text
stringlengths
144
682k
Jiddhu Krishnamurti (1895 - 1986) TWO CROWS WERE fighting, and they meant business. They were flopping about on the ground with their wings locked, and their sharp, black beaks were tearing at each other. One or two of their companions were cawing at them from a nearby tree, and suddenly the whole neighbourhood of crows was there, making an awful noise and trying to stop the fight. There must have been dozens of them, but in spite of their anxious and angry calls, the fight went on. A shout didn't stop it; then a loud clap of the hands scared them all away, even the fighters, who continued to fly at each other in and out among the branches of the surrounding trees. But it was all over. A black cow tied to a stake had placidly looked in the direction of the fight, and then gone on with her feeding. She was a small animal, as cows go, and very friendly, with big, limpid eyes. A procession came along the road. It was a funeral. Half a dozen cars were led by a hearse, in which could be seen the coffin, a highly polished affair with many silver fittings. Arriving at the cemetery, all the people got out of their cars, and the coffin was carried slowly to the grave, which had been dug earlier that morning. Twice around the grave they went, and then carefully laid the coffin on two solid planks which spanned the open trench. All knelt as the priest pronounced his blessing, and the coffin was gently lowered into its final resting place. There was a long pause; then each one threw in a handful of the freshly dug soil, and the diggers, in their bright loincloths, began shoveling it into the grave, which was soon filled. A wreath of white flowers, already withering in the hot sun, was placed upon the grave, and the people then solemnly departed. It had been raining recently, and the grass in the cemetery was dazzlingly green. All around it were palm and banana trees, and flowering bushes. It was a pleasant place, and children would come to play on the grass under the trees, where there were no graves. Early in the morning, long before the sun was up, there was heavy dew on the grass and the tall palms stood out against the starlit sky. The breeze from the north was fresh and it brought with it the long moan of a distant train. Otherwise it was very quiet; there were no lights in the surrounding houses, and the rattle of lorries on the road had not yet begun. Meditation is the flowering of goodness; it is not the cultivation of goodness. What is cultivated never endures; it passes away, and has to be started again. Meditation is not for the meditator. The meditator knows how to meditate; he practises, controls, shapes, struggles, but this activity of the mind is not the light of meditation. Meditation is not put together by the mind; it`s the total silence of the mind in which the centre of experience, of knowledge, of thought, is not. Meditation is complete attention without an object in which thought is absorbed. The meditator can never know the goodness of meditation. No longer young, he was a man well-known for his political idealism and his good works. Deep in his heart there was the hope of finding something far greater than these, but he was one of those to whom righteous action had always been the indication of goodness. He was constantly embroiled in reform, which he regarded as the means to an ultimate end: the goodness of society. An odd mixture of piety and activity, he lived in the shell of his own well-reasoned thought; yet he had heard a whisper of something beyond it. He had come with a friend, who was active with him in social reform. The friend was a short, wiry man, and there was about him an air of aggression held in check. He must have seen that aggression is not the right way to proceed, but he couldn't quite cover it up; it was behind his eyes, and it showed unknowingly when he smiled. As we sat down together in that room, neither of them seemed to notice the delicate blossom that a passing breeze had brought in through the window. It was lying on the floor, and the sun was upon it. "My friend and I have not come here to discuss political action," the first one began. "We are well aware of what you think about it. To you, action is not political reformatory or religious; there is only action, a total action. But most of us do not think like that. We think in compartments, which are sometimes watertight, and sometimes pliable, yielding; but our action is always fragmentary. We just don't know what total action is. We know only the activities of the part, and we hope by putting these various parts together to make the whole." Is it ever possible to make the whole by assembling the parts, except in mechanical things? There you have a blueprint, a design to help you to put the parts together. Have you a similar design by which to bring about the perfection of society? "We have," the friend replied. Then you already know what the future will be for man? "We are not so conceited as all that, but we do want certain obvious reforms brought about, to which no one can object." Surely, reform will always be fragmentary. To be active in doing `good' without understanding total action is in the long run to do harm, isn't it? "What is total action?" It is certainly not a putting together of various separate activities. To understand total action, fragmentary activity must cease. It's impossible to see at one sweep the whole expanse of the heavens by going from one small window to another. One must abandon all windows, mustn't one? "That sounds fine intellectually, but when you see the hungry the miserably poor, you boil inside and want to do something." Which is most natural. But mere reform is always in need of further reform, and to carry on these various fragmentary activities, without understanding total action, seems so mischievous and destructive. "How are we to understand this total action of which you speak?" asked the other. Obviously, one has first to abandon the part, the fragmentary, which is the group, the nation, the ideology. Holding on to these, one hopes to understand the whole, which is impossible. It is like an ambitious man trying to love. To love, the desire for success, for power and position, must cease. One can't have both. Similarly, the mind, whose very thinking is fragmentary, is incapable of discovering this total action. "Then how can one ever discover it at all?" demanded the friend. There is no formula for its discovery. The feeling of being whole, complete, is very different from the intellectual description of it. We don't feel this total being, and we try to bring together the fragments, hoping thereby to have the whole. Sir, if one may ask, why do you do anything? "I feel and think, and action flows from it." Doesn't this lead to contradiction in your various activities? "Often it does, but one can avoid that contradiction by sticking to a definite course of action." In other words, you shut out all activities which have no relation to the one you have chosen. Sooner or later, won't this create confusion? "Perhaps. But what is one to do?" he asked rather irritably. Is that merely a verbal question, or do you begin to feel that sticking to a chosen pattern of action is exclusive and harmful? It is because you don't feel the necessity for total action that you play around with activities which are contradictory. But to feel the necessity for total action, you must inquire deeply within yourself. There's no inquiry if there's no humility. To learn there must be humility; but you already know, and how can a man who knows be humble? When there's humility you can't be a reformer, or a politician. "Then we can't do anything, and we shall be driven into slavery by those of the extreme left whose ideology promises a paradise on earth! They will take power and liquidate us. But such an eventuality can definitely be avoided through intelligent legislation, through reform, and through the gradual socialization of industry. This is what we are after." "But what about humility?" asked the first one. "I see its importance, but how is one to come by it?" Surely, not through a method. To practise humility is to cultivate pride. A method implies success, and success is arrogance. The difficulty is that most of us want to be somebody, and this partial, reformatory activity gives us an opportunity to satisfy that urge. Economic or political revolution is still partial, fragmentary, leading to further tyranny and misery, as has recently been shown. There's only one total revolution, the religious, and it has nothing to do with organized religion, which is another form of tyranny. But why is there no humility? "For the simple reason that if one were humble, one would not be able to do anything," asserted the friend. "Humility is for the recluse, not for the man of action." You haven't moved away from your conclusions, have you? You came with them, and you will leave with them; and to think from conclusions is obviously not to think at all. "What prevents humility?" asked the first one. Fear. Fear of saying "I don't know; fear of not being a leader, of not being important; fear of not being in the show, whether it be the traditional show, or the latest ideology. "Am I afraid?" he asked musingly. Can another answer that question? Mustn't one discover the truth of the matter for oneself? "I suppose I have been in the limelight for so long that I have taken it for granted that the activities in which I am engaged are the good and the true. You are perfectly right. There's a certain amount of modification and adjustment on our part, but we dare not think too deeply, because we want to be among the leaders, or at least with the leaders; we don't want to be the forgotten men." Surely, all this indicates that you are really not interested in the people, but in ideologies, schemes and Utopias. You do not love the people, or feel sympathy for them; you love yourself, through your personal identification with certain theories, ideals and reformatory activities. You remain, clothed in a different respectability. You help the people in the name of something, for the good of something. You are actually concerned, not with helping the people, but with advancing the plan or the organization which you assert will help the people. Isn't this where your real interest lies? They remained silent and departed.
Introduction: Build a Better Quinzhee Hut Picture of Build a Better Quinzhee Hut A quinzhee hut is a type of temporary snow shelter, as distinct from more permanent ice-block igloos, that was historically used in survival situations by Native Americans, Scandinavians, and others living in cold northern latitudes. Traditionally, the builder would create a mound of snow 4 or 5 feet high, allow it a few hours to settle and conglomerate, then hollow it out to create a small cavern or snow hut for shelter from the elements. In real survival situations this ancient method is tried and true, but for the enterprising modern snow-architect there are a few tips and tricks that can turn a quinzhee from a crude temporary shelter into an awesome winter-long snow fort that'slarger, sturdier, better lit, and faster to build. Step 1: Materials To build a modern quinzhee hut you will need: • Snow, and lots of it! • shovels, rakes, and hand trowels • some shish-kebab skewers (or straws, twigs, etc.) • large plastic trash bags and twisty-ties • spray bottle of water • cake pans • and more water It sounds like an esoteric list of ingredients for a snow fort, I realize, but years of building these every winter has gradually improved our method to be as fast and efficient as possible. Step 2: Choose a Location Picture of Choose a Location You want to build your quinzhee where you have access to lots of undisturbed snow.  Once you've found your spot, sort of trample the snow in a circle to demarcate the boundary of your future quinzhee.  Make sure it's large enough to get cozy. Step 3: Inflate and Bury the Trash Bags Picture of Inflate and Bury the Trash Bags I know what you're saying. "Why inflated trash bags in a snow fort?"  Well the answer is simple.  Traditionally, after spending tons of time and energy to create a snow mound, a person would then spend even more time and energy just to hollow it out again.  You'd be moving all that interior snow twice. We've learned over the years that if you inflate trash bags with air, pile them up in the center of your quinzhee, and then bury them with snow, you save yourself a lot of time[*]. When it comes time to hollow your snow mound out, you just pop all the trash bags and 'oila!' your quinzhee is hollow. No need to spend hours chiseling snow out by hand. 1. Inflate your trash bags like a balloon (but please be careful putting plastic bags near your face, and maybe don't let children help with this step).  Then use a twisty tie to secure the mouth of the bag, followed by a quick knot to be double sure it's airtight.  It can take some practice, you'll probably make a few duds before you get quick at it.  Our quinzhee took about 25 trash bags. 2. Place your trash bags in a pile and begin to bury them in snow.  We've found it works best to go layer by layer, otherwise they are liable to shift and move around a lot. 3. Once your snow mound is about the size you want it, throw a bit more snow on top and around all the sides, just to make sure the walls are thick enough structurally.  Then use the back of a shovel to smooth out the edges, it you're into that sort of thing. [*] NOTE: The trash bag method works best with powder snow.  Powder snow surrounds and covers the trash bags without popping or moving them around much, which is ideal.  Icy, wet, or chunky snow is heavier than powder snow, and often will just push the bags out of the way, making the method almost useless, unless you are really, really careful.  If you only have access to chunky, heavy snow, maybe save yourself frustration and skip the bag step, and just make a good ole' fashioned snow mound. Step 4: Prepare for Excavation Picture of Prepare for Excavation Before you begin excavating your quinzhee there are two important steps to accomplish. 1. First you must take straws, or sticks, or shish-kebab skewers, and poke them into your quinzhee mound every couple of feet.  The reason for this is: when you are inside hollowing or smoothing out the interior wall of your quinzhee (even with the trash bag method you'll do some hollowing) you'll have a guide to how close you are to the exterior of your walls.  When you see a straw poking through the interior wall, you know your wall is 8-12 inches thick, which is perfect.  This way you'll avoid making your walls too thin, or worse, punching a whole in the side or roof of your hut. 2. Secondly, spray the exterior of your quinzhee with water from a spray bottle, to help it freeze and consolidate more quickly.  This step isn't strictly necessary, but it can't hurt. Step 5: Hollow Out Your Quinzhee Picture of Hollow Out Your Quinzhee I won't bore you with too many details on this step, since I'm sure you can figure it out! Just cut a doorway, and begin pulling out trash bags (or if you skipped the trash bags, prepare to move a lot of snow!).  You'll want to do a bit of interior smoothing in any case because the trash bags don't create a perfectly shaped interior cavity.  This is when you want to switch to hand trowels, rather than full blown shovels.  Remember to use the straws or sticks as your guides to wall thickness. note on size and safety: This is not our largest quinzhee ever built using this method.  A few years back we made a 6 foot tall quinzhee shaped like a turtle, with four feet, a tail, and a head for the entrance.  It was awesome, and so large you could almost stand up in it; it could fit 4 adults laying down.  Sadly it collapsed with everyone inside because we got a bit overzealous with creating windows and side pockets in the walls, ruining the structural integrity of the dome.  This brings me to the topic of safety.  Never build a quinzhee alone, and never build one so large that the weight of the snow above you could crush or immobilize you if it collapsed.  Snow can be incredibly heavy, especially when wet, and you could easily suffocate if you became buried.  The Wikipedia page on Quinzhees recommends always digging them out while on your knees, so that if it ever collapses you will have an air pocket beneath your chest and lungs.  Sorry to add a serious note to the generally fun topic of snow forts, but safety is key after all :) Step 6: Adding Ice Windows! Picture of Adding Ice Windows! Adding windows to your quinzhee is a great way to spruce it up. (Not to mention that great lighting will raise the property value of your your snow real estate :-) First fill your cake pans with twice boiled water (for crystal clear ice) or tap water (for expediency's sake) and set them outside to freeze overnight.  Our temperature was hovering around 31 degrees, so I just set them in the freezer instead. Once frozen, run them under cool tap water until they are free from the pans, and now your windows are ready to install.  Just cut a few window holes in your quinzhee and pack them in (but be careful to not ruin the structural integrity of your dome!)  If you have the time, crystal clear ice windows are the coolest, and really make your quinzhee shine.  We just used cloudy normal ice, but as you can see from the photos even cloudy windows are surprisingly great at lighting up the interior space.  I guess ours are more 'sunroof' than 'window'. Step 7: Final and Most Important Step! Picture of Final and Most Important Step! That's it you're done!  You have a professional grade quinzhee hut. After all that time in the snow, enjoy a delicious mug of hot cocoa. You deserve it! Feel free to post photos of your own quinzhee creations if you build one.  Let us know how it worked out.  Happy winter! Wyattr55123 (author)2013-03-21 The water method may make it sturdier, but it will also make the thing colder. I would never cheat when building a quinzee, because when I build them I will be sleeping in them, and I don't want to risk my safety on some might I say lazy, twenty first century methods. If it ain't broke, and has worked for thousands of years, why fix it. KevinE49 (author)Wyattr551232016-01-26 If you've really actually slept in one, you know that this will happen naturally anyway. Just the moisture from your breath/sweat/etc will eventually turns the interior walls into ice after a couple nights. rosey gillespie (author)2016-01-18 This is an excellent idea for family activities - or for families with growing kids. Mybe Instructables should form another channel for these kinds of things. Family oriented together -activities. Thancks for sharing. Cats Science Club (author)2014-01-11 Love this! I only wish I saw it a week earlier. nicwitzke (author)2012-12-18 Thank you for this FANTASTIC 'ible. I have been looking for some detailed, down to earth instruction on how to build a snow fort/Quinzhee hut. This 'ible was just what i needed. (Now i just need it to snow) Glad you liked it. It was a lot of fun to make. I hope you get some snow! Thanks, we just got some snow, and I went sledding at my friends winery/grape orchard and were pulling each other behind their MULE (all terrain vehicle). The snow was good, but not enough to make a quinzee hut. Happy Holidays! Lorddrake (author)2012-02-08 now if only it would snow here I can try this out. About This Instructable More by ATTILAtheHUNgry:Urban "Survival" KitHoliday Six-pack WalletFree 'Portal 2' inspired mirror Add instructable to:
What is 'Exoneration' In a general sense, this term means to free from blame or guilt, such as when a criminal is proven innocent. In the financial realm, exoneration usually means to relieve one of a financial obligation or duty. This can apply in many different areas of finance, such as taxation or mortgages. BREAKING DOWN 'Exoneration' The various financial aid programs offered by the government to provide relief to struggling homeowners are forms of exoneration. Delinquent mortgage holders will be exonerated of their current obligations and reassigned new ones that they can manage more easily. A taxpayer who convices the IRS that he or she does not owe taxes that have been assessed is also exonerated from paying those taxes.
Conflict of Generations Conflict of Generations by Lewis Feuer. Basic Books. 542 Pages. $12.50. NO MATTER what the captions on Life magazine say, Harvard has never experienced "centuries of academic calm." In fact, from 1766 to 1834, students seemed to go on a virtual rampage. Lewis Feuer has traced student politics back to the French Revolution, and his Conflict of Generations signifies a major effort to give these movements historical perspective and academic respectability. Feuer largely concentrates on the political consequences of the conflict, not the Oedipally determined struggle of sons against fathers. The element of generational conflict, he contends, has led students to amorality in the choice of political means. Given a set of alternative paths--rational or irrational--for reaching a social goal, student movements will rend toward the most irrational and violent. This analysis accompanies a leisurely executed polemic against student movements of whatever ideological flavor as they emerged throughout history. In all the major student movements documented by Feuer--the German, the Bosnian, the Russian, the Japanese, the Chinese, the French, the American--the original generosity and sacrifice for ideals ended up as criminal elitism in which the end justified any means: assassinations, thievery, strikes, destruction of property, and a heavy youth-weighted rate of suicide. STUDENT MOVEMENTS arise in disoriented societies, a condition often reenforced by the political apathy of the masses. Feuer lists two basic requirements for a student movement: gerontocracy and "deauthorization." A gerontocracy means that the older generation possesses a disproportionate amount of economic power and status. Feuer does nor regard the United States as a gerontocracy, but perhaps he is mistaken. The younger generation has grown weaker in this country, not stronger, as a result of prolonged schooling and economic dependence on their elders well into adulthood. This gives rise to the "free floating aggression" characteristic of young adults whose emotional energies do not go into making a living. The gerontocratic order is undermined by a feeling that the older generation has disgraced itself (deauthorization). The scandal of racial discrimination, for example, deauthorized the older generation in the early sixties and brought into existence the New Left. The debacle in Vietnam, I suspect, more significantly enforced deauthorization in every region of the country. One further law outlined by Feuer states that every student movement must have a "carrier" movement--either a nationalist, peasant, labor, or civil rights cause. Student patronage of such causes tends to distort them, inflame them, or deflect them. Student activists look for and require some oppressed class with which they can identify. They seek to offer themselves in a self-sacrificial way to an excluded group, whether it be the proletariat or a racial minority. Since some students are convinced they are deceived and exploited, they feel and kinship for others who are similarly deceived and exploited. "The back-to-the-people spirit is at once the most distinctive, noblest and self-destructive trait within student movements." All student activism requires this streak of populism and companionship with the masses. Harvard populism among people barely able to locate Central Square had all the classic symptoms of generational revolt. According to the formula, students act autonomously first and then seek for identification. The takeover of University Hall, for example, kicked off a campaign to identify exploited Harvard students with exploited Cambridge workers. Perhaps there is an identity. Significantly, though, the campaign against expansion began in earnest after the takeover. When the masses do not respond to heroic student initiatives, as they often do not, there tends to ensue a further loss of faith in democracy. But the erosion of democratic thinking among student radicals has been going on since 1964. Some suppose that the intellectuals will have to lead the revolution themselves. This belief tends to legitimize individual acts of terrorism. REJECTION by the masses is not a law of history, though. Feuer points out that in developing countries, students may meet favorable circumstances. Where democratic politics are closed off, then the intellectuals--young and old alike--will make common cause. Where the older intellectuals share power or see possibilities of compromise, then the intelligentsia will experience the conflict of generations. This "localized" conflict can be more acute. For the sake of revolutionary purity, students direct their tactics against the old liberals who have "sold out to the Establishment!" And since many of them teach at the university, they are easy to surround and threaten. One should not mistake the student movement for a youth movement. A student movement has the component, however feeble, of intellectualism. "A new idea," writes Feuer, "has all the poetry involvement and purity of a first live." Such idealism commands respect as a major means by which ethical ideas enter history. This is found with a complementary component of anti-intellectualism, apparent in student zeal to purify the classroom of backward thinking. Feuer writes an attractive kind of history, all anecdote and theory. Most of the anecdotes seem rather chilling, deliberately so, but the analysis is quite original. He clearly demolishes the old notion of student politics as one episode toward modernization. Student movements plague all types of societies and generally end in chaos without a single piece of legislation or reform to call their own. Feuer invented much of this analysis in response to current student radicalism and applied it to history retrospectively, but his case is nevertheless well argued. When he applied his categories of student revolt to the American New Left, they led, a bit too easily, to harshly negative conclusions. America's first student left in the thirties spent most of its energies fighting the New Deal. The alternative it had in mind to the economic chaos of the Depression was the law and order of Stalinist Russia. When it became clear by 1940 that Stalin had duped the radicals, or they had duped themselves, the American Left lost credibility with the next generation of students. The radical thirties gave way to the conservative forties and fifties, and the "silent generation" did not life a finger to save the deauthorized elders from the McCarthy persecutions. The New Left of the sixties grew out of an affluent society. Worse than that, it grew out of a stable society. The movement lacked objective economic institutions to attack. The moralistic disapproval of capitalism had carried over from the thirties, but the thrust was no longer socialistic. Socialism is mentioned rarely by the moderate wing of the SDS, and even then only awkwardly. The enemy is the system, not just the capitalist system. The New Left has picked up the alienation of the beat generation and combined it with political activism. FEUER TENDS to use terms like "radicals," "students," and "activists" indiscriminately. He might easily have distinguished the New Left from the New Politics. The New Left prefers to work outside party politics. It prefers direct action for the sake of a moral principle--strikes, demonstrations, building takeovers. Any kind of long run participation in decision-making bores the radicals. It is more Nietzschean to pit one's will against the system and make it yield. Confrontation politics is not really politics at all.
Health & Wellness / Healthy Weighs Examining Overeating OvereatingContrary to what some may believe, the majority of people that are overweight or obese are not binge eating a bag of chips or a gallon of ice cream every day. People that are overweight or obese tend to take in 300-400 extra calories per day causing a steady increase in weight. Part of the problem is that most people have no idea how many calories they should consume in a day to maintain their weight. A registered dietitian can help you calculate the approximate number of calories that you need based on your gender, body, weight and activity level. Examining overeating behavior is another important strategy for losing and then maintaining a healthy weight. During those times when you may overeat or graze excessively take a close look at your feelings and the circumstances in which you are doing so. There can be physical reasons for overeating and there can be emotional reasons. Physical hunger occurs gradually whereas emotional hunger is sudden. When eating to fill an emotional void, people typically choose a specific food. When you eat to satisfy a physical hunger, typically a variety of foods are acceptable. When eating to attempt to fill an emotional void, you are more likely to keep eating even past being full, creating feeling of guilt. Realizing the behaviors associated with overeating and how many calories are ideal for you is one of the first steps to managing your eating and health. Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
What are these black holes in an Airgram? • I'm looking at the airogram and I notice these black holes. What are they? I've looked at the temperature in the map at the relevant height and time and nothing is shown. The date was Friday 15th Sept for Milbrulong NSW Australia Thanks in advance for any assistance, Peter Evans • Developers @peterevans Hello, the black hole is an occasional error in the temperature data. The error can occur in the data source (forecast provider - gfs, ecmwf, ...) or during our internal processing of the data. This hole represents forecasted temperature that corresponds to midnight on Friday 15. It's totally off (~50 Kelvin = -223.15 Celsius = -369.67 Fahrenheit) and as such low values are not supposed to happen in nature our program does not consider them at all. If they do happen though, the program assigns them black color and the algorithm that interpolates colors between temperature points (to create the smooth looking map) yields these eerie black holes. @TZ is already working on a fix. I hope this answer satisfies your curiosity ! • @dzuremar Thanks for your quick and informative reply. The airgram is important to me as a fly a foot launched powered paraglider and use winds at different altitudes to extend my range. Often on the east coast of Australia in summer there is a lower eastly with an upper westerly. My main fuel tank is 14 litres and while I can use an aux fuel tank (in Australia) it significantly increases the weight I have to carry and the risks. Thanks for your EXCELLENT weather visualisation tool. Peter Evans Log in to reply
you're reading... Facet-based Information Navigation Facet-based site navigation systems provide a way of browsing complex data sets without forcing a formal taxonomy onto the data. Facet-Based browsing is different than other methods of crawling information. A common system for navigation is a Taxonomy where you start at the top of the tree and browse your way down to the information that you are looking for. Many different web sites use a taxonomy for browsing information. At ConsumerReports.org, you click on Appliances -> Large Kitchen -> Freezers. Another example would be looking for a MedLine article in a physical library. You find the Journal -> Volume -> Issue -> Pages. In a facet-based system, you could select one of several facets to crawl the information by: Date, Author, Journal, Keyword. You can click and limit the results by each Facet. Browsing a Facetted system will never lead you to an empty result. You can see a demo at Siderian Software’s Seamark Demo. Siderean Software’s products crawl the repository to create a facet-based information browser. The selections are generated on-the-fly with each sub-selection. Endeca also has a facet-based browsing system. They built a demo that dynamically crawls and displays 90,000 wine reviews from Wine Spectator. You can crawl (sort) by any of nine different facets: wine type, winery, country, price and year. Tags and browsing by tags (like at del.icio.us) allows for a very loose method of coalescing information. The social aspects of tagged based systems is critical (I think) to building an Enterprise Collaboration and Communication environment. The problems of tag-based systems are that: you are unsure if you found everything related to a tag, there will be inconsistency in the application of tags, stemming (various tags that mean the same thing like Mac, MacIntosh) causes missed opportunities and tags with multiple meanings cannot be teased apart without context. Formal taxonomies are difficult for users to navigate unless they are fully educated in the taxonomy. They are difficult to apply to information especially in the very loose conversations that make up collaboration and communication. Facet-based browsers could add the structure that allows for grouping similar information and filtering large data sets without constricting the flow of information. One very interesting demo is Facetious – a tag based browser for del.icio.us. The facets here are: Tag, Creator, Site, Feed and Date. Facet-Based browsing could fill the middle ground between the folksonomy based on tagging and the formal taxonomy in Enterprise Information Management. About jimphelps Comments are closed. %d bloggers like this:
Interactive Space In our day to day life, we are exposed to different ways on how we receive messages, share to others and even share our opinion on the received messages. Our generation has witnessed means of communication developing right before our eyes. Unlike before—where people write letters with pen on paper and send it via snail-mail, which took at least a week before the message reached the intended receiver—now our messages are sent to its intended receiver almost instantaneously at a click of the mouse. The Internet has almost everything. You can watch television shows, movies, listen to radio stations from around the globe and read books, academic studies, news and current events. The web has enabled us to connect with other people on a wider scale through on-line social networking, share ideas and opinions through blogs.It has even become a source of employment to some. It is very interactive since anyone can give their feedback on any article on the web. Information highway The Internet is also our virtual reporter that aggregates reports on current events in the world. It can give us free relevant news from abroad like the “current issues of the people in Mumbai,” or local news like “how Mayor Vicente Emano handled the tropical typhoon Sendong (International codename: Washi).” It can also be used as your virtual thesaurus, translator, dictionary and encyclopedia. One time, I encountered an unfamiliar word while I was reading a novel. I just typed the word into and voilà, I can access anything I need to know about the word. Like, how to use it in a sentence and even how to enunciate it. The web is also a great source of “how-to” tips, like how to write a research paper, solving mathematical equations and all you have to do is surf the vast ocean of the Internet and the answer would most probably be there. Connecting to the world Internet has revolutionized how we connect with other people. Connecting through on-line social networks are just a click away these days. Social networking sites can be used to describe community-based web sites, on-line discussion forums, chat rooms and other social spaces on the world wide web. “A social networking site is the phrase used to describe any web site that enables users to create public profiles within that site and form relationships with other users of the same site who access their profile,” defines Webopedia ( In the Philippines, believably the most popular free social networking site to date is “Facebook” ( According to a web site that monitors on-line social networks, “Social Bakers,” there are some 30,178,020 Facebook users in the country. That is almost a-third of our population of 90 million. In it, we can discuss in groups, play games, upload pictures, audio and video clips. We can also give notice to our friends about important personal events like birthdays. We can also create a page where we are the message sender, comment on other people’s status messages and through these exchanges we complete cycles of communication. Hub for multimedia creativity If you are an independent filmmaker, the Internet is a good place for you to be known. There is a web site called “You Tube” ( where you can upload your videos and show it to other people. Some of those people may like your work but the others will only criticize it. Maybe a film producer will see your work and would be up to fund you in making a big production of your film. Some will just criticize your video but don’t fret, it is part of the process of one’s skill to progress for the better. What’s the point of making a film if you do not welcome feedbacks from other people, be it positive or negative feedbacks? As an avid fan of movies, in the Internet you can watch movies from the past decades up to the current films today. In it, you can even express what you feel about that particular movie. You can watch it live streaming or just download the movie into your hard drive and watch it all over again that is, if you are worried about your Internet connection to be gone. Not only movies are found in the Internet but also music. Any song that you like are all in the Internet. It stretches from classical music, folk, blues, jazz, rock, metal, up to the current popular music of today. You can freely download any song that you like, If you are a musician. you can upload your masterpiece into the cyberspace and make a name for yourself. With the Internet, you can either be a listener of music or a musician. If you are a budding writer, you are always welcomed in the world of blogging. In blogging, it does not really matter if what you write is good , even if it is bad, it will still be published in the cyberspace. The power of blogging is you can write about whatever it is you want and if you go and make blogging as a profession, you can earn from it. Internet gaming is booming in the cyberspace. There are interactive games in the Internet like “Sims City” ( where you are going to manipulate a digitally formed human into living an ordinary life. On-line games which people, mostly teenagers are hooked up. Since, in it, they can make friends without seeing what they look like and not even knowing their name. In these games, people can socialize and enjoy sharing digital moments with their characters in the game. Warning: Internet gaming is purely addictive. Last frontier of free expression You can use any medium you want to use in the world wide web. It is the only space where we can freely express ourselves, which have been threatened into silence through censorship. Its reaches are global and it may offer to be the key to world peace and unity. The Internet gets the most audience share since it it purely interactive. Let us, then, fight that it stays genuinely free. Let your voices be heard ( Let us keep the last virtual frontier of expression and critical discourse free!
Depersonalization Anxiety Symptoms depersonalization anxiety symptoms Depersonalizaton anxiety symptoms description: Common depersonalization anxiety symptoms descriptions: To name a few. Depersonalization anxiety feelings can come and go rarely, occur frequently, or persist indefinitely. For example, you may feel depersonalization occasionally, feel it off and on more frequently, or feel depersonalization anxiety feeling all the time. Depersonalization anxiety symptoms may precede, accompany, or follow an escalation of other anxiety symptoms, or occur by itself. Depersonalization anxiety symptoms can precede, accompany, or follow an episode of nervousness, anxiety, fear, elevated stress, etc., or occur "out of the blue" (for no apparent reason). Depersonalization anxiety feelings can range in intensity from slight, to moderate, to severe. Depersonalization can also come in waves, where it's strong one moment then eases off the next. All of the above combinations/variations are common for depersonalization anxiety feelings. What causes depersonalization anxiety symptoms? Medical Advisory There are many reasons why depersonalization can be related to anxiety. Here are four of the most common: 1. Anxiety and an active stress response Depersonalization anxiety symptoms are common symptoms associated with persistently elevated stress, including the persistently stress that being overly anxious can cause. In fact, persistently elevated stress, such as that from stress-response hyperstimulation, is the most common cause of depersonalization. When we perceive danger, stress hormones are released into the bloodstream to help prepare the body for immediate action–either to fight or flee. As these hormones travel throughout the body, they cause physiological, psychological, and emotional changes in how the body functions so that our defenses are maximized. The body readies itself by heightening its emergency functions and suppressing non-emergency functions. While these changes affect many parts of the body, they also affect how the brain interacts with itself. For example, when stress hormones are at normal levels, the rationalization, learning, and emotional areas of the brain interact normally. This normal interaction allows us to think, remember, and experience thoughts and emotions normally. As a result, we FEEL normal, experience normal emotions and thinking processes, and feel complete within ourselves and in our reality. When we perceive danger, however, this interaction changes. For example, stress hormones cause the amygdala, the fear center of the brain, to become dominant while causing the rationalization and learning centers of the brain to become suppressed. It makes this change because our priority becomes survival when in dangerous situations. All functions that aren’t involved in the emergency response mechanism are suppressed so that the body can maximize its resources to either defend ourselves against or run away from the threat. While this change enhances our emergency readiness, it impairs our ability to think clearly and remember short-term information. The body makes this change because danger requires immediate action—to fight or flee. It’s better that we quickly take action rather than stopping to think things over in the midst of danger. Spending time thinking first rather than taking action could be hazardous to our health. Remember, stress responses are supposed to cause these changes. It’s part of the body’s instinctual survival mechanism. As the perception of danger increases, so does the body’s level of emergency preparedness. When we believe the danger has passed, however, stress responses end and the remaining stress hormones are either used up or expelled. Eventually, the body calms down and the body and brain return to normal functioning. 2. Stress-response hyperstimulation When we experience short-term fear, this mechanism works well, and the body and brain can recover relatively quickly. But when stress responses occur too frequently and/or dramatically, they can remain in a state of semi-emergency readiness (stress-response hyperstimulation), which can cause them to experience all sorts of symptoms, problems, and anomalies. The symptom depersonalization is an example of this. For example, rationalization and short-term memory suppression due to sustained emergency readiness impairs the brain’s ability to rationally process and store new information. Consequently, the areas of the brain that normally communicate well have difficulty doing so. This difficulty is experienced as a disconnect between how we perceive, process, and store information, as well as how we feel about it, our self, our life, and others - because our rationalization processes are adversely affected, our emotions and feelings are affected, as well. This combination of disconnects is at the root of feeling “separate” or “detached” from how we normally think, feel, and remember. “I feel like I’m living outside or separate from myself” is a common description of how this disconnect can be experienced. The “processing impairment” caused by stress-response hyperstimulation can make us feel depersonalized, separate from our self, separate from our reality, and cause us to experience memory, emotional, and even performance problems because of how the rationalization, internalization, and emotional processes are disconnected. We feel depersonalized because the brain isn’t communicating with itself correctly due to the negative effects of stress-response hyperstimulation. It’s not that we are disconnected or detached from reality, but that our brain is having a hard time processing information correctly. So it SEEMS that we are disconnected. Essentially, depersonalization is a brain-processing problem due to it being overly stressed. Depersonalization is not caused by a reality problem, consciousness problem, or by a real mental illness. Depersonalization is a consequence of stress-response hyperstimulation. Because stress, including the stress caused by being overly anxious, increases the body’s stress hormone levels, anxious personalities commonly experience this symptom. When this symptom is caused by stress and anxiety, it’s NOT an indication of a serious mental illness. It’s just another symptom of persistently elevated stress. Again, many anxious personalities experience this symptom. In fact, many people who are simply scared or stressed experience this symptom. They don’t become afraid of it, though, whereas anxious personalities do. The body and mind are tightly linked. What affects one, affects the other. This symptom is another example of how a hyperstimulated body, brain, and nervous system can cause odd or strange sensations, feelings, emotions, and perceptions. Much like how a psychoactive or recreational drug can alter one’s mental state, so can hyperstimulation. 3. Hyper- and Hypoventilation Hyper- or hypoventilation is another cause of depersonalization. When we breathe too shallowly and don’t take in enough oxygen (hypoventilation), this causes the CO2 levels in the blood to drop, which can cause a depersonalization feeling. If, on the other hand, you are breathing too aggressively and take in too much oxygen (hyperventilation), this can cause an increase in CO2 levels in the blood, which can also cause a depersonalization feeling. Even though depersonalization caused by breathing issues can seem odd and even unsettling, they are harmless and needn’t be a cause for concern. They will subside when you normalize your breathing. Depersonalization caused by hyper- and hypoventilation is typically a temporary condition and isn’t the cause of persistent depersonalization. 4. Adverse effects of medication Depersonalization can also be an adverse effect of medication, including anti-anxiety and antidepressant medications. If you believe your depersonalization is caused by an adverse effect of medication, you should discuss this with your doctor and pharmacist. I (Jim Folk) also experienced depersonalization…and to a severe degree. It scared the daylights out of me when it first occurred. In my hyper-reactive state, having my reality altered was the last thing I needed. Since depersonalization really shook the foundations of my reality, I really reacted badly to it initially. I had no idea what it was or what was causing it, so I imagined the worst: brain tumor, MS, ALS, some other serious mental illness or neurological disease, or that I was actually drifting into another consciousness. Even though I found out that depersonalization was a common anxiety symptom, it still took me a long time to accept it and not react to it. While depersonalization can be unsettling and impairing, it’s not harmful in itself or an indication of something more serious. It’s just another symptom of stress-response hyperstimulation, and therefore, it needn’t be a cause for concern. Similar to ALL anxiety sensations and symptoms, when you deal with your body’s hyperstimulated state and give your body sufficient time to recover, depersonalization subsides and eventually disappears. Once again, many people experience depersonalization anxiety feelings when overly stressed. The difference, however, is that non anxious people don't worry about this feeling, whereas anxious people do...making the depersonalization symptoms seem more sinister than it actually is. Since worry activates the body's stress response, worry can aggravate depersonalization and cause the depersonalization symptoms to persist. Depersonalization anxiety symptoms treatment When depersonalization anxiety symptoms are caused by apprehensive behavior and the accompanying stress response changes, calming yourself down will bring an end to the response and its changes. As your body recovers from the active stress response, depersonalization symptoms should subside and you should return to your normal self. Keep in mind that it can take up to 20 minutes or more for the body to recover from a major stress response. But this is normal and shouldn’t be a cause for concern. When depersonalization anxiety symptoms are caused by persistent stress (stress-response hyperstimulation), it may take a lot more time for the body to recover and to the point where the depersonalization symptoms eliminated. Nevertheless, when the body has fully recovered, depersonalization anxiety symptoms will completely subside. Therefore, depersonalization needn’t be a cause for concern. Simply reducing your body’s stress and giving it ample time to eliminate its hyperstimulated state is sufficient to eliminate depersonalization. You can speed up the recovery process by reducing your stress, practicing relaxed breathing, increasing your rest and relaxation, and not worrying about depersonalization symptoms. Sure, depersonalization anxiety can be unsettling. But again, when your body has recovered from the active stress response and/or stress-response hyperstimulation, depersonalization feelings completely disappear. Play the clip below for Jim Folk's commentary about the anxiety symptom depersonalization. Jim Folk is the president of Depersonalization is a common symptom of elevated stress, including the stress anxiety can cause. Jim Folk experienced depersonalization to a severe degree during his 12 year struggle with anxiety disorder. For a more detailed explanation about anxiety and its symptoms, why symptoms can persist long after the stress response has ended, common barriers to recovery and symptom elimination, and more recovery strategies and tips, we have many chapters that address this information in the Recovery Support area of our website. Back to our anxiety symptoms and signs page. Authors: Jim Folk, Marilyn Folk, BScN. Last updated September 10, 2017. Information, support, and coaching/therapy for problematic anxiety and its symptoms, including the anxiety symptom depersonalization.
Therapeutics 523 Final Overview I Home > Preview The flashcards below were created by user jannabogie on FreezingBlue Flashcards. 1. What is the cell wall of prokaryotes (like bacteria) made of? proteins, lipids, peptidoglycans 2. What is the cell wall of eukaryotes (such as fungi) made of? • Chitin • mannans, glucans (polysaccharides) 3. Which type of organisms have ergosterol, where is it, and what is its purpose? • eukaryotes • in the cell membrane • it is a target or binding site for many antifungals 4. What is the difference between the cell walls of G(+) and G(-) bacteria? • G(+) have a thick layer of peptidoglycan with many cross links • G(-) have a thinner layer of peptidoglycan with fewer cross links 5. What is a gram stain used for? • to classify bacteria as (+) or (-) on the basis of stain retention of the cell's peptidoglycan layer • G(+) stain purple • G(-) stain red 6. Name the 2 different types of media used to identify or differentiate between bacteria ad some examples of each. • Differential - Identity of an organism - e.g. Macconkey inhibits growth of G(+) and supports G(-) growth, especially GIT orgs; CHROM differentiates betw Candida spp • Selective - select specific bacteria from mixed cultures - e.g. Thayer-Martin allows Neisseria to grow 7. Name the 2 types of biochemical tests and what the results tell us. • 1. Coagulase - if (+) the org is S. aureus; if (-) the org is other Staph spp • 2. Catalase - if (+) the org is staphylococci; if (-) the org is streptococci 8. What is the purpose of the Lancefield serogroup test? To group Strep spp. It can tell us where the infx came from. 9. What do respiration/fermentation tests tell us? • if a bacteria has the ability to use lactose or glucose to produce acid or alcohol • e.g. of non-fermenters - Pseudomonas, Acinetobacter 10. What does a hemolysis test on blood agar tell us about a bacteria? • If alpha, they are partially hemolytic - a small zone is cleared. e.g. S. pneumoniae • If beta, they are completely hemolytic - a large zone is cleared. e.g. S.pyogenes • If gamma, they are not hemolytic. 11. What do serologic tests detect? • Nonspecific or specific antibodies • Presence and quantity can aid in identification of pathogen 12. If an unknown bacteria is a cluster of G+ cocci, what test might be used to determine the identity? • A coagulase test. • If (+) they'd probably be Staph aureus • If (-) they'd probably be Staph epidermidis 13. If an unknown G+ bacteria is cocci in pairs or chains, what is its likely identity? • Streptococci or Enterococcus • If they are Streptococci, they could be Alpha or Beta hemolytic. • If Alpha, likely identity is S. pneumoniae or Viridans group • If Beta, Group A may be S pyogenes, Group B may be S. agalactiae, Group D may be S. bovis, or others 14. Gram + bacilli are unusual, but what are some of the more likely of this type of bacteria we may encounter? • Bacillus anthracis • Corynebacterium diptheriae • Gardnerella vaginalis • Listeria monocytogenes 15. Gram negative bacilli are usually what type of bacteria? 16. Examples of coliform enterobacteriaceae • E. coli • Klebsiella spp • Enterobacter • Serratia 17. Examples of non-coliform enterobacteriaecae • Proteus spp • Salmonella spp 18. Are enterobacteriaceae fermentors or non-fermentors? 19. Name some non-fermentors • P. aeruginosa • Acinetobacter 20. Is Neisseria G(+) or (-)? Aerobic or anaerobic? Cocci or Bacilli? Aerobic G(-) cocci 21. Name 3 G(+) anaerobes • Clostridium • Peptostreptococcus • Propionibacterium acnes 22. Name one G(-) anaerobe and why it is a concern • Bacteroides fragilis • Concerning because it is inherently resistant to Abx 23. Name 3 atypical bacteria and the reason they're considered atypical • Chlamydia spp - cell wall similar to G- but lack peptidoglycan • Mycoplasma spp - lack a cell wall • Legionella spp - G- but difficult to stain; difficult to grow on standard media; use serologic testing to identify 24. What is MIC? What is MBC? • Minimum Inhibitory Concentration - the lowest conc of an agt that inhibits the visible growth of an organism • Minimum Bactericidal Concentration - the lowest conc of an agt that results in a 99.9% reduction in colony forming units (kills the bacteria) 25. What does a bimodal susceptibility distribution indicate? 26. If the MBC is ______ times the MIC, the organism is tolerant 27. What are breakpoint values? • they help evaluate MIC results and guide clinical decisions • based on pkin and pdyn of drug, MIC distribution in the bacteria population, clinical efficacy • tell if bacteria is susceptible, intermediate, or resistant to particular drugs 28. What is an antibiogram? a table telling the bug, drug, % susceptibility to various drugs 29. Is the true MIC ever determined? 30. Define virulence and virulence factors • Virulence is a quantitative measurement of pathogenicity - the likelihood a pathogen will cause a disease • Virulence factors are factors that allow a microbe to establish itself on or in a host and enhance its potential to cause disease 31. What are the 5 steps of pathogenesis? • 1. Colonize the host • 2. Gain access to the host • 3. find a niche within the host • 4. Evade host defenses • 5. Multiply within the host 32. What are adhesions? Name 4. • Microbial structures that mediate adherence of binding of a microbe to the host. Susceptible hosts have receptors for the adhesions. • 1. fimbriae/pili • 2. lectins • 3. lipids • 4. mechanical 33. Why might microbes produce biofilms? What are 2 pathogens that commonly produce biofilms? • to facilitate binding to target cells • to elude host defenses and Abx • Pseudomonas • Staph aureus 34. How does a microbe maintain viability once inside a host? • Must evade host defenses by: • Producing antiphagocytic capsule • Producing toxins or destructive enzymes • Stealth 35. What are exotoxins? What are endotoxins? • Exotoxins - bacterial proteins that the bacterium releases during exponential growth that are toxic for target cells • Endotoxins - intracellular and cell-associated toxic components of G(-) microbes - lipopolysaccharides 36. List 3 factors that have contributed to the emergence of antimicrobial resistance • 1. Inappropriate antibiotic use by clinicians • 2. lack of pt education or ineffective education • 3. widespread antimicrobial use in the food production industry 37. Difference between primary and secondary resistance • Primary is naturally occurring and no exposure to antimicrobials is required; secondary follows exposure to antimicrobials • Primary is predictable; secondary is not • Primary is also known as inherent, intrinsic, or native; secondary is also known as acquired 38. How does secondary resistance come about? • Selection of resistant subpopulations • Genetic alterations - spontaneous mutations or acquisition of new genetic material 39. List 3 common mechanisms of antimicrobial resistance • 1. antibiotic inactivating enzymes • 2. alteration of antimicrobial target or active site • 3. alterations in bacterial cellular membranes 40. how do beta-lactamases work? inactivate beta-lactam antibiotics by splitting the beta-lactam ring at the amide bond 41. What are ESBLs and what are they active against? • Extended-spectrum beta-lactamases • Active vs. all beta lactams except cephamycins, cefepime, carbapenems • Inhibited by beta-lactamase inhibitors such as sulbactam, clavulanate, and tazobactam 42. Are AmpC-type beta-lactamases inhibited by beta-lactamase inhibitors? 43. Examples of resistance by alteration of the antimicrobial target or active site • penicillin binding proteins (PBPs) • ribosomal binding sites • cell wall precursors • DNA gyrase 44. Examples of resistance by alterations in bacterial cellular membranes • porin channels (change in # or size) • transport proteins • efflux pumps 45. What is MRSA's resistance secondary to? What is the treatment of choice? • altered PBP • vancomycin (linezolid and daptomycin may also be used) 46. What may be a good treatment option for VISA? 47. What therapy is necessary for a cidal effect in enterococcus? Name 3 treatment strategies. • combo therapy with an aminoglycoside (with penicillin or vanco - these are static alone) • 1. vanco, linezolid, daptomycin, and streptogramins • 2. intermittent vs. continuous infusions of beta-lactams and vanco • 3. traditional vs once-daily dosing of AGs 48. List 6 strategies to prevent the spread of antibiotic resistance • 1. patient education • 2. knowledge of local susceptibility patterns • 3. prescriber education • 4. develop guidelines for appropriate antimicrobial usage • 5. vaccination • 6. hand washing 49. Can penicillins still work in pen-resistant S. pneumoniae? 50. Do AGs exhibit time-dependent or concentration-dependent bactericidal activity? 51. What are the 2 major toxicities assoc with AGs? What factor is best correlated to toxicity? • ototoxicity & nephrotoxicity • prolonged course of AG tx 52. What are the main goals of high-dose, extended-interval (once daily) AG dosing? How is the dosing interval determined? • Optimize bactericidal activity • Minimize toxicity • Dosing interval determined and evaluated using a nomogram • (basically a LD is given every time and the conc goes down to 0 in between doses each time) 53. How many half-lives does it take to reach steady state? approx 5 (assuming renal fxn is stable) 54. How do we empirically dose vanco? • based on pt's weight (TBW) and CrCl • using nomogram 55. Does Vanco exhibit concentration-dependent or concentration-independent killing? concentration-independent (time-dependent) - time above MIC 56. What are the usual vanco target drug concentrations? Trough: 5-20 mg/ml 57. What is "red man syndrome"? How can it be prevented? • Hypotensive rxn assoc with rapid infusion of vancomycin. D/T a vanco-induced histamine release. • Prevent by slowing the infusion and/or premedicating with an antihistamine 58. A pt has a sinus infx susceptible to both amoxicillin and ampicillin. Which do you choose and why? Amoxicillin because it has better bioavailability, you can give it with or without food, there is less frequent dosing than with ampicillin (bid or tid as opposed to qid) 59. An MD wants to prescribe Augmentin 500 mg TID for a pt with recurrent sinusitis. The pt can't swallow Augmentin 500 mg tabs. He writes for Augmentin 250 mg 2 tabs TID. Is this a good idea? Why? No. Too much clavulanic acid - leads to diarrhea. 60. A pt has a severe pen allergy. Can the pt receive azetreonam? A carbapenem? • Aztreonam yes • Carbapenem no 61. Which FQs inhibit DNA gyrase? Topoisomerase IV? What is the advantage of inhibiting Topo IV? • All FQs inhibit DNA gyrase • 3rd and 4th Generation FQs inhibit Topo IV • Advantage - less resistance and enhanced G(+) activity 62. Why shouldn't pediatric pts generally receive FQs? Which pediatric pts sometimes receive FQs? • Because they can cause cartilage malformations • CF patients 63. A pt develops a sternal wound infx following bypass surgery after an acute MI. He is placed on vanco. The pt is now complaining of severe itching on his face and neck. The nurse just hung the vanco bag on this pt about 10 minutes ago. He has been receiving vanco for about 7 days. What is the most plausible explanation for this event? How can you treat/prevent this rxn? • Red Man Syndrome • slow rate of infusion, give diphenhydramine, give fluids, dilute, change Abx 64. What is the difference in indications for vanco PO and IV? • PO is for C. diff • IV is for G(+) resistant infx like MRSA and MRSE 65. Describe the ototoxicity and nephrotoxicity that can occur with AGs • Ototoxicity - Cochlear and Vestibular - May or may not be reversible. • Nephrotoxicity - selectively toxic to proximal tubule - can cause acute tubular necrosis and glomerular nephrotoxicity • Related to prolonged duration of therapy or concurrent ototoxic or nephrotoxic drugs 66. Which macrolide would you not use for bacteremia because of its extensive tissue penetration? 67. Why should you drink a full glass of water with TCs and not take any doses at bedtime? to prevent esophageal ulcerations 68. Which of the following Abx can be used to treat CAP in a pt on antiarrhythmics? moxifloxacin, azithromycin, doxycycline no, no, yes 69. You have a pt on clindamycin who developed severe diarrhea and is C difficile (+) by toxin assay. How would you manage the diarrhea? List abx that can be used to treat AAD. • Stop the clindamycin • Give metronidazole 1st line PO x 10 days • Vanco is 2nd line x 10 days 70. List unique SEs of metronidazole. What drug intx would you caution a pt about? • furry tongue feeling, abnormal taste, peripheral neuropathy • counsel about dirulfiram-like rxn with alcohol 71. What are rifampin's indications for use? Why isn't rifampin ever used alone to treat an infection? • Indicated for TB, and for asymptomatic carriers of N. meningidites, in combo for synergy in G(+) infx • Combo with vanco or penicillin for endocarditis or osteomyelitis • Increased chance of resistance 72. If a pt is allergic to Bactrim what other non-abx drugs may they also be allergic to? diuretics, celecoxib, sulfonylureas 73. Statins should be stopped for pts on which abx because of the risk on increased CPK/myopathy 74. Which abx has an increased risk of serotonin syndrome if given concomitantly with SSRIs or MAOIs? 75. Which abx is available PO for the treatment of hospital-acquired MRSA/MRSE? 76. Which abx are assoc with dysglycemia? 77. Which abx exhibit concentration-dependent killing? • AGs • FQs • Metronidazole • Amphotericin B • Daptomycin 78. Which abx exhibit concentration-independent killing? • Beta-lactams • Glycopeptides (e.g. Vanco, teicoplanin) • Clindamycin • Macrolides • Fluconazole 79. What DI should you warn young women about with all antibiotics? • Decreased efficacy of OCs • Especially with rifampin • Use backup for duration of abx therapy plus add'l 7 days 80. Which antibiotics interact with warfarin most significantly? bactrim and flagyl 81. Which antibiotics can discolor urine? • nitrofurantoin • rifampin • metronidazole 82. Which Abx cause photosensitivity? • FQs • TCs • sulfonamides 83. Which Abx require therapeutic drug level monitoring? • AGs • Vanco IV • chloramphenicol 84. Which abx is telithromycin related to? Which abx is tigecycline related to? Which abx is tinidazole related to? • telithromycin - macrolides • tigecycline - tetracyclines • tinidazole - metronidazole 85. Which abx inhibit bacterial cell wall synthesis? • beta-lactams • vanco 86. Which abx inhibit protein synthesis? • AGs • TCs • glycocyclines, chloramphenicol • macrolides • synercid • etc. 87. Which abx are pregnancy category B? • beta-lactams • nitrofurantoin • macrolides (but not clarithromycin) • dlindamycin • metronidazole (but not in the 1st trimester) • sulfonamides (except in the 3rd trimester) • daptomycin 88. Are beta-lactams BS or BC? What is their MOA? • Bactericidal • Inhibit cell wall synthesis by binding to PBPs leading to the bacteria having a weak cell wall which becomes leaky and then bursts 89. What penicillin combos are antipseudomonal? • ticarcillin/potassium clavulanate • piperacillin/tazobactam sodium 90. What is the monobactam used in combo with AGs to fight pseudomonas? 91. Which carbapenems are antipseudomonal? • imipenem/cilastatin • meropenem 92. Which PCN is the DOC for otitis media and acute sinusitis? 93. What abx are the DOC in pregnancy? 94. How do penicillins produce a DI with warfarin? they suppress the gut bacteria that produce Vitamin K 95. Which cephalosporin is ok to use in neonates? 96. Which cephs are antipseudomonal? • ceftazidime (3rd Gen) • cefepime (4th Gen) 97. What is the purpose of cilastatin in combo with imipenem? • It has no antibacterial activity • Its role is to prevent renal tubular damage from imipenem 98. What is the MOA of aminoglycosides? • Bactericidal • Inhibits bacterial protein synthesis • Has long PAE vs. G(-) organisms 99. For G(+) aerobes gentamicin has synergy with which abx? vanco or a penicillin 100. What is the MOA of fluoroquinolones? • Bactericidal • Inhibits DNA gyrase (Topo II) • 3rd and 4th Gen also inhibit Topo IV • Possess PAE for all bacteria 101. What is the BBW for FQs? Tendonitis and tendon rupture 102. Which class of Abx can cause crystalluria, QT prolongation and dysglycemia? 103. DIs with FQs • Warfarin • multivalent cations • calcium • antiarrhythmics • sulfonylureas 104. MOA of vancomycin • BC and BS (depending on the organism) • Inhibits bacterial cell wall synthesis 105. What rate should infusion of vanco be limited to in order to avoid redman syndrome? give 1 gram no faster than over 1 hour 106. What toxicities can vanco cause? nephro and oto 107. MOA of macrolides/azalides and ketolides inhibit protein synthesis 108. Which antibiotic classes are good for covering atypical organisms such as mycoplasma, legionella, chlamydiae, and protozoa? • macrolides • FQs 109. clarithromycin is the DOC for which organisms? • MAC • H. pylori 110. DOC for CAP 111. Which abx can cause QT prolongation? • FQs • Macrolides 112. MOA of tetracyclines • inhibit protein synthesis • bacteriostatic 113. What class of abx is the DOC for lyme disease and rocky mountain spotted fever? 114. Which abx have the SE of discoloration of teeth/depression of bone and teeth development? 115. MOA of sulfonamides • competitive antagonism of PABA synthesis so bacteria cannot make folic acid • bacteriostatic 116. DIs with sulfonamides • diuretics • celecoxib • sulfonylureas 117. What is kernicterus and what abx can cause it? • a yellow staining of parts of the brain d/t increased unbound drug in the neonate because of neonate's inability to conjugate bilirubin • sulfonamides - they displace bilirubin from protein, resulting in increased free bilirubin 118. Sulfas inhibit 2C9 which can lead to significant intx with what drug? What must be monitored? • warfarin • monitor INR carefully 119. MOA of trimethoprim inhibits dihydrofolate reductase 120. Only indication for trimethoprim 121. MOA of lincosamides Inhibit bacterial protein synthesis 122. What is the BBW on clindamycin? severe and possibly fatal colitis 123. MOA of metronidazole • toxic to bacterial RNA and DNA • bactericidal to anaerobes (no activity vs. aerobes) 124. What is the BBW on metronidazole? possible carcinogenicity 125. MOA of rifampin • inhibits DNA-dependent RNA polymerase • never used alone d/t rapid development of resistance 126. What is a unique SE of rifampin? reddish-orange discoloration of urine, stool, saliva, tears (permanent discoloration of contacts), sweat, sputum 127. What abx is non-systemic and a derivative of rifamycin? 128. Indications for nitrofurantoin 129. SEs of nitrofurantoin • discolors urine brown • pulmonary toxicity • G6P deficiency hemolytic anemia 130. BBW for chloramphenicol bone marrow suppression 131. Which abx can cause gray baby syndrome? 