instruction stringlengths 75 2.08M | output stringlengths 7 2.47k |
|---|---|
<|fim▁begin|> Contents 1 Introduction 2 Outline Implementation 2.1 Basic Editor 2.1.1 Exercises 2.2 Processing the Document 2.2.1 Exercises Introduction JArithmetic is a prototype application intended to be a sort of poor man's MathCad. When you start to write a program you need a set of requirements. Sometimes the goal is very precise and can be exhaustively described but it often happens that while the goal is clear it is neither desirable nor practical to describe in detail what the program is to do. JArithmetic is an example of the second type. The basic requirements are these: An editor for a document type that can include formulas and show both the formula and the result, The editor must support text formatting (typeface, type size, type style. Obviously such a set of requirements doesn't constrain the developer very much. In this case an additional consideration is this: we aren't sure of the costs and benefits of different capabilities. we aren't sure what we mean by formula, we aren't sure what we mean by text formatting, we aren't sure what we mean by result. This means that we must develop the program a little before we can decide what additional requirements should be added. Still we ought not to just wander aimlessly in the programming landscape. Therefore we define a set of desired features, a wishlist: It should be possible to include graphics in the document, Results should be displayable as charts. Another valuable list of characteristics is a negative one. That is a list of things that are not required. This doesn't mean that they are forbidden, just that time is not to be spent on developing them at the expense of required or wishlist features: We will not demand the ability to format mathematical formulas in textbook style. That is, we are after some of the capabilities of Mathcad but are not trying to make camera ready copy. With the basic requirements, the wishlist and the non-requirements in mind we can begin to sketch the outline of an implementation. However, before we go any further we should remind ourselves of the chief virtues of a programmer. First the ones that get the process of programming moving, the passionate virtues: laziness never write code when you can 'steal' it, never write anything twice, impatience demand results now, hubris have pride in your power. and then those that keep it going: diligence don't be satisfied with sloppy work, patience don't be deterred when things get slow and hard, humility take help gladly from whomever and where ever it comes. The headwords are from Larry Wall but the definitions are mine. So let's see how far our basic requirements and the passionate virtues can get us. Outline Implementation Nothing says we have to take the requirements in the order in which they are presented so lets combine the second one: The editor must support text formatting (typeface, type size, type style with the first two virtues: laziness and impatience to get a basic editor. Once we have that we can start to think about the other principal requirement: An editor for a document type that can include formulas and show both the formula and the result. The essence of this requirement is that the program must somehow read the document, work out the results of executing the formulas and then put the answers back into the document. Basic Editor Built into Windows is a component called the rich text editor. Visual Basic Classic can use this component. This component implements a fancy text box that supports all the typefaces that Windows can use along with type sizes and type styles such as italic, bold, etc. This looks like it should fulfil the requirement and the first virtue. Now let's be impatient. All you have to do is create a new project and add a reference to the Rich Text control. On NT, Windows 2000 and XP this is usually found in: x:\WINNT\system32\RICHTX32.OCX and you can add the reference by clicking Components on the Project menu. File:VBClassicRichTextReference.png Now add a Rich Text box to the form. Don't worry about naming and resizing just now. Rich text example form. Now run the project. Even with no code you have an editor in which you can type that understands tabs and newlines. Now add the following code to the form: Private Sub RichTextBox1_KeyPress(KeyAscii As Integer) Select Case KeyAscii Case Asc("B") - 64 RichTextBox1.SelBold = Not RichTextBox1.SelBold Case Asc("U") - 64 RichTextBox1.SelUnderline = Not RichTextBox1.SelUnderline Case Asc("I") - 64 RichTextBox1.SelItalic = Not RichTextBox1.SelItalic End Select End Sub Don't worry about the lack of proper naming, constants and so on; this is just throwaway code to play with for the next five minutes. Run the program, type some text, highlight some text (use the mouse or shift and arrow keys). Now press control-B, control-I or control-U. See the text style change. This little experiment proves that we can get an editor that satisfies at least one of out principal requirements with almost no code. Exercises Read the documentation for the rich text control, Extend the program to include font selection and indented paragraphs, Think of another extension and implement it, If you haven't already tried setting the text to italic with control-I try it now. Explain <|fim▁hole|> alternative way of setting the bold, italic and underline attributes. Processing the Document Now we must see if we can find a way to satisfy our other requirement: An editor for a document type that can include formulas and show both the formula and the result. This is very vague and leaves to the readers imagination the definitions of a number of key words: formulas what is a formula? Does it look like the quadratic equations you see in a school text book? result Is a result a number? Could it be a set of numbers? What about a chart? What about text? Now we could answer all these questions by doing an in depth study of the real meaning of the words and interview our end users about what they want but there is another way: turn around and face the other way, ask what have we already got that could do the job. Look into your own experience and surroundings for ideas. You are or want to be a programmer so ask yourself 'what do our requirements remind me of?'