text
stringlengths
144
682k
Keywords: Chinese medicine     Life activities of the human body by heart kept beating to blood and oxygen supply to the heartbeat once stopped, it means that the end of life. Neijing the heart of the monarch official records of the internal organs of the Lord “, the heart of great significance in the activities of human life.     Chinese medicine believes that the heart is kept beating by Heart yang “function. So, the “Su Wen the · six viscera ‘, said:" The heart is the sun in the sun through the summer air. “Su asked · Synopsis of true speech said:" yang yang heart. “The mind is a fire. “"Su asked the yin and yang as big," said: “The heart is the fire dirty". The so-called “summer gas", “Sun", “yang yang" refers to the heart, there is a yang hot gas, equivalent to “heat", so the ancients used to “fire" to describe it, this has fiery nature yang, often to maintain a certain amount to maintain physiological functions such as blood circulation, stomach transport and renal water is very inviting, can not do without this yang. Yang is the driving force behind the activities of human life.
The Other CSA: What Is Climate-Smart Agriculture? There’s a pretty fair chance you’re going to start hearing a lot of references to “climate-smart agriculture” in the next few days (and very likely into the future, even after the stories of arrested protesters die down). It’s a complex term, especially in that it’s very easy to understand in the big picture and gets progressively more vague and confusing the more you try to learn about it. But! It’s also probably going to become a minor catchphrase, so let’s get into some specifics on what it means and why you should care. Climate-smart agriculture is a sort of overview concept originally put forth in 2010 by the UN’s Food and Agriculture Organization. Up until now it’s been a bit vague, a general idea about adjusting all forms of agriculture (“farms, crops, livestock, aquaculture, and capture fisheries”) to better adapt to a changing climate. It isn’t a set of guidelines, or even recommendations, really; it’s more of a philosophy that various global organizations are attempting to push. That philosophy: farming needs to involve significant investment, especially money, in developing technologies that can assist farmers as the climate changes; in transitioning farmers from current strategies to new climate-aware ones; and in encouraging farmers to abandon or lessen reliance on methods that increase greenhouse gas emissions. It’s necessarily vague because the needs of a taro farmer in a South Pacific island that may not exist in 20 years is different from the needs of a corn grower in Iowa or a rice farmer in Laos. The climate isn’t changing evenly throughout the world, and different places have wildly different needs. From our partners at But everyone agrees that climate change has and will have a disastrous or at least dramatic affect on agriculture. In general, the poorest and hottest countries will be the hardest hit; one typical study indicated that yields of maize in southern Africa could drop by more than 30% by 2030. Crops in tropical regions, it’s now believed, will be subject to droughts as well as temperature increases, which could be deadly. Many crops, like maize and rice, are already nearly hitting their tolerance for heat in regions of Africa and South America. This New York Times article lists some notable crops that’ll be adversely affected by climate change, from olives to tea to shellfish. In colder countries, the outlook isn’t as grim; European corn production could rise as temperature hikes actually increase its growing season. But that isn’t exactly a solution; Europe isn’t suffering food crises (even if the potato eventually has to be replaced by the banana), and shipping new European excesses to developing nations that are no longer able to grow their own food would have tremendous infrastructure obstacles. We already grow enough food to feed the planet; it’s infrastructure and transportation that leaves people hungry. The solutions, under the banner of climate-smart agriculture, typically involve new types of crops or new techniques for enriching soil and food output. Some examples, from a Huffington Post blogpost written by Dr. Jonathan Wadsworth of the Consultative Group on International Agricultural Research (CGIAR): Jeema Purty, a farmer in the Indian state of Odisha, is growing a drought-tolerant rice variety known as Sahbhagi dhan, meaning “rice developed through collaboration.” When Jeema started growing it, her harvests improved greatly and she was able to sell surplus grain at market. She re-invested her rice earnings and began growing vegetables, providing a more nutritious diet for her children. In Africa, drought tolerant maize developed by CGIAR and its partners has increased farmers’ yields by 20-30 percent, benefiting over 20 million people in 13 countries. In the Sahel, a climate-smart agroforestry practice that integrates food crops with trees that draw nitrogen from the air and transfer it to the soil has increased harvests by up to 400 percent, while capturing carbon and reducing greenhouse gas (GHG) emissions. CGIAR isn’t actually associated with the UN, the EU, or any other government, but is instead a group of 15 research centers housing scientists focused on assisting farmers in the tropics. The group works closely with the UN, individual countries, private businesses, and non-profits, but isn’t a division of a larger organization. CGIAR has been around for awhile, but today the group announced a huge change in their tactics and strategy: they will be committing 60% of their operating budget to creating climate-smart agriculture plans for 500 million farmers around the world. CGIAR is a major part of this week’s UN Climate Summit in New York, hosting talks to discuss climate-smart agriculture. This is, in large part, what the protesters that flooded Wall Street earlier this week were fighting for. (Image via CIAT) The Other CSA: What Is Climate-Smart Agriculture?
Acoma Pueblo The Sky City by Jay W. Sharp The storm came in the spring of that year, during the day, when all the people except for three ill women and a caretaker boy had descended from their pueblo atop Katzimo Mesa by way of Ladder Rock to plant corn, squash and beans in their communal fields in the surrounding desert plain. The storm struck with cosmic fury. Lightning ripped the sky, the thunder sounding like a duel of cannons. The rain – cascades of water – issued from the clouds. Runoff scoured drainages. The mesa-top village threatened to collapse, and the caretaker boy descended Ladder Rock through the fury of the storm to summon help. Just as he reached the bottom, "...he felt the ground quiver beneath his feet," said Charles Lummis, a journalist who recorded the story in the late nineteenth century, "A strange rushing sound filled his ears: and whirling about, he saw the great Ladder Rock rear, throw its head out from the cliff, reel there in instant in mid-air, and then go toppling out into the plain like some wounded Titan... The Ladder Rock had fallen—the unprecedented flood had undermined its sandy bed." After the storm, the people discovered, to their horror, that their mesa top home – a desert refuge – had been cut off. It – and the three ill women who had stayed behind that stormy day – now lay as far beyond reach as the mountains of the moon. Katzimo had become what Adolph Bandelier, a nineteenth century anthropologist and historian, would call "...a towering isolated mesa with vertical sides several hundred feet in height and utterly inaccessible..." The people had no choice but to abandon their pueblo and the three women. They decided to move a few miles west, to the top of another mesa, another natural citadel in the desert, where they would construct a new village around a few natural ponds, break new fields in the surrounding plain and rebuild their lives after the storm. As they left the forlorn and eroded desert floor below Katzimo, they could hear the pleading but hopeless calls of the three women stranded on the mesa top. That mournful event happened a long time ago, early in the second millennium, and it seared a permanent and painful place in the tribal memory. A New Life The people began construction of their new pueblo, which they would call Acoma, the "People of the White Rock," and they would rely on their cultural roots to anchor their new lives. Acoma street (originally, the walls were solid, with no windows or doors) They forged a trail upward, through a crevasse, often with handholds ground into the living stone, to the top of Acoma Mesa. There, more than 350 feet above the surrounding desert floor, they built ceremonial and communal chambers and homes two or three stories high, with windowless walls of stone, mortar and plaster; and they covered the structures with roofs of timbers, branches, grasses and soil. They ascended the walls by ladders and entered their homes though portals in the rooftops. In accordance with immemorial traditions, drawn from their origins as hunters and gatherers and seasoned by cultural winds from the great Mexican civilizations, they made water and agriculture the center of their spiritual universe. They celebrated the seasons of planting and harvest. They sought balance and harmony in their lives. They cherished the sense of belonging they found in their clans, which they identified by names taken from familiar animals and plants. They traced the children’s lineage and clan affiliations through the blood of their mothers, who also owned the family homes. They spoke Keresan, a language with mysterious roots. The men organized and directed ceremonies, hunted game and wove textiles. The women tended the children, ground corn, prepared food, carried water, wove baskets and cast exquisite thin-walled ceramics. Together, they worked the village fields, raised turkeys and built and maintained their homes. As the centuries passed, the people of Acoma and their village of stone and mortar, burnished by age, became an expression of Mother Earth, with lives attuned to the rhythm of the seasons, as natural and enduring as the wind on the mesa top. They felt secure here, in this natural fortress. They could set their spirits free here, in their home in the sky. Willa Cather caught the essence of the pueblo in her classic Death Comes for the Archbishop. "The Acomas, who must share the universal human yearning for something permanent, enduring, without shadow of change—they had their idea in substance. They actually lived upon their Rock; were born upon it and died upon it..." It was, she said, "a place to go back to." The Acomas, however, could never have anticipated the changes which lay before them. The Spanish Come Calling Late in the summer of 1540, the Acomas saw a vanguard of Francisco Vasquez de Coronado’s expedition appear from the west, out of the desert. They descended the mesa to confront the Spanish force, which, under the command of Don Hernando de Alvarado, comprised twenty soldiers and several Pecos Pueblo Indian guides. Unintimidated by bearded men who wore armor, rode strange animals and carried muskets, swords and crossbows, the Acomas first challenged the Spaniards to fight, then stood down and allowed them into the pueblo. "The village was very strong," said Pedro de Castaneda, a chronicler of the Coronado expedition, "because it was up on a rock out of reach, having steep sides in every direction, and so high that it was a very good musket that could throw a ball as high... There was a broad stairway for about 200 steps, then a stretch of about 100 narrower steps, and at the top they had to go up about three times as high as a man by means of holes in the rock... There was a wall of large and small stones at the top, which they could roll down without showing themselves, so that no army could possibly be strong enough to capture the village. On the top they had room to sow and store a large amount of corn, and cisterns to collect snow and water... They made a present [for the Spaniards] of a large number of [turkey] cocks with very big wattles, much bread, tanned deerskins, pine [pinon] nuts, flour [corn meal], and corn." In the snows of the following winter, the remainder of Coronado’s expedition passed the mesa. "...the natives, who were peaceful, entertained our men well, giving them provisions and birds..." said Castaneda. "Many of the gentlemen went up to the top to see it, and they had great difficulty in going up the steps in the rock, because they were not used to them, for the natives go up and down so easily that they carry loads and the women carry water, and they do not seem even to touch their hands, although our men had to pass their weapons up from one to another." Nearly six decades later, in the fall of 1598, the Acomas again found bearded Spaniards who wore armor, rode horses and carried muskets and swords at the base of their mesa, "the best situated Indian stronghold in all of Christendom." The Acomas had learned that these soldiers represented Juan de Onate’s enterprise to seize and colonize the pueblo lands of the Southwest. With barely concealed hostility, they invited Onate and his men to ascend the mesa, to the village. A warrior invited Onate to enter a ceremonial chamber, which hid a party of assassins. Onate wisely declined. The Keresan-speaking tribal elders listened, mystified, as the Spanish-speaking Onate administered to them the customary ceremony of Indian submission to the Crown and the Church, "And those," said Onate, "who render obedience can never again withdraw their allegiance under penalty of death." Those words would become prophetic. The Acomas watched Onate and his force leave, headed west. They waited patiently. A few weeks later, they laid an ambush for Onate’s nephew, Juan de Zaldivar, who led a force of 31 soldiers to Acoma, en route to join his uncle. In a brutal battle in the village, the Acomas killed Zaldivar and ten of his men. He fell, "delivered unto that eternal sleep to which we are all doomed someday," said Gaspar Perez de Villagra, Onate’s chronicler. The Acomas could not have known what Onate planned for retribution, that "penalty of death." They could not have known that Onate, with the support of his colonists, declared guerra de sangre y fuego, war by blood and fire—war without quarter, without mercy. In the ice and snow of January, 1599, the Acomas saw the Spaniards return, a force of 72 heavily armed soldiers commanded by Vicente de Zaldivar, Juan de Zaldivar’s brother. From the precipice of their mesa, the Indian hurled insults, ice, stones, arrows and spears at the Spaniards. On the afternoon of January 22, Acoma braced for attack. The warriors heard the call ofAcoma estutas, bread ovens trumpets, signaling the beginning of a Spanish frontal assault. They rushed to the top of the ascending trail, prepared to launch a fusillade of stones down on their attackers. They soon discovered that the trumpets had been a diversion, a cover for a dozen Spaniards, led by Zaldivar, who had gained entry into an undefended side of the pueblo. The Spaniards had, said Villagra, "climbed the high walls of this immense mass of stone...for there were none to oppose us." With the beachhead established, the Acomas could not prevent the entire Spanish force from overrunning their village. They fought with prehistoric club, arrow and spear against Spanish cannon, musket, sword and dagger. They fought house-to-house, hand-to-hand, for three days, falling to superior arms, leaping suicidally over the precipice, burning in the conflagration of battle. The Acomas died by the hundreds. They saw their community, where their lives had begun anew after the great storm centuries earlier, lying in ruins. They had killed not a single Spaniard. (Only one had died, accidentally shot by one of his own men. Others suffered wounds.) The surviving Acomas, about 500, mostly women and children, surrendered. "...those who render obedience can never again withdraw their allegiance under penalty of death." At the height of the battle, the Indians had seen (said Zaldivar’s soldiers) the spiritual figure of a Spaniard astride a white horse, hovering protectively above the Spaniards, wielding a flaming and deadly sword. A woman of transcendent beauty rode by his side. The Indians had seen (said Zaldivar’s soldiers) Santiago, the patron saint of Spain, and they had seen (said Zaldivar’s soldiers) the Virgin Mary herself. They had seen a miracle. The Keresan-speaking Acomas stood trial before the Spanish-speaking judge and jury, with conviction a foregone conclusion. Onate handed down the sentences: • Males over 25: loss of the right foot, 20 years of slavery. • Males 12 to 25: 20 years of slavery. • Two Moquis Indian visitors: loss of right hand, a warning to their own pueblos. • Women over 12: 20 years of slavery. • Children under 12: a Christian upbringing under a Franciscan priest. Sixty small girls found themselves bundled off to religious training in convents in Mexico City. They would never see their families nor Acoma again. Father Ramirez A few years after the disastrous defeat, Acoma men and women began to slip the bonds of slavery and return in a trickle to their village on the mesa, that place to go back to. They began to reconstruct their homes and kivas, reestablish their fields and rebuild their lives. Aging men with a missing right foot fueled continuing fires of hostility and bitterness toward the Spanish. Three decades passed before they found a renewed sense of purpose. It came from an unexpected source, a solitary and unarmed priest, Father Juan Ramirez, who appeared from nowhere one day like a tribal deity on the ascending trail to the mesa top. The Acomas attacked him with arrows, which were deflected by his habit. In the melee of the attack, a little girl tumbled over the precipice. They watched Father Ramirez pray over her. She revived from her fall, unharmed. A woman agonized over a dying infant. They watched the father pray over the baby, who recovered from its illness, cooing. Acoma's St. Stephens mission church Seeing their arrows deflected and their children saved, the Acomas believed that Father Ramirez had supernatural power, and they accepted him as a spiritual leader. Under his guidance, they undertook the construction of a great mission church on the top of their barren mesa. Over 12 years, they hauled 20,000 tons of earth and stone on their backs, up the trail from the plain, to raise walls 10 feet thick. They carried dozens of timbers, or vigas, 40 feet in length, 14 inches in diameter, from the flanks of Mount Taylor, 40 miles to the north, to construct the roof. They hauled up soil for the churchyard, which lies at a walled edge of the Mesa, before the structure’s massive twin bell towers. The mission church rose as a mighty fortress, like the mesa itself, a monument to sacrifice and suffering, with Saint Stevens as its patron saint. Seventy four Acomas – men and women – died in its construction. Moreover, as James Paytiamo, an Acoma, said in his 1932 book Flaming Arrow’s People, "I am told by [my people] that at the time this church was being built there was great famine at Acoma and that the people, when their regular food was gone, first ate cactus, then chewed their buckskins, and finally ate each other." A Measure of Revenge The tragic events of the pueblo’s past still have a powerful hold on the tribal memory . "If you go to the southwest side of the Acoma mesa," said Paytiamo, "you can still see under the overhanging bluff the smoke-stains from the Spanish cannon, made when the conquistadores came and took my people’s land away from them and tried to break down the rock mesa with their cannon, and there is still the remains of the little fort which my people built on the southwest top, with little windows from which they shot their arrows." More recently, in early January of 1998, four centuries after Onate began the Spanish colonization of northern New Mexico, the Acomas finally got a measure of revenge. They had watched with growing resentment as the visitors’ center near Onate’s first settlement raised a bronze sculpture of the conquistador mounted heroically on his horse, a celebration of the 400th anniversary of his expedition. The Acomas attacked "Onate" in the dark of night, not with arrows and spears, but with an electric saw, with which they separated the bronze Spaniard from his right foot. Acoma is located about 60 miles west of Albuquerque, south off Interstate 40. To visit the pueblo, one of the oldest continuously occupied settlements in the United States, you must register at the visitor center for a guided tour. You will be taken to the top of the mesa in a bus for a tour by an Acoma guide. Saint Stephen’s mission church, a national historic landmark, will be a highlight. Ticket Prices: Subject to change. Adults $23 Senior Citizens $20 Children $15 Camera Permits $13.00 (still camera only) For additional information on tour schedules and events, contact Acoma Visitor Center PO Box 309; Acoma, NM 87034 Ph 1-505 470-4966 or 1-800 747-0181 Pueblo Cultural Center 2401 12th Street NW Albuquerque, NM 87104 Ph 1-505-843-7270 or 1-800-766-4405 outside of NM To learn more about the history and the people, read Mrs. William T. Sedgwick’s Acoma, The Sky City and James Paytiamo’s Flaming Arrow’s People. Related DesertUSA Pages Cultures of the Southwest Related DesertUSA Pages Share this page on Facebook: The Desert Environment The North American Deserts Desert Geological Terms Enter E-Mail address: Hiking books Solar lighting Rockhound books Get the Best Hotel and Motel Rates Click here to see current desert temperatures!
El Dia de Los Muertos How does the Spanish culture view death? Gain the interest of your learners by showing them a skull (if you can get one). How is this Spanish celebration similar or different than Halloween? As an extension, you could dedicate a class period to actually celebrate it!  92 Views 60 Downloads Resource Details 8th - 10th 1 more... Resource Type Lesson Plans 45 mins Instructional Strategy Collaborative Learning Included Materials - Join to Access • Activity
The Difference Between Peripheral Neuropathy and MS Multiple sclerosis and peripheral neuropathy share some symptoms in common Peripheral neuropathy can result in partial paralysis. Peripheral neuropathy can result in partial paralysis. Huntstock/Getty Images Peripheral neuropathy and multiple sclerosis (MS) can cause some of the same symptoms because both affect the nervous system. Symptoms common to both conditions include abnormal sensations, including tingling, burning, a pins-and-needles feeling, numbness, and pain. Muscle weakness can also occur with both conditions. While some symptoms of peripheral neuropathy and MS overlap, they are completely different diseases in terms of their underlying cause, treatment, disease course, and who is most likely to be affected. An accurate diagnosis proves essential for managing the symptoms of both MS and peripheral neuropathy.   Different Underlying Abnormalities Peripheral neuropathy refers to nerve damage involving the peripheral nervous system—those nerves outside the brain and spinal cord. The damaged peripheral nerves malfunction and provoke abnormal sensations, pain, and numbness. These sensory abnormalities most commonly affect the feet, lower legs, and hands. Muscle weakness can also occur in people with severe or long-standing peripheral neuropathy.  Unlike peripheral neuropathy, MS affects the central nervous system—the brain and spinal cord. The nerves in this part of the nervous system sustain damage over time, which interferes with their ability to communicate with the peripheral nervous system. This can cause abnormal sensations, pain, and numbness indistinguishable from that caused by peripheral neuropathy. Muscle weakness also frequently develops with MS, occurring more frequently and with greater severity than usually seen with peripheral neuropathy.  Different Underlying Causes Peripheral neuropathy encompasses a group of disorders with different underlying causes. It can affect a single nerve but most often involves several. Diabetes is the most common cause of peripheral neuropathy among Americans, reports the National Institute of Neurological Diseases and Stroke. Many other diseases and conditions might also lead to peripheral neuropathy. Some examples include: • Chronic kidney disease • Hypothyroidism • HIV infection • Toxins, such as lead, mercury, and heavy alcohol intake • Injury-related nerve damage MS occurs as a result of recurring or ongoing inflammation in the central nervous system, which damages the nerves located there. Although the exact cause of this inflammation remains incompletely understood, an errant attack by the body's immune system on the tissues of the brain and spinal cord seems to be a key contributor. Diagnosing Peripheral Neuropathy vs. MS Although you may be tempted to delay seeing your doctor, nervous system symptoms should not be ignored. If you're experiencing symptoms that could be related to either peripheral neuropathy or MS, your doctor will do the necessary assessments to make the correct diagnosis. While you're waiting for your appointment date, it is helpful to keep a log of your symptoms so you can describe them in detail, along with any patterns in their occurrence, and any aggravating or provoking factors. Determining the cause of your symptoms begins with a complete medical history, including a careful review of all symptoms you've been experiencing. Next is a thorough physical with a complete neurological examination. Depending on the outcomes of these initial assessments, your doctor might recommend additional testing that could include blood work, an MRI, and/or nerve tests to determine how well specific nerves conduct the electrical signals by which they communicate with your brain. Once a diagnosis is made, you and your doctor will work together on a treatment plan to manage your symptoms and their underlying cause. Aminoff MJ, Daroff RB, eds. Encyclopedia of the Neurological Sciences. 2nd ed. Waltham, MA: Academic Press; 2014. Hersch CM, Fox RJ. Multiple Sclerosis. Cleveland Clinic Center for Continuing Education website. Levin MC. Multiple Sclerosis (MS). In: Porter RS, Kaplan JL, Lynn RB, et al. Merck Manual Professional Version. Peripheral Neuropathy Fact Sheet. National Institute of Neurological Diseases and Stroke website. Continue Reading
• How Nurture Overrides Kids' Nature -- or Why Succotash Model Fails As soon as scientists analyzed the DNA in cells from the toddlers' cheeks, it was clear some of the kids carried a serious handicap: The Shyness Gene. But when they returned to the lab at age 7, only some were actually shy. As the researchers dug deeper, they concluded that the "shy gene" lives up to its name only when a child grows up in a certain environment. "I see this as the new frontier in our understanding of child development," says Nathan Fox of the University of Maryland, College Park, who led... Popular on WSJ
Efficiency in the Healthcare Sector Optimisation of data system in the healthcare sector as a basis for more efficient patient treatment Electronic Health Record (EHR) is an electronic data system for the entire healthcare sector from hospitals to medical specialists that is gaining ground in Denmark. It gathers information about each patient, and this is the core advantage of EHR, because in a given treatment situation it is not necessary to search for the patient's medical history. EHR thus provides a basis for the development of optimised decision support to the clinical staff, initially those in the emergency department. A recently completed study, published in the New England Journal of Medicine, showed that EHR provides better quality in practice. A project in Patient@home will now aim for a better use of the EHR system leading to an improved data utilisation within the healthcare sector in order to achieve shorter patient treatment periods and better home health visiting. The project will therefore also provide the necessary basis for quicker patient discharge. Objectives and expected results The project aims to improve the service to be coordinated by the health sector. As EHR offers the opportunity to all within the field of healthcare to access the patient's medical record, it is requested that uncertainties regarding facts be reduced and that double agreements with specialists be excluded in order to optimise the use of the system. In addition, EHR also facilitates optimized assistance in emergency situations. Likewise, the risk of reoccurrence may be reduced, as there exists only one accessible file, which means that it is fully updated when the reader wants to access it; simultaneously, it excludes the risk of  forms and papers being lost. It is more efficient to gather all information in a single file when retrieving medical data for use in the examination of possible trends and changes over time in the patient's condition. Overall, the project will thus create greater efficiency in the healthcare sector.
This is “Expected Value”, section 17.7 from the book Theory and Applications of Microeconomics (v. 1.0). For details on it (including licensing), click here. Has this book helped you? Consider passing it on: 17.7 Expected Value Probability is the percentage chance that something will occur. For example, there is a 50 percent chance that a tossed coin will come up heads. We say that the probability of getting the outcomeheads” is 1/2. There are five things you need to know about probability: 1. The list of possible outcomes must be complete. 2. The list of possible outcomes must not overlap. 3. If an outcome is certain to occur, it has probability 1. 4. If an outcome is certain not to occur, it has probability 0. 5. If we add together the probabilities for all the possible outcomes, the total must equal 1. The expected value of a situation with financial risk is a measure of how much you would expect to win (or lose) on average if the situation were to be replayed a large number of times. You can calculate expected value as follows: • For each outcome, multiply the probability of that outcome by the amount you will receive. • Add together these amounts over all the possible outcomes. For example, suppose you are offered the following proposal. Roll a six-sided die. If it comes up with 1 or 2, you get $90. If it comes up 3, 4, 5, or 6, you get $30. The expected value is (1/3) × $90 + (2/3) × $30 = $50. Most people dislike risk. They prefer a fixed sum of money to a gamble that has the same expected value. Risk aversion is a measure of how much people want to avoid risk. In the example we just gave, most people would prefer a sure $50 to the uncertain proposal with the expected value of $50. Suppose we present an individual with the following gamble: • With 99 percent probability, you lose nothing. • With 1 percent probability, you lose $1,000. The expected value of this gamble is −$10. Now ask the individual how much she would pay to avoid this gamble. Someone who is risk-neutral would be willing to pay only $10. Someone who is risk-averse would be willing to pay more than $10. The more risk-averse an individual, the more the person would be willing to pay. The fact that risk-averse people will pay to shed risk is the basis of insurance. If people have different attitudes toward risky gambles, then the less risk-averse individual can provide insurance to the more risk-averse individual. There are gains from trade. Insurance is also based on diversification, which is the idea that people can share their risks so it is much less likely that any individual will face a large loss. Key Insights • Expected value is the sum of the probability of an event times the gain/loss if that event occurs. • Risk-averse people will pay to avoid risk. This is the basis of insurance. More Formally Consider a gamble where there are three and only three possible outcomes (x, y, z) that occur with probabilities Pr(x), Pr(y), and Pr(z). Think of these outcomes as the number of dollars you get in each case. First, we know that Pr(x) + Pr(y) + Pr(z) = 1. Second, the expected value of this gamble is EV = (Pr(x)*x) + (Pr(y)*y) + (Pr(z)*z).
How the Blacks Lived David Owen: A guy I work with at Allison Transmission in Speedway, Indiana, and who I went to Junior High School and High School with, Fred Russell, has a father who grew up on a farm near Hopkinsville, Kentucky. The father moved to Indianapolis a long time ago where jobs were plentiful. The father’s grandfather’s grandfather was a slave on a 200 acre plantation in Elkton, Kentucky and so was his children. He was sold to the white Russell when he was 23 years old. There were several slaves sold at one time. The white Russell bought them from Jefferson Davis, the future President of the Confederacy. Fred has a copy of the Bill of Sale. There were quite a few slaves on the 200 acre plantation. The farm is still there and is owned by the descendants of the white Russell. The white overseer’s shack is still there. The row of slave’s shacks are gone but some limestone foundation stones are still there. Wagon ruts are still there. There is a cemetery there where some white Russells are buried. Some slaves are buried next to the white cemetery; actually in the same cemetery. There are no headstones with the slaves’ graves but you can tell where they are buried from the ground being sunk in. From the white Russells’ research, the slaves were treated well. Nevertheless, after the Civil War, almost all of them split for Indiana in case the powers to be changed their mind. View Larger Map Quote of the day A person who has a cat by the tail knows a whole lot more about cats than someone who has just read about them. Mark Twain Powered By: Inspirational Quotes
4.12 Migrants and Citizens One of the most important responsibilities of a citizen is to elect those who represent it in government of the country. It can be argued that if the proof of the pudding is in the eating, we have not made the best jobs in choosing our leaders. However, but it is a fundamental dogma in any democracy that an imperfect democratic system is to be preferred to any other system of government, be it a benign dictatorship, an inspired theocracy or a totalitarian regime. In Australia it has long been assumed that these responsibilities may not be taken seriously. A high voting rate is achieved only through compulsion and legislation, not through conviction. Most Australians, it is felt, would rather stay on the beach than be bothered to vote, were it not for the penalties involved in not doing so. For some time, there has been a drive to increase the citizenship rate, to encourage people to vote and exercise other rights of citizenship. It has even been hinted that those who do not take citizenship show a lack of commitment to this country. Prime Ministers make special pleas to convince residents that they should take up citizenship. The extent to which the recommendations of reports such as the one entitled "Education for active Citizenship" have been implemented remains unclear. This Report aimed at identifying deficiencies in the knowledge of young people concerning political and parliamentary issues, and to enhancing their attitudes and skills in relation to awareness of their rights and responsibilities as citizens and their participation in the democratic process. Migrants as a whole have not been slow in obtaining citizenship. The citizenship rates for some ethnic groups are 80 - 90%. It is also well known that those from NESB are much more likely to take up Australian citizenship than those of persons from English-speaking countries such as UK or New Zealand, where the citizenship rate has been sluggish at about 40% It is therefore all the more perplexing to see that more recently the rights of overseas-born to obtain citizenship has been questioned. Noises have been made relating to limiting citizenship rights. Others have suggested that immigrants are not ready to vote "responsibly" unless they are proficient in English language. It is heartening to read responses from persons like Maureen Breen, then Mayor of the City of Richmond saying: 'I encounter daily people born overseas who have an enthusiastic interest in Australian politics, from the local level to the federal level. And what's more they vigorously debate those issues among themselves." She continued: "1 know they are more prepared to vote 'responsibly' than many others who, although born in Australia, have a total apathy to public affairs" (The Age 27/10/90) The commitment to Australia by NESB persons as measured by any criterion, and in particular citizenship rates, is beyond criticism. To create artificial barriers and distinctions between Australia-born and overseas-born is pernicious and not conducive to long-term stability in this country [From: The Ethnic Voice, Vol 2(10) Nov 1990 p 3] Source: Maurice N.Cauchi - The Maltese Migrant Experience, Malta 1999 top-of-pageprevioustopic-indexnext Email-A-Page Consultancy, hosting, programming and technical assistance provided by A6iT.
“Featherlight” Peanut Butter Pancakes Rosa Parks PancakesRosa Parks, the famous civil rights activist, loved peanut butter in her pancakes.  Her forthright thinking and no nonsense attitude  changed the racial landscape of the 1950’s south, bit by bit.  She was a complex woman, full of keen observations of her place and time.  Many of these thoughts were recorded in hand written letters and notes scrawled on stationery, or scribbled on scraps of paper in pencil or pen. After some legal wrangling, her papers were purchased and are now on loan to the Library of Congress. As an archivist pours through the boxes of papers, a clearer picture of our country’s figurehead of integration has emerged.  Her family walked a fine line between abject poverty and a more genteel down- at – the – heels lower middle class existence.  Money was tight, ethics were paramount, and Rosa liked to cook. On the back of a small brown envelope, the kind you would get cash in from a withdrawal at the back, is written a recipe in Rosa Park’s hand, for ” featherlight pancakes”.  Here is it: Featherweight Peanut Butter Pancakes, by Rosa Parks Makes about 18,  4-inch pancakes 1 cup flourRosa Parks Pancakes in process 2 tablespoons baking powder Pinch salt 2 tablespoons sugar 1 egg 1/3 cup peanut butterRosa Parks pancakes 3 1 1/4 cup milkRosa Parks Pancakes 4 1 tablespoons oil or melted butter 1. In a small bowl, mix all of the dry ingredients and stir well: flour, baking powder, salt and sugar. 1. In a separate small bowl, mix the egg and peanut butter until well combined. Whisk in the milk and oil until smooth.  Fold and stir in to the dry ingredients. 1. Bake on a warm (275° F) lightly greased griddle until golden, and flip, cook until firm. Serve warm, with maple syrup and more peanut butter, if you choose. Finding a recipe like this amongst Rosa’s writings is of interest in so many ways.  First, she had the inclination to cook, or by writing down and keeping the recipe, the desire to cook even when her activism was at a peak. The recipe seems so current, even though it was written in the late 1950’s, we just had to try them.  Yum…their name “Featherlight”, became clear, light and delicate with a surprise of peanut butter within.  Rosa was a  visionary, understanding and working to change the racial make up of the south.  And she seems to have been a visionary in the kitchen, mixing kitchen staples affordable to most anyone in the south,creating a special breakfast treat.  February is Black History month, and February 4 was Rosa Park’s birthday.  A fitting tribute, and celebration of both. Warning…Contains Nuts The subject of nuts for a cookbook always evokes questions.  How did you get interested in that?  Why nuts and seeds?  How did you chose them?  And the most commonly asked one, what about nut allergies, and the people with them? When we began our research for the book we addressed this question.  We spoke to experts , scoured the literature for information.  And our decision to not address allergies in any way came clear. Nut allergies are serious and the lives of individuals with these allergies could be threatened by making any recipe in our book.  There are no substitutions for nuts here. Sadly, those with nut allergies need to skip the book all together. As nuts have ascended to culinary stardom they also have been demonized, sometimes with good reason.  Since we have been on the road promoting the book countless people have told us that they would love to have us come and speak, the book is beautiful the say, but they work in a nut free facility.  We understand the abundance of caution, respect the nut free facilities, and steer clear. On this most recent trip to California I checked into my hotel and was greeted at the front desk with a warm chocolate chip cookie nestled in a paper bag.  On the front was an emblem, not dissimilar to the bold no smoking signs we are so used to.  It stated…”Warning: contains walnuts”.  I was happy to find them in my cookie, and I’m relieved that an early warning system keeps those with allergies safe. Creamy Crunchy Nut Butter Dip #NutSnackoftheWeek creamy crunchy nut butter In the fall, we are always looking for tasty ways to use our abundance of freshly picked apples. Sliced and dipped in our Creamy Crunchy Nut Butter Dip, our crisp apples make a great breakfast, mid day snack, or night time treat. 2 cups reduced fat Greek yogurt 1 cup natural nut butter, almond, peanut or cashew (or any you prefer) 4 tablespoons maple syrup or honey 1 tablespoon vanilla extract ½ cup chopped nuts (almonds peanuts or cashews) Serve with sliced crisp apples 1. Combine the yogurt and the nut butter in a small mixing bowl and stir well to mix. 2. Mix in the maple syrup, vanilla and nuts (reserving a few to sprinkle on top) 3. Serve immediately with slice apples.
Cervical cancer screening is used to find changes in the cells of the cervix that could lead to cancer. Screening includes the Pap test and, for some women, testing for human papillomavirus (HPV). Most women should have cervical cancer screening on a regular basis. Why Cervical Cancer Screening Is Done The cervix is the opening of the uterus at the top of the vagina. It is covered by a thin layer of tissue. This tissue is made up of cells. As these cells develop, the cells at the bottom layer slowly move to the surface of the cervix. During this process, some cells may become abnormal or damaged. Abnormal cells on the cervix may lead to cancer. These precancerous changes are call dysplasia or squamous intraepithelial lesions  (SIL). SIL can be either low-grade (mild dysplasia) or high-grade (moderate or severe dysplasia). Screening tests are used to find diseases in people who do not have signs or symptoms. This allows early treatment. The earlier cancer is treated, the greater the chance of survival. Cervical cancer screening is used to detect abnormal cervical cells. It allows early diagnosis and treatment so that the abnormal cells do not become cancer. How Cervical Cancer Screening Is Done Cervical cancer screening includes the Pap test and, for some women, and HPV test: • The Pap test involves removing a small sample of the cells from the cervix. The sample is sent to a lab and examined under a microscope to see if abnormal cells are present. • An HPV test looks for the presence of 13-14 high-risk HPV types in cells of the cervix. HPV is a virus. High-risk types can lead to cervical cancer. HPV is passed from person to person during sexual activity. Cervical cancer screening is simple and fast. It takes less than a minute to do. For a Pap test, you lie on an exam table and a speculum is used to open the vagina. This device gives a clear view of the cervix and upper vagina. A small number of cells are removed from the cervix with a brush or other tool. The calls are put into a liquid and sent to a lab for testing. A computer may be used to look or abnormal cells. For an HPV test, usually the sample taken for the Pap test also can be used for the HPV test. Sometimes two cell samples are taken. It depends on the type of Pap test your healthcare provider uses. Routine screening can help find problems early when they are more easily treated. Contact us for any questions or to set up an appointment.
Homepage News Prof. Duch: we can not use one hundred percent of the brain 05.03.2012 History&Culture The human brain can not be used in one hundred percent. But the potential of this organ can be increased, especially during the time when the brain develops most intensively, in the first year of life - said Prof. Włodzisław Duch at TEDx conference in Poznań. Prof. Włodzisław Duch is an expert in cybernetics at the Faculty of Physics, Astronomy and Applied Computer Science, Nicolaus Copernicus University in Toruń. His lecture was titled "How to fully develop human potential? Time to deal with brains". "There is a widespread belief that we use only 5 or 10 percent of our brain. Some, for example Scientologists, say: + (...) we will teach you how to use 100 percent of the brain+. If you meet these people, you should run!" - joked Prof. Duch. He explained that our brain generates about 20 watts of power, equivalent of a small light bulb. He said that when we focus our attention, only 1 percent of our neurons become highly active. If instead of 1 percent nerve cells all the neurons would activate, the power would be not 20 but 200 watts. "What happens to the water when turn on a 200 W heater? Water quickly evaporates, it begins to boil. If we used 100 percent of the brain we would cook it" - noted Duch. Can science can help the brain develop more efficiently? According to Prof. Duch, has the greatest potential lies in improving learning during the time of life when the brain develops most intensively. "The brain of a baby is the most flexible. 1 million connections are formed every second. Therefore, the greatest change and transformation in the brain we can affect occurs during the first year of life" - he noted. The researcher pointed out that intelligence tests should be constantly modified, because children become more and more intelligent. "Perhaps this is due to a greater amount of stimulation infants receive" - said the lecturer. "Childhood is a relatively young invention" - he stressed and added that the it had been relatively not long ago when people started to play with a children, give them attention, give them toys, and this positively affecting the development of the young brain. However, the development of the brain is inhibited over time: the organ becomes specialised. "But is specialization still good? It used to be. People lived in villages and would not leave them. They specialized in the assimilation of culture, language, things that helped survive in the village. But now we live in a global village" - said Duch, and explained that our needs were changing. He noted that today, for example, knowledge of many languages is valuable. Baby specializes only in listening to the language, in which its caregivers speak to it, and foreign phonemes are at a disadvantage in the brain development process. Meanwhile, if the child heard foreign languages already in the cradle, later it could speak those languages without an accent. The problem is that passive learning doesn’t do the trick with teaching languages to babies: they do not learn from foreign languages spoken, for example, on television. A child needs interaction to learn. The best form is contact with another person, but Prof. Duch expects that interactive toys could also have positive effects. These toys could recognize the child's responses and reward it accordingly. This way, already in the cradle the child would learn to recognize tones necessary not only in musical education, but also in learning the Chinese language, the language of tonality. The researcher also gave another example: the Japanese have difficulty with distinguishing sounds "l" and "r" in the English language. A child could develop this ability in the cradle, using toys. According to Duch, new generation of children, who would learn with the use of such toys, could be more likely to be more musical, develop their intelligence and working memory. Interactive aids, children could help children become more interested in exploring the world, have intrinsic motivation, and learn to speak foreign languages without an accent. In addition, if the toys helped detected hearing and speech problems earlier, these problems could be better addressed. Prof. Duch wants to soon begin testing the effectiveness of such interactive toys. If tests are successful, the researcher intends to begin production of such aids for babies. TEDx is an interdisciplinary conference organized in different cities around the world. Following the conference is often possible online. The purpose is to enable local communities to meet with people whose lives and achievements are characterized by commitment, innovation and uncompromising in the pursuit of objectives. TEDx in Poznań took place under the motto "4 x M, the City, the Weight, the Machines and the Brain". PAP - Science and Scholarship in Poland lt/ agt/ mrt/ tr. RL Share this Rating: 0 votes Forgotten password Comments: 0 Add comment See all comments   Most popular sites
Why Doesn’t Jurassic Park Exist Yet? Lazy scientists are depriving us of the greatest theme park man will ever know.   Sax Carrby Sax Carr Twenty one years ago, Michael Crichton released a novel called Jurassic Park. At around the same time, in a completely unrelated situation, everyone in the world agreed that dinosaurs were the coolest creatures that ever lived on the planet. As a child, I read the novel hundreds of times, and then watched the movie just as much. I assumed that someone, somewhere, must be developing the technology to bring dinosaurs back. But apparently, I was wrong. That's right, scientific community at large, I'm calling you out. What's the delay? We've cloned a sheep, and I think we can all agree that sheep are way less cool than giant monsters from the past. In fact, we have tons of them. So why make more? I morally object to living in a world where wool is a more important resource than wholesale slaughter. "Sheep suck."  –  T-Rex So what's keeping us back from turning the greatest theme park in the history of fiction into a bona fide reality? I'm actually quite curious myself. I mean, the science has obviously been there for more than two decades. Michael Crichton described every step slowly and carefully in the book. Heck, there was even a colorful cartoon breakdown of the process in the film. The instructions seemed so simple that given the resources, I could do it. Find the remains of ancient mosquitoes preserved in tree amber. Drill into tree amber to extract the DNA from mosquitoes. Complete DNA sequences with genetic information from modern species with similar genetic makeup. That's less intricate than most IKEA building manuals. And you're telling me that scientists won't put the same effort into bringing dinosaurs back that they put into their home-shelving solution? "You are so right.  This really wouldn't be that cool."  –  Sarcasm Considering the science is so clearly both possible and easy, I feel like there must be another reason why I can't buy a ticket to a prehistoric wonderland. When I first found out that dinosaurs had feathers, and were apparently more similar to birds than lizards, I thought maybe that was it. They had dinosaurs, but refused to introduce them to the public for fear that the public outcry against feathered dinosaurs would be too much. But we all went and saw the exhibit, came to terms with the massive historical retcon, and accepted 'birdosaurs' because they're still ancient killing machines with massive teeth and claws. The thing is, it's even been more than a decade since that revelation. In fact, I think it's come to a point where we all scoffed at it, then accepted it, then promptly forgot it. Now, if they do the big dinosaur 'relaunch', people will get thrown off by the feathers again because they waited too long. It's no longer a part of the human subconscious. You've lost your momentum! Now it'll be an uphill battle toward profit whenever you do manage to do your freaking jobs and create a theme park full of extinct animals. "Please?"  –  Me since I was seven. One last thing. It's unlikely, but one of the snags may have been the fact that in the book and movie, most of the characters die horribly and the theme park itself is a fiscal disaster and an ethical quagmire. Maybe I'm reading into it too much, but I think that could have lead to some hesitation from the scientific community. I mean, both the book and the movie are pretty brutal. Are you guys afraid you can't handle a few giant monsters? Wimps. Look, scientists. Jurassic Park is a work of fiction. It's not real. You guys don't have to worry. The book was a metaphor for the consequences of messing with nature. It's not like actually bringing dinosaurs back would be dangerous at all. It's not like Ian Malcolm and his 'Chaos Theory' have any basis in reality. I mean, you're scientists. You should be pretty good at telling the difference between reality and fiction. Now that it's cleared up, though, I hope you guys will start working on making Jurassic Park a wondrous reality. And I expect a free lifetime pass for helping you guys get there.
• Extinction is happening before your eyes As noted by those who have lived by and sailed on the Pacific Ocean, the tide pools are dead. The star fish have melted. Mass die off of all species are happening. The plankton, krill are gone as further up the good chain are starving to death. The food chain has been disrupted - it's a matter of time before earth becomes mars. Sad beyond words. • Fukushima can easily destroy the world. 3 nuclear reactors melted down at 100%. Chernobyl was one reactor 30 some percent. Unit 3 at fukushima alone was a million times more lethal than chernobyl. Unit #4 is hanging on by a thread and is being evacuated now. Mox fuel from unit #4 definitely has the possibility of destroying the world. • Fukushima Cannot Destroy the World No, Fukushima cannot destroy the world as the nuclear disaster that occurred there was not even near the nuclear damage that occurred a Hiroshima or Nagasaki. As the bombing of those two cities did not put a dent in the rest of the world, Fukushima's disaster certainly will not either. • It's not the end of the world. Fukushima is not about to destroy the world. While there is no question that the Fukushima nuclear disaster is just that, a disaster, it is not going to irradiate the planet. There's so much misinformation out there about nuclear power and radiation. For example, did you know the sensationalist headline about tuna on the west coast know showing up as radioactive from Fukushima's accident is true -- they just failed to include the part where you get more radiation from eating a banana. Don't believe the alarmists. Leave a comment... (Maximum 900 words) Vajrasattva-LeRoy says2014-12-08T15:22:22.607 How in hell could a planet be destroyed? What would radioactivity have to do with it? Instead of concentrating on Fukushima, also check out their Volcanoes & Super- Volcanoes, Super- storms, etc. Also check out the increasing activity of the Pacific Ring of Fire. I suspect that the Disasters are just beginning ... If the fish, sea food, cattle, food crops, forests, etc. , around & on Japan are radioactive, mutated, etc. covered with toxic volcano ash, destroyed, etc. , & are major parts of the Japanese economy, the collapse of Japan is obviously continuing. Winter Olympics in Japan, anyone? jimbeam says2015-04-28T20:35:32.597 Nope gonna kill all humans period
book, English Posted Date: 9/18/2012 2:42:58 AM | Location : United States Related Discussions:- book, Assignment Help, Ask Question on book, Get Answer, Expert's Help, book Discussions Write discussion on book Your posts are moderated Related Questions jose manuel found the three girls note in the basket what is the possessive noun #quWhich of the lettered sentences below contains an unnecessary shift in verb tense? (A) Jack White, a popular musician, grew up in Detroit, Michigan, and he was one of ten childr Explain the Types of Reports? i) Information reports Presents data without analysis Routine activities - daily, weekly and monthly reports Form reports - compla Explain the Historical Background to The Catcher in the Rye The Catcher in the Rye is more than just a story of one alienated teenager trying to make sense of his life.  It is Punctuate the following sentences correctly by adding the correct quotation marks and circling the phrases that should be italicized. 1.I read the article Five Cures for Writer' in novel kiddnaped who is mr champbell and what does he advised david Introduction: Rhetorical analysis is a method of studying how to think, write, and speak effectively. To be specific, rhetorical analysis involves the knowledge of how texts ar hi,i need your help i am from Asia and english is not my first,i am feeling difficulties to learn english is not bad but after 2 years i started it again.i never
Insurance as a financial security Insurance is a financial provision that helps you cope with an unexpected adversity. It provides you financial security, a guarantee that ensures you will not face a financial crisis in case something unavoidable happens. The basic principle governing the concept of insurance is that the insured will pay a certain sum of money to the insurer, who assures a reimbursement whenever the insured seeks protection for losses. The insurer undertakes the risk of ensuring complete protection to the insured through a policy that entails payment of a fixed amount of money in distributed installments, periodically, and the fulfillment of certain stipulations. Insurance as a concept was noticed among certain sections of society in the past. History has evidence of instances where Romans practiced certain forms of insurance. These practices were similar to the benefit societies of today. For example, the Roman Collegia offered provisions for burial and also for promotions among soldiers. The similarity is basically in the process of accepting a stipulated sum of money from members to perform certain services. Instances of marine loans made to ancient Greeks have also been recorded by Demosthenes. Chinese, apparently, have records of insurance practices that existed 2500 years ago. However, in all these cases, insurance was not practiced on a large-scale. Gradually, the concept waned, and we witnessed a revival of insurance only a few centuries ago. The insurance practice of today includes four main branches – marine insurance, fire insurance, life insurance, and casualty insurance. The first three forms of insurance provide an indemnity in case of disasters. The fourth, previously known as accident insurance, incorporates all aspects that are not covered by the other three branches. The oldest of all the modern insurance forms is marine insurance. It dates back over seven centuries. Apparently, it was practiced in the Mediterranean and has been an established practice for centuries, which continues till today. Fire insurance is the second oldest form of insurance that has been permanently established. It dates back to the great London fire of 1666. Life insurance followed fire insurance a little later. However, it has been an established practice only since 1760, when a company was founded to administer life insurance policies. The origin of casualty insurance is owed to the insurance offered to people for accidents during a railway journey. It has been in practice since the first half of the nineteenth century, when it originated in England. Insurance as a concept has evolved radically over the years. Insurance practices of today include many different sub-categories and contain a lot more clauses than before.