132. What 4 elements make up the basis of pharmacokinetics? • absorption • distribution • metabolism • elimination 133. How does concentration-dependent bactericidal activity work? What is the goal? • The rate and/or extent of activity increases with increasing concentration of the antimicrobial • Goal is to optimize the peak:MIC ratio • These agents have a shallow dose-response curve 134. How does non-concentration-dependent bactericidal activity work? What is the goal? • the rate and extent of bacterial killing is not significantly influenced by increasing antimicrobial concentrations - it is increased by the length of drug exposure (time-dependent killing) • Goal is to optimize the time above the MIC (time > MIC) 135. Four factors that influence the PAE • microorganism • antimicrobial • length of antimicrobial exposure • antimicrobial concentration 136. Agents that exhibit concentration-dependent bactericidal activity and have relatively long PAEs should be administered as ________________ doses to optimize the peak:MIC ratio large infrequent doses 137. If a peak:MIC ratio of 10-20:1 cannot be reached, which parameter best correlates with outcome? • AUC:MIC • want it to be >100:1 138. How should agents with concentration-independent killing and relatively short or no PAEs be dosed? • in order to maximize the amount of time at or above the MIC • small frequent doses or continuous infusion 139. Define PAE post antibiotic effect - a persistent suppression of bacterial growth following a brief exposure to an antimicrobial 140. 7 patient risk factors for pneumonia • 1. altered consciousness (stroke, intoxication, seizure, sleep) • 2. cigarette smoking • 3. advanced age • 4. underlying medical conditions • 5. intubation • 6. recent viral respiratory tract infx • 7. HIV/AIDS 141. S/S of pneumonia • fever or hypothermia • rigors • sweats • new cough with or without sputum production • chest discomfort • dyspnea 142. Can pneumonia be diagnosed based on symptoms? 143. According to PORT scores, which risk classes treat pts as inpatients, and which treat as outpatients? • Risk Class I, II: outpatient • Risk Class III: outpatient or brief inpatient • Risk Class IV, V: inpatient 144. Explain the CURB-65 Index and what it is used for • Used to determine need for hospitalization and need for ICU admission • Score based on how many of the following a patient has: • Confusion • BUN > 20 mg/dL • Resp Rate >/= 30 breaths/min • Low BP (systolic < 90 or diastolic </= 60) • Age >/= 65 years • If the score is 0-1 treat as outpatient • If the score is 2 admit to ward • If the score is 3 or more admit to ICU 145. Risk factors for drug-resistant S.pneumoniae • extremes of age (< 5 or > 65) • antibiotic use within the past 3 months • exposure to a child in daycare • alcoholism • immunosuppression • recurrent otitis media • recent hospitalization • multiple medical comorbidities 146. Outpatient treatment for pneumonia • If no recent Abx exposure, treat with macrolide (azithromycin or clarithromycin) or doxycycline • If pt has comorbidities or Abx exposure within last 3 months, treat with macrolide plus high-dose amoxicillin (or amox/clav) OR a FQ (levo, moxi, gemi) 147. Inpatient treatment of pneumonia in the medical ward • Same if pt has had recent abx exposure or not. • Macrolide plus beta-lactam OR FQ • Options for beta-lactams - cefotaxime, ceftriaxone, ampicillin/sulbactam, ertapenem 148. Inpatient treatment of pneumonia in the ICU • If Pseudomonas infx is not an issue, give a beta lactam + either a macrolide or a FQ • If Pseudomonas infx is an issue, give Anti-pseudomonal agt plus ciprofloxacin, OR an Antipseudomonal agt plus an AG + a FQ or macrolide Antipseudomonal agents are piperacillin/tazobactam, imipenem, meropenem, cefepime 149. Organisms likely to cause pneumonia S. pneumoniae, M. pneumoniae, C. pneumoniae, H. influenzae 150. What is the minimum duration of therapy for pneumonia? How long should a pt be afebrile? • Min 5 days • afebrile for at least 48-72 hours 151. CAP assoc signs of clinical instability • temp > 37.8 • pulse > 100 bpm • resp rate > 24 breaths/min • systolic bp < 90 • O2 sat < 90% • inability to maintain oral intake • mental status changes 152. What is HAP hospital acquired pneumonia - it occurs 48 h or more after admission and was not incubating at the time of admission 153. What is VAP? ventilator-associated pneumonia - it arises more than 48-72 hours after endotracheal intubation 154. What is HCAP? Healthcare associated pneumonia 155. Risk factors for HCAP • pt hospitalized in an acute care hospital for > 2 days within 90 days of infection • pt resided in a nursing home or LTC facility • Pt received recent IV Abx, chemotherapy, or wound care within the past 30 days • pt attended a hospital or hemodialysis clinic 156. Empiric antibiotic therapy for nosocomial pneumonia • if not late onset or no risk factors for MDR pathogens, treat with ceftriaxone, FQ, Amp/sulbactam, or ertapenem • if late onset (>/= 5 days) or risk factors for MDR pathogens, give an anti-psa ceph, or an anti-psa carbapenem, or pip/tazo PLUS an anti-psa FQ or an AG (also give vanco or linezolid if MRSA is suspected) 157. What should be ordered in all pts with suspected pneumonia? • a chest x-ray - helpful with diagnosis, assessing need for hospitalization, and possible etiology • note: a CXR is not very valuable for monitoring pt response to therapy b/c it lags behind the clinical picture by about 3 days 158. What are the major antigenic determinants of influenza A viruses? • hemagglutinin - mediates attachment and entry of virus into host cells • neuraminidase - facilitates the spread of virons 159. 3 steps in the pathogenesis of influenza • 1. virus enters human via inhalation of virus-containing respiratory secretions • 2. Virus is internalized in resp tract epithelial cells • 3. Replicates within cells and is then released throughout the body 160. Clinical course of influenza • 1-4 days of incubation • abrupt onset of sx • fever, chills, headache, myalgia, persist for about 3 days • resp sx may persist 3-4 d after fever subsides • convalescence 1-2 weeks 161. What is the duration of infectivity for influenza? • 5 days after illness onset for adults • Children shed virus for several days before onset to > 10 days after onset of sx 162. What is ILI? • influenza-like illness • characterized by a fever AND a cough AND/OR a sore throat in the absence of a known cause 163. What drugs are approved for treatment and prophylaxis of influenza? • Neuraminidase inhibitors (oseltamivir and zanamivir) • must be administered within 48 h of symptom onset 164. Which influenza medication is safe in pregnancy? oseltamivir (Tamiflu) 165. Which influenza med is CI'd in asthma pts? zanamavir (Relenza) 166. who should receive the influenza vaccine? • anyone who wants to reduce the risk of getting influenza • kids 6 mo - 18 yr • those > 50 years old • pregnant women • those with chronic medical conditions • immunosuppressed pts • residents of LTC facilities • those with conditions that increase risk of aspiration • persons who live with or care for high-risk persons (health care workers, household contacts of those < 5 and > 50 years, esp those < 6 mo, or with other high risk conditions) 167. What are the different ways to classify intraabdominal infx? • 1. by location - can be localized (e.g. abscess, abdominal penetration trauma wound) or generalized (e.g. peritonitis) • 2. by complexity - can be uncomplicated (involving single site/organ, not into peritoneal cavity - e.g. appendicitis, cholecystitis) or complicated (involving several sites/organs in add'n to source of infx; infx extends into peritoneal cavity - e.g. peritonitis, intra-abdominal abscess) • 3. by acquisition locale - can be community-acquired or health-care associated (nosocomial) 168. Which type of IAIs usually require both source control and antimicrobial therapy? complicated IAI 169. Community-onset health care-associated (IAI) infx include cases involving pts with at least one of the following health care risk factors. How is hospital-onset infx different? • 1. presence of an invasive device at time of admission • 2. hx of MRSA infx or colonization • 3. hx of surgery, hospitalization, dialysis, or residence in a LTCF in the 12 mo preceding the culture date Hospital-onset infx - pts have positive culture from a normally sterile site obtained more than 48 h after admission to hospital 170. Is appendicitis complicated or uncomplicated? How is it treated? • usually uncomplicated • managed by surgical intervention 171. What is cholecystitis? sudden inflammation of gallbladder (often not infectious) 172. When does IAI result from diverticulitis? When a perforation occurs and colonic contents move into the peritoneal cavity 173. How is peritonitis classified? • Primary: aka SBP (spontaneous bacterial peritonitis) - no identified source - in adults with liver disease and/or ascites • Secondary: most common form - almost always community-acquired - may affect anyone • Tertiary: complication of improperly managed primary or secondary peritonitis or other abdominal medical procedures - healthcare facility-acquired - occurs in critically ill or immunocompromised pts • Peritoneal-dialysis associated: only in pts who receive peritoneal dialysis 174. Common causes of peritonitis and abscess • appendicitis • diverticulitis • IBD • gastrointestinal cancer 175. Which classes of peritonitis require urgent medical attention? • all of them require urgent medical attention • pts with secondary and tertiary are usually in acute distress and their conditions deteriorate rapidly • pts with primary or peritoneal dialysis-associated are not usually in acute distress 176. What is ileus? the absence of peristalsis in the intestine 177. because primary peritonitis (SBP) has highly variable and non-specific presentation, how is it diagnosed? When do we initiate empiric antibiotic treatment? • Must use paracentesis with lab testing of the ascites to confirm diagnosis • PMN cell count of > 250/mm3 is diagnostic of SBP and warrants empiric antibiotic therapy 178. What can happen in severe cases of IAI? • third-spacing • abdominal distension • ileus • hypovolemia • septic shock • bacteremia • if no intervention is performed, multi-organ failures, severe systemic inflammatory response (SIRS), death 179. What are the most common anaerobes involved in peritonitis? Bacteroides spp 180. Describe the microbiology of IAI • Primary (SBP): usually monomicrobial, common orgs are Streptococci spp, E. coli, and Klebsiella spp • Secondary: usually polymicrobial with a mix of aerobic and anaerobic bacteria • Tertiary: associated with nosocomial microbes such as MRSA, VRE, Pseudomonas, coagulase-negative staph, candida (fungi), and those assoc with secondary • Peritoneal dialysis-associated: often involves enteric organisms and those found on the skin such as staph • Abscess: anaerobes commonly 181. What is the typical treatment for uncomplicated IAIs? • surgical source control only • antimicrobials not required unless there is anticipated complication • For appendicitis only prophylactic and perioperative abx for the surgery are required - no full course of routine abx is necessary • For bowel injuries d/t penetrating or blunt trauma that are repaired within 12 hours and with no complications, antibiotics should be used for less than 24 hours post surgery (and prophylactic and perioperative abx) 182. Treatment for abscess • surgical drainage • abx therapy is just an adjuvant 183. Treatment for secondary or tertiary peritonitis • IV fluids • Infx source control • Empiric IV abx ASAP • 4-7 day course of abx therapy 184. Treatment for SBP • May need IV fluids and/or surgical source control • If fluid from ascites confirms diagnosis of SBP (PMN > 250) abx therapy is needed • DOC is IV cefotaxime • beta lactam/beta lactamase inhibitor combos and carbapenems would work but are too broad spectrum, so are inappropriate as empiric tx. Also avoid AGs. • Optimal duration of therapy is 5 days minimum 185. What is the treatment for peritoneal dialysis-assoc peritonitis? • may need IV fluids and surgical source control • culture the dialysate to id the orgs, then determine abx susceptibilities • empiric IV abx - followed by monotx with vanco, or a 1st gen ceph (e.g. cefazolin) given IP (would use vanco if pt is allergic to pens or if MRSA is suspected or confirmed) • If more severe, can add AG given IP to the ceph • Can admin the abx QD (intermittent dosing), and the dwell time must exceed 6 hours each time • Duration of tx is usually 10-14 days 186. For IP abx therapy which abx are ok to mix in the same dialysis solution? Which should not and why? • vanco, AGs, cephs can all be mixed in same dialysis sol'n • AGs should not be mixed with pens because of chemical incompatibility (acid/base rxn) 187. What is the duration of therapy for community-acquired peritonitis? 4-7 days 188. What abx is the main component in combo therapy for community-acquired IAI? Which agents should not be used? • metronidazole is main component (mostly used with a ceph or levo) • Don't use amp/sulbactam d/t E.coli resistance, cefotetan and clindamycin d/t Bacteroides resistance, AGs b/c other agents are less toxic and equally or more effective • Empiric antifungal tx is not necessary • Don't use oral agents initially 189. Appropriate options for healthcare-acquired complicated IAI (tertiary peritonitis) • should have broad coverage, including Pseudomonas • Anti-psa B-lactam/B-lactamase inhibitor combo: piperacillin/tazobactam • Anti-psa carbapenems: imipenem/cilastatin, meropenem, doripenem • Anti-psa ceph + metronidazole: cefepime or ceftazidime • Anti-psa FQ + metronidazole: cipro or levo • Add vanco @ institutions with high incidence of MRSA/MRSE or if pt has hx of colonization 190. When would anti-fungal therapy be indicated in healthcare-acquired complicated IAI? Which agents? • if pt is immunocompromised, has recurrent IAI, or failure to respond to appropriate initial therapy • echinocandins or azole antifungals 191. Which type of peritonitis usually does not require culturing, speciation, and determination of antibiotic susceptibility? Community-acquired (secondary peritonitis) - the empiric therapy is often maintained for the full course of abx treatment unless there is intolerance or complications 192. What is the duration of therapy for each type of peritonitis? • primary - 5 d minimum • secondary - 4-7 d • tertiary - 4-7 d • dialysis-assoc - 10-14 d • abscess - abx are only adjuvant 193. What type of pneumococcal test is warranted for all pts admitted to the ICU? pneumococcal urinary antigen test 194. What type of peritonitis might require prophylactic abx? primary (SBP) Card Set Information Therapeutics 523 Final Overview I 2011-05-29 01:13:59 Therapeutics Final Overview Therapeutics 523 Final Exam Overview I Show Answers: What would you like to do? Home > Flashcards > Print Preview
P.E Chapter 7 Training Methods Home > Preview The flashcards below were created by user jt.mcrae on FreezingBlue Flashcards. 1. What is continuos training? Slow distance activities designed to improve aerobic fitness 2. What is interval training? Periods of wrok followed by periods of rest. Excellent for activities that involved interplay of energy systems 3. What is resistance (weight) training? • Movement of a load by a particular muscle group or groups to improve strength, power or speed • -isotonic • -isometric • -isokenetic 4. What is flexibility training? • Stretching of individual muscles to allow a greater range of movement at the joint • -PNF • -passive • -active • -ballistic 5. What is plyometric training? Explosive movements such as skipping, resulting in lengthening and shortening the muscles. Improves power 6. What is circuit traning? • A sequence of activites that are specific to certain fitness components and energy system requirements for a sport or activity • Can train a number of F.C or E.S at once 7. What is Fartlek training? • Slow distance activities interspersed with bouts of high intensity efforts such as sprints • Improves aerobic system 8. What is speed training? For sports and events where specific whole body or part body speed is needed 9. What is core-stabilization training? Training of the underlying muscles of the lower spine and middle trunk areas Card Set Information P.E Chapter 7 Training Methods 2011-08-10 01:33:58 Chapter Training Methods P.E Chapter 7 Training Methods Show Answers: What would you like to do? Home > Flashcards > Print Preview
Thursday, August 12, 2010 A Greek Tragedy of an extinct Drachma Coin reminiscing ancient Hellenic glory with Aristotle’s image Greece has been the centre of a ancient Hellenic civilization which spread all over the known world in wake of the rise of Alexander of Macedonia in the fourth century B.C.; spreading it right from Greece to Persia, Egypt, Central Asia right till the North-West frontier of the Indian subcontinent as a direct result of Alexander's expansionist campaign. There was significant change in the world of Numismatics in the wake of Alexander’s campaign when many states began adopting the Greek Attic standard of drachms (one drachm approx. 4.37 gm) under the aegis of the Seleucid Empire which rose after Alexander's death across these territories. India too adopted the drachm as a unit of its numismatic weight system first under the Kushans (1st Century to 3rd Century A.D.) who replaced the Indo-Greek rulers of the North-Western India and then under the Imperial Gupta dynasty in the 4th Century A.D. The drachma survived as a name of a unit of coin weight in most Indian languages till the early medieval period as ‘dramma’ which was eventually corrupted to ‘daam’ during Akbar’s reign (r.1556-1605) till it became the term for the price of an item in later day Hindi. Thus, the Greek drachma played a seminal role in the evolution of coins of the world in its initial gestational period. Cut to the twenty-first century, Greece is a modern state with a flourishing economy benefitting from its shipping industry, tourism, exports, etc. However, the Greek economy has seen its economy floundering under the worst ever crisis in 2009-10 causing it to lean on more prosperous and stable members of the European Union and earning their ire. Worse still, today Greece doesn’t even have its own independent currency, the Euro having replaced the indigenous drachma in 2001. This sad state of affairs is similar to Alexander's expansionism albeit the expansion is under the European Union engulfing the first super state of European civilisation, Greece. I came across a 5 Drachma coin in my collection having inscriptions in Greek alphabet on its obverse (image on left) written from 7’0 Clock position as ‘ΕΛΛHNIKH ΔHMOKPATIA’ read as ELLENIKE DEMOKRATIA in Roman alphabet meaning ‘Hellenic Republic’ Greece’s official name today. The centre has its denomination written as ‘5 DPAXMAI’ read as ‘5 DRACHMAI’ in Roman alphabet or plainly 5 Drachma. The date of the coin is given as 1976. The reverse (image on right) has the image of Greek polymath, Aristotle who amongst his many other interests was also a student of another great Greek philosopher, Plato and a teacher to Alexander of Macedon. The Greek legend on the coin is spelt as ‘APIΣTOTEΛHΣ’ transliterated as ‘ARISTOTELES’ in Roman alphabet or plain ‘ARISTOTLES’ The Drachma was revived with the establishment of the modern state of Greece in 1832 and was issued in three different phases between the two world wars. The third phase coincided with Greece’s domestic crisis in the form of the rule of a military junta between 1967 and 1974. In 1976, after the fall of the military junta and the installation of a new parliament of the Hellenic Republic, a new series of eight denomination coins carrying images of ancient heroes of the Greek nation was issued and this tiny cupro-nickel coin was a part of that historic series. Hence, this coin today represents a crisis in the world of coins where larger economic interests are subsuming indigenous coinage at a very large cost of loss of national and cultural identities. A Pan-Asian currency, anyone? Tuesday, August 10, 2010 Morocco’s M.A.D. Dirham issued in 1974 by King Hassan II Morocco is a land with a unique history with episodes of clashes between the Western and Arabic civilisations due to its strategic location at the farthest tip of North Africa bordering with Spain and other Mediterranean countries. In the medieval period, Morocco was a part of a geo-political entity known to the Arabs as ‘Maghreb’ literally the 'Land of the setting Sun' or the Western Land including other North African countries like Algeria, Tunisia, Libya, Mauritania and parts of the Western Sahara desert. Medieval geographers referred to Morocco as 'Al-Maghrib al Aqşá' 'The Farthest West', to distinguish it from it immediate neighbours in the West. In modern times, the Moroccan government invoked this historical identity by adopting the official name ‘al-Mamlaka al Maghrebiyya’ on all its communications including its coinage. Morocco has been ruled by the Alaouite dynasty which has ruled its territories since 1666; however, the Alaouite ruler, Sultan Abdel Hafid was forced to give up Morocco's sovereignty in 1912 turning it into a French protectorate under the Treaty of Fez. The next rulers ruled nominally under French tutelage till Morocco regained her independence in 1956 and became a constitutional monarchy under the leadership of King Mohammad V. He was succeeded by his son, Prince Mulay Hassan who took over as King Hassan II in 1961 and ruled till his death in 1999. I came across a coin with the legend ‘al-Mamlakatahu al-Maghrebiyya’ with the bust of a leader identified as Hassan II by the legend ‘Hassan al-Thani*' on the obverse. The coin is distinguished by a true-to-life portrait of Hassan II with a grim expression. The reverse features Morocco's coat-of-arms with the image of two lions upholding a crown and a shield with a star against the setting sun with the crest of the symbol enshrining a Quranic verse ‘An Tansar wa Allah Yansar Kam’ meaning ‘You defend Allah and Allah will defend you’**. The reverse states the denomination as ‘Wahid Dirham’ with the Roman numeral ‘1’ denoting its value as 1 Dirham; the Moroccan dirham’s international acronym lends it a strange connotation, M.A.D. The reverse of this coin has two dates in Roman numerals flanking the coat-of-arms; its date in the Common Era, 1974 and its date in Hijri era, 1394. Thus, this coin represents Morocco’s unique attempt to straddle between its modern and medieval identity as Morocco’s twin port cities of Casablanca and Tangier which attract hordes of Western tourists to its exotic beaches each summer, contribute to its bustling tourist economy in a major way. *Thani means Second in Arabic **This verse is seen on the actual coat-of-arms but is unclear on the coin’s image Monday, August 9, 2010 Egypt and Syria’s Pan-Arabic coin under the auspices of the United Arabic Republic in 1960 The period of 1950-60s saw political movements all around the Arabic world spanning 25 countries contained in the West Asia and North African regions to unite against the rising power of Zionist Israel under the banner of Pan-Arabism. The proponents of Pan-Arabism, alternatively called Arabic nationalism, viewed the world as divided into two parts, Arabic and non-Arabic and aimed to unite it all Arabic countries under a utopian welfare state with socialism as their main ideology. The most practical political achievement of this movement was the formation of political federations which were united against common enemies and interests. One such union was between Egypt and Syria under the auspices of the United Arabic Republic which began in 1958 under the leadership of the dynamic Egyptian leader, President Gamal Abdel Nasser and ended prematurely with the exit of Syria in 1961. I came across a coin with the Arabic legend ‘al-Jamhooriyat al-Arabiya Mutahidah’ on its obverse (see left image) in the upper line which is translated as ‘United Arabic Republic’ making it amply clear that the coin was a joint issue of Egypt and Syria under U.A.R. The central legend ascribes the denomination ’10 Qirush’ which was a sub-unit of the Eqyptian pound as 1 Egyptian Pound was equal to 100 Qirush. This Qirush is similar to the Ghirsh of the Saudi Arabian Riyal which we have discussed in the post of Saudi Arabia and is a remnant of the earlier Ottoman currency unit, Kuruş which in turn came from the Italian/Venetian silver Grossi, a coin which was the trade currency of the Middle East prior to the Venetian gold ducat or sequins in the early medieval era. An interesting feature of this coin is inclusion of the term ‘Suriyya’, the Arabic name of Syria, after the ‘10 Qirush’ indicating that this coin was probably issued for exclusive circulation in Syria only. The geopolitics of the U.A.R. doesn’t interests us here; however, it is interesting to know that the adoption of a common currency would have bound the two states for a longer period; however such a provincial approach to currency points to the fact that the leaders of the two countries were well aware of the temporary nature of the union. The reverse of the coin shows the coat-of-arms which displays an eagle known as ‘the Eagle of Saladin*’ bearing a shield against its chest with two stars; perched on the legend, ‘al-Jamhooriya al-Arabiyya Muttahidah’ (partially erased on this coin) and the year in common era 1960 on the left and in the Hijri era 1380 on the right in Arabic numerals. The 10 Qirush coin is a small denomination and was probably exchanged as small change in the Syrian territory for tea or small snack in 1960s. Today, we see that the Syrian Arabic Republic has adopted a variant of the emblem** as its coat-of-arms with a Syrian Hawk known as ‘Hawk of Qureish’ with the two stars intact albeit with two notable differences, the hawk’s head is turned to the right as opposed to left on our coin and the name of the republic has been changed to ‘al-Jamhooriyat al-Arabiyya Suriyya’ pointing to the evolution begun by this coin during its heyday in the markets of Damascus. * the legendary medieval ruler of Egypt and Syria **The evolution of this emblem can be seen on the link Saturday, August 7, 2010 Iraqi 10 Fils Coin from the Hasshemite dynasty period issued by Ghazi I I wish to present another Iraqi coin with the side profile of a ruler as a special feature in direct contrast to the Republican coin of the previous post. My hunch was that it was a ruler from the Hasshemite dynasty who ruled Iraq for four decades between and after the two World Wars. My hunch proved to be correct as the legend flanking the right side of the king’s profile on the obverse side read ‘Ghazi al-Awwal’ i.e. ‘Ghazi the First' proving that this coin was issued in the reign of King Ghazi I who ruled Iraq in the crucial period preceding the World War II. Ghazi I was the only son of King Faisal I who was the first Hasshemite ruler hailing from the clan of hereditary Sharifs of Mecca. Ghazi assumed regal authority in 1933 on the death of Faisal I and ruled Iraq till his untimely death in 1939 at the young age of 27 in a mysterious car crash; rumoured to be engineered by his all powerful Prime Minister, Nuri al-Said. Coming back to the coin in question, its reverse side has legends neatly divided into five segments; the central circle ascribes the denomination of 10 fils to the coin; the two side legends flanking the circle state the date, the left one 1938 in the common era and the right one, 1357 in Hijri era albeit in Arabic numerals; the upper and lower legends restate ‘al Mulkah al Iraqiyah’. The coin is a nickel one and was minted at the Royal Mint, London reflecting the close relations between the Hasshemite regime and the British even after their exit. Iraq did not submerge into anarchy after Ghazi's death because his 3 year old son, Faisal II was installed with Ghazi's cousin, Abd’allah serving as the Regent. Faisal II took over the throne after coming of age in 1953. However, he was killed in cold blood along with other members of the royal family after the coup d’état by General Abd’al Karim Qassim hailed as the ‘14th July Revolution’ ended the four decade long Hasshemite rule over Iraq. 10 Fils is a very small denomination as the Iraqi currency in Ghazi’ s regime had the following sub-units; 1 Dinar = 5 Riyals = 20 Dirham = 1000 Fils However, a small coin like the above, despite its low value, has again proved to be an invaluable tool for retracing the path of History in its own inimitable way. Wednesday, August 4, 2010 Iraqi Coin from Pre-Saddam Revolutionary Regime of Abdul Karim Qassim (1958-1963) A coin in my collection has a unique symbol of a starry Sun with a pair of swords on the inner circle with a sheaf of wheat at the centre (Left Image). Another interesting feature is a finely etched date read as ‘14 Tammuz 1958’ in the lower line making it very intriguing. The obverse inscription ‘al-Jamhooriyat al-Iraq’ (in the upper line) meaning ‘Republic of Iraq’ makes it amply clear that it is an Iraqi coin; other features on the obverse include the denomination ‘10 Falus’ and two dates ‘1959 and ‘1379’ in Arabic numerals. However, I soon reasoned that the former is the date of the coin in Christian era i.e. 1959 A.D. and the latter its Hijri era equivalent i.e. 1379 A.H. However, a search for Iraq’s connection with 1958 produced more interesting results; Iraq had a Revolution on 14 July 1958 which deposed its ruling monarchy of Hasshemite dynasty through an armed coup executed by a group of army officers with numerous grievances against the decadent regime. In modern consciousness, Iraq and its History has come to be conveniently divided into two neat blocks; Iraq under Saddam Hussein and the post-Saddam Hussein American occupation era; clearly overlooking the fact that the country has an ancient past stretching right from the Sumerian civilisation c. 4000 B.C. (which invented the world’s first writing system) till the medieval Islamic period of Abbasid Caliphate who established Baghdad as their capital city in A.D. 761. However, this golden period of Islamic culture came to an end when the Mongol warlord, Hulagu (Halaku) Khan massacred the last Abbasid Caliph, al-Musta’sim in A.D. 1257 and ended the Abbasid Caliphate in Iraq. Iraq was then subjected to a host of foreign invasions from the Mongols to Ottomans in fourteenth century who ruled it directly or by proxy till Iraq’s first invasion by a Western power, the British after the Ottomans lost to British in World War I; leading to Iraq’s inferior status as a British protectorate for over a decade and half. The British left Iraq in 1932 under the care of a monarchy headed by King Faisal I who founded the Hasshemite dynasty which ruled Iraq till July 14 1958 when a group of army officers overthrew King Faisal II under the leadership of Brigadier General Abd’al Karim Qassim. The coup was later celebrated by Qassim’s regime as ‘July 14 Revolution’. Qassim took over as the Prime Minister of Iraq and initiated a host of reforms in various fields like agriculture, women's rights and education; he ruled till his downfall and death after a coup by the Ba’ath Party in 1963. The ‘Sun with two sabre and sheaf of wheat’ emblem was adopted by Qassim’s regime as Iraq’s State emblem carefully avoided any Pan-Arabic or religious symbol and represents the regime’s reformist agenda as reflected by the sheaf of wheat. This coin thus in all probability symbolises a free and progressive Iraq which died a premature death at the hands of the Ba’ath Party supremacists who soon began to suppress all discontent like any dictatorial regime. It is anybody's guess if Iraq would have been a better place had the Qassim regime been allowed to pursue its progressive agenda peacefully! Image of state emblem courtesy: wikipedia
SupplyChain Example This example provides the infrastructure necessary to track physical objects in a real-world supply chain on the Sawtooth Ledger. Records are tracked on the Ledger, and are uniquely linked to the physical objects they represent. SupplyChain Overview Agents represent actors in the system. An Agent is expected most commonly to represent a company. Agents are identified by their public keys and any transactions an agent submits must be signed by the agent. Agents serve two roles in the system: owners and custodians. Owners are Agents that are the legal holders of the physical object a record represents. Custodians are Agents that have possesion of the physical object that a Record represents. Custodians may be transportation, logistics, warehousing companies, or any other company that has entered into an agreement to care for the item. The ledger representation of “Agents” is: // Agents are essentially public keys registered with a human readable name on // the chain. They will be able to create Records and submit Applications for // ownership or custodianship. message Agent { string identifier = 1; // the hex-encoded public key of the Agent string name = 2; // a human readable name // Container for on-chain Agents. // Allows multiple to be saved at a single address in case of hash collision. message AgentContainer { // List of Agents - more than one implies a state address collision repeated Agent entries = 1; Records represent physical objects in the world. Records are identified in the system by natural keys. These natural keys could be the serial number of the object, the RFID tag number, etc. Records keep a list of all the Owners and Custodians that have possessed the item: these records are stored in chronological order from oldest to most recent. The most recent is the current Agent in that role. Records may also be finalized. When a record is finalized it means the physical item has been consumed or destroyed and there can be no more updates to the Record. The ledger representation of “Records” is: // A Record tracks a physical item with a history of its owners and custodians. message Record { string identifier = 1; // the natural key of the record, serial number or // attached sensor identifier int64 creation_time = 2; // the time the record was created message AgentRecord { string agent_identifier = 1; // the public key of the agent int64 start_time = 2; // the time the agent started in the role repeated AgentRecord owners = 3; // list of the owners, ordered from oldest // to newest. The first by definition is the creator of the record. // The last is the current owner of the record. repeated AgentRecord custodians = 4; // ordered list of custodians. // Same ordering as the owners list. bool final = 5; // is the record finalized, finalized records cannot be // changed. // Container for on-chain Records. message RecordContainer { // List of Records - more than one implies a state address collision repeated Record entries = 1; Applications are the mechanism that Agents use to change roles (Owner or Custodian). Agents that wish to assume a new role for a Record create a new application that specifies the desired role. The current Agent in that role must then accept the Application before the Record is updated. This allows both Agents to assert their agreement to the change before the update is made. The applicant(proposing Agent) may cancel the Application or the current Agent may reject the Application if it is not wanted. The ledger representation of “Applications” is: // Applications are a request for ownership or custodianship of a Record. message Application { string record_identifier = 1; // the natural key of the record string applicant = 2; // public key of the applicant int64 creation_time = 3; // Whether this Application is a request for ownership or custodianship enum Type { OWNER = 0; CUSTODIAN = 1; Type type = 4; // The current acceptance status enum Status { OPEN = 0; CANCELED = 1; REJECTED = 2; ACCEPTED = 3; Status status = 5; string terms = 6; // human readable terms // Container for on-chain Applications. message ApplicationContainer { // List of Applications - more than one implies a state address collision repeated Application entries = 1; SupplyChain Transaction Family The SupplyChain Transaction Family is implemented by a Transaction Processor that manages ledger(global state) representation and integrity. SupplyChain REST API The SupplyChain REST API implements a domain specific api for clients to query SupplyChain Ledger state.
Discover the most talked about and latest scientific content & concepts. Concept: Cell nucleus BACKGROUND: Understanding the mechanical properties of chromatin is an essential step towards deciphering the physicalrules of gene regulation. In the past ten years, many single molecule experiments have been carried out, andhigh resolution measurements of the chromatin fiber stiffness are now available. Simulations have been usedin order to link those measurements with structural cues, but so far no clear agreement among different groupshas been reached. RESULTS: We revisit here one of the most precise results obtained with carefully reconstituted fibers. CONCLUSIONS: We show that the mechanical properties of the chromatin fiber can be quantitatively accounted for by thestiffness of the DNA molecule and the 3D structure of the chromatin fiber. Concepts: DNA, Gene, Cell nucleus, Gene expression, Histone, RNA, Chromosome, Chromatin Clustered, regularly interspaced, short palindromic repeats-CRISPR associated (CRISPR-Cas) systems are prokaryotic RNA-directed endonuclease machineries that act as an adaptive immune system against foreign genetic elements. Using small CRISPR RNAs that provide specificity, Cas proteins recognize and degrade nucleic acids. Our previous work demonstrated that the Cas9 endonuclease from Francisella novicida (FnCas9) is capable of targeting endogenous bacterial RNA. Here, we show that FnCas9 can be directed by an engineered RNA-targeting guide RNA to target and inhibit a human +ssRNA virus, hepatitis C virus, within eukaryotic cells. This work reveals a versatile and portable RNA-targeting system that can effectively function in eukaryotic cells and be programmed as an antiviral defense. Concepts: DNA, Protein, Gene, Cell nucleus, Bacteria, Organism, Virus, RNA Taxol and other antimitotic agents are frontline chemotherapy agents but the mechanisms responsible for patient benefit remain unclear. Following a genome-wide siRNA screen, we identified the oncogenic transcription factor Myc as a taxol sensitizer. Using time-lapse imaging to correlate mitotic behavior with cell fate, we show that Myc sensitizes cells to mitotic blockers and agents that accelerate mitotic progression. Myc achieves this by upregulating a cluster of redundant pro-apoptotic BH3-only proteins and suppressing pro-survival Bcl-xL. Gene expression analysis of breast cancers indicates that taxane responses correlate positively with Myc and negatively with Bcl-xL. Accordingly, pharmacological inhibition of Bcl-xL restores apoptosis in Myc-deficient cells. These results open up opportunities for biomarkers and combination therapies that could enhance traditional and second-generation antimitotic agents. Concepts: DNA, Gene, Genetics, Cell nucleus, Gene expression, Cancer, Chemotherapy, Transcription factor The trans-activator Tat protein is a viral regulatory protein essential for HIV-1 replication. Tat trafficks to the nucleoplasm and the nucleolus. The nucleolus, a highly dynamic and structured membrane-less sub-nuclear compartment, is the site of rRNA and ribosome biogenesis and is involved in numerous cellular functions including transcriptional regulation, cell cycle control and viral infection. Importantly, transient nucleolar trafficking of both Tat and HIV-1 viral transcripts are critical in HIV-1 replication, however, the role(s) of the nucleolus in HIV-1 replication remains unclear. To better understand how the interaction of Tat with the nucleolar machinery contributes to HIV-1 pathogenesis, we investigated the quantitative changes in the composition of the nucleolar proteome of Jurkat T-cells stably expressing HIV-1 Tat fused to a TAP tag. Using an organellar proteomic approach based on mass spectrometry, coupled with Stable Isotope Labelling in Cell culture (SILAC), we quantified 520 proteins, including 49 proteins showing significant changes in abundance in Jurkat T-cell nucleolus upon Tat expression. Numerous proteins exhibiting a fold change were well characterised Tat interactors and/or known to be critical for HIV-1 replication. This suggests that the spatial control and subcellular compartimentaliation of these cellular cofactors by Tat provide an additional layer of control for regulating cellular machinery involved in HIV-1 pathogenesis. Pathway analysis and network reconstruction revealed that Tat expression specifically resulted in the nucleolar enrichment of proteins collectively participating in ribosomal biogenesis, protein homeostasis, metabolic pathways including glycolytic, pentose phosphate, nucleotides and amino acids biosynthetic pathways, stress response, T-cell signaling pathways and genome integrity. We present here the first differential profiling of the nucleolar proteome of T-cells expressing HIV-1 Tat. We discuss how these proteins collectively participate in interconnected networks converging to adapt the nucleolus dynamic activities, which favor host biosynthetic activities and may contribute to create a cellular environment supporting robust HIV-1 production. Concepts: DNA, Protein, Gene, Cell nucleus, Amino acid, Metabolism, RNA, Ribosome Quorum sensing (QS) signaling allows bacteria to control gene expression once a critical population density is achieved. The Gram-negative human pathogen Pseudomonas aeruginosa uses N-acylhomoserine lactones (AHL) as QS signals, which coordinate the production of virulence factors and biofilms. These bacterial signals can also modulate human cell behavior. Little is known about the mechanisms of the action of AHL on their eukaryotic targets. Here, we found that N-3-oxo-dodecanoyl-L-homoserine lactone 3O-C(12)-HSL modulates human intestinal epithelial Caco-2 cell migration in a dose- and time-dependent manner. Using new 3O-C(12)-HSL biotin and fluorescently-tagged probes for LC-MS/MS and confocal imaging, respectively, we demonstrated for the first time that 3O-C(12)-HSL interacts and co-localizes with the IQ-motif-containing GTPase-activating protein IQGAP1 in Caco-2 cells. The interaction between IQGAP1 and 3O-C(12)-HSL was further confirmed by pull-down assay using a GST-tagged protein with subsequent Western blot of IQGAP1 and by identifying 3O-C(12)-HSL with a sensor bioassay. Moreover, 3O-C(12)-HSL induced changes in the phosphorylation status of Rac1 and Cdc42 and the localization of IQGAP1 as evidenced by confocal and STED microscopy and Western blots. Our findings suggest that the IQGAP1 is a novel partner for P.aeruginosa 3O-C(12)-HSL and likely the integrator of Rac1 and Cdc42- dependent altered cell migration. We propose that the targeting of IQGAP1 by 3O-C(12)-HSL can trigger essential changes in the cytoskeleton network and be an essential component in bacterial - human cell communication. Concepts: DNA, Gene, Cell nucleus, Gene expression, Cell, Bacteria, Pseudomonas aeruginosa, Biofilm The human deubiquitinase USP1 plays important roles in cancer-related processes, such as the DNA damage response, and the maintenance of the undifferentiated state of osteosarcoma cells. USP1 deubiquitinase activity is critically regulated by its interaction with the WD40 repeat-containing protein UAF1. Inhibiting the function of the USP1/UAF1 complex sensitizes cancer cells to chemotherapy, suggesting that this complex is a relevant anticancer target. Intriguingly, whereas UAF1 has been reported to locate in the cytoplasm, USP1 is a nuclear protein, although the sequence motifs that mediate its nuclear import have not been functionally characterized. Here, we identify two nuclear localization signals (NLSs) in USP1 and show that these NLSs mediate the nuclear import of the USP1/UAF1 complex. Using a cellular relocation assay based on these results, we map the UAF1-binding site to a highly conserved 100 amino acid motif in USP1. Our data support a model in which USP1 and UAF1 form a complex in the cytoplasm that subsequently translocates to the nucleus through import mediated by USP1 NLSs. Importantly, our findings have practical implications for the development of USP1-directed therapies. First, the UAF1-interacting region of USP1 identified here might be targeted to disrupt the USP1/UAF1 interaction with therapeutic purposes. On the other hand, we describe a cellular relocation assay that can be easily implemented in a high throughput setting to search for drugs that may dissociate the USP1/UAF1 complex. Concepts: DNA, Protein, Gene, Cell nucleus, Cell, Cell biology, Cytoplasm, Nuclear localization signal Concepts: DNA, Renal failure, Chronic kidney disease, Kidney, Nephrology, Cell nucleus, Cell, Cell division Concepts: DNA, Gene, Cell nucleus, Gene expression, Molecular biology, RNA, Chromatin immunoprecipitation, Transcription factor Numerous transcription factors (TFs) encode information about upstream signals in the dynamics of their activation, but how downstream genes decode these dynamics remains poorly understood. Using microfluidics to control the nucleocytoplasmic translocation dynamics of the budding yeast TF Msn2, we elucidate the principles that govern how different promoters convert dynamical Msn2 input into gene expression output in single cells. Combining modeling and experiments, we classify promoters according to their signal-processing behavior and reveal that multiple, distinct gene expression programs can be encoded in the dynamics of Msn2. We show that both oscillatory TF dynamics and slow promoter kinetics lead to higher noise in gene expression. Furthermore, we show that the promoter activation timescale is related to nucleosome remodeling. Our findings imply a fundamental trade-off: although the cell can exploit different promoter classes to differentially control gene expression using TF dynamics, gene expression noise fundamentally limits how much information can be encoded in the dynamics of a single TF and reliably decoded by promoters. Concepts: DNA, Gene, Genetics, Cell nucleus, Gene expression, Transcription, Transcription factor, RNA polymerase
Saturday, January 24, 2009 Foster Chapters 4&5 “The economic prosperity and democracy of the United States was rooted in the availability of “free land.” The closing of the frontier meant that there was no more free land to be exploited. Both democracy and prosperity were therefore threatened. The only answer was to seek new frontiers abroad.” This quote kind of irritates me a bit. This whole idea of free land is ridiculous, the land isn’t free. The fact is using that land for human benefit does cost something, but we ignore that because it only effects the environment and the animals that live there. It’s so ridiculous to think that the land belongs to humans and humans alone. I feel that Foster kind of feels the same way especially because he puts free land in quotations. At the same time if this didn’t happen would our lives be anything like they are now? “Man is everywhere a disturbing agent. Wherever he plants his foot, the harmonies of nature are turned to discords…[o]f all organic beings, man alone is to be regarded as essentially a destructive power, and…wields energies to resist which, nature…is wholly impotent.” This section shows us that there may be a reason to believe that man is kind of like a wrecking ball, at least that’s what I think Foster is getting at. He’s saying that wherever humans go they destroy nature, which kind of seems harsh, but at the same time kind of true. I don’t know if this statement is completely true. I don’t think its right to say that everything man has done has destroyed the world. I like to believe that humans have done something right on this earth. “A major concern, leading to the growth of the conservation movement, was the rate of extinction…Some 40 million bison had ranged over a third of North America when the Europeans first arrived…By the last decade of the nineteenth century, bison were nearly extinct…As bird species vanished, bison heards disappeared, and forests became mere memories, more and more people, particularly in the growing urban centers of the country, became concerned about conservation.” Here Foster tells us all about how terrible things are with the example of the bison. I think sections like this in the book are very well written. Foster gives us these huge numbers of bison and then says oh but all of them are gone now. I know when I read it I was thinking oh wow that is just terrible! We killed off an entire species of animal, well more than one, but let’s not get too down on ourselves! Then he says that forests are just memories and this is where I think Foster is getting a little ahead of himself. Forests aren’t memories they still exist even though the numbers aren’t as huge as they used to be. Chapter 5 “…in twentieth-century agriculture: the energy-intensive application of synthetic fertilizers, pesticides, certain “miracle” seed varieties, and petroleum-powered machinery, substituting these for agricultural methods.” I don’t think Foster thinks that all these things were so great for agriculture, and one of the reasons for my assumption is because of the quotations around miracle and because later on in the chapter he talks about how these new ways of doing things eliminated crop diversity. I have to agree with Foster on this one. Humans survived without pesticides for a long time and I think they are unnecessary and dangerous especially to those who live near the fields that are sprayed with that crap. In those neighborhoods child cancer rates are extremely high and I know this because of a previous sociology class that I took. By now scientists should’ve been able to figure out a safer way to keep the crops away from the insects. “A central component of the U.S. strategy for winning the war was a new kind of ecological warfare: defoliation. Besides destroying the forest cover, the U.S. aim was to create refugees which would give the United States physical control over the peasantry.” Not only does the U.S. destroy its own land but it destroys others which is no surprise after all it was a war and everything is fair in war. Burning down entire forests was uncalled for, and I think that’s what Foster is getting at here. Then later on Foster mentions that the U.S. didn’t even win the war so all the stuff the military did over there was for nothing and that is just ridiculous. Alicia Kingman 1. My primary concern about this book is how broad it is and how many different topics Foster feels that he needs to cover per chapter. His writing style is hurting my brain; it's so painful to read. I'm finding myself lost mid-chapter in a sea of conservation, soil, land, air, urban sprawl, the Industrial Revolution, extinction, back to urban blight, France in 1866, and the list could go on. Someone really should have told him to stop and scale down! On a brighter note I was delighted to learn a little something on the history of expansion and Western settlement and also the Conservation movement. On page 71 Foster refers to the work of social critic Thorstein Veblen, in reference to the expansion of American society. Here he cites that Veblen viewed the business civilization (man versus wild) as an issue of “converting all public wealth to private gain on a plan of legalized seizure.” Seizing land, developing it, destroying it, and moving on to new places all in the name of capitalistic benefit. This to me is a reality as well as society at its finest. I believe that this could possibly be a major source of ecological degradation. Once the land is developed and no longer useful it only makes sense to move on to fresh soil, though throughout history the over processed land has not been restored and made reusable. This in effect is a serious problem to the ecosystem. While not all individuals and collectives are destructive, those who are leave the planet in distress. This seems as though it should be a combination of common knowledge and common sense. Foster’s work regarding the “urban jungle” was quite interesting. He again used historical facts, quite possibly too far back in history, to support the idea that urban spaces need more fresh air, clean water and lush green grasses and less poverty and unsanitary living conditions. Though his references and ideas were historically based and did not seem to be to be tuned to today’s urban meccas. This idea that cities are filthy and need to be restored to an ecological state of beauty to me kind of takes away from all the positive aspects of cities, do lifestyles and cultures ring a bell? I wasn’t necessarily irritated with his reference to Upton Sinclair, I think that The Jungle is an amazing piece of literature, however, it may just be me but I didn’t really grasp why that was the most appropriate way to end the chapter; Thoughts? As for Imperialism and Ecology, this to me was another jumble of historical facts about as many countries as Foster could muster putting into one chapter. Great historical background, but again, too much! Obviously the creation of capital gain has taken a significant toll on ecological systems all over the globe. This is a global degradation problem, not just an exclusive issue for the United States OR for the United States to battle. Foster discusses different agricultural methods used to promote the Green Revolution at the expense of crops. This has obviously caused a lack of diversity in regards to the crops we are able to consume and utilize. Human beings have been cultivating their own crops for thousands of years, with the advancement of technology comes faster, yet in many cases more dangerous ways of producing massive amounts of consumer ingested monocrops. There has been a depletion of certain species as in all aspects of ecology, though is this all a result of crop dusting and over-farming? Or in certain cases is this a natural selection process, are crops the new dinosaurs? (Sidebar: Okay, so you were told that in areas where agriculture is predominant that child cancer rates are extremely high but are they significantly higher than perhaps areas of toxic waste, chemical plants, and so forth? While yes, I have read that pesticides in areas of high agriculture have been known to result in an increase of birth defects in some respects you must be aware that these are not the only cancer causing agents as well as the fact that home fertilizer has been known to cause cancer.) The segment about the War in Vietnam really tripped my trigger. I consider Vietnam to be a hot point, in all aspects, Sociological, Ecological and beyond. I find the destruction of land and crops and the senseless slaughter of wildlife and the Vietnamese people by the use of chemical warfare to be simply outrageous; Herbicide and Agent Orange equal insanity in my book. 2. I definitely agree with Alicia about the term "free land" being an inaptly name for the land way back when but I can't say for sure that I wouldn't have thought of it as free if I had lived back when the country was young and land seemed to be in a great abundance and all you needed to do to be prosperous was to go out and claim some as your own. And then when the idea of industrialization came around, promising a better life, I can't say that I would have scoffed at the notion. I would like to think that I would have been one of those people who protested the slaying of trees and other wildlife, but I obviously will never know for certain. One thing is sure, life would be a whole lot different had our predecessors not done what they did. Had they thought more about the wildlife, about preservation instead of a quick profit, we wouldn't have malls, sports stadiums, and exciting metropolises--all of which I am greatful for (although if there were no basketball arenas, there would be no Detroit Pistons and I wouldn't be forced to watch a team play so shhh---horribly :)) I got a little confused when Foster started quoting George Perkins Marsh's Man and Nature. I'm not familiar with him or his work so I'm not sure if I was understanding right, but I got the impression that he believes that man made nature. I can understand how he may think that we have molded nature to our liking (or disliking) but what about in the very beginning? Is he saying that man was here first? One thing I'm surprised that neither Alicia or eb commented on was the section on the Chicago slaughterhouses, but maybe that's because I'm just a big softy when it comes to animals. My eyes honestly started to well up when I read about the poor pigs being killed. I was more concerned about the animals' welfare than about the fact that Foster was making a point about the environment and economic gain. I agree with eb about the "too much" historical information being packed into each chapter. Of course, the book is subtitled A Short Economic History of the Environment so I suppose historical facts are important. Still, it made me feel like I was back in my 11th grade American history class, so much that I nearly fell into my old habits of doodling in the margins or laying my head down on my desk and sleeping. 3. I was kind of going about the Chicago slaughterhouse's in a round about way by bringing up Foster's mention of The Jungle. I was trying to figure out if it was a necessary addition to the chapter or not. I too am soft when it comes to animals. 4. The first part of chapter 4 seemed to depict that the industrial and agricultural boom was a negative action against people and the environment. I do agree with this but can't help but wonder what would of happened if this did not occur. Would the environment be better now or would a different negative aspect come in to play? Also, the positive aspects were left out like the money and jobs it created. Obviously Foster had an agenda to fill which I am no opposed to but he left me with those questions. This also seems to bring up the topic of how now people seem to associate this "green revolution" with a restriction to their personal lives. People like their lives to be simple and the industry helps them with products that provide that. Another thing that sparked my interest was when he said that people did know it was hurting the environment at the time. In past classes, especially what was taught in middle and high school, this notion was really never expressed to me. With the horrible working and living conditions I guess they would have to know to an extent but I'm not sure how far that would go. To make a claim that they knew that it would affect the world so much as it does now seems to be a little far fetched. The statement that we do not govern the land or nature is a great statement that I believe not many people understand still to this day and age. Technology will not be the single solution to our problems and we cannot control nature or fix it after we have damaged it so much. Technology is a great tool but our social habits will have to change also to be able to see a bigger difference. This also ties into later entries in the book where Marsh explains that "man is not external to nature". We are part of nature and therefore need to protect it and ourselves. The argument between conservationists and preservationists was also interesting. This struggle seems to be prevalent today. How much should a single person be doing to help the environment? Some are seen as radicals where others can not believe people are not more worried.
Felidae Conservation Fund Felidae Logo innovation in conservation Snow Leopard Uncia uncia With its pale green eyes and exotically marked fur, the snow leopard is one of the most beautiful cat species. Approximately the same size as the common leopard, the snow leopard is a stocky cat with a well-developed chest, long body, and moderately long legs. The snow leopard’s massive front paws are larger than the hind ones. The cat is strong, muscular, and built low to the ground. Large nasal cavities allow the snow leopard to breathe easier at high altitudes, where both the temperatures and oxygen are low. The snow leopard has a thick, bushy tail (used for balancing) that measures from 75-90 percent of the head-body length. The background color of the snow leopard’s fur is smoky gray, varying to grayish buff with whitish underparts. Black spots mark the head, neck, and lower limbs, whereas the flanks, back, and tail are covered with rosettes or irregular circles. An individual snow leopard can be identified by its unique markings. The fur is long, as insulation is important for survival in subzero temperatures. In addition, the large paws are well suited for gripping rocky inclines and for “snowshoeing” through deep, soft snow. Interestingly, the snow leopard is one of the least aggressive of the large cats. The snow leopard’s distribution lies in the high mountain regions of central Asia, ranging from 600 to nearly 5,800 meters. The species is a rock specialist and is usually found in rugged areas where the terrain is broken by cliffs, ridges, and ravines. Primarily a terrestrial hunter, the snow leopard is mainly active at dawn and dusk, traveling across the open terrain of desert and steppe to hunt. The species feeds on bharal (blue sheep), ibex, urial and argali sheep, markhor, smaller mammal prey, and domestic animals. It will also ingest grasses and twigs, possibly as a digestive aid or laxative. Overall, the snow leopard is more inclined to chase prey than other large cats, using agility when pursuing its prey across slopes or down mountainsides. Like most cats, the snow leopard is solitary and communicates by scent marking. In the wild, the snow leopard is rare and lives in low densities. It is estimated that only 3,500 to 7,500 individuals exist in the wild. Threats to the snow leopard are numerous. One of the major of these threats is retaliatory killing by livestock owners. This cycle begins when large ungulates (wild sheep and goats, the snow leopard’s native prey) are depleted by hunting in areas of the high Central Asian mountains. Without these prey, the snow leopard naturally turns to domesticated livestock for food. As a consequence, the snow leopards are hunted and killed by the livestock owners. In addition to loss of prey and retaliatory killing, snow leopards are in danger from traditional Chinese medicine (TCM), where snow leopard bone is used as a substitute for tiger bone, and from hunting for fur. The snow leopard is classified as Endangered (EN) by the International Union for Conservation of Nature (IUCN) and protected under appendix I of the Convention on International Trade in Endangered Species (CITES). Vital Stats: Lifespan- Up to 21 years Weight- 25-75 kg Body Measurements- Length: 1.2-1.5 m; Tail: 91 cm Status (IUCN)- Endangered (EN)
A rainbow at night: rare phenomenon at Yosemite The rainbow is an optical and meteorological phenomenon that is manifested by the appearance in the sky of a spectrum in the form of a colorful semi-circle when sunlight is reflected in the water droplets from the atmosphere. But what is a “moonbow”? The explanation is that the moonlight passes through mist or water vapors. They take place when moonbeams hit water droplets in the atmosphere. The last appearance of a “moonbow” was in Yosemite National Park, USA. Park officials were able to record this phenomenon and the film has already been viewed by people around the world. Moonbows are best viewed near large waterfalls. They occur when the moon is full or nearly full, and low in the sky. [Photo: YouTube]
Friday, August 19, 2011 The Age of the Universe: Part 1 I wrote a bit about the Traveling Creation Museum and its interesting (if not entirely convincing) curator, Sean Meek. I decided that I'd cool off a bit before saying too much and a couple years should be long enough. Mr. Meek was talking about what astronomers know about the beginnings of the universe and he said that they simply "make things up." With that kind of statement, you might see why I wanted to calm down a bit before commenting further. He said other nonsensical things but this was the one that really got under my collar. He also belittled findings based on radioactive decay dating (potassium-argon decay for one). He tried to dismiss all of science under the blanket idea that because we weren't there, we can't know. And it's true that there are no living witnesses who can attest to the existence of anything that happened more than 6000 years ago. I'll grant him that. But there is ample evidence that one needs only a brain, some simple math and a few simple scientific instruments that demonstrate that the universe in which we live is several orders of magnitude older than Mr. Meek would have you believe. First, we figure out the distance to the moon. You can't tell by just looking at it and ancient people might have thought that if you stood on a high enough mountain, you could touch it (legends speak of such things). But determining the distance to the moon is actually pretty elementary. Set up a simple observatory. Set up a similar facility a known distance away (preferably a few hundred miles). Have your astronomers measure the angle between the moon and a nearby star. This gives you the parallax of the moon. Simple trigonometry and you have the distance to the moon, about 240,000 miles. Second, now that we know how far away the moon is, we measure the distance to the sun. We know it's farther than the moon because it passes behind the moon during solar eclipses. We use the same sort of method we used to determine the distance to the moon. This time, it helps if we have accurate clocks to measure the angles because we can't use the stars (they're not out in the day time). But again, it's a matter of simple trigonometry to determine that the sun is about 93 million miles away. Now with the work of Johannes Kepler and Isaac Newton, we can figure the orbits and the distances to the planets. We have the scale of the solar system which is about 8 billion miles from side to side (using the orbit of Pluto as sort of an edge... if we use the heliopause, it's bigger still). Now we only need one observatory to go to our next level of measurement: the distance to the stars. We seek out a nearby star that can be seen in two different seasons, preferably opposite seasons (spring/autumn or summer/winter). Sirius is a good candidate. We measure its position against the background stars when it first starts appearing in the morning skies in August. Then we take a similar measurement the following February. We know that if we take these measurements 6 months apart, the two positions of the Earth will make a straight line with the sun in the middle. That line segment is about 186 million miles. Again, simple trigonometry and we find that Sirius is about 54 trillion miles away. It takes light a bit under 9 years to travel that distance so we say that Sirius is a little under 9 light years away (8.6 give or take 0.04 light years if you want to nitpick). We repeat this procedure for all the stars that are close enough for us to measure this way. That's about 100 light years which is right in our own backyard, celestially speaking. And that's a pretty huge number of stars when we see that there are about 50 stars within 17 light years of our sun. Part 2 will discuss how we determine the distances to stars that we can't measure in this manner. Post a Comment << Home
Spring Into Action O.K., it's finally spring (maybe), so plant those peas! Get that spinach and chard in the ground. Roto-till, double-dig or don't dig at all, but get out there in the dirt. Remove the last of the protective mulches from perennial beds and tender bushes. Fertilize with compost. If you don't have enough, call up your local government, and see if the public works department has any left over from fall leaf collections. Think about the bare spots where the mice ate your crocuses, and set out some pansies. Next fall, scatter the seeds of blue forget-me-nots about the tulip and early bulb beds. Don't forget to feed indoor seedlings once a week with a half-dose of liquid fertilizer, and keep moving those grow lights upward, as the plants grow. Transplant seedlings as soon as four leaves appear, and ruthlessly toss out the ones you'll never have room for. (Or give to friends, of course.) Attend one of the many seminars being given this time of year at the local botanical gardens or extension offices. A growing awareness of how pesticides and fertilizers affect the water table, as well as the need to save water, has resulted in much more easily accessible information on dry-tolerant plants, disease- and pest-resistant grasses and nontoxic pesticides.
Essay by teganiscoolHigh School, 12th grade February 2004 download word file, 8 pages 4.4 2 reviews Downloaded 87 times Recruitment, Censorship and Propaganda were all used in conjunction with each other in order to get the public involved in the war. Posters and signs of propagandist material were initially used to recruit soldiers. In apprehension of the public becoming disheartened, censorship was inducted to confine overwhelming stories from the front. This was so that recruitment remained solid, as a result of an anxious need of soldiers to sever the stalemate and instigate a major offensive. Primarily, censorship is fundamentally a tactic of propaganda, while the theme of war is glorified to promote recruiting. In Britain, the outbreak of the WW1 was welcomed with colossal interest. People were eager, proud and were determined to show their love for their country. This was attained, due to the public perception of the war being heroic and the role of censorship and propaganda in recruiting people to get themselves involved in the war. As a result, almost immediately, men enlisted through recruiting agencies, persuaded by the attraction of fighting a war for the good of their country. When conscription was ruled out as politically incorrect, Kitchener relied on emotional blackmail to entice people to join his new army. Posters all over the land showed Kitchener's stern features and accusing finger and brought home his message, "Your country needs you!" and "Enlist now!". Men were encouraged this way, and to enlist with their friends to form 'pals battalions' which was thought to sound more tempting. Guilt and shame were also used as a way to persuade men to enlist. Men who didn't enlist were constantly ridiculed until they did join. They usually received a white feather in the mail, representing that of a spiritless chicken. It was considered a disgrace to be seen in the street without a uniform. However, the pressure for the...