. Look at our document type, it is made of formulas and results; formulas are just a kind of instruction, they say things like add a to b and multiply the answer by c and results are just whatever comes out of that process. Sounds remarkably like a computer program. So if our document is to be a computer program we need to decide what language it will be written in. In principle we can use anything from textbook mathematical expressions with all the fancy symbols to Fortran, Lisp, Basic, Pascal, Prolog, etc., etc,. ad nauseam. We apply Larry Wall's virtues: hubris tells us that we can implement what we like, laziness says that would be hard work, impatience says I can't wait that long! So are there any languages that are already available to us in a form that our little program can use? The answer is a resounding yes. We can use one of the scripting languages: Ruby, Python, VBScript, JavaScript, etc. Which one should we choose? We can dismiss some straightaway because they rrequire too much work on our part or make the final program too big: Ruby or Python great languages, clean and powerful but need a significant amount of stuff to be installed before they will run, VBScript or JavaScript you probably already have these in the guise of the Microsoft Script Control. So to get it flying quickly and be able to deliver it to a user who doesn't have Python or Ruby we'll choose the scripting control. We'll delay the choice of VBScript or JavaScript until later. Processing the document is, in principle, simply a case of sending the text to the Scripting Control and reading back the answers. Lets add the Scripting Control to the little experimental application. There is no need for a visible control so just add the reference: Now add a command button to the form: Form with command button Now add this code to the form: Private Sub Command1_Click() Dim oSC As ScriptControl Set oSC = New ScriptControl oSC.Language = "JScript" oSC.Eval RichTextBox1.Text With RichTextBox1 .SelStart = Len(.Text) .SelText = vbCrLf & oSC.Eval("a") End With End Sub Run the project and type: a=1 in the rich text box. Make sure you delete anything else that might be there. Now the moment of truth: click the command button. If all is well the number one should appear on the line following the a=1 statement. Pretty boring though. Try something a little more exciting, clear the text and add this instead: b=2 c=3 a=b*c Click the button again. Should say 6. Click again and another 6 should appear. Now it's time to explain what has been happening. The script control is actually an interpreter or the front end for an interpreter. In fact it can interpret both VBScript and JScript. VBScript is a sort of Visual Basic where all data is Variant and JScript is Microsoft's implementation of JavaScript. The tiny scrap of code in the command button event handler just creates the script control, tells it which language to use, then asks it to evaluate the code in the rich text box. After that it asks to evaluate the simplest statement: a This returns the value of the variable a as the value of the Eval method. Then a little bit of magic with the rich text box adds that value to the end of the text. This tiny application satisfies in essence all our requirements. Do some exercises before moving on the next section where we will criticize our poor little application and make some improvements. Exercises Examine the command button event and write a sentence or two of explanation and clarification for each line. Don't repeat what the code says, concentrate on explaining what it does and why. Try the bold, italic and underline formatting commands. Do they affect the results? Add more statements, more variables, make the statement that sets the a variable more complex. If you know JavaScript you can add a function, use the function to set the value of a. If you don't know JavaScript then it's time to learn. Previous: Case Studies Contents Next: JArithmetic Round Two <|fim▁end|> | why it doesn't work. Provide an |
<|fim▁begin|> RussianDiscussionWikipedia SlovenianDiscussionWikipedia Русский язык — Slovenščina Русско-словенские ложные друзья переводчика R. банка Sln. pločevinka (Br.) ‘tin, (Am.) can’; kozarec, steklenica ‘jar’ Sln. banka R. банк ‘bank, credit bank’ map R. беседа Sln. pogovor, razgovor, pomenek ‘talk’ Sln. beseda R. слово ‘word’ map R. бор 1. bor ‘boron’2. borovje, borov gozd ‘a wood of pine-trees’ Sln. bor 1. бор ‘boron’2. сосна ‘pine-tree’ map R. брать Sln. jemati ‘take’ Sln. brati 1. читать ‘read’2. собирать ‘collect’ map R. брус Sln. bruno, hlod ‘squared beam, timber’ Sln. brus R. точильный камень ‘whetstone’ map R. быстрый Sln. hiter, uren ‘fast, quick’ Sln. bister 1. ясный, чистый ‘clear’2. живой, бодрый ‘lively, awake’ map R. вещь Sln. stvar, reč ‘matter’ Sln. vešč R. ловкий ‘clever’ map R. вещь Sln. reč, stvar, zadeva ‘matter, thing’ Sln. več R. больше ‘more’ map R. враг Sln. sovražnik ‘enemy’ Sln. vrag R. чёрт ‘devil, demon’ map R. вредный Sln. škodljiv ‘harmful’ Sln. vreden R. ценный ‘precious’ map R. время Sln. čas, doba ‘time’ Sln. vreme R. погода ‘weather’ map R. глава 1. glava ‘head’2. glava, šef ‘chief, boss’3. poglavje ‘chapter’4. kupola ‘dome, vault’ Sln. glava 1. глава (arch.), голова ‘head’2. глава (начальник) ‘chief, boss’ map R. град 1. mesto ‘town’2. toča ‘hail’ Sln. grad R. крепость ‘fortress’ map R. гроб krsta ‘coffin’ Sln. grob R. могила ‘grave’ map R. девица dekle, gospodična ‘girl, unmarried woman’ Sln. devica R. девственница ‘virgin’ map R. дело Sln. posel, zadeva ‘business, case’ Sln. delo R. работа ‘work’ map R. Дунай Sln. Donava ‘Danube’ Sln. Dunaj R. Вена ‘Vienna’ map R. жена Sln. žena ‘wife’ Sln. žena 1. жена ‘wife’2. женщина ‘woman’ map R. живот 1. život ‘belly, body’2. življenje ‘life’ Sln. život R. живот ‘belly, body’ map R. завод Sln. tovarna ‘factory, works’ Sln. zavod R. заведение ‘institute’ map R. заход Sln. zahod ‘sunset’ Sln. zahod 1. заход ‘sunset’2. запад ‘west’ map R. клоп Sln. stenica ‘bedbug’ Sln. klop R. клещ ‘tick’ map R. ковчег Sln. (Noetova) barka ‘(Noah’s) Arch’ Sln. kovček R. чемодан ‘suitcase’ map R. край 1. kraj ‘edge’2. kraj ‘region’ Sln. kraj 1. край ‘edge’2. край ‘region’3. конец ‘end’ map R. куча Sln. kup, kopica ‘heap’ Sln. koča R. хижина, избушка, шалаш ‘hut’ map R. лето 1. leto (30 let) ‘year (in the plural), e.g. 30 years’2. poletje ‘summer’ Sln. leto 1. лето (30 лет) ‘year (in the plural), e.g. 30 years’2. год ‘year (in the sg.)’ map R. листопад Sln. listopad ‘falling of leaves’ Sln. listopad 1. листопад ‘falling of leaves’2. ноябрь ‘November’ map R. лицо 1. lice ‘face’2. oseba ‘person’ Sln. lice 1. лицо ‘face’2. щека ‘cheek’ map R. личный Sln. oseben ‘personal’ Sln. ličen R. миловидный, симпатичный ‘beautiful’ map R. масть Sln. barva (konja, kart) ‘colour (of a horse; cards’ Sln. mast R. жир ‘fat’ map R. мозоль Sln. žulj ‘corn, callosity’ Sln. mozolj R. прищ ‘blotch, pimple’ map R. муж Sln. mož ‘husband’ Sln. mož 1. муж ‘husband’2. мужчина ‘man’ map R. наглый Sln. predrzen, nesramen ‘naughty’ Sln. nagel 1. внезапный ‘sudden’2. быстрый ‘fast, quick’3. резкий, поспешный ‘vehement, hasty’ map R. неделя Sln. teden ‘week’ Sln. nedelja R. воскресенье ‘Sunday’ map R. образ 1. podoba, slika ‘picture, painting’2. način ‘manner’ Sln. obraz R. лицо ‘face’ map R. обсудить Sln. razpravljati o ‘discuss, consider’ <|fim▁hole|> condemn’ map R. пара 1. par ‘pair’2. nekaj ‘a couple of, some’ Sln. para R. пар ‘steam’ map R. пасть Sln. žrelo ‘throat (of a beast)’ Sln. past R. капкан ‘trap’ map R. пепельница Sln. pepelnik ‘ash-tray’ Sln. Pepelnica R. среда на первой неделе великого поста ‘Ash Wednesday’ map R. плоть Sln. telo ‘body, flesh’ Sln. plot R. забор ‘fence’ map R. повесть Sln. kratek roman ‘novelette’ Sln. povest R. сказание, былина ‘legend’ map R. покой 1. pokoj ‘quiet’2. soba ‘room’ Sln. pokoj R. покой ‘quiet’ map R. правда Sln. resnica ‘truth’ Sln. pravda R. судебноe разбирательствo ‘court case’ map R. понос Sln. driska ‘diarrhoea’ Sln. ponos R. гордость ‘pride’ map R. пушка Sln. top ‘canon’ Sln. puška R. ружьё, винтовка ‘rifle’ map R. разбить Sln. 1. razbiti ‘shatter, break’ 2. postaviti (tabor, šotor) ‘set up (camp, tent)’ Sln. razbiti R. разбить ‘shatter, break’ map R. речь Sln. govor ‘speech’ Sln. reč R. вещь ‘matter’ map R. родина Sln. domovina ‘motherland, home region’ Sln. rodbina R. родственники ‘relations’ map R. рок Sln. usoda ‘destiny, fate’ Sln. rok R. срок ‘fixed time, set term, deadline’ map R. русый Sln. temno plav ‘blond, fair’ Sln. rus