Start writing Share this Story The Reason Yawns Are Contagious Why just reading this is probably making you yawn Ever wonder why it's impossible not to yawn when you see someone else doing it? Thanks to a new study, we have a better idea as well as a possible way to help treat disorders such as Tourette's syndrome. Research published in Current Biology found that yawning is triggered involuntarily when we see someone else yawn. This is a common form of echophenomenon, which is a fancy word for automatically mimicking another person's actions or words. While the cause of this brain phenomenon is unknown, researchers believe it's tied to neurological conditions like Tourette's, autism and epilepsy, and understanding echophenomena might provide clues for treatment. More: Eating Enough Fruits & Veggies for Health Benefits Isn't as Hard as You Thought Two other interesting findings came from this study. First, if someone specifically tells you not to yawn, it's ever harder to avoid yawning. Along the same lines, if you try not to yawn, it will only make it worse. Second, applying electrical stimulation also caused people to yawn — something that may be used to treat conditions like Tourette's syndrome. MoreThese Foods Actually Improve Your Eyesight Contagious yawns aren't limited to humans. Researchers found that the same thing happens among chimpanzees and dogs as well. "The popular theory for contagious yawning is that it is linked with empathy for others, mimicry and social bonding," Stephen Jackson — one of the authors of the study — told USA Today. "But again the evidence for this is weak. I still think that much more research is required to understand the function and biology of yawning." Regardless of the cause, it's probably a safe bet that you're yawning right now. Follow Us SheKnows Media ‐ Beauty and Style New in Health & Wellness SheKnows is making some changes! b h e a r d ! Welcome to the new SheKnows Community, where you can share your stories, ideas and CONNECT with millions of women. Get Started
Should We Keep Animals in Zoo? Only available on StudyMode • Download(s) : 202 • Published : May 16, 2013 Open Document Text Preview Should we keep animals in zoo? Zoos may seems like a inhumane way to keep animal... locked up. But the plus side to zoos are they help stop animals from becoming extinct. They are also used for animal research which can help repopulate some species back into the wild.  For : - Zoo life does not prepare animals for the challenges of life in the wild. For example, two rare lynxes released into the wild in Colorado died from starvation even though the area was full of hares, which are a lynx's natural prey. * Zoo will care for orphaned young or injured wildlife. * Animals properly cared for in Zoo's usually live a longer and healthier life than those in the wild, and they also allow those of us who have never been to the wilds a chance to see those animals with our own eye Against : - Diseases often spread between species  that would never live together naturally.  For example, many Asian elephants have died  in US zoos after catching herpes from African elephants. Some animals are kept in cages, which show cruelty towards these animals. It shows that they do not consider animals' rights and feelings. Animal should have the right to go anywhere they want to go * the animals who live there are kept in enclosures that don't allow them to live their lives in a natural way. * Animals like polar bears or felines are used to hunting; the zoo with regular feedings replaces this habit. Most animals kept in zoos would naturally roam for tens of miles a day. * Surplus animals are either killed - and sometimes fed to their fellow zoo habitants - or sold to other zoos or dealers. * It's unnatural environment. * They treat wild animals as an entertainment for people too. * Animals change their behaviour in Zoos as it is different form the wild. Overall i think zoos can be a great place for animals... it's the safest place for the animals too... they are well feed and they don't have any worries....  but these won't be true in... tracking img
Edit Article wikiHow to Create Substitute Pouches for Marsupial Rescue When you're caring for marsupials as part of an authorised or emergency rescue activity, recreating the pouch for joeys (or baby marsupial) is extremely important for ensuing that the joey remains warm and secure. This article suggests some ways for recreating the pouch in your home or other human rescue environment. This article relates principally to Australian marsupials; making pouches for placental mammals is dependent on their specific needs because clearly most don't need a pouch. 1. 1 Choose material that is soft and easy to wash. Blankets make ideal material for this purpose and the older they are, the softer they're likely to be. If they're threadbare, simply cut off any holes or scraggly bits. • Other good fabric includes polar fleece the inner side of windcheaters, sheets and jumpers. • A pillowcase lined with something soft and warm such as a jumper is ideal. • Consider sewing up the bottom of a jumper if using one. This allows the joey to pop her head out of the head hole, as she'd do from a pouch. 2. 2 Create a pouch for a joey. Select a pouch size that will allow the joey to move around a little but still feel snug inside. To recreate the sense of suspension that a joey would feel in her own mother's pouch, place the pouch inside a larger bag or breathable sack and suspend it from something while still keeping it close to the ground to allow for ease of exit and entry by the joey. However, do not have the bag touch the ground (you may need to make an adjustment once the joey's weight is taken into account). • When the joey is not yet actively leaving the pouch, it can be suspended higher but be sure to monitor growing changes and the desire to leave the pouch. 3. 3 Create a pouch for a wombat. Make a pouch from suitable material. Line with a small blanket piece (or small blanket), then place the whole pouch inside a wooden box. The box should have a lid, especially as the wombat gets older. • You could place an electric pet blanket under the wooden box for extra warmth but be careful not to overheat the wombat. Wombat joeys have better temperature control than kangaroo joeys. Do not use a human electric blanket, as these are completely unsuitable and risk burning the animal or starting a fire if urinated on or chewed. Talk to your vet about options. 4. 4 Create a pouch for a possum. Use a sock or a small woollen hat. Once the possum becomes active and tries to emerge from the pouch, you can keep her in the pouch by pinning the top together with a safety pin. That way she won't get lost or cold when you're not about to supervise. • Use Ugg boots for little possums. • Once the possum grows older and can come and go from the pouch with greater ease, keep the sock or hat opening open using wire. The pouch should be kept inside a cat cage or similar size cage now though, to prevent her from wandering too far away. • Hanging baskets can work well for possums. Simply arrange them so as to create a closed nest. Community Q&A Ask a Question 200 characters left • Although the term "joey" is commonly associated with kangaroo babies, it is the term applied to all baby marsupials. • If the marsupial is so young that it doesn't have fur yet, rub the baby with baby oil to help prevent friction in the makeshift pouch. This helps to reduce fluid loss and maintains adequate humidity. • Placing a joey pouch at the back on top of a fridge or near a water heater can provide warm places but only provided all precautions have been taken to prevent falling or scalding. • All bedding must be removable and either disposed of or washed to remove the inevitable messes. • Wearing the joey under your own jumper as you move about during the day can create a cosy and warm environment. • Never use anything that prevents breathing, such as plastic bags. • Keep your pets away from rehabilitating wildlife. There is too much risk of aggression, fearful reactions or accidents occurring, as well as the possibility of transferring disease to the more vulnerable native species. Use good hygiene at all times to ensure the best health of the joey. • Be sure to observe all the legal regulations concerning keeping native animals. These regulations vary from state to state and you may need a licence to foster the native animal. There is also a big difference between nurturing it long enough to return the animal to the wild and keeping it as a pet; don't cross the line. • All marsupials are lactose intolerant. Never feed them with cow's milk. Things You'll Need • Soft materials, socks, pillowcases, blankets, etc. • Hanging areas (good and solid) • Baby oil (optional, for fur-less joeys) • Sewing items, bulldog clips, pegs or safety pins to enclose parts of the pouch as needed Sources and Citations • Wombaroo pamphlet, undated – research source Made Recently Did you try these steps? Upload a picture for other readers to see. Upload error Article Info Categories: Animal Rescue | Wildlife Thanks to all authors for creating a page that has been read 6,821 times. Did this article help you?
Journal article Hydrogen Storage in the Carbon Dioxide - Formic Acid Cycle This year Mankind will release about 39 Gt carbon dioxide into the earth's atmosphere, where it acts as a greenhouse gas. The chemical transformation of carbon dioxide into useful products becomes increasingly important, as the CO2 concentration in the atmosphere has reached 400 ppm. One approach to contribute to the decrease of this hazardous emission is to recycle CO2, for example reducing it to formic acid. The hydrogenation of CO2 can be achieved with a series of catalysts under basic and acidic conditions, in wide variety of solvents. To realize a hydrogen-based charge-discharge device ('hydrogen battery'), one also needs efficient catalysts for the reverse reaction, the dehydrogenation of formic acid. Despite of the fact that the overwhelming majority of these reactions are carried out using precious metals-based catalysts (mainly Ru), we review here developments for catalytic hydrogen evolution from formic acid with iron-based complexes. Related material
Decoder BEMF Motor Control. I offer the following for those who are mystified on how a decoder controls the motor speed using BEMF.  You must understand how PWM motor control works BEFORE you can understand this section.  To read how decoder PWM motor drive works, go here:PWM Motor Drive 1) Decoder BEMF Control. 2) Decoder BEMF VS Variable Track Voltage. 1) Decoder BEMF Control. (DCC) Simplistically, BEMF is active motor speed control.   In its pure form, it will force the motor to operate at a constant speed independent of the load losses both internally to the motor and on the shaft (train).   It does this by measuring the BEMF voltage being generated by the motor and maintaining its value at a constant. BEMF creates a feedback loop to regulate motor speed.   Measure BEMF, determine speed error, adjust PWM as required. Decoder BEMF will increase the PWM duty cycle (longer On-pulse) as required to maintain the desired motor speed to compensate for the increased motor slip.  Increasing slip means the motor draws more current and hence draws more power.  BEMF will indirectly increase the power (current) as much as needed to maintain the motor speed. Stated another way, BEMF will dynamically increase the effective DC motor voltage to maintain a constant speed to account for the motors increased slip.  This is not unlike one turning up the DC throttle to keep the train going at the same speed up the hill. In this case, you the operator is acting just like the BEMF feature of a decoder!!! In practice there are different motors and the decoder will need to learn the usable BEMF voltage range.  Some of this is done with the user fine tuning the BEMF values and some it done by the decoder itself depending on how well it is designed.  A perfect BEMF decoder will control any type of motor at any speed without any adjustments inputs. When we say dynamically increase the effective DC motor voltage, we are again speaking of Duty Cycle.  BEMF dynamically adjusted the Duty Cycle with NO fixed value.  All BEMF knows is your DESIRED speed as indicated by the throttle speed step value.  The duty cycle value id calculated "on the fly" and adjusted as needed to maintain the BEMF voltage from the motor at a constant value independent of track voltage and load on the motor.   When you raise the track voltage, the Duty Cycle will go down assuming there is no load change on the motor shaft.  Hence there is no fixed relationship between the speed step value and the duty cycle you get.  The speed at which these "on the fly" adjustments are made is really fast.   At the slowest engine speeds, the calculation can potentially be adjusted a 50 or more times per rotation.  (How fast is up to the Decoder designer) The point is you get smooth motor rotation regardless of any variation of loading on a per turn basis.    Key Point with Decoder BEMF enabled: Decoder relates Speed Step Value to a BEMF voltage value. Not Duty Cycle which is what happens when BEMF is off. This is why the analogy to a car's cruise control is often sighted.  The car will go the same speed up the hill as it will on a flat road.   But when you go up the hill, you hear the engine shift gears and the gas consumption go up.  The load has increased because we are lifting the car up the hill.  Cruise control will do anything it can to maintain the MPH speed of the car.  Does not matter what the quality of the road your on nor the density of the air, nor air temperature nor the condition of the tires. BEMF Example: If you have the same train operating on flat track, at the same speed step value, same track voltage, the Duty Cycle value with BEMF on will be the same as with BEMF being off.  ----BUT----  If you have that same train now hit a grade, then the Duty Cycle value with BEMF on will be higher than it will be with BEMF off.  Why?  BEMF on will have accounted for the increased motor slip due to the increased load and the train speed will remain unchanged going up the grade.  That is what motor speed feedback does...Speed Error detection and correction.   However, wIth BEMF off, the Duty Cycle value has remained at its pre-fixed value as before and not account for the increased load and motor slip allowing the train to slow down.  There is no motor feedback to tell the decoder the speed has slowed down. 2) Decoder BEMF VS Variable Track Voltage. (DCC) All of the above discussion, we have assume the track voltage is constant. Let now talk about what happens when the track voltage varies. With respect to Detlef's comment that the current will go up when the track voltage goes down UNDER Decoder BEMF control, he is CORRECT. The conditional part of above statement being true must include the fact that the maximum Duty Cycle has not been reached under BEMF control at the lower track voltage.  If BEMF was turned off, then the current will not go up at all.   In fact it will go down and the train will slow down as most people expect would happen if the track voltage went down. This gets a lot more technical but the easiest way to look at it is from an energy conservation point of view.   Under Decoder BEMF control, the engine is still pulling the same train at the same speed on the same grade as it was before the track voltage was lowered since BEMF is regulating the motor speed independent of track voltage.  Stated another way, the amount of watts needed to pull the train has not changed. Motor Watts = Track Voltage x Motor Amps. Motor Amps = Motor Watts / Track Voltage. If the watts needed to pull the train is not allowed to change and the track/motor voltage is dropped, then the current MUST go UP proportionally to keep the watt value unchanged.  Motor Watts = 6 Watts Track Voltage = 12V Motor Current = 6 Watts / 12V = 0.5 Amps. Lets drop the track voltage by 2V. Motor Current = 6 Watts / (12V - 2V) = 6W / 10V = 0.6 Amps A drop in track voltage of 2 volts forced a increase in motor current of 0.1 Amps. The reverse is true, if one raises the track voltage by 2V, the current will go down the other way relative to the 0.5A What many people may not know is that pure BEMF will account for layout wiring voltage losses and any booster output voltage value up to a point.  So when you set a given speed step on a throttle with BEMF on, the engine speed will be the same regardless of the layout you run on as long as one does not hit the maximum Duty Cycle.  Once the maximum Duty Cycle has been reached, BEMF has lost speed control of the motor (no regulation reserve) and the motor speed will now directly follow track track voltage.  Further drops in track voltage will result in current going down resulting in less available watts to pull the train resulting in the train slowing down.  The point is there is a upper limit in terms of what Decoder BEMF can do. Hope this helps people understand what is going on. Last Update: 5/21/15
The Logic of Listening Tests Casual readers may not believe this, but in the world of audiophilia there are people who enjoy organising scientific listening tests – or more aptly ‘trials’. These involve assembling panels of human ‘subjects’ to listen to snippets of music played through different setups in double blind tests, pressing buttons or filling in forms to indicate audible differences and preferences. The motivation is often to use science to debunk the ideas of a rival group, who may be known as ‘subjectivists’ or ‘objectivists’, or to confirm the ideas of one’s own group. There are many, many inherent reasons why such listening tests may not be valid e.g. • no one can demonstrate that the knowledge you are taking part in an experiment doesn’t impede your ability to hear differences • a participant who has his own agenda may choose to ‘lie’ in order to pretend he is not hearing differences when he, in fact, is. • etc. etc. The tests are difficult and tedious for the participants, and no one who holds the opposing viewpoint will be convinced by the results. At a logical level, they are dubious. So why bother to do the tests? I think it is an ‘appeal to a higher authority’ to arbitrate an argument that cannot be solved any other way. ‘Science’ is that higher authority. But let’s look at just the logic. We are told that there are two basic types of listening test: 1. Determining or identifying audible difference 2. Determining ‘preference’ Presumably the idea is that (1) suggests whether two or more devices or processes are equivalent, or whether their insertion into the audio chain is audibly transparent. If a difference is identified, then (2) can make the information useful and tell us which permutation sounds best to a human. Perhaps there is a notion that in the best case scenario a £100 DAC is found to sound identical to a £100,000 DAC, or that if they do sound different, the £100 DAC is preferred by listeners. Or vice versa. But would anything actually have been gained by a listening test over simple measurements? A DAC has a very specific, well-defined job to do – we are not talking about observing the natural world and trying to work out what is going on. With today’s technology, it is trivial to make a DAC that is accurate to very close objective tolerances for £100 – it is not necessary to listen to it to know whether it works. For two DACs to actually sound different, they must be measurably quite far apart. At least one of them is not even close to being a DAC: it is, in fact, an effects box of some kind. And such are the fundamental uncertainties in all experiments involving the asking of humans how they feel, it is entirely possible that in a preference-based listening test, the listeners are found to prefer the sound of the effects box. Or not. It depends on myriad unstable factors. An effects box that adds some harmonic distortion may make certain recordings sound ‘louder’ or ‘more exciting’ thus eliciting a preference for it today – with those specific recordings. But the experiment cannot show that the listeners wouldn’t be bored with the effect three hours, days or months down the line. Or that they wouldn’t hate it if it happened to be raining. Or if the walls were painted yellow, not blue. You get the idea: it is nothing but aesthetic judgement, the classic condition where science becomes pseudoscience no matter how ‘scientific’ the methodology. The results may be fed into statistical formulae and the handle cranked, allowing the experimenter to declare “statistical significance”, but this is just the usual misunderstanding of statistics, which are only valid under very specific mathematical conditions. If your experiment is built on invalid assumptions, the statistics mean nothing. If we think it is acceptable for a ‘DAC’ to impose its own “effects” on the sound, where do we stop? Home theatre amps often have buttons labelled ‘Super Stereo’ or ‘Concert Hall’. Before we go declaring that the £100,000 DAC’s ‘effect’ is worth the money, shouldn’t we also verify that our experiment doesn’t show that ‘Super Stereo’ is even better? Or that a £10 DAC off Amazon isn’t even better than that? This is the open-ended illogicality of preference-based listening tests. If the device is supposed to be a “DAC”, it can do no more than meet the objective definition of a DAC to a tolerably close degree. How do we know what “tolerably close” is? Well, if we were to simulate the known, objective, measured error, and amplify it by a factor of a hundred, and still fail to be able to hear it at normal listening levels in a quiet room, I think we would have our answer. This is the one listening test that I think would be useful. 2 thoughts on “The Logic of Listening Tests 1. Unfortunately, double blind listening tests are the only way to establish whether subjects can hear a difference or not between various pieces of equipment and music file types etc. Of course some people could lie by saying that they can hear no difference but most people are honest. I do not believe any subjective claim on hi-fi forums or in hi-fi magazines. Those claiming that they can hear the differences between different forms of cable, power supplies or between cd quality and so called hires, should prove that they can do so by subjecting themselves to peer reviewed double blind tests to prove their claims. Otherwise they should either shut up or strongly qualify that their claims are only opinions and not facts. There is no doubt in my mind that equipment manufacturers etc. are making such tests but they probably never reveal the results. If some golden eared listeners were able to hear differences between music file types and resolution then there would be adverts emblazoned everywhere. 1. Hi Trevor That has got to be true, but not necessarily directly..? I would say that in a case where we can measure or calculate a deviation from the equipment’s stated function (e.g. a DAC or a cable, or the whole system) and can show that the error lies way below the threshold of hearing (established using listening tests and other science in the past), we don’t need to do a fresh listening test. We could also simulate the error, exaggerate it, and listen to it in isolation, or add it to music and listen to it. Far more casual listening tests could then confirm that the error is a red herring. No system will ever be error free, and I think that we lose all sense of scale when talking about the errors due to digital audio resolution, jitter etc. In order to understand these phenomena we have to draw pictures of them, and in order to see the errors we have to exaggerate them. If we improve the measurements by a factor of 1000 over the years, the picture stays the same! If the only way to verify each new system is to perform a scientific listening test, nothing will ever get done. I am not convinced of that at all! It would be so difficult and expensive, and almost always fruitless, that I think such tests hardly ever occur. At the end of the day, despite all the listening tests in audiophile history, the aim of an audio system remains basic ‘linearity’. Using the right chips, and checking the results with an oscilloscope, multimeter and, in this day and age, a PC-based measurement system, the manufacturer can get to the heart of the matter directly. It shows that their system is more-or-less the same as everyone else’s. (There are exceptions: ‘maverick’ designers believe their Frankenstein systems’ inferior measurements are a sign of genius and musicality). It is then time for the creative blurb, fancy box and logo to do their psychological work on the customers! Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Where is Western Sahara? Located in Northern Africa, Western Sahara has a 2,049.00 km border with Algeria (41 km), Mauritania (1,564 km) and Morocco (444 km).Many neighboring states reject the Moroccan administration of Western Sahara. Western Sahara is an African country covering 266,000.00 km2. This makes it the 172nd smallest region in the world and about the size of Colorado. Its geographic coordinates are 24 30 N, 13 00 W and El-Aaiun is the capital city. It is named for its location in the desert. Its ISO code is EH. Its constitution was last ratified in 1999. Western Sahara has a mean elevation of 256 m above sea level. Its lowest elevation is Sebjet Tah which is -55m below sea level. Its highest elevation is unnamed elevation which is 805m above tall. The climate is arid, although it is temperate in the mountainous regions and hot and humid along the west coast. Its terrain is mostly low, with flat deserts and small mountains. Western Sahara has a population of 587,020 making it the 169th largest in the world. The majority of the population resides in Laayoune. Standard Arabic is the national language. The most common ethnic groups are Arab and Berber. The majority of the population identifies as Muslim. The dialing code for the country is 212. Factoring in Purchasing Power Parity, Western Sahara's GDP is $906,500,000.00 (USD) with $2,500.00 (USD) per capita. This makes it the 203rd largest economy and its citizens the 190th richest in the world. The currency of Western Sahara is the Dirham (MAD). Its main export is phosphates. Its major imports include fuel for fishing fleet, and foodstuffs. This page was last modified on September 6th, 2017
Tuesday, May 16, 2006 Coral reefs are decreasing in number due to warming A study conducted recently indicates that warming of oceans could lead to the extinction of coral reefs. In 1998 some 16% of the world's coral reefs would lost in just one year. The lost of these reefs caused ecological unstability as some aquatic species depend on coral reef to provide food and shelter. To understand more go to No comments:
In-flight disease transmission Concern has been increasing about those possible spread of communicable diseases during air travel. Infections of particular concern include tuberculosis, Neisseria meningitidis, measles, influenza and SARS. Only one investigation has documented transmission of Mycobacterium tuberculosis (TB) from a symptomatic passenger to six other passengers who were seated in the same section of a commercial aircraft during a long flight (>8 hours). These six passengers were identified by conversion to a positive tuberculin test; none had evidence of active tuberculosis. The HEPA-filters used in newer commercial aircraft (described above) are able to filter out TB bacteria from the recycled air and are used in hospital respiratory isolation rooms to prevent the spread of TB within the hospital setting. Furthermore, the number of air exchanges per hour in airplanes exceeds the number recommended for hospital isolation rooms. The risk of TB transmission on commercial aircraft, therefore, remains low. People known to have infectious TB should travel by private transportation, rather than a commercial carrier, if travel is required. Neisseria meningitidis Meningococcal disease has been documented in travelers, particularly those traveling for the Hajj; however, transmission due to exposure while aboard an aircraft has not been documented. Guidelines for the management of airline passengers who have been exposed to meningococcal disease are available; please contact Protea Tours for further information’s. Measles is a high contagious viral disease. Most cases diagnosed are imported from countries where measles is still endemic. Furthermore, a person infected with measles in contagious from the first onset of vague symptoms (up to 4 days before rash) to approximately 4 days after the development of rash; therefore, the potential for disease transmission during air travel is a concern. Despite the risk, very few cases of measles have been documented as a direct result of in-flight exposure. Travelers should ensure they are immunized if they have not had the disease. Influenza is highly contagious, particularly among people in enclosed spaces. Transmission of infection has been documented aboard an aircraft, with most risk being associated with proximity to source. Since December 2003, a new strain of avian influenza has been shown to cause infection to humans, with limited human-to-human spread. Because influenza viruses are very adept at changing, there is concern that this strain could eventually become a threat and this affect air travel. SARS was first identified in South China in November 2002 and recognized as a global threat by March 2003. it is caused by a new coronavirus, the SARS-associated coronavirus. Despite the clear role of international travel in the spread of SARS during the 2003 outbreak, only one case of in-flight transmission has been confirmed. From investigations of disease outbreaks associated with air travel, two main risk factors for the spread of communicable diseases have been identified: flight duration (>8 hours) and seating proximity to the source. There is also increased risk of spread when the aircraft ventilation system is off. in general, the environmental systems are on when the engines are on or when an auxiliary unit is used, such as when the aircraft is on the ground at the gate. to reduce the spread of disease, standard respiratory and hand hygiene practices should always be encouraged. People with febrile illnesses or other possible communicable diseases should postpone air travel. Furthermore, airline regulations require that passengers be removed from an aircraft within 30minutes of shutting off the ventilation system. To reduce the international spread of mosquitoes and other vectors, a number of countries require disinsection of all in-bound flights. WHO and the International Civil Aviation Organization (ICAO) specify two approaches for aircraft disinsection: either spray the aircraft cabin with aerosolized insecticide (usually 2% phenothrin) while passengers are on board, or treat the aircraft's interior surfaces with a residual insecticide while the aircraft is empty. Some countries use a third method, in which aircraft are sprayed with an aerosolized insecticide while passengers are not on board. Although disinsection, when done appropriately, was declared safe by the WHO in 1995, there is still much debate about the safety of the agents and methods used for disinsection. Although passengers and crew members have reported reactions to both the aerosols and residual insecticides, including rashes, respiratory irritation, burning eyes, and tingling and numbness of the lips and fingertips, there are no data to support a cause-and-effect relationship. Guidelines for disinsection are being updated for the revised international Health Regulations. While only a few countries require disinsection for all in-bound flights, many countries reserve the right to increase the use of disinsection in the setting of increased threat of vector or disease spread. ALOR DIVE wish you a pleasant journey PDF print version
Skills For Bipolar Mood Triggers Read More This is a fact: when a person gets depressed initially, there is a 50 percent chance that he will fall to the same predicament over again. And come the 2nd time, you have the threat that this individual will go to a third manic depression episode. Manic depression is a genuine illness as it involves the mental, emotional and even physical performance of the person. This is not just a transient sad feeling that will go away when one wills it to. There are symptoms and signs as well as corresponding treatment. If not handled properly and soon, it may grow to worse conditions. Similar to other illness, depressive disorder in addition has variations. Major depression is a culmination of all the symptoms and signs that get involved with one’s capability to work normally. It could happen once, but recurring episodes are a possibility. Bipolar disorder is also a kind of depressive disorder that involves drastic mood changes, from being very high one minute to severely depressed another minute. The manic cycle could make the individual hyper and overenthusiastic but it transforms as soon as the stressed out cycle hits. The stressed out cycle has all the symptoms of depression. 1. Continious “empty” feeling 2. Serious hopelessness 3. Feeling guilty and worthless most the time 4. Shortage or loss of pursuits in activities that used to bring joy to the individual and this includes sex. 5. Prominent fatigue 6. Has a difficult time {making|taking decisions 7. Development of sleeping problems 8. Loss of appetite and drastic body change or loss 9. Suicidal attempts plus desires. 10. Pronounced irritability 11. Physical aches and discomfort which may have no physiological basis The good thing is at the end of this dark canal called depression, there is great hope. Treatment is gotten in 3 types: hypnosis, antidepressant medicine and the combination of the two. There are also times when electroconvulsive therapy (ECT) and light remedy are use. Share This: This entry was posted in Uncategorized. Bookmark the permalink. Leave a Reply
Geo-data Crowdsourcing and Outreach Crowdsourcing is a way to utilize civic engagement in the concrete rather than abstract. By addressing the public and providing tools for engagement, planners can reveal hidden insights into public needs and concerns regarding civil infrastructure projects. A part of introducing most every public infrastructure project is the public hearing or town-hall meeting where citizens can gather to hear and discuss the project. Maps and plans are usually put on display for a limited time and citizens are frequently given archaic means to comment. Without actually stopping by the public space for the meeting or viewing the displays, frequently on view in a lobby, stakeholders have few ways to keep up with what is being said by their fellow citizens. Geo-data crowdsourcing solves this by allowing direct participation.  By leveraging a public facing crowdsourcing program, planners can maximize public trust through transparent engagement. City Version 3 Expertise Our team has developed multiple types of geo-data crowdsourcing tools both for desktop and for smart phones. Through the use of geo-data crowdsourcing tools, planners can gather community suggestions for improvements to public infrastructure, such as bicycle parking, bikeshare station locations, bus shelter locations, and so on. Cities can leverage the crowd to take inventory of infrastructure, gather maintenance requests and report on completion for such things as potholes that need filling, street light outages, traffic control device requests, and more.
Server Connectors Deproxy uses server connectors to provide fine-grained control over how an endpoint receives a Request object and returns a Response object. Connectors can specify how sockets are created, and bytes are transferred to/from that socket. By default, an endpoint will will use a SocketServerConnector, which will serve requests over a socket. ________ request _________ handleRequest __________ ________ | Servlet| |Connector| | Endpoint | | Handler| | etc | <------- | | <-------------- | | | | |________| response |_________| return |__________| <---- |________| Built-in Connectors Deproxy provides the following built-in server connectors: • SocketServerConnector - This connector acts as a stand-alone HTTP server. It creates a socket on the given port, starts a thread that listens on that socket for incoming connections, and spawns a new thread to handle each new incoming TCP connection. Requests are read off the wire and converted from octet sequences into Request objects. Likewise, Response objects are converted to octet sequences and sent back to the source of the request. Each spawned thread can handle multiple HTTP requests in succession. However, the requests aren’t pipelined. That is, each request is handled and a response to it sent before the next request is read. This connector does not yet support HTTPS. • ServletServerConnector - This connector extends javax.servlet.http.HttpServlet and can therefore be embedded into a servlet container, such as Tomcat. It relies on the container to handle the management of sockets, threading, and translation of request and response from/to octet sequences. Specifying Connectors The Endpoint constructor accepts a connectorFactory parameter. This can be any method or closure that accepts an Endpoint as a parameter and returns an object that implements the ServerConnector interface. If no connectorFactory is specified, the Endpoint will default to SocketServerConnector. If a connectoryFactory is specified, then that factory will be used to get the connector during Endpoint construction. Additionally, if an argument is passed to connectorFactory, then the port parameter of both addEndpoint and the Endpoint constructor will be ignored; the port argument is only passed to SocketserverConnector constructor. def deproxy = new Deproxy() def servletEndpoint = deproxy.addEndpoint( connectorFactory: ServletServerConnector.&Factory); Tomcat.addServlet(rootCtx, "deproxy-servlet", servletEndpoint.serverConnector as Servlet); Custom Connectors You can create a custom server connector by implementing the ServerConnector interface. The ServerConnector interface only has a single shutdown method. The Endpoint is passive and relies on the connector to initiate the handling process. It is the responsibility of a custom connector to: 1. retrieve a Request object from some source, 2. pass the request to the Endpoint via the handleRequest method, 3. receive the Response back from handleRequest, and 4. send the response back to the origin of the request. Suppose you want to test a proxy for more than just its handling of certain request information. For example, how does it handle connection interruptions? ________ ________ ________ | | ---> 1. Request ---> | | ---> 2. Request ---> | | | Client | | Proxy | | Server | |________| |________| X <--- |________| 1. The client sends a request to the proxy 2. The proxy forwards the request to the server 3. While the server is returning the response, it hangs. Not all of the octets of the response are sent back to the proxy. What will the proxy do in this case? Throw an exception and log an error? Hang and catch fire? In order to test how the proxy will behave in this situation, we can create a custom server connector that sleeps for an arbitrarily long time while sending data. Here’s some example code for the connector: class SlowResponseServerConnector extends SocketServerConnector { public SlowResponseServerConnector(Endpoint endpoint, int port) { super(endpoint, port) void sendResponse(OutputStream outStream, Response response, HandlerContext context=null) { def writer = new PrintWriter(outStream, true); if (response.message == null) { response.message = "" writer.write("HTTP/1.1 ${response.code} ${response.message}") // sleep for a really long time. don't return headers And here’s the test that uses it: def deproxy = new Deproxy() def endpoint = deproxy.addEndpoint( connectorFactory: { e -> new SlowResponseServerConnector(e, 9999) def theProxy = new TheProxy(port: 8080, targetHostname: "localhost", targetPort: 9999) def mc = deproxy.makeRequest(url: "http://localhost:8080/") assert mc != null assert mc.handlings.size() == 1 assert mc.handlings[0].response.code == "200" assert mc.receivedResponse.code == "502" The server stops sending data halfway through sending the response. The handler in effect is simpleHandler, so the response generated should be a 200. However, because the full response never makes it back to the proxy, the proxy should eventually timeout and return a 502 Bad Gateway response to the client. ServerConnector Lifecycle When a Deproxy is shutdown, all of it’s Endpoints are shutdown as well. • SocketServerConnector - The default connector. 1. When the connector is created, it opens a socket on the designated port and spawns a thread to listen for connections to that socket. 2. Whenever a new connection is made, the listener thread will spawn a new handler thread. 3. The handler thread will proceed to service HTTP request, like so: 1. First, the incoming request is read from the socket, and parsed into a Request object. 2. Next, the connector will pass the Request to the endpoint by calling the handleRequest method. 3. The endpoint will: 1. Examine the request headers for a Deproxy-Request-ID header, and then try to match it to an existing MessageChain (created before in a call to makeRequest). 2. Determine which handler to use (see Handler Resolution Procedure), and pass the Request object to the handler to get a Response object. 3. If there is a MessageChain associated with the request, a Handling will be created and attached to the message chain. Otherwise, it will be attached to the orphanedHandlings list of all active message chains. 4. Return the response back to the connector. 4. The connector then sends the response back to the sender. 5. Finally, if the Request or handler indicated that the connection should be closed (by setting the Connection header to close), then the handler thread will exit the loop and close the connection. Otherwise, it will return to step a. above. 4. When shutdown is called on a parent Endpoint object, the connector will be shutdown. Its listener thread will stop listening, and no longer receive any new connections. Any long-running handler threads will continue to run until finished or the JVM terminates, whichever comes first. • ServletServerConnector - This connector expects to be loaded into a servlet container. Therefore, it neither creates threads nor opens sockets, and its shutdown method does nothing.
Researchers at the Icahn School of Medicine at Mount Sinai partnered with Sweden's Karolinska Institutet to study the baby teeth of patients with autism spectrum disorder (ASD). Their study, "Fetal and postnatal metal dysregulation in autism," was published in Nature Communications in April. It detailed that biomarkers in the layers of the ASD patients' teeth revealed they were exposed to higher concentrations of lead and other neurotoxins in utero and within the first months of life. Baby teeth from identical twins (at least one of whom was diagnosed with ASD), as well as identical twins without ASD, revealed the timeline of microchemical composition exposure throughout the earliest years of the children's lives. Dentine, the material that makes up inner tooth layers, retains an imprint of the microchemicals absorbed by the body from the earliest development of the tooth. Teeth develop beginning in the fetal stages and the first few years after birth. With each week, a new layer of dentine is formed. Each layer of dentine contains traces of the minerals and micronutrients the baby is exposed to, whether through the mother's nutrients or in their living environment post-birth. Tooth-matrix biomarkers in the teeth of ASD patients showed higher levels of lead a chemical that is widely known for being a neurotoxin. Lead has been tied to many detrimental effects on the brain, such as lower intelligence and overall lower cognitive function. High levels of lead found in dentine layers developed around three months post-birth were more likely to predict severe cases of autism. Conversely, low levels of manganese were consistent in ASD patients concerned with teeth of the control group. Researchers noted this dip in manganese level was prevalent in the first trimester and 15 weeks post-birth. They also found the difference was as much as 2.5 times lower than that of the twin without ASD. Furthermore, biomarkers with low levels of zinc were also discovered. The greatest deficiencies (as much as 28 percent lower than average) were found in dentine from the same time periods as the lowest levels of manganese. Medical professionals, from doctors to dentists, need to be vigilant about recommending proper neonatal vitamins to pregnant patients. Many women are unaware of the impact their nutrition has on the baby; professionals can help remedy this by providing information and referring them to trusted educational sources. Additionally, while homebuilders today are cognizant of materials with lead, many older homes still contain toxic amounts in the materials and pipes. Recommend patients keep an eye out for possible sources of lead and other neurotoxins to prevent unnecessary exposure.