New hope against antibiotic resistance Schematic diagram of a liposome. Antimicrobial compounds would be contained in the Water Core Schematic diagram of a liposome. Antimicrobial compounds would be contained in the water core Part of the problem with treating with antibiotics is ensuring that the drug makes it to where it needs to act. The compounds will need to travel from the site of administration through the body to the site of infection, and finding the microbe can be a challenge. Brittany Reichelt (11 AM Micro) brings us another in a series of options in the war against antibiotic resistance, which can offer us a possible answer tothis problem. This is a summary from Science Daily “Possible alternative to antibiotics.” Antibiotic resistance is a real concern: what if all the bacteria become resistant to antibiotics, what if I get an infection with bacteria that are resistant to antibiotics? Antibiotic resistance grows every time we use an antibiotic, it has been growing for 90 years since Penicillin was first used. In society today, bacteria are now becoming resistant to multiple antibiotics. This is causing great concern because infections from scrapes, surgeries, or “non-fatal” diseases, which are normally treated with antibiotics, will be causing deaths. Eduard Babiychuk and Annette Draeger completed research at the University of Bern in Switzerland. These scientists developed a substance that could have the potential to offer a different strategy against bacterial infections. Antibiotics target the bacterial cell and kill it off. The substance developed does not directly target the bacteria. This substance was created by “engineering artificial nanoparticles made of lipids, liposomes that closely resemble the membrane of host cells.” The liposomes are sneaky; they lure the bacteria toxins in, not the bacteria body directly Bacteria without the toxins will not be able to fight against the host’s immune system. Therefore, the host will not be harmed because their immune system will easily get rid of the bacteria. The importance of this drug is that it will treat bacterial infections, but it is not an antibiotic and will not aid in the antibiotic resistance that is increasing among bacteria. Normally liposomes are used clinically to deliver drugs and certain drugs to the body. Instead these scientists are using them as bait for the toxins on the bacteria, which are attracted to them. Researchers have studied these liposomes in mice that had fatal septicemia. The results showed that the mice survived with no need for any other antibiotics. This research offers great hope against antibiotic resistance, but needs to be studied in humans first. This study was also published in the Journal Nature, which can be viewed at this link. About ycpmicro Posted on November 6, 2014, in Guest Post. Bookmark the permalink. 3 Comments. 1. This was an interesting article and points out a great solution to a potentially big problem. Doctors used to be very quick to issue an antibiotic to a patient, not realizing that he/she was causing an even bigger issue — resistance to antibiotics. This is kinds of like what is happening with the antibacterial hand sanitizers. I remember when I was growing up I used to suffer from ear infections. According to my mother, at first the Dr used to prescribe amoxicillin. Getting 4 or 5 infections a year made me familiar with taking the antibiotic. However, as I got older, I still got the ear infections but was put on a different antibiotic. I remember asking my mom why the doctor has changed the medicine and she said that the amoxicillin no longer worked for me and I had to move to something stronger. Suffering with ear infections for 9 or 10 years forced me to change antibiotics three or four times because the Dr said that the others were no longer strong enough and my body was resistant to it. This new solution described in the article will be a great benefit to healthcare. 2. Gracen Schilling This article was very interesting. Since we were talking about how antibiotic resistance is a thing we need to be worried about, finding a way to fight bacteria off without causing a resistance could be very useful. Since it only draws in the toxins from the bacteria and does not attack the bacteria it self it seems to me that the good bacteria would not be affected so the host would not have any side effects. This could be fundamental for our future medical care if it works on humans as well as it did on mice. 3. The idea of anibiotic resistance seems like an interesting topic. I find it amazing how bacteria can mutate itself so that it can not easily be killed, a method that is harmful to the host of the virus. If this new treatment works in trapping the toxins, our health care industry will greatly benefit. People will not have to worry about taking different antibiotics to prevent a resistance, and antibiotic resistance can be prevented. With this discovery, hopefully hospitals won’t be seeing many more cases like the ones seen in the documentary during class. %d bloggers like this:
What is CVT CVT – continuously variable transmission with an external control, with automatically infinitely variable gear ratio, choosing the most optimal one according to the external load and engine speed, thereby making it possible to maximize the use of power. In car transmissions there are two types of CVTs are proliferated: V-belt and the toroid. What is CVT what is cvt V-belt CVT V-belt variator consists of a number (one or two) of belt drives, which are formed by the conical pulley discs due to biasing and moving apart of which vary the pulley diameter and correspondingly, the transmission ratio. Different companies have developed their design V-belt CVT, the transmission belt is used instead of the Multitronic chain and puts Honda recruited from metal plates belt, but the principle remains the same. what is cvt Why is V-belt? The belt has a trapezoidal cross-sectional shape and the “wedged” into the pulley their side surfaces. When these surfaces are deteriorated, due to its shape, it cuts deeper into the pulley and is still in a good coupling with it. For car breakaway conventional clutch or small torque converter is used, that is blocked after the start of movement. Pulleys Disk Management provides by electronic system of actuators, sensors and control unit. what is cvt How to change the gear ratio? The device is driving pulley cheeks when exposed to centrifugal forces gradually compressed and pushed further V-belt from a pulley center. The driven pulley while expands while it, and belt smoothly rolls closer to the center of the pulley. The larger the engine speed – the more compressed drive pulley and decompressed driven one, thereby changing the gear ratio from the crankshaft to the rear wheel. Toroidal CVT Toroidal variator is arranged otherwise – it consists of coaxial discs and rollers transmit drive from one point to another. To change the gear ratio the rollers and their radii changing position, which rollers run in wheels. Since all force is concentrated at the contact patch, then to rotate the rollers have to use particular apparatus capable of overcoming the force pressing the roller to the disc. CVT pros and cons Structurally weak areas of automotive CVTs are the following: for V-belt it is belts, and for the toroidal – contact patch and drive roller, where the force of the pressure reaches 10 tons. Therefore, using special high-tech materials helps to make high-reliable CVTs, close to the conventional automatic transmission reliability. But because of the load on the belt or the contact patch CVTs cannot be used with heavy-duty engines and vehicles for the transportation of goods. If trucks are not suitable for continuously variable transmission, the passenger car is quite acceptable, and here CVT has a great future, especially as the technology is not standing still. what is cvt If you compare the dynamic characteristics of the car was fitted with a CVT, it may be puzzling – why in the same vehicle with CVT acceleration is slower than with a manual, it should be the opposite, since the CVT  better use of the engine power? It’s all in the habit of – many motorists are very unhappy that the car with the CVT “whines the whole time on a single note.” Most drivers are accustomed to the familiar rising engine noise, and many firms are going to meet clients, especially setting up an electronic transmission control unit. In fact, during normal settings of the unit the acceleration is faster. Note that the variable speed type is more advanced than the transmission with automatic transmissions. This is manifested in better acceleration dynamics, lower fuel consumption, a smoother ride. At the same time, CVT is simpler in design than the “automatic”. What’s Hot
Wednesday, November 16, 2016 If you are a hardcore gamer, can you imagine your life without Nintendo Wii, Xbox and Playstation? Absolutely not. Let us have a view how these video games were invented and how it evolved over some decades. In October 1958, Physicist William Higinbotham created what is thought to be the first video game at a Brookhaven National Laboratory open house. It was a very simple tennis game. It took Higinbotham only a couple of hours to conceive the idea of a tennis game, and only a few days to put together the basic pieces. Having worked on displays for radar systems and many other electronic devices, Higinbotham had no trouble designing the simple game display. Higinbotham made some drawings, and blueprints were drawn up. Technician Robert Dvorak spent about two weeks building the device. After a little debugging, the first video game was ready for its debut. They called the game Tennis for Two. Tennis for Two had none of the fancy graphics video games use today. The cathode ray tube display simply showed a side view of a tennis court represented by just two lines, one representing the ground and a one representing the net. The ball was just a dot that bounced back and forth. Players also had to keep score for themselves. Later in 1961, Steve Russell, a student at the Massachusetts Institute of Technology (MIT), creates Spacewar, the first interactive computer game. It runs on a Digital PDP-1 mainframe computer, and the graphics are made up of ASCII text characters. But the first true video game wouldn't be invented until 1967 when an engineer named Ralph H. Baer created the first prototype of “Brown Box”, the world's first video game console. Baer, often known as the “Father of Video Games," was the first person to create a system that transformed electronic signals into pictures on a television screen via a raster pattern…or what we now know as a video game. The original Magnavox Odyssey featured a few simple games, such as a chase game, checkers, and a shooting game using a rifle peripheral device. The system came with two paddle controllers, as well as a few other accessories usually associated with board games. It was a huge success, selling over 700,000 units in its first three years of production. But these consoles are a very recent addition to the list of video games-related technologies that have developed over the years. Perhaps, you might have heard your parents mention ‘Atari’? Ask them, and they will tell you about Pong, a game originally created by a company called Atari Incorporated, way back in 1972 — 44 years ago. Pong was a two-dimensional tennis game and its creator was a man called Allen Alcorn. In those days, you could not simply buy a game and bring it home and play. There were places where these games were installed and they were coin-operated (arcade games). This meant that you had to put a coin in the machine to play the game! In 1972, Atari (founded by Nolan Bushnell, the godfather of gaming) became the first gaming company to really set the benchmark for a large-scale gaming community. Atari not only developed their games in-house, they also created a whole new industry around the “arcade,” and in 1973, retailing at $1,095, Atari began to sell the first real electronic video game Pong, and arcade machines began emerging in bars, bowling alleys and shopping malls around the world. In 1975, Atari's Pong is released with help from Sears Roebuck, which finances the production of 150,000 units. It becomes the hottest selling Christmas present. Sears sells the product exclusively, with the Sears Tele-Games logo. Gunfight, the first "computer" game is released. It is the first game to use a microprocessor instead of hardwired solid-state circuits. In 1977, Atari introduces its first cartridge-based home video system called the Video Computer System which later becomes known as the Atari 2600. It retails for $249.95. ATARI 2600 When it was released, the Atari VCS was only designed to play 10 simple challenge games, such as Pong, Outlaw and Tank. However, the console included an external ROM slot where game cartridges could be plugged in; the potential was quickly discovered by programmers around the world, who created games far outperforming the console’s original designed. The integration of the microprocessor also led to the release of Space Invaders for the Atari VCS in 1980, signifying a new era of gaming — and sales: Atari 2600 sales shot up to 2 million units in 1980. As home and arcade gaming boomed, so too did the development of the gaming community. The late 1970s and early 1980s saw the release of hobbyist magazines such as Creative Computing (1974), Computer and Video Games (1981) and Computer Gaming World (1981). These magazines created a sense of community, and offered a channel by which gamers could engage. There was also a major shift from dedicated consoles (with built-in games) to cartridge-based video game systems. In the first few years of 1990s, there is a notable shift in the medium used for storing games from cartridges to compact discs. No comments: Post a Comment
Several of the posts up to this point have dealt with the Battle of the Frontiers indirectly. Mons, Liege, Nery, Argonne , etc. . . . all of these conflicts could be broadly lumped together into what historians have called the Battle of the Frontiers. To describe it generally: The Battle of the Frontiers encompassed everything in the early days of the War on the Western Front outside of the Germans’ direct drive on Paris. Another reason for lumping so many conflicts into the larger name “Frontiers” rests in the nature of the larger battle: basically, everyone was on the offensive in a very fluid war front. This stands in stark contrast to the later stalemate of trench warfare. So here’s what happened: both the French and the Germans hoped to overwhelm and quickly conquer each other. Defensive warfare, however, was at this time supreme, so whoever had a moderate amount of defenders athwart their opponent’s line of advance would prove victorious. Thus, the French failed because the Germans anticipated their advance on the Franco-German border. The Germans succeeded, therefore, because the French failed to foresee the German invasion of France from the North, through Belgium. Though both the French and the British were out of position to resist the German southwestern advance into France, they nevertheless managed to execute several delaying actions against the Germans. In the consequent Battle of the Marne, the accumulation of these delays represented one of the major factors in the battle’s outcome. Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Sisters in Fate: The Lusitania and the Titanic A. Yes, on Sunday and Monday. A. I went 65 miles south of the position where the “Titanic” struck ice. Q. Under the above circumstances, would it be reasonably safe for such a vessel to proceed at a speed of 20 knots an hour or upwards? A. Certainly not; 20 knots through ice! My conscience!  The lawyers asked many of the same questions over and over in different forms, but no answer was groundbreaking to the case. However, there is one question and answer that sticks out.  Q. Have you learned nothing by that accident? A. Not the slightest; it will happen again. This answer sent a chill down my spine when I first read it because the captain being interviewed about the Titanic disaster was William T. Turner, captain of the RMS Lusitania. On May 7, just one week after Turner gave this testimony in New York City, the Lusitania was torpedoed by a German U-boat, becoming the most infamous maritime disaster of the First World War.  Nearly 1,200 people, including 128 Americans, were lost. There were only 761 survivors. The Cunard Line, just like the White Star after the Titanic disaster, filed a petition with the court of the Southern District of New York to limit its liability against claims filed by survivors and the families of victims.  This case, also part of the records of the National Archives at New York City, was the first project I worked on when I started volunteering. Captain Turner’s deposition and its relation to the Titanic disaster offers a surprising connection between these two infamous events. After the recent Titanic centennial, and after having examined both cases, I would like offer some thoughts on these two tragedies. The Titanic has always overshadowed the story of the Lusitania. Nonetheless, the repercussions of the Lusitania had a more significant impact on world events. While not directly leading to American entry into World War I, the sinking of the ship damaged relations between the United States and Germany in 1915, and was influential in the United States declaring war in 1917.  Yet, the Titanic is much more a part of our collective memory. Captain Turner avoided the iceberg believed to have sunk the Titanic; but he was unable to avoid the German U-boats. "A Photograph of an Iceberg Floating Near the Site of the TITANIC Sinking., 12/14/1912 " ARC Identifier 278334 The allure of the Titanic seems to stem from the romanticism that surrounds it. Like an ancient Greek tragedy, it was a disaster brought on by folly, arrogance, and possibly even fate itself. The two-and-a-half hours it took to sink turned the ship into a drowning stage that allowed a series of human dramas to play out. I imagine that the great bulk of the ship rising out of the water with its sparkling lights set against the night sky, as recreated in so many paintings and films, was both terrifying and mesmerizing. The Lusitania story is bleaker and more difficult to comprehend. Its sinking was swift, violent, and ugly. After a torpedo struck its starboard side, the Lusitania sank in a mere 18 minutes. While there were enough lifeboats for all passengers (a lesson learned from the Titanic), only 6 were successfully launched. Calls for “women and children first” mostly fell on deaf ears as primeval instincts of survival took over. Proportionally many more women and children died than on the Titanic. The fact that a civilian passenger ship was torpedoed without warning and that she was carrying different types of war materials (including 4 million rifle cartridges for the British Army) are still major points of controversy.     As for Captain Turner, he would survive the Lusitania. A British inquiry laid a great deal of the blame personally on his actions as if to avoid questions about the cargo on the Lusitania. Ultimately, in both the American and British inquiries, Germany was held solely responsible. As in the Titanic liability case, the Lusitania claimants received next to nothing. In spite of romantic notions or controversy the most poignant parts in both cases are the individual the human stories, preserved in the various claims and testimonies. The material available at the National Archives allows one to delve deeper into an event and come out with a more profound understanding of it. Having had the privilege to examine both the Titanic and Lusitania cases, I learned so much about the era from which these people came from and the events that they were caught up in; and in the process the strange coincidences of history that made the Titanic and Lusitania sisters in fate. This entry was posted in - World War I and tagged , , , , , , , , , , , , , . Bookmark the permalink.
Biological Information Principles Module 3 What Time Is It on Your Circadian Clock? • Discuss the kinds of molecules that carry biological information, and how information is encoded in them • Describe the way information is stored and transmitted in biological systems • Provide examples of cellular responses to environmental conditions • Understand the premises and goals of systems biology Key points • all organisms are constantly taking in cues from their environment and responding to it • biological information is stored in nucleic acids (DNA, RNA) and is used to encode proteins • the natural or cellular environment induces changes to gene expression via transcription and translation • signal transduction chains link inputs to outputs In-class activities • Read the article linked aboved about circadian clocks and discuss 1) why it is an example of biological information flow and 2) how it represents a ‘systems biology’ approach to studying circadian rhythm. How could it be possible to take a single blood sample, as stated by Dr. Ueda, and determine a person’s internal time?
Friday, 20 September 2013 Creating Tasks With Real World Outcomes Enhancing Learner motivation and engagement through real world tasks.  Real World Recently, I have become really interested in getting students excited about learning and studying. I've done all the eLearning tricks, which I do agree, help learners to be motivated and engaged in study. That said, I still felt that there is something missing from the whole learning experience. So, I remembered my days in college and university. I studied media in college and then theatre in university. Both courses were incredibly hands on, and required the students to produce a show, which would be seen by the public. Having that real world outcome really motivated all of us to give it our best. We'd start at 8am, go home at 10pm, Monday to Saturday. I was completely immersed in the project with my main thought being that an audience would see the product we would eventually produce. I have carried out a bunch of projects in my classes, but only recently did I start giving them a real world outcome. The main one would be the refugee book project (Click here), and film festival (Click here). I really saw a change in the students' behavior and attitude towards learning and completing a shared goal. The students were more motivated and engaged in the project, they stayed after class, held meetings, and did way more than I could have ever expected. Projects which have a real world outcome can really bring out the best in our students as it isn't simply for a grade, but has a meaningful outcome. I'm now trying to build as many real world projects into my class as possible. Some of these include: - T-shirt design: The students design a t-shirt for the school and the winner will actually be made. - Promotion Video: We'd like to promote our course overseas, so the students will create a promo video for our centre. - Researchers: As with the refugee book project, the students will be part of many other research projects and become assistants.  - Content creators: It takes a long time to make new content, so I am planning to get my students to be part of the process and become content developers.  These are just some of the ideas, which I think could work, and be set up relatively easily. I was wondering if any other teachers out there have created any projects with real world outcomes. If you have please share your experiences. 1 comment: 1. Syukur alhamdulillah saya ucapkan kepada ALLAH karna atas kehendaknya melalui AKI DARMO saya sekaran sudah bisa buka toko sendiri dan bahkan saya berencana ingin membangun hotel dan itu semua berkat bantuan AKI DARMO,saya tidak pernah menyanka kalau saya sudah bisa sesukses ini,atas bantuan AKI DARMO yang telah memberikan nomor selama 3x putaran dan alhamdulillah itu semuanya tembus bahkan beliau juga membantu saya dengan dana ghaib dan itu juga benar benar terbukti, AKI DARMO juga menawarkan minyak penarik kepada saya dan katanya minyak ini bisa digunakan untuk berbagai jenis keperluan dan baru kali ini saya temukan paranormal yang bisa dipercaya,,bagi teman teman yang ingin dibantu untuk dikasi nomor yang benar benar terbukti tembus atau dana ghaib dan kepengen ingin membeli minyak penglaris jualang silahkan hubungi AKI DARMO di 082-310-142-255 ini benar benar terbukti nyata karna saya sendiri yang sudah membuktikannya –ATAU KTIK ALAMAT BLOG AKI -
The Kite Flier A Hawaiian Legend February 28, 2006|Adapted by Amy Friedman Once upon a time the god Maui cast a fishhook into the sea and pulled up the islands we call Hawaii. Maui was small but very strong. He was also a mischief-maker, with boundless energy and never-ending curiosity. His mind was always at work, inventing and discovering new things. One day he was walking near his home in Hilo. As usual, he felt restless. "I need to do something brand new," he thought. Maui was searching for adventure when he saw his mother carrying a roll of paper cloth known as kapa. "That's it," Maui thought, and when his mother laid her kapa on the ground and turned her back, Maui snatched a piece of the cloth. He hurried to the riverbank. There he sat, folding the cloth this way and that. Before long he had invented the kite. "Now what?" he wondered as he studied his new invention. He tossed it into the air and caught it, and then he noticed growing nearby an olona plant. His eyes lighted up as he stripped off a piece of the loose bark, braided it and created a long, strong cord. This he tied to his kite. Holding the cord, Maui launched his kite into the sky. Summoning his magical powers, he cried, "Fly, kite, fly!" The kite rose slowly and bounced along, floating forward, dipping down gently. Maui shook and tugged at the cord, blowing as hard as he could, but his kite moved as if it were a wounded bird, tumbling forward and tripping backward. "I need wind!" Maui exclaimed, and of course he knew where to find it. Long before, the priest Kaleiioku had, in a fit of anger at the roaring winds that sometimes lashed the islands, opened a calabash, a giant gourd, and trapped the winds inside. "I must set the winds free," Maui said, so he stood upon the riverbank far from the big island, many miles from Waipio where the priest lived. Maui gazed across the water and began to chant: "Open the calabash, set the winds free, "They will fly fast, across the wide sea. "My kite will dance with the shake and the shiver "Of the winds as they reach the Wailuku River." From his faraway island the priest of Waipio heard Maui's chant and was powerless to stop his hand from obeying the god's command. He lifted the cover of the calabash, and the winds, freed from their trap, rushed out and sailed toward the coast. They swept across the ocean, on their way to Hilo Bay, carried by Maui's chant: "... they will fly fast, across the wide sea ..." The winds whipped their way along river gorges and tore over the peaks. As they swept toward the river, they spotted the kite. To the winds, the kite looked like a monster. They rumbled toward it, eager to destroy the invader. Maui stood upon the lava rocks, holding the cord of his kite, and when those winds attacked, even the little god had to brace himself against their force. The winds pummeled that kite, pushing it higher and higher, and Maui's feet gripped the lava rocks where he stood as the cord stretched and stretched. Maui's kite moved with the winds. It turned somersaults; it whirled and twisted, swirled and stretched. With each blow of the winds, the kite sailed higher, faster, its dance turning ragged and wild. Maui's heart pounded with joy, and he began to chant again: "Oh winds of Waipio, free from the calabash of Kaleiioku, "See this kite I've made -- I made it for you. "Pull and pummel, hurl and twirl, push and pound. "Never will you move this god from his place on the ground." The kite struggled as the fierce winds attacked. Maui loved to match his strength against the powerful. He was never happier than when he was engaged in a contest. Now the winds stirred up storms that rushed inland, and as waves crashed on shore, the winds climbed to the highest part of the sky. High above the mountains, the winds gathered strength again and crashed violently against the kite, bending it backward and forward. The kapa was strong, and the kite did not tear, but even Maui strained. Still he chanted: "Pull and pummel, hurl and twirl, push and pound, The winds were relentless, and suddenly the cord snapped and the kite tumbled over the volcano craters, somersaulting over mountain peaks. But Maui was determined to win this contest. With one leap he crossed those mountains, 1,400 feet high and 60 miles long. He stood over his kite that lay upon the ground, bruised and battered. Maui reattached the cord and sent his kite up, but this time when the winds grew too wild, he stopped chanting. Day after day he flew his kite, entertaining himself, until one day the people began to notice the dancing kite. They watched, dazzled by the dancing kapa, and after a while they understood that when the kite soared in the sky, the weather would be dry, the wind brisk but not too wild. On those days they rejoiced. Sun Sentinel Articles
Five Cybersecurity Disasters. Ever wonder how badly our information highway could be damaged from a security breach? Internet threats are always evolving, but here are five cybersecurity disasters from the past that hint at what we might face later on: First Worm In 1988, a graduate student designed a self-replicating worm and sent it forth to determine the “size of the internet.”  His creation did its job too well and replicated with a vengeance, causing millions of dollars’ worth of damage to thousands of computers and inspiring the creation of CERT,  or the Computer Emergency Response Team. Though he claimed the damage was accidental, Morris was charged with Computer Fraud and fined $10,000. In 1999, a computer virus named “Melissa” ( supposedly after a stripper), was launched from a stolen AOL account nested in a list of passwords to members-only pornography sites posted on an adult message board. One version of the virus would email itself to the first 40 email addresses it found in Microsoft Outlook. Eventually the virus clogged email traffic to the point that email servers at such places as Microsoft and Lockheed Martin were shut down. Melissa and her variants infected over one million personal computers and caused an estimated 80 million dollars’ worth of damage. The UFO Hacker Gary McKinnon, a Scots systems administrator and hacker, achieved the “biggest military hack” in history according to U.S. Prosecutors. McKinnon claimed he was looking for evidence of UFO cover-ups by the U.S. Government when he broke in to 97 NASA computers between 2001 and 2002. While he was there, he deleted source files that caused several hundred NASA computers to shut down during the added workload on 9/11. He erased NASA logs, copied key information onto his own hard drive and then left cryptic graffiti on the system using the handle “Solo”. Officials estimated the damage to be around $700, 000 Wikileaks is now world-famous, but the organization has been around since 2006.  It’s been suggested that Wikileaks developed its protocol while spying on Chinese hackers on the Tor Network, a volunteer system of network servers that wash the origin of internet packets until they are virtually “anonymous.” While it is not their only published exploit; the Iraq War Diaries document collection, published October 2010, was considered by the Pentagon to be largest intelligence leak in U.S. military history. The Aurora Hack Operation Aurora was a persistent attack on U.S. information-dependent resources that began and continued throughout 2009. The goal of the attacks was to locate and edit the source code of important American business, computer and government resources. First to publicize the attack was Google, who found their source code had been compromised and announced their suspicion that the attacks were originating from China. The Chinese government reacted to the accusations by claiming that it was the victim of an anti-Chinese conspiracy. Other targets included  Adobe Systems, Yahoo, Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical. The Aurora Hack now considered to be the largest cyberattack on American information assets to date.
Image Removed Young Adulthood Issues and challenges Young adulthood is described as the developmental phase between the ages of 18 to 35 and involves furthering the move towards independence from the family unit. Issues and challenges exist for young adults in today’s society that did not exist in previous generations. Many changes have taken place over the last several decades such as advances in technology leading to changes in the way we communicate, higher education being necessary to increase job prospects, young people marrying later due to a general acceptance of premarital sex and cohabitation, and young women are feeling less pressured to have babies due to a wider range of career options and access to reproductive technology. Choices for both genders are numerous and the task of making important decisions begins in high school when a young person is faced with the question of what to do when they leave school. In times past, young adults’ paths were more predetermined by role, family, and gender expectations. Expectations are now less clear about what the next step is after finishing school. Many young people remain unattached to romantic partners or permanent homes choosing to live with parents for longer or sharing accommodation, travelling, working overseas, enjoying the many options for study, and working in various jobs to explore a range of occupations. Following are some difficulties a person may face in young adulthood and a brief description of how counselling may help. Separation from parents Counselling can help us to establish where we are in the separation process and how much autonomy we are feeling. What keeps us tied to our parents? Is it okay to be different from our parents? Are there fears and anxieties about independence? Counselling can also assist us in exploring our identity and how well we know ourselves, our personality, our values and goals. Often our family, peers and society influence the way we see ourselves, our lives, choices and decisions. Sometimes it can be helpful for us to explore how we really feel and what we really want and need independent of outside influences so that when decisions are made (career for instance) we can own them as our own. The transition from adolescense to young adulthood can be an exciting yet confusing time. Some of us may feel isolated and alone, as if everyone else “has it together” . Counselling can help us work through the feeling of being “in between” one stage of life and the next, often striving for independence from parents, but needing to depend on them for financial or emotional support. Developing a clearer picture of the ‘possibilities’ can help to establish hope and optimism for the future, but it can also feel overwhelming to some of us. Counselling can be a helpful and supportive experience. Intimate relationships In early adulthood, an individual is concerned with developing the ability to share intimacy, seeking to form relationships and find intimate love. Sometimes the relationships formed in adolescense carry into young adulthood. When these relationships end if can be lonely and confusing experience. If we have been with a partner for a lengthy period of time, our identify has formed in conjunction with the relationship and therefore it is not uncommon for young people to experience confusion in regards to their identity at the end of a Long-term relationship. Distress can also result if one is seeking intimate love but has not yet found it. Especially if friends have developed intimate relationships and which can inadvertantly changes the dynamic of the friendship. This can invoke feelings of loneliness and hopelessness about the possibility of finding intimate love. New friendships are formed through study and work and a young person may move into a different friendship group from that which they had in high school. Friendships are reassessed based on feelings of reciprocity, differing values and the varying life stages that one can be at during young adulthood. If you are a young adult having difficulties in any of the areas discussed in this article a Psychologist can provide you with further support. If you would like to learn more about  Young Adulthood or would like to make an appointment  please contact us.
Wednesday, September 30, 2015 Dale Gieringer On The Slippery Slope to Prohibition How the 1906 'Pure Foods and Drug Act' practically empowered the U.S. Department of Agriculture to ban dilute cocaine, thus shifting the market of that drug to the infinitely more dangerous concentrated forms .... ... and to go further, how lying about cocaine was meant to protect markets for Tobacco.  That was evident with the 1906 Act's limiting the USDA's authority over substances in the U.S. Pharmacopoeia, from which Tobacco had been deleted in 1905, and the 1910 USDA Farmers' Bulletin article "Habit Forming Agents- Their Sale and Use a Menace to the Public Welfare", which decried the use of Coca against Tobacco, so described as "what is commonly believed to be a comparatively harmless habit" - authored by L.F. Kebler.  Yet it was Kebler, who in 1912 testified at a U.S. House of Representatives COMMlTTEE ON lNTERSTATE AND FORElGN COMMERCE hearing on the Food and Drug Act, that "tobacco and preparations of tobacco contain arsenic and lead, due to the fact that there has been used in the growing of tobacco lead arsenate, a chemical to deter or kill certain pests. As a matter of fact, some tobacco contains a goodly quantity of arsenic.... most of them would be dangerous to health". One of the [1906 Food and Drug] act's central provisions was to require that medicines bear warning labels if they contained habit-forming drugs such as alcohol, opiates, cocaine, cannabis, or chloral hydrate (plus the now-forgotten alpha- and beta-eucaine, chloroform, and acetanilide). It further required that the quantities of these drugs be specified on the label. In essence, this was a "truth in labeling" policy, which, being informative, not prohibitive, was altogether consistent with the principles of J.S. Mill. Contemporary observers credited the act with a substantial decline in the use of patent medicines with dangerous intoxicants.5 However, the act had a dark side as well, as it put the power to make decisions about what drugs could be sold into the hands of a new federal regulatory agency — the Department of Agriculture's Bureau of Chemistry, the predecessor of today's FDA. In specific, the Bureau was empowered to remove products that it found to be "adulterated" with substances "deleterious" to human health, and to ban the importation of any drug deemed "dangerous to the health of the people of the United States." The definition of such terms inevitably involved subjective value judgments, which under the act would be determined by federal bureaucrats instead of individual consumers and producers in the market. The dangers of this arrangement were aptly pointed out by Sen. Nelson Aldrich (grandfather of Gov. Nelson Aldrich Rockefeller, the eponymous author of New York's punitive drug law), who warned that "the liberty of all the people of the United States" would be undermined by "chemists of the Agriculture Department" with an interest in regulation.6 No doubt Sen. Aldrich's remarks were aimed at the Bureau's crusading director, Harvey Washington Wiley, who had championed the new law. An aggressive proponent of regulation, Wiley was a forerunner of today's consumer protectionists, highly averse to chemical additives, inclined to exaggerating scientific evidence about their dangers, and prohibitionist with regards to many substances, including alcohol. Taking an aggressive interpretation of the act's provisions regarding "adulteration," Wiley sought to have several popular ingredients banned from the food supply, among them saccharin, sodium benzoate, and caffeine. His efforts wound up discrediting him with President Theodore Roosevelt, who remarked, "Anybody who says saccharin is injurious to health is an idiot."7 However, Wiley was more successful with cocaine, which enjoyed popularity as an ingredient in several tonics and beverages but had recently come into disrepute. Cocaine is derived from the coca leaf, used since time immemorial by South American Indians with no evident ill effects. It was first popularized in the form of relatively mild tonics such as the famous Vin Mariani — endorsed by Thomas Edison, Pope Leo XIII, and President McKinley — and the original Coca-Cola. Like the coca tea enjoyed in the Andes, these beverages contained low levels of cocaine, and produced no evident ill effects. However, problems began to arise with the introduction of more potent cocaine in pure, powdered form following the announcement of its remarkable pharmaceutical properties by Carl Koller in 1884. A brief flurry of medical enthusiasm was soon dampened by disturbing reports of addiction, as previously normal patients became transformed into crazed "cocaine fiends." In the South, cocaine was blamed for inciting violent behavior in blacks. In the nation's capital, cocaine was seen as "one of the growing evils of the city among the lower classes," and became a motivating factor in the District Commissioners' push for the D.C. Pharmacy and Poisons Act.8 By 1906, nearly half the states had laws prohibiting the sale of cocaine except on a doctor's prescription — essentially the model followed in the Harrison Act. Although the Pure Food and Drugs Act was not prima facie a prohibition law, its provisions regarding food adulteration gave the Bureau leverage to intervene in the marketplace. In specific, the act defined adulterants to include any "deleterious ingredient" that might render the article "injurious to health." Seizing on this provision, Wiley declared cocaine to be an "adulterant" and sued to have it removed from beverages. At no point did Wiley ever show that the low levels of cocaine in coca beverages were actually injurious to health. Indeed, coca beverages and leaf remain legal to this day in the Andean countries, where they are thought to help stave off fatigue, hunger, and diabetes. Nevertheless, Wiley succeeded in pressuring manufacturers to withdraw all cocaine from their beverages. Ironically, that left only the more potent, addictive form of cocaine available on the market as a pharmaceutical drug. Although cocaine was ultimately restricted to prescription-only use under the Harrison Act, nothing could stop it from leaking out into the nonmedical black market, eventually metastasizing into other countries and becoming one of the world's largest criminal enterprises. Wiley's ban on coca would eventually be incorporated into international law by the Single Convention Treaty (1961), at the insistence of U.S. drug bureaucrats. While criminalization of the coca trade has effectively "protected" American consumers from harmless coca beverages, it has left millions more exposed to illicit, high-potency cocaine. Meanwhile, it has inflamed a violent war in Latin America that has cost U.S. taxpayers billions of dollars, claimed thousands of casualties, and injected corruption, violence, gangsterism, and criminality into what was a peaceful and lawful business a century ago.
Monday, February 17, 2014 Black Presidential Candidates in United States History from Wikipedia Presidential candidacies from Carol Mosely-Braun,George Edwin Taylor,Shirley Chisholm,Frederick Douglass,Al Sharpton,Allan Keyes, Jesse Jackson,Lenora Fulani, and of course our current president Barack Obama are highlighted for President's Day and Black History month. Shirley Chisholm: First Black Woman to Run For President Major party African American candidates for President of the United States did not run in primaries until nearly the third quarter of the 20th century, after the passage of the Civil Rights Act (1964) and Voting Rights Act (1965) opened up political participation to blacks in the South. In addition, party changes to give more weight to candidates' performance in primaries, rather than to party leaders' negotiation in secret, opened up the fields. In 2008, Senator Barack Obama was elected the 44th president of the United States, the first African American to win the office. This article is only about major party candidates who completed full campaigns. Third party candidates and those of major parties who dropped out of the primary process early, can be found at List of African American United States presidential and vice presidential candidates. Frederick Douglass[edit] In 1888 Frederick Douglass was invited to speak at the Republican National Convention. Afterward during the roll call vote, he received one vote, so was nominally a candidate for the presidency. In those years, the candidates for the presidency and vice-presidency were chosen by state representatives voting at the nominating convention. Many decisions were made by negotiations of state and party leaders "behind closed doors." Douglass was not a serious candidate in contemporary terms. George Edwin Taylor[edit] In 1904, George Edwin Taylor was president of the National Negro Democratic League.[1] Southern Democrats were enacting laws that disfranchised most Black voters and were imposing segregation through “Jim Crow” laws. Northern Democrats seemed unwilling and/or unable to control the excesses of their Southern parties. The National Negro Democratic League was fractured by the debate over the issue of linking the nation’s currency to silver as well as to gold. By 1904, Taylor was positioned to abandon the party and bureau that he had led as president for two terms. It was not a good time to be a Black Democrat. It also was a time when lynching was creeping northward and when scientific racism was gaining acceptance within the nation’s intellectual and scientific community (see Nadir of race relations). “Judge” Taylor made that change in 1904 when the executive committee of the newly formed National Negro Liberty Party asked him to become their candidate for the office of president of the United States.[2] That party had its origin in Little Rock, Arkansas in 1897 when it was known as the Ex-Slave Petitioners’ Assembly. It was one of several leagues or assemblies that had formed at the end of the century to support bills then working their way through the United States Congress to grant pensions to former slaves.[3] These leagues claimed that membership in a league was required to qualify for a pension, if and when Congress passed such a bill. In 1900, that Assembly reorganized as the National Industrial Council and in 1903 added issues of lynching, Jim Crow laws, disfranchisement, anti-imperialism and scientific racism to its agenda, broadening its appeal to Black voters in Northern and Midwestern states. In 1904 the Council moved its headquarters to Chicago, Illinois and reorganized as the National Negro Civil Liberty Party.[4] The first national convention of that new party convened in St. Louis, Missouri in July 1904, with plans to field candidates in states that had sizeable Black populations. Its platform included planks that dealt with disfranchisement, insufficient career opportunities for Blacks in the United States military, imperialism, public ownership of railroads, “self-government” for the District of Columbia (Washington, D.C.), lynching, and pensions for ex-slaves. The convention also selected “Col.” William Thomas Scott of East St. Louis, Illinois as its candidate for the office of president of the United States for the 1904 election and William C. Payne a little-known teacher from Warrenton Virginia as his Vice-Presidential running mate. The 37-year-old Payne who later founded an industrial school in Puerto Rico, served as a Cabin Steward on the USS Dixie during the Spanish-American War.[5][6] When convention delegates had left St. Louis and when Scott was arrested and jailed for having failed to pay a fine imposed in 1901, the party’s executive committee turned to Taylor (who had just stepped down as president of the National Negro Democratic League) to lead the party’s ticket.[7] Taylor’s campaign in 1904 was unsuccessful. The party’s promise to put 300 speakers on the stump to support his candidacy and its plan to field 6,000 candidates for local offices failed to materialize. No newspaper supported the party. State laws kept the party from listing candidates officially on election ballots. Taylor’s name failed to be added to any state ballot. The votes he received were not recorded in state records. William Scott later estimated that the party had received 65,000 votes nationwide, a number that could not be verified.[8] Shirley Chisholm[edit] In 1972, Shirley Chisholm was the first African-American major party candidate for president. She was a candidate for the Democratic Party nomination and participated in the Democratic primaries in numerous states.[9] She campaigned in 12 states and won 28 delegates.[10] In 1984 and 1988Jesse Jackson was the first major party black candidate to run nationwide primary campaigns. He also competed as a Democratic Party candidate.[11] In 1992 Alan Keyes was the first African-American candidate to run in the Republican presidential primaries.[citation needed] Keyes participated again, unsuccessfully, in 1996, 2000, and 2008. In 2004, Carol Moseley Braun and Al Sharpton were unsuccessful candidates in the Democratic primaries. "Tea Party" Republican Herman Cain has announced his candidacy for the presidency in 2012, though the nomination ultimately went to Mitt Romney. President Barack Obama[edit] Senator Obama was identified as a potential candidate for president of the U.S. after his eloquent speech at the 2004 Democratic National Convention.[12] The distinct possibility of an African American becoming elected was realized as the Democratic primary elections got under way in early 2008. Barack Obama emerged as a serious contender for the nomination[13] and was the first African American to win the nomination of a major party in a United States presidential election. As the Democratic Party's nominee he went on to win the general election on November 4, 2008. On January 20, 2009 he was sworn in as the first African American president of the United States. He was re-elected to a second term as President on November 6, 2012. The implications of his victory were discussed during the race, and one focus included the effect on race relations,[14] American society[15] and federal politics. The discussions took place in political circles, on cable news by pundits and professionals, in print journalismacademia, and on the blogosphere. Analysts addressed his heritage and cultural identification, his strong emphasis on family, academic training, community work, and two decades in an active faith community. Impact of African-American Presidential Candidates[edit] The results of African-American presidential campaigns have ranged from winning the presidency to ending before primary voting began. However, all of the candidates have had a political impact by making sure their voices were a part of the national debate and gaining some attention from their party’s establishment. Chisholm paved the way for African American and female candidates. Her goal was to make the Democratic Party more responsive to the people. When describing her reasons for running Chisholm said, “I am not the candidate of black America, although I am black and proud. I am not the candidate of the women’s movement of this country, although I am a woman, and I am equally proud of that…I am the candidate of the people of America.”[16] In the 1972 primary, Chisholm won more than 430,000 votes[17] in fourteen states and 28 delegates at the Democratic Convention in Miami.[18] Chisholm provided a boost to George McGovern, the eventual Democratic nominee, when she campaigned for him after the convention. Chisholm’s candidacy inspired many women and African Americans to make a difference in politics.[19] As the first African American and woman to run for the nomination of a major party, Chisholm paved the way for Jesse Jackson Sr. who would be the next major African American candidate to run. For future candidates, Chisholm advised, “the next campaign by a woman or black must be well prepared, and well financed; it must be planned long in advance, and it must aim at building a new coalition.”[20] Jackson seemed to follow Chisholm’s advice in his 1984 run for president. His 1984 campaign sought to bring together a “Rainbow Coalition” of African Americans, Hispanics, the poor, the elderly, family farmers, and women that would challenge the conservative policies of president Ronald Reagan.[21] Jackson placed third out of ten candidates for the Democratic nomination with more than 3 million primary votes.[22] He won primaries or caucuses in four states and the District of Columbia. Jackson’s campaign made enormous progress by building on Chisholm’s legacy. His 1984 campaign registered nearly 2 million voters of all racial backgrounds.[23] By registering so many new voters, Jackson expanded the Democratic Party’s base. He also inspired African American voters. Exit polls showed that nearly 12% of all Black voters were participating for the first-time.[24] Jackson’s campaign won him a speaking slot at the 1984 Democratic Convention, which provided a national platform for him to present his agenda.[25] In his 1988 campaign, Jackson increased his support to 6.9 million primary votes and won 9 states, the District of Columbia and Puerto Rico.[26] Sharpton and Moseley Braun followed Jackson’s campaign when they ran for the Democratic presidential nomination in 2004. Moseley Braun, having already made history as the only African American woman elected to the United States Senate, became the most visible female candidate to run for the 2004 Democratic presidential nomination. She advocated for expanding opportunity and encouraged women to seek positions of power. “Now is the time for Democrats to renew hope that we will leave [the American Dream] for the next generation in even better shape than we found it,” Moseley Braun said, “And a woman can lead the way.”[27] Though Moseley Braun ended her campaign in January 2004, she earned a speaking slot at the Democratic Convention in Boston where she had a national platform to advocate for equal rights.[28] Sharpton’s 2004 campaign also focused on equal rights. In describing why he was running, Sharpton said, “ I think if we stand up for workers’ rights, stand up for a peace plan worldwide, stand up for the constitutional rights of every American, those people will come back [to the Democratic Party], and those people are the majority of Americans.”[29] Like Moseley Braun, Sharpton’s campaign allowed him to participate in the early nationally televised Democratic Party primary debates, and earned him a speaking slot at the 2004 Democratic Convention, the same year future president Barack Obama gained national attention for his convention speech. On the Republican side, Keyes first ran for the nomination in 1996 seeking to force his party to focus on social issues such as abortion. Keyes garnered a lot of free media during this campaign.[30] The number of primary votes Keyes received increased from his 1996 campaign (471,716) to his 2000 campaign (914,548) but his vote total decreased in his 2008 primary run (58,977).[31] African American presidential candidates have a variety of reasons for joining the race. Some candidates run to because they think they can win. Others run to influence the national debate by advocating for specific policy proposals. African American candidates seek to inspire their community to participate in the electoral process and hold elected officials accountable. Some run for a combination of these reasons.[32] Above all, African Americans run, like all candidates, to make their voices heard. Regardless of their reasons for running, these candidates have broken down barriers for other African Americas, Latino, and women. In less than four decades, African American presidential candidates have increased their support from Chisholm winning 430,000 primary votes to Obama being elected president with more than 69 million. "Black presidents?"[edit] Various commentators have suggested a president could be recognized as the "first black president of the United States" for their contributions to the well-being of African AmericansRepublicanAbraham Lincoln was suggested because of his role as the "Great Emancipator" of four million blacks in the South after the American Civil War.[33] Toni Morrison labeled Democrat Bill Clinton the first black president of the United States.[34][35][36] Morrison suggested that Clinton was "blacker than any actual black person who could ever be elected in our children's lifetime."[37] Author and professor Angela Dillard stated such claims constituted a "silly and defeatist notion" that separated the black community.[38]
Mardi Gras is celebrated around the world, but today we’d like to teach you bit of French to help get you in the mood! Le mardi gras is literally Fat Tuesday in French, and is also knows as le carneval. It is a Christian holiday but a popular cultural phenomenon and dates back thousands of years to pagan spring and fertility rites. Mardi Gras is celebrated around the world – mainly those with large Roman Catholic populations – on the day before the religious season of Lent begins. Les dates de mardi gras Mardi Gras takes place 46 days before Easter, le Pâques, which usually falls between February 3 and March 9. Mardi Gras is the day before le carême or Lent and begins on Ash Wednesday, le mercredi des Cendres. The infamous party in la Nouvelle-Orléans or New Orleans is quite the celebration but it’s also celebrated across Europe and the Americas. Did you know? Rex, one of the oldest Mardi Gras krewes, has been participating in parades since 1872, and established purple, gold and green as the iconic Mardi Gras colors. Mardi gras colors! Purple (justice) Gold (power) Green (faith) le violet l’or le vert Le vocabulaire de mardi gras —  Mardi Gras vocabulary une babiole trinket un bal masqué costume ball un bijou jewel le capitaine captain un char float un collier necklace un costume costume le courir Mardi gras run une couronne crown un défilé parade un déguisement disguise un doublon doubloon une effigie effigy un feu de joie bonfire un flambeau torch la foule crowd un krewe krewe (Mardi gras organizer) un mardi gras  a person who really gets into celebrating the holiday le masque mask une paillette sequin une perle bead la plume feather la reine queen le roi king INGCO International is proud to offer translation, interpreting and global marketing services in 200+ languages across the globe. Get in touch with us to learn more! %d bloggers like this:
Thursday, March 19, 2009 Ecological Legitimacy Laura Pulido discusses cultural essentialism as having assumptions about indigenous groups and “third world” communities thus leading to negative assumptions of these people based on pre-conceived connotations made by what she refers to as “officialdom”. The relationship between the Hispanos in northern New Mexico and the United States government is used as the case study about ecological legitimacy and essentialism. This area was originally inhabited by Pueblo Indians until Spanish conquistadors and mestizo settlers began to settle the region. Hispanos lived in the area and their communities were based on collective ownership over the land. After the United States gained control of the region in 1848, they did not recognize communal land ownership, thus leading to the commodification of the land, this in turn increased resource consumption. All of this lead to the economic downfall of the Hispano people, and although there were some attempts for development projects, rarely did they address the loss of the Hispano land. All the development within the region focused on changing the individual while ignoring the original thriving rural economy, which was relatively self-sufficient. Laura Pulida attempts to shed light on the misinterpretation of ecological legitimacy among traditionalistic poor populations. She uses the case of the Hispanos in New Mexico and their communal land tenure and once becoming commodified lacking very little if any means of subsistence. Pulido points towards the misinterpretation and negative bias towards traditional cultures inability to properly and sustainably tend to the land in an environmentally friendly way. While these people have successfully grazed and persisted on these lands since the late 17th century, once commodified, and government control of the land took over, the Hispano people lost their traditional way of subsistence. Are now being blammed for their poverty while the government is failed to be seen for its actions. 1 comment: 1. It is sad to know that tribes need to legitimize with their means of nature even though they are perfectly capable of ensuring and providing for themselves. I don't believe that money is the only way we can do something to help the environment. Hospano's who provide for themselves believe that nature needs to be utilized so nothing is wasted. When cultural, economical, and ecological processes are used to provide this viability, these strategies screw over these tribes.
Top 10 Solid Examples of Pavlov Classical Conditioning in Action By Ravivaarman Batumalai The following article lists some simple, informative tips that will help you have a better experience with musical educations. Knowledge can give you a real advantage. To make sure you're fully informed about musical educations, keep reading. What's Pavlov Classical Conditioning? This theory can be defined as a form of associative learning that was first demonstrated by Ivan Pavlov, a Russian psychologist. Since Ivan Pavlov founded this theory with his breakthrough research techniques, it's also known as "Pavlov classical conditioning." More Explanation On Pavlov Classical Conditioning The typical procedure for inducing this theory involves pairing an unknown brand, things, words, and music repeatedly together with some other stimulus that you know already automatically elicits positive feelings or emotions. Let me enlighten you with more examples of classical conditioning theory in action if you're still blank. 10 Solid Examples Of Classical Conditioning In Action 1. Pairing a popular music together with the products in advertisements to generate positive feelings and liking towards the products 2. Christmas music played in store may trigger the sweet memories and the habits of giving and sharing in a consumer's mind and thus will persuade he or she to enter the store 3. Political candidates try to appear in TV with patriotic background music to elicit the patriotic feelings of the voters 4. Consistently advertising a product on exciting game shows may result in the product itself generating an excitement response. 5. Guys tend to associate themselves with anything that the girls like in order to create a good impression in their mind and eventually win their hearts. 6. Girls may tend to symbolize themselves as a "sex symbol" to instantly attract the guys to approach them to start a relationship. 7. People who receives chemotherapy often vomit during or shortly after the procedure. After several chemotherapy sessions, people begin feeling sick at the sight of the treatment room. 8. The sight of food will make you hungry. Soon every time you go into the kitchen, you will feel hungry too. 9. Whenever you see a scary movie, you will always eat a box of thin mints. Now you will find that just seeing thin mints makes you feel scared. 10. If you met a new person who is an excellent cook, after a few superb meals you will find yourself liking that person very much. Bonus Part: How To Do Hypnosis Mind Control/Persuade Someone With Pavlov Classical Conditioning Theory? Step 1: Learn as much as you can (feelings and behaviors) about your target audience and focus on the final outcome that you want them to response. Step 2: Associate yourself together with the positive feelings or your audience's favorite behaviors and keep on repeating it Step 3: Your audience will eventually associate you with something positive in their minds and thus will like you. Once you've achieved this, you can learn how to persuade someone easily and won't get rejected. Step 4: Go here to learn more on how to use Pavlov classical condition theory to do hypnosis mind control or persuade someone. That's the latest from the musical educations authorities. Once you're familiar with these ideas, you'll be ready to move to the next level.
Biological Therapy What Is Biological Therapy? biological-therapy-treatmentBiological therapy is a type of treatment that works with your immune system. It can help fight cancer or help control side effects (how your body reacts to the drugs you are taking) from other cancer treatments like chemotherapy. • Boosting the killing power of immune system cells • Enhancing the body’s ability to repair or replace normal cells damaged or destroyed by other forms of cancer treatment, such as chemotherapy or radiation • Preventing cancer cells from spreading to other parts of the body What Are Cancer Vaccines? biological-therapy-treatment1Cancer vaccines are a form of biological therapy. While other vaccines (like ones for measles or mumps) are given before you get sick, cancer vaccines are given after you have cancer. Cancer vaccines may help your body fight the cancer and keep it from coming back. Doctors are learning more all the time about cancer vaccines. They are now doing research about how cancer vaccines can help people diagnosed with melanoma, lymphoma, and kidney, breast, ovarian, prostate, colon, and rectal cancers. How Does Biological Therapy Fight Cancer? Doctors are not sure how biological therapy helps your immune system fight cancer. But they think it may: • Stop or slow the growth of cancer cells. • Make it easier for your immune system to destroy, or get rid of, cancer cells. • Keep cancer from spreading to other parts of your body. Do you have your medical reports; send us now for a free quote Or email at / Call +91 9029304141 click here
If your bone marrow has been invaded with cancer cells, hematopoietic stem cell removal may be preceded by one or more courses of chemotherapy. Removal (called harvest) of bone marrow stem cells is done while you are under general or epidural anesthesia. The harvest is done by using a long needle to repeatedly remove a sample of bone marrow fluid from multiple areas in your pelvic and hip bones. Tips Bone Marrow Growth Factors Peripheral blood The harvest of peripheral blood stem cells is similar to the process of platelet donation. It uses an apparatus, called an apheresis device, which removes hematopoietic stem cells from blood by a filtration process. Blood is removed from a vein in one location, filtered, and then returned to a vein in another location. The process does not require anesthesia. In order for there to be sufficient numbers of hematopoietic stem cells in the blood, you (or the donor) must first be treated with either chemotherapy or a growth factor that stimulates the production of hematopoietic stem cells. Healthy donors only receive growth factor; patients with cancer may receive growth factor alone or chemotherapy plus growth factor. The most commonly used growth factor is granulocyte colony-stimulating factor. Allogeneic bone marrow harvest People who donate their bone marrow will undergo harvest the day of transplant or one day prior. The donor is usually given general anesthesia to prevent pain. Following the procedure, pain in the donor is usually relatively minor and can be treated with pain medications such as acetaminophen. The donor may be hospitalized overnight following the procedure, and generally returns to his or her prior state of health within the following one to two weeks. Myeloablative therapy As noted above, many patients receiving bone marrow transplantation will undergo myeloablative therapy, which destroys bone marrow function as part of the intensive treatment for the patient's underlying cancer. The purpose of this treatment is to reduce the amount of cancer in the body and also to suppress the immune system adequately so that the graft will not be rejected. Depending upon the underlying disease and other factors, this phase of treatment may involve intensive chemotherapy, total body irradiation (radiation therapy), or both. After your bone marrow or cord blood transplant, your new cells will start to grow and make new blood cells. This is called engraftment. Engraftment is an important milestone in your transplant recovery. Risk of infection You will be at highest risk of infection until your new cells engraft. This is because you will have fewer than normal numbers of white blood cells. White blood cells are the part of the immune system that help prevent or fight infections. Your health care team will take steps to protect you from infections and treat any infections that develop. If you experience any symptoms of infection tell your doctor right away. For tips on how to minimize the risk infections, see Infection prevention. Diet can have significant effect on the immune system function. Overeating, especially consuming foods rich in simple carbs such as sugar and too much fat, can negatively affect the ability of your body to fight infections. Overeating increases insulin which can interfere with immune system function. On the other hand, malnutrition can have similar effect. Because of this, it is important to have balanced diet which consists of mainly natural, unprocessed foods and avoid overeating. Also, short term fasting and controlled calorie restriction can actually reflect positively on white blood cell production. When it comes to exercise, short-term, high-intensity activities such as sprinting are much better in boosting immune system function unlike long distance running. Actually, jogging and especially marathons can have opposite effect on its function. Many marathon, triathlon and ironman competetors often get sick after such demanding competitons, due to drastic increase in cortisol which is characteristic for these kind of activities. Cortisol suppress immune system which decreases production of white blood cells. On the other hand, exercises such as sprinting can stimulate activity of the bone marrow and increase growth hormone, while preventing chronic increase in cortisol production. Managing side effects after a bone marrow transplant Some important medications you will take after your transplant, such as those used to prevent graft-versus-host disease or infection may cause side effects with different degrees of severity. Tell your health care team about any side effects you experience. Often there are ways to reduce side effects or make medications more tolerable. Transfusions and growth factors Until your new cells engraft, you may get red blood cell or platelet transfusions. The number of blood and platelet transfusions you will need will vary greatly between patients and even at different times for the same patient. After an autologous transplant, when you receive your own cells for the transplant, some patients also receive growth factors. Growth factors are medications that stimulate the marrow to make more blood cells, and help transplanted cells engraft more quickly. A common growth factor for white blood cells is granulocyte-colony stimulating factor. Some patients may also receive growth factors to stimulate the marrow to make more red blood cells or platelets. Waiting for engraftment After you receive your transplant, your care team will watch you closely for signs of engraftment. Engraftment is when the new blood-forming cells start to grow and make healthy blood stem cells that show up in your blood. You will have daily blood samples taken while you are waiting for your cells to engraft. A laboratory will perform a CBC, or complete blood count test. The CBC test shows the numbers of and kinds of cells in your blood. Neutrophil engraftment Neutrophils are a type of white blood that are important for fighting bacterial infections. Neutrophils are also an important measure of engraftment. Neutrophils in your bloodstream will be counted in your CBC. An absolute neutrophil count (ANC) of 500 or more for 3 days in a row is a sign of engraftment. For patients who receive marrow or peripheral blood stem cells, neutrophil engraftment can occur as early as 10 days after transplant but is more common around 14-20 days. Patients who receive cord blood may need more time to engraft (typically about 25 days but sometimes as long as 42 days). Platelet engraftment Platelets help control bleeding. Your CBC test will show the number of platelets in your bloodstream. A platelet count of 20,000 to 50,000 is a sign of platelet engraftment. For patients who receive marrow or PBSC (peripheral blood stem cells), platelet engraftment often happens a little bit after neutrophil engraftment. For patients who receive cord blood, it may be 8 weeks or longer after transplant before platelets engraft. Your diagnosis, "bone marrow growth disorder," is indeed rather vague. All blood cells - red blood cells, white blood cells, and platelets - are manufactured in our bone marrow. You have evidence of a deficiency or suppression of both your red cells (anemia) and white cells (neutropenia). Hopefully, your hematologist is searching for the exact cause of these deficiencies or suppression of your bone marrow. Anemia can be associated with many symptoms, including fatigue, rapid heartbeat, shortness of breath, etc., and this is probably at least partially responsible for your feeling "tired and sluggish." The treatment for anemia depends on the cause or causes. You are apparently deficient in B12 and B6, which can lead to anemia, and therefore are being treated with vitamin supplementation. Procrit is a medication that is biologically indistinguishable from a naturally occurring hormone called erythropoietin. Procrit stimulates the bone marrow to make additional new red cells. It cranks up the production at the red cell factory (the bone marrow). It is not a "cure" for an underlying problem, but it can be extremely helpful in raising red blood cell counts and thus in resolving the symptoms associated with anemia. White blood cells help us fight off certain types of infections - particularly bacterial infections. Your low count could put you at increased risk. There is a medication for stimulating white blood cell production. Its effect on white blood cells is analogous to that of Procrit on red cells. It's called neupogen. As for your condition "veering into leukemia if not treated," I'd suggest you talk to your hematologist and ask for more details. Since this is an HIV information site, I'll assume you are also HIV-positive. You should also have your HIV specialist discuss your condition with your hematologist. Bone marrow suppression can result from certain HIV medications (such as AZT) or certain HIV/AIDS-related opportunistic infections. Your "tired and sluggish feelings" should improve as your Procrit kicks in and your anemia improves. The usual starting dose is 40,000 units once per week. It's self-administered by a small injection given just under the skin. Build Strong Bones Characterized by weak and brittle bones, osteoporosis and its precursor osteopenia affect 44 million Americans and cause more than 2 million bone fractures every year, according to the American Academy of Orthopaedic Surgeons (AAOS). Fortunately, there's a lot you can do to keep your bones strong and lower your risk of osteoporosis. It's never too early to start.Click through the slideshow to learn simple ways to keep your bones strong. Start Young Think of your bones as a retirement savings account; you need to bank a lot of funds when you're young so that you have plenty to draw on as you get older. Bones reach peak density when you're in your 20s. From then on, your job is to keep those levels up by getting enough calcium and vitamin D, exercising, and taking other steps. Milk It Milk is full of calcium (the foundation of healthy bones) and vitamin D (helps the body absorb calcium). On its own, vitamin D helps build and repair bones and keeps muscles strong, which reduces the risk of falls. Aim for 1,200 mg of calcium a day—about four glasses of nonfat milk or three cups of nonfat yogurt—and 1,000 of vitamin D, according to the National Osteoporosis Foundation. If you don't do dairy, drink calcium- and vitamin D-fortified orange juice, or non-dairy fortified milks like soy, almond or coconut milks and consider taking supplements. Don't Smoke, Limit Drinking Smoking increases the rate of bone loss. Women who smoke have lower levels of estrogen and tend to hit menopause sooner, both of which accelerate bone loss. If you drink, keep it to no more than two drinks a day for men and one drink a day for women. Anything more will interfere with your body's ability to absorb calcium and will also slow new bone formation. Meat in Moderation The popular saying “all things in moderation” definitely applies to meat, especially when it comes to healthy bones. Calcium and phosphorous help the body digest animal protein. Eating too much red meat, fish, pork, and poultry can sap these resources from the bone. On the other hand, protein deficiency hinders calcium absorption in the intestines. The solution? Limit your animal protein intake to no more than twice a day, and eat small portions—about 3 ounces, or the size of a deck of cards. Family Health and Nature© 2014. All Rights Reserved. Template By Seocips.com SEOCIPS Areasatu Adasenze Tempate Tipeex.com
Stinkbugs, Stick Insects and Stag Beetles And 18 More of the Strangest Insects on Earth by Sally Kneidel, Sally Written by Sally Kneidel, Sally Illustrated by RRP £19.99 Why does a Madagascan giant hissing cockroach hiss? How do bombardier beetles spray chemicals that are the temperature of boiling water? Why do leaf-cutter ants carry bits of green leaves over their heads? Nothing is more exciting than getting an up-close look at the amazing lives of unusual insects. In this wonderfully detailed guide, written by the author of the kids' perennial favorites Pet Bugs and More Pet Bugs, you can find the answers to everything you ever wanted to know about the behavior of the weirdest bugs on our planet. From burying beetles and back swimmers to robber flies and Madagascan giant hissing cockroaches, Stinkbugs, Stick Insects, and Stag Beetles digs deep into the creepy, crawly world of these strange and tiny creatures. You'll learn what each bug looks like, where to find it, and how its odd habits help it to survive. With lots of illustrations and observing activities, Stinkbugs, Stick Insects, and Stag Beetles will show you just how incredible the strangest bugs in the world can be. About the Author SALLY KNEIDEL, a former science teacher with a Ph.D. in biology from the University of North Carolina at Chapel Hill, has stalked bugs from the mountains of Switzerland to the tropical rain forests of Costa Rica. She is the author of eight science books, including Creepy Crawlies and the Scientific Method and Wiley s bestselling Pet Bugs and More Pet Bugs. More books by this author Other Formats Book Info 128 pages Interest Age: 8-12 Sally Kneidel, Sally More books by Sally Kneidel, Sally Publication date 24th July 2000 Harriet Cunningham Emily Jacques Erica Motoc, age 7 Jessica Cobbin – age 7 Rachel Bridgeman Jasmine Harris-Hart, age 12 Katie Lonsdale Sam Bateman and family Lovereading 4 schools
IDDM --> insulin-dependent diabetes mellitus medical dictionary A chronic condition in which the pancreas makes little or no insulin because the beta cells have been destroyed. The body is then not able to use the glucose (blood sugar) for energy. IDDM usually comes on abruptly, although the damage to the beta cells may begin much earlier. The signs of IDDM are a great thirst, hunger, a need to urinate often, and loss of weight. To treat the disease, the person must inject insulin, follow a diet plan, exercise daily, and test blood glucose several times a day. IDDM usually occurs in children and adults who are under age 30. This type of diabetes used to be known as juvenile diabetes, juvenile-onset diabetes, and ketosis-prone diabetes. Acronym: IDDM (09 Oct 1997)
Home > Signal > TMI This text was prepared by Gökce Aydin TMİ, Telefonla Merkezden Idare TMİ stands for “Telefonla Merkezden Idare”. It is a type of manual traffic control using written train orders. The system is operated by local stations but regulated by a line dispatcher. In TMİ system, dispatcher works in a centralized office. He constantly watches the current train traffic by means of tabular data sheets of train traffic and also traffic diagrams. He prepares the appropriate solutions for the traffic regulation and calls the local operators (local station staff) to transmit the orders. The local station staff repeats the order back to the dispatcher and then the order becomes valid. The local station staff prepares written orders from the orders they take from the dispatcher and hand them to train crews. Trains are allowed to exit from a local station area only if they get the appropriate order to depart. Local operators are also responsible for calling the dispatcher and inform the dispatcher about departure and arrival of trains from/to their stations. By this way dispatcher is able to watch the traffic. And he regulates the passing/overtaking operations accordingly. In TMİ system, trains can follow each other at station distance. This means that, a train is only allowed to depart from a station when the preceding train arrives at the next station and clears the entrance to the next station. This absolutely doesn’t lead to a high capacity of line and the system is used in the lines having a relatively low traffic density. It is very safe however. TMİ system is sometimes combined with a (mechanical) signaling system. But the signals are only provided at the entrance and exit of the interlocking areas, there are no intermediate block signals. So, the principle of train separation by station distance still applies in such lines. On such lines, the signals are mainly used to tell the driver that he has to stop at the station and collect a new order. It may also tell the driver to stop the train before entering the station. Also, the signaling system means that an interlocking system is set up within the station and leads to an increased safety and flexibility. If there is no signaling system, the situation is shown to the train crews by means of green or red flags. In such lines, driver has to approach the station at such a low speed that he may stop the train before entering the station. Also the driver cannot know whether the route set is straight or diverging, and he has to pass the entrance points at a reduced speed. This speed is generally 30 km/h. This is not the case when a signaling system exists since the aspect of the entrance signal is announced at the related distant signal (called approach signal). In this case the speed at station entrance is limited to 40 or 55 km/h depending on the kind of interlocking system. In TMİ lines, the passing/overtaking operations are scheduled and shown on the timetables/traffic diagrams. If there is not any signaling system, trains have to stop at all scheduled passing/overtaking stations. If there is a signaling system, they may pass without stopping, because the required safety is provided by the interlocking system. In 2004, TMİ system was in use on the following lines: • Eskişehir to Alayunt; Afyon; Konya; Ulukışla and Yenice • Alayunt to Kütahya; Balıkesir; Manisa; İzmir • Manisa to Uşak and Afyon • İzmir to Aydın; Goncalı and Denizli • Irmak to Zonguldak Manual Traffic Regulation Manual Traffic Regulation is another train order system. This system is the same as TMI, with only one exception: the traffic regulation is done between the local operators and there is no line dispatcher. The local operators communicate with each other by means of telephone and even telegraph.
