligation that determined their brothers’ behavior: they volunteered because they felt it was their duty, and while they were not allowed to fight, they could “do the next best thing,” as VAD Vera Brittain wrote to her parents, even when doing so cost them dearly in terms of mental health.[6]
Female Gentlemen
Women who volunteered were of a similar age and grew up in the Edwardian period. This was a time of transition for women, with the first wave of feminism and the suffrage movement achieving milestone moments in the years before the war. During this period, education for young girls was more similar to that of their male peers than ever before. Secondary and higher education now provided middle and upper-class girls and young women with a rigorous classical education and promoted the values of service, duty, self-control, and honor, as well as physical fitness and team spirit. While the public school education of the time is often provided as an explanation for why so many young men volunteered, the extent to which this played a role in female volunteers’ feelings towards the war and the traumatizing experiences they worked through is often ignored.
Colorful poster featuring three women in white nurse aprons.
A First World War recruitment poster for the Voluntary Aid Detachment. (Courtesy Wikimedia)
Finding that traditional feminine norms now felt inappropriate, these young women crafted gendered identities based on the masculine norms and values from their socialization and education. This code of morals, known as “gentlemanliness,” was set loose from its aristocratic origins throughout the nineteenth century with the rise of the middle classes.[7] Instead, gentlemanliness became something that was not solely dependent on breeding, but could instead be aspired to and followed (through self-help books and novels) by the bourgeois male. Young women determined that if gentlemanliness could be learned by non-aristocratic men, then women, too, could learn it.[8]
By adhering to this code, women could show firstly that their presence near the front was justified. FANY Grace McDougall wrote in her unpublished memoir that:
People used to scoff at the idea of women in the trenches, but these Belgians, soldiers, officers and doctors, know – their smiles are different, they are the smiles of comrades who trusted us, smiles of gratitude for the binding of their wounds, smiles of good-fellowship for the discomforts and dangers we shared. They will not forget nor shall we, that we stood beside their dying and their dead in the battle of the Yser.[9]
For McDougall, the primacy of experience and the shared dangers transcended the gender divide. They were ‘comrades,’ they ‘stood beside them’ and they were marked by a shared knowledge of war.
Secondly, FANYs and VAD nurses used values traditionally associated with men to show their similarity to their male counterparts and to distance themselves from perceptions of traditional femininity. Voluntary nurse Mary Borden wrote to her lover that “I am on night duty tonight – you will say I ought not to do it – but the morale is not all that it might be and I want to be an example to the women that weep and wail.”[10]
Thirdly, women regularly pointed out their self-control in order to emphasize the severity of the situation in which they found themselves. In keeping with the code of gentlemanliness, the struggle to keep control of one’s feelings despite inner turmoil was felt to be of greater merit if one normally acted cool, calm, and detached. Vera Brittain wrote of a situation during a raid where “I knew that I was more frightened than I had ever been in my life, yet all the time a tense, triumphant pride that I was not revealing my fear to the others held me to the semblance of self-control.”[11]
While nurse writers do point to the psychological damage they sustained, especially after the war, the members of the FANY strike a more careful note.[12] Allegiance to the group identity that the FANY fostered, on top of the positive outlook needed to promote resilience, prohibited any kind of blunt admission of trauma. Yet we still find Grace McDougall suffering from unexplained fainting fits and “pain,” while her colleague wrote of her, after the deaths of both her brothers, that “naturally all this trouble has completely unhinged her.”[13] McDougall herself wrote that by 1919, her nerves were shattered.[14] FANY Pat Waddell lost a leg on active service when her ambulance collided with a train and provides the perspective both of witness and of patient. While determinedly upbeat, she describes recurring nightmares and depression after the accident, especially when it became clear that the army had no idea what to do with her and that she would have to pay for her prosthetic leg herself. In Fanny Goes to War, she complains that “My troubles, I am sorry to say, began from then onwards. England seemed quite unprepared for something so unorthodox, and the general impression borne in on me was that I was a complete nuisance.”[15]
In the decade after the war, and with the rise of war books and memoirs, women tried to participate in the discourse on trauma, sacrifice, loss, and futility. But despite Mary Borden choosing this time to “pull out the manuscript of The Forbidden Zone and prepare it for publication, observing that the time appeared right for the public to hear the truth about war,” these women were not included in the ranks of veterans after the Armistice.[16] Brittain’s Testament of Youth was a bestseller in 1933, but she was quickly forgotten until the second feminist wave of the 1970s, while Grace McDougall failed to even find a publisher for her memoirs in the late 1930s.
Black and white photo of a white woman in a dark dress and white apron. The apron has the symbol of the Red Cross on the front.
Violet Jessop in her Voluntary Aid Detachment uniform, likely between 1915 and 1917. (Courtesy Wikimedia)
Belonging to the same class as the young officers who influenced the postwar discourse on shell shock, volunteer nurses and FANYs aligned themselves with these men through their portrayal of their experiences. This experience was, however, divided by class, both in the way shell shock was perceived, as well as in the way veterans wrote (or didn’t write) about war experiences. Shell shock was given different terms according to the class and rank of the sufferer. While ranks were presumed to be more physical in their expression of trauma (shaking, twitching), officers tended (it was assumed) to suffer more mentally, through nightmares, sleeplessness, nervousness, and hallucinations. The female gentlemen’s expression of trauma was meant to show the similarities between men and women (primacy of experience, rather than gender). By doing this, however, they also distanced themselves from other women who had war experience, but who were not of the same class.
Ultimately, while women who suffered mental breakdowns as a result of their war service were initially included in the ranks of shell-shocked veterans after the armistice, the rise of the “soldier’s narrative” came to dominate the discussion surrounding war trauma, leading to an exclusion of the women who went to war, which continues today.
As I was writing this article, the news regarding the Russia/Ukraine situation was growing ever more serious. Now, writing the last sentences days after the Russian invasion of Ukraine, we are again facing a protracted and brutal war in Europe. At this point, it is, of course, difficult to foresee how the events will progress. But as volunteers rush to Ukraine’s borders, we must be aware of the trauma they will bring back home with them. With reports of civilians being targeted by Russian forces with thermobaric weapons and cluster bombs, the situation in Ukraine could become indescribably awful. It can only be hoped that we, who are witnessing from afar, will listen and give support to those who are there.
1. Vera Brittain, Testament of Youth: An Autobiographical Study of the Years 1900–1925 (Weidenfeld & Nicolson, 2009), 315.
2. Brittain, Testament. 425.
3. VADs received pay and uniform allowances later in the war.
4. Lyn Macdonald, The Roses of No Man’s Land: Nurses on the Western Front (Michael Joseph, 1980).
5. Tracey Loughran, “A Crisis of Masculinity? Re-Writing the History of Shell-Shock and Gender in First World War Britain,” History Compass 11, no. 9 (2013): 733.
6. Brittain, Testament, 179.
7. Melissa Schaub, Middlebrow Feminism in Classic British Detective Fiction: The Female Gentleman (Palgrave Macmillan, 2013) 3.
8. Schaub, Middlebrow Feminism, 9.
9. Grace McDougall, Five Years with the Allies (n.Pub: 1920), 283.
10. Jane Conway, Mary Borden: A Woman of Two Wars (Munday Books: 2010), 76.
11. Brittain, Testament, 362.
12. It is worth remembering that the FANY still exist and were active in later conflicts. This may also have a good deal of influence on how freely members felt they could speak about their experiences.
13. Janet Lee, War Girls: The First Aid Nursing Yeomanry in the First World War (Manchester University Press: 2005), 123.
14. Lee, War Girls, 241.
15. Pat Beauchamp Washington (nee Waddell), Fanny goes to War (John Murrey: 1919), 219.
16. Conway, Mary Borden, 149; Janet S.K. Watson, Fighting Different Wars: Experience, Memory and the First World War in Britain (Cambridge University Press, 2004) 261.
About the Author
Share your Thoughts
|
Results {#results}
An intro to R chunks
One of the most useful parts of RMarkdown is the ability to weave or 'knit' text (as we've seen in the previous three chapters) together with the code that produces tables and graphics for your final document. This has various advantages such as:
To 'knit' such text and code together, code for particular graphs or tables should first be inserted into the text in 'chunks'. These chunks are opened with three backticks and closed in a new line with another three backticks. The code that produces the desired output is included between these lines, which can include comments etc. A key part of these chunks are the chunk parameters, which are included in braces immediately following the first set of backticks. The first parameter indicates the programming language. The second parameter, which is optional and should be separated from the first parameter only by a space, is a chunk label. It is important that this chunk label includes no spaces and is unique to this chunk. Then, separated by commas, are any additional parameters included. In the figure below, two examples are included: whether or not the code itself should be shown (echo) and whether or not the code should be evaluated or run (eval). Other parameters that we will see later include figure width, captions, etc.^[More information is available at]
In the code chunk shown in Figure \@ref(fig:chunk-parts), we can see that it is loading a package library. Functions and objects loaded or created in earlier chunks are cached by default and thus held on to for use in later chunks. It is therefore quite common to have a chunk early on in your chapter (or even your whole dissertation) that loads a number of the packages you need later on. As an example, below is a short code chunk that loads a set of R packages that we are going to rely on for the rest of this chapter.
# Load packages
When you click the Knit button above in RStudio a document will be generated that includes both content as well as the output of any embedded R code chunks within the document. If you need a graphic or tabular material to be part of the text, you can just put it inline. If you need it to appear in the list of figures or tables, it should be placed in a code chunk.
In the remainder of this chapter, we will see how to use code chunks to include figures, load and summarise data, and present results from your analysis.
Including external figures
First, we will treat how to include figures in RMarkdown in more detail. If your thesis has a lot of figures, RMarkdown might behave better for you than your usual word processor, which can have a tendency to . One perk is that it will automatically number the figures accordingly in each chapter. You'll also be able to create a label for each figure, add a caption, and then reference the figure in a way similar to what we saw with tables earlier. If you label your figures, you can move the figures around and RMarkdown will automatically adjust the numbering for you. No need for you to remember! So that you don't have to get too far into \LaTeX\ to do this, a couple R functions have been created for you to assist. You'll see their use below.
Numbering and labelling figures
You don't need to number figures in RMarkdown; it'll do it automatically. And captioning a figure is awfully easy too. In the R chunk below, we will load in a picture that is stored as iheid.png in our figures directory. The include_graphics() function is from the {knitr} package, that does most of the heavy lifting here. We'll label the chunk 'iheidlogo' so that we can refer back to it later, and give the figure the caption "IHEID logo". You will see that here you do not need to include the parameter echo=FALSE, as the code including the figure is hidden by default.
include_graphics(path = "figures/iheid.png")
Referencing figures
Referencing figures in the text should be done with a little reference to the chunk label so that it will always refer to the right figure number, even if you add additional figures and plots before it. To reference the IHEID logo use a backslash, at-symbol, and then in parentheses fig:chunk-label, like so \@ref(fig:iheidlogo). Usually some descriptor like "Figure", "Fig.", "Illustration" or other is added before this reference, so that it reads something like Figure \@ref(fig:iheidlogo). Note that the reference is hyperlinked in the resulting PDF, so that you can click on it to take you to the page where the original figure is printed.
Resizing figures
It is common to resize external image files so that they fit the format of the text. The most common way to do this was already demonstrated in the code chunk for Figure \@ref(fig:chunk-parts) above. There we used the parameter out.width="\\textwidth" to, in this case, shrink the image to the width of the text, but this same parameter specification would also expand an image to fit the width of the text where possible.
Another option is the out.extra chunk option. This can be used to shrink or expand an image loaded from a file more specifically by specifying "scale= ". Here we use the graph stored in the "subdivision.pdf" file, again found in the figures subdirectory. The output can be found in Fig. \@ref(fig:subd).
We can also use the out.extra chunk option to enlarge figures, and even to rotate them any number of degrees around its axis. In Figure \@ref(fig:subd2), we see an example where Figure \@ref(fig:subd) has been enlarged and flipped upside down.
If you look closely at the chunk options, you will also see that two different captions have been provided. The fig.scap is a short caption that overrides the main caption, fig.cap, in the table of contents. This can be very useful where, for example, you need to describe the figure in a caption over several lines, details that do not need to be presented in the table of contents.
Placing figures
One thing that may be annoying is the way RMarkdown handles "floats" like tables and figures (it's really \LaTeX's fault). \LaTeX\ will try to find the best place to put your object based on the text around it and, until you're really, truly done writing, it is best to just leave it where it lies. There are some optional arguments specified in the options parameter of the label function. If you need to shift your figure around, it might be good to look here (you can click on the word 'here') on tweaking the options argument.
Spacing out your chunks between paragraphs can help, as it can give \LaTeX\ more options to find a suitable home for the figure or table, as \LaTeX\ would otherwise try and keep all the text together, saving the image for later. A last trick is to write \clearpage directly in your RMarkdown document. This gives \LaTeX\ a chance to catch up with all the 'floats' it has accumulated, and starts a new page.