R. рыжеватый, рыжий ‘sandy, red’ map R. сад Sln. vrt ‘garden’ Sln. sad R. плод, фрукт ‘fruit’ map R. сбор 1. zbor ‘assembly’2. nabiranje, zbirka ‘collecting, collection’ Sln. zbor 1. сбор ‘assembly’2. хор ‘choir’ map R. склеп Sln. grobnica ‘tomb, vault’ Sln. sklep R. решение ‘decision’ map R. слово Sln. beseda ‘word’ Sln. slovo R. прощание ‘leave-taking, farewell’ map R. сметана Sln. kisla smetana ‘sour cream’ Sln. smetana R. сливки ‘cream’ map R. стол Sln. miza ‘table’ Sln. stol R. стул ‘chair’ map R. столица Sln. glavno mesto ‘capital’ Sln. stolica R. кафедра ‘professorship’ map R. страна Sln. zemlja, dežela ‘country’ Sln. stran 1. сторона ‘side’2. страница ‘page’ map R. трудный Sln. težak, težaven ‘hard’ Sln. truden R. усталый ‘tired’ map R. туча Sln. deževni oblak ‘rainy cloud’ Sln. toča R. град ‘hail’ map R. урок Sln. učna ura ‘lesson’ Sln. urok R. чары ‘magic spell’ map R. холод Sln. mraz ‘cold(ness)’ Sln. hlad R. прохлада ‘coolness’ map R. худой Sln. suh (človek, žival) ‘thin (man, animal)’ Sln. hud R. оштрий ‘sharp (dog), severe’ map R. час Sln. ura ‘hour’ Sln. čas R. время ‘time’ map R. часть Sln. del ‘part’ Sln. čast R. честь ‘honour’ map R. чёлн Sln. drevak, deblak ‘dugout’ Sln. čoln R. lodka ‘boat’ map R. шибкий Sln. hiter ‘speedy, fast’ Sln. šibek, šibki R. слабый ‘weak’ map R. ядро Sln. 1. peška (v sadežu), 2. jedro, 3. bistvo, 4. krogla (iz strelnega orožja) ‘kernel,, centre, main body, bullet’ Sln. jadro R. парус ‘sail’ map R. ягода Sln. jagoda ‘berry’ Sln. jagoda 1. ягода ‘berry’2. земляника, клубника ‘strawberry’ map For additional information on false friends, see the On-line hypertext bibliography by Daniel Bunčić and Ryszard Lipczuk. You can help! Have you spotted any mistakes on this page? Would you like to add information about false friends from your own experience, or help enhance this project in other respects? Just click the "edit this page" button at the top of this page — it’s easier than you think! If you need advice, see the editing help for this book. <|fim▁end|> | Sln. obsoditi R. приговорить ‘sentence; |
<|fim▁begin|> Let's get a few terms out of the way and define them: program : the finished product of programming a single independent ready to use file that serves a specific purpose. suite : a set of programs which work in conjunction to perform a set of tasks. product : the result of one's programming, can be a singular program, a suite or entire operating system. source code : the entire human usable collection of code put into a product. open source : used to describe any software where you are given the right to at least look at the source code necessary to generate the product. freeware : any type of product which can be obtained free of charge. Open Source : a label for a product approved by the OSI. Free Software : a label for a product approved by the FSF. When someone says the word "open", what do you immediately think of? Do you think of something that is ajar? Of something which is obvious? Where anyone can see it? Unobstructed? Or maybe something that is available for immediate usage? When you're in the programming world those possibilities come close but fall short of what open means. And what of <|fim▁hole|> of something that you don't need to pay for? Or do you think something that is unrestricted? Once again, it's a little more complicated in the world of programmers. To the layman Open Source and Free Software are the same thing; however, these two groups hold tense and sometimes hostile relations with one another. These programming sects believe in particular freedoms and work towards the betterment of these goals through the development of their software. People often like to think of this intellectual property in the same way they would physical property. If the various open source models are looked at in this manner then the public domain is public property and no one can deny access to that code for any reason or use. GPL code is private property that is granted to the public under the condition that all released works generated from it remains in the same position. BSD is property anyone can use for any reason or use on the condition that they maintain due credit. End this chapter with something along the lines of, "much like with a rented car, you've using licensed code or software, you've got responsibilities you must uphold." Which then leads into the next chapter. <|fim▁end|> | the word "free"? Do you think |
<|fim▁begin|> Base64 is a Public Domain Base64 Encoder/Decoder by Robert Harder. See Base64 for Java source. Types TBase64 Encode/Decode Base64 data. To Encode : SuperStrict Import BaH.Base64 Local someData:String = "Woo! BlitzMax Modules rock!" Local encoded:String = TBase64.Encode(someData, someData.length) Print "Encoded : " + encoded To Decode : SuperStrict Import BaH.Base64 Local encodedData:String = "V29vISBCbGl0ek1heCBNb2R1bGVzIHJvY2sh" Local data:Byte[] = TBase64.Decode(encodedData) Local decoded:String <|fim▁hole|> : " + decoded Functions Encode Decode TBase64: Functions Encode Function Encode:String( source:Byte Ptr, length:Int, offset:Int = 0, options:Int = 0) Description: Encode byte data to a Base64 encoded String, starting at offset of length bytes. Decode Function Decode:Byte[]( source:String, offset:Int = 0, options:Int = 0 ) Description: Decode Base64 encoded String to an array of Bytes, starting at offset. <|fim▁end|> | = String.FromBytes(data, data.length) Print "Decoded |
<|fim▁begin|> Contents 1 Poems 2 Hand Tables 2.1 Majiscules 2.2 Miniscules 2.3 Digraphs, Brevigraphs, Symbols, and Extended Examples Detailed Hand Lists Hand 1 Hand 7 Hand 13 Hand 1.1 Hand 7.1 Hand MS Hand 2 Hand 8 Hand MD Hand 3 Hand 9 Hand MF Hand 4 Hand 10 Hand TH1 Hand 5 Hand 11 Hand TH2 Hand 6 Hand 12 Hand HS Poems Foliation Incipit Hand Attribution 58v O myserable sorow withowten cure Hand 7, initials and annotation by an unidentified hand (possibly two), annotation by Hand MD (possibly) 59v Wyly no dought ye be a wry Hand <|fim▁hole|> the doblenes Hand 7 60v Myn vnhappy chaunce / to home shall I playn Hand 7 61v Go burnynge siths vnto the frosen hert Hand 7 62v In places Wher that I company Hand 7 63v If that I cowlde in versis close Hand 7 Hand Tables Majiscules E G I M O R T W Miniscules a b c d e f g h i k l m n o p r s t u v w y Digraphs, Brevigraphs, Symbols, and Extended Examples ces ff ll newer part sh ss st th that tter wer with <|fim▁end|> | 7 59v To dere is bowght |