John Graham of Claverhouse was a 17th century Scot, of minor nobility, who played a prominent role in the political and military events in Scotland during a particularly turbulent period between the Restoration of the Stuart Monarchy under Charles II in 1660, and the Glorious Revolution in 1689. His fame and infamy sit side by side in most common accounts of Scottish History. And of the many Scottish historical figures traduced by tradition (for example Mary, Queen of Scots and Bonnie Prince Charlie), he has perhaps been treated the harshest. Born in 1647, his early military career was spent in Europe and was largely without incident bar a muted tradition that, at the Battle of Seneff (in modern Belgium) in 1674, he was involved in saving from likely death, William of Orange. Who, 14 years later, was to become with his sister, joint ruler of the United Kingdom. In 1678 he was given a lieutenant’s commission in the newly raised Regiment of Horse Guards and in due course was dispatched to the south west of Scotland to begin his efforts to enforce law and order in that troubled area.Between 1682 and 1683 he served as Sheriff of Wigtown and was charged by the Scots Privy Council with the maintenance of law and order at a time when Covenanting conventicles (open air religious gatherings of the Protestant faithful) were deemed by the authorities to constitute a major threat to the political establishment. The primary historical records indicate that he performed this difficult task well, treating all he came across with a fair and even hand He was subsequently promoted to Colonel of the King’s Regiment of Horse and for the next 5 years was in the service of King Charles II and then his successor, James II, who created him first Viscount Dundee. At the end of 1688, when James was harried from his throne and supplanted by William and Mary, James commissioned Dundee his Lieutenant-General in Scotland. In the spring of 1689 Dundee raised an army in Scotland to restore James to his throne. In July of that year he led this army to victory over a redcoat army loyal to William. However, he was killed in the battle. With his death the driving force behind the rising was gone and King James’ army in Scotland was defeated a few months later. This first Jacobite Rising was followed by other unsuccessful movements in 1708, 1715 and 1719 before the Jacobite cause, restoring the Stuart monarchy to the throne of the United Kingdom, was finally put to rest at Culloden Moor in 1746. Three centuries later the memory of injustices alleged to have taken place at his hands, and for which little or no evidence exists, are given prominence and his achievements ignored. Firstly, prominent and highly acclaimed scholars have written false accounts of these events. Among these are Daniel Defoe, a 17th Century journalist and spy, and Thomas Babington Macaulay; a renowned politician and historian. Secondly, equally prominent novelists, who deal entirely with fiction, have entwined Claverhouse in their novels and attributed to him words and actions which were simply not his. Foremost amongst these is Sir Walter Scott and in particularhis otherwise magisterial work Old Morality. Thirdly, there are contemporay scholars who chose to present the events of the late 17th century Scotland as some simplistic, idealised struggle between simple, hard-working and God-fearing folk on the one hand and a rapacious, heavy-handed State bent entirely on the destruction of this honourable way of life. It is the purpose of this website to redress this imbalance. To extol Dundee’s many demonstrable virtues. To highlight the many positive aspects of his life and career. And to bring to a wider audience the knowledge of the great man that he truly was. Leave a Reply WordPress.com Logo Twitter picture Facebook photo Google+ photo Connecting to %s %d bloggers like this:
Industrial and multiphase power plugs and sockets From Wikipedia, the free encyclopedia Jump to: navigation, search Pin and sleeve connectors Industrial and multiphase plugs and sockets provide a connection to the electrical mains rated at higher voltages and currents than household plugs and sockets. They are generally used in polyphase systems, with high currents, or when protection from environmental hazards is required. Industrial outlets may have weatherproof covers, waterproofing sleeves, or may be interlocked with a switch to prevent accidental disconnection of an energized plug. Some types of connectors are approved for hazardous areas such as coal mines or petrochemical plants, where flammable gas may be present. Almost all three-phase power plugs have an earth (ground) connection, but may not have a neutral because three-phase loads such as motors do not need the neutral. Such plugs have only four prongs (earth, and the three phases). An example of a socket with neutral is the L21-30 (30 A) and the L21-20 (20 A) both of which have five pins (earth, neutral, and X, Y, Z phases). While some forms of power plugs and sockets are set by international standards, countries may have their own different standards and regulations. For example, the colour-coding of wires may not be the same as for small mains plugs. Concepts and terminology[edit] Generally the plug is the movable connector attached to an electrically operated device's mains cable, and the socket is fixed on equipment or a building structure and connected to an energised electrical circuit. The plug has protruding pins or, in US terminology, blades (referred to as male) that fit into matching slots or holes (called female) in the sockets. A plug is defined in IEC 60050 as an accessory having pins designed to engage with the contacts of a socket-outlet, also incorporating means for the electrical connection and mechanical retention of flexible cables or cords, a plug does not contain components which modify the electrical output from the electrical input (except where a switch and/or fuse is provided as a means of disconnecting the output from input). In this article, the term 'plug' is used in the sense defined by IEC 60050. Sockets are designed to prevent exposure of bare energised contacts. To reduce the risk of users accidentally touching energized conductors and thereby experiencing electric shock, plug and socket systems often incorporate safety features in addition to the recessed slots or holes of the energized socket. These may include plugs with insulated sleeves, recessed sockets, sockets with blocking shutters, and sockets designed to accept only compatible plugs inserted in the correct orientation. The term plug is in general and technical use in all forms of English, common alternatives being power plug,[1] electric plug,[2] and (in the UK) plug top.[3] The normal technical term (in both British and International English) for an AC power socket is socket-outlet,[4] but in non-technical common use a number of other terms are used. In British English the general term is socket, but there are numerous common alternatives, including power point,[5] plug socket,[6] wall socket,[7] and wall plug.[8] In American English receptacle and outlet are common, sometimes with qualifiers such as wall outlet, electrical outlet and electrical receptacle, all of these sometimes to be found in the same document.[9] Electrical sockets for industrial, commercial and domestic purposes generally provide two or more current carrying (live[10][11]) connections to the supply conductors. These connections are classified as poles. A pole will be either a neutral[12]connection or a line[13] Neutral is usually very near to earth potential, usually being earthed either at the distribution board or at the substation. Line (also known as phase or hot, and commonly, but technically incorrectly, as live) carries the full supply voltage relative to the neutral (and to earth). Single phase sockets are classified as two pole (2P) and provide a single line contact and a neutral contact. In addition, a protective earth[14] (Ground in American terminology) contact is usually, but not always, present, in which case the socket is classified as two pole and earth(2P+E). Three phase sockets provide three line contacts, they may also include either or both of a neutral and protective earth contact. The designations of the three contacts may vary. The IEC standards use the Line designations L1, L2 and L3.[15] NEMA standards use the Phase designations X, Y and Z.[16] Sockets intended for use with the American split Phase distribution system may have two line contacts and neutral. In this case the line designators X and Y are used.[16] They may also include a protective earth contact. 32 A 400 V 3P+N+E 16 A P+N+E 230 V plug Mated 16 A plug and wall-mounted socket Europe-wide IEC 60309 system[edit] In Europe, the most common range of heavy commercial and industrial plugs are made to IEC 60309 (formerly IEC 309) and various standards based on it (including BS 4343 and BS EN 60309-2). These are often referred to in the UK as CEE industrial, CEEform or simply CEE plugs, or as "Commando connectors" (after the MK Commando brand name for these connectors). Plugs are available in P+N+E (unbalanced single phase with neutral), 2P+E (balanced single phase), 3P+E (3 phase without neutral), and 3P+N+E (three phase with neutral). Current ratings available are 16 A, 32 A, 63 A, 125 A and 200 A. Voltage and other characteristics are represented by a colour code (in three-phase plugs the stated voltage is the phase-phase voltage, not the phase-neutral voltage). The different voltages have the earth pin of a larger diameter than the others, and located in different places depending on the voltage rating, making it impossible to mate, for instance, a blue plug with a yellow socket. Since the different current ratings have different overall sizes, it is also not possible to mate different pin configurations or current ratings. For example, a 16 A 3P+E 400 V plug will not mate with a 16 A 3P+N+E 400 V socket and a 16 A P+N+E 230 V plug will not mate with a 32 A P+N+E 230 V socket. Characteristic[a][c] Colour Earth pin 50–250 V DC White 3h, 90° >250 V DC White 8h, 240° 277 V 60 Hz only[d] White 5h, 150° 380 V 50 Hz only[e][f] White 3h, 90° 440 V 60 Hz only[e][f] White 3h, 90° 100–130 V[g] Yellow 4h, 120° 200–250 V[d] Blue 6h, 180° 120–250 V[e] Blue 9h, 270° 380–480 V[e] Red 6h, 180° 380–480 V[h] Red 11h, 330° 380–415 V[d] Red 9h, 270° 480–500 V[e] Black 7h, 210° 500–680 V[e] Black 5h, 150° 100–300 Hz[i][f] Green 10h, 300° 300–500 Hz[j][f] Green 2h, 60° Any of the above[b] Grey 12h, 0° None of the above[k] Grey 1h, 30° 1. ^ All AC systems are either 50 or 60 Hz unless otherwise stated. 2. ^ a b Single and 3 phase (3P+E only) supplied from an isolating transformer (except for yellow plug supplies). 3. ^ All three phase plugs and socket are available in 3P+E or 3P+N+E (but see [b]). 4. ^ a b c Single phase 5. ^ a b c d e f Three phase line voltage (phase-phase). 6. ^ a b c d Only available in 16 and 32 A sizes. 7. ^ Single phase voltage or three phase line voltage (phase-phase) including supplies from an isolating transformer. 8. ^ Three phase line voltage (phase-phase) at 60 Hz only. 9. ^ Greater than 50 volts three phase line voltage (phase-phase). Not available in single phase version. 10. ^ Greater than 50 volts single phase or three phase line voltage (phase-phase). 11. ^ Most frequently used for low voltage supplies that do not fall into any of the specified ranges. Yellow 2P+E, blue P+N+E, yellow 3P+E, red 3P+E, and red 3P+N+E are by far the most common arrangements. Blue P+N+E sockets (generally 16 A, although 32 A is becoming more common) are used as standard by British and Danish campsites and yacht marinas to provide 240 V domestic mains power to frame-tents, trailer-tents, caravans, and boats; they are also used elsewhere in Europe for the same purpose, though in some countries the local domestic plug is also widely used. Static caravans generally use the similar 32 A version because of the requirement to power electrical cooking and heating appliances. The blue P+N+E 16 A version carrying 240 V is also used in shopping malls and their peripherals to power 'temporary' stalls not incorporated within a lock-up shop, there is also use in domestic gardens within Britain to power garden equipment, barbecues, and temporary lighting. The yellow 2P+E 16 A version carrying 115 V is used extensively on the London Underground railway system to power temporary usage of heavy-duty fans; it is also frequently used by tradesmen within the UK, built into a portable transformer box that is powered from a standard 13 A 240 V mains supply, to run heavy-duty power-tools designed to operate at 115 V. A small number of marinas provide 230 V single-phase power through a red three-phase connector (breaking the relevant standards in the process). This goes some way to ensuring that only boats that have paid the required fee (and thus obtained an appropriately made-up adaptor cable) are able to use the electricity. Entertainment industry[edit] Throughout Europe, a common use of industrial power connectors is in the entertainment and broadcast industries. In this industry the above-mentioned IEC 60309 connectors are referred to as CEEform (or just CEE) connectors. 230 V single-phase (blue) and 400 V three-phase (red) connectors between 16 A and 125 A ratings are used. Where more current carrying capacity is required, such as between generator sets and distribution boards, VEAM Powerlocks or Cam-Loks may be used. These connectors are single pole so five are required to accommodate all three phases, neutral and ground. Powerlocks have a rating of 400 A or 660 A at 1 kV. Cam-Lok E1016 Series are rated at 600 V 400 A. Powerlocks are identified with the European harmonized colour code, they are also annotated as follows: •   Brown, L1 •   Black, L2 •   Grey, L3 •   Blue, N •   Green, Earth Cam-Loks are also available in these colours. Where it is necessary to run separate feeds through multicable, the Socapex 19-pin connector is often encountered on theatre and studio lighting rigs. UK: Lewden plugs[edit] Lewden plugs and sockets are metal bodied waterproof plugs and sockets made by Lewden. The pin arrangements of the smaller single phase varieties are the same as BS 1363 and BS 546 plugs and sockets. These plugs and sockets will mate with normal plugs and sockets of the same pin arrangement but they are only waterproof when a Lewden plug is used in a Lewden socket and the screw ring is properly tightened (sockets have a metal cover that screws on to waterproof them when not in use). UK: BS 196[edit] In 1930, the BS 196 standard for industrial plugs and sockets was introduced. The plugs are available in 5 A, 15 A and 30 A variants, with various configurations of keyways and pins to cater for different voltages. BS 196 plugs have now been superseded by BS 4343 (CEE type) connectors in most modern applications.[17] Sweden, Germany and Netherlands: Perilex plugs[edit] Perilex plugs and sockets are 5-pin 3-phase connectors. The system provides 400 V 3P+N+PE and exists in 16 A and 25 A versions. In Sweden, the 16 A is generally used for stoves and to some extent for other heating devices in kitchens. Sweden: Semko 17 plugs[edit] Semko 17 were 3/4-pin 3-phase connectors, with (4-pin) or without (3-pin) a neutral connector. Earth were provided via the shield. The connectors were available in different sizes, 16 A with rounded corners; 25 A and 63 A were rectangular. These connectors were used mainly in industrial and agricultural installations. Manufacturing and selling of Semko-17 connectors with metal shells was prohibited in 1989. A few years later manufacturing and selling of all Semko-17 connectors were prohibited.[18] Existing connectors may be used but not by any employee (prohibited by "Arbetsmiljöverket"). The reason for the prohibition is that Semko-17 had several safety issues. The ground connection can become oxidized and when the shells are made of metal any ground fault goes right through the hands of a person connecting/disconnecting a male and a female cable connector (unless the person wears insulating gloves). Incorrect use of the ground connector as a neutral was not uncommon. Perhaps the worst issue is that in some connectors the ground screw could rust so severely that the ground wire comes loose and in the worst case make contact with a line (phase) wire nearby. Switzerland: SEV 1011[edit] SEV 1011:2009, overview of the hierarchical Swiss System for household and similar purposes The Swiss standard SN SEV 1011:2009 Plugs and socket-outlets for household and similar purposes.[19] defines a hierarchical system of plugs and sockets including both single and three phase connectors. Sockets will accept plugs with the same or fewer number of pins and the same or lower ratings.[20] Single phase Swiss plugs and sockets are described in AC power plugs and sockets The type 15 plug and socket has 3 round pins of 4 mm diameter, plus 2 flat pins (for L2 and L3). It is designed for three phase applications and is rated at 10 A, 250 V/400 V. The socket will also accept types 11 and 12 plugs, and the Europlug. The type 25 plug and socket has 3 rectangular pins, 4 mm x 5 mm, plus 2 flat pins (for L2 and L3). It is designed for three phase applications and is rated at 16 A, 250 V/400 V. The socket will accept types 11, 12, 21, and 23 single phase plugs, the Europlug, and types 15 and 23 three phase plugs. Croatia, Serbia, BiH, Slovenia, Montenegro, Macedonia, Kosovo[edit] 380 V Yugoslavian 5-pin 3-phase wall socket 380 V Yugoslavian 5-pin 3-phase plug This type of three phase plug and sockets are mainly used in households in ex. Yugoslavian countries, they are 5-pin 3-phase connectors, rated at 16 A, 380 V. Industrial 3-phase connectors are same as European IEC 60309. North America[edit] Pin and sleeve[edit] Pin and sleeve plug Pin and Sleeve circular connectors are not compatible with the newer IEC 60309 type. Current ratings are 30, 60, 100, 200, and 400 A. All are rated for voltages up to 250 V DC or 600 V AC. Contact arrangements are from 2 to 4 pins. There are two styles depending on the treatment of the ground. Style 1 grounds only on the shell. Style 2 uses one of the contacts as well as the shell, internally connected together. They are not strongly typed for specific circuits and voltages as the IEC 309 are. One insert rotation option is available to prevent mating of similar connectors with different voltages. The contacts in the plug are simple cylinders (sleeves), while the pin contacts in the receptacle have the spring arrangement to hold contact pressure, the reverse of the IEC 60309 type connectors. All contacts are the same diameter. Originally metal construction was used, but now they are also made with plastic shells. Since only keying in the connector shell is used, and since the keys can be damaged in industrial use, it is possible to mis-match worn connectors. NEMA connectors[edit] NEMA devices are not exclusively industrial devices, and some types are found in nearly all buildings in the United States. "Industrial-grade" connectors are constructed to meet or exceed the requirements of more stringent industry testing standards, and are more heavily built to withstand damage than residential and light commercial connectors of the same type.[21] Industrial devices may also be constructed to be dust or water-tight. NEMA wiring devices are made in current ratings from 15–60 A, and voltage ratings from 125–600 V. There are two basic configurations of NEMA plug and socket: straight-blade and locking. Numbers prefixed by L are twist-lock, others are straight blade. Locking type connectors are found mostly in industrial applications and are not common in residential and light commercial use. NEMA 10-20, 10-30 and 10-50[edit] NEMA 10-30 NEMA 10 devices are a curious throwback to an earlier time. They are classified as 125/250 V non-grounding, yet they are usually used in a manner that effectively grounds the appliance, albeit not in a manner consistent with most modern practice. They provide a neutral pin and two phase pins (X & Y) which are used for the two phases of a split-phase source. As commonly used, 10-30 and 10-50 plugs have the frame of the appliance grounded through the neutral pin. This was a legal grounding method under the National Electrical Code for electric ranges and electric clothes dryers from the 1947 to the 1996 edition. Since North American dryers and ranges have certain parts (timers, lights, fans, etc.) that run on 120 V, this means that the wire used for grounding is also carrying current. Although this is contrary to modern grounding practice, such installations remain extremely common in the United States and are relatively safe, because the larger conductors used are less likely to be broken than the smaller conductors used in ordinary appliance cords. Persons moving their older appliances to newer NEMA 14-equipped buildings (or vice versa) should have the cords replaced by a qualified electrician, as the grounding details may be quite confusing to the uninitiated. NEMA 10-20 devices are very rare nowadays. There is also a similar obsolete design, lacking a NEMA configuration number, rated 125 V 15 A or 250 V 10 A which is nearly identical to the AS/NZS 3112 standard used in Australia/New Zealand. These are also extremely rare. NEMA 14[edit] NEMA 14-30 and 14-50 receptacles The NEMA 14 devices are 4-wire grounding devices available in ratings of 15–60 A. Of the straight-blade NEMA 14 devices, only the 14-30 and 14-50 are common. The voltage rating is a design maximum of 125/250 V. They are essentially the replacements for the connectors above with the addition of a separate grounding connection. All NEMA 14 devices provide a ground pin, a neutral pin and two phase pins (X & Y) which are used for the two phases of a split-phase source. They differ in rating and shape of the neutral pin. The 14-30 has a rating of 30 A and an L-shaped neutral pin. The 14-50 has a rating of 50 A and a straight neutral pin sized so that it will not fit in the slot of a 14-30. NEMA 14-30 devices are most commonly found serving electrically-heated clothes dryers, while 14-50 devices most commonly serve kitchen ranges. In the United States, these are generally found in buildings constructed after the 1996 National Electrical Code, although they are also found in considerably earlier mobile homes. In Canada, the use of NEMA 10 devices was discontinued much earlier (if it was ever permitted at all), so NEMA 14 devices are more common there. Twist-locking connectors[edit] 30 A 208Y/120 V L21-30 receptacle L21-30 plug Twist-locking connectors were first invented by Harvey Hubbell III in 1938 and Twist-Lock remains a registered trademark of Hubbell Incorporated to this day,[22] although the term tends to be used generically to refer to NEMA twist-locking connectors manufactured by any company. Twist-locking connectors all use curved blades that have shapes that conform to portions of the circumference of a circle. Once pushed into the receptacle, the plug is twisted and its now-rotated prongs latch into the receptacle. To unlatch the plug, the rotation is reversed. The locking coupling makes for a very reliable connection in commercial and industrial settings. Like non-locking connectors, these come in a variety of standardized configurations and follow the same general naming scheme except that they all begin with an L for locking. The connector families are designed so that 120 V connectors, 208/240 V connectors, and various other, higher-voltage connectors can not be accidentally intermated.[23] Stage pin connectors[edit] A stage pin connector. Note the GR denoting the longer ground pin, which is not quite in the center to prevent the plug being inserted upside down A stage pin connector (SPC), or grounded stage pin (GSP), is a connector used primarily in the theatre industry for stage lighting applications in the United States. Stage pin connectors are generally used for conducting dimmed power from a dimmer to stage lighting instruments, although occasionally they can power other equipment. The primary advantage of the stage pin connector over the NEMA 5-15 connector (commonly known as an Edison connector in the theatre industry) is its increased durability and resistance to damage due to its more robust construction and the ability to compensate for wear with a pin splitter. Having a distinct connector designated for dimmable power also helps prevent confusion of dimmed and non-dimmed circuits which could lead to equipment damage. Even the smallest stage pin connectors are rated for 20 A, which translates to 2.4 kW at 120 V, compared to the 15 A and 1.8 kW of the NEMA 5-15. In applications where cables are on the floor, the low profile of the connector allows for connections that are only slightly higher than the cables they connect. California 50 A Connector[edit] In North America for moderate current requirements the 50 A California style connector is commonly used. It features a twist-lock design with a metal sleeve full protecting the blades on the male connector and a center ground spike on the female connector to aid in centering.[24] California connectors are commonly used at outdoor events, shows and conventions and at construction sites. The connector gets it name from being developed as a safer connector during the early days of Hollywood film studios in California. The first high amperage connectors used in the studios were stage pin (also referred to as "paddle plugs") used in theaters, which were not grounded. The California plug, however, is grounded by the outer steel shroud. This also helped protect the male contact pins from damage from the constant dragging of cables around a set throughout the day. The grounded shroud helps absorb the arc-flash if the connector is plugged or unplugged while energized. The original paddle plugs were known for dangerous arc-flashes, especially in the older DC-powered theaters in the early years of electrical stage lighting.[25] For example, a three phase plug which requires a neutral connection cannot be inserted into a socket outlet which does not provide for such a connection. However, a plug which does not require a neutral connection can be inserted into a socket outlet which provides such a connection, although the neutral connection would not be utilized in that situation. For stage lighting use, a common plug is the 32-A 5-pin connector with a neutral pin. Motor loads that don't need the neutral use a four-pin connector. Larger requirements may use powerlock or camlock connectors. In the IT industry, the IEC 60309 system is sometimes used. Australian 3-Phase socket outlet, with both Earth and Neutral connections, rated at 20 A, IP56. Single-phase dual 10 Amp Australian socket outlets are seen in the background. In Australia, New Zealand and many associated South Pacific island nations, the AS/NZ 3123 standard is used. In this series, multiple sizes of three-phase round-pin socket are standardized by current rating and neutral circuit. Each socket accepts plugs up to its rating, but excludes plugs with a higher current rating or with a neutral pin (if not on the socket). Multiphase plugs and sockets are rated at up to 500 V and all include an earth connection. These plugs and sockets are usually IP56 rated if fitted correctly. A screw collar helps hold plug and socket together. In standard AS/NZS 3112, single phase plugs of lower current rating may be inserted into single phase socket outlets of higher current rating but not vice versa. Compatibility is grouped like this, such that larger sockets in one group can take the same plug or any smaller plugs from that group only:[26] • Single phase flat pin plugs & sockets (250 V rating) - 10 A, 15 A, 20 A • Single phase size 1 (round pin) plugs & sockets (250 V rating) - 20 A • Single phase size 2 (round pin) plugs & sockets (250 V rating) - 32 A • Multiphase size 1 unique (500 V rating) - 16 A (no neutral pin) • Multiphase size 1 (500 V rating) - 10 A, 20 A (all available with or without neutral) • Multiphase size 2 (500 V rating) - 32 A, 40 A, 50 A (all available with or without neutral) There are also metal clad plugs and sockets that go up to 63 A ratings, at a significantly higher cost.[27] Within each size group, certain "lugs" on the outside of the plugs of higher current rating prevent a plug rated for a higher current being installed into a socket outlet rated for a lower current. However, a plug rated for a lower current can be installed into a socket outlet of the same size group rated for a higher current. For example, a 32-A 4-pin plug without neutral can plug into a 50-A 5-pin socket with neutral available. However a 10-A 5-pin plug cannot fit a 32-A 5-pin socket, as the plugs are different diameters. See also[edit] 1. ^ Scott, C.; Wolfe, P.; Hayes, B. (2004). Snort For Dummies. Wiley. p. 227. ISBN 9780764576898. Retrieved 7 February 2016.  2. ^ Fullick, P. (2001). Physics for AQA.: Coordinated award. Pearson Education. ISBN 9780435584207. Retrieved 7 February 2016.  3. ^ Linsley, T. (2008). Advanced Electrical Installation Work. Taylor & Francis. ISBN 9781136444487. Retrieved 7 February 2016.  4. ^ "IEC/TR 60083 Ed. 6.0, IEC, 2009". Retrieved 7 February 2016.  5. ^ Collins (2006), "Power Point", Essential English Dictionary (2nd ed.), The Free Dictionary  6. ^ Douglas, J. (2010). Building Surveys and Reports. Wiley. p. 254. ISBN 9781444391084. Retrieved 7 February 2016.  7. ^ Odom, W. (2004). Computer Networking First-step. Cisco Press. p. 38. ISBN 9781587201011. Retrieved 7 February 2016.  8. ^ Stein, B. (1997). Building Technology: Mechanical and Electrical Systems. Wiley. p. 723. ISBN 9780471593195. Retrieved 7 February 2016.  9. ^ "Archived copy". Archived from the original on 2013-06-25. Retrieved 2013-03-02. , Tamper Resistant Receptacles, Electrical Safety Foundation International, 2009, (retrieved 1 March 2013 from ESFI) 10. ^ Williams, N.; Sargent, J.S. (2012). Electrical Inspection Manual, 2011 Edition. Jones & Bartlett Learning, LLC. p. 29. ISBN 9781449695538. Retrieved 30 July 2016.  11. ^ Scaddan, B. (2011). 17th Edition IEE Wiring Regulations: Explained and Illustrated. Newnes. p. 44. ISBN 9780080969176. Retrieved 30 July 2016.  12. ^ "IEC 60050 - International Electrotechnical Vocabulary - Details for IEV number 195-02-06: "neutral conductor"". Retrieved 30 July 2016.  13. ^ "IEC 60050 - International Electrotechnical Vocabulary - Details for IEV number 195-02-08: "line conductor"". Retrieved 30 July 2016.  14. ^ Tzimenakis, J.; Holland, D. (2000). Electrical Product Safety: A Step-by-step Guide to LVD Self-assessment. Newnes. p. 58. ISBN 9780750646048. Retrieved 7 February 2016.  15. ^ IEC 60309-2:1999+AMD1:2005+AMD2:2012 CSV, Plugs, socket-outlets and couplers for industrial purposes - Part 2: Dimensional interchangeability requirements for pin and contact-tube accessories, Cl 7.5, CH: International Electrotechnical Commission, 2012  16. ^ a b NEMA. "Wiring Devices—Dimensional Specifications".  17. ^ Ziakhs, Filerd (25 July 2010). "Cable Assembly - Custom-made and Industry Standard Cable Assemblies and Wire Harnesses". Retrieved 3 January 2017.  18. ^ "Så elsäkrar du ditt lantbruk (in swedish)". Swedish authority for electrical safety. Retrieved 2013-08-24.  19. ^ "SEV 1011:2009, Plugs and socket-outlets for household and similar purposes" (PDF). Electrosuisse, SEV Verband für Elektro-, Energie- und Informationstechnik. 2009. Retrieved 2014-08-27.  20. ^ "Information SEV 1011 – power socket/plug/connector" (PDF). Federal Inspectorate for Heavy Current Installations ESTI, Swiss Confederation. 1 August 2011. Retrieved 2014-08-22.  21. ^ Domitrovich, Thomas A. (16 September 2013). "A Journey Back to Basics With Receptacles". International Association of Electrical Inspectors. Retrieved 24 July 2016.  22. ^ Hubbell Corporate History 23. ^ Hubbell Twist-Lock Wiring Devices and Safety Enclosures 24. ^ "HUBBELL CS6365C AC Plug CA STD 50a 125/250v Male - Our Item #: 6982, Category: 50 Amp Twist Lock Plugs : Stay Online".  25. ^ "History of the "California connector" used in mid-sized distros?". Retrieved 2016-12-22.  26. ^ 27. ^ External links[edit]
Appomattox Remembered (3) The Final Act; Stacking Arms and Parole General Lee’s surrender was the simplest part of what is viewed popularly as the Surrender at Appomattox. A joint commission established by Grant and Lee then had to work out the details to make Grants’ terms a reality. Each army named three officers to be party to the work. The terms of the surrender allowed Confederate soldiers to be paroled and return home, instead of prison. It was not until the April 10 meeting between Grant and Lee that it was agreed each Confederate would be provided with an individual parole pass certifying that the men would not take up arms against the United States. This was to protect them from arrest or annoyance by federal officers. Per Grant’s instructions these passes could aid the former Confederates during their journey home, allowing them to use federal transportation (ships and trains where available) or to draw food and supplies from federally controlled stations in the South. Approximately 30,000 blank passes were printed at the Clover Hill Tavern. After the Confederates surrendered their military equipment, they were eligible to receive the pass. Some higher ranking Confederates were paroled by Federal officers, but most passes were signed by Confederate officers for the men in their commands. The National Park Service (NPS) has an alphabetical listing of soldiers that were paroled at Appomattox Court House. Sample Appomattox Parole Pass Sample Appomattox Parole Pass Stacking Arms Grant’s terms encompassed only to those Confederates in the Army of Northern Virginia within 25 miles of Appomattox Court House. The tone of reconciliation set forth between Generals Lee and Grant eased the process of surrender of the Army of Northern Virginia. This conciliatory tone served as a model for the terms of the later surrenders. Grant required an accounting, or list, of the men surrendered at Appomattox, and ultimately the names of 28, 231 Confederate soldiers were recorded on a set of duplicate roles. Grant also required that they formally surrender their equipment and symbols of resistance. On April 10th, more than 1,500 Confederate Cavalry surrendered. All of the following photographs were taken during the National Park Service (NPS) 150th Anniversary at Appomattox Court House National Historical Park, April 8-12, 2015. On April 11th, 2,600 Confederate Artillery surrendered. On the morning of April 12th the remnants of General Lee’s infantry, 21-22,000 men, marched as organized Confederate units for the last time. They marched from their encampments, east of the village, across the Appomattox River and into Appomattox Court House where they stacked their arms before double rows of Federal infantry. There, along the Richmond-Lynchburg Stage Road the Confederates laid down what was left of their state and regimental battle flags – many emblazoned with the names of Chancellorsville, Gettysburg, Fredericksburg and other bloody fields of the last four years. Before leaving for home the Southerners were issued parole passes. General Lee’s farewell to most of his soldiers was contained in his final order. Hd Quarters Army of Nor: Va. 10, April. 1865. No. 9 After four years of arduous service marked by unsurpassed courage and fortitude, the Army of Northern Virginia has been compelled to yield to overwhelming numbers and resources. I need not tell the brave survivors of so many hard fought battles, who have remained steadfast to the last, that I have consented to this result from no distrust of them. But feeling that valor and devotion could accomplish nothing that would compensate for the loss that must have attended the continuance of the contest, I determined to avoid the useless sacrifice of those whose past services have endeared them to their countrymen. By the terms of the agreement officers and men can return to their homes and remain until exchanged. You will take with you the satisfaction that proceeds from the consciousness of duty faithfully performed, and I earnestly pray that a merciful God will extend to you His blessing and protection. With an increasing admiration of your constancy and devotion to your country, and a grateful remembrance of your kind and generous considerations for myself, I bid you all an affectionate farewell. General Grant selected General Joshua L. Chamberlain to take charge of this ceremony. He asked for his old brigade, the Third Brigade, First Division, V Corps (which included his old regiment, the 20th Maine) to have the honor of representing the Union Army during this ceremony. At 5 a.m. on April 12, almost four years to the minute after the first signal shot was fired at Fort Sumter, Chamberlain began assembling elements of the Union Fifth Corps along the road to Lynchburg, the main street of Appomattox Court House, near the courthouse building. Not long afterward the surrendering Confederates marched into the village, led by Gordon’s Second Corps. When Gordon and his soldiers came abreast of Chamberlain and his soldiers, the simple truth is no one knows for certain what happened. What does seem certain is that on some command, the Union soldiers made some change in how they were standing, and that change in turn changed the tone of the surrender ceremony. As Chamberlain later represented the moment, he ordered “shoulder arms,” intending a salute to the surrendering Confederates. Not to be outdone in gallantry, Gordon ordered his men to attention also, “honor answering honor,” in Chamberlain’s phrase. Many Union supporters were shocked by what they saw as a display of admiration for the enemy. Chamberlain, explained later that he saluted not the cause, but the men. Chamberlain tells us… They fix their bayonets, stack; then, hesitantly, remove their cartridge-boxes and lay them down. Lastly—reluctantly, with agony of expression—they tenderly fold their flags, battle-worn and torn, blood-stained, heart-holding colors, and lay them down… As stated, April 9, 1865, in the surrender terms, “The officers to give their individual paroles not to take up arms against the government of the United States until properly exchanged and each company or regiment commander sign a like parole for the men of their commands… This done, each officer and man will be allowed to return to his home, not to be disturbed by United States Authority so long as they observe their paroles and the laws in force where they reside.” General Gibbon was ordered to arrange for a small printing press to print blank parole forms. General George Sharpe supervised the operation, which was carried out at the Clover Hill Tavern. Printing began the afternoon of the 10th and continued from daylight to a late hour each night through the 15th. The total number of officers and men paroled was 28,231. General Gibbon reported, “Rolls in duplicate had been prepared of the different commands and on the backs of these was placed a printed slot duly filled out and signed by General George H. Sharpe, the assistant provost marshal, each party keeping a copy. Such officers as did not belong to any particular organization signed the parole for themselves. In addition, each officer and man, when he separated from his command, was given one of the paroles to which I have referred after it was properly filled out and signed by his immediate commanding officer.” The Confederates were issued paroles before heading to homes throughout the Country. Some had only to walk the few miles down the Richmond Lynchburg Stage Road to nearby homes. Others faced days or weeks of travel by rail, boat or horse before they could return home from Confederate service for the final time. The Appomattox paroles would make this journey less treacherous for these surrendered soldiers. Parole pass issued to Captain Charles Gratiot Thompson at Appomattox Parole pass issued to Captain Charles Gratiot Thompson at Appomattox The parole pass issued to Captain Charles Gratiot Thompson at Appomattox. It reads: “Ordnance officer gen THE BEARER Capt. C. G. Thompson of Co. C, McGowan’s Brigade Wilcox’s Division, 3rd Corps, A.N.V. of Baltimore City, a paroled prisoner of the Army of Northern Virginia has permission to go to his home & there remain undisturbed G. E. Taft 2nd Liet. Commanding Company.” Charles G. Thompson’s parole pass shows markings of his journey home including passage through City Point, Virginia, Fort Monroe and the U. S. Provost Marshall’s office in Baltimore Maryland. The parole pass issued to Samuel Gideon Marsh. The parole pass issued to Samuel Gideon Marsh. The parole pass issued to Samuel Gideon Marsh is the subject of a web page created by his family He was a member of the 3rd Georgia Regiment. We are fortunate to see both sides of this document. On the back side we see he was issued one ration on 22/65. It is stamped at Colombia SC. My next blog will return to the Battle of Fredericksburg and a further look at Confederate Artillery. About Peter Glyer Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
The Horseshoe abyssal plain (HAP) is located on the Iberian margin at approximately 4800 m water depth, and is confined within topographic elevations with a relief of about 3000 m, with the exception of Gorringe Bank, which rises to only 20 m below sealevel. The plain is built up by an alternation of turbidites of the order of meter-thick beds, numbered H 2 , H 3 , H 8 , and H 13 , contrasting with sets of thinner beds of the order of decimeters thick (H (sub 4,5,6,7) and H (sub 9,10,11,12) ), and pelagites centimeters in thickness. An intensive study of eight piston cores, using visual observation (color and thickness), relative stratigraphic position of units, magnetic susceptibility logs, calcium carbonate content, and mineralogy of turbidite bases, concludes in a bed-by-bed correlation of all individual turbidites. The major source of terrigenous material feeding the HAP is the Sao Vicente canyon, which incises the Portuguese shelf, while minor sources are the surrounding seamounts. The elongate geometry of the abyssal plain with its single dominant source of sediments produced laterally continuous deposits from both large and small flows. These covered the entire 356 km length of the plain. Grain-size analysis of the four thickest turbidites (H 2 , H 3 , H 8 , and H 9 ) demonstrates only slight downcurrent fining and vertical grading, expressed best in the ratio of coarse silt to fine silt plus clay. A small amount of sand is carried the length of the plain. The thicker units all show the same pattern of thickness, with a maximum in the middle of the plain around a topographic constriction and bend. This is most plausibly explained as due to reduction in flow speed of an initially supercritical flow causing enhanced deposition. Some of the beds appear to have a double coarse layer in the base, which may indicate partial reflection of flows from the side of the basin. It is suggested by application of equations for flow behavior that both thick ( nearly equal 3 m) and thin ( nearly equal 0.3 m) beds are due to supercritical flows a few tens of meters high. However, the thick beds resulted from high-concentration flows ( C v nearly equal 4% by volume) whereas thinner beds require low concentration ( C v < 1%) to run out over the full length of the basin. The stratigraphy is tied into the dated oceanic pelagic record by analysis of foraminifera in the pelagic layers above the turbidites and through recognition of two Heinrich layers (H-1 and H-2, ages 14.3 and 21 ka). The resulting age framework shows higher turbidite frequency in the glacial (2.7/kyr) than interglacial (Holocene) (1.0/kyr). This also gives higher mass flux during the glacial. Emplacement of turbidites cannot be clearly related to sea-level changes but may well be due to seismic activity. However, one of the largest earthquakes in human experience (Lisbon in 1755) triggered only a thin turbidite, invalidating the term "seismite" for thick turbidites. You do not currently have access to this article.
Body Organization and Homeostasis notes on Body organization and homeostasis 100 trillion cells!!!! An average adult contains Different to preform certain functions Many of the cell are groups of cells that look alike and preform similar functions Epithelial tissue covers and protects both the INTERNAL and EXTERNAL suface of the body muscle tissue provides movement such as walking, beating of the heart, etc. Nerve tissue helps you respond to stimuli in the environment, cordinate body activities and movement, keeps us informed about our surroundings connective tissue support bind and join together various other tissues. blood and fluid surrounding cells help distribute nutrients fat, bone, and cartilage are three other types of connective tissue groups of different types of tissue that work together. ex. eyes lungs liver skin stomach et. organs that work to perform a specific function ex. skeletal muscular circulatory excretory digestive endocrine etc. the process by which an organisms internal environment is kept STABLE in spite of changes in the external environment teh reaction of your body and mind to threatening challenging or disturbing events stress does what to homeostasis? upsets it
everyday engineering examples Steamy show The Australian Academy of Technology and Engineering published a report sometime ago called ‘Technology is really a way of thinking‘.  They were right.  Once you become an engineer, then you can’t help looking at everything through the same ‘technology’ lens.  Let me give you an example. A couple of weekends ago we went to see  ‘Anthony and Cleopatra‘ performed by the Royal Shakespeare Company in Stratford-upon-Avon.  It was a magnificient spectacle and a captivating performance, especially by Josette Simon as Cleopatra.  Before the performance started, we couldn’t help noticing the columns of steam forming in the auditorium from the ceiling downwards.  Initially, we thought that they were a stage effect creating an atmosphere in the theatre; but then I realised, it was ‘steam’ forming as the air-conditioning pushed cold air into the auditorium.  It’s the same effect that sometimes causes alarm on an aircraft, when it appears that smoke is billowing into the cabin prior to take-off. The air in the theatre was a mixture of air and water vapour that was warm enough that the water was completely gaseous, and hence, invisible.  However, when the air-conditioning pumped cold air into the theatre, then the mixture of air and water was cooled to below the dew point of the water vapour causing it to condense into small droplets that were visible in the auditorium’s downlighters, forming the columns of ‘steam’.  Of course, the large mass of warm air in the auditorium quickly reheated the cold air, causing the droplets to evaporate and the columns of steam to disintegrate.  Most people just enjoyed the play; it’s just the technologists that were preoccupied with what caused the phenomenon! If you want a more technical explanation, in terms of partial pressures and psychrometry, then there is an Everyday Engineering Example lesson plan available : 5E lesson plan T10 – psychrometric applications. Picture: https://www.rsc.org.uk/shop/item/30200-anthony-and-cleopatra-poster-2017/ Slowing down time to think [about strain energy] 161-6167_imgLet me take you bungee jumping.  I should declare that I am not qualified to do so, unless you count an instructor’s certificate for rock-climbing and abseiling, obtained about forty years ago.  For our imaginary jump, pick a bridge with a good view and a big drop to the water below and I’ll meet you there with the ropes and safety gear. It’s a clear early morning and the air is crisp and fresh – ideal for throwing yourself off a bridge attached to a rope.  The rope is the star of this event.  It’s brand new, which is reassuring, and arrived coiled over my shoulder.  A few days ago, I asked you how much you weigh – that’s your real weight fully clothed, at least I hope that’s the number you gave me otherwise my calculations will be wrong and you’ll get wet this morning!  I have calculated how much the rope will stretch when it arrests your free-fall from the bridge parapet; so, now I am measuring out enough rope to give you an exciting fall but to stop you short of the water.  I’m a professor of structural materials and mechanics so I feel confident of getting this bit right; but it’s a long time since I worked as an abseiling instructor so I suggest you check those knots and that harness that we’ve just tightened around you. You’ve swung yourself over the parapet and you’re standing on the ledge that the civil engineers conveniently left for bridge jumpers.  The rope is loosely coiled ready with its end secured to a solid chunk of parapet.  As you alternate between soaking up the beautiful view and contemplating the chasm at your feet, you wonder why you agreed to come with me.  At this moment, you have a lot of potential energy due to your height above the sparkling water [potential energy is your mass multiplied by your height and gravitational acceleration], but no kinetic energy because you are standing motionless.  The rope is relaxed or undeformed and has zero strain energy. Finally, you jump and time seems to stand still for you as the fall appears to be happening in slow motion.  The air begins to rush past your ears in a whoosh as you build up speed and gain kinetic energy [equal to one half your mass multiplied by your velocity squared].  The bridge disappeared quickly but the water below seems only to be approaching slowly as you lose height and potential energy.  In reality, your brain is playing tricks on you because you are being accelerated towards the water by gravity [at about 10 metres per second squared] but your total energy is constant [potential plus kinetic energy unchanged].  Suddenly, your speed becomes very apparent.  The water seems very close and you cry out in surprise.  But the rope is beginning to stretch converting your kinetic energy into strain energy stored by stretching its fibres [at a molecular level work is being done to move molecules apart and away from their equilibrium position].  Suddenly, you stop moving downwards and just before you hit the water surface, the rope hurls you upwards – your potential energy reached a minimum and you ran out of kinetic energy to give the rope; so now it’s giving you back that stored strain energy [and the molecules are relaxing to their equilibrium position].  You are gaining height and speed so both your kinetic and potential energy are rising with that squeal that just escaped from you. Now, you’ve noticed that the rope has gone slack and you’re passing a loop of it as you continue upwards but more slowly.  The rope ran out of strain energy and you’re converting kinetic energy into potential energy.  Just as you work out that’s happening, you run out of kinetic energy and you start to free-fall again. Time no longer appears to stationary and your brain is working more normally.  You begin to wonder how many times you’ll bounce [quite a lot because the energy losses due to frictional heating in the rope and drag on your body are relatively small] and why you didn’t ask me what happens at the end.  You probably didn’t ask because you were more worried about jumping and were confident that I knew what I was doing, which was foolish because, didn’t I tell you, I’ve never been bungee jumping and I have no idea how to get you back up onto the bridge.  How good were you at rope-climbing in the gym at school? When eventually you stop oscillating, the rope will still be stretched due to the force on it generated by your weight.  However, we can show mathematically that the strain energy and deformation under this static load will be half the values experienced under the dynamic loading caused by your fall from the bridge parapet.  That means you’ll have a little less distance to climb to the parapet! Today’s post is a preview for my new MOOC on ‘Understanding Super Structures’, which is scheduled to start on May 22nd, 2017.  This is the script for a step in week 2 of the five-week course, unless the director decides it’s too dangerous.  By the way, don’t try this home or on a bridge anywhere. Revisiting closed systems in nature It is the beginning of the academic year and once again I am teaching introductory thermodynamics to engineering undergraduate students and my MOOC entitled ‘Energy: Thermodynamics in Everyday Life‘ is running in parallel.  Last week after my lecture on thermodynamic systems, a student approached me to ask whether the universe is a closed and isolated system.  It’s an interesting question and the answer is depends on the definition of universe.   In thermodynamics, we usually define a boundary to delineate the system of interest as everything inside the boundary and everything else are the surroundings.  The system and surroundings taken together are the universe (see my post ‘No beginning or end‘ on February 24th, 2016).  If the universe is defined as the system then there are no surroundings; hence the system cannot exchange energy or matter with anything which is the definition of a closed and isolated system. Physicists often refer to the observable universe, or define the universe as everything we can observe.  We are aware that we cannot observe everything.  Hence, it is reasonable to suppose that the observable universe exchanges energy and matter with the unobservable space beyond it, in which case the observable universe is an open system.  We could also consider the concept that we are part of multiverse and our universe is only one of many, in which case it seems likely that is not isolated, i.e. it can exchange energy, and perhaps it is open, i.e. it can exchange both energy and matter with other parts of the multiverse. This is not really thermodynamics in everyday life.  However, the occurrence of closed systems in nature appears to interest a lot of people to judge from the visits to my previous posts on this topic.  See ‘Closed Systems in Nature?‘ on  December 12th, 2012; Is Earth a closed system? Does it matter? on December 10th, 2014; and ‘No Closed Systems in Nature‘ on August 12th, 2015. For more about system boundaries, see my post entitled ‘Drawing Boundaries‘ on December 19th, 2012. Popping balloons Balloons ready for popping Balloons ripe for popping! Each year in my thermodynamics class I have some fun popping balloons and talking about irreversibilities that occur in order to satisfy the second law of thermodynamics.  The popping balloon represents the unconstrained expansion of a gas and is one form of irreversibility.  Other irreversibilities, including friction and heat transfer, are discussed in the video clip on Entropy in our MOOC on Energy: Thermodynamics in Everyday Life which will rerun from October 3rd, 2016. Last week I was in Florida at the Annual Conference of the Society for Experimental Mechanics (SEM) and Clive Siviour, in his JSA Young Investigator Lecture, used balloon popping to illustrate something completely different.  He was talking about the way high-speed photography allows us to see events that are invisible to the naked eye.  This is similar to the way a microscope reveals the form and structure of objects that are also invisible to the naked eye.  In other words, a high-speed camera allows us to observe events in the temporal domain and a microscope enables us to observe structure in the spatial domain.  Of course you can combine the two technologies together to observe the very small moving very fast, for instance blood flow in capillaries. Clive’s lecture was on ‘Techniques for High Rate Properties of Polymers’ and of course balloons are polymers and experience high rates of deformation when popped.  He went on to talk about measuring properties of polymers and their application in objects as diverse as cycle helmets and mobile phones. Engaging learners on-line Filming at Quarry Bank Mill Filming at Quarry Bank Mill The Everyday Engineering Examples page of this blog continue to be very popular.  More than 70 engineering schools in the USA have signed up to use this approach to teaching engineering science as part of the ENGAGE project.  The lesson plans on that page assist instructors to deliver traditional lectures that are engaging and effective.  Now, we have transferred the approach to online delivery in a MOOC that was designed to support undergraduate learning as well as to increase public engagement and understanding of engineering science. The MOOC entitled ‘Energy: Thermodynamics in Everyday Life‘ was completed by more than 960 learners from about 35 countries who ranged in age from 13 to 78 years old with a correspondingly wide range of qualifications in terms of both subject and level.  I believe that this is the first MOOC to use Everyday Engineering Examples within a framework of the 5E lesson plans and it seems to have been effective because the completion rate was 50% higher than the average for FutureLearn MOOCs. We also included some experiments for MOOC learners to do at home in their kitchen.  Disappointingly only a quarter of learners performed the experiments but surprisingly almost half of all learners(46%) reported that the experiments contributed to their understanding of the topics.  This might be because results and photos from the experiments were posted on a media wall by learners.  There was also a vibrant discussion throughout the five-week course with a comment posted every 8 minutes (or more than 6,500 comments in total). More than half the undergraduates (53%) who followed the MOOC did not continue to attend the traditional lectures and roughly the same percentage agreed or agreed strongly that the MOOC could replace the traditional lecture course with only 11% disagreeing.  So maybe the answer to my question about death knell for lectures [see my post ‘Death Knell for the lecture?‘ on October 7th, 2015] is that I can hear the bell tolling. I gave a Pecha Kucha 20×20 on these developments at an International Symposium on Inclusive Engineering Education in London last month, which is available as a short video.
what is trench You cannot be allowed to go to the fighting line lest your disease may be spread to others and thus cause misery and trouble to those who have denied themselves. The width of the silo must be no less than twice the length of the transport, packing, or unloading vehicles. The conditions in Mesopotamia, like those in Gallipoli earlier, were far worse than even the Western Front could create. A number of hospitals had been identified before the war for use and operation by the Territorial Force. Excavated earth is used to shore up the walls of semiunderground trench silos where the walls protrude above the ground. After ensiling has been completed, the ends of surface trench silos are closed with boards or bales of straw. Home hospital Existing military hospitals were expanded; many civilian hospitals were turned over in full or part to military use; many auxiliary units opened in large houses or public buildings; and many private hospitals also operated. And if you see a wrong answer, let me know: send me the right answer so the next reader can get the straight dope instead of a bum steer. More than half were evacuated from a General or Stationary Hospital for further treatment or convalescence in the United Kingdom. The Field Ambulances provided the bearer posts but also established Main and Advanced (that is, forward) Dressing Stations where a casualty could receive further treatment and be got into a condition where he could be evacuated to a Casualty Clearing Station. The type of mechanical equipment used for filling the silo and removing the silage and the number of livestock are taken into account in determining the size and construction of underground and semiunderground silos. All were expanded during war time, not only on the primary sites but with the addition of Auxiliary Hospitals and annexes. These produced appalling levels of diseases, leading to high levels of sickness and, in many cases, death. The RAMC was responsible for operating all the Army’s medical units although, as the war was prolonged, it had to be assisted by voluntary organisations like the British Red Cross, St John’s Ambulance, the Friends Ambulance unit, the Voluntary Aid detachments ( VADs ) and private and charitable organisations. Medical services could not cope with this and when it came to the fighting, the Turk was a much more resistant foe than had been thought. Its role was to retain all serious cases that were unfit for further travel; to treat and return slight cases to their unit; and evacuate all others to Base Hospitals. Those, like Lloyd George and Winston Churchill, who favoured the Eastern approach to victory, caused the British and Empire soldiers to pay a very heavy price for their grandiose schemes. Roads with hard surfaces are built leading up to the silo and approach ramps are constructed for vehicles. The principal building materials used for the walls and bottom are concrete, reinforced concrete, brick, and rubble. As the casualty rates increased, the RAMC had to develop a complex chain that processed the casualty from the front line and back to hospitals in the UK, although not all the wounded went through all of the stages. The length is determined on the basis of the required capacity but should be no less than twice the width. Ambulance Trains and Barges Casualties would normally be moved from the CCS to a Base Hospital by specially-fitted ambulance train or in some circumstances by barge along a canal. What follows is a simplified description of the various stages as provided by the Long Long Trail website. Aid and Bearer Relay Posts During Front line actions the wounded were likely to have received first medical attention at aid posts situated in or close behind the front line position. Auxiliary hospitals – for convalescents and patients with venereal disease – were also built in the city and surrounding villages. trench ditch disease in the trenches rats in trenches trenches meaning life on the western front what were the conditions like in the trenches life in the trenches video boys brown trench coat the life in the trenches trenches of wwi definition of trench how deep is the marianas trench trench definition trenches conditions wwi trench conditions define trench what were the living conditions like in the trenches life in the trenches gallipoli trench meaning how deep is marianas trench trenches definition trench cycle the trench system german trench what are trenches trench coat size army trenches cool trench coat trench soldier trenches game Leave a Reply WordPress.com Logo Twitter picture Facebook photo Google+ photo Connecting to %s
What is meditation and what is it not? What are the different kinds of meditation? gurudev (2) Meditation is defined as, maintaining a steady flow of thought on the same object. Typically, इश्वर isvara or saguna सगुण brahma ब्रह्मन्, the Lord with attributes, is the object of such a flow of thought. You can maintain that flow by repeating a name in your mind, by focusing your attention on a form, by thinking about the glories ‘of the Lord, by performing mental worship etc. Meditation includes all these different processes. It is called upasana उपासना or mental worship of the Lord. In this, there is a duality between the devotee and the Lord, between the one who is meditating and the Lord who is meditated upon. There are many kinds of meditation, but we define meditation as maintaining a thought-flow centered upon the Lord. It requires some support in the form of a word, a mantra, of an image to keep the mind focused. It is not emptying the mind of thought, or thoughtlessness. The yoga-sastra योगशास्त्र defines meditation as the stoppage of thoughts or a complete stilling of the mind. If there is identification with the thoughts, there is bondage. The purpose of stilling the mind is to dissociate it from all thought so that there is no bondage. When there are no thoughts there is no identification and in the absence of identification, there is only the self. The idea in the yoga-sastra is that we can gain the knowledge of one’s own. self only if we still the mind. However, rather than emptying the mind, we prefer mental worship, which invokes the devotee in the person who meditates. This helps to purify the mind and secure the grace of God. Another form of meditation is contemplation upon the realities of life or upon the nature of one’s own self; it can be called the reality; meditation. This meditation is of the nature of f seeing’ rather than worshipping. In mental worship, some kind of visualization may be involved, but here we see, for example, the order that obtains in the universe. There can be meditation upon your own self where you see the self as consciousness, or you can contemplate on the reality -seeing the reality as it is. You can meditate upon acceptance, compassion or the order. You can choose a topic and contemplate on it. When meditation involves the worship of God, it is soothing, healing, and purifying for the mind. It is desirable that इश्वर isvara be involved in the meditation. Ideally, meditation should involve a spirit of worship. The Upanisads suggest that we meditate upon pranava प्रणव  or om ॐ and superimpose isvara on om. The repetition, of om then becomes meditation. If one reflects upon brahman with the help of om, it becomes contemplation. Thus, one worships om as isvara in the first instance and sees the self as om or isvara in the second. In the उपनिषद Upanisads, we find उपासना upasanas that are meditations upon the Lord with attributes, and they are done with the help of certain models prescribed in the texts. For example, we find meditations upon the harmony and oneness obtaining in the universe, based on various elements of nature or the luminaries of the different worlds. In one meditation, the universe, which is the manifestation of isvara, is looked upon as the cosmic person with the sun for his eyes, with fire as his mouth, and so on. Seeing the cosmos as a person, as one organic whole, becomes meditation. These are some kinds of meditations that are taught in the Upanisads. Swami Viditatmananda Saraswati Excerpts from Satasanga with Swami Viditatmananda, Vol. 2 Link to Swamji’s Discourses Leave a Reply WordPress.com Logo Twitter picture Facebook photo Google+ photo Connecting to %s
Transformer jets, self-healing aircraft and UAVs printed with 3D printers: future of aviation unveiled Jul 09 2014 - 5 Comments Scientists and engineers at BAE Systems have released some interesting details about some futuristic technologies that could be operative by 2040. Or earlier. BAE Systems has been studying futuristic aircraft shapes for quite some time. The projects the British Defense company is  working on were recently unveiled through a series of animations which show how civil and military aviation of the future could be based on 3D printers capable to print UAVs on-the-fly during a mission; aircraft that can heal themselves; a Transformer long range aircraft which splits into a number of smaller aircraft when it reaches its target, and a directed energy weapon that could engage missiles at the speed of light. The Transformer is a flexible aircraft system that combines smaller jets: it’s a sort of mothership made of smaller sub-aircraft which can be combined together to increase the range, reduce the overall aerodynamic drag and save fuel during the transit to the area of operations. Once the mothership has reached the target area, each single craft can split off to conduct its specific mission: attack, surveillance, airdrop to name but few. The Survivor technology will be used to develop new aircraft and give them the possibility repair any damage sustained during the mission in flight. The self-healing technology could improve survivability of the aircraft employed in high lethality scenarios. It is based on advanced materials: “a lightweight adhesive fluid inside a pattern of carbon nanotubes from which the aircraft is constructed and is released when damaged to quickly ‘set’ mid-flight and heal any damage,” according to BAE Systems. Directed Energy Systems (something that has been studied in the U.S. for a long time)  is instead an on board weapon used to concentrate a low cost beam of energy at the speed of light against enemy aircraft, weapons (missiles, mortars, projecticles). In other words, it could be a laser cannon, used to hit and destroy ground and air targets with much accuracy. Furthermore, BAE Systems foresees the use of hi-tech on-board 3D Printers that, via Additive Layer Manufacturing and robotic assembly techniques, could be used to create small unmanned aircraft on-the-fly, based on the inputs sent by a human operator from the ground control station. Needless to say, such a way to create drones could be useful in various types of mission, including air strike, surveillance or SAR (Search And Rescue) operations, during which drone copters could be created to rescue and recover single civilians or soldiers. Even more interestingly, “after use the UAVs could render themselves useless through dissolving circuit boards or they might safely land in a recoverable position if re-use was required,” in order to prevent capture. Even if these concepts may seem a bit futuristic and remind Terminator or Transformer movies, they will probably be the base of the future aerial warfare. • This is very interesting and quite visionary but we’re at a crossroads now just like they were at the beginning of the jet age. The designs produced in the 1950s for rocket-powered and jet-powered aircraft were amazingly futuristic and visionary just as these designs are here. The drawback nowadays though is affordability. Price tags mattered little during the early Cold War, whereas nowadays, with ballooning costs due to any number of factors not limited to mission creep, advanced designs, contractor overcharging, et cetera cost is a MAJOR issue. When it comes to military aviation, the more novel something is, the more costly it is, and the less likely it is that it will be adopt. • CheetahFang258 I can’t wait till aliens come to this Earth, It will make this look like a toy. • STV Seems like a lot of nonsense. Parasitic aircraft that potentially have to rely on two other aircraft not being shot down in order to return home? Or laser weapon in a small aircraft with all the energy, heat, optics, blooming and cost problems that would entail? Not only that but operating in a world where nobody has worked out that inclement weather, laser diffusion techniques and (assuming the 3d printing thing works out) a barrage of much cheaper missiles could easily defeat or overwhelm such a system. The self healing might work- but probably not as seen in the video. Ditto the 3d printing- I doubt it would be a cost effective thing for an individual aircraft to do and a ground station is more likely- It would end companies like BAE and Lockheed though. Who would need them in a world where anyone can submit a design? There are two things that I think are more likely than all of this ‘uncontested skies’ vision of the world- 1) Stealth will be rendered practically useless by better radars, scanning and optical techniques. 2) Active defence systems will make there way onto combat aircraft meaning A2A missiles will either become redundant or be revolutionised and, perhaps, ushering an era where dogfighting becomes relevant again. • 65C02 I don’t think that the project is plausible, infact the number of jet engines needed in a big surface airplane are expressed in a regressive function rather than a proportional function. Because of the lift ot the air, which supports better the airplanes with big wings with few engines. the project show pieces of the transformer bird have engine (with their huge weight) rather than fuel. So much weight for engine (not running to save up fuel) is much much worse than weight for fuel. • TheRedLeaf Well unlike “none of your business” with his obsession with the word “stupid” I’m at least curious with some of the design approaches. Sure, some of it doesn’t look very practical but for the 3-drone set we also know that a “single wing” using the B2 for an example has different characteristics than more “conventional” manned air-craft. Price per drone “piece” cost may be completely dependent on a cost per multiplication factor of each drone working together. Do they save any fuel while working in unison? I have a suspicion of the two in the back specifically designed for being the alternate “casualty” as to the main body. Having one to do reconnaissance and the other heck out of loitering around lower altitudes or increased danger. I’ll admit the name was a bit of a dull choice by BAE but self-healing of a smaller scale could be doable. Say there are hoses spread out in veins with chip remote nozzles where upon impacts it’ll do spray the area with “first aid” material akin to a glue? Heck, certain materials may even become a second layer to wires or even to close up other leaks. At this would be a idea for smaller scale procedures… and won’t have to cost billions. Apparently modern ships fill some rooms and bulkheads with certain gases to eliminate sparks and fires which are great for those situations blazing in the ammo storage. Every help counts, especially when its protecting a multi-billion dollar military project.