Loading and exploring data
Sometimes it is not an existing image that must be imported, but instead you wish to create a table or plot of some data that you have imported. In this section, we're going to very quickly cover how to import internal and external data, how to manipulate and summarise the data, create plots from that data, and tabulate inferential results from that data.
Importing data {#import-data}
In some cases, the data you need might be available already in an R package. An example below is a very short code chunk that summarises a dataset that is built into R. Here it is particularly easy, as we do not even need to load the data (it is loaded by default).
Othertimes you may need to load the data first before summarising it, with the function data(). There are an increasing number of data packages for R available, including several on a range of international and development topics.
The other option is to import data that resides in a file outside of R. Included in this template is a file called flights.csv. This file includes a subset of the larger dataset of information about all flights that departed from Seattle and Portland in 2014.^[More information about this dataset and its R package is available at] This subset includes only Portland flights and only rows that were complete with no missing values. Merges were also done with the airports and airlines data sets in the pnwflights14 package to get more descriptive airport and airline names. We can load in this data set using the following commands:
# flights.csv is in the data directory
flights <- read.csv("data/flights.csv")
The data is now stored in the data frame called flights in the cached environment for this RMarkdown document in R. To get a better feel for the variables included in this dataset we can use a variety of functions. Here we can see the dimensions (rows by columns) and also the names of the columns.
Another good idea is to take a look at the dataset in table form. With this dataset having more than 20,000 rows, we won't explicitly show the results of the command here, so we'll use the eval=FALSE chunk option to make sure the following is not run when you 'knit' the document. Still, you can press the green play button at the right of the chunk to run the chunk on demand, bringing up a new tab showing the data.
Manipulating and summarising data
While not required, it is highly recommended you use the dplyr package to manipulate and summarize your data set as needed. It uses a syntax that is easy to understand using chaining or 'pipe' operations (%>%). Below I've created a few examples of using dplyr to get information about the Portland flights in 2014. The example we show here does the following:
flights2 <- flights %>%
select(carrier_name, arr_delay)
max_delays <- flights2 %>%
group_by(carrier_name) %>%
summarize(max_arr_delay = max(arr_delay, na.rm = TRUE))
A useful function in the knitr package for making nice tables in RMarkdown is called kable.
It is much easier to use than manually entering values into a table by copying and pasting values into Excel or \LaTeX. This again goes to show how nice reproducible documents can be! The chunk option results="asis" makes sure the table is produced, not the code to create the table. Tables created with the kable() function (in {knitr}) can be extended in many useful (and pretty) ways with the recommended {kableExtra} package.
col.names = c("Airline", "Max Arrival Delay"),
caption = "Maximum Delays by Airline",
caption.short = "Max Delays by Airline",
longtable = TRUE,
booktabs = TRUE
Note that instead of adding the caption details in the chunk options, we will be adding this in the kable() function, which then passes this on up. The caption.short argument is used to include a shorter title to appear in the List of Tables. The last two options make Table \@ref(tab:maxdelays) a little easier-to-read.^[Note that we can create references/links to tables using a very similar syntax here to that with figures above. We can preface the reference with "Table" or "Tab." or so, and then create the reference with the format \@ref(tab:chunk-label).]
We can further look into the properties of the largest value here for Alaska Airlines Inc. To do so, we can isolate the row corresponding to the arrival delay of 70 minutes for Alaskan in our original flights dataset. We see that the flight occurred on January 1st and departed a little after 1:30 am on its way to Anchorage.
flights %>%
arr_delay == 70,
carrier_name == "Alaska Airlines Inc."
) %>%
month, day, carrier, dest_name, hour,
minute, carrier_name, arr_delay
Creating plots
Once data has been loaded or imported and manipulated or filtered as required, a common task is to visualise some key dimensions of the data to inform the reader. Here the package {ggplot2} plays nicely with {dplyr} and other {tidyverse} packages. {ggplot2} produces beautiful, high-quality academic visuals, and has been extended with a huge range of add-ons for a very broad variety of visualisation styles no matter what kind of data you have.
We're going to continue playing with the flights dataset from Chapter \@ref(import-data). First, let us show how we can visualize the arrival delay of all departing flights from Portland on March 3rd against time of departure. Note that once you open the plotting function with ggplot(), additional elements are chained not with the pipe operator %>% but +. Considerably more help than I can offer here on how to use ggplot() can be found online.
flights %>%
dplyr::filter(month == 3, day == 3) %>%
ggplot(aes(x = dep_time, y = arr_delay)) +
Next Figure \@ref(fig:delaysboxplot) presents a bar graph with the mean flight departure delays by airline from Portland for 2014. A table linking these carrier codes to airline names is available at
mean_delay_by_carrier <- flights %>%
group_by(carrier) %>%
summarize(mean_dep_delay = mean(dep_delay))
ggplot(mean_delay_by_carrier, aes(x = carrier, y = mean_dep_delay)) +
geom_bar(position = "identity", stat = "identity",
fill = iheiddown::iheid_palette("IHEID", 1)) +
You don't have to use {ggplot2} though. For example, here is a way to use the base R graphics package to produce a plot using the built-in pressure dataset:
Tabulating inferential results
Another common task researchers have is the presentation of results obtained from applying various statistical methods to their data. Since R makes available a very broad range of statistical methods, and all too often these output objects in different structures and formats, there is unfortunately no single package that reliably and prettily prints results. Still, I can offer a few suggestions here that cover as much as possible, in addition to {kable} and {kableExtra} mentioned above.
I (James Hollway) would welcome any feedback on any other packages you find useful (more are being released all the time), and which of these worked for your purposes.
Tables from external data
In addition to the tables that can be automatically generated from data in R, you can also create tables directly using pandoc. This might be useful if you don't have values specifically stored in R, but you'd like to display them in table form.
Below is an example.
Pay careful attention to the alignment in the table and hyphens to create the rows and columns. More information is available at
Factors Correlation between Parents & Child Inherited
Education -0.49 Yes
Socio-Economic Status 0.28 Slight
Income 0.08 No
Family Size 0.18 Slight
Occupational Prestige 0.21 Slight
Table: (#tab:inher) Correlation of Inheritance Factors for Parents and Child
The addition of the (\#tab:inher) option to the end of the table caption allows us to then make a reference to Table \@ref(tab:label). Note that this reference could appear anywhere throughout the document after the table has appeared.
Try the iheiddown package in your browser
|
You asked: At what age does a baby hold its head up?
Everything that happens with head lifting between birth and 3 or 4 months of age is a warm-up for the main event: the major milestone of your baby having full control of their head. By 6 months, most babies have gained enough strength in their neck and upper body to hold their head up with minimal effort.
By the end of baby’s first month of life, your child may be able to lift his or her head slightly when placed on their tummy. By 2 months old, baby head control increases, and baby can hold his or her head at a 45-degree angle. … And by 6 months old, you should see your child have complete control of their head.
Can an 8 week old baby hold its head up?
From then on, your baby will gradually be able to raise his head for longer and longer periods of time.” By 8 weeks, some babies can raise their head while lying on their back or hold their head up (maybe a bit wobbily) when you carry them on your shoulder.
IT IS INTERESTING: You asked: How many naps does a 4 month old take?
How well should a 3 month old hold his head up?
Month 2: She may be able to lift her head 45 degrees. Month 3: Most babies can lift their heads 45 degrees by leaning on their forearms. Month 4: Most babies can make it to 90 degrees pushing up on their hands and can also hold their heads level.
How can I improve my baby’s head control?
To help her develop head control when lying face up, take her upper arms and pull her up gently until her head hangs back a little, then lay her down again. CAUTION:Do not pull the child up like this if her head hangs back. As you begin to lift her, watch to see if her neck muscles tighten. If not, do not pull her up.
What can a 2 month old see?
Second Month Baby Milestones: The Senses
How long should tummy time be at 2 months?
Try to keep your baby belly-down for three to five minutes, two to three times a day. As your baby begins enjoying tummy time, work up to longer and more frequent sessions throughout the day. Never put your baby to sleep on his stomach.
How can I strengthen my baby’s neck?
Lie your baby on his stomach on a soft surface on the floor. This will teach your baby how to play facedown and he will soon be able to lift his head from the floor. To help him you can take his favourite toy or a noisy toy and encourage him to look up at it. This will help to strengthen his neck and back muscles.
IT IS INTERESTING: Can you use a playpen instead of a crib?
What are the milestones for a 2 month old baby?
2-Month-Old Milestones
• Baby’s getting stronger, perhaps lifting his shoulders during tummy time and his head while in a seated position. …
• His legs are straightening out, and his kicks are stronger.
• Baby’s movements might start to look less jerky and more fluid. …
• Baby’s becoming more aware and playful with his hands.
When should you start tummy time?
What milestones should a 3 month old be doing?
Milestones at 3 Months
• Raises head and chest when lying on stomach.
• Supports upper body with arms when lying on stomach.
• Opens and shuts hands.
• Brings hand to mouth.
• Takes swipes at dangling objects with hands.
What happens if you don’t support a baby’s neck?
What should a 3 month old baby know?
At 3 months, your baby may:
• raise their head and chest when lying on their belly.
• open and close their hands.
• hold their upper body up on their arms when on their belly.
• kick their legs when lying down.
• try to bat at objects that are dangling in front of them.
IT IS INTERESTING: When should a baby child first go to the dentist?
When can babies drink water?
Is head lag normal at 3 months?
Infant head lag is observed when the head seems to flop around or lags posteriorly behind the trunk. Several articles have maintained that head lag should be absent by age 3 to 4 months.
How do you know if baby has head control?
If you carry your baby in a sling, make sure his face is visible since he can’t yet move his head to breathe easily. You’ll notice a definite improvement in head control by this time. Your baby will be able to raise his head to 45 degrees while on his tummy and keep it up steadily.
Your midwife
|
Nova Sciencenow
Season 3, Episode 5
Season 3, Episode 5 of 6
"Leeches" -- Leeches, those innocent bloodsuckers, have been bad-mouthed to the point that they've become synonymous with obnoxious freeloaders. Even host Neil deGrasse Tyson is creeped out while wading through leech-infested waters with scientist Mark Siddall, who runs the leech lab at the American Museum of Natural History. Siddall notes that leeches are far less dangerous than mosquitoes and ticks as disease spreaders. They've recently made something of a comeback, and are today used when reattached fingers and toes become engorged with excess blood that must be drained off. Leeches are hermaphrodites and exist in countless species and ecological niches throughout nature. You'll gain new respect for these fascinating little creatures and never use their name in vain again. "SETI" -- In 1960, a curious astronomer named Frank Drake aimed a radio telescope at a couple of nearby stars and started listening. More than 40 years later, we're still listening, and SETI - the search for extraterrestrial intelligence - has just expanded big-time to begin the systematic survey of millions of star systems for signs of advanced civilizations. NOVA scienceNOW reports on this impressive new effort, called the Allen Telescope Array. The project is underwritten primarily by billionaire philanthropist Paul G. Allen and will eventually comprise 350 giant dish antennas, all working in unison to answer the question: Are we alone? "Stem Cells" -- Researchers around the world are touting a possible new way of creating embryonic-like stem cells - without the embryo. Japanese researchers were the first to discover a way to "turn back the clock" on adult skin cells to create what look like embryonic stem cells - special cells normally found in a growing embryo that have the ability to become any type of cell in the body. Building on the Japanese discovery, U.S. researchers have since been creating these stem cells from human skin cells, with the hopes of possibly using these cells to understand diseases like diabetes, Alzheimer's and Parkinson's. Though the new method offers a potential alternative to the ethically charged work of using human embryos to isolate these important stem cells, the technique still has a number of obstacles to overcome and has scientists warning this is certainly not the end of the debate. "Edith Widder" -- Go for a deep-sea dive with a scientist who is seeing things never before recorded on the ocean floor. Edie Widder is a specialist in marine bioluminescence, the biochemical emission of light by ocean animals that can light up the murky depths to an astonishing degree. Widder is doing some lighting of her own with an innovative camera system called the "Eye in the Sea," which uses a wavelength of light invisible to sea creatures. On its first test, the "Eye" recorded a squid unknown to science. Widder's research has won her a MacArthur "genius" grant, which will help support her work at the Ocean Research and Conservation Association, of which she is a co-founder.
Previously Aired
9 p.m.
2 a.m.
10 p.m.
3 a.m.
The University of Arizona
|
How do I change Python path in Linux?
How do I change the default Python path in Linux?
Setting Path at Unix/Linux
1. In the csh shell − type setenv PATH “$PATH:/usr/local/bin/python3” and press Enter.
2. In the bash shell (Linux) − type export PYTHONPATH=/usr/local/bin/python3. 4 and press Enter.
3. In the sh or ksh shell − type PATH = “$PATH:/usr/local/bin/python3” and press Enter.
How do I change Python path?
Path will be set for executing Python programs.