Regulations Posted on February 15, 2017 | Policy Report Permit Freedom Download the report here (1.5 MB) Being free means not having to ask permission. Having rights means being able to choose—to decide and to act—without needing approval from some authority figure first.  When America’s founding fathers declared independence from Great Britain, they rejected the monarchical idea that freedom is a gift that kings give their subjects. Instead, the new nation was based on the idea that people are fundamentally free—that they have the right to pursue happiness as they see fit, so long as they respect the rights of other people to do the same. James Madison thought that principle was the founders’ “most triumphant” achievement. Sadly, America is steadily turning back from a free society—where freedom is regarded as a basic right—into a Permission Society, where our freedoms are regarded as privileges that government gives us when it chooses. Whether it be starting a business, building a home, buying a gun, supporting a political candidate, or even to taking medicine, our ability to make our own decisions is increasingly curtailed by permit requirements, licensing restrictions, and other rules that require us to get government permission before we may do what we think best with our lives.  Most of these laws exist at the state and local levels. For example, about one–third of Americans today must get some form of permission from the state to do their jobs. Property owners are frequently forced to give up land, money, or other rights in exchange for building or development permits. In many states, people seeking to buy guns must prove there is “good cause” for them to own a firearm, while bureaucrats are allowed to define “good cause” however they wish. Laws that restrict political campaigns are often so complicated that even skilled lawyers don’t know what is and isn’t allowed, and must ask a government agency to pre-approve what their clients want to say. In some communities, local politicians have used the complexities of permit rules to nullify state laws—as in Maricopa County, where officials have used permit delays to block implementation of a 2010 ballot initiative that legalized medical marijuana. In many places, citizens must get permits to cut down trees, to give tours, or even to close failed businesses. Some states go so far as to forbid new businesses from opening unless they first get permission from their own competitors These different rules all have one thing in common: they essentially reverse the longstanding principle that people are presumptively free, and that their freedom may be taken away only if they harm others. In a Permission Society, the individual is not free without government say-so. That puts government in a powerful position to impose restrictions on citizens and to demand things from them in exchange for the freedom to act.  The Goldwater Institute has drafted legislation that gives citizens a powerful tool to fight back against this trend. The Permit Freedom Act protects citizens against abuse whenever government imposes any kind of permit requirement on citizens. While licensing laws and permits can be an effective way to protect public safety, the safeguards in the Permit Freedom Act ensure that citizens are given fair warning of what the law requires, that they have a real chance to defend themselves in court, and that bureaucratic agencies make decisions in a timely manner, so that citizens can know what is and is not allowed.  Along with rules that help guarantee that citizens get due process of law when they go through the permitting process, the Permit Freedom Act will help ensure that our freedoms are not treated as privileges that government officials can choose to give or to withhold as they wish.  Requiring people to get permits before they engage in certain activities is often reasonable. If an activity is likely to cause serious accidents that can’t be fixed afterwards, it makes sense to require people to prove beforehand that they know what they’re doing. A good example is driver licenses: car accidents are common, and can be deadly. A person who dies in a car accident can’t be brought back to life, so it makes sense to take preventative measures beforehand, rather than punishing people after accidents happen. And the rules for driver licenses are usually clear and objective—people only need to be basically competent at driving, and government doesn’t show favoritism: anybody who satisfies the requirements can get a license.  But when licensing or permit requirements are applied outside of those contexts, they can wrongly deprive people of freedom, weaken our economy, and give government dangerous and unjust powers.  First, the permit system is based on the assumption that the government knows what should and should not be permitted. But that’s often untrue. For instance, some licenses (called “Certificate of Need” or CON laws) make it illegal to start a new company until the owner persuades the government that it would serve a “present or future public convenience and necessity.” These terms have never been defined, meaning that bureaucrats are free to decide at will whether a new business is “convenient” or will be in the future. Of course, nobody can possibly know such a thing. Nobody, for instance, could have proven in the 1980s that the United States “needed” a new chain of coffee shops—there were plenty already—but the decades that followed, Starbucks’ success proved there was such a need. The only way to learn whether any new business will serve a “public need” is to try it and see if it succeeds. Government officials—who have no profit-based incentive to predict the economic future correctly—can’t reliably foresee what businesses will prove successful. Economists call this the “knowledge problem”: no individual, business, or government agency, can possibly know all of the information necessary to make the “right” economic decisions, because there are simply too many factors.  Permit requirements work best when they are simple, clear, and objective. If the question is whether a person has gone to medical school, or whether a house has been built out of the proper materials, the knowledge problem is minimized. But when permit requirements force people to predict the future, or include subjective criteria—such as “good cause” or “convenience”—or require bureaucrats to know information that cannot possibly be known, they run the risk of limiting freedom for no good reason.  A related problem is the fact that permit requirements hinder innovation and experimentation. As economist Adam Theirer notes, nobody could have proven ahead of time that such web-based businesses as, Uber, or eBay would succeed. Yet thanks to rules that in the 1990s blocked government from interfering with Internet commerce, entrepreneurs had the freedom to try. Some, like, failed. But others succeeded, revolutionizing our way of life. “These innovations were able to flourish because our default position for the digital economy was ‘innovation allowed’ or permissionless innovation,” writes Thierer. “No one had to ask anyone for the right to develop these new technologies and platforms.”  Permit requirements force people to ask for the right to try new ideas. But even if an inventor or entrepreneur manages to prove a proposal’s merit—which can be prohibitively difficult—the delay alone can often destroy a budding business idea. Thierer gives the example of Free World Dialup, a company which in the 2000s tried to start a simple Internet-based video-call service similar to Skype. It took a year and a half for federal officials to decide that it didn’t need a permit under federal telecommunications regulations—but by that time, foreign-based Skype went ahead with its business plan, dooming Free World Dialup to failure.  Worse still is the cost imposed when the system stifles new ideas before they’re born. If people want to try something innovative, and the process for getting approval is expensive and time consuming, they might be deterred from trying things that could better our lives. It’s hard to measure this cost because when new ideas are stifled or abandoned before reaching the market, they never come into existence to begin with. These costs are therefore unseen. But while these costs may be invisible, they are real. They take the form of what might have been if only people had been allowed to try.  One thing that worsens the knowledge problem and the hindering of innovation is vague permit criteria. Vague rules are a serious threat to freedom, because if people don’t know what is and isn’t legal, they run the risk of being trapped or surprised later. If a law prohibited, say, “bad things” without defining that term, it would be impossible to know what would and wouldn’t be punished—and government officials could prosecute whomever they chose for whatever they wanted. Consequently, citizens would hesitate to act—or even to exercise other rights—for fear of crossing some invisible line and incurring punishment.  Compounding these problems is the phenomenon economists call “rent seeking,” better known as lobbying. When a government permit is necessary to run a business, that permit can be worth a lot of money—and it then becomes worthwhile for people to spend time and money to get that permit or to keep it away from their rivals. When an entrepreneur applies for a CON, for instance, existing companies that don’t want new competition will typically exercise their power to block the government from issuing the license to a potential competitor. Meanwhile, consumers—who would benefit from competition—often don’t even know such laws exist. This means bureaucrats may fall under the influence of politically powerful companies that use the system to benefit themselves by barring competitors and raising prices.  Another downside to permit requirements is the fact that when the government is in a position to grant or withhold permission to use property or exercise other rights, it is also in a position to demand something in exchange. Local governments frequently demand that property owners give up land, cash, or other rights in return for building permits. Officials in one California city even forced a family to give up their constitutionally protected right to vote in exchange for a permit to build a second story on their home. Most fundamentally, the Permission Society undermines the principle of equality. When freedoms are seen as privileges that the government gives the citizen, that means the citizen stands beneath the government—and must beg for the right to act. That’s the opposite of how freedom is supposed to work. Rights aren’t permissions, because rights already belong to us—we don’t ask the government for them, and the government can’t impose conditions on them. But when bureaucrats treat rights as privileges, they empower themselves and reduce citizens to a subservient position that is unhealthy for freedom.  The most infamous permit system in our legal history is known as “prior restraint.” Abolished more than 350 years ago, the prior restraint required British subjects to get a government permit before publishing a book or expressing their political or religious opinions. When the U.S. Constitution was written, one of the first rules its authors made clear was that Americans could not be subjected to any prior restraint requirement.  That total prohibition on prior restraints was later watered down by U.S. Supreme Court rulings. Yet the court made clear that even when prior restraints are allowed, the government still must provide certain procedural safeguards to protect citizens from abuse. The court listed several basic requirements, three of which are particularly important:  •  The standards for whether a permit will be granted or denied must be clear—vague standards that enable government officials to enforce the rule subjectively are unconstitutional;  •  The law must provide a clear deadline for when the permit will be granted or denied— officials must not be allowed to delay a permit application indefinitely;  •  The applicant must have an opportunity for independent judicial review—a day in court to challenge the government if a permit is wrongfully denied. These guidelines were originally applied to restrictions on free speech, but the Supreme Court has also made clear that any law that “makes the peaceful enjoyment of freedoms which the Constitution guarantees contingent upon . . . a permit or license” must provide such procedural safeguards, or the law will qualify as “an unconstitutional censorship or prior restraint upon the enjoyment of those freedoms.” In other words, all permit requirements must abide by these three standards.  Unfortunately, although courts have sometimes struck down specific permit requirements for violating these rules, they have done so inconsistently, and sometimes not at all.  The criteria for getting permits are often vaguely phrased. Consider, for example, the city of Mesa’s rules governing residential building permits. To get a permit, a house must have “adequate design features to create visual variety and interest” and must “create a distinctive and appealing community.” No doubt everyone would like an “appealing community,” but such terms are subjective, aesthetic judgment calls—not the kind of clear guidelines the law should provide. In 2008, when Ryan and Teresa Coleman asked the city of Mesa for a permit to open a commercial tattoo parlor, the city said no. Despite the fact that their application satisfied all required safety standards, the city council decided, by a 3-2 vote, that a tattoo parlor was not “appropriate” for the location.24 What qualifies as “appropriate” is anyone’s guess.  The Colemans sued, and the Arizona Supreme Court ruled in their favor. By denying them a permit, the court said, the city intruded on their right to free speech. But other kinds of businesses that don’t qualify as speech—hardware stores, restaurants, or gift shops—don’t enjoy that same legal protection, so the city’s vague zoning rules remain in place for them.  Sometimes courts just ignore the vagueness problem, or even openly defy constitutional standards. In a 1971 case, for instance, California justices ruled that that state’s “courts permit vague standards because they are sensitive to the need of government in large urban areas to delegate broad discretionary power to administrative bodies.” But the purpose of the law is to limit the “broad discretionary power” of government officials.  Even in areas other than zoning, the standards for getting permits or licenses are often subjective. For instance, Louisiana requires florists to be licensed, and to get a license, applicants must take a test where they are graded on their understanding of such artistic notions as the “harmony” and “effect” of flower arrangements.Gun permits are also frequently phrased in vague terms. Massachusetts, for instance, only allows “a suitable person” to get a gun license, even though courts have struggled unsuccessfully to define “suitable.” A federal court recently upheld a California law that bars people from carrying firearms unless they show “good cause”—even though “good cause” is not defined. Under such broad language, government officials can decide arbitrarily whether to grant or deny a permit.  And despite the rule that permit requirements must include specific deadlines saying when the applicant will get an answer, the reality is that agencies can take an indefinite amount of time to decide whether or not to grant permits. Even when a law does specify a reasonable time limit, the permitting process frequently involves numerous postponements and exceptions. The website of the city of Litchfield, Arizona, for example, frankly admits that “timelines may vary due to volume and suspensions for delays caused by the need for public hearings, state or federal licenses.”These hearings often result in applicants being asked to revise their applications and to come to another hearing—a process that can go on and on.  Courts have allowed this, on the theory that as long as the applicant gets another hearing, and another, and still another, his due process rights are still protected. “This ensures that due process becomes a blanket to suffocate, not a route to speedy and prompt review in the courts,” writes Professor Richard Epstein. “So long as there is hope within the administrative system, the courts remain closed to those who must have a permit in order to proceed with their business.”But for people who need a permit to build or to run a business, or to defend themselves with a firearm, such delays amount to a prohibition— worse, in fact, since an applicant is usually not allowed to ask a court to intervene as long as these delays continue. Even when agencies refuse to issue any permits, property owners and others often have no legal recourse. Finally, the rule that applicants are entitled to judicial review has been eroded by laws that allow bureaucratic agencies to hold “informal” hearings in which the ordinary rules of evidence don’t apply.Worse, the laws also limit the authority of judges to review an agency’s decision on appeal.Because courts are required to defer to decisions by bureaucratic agencies,someone who is brought before an agency for a hearing often has no right to object when evidence that is normally inadmissible, such as hearsay, is used.Later, when the person appeals to an actual court, he is often barred from disputing that evidence or introducing new facts. Indeed, courts will typically uphold an agency’s determination, even if the evidence that the agency based its decision on is contradicted by other evidence.This means people can lose their rights through a process that violates the basic rules of our legal system. As a result, the promise that each citizen has a right to a day in court “has become largely symbolic rather than effectual in contemporary licensing cases.” Businesswoman Debra Nutall started a successful hair-braiding business in Memphis, Tennessee, in the early 1990s. She had learned the traditional craft from her mother, and her business was so successful that within a few years, she was training low-income workers in hair-braiding. But in 1995, the state Board of Cosmetology began threatening her with prosecution for running her business without a cosmetology license. She waged a 15- year fight for her business, working with state and federal lawmakers until she finally gave up and moved across the border to Mississippi, where no license is required. “I started a business and now it’s nothing,” she said. “It leaves you no hope.” When it comes to CONs, the rule can be even harsher. Most licensing laws are intended to test a person’s skills or honesty, but CON laws exist solely to protect existing businesses against competition. And although these laws were originally written over a century ago to regulate railroads, they apply today to a wide variety of industries—everything from taxicabs and moving companies to liquor stores, car dealerships, and even hospitals.  Here is how these laws work: when someone applies for a certificate, the government gives all existing companies in the industry a chance to object, and when an objection is filed, the applicant must prove to the government that there is a “public need” for the new company, or that the new firm would serve a “future public convenience.” No court has ever defined these terms, meaning that bureaucrats can deny the application even if the applicant is fully qualified, experienced, safe, and honest, simply because existing companies don’t want competition.  Licensing laws are thought to cost the nation’s economy as much as 2.8 million jobs annually, enough that the Obama administration issued a report in 2015 urging states to find different ways to regulate the economy.41 Because most of the jobs lost to these permit requirements never come into existence to begin with, it’s impossible to know exactly how many businesses would have started, how many jobs might have been created, and how many goods and services could exist today if they had not been stifled by licensing restrictions. Permit requirements also create opportunities for bureaucratic delay, meaning government can use them to prevent businesses or construction, or other activities—thus imposing severe costs on people—without actually denying them outright. In 2002, the Arizona Snowbowl applied for federal approval to expand its operations, and to use recycled water to make artificial snow on ski slopes. Years of litigation ensued when environmentalists and Indian tribes tried to block the project, until at last courts ruled in favor of the Snowbowl’s owners in 2009. Yet even after the Snowbowl won the lawsuit, the U.S. Department of Agriculture refused to issue the required snowmaking permit for another year. (The Snowbowl was finally allowed to proceed as planned in 2010.)  In Benson, Arizona, a planned development called Villages at Vigneto, which would bring 28,000 homes, schools, medical facilities, and more than 16,000 jobs to Benson and Cochise Counties,was halted in the summer of 2016 when federal officials suspended permits for 8,200 acres of the development. Local officials approved the project, eager to see the economic boost it could bring, and the U.S. Army Corps of Engineers deemed the project environmentally sound. But at the behest of another federal agency, the Corps suspended the permit, and the project is now stalled. These delays harm taxpayers as well as the government. In 2012, an Arizona court ordered the city of Kingman to pay a company nearly $500,000 in damages for delaying construction on a railroad underpass for so long that building costs skyrocketed. In a 2007 case, a Washington state court upheld a $10 million verdict against a city that stalled a building permit application for three years because local officials didn’t want an apartment building in the area.The government sometimes even imposes burdensome licensing requirements on itself. The U.S. Department of Interior forces federal Border Patrol agents to get permits to go onto federal lands, and in a 2010 survey, more than half of the agents reported long delays in getting permits. Permit rules can sometimes be a a good way to protect public safety. But they are a risky tool. They can stifle innovation, empower lobbyists at the expense of taxpayers, and provide opportunities government abuse and exploitation. That’s why the three basic procedural safeguards—clear criteria, explicit deadlines, and a genuine right to judicial review—are so important. These requirements already have the blessing of the nation’s highest court. But they’re often ignored in practice. State law can give them real meaning and protect the rights of citizens—while still allowing reasonable regulation.  The Goldwater Institute’s Permit Freedom Act provides that whenever the government requires any kind of license or permit, the criteria for granting or denying that permit shall be clear and unambiguous. Also, it guarantees that applications for permits will be decided within a specified time—either one month, or another specific period established by the legislature. The Act then requires that hearings held by administrative agencies must comply with the rules of evidence and procedure that already protect individual rights in court. And it provides that if a court later reviews an agency’s decision, it will apply its own independent judgment instead of rubber-stamping the bureaucrats’ decision.  The Permit Freedom Act is basic, commonsense reform that protects citizens and taxpayers. While it enables government to enforce rules that promote public safety, it gives real meaning to the “procedural safeguards” that are so essential to preventing government abuse and ensuring the protection of individual rights.  Appendix: Proposed Legislation Section 1: Permit conditions  Notwithstanding any other law, in any case in which a license or permit is required prior to a person engaging in any constitutionally protected activity, the criteria for the granting or denial of that license or permit shall be specified in clear and unambiguous language, and the applicant shall be entitled to a review and determination of that permit or license application within 30 days or such other time as the legislature shall by law prescribe. The determination of what constitutes clear and unambiguous language shall be a judicial question, without deference to the legislature or the agency.  Section 2: Agency hearings  A. Unless knowingly and voluntarily waived by the parties, all agency hearings must comply with the rules of procedure and rules of evidence required in judicial proceedings. Notice may be taken of judicially cognizable facts, and of generally recognized technical or scientific facts within the agency’s specialized knowledge. Parties shall be notified either before or during the hearing or by reference in preliminary reports or otherwise of the material noticed, including any staff memoranda or data, and parties shall be afforded an opportunity to contest the material so noticed. The agency’s experience, technical competence, and specialized knowledge may be used in the evaluation of the evidence.  B. The parties to a contested case or appealable agency action have the right to be represented by counsel or to proceed without counsel, to submit evidence, and to cross-examine witnesses.  C. A party may file a motion with the director of the agency to disqualify an administrative law judge from conducting a hearing for bias, prejudice, personal interest, or lack of technical expertise necessary for a hearing. The administrative law judge may issue subpoenas to compel the attendance of witnesses and the production of documents. The subpoenas shall be served and, on application to the superior court, enforced in the manner provided by law for the service and enforcement of subpoenas in civil matters. The administrative law judge may administer oaths and affirmations to witnesses.  D. All hearings shall be recorded. The administrative law judge shall secure either a court reporter or an electronic means of producing a clear and accurate record of the proceeding at the agency’s expense.  E. On application of a party or the agency and for use as evidence, the administrative law judge may permit a deposition to be taken, in the manner and on the terms designated by the administrative law judge, of a witness who cannot be subpoenaed or who is unable to attend the hearing. Subpoenas for the production of documents may be ordered by the administrative law judge if the party seeking the discovery demonstrates that the party has reasonable need of the materials being sought. All provisions of law compelling a person under subpoena to testify are applicable.  F. Disposition may be made by stipulation, agreed settlement, consent order, or default. Findings of fact shall be based exclusively on the evidence and on matters officially noticed. A final administrative decision shall include findings of fact and conclusions of law, separately stated. Findings of fact, if set forth in statutory language, shall be accompanied by a concise and explicit statement of the underlying facts supporting the findings.  G. The burden of proof in agency hearings shall be preponderance of evidence. Notwithstanding any other law, at a hearing on an agency’s denial of a license or permit or a denial of an application or request for modification of a license or permit, the agency has the burden of persuasion. At a hearing on an agency action to suspend, revoke, terminate, or modify on its own initiative material conditions of a license or permit, the agency has the burden of persuasion. At a hearing on an agency’s imposition of fees or penalties or any agency compliance order, the agency has the burden of persuasion.  Section 2: Review of agency action  In any action to review a final administrative decision, the parties shall be entitled to a speedy and public determination by a court of law. If requested by a party to an action within 30 days after filing a notice of appeal or petition for review, the court shall hold an evidentiary hearing, including testimony and argument, to the extent necessary to make the determination. Notwithstanding any other law, for review of final administrative decisions, the court shall decide de novo all relevant questions of law, including the interpretation of constitutional, statutory, and regulatory provisions, unless the parties stipulate otherwise. On demand of any party, if the determination of facts may be made by a jury. Relevant and admissible exhibits and testimony that were not received during the administrative hearing shall be admitted so long as compliant with the rules of evidence, and objections that a party failed to make to evidence offered at the administrative hearing shall be considered, unless either of the following is true:  1. The exhibit, testimony, or objection was withheld for purposes of delay, harassment, or other improper purpose.  2. Allowing admission of the exhibit or testimony or consideration of the objection would cause substantial prejudice to  another party.  Timothy Sandefur is Vice President for Litigation. Before joining Goldwater, he served 15 years as a litigator at the Pacific Legal Foundation, where he won important victories for economic liberty ... Read © 2014 Goldwater Institute. All rights reserved
2010年3月12日 星期五 Driving by the Numbers Driving by the Numbers Published: March 11, 2010 Cambridge, Mass. Transportation Secretary Ray LaHood recently said the federal government may recommend that carmakers install “smart pedals”that give brakes priority when both brake and accelerator pedals are pressed simultaneously. Meanwhile, Toyota has said that, in contested acceleration accidents, it will give regulators access codes to data recorders — essentially, onboard black boxes being installed in some new cars.But sometimes the solution to a safety problem is simply more transparency. Indeed, there is a relatively easy solution that would help identify problems before they affect thousands of cars, or kill and injure dozens of people: allow drivers and carmakers real-time access to the data that’s already being monitored. Because carmakers believe such diagnostic data to be their property, much of it is accessible only by the manufacturer and authorized dealers and their mechanics. And even then, only a small amount of the data is available — most cars’ computers don’t store data, they only monitor it. Though newer Toyotas have data recorders that gather information in the moments before an air bag is deployed, the carmaker has been frustratingly vague about what kind of data is collected (other manufacturers have been more forthcoming). But what if a car’s entire data stream was made available to drivers in real time? You could use, for instance, a hypothetical “analyze-my-drive” application for your smart phone to tell you when it was time to change the oil or why your “check engine” light was on. The application could tell you how many miles you were getting to the gallon, and how much yesterday’s commute cost you in time, fuel and emissions. It could even tell you, say, that your spouse’s trips to the grocery store were 20 percent more fuel-efficient than yours. Carmakers could collect the data, too. Aberrant engine and driving behavior would leap out of the carmakers’ now-large data set, allowing them, if necessary, to conduct recalls much earlier. And, in exchange for your contribution of anonymous data, carmakers could send you driving benchmarks aggregated from your peers; then your app could tell you how your driving compares with the average of all drivers of the same car. Having such readily accessible data streaming from your car might raise fears of a Big Brother scenario, in which carmakers would know where you are and how you are using (or misusing) your vehicle. But you would still decide whether you wanted to tap into the data, how you would use it and with whom you’d share it. Allowing drivers and carmakers access to real-time performance data wouldn’t prevent every future mechanical failure. But it would allow carmakers and entrepreneurs to develop analytical tools to help catch developing problems in both individual cars and entire model lines. Cars would continue to break down and even cause accidents, but it wouldn’t take a Congressional hearing to figure out why. Robin Chase, the founder and former chief executive of Zipcar, is on the Intelligent Transportation Systems Program Advisory Committee for the United States Department of Transportation.
Chrome and Platinum Ore from Rustenburg, in the Bushveld Complex of the Transvaal, South Africa chromite [261 kb] "Rock of the Month # 60, posted for June 2006" --- Sample 1731, showing friable, granular chromitite of the UG-2 Reef from Rustenburg Platinum Mines (Breskop shaft). Collected in situ on 13 November 1995 and donated by Mark Rebagliati. This sample displays the basal 2 cm of the UG-2 chromitite, in sharp contact with a footwall "pyroxenite", in this instance a granular norite of 1-mm grain size. The chromitite is composed largely of the chrome spinel, chromite, while the underlying norite is also a simple rock, apparently containing roughly 60% yellow-brown orthopyroxene, 35% plagioclase feldspar, and 5% brighter green clinopyroxene. The nature of chromite and the geological context of this sample are described briefly below. Chromite, is the principal ore mineral of the metal chromium. It is a cubic oxide of the spinel family, ideal formula FeCr2O4. In practice, the more common occurrences of chromite include significant deviations from the simple ideal, especially the partial substitution of Mg for some of the Fe (FeII), and of Al and FeIII for some of the Cr. Black and shiny, it often goes unseen in hand specimen, individual grains commonly <0.25 mm in diameter. It is nevertheless a very common accessory mineral in a range of igneous rocks, such as basalts, gabbros and their metamorphic equivalents, and is also found as small, equant grains in many if not most ordinary chondritic meteorites. The black layer in this sample consists of perhaps 80 volume percent chromite, and is termed a chromitite. The balance is largely plagioclase feldspar and bronzite (an orthopyroxene), plus minor interstitial clinopyroxene and biotite mica, and quite possibly small grains of platinum-rich minerals. The Bushveld complex is the world's largest mafic-ultramafic layered intrusion. It underlies an area of roughly 66,000 km2, rivalled only by the >50,000 km2 of the Dufek intrusion in Antarctica. Diverse igneous rocks of iron- and magnesium-rich compositions host the majority of world's resources of metals such as nickel (Ni), chromium (Cr), vanadium (V) and the six platinum group elements (PGE), of which platinum (Pt) and palladium (Pd) are the best-known. Rhodium (Rh) and gold (Au - the most famous precious metal is not one of the PGE) are often included in estimates of PGE resources on the Bushveld. The lesser PGE are iridium (Ir), ruthenium (Ru) and osmium (Os). The igneous layering exposed in outcrop and drillcore has been minutely studied since Hans Merensky's 1924 discovery of the platinum-rich "reef" of layer that bears his name. Soon after, and somewhat deeper down the igneous stratigraphy, the highest important example of a series of chromite-rich reefs was discovered. It is known as the UG-2 (or UG2) Reef. The UG-2 is overlain by a noritic- anorthositic sequence 10-200 m or more thick, capped by the Merensky Reef. Until recently the more complex metallurgy of the UG-2 has slowed down its exploitation relative to the Merensky Reef. It is nevertheless minutely documented: a MINLIB bibliographic search of some 700 mostly public-domain publications on the Bushveld complex included roughly 1 item in 7 describing aspects of the UG-2 (e.g., Maier and Eales, 1997; Cawthorn et al., 2002). The UG-2 is found in both eastern and western limbs of the complex, and the two famous reefs are destined to be the major suppliers of platinum, in particular, for the forseeable future. The Merensky and UG-2 reefs host some 90% of the world's known PGE reserves and produce roughly 80% of the Pt and 20% of the Pd mined each year. The UG-2 is quite thin, 75-150 cm from top to base, typically with about 7 parts per million by weight of (Pt + Pd + Rh + Au). This is a rich grade, compared with most PGE-bearing deposits, and combined with the great lateral extent of the gently- dipping reefs explains the primacy of the two principal reefs. Furthermore, the Bushveld ores are relatively rich in Pt, whereas elsewhere in the world many deposits show higher proportions of the generally-cheaper Pd. Curiously, the Cr2O3 content is quite modest, generally near 32 weight percent, and without the high PGE "coproduct" value, the UG-2 might not be an economically viable chrome deposit. CAWTHORN,RG, MERKLE,RKW and VILJOEN,MJ (2002) Platinum-group element deposits in the Bushveld complex, South Africa. In `The Geology, Geochemistry, Mineralogy and Mineral Beneficiation of Platinum-Group Elements' (Cabri,LJ editor), CIM Spec.Vol. 54, 852pp., 389-429. MAIER,WD and EALES,HV (1997) Correlation within the UG2-Merensky Reef interval of the Western Bushveld complex, based on geochemical, mineralogical and petrological data. Geol.Surv.S.Africa Bull. 120, 56pp. plus appendices. Graham Wilson, 29 October 2006 Visit the Turnstone "Rock of the Month" Archives! Return to Contents Page
Dystocia in the mare: Manipulating a better outcome Dystocia in the mare: Manipulating a better outcome When a foal’s improper placement is interfering with delivery, the veterinarian’s success hinges on accurate determination of the cause and swift, appropriate intervention. May 08, 2017 Figure 1. Dystocia in a mare. (All photos courtesy of Dr. Michael Spirito, Hagyard Equine Medical Institute)In horses, dystocia refers to any problem interfering with the normal birth of a foal, including improper placement of the foal in the birth canal requiring intervention, says Hagyard Equine Medical Institute veterinarian Michael Spirito, DVM (Figure 1). Dystocia can occur in all breeds of horses. The best chance for a successful outcome depends on a prompt assessment of the cause followed by rapid intervention. Understanding the stages of labor and parturition is fundamental to these steps. Spirito describes these stages as follows:   Stage 1 labor. The mare shows signs of abdominal discomfort as the foal moves into the correct orientation, which consists of three parts: presentation, position and posture (Figure 2). • Presentation: Anterior longitudinal, with the foal’s head presented toward the mare’s vulva • Position: Dorsal sacral, describing the relationship between the foal’s back and the mare’s spine • Posture: Extension of the extremities, head and neck Stage 2 labor. This stage, which shouldn’t last longer than 30 minutes, begins when the chorioallantois ruptures and ends when the foal is expelled. It is also the point at which it’s most important for the practitioner to decide whether to refer to a clinic or to continue attempting to reduce the dystocia. Stage 3 labor. This stage is complete when the placenta is passed. Figure 2. A foal with correct presentation, position and posture during stage 1 labor. (All illustrations adapted from Noakes DE, Parkinson TJ, England GCW, et al. Arthur's veterinary reproduction and obstetrics. 9th ed. Edinburgh, Scotland. Elsevier, 2009.)Initial points to ponder When a mare presents with a dystocia, Spirito says practitioners need to first ask the following questions: • Will the mare allow me to freely palpate her? • What is the foal’s viability? • What are my obstetrical skills? • Do I have the equipment and facilities I need to help the mare? • What are the client’s financial constraints? Once the practitioner feels comfortable moving forward, he or she needs to ascertain: • The mare’s history • Whether this is the mare’s first or second foal • The foaling date • How long the mare has been trying to foal • When the mare’s water broke • Whether the mare is experiencing discomfort. “Once these items are determined, I sedate the mare and clean her vulva and adjacent areas with water and betadine,” says Spirito. “I then wrap her tail up to keep it out of the way and to lessen the risk of contamination. With an assistant at her head and another at her tail, I then don a sleeve and palpate the foal.” Spirito feels around for whatever he can locate first, which is usually the foal’s head or often a front or a hind leg. From there, he begins manipulating the foal to determine its placement, which helps establish his next steps. Figure 3. Assisted vaginal delivery of a standing, sedated mare.Dystocia intervention According to Spirito, there are four procedures to solve a dystocia. Manual manipulation. Assisted vaginal delivery, in which the practitioner manually manipulates the foal in a sedated, standing mare, should be attempted first (Figure 3). The practitioner should pull in time with the mare’s uterine contractions to reduce trauma to both the foal and the mare and may find tools (such as a head snare or chains on distal limbs) helpful. Once the foal is properly positioned and the rib cage enters the pelvic canal, the mare should be allowed to finish delivering the foal herself to lessen the chance of fracturing the foal’s ribs.    Controlled vaginal delivery. Controlled vaginal delivery should be done at a referral clinic with the mare under general anesthesia and in the Trendelenburg position, which utilizes gravity to repel the foal. The advantage of this procedure is that the foal can be repelled in a cranial direction with respect to the mare to allow more room for manipulation. Cesarean section. When a dystocia cannot be resolved vaginally, the practitioner can perform a cesarean section with the mare in dorsal recumbency using a caudal ventral midline incision (Figure 4). Indications for this procedure include a severely malpositioned fetus, an abnormal birth canal or a need to reduce reproductive tract trauma.   Fetotomy. A fetotomy is reserved for a dystocia in which the foal is confirmed dead and cannot be delivered via vaginal manipulation. Figure 4. A practitioner performing a cesarean section on a mare. Most common dystocia presentations Spirito outlines the most common dystocia presentations as follows: Anterior presentations 1. Incomplete elbow extension occurs when the fetal hooves lie at the same level as the muzzle. Correcting this presentation involves repelling the fetal trunk as far as possible and then applying traction on one limb at a time, thereby positioning the foal in a more normal presentation (Figure 5-1). Figure 5-1. Incomplete elbow extension.2. Dog sitting/hurdling position is characterized by apparent normal positioning, but the foal won’t move. Upon further palpitation, the practitioner will discover one or two feet hind up (Figure 5-2). Figure 5-2. Dog sitting/hurdling presentation.3. Carpal flexion/contracture is a common presentation that generally affects foals that are either quite large or that are contracted to some extent. To correct this presentation, the practitioner should pull the feet with a chain applied to the pastern with the carpus reflected laterally. A hand should guide the foot and the rotation should be gradual to avoid tearing the uterus (Figure 5-3). Figure 5-3. Carpal flexion/contracture presentation.4. Foot over nape position occurs when one or both of the forelimbs are displaced over the head and against the roof of the vagina. Correcting this position involves repelling the fetus while the forelimbs are pulled under the head (Figure 5-4). Figure 5-4. Foot over nape presentation.5. Head and neck lateral flexion is a common abnormality that is difficult to correct. If the fetus is alive, the practitioner should attempt to repel the foal and bring the head around (Figure 5-5). Figure 5-5. Head and neck lateral flexion presentation.6. Head and neck ventral flexion can be fairly easy to correct if the fetal nose is just below the brim of the pelvis and the foal is not too large. Correcting this position involves applying pressure to poll and placing the snare on the lower jaw (Figure 5-6). Figure 5-6. Head and neck ventral flexion presentation.7. Shoulder flexion may be unilateral (“swimming” position) or bilateral (“diving” position), and the fetal head can make access to the retained forelimb impossible. A cesarean section may be the only option (Figure 5-7). Figure 5-7. Shoulder flexion presentation. Posterior dystocia presentations 1. Hock flexion is typically bilateral. If the practitioner attempts to pull the foal, he or she risks rupturing the dorsal wall of the uterus. If the foal is small enough and there is adequate room, the position can be corrected using reduction. Otherwise, a cesarean section is called for if the foal is alive. 2. Bilateral hip flexion usually occurs with deformed foals. A cesarean section is generally preferred. Ventral dystocia presentations 1. Anterior/ventral position is generally easy to resolve—even at the farm—though it’s important to keep the head straight while rotating the foal and engaging it into the birth canal (Figure 6). Figure 6. Anterior/ventral position.2. Posterior/ventral/extended posture carries a risk that the hind legs will penetrate the vagina or rectum. The practitioner can attempt to rotate the foal and deliver in a posterior position, but this is risky if the foal is large. Transverse dystocia presentations Transverse dystocia presentations aren’t common and are most often associated with a congenital abnormality. Surgery or fetotomy may be necessary. Today, equine practitioners have the tools, equipment and experience to treat mares presenting with dystocia far more effectively than in the past. Equine practitioners at Hagyard Equine Medical Institute and similar facilities, along with graduates of excellent equine programs at veterinary institutions across the country, routinely bring about successful outcomes in equine dystocia cases with limited downside if the condition is treated in a timely and appropriate fashion. Suggested reading Spirito MA. Review of how to triage a dystocia, in Proceedings. 62nd Annu Conv Am Assoc Equine Pract 2016; 6-12. Noakes DE, Parkinson TJ, England GCW, et al. Arthur’s veterinary reproduction and obstetrics. 9th ed. Edinburgh, Scotland. Elsevier, 2009.
Got Computer Science? You Should Computer Science Education Week is Dec. 7 – 13 hands typing on a keyboard Because this week, Dec. 7–13, is Computer Science Education Week, sat down with Jeffrey R.N. Forbes, associate professor of the practice of computer science at Duke University, to discuss computer science education and how essential it is to address it through the lens of social justice. Last month, Forbes was named chair of the ACM Education Policy Committee, a high-level group of computer scientists and educators dedicated to improving opportunities for quality education in computer science and computing education around the world. In this role, Forbes and other committee members will play an important role in developing initiatives aimed at shaping education policy that affects computing education. [RELATED: Lack of Talent Pipeline a ‘Myth’ Says Congressional Black Caucus Chair] Why is computer science so important? Forbes: It’s interesting, I worked at the National Science Foundation from 2011 to 2014, and at that time, if you talked about computer science education, people were confused about what that meant. But now you’re starting to see parents ask about what opportunities there are for their children in school; the computing community is really rallying around that. The Education Policy Committee has the ability to make sure that access to quality computer science education is available to a broader set of students than currently has been the case. It is certainly true that schools with more resources tend to offer advanced placement computer science. We often focus on AP because we can very clearly identify what they’re actually doing. In schools that have fewer resources that say they have a computer science course, what they actually have is a typing course, or a course in how to use Microsoft Word. So one of the things that ACM has been pushing successfully for is getting people to understand that computer science does not just mean being a consumer of computer technology. It means actually creating technology, writing programs, engaging with computational tools in a real academic way. So we now have twice as many schools offering AP computer science as we did four years ago, but it’s important to recognize that the percentage of schools offering it has gone down over 20 years, which doesn’t make a lot of sense. Retaining high-quality computer science teachers is a challenge. We were involved in a project that took unemployed IT people who worked as teachers. But after the economy improved, they left. Or schools’ budgets were crunched during the recession and the first teachers they let go are the computer science teachers because computer science courses aren’t required. So what’s going to happen? In addition to getting more high quality computer science courses out there, we want them to fulfill a high school graduation or university entry requirement; that would make high quality computing education sustainable. What is the significance of the AP computer science course? AP is a lever that provides reliable statistics and some fidelity of replication—a more or less standardized approach, and there’s going to be a new one next year: AP Computer Science Principles is designed fundamentally around participation in computer science, whereas the old course focused on programming. The new one clearly shows the connection to all the incredible things you can do in computer science, which was not always clear with the old course—which some described as tedious and painful. The new course is a broad view of computing designed to engage students. It looks at the creative aspects and the societal impact of computing. Many colleges have gotten behind it. Using AP as a kind of gauge doesn’t solve everything because so many schools don’t offer it. It’s important to note that AP computer science has a much lower percentage of African Americans taking it than AP calculus. So, even schools that have resources to offer an AP calculus course may not be offering a computer science course, or African American students may not be taking the course. (Continued on next page) Pages: 1 2
How to Train Your Mind to Be More Zen There are many different forms of mind training. In fact, for more information on mind training, see 마음수련. One of those methods, however, is Zen. It is believed, in Buddhist practices, that Zen mind training is necessary to achieve enlightenment. Enlightenment, and reaching Nirvana, requires 100% dedication, something that is unachievable for most people. That doesn’t mean, however, that people should stop Zen practices. Rather, by performing Zen techniques, you will be able to achieve peace of mind and to boost your mind. Best of all, you can do it whenever and wherever. Let’s take a look at the main Zen meditation techniques. The Noble Eightfold Path There are eight specific practices involved in the Eightfold Path, being: 1. Right samadhi (union, or meditative absorption). 2. Right mindfulness. 3. Right effort. 4. Right livelihood. 5. Right conduct. 6. Right speech. 7. Right resolve. 8. Right view. These practices are depicted on a wheel, with the prajna (insight) standing central to it. Mindfulness Training When you start on the path to enlightenment, you begin with mindfulness training. The more you practice, the better you get, and the more advanced your possible practices become. Hence: 1. You start by improving your understanding of and sympathy towards others. This sets you free from the binds of ideologies and doctrines. 2. You then start to learn from the different life’s truths. This is about respecting the beliefs of others, even if they are wholly different from your own. 3. You will then start to care more about those people who have things less good than you. This is about living more simply, and feeling more attuned with the world around you. You should also walk and practice deep breathing exercises, which will allow you to let go of anger. Anger about your personal situation, but also anger about the injustices in the world. Zen mindsets are calm and patient. 4. Next, you will be ready to resolve conflicts and reconcile adversaries. You will learn to listen without condemnation or judgment. No longer will you engage in gossip or speak criticism. 5. You will then start to practice Sangha, which means you live free of abuses and injustices. Your goal should be to prevent war and protect life, and this starts with yourself. Giving up harmful substances such as alcohol and drugs is an integral part of this. You will also work towards making sure no one can profit from the suffering of others, such as the weapons industry. Most people never make it past the first few steps of mindfulness or Zen training. However, by understanding the noble Eightfold Path and having enlightenment as an ultimate goal in mind, even if you will never achieve it, will help you to become a better person overall. The key starting point towards all of this is meditation, enabling you to walk or sit and put your mind at ease, rebalance yourself and make yourself calm again. This is something everybody can benefit from. How to Help People With Mental Health Issues No Comments Leave a Comment.
Tour des Fouilles (15): The Roman bridge of Vaison and the miracle of 1992 Vaison-la-Romaine is famous for its Roman remains. The settlement - a city in size, but without walls or a regular street grid - was the main city of the Gaulish tribe of the Vocontii. There are two major exacavations around the centre of the town, and they are a regional tourist hotspot. You can see the remains of urban villas, of several bath complexes, of streets with shops, and of a theatre, and the museum has a great collection of art objects found during the excavation of the site, which happened in the early twentieth century. It is, in other words, one of those sites that archaeologists would recommend to friends, family and other interested non-specialists. Vaison also has a Roman bridge, crossing the Ouvèze, connecting the city to the road that ran on the other side. Vaison-la-Romaine, Pont Romain: View from the east - As you can see, the bridge is built of stone blocks, and its core is a semicircular arch, with a span of 17m. Note also that the bridge is high: the distance between the water and the highest point of the arch is more than ten meter. Some readers will know that the arch was (like concrete) one of those very practical Roman innovations that completely changed the game of infrastructure construction: without arches, it was much harder to build secure bridges (and thus roads). The bridge at Vaison-la-Romaine is one of many Roman bridges that are still standing.Yet, in some respect, that is kind of a miracle. For, as the valley here is rather small, things may get quickly out of hand when there excessive quantities of rain fall in a short period, which happens quite regularly in the Mediterranean. The fact that the bridge in 2000 years has never been washed away by torrential rain in itself is a compliment to Roman construction. All the more, if you realize how bad things can get in Vaison. The below video shows what happened on September 22, 1992: It is a spectacular film, but this was actually quite a big disaster. 35 people lost their lives in the region, a lot of property was damaged, the entire archaeological site went under water. But de bridge stood there, stubbornly refusing to give in - while entire caravans were smashed to pieces against its arch. Indeed, some modern bridges proved less durable on that day. And, one may add: this can hardly have been the first time that something like this happened at this place in the last 2000 years.
SOCS 644 Toward an Archaeology of the U.S. Prison System Demetrius Eudell Course Description Although the breach of social norms, to which we give the name crime, exists in all societies, the responses to committing crimes is always generated from each society’s particular understanding of its way of life and its conception of what it means to be fully human. In other words, jurisprudence is not a natural phenomenon, but rather is a socio-culturally constituted mechanism invented in order to regulate the behaviors of all members of the society. This course examines a central institution in our culture-specific approach to dealing with social transgressions: the prison system. It attempts to ask how and why prisons developed as the central mode for adjudicating breaches of the social order. Beginning with David Rothman’s classic Discovery of the Asylum, this course seeks to interrogate the historical and cultural origins of what has more recently come to be known as the prison industrial complex. It does so by utilizing an archaeological approach that examines the social, political and intellectual foundations of the modern form of the institution in the nineteenth century. It aims to show that the invention of the prison system cannot be separated from the intellectual breakthroughs, especially in the natural sciences, that also defined the era. The course will also pose the question of the effectiveness (however it is defined) of the prison system. Given that many critics contend incarceration is not achieving specific objectives (deterrence for instance), why maintain such a strategy? It is in this context that the metaphysical basis for prisons can be understood as prisons served not only to punish, but also to reaffirm our culture-specific self-conception and related notion of order. Such can clearly be seen with the acrimonious debate surrounding the death penalty, an issue in which many aspects of our understanding of crime and punishment intersect. Issues such as justice, punishment, forgiveness, evil, and revenge that underlay the current debate on the issue will be analyzed to show their effects on political discourse, social policy, and the lived reality of the victims of crime, the incarcerated, and the families and loved ones of both. Required Texts All of the following books have been ordered and can be purchased at Red and Black Books at 45 Broad Street, Middletown, CT.  Angela Davis, Are Prisons Obsolete? Ruth Wilson Gilmore, Golden Gulag: Prison. Surplus, Crisis, and Opposition in Globalizing California Judith W. Kay, Murdering Myths: The Story Behind the Death Penalty Cesare Lombroso, Criminal Man Jeffrey Reiman, The Rich Get Richer and the Poor Get Prisons: Ideology, Class and Criminal Justice Dylan Rodríguez, Forced Passages: Imprisoned Radical Intellectuals and the U.S. Prison System David Rothman, Discovery of the Asylum: Social Order and Disorder in the New Republic Evaluation of Course Performance The final grade in the course will be determined by regular attendance to class meetings, oral presentations, several short essays, and a final paper. In additional to at least two oral presentations, each student will be required to submit a response paper on each of the required texts for the class. The response paper is due before the first day of discussion of the text but will be accepted at any time before that, including before the actual beginning of class. The papers (approximately 3 pages in length) should briefly discuss the major argument in the text and then discuss its effectiveness (through mode of argument, methodology, or use of evidence). Why is (or is not) the author’s argument convincing or compelling? Does it change the way in which you think about current public debates and discussions on the origins or contemporary operations of the prison system? The final paper, with a topic to be given out later, is to be at least 8 (eight) pages in length and will be due on July 27, 2007. Course Schedule Week 1: The Nineteenth Century Context: Intellectual Foundations June 25-26 Rothman, Discovery of the Asylum June 27-28 Lombroso, Criminal Man Week 2: Race, Poverty, and Incarceration July 2-3 Reiman, The Richer Get Richer and the Poor Get Prison July 4 No class in observance of 4th of July holiday July 5 Davis, Are Prisons Obsolete? July 6 Kay, Murdering Myths Week 3: Toward a Reconceptualization of the Prison Industrial Complex July 9-10 Gilmore, Golden Gulag July 11-12 Rodriguez, Forced Passages
Sentence Examples • KRIVOY ROG, a town of south Russia, in the government of Kherson, on the Ingulets River, near the station of the same name on the Ekaterinoslav railway, 113 m. • It was formerly called Nikitin Rog, and occupies an elongated peninsula between two arms of the Dnieper at a point where its banks are low and marshy, and has been for centuries one of the places where the middle Dnieper can most conveniently be crossed. • Russia's most valuable ore deposit is the very large and easily mined one of Krivoi Rog in the south, from which comes about half of the Russian iron ore. How would you define rog? Add your definition here. comments powered by Disqus
→ Calculus → Optimization Updated 1 Jan 2014 (What’s New?) Copyright © 2003–2017 by Stan Brown Summary: One of the main applications of the derivative is optimization problems — finding the value of one quantity that will make another quantity reach its largest or smallest value, as required. Here’s an overview of the solution techniques. Steps to Optimization 1. Write the primary equation, the formula for the quantity to be optimized. The quantity to be optimized is the dependent variable, and the other variables are independent variables. Write down whether the dependent variable is to be maximized or minimized. 2. Before you can proceed, the primary equation must contain only one independent variable and the dependent variable. If you have extra variables, as usually you do, you must construct one or more secondary equations that involve the independent variables in the primary equation. (Usually a problem constraint will lead to a secondary equation.) Substitute the secondary equations in the primary equation to eliminate the extra variables. 3. Write down the feasible domain, the values of the remaining independent variable that make sense in the problem. Usually this information will come from the problem or your common-sense knowledge (such as no negative areas). 4. Find the desired maximum or minimum. (See summary below.) 5. Write the answer to the problem. Make sure you have answered the actual question! Example: Soda Can A standard US can of soda (or pop, depending on where you live) holds 12 fluid ounces or 355 ml. Find the dimensions of a cylindrical can that will use the least amount of aluminum. Solution: The dependent variable is the amount of aluminum. Essentially, you must minimize the surface area of the cylinder. Write the primary equation: the surface area is the area of the two ends (each πr²) plus the area of the side or lateral area to minimize: A = 2πr² + 2πrh The primary equation contains two independent variables, r and h. Can you relate them in some way? Yes, the problem constraint is that the volume equals 355 ml (or 355 cm³). This gives the secondary equation: V = πr²h = 355 Since h occurs once in the primary equation, and as a linear term, it will be easy to eliminate. Solve the secondary equation for h: h = 355 / πr² Substitute in the primary equation: A = 2πr² + 2πr·355/πr² ⇒ A = 2πr² + 710/r There are no obvious constraints on the feasible domain, except that r and h must both be positive. Since the feasible domain has no endpoints, you need not check whether they are minima. To try to find maxima or minima, differentiate: dA/dr = 4πr − 710/r² d²A/dr² = 4π + 1420/r³ Find critical numbers where dA/dr = 0 or does not exist. The derivative does not exist at r = 0; however you can disregard that because r = 0 is outside the feasible domain. 4πr − 710/r² = 0 ⇒ r = cuberoot(710/4π) ≈ 3.84 cm Is this a minimum, a maximum, or neither? Since d²A/dr² is positive for all positive r, the critical point r = 3.84 cm must be a minimum. The problem asked for the dimensions of the can with lowest surface area, which means that you also need the height. To find it, substitute r = 3.84 in the secondary equation and get h ≈ 7.67 cm. Answer: A cylindrical can with volume 355 ml will use the least aluminum if its radius is about 3.84 cm and its height is about 7.67 cm. Check: V = πr²h = π(3.84²)(7.67) = 355.3 cm³, the same as the required volume give or take a little rounding difference. Because a real soda can is not exactly cylindrical, you can’t expect perfect agreement with these figures. I measured about 3.2 cm radius and 12.7 cm height on a can of Barq’s root beer, including the top and bottom extensions. By the way, you may have noticed that the radius is about ½ the height. In fact, you can prove that the cylinder of a given fixed volume with the lowest surface area will always have r = h/2. Instead of setting V = 355 keep V as a letter and treat it as a constant. You will have r = cuberoot(V/2π) and substituting V = πr²h gives r = h/2. Steps to Finding Minimum or Maximum 1. Differentiate with respect to the independent variable. You will need both the first and the second derivatives. 2. Find the critical numbers, where f′ is 0 or does not exist. 3. For each critical number (call it c), evaluate the second derivative f″(c) to find whether you have a maximum, a minimum, or neither, as follows: 4. You must also evaluate the original function (primary equation) for each endpoint of the feasible domain, if it has endpoints. Compare to the function values at the optimum points from step 3. What’s New Because this article helps you, please click to donate! Because this article helps you, please donate at Updates and new info: Site Map | Home Page | Contact
Fun with maps Many factors traditionally determined borders between jurisdictions. Some follow approximately linguistic, ethnic or religious boundaries. Others are based on straightforward points of reference, such as rivers, lakes, mountain ranges or latitude/longitude coordinates. Few were ever determined with the help of a computer. What would the map look like if boundaries were created using the many data analysis tools we have at our disposal today? The first example below comes from an analysis conducted by Robert David Sullivan of CommonWealth magazine. His re-drawing of U.S. state boundaries is based on his county-by-county analysis of how Americans voted in elections from 1948 to 2008. The results is a 10-state U.S.A. (more if you treat non-contiguous regions, such as the Upper Coasts, as being separate states). Sullivan's political map of the U.S. Sullivan's political map of the U.S. The next map comes from Luanne von Schneidemesser, Ph.D., a linguistics professor at the University of Wisconsin-Madison. Her map is based on English usage in the U.S. — specifically, the terms that people use to refer to beverages such as Pepsi and Coca-Cola. Her map shows a 5-8 state U.S. divided largely along north/south and East Coast/West Coast lines. Von Schneidemesser beverage terminology map of the U.S. Von Schneidemesser beverage terminology map of the U.S. Here’s an interesting one that looks at Canada’s ethnic boundaries. It still comes out to about 13 provinces or territories, depending on where you draw the lines, but a redrawing of our provincial and territorial boundaries along these lines would still produce a much different looking Canada than we know today. Census ethnic distribution map Census ethnic distribution map Now, on the other hand, here is a border that doesn’t seem to follow rhyme or reason. It’s the border between the Belgian provinces of Flanders and Wallonia, and by extension, between the Walloon town of Braine-L’Alleud and the Flemish town of Sint-Genesius-Rode. What’s noteworthy about this boundary is that it might become Europe’s next international border. Belgians went to the polls a few days ago and elected a parliament in which the Flemish separatists are the largest party. You might recall this blog discussing Belgium’s problems in late April. This week’s election seems to bring the country even closer to breakup. Nowhere are these problems more acute than in the towns and suburbs that straddle the Flemish-Walloon frontier, where a 38-year-old woman was “refused permission to buy a house in the southern suburb of Sint-Genesius-Rode because she can’t prove sufficient Flemish roots” (!) and where, if you happen to ask for a government form in the ‘wrong’ official language, you’ll have to wait for authorization. If these tensions lead to a Belgian breakup, it could truly complicate life in Sint-Genesius-Rode/Braine-L’Alleud, where the would-be international boundary between an independent Flanders and an independent (or French-annexed) Wallonia would run through the middle of a few houses, meander across peoples’ yards, bisect the occasional driveway and, in at least one instance visible below, cut through a family’s backyard swimming pool. There Goes the Neighbourhood: Walking the dog could turn into an international journey in this Belgian neighbourhood if that country splits up Fortunately for residents of Avenue du Saphir/Saffierlaan — where merely walking down the street takes you from Flanders to Wallonia — it’s unlikely that there would be any border controls requiring people to report to customs if they merely walk down the street. It does make you wonder, though, which country’s postal system would be responsible for delivering the mail to that one house about half-way down the street, where the boundary appears to run between the sidewalk and the mailbox. About theviewfromseven Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s %d bloggers like this:
Prostate Cancer Prostate cancer occurs when cells in the prostate gland grow uncontrollably, resulting in a tumor. Since prostate glands are only found in the male reproductive system, only men can develop this type cancer. It is the second most common form of cancer in men behind skin cancer. According to estimates, nearly 3 million men are currently living with prostate cancer in the U.S, and one in seven men will be diagnosed with the disease in their lifetime. While common, the disease is highly treatable, and when caught at an early stage, the rate of survival is very high. Most men who are diagnosed with prostate cancer will not die from the disease. Causes and Risk Factors of Prostate Cancer Prostate cancer is caused by mutations of genes that lead to tumor growth. These mutations might be inherited (passed on from a parent) or acquired (caused by damage to the genes). The disease only affects men. Factors that increase your risk of prostate cancer include: • Age: Your risk of developing the disease increases with age, with 60% of prostate cancer cases occurring in men over the age of 65. • Race: Research shows that African-American and Caribbean men have a greater risk of developing prostate cancer than white men, and are more than twice as likely to die from the disease. Asian and Hispanic men have the lowest risk of being diagnosed with prostate cancer. • Geography: Rates of prostate cancer in men vary by location. The disease is most common in North America, the Caribbean, Europe, and Australia, with fewer cases in Central America, South America, Asia, and Africa. • Family history: Men with a family history of prostate cancer are twice as likely to be diagnosed with the disease than others. If your brother currently has or has had prostate cancer, you are more likely to be diagnosed with the disease than if your father has had it. • Gene changes: Some inherited gene mutations can lead to a higher risk of prostate cancer, but this only makes up a small percentage of all prostate cancer cases. Some mutations include Lynch syndrome, and the mutation of the BRCA1 or BRCA2 genes. There have been many studies exploring the impact of diet, weight, smoking, and sexually transmitted diseases on prostate cancer risk. Currently, there is not enough evidence to indicate any strong links between these factors and the risk of developing the disease, but research is ongoing. Living a healthy lifestyle, avoiding smoking, and practicing safe sex by using condoms are all recommended by doctors to protect your health. Prostate Cancer Prevention Men die each day from prostate cancer That's 26,730 this year — enough to fill a baseball stadium.” While many risk factors for prostate cancer cannot be controlled, such as age and race, you can take some preventative steps to lower your risk and lead a healthier life. Doctors recommend being physically active, maintaining a healthy weight, and eating a diet that includes two and a half cups of fruits and vegetables per day. Some studies suggest that the drugs finasteride (Proscar) and dutasteride (Avodart) may lower the risk of prostate cancer. As with any drug, there may be side effects, so speak to your doctor before taking any drug to prevent prostate cancer. Prostate Cancer Symptoms and Diagnosis Many men do not experience symptoms in the early stages of prostate cancer. Most medical professionals recommend men of average risk begin getting screened routinely for the disease at age 50. If you are at high risk or have a family history of prostate cancer, your doctor may recommend you begin screening at any earlier age. Some men experience the following symptoms of prostate cancer: Common Symptoms of Prostate Cancer • Problems urinating, such as a slow stream • Pain or a burning sensation when urinating • Increased need to urinate • Blood in the urine or semen • Pain in the hips, back, pelvis, or thighs • Weakness or numbness in the legs or feet • Loss of bladder or bowel control • Erectile dysfunction • Painful ejaculation These symptoms are not unique to prostate cancer and can indicate other issues with the body. Since the disease is easier to treat when caught early, it’s important to speak to your doctor if you experience any symptoms of prostate cancer. Doctors use a few different tests to diagnose prostate cancer. Many cases are diagnosed at an early stage through two primary screening tests, often before symptoms start to show. These tests include: • Prostate-specific antigen (PSA) test: A PSA screening is the first test a doctor will perform. PSA is a protein made by the prostate, and healthy men have little of it in their blood. To examine a man’s PSA level, the doctor will perform a blood test, and will usually order a biopsy when PSA is at 4 nanograms per milliliter of blood or higher. • Digital rectal examination (DRE): A doctor will insert a lubricated and gloved finger into a man’s rectum to feel for abnormal size and density of the prostate. This is typically done while the man is standing and bending at the waist. The examination can cause some temporary discomfort, and may result in slight bleeding. If these tests indicate cancer, the doctor will order a biopsy. A transrectal ultrasound (TRUS) is used to look at the prostate, and a sample of prostate tissue is extracted using a needle to be analyzed. If cancer is present in the sample, the doctor will order further tests, like an MRI or CT scan, to determine if the cancer has spread to other parts of the body. Additionally, doctors will assign a Gleason score on a scale from one to 10 that indicates how normal or abnormal the prostate looks. Higher scores indicate a more abnormal prostate. Stages of Prostate Cancer The stage of prostate cancer is determined by how far the cancer has advanced. Doctors will consider the patient’s PSA levels and Gleason score, the growth of the cancer, the lymph node status, and the level of metastasis. Prostate Cancer Stages Stage I: The tumor may or may not be noticeable from a DRE or imaging test. The cancer has not left the prostate. The Gleason score is six and PSA is less than ten. Stage IIA: Doctors may or may not be able to feel the tumor, and the cancer only exists in the prostate. The cancer has a Gleason score between six and seven, and the PSA is between 10 and 20. Stage IIB: The cancer may or may not be felt by a doctor through DRE and has not spread outside the prostate. Stage III: The cancer has spread outside the prostate and to nearby sites, but has not invaded lymph nodes or distant sites. Stage IV: The most aggressive stage, the cancer has metastasized and spread to distant parts of the body, and likely to nearby lymph nodes. Survival Rates and Life Expectancy Survival rates for prostate cancer range depending on the stage of the cancer at diagnosis. The National Cancer Institute (NCI) collects data and statistics on prostate cancer survival rates by stage, grouping cases based on where the cancer is located in the body. Local stage cases show cancer only in the prostate, while regional stage indicates that the cancer has spread outside the prostate but only to nearby organs. Distant stage is the most advanced, with cancer existing in other parts of the body and in lymph nodes. Prostate Cancer Survival Rates Stage5-Year Survival Rate Local Stage (Stages I and II)99% Regional Stage (Stage III)99% Distant Stage (Stage IV)36% The majority (79%) of prostate cancer cases are caught at the local stage, leading to a high probability of survival with proper treatment. Prostate Cancer Treatments and Therapies Men who are diagnosed with prostate cancer should consult with an oncologist and urologist to establish a course of action. Each cancer case is unique and requires an individualized treatment plan depending on the cancer’s stage and the patient’s circumstances. Treatments for prostate cancer include: • Active surveillance: Prostate cancer grows very slowly, so older men with localized prostate cancer may not need an aggressive treatment approach. Active surveillance consists of frequent monitoring of the cancer through PSA and DRE tests every few months. If results change and the cancer grows, more intensive treatment may be necessary. • Surgery: Many doctors recommend surgery if the cancer is only in the prostate. Surgery will entail removing the entire prostate and nearby tissues through a process called a radical prostatectomy. • Radiation: Using high-energy rays, radiation can be used to kill cancer cells in a localized area. This treatment is often used as a first option and sometimes in conjunction with other methods, like surgery. Doctors either use external beam radiation or brachytherapy for prostate cancer. • Cryotherapy: This procedure involves freezing the prostate to kill cancer cells by using a minimally invasive operation. Cryotherapy will kill both cancer cells and any cells nearby, and is typically only used in instances where the cancer returns after radiation treatment. • Hormonal therapy: Since hormones called androgens lead to prostate growth, doctors may lower androgen levels to stop the growth of the prostate. This is done either through medication or surgery, and is usually only used when other therapies are not an option. • Chemotherapy: The use of anti-cancer drugs through chemotherapy is employed if the cancer has spread to other parts of the body. Since chemo is not a localized treatment and attacks all cells throughout the body, it is only used in later stages of prostate cancer and if other treatments are ineffective. As with most cancers, the best way to treat prostate cancer is to catch it early. Stage I and II prostate cancer are the easiest to treat and have a high survival rate when treated properly. If you or someone you love is showing signs of prostate cancer, talk to your doctor as soon as possible.