Rohm shows the Swiss army knife of sensors Rohm shows the Swiss army knife of sensors Rohm's wearable key device is a prototype built to show manufacturers what they can do with its components Rohm showed its sensor board packed into a device shaped like a key Need a handy device that can secure your smartphone, measure distances and tell you what kind of sun lotion to wear? No? Well someone built one anyway. Japanese chip maker Rohm showed a prototype gadget at the Ceatec trade show in Japan this week that crams eight different sensors onto a circuit board about 3 centimeters by 1 cm. It embedded the board in a chunky plastic key and wrote some Android applications for it, all with the goal of showing gadget makers what they might be able to build with its chips. The board has an accelerometer, gyroscope, pressure sensor, magnetometer, ambient light sensor, ultraviolet sensor, proximity sensor, and color sensor, along with a Bluetooth Low Energy chip for communication and a micro-controller to manage them all. Waving the key in the air to draw a letter "U" can unlock a nearby smartphone or tablet that's programmed to work with it. The company didn't give too many details about the security features but it's supposed to provide a kind of secondary authentication. Point the key at the top of a landmark, like the Eiffel Tower, and an app on your phone will tell you how far away it is. It does this using triangulation, based on the angle of your arm to the ground and the height of the landmark, which it has in a database. The UV sensor can tell you how strong the sun is, so you know whether to wear factor 8 or factor 50 sun lotion. And the device is also a fitness tracker -- because what device these days isn't. The pressure sensor knows when you're walking up a hill or upstairs, so it can calculate more accurately how many calories you've burned, Rohm says. The magnetometer can even detect if there are small particles of metal in your food -- in case that's something you worry about. Some of these things you can already do with a smartphone -- Samsung Electronics introduced a pressure sensor in its Galaxy S4, for instance, and the iPhone 6 now has one. But the Rohm key should be a lot cheaper than a smartphone if any manufacturer decides to make it. A Rohm representative said the board costs just US$1 when bought in volume. Join the newsletter! Error: Please check your email address. Tags ComponentsCEATECBoards -- otherRohm More about GalaxyIDGNewsSamsung Show Comments
Atrial Septal Defects Heart With Atrial Septal Defects Adobe Flash Player. An Atrial Septal Defect, or ASD, is a hole in the wall between the right and left atria (atrial septum). In the presence of an ASD, blood flows from the higher pressure left atrium to the lower pressure right atrium. When this happens, the oxygen-rich blood of the left atrium is redirected through the right side of the heart and back to the lungs. The right atrium, right ventricle, and pulmonary artery may enlarge due to the increased blood flow through these structures. Long-term side effects of an untreated ASD include atrial arrythmias (loss or abnormality of rhythm), ventricular dysfunction, and pulmonary vascular obstructive disease (a condition in which the pulmonary arteries become thickened due to high blood flow). For these reasons, it is preferential to close even small ASDs early in life to prevent complications later in life. Three Types of ASD Secundum-Type ASD Secundum-type ASDs are the most common, comprising approximately 85% of all ASDs. In many cases, infants and young children are asymptomatic and the ASD may not be detected until school age or later. Approximately 20% of secundum-type ASDs close spontaneously in the first year of life. Often, a heart murmur, associated with the increase in blood flow across the pulmonary valve, is the symptom that causes a physician to investigate further. The diagnosis of an ASD is confirmed by echocardiography. In a secundum-type ASD, the hole is located in the central part of the atrial septum. The methods of treatment for a secundum-type ASD consist of surgical repair or a catheter technique. Options for surgical repair involve suture closure (reserved for small ASDs) or patch closure. The patch material may be a portion of the patients own pericardium (the sac around the heart) or a synthetic material. The catheter technique involves closure of the ASD with a synthetic device that plugs the hole. The device is introduced through a heart catheter which is passed through a vein in the leg that leads up to the heart. Initially, the device is held in place by the natural pressures created within the atria. Over time, the device acts as a framework over which normal tissue grows. Sinus Venosus ASD Sinus venosus atrial septal defects constitute 5% to 10% of all ASDs. In a sinus venosus ASD the hole is located in the upper portion of the atrial septum. This type of ASD is often associated with anomalous drainage of the right, upper pulmonary veins. In other words, the pulmonary veins, which normally carry oxygenated blood from the lungs to the left atrium, drain into the right atrium instead. There is no chance for spontaneous closure of this type of ASD. For this reason, surgical repair is necessary for patients with this type of ASD. Primum-Type ASD Primum-type ASDs constitute between 5% and 10% of all ASDs. In a primum-type ASD the hole is located in the lower part of the atrial septum. Frequently, abnormalities of one or more heart valves (most often the mitral valve) are associated with this defect. Unlike the secundum-type ASD, symptoms of this type of ASD are seen during early childhood. Surgical repair is the only method of treatment for a primum type ASD since there is no chance of spontaneous closure. What Is Normal Cardiac Anatomy? Learn More About Normal Cardiac Anatomy Heart With Normal Cardiac Anatomy Adobe Flash Player. Coarctation of the Aorta What Is Coarctation of the Aorta? Coarctation of the aorta (COA) is a narrowing of the aorta, the major blood vessel that carries blood away from the heart to the body. This narrowing causes the left side of the heart to work harder to pump blood through the aorta. Sometimes the coarctation is minor and might not even cause symptoms. Other times, surgery or other procedures are needed. Why Do Kids Get It? Coarctation of the aorta is a congenital defect, meaning that a baby is born with it. Doctors aren't sure why some people develop COAs, but boys are almost twice as likely to have it than girls. In many people, the defect shows up with other birth defects or conditions, such as a ventricular septal defect (a hole in the wall between the heart's left and right ventricles). It's also fairly common in girls born with Turner syndrome, a genetic disorder in which one of a girl's two X chromosomes is incomplete or missing. Usually, COA is found early. But some people aren't diagnosed until they're teens or even adults. In those cases, it's usually because the narrowing in the aorta is not severe enough to cause serious symptoms until then. But even people who don't have major symptoms need treatment because COA can eventually cause problems. The defect doesn't go away on its own. Signs and Symptoms Abnormal blood pressure is often the first sign of COA. During a physical exam, a doctor may find that a child with a coarctation has higher blood pressure in the arms than in the legs. The doctor also might hear a heart murmur or notice that the pulse in the groin is weak or hard to feel. Any person diagnosed with high blood pressure should be checked for coarctation of the aorta. Often, kids don't have any symptoms and the COA is discovered during a regular visit to the doctor. Kids who do have symptoms might have: • cold legs and feet • shortness of breath, especially when exercising • chest pain How Is Coarctation of the Aorta Diagnosed? Doctors may refer a child with the signs or symptoms of COA to a pediatric cardiologist (a doctor who specializes in diagnosing and treating heart problems in kids and teens). The cardiologist will listen to the heart, feel the pulses, and check blood pressure. The cardiologist might order an echocardiogram — a test that uses sound waves to create a picture of the heart and its circulation — and other tests that produce images of the heart, like a chest X-ray, a magnetic resonance imaging (MRI) test, or a computerized tomography (CT) scan. COA must be treated quickly because it can cause high blood pressure and enlarge the heart. It also can cause dissection or rupture of the aorta, which can be fatal. Severe coarctations usually are found shortly after birth and repaired by surgery immediately. How Is COA Treated? Coarctation of the aorta can be repaired with surgery or other procedures. One of the most common ways to fix a coarctation is to remove the narrow section and reconnect the two ends of the aorta. In some cases, doctors may do a balloon dilation (also called balloon angioplasty). In this procedure, a tiny balloon is inserted into a blood vessel in the leg and a very thin wire is threaded up to the aorta, across the narrow area. When the balloon is inflated, the narrow area is widened. Then the balloon is removed. The cardiologist also may implant a stent to keep the area open after the procedure. Home Care Once the defect has been fixed, most symptoms of COA disappear right away because the blockage that caused those symptoms is now gone. Some people will still have high blood pressure for a while and might have to take medicine to control it. Kids and teens who have had surgery often feel completely better after a week or two, and those who have had the balloon treatment feel better even sooner, often within a couple of days. But doctors recommend that all patients avoid some physical activities — especially lifting heavy objects or sports that could cause an impact to the chest — for several weeks or months to give the body enough time to heal. Someone whose blood pressure remains high may have to continue to limit certain activities until the blood pressure lowers. Kids who've had a COA corrected will need to see their doctors regularly. Sometimes, the narrowing can return after surgery or balloon dilation treatment. Visits to the cardiologist every year or two after recovery will let the doctor monitor blood pressure and look for signs that COA could be returning. If your child has COA or has had a coarctation repaired, call the doctor if you see shortness of breath, chest pain, or fainting. Overall, kids who have had coarctation of the aorta can expect to lead a normal life after treatment. Reviewed by: Steven B. Ritz, MD Date reviewed: September 05, 2017
Carbon dioxide; the gas released from leavening reactions and fermentation that creates bubbles and space in a batter or dough. (kuh-KOW) Tropical evergreen tree cultivated for its seed pods from which cocoa powder and cocoa butter are produced. When yeast loaves are under-proofed and the interior pushes up the top crust leaving a rough, sharp edge along the side of the loaf having the appearance of a “cap.” To heat sugar until brown and a characteristic flavor develops. Chemical leavening: The reaction of a leavening base (such as baking soda) with a leavening acid (such as sodium aluminum sulfate) in the presence of moisture and heat to produce carbon dioxide gas. Make mixture or cooking bowl cold by placing in refrigerator or in ice. From the Aztec word xocolatl meaning bitter water. A food derived from the cacao bean being fermented, dried, roasted, ground and processed into cocoa powder and a liquor used to make a variety of chocolate products: Bittersweet, dark, couverture, milk, semisweet, white, unsweetened. To make a substance clear or pure. Cocoa Butter: The portion of fat in the cacao bean. Cocoa Powder: Unsweetened cocoa powder made from cacao beans that are fermented, dried, roasted, and cracked. The nibs (small pieces) are ground to extract about 75 percent of the cocoa butter – a thick paste which is called chocolate liquor. This is dried and ground to powder. To mix or blend two or more ingredients together. Confectioner's or Powdered sugar: A granulated sugar that has been crushed into a fine powder. A small amount (about 3 percent) of cornstarch is added to prevent clumping. Convection Oven: A gas or electric oven equipped with a fan that continually circulates the hot oven air around the product. Circulating hot air allows products to bake on several racks at one time. Oven temperature can usually be reduced by 25°F and preheating may be unnecessary. A flour-based, sweet, hand-held small cake (from the Dutch word "koekje," meaning "little cake"). Cookie Sheet: A flat, rectangular baking pan made of steel or aluminum that is rigid. Sizes range from 10 x 8 inches to 20 x 15 inches. A cookie sheet is designed with two, non-edged sides so cookies can slide off either side for easier removal. To let food stand until it no longer feels warm to the touch. Baked goods are cooled on wire racks to avoid soggybottom crusts; cool baked goods before wrapping and storing. Cooling Rack: A rectangular grid of thick wire with “feet” that raise it above the countertop. They are used to cool cakes, cookies, and other baked goods when they come out of the oven. Products are cooled while in their pan for a short time and after the product is removed from the pan prior to storing or freezing. Yeast breads are removed from the pans and onto the rack as soon as they come out of the oven to prevent a soggy crust. Remove the seeded, inner portion of a fruit. Corn Flour: Flour milled from whole corn, it has the flavor of corn and is excellent in cornbread, muffins, waffles, and blended with cornmeal. Sometimes refers to corn starch. Dry de-germinated or whole grain corn kernels (yellow, white or blue varieties are grown) that have been ground into fine, medium or coarse meal. Corn starch: The fine, powdery flour obtained from the endosperm of corn used as a thickener for pie fillings and puddings; in combination with wheat flour in cakes, cookies, pastries, it produces a fine-textured product. Cornstarch may be referred to as cornflour in some recipe Courverture chocolate: Professional quality glossy coating chocolate. Also creaming. To work (with spoon or mixer) one or more foods until soft and creamy. Cream of Tartar: An acidic salt—potassium hydrogen tartrate (also referred to as tartaric acid); stabilizes beaten egg whites and leavens some baked goods. The French word for pancake; paper-thin, flexible egg-rich pancakes used to wrap or fold around sweet or savory ingredients as a first or main course. The interior of baked goods—not the crust; interior texture formed by air cell pockets trapped inside a webbing of starch and protein gelatinized by baking. To pulverize, as with herbs and spices used in baking. The caramelized crisp or chewy outer layer of a baked product that covers the crumb or more tender inside.
A Short History of Eastleigh Paper Number:  This paper has been written with the intention of setting down basic facts in the history of Eastleigh as they are known, and of drawing attention to the vast amount of detail still needing to be discovered and recorded.The very name of Eastleigh has its history and, together with all the other place-names in our modem Borough, a long one, with variations in spelling, popularity and expanse of land indicated by the name.Research already carried out by members of the Eastleigh and District Local History Society has been published in a series of occasional and Special Papers. Reference to these and other publications is made in the text so that more detailed information may be obtained when needed. The reader is encouraged to set himself in the right mood by making sure that he knows the history of his own patch. Who built the house? Why was it so designed? What materials were used and where did they come from? Why was the road so named? What is the nature of the garden soil and how was it composed? Find out the answers to these and other questions and, above all, remember that today’s events are tomorrow’s history. This may inspire you to seek further information or advice and, possibly, to meet others with similar aims. Local History Societies exist for this purpose; they welcome visitors and new members. Gordon Cox July 1987 Click on File to see paper:  Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer
Friday, September 28, 2007 Wednesday, September 12, 2007 Ebola Outbreak in the DRC News source: Major Ebola outbreak in DR Congo International agencies have begun airlifting emergency medical supplies and setting up isolation tents to try to contain the outbreak. Ebola is highly contagious. People contracting the disease suffer severe stomach pain and internal bleeding. 'Ebola kits' Medecins sans Frontieres has reinforced its medical personnel and has flown three tonnes of supplies to the provincial capital Kananga, to be distributed in the affected areas. The supplies include tents and plastic sheeting to build isolation facilities. Medicines, water and sanitation materials are also being sent. "Ebola kits" have been provided for the medical teams - they include protective gloves, boots and uniforms which are designed to be destroyed after use. Local health authorities are helping to disinfect contaminated areas. The fatality rate for Ebola, which has no known cure, is as high as 90%. Specialist laboratories in Gabon and Atlanta in the US confirmed Ebola from blood samples, saying they also showed the presence of Shigella dysentery - which is hampering efforts to identify Ebola victims. WHO has also requested additional support from the global outbreak alert and response network, and says specialised laboratories in Gabon, Canada and the US will share the analysis. They say there could be a "possible concurrent outbreak of another etiology". It is three months since people started falling sick from a mystery virus in several villages around Kananga, the capital of West Kasai region. Several villages are under quarantine, but WHO says so far there is no need for any further restrictions on travel or trade with DR Congo. The incident is the worst for several years and is likely to have serious consequences for some time to come - even if the spread has been contained. It is thought to be transmitted through the consumption of infected bush meat and can also be spread by contact with the blood secretions of infected people. The last major incidence of the disease was in Uganda in 2001 when more than 400 cases were reported and more than half of the patients died. Uganda has issued a red alert to border posts neighbouring the DR Congo and has instructed staff at Entebbe international airport to be on the lookout for passengers who show symptoms of fever. Thursday, September 6, 2007 39 and counting! Happy Swazi Independence Day! Sunday, September 2, 2007 Saving Lives -- Millions at a time Read this if you're interested in Public Health. Or if you may be considering doing work in the health sector at some point or the other in your life/career. Or, if, you just love me, cos thats okay tooooooooo. So, we all know no one grows up aspiring to be a public health professional, an epidemiologist, a biostatician, or a volunteer. Apparently, 100% of my incoming class never thought they would go into Health. Growing up, I think I changed careers (aspiring) mebbe an average of 12 times a day. I would wake up convinced I would be a doctor one day, by the end of the day, various adults got different answers from me. Anything from boxer to pilot. Clearly, I didn't know where my life is going. But atleast I knew it was going somewhere right? So, well, had fun a la process. High School was the usual. If you went to boarding school in Africa you'll know what I'm talking about. A section for the math and science whizz kids, B section for the ones that aspired to be in the A section and weren't too far from the dream, and the C class was the class that hated the A class with a passion. No need to explain why. So, high school is the 5 years of your African life where you are being trained to want to be a doctor, an engineer or ...a doctor. Naturally, I developed a love for the biological science and hmm, wasn't too bad at it either, so med school here we come! Things got confusing when I reached IB, where the hot kids were the art kids and econ was now the in thing. Physics was alrighhhtt, I guess but damn those English A1 higher level kids were the truth! Ok, so this was 2 years of confusion. Next step...liberal arts. We get to play around and choose a major that we will probably never use (half of Wesleyan went into investman banking, and most people were either a Bio major, a dance major or any such combination). Next thing, it's 3 months to graduation and you're wondering what the heck to do with yr life. Is thisyr story too? Read on. Not yr story? Read on. Getting into Public Health, for most people, is influenced (at any point in their careers) by some event or experience they have, usually in a low-income, pretty messed up country/town/state/village. The first thing a professor told me when I started classes was : If you're looking for a quick way to get rich, please apply to Harvard Buisness School. Public Health is not yr place. Ok so maye u CAN be rich doing Public Health, but if it's yr number 1 goal, you'll be very frustrated for a while. Lesson number 1, if you plan on going into public health -- marry rich. Cos the income sure as hell wont be coming from you! Im now patiently waiting for my business/engineering man to come take me for a carpet ride! (while I vaccinate 30 kids in Nakuru. Where are you, my lover! I need u and I need your money. For real. (Attention men: I really do have a heart, i promise to love and cherish too neh. The bride price will be worth it).Which brings me to point number 2. Public Health is for people WITH a heart. You have to feel connected to the people that you want to reach. It's not just about medical care, its about culture too. So, if u have those 2 down, we are free to move on to the most important thing abt Pub Health (PH). The reason I love P.H., other than that I believe it's part of God's purpose for my life and for the life of others that I will meet along this wonderful journey, is the fluidity of the discipline. I walk into a health management and policy class and there's 3 great professors there to just pour out the knowledge. An MBA, an MD and some random PHD geek who happened to work for a pharmaceutical company for 18 years. PH is not a concrete science! (I am beginning to understand why i absolutely hated organic chemistry). It's a great mixture of medicine, economics, biostatistics, engineering, anthropology, politics, linguistics, u name it, its all in there baby. And the truth is, anyone can go into Public Health, whether you are fresh out of college and you were a history major, or you are a 60 yr old doctor thats decided to go a little more global. Its about populations, social groups, countries,'s about love, smiles, solutions and dreams. And if you love Africa (and other developing regions) as much as I do, you'll realize that the health sector needs you, too! Whether you're a biochem student looking to get into law, or maybe you're a dancer and you taught some Swazi kids how to dance over a summer (I don't see how that is possible), or you're just someone with a passion and fire for a place where thousands and millions of your countryboys and girls never get the chance to see, live, talk, love, dream, smile, play soccer, feel the rain, drink clean water, get married, run in the sand...because their lives are claimed by things such as HIV, malaria, hunger, war, stupid governments, terrible decision-making, etc. You too can do something. Seriously, it's been said, again and again and again. Yes, yes, we must be the change we want to see...but really I've discovered that just saving one life, saves millions thereafter. For real though, I don't want to be the last remaining Swazi on earth (although that would be kinda cool no? Would they frame me and put me in a museum outside La L'ouvre?) I'm just doing my heal and deliver to those I love the most...and in the process, save the world...millions at a time.
Insects Facts - Amazing Knowledge Insects Facts This page contains information about the famous top 100 insects facts that are amazing weird or bizzare. Examples are facts about flies, spiders, ants and so on ... If that's what you're loooking for then this is the place for you. Below you will find a table of the top insects facts, containing the best of the best. Enjoy and make sure to add this page to your favourite section for easy reference in the future. Insects Facts The average housefly lives for one month. A honey bee strokes its wings about 11,500 times a minute. It takes 12 honeybees to make one teaspoon of honey. The average life span of a mosquito is two weeks. The speed at which honey bees fly is at 15 miles per hour. Beeswax production in most hives is about 1 1/2% to 2% of the total honey yield. Ladybugs make a chemical that smells and tastes terrible so that birds and other predators won't eat them. The brain of an ant has about 250,000 brain cells. There are approximately 2,700 different species of mosquitoes. A bird called the bee eater in areas of Africa thinks that riding around on the backs of other animals is fun! Butterflies are further divided into 30 orders, the main basis of classification being their wing structure. Many insects can carry 50 times their own body weight. There are more than 300,000 species of beetles, making them the largest order of insects in the world. A butterfly's taste sensors are located below their feet. Mosquitoes prefer children over adults. There is only one insect that can turn its head -- the praying mantis. Bees from the same hive visit about 225,000 flowers per day. One single bee usually visits between 50-1000 flowers a day, but can visit up to several thousand. The bite from a black widow spider is not automatically fatal. In fact, less than 1% of all people bitten by this spider run the risk of dying, and most of them are saved with the use of antivenin. There are about 34,000 species of spiders. A bee travels an average of 1600 round trips in order to produce one ounce of honey; up to 6 miles per trip. To produce 2 pounds of honey, bees travel a distance equal to 4 times around the earth. Butterflies and moths are found on all land masses except Antarctica. There are more than 2,400 flea species in the world. Bees fly an average of 13-15 mph. Just a single hive contains approximately 40-45,000 bees! The study of ants is called Myrmecology. During honey production periods, a bee's life span is about 6 weeks. The fiddler crab can grow a new claw when it loses one of its own. Dragonflies can fly up to 50 miles per hour. Of the 35,000 species of spiders, only 27 species are known to have caused human fatalities. The fastest known insect is a dragon fly that has been clocked at 58 kilometers an hour. Cockroach can live up to nine days without its head. A dragonfly has a lifespan of for to seven weeks. During hibernation, ladybugs feed on their stored fat. A house fly's feet are 10 million times more sensitive than a human tongue. Fried spiders taste like nuts. Scientists have actually performed brain surgery on cockroaches. The largest butterfly is the Queen Alexandra's birdwing butterfly from Papua New Guinea. The wingspan of the butterfly can reach to be almost one foot. Most fleas do not live past a year old. The eggs of walking stick insects are among the largest in the insect world. Some eggs are more than eight millimeters long. Wasps that feed on ferment occasionally get drunk and pass out. More insect facts here: Insects Facts. I hope the content of this page was useful to you, and that you learned some amazing insects facts, for example tips about flies, spiders, ants and so on ... If you liked the insects facts then you might also like our main list of Amazing Facts page. Copyright © 2016 WISDOMQUOTES.ORG. All rights reserved.
Embodied cognition and postmodernism 11 Aug 2017 / Leonardo Barichello The text below is a section of the book "Where mathematics comes from: how the embodied mind brings mathematics to being" by George Lakoff and Rafael Núñez. As we have just noted, a significant part of mathematics itself is a product of historical moments, peculiarities of history, culture, and economics. This is simply a fact. In recognizing the facts for what they are, we are not adopting a postmodernist philosophy that says that mathematics is merely a cultural artifact. We have gone to great lengths to argue against such a view. The theory of embodied mathematics recognizes alternative forms of mathematics (like well-founded and non-well-founded set theories) as equally valid but about different subject matters. Although it recognizes the profound effects of history and culture upon the content of mathematics, it strongly rejects radical cultural relativism on empirical grounds. In recognizing all the ways that mathematics makes use of cognitive universal and universal aspects of experience, the theory of embodied mathematics explicitly rejects any possible claim that mathematics is arbitrarily shaped by history and culture alone. Indeed, the embodiment of mathematics accounts for real properties of mathematics that a radical cultural relativism would deny or ignore: conceptual stability stability of inference, precision, consistency, generalizability, discoverability, calculability, and real utility in describing the world. This distinguishes an embodied view of mathematics from a radical relativist perspective. The broad forms of postmodernism recognize the effects of culture and history. But they do not recognize those effects of embodiment that are not arbitrary. It is the nonarbitrariness arising from embodiment that takes mathematics out of the purview of postmodernism. Moreover, the embodiment of mind in general has been scientifically established by means of convergent evidence within cognitive science. Here, too, em- bodied mathematics diverges from a radically relativistic view of science as just historically and culturally contingent. We believe that a science based on convergent evidence can make real progress in understanding the world. I think that just the fact that the authors felt the need to clarify why their ideas do not align to the postmodern view is quite interesting. But also, I enjoyed their explanation. Why multiple representations? 03 Aug 2017 / Leonardo Barichello I agree with the following statement by Duval (2006): From an epistemological point of view there is a basic difference between mathematics and the other domains of scientific knowledge. Mathematical objects,2 in contrast to phenomena of astronomy, physics, chemistry, biology, etc., are never accessible by perception or by instruments (microscopes, telescopes, measurement apparatus). The only way to have access to them and deal with them is using signs and semiotic representations. (pp. 107) If one accepts that statement, it seems reasonable to conclude that representations are particularly important in the teaching and learning of mathematics. However, it does not imply that multiple representations should be at the core of teaching, as several scientific papers and recent official documents place them. One of the justifications often presented to support the use multiple representations is the following: Because no single visual representation perfectly depicts the complexity of mathematical concepts, instructors often use multiple visual representations, where the different representations emphasize complementary conceptual aspects. (Rau and Matthews, 2017, pp. 531) I fundamentally disagree with this view because I understand that some representations are very powerful and may be able to communicate a wide enough (for educational purposes, for instance) range of conceptual aspects of a given concept. Two examples: Hindu–Arabic numeral system to represent quantities and flat drawings made with pen, paper, ruler and compass for euclidean plane geometry. A second common argument is the idea that multiple representations promote conceptual understanding. The problem with this argument is that since there is no instrumental definition of conceptual understanding, been able to use multiple representations to present a given concept became the definition of conceptual understanding. So, it is not a matter of multiple representations promoting conceptual understanding, but conceptual understanding being multiple representations. From my perspective, multiple representation is a matter of curriculum: we, teachers, teach multiple representations because they are included in the curriculum directly, as a topic on its own, or indirectly, as a pre-requisite for another topic. That is my stand point in the paper Implications of Giaquinto’s epistemology of visual thinking for teaching and learning of fractions, where I defend the adoption of a carefully chosen visual representation (instead of multiple representation) especially when it comes to low achieving students. Curiously, my position finds support in the paper published by Rau and Matthews (2017), where the authors draw some recommendations to promote learning through multiple representations. When discussing the limitations of their recommendations, they state that "some visual representations may be intuitively more accessible than others because they align with the structure of human cognitive architecture" (pp. 540). The authors call these representations privileged and point out that "deploying them as anchor representations might help optimize the web of meaning that emerges from use multiple representations" (pp. 540). That is my point! For some representations there are reasons to use them that go beyond curriculum. Therefore, these representations should stand out of the pool as tools that can actually support learning and, then, the other representations may come to complement specific aspects (if some) or to cover curricular goals. Duval, Raymond. ‘A Cognitive Analysis of Problems of Comprehension in a Learning of Mathematics’. Educational Studies in Mathematics 61, no. 1–2 (2006): 103–31. doi:10.1007/s10649-006-0400-z. Rau, Martina A., and Percival G. Matthews. ‘How to Make `more’ Better? Principles for Effective Use of Multiple Representations to Enhance Students’ Learning about Fractions’. ZDM 49, no. 4 (August 2017): 531–544. doi:10.1007/s11858-017-0846-8. 27 Jun 2017 / Leonardo Barichello This paper presents some theoretical arguments that I am developing for my thesis as a result of preliminary analysis of my data. Abstract: In this paper, I will present some implications of Marcus Giaquinto’s ideas about visual thinking and its epistemology when combined with Toulmin’s layout of an argument. This is the result of an ongoing effort to discuss, from a theoretical perspective, some issues that emerged from my Ph.D. research about teaching and learning addition and subtraction of fractions to low achieving students. My claim is that visual representations can be effective for low achieving students when teaching is focused on a carefully chosen model and time is given to students to fully use it. It was published in the Informal Proceedings of the British Society for Research into Learning Mathematics conference held in March 2017. 1 2 3 4 next ... end
Your gut instinct’s right... weight gain isn’t your fault TWINS Lisa and Alana ate the same food and did the same exercise in scientific tests but ended up different weights, Professor Tim Spector tells Health Editor LUCY JOHNSTON. Twins Lisa and Alana ate the same food and did the same exercise but were different weights Identical twins Lisa and Alana MacFarlane looked and weighed almost the same until they hit their 20s eight years ago. At that point things changed for the north London-based radio and TV presenters. Lisa became more than a stone heavier than her sister, even though she ate less and exercised more. Scientists studying the twins as part of cutting edge research into gut health believe these girls highlight the secret to both health and weight loss. Their research demonstrates that a key determinant of both weight and health is not what we eat, or how much we eat. Nor how much we exercise. In fact a growing number of studies are showing our weight is influenced by differences in our individual gut bacteria. Professor Tim Spector of King’s College London, an expert in genetics and nutrition, who is leading research into gut health, says: “A major factor influencing weight and obesity is mix of microbes in the gut. “Obese people have the wrong mix, making it difficult for them to lose weight and metabolise food in a healthy way.” Lisa had been forced to take a two-year course of antibiotics in a battle against recurrent kidney infections in the years before her weight changed. Professor Spector, author of the recent book The Diet Myth: The Secret Behind What We Eat, believes it is likely this destroyed large populations of the crucial “good bugs” in her intestines that helped her metabolise food. Various tests on the women have helped to confirm these findings. According to new research, weight gain and or loss is directly affected by gut bacteria An analysis of their gut health shows that, unlike Alana, Lisa has depleted levels of the vital friendly bacterial species essential for processing food efficiently.These include the newly identified fat-busting microbe Christensenella, which protects against the buildup of visceral fat. Professor Tim Spector Professor Spector arranged separate studies in which they both ate the same foods and exercised the same amount for a month at a time. In one test they both only ate junk food, including deep fried meats, chips, chocolate and crisps. They ate the same amount and exercised to the same degree. By the end of the month Lisa had gained a stone, her sister only a few pounds. After this the girls were advised to control their intake of healthy meals using the delivery fresh food scheme HelloFresh. Both ate the same healthy portions for a month along with special “prebiotic” bars to help fertilise the good bacteria in the gut. Both lost half a stone. The gut is home to approximately 100 trillion micro-organisms with up to 3,000 bacterial species and 200 times more genes than we have. Experts are only beginning to unlock the secret powers of these tiny organisms. Professor Spector and colleagues believe the Western diet with its abundance of processed foods, together with increasing sanitisation of our homes and environments, have reduced this bacterial diversity with dramatic results. They estimate those in the West have lost up to 40 per cent of this bacterial species compared to our ancestors’ tribes in Africa. In his work, highlighted in The Diet Myth, Professor Spector discovered the weight and health of 3,000 UK twins could be predicted by the diversity of their gut microbes. The gut community varies widely between people, even twins. In lean, healthy people the microbe community is like a rainforest brimming with many species but in obese people it is far less diverse with fewer species. Lean individuals, for example, tend to have high levels of the food metabolising bug species Christensenella. These feed off fibre and produce healthy chemicals that positively affect appetite and the immune system. But showing these differences does not necessarily prove cause and effect. A further series of recent laboratory studies have shown that these differences do seem to drive weight loss and gain. Professor Spector’s collaborators in the USA raised genetically identical baby rodents in a germ-free environment so that their bodies were free of any bacteria. The mice ate the same diet in equal amounts, yet the animals that received bacteria from an obese twin grew heavier and had more body fat than mice with microbes from a thin twin. As expected, the fat mice had a less diverse community of microbes in the gut. The Diet Myth by Professor Tim SpectorPH The Diet Myth by Professor Tim Spector studies gut bacteria and what affects weight gain Another experiment confirmed that simply giving the Christensenella bug protected the mouse from weight gain. But it is not just weight that these microbes appear to regulate. Professor Spector and his colleagues believe gut bacteria also provides protection from infection, produces vitamins, and dampens down our immune system. Dysregulated gut flora is now being linked with many chronic diseases such as diabetes, obesity, arthritis, allergy, autism, irritable bowel, and chronic fatigue. Professor Spector said: “Supporting intestinal health and restoring the integrity of the gut barrier will be one of the most important goals of the 21st century.” As Lisa’s case suggests, antibiotics are particularly devastating to the gut flora. Lisa, from West Hampstead in north west London, regularly runs and attends spin and bootcamp classes. But she says: “It is very frustrating. I can see Alana’s body and although she does no cardiovascular exercise, and I do, and we eat a similar diet, I am not so slim. I look at her and see how I should look.” Restoring gut health once it has been destroyed is not always easy. Professor Spector says the multi-million-pound industry in supplements and foods that claim to repopulate the gut with good bacteria, probiotics, are unlikely to give a person exactly what they need in sufficient amounts. This is partly because we all have a unique microbial blueprint for gut health, which Professor Spector compares to a fingerprint. The best way to improve the health of your intestines, he says, is to eat as naturally as possible, including fibrous foods that feed gut bacteria and more polyphenol-rich foods such as nuts, seeds, coffee, dark chocolate, extra virgin olive oil and the occasional glass of wine. He also recommends regularly eating bacterial-rich fermented foods such as cheese, yoghurt, sauerkraut and kimchi, the Korean dish made from fermented vegetables. Professor Spector says: “Treat microbes like you would treat your garden. Give them plenty of fertiliser, fibre and nutrients. Plant new seeds regularly in the shape of new foods. Give the soil an occasional rest by fasting and avoid poisoning your microbiotic garden with preservatives, antiseptic mouthwashes, antibiotics, junk or processed foods and sugar. Giving your gut microbes plenty of diversity of real food is the key.” The Diet Myth by Professor Tim Spector is published by W&N at £14.99
Early German and English sources indicate that the oboe originated in France. The name of the instrument in all European languages a direct borrowing from the French ''hautbois'' (high, or loud, wood). Its development from the shawm, which already had this descriptive name, is attributed to the Hotteterre and Philidor families. A number of members of these families were active both as musicians and instrument makers. Lully probably used an early form of the oboe in his ballet ''L'Amour malade'' in l657. A similar instrument was introduced into French military music in 1663. Beginning with the 1670 production of ''Le bourgeois gentilhomme'' oboes were regularly used at the French court. They also caught on rapidly in other European countries. This spread was fostered not only by Lully's preeminence in the musical scene but also by the revocation of the Edict of Nantes.  This led to the emigration of many musicians from France. They were eagerly received in many other countries. For example, from 1674 onwards the oboe was heard in England. In 1677 the court of Turin employed 6 military hautboys--among them several with French names. In Madrid there is evidence, from 1679 onwards, of French oboists. Starting in 1680 French oboists also appeared at various German courts. At latest by 1697 oboes had arrived in Vienna and by 1698 the they had replaced the cornetti at San Marco in Venice. The art of oboe making also emanated from France. Peter Bressan moved to England and in Nuremberg Christoph Denner was proud to produce instruments after the French model.  In the first decades of the oboe's existence the ensemble tradition of the shawms still played al important role. Typical repertoire can be seen in the Philidor manuscript. Normal instrumentation was two oboes, tenor (taille de hautbois) and bassoon. Oboes also played colle parte with the strings in the orchestra, and contributed variety with little trios for two oboes and bassoon. Inherited attributes of the shawm, especially their use in pastoral scenes, were much in evidence. The first major solos were in opera arias, starting with the work of Agostino Steffani, Johann Kusser and Reinhard Keiser in the 1690's. The first half of the 18th century must have been the golden age of the repertoire of the oboe. In addition to many sonatas, suites and ensemble pieces, there were solo concerti, developed first in Italy by Benedetto Marcello, Tomaso Albinoni and Antonia Vivaldi. J. S. Bach's use of the oboes in vocal works set a standard that has never been equalled. [go back to menu]
Scientists have finally unlocked the secret to a mussel’s muscles. When they’re not being steamed in a delicious broth and served with fries, mussels can mostly be found in the intertidal zones of oceans and freshwater bodies. Though hanging out on an exposed shore usually means the mussel experiences the violent pounding and pull of waves and tides, this bivalve doesn’t clamp down for dear life like the barnacle. Instead, the mussel anchors itself to a firm surface with a group of filaments called byssal threads or byssus, also known as the “beard” that has to be yanked off the shell before you start cooking. Having a tether allows the mussel to float out and grab more nutrients, but also means it risks getting torn away by a wave. But how can such thin threads withstand the fury of the breakwater? In a paper appearing this week in the journal Nature Communications, Massachusetts Institute of Technology scientists Zhao Qin and Markus Buehler take a close look at a mussel’s beard, which turns out to be made of some pretty strong stuff. For the first step of their experiments, Qin and Buehler put a cage in Boston Harbor. After three weeks, they took the cage -- now covered with a collection of mussels -- out of the water. They tested the threads’ strength with a tensile machine that pulled on the mussels with controlled force. Qin and Buehler also used computer modeling to create mockups of threads with varying compositions. The key, they found, lies not in the glue that the mussel uses to attach its beard to a surface, but in the intrinsic nature of the byssal threads themselves. About 80 percent of a byssal thread is made of stiff material, while the rest is made of softer stuff. Both materials are made using the same building block of protein, which shares properties with collagen. The soft, stretchier part of the thread attaches to the mussel, while the stiff end latches onto the rock. This 80-20 ratio of stiff to soft material distributes the energy of an impact, allowing a mussel to roll with a wave’s punches. In fact, byssus is even stronger when facing chaotic forces; it can withstand impacts in a dynamic, sloshing environment that are up to nine times stronger than the strain of being pulled in one direction. Knowing how the mussel’s natural bungee attachments function could help humans design similar synthetic materials. Qin and Buehler think the principle of the byssal thread could be used to make surgical sutures that can withstand pulses and irregular liquid flows. People could also model underwater cables after the mussel’s beard, and attach sensors or cameras to oceangoing vehicles without worrying the equipment could be lost at sea. SOURCE: Qin et al. “Impact tolerance in mussel thread networks by heterogeneous material distribution.” Nature Communications published online 23 July 2013.
Essay by KevvyHigh School, 12th grade July 2003 download word file, 7 pages 5.0 Downloaded 36 times Essay One - Crassus Marcus Licinius Crassus, one of the three informal "triumvirs" who helped bring an end to the Republic, unlike Pompey and Caesar, is a man about whom not much is known. Unlike his counterparts, little has been written about him, either at the time of his life or in more contemporary accounts of the period. However, that is not to say that his political and military career were not exceptionally important in the last decades of the Roman republic. Many of Crassus' military and political decisions attributed to both the rise to power of both Caesar and Pompey and ultimately the fall of the republic. Crassus, though he achieved the position of Consul twice in his life and remained for most of his time the richest man in Rome, has had little written about him. Plutarch inexplicably leaves large gaps in his crucial biography. This may be due to the fact that, in this era of titans, Crassus was the moneyman and behind-the-scenes intriguer, not the adorned general. Others believe it could be because he died four years before the civil war between Caesar and Pompey. Or perhaps Crassus is less visible because of the sheer prominence of his two great contemporaries and rivals whose own achievements surpassed his in every possible manner. Crassus' military career began much like that of his greatest rival, Pompey. After fleeing Rome, fearing the wrath of Marius and Cinna, who had killed both his brother and father, Crassus raised an army in support of Sulla. . When Sulla entered into Italy, he sent Crassus to raise an army among the Marsi. Crassus then asked him for an escort through enemy territory. Sulla allegedly was angry, saying "I give you an escort - your father, your brother, your friends, and your...
synovium syn·o·vi·um (sĭ-nō’vē-əm) See synovial membrane. Read Also: • Synpolydactyly synpolydactyly syn·pol·y·dac·ty·ly (sĭn’pŏl-ē-dāk’tə-lē) n. Syndactyly associated with polydactyly. • Synroc noun 1. a titanium-ceramic substance that can incorporate nuclear waste in its crystals • Synsepalous adjective, Botany. 1. gamosepalous. adjective 1. another word for gamosepalous • Syntactic adjective 1. of or relating to syntax: syntactic errors in English; the syntactic rules for computer source code. 2. consisting of or noting morphemes that are combined in the same order as they would be if they were separate words in a corresponding construction: The word blackberry, which consists of an adjective followed by a […]
Why Electric Vehicles?: Air Pollution Costs Everyone Something Air pollution costs society quite a lot, and internal combustion vehicles contribute to at least 29% of CO2 emissions in the US. Electric vehicles make sense: ultimately they save us money and they let us lead healthier lives. Combustion Pollution Consider the overall projected cost of “Climate Inaction” – the cost of inaction far outweighs the cost of action: Electric vehicles help stave off the wider costs of climate change. And climate change isn’t just a wide-eyed, affects-the-rest-of-the-world concept. The macro-effects are already well-documented. It’s here and it’s real, impacting your society and your lifestyle. Kentucky, for instance, will be especially hard-hit by the effects of climate change in the next few years. Do your part: aim to go electric.
Google+ Badge Friday, March 24, 2017 Tears in the Classroom: A Sixth Grade Story I adored my sixth grade teacher, Mr. Quist. He was a young teacher with lots of energy. We had a lot of fun in his class and he took an interest in us beyond the usual classroom learning and efforts. I so vividly remember one day when friends and I were creating a bulletin board. One friend, Sue, was an amazing artist. She had drawn a beautiful design on the board and we were all coloring the design. We were silly and fooling around a lot, and Mr. Quist was trying to teach. He gave us several reminders to do the right thing, but we continued fooling. Then he raised his voice. I was so ashamed that we had upset him. I was also embarrassed and angry that he yelled at us. I ran out of the room in tears. I don't know if I ever told my parents, but I knew I was doing the wrong thing, and I understood that I was mostly upset because I had upset my teacher. Tears happen in classrooms now and then. I've cried here and there, and children have cried from time to time. Of course, we like to steer away from that behavior as much as possible, but in truth, the classroom is an intimate place of learning, share, and connection, and sometimes, similar to family life, there can be events that bring us to tears. Now that I've been teaching for a while, I'm sure Mr. Quist rethought the episode and there were no more tears that I remember that year. The problem was probably trying to teach the rest of the class while trusting that a small group of enthusiastic sixth graders could create a bulletin board in the front of the class without creating a ruckus. He learned the lesson that it's difficult for any group of sixth graders to create together silently as it's a social age that generally displays a lot of spunk.
Neurointerventional Surgery Neurointerventional surgeons specialize in minimally invasive brain surgery. They use image based technologies in performing procedures to diagnose and treat disease states of the head, neck, and spine, including ruptured and non-ruptured brain aneurysms, and acute stroke (before permanent disability has set in). These surgeries are performed by making a small nick in the skin, through which tiny tubes or catheters are advanced. These tools are then guided to their intended targets in the brain, head, neck, or spine using sophisticated imaging technologies allowing definitive treatment with coil, stents, and balloons within the sensitive neural tissue of the brain. Their subspecialty focus allows them to deliver complex stroke care, giving patients the best chance of surviving this potentially devastating medical condition. Neurointerventional surgeons also play a vital part in the process of catching and treating diseases and conditions such as aneurysm, carotid atherosclerotic disease, head and neck tumors, traumatic vascular lesions, and more.
The Difference Between Brown and White Eggs Harriet W. asks: What is the difference between brown and white eggs? We here at Today I Found Out are all about uncovering the truth amongst all of the myths, and so here is the fascinating difference between brown eggs and white eggs: Brown eggs are brown. White eggs are white. Seriously, brown or white, they are the same on the inside, with one minor caveat which we’ll get to in a minute that has nothing to do with whether the chicken is a brown egg layer or white.  But besides that caveat, a brown egg or a white egg will give you the same amount of nutrition, they taste the same, and they are equally delicious in quiches and cakes. The two also have more or less the same shell thickness.  The differences in shell thickness that you may have observed likely has to do with the age of the chicken- young chickens lay eggs with shells that are typically harder than older chickens’ eggs, but this is true for both white and brown egg layers. How the rumours started about brown eggs being “better” is thought to be because they are often more expensive at supermarkets. If something costs more, it has to be better quality or better for you, right? Not in this case (and not in many others either- increasing the price of something, sometimes drastically, is an occasionally used marketing trick to get people to think one product is better than a comparable cheaper product. Sometimes that’s true, but many times it’s not.) As for egg prices, brown eggs cost more in part because the hens that lay them usually eat more, which means the hens cost more to keep per egg.  You see, white eggs are most often laid by white or light coloured hens with white ear lobes, while brown eggs are most often laid by red-feathered or brown / dark-feathered chickens with red ear lobes. (This is not a universal truth, just a general rule.  Further, the chicken’s ear lobes are really the indicator here, not the feathers, but there is a very strong correlation between ear lobe colour and feather colour, so feather colour can be a decent indicator too. Ultimately, egg colour is determined by genetics, but the ear-lobe / feather colour thing is a good, though slightly flawed indicator.) In the end, red-lobed chickens tend to be larger than their white-lobed counterparts, which is why they eat more. The farmers need to get reimbursed for the extra feed somehow, so they up the price of the brown eggs. This also explains why white eggs tend to be more popular in supermarkets. White-lobed chickens cost less for farmers to keep, which leads to cheaper eggs, which leads to grocers buying more white eggs to put on the shelves to offer this product cheaper to customers. White eggs are simply more cost-effective. There is also a commonly touted myth that brown eggs taste better, and that’s why they’re more expensive. As noted, this white egg / brown egg taste difference is a myth. But the potential difference in taste from one egg to another does lead us to our one caveat, though it isn’t anything to do with the colour of the egg—rather, it has to do with the chicken’s diet. Many chickens raised at home are brown-egg layers, while most of the chickens raised for commercial use are white-egg layers.  The different diets affect the taste of the eggs and even the colour of the yolk, similar to how diet can drastically affect the taste of the meat of some animal. However, if you were to take one of those brown egg-laying chickens and raise it on the same food as a white egg laying chicken, their eggs would taste the same and be otherwise indistinguishable aside from the colour of the shell. If their diets are the same, the yolks will even be identical in colour.  Today, chickens raised for commercial purposes, whether layers of white eggs or brown, are all getting fed the same thing, with perhaps just a slight variance from company to company.  If you’ve had some brown eggs from a neighbor or a chicken of your own that’s fed a different diet than commercially fed chickens eat, then there may be a difference in taste.  It just doesn’t have anything to do with the colour of the egg. So, if brown egg-laying chickens are more expensive to feed and to keep, why do farmers keep them around? The answer is that so many people buy into the “brown eggs are better” myth that brown eggs are still a viable business option. As long as people keep buying the more expensive eggs and are willing to pay marked up prices beyond factoring in the extra feed, farmers will keep raising chickens that lay them. Of course, these days some of the most hotly debated arguments aren’t over white vs. brown eggs, but over the superior quality of organic vs. not organic eggs, or free range vs. cage eggs. While differences in diet can affect the taste, if you’re wondering about quality of the egg or nutritional value, a study done by D.R. Jones et al. through the Agricultural Research Service and published in Poultry Science in 2010 found that, ultimately, there is very little difference in the quality of eggs produced in these different ways.  The small differences they did find “varied without one egg type consistently maintaining the highest or lowest values.” So, in the end, while there are small ways the composition and taste of chicken eggs can be influenced, the colour of the egg shell isn’t one of them. Bonus Facts: • Chickens were originally domesticated, not for food, but for cockfighting.  You can read more about this here. • Chicken eggs aren’t all brown and white. For instance, the Araucana and Ameraucana, rare breeds of chicken, actually lay “Easter eggs”—light blue and light green eggs. Both breeds originated in South America and were likely the cross between a few other blue egg-laying breeds. • It turns out it’s not just politicians that can live without brains, a chicken named Mike lived without his entire head for 18 months! • The U.S. Department of Agriculture estimates that 6.5 billion dozen eggs are produced every year, amounting to about $7 billion spent on eggs in the United States alone. • There are 25 billion chickens in the world, which means there are more of them than any other bird species—and everyone on the planet could have roughly 3 chickens each. • In general, chickens in their prime will lay about one egg per day, but their egg-laying capabilities depend on things like diet, the season and the weather. • Like many things egg-related, the food to feed chickens to produce the best-tasting egg seems to be up for debate, though many people seem to believe that corn-fed chickens produce the tastiest eggs. Expand for References Share the Knowledge! Facebooktwittergoogle_plusredditpinteresttumblrmailFacebooktwittergoogle_plusredditpinteresttumblrmail Print Friendly Subscribe Me To:  |  • Well done Emily, I really enjoyed reading that. Having always wondered the difference about shell color if reference to the hens. Last week I read something about the ear lobe and you mentioned that too. Anyway, I just wanted you to know that I thought you did a really good job explaining this. Have a great day! • While your main point may be sort of true, you miss the actual points by a country mile. Over 90% of the eggs laid in the US come from caged factory hens – so if ethical treatment of farm animals is not a concern for you, then have at your white eggs. Yes, they are cheaper – because the producer treats the birds like an biological machine: cheap input (food and living conditions) makes for cheap output. Typically that means using a breed of chicken that lays white eggs, so the correlation is causal not coincidental. White eggs are cheap because the farmer is cheap and the customer is cheap. But if you do care about where your food comes from, then even ‘cage-free’ should give you pause, and ‘free-range’ is a legally meaningless term for the most part. Chickens raised, not only with ‘access’ to the outdoors, but rather with meaningful, year round life on pastures lay eggs that are objectively better. These ‘pasture-raised’ chickens, who get to eat all the grass, bugs, herbs and critters they like, lay eggs that are nutritionally superior (just google Mother Earth New, Pasture Raised) and taste and look like eggs are supposed to – rich, golden yolks and deep, fluffy whites – without any sort of chemical adulteration (like the spurious addition of Omega3, or whatever the marketing supplement du jour is). Most small farmers are raising chickens like this, and the few national brands that there are adhere to very strict guidelines about what the term means. One thing is for sure; hens raised like this are happier and healthier. If you are going to write an article with such broad generalizations, then maybe you need to a little more of that finding out stuff. Or research as the rest of us call it. You’ll be amazed at what you can find out! • Daven Hiskey @Dan: While your ethical points are valid, it wasn’t what this article is about. Also, the taste certainly is likely different as noted in the article (diet affects taste). That said, this part of your comment “These ‘pasture-raised’ chickens, who get to eat all the grass, bugs, herbs and critters they like, lay eggs that are nutritionally superior” isn’t backed up by research to date (quite the contrary), as noted in the article, nor is the “fluffy whites” part, which is also measured in the aforementioned study and while they found differences, they weren’t differences divided by things like free-range / caged, but rather just random amongst the samples. “Or research as the rest of us call it.” I’d love to see the research you’ve found to support your comments. That would be interesting to include in the article assuming the methodology is sound in the particular studies. • So it sounds to me the only main difference between brown vs. white is the treatment of the chickens. I suppose if you’re one of those animal rights activists, then you might prefer brown eggs. To me, though, that’s like being a vegetarian — you refuse to eat meat because you hate cruelty to animals. • You don’t have to be a vegetarian or animal rights activist in order to dislike animal cruelty. I just found out about the insanely inhumane conditions in which those chickens live. Cages so crowded they can’t even move much. Some are so bad that their skin and feathers grow into the metal wires of the cages. We take their eggs, let’s at least give them some room. Many of those chickens get sick easily so they are given stuff that ends up in the eggs they lay and that we the eat. I’m really trying to eat “cage free” for the higher nutritional value and also from learning about the disturbing ways regular eggs are produced. You can look up videos about this on youtube I ain’t kidding. • Your assuming that people are cheap and never consider that many people are on a tight budget. Not everyone in this country has the luck of having a good paying job. You can have the luxury of caring about the welfare of animals when you garnish good or at least acceptable wages. That is not the reality of most of the world. The US spends billions of dollars on animals while millions of children go hungry. That’s how screw the world is. This out of the mouth of an animal lover who has rescued a lot of animals, but who believes that human life is more important to save. And I don’t say that lightly. Humans have greater contributions to offer the world than any other living animal. We invent, discover and do a lot of things that contribute to the well-fare of other human beings and to all living creatures. I just don’t think it’s fair to criticize others because they don’t have the means you do. • Daven Hiskey @Miguel: Gizmodo copied that from us with permission. They re-publish a lot of our articles. You’ll also note that they mention that both in that Emily Upton is listed as the author there and in the footer they say something like “re-published with permission from TodayIFoundOut” 🙂 • @Dan Although your concern about ethical part of the story is admirable , but with all do respect i think you didnt get the point of this article , i am a farmer and i produce 45000 egg per day , i must say to you that the article is absolutely right , the article is about the difference between white and brown egg , and you should be aware that both white and brown hens are kept in cage , unless the farmer decide to choose free run or cageless method of breed that is nothing to do with the color of hens or eggs , there are white hens that breed with free run method and there are brown hens that kept in cage , so that part that you said whites are cheap cause the farmer is cheap and the customer is cheap , is strongly wrong , and once again i should say the brown eggs are more expensive because of 3 reasons 1-the brown hens eat considerably more , compare 100 gr to 135 gr per day !!! 2-brown hens need more space because they are bigger (this means farmer can use less space of his farm) 3-they are less common ! • So, basically, both white and brown eggs taste the same. That is a bummer. That makes brown eggs a ripoff. I just bought them 3 days ago because I thought that they would taste better than the white eggs do. I was wrong. • 67 years ago when I was a child of 8 and in charge of the chickens on our “place,” we raised white chickens – first, because at that time customers wanted white eggs, second, my father said white leghorns were more consistent at laying eggs every day. We kept our hens in a large pen about 50′ by 25′. We didn’t allow them to eat grass as it made the yolks darker, customers wanted light yolks, therefore they were fed grain. Just some history. • My roommates still buy into the brown eggs are better myth. When I asked why they always bought brown eggs they said it was because they taste better and are more nutritious, but I definitely couldn’t tell the difference. Nice to know there never was a difference in the first place. Now we can stop wasting money on brown eggs. • I’m from the UK. Nearly all eggs there have a brown shell. Never see white shell eggs, but some blue & green ones. I find that the eggs in the US are tastier and fresher than the UK. I imagine that the flavour difference is because it is a grain based food in the UK and a corn based food in the US. Caged, barn, free range or organic has no influence on the taste, simply what their main food supply is. • Another point of view is about the characteristics (personality) of the breed to better cope with confinement. The isa brown hen, red ear lobe, brown egg layer is more docile than the white ear lobbed white leghorn, which is more flighty and aggresive. So this is a factor to consider when keeping volumes of chickens in close proximity. • I grew up onm white eggs, but now I live in Europe where they only have Brown eggs. I prefer the flavor of white eggs, and the shells are thicker on Brown eggs. I disagree with the above article. • I Love eggs, always have, but there is a difference in store bought vs range fed. If I buy eggs from the store and eat them I will be in the bathroom in about 20 min, when I eat range fed eggs, which I buy from a local person, because I know how they’re raised and what they eat, I have no problem at all I can eat as many as I want. I just thought I would put in my 2 cents, and there is no taste difference between white vs brown. • I just stumbled on this article and, although it’s a bit older, I still feel the need to reply. The characteristics of an egg, aside from the color, are really mostly about what you feed your hens. I raise chickens as a hobby and I’ve found that the yolks come out more orange when I give them more protein in their diet (mealworms, bugs, etc.) and more yellow when I don’t. Shell thickness, in addition to being influenced by age as is mentioned already, is also attributable to how much calcium they get in their diet. Layer food has calcium in it but it can also be given as a supplement to their diet; I offer them crushed oyster shell and they love it. They seem to pick at it according to their dietary needs as their intake goes up during periods of increased egg laying like the middle of summer. • Hi. I just wanted to ask,. Bec there are alot of eggs now that comes out from the supermarket and it is labeled with Omega 3, sellenium, vits. Etc. Do u think it is its natural nutrients of that egg or its is just been added to the eggs by the producers? Do u think this is good or healthy? And is it ok to eat raw fresh eggs from butt. from a native chicken. Or its still best to buy a pasteurized eggs from the market?. And which is better brown eggs or white eggs but pasteurized.? Coz i eat a raw fresh brown eggs and it really made me feel strong n good. Thank you,. Leave a Reply
In 2010, the Energy Department set up a commission to figure out what to do with the country’s nuclear waste, after a planned repository at Nevada’s Yucca Mountain was nixed. This week, the commission came back and advised a “consent-based approach” to choosing a new site. How would this work? A scenic view of the now-shut-down Three Mile Island nuclear power plant. (Michael S. Williamson/The Washington Post) “What’s obvious now, although it wasn’t always, is that if a local community doesn’t want you, there’s not much you can do,” Rod Ewing, a nuclear-waste expert at the University of Michigan, told me in an interview last year. “For a project that takes decades, the opposition only has to prevail once for everything to be put off track.” And, while everyone loves to gripe about NIMBYs, Ewing argues that NIMBYs are a fact of life — irrational or not, people get freaked out by nuclear waste. So what’s the alternative? One option is to look at what countries like Sweden have done. Back in the 1980s, the Swedish government drew up a long list of locations that could potentially host a waste repository. Each town was given a chance to veto, and, after two decades and countless hours of local consultation, Sweden had two finalists, towns that actually competed with each other for the chance to host the site and reap the economic benefits. (One was finally picked in 2009.) Both towns, not surprisingly, already had nuclear plants in the area, and polls showed support running as high as 83 percent. Now, there are reasons why a similar process might not go as smoothly in the United States. As Michael Greenberg of Rutgers has found, public opinion on nuclear waste follows an odd pattern. The people who live closest to proposed waste sites are often quite supportive (not least because they tend to have friends and family working in local nuclear facilities). But, as you move farther away, opposition grows. So, even if a local community wants a nuclear dump, the state government may squash the idea. Still, there’s at least one potential model. Currently, the only long-term nuclear-waste facility in the United States is the Waste Isolation Pilot Plant in Carlsbad, N.M., which opened in 1999 and handles the radioactive leftovers from U.S. defense facilities. As Roger Nelson of the Energy Department’s Carlsbad office explained to me, plans for the facility were originally most heavily promoted by nearby residents, who were worried about the area’s economy once its potash mines ran out. Eventually, those locals managed to convince wary state legislators in New Mexico to drop their opposition. The Energy Department’s commission is suggesting a Swedish-style approach for finding a new replacement for Yucca. Matthew Wald of the New York Times has some excellent additional coverage of the commission, noting, among other things, that the panel appeared to put a damper on the idea of reprocessing nuclear waste back into fuel. In any case, the hunt for a radioactive-waste repository has taken on a new urgency after the Fukushima disaster in Japan highlighted the risks of storing used fuel rods in on-site pools or dry caskets at hundreds of plants around the country. But the process will likely be a slow one — the commission, for its part, suggested that the search for a new Yucca could take as long as 20 years.