1. Right click on My Computer and click on properties.
2. Click on Advanced System settings.
3. Click on Environment Variable tab.
4. Click on new tab of user variables.
5. Write path in variable name.
6. Copy the path of Python folder.
7. Paste path of Python in variable value.
Where is my Python path Linux?
The following steps show how to perform this task:
1. In a new cell, type import os and press Enter.
2. Type os. environ[‘PYTHONPATH’]. split(os. pathsep) and press Enter. When you have a PYTHONPATH environment variable defined, you see a list of paths, as shown in the figure below.
How do I change the path of a Python executable?
Add Python to the Windows Path
3. In the System variable window, find the Path variable and click Edit:
INTERESTING: You asked: How do I run a binary file in Ubuntu?
How do I make Python 3.7 default in Linux?
Worked well for me.
1. sudo apt-install python3.7 Install the latest version of python you want.
2. cd /usr/bin Enter the root directory where python is installed.
3. sudo unlink python or sudo unlink python3 . …
4. sudo ln -sv /usr/bin/python3.7 python Link the new downloaded python version.
How do I change Python version in terminal?
When you type python in terminal, press tab before you press enter to see what you have available. You’ll see the symlinks (like shortcuts) to the different versions of Python that you have already.
Why do we set path in Python?
Adding Python to PATH makes it possible for you to run (use) Python from your command prompt (also known as command-line or cmd). This lets you access the Python shell from your command prompt. In simpler terms, you can run your code from the Python shell by just typing “python” in the command prompt, as shown below.
How do I get pip on Linux?
Installing pip for Python 3
1. Start by updating the package list using the following command: sudo apt update.
2. Use the following command to install pip for Python 3: sudo apt install python3-pip. …
3. Once the installation is complete, verify the installation by checking the pip version: pip3 –version.
How define path in Linux?
1. Change to your home directory. cd $HOME.
2. Open the . bashrc file.
INTERESTING: How do I move a file from one directory to another in Linux?
How do I change Python version in Ubuntu?
Switch Python Version on Ubuntu & Debian
1. Create a symlink from /usr/bin/python2. …
2. Change the symlink link to /usr/bin/python3. …
3. Repeat step 2 to add more Python version to group, which is already installed on your system.
4. At this point, You have added two python binary versions to the group name “python”. …
5. That’s it.
How do you add to a Python path?
Type open . bash_profile. In the text file that pops up, add this line at the end: export PYTHONPATH=$PYTHONPATH:foo/bar. Save the file, restart the Terminal, and you’re done.
How do I change Python version?
For Windows:
1. Advanced System Settings > Advance (tab) . On bottom you’ll find ‘Environment Variables’
2. Double-click on the Path . You’ll see path to one of the python installations, change that to path of your desired version.
|
The Covid-19 pandemic has driven the price of gas down dramatically. But that doesn’t mean driving doesn’t have an impact on the environment. Driving economically – to reduce your fuel bill and save the planet – starts with the driver. It doesn’t matter if you are driving an econobox; drive it badly and you’ll end up with poor fuel economy.
Keep reading to find a few tips and tricks to keep your vehicle sipping fuel. Doubt these will work? Just try them out on your car or bike.
Tips and tricks for maximum fuel economy
Check tire pressures
Check tire pressures (including the spare) at every second fill-up or at least once a month. Underinflated tires increase rolling resistance which hurts fuel economy. Properly pumped up tires can improve gas mileage by as much as 5%.
No extra weight
Empty the trunk of any unnecessary items. Carrying unnecessary weight makes the engine work harder and reduces fuel economy. Even roof racks add to the load and aerodynamic drag. Remove anything you don’t need and watch fuel consumption improve immediately.
Highest gear may not be best
It is a misconception that driving in the highest gear is always best. If the car is driving too slowly, the engine will lug trying to accelerate in a very high gear. This means the engine is pumping in as much fuel as it can even for small acceleration inputs. This is much less of a problem in modern automatic cars, but can occur if you are using the manual shifting mode or driving a manual transmission.
Don’t sit idling
It is commonly said that idling doesn’t waste a lot of gas, especially in modern engines. That is partly true – but what is truer is that fuel is burning away and you aren’t getting anywhere. You can undo a lot of fuel efficient driving idling for even 10 minutes.
The right octane
Cheaper gas is key to a smaller fuel bill right? Wrong! Turbocharged and performance engines run higher compression ratios that require higher octane gas (89, 91 or more). The cheapest grades of gas can cause uncontrolled combustion in the engine – hurting fuel economy and causing engine wear.
Look ahead
Be mindful of traffic around you and anticipate acceleration and braking. The smoother your inputs the less fuel is wasted and lesser is the CO2 released into the atmosphere. The MTO calls this defensive driving.
Don’t drag pedals
Resting the left foot on the brake pedal in an automatic car or on the clutch in a manual can cause imperceptible amounts of drag. Not only does this wear down the brakes (and the clutch) it affects fuel economy too.
Change the air filter
Follow the manufacturer’s recommendations for replacing the air filter periodically. If airflow is constricted it forces the ECU to pump in a lot more fuel to compensate for reduced oxygen. If driving in dusty conditions, change the filter more frequently.
Car Rental Scarborough
Making the smart eco-friendly rental choice just became a whole lot easier with On Demand Car. Choose from a wide selection of fuel efficient modern cars. Our fleet is regularly serviced to ensure reliable performance.
|
Differences Between SPI EEPROMs And SPI Flash Memories?
In embedded systems, a memory device is a physical device that is able to store data that can be used to communicate or perform a certain function. Memory devices can be interfaced through multiple different serial protocols, including SPI, or Serial Peripheral Interface.
There are multiple different types of SPI memory devices of micron technology inc used in embedded systems, including Flash memory and EEPROMs. In this article, we’ll provide a background on their relationship and a comparison between the two.
Differences Between Flash Memory and EEPROM
SPI Flash memory and EEPROMs are both considered to be a nonvolatile memory. Nonvolatile memory means the device is capable of retaining data without the need for constant power, allowing devices to save information even when turned off.
They are both electronically writable and erasable memory and are microcontroller-based applications, which means they are used either on or off-chip to store information.
While Flash memory and EEPROM devices are both able to store information used in embedded devices, their architecture, and operations for reading, writing, and erasing data slightly differ.
EEPROM, which stands for Electrically Erasable Programmable Read-Only Memory,
is a type of memory where data is read, written, and erased at the byte level. Flash memory, on the other hand, which is a type of EEPROM, is architecturally arranged in blocks where data is erased at the block level and can be read or written at the byte level.
|
Skip to Main Content
Parkinson's disease
Overview of Parkinson's disease
Parkinson’s disease is a complex movement disorder that occurs when nerve cells in the brain start to die or no longer function. Loss of these nerve cells causes a drop in circulating dopamine, a neurotransmitter. These types of chemicals enable nerve cells to communicate.
Because dopamine is necessary for nerve cells to communicate normal movement, reduced levels of it in people with Parkinson’s cause movement problems, such as hand tremors. Other non-movement problems can also be caused by Parkinson’s, such as sleep disorders, digestive problems, and cognitive difficulties.
Parkinson’s disease is chronic and progressive. It mainly affects people older than 60 but can begin much earlier in life.
Thankfully, the neurological specialists at Dignity Health are here to help you manage your Parkinson’s disease in NV, CA, or AZ at a location near you.
|
Print This Page
Fly Parasite
Common Name: Fly Parasite
Scientific Name: Order Hymenoptera, family Pteromalidae, Muscidifurax spp. and Spalangia spp.
Size: Adult--approximately 1/8"
Identification: A small black wasp.
Biology and life cycle: This wasp deposits its eggs in the larvae of flies or soon after the fly larva has gone into the pupa stage. The wasp egg soon hatches, and the wasp larvae feed on the developing fly and destroy it. After the larva reaches maturity, it then pupates and soon emerges from the dead fly pupa as an adult to start the generation over. One generation every three weeks. Complete metamorphosis.
Habitat: Wherever flies are attracted to moist, decaying organic material such as rotting vegetable waste, manure, or dead animals.
Feeding habits: Larvae feed on developing flies in the larva and soft pupa stages. Adults draw fluid from fly pupae.
Economic importance: Controlling flies and keeping them from becoming a big nuisance.
Natural control: They serve as their own control, as they reduce the population of their host.
Organic control: None needed.
Insight: These parasitic wasps have biological radar for finding fly pupae. They can be your best friend if you operate a dairy, feedlot, or stable or if you simply maintain a compost pile. If released properly, they can completely eliminate the need for chemical fly control--and at a lower cost. Here are instructions for an application of fly parasites.
The parasites will be shipped in fly pupae with wood shavings to insulate the pupae against damage. Place the shipment in a warm area out of direct sunlight until you observe hatching--approximately two to ten days, depending on the temperature and the stage of wasp's development at the time of shipment. In the warmer days of summer, it is not unusual for the parasites to be hatching aggressively upon arrival. In this case, they should be released shortly after you receive them.
Scatter a small amount of the fly pupae in the problem areas. Apply some around watering and feeding receptacles, taking care that they are out of the way of the paths where your animals routinely walk. Use the remaining parasites around any damp, cool spots that make good breeding areas for fly populations. Make scheduled follow-up applications.
Fly parasites seek out fly pupae and lay thier eggs in fly pupae as part of thier own reproductive cycle. The fly parasite larvae consumes the pest fly's larvae. The adult fly parasite emerges and will repeat the cycle, seeking out other fly pupae. Fly parasites attack several species of filth-breeding flies commonly associated with animals. They live on and near manure and garbage waste disposal sites, going completely unnoticed by humans or animals.
To release fly parasites think like a mama fly! The parasites should be distributed throughout the breeding areas when they begin emerging on a weekly basis during 'fly season".
Search Library Topics Search Newspaper Columns
|
What is Hypertrophy and why is it so important?
If you're one of my clients, you hear me talk about Hypertrophy all. the. time. It is the BASIS of building strength which will lead to all of the other fitness and health goals you could ever dream up...so it's obviously very important.
So what is Hypertrophy?
By definition: Hypertrophy is an increase in the cross-sectional size of a muscle in response to strength training.
The important part: It's building muscles so you can lift heavier, move better, and feel stronger!
Does this mean that if you practice "hypertrophy" training you are going to get big + bulky? Absolutely NOT. Muscle building does NOT necessarily mean that the muscle itself is appearing to get larger; it simply means that there is "hyperplasia" occurring (increasing muscle fibers) and your body composition is changing. Who doesn't want to look and feel more toned?!
When you are beginning an exercise program of any kind, it is essential to build strong muscles and change your body composition to include lean body mass (aka muscles) before trying to restrict calories or perform any calorie-torching aerobic activities to ensure weight loss comes from fat loss as opposed to muscle tissue. Let's dig in-
Why is hypertrophy so important?
1. Muscle Tissue Composition.
Muscle tissue is the leanest tissue we have in our bodies. It requires a lot of energy to do the constant flexing and contracting
our bodies require throughout the day, making muscle tissue the most active tissue (kind of funny to say, right?). As a result, muscle tissue has the most mitochondria of any other tissue in our bodies, which are the "energy" centers of cells and, generally speaking, are equivalent to your metabolism (in fact, there is a Mitochondria and Metabolism Center at UW here in South Lake Union!). More muscle tissue/mass = More Mitochondria = Higher metabolism + burning more calories ALWAYS.
2. Support for joints, tendons, and ligaments.
The stronger your muscles are, the better they can support all of the daily functions your joints are put through every day. It allows you to move better, increase your range of motion in the complex joints like your shoulders and hips, and give extra support to the more elastic tissues that surround these joints. More muscle tissue/mass = less injuries. Just ask any runner- they will all tell you that they saw a reduction in injuries once they started incorporating strength training into their routine!
3. Lean body composition.
Due to the first point, the more muscle mass you have, the leaner you will be. And as you increase strength through weight training as well as add in other exercise techniques like aerobic activity, your body will naturally learn to burn fat instead of burn muscle. Without building a strong base of strength, aerobic activity will reduce your lean body mass because your body is simply burning any and all calories it can! More muscle tissue/mass = leaner body composition.
This is a given. But obviously being strong and seeing your body continue to amaze you with how much it can handle, change, and progress is extremely rewarding. Hypertrophy is the science behind that progress and strength. More muscle tissue/mass = More strength.
5. Build THE foundation.
Hypertrophy builds your foundation from which you can do ANYTHING in the fitness world. It makes jumping, lifting, running, swimming, biking, dancing, walking, pretty much anything much easier. A solid muscle base is essential to have a well-rounded, holistic health and fitness plan and build a long, lean aesthetic.
And just one more from ISSA- "Weight training stands out as the single best method there is for ensuring that gradually lost weight will come from fat stores and not hard-won muscle tissue. Why? Because aerobic training simple does not build muscle to the extent that weight training can. In fact, aerobic training alone with reduce your lean body mass and drop your BMR. This means you need to exercise more to burn more calories. But, on the other hand, if you gain 5 or 10 pounds of muscle, you are burning more calories all the time, even when you are sleeping."