This question originally appeared on Quora. 2012-03-02-cristinahartmann.jpegCristina Hartmann, Lawyer by day, writer by night. Let's start with skin color. After all, we need to know if any basis exists for interpreting Katniss as a woman of color. Katniss' skin color. Collins describes Katniss as having black hair, olive skin and gray eyes. Not very helpful, but let's look at the skin and eye color issue. Olive skin, according to Wikipedia: describes a skin color range of some indigenous individuals who are from the Mediterranean and some other parts of Europe, Middle East, and regions of South Asia, Southeast Asia Central Asia and Latin American [sic]. [1] So, olive skin encompasses both Causcian and non-Causcian backgrounds. Still not terribly helpful, moving on. Gray eyes apparently exist, despite my initial skepticism. Gray eyes occur the most often in North and East Europe. There are, however, some instances of gray eyes in North Africa and the Middle East.[2] Again, very ambiguous. According to her skin, hair, and eye color, Katniss could have European, Middle-Eastern, or North African ancestry. Other circumstantial evidence of Katniss' heritage. Katniss lives in District 12, also known as the Appalachia region of West Virginia. If we assume that the ethnic demographics of the futuristic Appalachia reflect District 12 demographics, maybe we can guess at Katniss' racial background. According to the Census Board, White persons make up 93.9 percent of West Virginia (compared to the national 72.4 percent). So, the odds are pretty overwhelming that Katniss is a white person (of indeterminable origin). Still, she could be in the remaining 4.1 percent! (Note that people of African descent constitute 3 percent of that 4.1 percent.)[3] If we make the very shaky assumption that District 12's racial demographics mirror modern demographics, the odds weigh heavily on Katniss being of Caucasian origin. Of course, Caucasians can come from North Africa, Middle East and some parts of Asia, as well as Europe.[4] Is this all much ado about nothing? Since circumstantial evidence points towards a Caucasian heritage, Jennifer Lawrence's casting doesn't violate the canon's material. As we see in the promotional material, the makeup artists darkened Lawrence's skin a bit. I'd have liked a more yellowish undertone to her skin (befitting the "olive" label), but whatever. Race seems to play little, if any, role in The Hunger Games. The books focus more on political oppression, tyranny, and television, not race. I wonder if the "layer of meaning" would detract from the core message of the books because of our unfortunate relationship with race. Sure, it'd be nice to see a minority woman in that role, but I don't think it's a deal-breaker. Addendum: I should've mentioned that I'm very displeased with the filmakers' decision to limit the casting call to white actresses. To preemptively decide that a racially ambiguous fictional character is white reeks of racism (intentional or unintentional). Perhaps a minority actress could've been a great fit for the role, but we'll never know because that choice was made too early. _________ [1]: Olive Skin (Wikipedia article) [2] Eye color (Wikipedia article): [3]: U.S. Census Bureau: West Virginia: [4]: Caucasian Race (Wikipedia article): More questions on The Hunger Games: categories Movies
First signs of spring  In Mid-February, we were able to observe the first signs of spring. At the end of November, the last cranes migrate to their wintering grounds in the south of Spain: this for most of us heralds winter. In contrast, when in February the first cranes are migrating back to their breeding grounds in the north of Germany or Sweden, some of the optimistic ornithologists claim that spring has started. As Luxembourg is situated on a 100-kilometre passage on the migratory track of the cranes, we have the opportunity to observe big groups of up to 1000 individuals migrating to the north. Last week, temperatures have risen by 5°C; this increase was a signal for up to 20 000 cranes to start their migration. This spectacle was observed by a lot of hobby ornithologists including myself; this means that between the 21 and the 23 of February I was able to count up to 5000 birds heading to the north. Not only cranes announce the spring, other indicators were singing like blackbirds and chaffinches; these two species hardly migrate, which explains their presence on the feeders during winter. Another species introducing the spring is the white stork. The first arriving white storks are always males, they are first because they need to occupy their territory and nest. Waiting for the female birds to arrive, they work on their nests in order to present a well-formed home, on which both of them can raise their chicks. A highlight for Luxembourg was the first breeding pair of the white stork in 2012. This bird species was extinct for decades, but it seems that the population is rising. Last week the first storks arrived and excited a lot of ornithologists. Apart from the aforementioned species, some of the most impressive birds of prey have also returned. The first red kites were observed in January. Last week, we were able to observe our local breeding couple, starting to rebuild their nest. In addition to the red kites, we observed the first reed buntings. This bird species, which uses reeds to feed and to raise their chicks benefits from the last grains on the feeders to survive the month of March. As reeds start to grow late in March, reed buntings depend on remaining grains which they find along fields or on the feeders. An additional spring species is the woodlark (Lullula arborea), which started singing in the vineyards last week. Autor: Dave Lutgen Write a comment Comments: 0
Let’s talk about toxins today! What are these harmful substances that build up in my body?  A toxin is defined as any element that is toxic to the body which means it has harmful effects on the body. The environment today and normal cellular metabolism exposes the body to toxins. In order to maintain health, is it very important that the body is able to handle the toxins and adequately eliminate them. Toxins can come from food or water, from chemicals, and even from the air that we breathe. Our bodies process those toxins through organs like the liver and kidneys and eliminate them in different forms. The elimination of toxins allows the body to rid itself of waste and unnecessary harmful compounds. If toxins are left in the body they begin to accumulate and overtime disrupt the body’s natural physiological functioning and lead to different diseases. The systems of the body are designed to handle some naturally occurring metabolic and environmental toxins. The body however, is not prepared to handle the excess toxins that are present in today’s world. The need to support and encourage removal of toxins on an ongoing basis is necessary due to the increased number of toxins that each person is now exposed to in food, water, personal care products and our environment. You can divide toxins into four main categories: toxins from the air, water, food and chemicals in our environments. Air pollutions usually refers to the toxic gases such as carbon monoxide, methane, etc, that are released into the atmosphere.  Flame retardants and paint fumes – another example. It mixes with the air we breath in and exhale out. But do we exhale them completely? Unfortunately not! Chronic exposure to air pollutions can cause problems with the breathing due to increased mucus production from the nasal cavity. Chronic nasal discharge over time disrupts the ability of the nose to capture and eliminate inhaled toxins on a regular basis, which in turn decreases the integrity and protective function of the mucous membranes, so it becomes a vicious circle!  Pollution toxins can come from vehicle and factory emissions as well as other sources for example cigarettes. Inhaled tobacco products contain a number of highly toxic ingredients that can have a very negative effect on your body.  Smoke can also be inhaled from other smokers, so even non-smokers should be aware of the harmful effect of tobacco. Water. Lots of toxins have been found in water. Chemicals such as chlorine, fluoride, bleach, ammonia and even prescription medications have been reported to be found in excess in drinking water and have been said to cause lots of symptoms from depression to even cancer. Food. Examples are food additives, highly processed or genetically modified foods and even chemical ingredients in food recipes such as food colourings and chemical flavours such as MSG and aspartame ( for example in Coca-Cola). Today’s processed food is loaded with sugars that alter the body’s hormonal balance, creating a toxic environment and an addiction to harmful food. Another common food toxin is alcohol. Most of the wines for example contain toxic sulphites, which some people are allergic to. Chemicals. The most common chemicals we come across are pesticides on non-organic fruits and vegetables, that’s why we need to try to buy organic whenever possible! Medical drugs are also referred to as chemical toxins that can build up in your body over time. They might be helpful in small doses, but poisonous when used in large amounts and for prolonged period of time. Ingredients used in most skin and beauty products are very toxic, they come into our skin, but they do not come out! Skin is our largest organ and what we put on our skin gets absorbed into our bodies. Add here cleaning products, sprays, sunscreen, etc. We put more things on our skin than we actually realise. Using natural, chemical free personal care products can greatly decrease exposure and not overburden the routes of elimination. So, is detox necessary, relevant, important and effective in humans? Here at Amrita we believe that a properly constructed and conducted detox programme does have a positive effect in helping your body reduce the burden of unwanted chemicals from 21st century living, giving you back energy and, with ongoing support and information can help you make healthier choices in your life leading to long term better health. Like our articles? Try our Home Wellness Programmes!
Thursday, June 6, 2013 What is “economic peace?” These last few days, the term “economic peace” has been used to critique the decision of Secretary of State John Kerry to invest $4 billion in the West Bank. What is “economic peace” and why for many activists who wish to see justice in Palestine, is this controversial?  “Economic peace” means that economic stability and prosperity in the Palestinian territories would be a good vector of political prosperity. However, what economic peace develops and promotes is the dependency of the Palestinian Authority on Israel. The PA has no power to implement any form of economic policy to begin with due to the occupation. The Oslo Accords did not grant independence to the Palestinian territories but rather nominal control of certain parts to the PA. Decades later, the PA, with the help of the international community through plans like Kerry's, is trying to deliver growth and economic prosperity while ignoring the issue of occupation. Economic peace has meant the PA following global trend of adopting neoliberal policies that haven't actually helped alleviate poverty, let alone end the occupation. Donors have been giving funds to the PA that have exceeded $1.5 dollars annually since 2007, yet a third of the West Bank inhabitants live under the poverty line. Instead money has been going to the construction of international hotels, car shows and fashionable restaurants. It also created a bubble in the city of Ramallah. The occupation means that the PA has to rely on Israel to establish any political or economic agenda. The PA has no central bank and therefore cannot control the interest rates and inflation or set a competitive currency exchange rate in support of export-led economic growth. Its commitment to the Economic Protocol with Israel means that it cannot independently reduce tariff rates or value Added Taxes. Well-defined property rights, which are a prerequisite for investment, are not present in the West Bank due to the limited jurisdiction of the PA. The PA only controls fiscal policy, notably through reducing public expenditure and increasing tax revenues. Almost everything else is dependent on Israel. In the reports by the International Monetary Fund and the World Bank about the economic situation of Palestinians, the consequences of occupation are never mentioned. Both of these institutions use technical and neutral vocabulary and do not denounce Israel’s unlawful policies. Kerry's latest plans resembles past ones pushed by the United States and international organizations like the IMF and World Bank. These plans try to normalize occupation- economic peace, seems to be only another word for status quo.  Even if one takes a neoliberal point of view, economic growth can only occur when there is a production of goods or services. Given that the Palestinians have no control over their production or their goods, Kerry’s plan or any other plan that does not ask for the end of the Israeli occupation is doomed to fail. Occupation is still present because many companies in the United States and worldwide benefit from it. Kerry should consider supporting peace by promoting the BDS movement and ending U.S. military aid to Israel. This is an economic plan for Palestine that will cost less and achieve more. Isn’t that the goal given the current bad economy?
Earth, Home Life, Pollution, Energy Nuclear Energy Nuclear energy was going to make the world a much better place during the 1950’s. The promise of an almost limitless supply of cheap energy that did not produce any soot or atmospheric pollutants almost seemed to good to be true. During the 1960's and 1970's, the United States nuclear industry expanded, as fears of a looming end to oil and gas reserves fueled construction. But by the late 1970’s, though, the wheels had come off of the nuclear wagon. The cheapness of the energy never did pan out, as prices of electricity from nuclear energy rivaled those of fossil fuels. Furthermore, the fear of a major catastrophe caused some to question the prudence of using such a lethal source of energy. In March of 1979, the movie “The China Syndrome”, a fictional tale about a near meltdown in a California nuclear power plant, was released to theaters. At the time, it opened up a debate about the safety of nuclear power and whether such an incident as portrayed in the film could ever occur. Less than two weeks after the release of the movie, an accident occurred at the Three Mile Island nuclear facility that caused a shutdown of the system and a small release of radioactive steam.
 Czasopisma Naukowe w Sieci (CNS) La comparación de los conceptos de TRABAJO y PRACA en dos cartas fundamentales: el Fuero del Trabajo y la Constitución de la República Popular de Polonia 1. Martyna Sońta A comparison of the concepts TRABAJO and PRACA in two fundamental laws: Fuero del Trabajo and the Constitution of the Polish People’s Republic The aim of this study is to reconstruct and compare the linguistic picture of two concepts: Spanish TRABAJO and Polish PRACA (work). The analysis refers to the theory of the linguistic picture of the world by Jerzy Bartmiński. The material for investigation was selected from two legal documents: Fuero del Trabajo (1938) and the Constitution of the Polish People’s Republic (1952). The study was based on the overview of the collocations of lexemes praca and trabajo. The quotes containing mentioned lexemes were assigned to four categories (called aspects): political/institutional, social, ideological and economic. Then, to find the similarities and differences between the two concepts, the cognitive definitions of both of them were developed. The results affirm the thesis that TRABAJO and PRACA have many semantic features in common, however, we find the different connotations because of cultural and ideological differences. Pobierz artykuł Ten artykuł Estudios Hispánicos 23, 2015 Strony od 195 do 207 Inne artykuły autorów Google Scholar Twoj koszyk (produkty: 0) Brak produktów w koszyku Twój koszyk Do kasy
Thursday, May 21, 2015 Revealing the Mystery of Bones In January, I wrote "Revealing the Mystery of Skulls," in which I shared how a closer look at an animal's skull can reveal mysteries about its former life. Many of you commented on how much you enjoyed that post, and so today I thought I would bring to you a second helping of calcified goodness. This time, we'll be taking a look not at skulls, but other animal bones. Although other bones may not seem as exciting as skulls, they too can tell stories about an animal's life and death. Dive! Dive! These are what human rib bones look like. No real surprises here, a series of thin, curved bones, designed to protect your most important organs, like your heart and lungs. What is surprising and kinda creepy is that I got this image from Pintrest, where these real bones are for sale. Just smile and walk away, Katie, pretend you didn't see anything and avoid eye contact. Now take a look at this rib bone: Look at how thick it is! The thickness is disproportionate to the size; this is not some dinosaur or elephant bone. So whose is it and why is it so thick? This is the rib bone of the Florida manatee, aka "sea cow." Manatees are slow moving marine mammals that spend their days at the bottom of waterways, grazing on sea grasses. If a human wanted to lay on the bottom of the Gulf of Mexico, they would need to wear scuba dive weights to help them descend. Manatees have their dive weights built right in! Their super heavy and dense skeletons make it much easier to bob along on the bottom of the beautiful briny sea (extra points if you got the reference!). And if you're wondering how a manatee's body counteracts the weight of its skeleton in order to surface to breathe, manatees have extra long lungs along their back to aid in buoyancy. Two Clues in One Here we have another mystery bone, this one with two stories to tell. First, let's take a closer look at that hole on top.  Unlike the manatee's solid rib, this bone is hollow, meaning it can only belong to one kind of animal: a bird! Almost every single aspect of a bird's anatomy comes back to weight reduction in order to achieve flight. Bird's skeletons are hollow, but still have criss-cross struts for reinforcement, just like an airplane's wings. This particular bone came from the wing of a brown pelican. Now let's look at another clue by zooming in on the left side of the bone. See all those scrape marks? Those aren't a normal feature of this bone, they came after the pelican died and its tissues decomposed. These are chew marks from a rodent! In the wild, animals don't have Flintstones vitamins in order to get the calcium they need, they get it from eating bones. This not only gives the chewer calcium, but also helps break down and dispose of animal carcasses. Rats, mice, squirrels, even deer and pigs will all chew on bones and leave their telltale clues behind. Super Sensors Another bird bone, this one is the beak of a roseate spoonbill, a gorgeous resident of Florida that is often mistaken for a flamingo due to its bright pink feathers. Spoonbills wave their beak back and forth in the water while holding it slightly open in order to find their food. Instead of relying on their sense of sight to tell them when to snap their bill shut, they instead use a keen sense of touch. When we look closer at the underside of this spoony's beak, we can see hundreds of small holes where nerves permeate it, especially at the tip.  Fish don't stand a chance. A Successful Defense (but he still died anyway) Strong and sturdy, a turtle's shell is its ultimate defense from predators. The shell is a part of its skeleton, and is the result of widened and fused ribs, which are attached to the central backbone. When a turtle is withdrawn into its shell, it is protected from the bite of most predators, including raccoons, bobcats, and even...alligators.  Check this out: On the back of this shell, you'll see three holes, the middle of which even has a scrape mark. And when we look on the bottom of the shell... Three more tooth marks, complete with scrapes too! This turtle was one baaaad shut your mouth! It survived an attack from an alligator! How do we know it survived? Well unlike raccoons and bobcats, who can still use their paws to claw at a retracted turtle, alligators eat turtles by crushing their shells in their jaws. Because the shell is intact, we know this didn't happen. We also know that the turtle wasn't just swallowed whole because an alligator's stomach is capable of dissolving bone, so this isn't a shell that was pooped out. Just as well too, because this is a big shell and that sucker would hurt on the way out. We may not know what killed this turtle in the end, but we know it wasn't an alligator! We may think of skulls as the most interesting part of an animal's skeleton, but all bones, no matter how small or mundane-looking, can tell stories of life and death. The next time you find an animal bone, go all CSI on it and see what you can figure out. Just don't sell any human bones you find on Pintrest, ok? That's still creeping me out. Wednesday, May 13, 2015 Why Pollen, WHY? Ah spring, the time of singing birds, baby animals, flowers, and...allergies. One out of about every five of you reading this right now are likely sniffling, sneezing, watery-eyed messes, all because of a flower. First off, I want to clear the air (so to speak) about just what plants are and are not causing your misery. You likely know that it's a flower's pollen that is your allergy trigger. But not all pollen is created equal. In the world of plants, there are generally two main ways that pollen travels from one flower to another in order to fertilize it (That's right, that stuff you're inhaling is plant sperm. Awww yeah.). One way we learned about back in elementary school, when bees, butterflies, and other pollinators visiting flowers for their nectar inadvertently collect sticky pollen on their bodies and then deposit it on the next flower they visit. Flowers that depend on animals as their pollen couriers are typically showy and colorful in order to attract the attention of their pollinator pals. The other way pollen gets around is through the wind. The wind blows pollen, hopefully in the right direction, to a neighboring plant. This method is common in grasses and many trees, such as the oak seen in the photo above. These plants are small, numerous, and not very showy, because the wind isn't shallow and doesn't judge a flower's worth by the physical appearance of its flowers.  When you see pictures, videos, and other images for pollen allergies, you usually see something like this photo. The problem is that the flowers shown are those whose pollen sticks to animals, not goes up your nose. The real culprit for pollen allergies is those wind-blown flowers! But let's face it, a photo like this just isn't as exciting to use for CNN news spots and Allegra commercials. "Is that man crying over caterpillars?" Now that we know what causes pollen allergies, the answer is why? Why are we humans allergic to something as mundane and natural as pollen? I just can't imagine our ancestors being successful hunters while sniffling and trying to see their prey through red, watery eyes. In short, scientists still don't entirely know why allergies occur. But there are a few theories. One thing that we know is that allergies don't typically start showing up in children until about age 5 or 6. When you were a child and got sick with a virus, say the common cold, it may have occurred at the same time that there was a big tree bloom going on. As your immune system was reacting to the virus and trying to purge it from your body, your immune system made an association between the pollen and the virus. It reminds me of when I once got seasick on a casino cruise after eating a breakfast buffet. It took me years to be able to eat a croissant again without feeling nauseous. Unfortunately for you, your immune system has a far better memory than my digestive system. Another theory is called the hygiene hypothesis. It suggests that in today's hand sanitizer-obessed world, kids are not exposed to the host of germs, bacteria, and other pathogens that essentially train the immune system what is dangerous, what is not, and how to react to them. So later on in life, when your immune system encounters something that normally shouldn't be a big threat, it overreacts and has the same reaction as this kitten to a harmless bearded dragon lizard: The good news is when it comes to pollen allergies, the symptoms are seasonal, unlike those with allergies to pets and peanuts. I know that's not much of a comfort right now, but hey, while you're stuck inside, you always have The Nature Geek archives to keep you company! And for those of you who have children, get them outside, get them dirty, let them play with animals, and yes, maybe even let them eat a little bit of dirt. Those mud pies are not only low in calories, but high in immuno-building goodness as well. Thursday, May 7, 2015 Geeky Origins I've been doing this blog for 4ish years now and I realize I have never even properly introduced myself! No, "Hey, welcome to my blog, my name is Katie and here's why I'm full of geeky goodness" first blog post or even an info page on my blog. So I figure hey, it's Thursday, let's do some good ol' fashioned throwbackin' and talk about how we got to this point and share some old photos of me in the process.  Yup, that's me, circa age 13. Growing up, I was always chasing and capturing animals, whether it was leafhoppers and grasshoppers in my backyard in North Dakota, moths at recess in 4th grade, or a menagerie of critters at my family's Minnesota lake cabin during my teen years. I was always exploring, discovering, wondering, and getting my hands dirty. By the time this photo was taken, I had already decided I wanted to go to college to become a wildlife biologist. And whaddya know, five years later, I was enrolled at Colorado State University in the Wildlife Biology program. This photo was taken at the one and only college sporting event I ever attended at CSU (go Rams!). I spent most of my extra curricular energy involved in the student chapters of The Wildlife Society and The Society for Conservation Biology. Yup, I was in geeky heaven! I concentrated on ornithology, which is the study of birds. To those of you who are regulars to my blog, this should come as no surprise. I spent lots of time birding with my bird geek extraordinaire friend, Jason, helped a grad student with his research on black-capped chickadees, and studied my field guide more than my text books. I also spent a summer living in a small pop-up camper, which I towed around the prairies of Colorado as I conducted bird surveys for the Rocky Mountain Bird Observatory. It was my first field technician job, and it was an amazing experience. Living out of a glorified tent, spending my days getting paid to watch birds, and being surrounded by beautiful prairie ecosystems every moment.  After receiving my Bachelor's degree, I had another field technician job in California, working for the Point Reyes Bird Observatory (now called Point Blue). I lived in an old dairy farm house with my kick-butt roommate and coworker, Jess, and we lived the geeky dream, counting and banding birds by day, and watching movies and X-Files by night. This Bewick's wren is less than thrilled to be having his wings measured for science. Fast forward and there are so many jobs and experiences that have made me who I am as an educator, geek, and animal guru today. I have worked for the US Fish & Wildlife Service, wandered the swamps of Florida, got to work with incredible people and animals at Tampa's Lowry Park Zoo, studied herring gulls in Virginia, and yes, started programs as The Nature Geek at Lettuce Lake Park in Tampa. Me and Mr. Nature Geek with members of the animal ambassador team at Lowry Park Zoo. I'm holding Ivan, the Eurasian eagle owl, and Mr. Geek has Kajaro, the red-tailed hawk. One of the best times of my life! I have known I am a geek for a long time. Instead of hiding it, shying away from it, or ignoring it, I embraced it, and being true to my passions has led to some incredible opportunities and amazing experiences. And through this blog, I'm so happy to get to share those experiences with all of you! So keep geeking on my friends, do what you love to do, and good things will come your way. Friday, May 1, 2015 Revisiting the Cicada Killer Wasp Four years ago, I introduced you to the cicada killer wasp, one of my favorite insects. Why do I like these guys so much? I think there are many answers: 1) I like to champion the underdog, the animals that most find terrifying or ugly; 2) they're just so massive; and 3) because of their large size, it makes it easier to observe their fascinating behaviors. (These are the same reasons why I also love the carpenter bee.)  Every summer, I visit a hill at a local park where a large colony of about 30 cicada killers make their homes. Mr. Nature Geek and I love to sit right in the middle of the colony and watch the action around us, never once fearing we will be stung. When it came time to create videos for my Master's thesis, I knew just where one of my videos needed to be shot.  Did you see that shot where I picked up a female cicada killer in my hand? Like I mentioned in my previous blog on cicada killers, females with a heavy cicada in tow have a hard time getting lift off of the ground, so they rely on vegetation and friendly humans to gain some altitude. And if nothing I've shown you so far has convinced you that cicada killers are not out to get you, let this be the ultimate proof: (When she's sitting on my shoulder and waving her abdomen around like that, she's not trying to sting me, but rather is breathing heavily from all that climbing with a cicada that weighs 3 times as much as she does!) Cicada killers are massive, yes, but they are massively beneficial and massively interesting when you give them a chance. This summer I triple-dog-day-cicada-dare you to find some cicada killers of your own and watch them do their thing. I'm just not responsible for what happens if you go chasing them with giant nets!
Wednesday, April 12, 2017 Less meat and more miles or More meat and less miles? This post is because of this report. It summarizes a study on on the environmental impacts of conversion of mangroves for agricultural uses -  raising cattle and shrimp farms. It quotes ""On a personal scale, this means a typical steak and shrimp cocktail dinner produced through mangrove conversion would burden the atmosphere with 1,795 pounds of carbon dioxide," said J. Boone Kauffman, an ecologist at Oregon State University who led the study. ... This is approximately the same amount of greenhouse gases produced by driving a fuel-efficient automobile from Los Angeles to New York City." " Let's first dispense with the obvious. Of course the answer to the question is neither as less meat and less driving is the more sustainable choice. To me sustainability is more about  like Haile Gebrselassie rather than Usain Bolt i.e.,  winning a marathon rather than a 100m dash. So let's focus on making one adjustment at a time. There is a neat paper co-authored by the late Dr. Lee Schipper, who made great contributions to transportation sustainability. And some of the most telling number from his study is the picture below As someone whose single biggest impact comes from air travel, I felt better that the airline industry has made great strides in reducing the GHG intensity. If you read the paper, this is attributed to fuel economy, and regulatory changes and higher occupancy per flight. Also rail travel is getting better but in terms of the passenger miles traveled in the US it's absolute impacts are likely smaller relative to road and air travel. But let's just focus on grub and gas (I mean gasoline, not the product of the former).  So while the statement that a single meal involving steak and shrimp might have more impact than driving a car several thousand miles is striking, most people are not considering driving from LA to New York, which is about 2800 miles. So let me interpret this as equal to about a fourth of the annual miles the average american drives each year. Now, let us crunch some numbers to compare the effectiveness of reducing meat vis a vis reducing vehicle miles traveled from a greenhouse gas perspective. I am using the assumptions below for protein, which come from this study. Emissions per mile of auto use are based on EPA reported fuel economy (harmonic mean of 50% city and 50% highway miles) A few additional assumptions about the base line relative to which some adjustments will be compared: Protein intake Daily protein requirement for adult: 60 grams (gm)/day Baseline protein mix:  45 gm of beef protein + 15 gm of chicken/milk protein + 0 gm legumes Average annual vehicle miles (U.S.) - 12000 miles/year Automobile for the base case - Ford F150 Below is the effectiveness of four different adjustments relative to the baseline Reducing beef protein intake by 10% is as effective as driving 5% less miles using a F150. Switching to a Camry is four times as effective as each of the other adjustments shown. It is for oneself to decide which of these adjustments is easier. Of course bigger adjustments, combining more than one type of adjustments or different baseline assumptions will all affect the calculations. Bottomline: There are any number of calculators to estimate your energy, water, CO2 footprint etc. But I have not come across a calculator that combines our various activities and various types of burdens and gives information about the effectiveness (say, on a % emissions basis) of adjustments along different fronts (food, travel, housing, etc.) and in terms of changing the equipment (or capital stock) vs usage and let the consumer make better informed decisions. No comments: Post a Comment
To boost profits for sugar beet growers and processors, Agricultural Research Service scientists are developing new processes to efficiently isolate beet pectin and associated polysaccharides and find profitable uses for them. Pectin, which can be found in the cell walls of fruits and vegetables, is a polysaccharide, a large molecule made up of many simple carbohydrates (sugars) linked together. It is often used as a gelling agent and fat substitute. Most commercial pectin is extracted from citrus peels, but sugar beet pulp is an untapped source with great profit potential. Every year, U.S. processors generate about 1.5 million tons of dry beet pulp, most of which is sold for little profit as animal feed. ARS researchers are investigating how the chemical features of sugar beet pectin could expand the pulp market. They have also found ways to improve the extraction process. Extracting pectin from plant material takes an hour or more using conventional heating methods. To save time and reduce cost, chemist Marshall L. Fishman, who retired from ARS and is now a collaborator at the ARS Eastern Regional Research Center, Wyndmoor, Pa., developed microwave and steam-injection techniques to heat fruit peels with acidified water in pressure-resistant containers. These methods can extract high-quality pectin within 10 minutes, using less energy. How will this pectin be used? In one study, ARS chemist LinShu Liu developed material from pectin and other natural polymers that can be used in biomedical supplies, such as prosthetic devices and scaffolding for tissue repair. In another study, plant physiologist Arland T. Hotchkiss, Jr. and cooperators demonstrated that pectin fragments from orange peel could promote health by increasing the growth of beneficial probiotic bacteria in the large intestine. SOURCE: USDA news release.
 AllAboutFeed - Finally: EFSA opinion on insects for feed New proteins News 14141 views 2 commentslast update:27 May 2016 Finally: EFSA opinion on insects for feed The long awaited EFSA opinion on the safety of using insects in animal feed and food is finally here. In its risk assessment, EFSA names the lack of data on contaminants in insects a point of concern. Insect use in feed and food is promising and many companies are starting to breed and process insects. However, the current TSE regulation does not allow insect Processed Animal Protein (PAP) to be fed to farmed animals due to lack of a safety profile. To get a clear understanding about the safety and risks involved in feeding insects to livestock, EFSA published a scientific opinion about this. Safety of substrates (the feed for insects) Insects are considered farm animals, and the EU states that farm animals may be fed only with safe feed. EFSA states that when currently allowed feed materials are used as substrate to feed insects, the possible occurrence of microbiological hazards is expected to be comparable to their occurrence in other non-processed sources of protein of animal origin. The possible occurrence of prions in non-processed insects will depend on whether the substrate includes protein of human or ruminant origin. Data on transfer of chemical contaminants from different substrates to the insects are very limited. Need for more substrate sources According to EFSA, there is increasing demand to use other substrate sources as well, other than the ones that are currently allowed. This is because insects are very efficient in converting low quality organic material into high quality feed and food. Think of substrates such as animal and human manure, human food waste (including meat and fish), swill, organic material such as gardening and forest material and by-products from slaughterhouses (e.g. feathers and bones). The company Entofood for example is doing this. Also AgriProtein has developed a system to efficiently convert waste into insect protein. These are readily available, but not allowed to feed to insects in the EU. In Kenya for example, it is common practice to apply human manure (after compositing) as substrate for rearing insects. Heavy metals Like products from other animals, insect derived food and feed products may contain hazardous chemicals. Some of these chemicals may be present in the substrates for insects, such as environmental contaminants, e.g. heavy metals. Earlier studies showed that Cadmium can be a risk. EFSA states that the concentrations of heavy metals and arsenic in insects depend on the characteristics of the elements and their concentrations in the substrates, the insect species and their growth stage. Studies done so far, show limits of the latter that some insect species were above the EU maximum limit for complete feed. EFSA concludes that transfer of heavy metals from substrates (e.g. organic matter, plants) for insects is apparently the most important route of contamination. Accumulation is dependent on insect species, growth stage, and metal in question. Occurrence of bacteria and viruses The microbiota (including bacteria, viruses, fungi) present in the gut of the insects is essential for the metabolism, behaviour and survival of the insects. But when insects are further processed, even if the intestine is emptied before harvesting, frass will remain in the substrate and can contaminate the insects. Some of the microbiota may become pathogenic to the insects under stress circumstances. EFSA therefore wanted to know if any of these microbes are pathogenic to other than insects, for example, to humans and animals. And if so, whether they could be transferred through feed and food containing insects or insect products. EFSA concludes that studies on the occurrence of human and animal bacterial pathogens in farmed insects used as food and feed are very scarce in the scientific literature. Pathogenic bacteria (such as Salmonella, Campylobacter and verotoxigenic E. coli) may be present in non-processed insects depending on the substrate used and the rearing conditions. Most likely, the prevalence of some of these pathogens for example Campylobacter, will be lower compared to other non-processed sources of animal protein. EFSA states that insect pathogenic viruses occurring in insects produced for food and feed are specific for insects and therefore are not regarded as a hazard for vertebrate animals and humans. Response from PROteINSECT The EC funded research project PROteINSECT welcomes the publication of the EFSA Scientific Opinion and agrees with many points among which that the use of other (currently forbidden) substrates to feed insects destined for animal feed such as organic wastes (food waste and manures) must be specifically evaluated. PROteINSECT Project Co-ordinator Dr Elaine Fitches from Fera (UK), adds, "This opinion is an important stepping stone in furthering our understanding of the potential of insects as a protein source. It provides valuable insight against which PROteINSECT can continue to communicate our research findings to key stakeholders across Europe and beyond, on production, processing, quality, safety and consumer acceptance around insect protein for animal feed." Or register to be able to comment.
Study your flashcards anywhere! Download the official Cram app for free > • Shuffle Toggle On Toggle Off • Alphabetize Toggle On Toggle Off • Front First Toggle On Toggle Off • Both Sides Toggle On Toggle Off • Read Toggle On Toggle Off How to study your flashcards. H key: Show hint (3rd side).h key A key: Read text to speech.a key Play button Play button Click to flip 74 Cards in this Set • Front • Back What is basic research? pure science that aims to increase the scientific knowledge base What is applied research? Used to solve a problem What is a psychologist? more focused on testing and research What is a psychiatrist? -medical doctor -prescribes medication hindsight bias -idea that you already knew -doesn't require any critical thinking case study study individual in great depth to reveal universal truths substance administered without the drug in it -looks inward (introspective) -Edward Titchner -how we interact w/ eachother -why we do the things we do double-blind procedure experimental procedure where both participants and researchers are blind as to who received the treatment or placebo placebo effect any effect on behavior caused by the placebo experimental condition people who receive the treatment control condition w/o treatment for comparison random assignment assigning participants by chance, minimizing pre-exhisting differences between the assigned different groups independant variable factor that is being manipulated dependent variable experimental factor that is being effected corralation coefficient how much things vary/to what degree (relationships) neuroscience perspective evolutionary perspective how the natural selection of traits promotes the perpetuation of one's genes behavior genetics perspective how much of our genes ad our environment influence our individual differences psychodynamic perspective how behavior springs from unconscious drives and conflicts behavioral perspective how we learn observable responses cognitive perspective how we encode, process, store, and retrieve information social-cultural perspective how behavior and thinking vary across situations and cultures the view that knowledge comes from experience via the senses and science flourishes through observation and experimentation a nerve cell; the basic building block of the nervous system the extension of a neuron, ending in branching terminal fibers, through which messages pass to other neurons, muscles or glands action potential a neural impulse; a breif electrical charge that travels down an axon myeliln sheath -layer of fatty tissue encasing the axons -helps speed neural impulses the level of stimulation required to trigger a neural impulse the junction between the axon tip of the sending neuron and the dendrite/cell body of the receiving neuron chemical messengers that move thru the synaptic gaps between neurons controls self-regulated actions of internal organs and glands natural neurotransmitters linked to pain and pleasure controls the movements of our skeletal muscles -base of brain -begins from spinal cord -runs from brainstem -controls heartbeat and breathing reticular formation -above medulla -controls arousal -above reticular formation -reeives information from all senses except smell and routes it to the higher brain region checks for electrial symptoms -swallow radioactive fluid -visual display of brain activity -uses magnetic fields and radio waves to produce images that distinguish different types of soft tissue -allows us to see structures w/in the brain -impaired use of language -some can speak fluently but not read Broca's area -controls language expression -after damage, a person struggles to form words yet can sing familiar songs easily Wernicke's area -controls language reception -after damage, people could only speak meaningless words and were unable to comprehend other people's words processes memory pituitary gland secretes different hormones maintenence regulator (eating, drinking, body temp) the brains capacity for modification, as evident in brain reorganization following damage and in experiments on the effects of experience on brain development frontal lobes -portion of the cerebral cortex lying just behind the forehead -involved in speaking and muscle movements and in making plans and judgments parietal lobes occipital lobes -the portion of the cerebral cortex lying at the back of the head -includes the visual areas, which receive visual info from the opposite visual field temporal lobes -the portion of the cerebral cortex lying roughly above the ears -includes auditory areas, each of chich receives auditory info primarily from the opposite ear motor cortex sensory cortex the area at the front of the parietal lobes that registers and proesses body sensations adrenal glands a pair of endocrine glands that secrete the hormones epinepherine and nonepinepherin, which help to arouse the body in times of stress pituitary gland the endocrine systems most influential gland that regulates growth and controls other endocrine glands Function of ACh enables muscle action, learning and memory Function of Dopamine influences movement, learning, attention, and emotion Function of Serotonin affects mood, hunger, sleep, and arousal Function of norepinepherine helps control alertness and arousal Function of GABA a major inhibitory neurotransmitter Function of Glutamate -a major excitatory neurotransmitter -involved in memory Undersupply of ACh causes... Alzheimer's disease Excess Dopamine causes... Undersupply of Dopamine causes... Undersupply of Seratonin causes... Undersupply of Norepinepherin causes... depressed mood Undersupply of GABA is linked to... seizures, tremors, and insomnia Oversupply of Glutamate can... produce migranes or seizures
cerebral hemisphere (redirected from Brain hemispheres) Also found in: Dictionary, Medical, Encyclopedia. Graphic Thesaurus  🔍 Display ON Animation ON • noun Synonyms for cerebral hemisphere References in periodicals archive ? Most people don't know that our brain hemispheres don't develop together. Generally, hyperdense signal changes are observed in bilateral, symmetrical T2A and "FLAIR" series in the posterior parts of the brain hemispheres especially in the parietooccipital white matter. Notably, patients with severe, unilateral carotid stenosis showed cognitive impairments for functions linked with the brain hemisphere that received its blood supply from an occluded carotid, while the same people with an unimpeded contralateral carotid showed no impairment on cognitive tests that tested their contralateral brain function, said Dr. He argues that deception, which occurs even between our brain hemispheres, is closely tied to group conflict, courtship, neurophysiology and immunology, but can be overridden by awareness of it and its consequences. His special interest is cognitive neuroscience, and his empirical research has focused on the interaction of left and right brain hemispheres. It was hypothesized that the immune function of glia cell to the inflammatory insults is asymmetrically distributed in the two brain hemispheres. Perhaps best-known for his work with 'split-brain' patients that showed that the right and left brain hemispheres have differing functions, Gazzaniga (SAGE Center for the Study of the Mind, U. Separating our species from virtually all others, we have two highly specialized brain hemispheres. While Grafman concedes that brain hemispheres and sectors tend to specialize by certain junctures prior to adulthood, his research clearly demonstrates that they are anything but hardwired to do so. Our brains have a left and right hemisphere, so the correct selection of music during learning can stimulate these brain hemispheres and bring about whole brain learning. My research led to some behavioral studies and then to the causes for handedness, which, in turn, led to the dominance and the specific function of the brain hemispheres. A boy's corpus callosum, the tissue connecting the brain hemispheres, is up to 25 percent smaller than a girl's. Slater developed epilepsy when she was ten, and suffered such severe and frequent seizures that she underwent surgery, at 13, to relieve the intensity of the electrical discharges as they traveled between brain hemispheres.