Around 75 artifacts—including some that were likely used by Hitler himself—were found in a hidden room inside a collector's home. Nazi Artifacts Argentina Photos Twitter/APSome of the items uncovered in the recent raid of Argentina’s largest-ever stash of Nazi artifacts. The largest collection of Nazi objects in Argentina’s history was discovered outside of Buenos Aires this month. Around 75 artifacts — including some that were likely used by Hitler himself — were found in a hidden room inside a collector’s home. Among the disturbing items were magnifying glasses engraved with swastikas, a bust of Hitler, a box of harmonicas, and a scary-looking medical device used to measure heads (an ethnocentric technique used by Nazis to distinguish “Aryans” from Jews). Authorities suspect that many of the pieces belonged to high-ranking Nazi officials. This theory is supported by photographs found with the collection — one of which shows Hitler using a magnifying glass like the ones confiscated. “We have turned to historians and they’ve told us it is the original magnifying glass (that Hitler used),” Nestor Roncaglia, the head of Argentina’s federal police, said. “We are reaching out to international experts to deepen (the investigation).” Investigators had been tracking this particular collector for awhile — since the illicit artwork was found in a local gallery — and they raided the house on June 8. Ironically, they found a large, suspicious-looking bookshelf that turned out to be a hidden door. Behind it, a secret passage led to a room filled with Nazi paraphernalia. The collector, whose name remains confidential, is still free, but under investigation. Authorities are still unsure how he came to possess these original pieces. They suspect that they were brought to the South American country by Nazis fleeing after World War II. The infamous Josef Mengele and Adolf Eichmann were among the many Holocaust masterminds who chose Argentina as their getaway destination. Both of them settled in houses near where the objects were found. Despite being on the run from war crimes charges, these escapees apparently had time to pack some heavy cargo. A massive, swastika-engraved hourglass, a gold eagle sculpture sitting atop a swastika pedestal, toys that would have been used to indoctrinate Nazi children, a trumpet and some silverware were also found among the disturbing stash. “There are no precedents for a find like this,” Roncaglia said. Next, read the little-known story of the Nazis who defended China from the Japanese. Then, learn about the American arm of the Nazi party before and during WWII. Annie Garau Close Pop-in Like All That Is Interesting
Monday, April 5, 2010 OSPF is the most popular routing protocol in the world. However, OSPF needs to deal with a lot of computations internally. To help make the routing more efficient, it is better to do route summarization. Routers with less routes are faster. Suppose a router has 16 connected routes from to These subnets are only connected to that router and no where else. In a typical case, the router would advertise ALL the routes to neighbors. However, this is inefficient because the neighbor routers would not need to know if any route in the bunch went down because it would not exist anywhere else. There are two ways to summarize this route. One way is to turn it into This in essence the router telling the neighbors that it knows how to get to anything that starts with 192.168. However, this is inefficient because may exist somewhere else. A better way is to actually group all unchanging bits together. For example: .0.0 would be 192.168.00000000.0 .5.0 would be 192.168.00000101.0 .10.0 would be 192.168.00001010.0 .15.0 would be 192.168.00001111.0 Notice that the first two and a half octets are unchanging. In this case, we can simply advertise a mask of which would group everything from .0.0 to 0.15.0. If the company somehow has growth and a subnet is added, there are two things that can be done. First, the subnet mask can actually be shifted back so that we now advertise However, this would encompass routes all the way to .31.255. A better way to do this in real life is to advertise two separate routes which are: It is better to have two routes than have a single route that encompasses a lot of unnecessary routes which may look messy if the route appears somewhere else. Areas are like maps. The entire topology is like a world map, and the topology in an area is like a city map. Only routers in the area know the full topology of the area. Routes from external areas are summarized. All areas must connect to area 0. The goal of areas is to localize updates within an area. Areas require a hierarchical design to be effective. Any router that has interfaces in two or more areas are ABRs. ABR stands for Area Border Router. ABRs are the routers that perform summarization. A hierarchical design can be observed in the following example: Suppose that Area 1 has routes from to, and Area 2 has routes from to Area 3 has to and Area 4 has to If routes aren't summarized properly, the routers in Area 0 would see the routes as: Area 1 Area 2 Area 3 Area 4 That would be a LOT of routes. Therefore, we would need to summarize Area 1 and 2 into /27 masks and Area 3 and 4 into /28 masks. We would then have: Area 1 Area 2 Area 3 Area 4 This effectively locks us into a hierarchical situation. Area 1 can be further subnetted, but we cannot bring any subnets in out of area 1. This however, also becomes a convenience in that anything starting with 192.168.[0-15].0 can be sent to area 1. Something to note in OSPF is that even though all routers have the same topology table, all routers will have different routing tables. All routers will calculate the best routes to everywhere using their location as the starting point. An area is used to localize topology updates, so anything that happens in area 0 stays in area 0. Other areas will just see the summary. Another type of router role is an ASBR. ASBR stands for Autonomous System Boundary Router. The ASBR typically connects to the internet or another routing protocol. Like the ABR, the ASBR can also summarize. OSPF neighbors send Hello messages on chosen interfaces. OSPF sends Hello every 10 seconds in Broadcast/P2P networks, and once every 30 seconds on NBMA networks (like Frame Relay). The Hello messages contain information like: -Router ID -Hello and Dead timers* -Network Mask* -Area ID* -Router Priority -DR/BDR IP address -Authentication Password* * indicates parameters that must match. Administrators typically tune down the Hello intervals so downed neighbors are more quickly detected. No comments : Post a Comment
Differences between a wood jointer and a wood planer Sometimes people mistake wood jointers and wood planers to function the same way, no. They actually function differently. A wood jointer is different from a wood planer and a wood planer is different from a wood jointer. How can you tell the difference? A jointer is a wood working tool which is used for creating flat surfaces along the edges and faces of a piece of wood. The job of a jointer is to flatten the edges and faces of a piece of wood.  Most lumber are mostly sold in the form of rectangular boards, which are normally custom cut in the workshop into different, thicknesses, widths and length.  When a large piece of lumber is cut down to different sizes, the surfaces are not even. Here is where a jointer comes into play. A jointer is used to even up these surfaces. The wood with the uneven surface is placed in the in-feed table of a jointer, where it is pushed through steel cutting blades over to the out-feed table.  This process is done repeatedly until the desired smoothness of the surface is acquired.  The work of a jointer is to ensure that the surfaces of pieces of wood are smooth and even so that they can be joined together without any difficulty. On the other hand, a planer is not used to flatten the surface of wood, but to reduce a piece of wood to a desired thickness. When a piece of wood is too thick to what you desire it for, the planer comes into play.
Answered By: Erin Mooney Last Updated: Jan 19, 2016     Views: 224 A search like impact of gender on people's salary expectations will get you far fewer results than if you searched for  gender AND salary AND expectations It is also valuable to think of all of the terms that mean the same thing as your key concepts. Just because you think of the word salary does not mean that all of the authors are using that word. They might use terms like wages, pay, income, or earnings. Searching for all of those terms together with OR between them (for example: salary OR pay OR wages OR income OR earnings) tells the search engine to find at least one of these terms in your search results. It allows you to find all of the possible works on your topic at once without knowing exactly which term each author will use. How can you brainstorm the key concepts, keywords, and synonyms for your topic? Reference resources (such as AccessScience Encyclopedia of Science and TechnologyOxford Reference Online, Gale Virtual Reference, Credo Reference Unlimited) or even Wikipedia can provide you with basic information about your topic, including keywords, people's names, or place names you may not have thought of before. If you are focusing on a particular academic discipline (e.g. Psychology, Education, Business), take time to look at subject-specific encyclopedias and reference sources in your field to find basic information on your topic and to discover new keywords. You can find these resources listed on the library research guides for subjects, or search discoverE for "your subject/topic" AND encyclopedia. Chat with a Reference Librarian: Text us a question to (404) 994-3366.
Arden Miller photo       Arden Miller, Ph.D Professor of Psychology Missouri State University Psychological Statistical Methods Unit 7: Decision Errors, Power, and Effect Sizes Download all videos in a zip file. Download mp4 videos, smaller format suitable for smartphones or computer Objectives and Lecture Notes Reading: Aron, Chapter 6 1. Explain the two types of decision errors that occur when conducting hypothesis tests. 2. Compute an effect size and explain how it is useful in putting statistical significance in context and in conducting metaanalysis. 3. Given an effect size, N, and population parameters, compute the power that goes with a statistical test. 4. Demonstrate an understanding of how variance, effect size, and sample size work together to influence the power of a statistical test and discuss statistical and methodological alternatives for increasing the power of statistical test. 5. Discuss the comparative roles of effect size and statistical significance in evaluating the meaning of a study. Power computation QA Power & Effect size
The Info List - University Of Berlin --- Advertisement --- The HUMBOLDT UNIVERSITY OF BERLIN (German : _Humboldt-Universität zu Berlin_, abbreviated HU BERLIN) is one of Berlin 's oldest universities , founded on 15 October 1811 as the UNIVERSITY OF BERLIN (_Berliner Universität_) by Frederick William III of Prussia , on the initiative of the liberal Prussian educational reformer and linguist Wilhelm von Humboldt . The Humboldt university model has strongly influenced other European and Western universities. From 1828 to 1945 it was known as the FREDERICK WILLIAM UNIVERSITY (_Friedrich-Wilhelms-Universität_) and also (unofficially) as the _Universität unter den Linden_ after its location in the former palace of Prince Henry of Prussia which his brother, King Frederick II , had built for him between 1748 and 1753 on the avenue Unter den Linden . In 1949 (no personal name in the meantime), it was named _Humboldt-Universität_ in honour of both its organiser Wilhelm and his brother, geographer Alexander von Humboldt . In 2012, the Humboldt University of Berlin was one of eleven German universities to win in the German Universities Excellence Initiative , a national competition for universities organized by the German Federal Government. The university has been associated with 40 Nobel Prize winners and is considered one of the best universities in Europe as well as one of the most prestigious universities in the world for arts and humanities. * 1 History * 1.1 Early history * 1.2 Enlargement * 1.3 Third Reich * 1.4 Reopening * 1.5 East Germany * 1.6 Modern Germany * 2 Organization * 3 Library * 4 Distinguished alumni and lecturers * 4.1 Nobel Prize laureates * 5 Rankings * 6 See also * 7 Notes and references * 8 External links The structure of German research-intensive universities, such as Humboldt, served as a model for institutions like Johns Hopkins University . Further, it has been claimed that "the 'Humboldtian' university became a model for the rest of Europe with its central principle being the union of teaching and research in the work of the individual scholar or scientist." The University in 1938 In the spring of 1948, after several university students with admission irregularities were withdrawn, the opposition demanded a "free" university. Students and scholars, with support from especially the Americans, the newspaper _ Der Tagesspiegel _, and the governing Mayor Ernst Reuter founded the Free University of Berlin in Dahlem (part of the American sector). The decades-long division of the city into East and West Berlin finally cemented the division into two independent universities permanently. Humboldt University in 1964 Since the old name of the university had some monarchic origins the university was renamed. Although the Soviets and the government of East Berlin preferred a naming after some communist leader the university was in the end named after the two Humboldt brothers. It was able to create and maintain international contacts and create world-wide cooperation. The long-standing and intensive research and exchange links with the universities in Eastern Europe and particularly in the former Soviet Union are worth special mentioning; many of these links are without parallel in Germany. In addition, formal academic cooperation with nearly all universities in the capital cities of Western Europe has existed since the 1970s. And for several years there have been close relations to universities in Japan and the United States, as well as in Asian, African and Latin American countries. These are the nine faculties into which the university is divided: * Faculty of Law * Faculty of Mathematics and Natural Sciences ( Geography , Computer Science , Mathematics , Chemistry , Physics ) * Faculty of Life Sciences ( Agriculture and Horticulture , Biology , Psychology ) * Charité Berlin University Medicine * Faculty of Philosophy I ( Philosophy , History , European Ethnology , Department of Library and Information Science ) * Faculty of Philosophy II ( Literature , Linguistics , Scandinavian Studies , Romance literatures, English and American Studies , Slavic Studies , Classical Philology ) * Faculty of Humanities and Social Sciences (Social Sciences, Cultural Studies /Arts, Asian/African Studies (includes Archeology ), Sport science , Rehabilitation Studies, Education , Quality Management in Education ) * Faculty of Theology * Faculty of Economics and Business Administration Furthermore, there are two independent institutes (_Zentralinstitute_) that are part of the university: * Centre for British Studies (in German: _Großbritannienzentrum_) * Humboldt-Innovation (research transfer and spin-off service) * Museum für Naturkunde (Museum of Natural History) * Späth-Arboretum The former Royal Library, now seat of the Faculty of Law _ Otto von Bismarck Albert Einstein Karl Marx Georg Hegel Werner Heisenberg Yeshayahu Leibowitz Max Planck Jakob and Wilhelm Grimm Angela Davis * Theodore Dyke Acland (1851–1931), surgeon and physician * Alexander Altmann (1906–1987), rabbi and scholar of Jewish philosophy and mysticism * Gerhard Anschütz (1867–1948) leading jurisprudent and "father of the constitution" of the Bundesland Hesse * Michelle Bachelet (born 1951), pediatrician and epidemiologist, president of the Republic of Chile * Azmi Bishara (born 1956), Arab-Israeli politician * Bruno Bauer (1809–1882), theologian, Bible critic and philosopher * Jurek Becker (1937–1997), writer ( Jacob the Liar _) * Eliezer Berkovits (1908–1992), rabbi, philosopher and theologian * Otto von Bismarck (1815–1898), first German chancellor * Dietrich Bonhoeffer (1906–1945), theologian and resistance fighter * Max Born (1882–1970), physicist, Nobel Prize for physics in 1954 * Aron Brand (1910–1977), pediatric cardiologist * Gottlieb Burckhardt (1836–1907), psychiatrist, first physician to perform modern psychosurgery (1888) * Michael C. Burda , macroeconomist * George C. Butte (1877–1940), American jurist * Stepan Shahumyan (1878–1918), communist politician and head of the Baku Commune * Ezriel Carlebach (1909–1956), Israeli journalist and editorial writer * Ernst Cassirer (1874–1945), philosopher * Adelbert von Chamisso (1781–1838), natural scientist and writer * Angela Davis (born 1944), political activist, educator, author, philosopher * Suat Derviş (1904/1905 – 1972), Turkish novelist, journalist, and political activist * Harilal Dhruv (1856–1896), Indian lawyer, poet, indologist * Wilhelm Dilthey (1833–1911), philosopher * W. E. B. Du Bois (1868–1963), African-American activist and scholar * Paul Ehrlich (1854–1915), physician, Nobel Prize for medicine in 1908 * Albert Einstein (1879–1955), physicist, Nobel Prize for physics in 1921 * Friedrich Engels (1820–1895), journalist and philosopher * Ludwig Andreas Feuerbach (1804–1872), philosopher * Johann Gottlieb Fichte (1762–1814), philosopher, rector of the university (1810–1812) * Hermann Emil Fischer (1852–1919), founder of modern biochemistry , Nobel Prize in chemistry in 1902 * Werner Forßmann (1904–1979), physician, Nobel Prize for medicine in 1956 * James Franck (1882–1964), physicist, Nobel Prize for physics in 1925 * Ernst Gehrcke (1878–1960), experimental physicist * Jacob Grimm (1785–1863), linguist and literary critic * Wilhelm Grimm (1786–1859), linguist and literary critic * Gregor Gysi (1948–), German politician and lawyer * Fritz Haber (1868–1934), chemist, Nobel Prize for chemistry in 1918 * Otto Hahn (1879–1968), chemist, Nobel Prize for chemistry in 1944 * Sir William Reginald Halliday (1886–1966), principal of King\'s College London (1928–1952) * Robert Havemann (1910–1982), chemist, co-founder of European Union , and leading GDR dissident * Georg Wilhelm Friedrich Hegel (1770–1831), philosopher, rector of the university (1830–1831) * Heinrich Heine (1797–1856), writer and poet * Werner Heisenberg (1901–1976), physicist, Nobel Prize for physics in 1932 * Hermann von Helmholtz (1821–1894), physician and physicist * Gustav Hertz (1887–1975), physicist, Nobel Prize for physics in 1925 * Heinrich Hertz (1857–1894), physicist * Abraham Joshua Heschel (1907–1972) rabbi, philosopher, and theologian * Jacobus Henricus van \'t Hoff (1852–1911), chemist, Nobel Prize for chemistry in 1901 * Max Huber (1874–1960), international lawyer and diplomat * Christoph Wilhelm Hufeland (1762–1836), founder of macrobiotics * Wilhelm von Humboldt (1767–1835), politician, linguist, and founder of the university * Alexander von Humboldt (1769–1859), natural scientist * Zakir Hussain (1897–1969), third president of India * Sadi Irmak (1904–1990), Prime minister of Turkey * Hermann Kasack (1896–1966), writer * George F. Kennan (1904–2005), American diplomat, political scientist and historian * Gustav Kirchhoff (1824–1887), physicist * Robert Koch (1843–1910), physician, Nobel Prize for medicine in 1905 * Komitas (1869–1935), composer, ethnomusicologist, the founder of the Armenian classical music * Albrecht Kossel (1853–1927), physician, Nobel Prize for medicine in 1910 * Arnold Kutzinski (died 1956), psychiatrist * Edmund Landau (1877–1938), mathematician * Arnold von Lasaulx (1839–1886) mineralogist and petrographer * Max von Laue (1879–1960), physicist, Nobel Prize for physics in 1914 * Yeshayahu Leibowitz (1903–1994), Israeli public intellectual and polymath * Wassily Leontief (1905–1999), economist, Nobel Prize for economics in 1973 * Karl Liebknecht (1871–1919), socialist politician and revolutionary * Friedrich Loeffler (1852–1915), bacteriologist * Ram Manohar Lohia (1910–1967), Indian activist and politician * Karl Adolf Lorenz (1837–1923), composer * Herbert Marcuse (1898–1979), philosopher * Karl Marx (1818–1883), philosopher and sociologist * Ernst Mayr (1904–2005), biologist * Lise Meitner (1878–1968), physicist, Enrico Fermi Award in 1966 * Felix Mendelssohn (1809–1847), composer * Theodor Mommsen (1817–1903), historian, Nobel Prize for literature in 1902 * Edmund Montgomery (1835–1911), philosopher, scientist, physician * John von Neumann (1903–1957), mathematician and physicist * Max Planck (1858–1947), physicist, Nobel Prize for physics in 1918 * Gordon Prange (1910–1980), American historian * Leopold von Ranke (1795–1886), historian * Otto Friedrich Ranke (1899–1959), physiologist * Erich Regener (1881–1955), physicist * Robert Remak (1815–1865), cell biologist * Friedrich Wilhelm Joseph Schelling (1775–1854), philosopher * Friedrich Daniel Ernst Schleiermacher (1768–1834), philosopher * Bernhard Schlink (born 1944), writer, _Der Vorleser_ (_The Reader _) * Carl Schmitt (1888–1985), German jurist, political theorist, and professor of law * Menachem Mendel Schneerson (1902–1994), rabbi, philosopher, and theologian * Arthur Schopenhauer (1788–1860), philosopher * Erwin Schrödinger (1887–1961), physicist, Nobel Prize for physics in 1933 * Peter Schubert (1938–2003), diplomat and albanologist * Georg Simmel (1858–1918), philosopher and sociologist * Joseph B. Soloveitchik (1903–1993), rabbi, philosopher, and theologian * Herman Smith-Johannsen (1875–1987), sportsman who introduced cross-country skiing to North America * Werner Sombart (1863–1941), philosopher, sociologist and economist * Hans Spemann (1869–1941), biologist, Nobel Prize for biology in 1935 * Hermann Stieve (1886–1952), anatomist who did research on bodies of Nazi execution victims * Max Stirner (1806–1856), philosopher * Yemima Tchernovitz-Avidar (1909–98), Israeli author * Gustav Tornier (1859–1938), paleontologist and zoologist * Kurt Tucholsky (1890–1935), writer and journalist * Komitas Vardapet (1869–1935), Armenian priest, composer, choir leader, singer, music ethnologist, music pedagogue and musicologist * Rudolf Virchow (1821–1902), physician and politician * Luis Villar Borda (1929–2008), Colombian politician and diplomat * Alfred Wegener (1880–1930), scientist, geologist, and meteorologist, early theorist of continental drift * Karl Weierstraß (1815–1897), mathematician * Max Westenhöfer (1871–1957), pathologist, proposed the Aquatic ape hypothesis , reformer of field of pathology in Chile * Wilhelm Heinrich Westphal (1882–1978), physicist * Wilhelm Wien (1864–1928), physicist, Nobel Prize for physics in 1911 * Ulrich von Wilamowitz-Moellendorff (1848–1931), philologist * Richard Willstätter (1872–1942), chemist, Nobel Prize for chemistry in 1915 * Annette Schmiedchen (born 1966), Indologist and Padma Shri award winner * Max Weber (1864–1920), sociologist, philosopher, and political economist There are 40 Nobel Prize winners affiliated with the Humboldt University: Albert Abraham Michelson Otto Hahn Theodor Mommsen * 1901 Jacobus Henricus van \'t Hoff (Chemistry) * 1901 Emil Adolf von Behring (Physiology or Medicine) * 1902 Hermann Emil Fischer (Chemistry) * 1902 Theodor Mommsen (Literature) * 1905 Adolf von Baeyer (Chemistry) * 1905 Robert Koch (Physiology or Medicine) * 1907 Albert Abraham Michelson (Physics) * 1907 Eduard Buchner (Chemistry) * 1908 Paul Ehrlich (Physiology or Medicine) * 1909 Karl Ferdinand Braun (Physics) * 1910 Otto Wallach (Chemistry) * 1910 Albrecht Kossel (Physiology or Medicine) * 1910 Paul Heyse (Literature) * 1911 Wilhelm Wien (Physics) * 1914 Max von Laue (Physics) * 1915 Richard Willstätter (Chemistry) * 1918 Fritz Haber (Chemistry) * 1918 Max Planck (Physics) * 1920 Walther Nernst (Chemistry) * 1921 Albert Einstein (Physics) * 1925 Gustav Ludwig Hertz (Physics) * 1925 James Franck (Physics) * 1925 Richard Adolf Zsigmondy (Chemistry) * 1928 Adolf Otto Reinhold Windaus (Chemistry) * 1929 Hans von Euler-Chelpin (Chemistry) * 1931 Otto Heinrich Warburg (Physiology or Medicine) * 1932 Werner Heisenberg (Physics) * 1933 Erwin Schrödinger (Physics) * 1935 Hans Spemann (Physiology or Medicine) * 1936 Peter Debye (Chemistry) * 1939 Adolf Butenandt (Chemistry) * 1944 Otto Hahn (Chemistry) * 1950 Kurt Alder (Chemistry) * 1950 Otto Diels (Chemistry) * 1953 Fritz Albert Lipmann (Physiology or Medicine) *
ron soyland Without doubt, making the vacuum tight wire seals through the pyrex glass is the most difficult part of making a tube. More tubes will fail from seal leakage than from all other problems combined. Thus, I will spend some time here showing exactly how it is done. After several dozen or more practice seals you should be able to relaibly make a seal that will be completely vacuum tight. And have no problems with annealing! Pyrex (borosilicate glass) is different from the soft glasses in the respect that the expansion coefficient with heat is drastically lower. The glass doesn't change size much when it is heated. This very fact is why pyrex is so desirable to use. It has a very low tendency to crack when it is heated or cooled. There is a serious downside to this though. There is only one metal (common metal) that has a coefficient of expansion close enough to pyrex to successfully make a seal that is vacuum tight. Many wires will seal through pyrex for liquids but not vacuum tight for gases. Tungsten metal has a coefficient of expansion that is within 10% of pyrex. Thus, by using a trick, a vacuum tight seal can be made. This trick involves the use of tungsten oxide as an interface between the pyrex and the tungsten. Other metals, such as Kovar, are available for sealing to some types of borosilicate glasses, but these are special glasses that are not commonly available. You would have to buy the glass directly from the manufacturer, which would mean a full case minimum. (a lot of glass, a lot of money!) Kovar will not successfully seal to common boro 7740 lab glass (pyrex and equivalents) that is the most commonly available borosilicate glass. The tungsten seal is the only successful seal for this glass. The tungsten oxide inherently seals to the tungsten, by forming a compound. It also will go into solution with the pyrex glass. The result is a seal to tungsten on one side, a layer of oxide, and a seal to pyrex on the other side. There are strict requirements for this process to work: (These requirements are for a simple pinch seal in 7740 borosilicate glass: pyrex or its equivalents.)  First, the maximum size wire you can get away with this seal is about 20 mils (1/2 mm) diameter wire. Try with larger diameter wires and the seal may fail at any time due to stresses. You might be successful when you do the seal but an hour later, a day later,a week later, the seal may crack and be ruined. This doesn't happen with wires below 20 mils diameter. The smaller the wire used for the seal, the more likely it is to succeed. The current handling capacity of the wire is the determining factor of the wire size, and to a certain degree handling complications for smaller diameters also limits the smaller sizes. Second, the wire must be polished mirror smooth. A rough as-drawn wire will not seal because the small longitudinal grooves from the drawing process will conduct gas past the seal. Most tungsten wire is easily buffed to the required polish in a few minutes using fine emery cloth. (400 grit) Third, the oxide coating on the tungsten must be of the correct thickness. If the coating is too thick, it will crack. If it is too thin, it all will mix with the glass and there will be no oxide left to bond to the tungsten. Fourth, the temperature of the glass when the seal is made must be just right. Too cold and the glass will not completely form tightly around the wire, leaving a gap for air to leak through. Too hot, and the oxide will break down and release oxygen gas making bubbles along the joint which can make passages for air leaks. A fifth somewhat more rare occurance is longitudinal laminations in the tungsten wire. When the wire is drawn down, any imperfection in the original wire gets pulled through the die with tremendous force. This can cause it to laminate and form an invisible crack that runs longitudinally along the wire for a few millimeters. If this crack just happens to fall where you make the seal, you can have a perfect seal to the tungsten but the crack will pass gas along under the seal! The wire used for the seal must be free of the longitudinal cracks. Welding wire (TIG wire) is not tested for these cracks so you must be aware when preparing the wire for any indications of a crack. A sure sign is when you bend it sharply to break it, the break is not clean. It splits the wire instead of cracking it cleanly in half. In this case, throw that piece away and move down the wire a few millimeters and try again. The cracks are never longer than a few millimeters so it is easy to get by them. Annealed tungsten wire (light bulb filaments) are inspected for cracks so you can be sure they do not have any. It is important to use NEW light bulbs for the filaments, since in used bulbs the filaments will be so brittle they will shatter if you try to straighten them. Auto headlamps have heavy tungsten filaments, but can be expensive. Simply buy the wire from a supplier. The cheapest source of tungsten wire is welding wire that is used with TIG welders. (tungsten-inert gas) This wire is available in sizes from about 10 mils to over 100 mils. This type of wire is not annealed. Thus it is stiff and cannot be easily formed. It can be cleanly broken by gripping it with a pliers and sharply bending it over. This wire in the size used for tube feedthroughs is about 70 cents a foot. (A 100 foot roll at $73 lasted me over 5 years even with the large number of tubes I have made! (almost 1000 tubes now!) Annealed tungsten wire is available from a company called HYPERTRITON which sells on ebay. The price for the size used in tube feedthroughs is about $3.80 a foot, which is much higher than welding wire. The wire is annealed, so it bends to form easily. It is cut with a good side cutters. The annealed tungsten wire doesn't have any longitudinal cracks to worry about, and it is already polished to a mirror finish. One foot will make about 40 seals so the cost per seal is about 10 cents each. This is not a problem. I have several rolls of welding wire left or I would buy the annealed wire myself.  The current carrying capacity of the wire is what determines the size you need. For most small vacuum tubes, the filament will be the highest current that will flow. Thus, the wire should be chosen to carry that load safely. The rating for the wire (in a glass seal) is less than the rating in free air, since the wire must not get hot enough to risk cracking the seal. For 1 amp current, 15mil tungsten wire is satisfactory. I have used 15mil wire (.39mm) to carry 3 amps of current with no failures, so the ratings are generous. One characteristic of welding wire is that it is "as drawn" with no surface polishing at all. Thus, if you use welding wire you must polish the wire. To do this, cut about 2 feet of the wire and grip one end in a bench vise and the other in a visegrips pliers. First, use 300 grit emery to polish the wire by pinching the wire in a fold of the emery and sliding it forcefully along the wire rotating it to get all sides. Then do the same with some 400 grit. This only takes a few minutes to prepare two feet of wire, which is a lot of seals. If you purchase the annealed wire you don't have to do this. (recommended) This size of wire may be a bit large if you are going to make a multi-lead pinch with over 8 wires. Drop down to 10 mil (,25mm) tungsten and you can get more leads per seal. The current carrying capacity of 10mil tungsten is right at 1 amp, which will be satisfactory for tubes using a 2mil (1/20mm) tungsten wire for the filament. If you use the annealed tungsten wire, you can use the tungsten wire itself inside the tube for element support since you can bend it around quite easily. But at almost 4 bucks a foot that will get expensive quick, since you will use as much as half a foot per tube in some cases. Also, welding to tungsten wire requires a buffer metal, which is not convenient in the tube support construction. I recommend welding nickel or stainless steel wires to the tungsten so the tungsten is used only for the seal itself. Thus, make the seal wire itself about 1/4 inch long and weld a copper wire to one end for the external connecting wire, and a nickel wire to the other end for the internal tube element support. Use 20mil or so copper wire and about the same nickel. This gives good flexibility for the copper and good stiffness for the nickel. See the page on the pincher welder to see how to make the welds to the tungsten. The tungsten as purchased has air trapped in the surface of the metal. If the seal is made without driving out this air, bubbles will form which can form a path for a leak. It is important to do the preparation immediately before making the pinch. Do not do it ten minutes earlier, do it just before you are heating the glass to pinch it. This is important to get a perfect seal. To prepare the wire, have it supported right ready to insert into the glass where the pinch is to be made. Use the small pinpoint tip (1mm flame) and carefully swipe the flame across the tungsten wire (or wires if you are making a multi lead seal) heating each wire to white hot for a fraction of a second. BE CAREFUL NOT TO LEAVE THE TORCH ON THE WIRE LONG ENOUGH TO MELT OFF THE WELDED WIRES! The tungsten will not melt in the flame but if you heat it too hot, the copper wire especially will melt and drop off. Play the flame back and forth over the wires, heating each one to white hot, until they have a black coating, AND THEN STOP. If you get a white coating or a yellow coating, you have done it too long. The oxide coating should be a dark gray-black in color. The wire is now ready to make the pinch. Move it into the glass right to the position where the pinch will be made. NOTE: During all phases of the pinch, be sure the mashers do not get red hot. Glass will stick to them! Let them cool somewhat if they get red. If the glass sticks to the mashers, immediately remove the torch and let the joint cool slightly while moving the mashers slowly back and forth side to side. They will pop loose when the glass cools. Do not try to pull them away while the glass is molten. The pinch is best done in three stages. First, the internal nickel lead wires are pinched to hold the wires exactly in position. Second, the actual seal pinch is made. Third, the pinch to hold the exit lead wires is done. The pinch is the most critical part of the seal. It is best to use a "crossfire" torch that has a jet on each side of the glass to heat both sides at the same time. Use the mashers to clamp the wires right at the edge of the pinch so you will not burn them off when you heat the glass. First, heat just the edge of the glass, the part that will grip the nickel wires. Get the glass to the point that it is starting to sag and quickly use the mashers to pinch the glass down onto the wires. Note that this is not the seal pinch. This is to pinch the glass down onto the wires to hold them in place. Now, the wires are in position inside the glass. If there are any wires that are touching or out of position, carefully heat the glass and use a small screwdriver to pry the wires into position. The electrode ready to make the pinch. The top wire is .028 nickel, which is used for the internal wire to support the tube elements. The center is .016 tungsten, which will be the actual seal. The lower wire is .024 copper, which is the external connecting wire. Note the thorough penetration of the welds so they will not pop loose while the pinch is being made. The total length of the tungsten seal part is not particularly important. It can be anything from about 2mm to 10mm or so. The 4 mm length gives a good chance of having a vacuum tight seal while not making the overall length of the seal so long as to be messy. If the tungsten is made very short, there is a greater chance of a leak if the pinch is not perfect. A slightly longer seal area makes it more likely that part of the seal will be hermetic and make the seal a success. There are some situations where a very short seal length is necessary, like through the side envelope of a tube. It is best to pre-bead the tungsten in this case. To pre-bead the tungsten, the electrode is prepared as in the picture. The tungsten is flared to remove the air and form the oxide layer. Then, a short piece of capillary glass is placed over the seal area. The torch is then used to seal the bead onto the wire starting at one end and carefully working along so that the air is excluded. The second photo is of a seal bead ready to be used in a vacuum tube. Note the perfect dark gray, almost black color of the tungsten seal with no signs of bubbles at all. This is a perfect hermetic seal. The seal was made using the electrode wire in the other photo. When making the bead, it should be about .125 (3mm) dia. Be sure the bead completely captures each end wire weld in the glass.  If you are going to use the bead in a pinch, the total diameter can be made smaller, .06-08 in. (2mm) dia. However, it is not usually necessary to go to the trouble of making beads when making a pinch. Just do the seal in the pinch! Note that seal beads like this can be prepared ahead of time, since the tungsten is completely covered with glass and will not tarnish. A pyrex flare flattened to make it easier to do the pinch on a bunch of wires. Two tungsten seals in pyrex. Note the perfect dark gray color of the seal itself. The bubbles on the nickel end wires are not usually a problem, but can make outgassing the tube take longer. Heating the nickel weld to red hot for a few seconds before making the pinch reduces the bubbles significantly. So I forgot.
Library Technicians Professional and related occupations Significant Points • Increasing use of electronic resources enables library technicians to perform tasks once done by librarians. • Employment should grow more rapidly in special libraries because increasing numbers of professionals and other workers use those libraries. • Opportunities will be best for those with specialized postsecondary library training. Nature of Work Library technicians help librarians acquire, prepare, and organize materials and help users to find those materials. Library technicians usually work under the supervision of a librarian, although they sometimes work independently. Technicians in small libraries handle a range of duties; those in large libraries usually specialize. The duties of technicians are expanding and evolving as libraries increasingly use the Internet and other technologies to share information. Depending on where they work, library technicians can have other titles, such as library technical assistant or media aide. Technicians also market library services. They participate in and help plan reader advisory programs, used-book sales, and outreach programs. They may also design posters, bulletin boards, or displays to inform patrons of library events and services. As libraries increasingly use the Internet, virtual libraries, and other electronic resources, the duties of library technicians are changing. In fact, new technologies allow some technicians to assume responsibilities which were previously performed only by librarians. Technicians now catalog new acquisitions and oversee the circulation of all library materials. They often maintain, update, and help customize electronic databases. Technicians also may help to maintain the library’s Web site and instruct patrons in how to use the library’s computers. The automation of recordkeeping has reduced the amount of clerical work performed by library technicians. Many libraries now offer self-service registration and circulation areas, where patrons can register for library cards and check out materials themselves. These technologies decrease the time library technicians spend recording and inputting records. Some library technicians operate and maintain audiovisual equipment, such as projectors, tape and CD players, and DVD and videocassette players. They also assist users with microfilm or microfiche readers. Library technicians in school libraries encourage and teach students to use the library and media center. They also help teachers obtain instructional materials, and they assist students with assignments. Some technicians work in special libraries maintained by government agencies, corporations, law firms, advertising agencies, museums, professional societies, medical centers, or research laboratories. These technicians conduct literature searches, compile bibliographies, and prepare abstracts, usually on subjects of particular interest to the organization. To extend library services to more patrons, many libraries operate bookmobiles, which are often run by library technicians. The technicians take bookmobiles—trucks stocked with books—to shopping centers, apartment complexes, schools, nursing homes, and other places. Technicians may operate a bookmobile alone or with other library employees. Library technicians who drive bookmobiles are responsible for answering patrons’ questions, receiving and checking out books, collecting fines, maintaining the book collection, shelving materials, and occasionally operating audiovisual equipment to show slides or movies. Technicians who drive the bookmobile keep track of mileage and sometimes are responsible for maintenance of the vehicle and any equipment, such as photocopiers, in it. Many bookmobiles are equipped with personal computers linked to the main library Internet system, allowing patrons access to electronic resources as well as books. Work environment. Library technicians who prepare library materials sit at desks or computer terminals for long periods and can develop headaches or eyestrain. They may lift and carry books, climb ladders to reach high stacks, and bend low to shelve books on bottom shelves. Technicians who work in bookmobiles may assist handicapped or elderly patrons to the bookmobile or shovel snow to ensure their safety. They may enter hospitals or nursing homes to deliver books. Library technicians in school libraries work regular school hours. Those in public libraries and college and university libraries may work weekends, evenings, and some holidays. Library technicians in corporate libraries usually work normal business hours, although they often work overtime as well. The schedules of technicians who drive bookmobiles often depend on the size of the area being served. Training requirements for library technicians vary widely, ranging from a high school diploma to specialized postsecondary training. Some employers only hire individuals who have library work experience or college training related to libraries; others train inexperienced workers on the job. Education and training. Most libraries prefer to hire technicians who have earned a certificate or associate degree, but some smaller libraries may hire individuals with only a high school diploma. Many library technicians in public schools must meet the same requirements as teacher assistants. Those in Title 1 schools—schools that receive special funding because of the high percentage of poor students enrolled—must hold an associate or higher degree, have a minimum of 2 years of college, or pass a rigorous State or local exam. Associate degree and certificate programs for library technicians include courses in liberal arts and subjects related to libraries. Students learn about library organization and operation and how to order, process, catalogue, locate, and circulate library materials and media. They often learn to use library automation systems. Libraries and associations offer continuing education courses to inform technicians of new developments in the field. Other qualifications. Given the rapid spread of automation in libraries, computer skills are a necessity. Knowledge of databases, library automation systems, online library systems, online public access systems, and circulation systems is particularly valuable. Many bookmobile drivers must have a commercial driver’s license. Advancement. Library technicians usually advance by assuming added responsibilities. For example, technicians often start at the circulation desk, checking books in and out. After gaining experience, they may become responsible for storing and verifying information. As they advance, they may become involved in budget and personnel matters. Some library technicians advance to supervisory positions and are in charge of the day-to-day operation of their departments or, sometimes, a small library. Those who earn a graduate degree in library sciences can become librarians. Library technicians held about 121,000 jobs in 2006; about half worked in local public libraries. Most of the rest worked in school or academic libraries, but some worked in special libraries in health care and legal settings. The Federal Government employs library technicians primarily at the U.S. Department of Defense and the U.S. Library of Congress. Job Outlook Employment of library technicians is expected to grow about as fast as average. Opportunities will be best for those with specialized postsecondary library training. Employment change. The number of library technicians is expected to grow by 8 percent between 2006 and 2016, about as fast as the average for all occupations, as the increasing use of library automation creates more opportunities for these workers. Electronic information systems have simplified some tasks, enabling them to be performed by technicians rather than librarians, and spurring demand for technicians. However, job growth in educational institutions will be limited by slowing enrollment growth. In addition, public libraries often face budget pressures, which hold down overall growth in library services. However, this may result in the hiring of more library technicians because they are paid less than librarians and, thus, represent a lower-cost way to offer some library services. Employment should grow more rapidly in special libraries because increasing numbers of professionals and other workers use those libraries. Job prospects. In addition to job openings from employment growth, some openings will result from the need to replace library technicians who transfer to other occupations or leave the labor force. Opportunities will be best for library technicians with specialized postsecondary library training. Increased use of special libraries in businesses, hospitals, and other places should result in good job opportunities for library technicians in those settings. Projections Data Projections data from the National Employment Matrix Occupational title SOC Code Employment, 2006 Change, 2006-16 Detailed statistics Library technicians zipped XLS Median annual earnings of library technicians in May 2006 were $26,560. The middle 50 percent earned between $20,220 and $34,280. The lowest 10 percent earned less than $15,820, and the highest 10 percent earned more than $42,850. Median annual earnings in the industries employing the largest numbers of library technicians in 2006 were as follows: Colleges, universities, and professional schools$29,950 Junior colleges29,470 Local government25,610 Elementary and secondary schools24,760 Other information services23,420 Salaries of library technicians in the Federal Government averaged $43,238 in 2007. Related Occupations Library technicians perform organizational and administrative duties. Workers in other occupations with similar duties include library assistants, clerical; information and record clerks; and medical records and health information technicians. Technicians also support and assist librarians in much the same way as teacher assistants support teachers. Sources of Additional Information For general career information on library technicians, including information on training programs, contact: State library agencies can furnish information on requirements for technicians and general information about career prospects in the State. Several of these agencies maintain job hot lines that report openings for library technicians. State departments of education can furnish information on requirements and job opportunities for school library technicians. Source: Bureau of Labor Statistics Occupational Outlook Handbook
As the debate about whether aliens exist or not rages on, we're no closer to a definitive answer. Over the last year there have been many suggestions that NASA are edging closer to announcing alien life forms, though it feels as if those believers will never actually know. But while you wait for the next piece of evidence about vapour plumes and all the rest of it, NASA's Juno spacecraft has sent some truly incredible up-close images of Jupiter back to Earth. The pictures were taken on the craft's seventh science flyby over the planet, during which it orbits Jupiter, edging closer every 53 days for research before retreating again to avoid the intense radiation, IFL Science reports. Credit: NASA The pictures look a lot like Vincent Van Gogh paintings, which is cool, but also totally irrelevant. The agency released the images to their website for the public to see and to discuss. Juno reportedly came within 3,500 kilometers (2,200 miles) of the planet, capturing the swirling clouds that indicate fierce storm in the upper atmosphere of Jupiter. Credit: NASA Researchers are hoping that the photographs can help with studies looking into what the core of the planet is like. Juno is set to orbit Jupiter 12 times, ending its mission in July next year. There could be an option to extend the mission should certain things be in place, like the condition of the spacecraft. Featured Image Credit: NASA Mark McGowan Next Up
1. Du är här: 2. Start 3. Zoologiska institutionen 4. Forskning 5. Populationsgenetik In the division of population genetics we study intraspecific genetic variation and the micro-evolutionary processes that govern this variation. Our broad interest is focused in finding out how and why genetic variation is structured within and among populations of animals over geographic space and time. We use genomic tools to investigate the genetic mechanisms behind important phenotypic traits affecting fitness in an evolutionary context. We use large scale genotyping of marker loci, computer simulations, and theoretical modelling to investigate how anthropogenic factors affect genetic biodiversity and how management can be designed to maintain of genetic variation in animal populations. Monitoring genetic biodiversity in brown trout The Lakes Bävervattnen Project is a unique long term study of natural brown trout populations in an undisturbed setting in the Hotagen Nature Reserve in central Sweden. We address a wide range of issues relating to microevolution and conservation genetics including methods for estimating and monitoring effective population size over space and time. Functional genomics of life history evolution in Pieris napi What are the genetic variants that help animals adaptation to their complex habitats? Using many different ‘omic tools, I am working with colleagues to answer this question for a range of adaptive phenotypes in the butterfly P. napi: diapause, wing patterning, polyphenism, polyandry, and immunity. Currently we are sequencing a high quality genome of this butterfly. Large scale releases of salmon in the Baltic Sea We have evaluated the conservation genetic risks for remaining wild salmon populations associated with compensatory releases of hatchery reared salmon into the Baltic Sea. Colias butterfly color evolution We are using genomic tools to investigate the evolution of color variation in Colias (Pieridae) butterflies. We are nearly finished with a revised phylogeny for all Pieridae using 8 genes, and will be adding as many Colias to this tree as we can. Conservation genetic management of Swedish wolves The Swedish wolf population is small, isolated and highly inbred. We address issues relating to the conservation genetic management of this, and similar populations. Våra senaste publikationer Philipp Lehmann, Wouter Van der Bijl, Sören Nylin, Christopher W. Wheat, Karl Gotthard. 2017. Timing of diapause termination in relation to variation in winter climate. Physiological entomology (Print) 42: 232-238. Reuben W. Nowell, Ben Elsworth, Vicencio Oostra, Bas J. Zwaan, Christopher W. Wheat, Marjo Saastamoinen, Ilik J. Saccheri, Arjen E. Van't Hof, Bethany R. Wasik, Heidi Connahs, Muhammad L. Aslam, Sujai Kumar, Richard J. Challis, Antonia Monteiro, Paul M. Brakefield, Mark Blaxter. 2017. A high-coverage draft genome of the mycalesine butterfly Bicyclus anynana. GigaScience 6. Sangeet Lamichhaney, Angela P. Fuentes-Pardo, Nima Rafati, Nils Ryman, Gregory R. McCracken, Christina Bourne, Rabindra Singh, Daniel E. Ruzzante, Leif Andersson. 2017. Parallel adaptive evolution of geographically distant herring populations on both sides of the North Atlantic Ocean. Proceedings of the National Academy of Sciences of the United States of America 114: E3452-E3461. Lovisa Wennerström, Jens Olsson, Nils Ryman, Linda Laikre. 2017. Temporally stable, weak genetic structuring in brackish water northern pike (Esox lucius) in the Baltic Sea indicates a contrasting divergence pattern relative to freshwater populations. Canadian Journal of Fisheries and Aquatic Sciences 74: 562-571. Carina Lundmark, Klas Andersson, Annica Sandström, Linda Laikre. 2017. Effectiveness of short-term knowledge communication on Baltic Sea marine genetic biodiversity to public managers. Regional Environmental Change 17: 841-849. Alyssa Woronik, Christopher W. Wheat. 2017. Advances in finding Alba - the locus affecting life history and color polymorphism in a Colias butterfly. Journal of Evolutionary Biology 30: 26-39.
Thursday, July 28, 2016 Saviors of the 20th Century (4) - Poland - Armageddon of WW II The war of annihilation between the Nazis and Communists ISBN 0964599317 LCCN 2004095812 Available worldwide through Amazon Kindle books Poland - Armageddon of WW II Poland, the Armageddon of World War II, the proverbial scene of the decisive battle between good and evil. In the history of civilization it is doubtful any country faced the dire conditions and the deadly consequences faced by Poland from 1939-1945. Sandwiched between Nazi Germany and the Soviet Union, it was the only nation to be partitioned without a vote between the Nazi and Communist Empires as a result of the 1939 non-aggression pact between Hitler and Stalin. Poland was a geographic buffer between these two menacing monsters, a buffer that vanished off the face of the earth during the month of September 1939. Both Hitler and Stalin had reasons to hate the Poles. Fact is both felt justified in ravaging the nation for their own purposes. After World War I Poland humiliated the Germans as a result of the severe conditions of the Treaty of Versailles. Over one and one half million Germans were forced to abandon their homes to Poles because of the treaty. In 1939 Poland was the fastest growing industrial nation in Europe and was much needed to support the German war machine. Both Hitler and Himmler had rejected their Catholic upbringing and there were more Catholics in Poland than any other country, making it a convenient target for religious persecution. It was also the gateway for the inevitable invasion of the Soviet Union and of vital strategic importance. More ominously, it was the home to nearly three million Jews before the war. Ever since Catherine II established the Pale for Jews they had moved into Poland and had recently represented nearly eight percent of the population, the most of any nation in Europe. Earlier in the 20th century, before World War I, there were over thirty million Poles, but four million were killed in World War I, thirty-four times the American loss in the war. Almost all the fighting of that World War took place on Polish soil. Yet deaths were not the only suffering by the Poles. Devastation was astounding as over 1.7 million buildings were destroyed, 6,969 churches, and 40% of all railway bridges and stations during the First World War. The Soviets also had reason to dislike Poland. When the Communists swept to power in Russia and successfully won the Russian Civil War, the Soviet leaders decided to continue rolling right over Europe with their revolution. The mighty Red Army attacked the Poles in August of 1920 driving to the very gates of Warsaw. A miracle of sorts happened when the embattled Poles fought back valiantly August 15 in the Battle of Warsaw outmaneuvering the stunned and vastly superior Red Army and routing them on August 18, thus saving Europe from Soviet conquest. It was a setback that reverberated throughout the Kremlin and caused the Communists to slow down the worldwide revolution they advocated. In time it came to be known as the day of the Polish Miracle. Yet there was more, for though the Soviets were a new nation dominated by Jewish-Bolshevik leaders and committed to stopping anti-Semitic actions, they were also committed to driving the opposition Jewish groups from influence, adversaries such as the Jewish Zionist and Bund nationalist parties. Because of its proximity Poland had become a haven for Jewish outcasts from the Soviet Union after the revolution and civil war - those on the wrong side of Judaism who became enemies of the Bolshevik State. It also was a safe haven for all those fleeing Communist persecution throughout the Soviet Empire. To the Soviets, Poland was a nation harboring many dangerous fugitives and traitors. Poland also was a hotbed of another faction of Jewish revolutionaries who were committed to the Communist Marxist revolution and the Soviet Bolshevik leadership. Thus some Polish Jews were enemies of the Soviets and many more were allies. Ironically Jewish participation in the Marxist revolution in Poland earlier caused the Poles and Ukrainians to distrust them as well. Active Jewish involvement in the revolutions that swept Europe after World War I would come back to haunt them. Beyond the desire of the Soviets to save some Jews from Nazis and punish some for opposing the Bolsheviks, the Soviets were also in desperate need of access to the Baltic Sea north of Poland. A treaty with Hitler gave Stalin freedom to overrun the Baltic States and gain that ocean access. By 1921 the Polish population dropped to twenty-seven million, then grew to thirty-two million by 1931, the last official census before World War II. It was a diverse population as Ukrainians and Belorussians were the majority, Poles made up one third of the population, and Jews were about eight percent. Germany and the Soviets announced to a stunned world the signing of the non-aggression pact at the end of August 1939 and on September 1 the Nazi invasion of Poland from the west was launched. It was to be a coordinated attack with the Red Army attacking from the east. Over 1,800,000 German soldiers poured across the border with 2,600 tanks and over 2,000 aircraft supporting the invasion. Typical of the new German strategy designed by Hitler personally, it was to be a rapid and deadly strike. The Poles, like the rest of the world, were caught unprepared and less than a third of the Polish military was able to mobilize against the Nazi invasion. Stalin, to the chagrin of Hitler, did not attack immediately as promised but waited to see what kind of resistance the Germans would encounter. He was also wary of the reaction of England and America to the invasion, as he needed Churchill and Roosevelt to be allies if he were to have any hope of defeating Hitler and Germany. By waiting until the Germans destroyed the Polish army, he could proclaim the Soviets were invading Poland to protect the Ukrainian and Belorussian populations living in Poland from the Nazis, a tactic that infuriated Hitler when he learned of it. The Soviet war machine finally did roll across the eastern border of Poland September 17 as Hitler's forces had secured the German half of the country and were rapidly moving into the Soviet territory. For a time it appeared as if the former bitter enemies and now allies might start fighting each other as they laid claim to the Polish nation. One of the most intriguing comments of the dilemma faced by the Poles came from their decorated General Wladyslaw Anders, Polish Commander, speaking to General George Patton later in the war. Anders said: "With the Nazis, we lose our lives; with the Soviets, we lose our souls… If I found my army between the Nazis and the Soviets, I would attack in both directions." By October 5 Poland could hold out no longer against the onslaught from the Nazis and Red Army, and finally surrendered. Poland ceased to exist. Still in just a few weeks of fighting the Poles inflicted heavy losses on the Germans, 50,000 men, 697 planes and 993 tanks and armored cars, while thousands of Polish soldiers and civilians were able to escape to France and Britain. The defeat in battle was just the beginning of the Polish suffering. In the 20 years following World War I Poland had rebuilt her industry and railroads. She now had over 5,500 railroad locomotives, 11,350 passenger cars, and 164,000 freight cars. Over 1,250 miles of new railroad track had been laid and Polish highways had been expanded by over 30%. All of these resources were needed by the Nazis in their ambitious plans to reunite the German Empire. A vast network of nearly 200 concentration camps were soon developed throughout Poland and the surrounding area first for the purpose of providing labor, and later as the sites of the Nazi death camps. The need for industrial output was the priority and over two million Poles were among five million prisoners sent into forced labor. When the occupation was completed Germany controlled about 13 million Poles including 2.1 million Jews, and the Soviets controlled about 13 million Poles including about 1.2 million Jews. Over 600,000 people fled from the German to Soviet sector including over 350,000 Jews during the next year. Of the total population in Soviet occupied areas about one tenth were Jewish, one third were Poles, and the majority were Ukraine and Belorussian. Germany immediately threw 1.2 million Poles from their ancestral homes for resettlement in ghettos to make room for Germans who lost their homes after World War I. The Soviets and Polish were bitter enemies and the Soviets captured 230,000 Polish soldiers including 25,000 Jewish soldiers. Millions of Poles died in the hands of the Germans and Soviets. Before the Nazis were driven out of Poland nearly 2.5 million Poles were murdered in camps and another 500,000 were starved to death. Millions more died during forced labor, resettlement and deportation. As for Poles living in the Soviet lands, 1.6 million Poles were deported to the gulags and prisons of Russia including over 130,000 Jews sent from the Soviet occupied area of Poland to Siberia as "enemies of the state." Ironically this deportation probably saved them from the Nazi holocaust. In addition to the Polish citizens imprisoned or forced into labor camps the Soviets murdered many thousands of Polish military. Soviet treatment of the Poles changed only when Hitler violated the non-aggression treaty and attacked the Soviet Union using Poland as the launch point in June of 1941. This action caused some positive events to take place in the midst of the carnage. On August 12, 1941, with the German army advancing on Moscow, the Supreme Soviet granted amnesty to all Polish citizens and released all Polish prisoners from gulags and prisons in order to help in the fight against Nazi Germany. The millions of Poles sent to Soviet prisons were now free, unlike the fate of most Russian citizens sent to the deadly Soviet gulag prison system. A total of nearly six million Poles died (civilian and military) during the war, ranking Poland third behind the Soviet Union and Germany for the most deaths in the European sector of World War II. This represented nearly 22% of the entire Polish population before the war. When the dust finally settled on the deadliest conflict in history over fifteen million people had died in Polish concentration camps. Most were Soviet and Communist prisoners captured when the Germans overran the Soviet occupied Poland, the Ukraine and western Soviet territory extending all the way to Moscow. Tens of millions of Soviet military and civilians, Communists and Communist sympathizers were exterminated. Poland once again lay in ruins and it was to remain a Soviet state for the next half century. As destiny would have it, Poland made history in quite another way. On the very same day as the Polish Miracle, May 18, 1920, when the Poles stopped the mighty Soviet Red Army and captured Kiev, in Poland a baby boy named Karol Jozef Wojtyla was born. This young boy grew up and helped organize a secret theater group during the Nazi occupation. By 1944 he became a Catholic priest in a secret order in Poland. Soon the equally murderous Communists under Stalin drove out the murderous Nazi regime. The priest became a Cardinal, and then the Cardinal became the first Polish Pope of the Roman Catholic Church, Pope John Paul II. In time he would use his influence as Pope to help the Solidarity movement in Poland oppose the Communist rule, and would help lead the Polish people out from under the shackles of Communism into a new life of freedom. No comments:
Thinking about Leadership….Part 1 The concept of leadership is difficult to define.  Leadership can mean different things to different people.  When reading  about the topic of  leadership,  it is clear that it is hard to pinpoint a definition as there are such varied definitions for it.  Further, there is a debate around whether leadership is an innate ability or if it is something that can be learnt and practised. Just from the fact that there are so many leadership courses that claim to ‘teach’ leadership, it seems that there are certain skills, at least, that can be taught. However, leadership is something that can only be practised in ‘real life’ situations.  Different theories and the understanding behind leadership styles allow us to reflect on our abilities and our traits as leaders.  Having this understanding can allow ourselves as leaders to be more aware of our characteristics and how we deal with day to day scenarios.  From my experience working with and teaching others’ about leadership, there are some key attributes that I feel are essential in  making someone an effective leader within education. First and foremost, leading by example is fundamental.  We always hear this, but what does it look like in practice?  It means, simply, that you do what you expect others to do.  But even more than that, you remain credible, people see you modelling above and beyond what you expect of them.  The way you speak to the children, to other adults and to visitors that come into school, the way you react in stressful situations or react when things don’t go the way you expect, when parents or staff are troublesome or are disrespectful – the way you act in all of these situations, shows your true colours.  During these situations, people get to see you for who you really are – so these moments really matter.  The thing is, you can’t pretend to be someone you aren’t.  Therefore, genuinely being able to remain positive and calm during these situations will demonstrate a leader of integrity. Can integrity be learnt?  Or is this an attribute that just comes with ‘natural’ leaders?  This could be an interesting debate. A leader also must have a clear vision.  A leader without a vision, is like an architect without any plans. If you can’t see where you are going, it will be a chaotic and difficult journey getting there.  It is vital to have an achievable vision, but further, be able to get others to ‘buy into’ the vision. Therefore, being able to sell your vision is just as much a part of the job as anything.  A leader is able to motivate others to want to work towards their vision.  They allow others to become a part of it, giving others a chance to demonstrate their skills to achieve aspects of the vision.  In the end, the whole team will have enthusiastically worked towards something they have all played a part in.  A leader is able to make their vision, someone else’s vision and is able to get everyone ‘on board.’   I will continue this discussion tomorrow, but it would be good to see what others feel are the key attributes of an effective leader.  It can be difficult honing down this list, as there are many traits that are needed in leadership.  I will do my best to keep it to ten key aspects. One Response to Thinking about Leadership….Part 1 Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
from Wiktionary, Creative Commons Attribution/Share-Alike License • n. A superintendent or supervisor of an American U.S. freight railroad. The trainmaster is responsible for enforcing policies of the rail company, for train movements, locomotive assignments, crew assignments, personnel management, discipline, derailments and more. In the past, trainmasters were promoted brakemen or conductors who retained their union seniority. Sorry, no etymologies found.