I know sometimes weight training doesn't seem like the best option for when you're trying to "lose weight fast." Burpees + HIIT + cardio SEEM like much better options. But to achieve long term, sustainable, healthy fat loss, hypertrophy is ESSENTIAL (and I promise, you won't be disappointed with that STRONG individual staring back at you in the mirror!)
Happy muscle building!
|
Nova Scotia
Nova Scotia
This Atlantic peninsula could have been an American state or a French colony, but instead it’s a maritime stronghold of Canada’s Scottish population.
With a name meaning “New Scotland” in Latin, Nova Scotia is culturally Scottish. Historically, it is a broad melting pot. Today its seaside communities are filled with pubs and Celtic culture. Its shores have welcomed over a million immigrants to Canada from across the world. Traces of other nations’ settlements remain today. Enjoy Nova Scotia’s Scottish port towns, explore its colonial history and take in its world-famous coastal landscapes.
Enjoy the culture and seafood of a Nova Scotia seaport. Halifax is the province’s largest city and it has the busiest port. Explore the harbor, which has antique sea craft and seafood restaurants. Nearby are marine-themed museums including the Maritime Museum of the Atlantic, featuring a Titanic deck chair reproduction. For a more intimate experience of Nova Scotia seaside life, head to the coastal village of Lunenburg. Established in 1753, this UNESCO World Heritage site features many brightly colored 18th- and 19th-century buildings.
During the colonial age, Nova Scotia was a major frontier in the territorial race between France and England. As a result, the province has many old fortifications, such as the Halifax Citadel. This star-shaped fort towers over the city from its highest hill. The neighboring Halifax Town Clock is the city’s main landmark. France’s response to England’s formidable settlements include the Fortress of Louisbourg, located just outside the modern town of Louisbourg on Cape Breton Island. The 18th-century castle has massive walls up to 36 feet (11 meters) thick. In summer, costumed actors recreate life as it might have been like here in 1744.
In addition to Louisbourg, Nova Scotia’s northeasterly Cape Breton Island features the renowned Cabot Trail. Wrapping around the island’s northern peninsula, the Cabot Trail reveals mountainous coastal vistas. Pass through Cape Breton Highlands National Park, where 26 hiking trails provide views over forested seaside cliffs. Head on to Pleasant Bay, which is a prime spot for whale watching.
The best time to visit Nova Scotia is between June and September, although crowds can be heavy in July and August. Fly or boat into Halifax to begin your trip to this colorful and historic Atlantic province.
Popular cities in Nova Scotia
Crystal Crescent Beach featuring a sandy beach and general coastal views
Known for Ports, Historical and Tours
Atlantic Canada’s harbor city is a treasure trove of maritime heritage, woodland parks and sandy beaches.
Reasons to visit
• Maritime Museum of the Atlantic
• Halifax Public Gardens
• Halifax City Hall
Dartmouth which includes street scenes
Known for Shopping, Ports and Lakes
Enjoy lots of aquatic adventures on the lakes of this waterfront community, situated on the eastern shore of Halifax Harbor.
Yarmouth featuring a marina
Known for Ferries and boats, Excursions and Ports
Learn the history and seafaring culture of this port town and admire mansions that belonged to sea captains in the late 19th century.
Sydney featuring a house and a small town or village
Known for Friendly people, Dining and Walking
Tour a reconstruction of an 18th-century fortress town, drive along a scenic highway and hike through forests at this seaside town.
Truro showing street scenes
Known for Friendly people, Gardens and Biking
Come to a town in central Nova Scotia to witness some of the highest tides in the world and to ride on powerful river waves.
Lunenburg showing a house
Known for Ports, Walking and Historical
Hear tales of old sea voyages, see humpback whales, navigate waterways and appreciate the traditional architecture of this old port town.
|
Meet eSight 3, glasses that can give sight to the blind.
October 12, 2018 / Source: Vanguard
For people who are visually impaired, direction-finding is always a big challenge to them, though support canes can help out. Of the 285 million people worldwide considered blind, 86 per cent are legally blind with low vision caused by macular degeneration, glaucoma and other eye conditions.
However, with the latest technological device known as eSight 3, the visually impaired can now see objects.
eSight’s headsets look a lot like any other VR or AR gear out there. But while most virtual reality systems are built to make digital worlds more realistic, the eSight aims to do just the opposite, using augmented reality headsets and digital technology to help bring the real world to individuals who are legally blind.
Read the full article here.
|
The Mahabharata War
Q. Bhishma Pitamah, knew that Krishna is the Supereme Lord. Then why he could not stop the Kauravas to fight the war, the result of which he knew in advance?
A. If you read Mahabharata carefully you will find at so many places, Bhishma is giving advice to Dhritrashtra, who was the king and if he wanted, he could have stopped the war. But Dhritrashtra never listened to him because of his blind attachment to Duryodhana.
He had to fight on behalf of Dhritrashtra because he had taken the vow that he will fight for whoever is ruling Hastinapur.
And Lord put Bhishma in this situation to show the world that whoever takes the side of irreligion, no matter who he is will be destroyed.
|
Whether the goal is watching TV in peace without bothering others, ensuring a conversation on the phone is understood, or listening to things in public or at events, an assistive listening device can significantly impact the quality of life. These devices alleviate the stress that comes with being hard of hearing. They help by providing relief from feeling left out of events and no longer asking others to repeat themselves.
What is an Assistive Listening Device?
An assistive listening device (ALD) helps amplify the sounds you want to hear. They are especially effective in situations where there is a substantial amount of background noise. These devices can be used with a hearing aid or cochlear implant and help a wearer hear specific sounds clearer.
What Are the Uses for ALDs?
The most common use of these devices is to help individuals experience a better, more fulfilling life than without the assistive listening device when they are struggling to hear things. Some uses include:
• Helping in communicating in one-on-one conversations, such as speaking with a family member at a large gathering.
• Hearing better in public places, including classrooms, theaters, places of worship, and airports.
ALDs are meant to be helpful in everyday life and not impede the movement or activities of those using them. The benefits of these devices are using them in small and large spaces and with either an individual or a group of others.
What to Look for in an ALD
When looking for a listening device, it is essential to make sure it fits into the user’s lifestyle. The easier they are to use, the more they will be used. ALDs come in several styles, such as earbuds and over-the-ear headphones. Some have microphones and can connect to a cell phone or tablet for easy listening. Be sure to select a device that has easy-to-use display buttons for volume and power.
There are also many accessories available. Charging bases, lanyards, and belt clip packages can be purchased. Options like neckloops or stetoclips are also available. Suffering from hearing loss does not have to mean missing out on personal conversations, concerts, church gatherings, or other daily events that make life fulfilling. An assistive listening device can be the perfect solution.
How to Communicate with Someone with Hearing Loss
People who are hard of hearing may hide their condition, making it tricky when trying to communicate with them. Here are some tips on how to have the best conversation possible with someone who has hearing loss, whether it’s a recent event or if they have been hard of hearing for their entire life.
Many people will let you know they can’t hear or have trouble doing so, while they’ll keep it hidden for others. You may notice how they don’t seem to be paying attention. It’s best to make complete eye contact and smile. If you’re somewhere where you have to wear a mask, you can get clear ones, so they can lip-read and see your facial expressions.
Not everyone can do sign language, but if you’re out in public, providing directions with your hands is a universal way to direct them to where they need to go.
If they still can hear to some extent, it’s okay to raise your voice slightly, but do so at a normal or slower pace, but never yell. Always be respectful.
Try to simplify your interaction as much as possible. For example, someone may be asking you a question or participating in a social event, but they don’t want to spend several minutes on one topic.
Encourage your friends, family, or colleagues with hearing loss to research hearing amplifiers. These are small devices that amplify sound to enable someone with hearing loss to better participate in social interactions or perform well at work.
These assistive listening devices aren’t what your grandparents used last century. Instead, they utilize modern technology to amplify what others are saying and block unnecessary background noise.
According to a University of Alberta study, many people with hearing loss are embarrassed by it, keeping them from seeking assistive listening devices for the deaf. However, once they reach the acceptance stage, they can seek ways to improve their interaction with other people.
A person who has hearing loss who uses assistive listening devices can experience a better life. If you have a friend or family member with hearing loss, we encourage you to reach out to them about assistive listening devices. Soon they’ll be back to socializing and having an everyday happy life again!
|
Abdul Rahman Ibrahim, indeed, was an unfortunate Muslim prince, whose fate was to spend almost all his adult life operating in the Mississippi Delta, rather than reigning over a kingdom. He Married Isabella on the areas and set up a family of nine kids.
After four centuries of enslavement in the Mississippi delta, he began his home journey to Africa in the summer of 1829.
Ibrahim had lastly regained his liberty with the help of President John Quincy Adams after years of conflicts. His final destination in Africa was set to be the village where he was born, in Timbo, nowadays known as the Republic of Guinea.
He died on 6th July 1829 in Moravia, Liberia, which was then an American colony not far from Ibrahim’s house. Tragically, he lost his life a short while after the end of his homecoming voyage due to contracting a “coastal fever.”
President John Quincy Adams, whose government helped arrange Sori's release.
President John Quincy Adams, whose government helped arrange Sori’s release.
He was born to King Sori who ruled in the Fouta Djallon region, further known as the Land of the Fulbe and Jalunke. He was serving in the military when one day he was ambushed and forced onto the slave market at the age of 26.
Ibrahim’s story relates to tensions that were ongoing between the Fulbe and the Jalunke people who both inhabited the region. They were two distinct groups with different religious beliefs. The Fulbe were Muslim orientated, and the Jalunke were non-Muslim.
Georgetown gave the descendants of 272 slaves preferential admission rights
By the time Ibrahim grew up, as Professor Terry Alford explains in his book, Prince Among Slaves, the tensions between these two groups had escalated to the point of total war, following a ban on public prayer activities issued by the Jalunke officials.
When Ibrahim was captured, he was serving as a leader of one of the Fulbe army’s troops. He was quickly auctioned on the slave market and around the year 1788, he ended up on a Mississippi plantation in Natchez, in the ownership of Colonel Thomas Foster.
What may have helped Ibrahim at least a little was that he possessed the green thumb as much as good leadership skills. Thus Foster made him one of the majors on the cotton plantations. His spouse, Isabella, was also a slave on the estate, and they married around 1794, and of their nine children, five were boys and four were girls.
But settling down with a family on a cotton plantation run by slaves, while also being one, was certainly not anyone’s dream. Ibrahim made a few attempts to reclaim freedom and leave, but things did not go that smoothly. The first spark of hope had come following a visit from Dr. John Cox, an Irish surgeon who saw a familiar face in the slave.
As sources tell, Ibrahim and Cox already knew each other because Cox had previously traveled to Ibrahim’s homeland, and in one instance had fallen sick for almost half a year. It was Ibrahim’s family who took care of him while he was ill, and now it was time to return the favor.
Initially, Cox offered to become Ibrahim’s new owner, to “buy” him from Foster, only to later grant him his freedom, but Foster refused the offer. Cox supposedly tried anything that he could think of — lobbying among high officials, to create pressure for Ibrahim’s release–but no matter how much he tried, Ibrahim remained enslaved. Cox died around 1816.
Ten years later, it happened that Ibrahim wrote a letter in Arabic and had it sent to his relatives in West Africa. Allegedly, the man who picked up the letter from Natchez, named Andrew Marshchalk, had forwarded a copy of it to Senator Thomas Reed. The officials in Washington, D.C., thinking that Ibrahim originated from Morocco, then forwarded the letter to Morocco and it eventually ended up in the hands of the Moroccan Sultan.
Regardless of the fact that Ibrahim did not come from Morocco, the Sultan reportedly took an interest in his case and eventually set up a new petition that now addressed the President of the United States.
From here on in, fortunes changed for the forgotten African prince, and a process of fundraising was underway to help him become free of slavery. The collected funds were not enough to support the return of the entire family, but there was still enough for Ibrahim, now in his mid-60s, and his wife to board a vessel to Africa.
Sadly, his death occurred at the end of their journey, and he was never able to see his birth village again. Following his death, his spouse settled in Liberia. Tragically, only two of their children were released and traveled to Africa, while the rest remained enslaved.
Ibrahim was aged 66 when he passed away. He never became a king who could leave a kingdom behind as a legacy. What he left was only a life story that sheds light on some of the darkest moments of humanity–the terrible history of enslavement.
|
Lower School
English/Language Arts
The LFS lower school language arts program guides students to becoming strong, confident, and joyful lifelong readers, speakers, writers, and listeners.
Students interact with language in many different ways, including conversation, discussion, stories, and books, both fiction and non-fiction. In our language rich classrooms we fuel the imagination and encourage exploration while developing strong decoding, inferential, and comprehension skills in every student.
This curriculum is flexible to suit the individual learner, meeting the needs of each student based on their strengths, needs, and interests. Our early readers learn phonemic skills and enjoy a variety of genres and authors, reading prose and poetry, making connections and responding to multiple viewpoints. Cultural awareness and social justice is addressed through content that is selected to coincide with areas explored in history lessons and ones which represent the students’ diverse experiences.