<|fim▁begin|> This is the print version of Rock ClimbingYou won't see this message or any elements not part of the book's content when you print or preview this page. Equipment Basic gear Shoes Climbing shoes should be tight, but not cause pain. Entry level shoes will have flatter soles, while those that arch are meant for more skilled climbers. Chalk Just as in certain types of gymnastics, rock-climbers typically use chalk (in fact usually magnesium carbonate) for drying their hands to prevent slipping. Chalk comes in three general forms; blocks, powder inside balls of cloth, and liquid. Blocks of chalk tend to cruble and make a mess so some gyms don't allow their use. Liquid chalk is a mixture of powdered chalk with a volatile liquid which evaporates in a matter of seconds, leaving a relatively long lasting coating of chalk. Chalk balls are probably the most common of the three. Helmet Some climbers use a helmet to protect themselves in high falls, or from falling rocks and other objects. Top-roping Harness Unless when bouldering, climbers are usually secured with a rope which is attached to the climber's harnesses, a webbed belt that fits around one's waist and thighs. The belayer will typically also wear a harness to which the belay device is attached, using the belayer's weight as an anchor. Rope Carabiners and webbing You will need a few for the anchors. Lead-climbing Quickdraws These are pairs of carabiners connected with webbing. These are clipped into anchors bolted into the face of the rock. Removable protection On traditional lead climbs where there are no bolts, protection devices are secured in places such as cracks by the lead, and cleared by the second. These include: Aluminum or steel nuts Hexagonal-shaped chocks Slings Spring loaded camming device Tricams Technique Use your feet The choice of where you place your feet is the major determiner of where you can go next. Lead with your feet Your reach extends only as far as you are tall, so to reach farther you have to move your feet up. Obvious, but new climbers tend to focus only on their hands and the direction they are going -- up -- and forget that their feet have to move up the wall too. If you do this, you'll become extremely stretched out on the wall. It's really hard to move out of this position. It'll be hard to see where to place your feet because your torso is pulled in so close to the wall, and it will be hard to actually make the next move. A better technique is to move the feet up, which moves the torso up, which increases the range of holds that the hands can reach. Moving the feet up first also bends the knees and hips which gives the climber leverage, and makes climbing up easier. You do want to stay in close to the wall, but as I'll talk about later, generally you want to twist and keep one side (not your front) in to the wall so that the other side is free to move. Avoid becoming too stretched out as it limits your options. Place your feet quickly When climbing, you want to save your strength for big moves that really require it. Try to avoid whittling away your reserves by using your arms when you could be using your feet throughout the climb. The muscles in your legs are larger and stronger than the muscles in your arms, and you want to try to use this fact to your advantage as much as possible. To do this, keep your feet on the wall! Avoid leaving limbs dangling. Before making a move, think about where your feet are going next. After you make the move, place your feet back on the wall as quickly as possible to minimize the time that you are holding your body weight with your arms. Use your legs As noted above, your legs are stronger than your arms and you should use this to your advantage. Your legs carry your weight every day, but routinely your arms only carry a fraction of it. New climbers tend to focus on their arms and pull themselves up the wall. One of the most common excuses I hear from people who think they can't climb is "but I have no upper body strength". This statement is misguided because massive upper body strength isn't necessary at all. Overusing your arms and neglecting your legs is simply bad technique. Practice using your legs to push yourself up, and using your arms only for balance. Step up to a foot hold and stand up on it by straightening your leg and keeping your hips in to the wall, while at the same time putting as little weight as possible into your hands. (This is easiest to practice on slab or on a wall that's a few degrees from vertical.) This technique will teach you to use your body mechanics efficiently. Keeping weight out of your hands will also aid in not overgripping (holding on with more strength than is strictly necessary). Pushing with your legs will also be covered in the section on stemming when talking about using opposing forces. Place your feet carefully and firmly Your feet should not make noise when you place them on the hold. If they are, you are wasting energy by bringing them down faster and harder than is necessary. If your feet are making noise then your foot placement is also likely to be a little sloppy and uncontrolled. Climb using the edges of your feet. Aim to place the ball of your big toe on the hold. Avoid using the ball of your foot, as using your toe will give you a little more reach, and a little more leverage -- often that's all that is needed to get through the crux of a climb. Climbing shoes are designed to make this efficient. They draw your toes together, giving you a smaller surface to place on the rock, minimizing the size of the foothold you'll need. Once you have placed your foot, press it firmly downwards and into the wall. Keeping tension in your leg will reduce the chance of your foot slipping, and will of course move you upwards. See also the section on shifting your weight for advanced foot placement techniques. Other foot placement techniques involve using your heel hooked around a hold to pull yourself towards it. I'll talk about these in detail in later sections. Smear Smearing is the technique of pushing the flat of your foot on the wall where there is no foothold. The friction between the sole of your shoe and the wall is enough to hold your weight up. It creates a point of contact with the wall to maintain balance while you make a move. As soon as you are able, move the smearing foot back to a foothold. The keys to smearing are the force and direction in which you push into the wall. Friction is proportional to the amount of force applied, so use a lot of muscle to press your foot into the wall. The harder you push, the less likely your foot is to slip off. Also you want to be going up (presumably), so the force should be directed slightly downwards (not just perpendicular to the wall), to give you a bit of help. Trust your feet Yes, the hold is small. Yes, you can stand on it. Yes, it will hold your weight. Like a ballet shoe, climbing shoes are designed to cram your toes together into a point. This focuses your weight into a smaller area, making it easier to stand on smaller things. It's not natural to stand with only the ball of your big toe on a 5mm (or smaller!) wide ledge, but it is possible, and it is good climbing technique. Learning to trust your feet is necessary to climb harder routes strictly from a physical perspective. It is absolutely essential from a mental perspective to allow you to be comfortable on the rock. If you are constantly questioning if the hold is good enough to step on, then you can't concentrate on the sequence of moves you are executing, and you'll psych yourself out. Understand gravity and the forces you exert to oppose it It takes time, but after enough practice you will begin to develop an intuitive sense for how shifting your limbs changes your centre of gravity and how your body will shift on the rock. With that understanding, you can start using the way your body shifts to your advantage. Keep your hips close to the wall Keeping your body close to the wall accomplishes three things: first, it decreases the distance you have to move to get to the next hold, second, it increases the effectiveness of your footholds, and finally it decreases the amount of force in your arms that you need to hold yourself up. This is true whether the wall is vertical or overhung. Flag Picture the following: you are standing on two footholds which are at the same height, and