Lord of the Flies What act of cruelty does the boys do upon one another? What bad things that they do to one another ? Asked by Last updated by campbell c #255295 Answers 2 Add Yours Well, pretty much take your pick from a prolific list! THe humiliate Piggy, kill Simon (their Christ figure), Roger tortures Wilfred, Kill Piggy...... well in the novel in the beginning evry thing was fine until jack wanted to take over from ralph.then thats when the team of hatred came in,jack left and formed is crew which was called coastal rock taking piggy along then ppiggy and ralph decided to get it on gettin it piggy was killed by roger with a rock,another one is that simon was also killed by the littluns and biguns thinking that simon was he beastie that torturing was torturing them piggy was killed with a massive rock simon was kialled with abear hand by the boys n thae islznd
Tag Archives: social stigmas The Inbetween People The same is true of Saleem, and how the loss of his mother affected him and the rest of his family. How the loss of his grandmother’s house affected how the family managed to survive the indecency of it. Can we bury the past? When familial, emotional trauma constantly fills us, mentally, physically and emotionally, we can become like people in limbo, in between the past and the present. The connections are intertwined. Through McEvoy’s beautiful prose, almost poetic prose and word imagery, we are given a lot to ponder in that respect. The novel is a sad one, poignant, and a reminder of the human condition. The story is a metaphor for love, loss and redemption, within a framework of an ongoing social situation. It did have a strong message, within the short framework. Emma McEvoy’s prose is filled with loveliness, and a feeling of melancholy illuminates the pages. I found The Inbetween People to be an excellent read regarding the emotional issues surrounding motherly loss and regarding the issues of conflict within a country’s changing attitudes and ideals. Emma McEvoy encompassed those issues well. This was my second reading of this novel, as I read it recently for a book club. Leave a comment Filed under historical fiction, middle east fiction
Thread: command line arguments 1. #1 Registered User Join Date Jan 2008 command line arguments this is merely out of curiosity, i have read a couple of articles recently on the arguments that get parsed/passed(?) by int main , and some of the situations where these arguments are filtered/checked and a relevant process is invoked.... what i haven't been able to read anywhere, is how a app can send arguments to int main when when the application starts up or during application runtime, or if this is possible, or how these arguments arise in argc argv. from what i read, a file could be one of the arguments, how does this file land up there, say for instance i open and read a file in a program, does this automatically become one of the arguments, or is a file specifically run from a command line argument...... i dont really understand this, but i hope my questions are clear enough to get the correct answers. 2. #2 Registered User Join Date May 2008 The easiest way to pass arguments to a program is through the command line. Everything after the application's file name is passed as an argument to the application. For example, $ foo bar1 bar2 will invoke the "foo" program and pass it the arguments "bar1" and "bar2". These are in addition to "foo", which is how we invoked the program and is always the first argument supplied. Now you might be thinking that now all applications are started from the command line. To invoke an application from within another application and pass it arguments, one can use a member of the exec() family of functions. Hope that helps 3. #3 Frequently Quite Prolix dwks's Avatar Join Date Apr 2005 Command line arguments (or parameters) are simply strings. Whether these strings represent filenames or switches or whatever is up to you. From main()'s point of view, command line arguments are just arguments to the function main() itself, in the form of argc and argv. In other words, all of the arguments are supplied when the program is first started. You can't pass in parameters to a program at any time, only when the program is initially executed and main() is initially called. From a shell's point of view, you type strings to be executed. For example, I might type "test" into a shell (perhaps bash for Linux, or the standard Command Prompt for Windows). The shell should then execute the program "test". If I typed "test message", the program "test" would be executed, with one parameter: "message". "test this message" would result in two parameters, and so on. There's also an FAQ about this, though it's not very extensive. Seek and ye shall find. quaere et invenies. Other boards: DaniWeb, TPS Unofficial Wiki FAQ: My website: Projects: codeform, xuni, atlantis, nort, etc. 4. #4 Registered User Join Date Jan 2008 thanks for the explanations. Popular pages Recent additions subscribe to a feed Similar Threads 1. Beginner Needs help in Dev-C++ By Korrupt Lawz in forum C++ Programming Replies: 20 2. GradeInfo By kirksson in forum C Programming Replies: 23 3. Replies: 10 4. NULL arguments in a shell program By gregulator in forum C Programming Replies: 4 5. registry, services & command line arguments.. ? By BrianK in forum Windows Programming Replies: 3
Loading presentation... Present Remotely Send the link below via email or IM Present to your audience Start remote presentation • Invited audience members will follow you as you navigate and present • People invited to a presentation do not need a Prezi account • This link expires 10 minutes after you close the presentation • A maximum of 30 users can follow your presentation • Learn more about this feature in our knowledge base article Do you really want to delete this prezi? Make your likes visible on Facebook? You can change this under Settings & Account at any time. No, thanks Daily Life in Salem No description on 22 August 2013 Comments (0) Please log in to add your comment. Report abuse Transcript of Daily Life in Salem Daily Life in Salem by: Madelyn wild, Alexis Paddie, Mary Pugh, Ashely Thibodeaux Clothing worn by men and women. What types of fabric was used? One type of hat was a very big hat with a decorative belt and a buckle was usually worn. Another kind of hat that was worn had a big feather. Falling ruffs are collars that people during the Elizabethan period wore and both woman and men wore this. The most popular shoes were worn by both men and woman were high heels Family Life of Puritans Puritan parents disciplined their children severely. They felt no remorse about punishment. Believes children entered the world with sin and could only be redeemed through religious obedience. Children did not play with toys, instead boys did carpentry and girls did chores. How their food and eating habits supported their religious views? Because of the Puritans strong religious beliefs, they fasted. The Puritans obtained their food by growing their own crops and hunting for animals just as God intended Puritan Education To the puritans education was extremely important. They also believed that their spiritual life was an aid to their education. Education in the religious sense was their top priority. Because religion was their top priority, they were not the best at reading, so it was the parents duty, by law, to teach their kids to read. If they disobeyed, they were severely punished. Fun Fact: the Puritans founded Harvard How did their clothing support their religious views? They never dress "high class" because it is a sin to their religion. So they never get fancy. They used simple clothing. Puritan Meal Puritans ate the crops they grew which consisted of corn, lettuce, and pumpkins. They also ate the pigs, chicken, and cows that they raised. They ate dinner around noon because the candles did not provide enough light after dark to eat. Staples, Peter. “Description of Puritan Meals in Salem.” eHow. Demand Media. Web. 21 August. 2013. http://www.ehow.com/info_8182418_description-puritan-meals-salem.html> Greenwood, Melanie. “What kinds of Food Did Puritans Eat?.” eHow. Demand Media. Web. 21 August. 2013. <http://www.ehow.com/info_8132159_kinds-food-did-puritans-eat.html> Graham, Judith. “Puritan Family Life.” Northeastern University. UPNE. Web. 21 August. 2013. <http://www.ushistory.org/us/3d.asp> Mason, Charolette. "Charolette Mason and the Puritans on Education." Wordpress.2013. Web. 21 August. 2013. <http://lettersfromnebby.wordpress.com/2013/03/17/charlotte-mason-and-the-puritans-on-education/> "Kalapuya of the Willamette Valley." Salem History. Salem Public Library. Web. 21 August. 2013. <http://www.easybib.com/reference/guide/mla/website> Describe the types of homes that probably existed in Salem. Explain what a palisade is and why it was necessary. The types of homes in Salem had small windows and wooden frames. The churches were made out of wood. A palisade is a wooden fence inclosed. this is used to protect the house from attacks and harsh weather wigwam inside witch house in Salem Full transcript
Loading presentation... Present Remotely Send the link below via email or IM Present to your audience Start remote presentation • Invited audience members will follow you as you navigate and present • People invited to a presentation do not need a Prezi account • This link expires 10 minutes after you close the presentation • A maximum of 30 users can follow your presentation • Learn more about this feature in our knowledge base article Do you really want to delete this prezi? Make your likes visible on Facebook? You can change this under Settings & Account at any time. No, thanks Touching Spirit Bear Themes No description Jan Gauthier on 21 November 2013 Comments (0) Please log in to add your comment. Report abuse Transcript of Touching Spirit Bear Themes The Trees of Life and Justice Created by: Pragya T., Jency S., Sydney T., and Sydney H. We are all equals. Through despair, comes hope and personal growth. How the Author Defines the Theme: Visual Representations: Connections to Make: Connections to Make: Visual Representations: Visual Representations Continued: How the Author Defines the Theme: How the Author Defines the Theme: Connections to Make: Visual Representations: We must control our anger. Everyone in the world has anger that they are struggling to let go. Humans, like Cole, can never forget their anger and want to find happiness. In a rage, we let go of reason and feel as if we cannot forgive those who have wronged us. Adam Lanza, the shooter at Sandy Hook Elementary School, was motivated by hatred when murdering innocent schoolchildren. Cole was similarly motivated when he smashed Peter's head on a sidewalk. Cole, at the beginning of the novel, could not control his anger and that negatively impacted his behavior. Lord Voldemort, the antagonist of the Harry Potter series, is shown as a child exhibiting the same behavior as Cole. The novel particularly referred to is "Harry Potter and the Half-Blood Prince" by J.K. Rowling. There is constant racism and segregation in societies today, as well as the past. African Americans have been highly segregated in the United States, starting from the chains of slavery. Societies are coming to the realization that discrimination is horrid and that everyone is equal to another. Cole also came to the same conclusion in isolation, nature and him were equals, "The Devil's Arithmetic" by Jane Yolen exhibits the discrimination faced by Jews in World War II. Nazis tortured the Jews based on falsehoods and propaganda. After the Germans' lost the war, an error was seen in their ways. Every person is equal to another and the world better recognizes that, like Cole. He came to realize that the world was shared by all creatures with equal right through the course of the novel. The Circle of Life Theme is defined as the lesson derived, or learned, from a story. In the novel, "Touching Spirit Bear", by Ben Mikaelsen, several themes are explored as Cole Matthews journeys through his own healing on a remote Alaskan Island. Anger is being wrongfully expressed. Happiness has been found. Respect and dignity are what the Spirit Bear and the eagle represent. This bear is an endangered animal and the men above have chosen to kill it. This will ultimately harm them because their entire ecosystem will collapse. The bears hunts fish, fish will overpopulate without the bear eating, and the water levels will be reduced causing a local water shortage. In life there is both anger and happiness, and although anger can never be forgotten, we cannot allow ourselves to be consumed by it. We, as human beings, must look for happiness in our lives. "The right end of the stick is your happiness, the left end is your anger . . . People spend lifetimes breaking their stick to get rid of anger. But always anger remains, and they think they've failed." - Edwin, page 144 of "Touching Spirit Bear" Everyone in this universe ought to be treated with respect and dignity. Everything in this world is connected like a circle and harm inflicted on another, is harm inflicted on yourself. “Whatever you do to the animals, you do to yourself. Remember that.” - Edwin, page 19 of "Touching Spirit Bear" Cole regarded the Spirit Bear with anger when he was first brought onto the island. He did not believe the bear to be his equal and that harmed his healing process. He was severely mauled by the Spirit Bear as a consequence of his behavior. When pain, or sorrow, is experienced personally, only then does it have deeper meaning. With the new understanding gained, being sympathetic to other's plight is also gained. “The dances, carving the totem, carrying the ancestor rock, touching the Spirit Bear, it was all the same thing—it was finding out who I really was.” - Cole, page 283 of "Touching Spirit Bear" Throughout the novel Cole is on a journey of self-discovery and healing. Him carrying the ancestor rock, soaking in the pond, dancing to his emotions alongside those of an animal's, and carving a totem pole make Cole a changed person. The experience on the remote Alaskan island in isolation made Cole a greater person. He came 'full circle'. This man is shown progressing through his career. The woman above is receiving quality counseling to resolve her issue and conflicts. She is growing emotionally despite barriers. "My aunt suffered through breast cancer recently and that took a toll on her. However, the disease made her a stronger person and she continuously had hope that she would live. Peter's condition impacts Cole, like my aunt's condition impacted myself and my family. Peter had hope of surviving after he endured the battle of forgiving Cole for his crimes." - Jency Shaji In the novel, "The Devil's Arithmetic" by Jane Yolen, Chaya and Rivka faced the despairs of a concentration camp. The two always thought that eventually they would be free and had hope all would be well. Chaya grew to realize the importance of her Jewish culture. Cole similarly follows Tlingit Indian treatments, which are harsh, but effective. He grows as Chaya does to appreciate life and its beauty. Full transcript
Hurricane season officially starts today, June 1, in the Atlantic Ocean. (NASA) Today, June 1, marks the official start of the six-month Atlantic hurricane season. The season, which forecasters suspect will be a quiet one, will last through the end of November. There are no active storms, and no hints of anything developing in the foreseeable future, but that is fairly typical for early June. On average, the bulk of the season ramps up in August, reaches a peak in September, then begins to slow down in October. Of course, individual seasons may not follow this timeline. Climatological seasonal cycle of tropical cyclone activity in the Atlantic, broken down into three intensity categories. There is a consensus among agencies that make seasonal hurricane forecasts that the 2015 season will be quieter than average, largely due to a strengthening El Niño which tends to enhance activity in the East Pacific and suppress activity in the Atlantic. But if you’re in Wilmington, Miami, New Orleans, or any hurricane-vulnerable city along the coast, the overall number of storms should not concern you, because it only takes one. Now is the time to prepare basic materials and plans, not when a storm threatens. [NOAA calls for below-average hurricane season, but emphasizes preparedness] The 2015 list of storm names for the Atlantic is shown here, and of the 21 names, 14 are still from the original 1979 list.  There are no new names this year, since none were retired after the 2009 season. We already had Tropical Storm Ana form in early May, so the next names on deck are Bill, Claudette and Danny. The “drought” of major hurricane landfalls in the U.S. continues deeper into record-setting territory. The last major hurricane (category 3 or stronger on the Saffir-Simpson scale) to strike the U.S. was Wilma, which hit the southwestern Florida peninsula on Oct. 24, 2005.  However, that is not to be interpreted to mean that there has not been much “action” in the Atlantic since then. Chart showing the number of days between U.S. major hurricane landfalls, from 1900-2015. (modified from http://rogerpielkejr.blogspot.com/) The U.S. has been struck by seven category 1 or 2 hurricanes (eight if you include Sandy, which was not technically a hurricane at landfall) since then, some of them quite destructive and deadly. Furthermore, there have been 25 major hurricanes in the Atlantic since Wilma, and nearly half of them made landfall (or a very close encounter), just not on the United States. Countries to our south such as Cuba, Mexico and the Bahamas certainly have not had the same good fortune as we have these past ten years. [Study says major hurricane drought is just “dumb luck"] How long will the streak last? Hurricanes do not have any memory of where they’ve hit, or any built-up pressure by not hitting a particular location, so the concept of being “overdue” does not apply. The U.S. is not overdue, it has just been lucky, and the luck could end this year, or continue for yet another year. Even during relatively quiet seasons, very notable hurricane landfalls can happen. Suppose there are only three hurricanes in the entire season but all three of them make landfall near Houston — it will still be an inactive season, but one that will be very memorable there! There are a few new products available from the National Hurricane Center this season. For storms approaching the U.S. coast, storm surge watches and warnings will now be issued. This can be different from the areas under a hurricane watch or warning, and should prove to be a very valuable separate product. Storm surge is the number one killer in hurricanes, ahead of rain, surf and wind. Sample storm surge watch and warning map, based on last year's Hurricane Arthur. (NOAA) Sample storm surge watch and warning map, based on last year’s Hurricane Arthur. (NOAA) In the past, the National Hurricane Center’s 5-day tropical weather outlook has been available by text, and the graphical outlook historically covered out to two days. This year, 2-day and 5-day graphical outlooks are available. This map shows the locations of any existing disturbances and the areas in where they could develop, as well as areas to monitor for possible formation. The areas are shaded by probability of formation within the next two or five days. Example 5-day graphical tropical weather outlook. (NOAA) Also, each season, the “cone of uncertainty” changes size. The cone’s size is based on actual track forecast errors averaged over the previous five seasons (2010-2014, in this case) and will be the same size for all storms this season. Most importantly, note that the cone does not include any information on impacts or storm size. The cone is designed to show a two-thirds probability of where the center of the storm will track, based on errors from the past five years. There is still historically a one-third probability that the center could track outside of the cone. Damaging impacts such as wind, rain, and storm surge will likely extend hundreds of miles away from the center, well outside the cone, even with a perfect track forecast. Comparison of the “cone of uncertainty” for this year (red) and from 2009 (green). Although not new this season, I want to highlight two other extremely useful products that are relatively new: the storm surge flooding map and the wind speed probability map. Examples of each are shown here. Examples of the storm surge flooding map (left) and the wind speed probability map (right). (NOAA) Throughout hurricane season, check in with the Capital Weather Gang for updates and outlooks on developing and active storms!
It has become clear that responsibility for Japan’s participation in the war was no one else but Roosevelt, George Winston James Perloff goes on to dismantle some of these misrepresentations of Japan during the Second World War. It has become clear that responsibility for Japan’s participation in the war was no one else but American President Franklin D. Roosevelt, who forced the Asian power to join through economic pressure. And not just that, but he also became aware of the Pearl Harbor attack plans through several intercepts and other personal warnings. He always had the information, however, he hesitated on passing it over to the military leaders in Hawaii. Joseph Grew told the people that Japan believed it was its leaders’ right and duty to conquer and rule the world, to destroy all nations which would attempt to interfere with their plans and that all that Japanese people wanted was for Tokio to become the capital of the world. However, he might have forgotten to mention that before Commodore Perry forced them to sign a trade agreement by threatening them with naval bombardment, Japan was just an isolationist country. Other Second World War specialists would insist that Japan brought in and supported fascist and communist aggression. But what about when Germany invaded Poland in 1939 and Britain and France went straight to war with Germany; and then, when Poland was the second time invaded by the Soviet Union that month, the Allies pretended it’s all quiet on the Western Fronts and it should stay like that. And again, when the war ended in 1945 and Poland’s sovereignty was the alleged issue over which the war broke out and lost her sovereignty to Stalin, the Allies closed eyes again, the Liberty Round Table reports. The invasion of Manchuria by the Japanese forces in the 1930s was viewed as part of Japan’s malefic plan to conquer the world, but they forgot to mention that the Soviets were the first to seize Outer Mongolia and the province of Sinkiang in North-West China. While some say Japan had no right to go and disturb China’s Communist regime, let’s just remember that the Americans did the same when they sent their troops to Vietnam to fight on the same principle. Americans offered the nation’s support to Chiang Kai-shek, heir to Sun Yat-sen during the war against Japan, just to retrieve it as soon as Japan surrendered. Manipulated photography such as the “Shanghai baby” was used to influence the U.S. public vision of Japan. And here’s the real question now: was Japan not targeted because of its plans to conquer the world, or because the Japanese had the guts to raise against Communist leaders and tried to preserve their nationalist beliefs and did not support the idea of a world government?
Church History for Kids Peril and Peace Chronicles of the Ancient Church by Brandon and Mindy Withrow 207 pages Monks and Mystics Chronicles of the Medieval Church by Brandon and Mindy Withrow 223 pages Find it: Teen, YA Wit Color code: Orange Local authors, Brandon and Mindy Withrow, have undertaken the task of writing a multi-volume history of the church for youthful readers. And the results are a wonderful gift to the church, both providing a helpful historical resource and narrating lives and events in a way that engages and inspires. The first volume, Peril and Peace tells the story the early church from the time of the apostle Paul to Saint Benedict, figures whose accomplishment shape the church even still. The Withrows help us see the struggles, triumphs, mistakes, and growth of the first Christian centuries as God sent his people on mission among many cultures and nations. The second volume, Monks and Mystics covers the centuries from Pope Gregory I to the reformers Wycliffe and Huss, as the church moved forward in a world marked by the growth of Islam, theological controversy, church divisions, new learning, and spiritual decline. Follow the story of God's people as the stage is set for the Reformation and the emergence of the modern world.
Tuesday, March 21, 2017 Cells are the basic units of life Human body: Human anatomy and physiology are treated in many different articles. For detailed discussions of specific tissues, organs, and systems, see human blood; cardiovascular system; digestive system, human; endocrine system, human; renal system; skin; human muscle system; nervous system; reproductive system, human; respiration, human; sensory reception, human; skeletal system, human. For a description of how the body develops, from conception through old age, see aging; growth; prenatal development  Mycoplasma, any bacterium in the genus Mycoplasma. The name mycoplasma has also been used to denote any species in the class mollicutes or any genus in the order Mycoplasmatales. Mycoplasmas are among the smallest of bacterial organisms. The cell varies from a spherical or pear shape (0.3 to 0.8 micrometres [0.0000117 to 0.0000312 inch]) to that of a slender branched filament (up to 150 micrometres [0.00585 inch]). Mycoplasma species are mostly facultatively anaerobic, colonial microorganisms that lack cell walls. Mycoplasma species are parasites of joints and the mucous membranes lining the respiratory, genital, or digestive tracts of ruminants, carnivores, rodents... No comments:
Friday, May 12, 2017 WELCOME , you'll become a acquainted with the components of the Thought Field Therapy algorithms that you'll be using to manage your own emotional problems.   Algorithm is a term and a concept rooted in mathematics. In the context of math, it refers to a common solution to a problem ( for example, a solution for finding the highest common divisor). One authority defines the more general notion of an algorithm this way: " A sequence of instructions to be followed with the intention of finding a solution to a problem. Each step must specify what steps are to be taken, and although there may be many alternate routes through the algorithm, there is only one start point and one end point."    In medicine, algorithms are treatment formula or guidelines to be followed for diagnosing and/or managing specific diseases. they are sets of proven steps that, when followed diligently by doctors, can produce more accurate diagnoses and more efficient and successful patient care.    In Thought Field Therapy (TFT), algorithms are used for treatment. I developed them over time, using the Causal Diagnosis procedure unique to TFT. While it's not necessary to understand this complex process, keep in mind that each component of every algorithm was tested on hundreds of clients and shown to have a very high success rate before becoming part of this program. Only when the common efficacy of the treatment sequences could be shown did I grant them algorithm status. All of the algorithms in this blog have a proven rate of success of 75% to 80 percent, and they are a way to enter the healing world of TFT with extraordinary ease.    Over the years, I developed a particular treatment patterns that works best for a given disorder. As a result, this blog-site provides a different "recipe" for each psychological problem. For example, the precise elements and their sequence in the formula used for the fear of flying differ from those in the formula used for coping with a traumatic event like sexual abuse. If you follow the simple instructions of each algorithm, you can ease a variety of problems whenever necessary.    TFT as a whole has a unique architecture, so while the algorithms may differ in their specifics, they have common elements. Here, you will see in the algorithms that you eventually try. The following sections are meant as an introduction to and explanation of these common elements ; DO NOT ACTUALLY TRY THEM OUT OR PRACTICE THEM UNTIL YOU GET TO THE LAST POST. At that time, you'll learn the precise sequence of steps created for your particular problem. These next few pages should not be used as a "trial run," but rather as an orientation to what you'll be doing in the following post. Every algorithm begins the same way. The first step is to intentionally think about or concentrate on the Thought Field associated with your emotional distress or problem. Here we are not being negative thinking but we are processing the emotions. In essence, you'll bringing thoughts associated with the problem into your awareness. You'll be asked to consciously think about your own particular fear, anxiety,  or trauma.   Again, in other therapies it really doesn't matter what you're thinking about while you're being treated. But with TFT, it makes all the difference in the world. To be treated successfully, you need to tune the perturbed Thought Field -- in other words, think about the problem that you're trying to resolve. This will bring to the fore the specific perturbations and related information that are active in the problem and need to be addressed in the treatment. In the early years of TFT, I compared this process to tuning a specific radio station. If you turn the dial to another station instead, you will get completely different information. Or imagine asking your tailor to alter your trousers without bringing the trousers to him; the job just wouldn't get done.    Psychologists have known for many years that particular thoughts have definite and profound effects on an individual. This concept is fundamental to clinical psychology . As you turn your attention to the event, circumstance, or person that is the focus of your psychological problem, it's understandable that you'll have an emotional reaction to those thoughts. But even though the process of tuning a Thought Field may make you feel distressed and upset, it's an important  element in healing. This is real processing the true emotional problem and not denying the reality of the existence of the emotion or suppressing it deep within the subconscious mind. Hence the success rate of TFT application.    When you tune a Thought Field and it produces intense emotions, this will be clear indication that perturbations exist. These perturbations will appear immediately upon tuning the Thought Field. When I was developing TFT, I would give patients plenty if time to tune the Thought Field. I'd watch their eyes and their facial expression to make sure they really had it. I later learned that the tuning tales place instantly. If you don't become upset, there are probably no perturbations present, although there are exceptions. Most notably, a person repressing his psychological problem may not become distressed merely thinking about it; however, if he were to be exposed to the actual situation -- foe example, speaking in public -- then his anxiety would surface. The Causal Diagnosis procedure if TFT can identify precisely what perturbations ate present, allowing even a repressed person to be treated successfully.  Breathing Techniques The Touching Steps No comments:
martes, 22 de julio de 2008 BENIN - Capital Porto Novo. From Wikipedia, the free encyclopedia Jump to: navigation, search Not to be confused with the Kingdom of Benin, now the Benin region of Nigeria, or Benin City in that region. République du Bénin Republic of Benin Flag Coat of arms Motto: "Fraternité, Justice, Travail" (French) "Fellowship, Justice, Labour" Anthem: L'Aube Nouvelle (French) The Dawn of a New Day Capital Porto Novo 6°28′N 2°36′E / 6.467, 2.6 Largest city Cotonou Official languages French Demonym Beninese; Beninois Government Multiparty democracy - President Yayi Boni Independence from France - Date August 1, 1960 - Total 112,622 km² (101st) 43,483 sq mi - Water (%) 1.8 - July 2005 estimate 8,439,0002 (89th) - 2002 census 6,769,914 - Density 75/km² (118th3) 194/sq mi GDP (PPP) 2005 estimate - Total $8.75 billion (140th) - Per capita $1,176 (166th) Gini (2003) 36.5 (medium) HDI (2007) ▲ 0.437 (low) (163rd) Currency West African CFA franc (XOF) Time zone WAT (UTC+1) - Summer (DST) not observed (UTC+1) Internet TLD .bj Calling code +229 1 Cotonou is the seat of government. 3 Rank based on 2005 estimate. You can improve this article by introducing more precise citations where appropriate. This article needs additional citations for verification. Benin (IPA: /bə'nɪn/), officially the Republic of Benin, is a country in Western Africa. It borders Togo to the west, Nigeria to the east and Burkina Faso and Niger to the north; its short coastline to the south leads to the Bight of Benin. Its capital is Porto Novo, but the seat of government is Cotonou. Benin was known as Dahomey until 1975. The name "Benin" has no proper connection to Kingdom of Benin (or Benin City). The name Dahomey was changed in 1975 to The People's Republic of Benin, named after the body of water on which the country lies, the Bight of Benin. This name was picked due to its neutrality, since the current political boundaries of Benin encompass over fifty distinct linguistic groups and nearly as many individual ethnic groups. The name Dahomey was the name of the ancient Fon Kingdom, and was determined to be an inappropriate name. Main article: History of Benin The African kingdom of Dahomey was formed out of a mixture of various local ethnic groups on the Abomey plain. Historians theorized that the insecurity caused by the slave trade may have contributed to mass migrations of different groups to Abomey, including a segment of the royal family of the city of Allada. These groups coalesced around a strict military culture aimed at securing and eventually expanding the borders of the small kingdom. Along with the powerful Dahomey Kingdom, other peoples inhabited the area that would become the Republic of Benin. Of note were the Ketu, Icha, Dassa, Anago, and other sub-groups of the Yoruba-speaking people. These groups were in close contact with related sub-groups in present-day Nigeria, and were often enemies of the Dahomeans. However, some were also citizens of Dahomey. In regions such as present-day Porto Novo, both groups inter-married. North of these people were the Borgu, Mahi, and several other ethnic groups that are included in the country's current population. [edit] Colony For the next 12 years, ethnic strife contributed to a period of turbulence. There were several coups and regime changes, with three main figures dominating - Sourou Apithy, Hubert Maga, and Justin Ahomadegbé - each of them representing a different area and ethnicity of the country. These three agreed to form a presidential council after violence marred the 1970 elections. In 1972, a military coup led by Mathieu Kérékou overthrew the council. Kérékou established a Marxist government under the control of Military Council of the Revolution (CNR). In 1975 he renamed the country the People's Republic of Benin. In 1979, the CNR was dissolved and elections took place. By the late 1980s, Kérékou abandoned Marxism after an economic crisis and decided to re-establish a parliamentary capitalist system. In 1991 he was defeated by Nicéphore Soglo and became the first black African president to step down after an election. Kérékou returned to power after winning the 1996 vote. In 2001, a closely fought election resulted in Kérékou's winning another term. His opponents claimed election irregularities. President Kérékou and former President Soglo did not run in the 2006 elections, as both were barred by the constitution's restricting age and total terms of candidates. President Kérékou is widely praised for making no effort to change the constitution so that he could remain in office or run again, unlike some African leaders. On March 5, 2006, an election was held that was considered free and fair. It resulted in a runoff between Yayi Boni and Adrien Houngbédji. The runoff election was held on March 19 and was won by Yayi Boni, who assumed office on April 6. The success of the fair multi-party elections in Benin won high praise internationally. Benin is widely considered a model democracy in Africa. United States President George W. Bush and First Lady Laura Bush briefly visited Benin on February 16 2008, marking the first visit of a major head of state to this tiny country. President Yayi Boni presented President Bush with the Grand Cross of the National Order of Benin and thanked him for US economic aid. Main article: Politics of Benin On February 16th 2008, United States President George W. Bush made a brief stop in Benin during which he held a meeting with president Thomas Boni Yayi as well as a press conference at Cadjehoun Airport in Cotounou. The president later proceeded to Tanzania to continue with his five-nation African tour. [edit] Departments and communes Main articles: Departments of Benin and Communes of Benin Departments of BeninBenin is divided into 12 departments (French: départements), and subdivided into 77 communes. In 1999, the previous six departments were each split into two halves, forming the current 12. The new six departments have not been assigned a capital yet. Map of BeninMain article: Geography of Benin Stretched between the Niger River in the northeast and the Bight of Benin in the south, Benin's elevation is about the same for the entire country. Most of the population lives in the southern coastal plains, where Benin's largest cities are also located, including Porto Novo and Cotonou. The north of the country consists mostly of savanna and semi-arid highlands. Running southernly, down the middle of the country is the Oueme River. The climate in Benin is hot and humid with relatively little rain compared to other West African countries, although there are two rainy seasons (April-July and September-November). In the winter the dust winds of the harmattan can make the nights rather cold. The largest city and commercial capital is Cotonou. The name Cotonou is from the Fon phrase ku tɔ nu 'at the lake of the dead', from the adjacent lagoon. This is a reference to the belief that falling stars represent the souls of those who have just died falling to the underworld. It is said that when Cotonou was founded, the lights of the lacustrine village of Ganvié across the lagoon were reflected in the waters, suggesting fallen stars at the bottom. Ganvié is a fishing village sitting in the water on stilts at the western shore of the lagoon. The town of Ouidah is the spiritual capital of Vodun, and is known locally as Glexwe. It was a major slaving port under Portuguese occupation. The town of Abomey is the old capital of the Fon kingdom of Dahomey, and the Fon king continues to reside there. In Atakora province, Betamaribe settlements straddling the Togolese border are called tata somba 'Somba houses'; they are famous for their fortifications, with livestock housed inside and the people sleeping in huts among the granaries on the roofs. Main article: Economy of Benin The economy of Benin remains underdeveloped and dependent on subsistence agriculture, cotton production, and regional trade. Growth in real output has averaged a stable 5% in the past six years, but rapid population rise has offset much of this increase. Inflation has subsided over the past several years. In order to raise growth still further, Benin has plans to attract more foreign investment, place more emphasis on tourism, facilitate the development of new food processing systems and agricultural products, and encourage new information and communication technology. The 2001 privatization policy should continue in telecommunications, water, electricity, and agriculture in spite of initial government reluctance. The Paris Club and bilateral creditors have eased the external debt situation, while pressing for accelerated structural reforms. There are several dozen ethnolinguistic groups in Benin, representing three of Africa's language families: Niger-Congo, Nilo-Saharan, and Afroasiatic. The latter is represented by Hausa living mostly as merchants in the north, while Nilo-Saharan is represented by the Dɛndi, descending from the Songhai Empire. The Dɛndi language predominates along the Niger River in the far north, and is used as a lingua franca in Muslim areas throughout the north, in Alibori, Borgou, and Donga provinces. Of the Niger-Congo family, five branches are represented: Mande by the Boko or Busa, now in the far eastern corner (southern Alibori-northern Borgou), but previously more widely spread before being largely absorbed by the Bariba West Atlantic by the nomadic Fulbe scattered across the northeast Benue-Congo by the Yoruba of Collines and Plateau provinces, such as the old kingdom of Sakete, and the capital city of Porto-Novo, having expanded west from Oyo and Ife in the twelfth to nineteenth centuries Gur (Voltaic) languages predominate in the four northern provinces, with the Batɔmbu (Bariba) of the old Borgou (Bariba) Kingdom occupying most of the countryside in its successor provinces of Borgou and Alibori, as well as the provincial captital of Parakou; the Yom throughout much of Donga province and its capital Djougou; and several groups in the Atakora, including the Bɛtamaribɛ of the Otammari country around the provincial capital of Natitingou, the Biali, the Waama of Tanguiéta, and the Gulmàceba. Kwa, especially the Gbe languages spoken by the Tado peoples in the southern and central provinces: the Aja who established themselves in Kouffo province from neighboring Togo and gave rise to the other Tado peoples of Benin, except for the Mina of Mono province, who arrived separately from Togo or Ghana: The Fɔn culture centered in Zou province around the old Fɔn capital of Abomey, but also dominant in Cotonou and southern Atlantique areas such as Ouidah; the Maxi in central Collines, especially around Savalou; the Ayizɔ of central Atlantique (Allada); the Xwla and Xueda in the lagoons of the coast; the Tɔfin of Ouémé; and the Gun of Porto-Novo. Other Kwa languages are spoken by the Anii in southern Donga in the region of Bassila, and the Fooɖo in western Donga near the town of Ouaké. The largest ethnic group are the Fon, with 1.7 million speakers of the Fon language (2001), followed by the various Yoruba groups (1.2 million), the Aja (600,000), the Bariba (460,000), the Ayizo (330,000), the Fulbe (310,000), and the Gun (240,000). Near the ports in the south can be found people who are descended from returned Brazilian slaves. There are also small numbers of Europeans, principally French, and people from the western Asia, mainly Lebanese, and East Asia, chiefly Indians. Main article: Religion in Benin Celestial Church of Christ baptism in Cotonou. Five percent of Benin's population belongs to the Celestial Church of Christ, an African Initiated Church.According to the 2002 census, 27.1 percent of the population of Benin is Roman Catholic, 24.4 percent Muslim, 17.3 percent Vodun, 5 percent Celestial Christian, 3.2 percent Methodist, 7.5 percent other Christian, 6 percent other traditional local religious groups, 1.9 percent other religious groups, and 6.5 percent claim no religious affiliation.[2] Indigenous religions include local animistic religions in the Atakora (Atakora and Donga provinces) and Vodun among the Yoruba and Tado peoples in the center and south of the country. The town of Ouidah on the central coast is the spiritual center of Beninese Vodun. The Yoruba and Tado pantheons correspond closely: The supreme deity Mawu (in the Fon language) or Olodumare (in Yoruba) The god of the earth and smallpox, Sakpata or Cankpana The god of thunder, Xevioso or Cango The god of war and iron, Gu or Ogun The major introduced religions are Islam, introduced by the Songhai Empire and Hausa merchants, and now followed throughout Alibori, Borgou, and Donga provinces, as well as among the Yoruba, by 10-15% of the population; and Christianity, followed nominally by another 10-15% throughout the south and center of Benin and in Otammari country in the Atakora. Most Christians, however, continue to hold Vodun beliefs and have incorporated into Christianity the pantheon of Vodun. List of Beninese writers, Music of Benin, and Literature of Benin Singer Angelique Kidjo, who is a five time Grammy nominee and international goodwill ambassador for UNICEF, was born in Cotonou, Benin. Health issues During the 1980s, less than 30 percent of the population had access to primary health care services. Benin had one of the highest death rates for children under the age of five in the world. Its infant mortality rate stood at 203 deaths for every 1000 live births. Only one of three mothers had access to child healthcare services. The Bamako Initiative changed that dramatically by introducing community-based healthcare reform, resulting in more efficient and equitable provision of services.[3] A comprehensive approach strategy was extended to all areas of health care, with subsequent improvement in the health care indicators and improvement in health care efficiency and cost.[4] A phone card from Benin.Communications in Benin Education in Benin Foreign relations of Benin List of cities in Benin Military of Benin Scoutisme Béninois Transport in Benin ^ "Serious violations of core labour standards in Benin, Burkina Faso and Mali". ICFTU Online. Retrieved on 2007-07-30. ^ "Bamako Initiative revitalizes primary health care in Benin". Retrieved on 2006-12-28. ^ "Implementation of the Bamako Initiative: strategies in Benin and Guinea". Retrieved on 2006-12-28. Adam, Kolawolé Sikirou and Michel Boko (1983), le Bénin. SODIMAS, Cotonou and EDICEF, Paris. Godfrey Mwakikagile, Military Coups in West Africa Since The Sixties, Huntington, New York: Nova Science Publishers, Inc., 2001, chapter on Benin. External links Find more about Benin on Wikipedia's sister projects: Dictionary definitions Source texts Images and media News stories Learning resources Benin Government Portal (official site) lunes, 21 de julio de 2008 De Wikipedia, la enciclopedia libre Bandera Escudo Lema: Todos somos uno Himno nacional: Pátria Amada • Población • Coordenadas Maputo 966.837 (1996 est.) 25°57′ S 32°35′ E Ciudad más poblada Maputo Idiomas oficiales Portugués Forma de gobierno República Primer ministro Armando Guebuza Luisa Diogo • Fecha De Portugal 25 de junio de 1975 • Total • % agua Fronteras Puesto 34º 799.380 km2 4.571 km • Total • Densidad Puesto 53º 19.406.703 (julio de 2005 est.) 24,28 hab/km2 PIB (nominal) • Total • PIB per cápita • Total (2005) • PIB per cápita Puesto 102º $ 25.974 millones $ 1.335 (169º) IDH (2007) 0,384 (172º) – Bajo Moneda Metical (MZM) Gentilicio Mozambiqueño Huso horario • en verano UTC +2 UTC +2 Dominio Internet .mz Prefijo telefónico +258 Prefijo radiofónico C8A-C9Z Código ISO 508 / MOZ / MZ Miembro de: Commonwealth, CPLP, ONU, UA La República de Mozambique, o simplemente Mozambique se encuentra situado al sudeste de África, a orillas del océano Índico. Limita al norte con Tanzania y Malawi, al noroeste con Zambia, al oeste con Zimbabwe, al suroeste con Swazilandia, al sur y al suroeste con Sudáfrica y al este con el océano Índico. Es miembro de Comunidad de Países de Lengua Portuguesa, de la Unión Africana y de la Mancomunidad Británica de Naciones. Tabla de contenidos 1 Historia 2 Política 2.1 Organización territorial 3 Geografía 4 Ecología 5 Economía 6 Demografía 7 Cultura 7.1 Deportes 8 Enlaces externos Historia de Mozambique Colonizada por Portugal desde el siglo XVI sus costas, y desde finales del XIX el interior, en los años 1960 comenzó una guerra de guerrillas contra la metrópoli al negarse ésta a conceder la independencia. Finalmente en 1975 la minoría portuguesa regresó a su país, iniciándose una guerra civil entre el FRELIMO marxista, que alcanzó el poder y la RENAMO, apoyada por Sudáfrica. La guerra terminaría en 1992. Política de Mozambique El Frelimo fue el movimiento que luchó por la liberación desde el inicio de la década de los sesenta. Después de la independencia, el 25 de junio de 1975, la Frelimo pasó a controlar el poder. En 1978, el Frelimo se convirtió en un partido político marxista-leninista y Samora Machel ocupó la presidencia del país, en un régimen monopartidista, desde la independencia hasta su muerte en 1986. En 1990, fue aprobada una nueva constitución que transformó el estado en una democracia multipartidista. La Frelimo permanece en el poder hasta hoy, habiendo ganado tres veces las elecciones multipartidistas realizadas en 1994, 1999 y 2004. La Renamo es el principal partido de la oposición. Organización territorial de Mozambique Mozambique está dividida en 11 provincias: Cabo Delgado, Gaza, Inhambane, Manica, Maputo (ciudad), Maputo (provincia), Nampula, Niassa, Sofala, Tete y Zambezia. Mapa de Mozambique Artículo principal: Geografía de Mozambique El país se localiza en la costa este de África, en la mayor planicie costera del continente (la mitad del territorio del país se encuentra a 230 m sobre el nivel del mar). La cadena montañosa conocida como Inyanga se localiza al oeste del país, alcanzando su máxima altura en 2500 m. Las mayores elevaciones montañosas se encuentran cerca de Zimbabwe, Zambia y Malawi. Las costas son muy irregulares, estando cubiertas por grandes pantanos. Sus playas son excelentes para el turismo, gracias a su fina arena blanca y aguas cristalinas. Otro reclamo turístico es su bajo precio, sobre todo el del pescado fresco, de gran calidad. El país está dividido por el río Zambeze. Mozambique tiene una estación cálida y lluviosa desde noviembre a marzo, y una fresca con vientos secos desde julio a septiembre. Según WWF, el territorio de Mozambique se reparte entre doce ecorregiones: Selva mosaico costera de Inhambane y manglar de África oriental, en la costa norte Sabana arbolada de miombo oriental, en el norte Sabana costera inundada del Zambeze, en el delta del Zambeze y otros ríos cercanos Pradera inundada del Zambeze, en los alrededores del lago Chilwa, en la frontera con Malawi Mosaico montano de pradera y selva del Rift meridional, en las montañas al oeste del lago Malawi Sabana arbolada de miombo meridional y sabana arbolada de mopane del Zambeze, en el oeste y noroeste Mosaico montano de selva y pradera de Zimbabue oriental, en las zonas montañosas fronterizas con Zimbabue Salobral del Zambeze, en el valle del Changane, en el sur del país Selva mosaico costera de Maputaland, en el sur Manglar de África austral, en un pequeño enclave costero del extremo sur Economía de Mozambique Pesca tradicional de Mozambique La economía de Mozambique es una de las más bajas de las del tercer mundo. Casi el 45% del territorio de Mozambique se puede utilizar para agricultura. Sin embargo, el 80% de la producción agrícola es de subsistencia. Hay extracción de madera en las selvas nativas. La reconstrucción del país, después del término de la guerra civil en 1992 y de las inundaciones del año 2000 es dificultada por la existencia de minas terrestres no desactivadas. Evolución de la demografía de Mozambique Artículo principal: Demografía de Mozambique Al año 2007, Mozambique tiene una población de 20.905.585 habitantes. El grupo étnico mayoritario de Mozambique está compuesto por varios subgrupos con diferentes lenguas, dialectos, culturas e historias. Muchos de ellos están relacionados con grupos étnicos similares que viven en países vecinos. Las provincias de Zambezia y Nampula (en el norte-centro del país) son las más habitadas, con un 45% del total. Con aproximadamente 4 millones, los Makua son el grupo étnico mayoritario en el norte, los Sena y los Ndau ocupan gran parte del valle Zambezi, y los Shangaan dominan la parte sur del país. Se calcula que un poco menos del 1% de la población es europea (principalmente portugueses)y mestiza. A pesar de la influencia islámica y las colonizaciones europeas, los mozambiqueños han mantenido su cultura indígena basada en la agricultura a pequeña escala. El arte predominante ha sido formas basadas en la escultura de la madera. Las clases media y alta continúan teniendo una fuerte influencia de cultura y lengua portuguesa. El idioma oficial es el portugués. La esperanza de vida es de 40 años. El 47.8% de la población esta alfabetizada. Se calcula que el 12.2% de la población esta infectada con el virus de VIH(SIDA). El promedio de hijos por mujer es de 5.29. Cultura de Mozambique Mozambique en los Juegos Olímpicos Selección de fútbol de Mozambique Fiestas Fecha Nombre en castellano Nombre local Notas 1 de enero Día de la fraternidad universal Dia da Fraternidade universal 3 de febrero Día de los Héroes Mozambiqueños Dia dos Heróis Moçambicanos En homenaje a Eduardo Mondlane 7 de abril Día de la mujer Dia da Mulher Moçambicana En homenaje a Josina Machel 1 de mayo Día internacional del Trabajo Dia Internacional dos Trabalhadores 25 de junio Día de la independencia Nacional Dia da Independência Nacional 7 de septiembre Día de la Victoria Dia da Vitória 25 de septiembre Día de las fuerzas armadas de liberación Nacional Dia das Forças Armadas de Libertação Nacional En homenaje del incio de la lucha armada de liberación Nacional 4 de octubre Día de la Paz a la Reconciliación Dia da Paz e Reconciliação En homenaje al acuerdo general de Paz 25 de diciembre Día de la Familia Dia da Familia
First read all of the information regarding the Trait Theory on this page and Mr. Neuzil's analysis. • Do you agree with these results about Mr. Neuzil? Explain. (Part 1) Click here to take the BIG FIVE (OCEAN) PERSONALITY TEST • Print out your results and write an analysis on whether you feel the assessment is accurate. (Part 2) • Have someone who knows you well read your test results (not your interpretation) and have them write out a statement arguing whether the assessment is accurate. (Identify this person's relationship to you--this should be a different person from the previous assignment). (Part 3) Mr. Neuzil's Test Results Two of the founding figures in trait theory are Raymond Cattell and Hans Eysenck, both of whom conducted their seminal research in the 1940's and 1950's. Although they differed in their conclusions, they approached the problem of how to describe personality in a very similar way: by asking people to indicate the extent to which they and others could be described with each of a large number of words. Raymond Cattell started with approximately 18,000 words for describing personality that had been culled from the English lexicon. He narrowed this unmanageably large number of words down to approximately 170 by choosing those that seemed most representative and largely independent of each other. He then had people describe themselves and others using each of these words, and then subjected the descriptions to factor analysis to determine which groups of descriptions tended to occur together (and which never occurred together). Using this method, Cattell came up with a list of sixteen factors of personality (each a continuum from one extreme to the other), and developed a questionnaire that could be used to measure each of these factors in an individual or a group. The factors identified by Cattell were: sociable-unsociable, intelligent-unintelligent, emotionally stable-unstable, dominant-submissive, cheerful-brooding, conscientious-undependable, bold-timid, sensitive-insensitive, suspicious-trusting, imaginative-practical, shrewd-naïve, guilt proclivity-guilt rejection, radicalism-conservatism, self- sufficiency-group adherence, self-disciplined-uncontrolled will, and tense- relaxed. Hans Eysenck's early work took place at approximately the same time as Cattell's and used an almost identical method. However, Eysenck used factor analysis slightly differently, and came up with only two factors: extroversion-introversion and neuroticism-stability. Extroversion- introversion refers to a person's tendency to seek stimulation and novelty: a person who is highly extroverted is more likely to take risks, to have many friends, and to be outgoing than someone who is highly introverted. Neuroticism-stability refers to a person's tendency to become emotionally upset. Eysenck believed that these two traits were heavily influenced by biology. In particular, he thought that extroverted people had higher thresholds for stimulation than introverted people. According to his theory, the differences in behavior between extroverts and introverts are due to the tendency to seek out an optimal level of stimulation; introverts are likely to be overstimulated by the kinds of activities that extroverts find most comfortable. The Big Five (Also known as OCEAN or CANOE) Since Cattell and Eysenck, many researchers have conducted many studies to determine whether there are sixteen traits, as Cattell argued, or two, as Eysenck argued, or whether the truth is somewhere in between. The consensus that has arisen is that across many studies and many situations, five factors appear to account for most of the personality differences between people. These factors include two of Eysencks--extroversion and neuroticism--as well as three new ones: agreeableness, conscientiousness, and openness to experience. Of these, extroversion and neuroticism account for most of the variance. Personality assessments based on the Big Five tend to be relatively stable over time, but they are relatively poor predictors of any specific behavior. Source: SparkNotes: You are well-organized, and are reliable.                                           (Your percentile: 74) You are neither extremely forgiving nor irritable.                            (Your percentile: 57)   You are generally relaxed.                                                                               (Your percentile: 32) Openness to Experience/Intellect You enjoy having novel experiences and seeing things in new ways. (Your percentile: 88) High scorers tend to be sociable, friendly, fun loving, talkative; Low scorers tend to be introverted, reserved, inhibited, quiet.                You are relatively social and enjoy the company of others.         (Your percentile: 79)
11/19/2013 01:36 pm ET Updated Jan 23, 2014 Warning: This Birth Control Product May Be Hazardous to Your Health by guest blogger Diana Zuckerman, PhD, president of the National Research Center for Women & Families "Was I just unlucky, or is this medical product not really safe?" That's a question I get asked often, and was recently asked about Essure, a "permanent birth control" device made by Bayer. At first it seemed these women were just unlucky. But after gathering more information, it now looks like there could be much greater risks than patients are being advised of. In case you're wondering, permanent birth control means sterilization. The purpose of Essure is to prevent a woman from ever getting pregnant again. For some women, preventing any future pregnancies could save their lives. So it is obviously a problem when Essure doesn't work and women get pregnant, which was one of the problems I heard about. But I also heard from women who were in terrible, unrelenting pain, feeling that their lives had been ruined by this product. Since National Research Center for Women and Families is known as an objective source of medical information and isn't on the payroll of any companies, the women asked, "What do you know?" and "Is this product really safe, or are there a lot of other women like me?" And also, "Can you warn other women?" The Food and Drug Administration (FDA) has much lower standards for medical implants than it does for prescription drugs, so I checked out Essure on the FDA website and was pleasantly surprised to see that the FDA had required clinical trials, which the agency often doesn't require for implants. These studies of women with Essure implants showed that Essure patients had a rather low rate of complications. The studies showed that the main problem was that sometimes the device fell out. If the woman didn't realize it, she could get pregnant. If she did realize it, she'd need to get a replacement implant or use another type of birth control. There was about a 5 percent rate of serious complications reported--not great (especially if a complication happens to somebody we care about), but not a bad rate, either. Since all birth control has some risks (such as potentially fatal blood clots), and since pregnancy has rather substantial health risks (an even greater risk of potentially fatal blood clots), the studies of Essure seemed reassuring (no pun intended). Sometimes studies can be deceiving, however, especially when conducted by the company trying to sell you the product. An NBC news investigative team interviewed Kim Hudak, one of the women in the study who has had terrible pain in the years since she got Essure. The reporters found that the telephone surveys and medical visits that were used to provide data for the company's study had yielded information about her terrible health problems after Essure but hadn't counted them as complications. The health professionals conducting the study had made very subjective decisions: for example, that excruciating pain in the same part of her body as the Essure device somehow was unrelated to Essure and therefore needn't be counted as a complication. Instead, they reported Kim's experience with Essure as "excellent" and Kim as "very satisfied." Meanwhile, Kim was in excruciating pain--and had gained 100 pounds from the medications she was given as doctors tried to figure out what was wrong. Kim told me that she thought her health problems might possibly be caused by Essure but believed the doctor when he told her they weren't. Eventually, Kim was in so much pain that she ignored the doctor's advice and had her Essure implant removed. Kim told me that her health has dramatically improved ever since, and she has lost most of the weight she had gained. This is not the story of one woman. It's a story about how poorly conducted research provides inaccurate information that can potentially harm thousands if not millions of patients. Whether the study was intentionally fraudulent or just badly conducted by some of the medical professionals involved, the results are the same for Kim and anyone misled by the completely inaccurate reporting of her terrible medical problems. The fact that Bayer was accused just two years ago of covering up deaths from Yasmin, another one of its birth control products, does add extra drama. Can the company's studies be trusted? And should the FDA do a better job of scrutinizing them? It doesn't take much to monitor these studies. For example, you can see in Kim's study survey where her health problems were clearly written and then somebody crossed them out, added his or her initials to show this was an official revision, and changed the answer from "Yes" (I have health problems since getting Essure) to "No." The woman interviewing Kim also checked "excellent" and "very satisfied." If that had only happened to Kim and nobody else, then perhaps Essure could be almost as safe as the company reported. But the same people who collected data on Kim also "studied" other women, so it's likely that such changes and inaccuracies happened numerous times. That would mean that FDA's decision to approve Essure was based on inaccurate information. Instead of monitoring the company's studies, unfortunately, the FDA has defended them. While the NBC investigative reporters were gathering information, the FDA wrote a new article for its website defending the safety of Essure. As a person who uses medical products, what can you do to make sure you aren't harmed by implants or medications that aren't really safe? There is no easy answer. But there are a few things you can do: 1. Before starting a new medication or agreeing to a new medical implant or device, go online. Go to your favorite search engine and type in the name of the product and the word "problems" or "risks" or "complications." That will usually take you to web pages that list the possible problems with the product. You can even go to the official website for the product. Although a company's website will advertise how great the product is, by law the company is also required to list all the possible complications that the FDA has found. This isn't a perfect source of information (as my Essure example shows), but it will provide some warnings of what the risks are. 2. For prescription drugs, you can also go the's Best Buy Drugs website to get information that compares the drug you are considering with other drugs that can be used for the same purpose. The site doesn't have information about all drugs, but it does have good comparison information about many widely used drugs. 3. Check out and for information about many drugs and devices. And, if you are having trouble finding the information you're looking for, you can contact our Center's free hotline at to ask us. You'll receive a free, personal response within days. One more thing to remember: The newest medical products are often not the best, even though they're the most expensive. FDA approves new medical products on the basis of information that is provided by the company making the product. It isn't until the product has been used by many thousands of patients in the real world that it's possible to learn what all the risks are and how it compares to other treatments. For more from Maria Rodale, visit
10/23/2012 04:34 pm ET Updated Dec 23, 2012 Why Music Is Important: Education The greatest investment any society can make is in the education of the young. I think the Founding Fathers would have agreed with this, as would the ancient Greeks. Photo: Andrew Hurlbut Without education, there is ignorance and where there is ignorance there is poverty and, from the cesspit of poverty emanates horrors such as famine, deadly epidemics, drug addiction, crime, terrorism and serial violence. If you believe this as I do, we can perhaps examine some alternative scenarios to events over the last 10 years. Imagine if instead of spending billions of dollars on invasions and bombings, we had used the same resources to fund educational systems, build infrastructure, and provide medical care in the Middle East and beyond. That might have brought sustainable peace and rehabilitated America's badly tarnished image. Photo: Franco Folini Perhaps that is a naïve dream. But what of our own country? In the U.S., we suffer from unconscionable levels of poverty despite being the world's wealthiest nation. The statistics are dismal: In 2010, 46.9 million people were living in poverty, up from 37.3 million in 2007. That's 15.1 percent of the population, up from 12.5 percent in 1997. Also in 2010, 17.2 million households or 14.5 percent of households (approximately one in seven), were food insecure, the highest number ever recorded in the United States. Then, there is the public education system serving our communities. What should be a non-partisan priority investment has become a pawn for politicians. What was an exemplary system of education to which the whole world looked just a few decades ago, has become a rusted wreck. Check out the analysis by my fellow Huffington Post blogger Jack Jennings, who recently retired after 17 years directing the Center on Education Policy. Not surprisingly, our education system is criticized, pilloried by parents, children, and government. Our politicians, whether they are Democrat or Republican, do not see education as a birthright. It is there to be fiddled with, subjected to some of the most corrosive and destructive policies.Do I really have to analyze what effects this is having on our young people? Does it not scream at us? Photo courtesy of MDGovPics Such policies explain the deep negativity so many young people have toward education, particularly in the Latino and African American communities. What should be the privilege of knowledge and creativity, becomes the sad residue of budgetary cuts, restrictive union work rules, inequality of opportunity, and curriculum tinkering. So is this the country we want to promote? Greater social divide? Greater poverty? Greater ignorance? A fertile foundation for crime and urban ghettos? We really should stop and think and look at hard evidence and plan for a world that the founding fathers would recognize as one they would be proud to see as their legacy. And music belongs front and center in all this.