Students will develop writing skills by producing work and going through the process of drafting, revision, editing, and proofreading their own writing, paying special attention to vocabulary, mechanics, handwriting, and spelling.
History and Social Studies
Through the history curriculum, students will learn about their place in time and space by curating a holistic understanding of the passage of time.
Beginning with the Big Bang story and continuing throughout the history of life on Earth, students will learn about what time is, how it affects us, and how we are connected through it.
Early grades will work on telling time and elapsed time work. They will also look at passage of time in their own lives through personal biography and timeline work. There will be crossover with language work in studying verb tenses and the ideas of before and after, past and present.
Through timeline work, students gain understanding of how things grow and change over time, emergence of inventions and how they changed our world, as well as migration over time and how that changed our global landscape.
Studies of human life will focus on the fundamental human needs which weave together different global cultures throughout time, recognizing and appreciating the differences in how humans get their needs met. A three-year cycle will cover studies of the civilizations of Africa, Oceana, Europe, Asia, North America, and South America, recognizing the true history of human development in each global region. Coming closer to home, students will learn about U.S. history and government, along with state and local history, as part of our mission to develop global and conscious citizens, and critical thinkers. These themes will be reinforced through language and literature studies that are connected to our continent studies. The students will explore these topics and related areas that interest them through research, developing writing and research skills.
As students learn about our world, it is vital that they understand the Earth, its physical history and formation, the various land and water forms, and how we use and read maps. Students will make connections to land forms and human needs and civilization growth.
Confident, excited, strong, and flexible are the four key words that guide our community of young mathematicians at LFS.
Our mathematics curriculum is designed to meet students where they are and guide them to a deep understanding of number sense, calculations, patterns, geometry, probability, money, time, mental math, number operations, data and statistics, and algebraic concepts.
We encourage students to look for patterns and relationships through real-world investigations and see how mathematics and geometry are integrated into their daily lives and the natural world. We balance the practice of specific strategies and processes while encouraging students to develop and share their own strategies for solving problems. Through practice and deep knowledge, we help students develop a sense of joy and excitement about math.
The LFS science program is hands-on and experiential. We encourage students to ask questions, experiment, build, plan, and play.
Science is integrated throughout the school day and the curriculum. Our students come to think of themselves as experimenters, engineers, and thinkers and are confident in their ability to do science. Students in each grade participate in our LFS STEAM fair, where they showcase their age-appropriate investigations, experiments, and projects.
Lower School science courses cover a wide range of topics and include physics, chemistry, biology, and environmental science activities. Kindergarten and first-grade science follows a seasonal framework and builds on children’s natural curiosity and wonder, investigating phenomena such as weather, seasons, terrestrial ecosystems, life cycles, plants and animals, liquids and solids, and more. In second through fifth grades, science is taught through themes (coral reefs, the deep ocean, the local garden, human bodies, feeding the world, and more), engineering challenges, experiments, and field experiences.
World Language
Lower school students engage with Spanish on an immersive level, encouraging interaction with the language and the development of listening and speaking skills.
Lower school students will work with Spanish songs, stories, and games to get them interacting with the language in an immersive and conversational context. The Spanish curriculum is developed with native speakers and new learners in mind, to accommodate all members of the Lancaster community. Students will be involved in Spanish 3 times a week for 30 minutes with a small group of other students.
Through games and conversations, new vocabulary will be regularly introduced to learners and will be continually reinforced with continued interaction. The goal of the Spanish curriculum is to make students excited about and familiar with the language, and to build foundational conversational skills that will aid them in further language development.
We chose to focus on Spanish as a world language to serve the Lancaster community, and to better equip our students to be active and knowledgable global citizens.
|
Latin America and the Caribbean is one of the epicenters of the pandemic. (
Wastewater Testing Can Improve Latin America's COVID-19 Response: Report
English covid-19 latin america water
Wahyu Dwi Anggoro • 26 January 2022 12:04
Washington: Wastewater testing provides a relatively economic method whereby countries in Latin America and the Caribbean can improve their detection, diagnosis, control, and monitoring systems for viruses that cause diseases like COVID-19 and its variants, according to a new World Bank report.
Latin America and the Caribbean is one of the epicenters of the pandemic, with some of the highest mortality rates in the world and more than 1.56 million deaths.
With its unrelenting social and economic consequences, COVID-19 threatens to undo recent gains in human capital outcomes in the region.
Bagaimana tanggapan anda mengenai artikel ini?
In this context, wastewater testing can, at a relatively low cost, provide information on the circulation of the virus and identify clusters of cases before the situation reaches the level of sustained transmission.
This early warning allows public health professionals to detect potential outbreaks and quickly implement targeted control measures.
The new report highlights that wastewater testing can facilitate the collection of useful information about vulnerable populations or groups in remote locations, especially those that do not have access to clinical tests for COVID-19.
The collection and testing of samples in certain at-risk settings provides reliable information and can therefore prevent outbreaks that could overwhelm the local health care system, especially with the emergence of new worrying variants, such as Omicron.
"The COVID-19 pandemic has meant the loss of years of development gains for many countries in the region and has highlighted the need to develop new tools to better prepare for and respond to future crises," said Carlos Felipe Jaramillo, World Bank vice president for the Latin America and Caribbean region, in a press release on Tuesday.
"The region can benefit from using its water and sanitation infrastructure for public health risk surveillance, such as COVID-19. The World Bank will help countries finance and implement this type of smart investments to help solve their complex problems," highlighted Jaramillo.
The report "Strengthening public health surveillance through wastewater testing: an essential investment for the COVID-19 pandemic and future health threats" indicates that investments in wastewater monitoring systems can yield long-term benefits to strengthen countries’ capacity to provide timely and well-informed public health responses.
Best practices therefore need to be developed for measurement and the generation of reports, as well as to enable collaboration and coordination between health entities, laboratories, and services that are involved in wastewater collection.
This will require an infrastructure that allows for a broader, well-organized, and sustainable surveillance system.
Ikuti media sosial dan dapatkan berbagai keuntungan
Dapatkan berita terbaru dari kami Ikuti langkah ini untuk mendapatkan notifikasi
unblock notif
|
Community Organization – 5 important facts to note
The Industrial Areas Foundation of Saul Alinsky has been referred to numerously in community organization.
Review the Saul Alinsky, Community Organizing and Rules for Radicals article, research the roots of this method, and then discuss its application of “the ends justify the means” in today’s economy
Address whether this theory is still applicable. Why or why not? Under what circumstances? Provide a specific example to illustrate your perspective.
Prepare a two- to- three page paper (excluding title and reference pages) with a minimum of two scholarly, peer-reviewed sources that were published within the last five years, in APA format.
community organization
Calculate the price
Make an order in advance and get the best price
Pages (550 words)
*Price with a welcome 15% discount applied.
How it works
step 1
Upload your instructions
Pro service tips
One writer throughout the entire course
The same paper from different writers
Copy of sources used by the writer
Customer reviews in total
Current satisfaction rate
3 pages
Average paper length
Customers referred by a friend
15% OFF your first order
Claim my 15% OFF Order in Chat
|
ASP.NET Interview Questions and Answers
1. What is ASP.NET?
ASP.NET is a web application framework developed by Microsoft which is open source & runs on server side. It allows programmers to develop dynamic web pages & web services as well using HTML, Javascript, CSS, C# etc. It is the successor to Microsoft’s Active Server Pages (ASP) technology.
2. How does ASP.NET differ from PHP?
Firstly, ASP.NET is always compiled whereas PHP is usually interpreted but it can be compiled using commercial compilers. Secondly, websites developed through ASP.NET can be hosted only in windows servers whereas websites developed through PHP can be hosted in windows as well as linux servers.
3. How does ASP.NET differ from Classic ASP?
Firstly, ASP.NET is always compiled as it uses .Net language like C# whereas ASP is interpreted as it uses VBScript. Secondly, in ASP error handling is very poor whereas in ASP.NET tools like Microsoft Visual Studio used for debugging help in error handling. Thirdly, ASP does not have built in support for xml whereas ASP.NET has full support for xml.
4. What is Common Language Runtime (CLR)?
CLR is used to manage the execution of .NET programs. It uses just-in-time which converts compiled code into machine code and then executes it. It has 4 primary functions which are Garbage collection, Code Access Security(CAS), Code Verification(CV) and Intermediate Language(IL) to native translation.
5. Explain IL, CTS, CLS and JIT.
• IL(Intermediate Language)- It is a lowest level programming language designed for usage by compilers. During runtime just-in-time compiler converts IL into machine code and then executes it.
• CTS(Common Type System)-CTS is a standard which defines how types are declared, used and managed in the common language runtime. It supports 5 types i.e. classes, structures, enumerations, interfaces and delegates.
• CLS (Common Language Specification)- It forms a set of rules which every language has to follow those run under .NET framework. It is a subset of CTS(Common Type System).
• JIT(Just-in-time)- JIT compiles the IL (Intermediate Language)code to Machine code before execution and then saves this transaction in memory.
6. What are the different types of JIT?
Different Types of JIT are:
A) Pre-JIT - Complies complete source code into native code in a single cycle at the time of deployment.
B) Econo-JIT - Complies those methods that are called at runtime. They are removed when they are not required anymore.
C) Normal-JIT - Complies those methods that are called at runtime and then they are stored in cache. Next time when the same methods are called, compiled code will be taken from cache.
7. Define a Managed Code.
Managed code is written in any high level programming language like C#, J# etc. Which is used with .NET framework. It will execute inside the environment of Common Language Runtime (CLR) i.e. .NET runtime. Note that all Intermediate Language (IL) are managed code. If you want to use any third party software i.e. VC++ etc. they are unmanaged code.
8. Explain the working of a web application.
A web application resides in the server and responds to the client's requests over internet. When a client accesses the web page using browser from his machine and makes a request, it receives the response in HTML form which is displayed by the browser. Microsoft Internet Information Services (IIS) is required to run this web application on the server side. IIS sends the request of the client to the application. The application returns the requested result to IIS in HTML form then IIS sends this result to the client.
9. Explain serialization and deserialization.
Serialization is an object conversion into a stream of bytes and deserialization is creation of an object from a stream of bytes.
10. What are the application and session event handlers in ASP.NET ?
1.Application_Start - Triggers when the first user visits a page of the application or 2.first resource is requested from the server.
3.Application_End - Triggers when there are no more users of the application.
4.Application_BeginRequest - Triggers at the beginning of each request to the server.
5.Application_EndRequest - Triggers at the end of each request to the server.
6.Session_Start - Triggers when a new user visits.
7.Session_End - Triggers when the users stop requesting pages and their session times out.
|
Would You Know What to Do?
Emergency Situations
What would you do if you witnessed — or worse, were involved in — a life-threatening situation? Learn the steps to take in case you find yourself in an emergency scenario.
What to do if someone is
hit by a car.
Lifesaving dos and don'ts during a dog attack.
Learn what to do if a child ingests a poisonous chemical.
5-Minute Health Fixes
Heart Attack
Heart disease is the leading cause of death for both men and women in the United States. Every year, about 785,000 Americans suffer their first heart attack and another 470,000 have repeated ones.
E.R. physician Dr. Travis Stork explains the warning signs of a heart attack and what happens to the body during one.
Typical Heart Attack Symptoms
• Chest pain
Upper body pain
Shortness of breath
Stomach pain
Cold sweats
Commonly Overlooked Heart Attack Symptoms
Abdominal pain or nausea
Neck or jaw pain
Risk factors for cardiovascular disease include smoking, high blood pressure, high cholesterol, high triglycerides, untreated diabetes, obesity, stress and lack of regular exercise.
Heart attacks, however, can affect seemingly healthy people, as well. In September, Hayward Demison, a 17-year-old junior on the Central Catholic (Oregon) football team, suffered a cardiac arrest during a game.
Learn why seizures occur and what to do if you see someone having one.
Lisa, a registered nurse, rushed onto the field to perform CPR and saved Hayward's life. "I was very lucky to know what to do that day," Lisa says. "I noticed there was a little bit more commotion down there than usual, and noticed that somebody had collapsed. I rushed down there to see what I could do to help."
Hayward, who is recovering from heart surgery, and his father join The Doctors from the hospital to share a special message for Lisa.
While not everyone is a trained nurse, everyone should learn what to do if someone is suffering from a heart attack:
The Doctors and USA Weekend
The Doctors began an exciting partnership with USA Weekend magazine as exclusive medical contributors.
Learn how to boost your child's health!
Check out The Doctors' HealthSmart column!
• Find out which local newspapers feature
USA Weekend
Check if the person is breathing
Check for a pulse
Raise legs 18 inches off the ground to allow blood to flow towards the heart
Chest compressions
If these actions don't restore a pulse, perform CPR until an ambulance arrives
If the person regains consciousness, give him or her aspirin to thin the blood
Don't panic — take action and dial 911
Don't leave the person alone
Don't allow the person to convince you not to call for medical help
Don't wait to see if the symptoms will go away
Nearly 4,600 people die each year from choking. But what happens if you are the one choking and you are alone? Get the information to save your life, or someone else's.