you have your left hand on a generous handhold. The next hold is farther left. Imagine matching on the rightmost hand hold, then reaching for the next hold with your left hand, all while keeping your feet where they started. If the second hold is far enough to the left, this will shift your centre of gravity far enough to the left that your right side will start to spin out from the wall, and it can be very hard to keep holding on to the new hold with your left hand. Now imagine the same initial situation and again match hands on the first hand hold. This time though, as you move your left hand out to the next hold to the left, also move your right leg out to the right. This will keep your centre of gravity over your left leg, and will reduce torque. As you do this, also twist your torso to the right so that you are reaching backwards with your left hand for the hold out to the left. This will maximize your reach (see the section on reaching backwards) and will make flagging with your right leg easier as it will be moving out in front of you, not out to the side. A slightly more awkward, but possible technique is to flag with your left foot to the right. From the same starting situation, switch feet so your right foot is where your left was originally. As you reach for the hold to the left with your left hand, move your left leg to the right behind your right leg to counterbalance. This configuration may be useful depending on the rest of the climb. Avoid barndooring When the points of contact between your body and the wall are all to the left or all to the right, gravity will want to pull your body out from the wall. This is called "barn-dooring", as your points of contact act like a hinge and your body rotates around it, away from the wall. To prevent this from happening, either make sure that your center of gravity is between your holds (for example, using your left hand and your right foot as opposed to left hand and left foot), or you can flag to balance out where you body is as compared to the holds. Use opposing forces (Stemming) We've already talked about the importance of pushing your feet into the wall when you climb. Stemming is the art of managing these forces to help you climb up. Think about climbing up the inside of a narrow chimney. You can press a foot into the wall in front of you, the other into the wall behind you, and use these forces to hold your weight up. Then, press your hands into opposite walls, and one at a time, shift both feet up a foot or so, then stand up on your legs. Repeat. This is technique of using opposing forces is called stemming, and it's applicable to many more frequently encountered situations. Stemming is not useful only in chimneys or in situations where two walls meet at an angle. You will find it useful, especially when climbing a route with many slopers, to push off a lower hold to be able to reach for a higher hold. Shift your weight Often times, a hold may only be good if pulled at from one direction; however, you may not be pulling from that direction when you first use the hold. In order to get a better grip, you will need to shift your weight, so that gravity is pulling you into the hold instead of away. A similar problem occurs when making a horizontal or diagonal move, where reaching for the hold will move you off balance. To compensate, first shift your weight towards where the hold is, so that you remain supported while reaching. Maximize your reach Reach backwards People who start climbing want to face towards their next hold as they are reaching for it. Due to the way the shoulder is constructed, turning away from the next hold and reaching backwards for it actually allows a farther reach than reaching forwards does. Think about how you would reach for something that is far under a bed, and use the same twisting motion in your climbing. Stand up Another tendency of beginning climbers is to not take full advantage of the holds available to them. For example, if you have a foot on a hold with your knee bent, stand up before reaching for the next hand hold. Maximize your upwards extension on the available holds before reaching for new hand holds. Keep your arms straight as you do this so as to not pump out your biceps. (There is one situation in which this is not good advice -- if your hand holds are slopers, it's often better to stay underneath or to one side of them.) This is strongly related to keeping your hips close to the wall -- if you do that, you will naturally keep your legs straighter. Highstep/Hand-Foot Match Bump Bumping is another technique to gain a few more inches. If the rock is such that the only hold within reach is too small to hang off but just a little farther up is a much more generous hold, you can bump. Move to the lower hold, and quickly use it to gain more momentum, so that you can reach the next solid hold. Plan your route As you are climbing, think at least one move ahead. Make sure that where you place your right hand now is where you want your right hand so that you can move your left. Same for your feet. It doesn't always make sense to grab the first available hold, especially if the climb veers to one side. If you are climbing to the right and moving your right hand, move two holds over so that you can move your left rightwards without having to match. This will make your climbing smoother. Pay attention to the shape of the holds. If they are only positive (allow for a good grip) on the left hand side, then place your body to the right of the holds, so you can more effectively resist gravity. Be elegant Just enough force Easy climbs tend to have holds with enough grip that launching oneself towards the wall can be compensated for by pulling on the holds. Not only will this stop working as the holds become smaller and balance more important, but it also wastes energy. Use only enough force to reach the hold, don't overshoot. (This is related to stepping lightly.) Similarly, use only enough force to grip the hold; don't waste energy squeezing the rock harder than is necessary to hold on. Fluidity Good climbers make climbing look effortless. One aspect of achieving this is maintaining momentum from move to move. If you are planning ahead, don't stop at each move; flow between moves. Be bold A lot of moves in a climbing route may seem difficult at first, especially if you are lead climbing. Psychologically, this makes it difficult to fully commit to the move, since your body is tensing up in anticipation of falling. Remember, however, that all the equipment is there to keep you safe, and that you are usually protected from injury even if you don't make the move. Getting over this psychological fear - being bold on a problem - will help you focus on the climb instead of the fall. Training There are many different training regimes instituted by climbers. As with all sports, training should chosen with respect to the climber's goals and experience level. Training regimes may include a mixture of bouldering, caving, finger and body weight exercises, versa-climber training, route climbing, and up/down climbing. Technique Bouldering usually consists of climbing at a low height without supports and moving laterally, and vertically along the climbing surface. Bouldering routes can be very useful to practice technique as it's easy to start at difficult parts and practice them specifically. Strength and endurance Caving