North Carolina State University 04/06/2017 | Press release | Distributed by Public on 04/06/2017 11:42 World War I Transformed NC State Note: The North Carolina Museum of History opens a two-year exhibit about a North Carolina soldier's experiences on the battlefields of France with a day-long centennial celebration from 10 a.m.-4 p.m. on Saturday. They had no idea how much their world, and their legacies, would change. One day they were students, rural farm boys (and a few farm girls) who had come to Raleigh from North Carolina's 100 counties with a dark cloud of a foreign war hanging over their heads. On April 6, 1917-100 years ago today-the United States declared war on the German Empire to enter 'The War to End War,' and the newly renamed North Carolina College for Agriculture and Engineering changed forever. Each of the students gave up something. Many gave up their education. Some gave their lives. Most were scarred forever. Nearly 100 students immediately withdrew from school to enlist. The school changed from its traditional grey military uniforms to U.S. Army-issued olive drab. School-required afternoon military drills on the Red Diamond Field were increased from three to five days a week. 'The school began to have the atmosphere and appearance of an infantry camp,' wrote early college historian David Lockmiller in 1939. In fact, that's what it became. In the fall of 1918, all 593 students were organized into the Student Army Training Corps, a military unit of five infantry companies and one naval section. Each student received free college expenses and $30 per month in military pay. 'In a sense, the government commandeered the College,' Lockmiller wrote, 'and the administration, faculty, and students loyally gave up their old studies and customs and cooperated in a program designed to win war.' The school had already been touched by the war, from increased agriculture activity to aid the Europeans who had been fighting since 1914 to war classes as part of the Reserve Officers Training Corps that was formed in 1916. Alum George Fletcher Sedberry of Fayetteville had already become the school's first fatality of the war when he and seven other Americans died on British steamship Marina, which was sunk by a German U-boat off the coast of Ireland in 1916. The school, Raleigh and the country were gearing up to be fully prepared for all-out war in 1919. Before any of the SATC officers were ever commissioned, however, the war abruptly ended with the armistice of Nov. 11, 1918. Though some remained in military pursuits, most students received an honorable discharge from their military duties and returned to their studies for the 1919 spring semester. Without a doubt, that declaration of war, and the long-range effects, changed the landscape of the tiny little school on the western edges of Raleigh, a town of less than 20,000 that at the time was smaller than Winston-Salem, Charlotte, Wilmington and Asheville. In all, 1,897 NC State students or alumni served in the First World War. The 34 who died in action, from illness or while training, are remembered in the NC State Memorial Tower, the campus icon that is dedicated to those who were lost in the war. Some became real heroes. James Henry Baugham, enrolled in school and a member of the varsity football team for barely two months, took off for France in the fall of 1917 to become one of 180 American volunteers to make combat flights for the Lafayette Flying Corps as part of the French Air Service. He was twice shot down over the battlefields of France, surviving the first but suffering mortal wounds in the second. He earned the French Croix de Guerre with two palms and the French Medal Militaire. Raleigh's James Allen Higgs, a 1910 civil engineering graduate, was awarded a special war medal after he was shot down three times from observation balloons over the battlefields of France. Each time, he went back up in a new balloon. Madison native Robert Opie Lindsay-a textiles major who had played basketball, served as business manager of the school paper and editor of the Agromeck-became the only North Carolina-born pilot to earn the distinction of flying ace, with six confirmed kills in air battles, while twice being shot down from 20,000 feet. During World War II, he organized the Oklahoma Air National Guard and served as the commanding officer of Fort Sill. Raleigh native Frank Thompson -an early athletics hero when the school was known as the North Carolina School for Agriculture and Mechanic Arts, the head baseball coach at NC State and both the head football and baseball coach at Wake Forest College-enlisted as a lieutenant in the 15 Machine Gun Battalion at the age of 31 and died in action on the battlefield at St. Mihiel, France. NC State's first campus gymnasium and current theater, Thompson Theatre, is named in his memory. Some were local sons and daughters. Alexander Holladay Pickell, grandson of inaugural school president Alexander Holladay, died of pneumonia at a Naval Training Reserve in Massachusetts. Eliza Riddick, daughter of school president Wallace Carl Riddick, died while comforting more than 500 students and faculty who were consumed in the Spanish flu pandemic of 1918, which killed 10 times more people worldwide than the war. In addition to Riddick and fellow nurse Lucy Page, 13 enrolled students died of the flu. Dozens of faculty enlisted as well. Future chancellor and double-engineering graduate John C. Harrelson left his post as a math professor to join the Army, overseeing a company of mostly NC State alumni in the Coast Artillery Corps at Fort Caswell. He was promoted to colonel, the highest rank earned by an NC State alum in the war. William C. Lee, a starting fullback on the NC State football team in the fall of 1916, enlisted as an infantry soldier in the spring of 1917 and, after the war, worked his way through the ranks to become the world's leading expert in airborne infantry combat. The Dunn native is remembered as the 'Father of the U.S. Airborne' and the architect of the Allied Forces airborne invasion of France during World War II. Just off NC State's campus, from the outlying community of Method all the way to House's Creek Township, land that originally belonged to Raleigh founder Joel Lane and that was later used as a Confederate training camp during the Civil War was leased by the U.S. Government and turned into Camp Polk. It became one of three major military training grounds in North Carolina, along with Camp Greene in Charlotte and Camp Bragg in Fayetteville. In September 1918, Camp Polk was designed to become the country's only training ground for the deadly new fighting machines known as 'tanks.' The state fair, held across Hillsborough Street from the NC State campus, was canceled for that fall and the exhibition grounds were turned into a camping area. The grandstands were turned into a large garage for lumbering used British training tanks that had been recovered from the battlefields of France and 16,000 soldiers and construction workers moved in, ready to reshape all of Raleigh. And just like that, the war ended, leaving some 15 million board-feet of lumber, delivered diligently by train, lying around to waste away before being sent overseas to rebuild France. By Jan. 1, 1920, what was to have been Camp Polk was turned over to the state of North Carolina, which developed the former farmland for agricultural research and a prison farm until the 1940s. Following the war, more than one-third of the school's students were rehabilitating former soldiers who had been injured in battle.
North Korea conducted tests of ballistic missile warheads equivalent to 10 kilotons, almost twice as powerful as the latest test’s kiloton yield. North Korean TV described the detonation as a step into making the country more able to putting nuclear warheads on rockets. South Korea estimates that the nuclear tests performed on Friday are the biggest and most powerful yet, raising important concerns among its allies, especially the U.S. North Korea Missile South Koreans watch a news program reporting about North Korea’s missile launch. Image credit: Voa News. Nuclear weapons for a deranged nation The nuclear test was detected by the U.S. Geological Survey, who reported an explosion causing a seismic event at 8:30 p.m. Eastern Time 12 miles from Sungjibaegam, North Korea. Karl Dewey from IHS Jane’s explains that the explosive artifact tested by Kim Jong-Un’s North Korea is “smaller than both Hiroshima or Nagasaki, but it would still rip the heart out of a city.” “If detonated in the middle of Lower Manhattan in New York, for example, it would destroy pretty much everything up to the West Village and down to about the New York Stock Exchange.” Even if it seems that one of North Korea’s top priorities is to develop ballistic missiles with nuclear warheads able to reach U.S. soil, sheer explosion power is not the only factor that should be taken into account, as none of North Korea’s missiles can reach the U.S. nor be accurate enough to destroy a specific target. Is there a threat? Analysts believe that North Koreans do have the ability to cause significant harm by using nuclear weapons and that the only thing they must develop is the sufficient missile technology in order to deliver the warhead with enough accuracy. With the argument that practice makes perfect, North Korea could potentially become proficient in missile launching in less than six years. Kim Jong-Un’s rule has been erratic and brutal, and the availability of weapons able to kill thousands of people in seconds make a lethal combination against the world and South Korea, a country that’s still warring against its northern counterpart. North Korea Missile North Korea fired three missiles on Monday, September 5. Image credit: AP. Recent tests performed by North Korea show that they are able to reach up to 620 miles, as some of the missiles landed in the proximity of Japan, which escalated tensions in the eastern region of Asia. Economic sanctions and isolation from free world politics place a heavy burden on Kim Jong-Un’s shoulders, as the nation is slumping in hunger and an imminent financial crisis, but the authoritative rule of North Korea’s Supreme Leader directs too much effort into military prowess, mainly to keep tensions high and force the population to believe that they are in a constant war. Despite several economic sanctions, North Korea, has made significant progress in the development of their nuclear arsenal, which raises the question of how much time until they finally decide to attack a neighboring country. The United Nations Security Council has scheduled a meeting about ceasing the nuclear progress of North Korea by delivering a “robust response” to their actions. World powers agree that North Korea is becoming increasingly more erratic and closer to achieving a way of having important leverage when threatening other nations. Source: NBC
“If Jesus isn’t the Jewish Messiah, Can He Be the Savior of the World?” By Eric Chabot Over the years there have been a slew of books that discuss the birth of the Jesus movement. Linguistically speaking, Christianity didn’t exist in the first century. Judaism in the first century was not seen as a single “way.” Thus, there were were many Judaisms (i.e.,the Sadducees, the Pharisees, Essenes, Zealots). The followers of Jesus are referred to as a “sect” (Acts 24:14;28:22); “the sect of the Nazarenes”(24:5). Hence, the first followers of Jesus were considered to be a sect of Second Temple Judaism. Part of history is to look at historical causation and ask what might be the best explanation for a specific event. Skeptics have posited that the birth of our faith does not rely on a miracle such as the resurrection of Jesus. Traditional Jewish Expectations One of the Jewish expectations is that the Messiah will enable the Jewish people to dwell securely in the land of Israel (Is.11:11-12; 43:5-6; Jer.23: 5-8; Mic.5:4-6), and usher in a period of worldwide peace. Part of the Messiah’s mission is to put an end to all oppression, suffering and disease (Is.2:1-22; 25:8; 65:25; Mic.4:1-4) and create a pathway for universal worship to the God of Israel (Zeph.3:9; Zech.9:16 ;14:9). Another traditional view is that the Messiah will spread the knowledge of the God of Israel to the surrounding nations (Isa.11:9; 40:5; 52:8). Even in the Qumran community which predated the time of Jesus thought there were possibly two Messiahs, one priestly and one royal (1QS 9.11; CD 12.22-23; 13. 20-22; 14. 18-19; 19.34-20.1; CD-B 1.10-11; 2.1; 1Q Sa 2. 17-22). The Davidic Messiah As seen in 2 Samuel 7:12-17, the immediate prophecy is partially fulfilled in David’s son Solomon. However, the word “forever” shows there are future descendants to come. God promised David that his “seed” would establish the kingdom. The New Testament states that Jesus the Messiah, the “seed of David.” Jesus is God’s chosen vessel to restore God’s kingship over mankind (Matt. 1:1; Acts 13:23; Rom. 1:3,4; Rev. 22:16). Therefore, the fulfillment reached its completion in the Messiah, both son of David and the one greater than David ( Psalm 110:1-4). As it says in Luke 1:32-33, “He shall be great, and will be called the Son of the Most High; and the Lord God will give Him the throne of His father David; and He will reign over the house of Jacob forever; and His kingdom will have no end.” In this sense, Jesus is not simply a son of David, but instead, the Son of David. Roman crucifixion was viewed as a punishment for those a lower status (i.e., dangerous criminals, slaves, or anyone who caused a threat to Roman order and authority). Given that Jewish nationalism was quite prevalent in the first century, the Romans also used crucifixion as a means to end the uprising of any revolts. Donald Juel discusses the challenge of a crucified Messiah: Despite the fact that there is a case for a suffering Messiah in some of the Jewish literature that post dates the New Testament, we shouldn’t overlook Justin Martyr’s work called Dialogue with Trypho the Jew. In it, we see the challenge of a dying Messiah. Justin Martyr, the Palestinian Christian who in his mature years taught and wrote in Rome, tries to make the case that Jesus’ Spirit empowered ministry fulfills Scripture at many points and offers proof that he really is Israel’s Messiah to Trypho the Jew. But Trypho is not persuaded by this argument. In one part of this work, He replies: How has a dying Messiah been received by the Jewish community throughout history? Perhaps a couple of comments can shed some light on this issue: “We are obligated to believe that a Jewish man will come who will begin to save Israel and will complete the salvation of Israel in that generation. One who completes the task is the one, while the one who does not complete it in that generation but dies or is broken or is taken captive (Exod 22:9) is not the one and was not sent by God.” (R. Phinehas Elijah Hurwtiz of Vilna (1765-1821), Sefer haberit hashalem (Jerusalem, 1990), 521 (4) Another Messiah? On many occasions I have heard old saying, “Jesus is just one of several messiah’s in the first century” is not only patently false but also a gross oversimplification. Just because someone leads a messianic revolt does not qualify them as “the Messiah” (notice the capital “M”). Here are some of the figures who claimed royal prerogatives between 4 B.C.E and 68-70 C.E but are not called “the” or “a” Messiah: 5. Simon, son of Gioras (bar Giora) (War 2.521, 625-54;4.503-10, 529;7.26-36, 154) (5) So what if Jesus was a failure? Maybe there was another Messiah who would come that would restore the Jewish people to self- rule. Out of the all the messianic movements within Judaism, I will mention some that I believe are rather significant. So after glancing at these issues, what needs to asked is the following: 1. Would there be a Christianity today apart from the resurrection of Jesus? Sure, just because a new religious movement grows doesn’t make a faith true. But given the negative views of crucifixion and a dying Messiah, it seems that the early Christian movement (pre-70 A.D.) should of ended very quickly. Hence, in light of all the varied messianic expectations and given the failure of messianic revolts, the Christian can echo the comments by scholar C. F.D., Moule in his book, The Phenomenon of the New Testament. Moule affirmed that the actual existence of the Nazarenes, which is an event, called for an explanation. Moule went onto say that the phenomenon was brought about by ‘a most powerful and original mind and a tremendous confirmatory event.’ (6) As we conclude, I am well aware of several naturalistic explanations that try to explain the birth of our faith. We should remember to study the resurrection in it’s first century context. From my experience, this pays great dividends. While Christians take the time this season to celebrate the Savior of the world, let us heed the words of my friend Dr. Michael Brown who says, “Unless Jesus is the Jewish Messiah of both Israel and the nations, he can’t be the Savior of the world.” 4. David Berger, The Rebbe, The Messiah And The Scandal Of Orthodox Difference (Portland: The Littman Library of Jewish Civilization. 2001), 21. 5. Arthur Zannoni, Jews and Christians Speak of Jesus (Minneapolis: Fortress Press.1994),113-114. 6.  C.F.D. Moule, The Phenomena of the New Testament (London: SCM, 1967, 3, 17). Eric Chabot is the director of Ratio Christi, The Ohio State University, and CJFM Midwest Representative. He has an M.A. from Southern Evangelical Seminary and blogs reguarly at Thinkapologetics.com
Safe Food Handling STL 3 K10 SAFE FOOD HANDLING Good Hygiene Practise When preparing food it is essential that you keep yourself and your kitchen clean. Wash and dry your hands thoroughly before touching and preparing food and after touching raw foods especially poultry such as chicken. Always wash your hands after using the toilet or touching bins or pets. It is recommended that hair be tied back or covered while cooking. Wear a clean apron when cooking and remove it should you need to visit the toilet. Change dishcloths and tea towels frequently, they may look clean but they are a perfect breeding ground for germs and bacteria. Cooking foods Food poisoning such as E coli and salmonella can be killed through cooking. Always check that food is piping hot in the middle. Pinkness in sausages and chicken shows that food is not cooked and could contain harmful germs. Do not reheat food more than once. Cross-contamination This is one of the major causes of food poisoning and happens when germs spread between food, hands, surfaces or cooking utensils. Always ensure that raw foods such as chicken, fish and meat are kept apart from cooked foods. Need essay sample on "Safe Food Handling" ? We will write a custom essay sample specifically for you for only $12.90/page Keep raw meat in sealed containers in the fridge on a different shelf usually the bottom to avoid juices from getting onto other foods. Never use the same chopping board for raw meat and ready-to-eat food without thoroughly washing the board and knife. Washing raw meat does not get rid of harmful germs only increases the risk of splashing other things only cooking will stop cross contamination. After cutting raw meat wash your hands, boards, knives, worktops with hot soapy water. Chilling Germs can be stopped from growing by storing foods in a fridge at the correct temperature which is about 5oC. Keep the fridge door closed to maintain the temperature and never put hot or warm food straight into the fridge allow it to cool first. Do not leave leftovers in a fridge for more than two days. Always refrigerate food within 2 hours or 1 hour if the temperature outside is above 90oF. Check the temperature in the fridge and freezer with a thermometer. The fridge should be kept at 40oF or below and the freezer below 0oF. Additional information Never buy food which is past its sell by date or with meat and poultry if the packaging is torn or is leaking. Haven't found the Essay You Want? Get your custom essay sample For Only $13/page
1 2 Processors improve the efficiency and the speed of your computer by processing information sent by both the computer and software programs. By having a higher gigahertz capacity in a processor, information will be able to be processed quicker meaning that the overall speed of the computer will be improved. Shop your perfect PC Proessor now.
Sudden Death Syndrome (SIDS) Tips Research indicates that SIDS is more common in babies who go to sleep on their stomachs. Many SIDS victims have been healthy infants who were found sleeping on their stomachs with their faces, noses, and mouths covered by soft bedding. However, some SIDS victims were sleeping on their backs, but soft bedding covered their heads. Safe bedding practices for infants: The following practices are strongly recommended for all healthy babies under 12 months old.
Post LGM Landscape Reconstructing the evolution of post-LGM landscape and late Lateglacial paleoclimate in Bösbächital Student : Nicolas Gay Supervisor : PD Dr. Susan Ivy-Ochs ; Dr. Kristina Hippe The analysis of Quaternary geology allows to reconstruct and understand the evolution of the recent landscape. However, moraines are not only an evidence of glaciation, but also give important information about the climate. Indeed, the advance and retreat of a glacier are closely linked to change in precipitation and/or temperature. The research in the Bösbächital with ArcGIS and fieldwork gave an insight in the evolution of the valley. Since the LGM, the Bösbächi glacier advanced at least once (with fluctuations) in the valley. Its moraines are still visible today, but the glacier bed has been slowly covered by deposits and eroded by other processes, including scree, debris flows and streams. Periglacial landforms also recall some colder period of the past. The reconstruction of the glacier with ArcGIS allowed to estimate the paleo-ELA with AAR and AABR methods. That lead to an age estimation with the help of the ELA-depression with respect to the LIA-ELA, the moraines should have been created during the late Lateglacial. The paleo-ELA, and paleo-temperature inferred through biological proxies, allowed to estimate the past change in precipitation. It seems to have been 5.7% higher during the late Lateglacial than today, which is consistent with other studies on the same period.
Calopteryx_splendens_male  Calopteryx  Banded demoiselle (C. splendens) and Beautiful demoiselle (C. virgo) males are flying above slow running water. The males are colored blue. Males may defend a territory above the stream. Males will use their colored wings for signalling and  communication. In the Netherlands two species of Calopteryx occur, C.splendens (Banded demoiselle) and C. virgo (Beautiful demoiselle). The wings of C. splendens males are partly blue, the wings of C. virgo are completely blue. Calopteryx_splendens_male              Spoordonk_H_Eik_Bosbeekjuffer_mn_030611_1552A_part C. splendens (left)    and C. virgo (right) The behaviour of both species is only different in detail. Calopteryx splendens Normal flight Courtship of C. splendens Courtship includes a phase in which the male is moving its wings approximately horizontally with the forewings and the backwings approximately in antiphase. This mode of flying is given 30 times retarded in the animation. The real frequency of the wingbeat is 40 Hz. Calopteryx splendens Courting behaviour retarded 30 times. The male is indicating the female a small area with water- weeds for laying eggs. This behaviour may be called water-display. Courtship of C. virgo Here too courtship includes a phase in which the male is moving its wings approximately horizontally. However the backwings are approximately a quarter period retarded compared to the forewings. Courtship of C. virgo male (animation 30X retarded) Creative Commons License
Unlock This Video Now for FREE This video is normally available to paying customers. Electrical injuries are not only caused by contact with a high voltage, lower voltages under certain circumstances can also cause serious injury, for example the batteries contained in a UPS back up power supply system. However the risk of injury is generally greater with higher voltages but in all cases other circumstances including the route of the electricity through the body dictates the severity of the injury. Human contact with electricity is not the only hazard electrical sparks from batteries and mobile phones for example could ignite flammable substances. Alternating current (AC) and Direct Current (DC) electrical supplies can cause a range of injuries including: - Electric shock - Electrical burns - Loss of muscle control - Thermal burns Under UK law the Health and Safety at Work Act 1974 in Great Britain or the Health and Safety at Work (Northern Ireland) Order 1978, employers are responsible for ensuring the safety and health of their employees and members of the public, if they are at risk from work activities. These laws include electrical safety. When working with or near electricity in a building like this, there are many risks. You may not be allowed to work without a permit or supervision, no matter how small the job is. In this room we have high voltage electricity and very powerful back up power supplies called UPS units that store power in batteries in the case of power cuts. Even when to power is off they can give a life threatening shock. We are now going to look at some guidelines for safe working with and near electricity or electrical equipment.  Firstly you should complete a risk assessment for the work you are planning, and make sure this covers electrical hazards.  Learn how to recognise electrical wires. These may be overhead power lines, electrical wiring in a workplace, or cables buried under the ground.   Look for electrical wires, cables or equipment near where you are going to work and check for signs warning of dangers from electricity, or any other hazard. there may be a map of the electrical services in the area but always be aware of hazards not on the map. Remember to always look up, down, and around you for cables. If you will be digging or disturbing the earth or cutting into surfaces, use a cable locator to find buried services and permanently mark the position of electrical services you find.   Work away from electrical wiring wherever possible. If you have to work near electrical wiring or equipment, ask for the electrical supply to be turned off. When you have been told it is off, make sure the power is off, and cannot be turned on again without you agreeing. If the electrical supply cannot be turned off, consult a competent person who should be able to advise you on the best way to proceed.  Identify where it is safe to work. Put up danger notices where there are still live electrical circuits, and warn your co-workers where it is safe to work and where it is not safe. Remember to remove notices at the end of the work.  There are different electrical danger signs including Danger of death electricity and warning - Isolate supply before opening cover. Signs warning of electrical danger may not always be easy to see, or may have been removed, so even if you see no signs, electrical cables may still be nearby. Stay vigilant. When you see signs warning of electrical danger it is highly likely there is electricity present. Remember, you don’t need to touch a high voltage cable to get an electric shock and even low voltage cables can be dangerous. If you cannot work out where the electricity is, ask a competent person to do it for you. You may not see electrical wires near where you plan to work but this doesn’t mean there aren’t any. Even if you do see wires, there may be others you cannot see.   Electrical wiring may sometimes look like pipes, and may be a range of colours.   Before you drill or start cutting into surfaces: • Look for electrical wires and any other hazards such as asbestos • Remember to Look on both sides of walls • Ask to see plans of the electrical installation, and use these to find electrical wiring • If you are competent to do so, use a suitable cable detector, or get a competent person to do it for you. Remember that some cable detectors won’t find a wire carrying a just a small current, so consult the user guide to ensure you get accurate information • Look for nearby electrical equipment or installations and find where the wiring runs to these • Use equipment that will minimise the risks during the work;wear suitable protective clothing • If you are in doubt STOP WORK and consult a competent person. If the electrical power has been turned off to allow you to do work safely, it is essential that the power stays off until you have finished work. Make sure YOU are in control and STAY in control. A good way is to have the only key to the switch or a locked room or cabinet containing the switch. Remember, if you remove a fuse, someone could inserted one in its place, and remember some people ignore notices. If you have any doubts that the electricity may be turned on again without your knowledge and consent, STOP WORK.
Unit Information Game Strategies History Trebuchet European Trebuchets in a deployed state for attacking (left) and an undeployed, mobile state (right). The Trebuchet is the standard Artillery Weapon of the Medieval Age Medieval Age, available to upgrade from the Catapult as soon as the age is reached, and assuming Military Military 2 (Mercenaries) is already researched. Like all artillery, it is trained and upgraded at the Siege Factory. Overview Edit After Catapults become Trebuchets, they gain +6 attack strength, +20 hit points, +2 moves, +2 Line of Sight and +1 maximum range. Its projectiles go slightly slower than those of the Catapult (projectile speed of 80 instead of 85), and go through a higher trajectory given the nature of the weapon, but are more accurate (-12% attenuation compared to the Catapult's -14%). As artillery, the Trebuchet excels at taking down buildings and conquering cities, and it outranges all Towers and Forts. However, it is extremely vulnerable, as it requires to be deployed and undeployed to shoot and move respectively, and even though it's capable of hitting units, its projectile speed is remarkably slow, the projectiles themselves, though better than before, are still innacurate, and cannot even shoot its most menacing foe: Units within melee range. The only units a Trebuchet can realistically target and counter are enemy artillery (usually other Trebuchets), and static or slow-moving targets on the larger side, like ships and Supply Wagons. Keep in mind that artillery units require a nearby Supply Wagon or a Red Government Patriot to operate at full efficiency—without supply artillery reloads and fires only at half the normal rate. Unit Costs Edit Unit production cost increases progressively with every Siege Factory unit on the field or currently in production. The default increase is of 20 Timber Timber and 20 Metal Metal for the second unit created, increasing further with every new unit until the cost cap is reached, which for military units is +125% of their original base value; in the case of the Trebuchet that is 157 Timber Timber, 157 Metal Metal (reached with 5 units). It's important to note, however, that these prices are the default standard, and actual production and upgrading costs may differ, depending on researched technologies/ages, connected rare resources, or adopted governments. Unique Units Edit Ad blocker interference detected!
Presentation is loading. Please wait. Presentation is loading. Please wait. Wireless Sensor Networks Similar presentations Presentation on theme: "Wireless Sensor Networks"— Presentation transcript: 1 Wireless Sensor Networks U N I T - 8 Wireless Sensor Networks 2 Contents… Wireless Sensor Networks (WSN) Wireless Mess Networks (WMN) Computational Grids P2P Networks Session Initiation Protocol (SIP) HTML5 3 Wireless Sensor Networks (WSN) A wireless sensor network is a collection of self-organized sensing nodes grouped in a network. A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data through the network to a main location. 4 Wireless Sensor Networks (WSN) A sensor node, also known as a mote, is a node in a wireless sensor network that is capable of performing some processing, gathering sensory information and communicating with other connected nodes in the network. 6 Wireless Sensor Networks (WSN) on the basis of mode of operation and type of intended applications, WSN can be broadly classified in to 2 categories: Proactive WSN: The sensor nodes periodically switch on their transmitters, sense the parameter, and transmit the data to the network. Reactive WSN: The sensor nodes react immediately to sudden and significant changes in the value of a sensed parameter. 7 WSN Functioning: Components: The main components of a sensor node are a microcontroller, transceiver, external memory, power source and one or more sensors. Controller The controller performs tasks, processes data and controls the functionality of other components in the sensor node. While the most common controller is a microcontroller, other alternatives that can be used as a controller are: a general purpose desktop microprocessor, digital signal processors, ect. A microcontroller is often used in many embedded systems such as sensor nodes because of its low cost, flexibility to connect to other devices, ease of programming, and low power consumption. 8 WSN Functioning: Components: Transceiver 9 WSN Functioning: Components: External memory From an energy perspective, the most relevant kinds of memory are the on-chip memory of a microcontroller and Flash memory—off-chip RAM is rarely, if ever, used. Flash memories are used due to their cost and storage capacity. Memory requirements are very much application dependent. Components: Power source A wireless sensor node is a popular solution when it is difficult or impossible to run a mains supply to the sensor node. However, since the wireless sensor node is often placed in a hard-to-reach location, changing the battery regularly can be costly and inconvenient. The sensor node consumes power for sensing, communicating and data processing. More energy is required for data communication than any other process. The energy cost of transmitting 1 Kb a distance of 100 metres is approximately the same as that used for the execution of 3 million instructions by a 100 million instructions per second/W processor. 10 WSN Functioning: Architecture 11 WSN: Operating System support in Sensor Devices As sensor nodes must be low power, their hardware design will tradeoff computation capabilities for lower power consumption. As such, the nodes will have limited processing power and memory resources. An operating system for sensor networks should deliver the required application services without using a significant amount of the computational resources available to the nodes. Typical embedded operating systems, such as TinyOS, VxWorks, QNX, OS-9, WinCE and Clinux provide a programming environment similar to those existing in traditional computers. 12 WSN: Operating System support in Sensor Devices TinyOS is based on an event driven programming model instead of multithreading. TinyOS programs are composed in to event handlers and tasks which run to completion semantics. When an external event occurs, such as an incoming packet or a sensor reading, TinyOS calls the appropriate event handler to handle the event. Both the TinyOS system and programs written for TinyOS are written in a special programming language called network embedded systems C (nesC). 13 WSN Characteristics: The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy harvesting Ability to cope with node failures Mobility of nodes Communication failures Heterogeneity of nodes Scalability to large scale of deployment Ability to withstand harsh environmental conditions Ease of use 14 WSN Operations: Five stages: Planning Deployment Post Deployment Post Operation 15 WSN Design Process: The following issues should be considered during design of WSN Routing Protocol Issues Data Dissemination Query Processing Location and Management Issues Key Distribution Security Measures MAC Protocol Issues. 16 Sensor Architecture Cluster Management: Low Energy Adaptive Clustering Hierarchy (LEACH) a clustered based protocol that minimizes energy dissipation in sensor networks. The purpose of LEACH is to randomly select sensor nodes as Cluster Heads (CHs), so the high energy dissipation in communicating with the base station is spread to all sensor nodes in the sensor network. The operation of LEACH is separated into 2 phases, The Setup Phase The Steady State Phase. 17 Sensor Architecture Cluster Management: Each setup phase consists of CH selection and cluster formation. Steady state phase consists of the data transmission. The duration of the steady state phase is longer than that of the setup phase to minimize the overhead. 18 Sensor Architecture Cluster Management: The setup phase procedure is as follows: At the beginning of each round, each node advertises its probability to the CH, to all other nodes. Nodes with higher probabilities are chosen as the CHs. CHs broadcast an advertisement message (ADV) using CSMA MAC protocol. Based on the signal strength, each non-CH node determines its CH for this round. Each non-CH transmits a join-request message (join-REQ) back to its chosen CH using a CSMA MAC protocol. CH node sets up a time division multiple access (TDMA) schedule for data transmission coordination with in the cluster. 19 Sensor Architecture Cluster Management: The steady state phase procedure for data transmission is as follows: TDMA schedule is used to send data from node-to-head cluster. Head cluster aggregates the data received from node to cluster. Communication is via direct sequence spread spectrum (DSSS) and each cluster uses a unique spreading code to reduce inter-cluster-interference. Data are sent from the CH nodes to the BS using a fixed spreading code and CSMA. After a certain period of time spent on the steady state phase, the network goes into the setup phase again enters another round of selecting CHs. 20 Sensor Architecture Cluster Management: 21 Wireless Mess Networks 22 Wireless Mess Networks Characteristics: WMN support ad-hoc networking, and have the capability of self-forming, self-healing, and self-organization. WMNs are multihop wireless, but with a wireless infrastructure/backbone provided by mesh routers. Mesh routers have minimal mobility and perform dedicated routing and configuration which significantly decreases the load of mesh clients and other end nodes. Mobility of end nodes in supported easily through the wireless infrastructure. Mesh routers integrate heterogeneous network, including both wired and wireless networks. WMNs are not stand alone and need to be compatible and interoperable with other wireless networks. 23 WMN Design: Internet Wireless Client Mesh Router with Gateway/ Bridge Wired Client Wireless Mesh Backbone 24 Wireless Mess Networks Issues in WMNs: Physical Layer Issues. MAC Sub Layer Issues. Network Layer Issues. Transport Layer Issues. 25 Wireless Mess Networks Issues in WMNs: Physical Layer Issues: IEEE Mesh Networks -- peak load is 11 Mbps (802.11b). -- 54 Mbps (802.11a). -- Researchers interested to increase the speed of Wi-Fi by 10 to 20 times. IEEE Mesh Networks a is based on multiband Orthogonal frequency-division multiplexing(OFDM), that uses ultra wide band(UWB) to reach up to 480 Mbps. -- a direct sequence UWB (DS-UWB) claims up to 1.3 Gbps. IEEE Mesh Networks operates in the 1066 GHz band and requires line of sight towers. -- The a extension uses lower frequency of 211 GHz, enabling non line of sight connections. -- to allow consumers to connect to the internet while moving at vehicular speed, e is used. 26 Wireless Mess Networks Issues in WMNs: MAC Sub Layer Issues: MAC layer is concerned with more than One Hop (OH) communication in WMN. MAC layer works for multipoint to multipoint and network self organization. Differences between the MAC in WMN and other types of networks are, MAC for WMNs is concerned with more than OH communication. MAC distributive, needs to be collaborative, and works for multipoint to multipoint communication. Self organization of the network is needed for better collaboration between neighboring nodes and nodes in multi-hop distances. Mobility is low but still affects the performance of MAC. 27 Wireless Mess Networks Issues in WMNs: Network Layer Issues: WMN is tightly integrated with the Internet and IP. Routing protocols for WMN are different from those in wired network. Multipath Routing -- for better load balancing. -- high fault tolerance. -- complexity (drawback). Multiradio Routing -- focuses on maximizing throughput rather than mobility or minimizing energy. -- shortest path routing algorithms are used. -- NIC is replaced with Multiradio NIC. -- for multiradio WMN, multiradio link quality source routing (MR-LQSR) is used. Hierarchical Routing 28 Wireless Mess Networks Issues in WMNs: Transport Layer Issues: The WMN use single channel for data transfer and control, and these are multi-hop networks. packet loses at higher bit rates. the hidden node and exposed node causes transmission failure. TCP is not suitable, because client moves across the network. UDP alone can not guarantee the delivery of packets. Real-Time Protocol (RTP) is used along with UDP. 29 Computational Grids 30 Computational Grids A computational grid is a loose network of computers linked to perform grid computing. A large computational task is divided up among individual machines, which run calculations in parallel and then return results to the original computer. These individual machines are nodes in the network. Computational grids are often more cost effective than supercomputer of equal computing power. 31 Computational Grids Grid Features: Computational grids are used to solve the problems in engineering, science and commerce. Provides transparent access to remote resources. Enable resource sharing. Reduce execution time for data processing applications. Allow on-demand aggregation of resources at multiple sites. Provides access to remote database and software. 32 Computational Grids Issues in Grid Construction Design: For data grids: The ability to integrate multiple distributed, heterogeneous, and independently managed data sources. The ability to provide efficient data transfer mechanisms to provide data where the computation will take place. The ability to provide necessary data discovery mechanism, which allow the user to find data based on characteristics of data. The capability to implement data encryption and integrity checks to ensure that data is transported across the network in a secure fashion. The ability to provide the backup/restore mechanism and policies necessary to prevent data loss and minimize unplanned downtime across the grid. Download ppt "Wireless Sensor Networks" Similar presentations Ads by Google
The Shard-class capital ship was a class of capital ship that was designed and built by the Killiks for the Battle of Tenupe. The warships were roughly cone-shaped, and ranged from one and a half to ten kilometers in length. Their name was derived from the fact that they appeared to have been constructed by shattering a moon or asteroid into shards and then hollowing them out in a hive-like fashion. This method of construction provided these ships with extensive defenses, as each layer of the hive could be considered an extra set of armor plating. Ad blocker interference detected!
Archive for Uterus Uterus Tumors Uterine Fibroids Uterine fibroids, masses of muscle and connective tissue that are stimulated by estrogen, occur in some 20 to 50 percent of women between the ages of 30 and 50. Fibroids are more often seen in African-American women. Diagnosis is made by physical exam, ultrasound or x-rays. The size of these benign tumors varies from pea size up to that of a tennis or softball. These smooth, firm, rounded tumors are usually asymptomatic. However, large tumors can cause excessive menstrual bleeding, menstrual cramps, urinary frequency, constipation, low abdominal pain, and infertility. Tumors that distort the uterine cavity or endometrium can cause infertilty or spontaneous abortion. Treatment is dependent on age, symptoms, parity and patient condition. No treatment is required for asymptomatic persons. For women approaching menopause the withdrawal of estrogen causes a stasis or regression of the fibroids. Hysterectomy may be necessary in women with excessive bleeding. Endometrial Cancer Endometrial cancer affects mostly postmenopausal women and is the third most prevalent cancer in women. Exogenous estrogens may contribute to the development of endometrial cancer. Obesity, diabetes, hypertension, family history, and upper socioeconomic levels are also associated with a higher incidence of these slow growing tumors. Endometrial cancer spreads first to the cervix and myometrium followed by the vagina, pelvis and lungs. Abnormal uterine bleeding is often the first sign. Other signs include cramping, bleeding after intercourse, or swollen lymph nodes. Diagnosis is by dialation of the cervix and scraping the endometrial lining for microscopic study. Early stages of endometrial cancer are curable by hysterectomy and radiation. Cervical Cancer Early onset of sexual intercourse, low socioeconomic status, race, promiscuity, and multiparity are all risk factors for the development of cervical cancer. Cervical cancer is seen most frequently in the 30-50 year old woman who began intercourse prior to the age of 20. There are profound differences in the incidence and death rate associated with race (e.g., African-Americans, Hispanics and American Indians have higher death rates than the national average). Race and age are risk factors that obviously cannot be controlled. The age of onset of sexual relations and promiscuity are, however, matters of personal choice. Frequent unprotected sex with multiple partners is a definite risk factor for the development of cervical cancer. A link to genital herpes and other sexually transmitted disease has been found. As the carcinoma progresses it may metastasize to the bladder, rectum, lymph nodes, lungs, bones and liver. Early cervical cancer is asymptomatic making early diagnosis key. Routine (yearly) Pap smears are and excellent diagnostic tool. Treatment is by laser surgery, electrocautery or cryosurgery to remove the lesion early. In advanced or recurrent cases, hysterectomy and radiation therapy may be indicated. Uterus Pathology Endometriosis is the abnormal location of endometrial tissue that can occur within the myometrium or at external sites such as the outer surface of the uterus, Fallopian tubes, ovaries, bladder, appendix or bowel. This aberrant tissue responds to ovarian hormones as normal endometrial tissue would thus causing the site dependent symptoms. The most common symptom is low abdominal or pelvic pain associated with onset of menstruation. Pain during sexual intercourse indicates uterine involvement and pain during urination reflects bladder involvement. No laboratory test is available. Physical examination and exploratory surgery may be necessary to identify the lesion. Symptoms are generally handled with analgesics in women of childbearing years where the symptoms are not severe. Hormone therapy that prevents ovulation may be helpful. When the endometriosis is embedded within the myometrium, hysterectomy is indicated to prevent the symptoms of painful intercourse, severe cramps and pelvic discomfort. Premenstrual Syndrome (PMS) PMS is the name given to the common symptoms that accompany the onset of the monthly period. Symptoms include headache, mood changes, breast tenderness, bloating, edema, weight gain, backache, irritability, depression, and anxiety. Treatment is symptomatic and includes analgesics, diuretics, tranquilizers and sedatives. More commonly referred to as cramps, dysmenorrhea is painful menstruation caused by abnormal uterine contractility that effects some 50% of menstruating women. Primary dysmenorrhea is that which is not related to an obvious physical cause. Sharp cramps are experienced the first couple days of the menses. Headache, nausea, vomiting, diarrhea and fatigue also may be symptoms of dysmenorrhea and are thought to be caused by the liberation of prostaglandins in the endometrium. Treatments include analgesics, antiprostaglandins and hormones. Non-steroidal anti-inflammatory drugs, such as aspirin, indomethacin, and ibuprofen inhibit prostaglandin synthesis and act as analgesics. In severe cases, hormone therapy is initiated to prevent ovulation as anovulatory cycles are usually painless. Dysmenorrheic women produce more prostaglandins in the endometrium and menstrual fluids than those without dysmenorrhea. Dysmenorrheic women also have been reported to have lower progesterone levels than normal women creating a dominance of estrogen in the endometrium which favors prostaglandin synthesis. At the end of an ovulatory cycle progesterone declines leading to a cascade of enzymatic events that lead to the production of prostaglandins. These prostaglandins cause uterine hypercontractility, decreased blood flow and ischemia, and uterine hypoxia that causes pain. Cyclooxygenase inhibitors such as aspirin, naproxen or ibuprofen prevent the formation of prostaglandins and relieve the symptoms of dysmenorrhea. Oral contraceptives inhibit ovulation (prevent formation of corpus luteum and decrease the thickness of the endometrial lining) and therefore prevent the environment necessary for increased prostaglandin production. Physiologic amenorrhea, or the cessation of menstrual periods, normally occurs in pregnancy, lactation, adolescence, and menopause. Pathologic amenorrhea may be caused by endocrine disorders such as dysfunction of the hypothalamus, pituitary, ovary, thyroid or adrenal glands. Metabolic and psychogenic causes include malnutriton, obesity, chronic stress, drug addiction, diabetes, anorexia nervosa and anemia. Removal of the underlying cause will usually result in the resumption of normal periods. If hormone deficiencies are found, substitutional therapy is recommended. Primary amenorrhea is hypogonadotropic and hypogonadal, meaning that blood levels of the gonadotropins and gonadal steroids are abnormally low. Release of LH and FSH are inhibited by endorphins at the level of the hypothalamus where they inhibit GnRH release. Without the gonadotropins the ovaries do not make gonadal steroids. Stress of many difererent kinds causes the synthesis of an ACTH precursor molecule in the hypothalamus that contains the sequence for endorphin and enkephalin. The cells making and processing the precursor are in direct contact with cells that make GnRH. A shift in body composition or weight loss as in anorexia nervosa, ballet dancers, long-distance runners or malnutrition can cause amenorrhea. There seems to be a body fat threshold for the maintenance of normal cycles that is in the neighborhood of 18%. In many of these cases, if the patient gains weight normal cycles will resume. In obesity, weight loss and the concomitant decrease in stress on the body will enable a resumption of normal function. Amenorrhea may also result from psychogenic causes such as depression or chronic emotional stress. The female reproductive tract is subject to bacterial, fungal, protozoal and viral infections. Many of these, such as trichomonas, gonorrhea, genital herpes and syphilis affect the vagina and external genitalia. Those that are sexually transmitted are covered at Infections of the upper reproductive tract (above the cervix) are lumped together under the heading of pelvic inflammatory disease. Common causes of pelvic inflammatory disease include Gonococcus, Staphylococcus, Streptococcus and Chlamydia. It is associated with IUD use, abortion and post delivery. Symptoms include severe pelvic pain, chills, fever, nausea, vomiting, and a heavy odorous vaginal discharge. Treatment depends on the cause and extent of the infection but may include hospitalization, antibiotics, and analgesics. Inadequately treated pelvic inflammatory disease may result in infertility or sterility. Uterus Function Functionally the endometrium can be divided into two zones: 1) the functionalis, which is built up and sloughed monthly during menstruation, and 2) the basalis, the epithelium and glandular elements that remain and supply the replicative cells to generate the next month’s functionalis. The Menstrual Cycle The average menstrual cycle is 28 days, however only a very small percentage of cycles are exactly 28 days, most cycles range from 25-36 days. Menstrual cycles usually start between the ages of 12 and 15 and continue to about the age ot 45-50 when menopause occurs. Females have four major hormones involved in the menstrual cycle: follicle-stimulating hormone (FSH), luteinizing hormone (LH), estrogen (estradiol) and progesterone. FSH and LH are protein hormones produced by cells of the anterior pituitary within the brain, in response to small peptide hormones from the hypothalamus (hypothalamic releasing factors). These pituitary hormones travel in the blood to the ovary where they stimulate the development of one or more eggs, each within a follicle. A follicle consists of an ovum surrounded by cells responsible for the growth and nurturing of the ovum. As the cycle progresses, one follicle becomes dominant and all others regress. The menstrual cycle can be divided into three phases: the follicular (proliferative) phase, the ovulatory phase, and the luteal (secretory) phase. The follicular phase begins with the first day of menses (menstrual flow) and continues to approximately day 13 or 14 when ovulation takes place. During the follicular phase, FSH and LH are slowly rising in preparation for the LH surge (very high level of LH) at the time of ovulation. FSH is stimulating the growth of follicles in the ovary. Estrogen and progesterone are relatively low throughout this time but slowly begin to rise toward the end of this phase. Estrogen, and progesterone to a lesser degree, are steroid hormones produced by cells of the developing ovarian follicle. Estrogen causes the endometrium to increase in thickness and vascularization (i.e.blood supply). At the end of the proliferative (follicular) phase, the endometrium is 2-3 mm thick and the glands are straight tubules with narrow lumens. LH surges and peaks during the ovulatory phase (around day 14) and estrogen peaks at the same time. These peaks trigger ovulation. The ovum lives about 72 hours after ovulation, but it is fertilizable for only about 36 hours. Just before ovulation, progesterone levels begin to rise rapidly. Changes in cervical mucous accompany ovulation. The amount of mucous increases and it becomes clear and thin. This facilitates conception by aiding the passage of sperm through the cervical canal. Sperm can live for up to 72 hours in the female reproductive system. Therefore, the fertile period during a 28-day cycle is only about 4-5 days. After ovulation (at the midpoint of the cycle), under the influence of LH, the ovarian follicular cells shift to the production of progesterone becoming a yellowish structure called the corpus luteum (luteal phase). The corpus luteum remains intact for the remainder of the cycle. Progesterone causes the endometrial lining to become secretory and nutritive in anticipation of implantation of a fertilized egg. The uterine glands become very coiled and the endometrial lining reaches maximum thickness of about 5 mm during the luteal (secretory phase). Progesterone also inhibits the contractions of smooth muscle cells of the myometrium. The breast swelling, tenderness and pain experience by some women is most likely due to the effects of progesterone on breast tissue. In the luteal phase progesterone levels are very high–progesterone is important during this phase because if the egg is fertilized, and implanted in the uterus, progesterone keeps the uterus intact so that the pregnancy is maintained. The continued health of the corpus luteum (progesterone secretion) is assured by the production of human chorionic gonadotropin (hCG) by the implanted embryo, until the placenta develops and can take over. The detection of hCG in urine is the basis of laboratory and home pregnancy tests. If fertilization and implantation have occurred, than the corpus luteum will be stimulated by hCG to continue its production of estrogen and progesterone to maintain the pregnancy. This is important because the corpus luteum dies 14-22 days after ovulation if fertilization and implantation do not occur. At the end of the secretory (luteal) phase, blood levels of estrogen and progesterone drop rapidly. The coiled arteries serving the endometrial lining contract, causing ischemia leading to tissue death in the functionalis. The blood vessels above the vasoconstriction rupture and bleeding begins resulting in the monthly menstrual flow that normally lasts about 5 days. Uterus Anatomy The uterus is a muscular pear-shaped organ of reproduction in the female. It is specialized for containing and nourishing a developing embryo from implantation to paturition (birth). The epithelial lining of the uterus undergoes cyclic changes that make it hospitable for the early embryo if fertilization has occurred. The muscular and elastic elements are specialized for expansion with the growing baby and for the expulsion of the baby at birth. The never pregnant (nulliparous) uterus is a 7-8 cm long to 4-5 cm wide, muscular pear-shaped organ lying in the pelvic cavity on the superior surface of the bladder. The uterus weighs under 50 grams and is divided into the broad-ended fundus, body and thin isthmus that ends in the uterine cervix. The cervix is made mostly of dense connective tissue, about 2.5 cm in length and is covered interiorly by a mucous secreting ciliated epithelium at the upper regions and by stratified squamous epithelium at the vaginal end. The opening of the cervix into the vagina is almost at a right angle to the long axis of the vagina. The uterine cavity has a triangular shape that is widest at the fundus and flattened in sagittal section (sliced through, front-to-back). Uterine (Fallopian) tubes enter the uterus as the fundus and are supported by the broad ligaments as they span the distance from the ovary to the uterus. When the bladder is empty the uterus angles forward over the bladder. As the bladder fills the uterus is lifted dorsally and may become retroflexed pressing against the rectum. Uterine blood supply is via the uterine and ovarian arteries with venous return traveling via the uterine veins. The hypogastric and ovarian nerve plexuses supply sympathetic and parasympathetic fibers as well as carry uterine afferent sensory fibers on their way to the spinal cord (T11 & 12). Histologically, the uterus is composed of three layers: 1) an outer perimetrium composed of connective tissue, 2) a thick smooth muscle and elastic tissue, myometrium, and 3) a mucosal epithelial lining called the endometrium. The myometrium consists of roughly four layers of smooth muscle. The tubular glands of the endothelium can be seen near the myometrium near their beginning in the lamina propria. The epithelium contains simple columnar and ciliated cells. The lamina propria is made of extracellular matrix, many fibroblasts and mostly reticular fibers. Blood supply to the uterus is carried by the arcuate arteries that branch to supply the endometrium in the form of straight arteries to endometrial epithelium and coiled arteries to the menstrual epithelium.