Learn how to use a chair to save your own life if
you're choking.
Learn how to lower your child's risk of choking.
Food Choking Hazards for Kids
Ten percent of drownings occur within 25 yards of another person. Find out what you can do if you see someone helpless in the water.
Poolside hazards
Hot dogs
Hard candies
Meal Choking Prevention Tips
Eat slowly
Limit alcohol at dinner
Take small bites
Chew thoroughly
Don't talk with a full mouth
Supervise children during meals
OAD 10/28/10
|
Why A Female Should Go For Thyroid Test During Pregnancy?
• Request a call back
Why A Female Should Go For Thyroid Test During Pregnancy?
Thyroid glands are gland located in the front of the neck which synthesizes thyroid hormone which controls various metabolic pathways.
When this hormone exceeds their limit of secretion they cause hyperthyroidism while if the hormones get down-regulated it may cause hypothyroidism, both having a massive impact on the pregnancy.
1. Role of thyroid hormone in pregnancy:
Thyroid hormone takes care of growth and development of the fetus. It is researched that during the trimester the baby gets the supply of thyroid hormones. During the pregnancy, the hCG and estrogen cause an increase in the level of the thyroid which results in thyroid enlargement.
Any problem in the thyroid hormone or gland may result in neurological problems and postpartum thyroiditis in the newly born baby.
2. Causes of hyperthyroidism:
Hyperthyroidism during pregnancy may be a result of Graves’s disease, where the immune system is misguided to consider the thyroid cell as foreign. The antibodies produced are called the thyroid stimulating immunoglobulin.
Hyperthyroidism may be due to a rare incidence of hyperemesis gravidarum which accompanies with weight loss, vomiting, and nausea.
3. Symptoms of Hyperthyroidism:
Once a woman is producing a high amount of thyroid hormone, the subject feels increased heartbeats, tiredness, and weight loss. It can result in the incidence of fatal events like preeclampsia, congestive failure of heart, premature birth or even miscarriage.
4. Causes of hypothyroidism:
Hypothyroidism in pregnancy is mainly caused by the Hashimoto's disease which is an autoimmune disorder. The cells of the thyroid gland are affected to downregulate the hormone levels.
5. Symptoms of Hypothyroidism:
If the hypothyroidism is left untreated it may result in the baby may be underweight, preeclampsia, stillbirth, anemia, miscarriage or a rare incidence of congestive failure of the heart.
Thus it is very important to test for the thyroid abnormality during pregnancy to narrow down any future complications.
Suggested Diagnosis and Tests for Thyroid Disorders
|
Комментарии читателей
Why are women living longer than men?
Kimberly Castleberry (2022-04-18)
Everywhere in the world women live longer than men - but this was not always the case. The available data from rich countries shows that women didn't live longer than men in the 19th century. Why do women live longer than men in the present and how does this benefit increase over time? We only have partial evidence and the evidence isn't strong enough to make an absolute conclusion. We know that biological, behavioral and environmental factors contribute to the fact that women are healthier than men; however, we aren't sure how significant the impact of each factor is.
In spite of the amount, we can say that at a minimum, the reason women live so much longer than men do today and not previously, is to relate to the fact that several fundamental non-biological factors have changed. These factors are changing. Some are well known and relatively straightforward, like the fact that men smoke more often. Others are more complex. For example, there is evidence that in rich countries the female advantage increased in part because infectious diseases used to affect women disproportionately a century ago, so advances in medicine that reduced the long-term health burden from infectious diseases, especially for survivors, ended up raising women's longevity disproportionately.
Everywhere in the world women tend to live longer than men
The first chart below shows life expectancy at birth for men and women. We can see that every country is above the line of parity diagonally. This implies that a baby girl from every country could anticipate to live longer than her older brother.
This chart shows that, even though women enjoy an advantage everywhere, cross-country differences are often significant. In Russia women have a longer life span than males; while in Bhutan the difference is just half an hour.
The female advantage in life expectancy was less in the richer countries that it is today.
Let's look at how female longevity advantage has changed over time. The following chart shows male and female life expectancy at birth in the US over the period 1790-2014. Two points stand out.
The first is that there is an upward trend. Women and men living in America are living longer than they were a century ago. This is in line with historical increases in life expectancy everywhere in the world.
And ماذا يحدث بين الزوجين في الحمام بالصور second, there is a widening gap: The female advantage in life expectancy used to be very small however it increased dramatically in the past century.
You can verify that these points are also applicable to other countries with data by clicking on the "Change country" option on the chart. This includes the UK, France, and Sweden.
|
Renewable energy is one way to reduce the carbon impact and secure the environment. There are several types of renewable energy, but they are all thought to be clean and environmentally friendly. The term “green” refers to the technologies utilized for producing electrical energy from green sources. They are simply not really equivalent to non-renewable fuels, but rather are more environmentally friendly. Boosting your use of renewable energy could be a great way to save money while improving the environment.
The primary energy sources which might be environmentally friendly are nuclear, regenerative, and green. These energy sources are not only clean, but are likewise non-emitting, thus they are a fantastic alternative to non-renewable fuels. While elemental power is normally not green, sunlight and geothermica are two of the most popular types of rinnovable strength. These types of energy are also the most economical, making them an excellent decision for the majority of shoppers.
These strength resources originate from natural means and are not really responsible for virtually any greenhouse fumes. This means that they’re ideal for the environment and for the healthiness of our the community. You’ll be surprised to find out that some of these powers can even be manufactured from the wastes of our homes. They’re an excellent way to produce electrical energy for the whole friends and family. And it’s even better than solar energy if you reside in a crissis where the sunshine is constantly shining.
|
Help make Alexa smarter on Alexa Answers. Sign in with Amazon
Why did they call fire trucks red?
they have 8 wheels and 4 people on them, 4 plus 8 makes 12, theres 12 inches in a foot, which is a ruler; Queen Elizabeth was a ruler, and a ship, the ship sailed the seas, and there were fish with fins, and the Finns fought the Russians, the Russians are red; fire trucks are always Russian around
{{ relativeTimeResolver(1576911728817) }}
Points points 5
Similar Questions
Sign in to view all similar questions
Miscellaneous 6 Answers
Join Alexa Answers
Help make Alexa smarter and share your knowledge with the world
|
Secret Wars: Covert Conflict in International Politics Princeton University Press
Austin Carson | September 25, 2018
Secret Wars is the first book to systematically analyze the ways powerful states covertly participate in foreign wars, showing a recurring pattern of such behavior stretching from World War I to U.S.-occupied Iraq. Investigating what governments keep secret during wars and why, Austin Carson argues that leaders maintain the secrecy of state involvement as a response to the persistent concern of limiting war. Keeping interventions “backstage” helps control escalation dynamics, insulating leaders from domestic pressures while communicating their interest in keeping a war contained.Carson shows that covert interventions can help control escalation, but they are almost always detected by other major powers. However, the shared value of limiting war can lead adversaries to keep secret the interventions they detect, as when American leaders concealed clashes with Soviet pilots during the Korean War. Escalation concerns can also cause leaders to ignore covert interventions that have become an open secret. From Nazi Germany’s role in the Spanish Civil War to American covert operations during the Vietnam War, Carson presents new insights about some of the most influential conflicts of the twentieth century.Parting the curtain on the secret side of modern war, Secret Wars provides important lessons about how rival state powers collude and compete, and the ways in which they avoid outright military confrontations.
|
How Tyrannosaurus rex bit, new research
This October 2018 video says about itself:
The team working on Saurian have just revealed their massive, year-long project in a blog post; the complete redesigning of their game’s T. rex. And it might be the most accurate Tyrannosaurus anyone’s ever created.
From the University of Missouri-Columbia in the USA:
T. rex used a stiff skull to eat its prey
3D models shows how ligaments and joints in the skull of a Tyrannosaurus rex work
September 25, 2019
A Tyrannosaurus rex could bite hard enough to shatter the bones of its prey. But how it accomplished this feat without breaking its own skull bones has baffled paleontologists. That’s why scientists at the University of Missouri are arguing that the T. rex’s skull was stiff much like the skulls of hyenas and crocodiles, and not flexible like snakes and birds as paleontologists previously thought.
“The T. rex had a skull that’s 6 feet long, 5 feet wide and 4 feet high, and bites with the force of about 6 tons,” said Kaleb Sellers, a graduate student in the MU School of Medicine. “Previous researchers looked at this from a bone-only perspective without taking into account all of the connections — ligaments and cartilage — that really mediate the interactions between the bones.”
“Dinosaurs are like modern-day birds, crocodiles and lizards in that they inherited particular joints in their skulls from fish — ball and socket joints, much like people’s hip joints — that seem to lend themselves, but not always, to movement like in snakes,” said Casey Holliday, an associate professor of anatomy in the MU School of Medicine. “When you put a lot of force on things, there’s a tradeoff between movement and stability. Birds and lizards have more movement but less stability. When we applied their individual movements to the T. rex skull, we saw it did not like being wiggled in ways that the lizard and bird skulls do, which suggests more stiffness.”
In addition to helping paleontologists with a detailed study of the anatomy of fossilized animals, researchers believe their findings can help advance human and animal medicine by providing better models of how joints and ligaments interact.
“In humans, this can also be applied to how people’s jaws work, such as studying how the jaw joint is loaded by stresses and strains during chewing,” said Ian Cost, the lead researcher on the study. Cost is an assistant professor at Albright College and a former doctoral student in the MU School of Medicine. “In animals, understanding how those movements occur and joints are loaded will, for instance, help veterinarians better understand how to treat exotic animals such as parrots, which suffer from arthritis in their faces.”
7 thoughts on “How Tyrannosaurus rex bit, new research
1. Pingback: How big dinosaurs survived heat | Dear Kitty. Some blog
2. Pingback: Many dinosaur footprints discovered in Alaska | Dear Kitty. Some blog
3. Pingback: Herbivorous dinosaurs, new research | Dear Kitty. Some blog
4. Pingback: Tyrannosaurus rex Trix in Naturalis museum | Dear Kitty. Some blog
5. Pingback: Mosasaurs, why Tyrannosaurus rex-like teeth? | Dear Kitty. Some blog
7. Pingback: Top Ten 2019 fossil animal discoveries | Dear Kitty. Some blog
Leave a Reply
You are commenting using your account. Log Out / Change )
Twitter picture
Facebook photo
Connecting to %s
|
The Climate Corporation: Making it rain, game recognize game
Does big data put food on the table? Yes, yes it does. $1B later, The Climate Corp is helping farmers get smarter. Humanities ancient industry gets a IOT revamp in the face of climate uncertainty.
Around 8500 B.C., the agricultural revolution changed the game. Human beings discovered methods to grow and store food at will, allowing for population expansion, resource management and the first opportunity to reliably plan societal development. Since day one, we have exponentially improved the tools we use and the crops we grow. Examples include domesticated animals, dry seed, irrigation, the modern till, and the internal combustion engine, all producing incredible gains in efficiency [1]. More recently, technology has deeply permeated the processes we implement to maximize crop yield, land efficiency and nutrition content. Now, we produce enough food worldwide to feed 9 billion people and manage to waste 20% of our production along the way. Clearly we have much more ground to gain in terms of minimizing average waste and maximizing yield; however, the technological age has only accelerated our innovation discovery and distribution channels worldwide.
The Climate Corporation offers farmers visualization and processing software products. Data on soil moisture, nitrogen content, and real-time crop health mix together to give farmers continuous updates on overall yield [2]. As a result, business models for farms have become predictive, instead of responsive. With shorter lead times, farms can react to growing hazards such as nitrogen deficiency and low moisture content that would otherwise ruin an entire harvest. Value is created as the delta between the cost of The Climate Corporation’s FieldView product and the increased revenues due to better yield and crop planning. Reduction in waste costs only augment value capture from wasted labor and mismanaged land. All these gains are made possible by distributed processing power (smartphones, internet, laptop on every farm) and increased planting and harvesting control given to farmers through automated machinery and digital planning.
The net result of closing the feedback loop between these devices in the field and the farmer’s database results in smarter seeding, harvesting, watering and fertilizing decisions. Sam Eathington, Climate Corporation’s Chief Science Officer, claims that they have created “the world’s first in-field sensor network for agriculture” [7]. I expect that these innovations and a smart field are just the tip of the iceberg in humanity’s quest to produce enough food to fuel our growing population. As the boundary layer of technological improvement pushes outward, I think The Climate Corporation should begin researching how we will make the next wave of products that will allow farmers to push predicting climate impacts into directing climate impacts. In the face of climate change and so many signs pointing toward an irreversible global warming, The Climate Change’s technologies may be an aggressive hedge against diverging climate circumstances and increasingly adverse conditions for our world’s food supply.