adds an extra dimension of climbing beneath overhanging surfaces, and hanging from the roof. Body weight exercises or calisthenics that focus on the back,leg, and finger muscles should be a focus for any climber. Leg exercises are essential as climbing is more like crawling than doing repeated chin-ups and a lot of technique is aimed at maximising the use of all limbs, balancing weight between hand- and foot holds. A Versa climber is cardiovascular machine, sometimes used to train upper body and lower body endurance. Up/Down climbing is used to also train endurance, and involves climbing up to a location and then climbing back down. GNU Free Documentation License As of July 15, 2009 Wikibooks has moved to a dual-licensing system that supersedes the previous GFDL only licensing. In short, this means that text licensed under the GFDL only can no longer be imported to Wikibooks, retroactive to 1 November 2008. Additionally, Wikibooks text might or might not now be exportable under the GFDL depending on whether or not any content was added and not removed since July 15. Version 1.3, 3 November 2008 Copyright (C) 2000, 2001, 2002, 2007, 2008 Free Software Foundation, Inc. <http://fsf.org/> Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. 0. PREAMBLE The purpose of this License is to make a manual, textbook, or other functional and useful document "free" in the sense of freedom: to assure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this License preserves for the author and publisher a way to get credit for their work, while not being considered responsible for modifications made by others. This License is a kind of "copyleft", which means that derivative works of the document must themselves be free in the same sense. It complements the GNU General Public License, which is a copyleft license designed for free software. We have designed this License in order to use it for manuals for free software, because free software needs free documentation: a free program should come with manuals providing the same freedoms that the software does. But this License is not limited to software manuals; it can be used for any textual work, regardless of subject matter or whether it is published as a printed book. We recommend this License principally for works whose purpose is instruction or reference. 1. APPLICABILITY AND DEFINITIONS This License applies to any manual or other work, in any medium, that contains a notice placed by the copyright holder saying it can be distributed under the terms of this License. Such a notice grants a world-wide, royalty-free license, unlimited in duration, to use that work under the conditions stated herein. The "Document", below, refers to any such manual or work. Any member of the public is a licensee, and is addressed <|fim▁hole|> the license if you copy, modify or distribute the work in a way requiring permission under copyright law. A "Modified Version" of the Document means any work containing the Document or a portion of it, either copied verbatim, or with modifications and/or translated into another language. A "Secondary Section" is a named appendix or a front-matter section of the Document that deals exclusively with the relationship of the publishers or authors of the Document to the Document's overall subject (or to related matters) and contains nothing that could fall directly within that overall subject. (Thus, if the Document is in part a textbook of mathematics, a Secondary Section may not explain any mathematics.) The relationship could be a matter of historical connection with the subject or with related matters, or of legal, commercial, philosophical, ethical or political position regarding them. The "Invariant Sections" are certain Secondary Sections whose titles are designated, as being those of Invariant Sections, in the notice that says that the Document is released under this License. If a section does not fit the above definition of Secondary then it is not allowed to be designated as Invariant. The Document may contain zero Invariant Sections. If the Document does not identify any Invariant Sections then there are none. The "Cover Texts" are certain short passages of text that are listed, as Front-Cover Texts or Back-Cover Texts, in the notice that says that the Document is released under this License. A Front-Cover Text may be at most 5 words, and a Back-Cover Text may be at most 25 words. A "Transparent" copy of the Document means a machine-readable copy, represented in a format whose specification is available to the general public, that is suitable for revising the document straightforwardly with generic text editors or (for images composed of pixels) generic paint programs or (for drawings) some widely available drawing editor, and that is suitable for input to text formatters or for automatic translation to a variety of formats suitable for input to text formatters. A copy made in an otherwise Transparent file format whose markup, or absence of markup, has been arranged to thwart or discourage subsequent modification by readers is not Transparent. An image format is not Transparent if used for any substantial amount of text. A copy that is not "Transparent" is called "Opaque". Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification. Examples of transparent image formats include PNG, XCF and JPG. Opaque formats include proprietary formats that can be read and edited only by proprietary word processors, SGML or XML for which the DTD and/or processing tools are not generally available, and the machine-generated HTML, PostScript or PDF produced by some word processors for output purposes only. The "Title Page" means, for a printed book, the title page itself, plus such following pages as are needed to hold, legibly, the material this License requires to appear in the title page. For works in formats which do not have any title page as such, "Title Page" means the text near the most prominent appearance of the work's title, preceding the beginning of the body of the text. The "publisher" means any person or entity that distributes copies of the Document to the public. A section "Entitled XYZ" means a named subunit of the Document whose title either is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in another language. (Here XYZ stands for a specific section name mentioned below, such as "Acknowledgements", "Dedications", "Endorsements", or "History".) To "Preserve the Title" of such a section when you modify the Document means that it remains a section "Entitled XYZ" according to this definition. The Document may include Warranty Disclaimers next to the notice which states that this License applies to the Document. These Warranty Disclaimers are considered to be included by reference in this License, but only as regards disclaiming warranties: any other implication that these Warranty Disclaimers may have is void and has no effect on the meaning of this License. 2. VERBATIM COPYING You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the copyright notices, and the license notice saying this License applies to the Document are reproduced in all copies, and that you add no other conditions whatsoever to those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute. However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions in section 3. You may also lend copies, under the same conditions stated above, and you may publicly display copies. 