Kinds of Thistle Written by samantha belyeu | 13/05/2017 Kinds of Thistle Thistles are composed of two families of plants: Asteraceae or Chenopodiaceae. (Bee at flower image by barv from Thistles are primarily of the plant family Asteraceae, though one plant commonly referred to as Russian thistle is actually from the Chenopodiaceae family. They are remarkable for their prickly form on leaves, stems and flower heads. They inhabit disturbed land along roadsides, overgrazed pastureland and agricultural areas that are constantly tilled. While they provide numerous benefits to insect and plant wildlife, they also overcrowd native plants, harm farm animals and cause painful wounds on humans who come into contact with them. Artichokes and their cousins, the cardoon, are both edible thistle plants. The artichoke head that is available at the supermarket is actually the flower head. Once you get to the heart of the artichoke, the spindly parts are petals of the underdeveloped flower. Bull Thistle Bull thistle flowers range from pink to purple with weblike hairs. The top and bottom of all the long, pointed leaves are covered in spines, though the spines of the upper leaves are longer. Burdock is a biennial in the same family as thistle and is often referred to as thistle, though its flowers have hooked bracts instead of straight ones like most thistle plants. The leaves are also broader and come up in a rosette formation. Canada Thistle This perennial thistle does not have spines at the tops of the leaves and is lobed instead of smooth on the edges. It spreads by seed and rhizome. Milk Thistle Milk thistle is a Mediterranean herb commonly used as an herbal remedy for liver issues. The flowers range from red to purple, and the plant grows from 4 to 10 feet tall in full sun. Musk or Nodding Thistle The flowers of musk thistle are pink, purple or white and are often held on stems bent with the weight of the 2-inch heads atop spiny brachts. The leaves are thin and lobed. Pasture or Tall Thistle Pasture thistle is a common name for thistles found in pasture land in the U.S., including Canada thistle, musk and bull thistle. In some parts of the U.S., it refers specifically to tall thistle, a variety that isn't much taller than its cousins but has smaller flowers. Russian Thistle Russian thistle is not related to any other thistle and has only tiny white flowers with no spine bracts. The leaves have no spines, but the tips of them are prickly. The plant dries up and breaks off at the roots, rolling over grassland as tumbleweed. Scotch or Cotton Thistle Scotch thistle resembles artichokes and cardoons with its wide, bluish-grey, hairy leaves. The flowers are red-purple and often occur in clusters. • All types • Articles • Slideshows • Videos • Most relevant • Most popular • Most recent No articles available No slideshows available No videos available
Transport & Means of Communication-Test-3 Transport and means of communication 1. Mark the odd one out on the basis of mode of transportation. A.      B.      C. 1. The given picture shows the journey of a letter. Which of the following options show the correct sequence of the journey of a letter? A. B ⇒ D ⇒ C ⇒ E ⇒ F ⇒ H ⇒ G ⇒ A B. A ⇒ D ⇒ C ⇒ B ⇒ E ⇒ H ⇒ G ⇒ F C. H ⇒ C ⇒ B ⇒ E ⇒ D ⇒ G ⇒ F ⇒ A Click here for more worksheets 1. Which of the following will take least time to send message? A. Telegram B. Pager C. Messenger 1. Which of the following vehicles is specially designed for disabled? A.          B.     C. 1. Which of the following is a development in communication technology? A. Invention of light bulb B. Invention of train C. Development of man-made satellites 1. The script widely used by visually impaired person to read and write is known as: A. Louis script B. Braille script C. Marconi script 1. Who invented aeroplane? A. The Wright brothers B. Thomas Alva Edison C. Alexander Fleming 1. Which of the following is very useful for the communication for the people working in armed forces? A. Telegram B. Wireless communication C. Newspaper 1. ISD stands for: A. International subscriber dialing B. Indian subscriber dialing C. Internet subscriber dialing 1. How long will it take to send the photograph from India to a friend sitting in America via E-mail? A. Within few hours B. Within few minutes C. Within few days 1. Who invented the printing machine? A. Alexander Graham Bell B. Rudolf Diesel C. Johannes Gutenberg 1. The process that deals with the sharing of ideas, information and knowledge is known as: A. Transmission B. Communication C. Translation 1. Mark the factors on the basis of which different means of transport can be classified. A. Numbers of person needed for driving B. Distance to be travelled C. Number of persons can sit D. Number of wheels present E. None of these Answer Keys (1)–A; (2)–C; (3)–B; (4)–C; (5)–C; (6)–B; (7)–A; (8)–B; (9)–A; (10)–B; (11)–C; (12)–B; (13)–(C,D)
Today we take a peek at how many former slave-owning families in the United Kingdom fared after slavery was abolished in England in the early 1800’s. Article Source Slaves on the Auction Block Slaves on the Auction Block Britain’s colonial shame: Slave-owners given huge payouts after abolition The British government paid out £20m to compensate some 3,000 families that owned slaves for the loss of their “property” when slave-ownership was abolished in Britain’s colonies in 1833. This figure represented a staggering 40 per cent of the Treasury’s annual spending budget and, in today’s terms, calculated as wage values, equates to around £16.5bn. A total of £10m went to slave-owning families in the Caribbean and Africa, while the other half went to absentee owners living in Britain. The biggest single payout went to James Blair (no relation to Orwell), an MP who had homes in Marylebone, central London, and Scotland. He was awarded £83,530, the equivalent of £65m today, for 1,598 slaves he owned on the plantation he had inherited in British Guyana. But this amount was dwarfed by the amount paid to John Gladstone, the father of 19th-century prime minister William Gladstone. He received £106,769 (modern equivalent £83m) for the 2,508 slaves he owned across nine plantations. His son, who served as prime minister four times during his 60-year career, was heavily involved in his father’s claim. Mr Cameron, too, is revealed to have slave owners in his family background on his father’s side. The compensation records show that General Sir James Duff, an army officer and MP for Banffshire in Scotland during the late 1700s, was Mr Cameron’s first cousin six times removed. Sir James, who was the son of one of Mr Cameron’s great-grand-uncle’s, the second Earl of Fife, was awarded £4,101, equal to more than £3m today, to compensate him for the 202 slaves he forfeited on the Grange Sugar Estate in Jamaica. Mr Hogg refused to comment yesterday, saying he “didn’t know anything about it”. Mr Cameron declined to comment after a request was made to the No 10 press office. Another demonstration of the extent to which slavery links stretch into modern Britain is Evelyn Bazalgette, the uncle of one of the giants of Victorian engineering, Sir Joseph Bazalgette and ancestor of Arts Council boss Sir Peter Bazalgette. He was paid £7,352 (£5.7m in today’s money) for 420 slaves from two estates in Jamaica. Sir Peter said yesterday: “It had always been rumoured that his father had some interests in the Caribbean and I suspect Evelyn inherited that. So I heard rumours but this confirms it, and guess it’s the sort of thing wealthy people on the make did in the 1800s. He could have put his money elsewhere but regrettably he put it in the Caribbean.” The TV chef Ainsley Harriott, who had slave-owners in his family on his grandfather’s side, said yesterday he was shocked by the amount paid out by the government to the slave-owners. “You would think the government would have given at least some money to the freed slaves who need to find homes and start new lives,” he said. “It seems a bit barbaric. It’s like the rich protecting the rich.” The database is available from Wednesday at: Cruel trade Slavery on an industrial scale was a major source of the wealth of the British empire, being the exploitation upon which the West Indies sugar trade and cotton crop in North America was based. Those who made money from it were not only the slave-owners, but also the investors in those who transported Africans to enslavement. In the century to 1810, British ships carried about three million to a life of forced labour. More than that, it said that only children under six would be immediately free; the rest being regarded as “apprentices” who would, in exchange for free board and lodging, have to work for their “owners” 40 and a half hours for nothing until 1840. Several large disturbances meant that the deadline was brought forward and so, in 1838, 700,000 slaves in the West Indies, 40,000 in South Africa and 20,000 in Mauritius were finally liberated. Thanks for your attention. About The BETAA at NJIT Mentor Long Distance Mentor Leave a Reply You are commenting using your account. Log Out / Change ) Twitter picture Facebook photo Google+ photo Connecting to %s
Malaria Journal , 15:24 | Cite as Mind the gap: residual malaria transmission, veterinary endectocides and livestock as targets for malaria vector control Open Access Ivermectin Endectocides Vector control Residual transmission Livestock Zoophilic vectors Malaria elimination  long-lasting insecticide-treated nets indoor residual spraying The work of Pooda et al. published in Malaria Journal [1] provides encouraging evidence of the potential use of systemic insecticides in cattle as a complementary means to further reduce residual malaria transmission that persists despite high coverage of current front-line vector measures, namely long-lasting insecticidal nets (LLINs) and indoor residual sprays (IRS). LLINs and IRS interventions are responsible for most of the remarkable reductions in malaria burden achieved in this century [2], but even more ambitious new vector control measures will be required to achieve elimination of transmission from most endemic areas in the years ahead [3, 4, 5]. This is because LLINs and IRS leave two obvious spatial and temporal gaps wherever vector mosquitoes attack people outdoors, especially in the evenings and mornings, or rest outdoors before and after feeding [3, 4, 5]. There is, however, a third gap that does not usually receive as much attention, specifically their failure to kill mosquitoes that feed on animals rather than humans. Zoophagic vectors that feed predominantly on animals can sustain malaria transmission even if they only bite humans infrequently [6]. Even with near-complete coverage of human sleeping spaces and houses, LLINs and IRS cannot be reasonably expected to have any meaningful impact upon the density or longevity of zoophagic vector populations, because they achieve no insecticidal coverage of the animals that constitute their main source of protein [4, 6]. Fortunately, by far the most common source of blood for most zoophagic malaria vectors are domesticated livestock, cattle in particular [7], so it is also possible to control the malaria transmission they mediate through veterinary applications of insecticides [8], the most exciting of which may be the systemic insecticides which the mosquito actually ingests along with its blood meal. Fritz et al. first described increased mortality of Anopheles gambiae feeding on ivermectin-treated cattle and suggested a potential role of this strategy for integrated vector management [9]. These findings have since been extended to Anopheles culicifacies and Anopheles stephensi, the main malaria vectors of Pakistan [10], and more recently to an important African vector of residual transmission, Anopheles arabiensis [11]. This latest report by Pooda et al. [1] now demonstrates similar increased mortality and reduced fertility of Anopheles coluzzii, a widely distributed vector species which maintains robust malaria transmission all across west and central Africa [12]. Interestingly, the lethal effect of ivermectin was seen even when the colony used had high prevalence of the kdr mutation which contributes to pyrethroid resistance in many parts of Africa. Although the evidence base is growing fast, the full potential of ivermectin for malaria vector and transmission control remains to be established, but most discourse thus far has focused on medical delivery to human beings [13]. However, the alternative strategy of veterinary delivery to livestock has several advantages: • Long-lasting injectable veterinary formulations of ivermectin already exist that can dramatically increase the effectiveness of this approach, by not only targeting a more important blood source for vector populations than humans, but also by achieving far longer duration of efficacy than is possible with the oral formulations available for human pharmaceutical delivery. • A much greater diversity of different endectocides are available for cattle and other livestock, which offers an opportunity to combine drugs with different mechanisms of action, especially if ivermectin is to be used for mass drug administration to humans. • Integrating an endectocide into traditional zooprophylaxis strategies [14] removes potential risks of accidentally increasing malaria transmission by increasing vector survival and reproduction [15], because mosquitoes attracted to feeding on animals could be killed rather than merely diverted away from humans. • Endectocides can contribute to an overall One Health strategy by simultaneously improving livestock and human health. Nonzoonotic livestock parasites pose an important burden on human health by reducing economic output and nutrient availability. In addition to preventing malaria transmission, broadening the use of veterinary endectocides also offers an excellent opportunity to alleviate poverty and malnutrition by reducing the burden of livestock parasites on the health and economic resilience of their human owners [16]. Plasmodium falciparum and Plasmodium vivax are both strict anthroponoses, so it is understandable that ivermectin mass drug administration for malaria control and elimination is usually viewed primarily as an intervention for human populations. However, the use of veterinary antiparasitic drugs with insecticidal proprieties in domesticated livestock could perhaps achieve greater impact in many settings where persisting transmission is mediated by zoophagic vectors, and contribute to human health in previously unforeseen ways. Competing interests Both authors declare that they have no competing interests. 1. 1. Pooda SH, Rayaisse JB, Hien F-S, Lefevre T, Yerbanga S, Bengaly Z, et al. Administation of ivermectin to peridomestic cattle: a promising approach to target the residual transmission of human malaria. Malar J. 2015;14:496.PubMedCentralCrossRefGoogle Scholar 2. 2. 3. 3. WHO. Guidance note: Control of residual malaria parasite transmission. World Health Organization Global Malaria Programme; 2014: pp 5.Google Scholar 4. 4. Killeen GF. Characterizing, controlling and eliminating residual malaria transmission. Malar J. 2014;13:330.PubMedPubMedCentralCrossRefGoogle Scholar 5. 5. Durnez L, Coosemans M: Residual transmission of malaria: an old issue for new approaches. In: Manguin S editor, Rijeka: Intech. Anopheles mosquitoes—New insights into malaria vectors. 2013. p. 671–704.Google Scholar 6. 6. Kiware SS, Chitnis N, Moore SJ, Devine GJ, Majambere S, Killeen GF. Simplified models of vector control impact upon malaria transmission by zoophagic mosquitoes. PLoS One. 2012;7:e37661.PubMedPubMedCentralCrossRefGoogle Scholar 7. 7. Garrett-Jones C, Boreham P, Pant CP. Feeding habits of anophelines (Diptera: Culicidae) in 1971–1978, with reference to the human blood index: a review. Bull Entomol Res. 1980;70:165–85.CrossRefGoogle Scholar 8. 8. Rowland M, Durrani N, Kenward M, Mohammed N, Urahman H, Hewitt S. Control of malaria in Pakistan by applying deltamethrin insecticide to cattle: a community-randomised trial. Lancet. 2001;357:1837–41.PubMedCrossRefGoogle Scholar 9. 9. Fritz ML, Siegert PY, Walker ED, Bayoh MN, Vulule JR, Miller JR. Toxicity of bloodmeals from ivermectin-treated cattle to Anopheles gambiae s.l. Ann Trop Med Parasitol. 2009;103:539–47.PubMedCrossRefGoogle Scholar 10. 10. Naz SM, Ahmad A, Ahmad M, Zaman S. Efficacy of ivermectin for control of zoophilic malaria vectors in Pakistan. Pakistan J Zool. 2013;45:1585–91.Google Scholar 11. 11. Poche RM, Burruss D, Polyakova L, Poche DM, Garlapati RB. Treatment of livestock with systemic insecticides for control of Anopheles arabiensis in western Kenya. Malar J. 2015;14:351.PubMedPubMedCentralCrossRefGoogle Scholar 12. 12. Coetzee M, Hunt RH, Wilkerson R, Della Torre A, Coulibaly MB, Besansky NJ. Anopheles coluzzii and Anopheles amharicus, new members of the Anopheles gambiae complex. Zootaxa. 2013;3619:246–74.PubMedCrossRefGoogle Scholar 13. 13. Chaccour CJ, Rabinovich NR, Slater H, Canavati SE, Bousema T, Lacerda M, et al. Establishment of the ivermectin research for malaria elimination network: updating the research agenda. Malar J. 2015;14:243.PubMedPubMedCentralCrossRefGoogle Scholar 14. 14. Donnelly B, Berrang-Ford L, Ross NA, Michel P. A systematic, realist review of zooprophylaxis for malaria control. Malar J. 2015;14:313.PubMedPubMedCentralCrossRefGoogle Scholar 15. 15. Saul A. Zooprophylaxis or zoopotentiation: the outcome of introducing animals on vector transmission is highly dependent on the mosquito mortality while searching. Malar J. 2003;2:32.PubMedPubMedCentralCrossRefGoogle Scholar 16. 16. Rist CL, Garchitorena A, Ngonghala CN, Gillespie TR, Bonds MH. The burden of livestock parasites on the poor. Trends Parasitol. 2015. doi:10.1016/ Scholar Copyright information © Chaccour and Killeen. 2016 Authors and Affiliations 1. 1.Department of Internal MedicineClinica Universidad de NavarraPamplonaSpain 2. 2.ISGlobal, Barcelona Ctr. Int. Health Res. (CRESIB), Hospital ClínicUniversitat de BarcelonaBarcelonaSpain 3. 3.Instituto de Salud TropicalUniversidad de NavarraPamplonaSpain 4. 4.Ifakara Health InstituteEnvironmental Health and Ecological Sciences Thematic GroupMorogoroUnited Republic of Tanzania 5. 5.Department of Vector BiologyLiverpool School of Tropical MedicineLiverpoolUK Personalised recommendations
Leprosy and Charity in Medieval Rouen by Elma Brenner (review) Reviewed by Elma Brenner. Leprosy and Charity in Medieval Rouen. Royal Historical Society Studies in History: New Series. Rochester, N.Y.: Boydell & Brewer, 2015. xi + 203 pp. Ill. $90.00 (978-0-86193-339-6). This thorough regional study draws on the rich archives of one of the largest and wealthiest leprosaria in medieval France—Monts-aux-Malades, just outside of Rouen—along with institutional and testamentary evidence for a number of other leprosaria, the episcopal visitation records of Bishop Eudes Rigaud from the second half of the thirteenth century, diocesan statutes, medical literature, and surviving architectural monuments both from Montaux-Malades and the female leprosarium of Salle-aux-Puelles. Many of the author's broader conclusions support what has been argued concerning other French and English leprosaria: the surge of support for such institutions began in the twelfth century; ideas about contagion began to shape attitudes toward lepers only in the 1220s and 30s and then accelerated after the onset of the Black Death; physicians sometimes played a role in diagnosing lepers at the point of entry into a leprosarium, but the bulk of palliative care fell on the shoulders of female religious; and leprosaria, like other hospital institutions, had to adapt to new circumstances in the later Middle Ages. In Normandy, those circumstances included the depredations of the Hundred Years' War. Brenner also draws on archeobiological evidence from the cemeteries of leprosaria in other regions in order to argue that a significant proportion of the sick inmates of leprosaria did, in fact, have Hansen's disease. The evidence concerning Montaux-Malades adds to our understanding of the ways in which the landscape of patronage adapted when the political landscape changed: up until 1204 Montaux-Malades received its most significant support from the English king and from Anglo-Norman aristocrats. After 1204, when the English king lost Normandy to France, some Anglo-Norman aristocrats continued to offer support, while the support of the urban elite of Rouen rose, and, eventually, the French king became involved. The sources concerning the inmates of both Montaux-Malades and Salle-aux-Puelles add to our understanding of the ways in which gender and social status could complicate lepers' experiences of confinement and difference. Both institutions catered to lepers from the aristocracy, and Salle-aux-Puelles—unlike any other leper institution in Normandy—accepted only women, as was the case, as well, with a number of leprosaria in England. Additionally, leprous monks from [End Page 439] two of the most prestigious monasteries in Normandy—St. Ouen and St. Wandrille—were sent to Montaux-Malades, where they enjoyed special arrangements both concerning their diets and their rights to leave the leprosarium in order to visit their home monasteries. The penitentiary at Montaux-Malades and perhaps other leprosaria as well, also housed miscreant monks and nuns from the region, especially those who had broken their vows of chastity. The author suggests that monastic authorities chose to confine sexually active monks and nuns at leprosaria in order to remind them that in some cases the disease of leprosy was a divine punishment for lascivious behavior. Brenner also brings new perspectives to the argument that lepers were not as marginalized as scholars once thought: through its landholdings and urban fair in the center of Rouen, Montaux-Malades was tied to the vibrant urban culture of the town. Every Sunday, moreover, itinerant lepers and representatives of some of the smaller leprosaria in the region gathered at the Cathedral of Rouen in order to beg for alms. Brenner fails to resolve apparent contradictions in a few places: on p. 5, for instance, she argues that lepers were viewed as spiritually superior, and thus valuable allies in prayer; on p. 130, by contrast, she suggests that leprosy was often seen as a form of punishment for lascivious behavior. And on pp. 54 and 55 she draws differing conclusions concerning a statute that placed limitations on who could provide an entry gift when a leper entered Montaux-Malades. Nevertheless, this is a fine study that brings new perspectives to the history of leprosy in the Middle Ages. Sharon Farm University of California, Santa Barbara
Friday, March 29, 2013 Year 3: Week 26 - The Reactions One of the challenges of teaching is trying to figure out how your students feel about things that are happening in class. I don’t need to know whether or not they like everything that I’m doing in class but it’s helpful. Being able to tell when a student is upset about something is even more crucial. One of the things that I enjoy about my 3rd graders is that they are pretty easy to read. When they are excited about a song we are learning, they sit-up, smile at me and I can see the excitement in their eyes. When they don’t like something we are doing they will avoid eye contact, slouch and engage in distracting behavior. For most of these kids, I can tell what’s going on with them because they don’t try to hide it. I do have students every year who are less comfortable with their self-expression and are harder to read but in general, 3rd graders pretty clearly show you how they feel. Middle school students are a whole different game. They can sit there and give you the exactly same expression and posture when they are hating an activity or having the time of their life. " Grouchy-annoyed" face doesn’t necessarily mean that they are annoyed and "exuberant-happy" face could very well be sarcasm and not genuine excitement. This can get confusing and can make working with middle school kids a baffling proposition. Because of the nature of middle school students you have to look for different things besides their facial expression to gauge their excitement and interest. Are they participating in class? When you ask them to do something are they complying? Even if they are whining, if they are still doing the work well, then they probably don’t hate what’s going on in class. There’s a couple other things you can try. When a student was whining about being in band class I asked him, “are complaining because you are whining or because you actually don’t want to be here.” He responded, “I’m just whining, I’m cool being in band.” So after reassuring him that if it was a valid complaint that I did indeed want to hear, it we got back to work and I completely ignored his whining. There's another piece with middle school students that can lead to more authentic reactions.  Like adults middle school students try to be a certain kind of person.  Many of their actions stem from insecurity.  If they show that they like something too much they may be considered a dork.  If you can create a classroom atmosphere where students feel safe enough that they stop trying to be someone and are simply themselves, you see many more genuine reactions.  This is a hard place to get to that I've only reached with a couple classes of students.  It takes a lot of trust building, some very specific conversations and a great deal of energy from the teacher.  You have to make them believe that you really got their back and that in your classroom they have nothing to fear. The bottom line is that you have to get to know your students as people.  Celebrate their hopes, their interests and their feelings.  Don't ever tell a students that what they are feeling is not valid.  Always give them the benefit of the doubt and never hesitate to tell a student how much you believe in them.  Above all else, listen, really listen to what the students are saying. No comments: Post a Comment
Binge eating Binge Eating Binge eating is a pattern of disordered eating  which consists of episodes of uncontrollable eating. It is sometimes a symptom of binge eating disorder  or compulsive eating  disorder. During such binges, a person rapidly consumes an excessive amount of food. Most people who have eating binges try to hide this behavior from others, and often feel ashamed about being overweight or depressed about their overeating. Although people who do not have any eating disorder may occasionally experience episodes of overeating, frequent binge eating is often a symptom of an eating disorder. Women account for 60% of binge eating disorders People who binge eat are known for having low self es-stem Binge eating is mostly with teenagers 1 in 5 young women report they have a binge eating disorder Most people with binge eating disorder are overweight or obese  but the condition also occurs in individuals of normal weight Children and teens may develop binge eating disorder. Whites and African Americans are affected in roughly equal proportions, and the condition is slightly more common in women than in men (three women are affected for every two men). Comment Stream
Comment: Why the UK’s coal phaseout is a really big deal The UK is getting off coal. For real. There’s even a deadline. Energy and Climate Change Secretary Amber Rudd has announced the beginning of the end of coal in the UK, with every single coal power station required to close by 2025 (with a possible loophole for any which buy into carbon capture and storage). This means the UK is set to become the first major economy to entirely move away from the dirtiest form of energy generation. Where the coal industry was first born in the 19th century, the coal industry will first die in the 21st. The last of the its remaining deep coal mines, for so long a key political battleground, will be closed next month, its last remaining coal plants will be put out to pasture a decade from now. It’s even more remarkable for the fact that coal remains the cheapest form of power, the UK has plentiful reserves of it and the government otherwise to be pursuing an anti-green agenda. The timing is no coincidence. It means UK prime minister David Cameron will be able to waltz into the UN climate conference at the end of the month and say: ‘Look what we’re doing’. Good for everyone Could coal be phased out earlier? Probably.   But right now all the unanswered questions are secondary to simply this: there will be no unabated coal burning in the UK in ten years time. That means thousands of premature deaths will be prevented, that billions of pounds in health and mortality spending will be saved, that tens of billions of tonnes of carbon dioxide will not be emitted. Coal has been on the way out for a while actually. The UK may have 10 plants running right now, but that number will drop to 7 as early as next year. Drax, the country’s largest power station, has for years been planning for life as an exclusively biomass burner — though it’s debatable as to whether that’s any better for the environment. Coal accounted for 29% of UK power last year — and though that may sound like a lot, it’s actually 7% less than 2013 when it was nearly 40%. Furthermore, just last quarter, renewables overtook coal in the UK’s generation mix for the first time ever. What’s also significant is just where this announcement fits in the global coal landscape, which is in the midst of a radical transformation. Coal use around the world has fallen by a record-breaking amount this year, Unearthed recently revealed. The historic drop may have been driven by China and the US, but the UK was actually at the front of the pack with a massive drop of 16%. From a European perspective, this represents the end of the oldest and third most polluting coal fleet on the continent. Basically, for all involved, the phaseout is a pretty big deal. Quite what it means for the Paris climate conference and beyond that is still anybody’s guess. The same goes, in fact, for the future of UK energy policy. If one part of the climate equation is dialling down on fossil fuel use another is surely inventing clever alternative ways to use and produce energy. And though the UK may have led the last global transformation in energy use it is showing few signs that it knows where to go next. In the same breath as she ruled out future coal use Rudd poured cold water on the government’s previous support for renewables. Energy efficiency was given but a cursory mention. The future, she suggested, will be gas and nuclear; her administration has talked in the past about a huge fleet of new gas power plants. It’s hardly a clean energy revolution, there’s even precious little policy in place to make that happen. Experiments in carbon capture have faltered. Subsidies for new gas plants have failed to get them built. Even the government’s plans for a solitary new nuclear plant (to partially replace the closure of most of the UK’s fleet over the next decade) are mired in controversy and expense. It feels as if the UK is calling time on the old ways which it helped to invent — but this time it’s waiting for someone else to show it the future.
Sample Essay Outlines Sample Analytical Paper Topics Topic #1 Follow the development of clothes as symbols in The Color Purple and explain how clothes become symbols of protection. I. Thesis Statement: In The Color Purple, characters who wish to protect others from harm make clothes for them. Clothes become a symbol of protection because the making of clothes is an act of support from one to another. II. Early examples of this symbol A. Celie dresses up to try to protect Nettie from Alphonso B. Corrine’s dress for Olivia C. These symbols do not help Celie III. Those that help Celie A. Kate’s wish to make a dres B. Shug 1. Donates a dress for Celie’s quilt 2. Gives Celie the idea for pants IV. Celie as protector A. Sews pants for herself B. For Sofia C. For Nettie D. For everyone Topic #2 Use examples from the text in which the setting is either inside or near a church. Compare scenes with churches to illustrate the theme of God in The Color Purple. I. Thesis Statement: The church is used as a symbol for God in The Color Purple. Early in the text, violence and injustice occur near churches in order to illustrate the inequity with which women are treated in so-called “God-fearing” towns. II. Victims of church A. Annie... (The entire section is 404 words.)
CrossTree Blog Sort yourself out, Grade yourself in Sorting and Grading are commonly spoken of as one activity - in the persihable trade. But where lies the difference and where lies the finesse... lets try and understand the discriminating differences! Sorting: the activity at source when produce is assorted into target lots basis qualitative criteria – as non-edible, as reject or dump, by quality, by shelf life, by market value, etc. This sorting activity is the first step that brings the concept of value to fore. Essentially, this is the first stage categorisation of received produce and separates them into differentiated value-based flow towards an ascertained and useful end-use. For example, the ‘late harvest’ assortment would need a quick sale and head readily to a local market… the ‘early harvest’ assortment may target consumers at distant markets… the ‘just turning’ banana should bypass the ripening chamber, straight to consumer… the non-edible reject would divert to a vermicomposting unit, or dye making… trimmings be sorted for cattle feed… the surplus for food processing, etc, etc. All are different value realisation channels, all are aimed at optimising the off-take at production point. When practised correctly, the process of sorting is the original step towards maximising value extraction of harvested produce. The assorting of produce into target use based destinations, the farmers can, be paid or, realise the most value for their fresh harvest. Sorting can even be controlled at harvest level – example, in case of roses the flower is harvested early in budding phase so as to sell in distant markets, but harvested late in full bloom when the target market is next door. Sorted product is assigned or classed into value based flow for an end use. The bad egg is removed at first instance, before it ends up on the polishing line. Grading: this is often erred to be synonymous with sorting, largely because the earlier sorted produce is colloquially termed into A-Grade, B-Grade, C-Grade (these are actually quality based terms). In actuality, Grading is a pre-cursor to packaging, performed such that the unit package dimension is optimally utilised to store the maximum. Package designing and dimensions must suit transport capacities and a box/carton makes good sense if it stores similar sized pieces. To explain, similar sizes and shapes fit more securely into a package, but mixed sizes and shapes when packed together are likely to lead to inefficient space utilisation and even damage when handled. If you fit a football, a basketball, a cricket ball, a table tennis ball into a box, you end up wasting space; but if all are of one size, the space is efficiently used and the fitment is snug. Graded product makes marketing easy by allowing safe transport and care during delivery. Grading originated more as a logistics necessity, and involves the physical segregation of goods into optimal packing lots, after initial sorting. Grading is good practise for packaging and markets now demand graded produce for efficient shelf space utilisation & for graded shelf presentation. You cannot stock eggs of differing sizes into a box and hope not to break them, but if they all are of the same size and fit tghtly, you are sure to have done a good job. While the Cold-chain should not to be inferred simply as a ‘chain of activities in the cold’, as may be construed from an ingenuous joining of two distinct meanings, on the other hand Sorting and Grading are not one but two separate activities that serve two conspicuous & distinct purposes. The process of Sorting is to direct flow of collected goods into existing and multiple value based uses and the process of Grading is subsequently to physically prepare the sorted goods for better handling, transport and marketing. Certain assortments do not need consequent grading, whereas all high value ‘A-category’ goods will typically undergo grading and then packaging so as to safely reach end destination. There are of course many atypical uses of both activities. More... sorting is when you sift the chaff out of the wheat, grading is when fitting shapes into the right slot. By sorting you can choose where and if to apply subsequent effort and energy fruitfully. Grading is to to make the most of the final move and follow-up presentation. -Pawanexh Kohli For other information visit
Travel store - Maps, photos What's new on our site? CIA - The World Factbook -- Antigua and Barbuda List | World Factbook Home Antigua and Barbuda Flag of Antigua and Barbuda Map of Antigua and Barbuda Introduction Antigua and Barbuda Geography Antigua and Barbuda Geographic coordinates: 17 03 N, 61 48 W Map references: Central America and the Caribbean land: 442.6 sq km water: 0 sq km note: includes Redonda, 1.6 sq km Area - comparative: 2.5 times the size of Washington, DC Land boundaries: 0 km 153 km Maritime claims: territorial sea: 12 nm contiguous zone: 24 nm exclusive economic zone: 200 nm tropical maritime; little seasonal temperature variation Elevation extremes: lowest point: Caribbean Sea 0 m highest point: Boggy Peak 402 m Natural resources: NEGL; pleasant climate fosters tourism Land use: arable land: 18.18% permanent crops: 4.55% other: 77.27% (2001) Irrigated land: Natural hazards: hurricanes and tropical storms (July to October); periodic droughts Environment - current issues: Environment - international agreements: signed, but not ratified: none of the selected agreements Geography - note: People Antigua and Barbuda 68,722 (July 2005 est.) Age structure: 0-14 years: 27.9% (male 9,767/female 9,427) 15-64 years: 68% (male 23,466/female 23,250) 65 years and over: 4.1% (male 1,085/female 1,727) (2005 est.) Median age: total: 29.67 years male: 29.19 years female: 30.15 years (2005 est.) Population growth rate: 0.57% (2005 est.) Birth rate: 17.26 births/1,000 population (2005 est.) Death rate: 5.44 deaths/1,000 population (2005 est.) Net migration rate: -6.11 migrant(s)/1,000 population (2005 est.) Sex ratio: at birth: 1.05 male(s)/female under 15 years: 1.04 male(s)/female 15-64 years: 1.01 male(s)/female 65 years and over: 0.63 male(s)/female Infant mortality rate: total: 19.46 deaths/1,000 live births male: 23.43 deaths/1,000 live births female: 15.29 deaths/1,000 live births (2005 est.) Life expectancy at birth: total population: 71.9 years male: 69.53 years female: 74.38 years (2005 est.) Total fertility rate: 2.26 children born/woman (2005 est.) HIV/AIDS - adult prevalence rate: HIV/AIDS - people living with HIV/AIDS: HIV/AIDS - deaths: noun: Antiguan(s), Barbudan(s) adjective: Antiguan, Barbudan Ethnic groups: black, British, Portuguese, Lebanese, Syrian Christian, (predominantly Anglican with other Protestant, and some Roman Catholic) English (official), local dialects total population: 89% male: 90% female: 88% (1960 est.) Government Antigua and Barbuda Country name: conventional long form: none conventional short form: Antigua and Barbuda Government type: constitutional monarchy with UK-style parliament Saint John's (Antigua) Administrative divisions: 1 November 1981 (from UK) National holiday: Independence Day (National Day), 1 November (1981) 1 November 1981 Legal system: based on English common law 18 years of age; universal Executive branch: chief of state: Queen ELIZABETH II (since 6 February 1952), represented by Governor General Sir James B. CARLISLE (since 10 June 1993) Legislative branch: bicameral Parliament consists of the Senate (17-member body appointed by the governor general) and the House of Representatives (17 seats; members are elected by proportional representation to serve five-year terms) elections: House of Representatives - last held 23 March 2004 (next to be held NA 2009) election results: percent of vote by party - NA%; seats by party - ALP 4, UPP 13 Judicial branch: Political parties and leaders: Antigua Labor Party or ALP [Lester Bryant BIRD]; Barbuda People's Movement or BPM [Thomas H. FRANK]; United Progressive Party or UPP [Baldwin SPENCER] (a coalition of three opposition parties - United National Democratic Party or UNDP, Antigua Caribbean Liberation Movement or ACLM, and Progressive Labor Movement or PLM) Political pressure groups and leaders: International organization participation: Diplomatic representation in the US: chief of mission: Ambassador Lionel A. HURST chancery: 3216 New Mexico Avenue NW, Washington, DC 20016 telephone: [1] (202) 362-5122 FAX: [1] (202) 362-5225 consulate(s) general: Miami Diplomatic representation from the US: the US does not have an embassy in Antigua and Barbuda (embassy closed 30 June 1994); the US Ambassador to Barbados is accredited to Antigua and Barbuda Flag description: Economy Antigua and Barbuda Economy - overview: Tourism continues to dominate the economy, accounting for more than half of GDP. Weak tourist arrival numbers since early 2000 have slowed the economy, however, and pressed the government into a tight fiscal corner. The dual-island nation's agricultural production is focused on the domestic market and constrained by a limited water supply and a labor shortage stemming from the lure of higher wages in tourism and construction. Manufacturing comprises enclave-type assembly for export with major products being bedding, handicrafts, and electronic components. Prospects for economic growth in the medium term will continue to depend on income growth in the industrialized world, especially in the US, which accounts for slightly more than one-third of tourist arrivals. GDP (purchasing power parity): $750 million (2002 est.) GDP - real growth rate: 3% (2002 est.) GDP - per capita: purchasing power parity - $11,000 (2002 est.) GDP - composition by sector: agriculture: 3.9% industry: 19.2% services: 76.8% (2002) Labor force: Labor force - by occupation: agriculture 7%, industry 11%, services 82% (1983) Unemployment rate: 11% (2001 est.) Population below poverty line: Household income or consumption by percentage share: lowest 10%: NA highest 10%: NA Inflation rate (consumer prices): 0.4% (2000 est.) revenues: $123.7 million expenditures: $145.9 million, including capital expenditures of NA (2000 est.) Agriculture - products: Industrial production growth rate: 6% (1997 est.) Electricity - production: 110.8 million kWh (2002) Electricity - production by source: fossil fuel: 100% hydro: 0% nuclear: 0% other: 0% (2001) Electricity - consumption: 103 million kWh (2002) Electricity - exports: 0 kWh (2002) Electricity - imports: 0 kWh (2002) Oil - production: 0 bbl/day (2001 est.) Oil - consumption: 3,600 bbl/day (2001 est.) Oil - exports: Oil - imports: $689 million (2002) Exports - commodities: Exports - partners: Poland 47.8%, UK 24.6%, Germany 8.7% (2004) $692 million (2002 est.) Imports - commodities: Imports - partners: China 19.5%, US 18.7%, Singapore 14.8%, Poland 8.5%, Trinidad and Tobago 4.7% (2004) Debt - external: $231 million (1999) Economic aid - recipient: $2.3 million (1995) Currency (code): East Caribbean dollar (XCD) Currency code: Exchange rates: note: fixed rate since 1976 Fiscal year: 1 April - 31 March Communications Antigua and Barbuda Telephones - main lines in use: 38,000 (2002) Telephones - mobile cellular: 38,200 (2002) Telephone system: general assessment: NA domestic: good automatic telephone system international: country code - 1-268; 1 coaxial submarine cable; satellite earth station - 1 Intelsat (Atlantic Ocean); tropospheric scatter to Saba (Netherlands Antilles) and Guadeloupe Radio broadcast stations: AM 4, FM 2, shortwave 0 (1998) 36,000 (1997) Television broadcast stations: 2 (1997) 31,000 (1997) Internet country code: Internet hosts: 1,665 (2003) Internet Service Providers (ISPs): 16 (2000) Internet users: 10,000 (2002) Transportation Antigua and Barbuda total: 250 km (1999 est.) Ports and harbors: Saint John's Merchant marine: total: 980 ships (1,000 GRT or over) 5,873,626 GRT/7,683,143 DWT by type: bulk carrier 33, cargo 630, chemical tanker 9, container 272, liquefied gas 9, petroleum tanker 1, refrigerated cargo 8, roll on/roll off 17, vehicle carrier 1 foreign-owned: 923 (Australia 2, Bangladesh 4, Belgium 4, Colombia 2, Denmark 8, Estonia 2, Germany 849, Iceland 5, Latvia 5, Lebanon 2, Lithuania 1, Netherlands 11, Norway 3, Philippines 1, Russia 1, Slovenia 5, Sweden 1, Switzerland 5, Turkey 4, United Kingdom 1, United States 7) (2005) 3 (2004 est.) Airports - with paved runways: total: 2 2,438 to 3,047 m: 1 under 914 m: 1 (2004 est.) Airports - with unpaved runways: total: 1 under 914 m: 1 (2004 est.) Military Antigua and Barbuda Military branches: Royal Antigua and Barbuda Defense Force: Infantry, Coast Guard (2004) Military service age and obligation: 18 years of age (est.); no conscript military service (2001) Military expenditures - dollar figure: Military expenditures - percent of GDP: Transnational Issues Antigua and Barbuda Disputes - international: Illicit drugs: This page was last updated on 20 October, 2005 Cascoly Global Challenge home page More online trivia games Cascoly Photography & Games Cascoly Travel Home Page
Definitions Edit Frequency hopping (FH) is [a] form of spread spectrum in which the transmission frequency of a single communication channel is made to change by a random or pseudo-random sequence of discrete steps.[1] a technique for changing transmit frequency in a way that makes it difficult for an adversary to jam communications.[2] References Edit 2. The Evolution of Untethered Communications, at 184. See also Edit Ad blocker interference detected!