Friday, March 19, 2010 (Steam) engine of modernity Christian Wolmar's Blood, Iron and Gold: How Railroads Transformed the World takes readers on an intercontinental trip around the globe The following review was published earlier this week on the Books page of the History News Network website. It is easy for many of us to overlook the role the railroad has played in everyday life for the past 175 years. But it is difficult to overstate its impact. What the Internet has been to the 21st century, and the automobile was to the twentieth, rail was to the nineteenth. In the United States and virtually everywhere else on the planet, locomotives were literally the engines of modernity. It is no exaggeration to say that rail remade the world, and this epic global story is ably retold with notable concision by British railroad historian Christian Wolmar. Wolmar's story begins, as any story ineluctably bound up with industrialization does, in Great Britain. The opening of the Liverpool and Manchester railway in 1830, constructed in large measure to move the two fuels of British imperial power, cotton and coal, was followed with great interest at home and abroad. The boom that followed was not always even -- accidents, engineering problems, political conflict and financial chicanery were always part of the picture -- but no actual or figurative bust could impede a trajectory of explosive growth. Britain led the way, and indeed went on to build and/or finance much of the rail infrastructure in the world, but the United States and continental Europe were never far behind. Wolmar notes that despite the striking degree of consensus among these competitors that rail did indeed represent the future, the hallmark of this story is diversity. This is true on the most fundamental level: technological considerations like the width, or gauge, of railroad lines varied widely for a panoply of economic, environmental and political reasons. Some nations, principally the Britain and the United States, relied on the private sector to build railroads, but inevitably government involvement proved necessary in the form of financial assistance and regulation, if not management. Others, like France, viewed rail as a political resource from the outset, and conceptualized a network as a means of advancing state interests, whether in terms of stitching together regions, assisting military operations, of both. Germany, a disorganized region of central Europe at the start of this story, nevertheless created a patchwork system with striking rapidity; Otto von Bismarck was content to have it in private hands until his rapid victory over France in the Franco-Prussian convinced him that rail was too important a resource not to be under government control. Yet utilitarian considerations cannot solely explain the mania for railroad building across the world -- at least not in any obvious sense -- and nowhere is that mania more striking in the series of transcontinental railroads that were built across the globe in the latter half of the nineteenth century. The best-known, and most obviously necessary, was that of the United States. But enormous projects were undertaken in Russia, South America and Africa (the Cairo-to-Capetown line was a seeming exception in not being realized) without any real likelihood that they would be regularly traversed from end to end. They nevertheless made a tremendous impact in multiple directions wherever they went. Actually, Wolmar is at his most arresting in describing the cultural impact of railroads, in ways that range from the creation of the tourism industry the transformation of urban diets. Not all these changes were positive; ecological devastation, for example was rampant (though, he argues, not nearly as bad as that wrought by the automobile). Railroads were implicated in the peculiarly deadly dynamics of World War I; since advancing armies typically entered destroyed terrain and defending ones could bring help directly to the front, successfully offensive operations were difficult to achieve. Tanks and aviation displaced rail in visibility during World War II, but the Holocaust would have been impossible without it. Still, even as he acknowledges these horrors, Wolmar believes rail has done more good than harm. He notes that in the case of Mexico, for example, a network was built at the behest of dictator Profirio Diaz for his own interests, yet“railroads were forced to recognize the rights of local people, despite the central government's attempts to ride roughshod over them.” The conventional wisdom holds that rail went into decline in the years following the First World War, but Wolmar insists this is not the case, noting that total railway mileage continued to grow through World War II, particularly in places (like Asia) where its reach was not widespread. Although it unmistakably retreated in terms of passenger service in the United States, rail continued to be of vital importance for carrying freight there and elsewhere. And at the very nadir of rail’s fortunes, the opening of the high-speed Tokyo-Osaka line in 1964 opened a new chapter in rail as a form of passenger transportation. China, now the nation on the cutting edge of modernity, is building railways of stunning speed with stunning speed. The United States, which lumbers along with a significant commuter infrastructure in the northeast, and a truly lame Amtrak, can continue to neglect or ignore rail at its peril. In these and other ways, Blood, Iron and Gold makes for an illuminating and useful excursion. It’s a book that should be read with as much interest by the Internet maven as it is the rail enthusiast as a case study in the global history of technology.
YOU ARE HERE: LAT HomeCollections (Page 2 of 2) Pasty, the Subterranean Sandwich This Cornish miner's lunch was the ancestor of the hoagie April 11, 1996|LINDA BURUM Hard-rock mining, with its dangerous dynamite blasts and long working hours in cramped spaces lighted with only a candle affixed to the miner's hat, took a certain strength and tenacity. It's said that besides these traits, Cornish miners had an uncanny knack for finding the veins with the richest ore, even more accurately than mining engineers and geologists. To keep their pasties in edible condition, the miners carried specially designed pasty lunch boxes, often with a secret compartment for liquor or a place for a live coal to keep the pasty warm. These antique boxes are collector's items. "You can't even get them in England," Burrows says. Based on his cookbooks and the books about Cornish miners, Burrows has been able to make a sort of historical chronology of the pasty. In Vida Heard's "Cornish Cookery: Recipes of Today and Yesteryear," he found a description of the ancient "bag pudding" made from barley meal, raisins and pork blood that was the predecessor of today's pasty. Burrows likes to think that the pudding was served by King Arthur at Camelot because he read about it in John Steinbeck's translation of Mallory's "King Arthur and His Noble Knights." Of course, Mallory was not an authority on food history. Much later, in the early 19th century, the common miner's pasty--also called a hogan or auggie in some parts of Cornwall--was a chunk of unleavened barley dough into which vegetables and an occasional bit of pork were inserted. The Cornish miners couldn't afford wheat flour, but no matter: The barley dough pasties were famously tough. It was said they could withstand a fall down a mine shaft, and pasties have borne that reputation ever since. The old-time pasty or auggie was "a triumph of Cornish make-do," Heard writes. The overstuffed American sandwich called a hoagie probably gets its name from the auggie. Around the 1840s, the auggie evolved into the more refined stuffed wheat-crusted pasty and became part of everyday Cornish eating. Children who took pasties to school made sure to be friendly with the pasty monitor, who decided where each pasty would be placed by the fire that would warm them for lunch. They might find rabbit meat in their pasties, because rabbit was easier to acquire than beef. Burrows has been perfecting his pasty pastry recipe for years, constantly analyzing recipes from cookbooks and trying something new. When The Times Food Section ran an issue devoted to the attributes of lard and Burrows learned it was lower in cholesterol than butter, he was elated. Lard makes the best pasty crust, he believes. He now renders his own lard from fresh pork fat. "Lard rendering is so easy," he says enthusiastically. "You simply bake the fat in a 200-degree oven on a rimmed cookie sheet then pour off the liquid." He also likes the flavor that real beef suet gives to his meat-filled pasties. HiHs latest triumph, airy pasties, are baked without a filling. "What I like best about these," Burrows says, "is you can bake them, freeze them, then fill them with whatever you want right before you eat." Burrows gives a California-style vegetarian filling recipe for airy pasties. Granny's Pasties, a shop in Cornwall, typifies this trend of using novel pasty fillings. Granny's offers chicken curry and "figgy" (raisin-nut) fillings along with the more traditional beef or chicken. In Cornwall and in London, Burrows says, supermarkets now sell pasties with a wide variety of fillings. Perhaps that's how another of Burrows' favorite Cornish sayings arose: "The devil never ventures into Cornwall for fear a baker would put him into a pasty." Personalized Pasties It can be hard to tell one pasty from another. That's why Cornish miners put their initials on the pasties they took to work with them. Patrick Burrows marks his pasties as well. The practice is not only historically accurate, it's also useful. Sometimes Burrows marks the initials of the recipient of the pasty; other times, he indicates the type of filling the pasty contains. Burrows uses a pointed soldering iron to personalize his pasties, but initials can also be carved with the tines of a fork. Los Angeles Times Articles
Twenty20 cricket twenty20Twenty20 cricket (T20) is a short form of cricket where the two teams have one innings each and each team bats for a maximum of 20 overs. Twenty20 cricket is thus fairly similar to limited overs cricket (one day cricket), but for limited overs cricket the maximum number of overs can be set at a higher level, and allowing 40 overs or more per team is not unusual. While a match of the more traditional Test cricket is scheduled for three days or more, with a normal day starting at 11 a.m. and ending at 6 p.m., a Twenty20 game will normally not carry on much longer than three hours in total. Each innings will normally go on for 75-90 minutes and there is a 10-20 minute long interval. This makes the time requirement for players and spectators more similar to that of other popular sports, e.g. baseball, basketball, American football and ice hockey. Twenty20 cricket is a comparatively new addition to the world of cricket. It was formally introduced by the England and Wales Cricket Board (ECB) in 2003 for a professional inter-country competition in England and Wales. Twenty20 is not only a shorter form of cricket that is easier to fit into the schedules of prospective audiences, it is also played at a faster pace since endurance becomes less important than in Test cricket. This increase of pace has been very well received by both spectators in the field and by those who enjoy watching televised cricket. Rules for Twenty20 cricket In general, Twenty20 cricket follows the Laws of Cricket. There are however some exceptions. Here are a few of the most important once: • An individual bowler may not bowl more than one-fifth of the total overs per innings. (For a full Twenty20 match, this equals 4 overs.) • If a bowler oversteps the popping crease, thus causing a no ball, it will cost 1 run and his next delivery is designated a “free-hit”. In this case, the batsman can only be dismissed through a run out, or by handling the ball, obstructing the field or hitting the ball twice. • No more than five fielders are allowed to be on the leg side at any time during Twenty20 cricket. • During the first six overs of a Twenty20 match, no more than two fielders are allowed to be outside the 30-yard circle. • After the first six overs of a Twenty20 match, no more than five fielders are allowed to be outside the fielding circle. • If the fielding team does not start to bowl their 20th over within 75 minutes, the batting side is credited an extra six runs for every whole over bowled after the 75-minute mark. However, if the batting team is wasting time, the umpire may add more time to prevent the batting team from benefiting from their bad behaviour. It is up to the umpire to decide if the batting team is wasting time or not. cricket Twenty20Breaking a tie in Twenty20 Earlier, tied Twenty20 matches were decided by a bowl-out. This has now been changed. If a Twenty20 match ends in a tie, and the tie must be broken, it will be broken with a one over per side, a so called “Super Over”. Each team will pick three batsmen and one bowler. These selected players will play a one-over per side game (king of a mini-match within the match). This is sometimes referred to as a One1. The team that attains the higher score in the Super Over wins the whole Twenty20 match. The commencement and rise of Twenty20 cricket Twenty20 cricket rose in the wake of the last Benson & Hedges Cup. The Benson & Hedges Cup was a one-day cricket competition for first-class counties in England and Wales, sponsored by the owners of the English cigarette brand Benson & Hedges. A ban on tobacco advertising put a halt to the sponsorship, and the last ever Benson & Hedges Cup took place in 2002. With the Benson & Hedges Cup discontinued, the England and Wales Cricket Board (ECB) needed a new one day cricket competition to take its place. Dwindling crowds and reduced sponsorship income was of great concern to the board, and they wanted to find a way of providing fast paced short cricket that could appeal to an audience that wasn’t very interested in long cricket matches. ECB:s marketing manager Stuart Robertson suggested they try a new format; a 20 over per innings game that would only take a few hours to complete. Twenty20 cricket game The first official Twenty20 matches took place between English counties on 13 June 2003. A little more than a year later, the illustrious Lord’s Cricket Ground arranged their very first Twenty20 match on July 15 2004. That match attracted over 27,500 spectators. The year 2004 was also when the first international Twenty20 match took place, between England’s and New Zealand’s female cricket teams. From this point on, Twenty20 cricket quickly spread throughout cricket playing countries around the globe. Pakistan held their first national Twenty20 competition in 2004, and was followed by Australia in 2005. In Australia, the inaugural Twenty20 game took place at the WACA Ground in Perth, and for the first time in nearly 25 years the ground was completely filled with spectators. The following year, 19 West Indies regional teams squared off in the Standford 20/20 tournament. In 2007, the first ever ICC World Twenty20 was arranged in South Africa, where the Indian team won by five runs against the Pakistani team in the final.
Wednesday, November 28, 2007 249)The Genographic Project of the National Geographic Society: How I discovered my ancestry from 10-15 thousand years ago. The National Geographic Society's worldwide Genographic Project asks the following questions: "Where do you really come from? And how did you get to where you live today? DNA studies suggest that all humans today descend from a group of African ancestors who-about 60,000 years ago-began a remarkable journey. Follow the journey from them to you, as written in your genes" : I joined this study in 2004 and discovered my remote heritage. Genetic analysis of the Y-chromosome extracted from the DNA inside my inner cheek cells reveals that I belong to the H1a Haplogroup of the M17 Genetic Marker; furthermore, 35% of all the people who live in Gujarat State in northwestern India(millions of people) have the same genetic marker as me. Another 10% are descended from a completely different genetic group, the Dravidians of South India. Most of the remainder of people in Gujarat are a mixture of these two and other groups. On the basis of this information and the information I received from the project head, this is how I constructed the Heritage section on my Facebook profile: "Based on a genetic analysis done in 2004 of the Y-chromosome extracted from my cheek cell DNA, which shows that I belong to the R1a haplogroup of the M17 genetic marker, my remote ancestor was a man of European origin born on the grassy steppes in the region of present-day Ukraine or Southern Russia 10,000 to 15,000 years ago. This man's descendants(known also as the Kurgan people) became the nomadic steppe dwellers who eventually spread as far afield as India and Iceland. I am descended from the Indo-European branch of this clan, which is thought to be responsible for, among other things, the domestication of the horse and the development of the Proto-Indo-European language, leading eventually to the development of English, French, German, Russian, Spanish, other Romance languages as well as Sanskrit-based languages like Hindi, Bengali, Gujarati and Urdu. Many of the Indo-European languages share similar words for animals, plants, tools and weapons. My more recent ancestors were originally Hindus living in Chotila, Gujarat, India. They were converted to Shia Ismaili Islam by Persian Sufi Mystics(Pirs) around the 14th century CE. My great-grandfather and his 3 brothers travelled by ship and train from India to Pretoria, South Africa around 1894. Thus, having originally left Africa 60,000 years ago during the big migration, my ancestors had once again returned to Africa. I emigrated to Toronto, Ontario, Canada from Pretoria, South Africa in 1973. My wife has a similar heritage to me but she was born in Mbale, Uganda and lived in Kampala, Uganda. Both our children(son 23yrs, daughter 14yrs) were born in Canada. I am very proud of my heritage." Easy Nash aka easynash
Tuesday, June 04, 2013 320-400: Oribasius preserves Galen's work In 320 A.D. Oribasius was born in Pergamum, the hometown of Galen, and perhaps it's for this reason he fell in love with the writings of the former. Through his voluminous writings he may be partially responsible for Galen becoming a medicinal god to medieval physicians. This is especially important because the physicians that immediately followed Galen, including Serenus Sammonicus (died 211 A.D.) and Marcellus Empiricus (4th or 5th century), wrote nothing of Galen, said historian John Watson.  (8, page 173) Constantine (272-337) was Roman Emperor from 306-337, and during his reign he declared the national religion was Catholicism. This was good in a way, because it helped to clean up some of the problems that ailed Rome.  It helped people develop morals and values that were necessary to clean up the fabric of life. It encouraged people to be humble, and to be happy living a simple life with no opportunity for advancement. The Christian Bible encouraged each man to marry one woman, and to be faithful to that one woman.  It encouraged purity and cleanliness.  This was all in an attempt to prevent the spread of disease.  It was also an attempt to encourage each person to be kind and generous to his neighbor. It likewise encouraged businessmen to be honest. Yet this happened at the expense of wealth and opportunity.  It came at the expense of philosophy and medicine.  The Christian priests believed that wisdom and wealth were the antithesis of faith, and instead people were encouraged work hard and to live humbly and to appreciate poverty and depravity as a gift from God. The reward for such hard work and humility was eternal life with Jesus in Heaven.  All that was needed to maintain health and order was faith in the Lord.  He was the King, and He was the Healer. In 337 A.D. Constantine died, and Julian came to the throne.  Julian wanted to end the reign of Christianity in Rome, and to do this he hired the services of the physician Zeno. Of this, historian Thomas Bradford wrote: After Constantine had declared Christianity the true religion, came Julian who attempted to overthrow its teachings and re-establish paganism. One of the first of his imperial acts was to endeavor to revive the ancient institutions of Alexandria. This mission was entrusted to a physician of Cyprus, named Zeno (at Alexandria). He went thither, but most of the inhabitants were Christians, and instead of proclaiming his mission, he kept himself quiet, and being really an illustrious member of the medical profession, was soon able to surround himself with numerous disciples, among whom were Jonicus and Oribasius. Zeno (who lived in the 4th century) left certain treatises, but they are lost. He is described as being the most famous teacher and practitioner of that time, though his fame seems to have originated in being able to have educated such illustrious pupils.(6, page 45) Jonicus went on to become a very skilled physician in the 4th century.  He became very knowledgeable of anatomy, and "so great was his knowledge of pharmacology that it was said that none its secrets were withheld from him."  (6, page 45-46) Yet it was Oribasius who would have the greatest impact on medicine.   He was a pagan and a sophist, "descended from parents of good condition.  He made quick progress of the liberal arts, which greatly conduce to virtue," wrote a good friend of his, Eunapius. (3, page 387) Oribasius was also a "precocious" student during the reign of Constantine and his son Constantius (who was close to the age of Oribasius).  He studied at the school of Alexandria, and it was here he became physician and good friend to the future emperor Julian.  (1, page 175) Oribasius would also go on to become one of the most famous philosophers of his time.  (6, page 46) Oribasius and Julian had a lot in common.  As they became close friends early in life, they "were of similar taste, and were both devoted to the ancient religion (which was paganism)." (6, page46) The two friends would go on to greatly benefit one another.  Many believe Oribasius taught Julian philosophical skills that were later necessary to be king.  And Julian encouraged his friend to write a synopsis of the works of Galen.  (1, page 175) Oribasius ended up spending the next several years enveloped in research regarding ancient physicians, particularly on the works of Hippocrates and Galen.  He ended up writing a 70 book synopsis (some say it was 72 books) on the writings of both physicians, and much of his works are plagiarized from from their works.  Time has destroyed three quarters of his work, yet what remains is "of great historical value." (4, page 129)(6, page 46) Rather than call him a plagiarizer, historian Fielding Hudson Garrison, in his book, "An Introduction to the history of medicine," preferred to describe him as a "torch-bearer of knowledge rather than as an original writer, but his compilations are highly valued by scholars in that he always gives his authorities, and, so far as is known, quotes them exactly."  In other words, if it were not for the works of Oribasis, many of the works he copied would have been lost. (5, page 111) Julian, in his 277 A.D. Letter to Athenians, according to Wilmer Cave Wright: "refers to a 'certain physician" who had been allowed by Constantius* to accompany him to Milan when he was summoned there to be made Caesar. Oribasius went with Julian to Gaul, and there is preserved by Photius a letter from him to Julian mentioning their sojourn there together; but we do not know whether he went on the expedition to Persia.  When Eunapius says that Oribasius "made Julian Emperor," he probably means not so much that Oribasius was an accomplice in the plot to put Julian on the throne, though he does in fact, in his Life of Maximus, speak of Oribasius as the Caesar's "accomplice," but rather that the physician, by his virtuous teachings, had fitted Julian for the position. The historians at any rate are silent as to the connivance of Oribasius. It was probably in 358 that Julian wrote his extant letter to Oribasius, when the latter was editing an epitome of GaFen. Oribasius was with him in Antioch on the way to Persia, and is no doubt one of the seven persons whom Julian mentions in Misopogon 354 c as newcomers to Antioch, and out of sympathy with its frivolous and ungodly citizens. (7, pages 337-338) Julian at one point named his friend Oribasius "quaestor (public official who managed financial affairs of the state) of Constantinople", and was later with Julian as his personal physician as the Emperor traveled into Persia. (6, page 46) In 363 Julian was killed in a war with the Parthinans, and he died, of his mortal wounds, in the arms of his best friend Oribasius.  (2, page 214) (6, page 46)(3, page 387) Perhaps due to his opposition to Christianity, Christian emperors who took over the reigns of the empire exiled Oribasius, spared him death for being a pagan, and exiled him to live among the Barbarians (it is unknown who the Barbarians were).(3, page 387)(6, page 46) Much of what we know about Oribasius (much of what is written above) comes from his friend, and fellow exiled pagan physician Eunapius. It is believed that Eunapius was born in 347 A.D. in Sardis, studied there under the pagan sophist (Greek teacher of philosophy, rhetoric and arts) Chrysanthius (of the 4th century), and went to Athens to learn rhetoric from Prohaeresius (272-367).  Like Julian and Oribasius, he was also a Pagan, and was opposed to Christianity, and this theme was emphasized in his writings. While Oribasius was still alive, Eunapius published a book, "The Lives of the Sophists," honoring the world's 23 greatest philosophers, of whom, according to Eunapius, Oribasius was one. (3,page 387) Eunapius said that Oribasius was also "the most skillful in medicine, and the most amiable in conversation."  (6, page 46)(7, pages 533, 537) Eunapius explains that while in exile: (3, page 387)  "he (Oribasius) exhibited proofs of his abilities restoring some to health from long and grievous sicknesses, and recovering others from the very gates of death.  Whereby, in a short time, he gained great esteem with the barbarian kings, and was revered with almost divine honours.  The Romans were very desirous of his presence with them; and the emperors, changing their former counsels, gave him leave to return; which he was very willing to do out of regard to his native country." (3, page 387)(7, page 535) Eunapius said Oribasius married a rich woman, had four children, "had his estate restored to him out of the public treasury, the emperors revoking their former sentence against him as unjust."  (3, page 387)(6, page 46)(7, page 535) Eunapius said Oribasius then "recovered his original fortune from the public treasure."  (7, page 537) His legend lived on through his voluminous writings. He was partially responsible for keeping the works of Galen in the minds of medieval physicians, as his works were referenced by future physicians, including many who would go on to write about asthma. Because of his association with Julian, and later due to his skills as a physician, "Oribasius and his family lived a very comfortably; if he met with some difficulties, as Eunapius intimates, they could not be for any long duration... it hence appears that Oribasius reached a good old age."  (3, page 387)  He died sometime around 400 A.D. It must be said that by this time "the majority of the people of the Roman empire were now Christians, and the laws were favourable to them." (3, page 387)  People who claimed that "diseases had a real cause" were ignored, and those who practiced medicine were persecuted, said Bradford (6, page 48-49) All the temples of Aesculapius, the Asclepions, since they were no longer needed, were "abolished" by Constantine, said Bradford.  Of these, Bradford explained: They were replaced by hospitals and asylums placed under the care of the church. These were richly endowed with lands and money... The empress—mother of Constantine—Helena, was foremost in this charitable work, and was assisted by many high-born ladies. Orphan asylums, foundling homes and abodes were organized for the poor. There were also parabolani, out-door visitors to the sick poor, especially in time of pestilence. But noble as was this great charity of the church, it labored under the defect that in place of the skillful physicians of the Asclepions, they were now only well meaning but unskillful priests, who really knew nothing about disease. The sick were really under the care of nurses; and hence, to hide their inability and ignorance, these nurse priests proclaimed that prayer and relics of saints and other ceremonials were better for thecure of the sick than the skill of the earthly physician. Those having charge of the hospitals were called the nosocomi... With the Asclepions closed, the schools of philosophy prohibited, learning branded as magic and punished as treason, philosophy driven into exile, and as a class exterminated" (6, page 49) Bradford likewise explains that knowledgeable and skillful physicians "were replaced by well meaning but unskillful priests." Diseases were no longer caused by an imbalance of the humors, so knowledge of anatomy, pathology, and philosophy were no longer needed.  Instead of  the sick seeking the cures of physicians, they sought the miracles of priests. (6, page 49) Regardless, Paganism became extinct.  Oribasius was, therefore, the last of the Pagan physicians.  (4, page 129) *Constantius lived from 250 to 306, and was a Roman Emperor from 293-305.  He was the father of Constantine.  Constantine lived from 272-337, and was Roman Emperor from 306-337.  He was the father of the next Constantinus, also known as Constantine II.  He lived from 316-340, and was Roman Emperor from 317-340.  Julian lived from 331-363, and was Roman Emperor from 355-363 1. Lawson, Russell M, "Science in the ancient world: an encyclopedia,"  2. Temkin, Owsei, "Hippocrates in a World of Pagans and Christians 3. Lardner, Nathaniel, transcribed by Andrew Kippis, "The works of Nathaniel Lardner in five volumes," 1815, pages 386-388 4. Withington, Edward, "Medical History from the earliest times," 1894 5. Garrison, Fielding Hudson, "An introduction to the history of medicine," 1921, Philadelphia and London, W.B. Saunders Company 7. Philostratus (the Athenian), Eunapius, "Lives of the Sophist," translated by Wilmer Cave Wright, 1922, London, G.P. Putnam's Sons 1 comment: 1. Asthma alternative therapy:-Asthma may be a common chronic inflammatory disease of the airways characterised by variable and continual symptoms, reversible air flow obstruction, and spasm.Common symptoms embody wheezing, coughing, chest tightness, and shortness of breath.
Wednesday, September 23, 2009 Artistic musings Art presents a special challenge to a Jewish parent. Mostly it's the issue of tznius (modesty). The Jewish idea of what's appropriate, even for art and self expression purposes, is very different from that of the secular world. There is also the issue of shmiras einaim, being careful not to look at things that are spiritually detrimental to one's soul, which is at least as important as eating kosher food. There are a few reasons though why teaching art is important. First, there are the technical aspects, of which there are many, that develop many practical skills that could be later applied, transferred or combined with other disciplines. Secondly, it teaches one to pay attention to detail and beauty in the world. Thirdly, a beautiful piece of art has a potential to be as moving and inspirational as a piece of music or a poem. Finally, it allows the individuals with artistic inclinations, latent or otherwise to develop their creativity. However, as far as I have seen there is no one art program or package that could be used by a religious Jew without modifications. So it's up to the parent or a teacher to come up with appropriate materials and present them to the student in a proper way. Luckily there are many sources of artwork available on the Internet (reproductions that could be bought or printed out) so one can pick and choose and select what is appropriate. Post cards and art from calendars or old books can also be used. One can even use picture book illustrations to explain various elements of art. For the Charlotte Mason system fans, picture study is a good way to introduce students to art. From the Montessori crowd, the idea of utilizing child sized masterpieces also offers a good way to introduce art. The book, Mommy It's a Renoir or How to use child sized masterpieces by Aline Wolf, explains the details (the books with the actual postcards are not all Jewish child friendly so you are better off making your own selections). As for the technical aspects there are myriads of books available on all different types of art, one just has to pay attention and make the necessary modifications. For the Jewish parent teaching art is more of a practical matter rather than cultural, even though some art can be taught in its historical context. There are also ways to combine art with teaching science and math or foreign language. Also, art could be a practical skill that could be used effectively in many venues in the home or otherwise. Art is a subject that could incorporated in home learning in many, many ways. It's also something that parents and children can do together. So if you or your child are artistic or like art, make it a part of your home education. Post a Comment
Pop Hill Caves The “devil at your doorstep” was how the St. Olaf College administration viewed a small brewery and beer garden once located directly behind Thorson Hall. In 1885, Adolph Grafmueller purchased the land adjoining Manitou Heights. He enlarged a natural sandstone cave for beer manufacturing and storage, creating what students nicknamed "Brewery Hill." In front of the cave he built a couple of buildings from limestone. The large flat area in front served as a beer garden with tables, chairs, and colored lights. Since Grafmueller's business was near St. Olaf, students "inspected" his establishment on the sly. In fact, some students even raided cases of beer by dropping down the caves' ventilation ducts using ropes. In 1897, Grafmueller sold his business. In the years that followed, until 1919 when Prohibition took effect, owners continued the manufacturing of beer. After 1919, for many years the caves housed the Northfield Bottling Co., which manufactured and stored soda pop; thus, the site was renamed "Pop Hill." Professor Carl Mellby recounted a story from June 1904, when Hermann Wenner peddled beer without a license. The college was enthusiastic about getting the liquor traffic out of Northfield, so Professor Oluf Glasoe pretended to be a customer and secured samples. The beer purveyor and his wife were brought into court. They defended themselves by saying that they made and sold a valuable health drug. Mellby recalled the exchange with Judge John C. Couper: "Do you sell that to college boys?" demanded Judge Couper. "Yes," she said. "It makes them strong, healthy." Finally the lawyer summed up his case, making some strong statements that caused Mrs. Wenner, age 70, to become quite heated. When Judge Couper pronounced the sentence of $20, she rushed toward Professor Glasoe and began chasing him all over the room. He was afraid to leave for fear that she might catch up with him. He managed to dodge her by going around until she became exhausted. A couple of days later, she called on President John N. Kildahl. Mellby was present and recalled the conversation: "Mr. President, that was a grand injustice." "No, you broke the law." "But your boys have money and can pay for it. It's good drink. It'll make them better Christians." The college acquired the caves in the mid-1950s. Before and after the purchase, students continued to frequent the site, a popular locale for beer and blanket parties, exploration, and other mischievous exploits. By the early 1960s, a door barred entry, but students continued to find ways to sneak in. In 1987, the caves were permanently demolished after a student accident. Brewing up Trouble! tif / 716.67 kB Download
In Doe v. Unocal Corp., several citizens of Myanmar alleged a California-based oil company, in cooperation with Myanmar’s ruling junta, used beatings, torture, rape, slavery, and murder to confiscate ancestral lands and force villagers to clear a path though mountain jungles for a gas pipeline jointly owned by Unocal and the junta. The plaintiffs lived in the jungles in tribal groups, spoke a local dialect known as Karen, and had an average third grade reading level. There was no treaty to obtain discovery, the ruling junta was hostile to the lawsuit, and attorneys were not permitted to enter the country. In Occidental Petroleum Corp. v. Certain Underwriters at Lloyd’s, London, the Fuerzas Armadas Revolucionarias de Colombia (FARC), a Marxist-Leninist revolutionary guerrilla organization in Colombia, bombed pipelines owned by a California-based oil company on 285 separate occasions over a period of two years. The oil company’s insurer considered every bombing to be a separate incident giving rise to a separate one million dollar deductible. The oil company considered the bombings to be part of a single campaign of terror, giving rise to only one deductible. Key witnesses and evidence were located in Colombia and London. One witness in Colombia was a former FARC member who slept in a different house every night to avoid FARC assassins. What power does the court have to manage litigation such as this? What procedures?
Here’s a new idea to save jobs in coal and steel country: Spin it into carbon fiber, a lightweight, sturdy building material. The pitch-black stuff derived from long-dead forests could become the backbone of spacecraft, airplanes, cars, and bikes. With a lightweight body, those vehicles would theoretically need less fuel to get moving — meaning fewer greenhouse gases polluting the atmosphere, despite more people back at work taking coal out of the ground. Demand for U.S. coal has plummeted in recent years for a multitude of reasons. Coal production reached 35-year lows last year, related in part to bargain-basement prices for oil and natural gas. Demand has also dropped as utilities look for energy sources that produce fewer greenhouse gases, and as the prices of wind and solar power have fallen. As a result, coal jobs have taken a hit, a narrative that appeared throughout the 2016 presidential election and continues in its aftermath. Trump's misleading coal promises President Trump and his administration have fixated on restoring these jobs by rolling back regulations, including signing an executive order to withdraw the Obama-led Clean Power Plan, which would have frozen construction of new coal plants and closed hundreds of existing ones. The plan was a keystone piece of the Paris Climate Agreement, a landmark accord that calls for coordinated global action to combat greenhouse-gas emissions. But Trump and other Republicans also incorrectly argue that climate change is not happening or is not caused by human activity. Trump also eliminated a stream protection rule that took years to write but was finally implemented in the waning days of the Obama administration. Environmental groups decried that move, saying wetlands and streams will now be at risk of pollution by coal companies. Trump said such actions would bring coal jobs back, but states and the federal government were taking other, more progressive steps toward coal’s future even before the Trump administration began. Using science to find answers The Obama administration’s POWER initiative designated $28 million for coal-impacted communities, and some of those funds were directed to the University of Utah, which is leading a research effort that includes scientists and engineers in other coal-seam states like Kentucky and Tennessee. Researchers started working on their new project last month, and they hope to transform coal into an affordable precursor for carbon fiber. It would be a boon not only to coal country, but to manufacturing and the environment — if researchers can get the recipe right. It’s harder than it may seem, according to Ahmad Vakili, a mechanical engineering professor at the University of Tennessee Space Institute. “Carbon fiber has properties that, pound for pound, are lighter weight and stronger than steel. But there are a bunch of catches involved,” he said. Chiefly, the catches are price — it’s still prohibitively expensive to do this for anything other than aerospace technology — and quality. As of now, coal-based carbon fiber isn’t strong enough to compete with the more common kind, made from polymers. For several centuries if not millennia, humans have burned coal to produce heat, and later to generate electricity. When coal is heated without oxygen, the hydrocarbons within it can be captured instead of released. This material is called pitch. Because it’s carbon-based, this raw waste material can be refined and spun into carbon fibers. Environmental groups like the Sierra Club argue that any use of coal harms natural resources, because the process of extracting and using coal is rife with pollution. But Sierra’s Beyond Coal campaign, which advocates for alternative energy sources, has not yet studied the effects of using coal to produce carbon fiber, according to a spokesman. Similarly, advocacy groups like Citizens Coal Council say the research is still new and have not taken a position on it. Most carbon fiber is typically made from a petroleum-based compound called polyacrylonitrile, or PAN, which has long strings of molecules bound tightly by carbon atoms. These are combined into larger filaments, which are wound together in a bundle called a tow or a ribbon. A single tow with 24,000 filaments in it would be about the diameter of a pencil, says Matthew Weisenberger, associated director at the Center for Applied Energy Research at the University of Kentucky in Lexington. “You can take a 24,000 filament tow, and you can tie it in a knot and pull the knot tight, with a PAN-based fiber. They can handle high strain without breaking, so they’re used in airplanes, cars, in sensitive structures,” he said. Pitch-based, not so much. “It could be twice the length of a PAN-based rod and still say straight, but it will snap like a twig. It’s going to weigh nothing, but if you tried to tie a knot and pull it tight, it’s going to break. It can’t handle the strain.” This has to do with the size of the crystals in the material, and the sizes of the gaps between them, he said. Figuring out how to alter these crystal structures requires better understanding of the coal itself, explained Vakili. Coal is mostly plant matter that has been compressed and carbonized over the eons. But different plants grow in different parts of the world, in the deep past as they do now. Pitching new coal products “Coal coming out of the ground from Kentucky is different from coal coming out of the ground in different parts of the country. They are not the same coal mine, so they are going to be different,” Vakili said. “The processing takes into account all those differences.” Eric Eddings, a professor of chemical engineering who leads the research team at the University of Utah, says his team will analyze the makeup of Utah coal to figure out how it can be used in pitch precursors. They will deliver them to Weisenberger’s team, who will spin them into carbon fibers. Vakili adds that the refining process is competitive, and different labs have their own techniques. His lab holds a patent on a process that he says can produce fibers more cheaply than other groups. While the precursor material is already cheap, because it’s left over from the process of petroleum refining or coal production, it’s the processing that gets expensive, Vakili said. “Typically, lower end products are the cheapest. You can buy pitch for like 50 cents a pound, or 20 cents a pound,” he said. “So if you can use this effectively to convert into carbon fiber, with some extra processing, then you get cheap carbon fiber.” Mitsubishi already uses a form of coal-derived pitch to produce carbon fiber for robotic hands, disc brakes, and satellites. But improving the refining and spinning process to make this less expensive will take time and work, not to mention additional government funding, Vakili said. If researchers can make coal-based carbon fiber more cost-effective, they’d be solving several problems at once: Increasing demand for coal jobs, removing hydrocarbons from the ground and the atmosphere, and producing a strong, tough material that can improve fuel economy for gas-guzzling vehicles in the skies and on the roads. “You certainly don’t want to dump it; it’s polycyclic aromatic hydrocarbons. If you can utilize it for something that’s high value, that’s awesome,” Weisenberger said. “If we can get there, we’ll start to garner a lot of attention.” Rebecca Boyle is an award-winning freelance journalist in Saint Louis, Missouri.
A famous painting by historical artist Godwin Mandelson mocking John the Black for his "claim to the throne"; John of Black's armour did not actually have a crown and other royal symbols. John Edward Antagen the Black was a famed knight of Stormwind, a Grand Champion of Redridge and a disowned child of royalty. Born into a time of relative peace, a young John found practicing his martial skills annoyingly difficult. Some say that it is this that has caused his unusual ferocity in battle, others say that it is merely his excellent ability and now people put it down to a mental disability. He had seen fame in the Prince of Redridge Joust, and was renown throughout the land before the First War. Though now historians prey on him as a historical figure, and he has now been defamed as a rather idiotic brute. So much so, in fact, that the eponym "antagenist" was created for someone who is overly violent for no clear reason. Claim to RoyaltyEdit Though originally a rumour created by the former Prince Adamant when he remarked "I wish this man was relation," after seeing John defeat his last opponent in a joust, new historical evidence suggests that John may just have been of royal blood indeed. Many artists, such as Godwin Mandelson albeit mockingly, portrayed him as royal in some way. From the account of the third princess of Alterac's diary, and the diary of her cousin Prince James, it is apparent that there was an incestuous relationship between the two. Though neither account mentions that this relationship produced a baby, many court nobles of Alterac recall the princess showing signs of pregnancy. Also, the chamberlain who was tasked with taking John to his new home wrote in his memoirs that the princess had cried when he came to take the baby away, even though he was told that they had found the baby on a hunting trip. John does not show up in records again until the noble who the baby was delivered to, Reginald Antagen, sends him to be trained by a knight of Stormwind. The knights that trained him appeared to have done well, because in the second Prince of Redridge Joust, a young warrior clad in black plate defeated the competition with brutal methods of attack. Though it was covered up at the time, three knights were known to have died from hemorrhages caused by John's lance, when the joust was supposed to be a non-lethal event. Four titles later, and thirty lives taken in the grand mêlées and jousts later, John of Black was one of the greatest knights the King had at his dispense. Loved by the people for the carnage he brought, and loved by the nobles for being quiet (so that they could practice their own nefarious court deeds) he earned the fallacy of being a "gentleman". The reality could not be further from the truth; John the Black, as his peers and servants recall, beat his wife on several occasions, harassed villagers and was involved with several corruption plots which included other court nobles. These scandalous plots include the falsely enforced tax on peasants, known as the "Cow Tax"(1) amongst other things. (1) The Cow Tax meant that all peasants who had cows would have to pay fifty silver for milking the cow; the justification being that there was only so much milk cows could have, and therefore peasants shouldn't be greedy. This was uncovered eventually by a more intelligent peasant who petitioned the King. Though servants of the land had little rights, the nobles knew that - should the truth come out - their name, and John's name, would be besmirched forever. John the Black's death has been subject to both lie and wistful revision. The conventional story is that he was murdered by his squire who blamed one of his men-at-arms. Though many people believed this, the story is irrevocably false. Several facts and accounts have been compiled that suggest an alternate and more believable construction of events. To begin with, John the Black had no squire. Indeed, he had alienated most squires he had through his violence in teaching them. Instead, the person who murdered John the Black was the maid who, according to the conventional version of history, uncovered the squire. Several of the servants', who worked in John's manor, accounts suggest that the knight had forced himself upon the maid. The maid was taken back to John's bedroom, where she slit his throat with the knife upon his belt. In desperation, she fled to her husband, who happened to be one of John's men-at-arms. The husband agreed to take the blame for the crime, and pretended that he was drunk on the night of the crime in court. Due to the maid and her husband's lack of intelligence, however, the investigation showed that the maid had indeed slit John's throat. However the maid would not go to prison; many of the nobles who wished to preserve John's good name blamed it upon a peasant boy who they pretended was John's squire. They did this because they knew, should the maid be prosecuted, the truth would come out via the other servants in the house - who would testify that the murder was in self-defence. And so, a lie was spawned. Ad blocker interference detected!
The world's most expensive pets Most Expensive LEGAL Pets To Own Monkeys, Lions and Chimpanzees are animals we often see in the wild or on the Discovery Channel, however many of these exotic animals can be purchased legally within the United States. Living in an acceptable jurisdiction and acquiring the correct permit could turn your home into a modern day zoo. These animals, however do come with a heavy price tag and that is not including the upkeep. 13. Bengal Cat The Bengal Cat is bred by mating a domestic black shorthaired cat with an Asian Leopard cat. As with many hybrids the goal is to create a domestic cat in size and demeanor with the exotic Asian Leopard Cat appearance and coloring. As with most hybrid cats, the breed becomes more and more domesticated with each successive generation, therefore the ideal domesticated breed would be at least three to five generations removed from the original breed. 12. Snow Macaque The Snow Macaque is considered a threatened species as we continue to encroach on more and more of the animal's habitat. Due to this fact, coveted licenses and special permits are mandated to own this very rare animal. The Snow Macaque is a smaller primate with a lifespan of over 25 years with the distinguishing feature of a hairless red face. 11. Squirrel Monkey This primate is about the size of a squirrel thus it's name. Generally the squirrel monkey does not get any bigger than 2 pounds and is considered a very social, affectionate and peaceful animal. These complacent characteristics make the animal a highly desired pet, however as with most of these animals, many states do not allow them to be privately owned. 10. Chinese Crested Hairless Puppies These dogs weigh about 5 to 12 lbs and are very vivacious, alert and friendly animals. Considered to be one of the rarest dogs, these dogs are prone to sunburning on a hot and clear day. The dogs first originated in Africa and the animals is most often found to be a very pleasant companion that lives for over 10 to 12 years. 9. Savannah Cat Bred in a similar process to the Bengal Cat, the Savannah Cat is bred by mating the African Serval with a smaller domestic cat. The Savannah inherently has a much more difficult breeding process, because an African Serval is 40lbs and undomesticated and breeding it with a domestic house cat is problematic. Concurrently, the gestation periods between the two animals are different. Due to these factors, the Savannah is a more expensive and rare breed of cat. 8. Mona Guenon The Mona Guenon's natural habitat is within the Western African tropical forests, however this animal is capable of adapting to any forest environment। Therefore, despite special permits and licenses to own this animal, it is not considered an endangered specie. 7. Debrazzas Monkey The DeBrazza's Monkey is easily recognized by its white beard and yellowish gray fur. The animal will generally live for about 22 years. Though many people do shell out the hefty price for this primate, they become disappointed when the docile and tender babies grow to become unpredictable and hostile adults. 6. Striped Ball Python Master Python Breeder, Bob Clark states that he has an exclusive on this genetic striped ball python. The prominent stripe is what makes this animal very unique. More clearly, the striped ball showcases a yellow dorsal stripe with a a black border, clearly differentiating them from any other snake. 5. Hyacinth Macaw Macaws overall are very expensive. The Hyacinth Macaw exhibiting beautifully vibrant coloring, generally commands $20,000 a pair. Physically these birds are about 40 inches long and have a bright blue coloring. Their wing span is about four feet and these birds make popular pets despite their expensive price tag. 4. Reticulated Albino Type II Tiger Python Master Python Breeder, Bob Clark's Reticulated Albino Type II Tiger Pythons sell for $15,000 each. An extremely rare breed, these pythons showcase a co-dominant tiger pattern, making them extremely popular in the snake world. 3. Lavender Albino Python Female This red-eyed snake is lavender in color, under a vibrant yellow pattern. Also available from python breeder Bob Clark, the rarity has fueled demand. 2. Chimpanzee Chimpanzees are highly intelligent primates and are closely related to humans. Chimpanzees weigh about 115 lbs and the male is slightly larger than the female. The natural habitat of the Chimpanzee is within central Africa and western Africa. Though an endangered specie, Chimps are legal pets in some states. 1. White Lion Cubs The very rare White Lion is because of a a recessive gene and the animals are not considered to be albino. The White Lion's eye color is similar to the regular lion, however the coat pigmentation and skin are not. Due to its price, demand, upkeep and scarcity, the White Lion remains one of the most difficult animals in the world to obtain. Related Posts with Thumbnails Powered by Blogger
Like Stonehenge, many mysteries surround the construction of these three pyramids, which are part of a mausoleum complex. The Great Pyramid of Giza, the best-known of the group standing outside of Cairo, is the only one of the ancient Seven Wonders of the World that also graces our list. Finished around 2,560 BC, the 481-foot creation (now shorter due to erosion) was the tallest man-made structure in the world for 38 centuries until the completion of Lincoln Cathedral in 14th-century England. How were these made? Were space aliens needed to cut, move and stack the millions of stones, some weighing 88 tons? Does some powerful force emanate from them today? Hop on a camel or hail a taxi and go judge for yourself.
 Traditional Chinese Medicine - Wuhan Dr.lees TCM Clinic diuretic and anti-inflammatory pill Home > Traditional Chinese Medicine > The theory of TCM(traditional Chinese Medicine) forms in the warring states period to the Han dynasty initially. It is marked by four classical medical books of “Yellow Emperor”, “Nanjing”, "The typhoid miscellaneous diseases theory”...[read article] Spicy food is popular with a lot of people, however, when people get sick, some of the spicy food is forbidden. Especially when you choose some traditional Chinese medicine, the doctor usually require the taboo of spicy food....[read article] The stimulating food usually refers to the food with the feature of nutrition or irritation, so it has both positive and negative effects. Commonly, the positive side is lactagogue, which use the stimulating food to stimulate the secretion o...[read article] The Internal Canon of Medicine, an ancient Chinese medicine book, point out that there are three treasures in human body: the essence, Qi and the spirit. With a rich essence, the Qi is also in a good condition. On the contrary, if the gas is...[read article] Like everything is renewing in the early spring, keep health in spring will lay a solid foundation of our body for a year. Wuhan Dr.lee reminds the elderly that if you want to keep health in the early spring, you should keep the three points...[read article] Health preservation in TCM refers to the concept of enjoying life, enhancing physical fitness and preventing diseases through various ways, and reaches the purpose of achieving longevity. In traditional Chinese, the health emphasis on the re...[read article] • total 1 page • Reviews Send us an email or add on Live Messenger • Questions Copyright@2010-2017 Copyright @ Drleetcmclinic.com All Rights Reserved
Johnny Tremain Follow in your imagination the marshalling of the British troops. What details make the scenes vivid? What event forms an outstanding picture in you mind? I can't think about this. please help ! :) Asked by Last updated by Aslan Answers 3 Add Yours Best Answer Consider the battle of Lexington. Lexington fell quickly to British forces––it was a battle between 700 British soldiers and 70 rebels. Most of the rebels fled when they realized they were outnumbered.Consider the massive amount of British soldiers meeting the few rebels. That would have been quite a scene. The British soldiers have become much rougher and more violent. Johnny thinks this is because the rebels are winning and they are frightened. He also correctly predicts that the returning British troops will come through Charlestown rather than returning the way they left, via Cambridge. He is right, and he watches them enter Charlestown from the top of Beacon Hill. The mood is pretty nasty. THe British are out for blood and they have many well equipped men. The massive n of British soldiers would look like a wave coming in. Knowing which chapter you are at will help me. Around where is the scene you are referring to? It's chapter 11. And I think its at the beginning of the chapter.
Biology and CAD Students Create Hydroponic Garden Mrs. Stacy Ort's college biology class needed some help making a hydroponic garden, so they turned to their fellow students in the Computer Aided Design (CAD) class. The collaboration between the two classes yielded a very green and growing hydroponic garden. "Mr. Mitchell's CAD class used the 3D printer to make us the parts we needed to start a mini hydroponic garden," said Mrs. Ort. "We are using the garden to study photosynthesis, but there are a lot of other applications for the garden too." For example, hydroponic gardens can be used in areas where there is poor soil quality or weather--to grow plants indoors for food. Mrs. Ort said the part created by the CAD crew is called a "connector." It connected the two soda pop bottles together for the hydroponic garden. Mrs. Ort is TC's adjunct teacher for college biology and anatomy courses through Edison State Community College. She has a double major in biology and chemistry, with a Master's degree in Anatomy/Bioethics. The goal of the project was to teach students about photosynthesis and hydroponic gardening. Also, it was a review of how to use the scientific method to test a problem. The project was a success thanks to a little help from the sun for photosynthesis.....and from the CAD students for making it all connect. Great job Mrs. Ort, Mr. Mitchell, and all the TC college biology and CAD students!
Connect with us What happens when robots, drones and AI aid the police? The utilization of artificial intelligence, drones and robots in police activity is giving the law enforcers an edge in performing their duties. Many drivers and commuters now take the Waze app for granted. It seems so ordinary now to use that interactive, GPS-based app to spot potential traffic congestion and then rely on it to tell them the fastest route to take. However, technology—to use an old expression from a more low-tech era—can be a double-edged sword. According to Police Magazine, police in the U.S. has expressed concern over Waze because some criminals have been using it to spot the presence of police vehicles. This way, criminals can adjust their route to avoid detection and capture—and sometimes, they use Waze to actively seek out police officers and cause harm. Still, usually, it’s the police who have the advantage when it comes to high-tech tools for deterring, preventing, and solving crimes. Over the years, law enforcement has been investing heavily in new technology to help with many aspects of the job. New technology doesn’t only let police perform their duties more efficiently, but also more safely, so there’s less collateral damage to themselves and civilians. Let’s take a look at some of these technologies: Robots and drones It’s not always the smart thing to do for police officers to run in with guns drawn—especially in a risky area. The place where a crime has been or is currently being committed might be fraught with risks. A house or building would have corners and rooms that could present hazardous surprises. What if the scene of a crime is dark? Or what if armed suspects are hiding behind a wall, or have left a bomb behind? In an active or recently vacated crime scene, there are simply too many risks and many unknown variables. There’s an option to send in a highly-trained police dog first—but that would also be putting the animal at risk. As Computer World reports, if such an animal is injured or killed there’s both a financial and emotional cost. A police dog can cost up to US$20,000, and there’s the grief to be felt by his human comrades. Bomb disposal robot Police use robots to dispose of bombs hidden by perpetrators within the crime scene. (Photo by Rept0n1x via Wikimedia Commons. CC BY-SA 2.0) Fortunately, there are now robots and drones that can go safely where no police officer (or dog) should dare go. One example is the Recon Scout Throwbot. This is a robot on wheels that police deploy simply by throwing it through a door, window, or passageway. The robot’s cameras capture the events at the scene and are remote-controlled. Dubai has also led the way for a more advanced police force with its launch of an Android police officer. Google, together with IBM, is working with the Dubai police to create a virtual assistant which will allow the robots to follow voice commands in the future. Another example is the flying drone, usually referred to as an unmanned aerial vehicle or a micro-air vehicle. Like the ground-based robot, this device also lets police conduct surveillance safely, from the air. All the information gathered by these robots and drones are admissible in court—and their cost has been dropping so more and more police departments will be using them. Scanning and data There are also devices that police themselves bring along to gather data in real-time. These devices can connect to a database so that all the collected and recorded data can be analyzed later on. Such devices would include Google Glass, iPads, and even smartphones. These provide various ways for police to gather data to help them find suspects, record or report crimes in progress, or get information that helps them make smarter and safer decisions at the actual crime scene. SEE ALSO  Using time wisely: Best 10 tips to decrease your workload Laptops used to be the required high-tech gadget in a police vehicle—but the portability of new data devices have made them obsolete. For example, Google Glass can be used to scan a scene and spot license plates, addresses, and even actual suspects through facial recognition software. Google Glass Google Glass (pictured) can scan a crime scene, detect license plates and identify suspects with the help of facial recognition. (Photo by Giuseppe Costantino via Flickr. CC BY 2.0) Speaking of scanners, there’s now a special radar that can see through walls. This RANGE-R allows police to see what’s happening behind walls where armed and dangerous suspects might be hiding. The device uses Doppler radar technology to “see” and sense motion of possible combatants hiding behind walls. It has a cousin, another “thru-wall sensing” device, called EMMDAR, but uses electromagnetic waves instead. Both are made by L3 CyTerra, a firm that specializes in creating detection devices to be used in various environments and landscapes–for military, humanitarian, and homeland security purposes. Predictive analytics All the data gathered would be of little use if their meaning, relevance, and real-world implications are not processed and analyzed. This is where AI software aids human analysts in not only understanding data but also predicting where and when the crimes can probably occur. SEE ALSO  Buying cheap stocks: What does cheap really mean? This is possible primarily because crimes tend to happen in clusters—depending on many variables. The clustering could be due to the presence of gangs or crime suspects in a particular neighborhood, or because there are commercial establishments in an area that make attractive targets. Whatever the variables are, police are now able to gather and make sense of the data and make informed decisions on when to send patrols, identify areas where police presence is needed, or where police should develop closer ties with the community, gaining their trust so that people are encouraged to report criminal activity. New technologies for law enforcement and crime prevention are here to stay and are bound to create new products and systems that are more effective and less costly. This bodes well for investors who will put their money on companies developing such technologies, but also for the public, whose safety will be more assured. Continue Reading Click to comment Leave a Reply Most Popular
I told you ever since i suffered severe gastritis, i have become mindful of my diet and lifestyle. Well, not that i instantly became Mr. Clean and Organic. The fact is i still steal a smoke a day and i eat all these foods that this article said can cause cancer. Just the same, let me share this article for your health concern. Chemotherapy involves poisoning the rapidly-growing cancer cells and also destroys rapidly-growing healthy cells in the bone marrow, gastro-intestinal tract, etc. and can cause organ damage like liver, kidneys, heart, lungs, etc.. Radiation, while destroying cancer cells also burns, scars and damages healthy cells, tissues and organs. 2. CANCER FEEDS ON MUCUS. Milk causes the body to produce mucus, specially in the gastro-intestinal tract. By cutting off milk and substituting with unsweetened soya milk cancer cells are being starved. 3. CANCER CELLS THRIVE IN AN ACID ENVIRONMENT. A meat-based diet is acidic and it is best to eat fish and a little bit of chicken rather than beef or pork. Meat also contain livestock antibiotics, growth hormones and parasites which are all harmful, especially to people with cancer. 4. A DIET MADE OF 80% FRESH VEGETABLES AND JUICE, WHOLE GRAINS, SEEDS, NUTS AND FRUITS HELP PUT THE BODY IN AN ALKALINE ENVIRONMENT. About 20% can be from cooked food including beans. Fresh vegetable juices provide live enzymes that are easily absorbed and reach down to cellular levels within 15 minutes to nourish and enhance growth of healthy cells. To obtain live enzymes for building healthy cells try and drink fresh vegetable juice (most vegetables including bean sprouts) and eat some raw vegetables 2 to 3 times a day. Enzymes are destroyed at temperatures of 104 degrees F (40 degrees C). 5. AVOID COFFEE, TEA AND CHOCOLATE, WHICH HAVE HIGH CAFFEINE. Green tea is a better alternative and has cancer-fighting properties. Water, it is best to drink purified water or filtered, to avoid known toxins and heavy metal in tap water. DISTILLED WATER IS ACIDIC, avoid it. Some supplements build up the immune system (IP6, Flor-ssence, Essiac, anti-oxidants, vitamins, minerals, EFAs, etc.) to enable the body’s own killer cells to destroy cancer cells. Other supplements like vitamin E are known to cause apostasies, or programmed cell death the body’s normal method of disposing of damaged, unwanted or unneeded cells. CANCER IS A DISEASE OF THE MIND, BODY AND SPIRIT. Anger, unforgiveness and bitterness put the body into a stressful and acidic environment. Learn to have a loving and forgiving spirit. Learn to relax and enjoy life. Cancer cells cannot thrive in an oxygenated environment. Exercising daily and deep breathing help to get more oxygen down to the cellular level. Oxygen therapy is another means to destroy cancer cells. post script: Dioxin chemicals cause cancer, especially breast cancer. Dioxins are highly poisonous to the cells. Don’t freeze your plastic bottles with water in them as this releases dioxins from the plastic. Recently, Dr. Edward Fujimoto, Wellness Program Manager at Castle Hospital was on a TV program to explain this health hazard. He talked about dioxins and how bad they are for us. He said that we should not be heating our food in the microwave using plastic containers. This specially applies to foods that contain fat. He said that the combination of fat, high heat and plastics releases dioxin into the food and ultimately into the cells. Instead, he recommends using glass, such as Corning Ware, Pyrex or ceramic containers for heating food. You get the same results, only without the dioxin. So such things as TV dinners, instant ramen and soups, etc. should be removed from the container and heated in something else. Paper isn’t bad but you don’t know what’s in the paper. Its just safer to use tempered glass. He reminded us that a while ago some of the fast food restaurants moved away from the foam containers to paper. The dioxin problem is the reason. Also, he pointed out that plastic wrap, such as Saran, is just as dangerous when placed over food to be cooked in the microwave. As the food is nuked high heat causes poisonous toxins to actually melt out of the plastic wrap and drip into the food. Cover food with a paper towel instead.