3. COPYING IN QUANTITY If you publish printed copies (or copies in media that commonly have printed covers) of the Document, numbering more than 100, and the Document's license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies. The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in addition. Copying with changes limited to the covers, as long as they preserve the title of the Document and satisfy these conditions, can be treated as verbatim copying in other respects. If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto adjacent pages. If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which the general network-using public has access to download using public-standard network protocols a complete Transparent copy of the Document, free of added material. If you use the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through your agents or retailers) of that edition to the public. It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them a chance to provide you with an updated version of the Document. 4. MODIFICATIONS You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version: Use in the Title Page (and on the covers, if any) a title distinct from that of the Document, and from those of previous versions (which should, if there were any, be listed in the History section of the Document). You may use the same title as a previous version if the original publisher of that version gives permission. List on the Title Page, as authors, one or more persons or entities responsible for authorship of the modifications in the Modified Version, together with at least five of the principal authors of the Document (all of its principal authors, if it has fewer than five), unless they release you from this requirement. State on the Title page the name of the publisher of the Modified Version, as the publisher. Preserve all the copyright notices of the Document. Add an appropriate copyright notice for your modifications adjacent to the other copyright notices. Include, immediately after the copyright notices, a license notice giving the public permission to use the Modified Version under the terms of this License, in the form shown in the Addendum below. Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the Document's license notice. Include an unaltered copy of this License. Preserve the section Entitled "History", Preserve its Title, and add to it an item stating at least the title, year, new authors, and publisher of the Modified Version as given on the Title Page. If there is no section Entitled "History" in the Document, create one stating the title, year, authors, and publisher of the Document as given on its Title Page, then add an item describing the Modified Version as stated in the previous sentence. Preserve the network location, if any, given in the Document for public access to a Transparent copy of the Document, and likewise the network locations given in the Document for previous versions it was based on. These may be placed in the "History" section. You may omit a network location for a work that was published at least four years before the Document itself, or if the original publisher of the version it refers to gives permission. For any section Entitled "Acknowledgements" or "Dedications", Preserve the Title of the section, and preserve in the section all the substance and tone of each of the contributor acknowledgements and/or dedications given therein. Preserve all the Invariant Sections of the Document, unaltered in their text and in their titles. Section numbers or the equivalent are not considered part of the section titles. Delete any section Entitled "Endorsements". Such a section may not be included in the Modified version. Do not retitle any existing section to be Entitled "Endorsements" or to conflict in title with any Invariant Section. Preserve any Warranty Disclaimers. If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material copied from the Document, you may at your option designate some or all of these sections as invariant. To do this, add their titles to the list of Invariant Sections in the Modified Version's license notice. These titles must be distinct from any other section titles. You may add a section Entitled "Endorsements", provided it contains nothing but endorsements of your Modified Version by various parties—for example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard. You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added by (or through arrangements made by) any one entity. If the Document already includes a cover text for the same cover, previously added by you or by arrangement made by the same entity you are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the previous publisher that added the old one. The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity for or to assert or imply endorsement of any Modified Version. 5. COMBINING DOCUMENTS You may combine the Document with other documents released under this License, under the terms defined in section 4 above for modified versions, provided that you include in the combination all of the Invariant Sections of all of the original documents, unmodified, and list them all as Invariant Sections of your combined work in its license notice, and that you preserve all their Warranty Disclaimers. The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be replaced with a single copy. If there are multiple Invariant Sections with the same name but different contents, make the title of each such section unique by adding at the end of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to the section titles in the list of Invariant Sections in the license notice of the combined work. In the combination, you must combine any sections Entitled "History" in the various original documents, forming one section Entitled "History"; likewise combine any sections Entitled "Acknowledgements", and any sections Entitled "Dedications". You must delete all sections Entitled "Endorsements". 6. COLLECTIONS OF DOCUMENTS You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this License in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim copying of each of the documents in all other respects. You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License into the extracted document, and follow this License in all other respects regarding verbatim copying of that document. 7. AGGREGATION WITH INDEPENDENT WORKS A compilation of the Document or its derivatives with other separate and independent documents or works, in or on a volume of a storage or distribution medium, is called an "aggregate" if the copyright resulting from the compilation is not used to limit the legal rights of the compilation's users beyond what the individual works permit. When the Document is included in an aggregate, this License does not apply to the other works in the aggregate which are not themselves derivative works of the Document. If the Cover Text requirement of section 3 is applicable to these copies of the Document, then if the Document is less than one half of the entire aggregate, the Document's Cover Texts may be placed on covers that bracket the Document within the aggregate, or the electronic equivalent of covers if the Document is in electronic form. Otherwise they must appear on printed covers that bracket the whole aggregate. 