Welcome to the  website  Abstract: RLaB is an interactive, interpreted scientific programming environment for fast numerical prototyping and program development. rlabplus provides the third release of the environment for 32- and 64-bit linux systems on Intel and ARM/RaspberryPi architectures. The environment integrates large number of numerical solvers and functions from various sources, most notably from the Gnu Scientific Library (GSL) and from the netlib. Within the environment it is possible to visualize data using gnuplot, xmgrace, and pgplot xor plplot; get and post data using uniform resource locator implementing HDF5 or world wide web; and control serial, GPIB or TCP/IP connection. RLaB supports embedded python, java and ngspice interpreters. RLaB was created by Ian Searle and collaborators. rlabplus is being actively developed by Marijan Kostrun.    Project rlabplus for Linux: Content About RLaBAbout rlabplusAdmin |  Home Page |  Forums |  Tracker |  Bugs |  Support |  Patches |   | Download RLaB2 Rel. 3  for Linux | About the author |  What is RLaB ?  " .. RLaB is an interactive, interpreted scientific programming environment. RLaB is a very high level language intended to provide fast prototyping and program development, as well as easy data-visualization, and processing. RLaB is not a clone of languages such as those used by tools like Matlab or Matrix-X/Xmath. However, as RLaB focuses on creating a good experimental environment (or laboratory) in which to do matrix math, it can be called ``Matlab-like''; since the programming language possesses similar operators and concepts. RLaB does not try to be a Matlab clone. Instead, it borrows what I believe are the best features of the Matlab language and provides improved language syntax and semantics. The syntax has been improved to allow users more expression and reduce ambiguities. The variable scoping rules have been improved to facilitate creation of larger programs and program libraries. A heterogeneous associative array has been added to allow users to create and operate on arbitrary data structures. The fundamental data type is a floating point matrix (either real or complex), though RLaB also includes string matrices, and sparse numerical matrices (both real and complex) .." Ian Searle    RLaB2 Rel. 1 (rlab-2.1.05) is no longer maintained. It is still available for download from the web site Features of   or   RLaB2 Rel.3 1. Built-in solvers: 1. Advanced numerical methods and algorithms from the GNU Scientific Library (GSL) and  netlib /gams; 1. cubic spline toolkit; 2. root finding in one and multi-dimensions using MINPACK/GSL and HOMPACK (multidimensions), single parameter curve tracking with CONTIN and HOMPACK; 3. numerical integration of a real function of a real scalar (QUADPACK/GSL) and a real vector variable over hypercube (GENZPAK and Monte Carlo) and simplex domains (GENZPAK); 4. Tchebyshev polynomial toolkit, numerical differentiation of a real scalar and vector function in one and multi-dimensions, numerical div operator; 5. Minimization of real vector functions of real vector variable with MINPACK/GSL, CONMAX and Proximal Bundle (TOMS 811), NEWUOA and differential evolution ; 6. Fitting and modeling : least-squares and orthogonal distance regression solvers provided by ODRPACK and the GSL; 7. Statistics toolkit, permutations, combinations, outliers; 8. Ordinary differential equations toolkit with solvers for: • Initial value problems: rk2, rk4, rkf45, rkck45, rk8pd, rk2imp, rk4imp, gear1, gear2, bsimp (from the GSL), adams method (from netlib), blended implicite method (BiM) and the backward difference method as implemented in the package dvode (also from netlib) ; • Two-point boundary value problems:  ACDC/TWPBVP (stiff), COLDAE/COLSYS (mildly stiff) and MIRKDC (non-stiff); • Differential algebraic equations initial value problem: MEBDFI, DDASKR and BIM (all stiff solvers); • Sturm-Liouville eigenvalue/eigenfunction boundary value problem: SLEIGN2. 9. Special functions (from AiryAi to Zeta, total of more than 65 new functions); 10. Random number generators: integer, discrete, continuous, and histogrammatic in 1- and 2-D; and their respective probability distribution functions. Shuffling, choosing and sampling; 11. Simulated annealing: basic (the GSL) and advanced (ASA code); 12. Partial Differential Equations in 1-D: 13. Chaos and Signal Processing toolkit, based-on or inspired-by the Time-Series Analysis Package ( TISEAN ) and recognized sources from netlib and gams:  False nearest neighbors, average mutual information; Recurrent maps, autocorrelation, running average; 14. Generalized cross-validating spline smoothing (GCVSPL) for noisy data; piece-wise line interpolation (STL2) of noisy data, and generic b-spline fit in 1- and 2-D (DIERCKX). 15. The Gnu Linear Programming Kit (GLPK): load/save data in different formats (MPS, CPLEX LP, GnuMath), and solvers (simplex, interior point, mixed integer). Uses sparse matrix storage for constraint matrix, can work with both dense and sparse constraint matrices. 16. Sparse matrices functionality: integrated solvers SuperLU , UMFPack and SPARSKIT v.2, which provide efficient (memory and speed-wise) built-in sparse matrix functions solve, spsolve and det. 17. Linear algebra functionality: ARPACK which provides eigs function for calculation of smaller number of eigenvalues/eigenvectors for dense and sparse matrices. It offers 4 general purpose iterative routines, integrated with UMFPACK (complex sparse matrices), SuperLU (real sparse matrices) and LAPACK (dense matrices). 18. Integer data type which allows bit-wise logical operations on integers (and, or, not). Seamlessly incorporated in readb/writeb binary I/O operations. 19. Elements of the C Clustering Library that are combined with such from the (now extinct and vanished) SPRANNLIB. 2. General purpose libraries:  String toolkit: access to ascii table, creation of a string matrix, conversion of a real matrix to string matrix, gawk-type manipulations on string matrices. 3. Dedicated lists mks and const with conversion factors between MKSA (SI) units and others, and the mathematical constants (different from unity), respectively. 2. Data visualisation and input/output: 1. Grace toolkit for visualization of the RLaB data arrays: custom colors, stacked graphs, etc. See jpegs of grace graphs created using rlabplus : example 1, example 2, and example 3; 2. Pgplot fully integrated for fast data plots (e.g., during iterative solving). Gnuplot fully supported through pipe, or files: Predefined terminal options implemented for eps/ps, and gdlib (png/gif/jpeg) and xterm/wxt. 3. Standard input/output functions: access to shell commands, editing or viewing of data arrays, stderr console etc. 4. Handling of input/output using Uniform Resource Locator (URL) protocol://address. Supports protocols file, HDF5, serial, http/https/ftp and tcp. HDF5 input/output is supported for all data structures specific to RLaB (dense and sparse matrices, lists). 5. GPIB add-on (shared object library. loader and scripted library) based on the project linux-gpib. Here, GPIB stands for General Purpose Interface Bus, and is a communication hardware and protocol used for scientific instrumentation, e.g., to communicate with oscilloscopes, power supplies, source meters, and so forth. I wrote support libraries for bunch of instruments. Let me know what you need. 6. Export data to openoffice.org and matrix market (NIST) format. 3. Embedded interpreters (virtual machines) and special solvers - all are disabled by default: 1. Python (requires  ./configure --with-python). Initializes/kills interpreter, executes commands, and sets and reads python variables. 2. Java Virtual Machnine (requires ./configure --with-jvm=/location/of/your/libjvm.so) Initializes the interpreter, calls different java methods from their jar files, and sets or reads jvm variables. 3. ngspice (requires ./configure --with-spice, requires ngspice-25 or later built as a shared library) Initializes/kills the interpreter, passes commands to spice, runs spice scripts and files, and retrieves node values from processed spice circuits. Irrespectively, it can start ngspice processes, and read raw spice output files. 4. Documentation: A first draft of a manual containing some 330 pages is available for download (size 2MB). Test codes demonstrating new features are available for download, as well. See a screenshoot of RLaB in action. On-line help is also available from the site Project Rosetta Code. Installation Notes rlabplus provides RLaB2 for 32- and 64-bit linux systems. Each comes in two archives, binaries only, and as source code. The source code archive contains a number of rconfigure scripts that set recommended features, e.g.: All shared libraries require their development packages (library, e.g., libopenblas_barcelonap-r0.2.9.rc1.so; library soft link, e.g., libopenblas_barcelonap-r0.2.9.rc1.so -> libblas.so, and its header files in system wide directory /usr/include). Some libraries are mandatory, while the others are optional, where 1. Mandatory libraries are: • math/io: BLAS, LAPACK,GSL, HDF, curl, X (if one chooses accompanying pgplot package for plotting) • system: termcap, readline, gnulib, f2c, gcc, ncurses, gfortran 2. Optional libraries are • math: ARPACK (linear algebra), GLPK (linear programming), superlu/suitesparse (linear systems based on sparse matrices); • plot: plplot; • image/camera: gphoto2, imagemagick. All libraries except   ng-spice  are available from the installation media of any major linux distribution. I recommend using processor/cache optimized version library openblas, or libgoto2, in place of BLAS, because it significantly speeds up matrix computations. 3. Optional libraries for embedded interpreters are • python (tested on 2.7); • java virtual machine; and, • ngspice 25 or later (tested and working for ngspice configured through, may require openmpi libraries)  root/of/ngspice> \        ./configure --with-ngshared --with-pic --with-gnu-ld \          --libdir=/usr/lib64 --enable-nobypass --enable-xspice --enable-pss --enable-ndev --enable-openmp \ 4. Installation from archived source, 1. Download rlab-2.x.y.z.src.tgz 2. > tar xvfz rlab-2.x.y.z.src.tgz 3. > cd rlab-2.x.y-gcc 4. > ./configure  [--with-ngspice] [--with-jvm=/whereis/your/libjvm.so] [--with-python]   [--with-arpack] [--with-superlu] [--with-im] [--with-gphoto2] [--with-plplot] [--enable-glpk] [--with-suitesparse] 5. > make [scanner] gc flibs clibs rlab 6. > sudo make install which will - copy executable and shared libraries to /usr/local/lib{64}/rlab{64}-2.x.y-gcc{n}.{l}.{m}; - copy RLaB header files to /usr/local/include/rlab. (the headers are accessible through #include <rlab/.....h> in your code, c.f. libgpib on sourceforge web site). 7. > sudo make uninstall also works, and it will remove RLaB - however, different versions of rlab, designation y above, can peacefully coexist on single machine. > make clean is recommended before building from the source code. 5. Installation from archived binary, 1. Download rlab-2.x.y.z.bin.tgz 2. > tar xvfz rlab-2.x.y.z.bin.tgz 3. > cd rlab-2.x.y 4. Start an installation script in the directory, which will • copy the binaries and the needed libraries in the • copy the start script in /usr/local/bin/rlab2. During building from sources, the flags CFLAGS and FFLAGS are consulted. The binary version was built using FFLAGS=CFLAGS=-O3 -fPIC . Known Compilation Issues rlabplus is built and tested on Linux distributions opensuse 11.1, 12.1, 12.3, 13.1, on processors ranging from Intel Pentium IV (32-bit), to AMD 64-bit Opterons, and ARM (RaspberryPi). I hear through the grape wine, it compiles without a problem of debian, ubuntu and fedora. Please report any problems with building rlabplus. The known compilation issues are: 1. ncurses library has to be fixed on opensuse 11.1 and prior installations. The two are provided, /usr/lib/libncurses.so.4 and /lib/ncurses.so.5. The .so.5 is required because of readline. cd /usr/lib{64]; ln -s ../../lib/libncurses.so.5 ./libncurses.so to fix it. 2. termcap library has to be fixed on opensuse: The library is located in /usr/lib{64]/termcap. cd /usr/lib{64}; ln -s termcap/libtermcap.so ./; . 3. The garbage collector gc (version 7.2) is part of the source tree, and is built through          ./configure --disable-threads Use  make gc  to build it from the source root directory. 4. Warning! RLaB parser is contained in the file lex.yy.c, which is created by FLEX, version 2.5.35 and fixed by hand. If there are problems with the parser file (it suddenly disappeared from source root directory),         make scanner should fix it. About the author Marijan Kostrun, Ph.D. Physics (2002), University of Connecticut. Past gigs include UConn, ITAMP, and Wesleyan University. Currently researching on how to make the world a better place one photon at a time, albeit with as few electrons as possible. Back to the Top © 2004-2014, Marijan Kostrun. Last updated on April 12, 2014. Please e-mail all questions or comments to me !   SourceForge.net Logo
Presentation is loading. Please wait. Presentation is loading. Please wait. Similar presentations Presentation on theme: "Apologetics 2 UNDERSTANDING WHAT YOU BELIEVE IN"— Presentation transcript: 2 What is apologetics Apologetics comes from a Greek word “apologia” which means “Defense”. In general it means “Reasoned arguments or writings in justification of something, typically a theory or religious doctrine”. It is a branch of theology that deals with the defense and establishment of the Christian faith. Sanctify Christ as Lord in your hearts, always being ready to make a defense to everyone who asks you to give an account for the hope that is in you, yet with gentleness and reverence," (1 Peter 3:15);1 Peter 3:15 3 You have to understand your faith to defend it 4 Key Doctrines To defend your faith, you must know what you and why you believe. There are key doctrines that you must know that cults distort and contend with; You must know what they believe in and prepare an answer in advance. You must learn from the field of the selling; You must know the authenticity of the Bible 5 What we contend with The Muslims: Jesus is just a prophet and that there many contradictions in the Bible; The Atheist who say there is no God; The Marmon's who deny the virgin birth of Christ; The Jehovah’s witness who deny the existence of the trinity; The SDAs who want you to follow they law they don’t. 6 Critical Doctrines 7 1. The Nature of God There is only one God (Deut 6;4; Isaiah 43:10; 44:6,8, 45:5a But he exists in three persons Gen 1:26; 11;1-7; There are more than 60 passages in the Bible that mention three persons together (Math 3:16-17; 28:19; 2 Cor. 13:14; Eph 4:4-6) Some consider God as only one who exits as Jesus, Holy Spirit and God the father (Jesus Only) Others think of several Gods; Some say there is only one God, Jesus is his son the Holy Spirit is just a force. 8 2. The Deity of Christ Many cults deny the divinity of Christ. Some contend he was just a good prophet, He is a God with a small g (Jehovah’s Witnesses; He was just a greatest teacher whoever lived. If he is not God why is the Creator of all things (John 1:1-5; Col.1:15; 3:9) God called him God; (Heb 1:6-8) Philip called him God (John 20:28) Paul Called him God Acts 20:28 9 Many people say different things about who Jesus was Matthew 16:13-17 Muslims believe that Jesus was one of Islam’s many prophets, a good and holy man, but certainly not the Son of God. Mormons believe that God created Jesus through a relationship with one of His celestial wives. In fact, according to the Mormon publication, Pearl of Great Price, even Satan himself was a son of God, and a brother of Jesus, equal with Jesus in nature. [Book of Moses, Chapter 4, Verses 1-4] Jehovah’s Witnesses believe that Jesus was, and is, merely an angel who is just one of many “gods” that they say exist. To underscore their belief that Jesus is not Almighty God, they give Jesus the title “god” but with a small “g” in their self-published New World Translation of the Bible (see John 1:1). 10 What different People Say about Jesus Most adherents to the New Age Movement believe that Jesus was a great enlightened teacher who realized that He was God, just like we all can realize we are God. Hindus believe that Jesus was one of many great and holy men. Many Hindus believe that Jesus was a good teacher and perhaps one of their 330 million avatars. An avatar is an incarnation of the impersonal, supreme being that Hindus believe fills the universe. Buddhists believe that Jesus was an enlightened man. God? No. 11 3. The Holy Spirit is God Many cults do not believe in the Holy Spirit as God; Acts 5:3-4 equates the Holy Spirit to God; A number of scriptures that were associated with Jehovah in the Old Testament were actually spoken by the Holy Spirit: Compare Heb 10:15,16 with Jer 31:33; Act 28:25-27 with Isaiah 6:5, 9-10; Heb 3: 7-9 with Ps 95:8-11 & Ex 16:7. 12 3. Christ’s Virgin Birth Because of the nature of his birth he did not inherit the sinful nature; Others contend of the virgin birth; Others say he was just an ordinary person with a father and mother; If had the human nature he would not be sinless and he would not save us. 13 4. Christ humanity Some people contend that how can Christ be both divine and human; Heb 2: 14-18; If he was not human he would not save us and if he was not divine he would not save us; Because only God is without sin. Phi 2: 5-11 14 5. Human depravity Human depravity means that every human is spiritually separated from God and totally incapable of saving himself Some people think they will be saved by good works Eph 2: 11-13; Roman 3:23 15 6. Salvation is only in Christ Depravity of man (Rom. 3:23); Salvation is Through his atoning blood The necessity of grace through faith (Eph. 2:1-9) Act 4:12 salvation is in no other name but Jesus False religions and cults substitute salvation with works, being good and other persons; Giving arms, purgatory, worship on the Sabbath 16 7. Christ’s Bodily Resurrection and ascension Christ never died; somebody else was killed; He left and got married 17 8. Heaven & Hell There also issues about heaven; Heaven is on earth; There is no heaven but you just reborn (Reincarnation) There is no hell, once you die that is the end. 19 1. Revelation They teach a doctrine distort, deny or add to scripture These doctrines are taught in order to mislead people to destruction. They will make false claims on apostolic or prophetic authority. 1.Mormonism: John Smith is the prophet according to the book of Mormonism. 2.Jehovah's Witnesses: God only speaks only to small class of anointed people. 3.SDA’s: Ellen G. White as God’s end time prophet. 20 2. False Teachings about God False religions and cults teach doctrines that distort the nature of God; Or teach about false gods; Mormonism: There are many gods, and God the father was once a man. Jehovah’s Witnesses: No trinity only God the father. Oneness Pentecostals: The trinity is false – Jesus is father, son and Holy Spirit. 21 3. Denying the Lordship of Jesus They deny the Lordship of Christ; They also deny the his genuine humanity JW’s: Christ was the first Michael Archangel then he became a perfect man – not God in flesh. Mormonism: Jesus is not born of a virgin because God has his father and Mary the father in physical sense. Unification Church: Rev Moon is the new messiah – greater than Jesus 22 4. Salvation The propagate teachings that legalism as way of salvation; They promote license to sin; They deny the Christ’s death and resurrection. Mormonism: Salvation is by achieving personal worthiness and belief in Joseph Smith as God’s appointed Prophet. JW’s: salvation is through serving in Jehovah’s one true organization, the Watch Tower. 23 5. False Teachings about the Church They deliberately attempt to lead away people from the fellowship of true Christians; There is also an utter rejection of the church; Mormonism – all Christian churches are false and an abomination to God; Branhamism: all Christians must leave the churches and follow William Branham, God’s true end-time prophet. 24 6. False Teachings about the future Cults and false religions like to make false predictions about the future; The make claims about Jesus returns; Jehovah’s witness falsely predicted Christ’s return in 1874, 1914, and Armageddon: 1941, 1975. Download ppt "Apologetics 2 UNDERSTANDING WHAT YOU BELIEVE IN" Similar presentations Ads by Google
Wind resource Xem 1-20 trên 20 kết quả Wind resource pdf643p chunghuuhien 12-12-2011 109 60   Download pdf0p aries23 29-09-2012 79 31   Download pdf513p chipmoon 19-07-2012 150 58   Download pdf327p coeus75 29-01-2013 20 8   Download • Chater 5: Earth's resources includes natural resources (what ways do you use water? what are natural resources? How do we use rocks and soil? How do we use water and wind?) plant and animal resources (How do we use plants and animals? How do we use plants?...), resources of California. pdf45p thieulam5782 04-10-2015 14 2   Download • (BQ) Part 2 book "Renewable energy resources" has contents: Power from the wind, the photosynthetic process, biomass and biofuels, wave power, tidal power, ocean thermal energy conversion, geothermal energy, energy systems, storage and transmission, institutional and economic factors. pdf340p bautroibinhyen18 23-02-2017 3 2   Download • The most informative dictionary of economics available, the Routledge Dictionary of Economics avoids the tendency to indulge in long-winded definitions of the major concepts and provides students with a lucid, comprehensive and accurate guide to the discipline. Employing the key feature of further reading with many of the terms, the book uses the subject classification system defined by the Journal of Economic Literature and The Economic Journal. pdf691p conrepcon 13-04-2012 65 29   Download pdf156p dienquochuy 21-12-2012 44 19   Download • Wind power generation is considered as the most economic viable alternative within the portfolio of renewable energy resources. Among their advantages are the large number of potential sites for erection and the rapidly evolving technology with many suppliers offering from the individual turbine set to even turnkey projects. The disadvantages of wind energy include high capital costs and lack of controllability on the discontinuous or intermittent resource. pdf246p 123859674 04-07-2012 109 17   Download pdf230p 123859674 04-07-2012 51 11   Download • Cyclones are a key element of the atmospheric circulation in the midlatitudes (Carlson, 1998). Cyclogenesis, for which a first conceptual model was presented by the Bergen school (Bjerknes, 1910), occurs most frequently at the polar front. The various ascending and descending airstreams typically associated with these cyclones carry a range of different chemical signatures (Cooper et al., 2002). The so-called warm conveyor belt (WCB) – a strongly ascending airstream ahead of a cyclone’s cold front (Browning et al. pdf17p doipassword 01-02-2013 19 4   Download pdf0p mebachano 01-02-2013 23 2   Download • Solar energy, light and heat radiation from the Sun, has been exploited by humans since ancient times using a variety of technology development than ever before. Solar radiation along with secondary resources of energy like wind and solar energy, water power and biomass, make the most of renewable energy available on earth. Only a tiny fraction of the available solar energy is used. ppt202p minhhai20789 26-04-2011 199 113   Download pdf532p thienbinh1311 13-12-2012 111 44   Download • Overall structure of electrical power system is in the process of changing. For incremental growth, it is moving away from fossil fuels - major source of energy in the world today - to renewable energy resources that are more environmentally friendly and sustainable [1]. pdf328p phoebe75 19-02-2013 68 24   Download pdf0p kimngan_1 05-11-2012 69 16   Download • Overall structure of electrical power system isin the process of changing. For incremental growth, it is moving away from fossil fuels - major source of energy in the world today - to renewable energy resources that are more environmentally friendly and sustainable [1]. pdf327p namde01 11-04-2013 55 15   Download • For towns and cities to be economically competitive, socially progressive and environmentally responsible, they must reduce their inefficient use of finite resources. CABE believes every place can become better by: Understanding and nurturing its unique qualities as the basis of its response to a changing climate Each town and city is different, shaped by the geography of the place itself, the passage of time and the people who live there. The best solutions for one place may not suit another. pdf47p doidieumuonnoi 11-06-2013 23 6   Download • About 95% of the renewable energy sold to consumers through green pricing programs was supplied from projects meeting the generally accepted industry definition of “new.” Renewable energy sold through green pricing programs in 2008 represents an equivalent renewable energy capacity of more than 1,500 MW, with more than 1,400 MW of this represented by “new” renewable energy resources (Table 11). pdf49p lenh_hoi_xung 21-02-2013 24 4   Download • The KidWind Project is a team of teachers, students, engineers, and prac- titioners exploring the science behind wind energy in classrooms around the US. Our goal is to introduce as many people as possible to the elegance of renewable energy through hands-on science activities which are challenging, engaging, and teach basic science principles. While improving science education is our main goal, we also aim to help schools become important resources for both students and the general public, to learn about and see renewable energy in action.... pdf8p nhacnenzingme 23-03-2013 18 3   Download Đồng bộ tài khoản
Russian space program is handed new responsibility Sun Foreign Staff The 'Chief Designer' Russian started designing its Buran space shuttle and building a bigger, longer-lasting space station -- Mir. Its first section was sent into space in April 1986. "Mir was the peak of our achievements," said Gorshkov. "After it was launched, we came to realize what faults it had, and what kind of improvements we should have made." It remained in orbit 15 years, proving itself one of the most durable spacecraft in history. The weakness in the Soviet economy finally caught up with the space program in 1989 when the Kremlin began slashing the budget, and the cutting accelerated during the economic chaos of the 1990s. The Buran flew just once. Government officials were deaf to the pleas of the space program. "It was not only that they were less interested," Gorshkov said. "It was worse. They put up obstacles to stop developments in this field." At about the same time, NASA was having trouble getting money for a space station from Congress. Sensing an opportunity, Russian space officials approached their American counterparts in 1993. The two space communities had been working together on and off since the era of detente in the early 1970s. They decided to collaborate on one of the biggest public works projects in history, the International Space Station. While designing the new station, Russian engineers gamely struggled to keep Mir in orbit. Short of money, they charged a Japanese television network $12 million for allowing a journalist to travel to the station. They produced ads aboard the vehicle and considered having a feature film made there. "I didn't like it very much," Gorshkov said. "But it is something unavoidable." Mir suffered a series of technical failures. There was a fire aboard in 1997, followed quickly by a collision with a Progress cargo ship. The crash destroyed solar panels and punctured the hull. The crew saved the spacecraft, but it required months of repairs. End of the line Even the Russian genius for getting by, making do, couldn't keep Mir flying. In 2001, technicians at the Russian Mission Control Center steered the abandoned station out of orbit and into the upper atmosphere over the Pacific, where it broke up in a shower of fiery debris. Construction had been begun on the International Space Station, drawing financial and technical support from Europe, Canada and Japan as well as the United States and Russia. The first station component -- a Russian-made Zvezda module -- was launched in 1998. Russia's manned space program then seemed to lose its remaining luster. The space shuttle did all the glamorous work: delivering astronauts and most supplies to the space station, as well as construction supplies. A Soyuz is always kept docked to the station for use as an escape vehicle, but it has a limited life in orbit. Twice a year, cosmonauts fly a replacement module to the International Space Station, occasionally with a tourist aboard paying about $20 million for the flight. About six times a year, Russia dispatches unmanned Progress cargo vehicles to the station, as it did Sunday. Until the Columbia disaster, Americans showed little interest in shuttle flights. With few manned missions of their own, Russians cared even less. "We would like the Russian media to cover more of the international space programs, but there is no interest," complained a spokesman for the Russian Aviation and Space Agency. Money from the U.S. That could soon change. Russia's manned space program might expand rapidly in the next few months. The United States, which pays for most of the costs of the space station, could order several new Soyuz and Progress vehicles. Some scientists are even talking about reviving the Buran. They say they still have all the necessary launch equipment and a warehouse full of spare parts. Talks between NASA and Energia about expanding Russia's role were expected to begin this week. Gorshkov, now in charge of planning a manned mission to Mars, has watched his agency shrink. During the 1990s, he said, college graduates didn't want to work for impoverished state agencies. Russia's space effort might revive now, he said, but the future lies in nations working together, not in a resumption of a space race: "Such huge programs as the flight of man to Mars, of course, should be a joint one." Copyright © 2017, Daily Press
Pdf fan Tap here to download this LitChart! (PDF) Intellectualism and the Value of Words Theme Analysis Themes and Colors Reason and Passion Theme Icon The Human Desire for Meaning and Transcendence Theme Icon Pleasure and Love Theme Icon Parts, Wholes, and Limits Theme Icon Intellectualism and the Value of Words Theme Icon Politics Theme Icon LitCharts assigns a color and icon to each theme in Faust, which you can use to track the themes throughout the work. Intellectualism and the Value of Words Theme Icon The play examines intellectual pursuits primarily through the lives of Faust, Wagner, and the student/baccalaureate, all of whom are, at least at some point in their lives, scholars who live for and learn from books alone. Faust comes to reject such a life as unsatisfying, too much of a wild goose chase full of empty words and navel-gazing. Wagner, the more rationalistic and committed scholar of the two, is content to work within the limitations of human knowledge, preferring a life of libraries and laboratories to a life among nature and other people. Eventually, Wagner succeeds in simulating the creation of life with his Homunculus, which represents in the drama the pinnacle of achievement for Enlightment science—but Homunculus then follows Faust in seeking transcendence, which suggests that the drama as a whole privileges the search for the meaning of life over narrow scholarship, however successful it might be. If Wagner exemplifies the best of scholarship, it is the student/baccalaureate who exemplifies the very worst, being as he is easily influenced by authority, superficial in his studies, unoriginal in his insights, and pompous. It may well be as Mephistopheles says: there’s no wise or stupid thought that has not been thought already. Closely connected to the play’s examination of intellectualism is its evaluation of words, which can so often be empty, disconnected from what they refer to. Faust, for one, comes to reject his scholarly life in large part because he finds that books peddle no more than empty words. Far from finding this state of affairs distressing, Mephistopheles revels in the big, meaningless words of philosophers, and he encourages the student to put all his faith in words, memorizing them and accepting them from authorities without critical thinking. That this is the devil’s advice, of course, should deter us from following it. Faust, for one, comes to have faith only in actual feeling, regardless of how one names one’s feelings. He tells Margarete: “Imbue your heart with this immensity [of the universe], / and when you wholly feel beatitude, / then call it what you will— / Happiness! Heart! Love! God! / I have no name to give it! / Feeling is everything, / name is but sound and smoke…” This is the man, after all, who says that God created the universe not with the Word, as the Biblical Gospel of John states, but with the Act. However, at the end of the drama, a mystical chorus suggests that words can still be meaningful as transitory symbols that do not refer to, but gesture toward the presence of, indescribable eternity. Words cannot reveal the face of the Lord God, the play suggests, but they can reflect His face. Get the entire Faust LitChart as a printable PDF. Intellectualism and the Value of Words ThemeTracker The ThemeTracker below shows where, and to what degree, the theme of Intellectualism and the Value of Words appears in each scene of Faust. Click or tap on any chapter to read its Summary & Analysis. How often theme appears: Scene length: Intellectualism and the Value of Words Quotes in Faust Below you will find the important quotes in Faust related to the theme of Intellectualism and the Value of Words. Prelude in the Theater Quotes When Nature, unconcerned, twirls her endless thread and fixes it upon the spindle, when all creation’s inharmonious myriads vex us with a potpourri of sound, who then divides the strand monotonously unreeling and gives it life and rhythmic motion, who summons single voices to the general choir where music swells in glorious accord? Related Characters: The Dramatic Poet (speaker) Page Number: 142-149 Explanation and Analysis: In this passage, two of the "form characters" of the poem, the Dramatic Poet and the Stage Manager, bicker over how best to put on a play of Faust. The Manager takes the position that the goal of a play is simple: to entertain a drunk, lazy audience. The Poet, however, takes a lofty, Romantic view of things: he thinks of himself as a kind of mastermind, organizing the chaotic "parts" of a play (its characters, its singers, etc.), and of a play's story, into one organized whole. The Poet makes a complicated analogy, comparing his duty as a poet to that of God, who organizes the different discrete parts of the natural world into one harmonious whole. Goethe arguably presents his own view most clearly here--he sees himself as the "God" of his fictional world, imposing order and control upon his characters in order to create something beautiful and harmonious. And as with God, Goethe doesn't see himself as a mere entertainer or a businessman: his goal is to transform his disorderly audience of drunks into a more pious, educated group--he hopes to pass on some lessons and observations about good and evil, art, life, etc. Unlock explanations and citation info for this and every other Faust quote. Plus so much more... Get LitCharts A+ Already a LitCharts A+ member? Sign in! Part 1: Night (Faust’s Study 1) Quotes I’ve studied now, to my regret, Philosophy, Law, Medicine, and—what is worst—Theology from end to end with diligence. Yet here I am, a wretched fool and still no wiser than before. Related Characters: Heinrich Faust (speaker) Page Number: 354-359 Explanation and Analysis: In this passage, we're introduced to our protagonist, Faust, a wise man who's studied all the knowledge of the world and come up strangely lacking. Faust supposedly knows everything there is to know about Philosophy, Medicine, Theology, etc.--and yet his knowledge brings him no satisfaction (confirming Mephistopheles's theory, expressed in the previous quote; knowledge causes unhappiness). It's been suggested that Faust is something of a "stand-in" for Goethe himself: Goethe was one of the most educated, talented, and intelligent people of all time. Just as Faust sees human knowledge as somehow insufficient, Goethe's writings paved the way for Romanticism, the cultural movement that placed value on individual freedom and intuitive wisdom, rather than merely the soulless accumulation of knowledge (the Enlightenment worldview). When humanity's knowledge is limitless, there's still something missing from life: a sense of belonging, love, and joy. It's telling, then, that Faust is all alone in this scene: his knowledge and education have deprived him of intimate connections with his fellow human beings. No dog would want to linger on like this! That is why I’ve turned to magic, in hope that with the help of spirit-power I might solve many mysteries, so that I need no longer toil and sweat to speak of what I do not know, can learn what, deep within it, binds the universe together, may contemplate all seminal forces— and be done with peddling empty words. Related Characters: Heinrich Faust (speaker) Page Number: 376-385 Explanation and Analysis: In the absence of help from Philosophy, Theology, etc., Faust turns to magic in the hope of bringing comfort to his soul. Faust is an educated man, and yet the world's established, preexisting knowledge seems dry and useless to him: it educates him but doesn't nourish him. Magic, on the other hand, appeals to Faust because it's undiscovered, and has the potential to give him truly godlike knowledge. Here Faust would truly be a stranger in a strange land, investigating a mysterious, uncertain discipline. Because the passage shows Faust venturing into the unknown, it tells us a lot about his character. We knew that Faust was dissatisfied with his lot in life, but here, we see that he's still energetic and adventurous enough to try something new. Faust has internalized all the world's knowledge, but his knowledge hasn't made him dull or cautious: on the contrary, it's just made him hungry for more knowledge. Indeed, his restlessness and ambition are arguably his defining qualities, those that bring about both his downfall and his salvation. The passage also conveys some of Faust's arrogance and hubris: instead of accepting his status as God's servant, he wants to know the mind of God and understand the forces that bind the universe together. Like so many of the fictional magicians and mad scientists whom Goethe's Faust inspired, Faust will arrogantly try to "play God," and face punishment for his actions. Is parchment then the sacred fount, and does one drink from it forever to slake our thirst? There’s nothing you can gain refreshment from except what has its source in your own soul. Related Characters: Heinrich Faust (speaker), Wagner Page Number: 566-569 Explanation and Analysis: In this passage, Faust has an argument with his assistant, Wagner, about the value of knowledge and education. The two men's positions have been interpreted to reflect the two dominant intellectual positions of European thought at the time, the Enlightenment and Romanticism. Wagner argues that book-learning is useful because it fills the mind with useful knowledge; one could argue that his point of view is characteristic of the Age of Enlightenment (the era when the encyclopedia, the dictionary, and the modern school system came into being). But Faust disagrees with his assistant: it's not enough, he claims, for books to fill the mind with information--they must nourish the soul as well. Faust argues that the best books don't really introduce new information at all; instead, they merely provide the answers to questions that the mind, or rather, the soul, has already posed in some way. Faust's observations, complicated though they are, suggest why his pursuits of knowledge so far have failed. Faust has gotten a lot of information from his books, and yet there's a sense, deep down, that he hasn't really satisfied his soul's desires yet. Faust doesn't yet know what he wants to know; he's out of touch with what his soul is "thirsty" for. Part 1: Faust’s Study 2 Quotes My spirit prompts me, now I see a solution and boldly write: “In the beginning was the Act.” Related Characters: Heinrich Faust (speaker) Page Number: 1236-1237 Explanation and Analysis: In this passage, Faust rewrites the New Testament, beginning with the Book of John. Faust looks at the famous first verse of the Book, in which we're told, "In the beginning was the word." Faust is dissatisfied with such a view of life: he finds words dry and ultimately empty. Faust has spent his entire life studying various "words," and he's emerged none the happier. Here, Faust crosses out the word "word," and replaces it with a series of other words, culminating in "act." What does it mean for Faust to replace "word" with "act?" To begin with, it's a sign of Faust's hubris and arrogance that he's daring to rewrite the Bible at all. But furthermore, Faust's rewriting suggests that he's tiring of passivity in all its forms. Faust is no longer content to sit in a study reading books--he wants to use his knowledge to understand and dominate the world. By acting instead of just reading, Faust hopes to bring himself a sense of control and power. Faust, one could argue, is the true Romantic hero: instead of accepting the "word" (i.e., the law, whether of Christianity or of society) he seeks to make a new law for himself by acting on his own. Part 1: Faust’s Study 3 Quotes Take my word for it, anyone who thinks too much is like an animal that in a barren heath some evil spirit drives around in circles while all about lie fine green pastures. Related Characters: Mephistopheles (speaker), Heinrich Faust Page Number: 1830-1833 Explanation and Analysis: In this passage, Faust and Mephistopheles have arranged a contract (setting in motion the events of the rest of the poem). Mephistopheles notes that Faust has agreed to the corrupt bargain (in which Faust will be granted unlimited power, until the moment when he wishes to "linger," at which time he'll lose his life and soul) because Faust is dissatisfied with his own knowledge and enlightenment. Mephistopheles reminds Faust that intelligence is a prison: the ignorant man can more readily embrace the glories of God (the "green pastures," perhaps an allusion to the Bible's famous 23rd Psalm), while Faust is too smart to embrace God whole-heartedly. The passage is a good reminder of how Mephistopheles is both a figure of good and a figure of evil. Mephistopheles wants to take Faust's life for himself, and yet he also seems to understand Faust deeply: he recognizes, for instance, that Faust's study has brought him knowledge but not spiritual enlightenment. Mephistopheles is both Faust's worst enemy and his best friend in the play. Part 2: Act 2: Laboratory Quotes [Homunculus’s vial is] rising, flashing, piling up— another moment and it’s done! A grand design may seem insane at first; but in the future chance will seem absurd, and such a brain as this, intended for great thoughts, will in its turn create a thinker too. Related Characters: Wagner (speaker), Homunculus Related Symbols: Faust’s Study and Wagner’s Laboratory, Prisons and Keys Page Number: 6865-6870 Explanation and Analysis: In this passage, we're introduced to Homunculus, the tiny man that Wagner, Faust's former pupil and assistant, is developing in his laboratory. Homunculus is a human being, and yet he has no true parents, except for Wagner, who has produced Homunculus using "crystallization," rather than the usual process of procreation. Homunculus has been interpreted as a symbol for the scientific innovations of Goethe's lifetime, an era during which interest in science exploded. Others have noted that the Homunculus--a bizarre, satanic, motherless human being--might symbolize modern, isolated human beings. Homunculus, in any event, represents the unnatural qualities of Wagner's experiments: Wagner has gone against "God's will" by creating a living, breathing creature on his own (although the devil's presence was seemingly necessary to give him the spark of life). Wagner, one could say, has eclipsed even Faust as a scientist and a thinker--he seems almost as restless and arrogant as Faust in his desire to understand the mysteries of the universe and overreach the bounds of human knowledge and pride.
What Every Parent Needs to Know About Kids and Sleep It still sticks in my brain:  the girls teasing me about the time I went to bed.  Why?  Because I wasn’t smart enough to not answer when they asked, even though they weren’t my friends and kinda mean.  So of course my 8 o’clock bedtime became fodder for calling me a “baby.” Even though I slept like one, this “baby” would have much preferred to stay up later.  What kid doesn’t?   But my parents were unwavering on when I went to bed, which was good:  I went out fast and rarely awakened during the night.  So I must have needed the extra two hours that the “cool” kids  were missing out on with their stated 10:00 bedtimes.  Maybe that was just me.  And now my kids as well.  If they aren’t out by 8:30, God help us all the next day. We think of sleep as natural and routine.  We often don’t give it a second thought and set bedtimes for our kids based on daily schedules, when the grind finally winds down.  We may not consider how much they truly need to function during waking hours.   As summer break, with its longer days and warmer evenings, vacations and day camp, comes to an end, we parents push bedtimes forward to the “school night” schedule but challenges do arise.  With a seemingly small window of time between school and “lights out!” homework and sports and other extracurricular activities wreak havoc with our best bedtime intentions. But how important is an adequate night’s sleep?  Very, if kids are to be ready to learn for a full seven hours, five days a week.  Lack of a good night’s rest can lead to increased distractibility, impulsivity and poor concentration.   Not exactly the best frame of mind in which to learn.  That said, what exactly is the definition of a good night’s sleep?  The answer varies, depending on your child’s age.  And the answer may also surprise you. Here’s what you need to know: Preschoolers (ages 3 to 5):   Formal schooling starts at this age, sometimes with all-day preK.  Sources vary, but generally preschoolers need 11-13 hours of sleep in a 24-hour period.  Most children give up napping by age five, which coincides well with the beginning of Kindergarten.  However, don’t hesitate to push bedtime up if your happy-go-lucky child seems out-of-sorts by 6:30 pm on a school night.** Young kids (ages 5-12):   Sleep problems are common in the age group.  And no wonder:  there is homework, organized sports, video games…and also sleepovers with scary movies, awesome amounts of junk food and very late bedtimes.  (Some sources recommend no overnights for these reasons but it seems extreme to deprive our kids of this quintessential childhood activity.)  However, elementary schoolers need 9 – 11 hours of sleep a night.  So consider your school morning routine.  What time does your child need to be out of bed to get to school on time?  Then work backwards to determine what bedtime should be to get in those necessary z’s.  An 8 pm bedtime is probably what you need to aim for. Teenagers:  This is a tough group.  A loaded statement for sure, but the sleep needs of teens has been a subject for debate.  It’s easy to say the-older-we-get-the-less-sleep-we-need, and generally that is true.  But teens are still adolescent, their bodies still changing.  Toss in school, jobs, and social and extracurricular activities and your “hot mess” of a teen can actually have a “hot mess” of a sleep problem.  Kids in this age group need 8 to 10 hours of sleep a night but, because they are emerging into adulthood, it’s common for them to have difficulty falling asleep before the grown-up bedtime hour of 11 pm.  Which is why it’s hard to drag teens out of bed for school; their growth and development keeps them burning the midnight oil.  So these kids are tired. (This sleep pattern has numerous advocates calling for later school-start times for teens.)  And the effects go beyond the inability to learn:  depression, explosive anger, falling asleep at the wheel, and flare-ups of acne.  In short, teenagers need lots of sleep.  More than we think and certainly more than they get. [**Don’t let your child go to The Dark Side.  You know, that place after “a second wind” when things get ugly.  If your tired child suddenly perks up in the evening, don’t be fooled.  She is so exhausted a surge of natural adrenaline is the only thing that keeps her going.  Until she can’t anymore.  Because adrenaline is a stimulant, a child who needs to sleep can’t, at least not until way past her bedtime.   A vicious, sleep-deprived cycle ensues which makes learning, and the behavior needed in the classroom to do so, nearly impossible.  So be proactive:  if 7:00 pm is when your child suddenly decides it’s time to jump on the furniture…make 6:30 bedtime.] Sleep Hygeine:  the onus is on us. Kids are observant.  We parents need to model good bedtime prep as much as we need to model any other good habit.  If they see us engaging in good sleep habits, chances are they will be open to the same.  Here’s some tips (for adults and kids alike!): ~Get back in the groove.  Too late, I realize, for this school year but three weeks before kids return to class, get back to the school night bedtime hour.  Even better, although there will be plenty of exceptions, keep summer bedtimes as close to that during the school year.  Kids want to make the most of their summers.  Give them the restorative z’s they need to make that happen. ~And stay in the groove.  Consistency is key.  Stick to bedtime with a firm hand.  Which is challenging:  I know I’m a sucker for giving in to requests for water and back rubs and stories “from when I was a kid.”  But setting rules puts the kibosh on stall tactics.  Decide what you’ll do and won’t do.  Maybe it is answering one, just one, question about your first pet.  Maybe it’s fetching that one cup of water.  Set ground rules for requests.  Bedtime consistency goes out the window if we don’t stick to it.  Because before we know it, it’s 8:30 or 9:00. ~Diet.  Did you know that some brands of orange soda contain caffeine?  I didn’t.  But no matter…my kids were up until almost 11:00 that night anyway (not my best parenting example).  But watch the caffeine…as in none after midday.  Not that too many kids are slurping cups of joe or cans of Pepsi in the school cafeteria anyway but still a good rule of thumb. ~Set the mood.  Keep your child’s bedroom cool and dark.  A nightlight is perfectly ok,  though.  Televisions, computers, handheld electronics, etc., should have a home outside the bedroom.  And should be turned off at least an hour before bedtime. ~Define the space.  Kids’ beds should be for sleeping only.  Not for reading or playing.  This is a tough one.  I know I’d rather just roll over and turn off the bedside lamp when I’m falling asleep in my book.  And reading is a great settle-down activity and seems a logical thing to do propped up with an extra pillow, under a comfy bedspread.  But if kids associate their bed with something other than sleep, sleep will come with difficulty.  Consider a separate place in your living room or play area to create a relaxing reading environment. ~Trim the Schedule.  Reconsider after-school activities.  I don’t like this idea anymore than anyone else.  But if a weekday activity gets your kids to bed late and they can’t function the next day at school…the activity needs to go.  Or if the benefits are worth fighting for, advocate for an earlier time or a different day altogether.  It’s not worth having tired, unhappy kids the next day.  I ask myself over and over: Is it worth sacrificing an entire day for an hour or two the previous evening? Sometimes it’s the tough decisions that are worth making.  If it were only easy to make them. ~Remember you need to recharge, too.  Years ago, I heard a pediatrician in our community give a talk on her area of interest, pediatric sleep.  In her discussion of appropriate bedtimes for kids she made several points on the benefits to pediatric growth and development and another important, yet rarely considered (or admitted), point for parents themselves: When kids are awake, parenting needs to be the priority.  But parents need time to discuss family matters, one-on-one.  So timely bedtimes for kids need to be in place for this reason as well. An eloquent euphemism for “Darn it, we parents need to unwind, too!”?  Probably.  We’ve all thought it, after a busy day, as much as we love our kids.  But at least once a week my husband or I brings a list to the living room after the kids are in bed.  We talk the kids’ schedule for the week, upcoming holiday plans, you name it.  Parents need the chance to connect, communicate and ready themselves for the next busy day.  A couple hours to do so means we can be at our best to care for our kids when they wake. And we don’t have to feel guilty about those “early” bedtimes.  We all need them. • Thanks for sharing your ideas on this, Heidi. For me, the hardest thing is the back-and-forth business between school days and weekends. We end up staying up until midnight often on either Friday or (worse) Saturday night, and then when Sunday evening bedtime comes around, it’s impossible! And evening events start very late here, which is another issue. (Seriously, my volleyball games “started” at 8:30, meaning that people would show up around 8:45 and by the time everyone was changed and had warmed up, the game itself would start around 9:15! We often got home between midnight and 1 a.m. on Friday nights, setting the wrong tone for the weekend.) Thankfully, elementary school starts at 9:00, and junior high starts at 8:00 on some days and 9:00 on others. And since they have little transportation time, that helps, too. But this is *not* an easy issue for me, for sure. • That does sound like a challenge, Aimee. It’s tough on you, too, as a mom and an adult who needs sleep at regular times, too. How do your kids do with later bedtimes and school start times? • They *think* they do OK with the later bedtimes, but they have a hard time getting up on the “early in the week” school days. At least they now have school on Wednesday mornings, because until last year, there was no school on Wednesdays, so they thought they should be able to stay up late on Tuesday evenings, too! • Great article Heidi. My oldest (almost 16) has always needed his sleep and will put himself to bed by 9. Makes no difference what else is going on. Some nights he has even been in bed before 8. However, sleeping in for him is 7:30 ?. Sharing your post. • Glad you enjoyed the article! And thank you for sharing your son’s sleep habits. You have given me hope that my younger son will sleep the same way, even as a teen!
Bible Book List 2 Samuel 2Names of God Bible (NOG) David Becomes King of Judah After this, David asked Yahweh, “Should I go to one of the cities of Judah?” “Go,” Yahweh answered him. “Where should I go?” David asked. “To Hebron,” Yahweh replied. David went there with his two wives, Ahinoam from Jezreel and Abigail (who had been Nabal’s wife) from Carmel. David took his men and their families with him, and they settled in the towns around Hebron. Then the people of Judah came to Hebron and anointed David to be king over the tribe of Judah. They told David, “The people of Jabesh Gilead were the ones who buried Saul.” So David sent messengers to the people of Jabesh Gilead. He said to them, “May Yahweh bless you because you showed kindness to your master Saul by burying him. May Yahweh always show you kindness. I, too, will be good to you because you did this. Now, be strong and courageous. Because your master Saul is dead, the tribe of Judah has anointed me to be their king.” Abner Makes Ishbosheth King of Israel Ner’s son Abner, commander of Saul’s army, took Saul’s son Ishbosheth[a] and brought him to Mahanaim. Abner made him king of Gilead, Asher,[b] Jezreel, Ephraim, and Benjamin, that is, all Israel. 10 Saul’s son Ishbosheth was 40 years old when he became king of Israel. He ruled for two years, but the tribe of Judah followed David. 11 In Hebron David was king over the tribe of Judah for seven years and six months. Conflicts between Abner and Joab 12 Ner’s son Abner and the officers of Saul’s son Ishbosheth went from Mahanaim to Gibeon. 13 Zeruiah’s son Joab and David’s officers also left Hebron. Both groups met at the pool of Gibeon. They sat down there, one group on one side of the pool and the other group on the other side of the pool. 14 Abner said to Joab, “Let’s have the young men hold a contest.” Joab agreed. 15 The men got up and were counted as they passed by. Twelve were from the tribe of Benjamin (representing Saul’s son Ishbosheth), and twelve were from David’s officers. 16 Each one grabbed his opponent by the head, stuck his sword into his opponent’s side, and they fell down together. Therefore, that place in Gibeon is called the Field of Enemies. 17 Fierce fighting broke out that day, and David’s men defeated Abner and the men of Israel. 18 Zeruiah’s three sons were there: Joab, Abishai, and Asahel. Asahel was as fast on his feet as a wild gazelle. 19 He chased Abner and refused to leave him alone. 20 When Abner looked back, he asked, “Are you Asahel?” “Yes,” Asahel answered. 21 Abner told him, “Leave me alone! Catch one of the young men, and take his weapon.”[c] But Asahel refused to turn away from him. 22 So Abner spoke again to Asahel. “Stop following me,” he said. “Why should I kill you? How could I look your brother Joab in the face again?” 23 But Asahel refused to turn away. So Abner struck him with the butt of the spear. The spear went into his belly and came out his back. He fell down there and died on the spot. And everyone who came to the place where Asahel fell and died stopped there. 24 But Joab and Abishai chased Abner. When the sun went down, they came to the hill of Ammah, opposite Giah on the road from Gibeon to the desert. 25 The men of Benjamin rallied behind Abner, banding together and taking their position on top of a hill. 26 Then Abner called to Joab, “Should this slaughter go on forever? Don’t you know this will end in bitterness? How long will it be before you will call off your troops from chasing their relatives?” 27 Joab answered, “I solemnly swear, as Elohim lives, if you had not spoken, the men would not have stopped chasing their relatives until morning.” 28 So Joab blew a ram’s horn, and all the troops stopped. They didn’t chase or fight Israel anymore. 29 Abner and his men marched through the plains all that night. They crossed the Jordan River and passed through the entire Bithron until they came to Mahanaim. 30 Joab returned from chasing Abner. When he had gathered all the troops, only 19 of David’s officers and Asahel were missing. 31 However, David’s officers had killed 360 of the men of Benjamin under Abner’s command. 32 They took Asahel and buried him in his father’s tomb in Bethlehem. Then Joab and his men marched all night and arrived at Hebron by daybreak. 1. 2 Samuel 2:8 Masoretic Text; 1 Chronicles 8:33, 9:39, Greek “Ishbaal.” 2. 2 Samuel 2:9 Or “the Ashurites.” 3. 2 Samuel 2:21 Hebrew meaning uncertain. Names of God Bible (NOG) 1 of 1 Viewing of Cross references