The Climate Corporation was acquired in 2013 by Monsanto, a multinational giant in the agribusiness space, largely due to its sales of technologically improved seeds. In a press release from Monsanto, they claimed the acquisition “represents Monsanto investment in supporting farmers by offering them novel options in the way they manage risk on farm – including weather, which is the single biggest risk farmers face on an annual basis” [3]. Other ways that The Climate Corporation’s unique big data approach to farm predictive analytics shakes up agribusiness lies in secondary markets for selling data-driven harvest insurance and supply chain management solutions. The scale of this market is reflected in Monsanto’s bid of $1.1B for The Climate Corporation’s team and intellectual property [6]. As part of Monsanto, the Climate Corporation’s research and development efforts are largely shrouded; however, we can hope that with Monsanto’s deep war chest will only enable further innovation. Combined with Monsanto’s willingness to suffer through public scrutiny in a never-ending quest for a profitable and sustainable future, the Climate Corporation could very well be our foodie-salvation.
Before the agricultural revolution, human was at the mercy of the land for food. Before the technological revolution, human had mastered the land; however, remained at the mercy of weather. Now, in the heat of the technological revolution, we have better predictors on the weather and have shortened our response time to climate to the point where we can operate one step ahead of famine. How long will it be before we master our weather as well? Perhaps one day we will drive the climate, instead of responding to it. When that time comes, what choices will we make to be good stewards of our environment? Or will we extract every cent of value from our short term horizons? Our generation of agribusiness leaders will have to feed our future mouths and make these hard choices. The Climate Corporation seems to be leading the charge in the right direction.
Word count [760]
1. A History of Farming.
2. The Climate Corporation.
3. Monsanto Acquires The Climate Corporation.
4. Monsanto: The parable of the sower.
5. Cornell Agriculture Library.
6. Silicon Valley Agriculture Start-ups.
7. Sensors and Connecting the Field.
Bringing New York’s Fifth Avenue to China
Life Line: Apollo’s digital disruption to delivery of healthcare in India
Student comments on The Climate Corporation: Making it rain, game recognize game
1. Thanks for this article, which is extremely relevant for humanity considering the world’s current demographic trends. The United Nations estimate that population will increase from 7.3 billion today, to 9.7 billion by 2050 and 11.2 billion by 2100. Moreover, about half of that growth will come from Africa. [1]
With that in mind, I wonder how far are we from applying digital technology, such as Monsanto’s The Climate Corporation, in African rural areas? What kind of private and/or public initiatives are needed to ensure that these sectors, laptops, mobile phones, and training reach to the most needed segments of global population?
2. The data that Climate Corporation is collecting and interpreting seems tremendously valuable to farmers who, as you point out, can respond much more adroitly to changing variables. But who owns the data? Is Climate Corporation building the network, owning the data, and licensing it back to farmers? Or do farmers own whatever data is gathered on their property? It seems like the answer to that question could have massive implications for the use of Climate Corporation’s network. An integrated, nation-wide network of IoT farming data could be deployed in any numbers of ways to improve yields. But a network in which each farmer would be limited to using his own data might have more limited scaling ability.
3. Interesting article! I wonder if the future of farming is something we can predict. You mention that being able to predict, or even set, the weather in the future will provide an opportunity for growth. What if the future of agriculture has nothing to do with weather? What if our practices begin to transcend the whims of nature and thrive in a precisely controlled and fine tuned man made environment?
An indoor vertically integrated farm would provide many advantages in a dense urban setting. Perhaps it never goes past a specialty use, but in areas with limited land, such as Japan, the VIF is an interesting concept.
Leave a comment
|
All You Need To Know About DeFi
Decentralized Finance (DeFi) is the emerging concept for financing. It is taking Cryptocurrency to the next step, and here is everything you need to know about Decentralized Finance. When you learn about Cryptocurrencies too, do not forget to take a look at Bitcoin Era for more comprehensive information in this field.
What is Decentralized Finance?
A collective term for financial services and products, DeFi is accessible to everyone who has an Internet connection. This concept theoretically eliminated the need for any centralized third party like a bank or a Government agency to approve any financial transactions.
DeFi is mainly regarded by many as a term covering the new financial services innovation wave. It is connected deeply to Blockchain, the public ledger that Bitcoin is based on. Blockchain is decentralized, immutable, transparent, and enables all of the computers on the network to hold a copy of all the transactions on the network. This is the base idea behind DeFi that no head entity has control over the ledger eliminating centralization.
Difference Between DeFi and Bitcoin
Bitcoin is a digital Cryptocurrency used as a store of value that is decentralized and operates on its public ledger called Blockchain. In contrast, DeFi, is a concept. A concept that details financial services built on public blockchains like Ethereum and Bitcoin. One example of these financial services is that users can earn interest or borrow against their Cryptocurrency cassettes. DeFi has a lot of such financial services that it is an umbrella term for borrowing, lending, trading, and its derivatives.
How Does DeFi Work?
DeFi eliminated intermediaries with the help of Smart Contracts and Cryptocurrencies. The financial services offered under DeFi are lending, trading peer-to-peer without a broker, receiving loans instantly, earning an interest rate better than the bank, saving Cryptocurrency, and purchasing derivatives like Futures contracts and stock options. These peer-to-peer trades are facilitated using dApps, mostly found on the Ethereum network. The protocols and applications are theoretically open to its users, so they can inspect and innovate upon them. So, users can inspect and innovate these protocols to create unique combinations and develop their apps.
What are Smart Contracts?
Smart Contracts are contracts signed between two parties that run on Blockchain and are stored on a public ledger. These contracts cannot be altered and can only be closed once both parties have met their conditions. The biggest benefit of Smart Contracts is that the financial services on it can be completed without the intervention of any third party.
Uses of DeFi
Since DeFi utilizes smart contracts and Cryptocurrencies to offer financial services without any bank involvement, with the growing number of dApps, the possibilities of DeFi have no limits. Some of the popular uses of DeFi are transactions to any corner of the world, Crypto wallets for storing money, peer-to-peer lending and borrowing, trading anywhere and anytime anonymously, trading stocks, NFTs, other assets, and many other services.
This was all you needed to know about DeFi to start using this new wave of innovation in the financial market.
|
Potty training: What works
Potty training: What works
We are searching data for your request:
Forums and discussions:
Manuals and reference books:
Data from registers:
Wait the end of the search in all databases.
To make potty training as smooth a process as possible for you and your toddler, take a moment to learn what tends to work and what doesn't. What works:
Waiting until your child is ready
There's no magic age for being ready to start learning to use the potty. Most toddlers develop the necessary physical and mental skills between 18 and 24 months, while some kids aren't there until closer to age 3 or even 4. Keep an eye out for physical, cognitive, and behavioral signs that your toddler might be ready to give it a try.
Once you do start, if you've been trying for several weeks without success, that's a sign your toddler's not ready. Wait a few more weeks or until you see signs that the time is right and try again.
Making a plan
Before you even buy your toddler a potty seat, it's important to have a plan for the training process itself. Decide when and how you want to start, how to handle accidents, when to back off, and so on.
At the same time, prepare to be flexible. There's no way to know how your child will respond to potty training attempts or what techniques will work best. Keep in mind that as with most developmental milestones, success doesn't necessarily happen in a linear fashion your toddler may make initial progress only to regress at one or more points along the way.
Discuss your plan with your child's pediatrician and daycare provider. They'll probably have plenty of experience and advice to share. Once you've decided on a strategy, be sure you and everyone else who takes care of your child sticks to it barring unexpected setbacks and other potty training challenges, of course.
Taking it slow
Of course, it's perfectly all right to try to motivate with gentle reminders and encouragement. If he balks, though, ease up.
Praising your child
Accepting that there will be accidents
It's likely your toddler will have numerous accidents before being completely potty-trained. Don't get angry or punish him. After all, it's only recently that his nervous system has matured enough for him to perceive the sensation of a full bladder or rectum and that his muscles have developed sufficiently to allow him to hold in his urine and stool and that's if he's on the early end of the developmental spectrum.
|
The US must tread lightly on using dollar's control of the global monetary system. Image Credit: Reuters
The root causes for the Russia-Ukraine crisis are well-known, and yet there are unforeseen issues that are no less important. Or perhaps, even more important in the post-war world. As the tides sweep away detritus, the Ukrainian conflict has exposed economic and financial contradictions along with the embers, including that related to dollar’s dominance.
The US currency dominated global monetary transactions for seven decades, and provided that country with enormous financial capabilities and advantages that no one else had. The greenback allowed the US to pay for imports of all kinds of goods, and the printing of the currency accelerated in the past two years within the parameters of the so-called ‘quantitative easing’. In addition, the dollar granted Washington comprehensive control over all financial transactions between other countries, as such exchanges had to be routed through New York.
This situation is primarily attributed to the economic power of the US. Yet, it has been experiencing challenges after the emergence of countries with growing economic clout such as China, India, Russia, Brazil and Indonesia. Those countries believe it is time to end the dollar’s hegemony, something which will cause Washington, if this actually happened, to lose its throne in setting financial and monetary relations the world over. This transformation was taking place gradually even before the Russian attack on Ukraine.
A basket of currencies
But the conflict was like a strong wind that pushed ships to their final destination at great speed and encouraged more ‘captains’ to start sailing to take advantage of these conditions. Alternatives are available in the euro and the Chinese yuan. Many countries have listed the yuan within their monetary reserves along with the dollar and the euro, including those allied with Washington, such as Israel. The Central Bank of Israel recently decided to make the biggest change to its monetary reserve, adding the yuan to its reserves, which has exceeded $200 billion, along with three other currencies.
Moreover, economically influential China, Russia and India are using their national currencies in trade exchange operations away from the dollar. The Egyptian government has decided to authorize shipping agencies to accept the Egyptian pound instead of the dollar, according to Bloomberg. Thanks to the existence of Suez Canal, shipping operations have a special importance in Egypt.
Gas disconnect
Above all, the boldest measure was taken by Russia, where it decided to sell its oil and gas exports in rubles. Nine European buyers have so far paid their purchases of Russian gas in rubles, while gas has been cut off from Poland and Bulgaria after they refused to do so. The rest of Europe have to determine their position to avoid the cutting of gas supplies, which would constitute an economic disaster if it happened.
This does not mean an end to the ‘Age of the Dollar’, or that a transformation will take place tomorrow. The process will happen over a period and will end with the dollar losing its hegemony and turn into a normal currency for financial and commercial exchanges. It will be given some extra advantages due to the continued linkage of oil sales to the dollar; but if this link breaks, the dollar’s worth will erode further.
This dangerous transformation is being controlled by a country that continues to deal flexibly despite the unjustified US provocations against it. So far, it has been satisfied with launching warning balloons so as not to break the link between oil and the dollar, which if it happens will accelerate the establishment of a multipolar monetary world.
|
22 Matching Annotations
1. Mar 2021
2. Feb 2021
1. Business Process Model and Notation (BPMN) is a standard for business process modeling that provides a graphical notation for specifying business processes in a Business Process Diagram (BPD),[3] based on a flowcharting technique very similar to activity diagrams from Unified Modeling Language (UML).
3. Jan 2021
1. Both are elements positioned near a "reference" element, and are hidden until they are triggered. They help conserve space by hiding secondary information or functionality behind a hover or click. They are positioned outside the normal flow of the document so when they are triggered, they are overlaid on top of the existing UI without disrupting the flow of content.
4. Nov 2020
1. In both schools, institutions are important for politics because they structure political behavior.
the idea that people act on rational interests is commonality.
5. Oct 2020
1. Solid is similar to remoteStorage in that it allows apps and services (including unhosted web apps) to store the user's data under the user's control.
6. Aug 2020
1. You can also think about each one with the way we stress the different syllables slightly when we're speaking: "log in to host.com" sounds like "log + in + to host.com" (each word is pretty much evenly stressed) "log into host.com" sounds like "log + INto host.com" (the stress is on "in") "login to host.com" sounds like "LOGin + to host.com" (the stress is on "log")
I wouldn't have thought about using the way we pronounce it to make a point about grammar, but somehow it seems to help slightly to make the point.
7. Jul 2020
1. A typical tagline is short -- many are seven words or less – and you can think of it as a linguistic counterpart to your company’s logo.
1. If you have an object of properties, you can 'spread' them on to a component instead of specifying each one: <Info {...pkg}/>
8. May 2020
9. Aug 2019
1. heseclerksareoftenmen,whoeremorevile&treacherousthantheInda.themselves
the clerks from the trading posts (sent by Aitkin) are described as worse than the Natives in terms of civility
2. ButafterallthereisnotsogreatadifferencebetweentheseInds.&ourvoyageursasonemightsuppose.fortheyoftenreoievetheirrationofflourintheirpockethandkerchieforhat
provisions are received by Natives and soldiers alike in dirty clothes
10. Dec 2018
1. such personal advantages
Another conceited man along the lines of Persuasion's Sir Elliot.
2. volume of Camilla
Charlotte has similar reading tastes to Catherine (Northanger Abbey).