Bio 106 Home > Preview The flashcards below were created by user JFandino on FreezingBlue Flashcards. 1. Which of the following is true about cells? A cell is ___ A) only found in multiples of 2 B) characteristic of eukaryotic but not prokaryotic C) characteristic of both prokaryotic and eukaryotic organisms. D) always between 200 and 500 micrometers in diameter C) Characteristic of both prokaryotic and eukaryotic organisms. (this multiple choice question has been scrambled) 2. Recall Pasteurs experiment on spontaneous generation. If he had just warmed the nutrient rich broth, rather than boiled it, what would have been the likely outcome of his experiment? b) cells would have appeared in both flasks 3. Over the past several decades, natural selection has caused populations of Staphylococcus aureus (an infectious wound bacterium) to evolve resistance to most antibiotics. If antibiotic use were stopped, what would you predict would happen to these S. aureus populations? c) the frequency of nonresistant forms will increase in these populations 4. The phylogenetic tree below ___. a) depicts the three major domains of life 5. Starting from the wild mustard Brassica oleracea, breeders have created the strains known as Brussels sprouts, broccoli, kale, and cabbage. Which of the following statements is supported by this observation? a) in this species, there is enough heritable variation to create a variety of features 6. Both tuna (fish) and dolphins (mammals) have a stramlined body shape and large tail fins that they use to move through the water. Many other anatomical and molecular data indicate, however, that tuna and dolphins are not closely related from an evolutionary perspective. The latter data suggest that ___. c) Tuna and dolphins faced similar selective pressures on body shape for reproductive success. 7. If you find a mouse in your basement, it is likely Mus musculus. Peromyscus leucopus is also common. Or, you may get lucky and find a relatively rare Peromyscus maniculatus instead. Out of these three species, which two are the most closely related (from an evolutionary standpoint)? b) the two species in the Peromyscus genus 8. Why did the five-kingdom system of classification fall out of favor? d) it did not reflect the actual evolutionary relationships among organisms very well 9. On an evolutionary tree, any group that includes a common ancestor and all of its descendants is called monophyletic ("one-tribe"). Recall the current tree for Bacteria, Archaea and Eukarya. Are Prokaryotes monophyletic? b) No 10. For many years no one bothered to test the food-competition hypothesis for why giraffes have long necks. Why? b) the hypothesis was so plausible that no one thought to question it. 11. A parent cell divides to form two genetically identical daughter cells in the process of mitosis. For mitosis to take place ___. b) the parent cell must first replicate its entire genome 12. In Eukaryotic Cells, chromososmes are composed of ___. c) DNA and proteins 13. What is the final result of mitosis? a)genetically identical 2n somatic cells 14. the microtubule-organizing center found in animal cells is an identifiable structure present during all phases of the cell cycle. Specifically, it is known as which of the following? b) Centrosome 15. Metaphase occurs prior to the splitting of centromeres. It is characterized by _____. a) aligning of chromosomes on the equator 16. Mitosis is the process of chromosome separation. Cytoplasm is divided between the two daughter cells in a process known as ____. b) Cytokinesis 17. Some cells have several nuclei per cell. How could such multinucleated cells be explained? c) the cell underwent repeated mitosis, but cytokinesis did not occur. 18. How is plant cell cytokinesis different from animal cell cytokinesis? b) plant cells deposit vesicles containing cell-wall building blocks on the metaphase plate; animal cells form a cleaveage furrow. 19. The M-phase checkpoint is designed to make sure all chromosomes are attached to the mitotic spindle. If this fails to happen, in which stage of mitosis would the cells be most likely to arrest? d) Metaphase 20. If a cell has accumulated DNA damage, it is unlikely to ____. a) pass the G2 checkpoint 21. Which of the following processes contributes directly to genetic variation? c) meiosis 22. Somatic cells of roundworms have four chromosomes. How many chromosomes would you find in an ovum from a roundworm? b) Two 23. Meiosis involves the creation of haploid cells from diploid cells. The haploid chromosome number is created when ___. a) Homologous chromosomes seperate 24. What is a major difference between mitosis and meiosis I? a) Sister chromatids seperate in mitosis, and homologues seperate in Meiosis I 25. Crossover, the exchange of segments of homologous chromosomes, takes place during which of the following processes? d) synapsis 26. Male grasshoppers (such as the karyotype shown here above), have a single X chromosome. How many chromosomes would be in a sperm cell from this grasshopper? b) 12 27. Chromosomes and their homologues align at the equator of the cell during ___. b) metaphase 28. At what stage of meiosis does DNA replication take place? d) None. DNA replication occurs before meiosis I begins 29. If meiosis produces haploid cells, how is the diploid number restored for those organisms that spend most of their life cycle in the diploid state? d) Fertilization 30. Asexual reproduction takes place by which of the following processes? d) mitosis 31. Mendel crossed yellow-seeded and green-seeded pea plants and then allowed the offspring to self-polinate to produce an F2 generation. The results were as follows: 6022 yellow and 2001 green (8023 total). The allele for green seeds has what relationship to the allele for yellow seeds? 32. A man and woman are both of normal pigmentation, but both have one parent who is albino (without manin pigmentation). Albinism is an autosomal (not sex-linked) recessive trait. What is the probablility that their first child will be an albino? d) 1/4 33. In tigers, a recessive allele causes a white tiger (absence of fur pigmentation). If one phenotypically normal tiger that is heterozygous is mated to another that is phenotypically white, what percentage of their offspring is expected to be white? a) 50% 34. A black guinea pig crossed with an albino guinea pig produced 12 black offspring. When the albino was crossed with a second black animal, 6 blacks and 6 albinos were obtained. What is the best explanation for this genetic situation? a) Albino is recessive; black is dominant d) 1:1 36. A recessive allele on the X chromosome is responsible for red-green color blindness in humans. A woman with normal vision whose father is color blind marries a color blind male. What is the probability that this couples firs son will be color blind? b) 50% 37. A man who carries an allele of an X-linked gene will pass it on to ____. a) all of his daughters 38. Regarding an allelic pair for flower color in snapdragons, heterozygotes have pink flowers whereas the two homozygotes have red flowers or white flowers. When plants with red flowers are crossed with plants with white flowers, what proportion of the offspring is expected to have pink flowers? c) 100% 39. Snapdragons are flowers that come in a variety of colors, including red pink and white. A series of crosses with snapdragons having flowers of different colors produced the following results: Pink x pink: 27 pink, 13 red, 14 white red x red: all red white x white: all white pink x white: 29 pink, 26 white pink x red: 28 pink, 27 red white x red: all pink Based on the results, what is the most reasonable explanation for the inheritance of these flower colors? b) incomplete dominance 40. In humans ABO blood types refer to glycoproteins in the membranes of red blood cells. There are three alleles for this autosomal gene: IA, IB, and i. The IA allele codes for the A glycoprotein, the IB allele codes for the B glycoprotein, and the i allele doesn't code for any membrane glycoprotein. IA and IB are codominant, and i is recessive to both IA and IB. People with A type blood have the genotypes IAIA or IAi, people with type B blood are IBIB or IBi, people with type AB blood are IAIB, and people with O type blood are ii. If a woman with type AB blood marries a man with type O blood, which of the following blood types could their children possibly have? a) A and B Card Set Information Bio 106 2012-12-12 02:16:05 bio 106 First test Show Answers: What would you like to do? Home > Flashcards > Print Preview
Cookies on this website Circadian rhythms are endogenous 24 h cycles that persist in the absence of external time cues. These rhythms provide an internal representation of day length and optimize physiology and behaviour to the varying demands of the solar cycle. These clocks require daily adjustment to local time and the primary time cue (zeitgeber) used by most vertebrates is the daily change in the amount of environmental light (irradiance) at dawn and dusk, a process termed photoentrainment. Attempts to understand the photoreceptor mechanisms mediating non-image-forming responses to light, such as photoentrainment, have resulted in the discovery of a remarkable array of different photoreceptors and photopigment families, all of which appear to use a basic opsin/vitamin A-based photopigment biochemistry. In non-mammalian vertebrates, specialized photoreceptors are located within the pineal complex, deep brain and dermal melanophores. There is also strong evidence in fish and amphibians for the direct photic regulation of circadian clocks in multiple tissues. By contrast, mammals possess only ocular photoreceptors. However, in addition to the image-forming rods and cones of the retina, there exists a third photoreceptor system based on a subset of melanopsin-expressing photosensitive retinal ganglion cells (pRGCs). In this review, we discuss the range of vertebrate photoreceptors and their opsin photopigments, describe the melanopsin/pRGC system in some detail and then finally consider the molecular evolution and sensory ecology of these non-image-forming photoreceptor systems. Original publication Journal article Philos Trans R Soc Lond B Biol Sci Publication Date 2849 - 2865 Animals, Circadian Rhythm, Evolution, Molecular, Opsins, Phylogeny, Retinal Ganglion Cells, Rod Opsins, Vertebrates
The Korat is native to Thailand where they are called "Si-Sawat" which translated means "greyish-blue cat" and in their native land they have always been highly prized because they are thought to bring good luck. They are a rare breed and anyone wanting to share their homes with a Korat would need to register their interest with breeders an agree to go on a waiting list for the pleasure of owning such a striking, loyal and affectionate cat. The Korat is an ancient breed with records of the breed in the Bangkok National Library called the Cat-Book Poems. The breed is thought to be over 600 years old and has always been revered in their native Thailand for bringing good luck. However, Korats were allowed to interbreed with Siamese and Copper cats and it was quite common to find all three breeds in a single litter. It was not until 1959 that the first Korats were introduced to America when a breeder had been offered two cats from another Thai breeder at the time. The two Korats were called Nara and Darra. These cats were also allowed to breed with Siamese although any kittens that did not boast blue coats were never registered as being Korats and they were not described as being Korats either. As such, all Korats carry the genes that produce Siamese or lilac cats and this means generations down the line, a Korat may well produce a Siamese kitten in a litter. It was not until 1965 that a breed club was established with the end goal being to produce a breed standard. Korats were awarded Championship status in the States a year later in 1966. However, it was not until around 10 years later, in 1972, that Korats first appeared in the UK. Two years later, there were over 20 cats in Britain, but it was not until 1984 that the breed was awarded Championship status by the GCCF. Today, the Korat remains a rare breed even in their native Thailand and with a policy of no outcrossing having been put in place, they are one of the more "natural" blue coated cats on the planet. Over the years these fascinating cats have found a fan base both here in the UK and elsewhere in the world thanks to their striking looks and the fact they are so people-oriented. However, anyone wanting to share a home with a Korat would need to go on a waiting list for the pleasure of doing so because they are still so rare. The Korat is an elegant medium size cat that boasts a lithe, muscular body with females being daintier than their male counterparts. The breed is renowned for their large eyes which are a stunning green and their coats which boast having a silvery sheen on them. They are also known for being extremely talkative, especially when greeting an owner and at meal times. They have heart-shaped heads with a nice width in between the eyes and which curves gently to a well-developed muzzle. Their foreheads are flat and large and noses short having a slight downward curve to them. When seen in profile, cats have a slight stop in between their noses and their foreheads. Chins are strong and their jaws are strong too. The Korat has large ears that boast having rounded tips and a large flare at their base. Ears are set high which adds to the Korat's keen, alert expression. There is very little hair inside of a cat's ears and their eyes are large and bright being quite prominent and rounded with a slight slant when they are closed, but not when they are open. The Korat has a medium size, strong and muscular body that's quite cobby in appearance with males being larger and more powerful than their female counterparts. They have a slight, gentle curve in their backs and their legs are nicely in proportion with the rest of a cat's body. Paws are oval shaped with cats having five toes on their front feet and only four on their back ones. Their tails are medium in length being heavier at the base before tapering to a rounded tip. When it comes to their coat, the Korat boasts having a short, close lying short to medium length coat that's fine to the touch and very glossy. The hair on the spine tends to break when a cat moves. The accepted breed colour under the GCCF breed standard is as follows: Any shade of blue with each hair being tipped with silver, nose and lip colour should be either dark blue or lavender and paw pads can range from being a dark blue to lavender. The Korat is an extremely people-oriented cat and one that thrives on being with their owners. Some even insist on going in the car so they can spend time with the people they love. They make wonderful companions and family pets because they thrive in a home environment, loving nothing more than to be included in everything that goes on around them. They mature slowly which can take anything up to four years which means they retain many of their kitten traits up until then and even into their senior years. They are also quite talkative and love to have conversations with their families, although they don't tend to be as vocal as their Siamese cousins. They are also highly intelligent, learning things quickly which includes fetching toys. Being energetic cats by nature, the Korat loves to play interactive games which is just one of the reasons they make such great companions and family pets. Because they thrive on human contact, the Korat does not like to be left on their own for any length of time. With this in mind, they are best suited to families where at least one person stays at home when everyone else is out of the house. They love exploring the great outdoors and being able to mark their territory, but they should only be allowed out if it is safe for them to do so. The good news is that Korats adapt very well to being kept as indoor pets as long as they are given lots of things to do and places for them to snuggle up when the mood takes them. The Korat is known to be a highly intelligent cat and one that learns new things extremely quickly and this includes retrieving toys and playing ball with their owners. Because they are so smart, Korats like to be kept busy and love to be involved in everything that goes on around them. If they get bored, cats often find their own ways of amusing themselves which could result in them being destructive around the home. This is their way of relieving their boredom and any stress they may be experiencing and why it’s so important to invest in lots of interactive toys. Children and Other Pets Korats with their outgoing, affectionate personalities are the perfect choice for families with children. They are quick and agile on their feet and therefore know when to get out of the reach of smaller children when they get too boisterous or loud. However, care always has to be taken when cats are around toddlers and any interaction should always be supervised by an adult to make sure things stay nice and calm. Younger children need to be taught how to behave around cats and when to leave them alone. They also get on well with dogs especially if they have grown up together in the same household. However, care has to be taken when introducing a Korat to dogs they don't already know just in case the dog does not get on with their feline counterparts. If they have grown up with another cat in a household, they generally get on well together although there may be the occasional spat when cats re-establish the pecking order, which they do from time to time. Korats are incredibly social by nature and have been known to get on with other pets. However, it's always wiser to keep a close eye on any cat when they are around smaller pets, just to be on the safe side. The average life expectancy of a Korat is between 15 and 18 years when properly cared for and fed an appropriate good quality diet to suit their ages. The Korat is known to suffer from few hereditary health issues, but they are prone to two types of genetic disorder which often sees cats dying before they are 12 months old and which are as follows: • GM1 - Breeders should have stud cats tested before using them in a breeding programme • GM2 - Breeders should have stud cats tested before using them in a breeding programme Caring for a Korat As with any other breed, Korats need to be groomed on a regular basis to make sure their coats and skin are kept in top condition. On top of this, cats need to be fed good quality food that meets all their nutritional needs throughout their lives which is especially true of kittens and older cats. Korats boast having short, close lying, single coats and as such they are low maintenance on the grooming front. A weekly brush and wipe over with a chamois leather is all it takes to keep their coats in good condition with a nice sheen on it. Like other cats, they tend to shed the most in the Spring and then again in the Autumn, although a lot less than many other breeds thanks to their single coats. It's also important to check a cat's ears on a regular basis and to clean them when necessary. If too much wax is allowed to build up, it can lead to a painful infection which can be hard to clear up. In short, prevention is often easier than cure with ear infections. Cats often suffer from ear mites which can be a real problem which is why it's so important to check their ears on a regular basis. Energy Levels/Playfulness The Korat boasts having a ton of energy and love to be doing things, in between their cat naps that is. They also love to play interactive games which includes retrieving toys and balls when they are thrown for them. They thrive on being around their owners and will follow them wherever they go, with some cats even insisting on going in the car so they can be with them. Cats when kept as indoor pets need to be given lots of things to do and places they can snuggle up for a snooze when the mood takes them because if there is one Korats enjoy it's napping during the day. They also love lying in the warmest spot on a windowsill which means making sure it's wide enough for them to do so comfortably. If you get a Korat kitten from a breeder, they would give you a feeding schedule and it's important to stick to the same routine, feeding the same kitten food to avoid any tummy upsets. You can change a kitten's diet, but this needs to be done very gradually always making sure they don't develop any digestive upsets and if they do, it's best to put them back on their original diet and to discuss things with the vet before attempting to change it again. Older cats are not known to be fussy eaters, but this does not mean they can be given a lower quality diet. It's best to feed a mature cat several times a day making sure it's good quality food that meets all their nutritional requirements which is especially important as cats get older. It's also essential to keep an eye on a cat's weight because if they start to put on too much, it can have a serious impact on their overall health and wellbeing.  Like all other breeds, Korats need free access to fresh, clean water at all times. Average Cost to keep/care for a Korat If you are looking to buy a Korat, you would need to pay upwards of £250 for a well-bred pedigree kitten and you would need to register your interest with breeders and agree to being put on a waiting list because not many well-bred kittens are registered with the GCCF every year. The cost of insuring a male 3-year-old Korat in northern England would be £16.27 a month for basic cover but for a lifetime policy, this would set you back £23.79 a month (quote as of September 2017). When insurance companies calculate a pet's premium, they factor in several things which includes where you live in the UK, a cat's age and whether or not they have been neutered or spayed among other things. When it comes to food costs, you need to buy the best quality food whether wet or dry making sure it suits the different stages of a cat’s life. This would set you back between £15 - £20 a month. On top of all of this, you need to factor in veterinary costs if you want to share your home with a Korat and this includes their initial vaccinations, their annual boosters, the cost of neutering or spaying a cat when the time is right and their yearly health checks, all of which quickly adds up to over £500 a year. As a rough guide, the average cost to keep and care for a Korat would be between £30 to £50 a month depending on the level of insurance cover you opt to buy for your cat, but this does not include the initial cost of buying a well-bred kitten. Click 'Like' if you love Korats. © Copyright - Pets4Homes.co.uk (2017) - Pet Media Ltd
Browse Subject Areas Click through the PLOS taxonomy to find articles in your field. For more information about PLOS Subject Areas, click here. • Loading metrics Emergence of Swarming Behavior: Foraging Agents Evolve Collective Motion Based on Signaling • Olaf Witkowski , Affiliations Department of Interdisciplinary Studies, Graduate School of Arts and Sciences, The University of Tokyo, 3-8-1 Komaba, Meguro-ku 153-8902 Tokyo, Japan, ELSI Origins Network, Earth-Life Science Institute, Tokyo Institute of Technology, 2-12-1-IE-1 Ookayama, Meguro-ku 152-8550 Tokyo, Japan • Takashi Ikegami • Olaf Witkowski,  • Takashi Ikegami Swarming behavior is common in biology, from cell colonies to insect swarms and bird flocks. However, the conditions leading to the emergence of such behavior are still subject to research. Since Reynolds’ boids, many artificial models have reproduced swarming behavior, focusing on details ranging from obstacle avoidance to the introduction of fixed leaders. This paper presents a model of evolved artificial agents, able to develop swarming using only their ability to listen to each other’s signals. The model simulates a population of agents looking for a vital resource they cannot directly detect, in a 3D environment. Instead of a centralized algorithm, each agent is controlled by an artificial neural network, whose weights are encoded in a genotype and adapted by an original asynchronous genetic algorithm. The results demonstrate that agents progressively evolve the ability to use the information exchanged between each other via signaling to establish temporary leader-follower relations. These relations allow agents to form swarming patterns, emerging as a transient behavior that improves the agents’ ability to forage for the resource. Once they have acquired the ability to swarm, the individuals are able to outperform the non-swarmers at finding the resource. The population hence reaches a neutral evolutionary space which leads to a genetic drift of the genotypes. This reductionist approach to signal-based swarming not only contributes to shed light on the minimal conditions for the evolution of a swarming behavior, but also more generally it exemplifies the effect communication can have on optimal search patterns in collective groups of individuals. The ability of fish schools, insect swarms or starling murmurations to shift shape as one and coordinate their motion in space has been studied extensively because of their implications for the evolution of social cognition, collective animal behavior and artificial life [16]. Swarming is the phenomenon in which a large number of individuals organize into a coordinated motion. Using only the information at their disposition in the environment, they are able to aggregate together, move en masse or migrate towards a common direction. The movement itself may differ from species to species. For example, fish and insects swarm in three dimensions, whereas herds of sheep move only in two dimensions. Moreover, the collective motion can have quite diverse dynamics. While birds tend to flock in relatively ordered formations with constant velocity, fish schools change directions by aligning rapidly and keeping their distances, and most insects swarms (with perhaps exceptions such as locusts [7]) move in a messy and random-looking way [810]. Numerous evolutionary hypotheses have been proposed to explain swarming behavior across species. These include more efficient mating, good environment for learning, combined search for food resources, and reducing risks of predation [11]. Pitcher and Partridge [12] also mention energy saving in fish schools by reducing drag. In an effort to test the multiple theories, the past decades counted several experiments involving real animals, either inside an experimental setup [1315] or observed in their own ecological environment [16]. Those experiments present the inconvenience to be costly to reproduce. Furthermore, the colossal lapse of evolutionary time needed to evolve swarming makes it almost impossible to study the emergence of such behavior experimentally. Computer modeling has recently provided researchers with new, easier ways to test hypotheses on collective behavior. Simulating individuals on machines offers easy modification of setup conditions and parameters, tremendous data generation, full reproducibility of every experiment, and easier identification of the underlying dynamics of complex phenomena. From Reynolds’ boids to recent approaches Reynolds [17] introduces the boids model simulating 3D swarming of agents called boids controlled only by three simple rules: • Alignment: move in the same direction as neighbours • Cohesion: remain close to neighbours • Separation: avoid collisions with neighbours These rules can be translated into differential equations based on the velocity of each boid: (1) The position of each boid is updated by the computed velocity iteratively. The attraction and repulsion terms are represented by the first and second term, respectively. Each rule has an interaction range around each agent and is respectively denoted by Sc, Ss and Sa. In the equation, the amplitudes of those interactions are respectively wc, ws, and wa, and the speed amplitude is typically bounded between values vmin and vmax. Various works have since then reproduced swarming behavior, often by the means of an explicitly coded set of rules. For instance, Mataric [18] proposes a generalization of Reynolds’ original model with an optimally weighted combination of six basic interaction primitives (namely, collision avoidance, following, dispersion, aggregation, homing and flocking). Vicsek [6] models the swarming of point particles, moving at a constant speed, in the average direction of motion of the local neighbors with some added noise. Hartman and Benes [19] come up with yet another variant of the original model, by adding a complementary force to the alignment rule, that they call change of leadership. Many other approaches have been based on informed agents or fixed leaders [2022]. Unfortunately, in spite of the insight this kind of approach brings into the dynamics of swarming, it shows little about the pressures leading to its emergence. For that reason, experimenters attempted to simulate swarming without a fixed set of rules, rather by incorporating into each agent an artificial neural network brain that controls its movements, namely using the evolutionary robotics approach. The swarming behavior is evolved by copy with mutations of the chromosomes encoding the neural network parameters. By comparing the impact of different selective pressures, this type of methodology, first used in [23] to solve optimization problems, eventually allowed to study the evolutionary emergence of swarming. Tu and Terzopoulos [24] have swarming emerge from the application of artificial pressures consisting of hunger, libido and fear. Other experimenters have analyzed prey/predator systems to show the importance of sensory system and predator confusion in the evolution of swarming in preys [25, 26]. In spite of many pressures hypothesized to produce swarming behavior, designed setups presented in the literature are often complex and specific. Previous works typically introduce models with very specific environments, where agents are designed to be more sensitive to particular inputs. While they are bringing valuable results to the community, one may wonder about with a more general, simpler design. Recently, studies such as in Torney et al. [27] successfully showed the advantages of signaling to climb environmental gradients. However, these models hard-code the fact that individuals turn towards each other based on the signals they emit, unlike the evolutionary robotics approach mentioned previously which attempts to have the swarming behavior evolve. Collective navigation has also been shown to allow for a dampening of the stochastic effects of individual sampling errors, helping groups climb gradients [28, 29]. This effect has also been highlighted for migration [30, 31]. Finally, even when studies focus on fish or insects, which swarm in 3D [26], most keep their model in 2D. While swarming is usually robust against dimensionality change, the coding for such behavior from 2D to 3D has been shown to require a non-trivial mapping, in the sense that the dependence on parameters can vary case by case [32]. Indeed, the addition of a third degree of freedom may enable agents to produce significantly distinct and more complex behaviors. Signaling agents in a resource finding task This paper studies the emergence of swarming in a population of agents using a basic signaling system, while performing a simple resource gathering task. Simulated agents move around in a three dimensional space, looking for a vital but invisible food resource randomly distributed in the environment. The agents are emitting signals that can be perceived by other individuals’ sensors within a certain radius. Both agent’s motion and signaling are controlled by an artificial neural network embedded in each agent, evolved over time by an asynchronous genetic algorithm. Agents that consume enough food are enabled to reproduce, whereas those whose energy drops to zero are removed from the simulation. Each experiment is performed in two steps: training the agents in an environment with resource locations providing fitness, then testing in an environment without fitness. During the training, we observe that the agents progressively come to coordinate into clustered formations. That behavior is then preserved in the second step. Such patterns do not appear in control experiments having the simulation start directly from the second phase, with the absence of resource locations. This means that the presence of the resource is needed to make the clustered swarming behavior appear. If at any point the signaling is switched off, the agents immediately break the swarming formation. A swarming behavior is only observed once the communication is turned back on. Furthermore, the simulations with signaling lead to agents gathering very closely around food patches, whereas control simulations with silenced agents end up with all individuals wandering around erratically. The main contribution of this work is to show that collective motion can originate, without explicit central coordination, from the combination of a generic communication system and a simple resource gathering task. As a secondary contribution, our model also demonstrates how swarming behavior, in the context of an asynchronous evolutionary simulation, can lead to a neutral evolutionary space, where no more selection is applied on the gene pool. A specific genetic algorithm with an asynchronous reproduction scheme is developed and used to evolve the agents’ neural controllers. In addition, the search for resource is shown to improve from the agents clustering, eventually leading to the agents gathering closely around goal areas. An in-depth analysis shows increasing information transfer between agents throughout the learning phase, and the development of leader/follower relations that eventually push the agents to organize into clustered formations. Agents in a 3D world We simulate a group of agents moving around in a continuous, toroidal arena of 600.0 × 600.0 × 600.0 (in arbitrary units). Each agent is characterized by the internal neural network (i.e. neural states xi and the connections among them wij), 6 inputs Ii (i = 1, 2, … , 6) and 3 outputs Oi (i = 1, 2, 3) computed from the inputs through the neural network. The agents have energy which is consumed by their moving around. If at any point an agent’s energy drops to zero, the agent is dead and is immediately removed from the environment. The agent’s position is determined by three floating point coordinates between 0.0 and 600.0. Each agent is positioned randomly at the start of the simulation, and then moves at a fixed speed of 1.0 arbitrary unit per iteration. The navigation schema of each agent consists of 3 steps. 1. The agent’s velocity is updated by the following equation; (2) from the two Euler angles (ψ for the agent’s pitch (i.e. elevation) and θ for the agent’s yaw (i.e. heading)) at the previous time step. Fig 1 illustrates the Euler angles, as they are used in our model. 2. The angles are updated as follows: (3) while the norm of the velocity is kept constant (like in [6]). 3. The position of agent i is then updated according to its current velocity with, instead of Eq 1: (4) Fig 1. Illustration of Euler angles. ψ corresponds to the agent’s pitch (i.e. elevation) and θ is the agent’s yaw (i.e. heading). The agent’s roll ϕ is not used in this paper. We iterate the three steps in order to determine the next positions and velocities of each agent. In order to compute the second step above, we need to calculate the outputs of neural networks. Agents controlled by neural networks A neural network consists of 6 sensors, a fully connected 10-neurons hidden layer and 3 output neurons that encode two motor outputs and one which produces the communication signal. Each sensor and output state takes continuous values between 0 and 1, but the output states are converted into two Euler angles (see in the previous section) and one communication signal. Each activation state yi of a neuron i takes a value in the interval between 0 and 1 and is updated according to: (5) where wji the weight from neuron j to neuron i, and σ is the sigmoid function defined as: (6) with β the slope parameter. The connections between neurons are defined according to the architecture shown in Fig 2. Each connection’s weight wji in the neural network takes continuous values between 0 and 1. The connection weights are put into a gene string which constitutes the agent’s genotype, and is then evolved using a specific genetic algorithm described below. Fig 2. Architecture of the agent’s controller, a recursive neural network composed of 6 input neurons (I1 to I6), 10 hidden neurons (H1 to H10), 10 context neurons (C1 to C10) and 3 output neurons (O1 to O3). The input neurons receive signal values from neighboring agents, with each neuron corresponding to signals received from one of the 6 sectors in space. The output neurons O1 and O2 control the agent’s motion, and O3 controls the signal it emits. The context neurons have connections from and to the hidden layer, thus creating a feedback allowing for a state maintenance effect. Communication among agents Every agent is capable of sending signals with intensities (signals are encoded as floating point values ranging from 0.0 to 1.0). One of three outputs, O3, is assigned as a signal. Six input sensors (Ii (i = 1, 2, … , 6)) of each agent are to detect signals produced by other agents. The sensors are put on the front, rear, left, right, top and bottom of the agent’s spherical body and collect inputs up to a distance of 100 units from 6 directions, respectively. The distance to the source proportionally affects the intensity of a received signal, and signals from agents above a 100-distance are ignored. The sensor whose direction is the closest to the signaling source receives one float value, equal to the sum of every signal emitted within range, divided by the distance, and normalized between 0 and 1. Genetic algorithm and an asynchronous reproduction scheme Genetic algorithms [3335] simulate the descent with modification of a population of chromosomes, selected generation after generation by a defined fitness function. Our model differs from the usual genetic algorithm paradigm, in that it designs variation and selection in an asynchronous way, similarly to steady state genetic algorithms in [36, 37]. The reproduction takes place continuously throughout the simulation, creating overlapping generations of agents. This allows for a more natural, continuous model, as no global clock is defined that could bias the results. Practically we iterate the following evolution dynamics in this order: 1. Every new agent is born with an energy equal to 2.0. 2. Each agent can lose a variable amount of energy depending on the behavior during a given period. More precisely, agents spend a fixed amount of energy for movement Cmov (0.01 per iteration) and a variable amount of energy Csig for signaling costs (0.001 ⋅ Isig per iteration where Isig is the signal intensity). 3. Each agent can gain at time t from an energy source by where r is the reward value and di is the agent’s distance to the center of the energy source. The reward falls off inversely proportionally to d. 4. A total sum of energy Fi is computed, which is adjusted such that the population size remains between 150 and 250 agents. This adjustement is given by introducing the cost factor c as follows: Fi(t) = Ric ⋅ (Cmov(t)−Csig(t)). 5. Whenever an agent accumulates 10.0 in its energy value, a replica of itself with a 5% mutation in the genotype is created and added to a random position in the arena (the choice for random initial positions is to avoid biasing the proximity of agents, so that reproduction does not become a way for agents to create local clusters). Each mutation changes the value of an allele by an offset value picked uniformly at random between −0.05 and 0.05. The agent’s energy is decreased by 8.0 and the new replica’s energy is set to 2.0. 6. Every 5000 iterations, the energy source site is randomly reassigned. There are a few remarks in running this evolution schema. First, a local reproduction scheme (i.e. giving birth to offspring close to their parents) leads rapidly to a burst in population size (along with an evolutionary radiation of the genotypes), as the agents that are close to the resource create many offspring that will be very fit too, thus able to replicate very fast as well. This is why we choose to introduce newborn offspring randomly in the environment. On a side note, population bursts occur solely when the neighborhood radius is small (under 10), while values over 100 do not lead to population bursts. Second, for the genetic algorithm to be effective, the number of agents must be maintained above a certain level. Also, the computation power limits the population size. Third, the energy value allowed to the agents is therefore adjusted in order to maintain an ideal number as close as possible to 200 (and always comprised between 50 and 1000, passed which there is respectively no removal or reproduction of agents allowed) agents alive throughout the simulation. The way it is done in practice is by adjusting the energy cost of every agent by a multiplying factor 1.0001 if the population is higher than 250 individuals and a divide it by 1.01 if the population is lower than 150. Finally, the agents above a certain age (5000 time steps) are removed from the simulation, to keep the evolution moving at an adequate pace. Experimental setup Additional to the above evolution schema, we executed the simulation in two steps: training and testing: In the training step, the resource locations are randomly distributed over the environment space. In the testing step, the fitness function is ignored, and the resource is simply distributed equally among all the agents, meaning that they all receive an equal share of resource sufficient to keep them alive. As a consequence, the agents do not die off, and that second step conserves the same population of individuals, in order to test their behavior. From this point, whenever not mentioned otherwise, the analyses are referring to the first step, during which the swarming behavior comes about progressively. The purpose of the second step of the experiment is uniquely aimed at checking the behavior of the resulting population of agents without resources, that is to say, without reproduction, as the cost in energy is controlled to maintain the population in a reasonable interval. The parameter values used in the simulations are detailed in Table 1. Emergence of swarming Agents are observed coordinating together in clustered groups. As shown in Fig 3 (top) the simulation goes through three distinct phases. In the first one, agents wander in an apparently random way across the space. During the second phase, the agents progressively cluster into a rapidly changing shape, reminiscent of animal flocks (as mentioned in the introduction, swarming can take multiple forms depending on the situation and/or the species, and is reminiscent of the swarming of mosquitoes or midges in this case). In the third phase, towards the end of the simulation, the flocks get closer and closer to the goal, forming a compact ball around it. Although results with one goal are presented in the paper, same behaviors were observed in the case of two or more resource spots. Fig 3. Visualization of the three successive phases in the training procedure (from left to right: t = 0, t = 2 ⋅ 105, t = 2 ⋅ 107) in a typical run. The simulation is with 200 initial agents and a single resource spot. At the start of the simulation the agents have a random motion (a), then progressively come to coordinate in a dynamic flock (b), and eventually cluster more and more closely to the goal towards the end of the simulation (c). The agents’ colors represent the signal they are producing, ranging from 0 (blue) to 1 (red). The goal location is represented as a green sphere on the visualization. Fig 4 shows more in detail the swarming behavior taking place in the second phase. The agents coordinate in a dynamic, quickly changing shape, continuously extending and compressing, while each individual is executing fast paced rotations on itself. Note that this fast rotation seems to be needed to evolve swarming, as all trials with slower rotation settings never achieved this kind of dynamics. A fast rotation allows indeed each agent to react faster to the environment, as each turn making one sensor face a particular direction allows a reaction to the signals coming from that direction. The faster the rotation, the more the information gathered by the agent about its surroundings is balanced for every direction. The agents are loosely coupled, and one regularly notices some agents reaching the border of a swarm cluster, leaving the group, and ending up coming back in the heart of the swarm. Fig 4. Visualization of the swarming behavior occurring in the second phase of the simulation. The figure represents consecutive shots each 10 iterations apart in the simulation. The observed behavior shows agents flocking in dynamic clusters, rapidly changing shape. In spite of the agents needing to pay a cost for signaling (cf. description of the model above), we observe the signal to remain mostly between 0.2 and 0.5 during the whole experiment (in the case with signaling activated). We choose to measure swarming behavior in agents by looking at the average number of neighbors within a radius of 100 distance around each agent. Fig 5 shows the evolution of the average number of neighbors, over 10 different runs, respectively with signaling turned on and off. A much higher value is reached around time step 105 in the signaling case, while the value remains for the silent control. The swarming emerges only with the signaling switched on, and as soon as the signaling is silenced, the agents rapidly stop their swarming behavior and start wandering randomly in space. Fig 5. Comparison of the average number of neighbors (average over 10 runs, with 106 iterations) in the case signaling is turned on versus off. We also want to measure the influence of each agent on its neighborhood, and vice versa. To do so, we use a measure of information transfer, to detect asymmetry in the interaction of subsystems [38]. The measure is to be applied on the time series of recorded states for different agents, and is based upon Shannon entropy. In the following, we first introduce the measure, then explain how we use it on our simulations. Transfer entropy measure Shannon entropy H represents the uncertainty of a variable [39]. For a probability p(x), where x is the state of each agent (in our case we choose the instantaneous velocity), it is defined by: (7) The mutual information I between two variables X and Y can be expressed as: (8) where H(Y) is the uncertainty of Y and H(Y|X) is the uncertainty of Y knowing X. The direction of causality is difficult to detect with mutual information, because of the symmetry: M(X, Y) = MI(Y, X) [40]. The transfer entropy from a time series X to another time series Y is a measure of the amount of directed transfer of information from X to Y. It is formally defined as the amount of uncertainty reduced in future values of Y by knowing a time window of h past values of X. This is written as follows: (9) where Xt−1: th and Yt−1: th are the past histories of length h for respectively X and Y, i.e. the h previous states counted backwards from the state at time t−1, and d is the time delay. Information flows in simulations In our case, as the processes are the agent’s velocities, and thus they take values in , we based our calculations on generalizations to multivariate and continuous variables as proposed in [4043]. To study the impact of each agent on its neighborhood, the inward average transfer entropy on agent’s velocities is computed between each neighbor within a distance of 100.0 and the agent itself: (10) We will refer to this measure as inward neighborhood transfer entropy (NTE). This can be considered a measure of how much the agents are “following” their neighborhood at a given time step. The values rapidly take off on the regular simulation (with signaling switched on), while they remain low for the silent control, as we can see for example in Fig 6. Fig 6. Plot of the average inward neighborhood transfer entropy for signaling switched on (red curve) and off (blue curve). The inward neighborhood transfer entropy captures how much agents are “following” individuals located in their neighborhood at a given time step. The values rapidly take off on the regular simulation (with signaling switched on, see red curve), whereas they remain low for the silent control (with signaling off, see blue curve). Similarly, we can calculate the outward neighborhood transfer entropy (i.e. the average transfer entropy from an agent to its neighbors). We may look at the evolution of this value through the simulation, in an attempt to capture the apparition of local leaders in the swarm clusters. Even though the notion of leadership is hard to define, the study of the flow of information is essential in the study of swarms. The single individuals’ outward NTE shows a succession of bursts coming every time from different agents, as illustrated in Fig 7. This frequent switching of the origin of information flow can be interpreted as a continual change of leadership in the swarm. The agents tend to follow a small number of agents, but this subset of leaders is not fixed over time. Fig 7. Plot of the individual outward neighborhood transfer entropy (NTE), aiming to capture the change in leadership. Detail from 4.75 104 to 5.45 104 time steps. The plot represents the average transfer entropy from an agent to its neighbors, capturing the presence of local leaders in the swarming clusters. Each color corresponds to a distinct agent. A succession of bursts is observed, each corresponding to a different agent, indicating a continual change of leadership in the swarm. On the upper graph in Fig 8, between iteration 105 and 2 × 105, we see the average distance to the goal drop to values oscillating between roughly 50 and 300, that is the best agents reach 50 units away from the goal, while other agents remain about 300 units away. On the control experiment graph (Fig 8, bottom), we observe that the distance to the goal remains around 400. Fig 8. Average distance of agents to the goal with signaling (top) and a control run with signaling switched off (bottom). The average distance to the goal decreases between time step 105 and time step 2 × 105, the agents eventually getting as close as 50 units away from the goal on average. In the same conditions, the silenced control experiment results in agents constantly remaining around 400 units away from the goal in average. Swarming, allowed by the signaling behavior, allows agents to stick close to each other. That ability allows for a winning strategy in the case when some agents already are successful at remaining close to a resource area. Swarming may also help agents find goals in the fact that they constitute an efficient searching pattern. Whilst an agent alone is subject to basic dynamics making it spatially drift away, a bunch of agents is more able to stick to a goal area once it finds it, since natural selection will increase the density of surviving agents around those areas. In the control runs without signaling, it is observed that the agents, unable to form swarms, do not manage to gather around the goal in the same way as when the signaling is active. Controller response Once the training step is over, the neural networks of all agents are tested, and swarming agents are compared against non-swarming ones. In particular, we plotted on Fig 9 for a range of input values for the front sensor, the resulting motor output o1 (controlling the rotation of the velocity vector about the y axis) and the average activation of neurons in the context layer. In practice, this is equivalent to plotting the rotation rate against local agent density and against “memory activation”. We observed that characteristic shapes for the curve obtained with swarming agents presented a similarity (see Fig 9, top), and differed from the patterns of non-swarming agents (see Fig 9, bottom) which were also more diverse. Fig 9. Plots of evolved agents’ motor responses to a range of value in input and context neurons. The three axes represent signal input average values (right horizontal axis), context unit average level (left horizontal axis), and average motor responses (vertical axis). The top two graphs correspond to the neural controllers of swarming agents, and the bottom ones correspond to non-swarming ones’. In swarming individuals’ neural networks, patterns were observed leading to higher motor output responses in the case of higher signal inputs. This is characteristic of almost every swarming individual, whereas non-swarming agents present a wide range of response functions. A higher motor response allows the agent to slow down its course across the map by executing quick rotations around itself, therefore keeping its position nearly unchanged. If this behavior is adopted in the cases in which the signal is high, that is in the presence of signaling agents, the agent is able to remain close to them. Steeper slopes in the response curves in Fig 9 may consequently lead to more compact swarming patterns. Those swarming patterns are observed after longer simulation times. This dual pattern of motion is reminiscent of species such as Chlamydomonas reinhardtii [44]. This single-cell green alga moves by beating its two flagella either synchronously or asynchronously, leading respectively to spiraling along a rectilinear trajectory or rotating around a fixed axis. On the one hand signaling having a cost in energy, one expects it to be selected against in the long run since it lowers the survival chances of the individual. However, if the signaling behavior is beneficial to the agents, it may be selected for. But agents that do not signal may profit from the other agents’ signals and still swarm together. A value close to zero for the signal saves them a proportional cost of energy in signaling, hypothetically allowing those freeriders to spend less energy and eventually take over the living population. In order to study the agent’s choice of signaling over remaining silent, we examine the effect of artificially introducing silent agents in the population. To that purpose, during a run at the end of its training step, 5 agents are picked at random in the population, and their genotype is modified such that the value of the signal they produce becomes zero. Indeed, the values in each agent’s genotype encodes directly the weights of its artificial neural network. In order for the rest of the controller response to be identical, the only weights being changed are the ones of the connections to the signal output (O3 on the diagram in Fig 2). As a result, the modified (silent) agents take over the population, slowly replacing the signaling agents. As the signaling agents progressively disappear from the population (cf. Fig 10), so does the clustering behavior. About 200k iterations after the introduction of the freeriders, the whole population has been replaced by freeriders and the swarming behavior has stopped. This confirms silent freeriding as an advantageous behavior when a part of the population is already swarming, however leading to the advantageous swarming trait being eradicated from the population after a certain time. If we then let the simulation run, we observe that the signaling behavior will end up evolving again, after a variable time depending on the seed. Although it is not in the scope of this paper, further study could focus on how certain areas of the genetic space will influence the probability to evolve it again in a given simulation time. Fig 10. Invasion of freeriders resulting from the introduction of 5 silent individuals in the population. About 200k iterations after their introduction, the 5 freeriders have replicated and taken over the whole population. If there is an evolutionary advantage to swarming, and if that behavior relies on signaling, the absence of signaling directly reduces the swarm’s fitness. This is not the case however if the change in signaling intensity occurs progressively, slowly leading to a lower, cost-efficient signaling, while swarming is still maintained. We observe this effect of gradual decrease in average signal at Fig 11. Fig 11. Average signal intensity over the population versus evolutionary time (5 runs). The reason why in the original simulation, the whole population is not taken over by freeriders is that smaller changes to the genotype, smoothly making the signaling lower, is not going to invade the whole population in the same way. Indeed, in that case, the population is replaced by individuals signaling gradually less. In our evolutionary scheme, the genes controlling the signal intensity do not drop quickly enough to make the signal intensity drop to zero. Instead, a swarm will have its signal intensity drop down to a point where it is still fit enough to be selected for, against other groups, which illustrates a limited case of group selection. A detailed analysis of these dynamics is however not in the scope of this paper. Genotypic diversity The decisions of each agent are defined by the parameters describing its neural controller, which are encoded directly in each agent’s genotype. That genotype is evolved via random mutation and selection in the setup environment. In order to study the variety of the genotypes through the simulation, the average Shannon entropy [39] is calculated over the whole population using: (11) where pi is the frequency of genotype i. The frequency is the proportion of a particular combination of genes among all combinations being considered. The value of H ranges from 0 if all the genotypes are similar, to log n for evenly distributed genotypes, i.e. . It should be noted that as every allele (i.e. value in the genotype vector) takes a floating point value, we discretize those in 5 classes per value to allow for a measure of frequencies. H is used as a measure of genotypic variety and plotted against simulation time (Fig 12). The measure progressively decreases during the simulation, until it reaches a minimal value of 50 hartleys (information unit corresponding to a base 10 logarithm) around the millionth iteration, before restarting to increase, with a moderate slope. The fast drop in diversity is explained by a strong selection for swarming individuals in the first stage of the simulation. Once the advantageous behavior is reached, a genetic drift can be expected, resulting in genetic drift and reduced selection, as will be discussed further below. Fig 12. Genotypic diversity measured by Shannon’s information entropy. The information entropy measures the variety in the measure progressively decreases during the simulation, until it reaches a minimal value of 50 hartleys (information unit corresponding to a base 10 logarithm) around the millionth iteration, then restarts to increase slowly. The heterogeneity of the population is visualized on the phylogenetic tree at Fig 13. At the center of the graph is the root of the tree, which corresponds to time zero of the simulation, from which start the 200 initial branches, i.e. initial agents. As those branches progress outward, they create ramifications that represent the descendance of each agent. The time step scale is preserved, and the segment drawn below serves as a reference for 105 iterations. Every fork corresponds to a newborn agent. The parent forks counterclockwise, and the newborn forks clockwise. Therefore, every “fork burst” corresponds to a period of high fitness for the concerned agents. Fig 13. Phylogenetic tree of agents created during a run. The center corresponds to the start of the simulation. Each branch represents an agent, and every fork corresponds to a reproduction process. In Fig 14, one can observe another phylogenetic tree, represented horizontally in order to compare it to the average number of neighbors throughout the simulation. The neighborhood becomes denser around iteration 400k, showing a higher portion of swarming agents. This leads to a firstly strong selection of the agents able to swarm together over the other individuals, a selection that is soon relaxed due to the signaling pattern being largely spread, resulting in a heterogeneous population, as we can see on the upper plot, with numerous branches towards the end of the simulation. Fig 14. Top plot: average number of neighbors during a single run. Bottom plot: agents phylogeny for the same run. The roots are on the left, and each bifurcation represents a newborn agent. The two plots show the progression of the average swarming in the population, indicated by the average number of neighbors through the simulation, compared with a horizontal representation of the phylogenetic tree. Around iteration 400k, when the neighborhood becomes denser, the selection on agents’ ability to swarm together is apparently relaxed due to the signaling pattern being largely spread. This leads to higher heterogeneity, as can be seen on the upper plot, with numerous genetic branches forming towards the end of the simulation. The phylogenetic tree shows some heterogeneity, and the average number of neighbors is a measure of swarming in the population. The swarming takes off around iteration 400k, where there seems to be a genetic drift, but the signaling helps agents form and maintain swarms. To study further the relationship between heterogeneity and swarming, we classify the set of all the generated genotypes with a principal component analysis or PCA [45]. In practice, we operate an orthogonal transformation to convert the set of weights in every genotype into values of linearly uncorrelated variables called principal components, in such a way that the first principal component PC1 has the highest possible variance, and the second component PC2 has the highest variance possible while remaining uncorrelated with PC1. In Fig 15, we observe a large cluster on the left of the plot for PC1 ∈ [−1; 0], and a series of smaller clusters on the right for PC1 ∈ [3; 5]. The genotypes in the early stages of the simulation belong to the right clusters, but get to the left cluster later on, reaching a higher number of neighbors. Fig 15. Biplot of the two principal components of a PCA on the genotypes of all agents of a typical run, over one million iterations. Each circle represents one agent’s genotype, the diameter representing the average number of neighbors around the agent over its lifetime, and the color showing its time of death ranging from bright green (at time step 0, early in the simulation) to red (at time step 106, when the simulation approaches one million iterations). The classification shows a difference between early and late stages in terms of genotypic encoding of behavior. The genotypes are first observed to reach the left side cluster on the biplot, which differs in terms of the component PC1. It also corresponds to a more intensive swarming, as shown by the individuals’ average number of neighbors. The agents then remain in that cluster of values for the rest of the simulation. The timing of that first change corresponds to the first peak in number of neighbors, which is an index for the emergence of swarming. The agents’ genotypes then seem to evolve only slowly in terms of PC2, until they reach the last and highest peak in number of neighbors. This very slow and erratic increase is correlated with the slow drop in the radius of the clusters, due to steeper slopes of controller responses (see Fig 9) on long runs. In this work we have shown that swarming behavior can emerge from a communication system in a resource gathering task. We implemented a three-dimensional agent-based model with an asynchronous evolution through mutation and selection. The results show that from decentralized leader-follower interactions, a population of agents can evolve collective motion, in turn improving its fitness by reaching invisible target areas. The trajectories are reminiscent of swarms of cells such as Chlamydomonas, which alternate synchronous and asynchronous swimming using their two flagella [44]. However, the intention in this paper is not to imitate perfectly animal swarms in nature, but rather study how an approach from evolutionary robotics, with neural networks evolved via an asynchronous genetic algorithm, could lead to the emergence of such collective behavior. The obtained swarming genuinely corresponds to the conditions of the embodiment given to the agents in our simulation, which models a species unable to directly perceive its fitness landscape. The absence of sensors to detect gradients of resources forces the agents to find different ways to optimize their survival, thus letting them evolve a swarming behavior. This paper can as well be read through the lens of the evolutionary metaphor for a species performing an uninformed search for optimal ecological niches. In that case, the three-dimensional space becomes just an abstract representation of the role and position of the species in its environment, i.e. how it feeds, survives and reproduces. Our results represent an improvement on models that use hard-coded rules to simulate swarming. Here, the behavior is evolved with a simplistic model, based on each individual’s computation, which truly only perceive and act on their direct neighborhood, as opposed to a global process controlling all agents such as the boids introduced by [17]. The model also improves on previous research in the sense that agents naturally switch leadership and followership by exchanging information over a very limited channel of communication. Indeed, it does not rely on any explicit information from leaders like in [46, 20] and [21], nor does it even impose any explicit leader-follower relationship beforehand, letting simply the leader-follower dynamics emerge and self-organize. The swarming model presented in this paper offers a simple, general approach to the emergence of swarming behavior once approached via the boids rules. Other studies such as [26] and [25] have approached swarming without an explicit fitness. Although their simulation models a predator-prey ecology, the type of swarming they obtain from simple pressures is globally similar to the one in this study. However, a crucial difference is that our model presents the advantage of a simpler self-organized system merely based on resource finding and signaling/sensing. Our results also show the advantage of swarming for resource finding (it is only through swarming, enabled by signaling behavior, that agents are able to reach and remain around the goal areas), comparable to the advantages of particle swarm optimizations [23], here emerging in a model with a simplistic set of conditions. Contrary to previous work studying environmental gradients climbing [27], the motion leading to swarming was here not a coded behavior but rather evolved through generations of simulated agents. In the simulations, the agents progressively evolve the ability to flock using communication to perform a foraging task. We observe a dynamical swarming behavior, including coupling/decoupling phases between agents, allowed by the only interaction at their disposal, that is signaling. Eventually, agents come to react to their neighbors’ signals, which is the only information they can use to improve their foraging. This can lead them to either head towards or move away from each other. While moving away from each other has no special effect, moving towards each other, on the contrary, leads to swarming. Flocking with each other may make agents slow down their pace, which for some of them may keep them closer to a food resource. This creates a beneficial feedback loop, since the fitness brought to the agents will allow them to reproduce faster, and eventually spread the behavior within the whole population. In this scenario, agents do not need extremely complex learning to swarm and eventually get more easily to the resource, but rather rely on group dynamics emerging from their communication system to increase inertia and remain close to goal areas. The swarming constitutes an efficient dynamic search pattern, that improves the group’s chances to find resource. Indeed, the formation of a cluster slows agents down, allowing them to get more resource whenever they reach a favorable spot, which gives the agents more chance to replicate. Also, as a cluster, the agents are less likely to be wiped off because of some individuals drifting away from the resource. As long as the small mistakes are still corrected as newcomers join the group, the swarm can be sustained. Importantly, such dynamic swarming pattern is only observed in the transient phase, when the agents are still moving across the map, i.e. before any group has stabilized its position around a fixed resource area, thus making the swarms more and more compact. Lastly, we provide five ending remarks about the swarming dynamics uncovered in this paper: 1. The simulation allows for strong genetic heterogeneity due to the asynchronous reproduction schema, as could be visualized in the phylogenetic tree. Such genetic, and thus behavioral heterogeneity may suppress swarming but the evolved signaling helps the population to form and keep swarming. The simulations do not exhibit strong selection pressures to adopt specific behavior apart from the use of signaling. Without high homogeneity in the population, the signaling alone allows for interaction dynamics sufficient to form swarms, which proves in turn to be beneficial to get extra fitness, as mentioned above. The results suggest that by coordinating in clusters, the agents enter an evolutionary neutral space [47], where little selection is applied to their genotypes. The formation of swarms acts as a shield on the selection process, as a consequence allowing for the genotypes to drift. This relaxation of selection can be compared to a niche construction, in which the system is ready to adapt to further optimizations to the surrounding environment. This may be examined in further research by the addition of a secondary task. 2. In the presented model, the population of genotypes progressively reaches the part of the behavioral search space that corresponds to swarming, as it helps agents achieve a higher fitness. The behavioral transition between non-swarming and swarming happens relatively abruptly, and can be caused by either the individual behavior improving enough or the population dynamical state satisfying certain conditions, or a combination of both. The latter one is highlighted by the variable amount of time necessary before swarms can reform after the positions have been randomized, thus illustrating the concept of collective memory in groups of self-propelled individuals. Indeed, although one agent’s behavior is dictated by its genotype, the swarming also depends on the collective state of the neighborhood. Couzin et al. [4] brought to attention that even for identical individual behaviors, the previous history of a group structure can change its dynamics. In the light of that fact, reaching the neutral space relies on more than just the individual’s genetic heritage. 3. The swarming behavior that our model demonstrates in phase 2, before it starts overfitting in phase 3, may be an example of emergence of criticality in living systems [48]. The coevolutionary and coadaptive mechanisms by which populations of agents converge to be almost critical, in the process of interacting together and forming a collective entity, is typically demonstrated in phase 2, showing agents reaching this critical evolutionary solution in their striving to cope in a complex environment. 4. The leadership in the simulated swarms is not fixed, but temporally changing, as shown by our measures of the transfer entropy among agents. This dynamic alternation of leaders may change depending on the swarm approaching or getting away from food sites. The initiation of leadership is an interesting open question for simulating swarming behaviors, which should be examined in further work. 5. The phenomenon of freeriding, observed when artificially introducing silent individuals, is comparable to a tragedy of the commons (ToC) or an evolutionary suicide, in which an evolved selfish behavior can harm the whole population’s survival [49, 50]. This effect, here provoked artificially, is however unlikely to happen in our setup, as the decrease in produced signal intensity would progressively result in an inefficient performance, with a smooth decrease of fitness over the search space. The ToC has better chances to arise in a setup with a larger map, in which parts of the population can be isolated for a longer time, leading to different populations evolving separately, until they meet again and confront their behaviors. Author Contributions Conceived and designed the experiments: OW TI. Performed the experiments: OW. Analyzed the data: OW TI. Contributed reagents/materials/analysis tools: OW. Wrote the paper: OW TI. 1. 1. Bonabeau E., Dorigo M., and Theraulaz G. (1999). Swarm intelligence: from natural to artificial systems (No. 1). Oxford University Press. 2. 2. Cavagna A., Cimarelli A., Giardina I., Parisi G., Santagati R., Stefanini F. et al. (2010). Scale-free correlations in starling flocks. Proceedings of the National Academy of Sciences, 107(26), 11865–11870. 3. 3. Couzin I. D. (2009). Collective cognition in animal groups. Trends in cognitive sciences, 13(1):36–43. pmid:19058992 4. 4. Couzin I. D., Krause J., James R., Ruxton G. D., and Franks N. R. (2002). Collective memory and spatial sorting in animal groups. Journal of theoretical biology, 218(1):1–11. pmid:12297066 5. 5. D’Orsogna M. R., Chuang Y. L., Bertozzi A. L., and Chayes L. S. (2006). Self-propelled particles with soft-core interactions: patterns, stability, and collapse. Physical review letters, 96(10), 104302. pmid:16605738 6. 6. Vicsek T., Czirók A., Ben-Jacob E., Cohen I., and Shochet O. (1995). Novel type of phase transition in a system of self-driven particles. Physical review letters, 75.6 (1995): 1226. 7. 7. Buhl J., Sumpter D. J., Couzin I. D., Hale J. J., Despland E., Miller E. R. et al. (2006). From disorder to order in marching locusts. Science, 312.5778 (2006): 1402–1406. 8. 8. Budrene E. O., Berg H. C. (1991). Complex patterns formed by motile cells of escherichia coli. Nature, 349(6310):630–633. pmid:2000137 9. 9. Czirók A., Barabási A.-L., and Vicsek T. (1997). Collective motion of self-propelled particles: Kinetic phase transition in one dimension. arXiv preprint cond-mat/9712154. 10. 10. Shimoyama N., Sugawara K., Mizuguchi T., Hayakawa Y., and Sano M. (1996). Collective motion in a system of motile elements. Physical Review Letters, 76(20):3870. pmid:10061130 11. 11. Zaera, N., Cliff, D., and Janet, B. (1996). Not) evolving collective behaviours in synthetic fish. In Proceedings of International Conference on the Simulation of Adaptive Behavior. Citeseer. 12. 12. Pitcher T. and Partridge B. (1979). Fish school density and volume. Marine Biology, 54(4):383–394. 13. 13. Ballerini M., Cabibbo N., Candelier R., Cavagna A., Cisbani E., Giardina I. et al. (2008). Interaction ruling animal collective behavior depends on topological rather than metric distance: Evidence from a field study. Proceedings of the National Academy of Sciences, 105(4):1232–1237. 14. 14. Katz Y., Tunstrøm K., Ioannou C. C., Huepe C., and Couzin I. D. (2011). Inferring the structure and dynamics of interactions in schooling fish. Proceedings of the National Academy of Sciences, 108(46):18720–18725. 15. 15. Partridge B. L. (1982). The structure and function of fish schools. Scientific american, 246(6):114–123. 16. 16. Parrish J. K. and Edelstein-Keshet L. (1999). Complexity, pattern, and evolutionary trade-offs in animal aggregation. Science, 284(5411):99–101. 17. 17. Reynolds C. W. (1987). Flocks, herds and schools: A distributed behavioral model. In ACM SIGGRAPH Computer Graphics, volume 21, pages 25–34. ACM. 18. 18. Mataric M. J. (1992). Integration of representation into goal-driven behavior-based robots. Robotics and Automation, IEEE Transactions on, 8(3):304–312. 19. 19. Hartman C. and Benes B. (2006). Autonomous boids. Computer Animation and Virtual Worlds, 17(3–4):199–206. 20. 20. Cucker F. and Huepe C. (2008). Flocking with informed agents. Mathematics in Action, 1(1):1–25. 21. 21. Su H., Wang X., and Lin Z. (2009). Flocking of multi-agents with a virtual leader. Automatic Control, IEEE Transactions on, 54(2):293–307. 22. 22. Yu W., Chen G., and Cao M. (2010). Distributed leader—follower flocking control for multi-agent dynamical systems with time-varying velocities. Systems & Control Letters, 59(9):543–552. 23. 23. Eberhart, R. C. and Kennedy, J. (1995). A new optimizer using particle swarm theory. In Proceedings of the sixth international symposium on micro machine and human science, volume 1, pages 39–43. New York, NY. 24. 24. Tu, X. and Terzopoulos, D. (1994). Artificial fishes: Physics, locomotion, perception, behavior. In Proceedings of the 21st annual conference on Computer graphics and interactive techniques, pages 43–50. ACM. 25. 25. Olson R. S., Hintze A., Dyer F. C., Knoester D. B., and Adami C. (2013). Predator confusion is sufficient to evolve swarming behaviour. Journal of The Royal Society Interface, 10(85):20130305. 26. 26. Ward C. R., Gobet F., and Kendall G. (2001). Evolving collective behavior in an artificial ecology. Artificial life, 7(2):191–209. pmid:11580880 27. 27. Torney C. J., Berdahl A., and Couzin I. D. (2011). Signalling and the evolution of cooperative foraging in dynamic environments. PLoS Comput Biol, 7(9): e1002194. pmid:21966265 28. 28. Grünbaum D. (1998). Schooling as a strategy for taxis in a noisy environment. Evolutionary Ecology, 12(5), 503–522. 29. 29. Simons A. M. (2004). Many wrongs: the advantage of group navigation. Trends in ecology & evolution, 19(9), 453–455. 30. 30. Berdahl A., Westley P. A., Levin S. A., Couzin I. D., and Quinn T. P. (2014). A collective navigation hypothesis for homeward migration in anadromous salmonids. Fish and Fisheries. 31. 31. Mueller T., O’Hara R. B., Converse S. J., Urbanek R. P., and Fagan W. F. (2013). Social learning of migratory performance. Science, 341(6149), 999–1002. pmid:23990559 32. 32. Sayama, H. (2012). Morphologies of self-organizing swarms in 3d swarm chemistry. In Proceedings of the fourteenth international conference on Genetic and evolutionary computation conference, pages 577–584. ACM. 33. 33. Bremermann H. J. (1962). Optimization through evolution and recombination. Self-organizing systems, pages 93–106. 34. 34. Fraser A. (1960). Simulation of genetic systems by automatic digital computers vii. effects of reproductive ra’l’e, and intensity of selection, on genetic structure. Australian Journal of Biological Sciences, 13(3):344–350. 35. 35. Holland J. (1975). Adaptation in natural and artificial systems: An introductory analysis with applications to biology, control, and artificial intelligence. 36. 36. Nishimura S. and Ikegami T. (1997). Emergence of collective strategies in a prey-predator game model. Artificial Life, 3(1):243–260. pmid:9654781 37. 37. Syswerda G. (1991). A study of reproduction in generational and steady state genetic algorithms. Foundations of genetic algorithms, 2, 94–101. 38. 38. Schreiber T. (2000). Measuring information transfer. Phys. Rev. Lett., 85:461–464. pmid:10991308 39. 39. Shannon C. E.. and Weaver W. (1949). The mathematical theory of communication. Urbana, IL: University of Illinois Press. 40. 40. Vicente R., Wibral M., Lindner M., and Pipa G. (2011). Transfer entropy model-free measure of effective connectivity for the neurosciences. Journal of computational neuroscience, 30(1):45–67. pmid:20706781 41. 41. Kaiser A. and Schreiber T. (2002). Information transfer in continuous processes. Physica D: Nonlinear Phenomena, 166(1):43–62. 42. 42. Lizier J. T., Heinzle J., Horstmann A., Haynes J.-D., and Prokopenko M. (2011). Multivariate information-theoretic measures reveal directed information structure and task relevant changes in fmri connectivity. Journal of Computational Neuroscience, 30(1):85–107. pmid:20799057 43. 43. Wibral M., Pampu N., Priesemann V., Siebenhner F., Seiwert H., Lindner , et al. (2013). Measuring information-transfer delays. PLoS one, 8(2):e55809. pmid:23468850 44. 44. Polin M., Tuval I., Drescher K., Gollub J. P., Goldstein R. E. (2009). Chlamydomonas swims with two’gears’ in a eukaryotic version of run-and-tumble locomotion. Science, 325(5939), 487–490. pmid:19628868 45. 45. Pearson K. (1901). Principal components analysis. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, 6(2):559. 46. 46. Blondel V., Hendrickx J. M., Olshevsky A., and Tsitsiklis J. (2005). Convergence in multiagent coordination, consensus, and flocking. In IEEE Conference on Decision and Control, volume 44, page 2996. IEEE; 1998. 47. 47. Wright S. (1932). The roles of mutation, inbreeding, crossbreeding, and selection in evolution, volume 1. 48. 48. Hidalgo J., Grilli J., Suweis S., Muñoz M. A., Banavar J. R., Maritan A. (2014). Information-based fitness and the emergence of criticality in living systems. Proceedings of the National Academy of Sciences, 111(28), 10095–10100. 49. 49. Haldane J. B. S. (1990). The causes of evolution. No. 36, Princeton University Press. 50. 50. Hardin G. (1968). The tragedy of the commons. Science 162(3859), 1243–1248. pmid:5699198