11. Oct 2017
1. classic T-cell activation by pMHC-TCR interaction and the BiTE® mode of action share several features: (i) Formation of BiTE®-mediated cytolytic synapses structurally resembles normal immunologic synapses. (ii) Induction of full-blown T-cell activation utilizes common signal transduction pathways. This leads to upregulation of activation markers, cytokine release, and proliferation, and is strictly target cell-dependent. (iii) Redirected lysis of target cells is mediated by induction of apoptosis as evidenced by perforin and granzyme B release, caspase 3/7 activation, PARP cleavage, DNA fragmentation, and membrane blebbing and perforation. (iv) T cells can adopt a serial lysis mode to sequentially kill multiple target cells.
similarities between adaptive immune response and bite
12. Feb 2017
1. sannah Wesley, who had led large prayer meetings in their home when her Anglican priest husband was absent. W
Beginning with Margaret Fell in the late seventeenth century, Quaker women were among the first lo speak in public on social issues, Similar behavior between the two woman of allowing meetings in their homes. Only difference was that Margaret ended up in prison.
1. we’re both so focused on what the other is saying or doing that’s wrong that we barely hear anything else. There may have been a time when we might listen to what the other has to say politely, but those days are long gone.
I believe this statement can sum up many if not almost all of the arguments we have with friends. We just focus on what they are doing wrong or saying wrong at the moment that we forget how much we actually have in common thus making us FRIENDS. I believe the author puts it greatly that the time to be polite is long gone. Could this because of the growing trend of social media?
|
Artificial Intelligence & Machine Learning
Know more about the technology transforming agriculture
KhetiBuddy’s AI and ML applications enables the agribusinesses’ with a key tech component for adoption of better and efficient farming practices. AI and ML can help crops yield and quality more efficiently than ever before, owing to its ability to optimize resources, predict weather patterns, and identify pests or diseases early on.
Resolving production bottlenecks with DeepTech
Agriculture is a critical part of the global economy, but it's also one of the most challenging sectors to operate in. Agriculture is challenged by the growth of the global population at an alarming rate, and with it the demand for food.
It's estimated that we'll need to produce 70% more food by 2050 to meet the needs of the world's population. Farmers are under constant pressure to produce more food with fewer resources, and they often don't have access to the latest technology or information while they face increasing competition from abroad and rising production costs.
Artificial Intelligence (AI) and Machine Learning (ML) can help farmers overcome these challenges. It can help increase crop yields while reducing production costs at farm level. Our algorithms use real-time data and visualize analytics to improve predictions about which crops will thrive and where pests are likely to appear. We also develop optimized pesticide mixes to be applied only where needed, reducing waste and environmental impact. With our algorithms' ability to identify pests and disease using image processing and recognition framework, farmers/growers can get immediate actionable advice for limiting crop losses. It also connects them with advisors for further assistance.
Applications of AI and ML for Agriculture
Traditional methods are no longer enough to handle huge food demand, which is driving farmers and agri-based companies to find newer ways to increase production and reduce input and output waste. As a result, Artificial Intelligence (AI) and Machine Learning (ML) is steadily emerging as part of the agri industry’s tech evolution. There’s no doubt that crop yields and quality are more efficient now than they were centuries, or even decades ago with the help of AI. We’ll take a look at some of the most promising AI/ML use-cases for agriculture:
Looking for optimizing farm resource management and increasing farm profitability?
Artificial intelligence
Artificial Intelligence
Proprietary AI algorithm for agribusiness
High data granularity
Reduce crop losses
Combat climate change
Machine Learning
Machine Learning
High performance computing for agriculture
Optimizing farming practices
Data-driven decision making
Yield forecast and estimation
Mitigate crop deficiencies
FAQs on AI/ML for Agriculture
Our AI/ML modules are trained with a credible secondary and primary database upon which we run the algorithm to create actionable insights and inputs for improving farming practices. This model can be trained for any crops provided that sufficient database (includes images) is available with you to provide high accuracy. KhetiBuddy does not take any responsibility or liability for variances in output in such cases, however we will provide support and guidance in order to help you train the model with right inputs.
|
Some mitochondrial DNA (mtDNA) haplotypes show a high number of matches. There are two possible explanations for this.
• Many people with the same results as your ancestors lived thousands or tens of thousands of years ago. The majority of their descendants still carry their signature.
• A more recent common ancestor, within the last one or two thousand years, with this haplotype had many daughters who in turn had many daughters and so on leading to you having many distant cousins.
Increasing your testing level to the Mitochondrial DNA Full Genomic Sequence, the HVR1toMega or the HVR2toMega upgrade, will separate these two cases. This will allow you to focus on your relevant matches.
|
Digital Health Is Elevating Precision Medicine
Precision medicine is where healthcare is developing. Pharmaceutical companies are already developing medication tailored for individuals. Where's the place for digital health?
Digital Health Is Elevating Precision Medicine
Photo by Ricardo Arce / Unsplash
Let’s first start with the definition of precision medicine.
Precision medicine is a medical model that proposes the customisation of healthcare, with medical decisions, treatments, practices, or products being tailored to a subgroup of patients, instead of a one‐drug‐fits‐all model.
Many Slovenians first came into contact with it in late 2019, when a boy with spinal muscular atrophy (SMA) was in urgent need of a drug that would treat his disease. The family was collecting funds for (at that time) the most expensive drug and treatment in the world, called Zolgensma. It’s a drug that carries a virus with the DNA of the survival motor neuron 1 gene, which is missing or not working properly in SMA. A one-time dose produced for specific patients often results in saving their lives, which was also the case with the Slovenian boy.
Precision medicine is unquestionably the way in which medicine is evolving. Novartis, the producer of Zolgensma, has a clear direction in which they want to develop their medication. The problem is that such treatment is meant for rare diseases and is incredibly expensive for now.
At first glance, precision medicine has less to do with digital health and more to do with genetics. However, if we research a bit down this rabbit hole, we find out that these two fields are closely connected. What if we could analyse genomes with the help of AI and machine learning (ML) to more efficiently determine what a patient needs? Or more efficiently and precisely predict whether a patient is prone to developing a disease? It’s already happening!
Earlier this year, Google published a study of a machine learning model aimed to improve genomic discovery of glaucoma. In short, they developed a prediction model that uses a fundus image to measure the diameters of the optic disk and the optic cup and determine the vertical cup-to-disk ratio (VCDR). This is a good predictor of whether a patient should be referred for assessment for glaucoma.
Earlier detection and treatment of glaucoma, a disease that causes progressive and irreversible vision loss, is a key strategy outlined by the World Health Organization for the prevention of blindness worldwide.
They applied this model to predict the VCDR in all fundus images from individuals in the UK Biobank. Since this database also includes genetic data, they performed a genome-wide association study (GWAS) to identify genetic variants that are associated with the changes in VCDR. The results show that there are 156 such genomic regions, and 93 of them were novel. If you’re asking yourself whether this model was accurate, they also compared it to another study, where experts determined the VCDR themselves. It found 62 out of 65 associations, “which indicates that the model accurately predicts VCDR”.
Our ML-based model was trained and tuned on images that were assessed by multiple graders and may therefore be expected to outperform a single human grader, on average.
The GWAS can be used to build a polygenic risk score (PRS), which is a combination of genes that can predict disease predisposition, in this case, glaucoma. However, the PRS from the ML-based GWAS showed greater predictive ability than the PRS determined by the experts. And they didn’t stop there. They even applied the model of determining the PRS to patient-reported indications of glaucoma, and the correlations were there. Mind-blowing.
Large-scale machine-learning-based phenotyping significantly improves genomic discovery for optic nerve head morphology
Genome-wide association studies (GWASs) require accurate cohort phenotyping, but expertlabeling can be costly, time intensive, and variable. Here, we develop a machine learning(ML) model to predict glaucomatous optic nerve head features from color fundus photographs.We used the model to predict v…
|
Checkout Secure
Free Shipping Over $x to
Why Do Smoke And Hot Air Go Up A Chimney?
By Lawrence Macmillan October 25, 2021
A good chimney is definitely one of those things that we take for granted, and that’s largely because they do their job so well. After all, the only reason we’d have to really acknowledge it is if something went wrong.
It all seems so commonplace and naturalized to us. We light a fire, the nasty stuff goes up and away, and we get cozy in the living room and throw the Disney Channel on, but when you stop to think about it, there’s really nothing commonplace about it.
Why do smoke and hot air travel up through the chimney rather than out into the room? There’s nothing stopping them, so what’s really going on here?
Why Does Hot Air Go Up The Chimney - A Matter Of Molecules
First, let’s discuss why it is exactly that hot air rises. It helps to kick this topic off by thinking about water in a kettle.
When you flick your kettle on in the morning and prepare yourself for that first glorious cup of Joe of the day, the water is being heated.
You can tell the water is being heated because you can hear and see the formation and movement of bubbles within it. It’s as if the water is becoming irritable and can’t contain its energy, and that’s actually what’s happening.
The bubbles are caused by the excitement of molecules, which in scientific terms is what heating something is. The molecules start dancing and jumping around, rather than flowing languidly as they were when the water was cold.
During this molecular shindig, the molecules are bouncing further and further away from one another, reducing the density of the water.
The molecules that are really partying hard draw so far away from one another, they become gaseous, rise in the form of bubbles, and pop on the water’s surface.
The thing to remember here is that if something (a bubble, in our case), is less dense than whatever is surrounding it (water), it naturally shoots upwards.
It’s harder to visualize due to air’s intangibility, but this is exactly what’s happening to air when it gets heated up in your fireplace.
Picture a hot air balloon. Have you ever wondered how they work? It’s the exact same principle.
The pilot turns on the burner, which heats up the air molecules. The air molecules zoom upward before being caught by, and filling up, the balloon, which rises into the air due to their collective force.
Just as they do in the hot air balloon, when you light a fire, the air molecules kick off their invisible dance party, and as the surrounding air is much cooler, they start their ascension up the chimney.
As these air molecules travel upwards, the space beneath them becomes depressurized, creating a vacuum, or in Layman’s terms, a space devoid of matter.
Consequently, more air is drawn from the room to fill the vacuum in the firebox created by the rising molecules. Then the air beneath those molecules is drawn upward, and the molecules after them too, then again, and again, perpetually — pretty neat, huh?
As air pressure in the room decreases due to the draw of the fireplace, more air is drawn in from outside, causing a river-like flow that only travels in one direction...up your chimney.
Why Does Smoke Go Up The Chimney - Riding The Draft
This constant molecular rise and fluctuating pressure creates something known as a draft, which you can basically think of as a wave that the smoke and all other combustion gases surf up the chimney and out of the building.
The reason smoke doesn’t come out of the fireplace and fill the room is that there are no forces within the room strong enough to pull it from the “current” of the draft.
In this respect, draft is a little bit like the event horizon of a black hole — nothing is powerful enough to prevent the smoke from traveling further in towards the opening of your chimney on your roof.
Well...that’s not strictly true. A strong enough breeze would draw some smoke out into the room, but you get the idea.
When Will Smoke Not Travel Up A Chimney?
Sometimes, smoke doesn’t seem like it’s in the mood for a draft surfing session, deciding instead to venture out into the room, which can be incredibly dangerous, but why the sudden change of heart?
Wet Wood
Did you know it takes most wood a year of storage in a dry place before it’s properly seasoned for burning in a fireplace? That seems like a long time, I know, but it’s worth the wait.
When we burn wet wood, it releases 3–4 times the amount of smoke as properly seasoned wood. This smoke is full of harmful by-products, and as there’s so much of it, it’s easy for some plumes to escape the draft and pollute the air in your room.
Closed or Blocked Flue/Damper
The flue is the main section of your chimney that the smoke travels up. The damper is like a little drawbridge that can be closed when the chimney’s not in use to prevent cold air finding its way into your house.
When the flue becomes blocked or the damper is closed, the draft is disrupted, and smoke will billow out into the room. That’s why it’s so important to hire someone to clean your chimney or do it yourself with a chimney cleaning brush.
Negative Air Pressure
Negative air pressure occurs when a home is too airtight. As the molecules rise and create the vacuum in the chimney, no new air can be drawn in from outside to continue feeding the fire and create the flowing air system that takes the smoke up the chimney.
But the external air doesn’t give up there, oh no; with the pressure outside exceeding the pressure inside, the air has no choice but to continue looking for an entry point, and the chimney is just that.
The air from outside will travel down the chimney, reversing the draft, and forcing the smoke out into the room.
Why Do Smoke and Hot Air Go up a Chimney - Summing Up
There you have it, folks; hot air is less dense than cool air, which causes it to rise through the chimney. This creates a draft that carries smoke and other combustion gasses along for the ride.
I hope that’s cleared things up for you!
Older Post Newer Post
Leave a comment
Please note, comments must be approved before they are published
I agree to subscribe to updates from Modern Ethanol Fireplace -
Voted #1 by our customers! Here's what they're saying:
Added to cart!
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.