8. TRANSLATION Translation is considered a kind of modification, so you may distribute translations of the Document under the terms of section 4. Replacing Invariant Sections with translations requires special permission from their copyright holders, but you may include translations of some or all Invariant Sections in addition to the original versions of these Invariant Sections. You may include a translation of this License, and all the license notices in the Document, and any Warranty Disclaimers, provided that you also include the original English version of this License and the original versions of those notices and disclaimers. In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will prevail. If a section in the Document is Entitled "Acknowledgements", "Dedications", or "History", the requirement (section 4) to Preserve its Title (section 1) will typically require changing the actual title. 9. TERMINATION You may not copy, modify, sublicense, or distribute the Document except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, or distribute it is void, and will automatically terminate your rights under this License. However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation. Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice. Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, receipt of a copy of some or all of the same material does not give you any rights to use it. 10. FUTURE REVISIONS OF THIS LICENSE The Free Software Foundation may publish new, revised versions of the GNU Free Documentation License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. See http://www.gnu.org/copyleft/. Each version of the License is given a distinguishing version number. If the Document specifies that a particular numbered version of this License "or any later version" applies to it, you have the option of following the terms and conditions either of that specified version or of any later version that has been published (not as a draft) by the Free Software Foundation. If the Document does not specify a version number of this License, you may choose any version ever published (not as a draft) by the Free Software Foundation. If the Document specifies that a proxy can decide which future versions of this License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Document. 11. RELICENSING "Massive Multiauthor Collaboration Site" (or "MMC Site") means any World Wide Web server that publishes copyrightable works and also provides prominent facilities for anybody to edit those works. A public wiki that anybody can edit is an example of such a server. A "Massive Multiauthor Collaboration" (or "MMC") contained in the site means any set of copyrightable works thus published on the MMC site. "CC-BY-SA" means the Creative Commons Attribution-Share Alike 3.0 license published by Creative Commons Corporation, a not-for-profit corporation with a principal place of business in San Francisco, California, as well as future copyleft versions of that license published by that same organization. "Incorporate" means to publish or republish a Document, in whole or in part, as part of another Document. An MMC is "eligible for relicensing" if it is licensed under this License, and if all works that were first published under this License somewhere other than this MMC, and subsequently incorporated in whole or in part into the MMC, (1) had no cover texts or invariant sections, and (2) were thus incorporated prior to November 1, 2008. The operator of an MMC Site may republish an MMC contained in the site under CC-BY-SA on the same site at any time before August 1, 2009, provided the MMC is eligible for relicensing. How to use this License for your documents To use this License in a document you have written, include a copy of the License in the document and put the following copyright and license notices just after the title page: Copyright (c) YEAR YOUR NAME. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the "with...Texts." line with this: with the Invariant Sections being LIST THEIR TITLES, with the Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST. If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation. If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free software license, such as the GNU General Public License, to permit their use in free software. <|fim▁end|> | as "you". You accept |
<|fim▁begin|> <pagequality level="3" user="Zoeannl" />style="background: #ececec; text-align: left; padding-left: 0.5em; font-weight: bold;" class="table-rh" VII. A CHINESE STORY. We hear a great outcry against the cupidity and the egotism of the age! For my own part, I see the world, Paris especially, peopled with Deciuses. Open the thousand volumes, the thousand newspapers of all sorts and sizes, which the Parisian press vomits forth every day on the country—are they not all the work of minor saints? How vividly they depict the vices of the times! How touching the tenderness they display for the masses! How liberally they invite the rich to share with the poor, if not the poor <|fim▁hole|> rich! How many plans of social reforms, social ameliorations, and social organizations! What shallow writer fails to devote himself to the wellbeing of the working classes? We have only to contribute a few shillings to procure them leisure to deliver themselves up to their humane lucubrations. And then they declare against the egotism and individualism of our age! There is nothing which they do not pretend to enlist in the service of the working classes—there is positively no exception, not even the Customhouse. You fancy, perhaps, that the Customhouse is merely an instrument of taxation, like the octroi or the toll-bar? Nothing of the kind. It is essentially <|fim▁end|> | to share with the |
<|fim▁begin|> « Computer network technologies and servicesWAN » MPLS Strictly speaking, a Wide Area Network (WAN) is a network that is extended over a broad area, spanning regions, countries or in the case of the Internet even the world. More in general, any computer networking technology used to transmit data over long distances can be called as a WAN. A WAN technology should meet some requirements in terms of service duration, bit rate and delay constraints according to the application (telemetry, telephony, data transfer, etc.) it is designed for. Asynchronous Transfer Mode (ATM) represents the convergence for a wide variety of technologies that in the past both telecom and IT worlds in parallel introduced in order to transmit data over long distances: in the telecom world, the telephony turned from analog to digital, then ISDN and B-ISDN started to carry data along with the voice; in the IT world, Frame Relay superseded analog and digital leased lines by taking advantage of packet switching, and X.25 by moving the complexity from core to edge nodes. Nowadays ATM is going to be abandoned in favour of IP thanks to its lower complexity and greater simplicity. Contents 1 ISDN 2 PDH 3 SDH 4 Frame Relay 4.1 CIR 5 ATM 5.1 AAL 5 6 Optical networks 7 References ISDN Integrated Service Digital Network (ISDN) allows to carry data along with the voice: a variety of digital devices can be connected to a bus and can transmit over the available ISDN channels: Basic Rate Access (BRA) or Basic Rate Interface (BRI): it offers 2 data B-channels at 64 kbps and 1 signaling D-channel at 16 kbps → total: 144 kbps (good for single users or small offices); Primary Rate Access (PRA) or Primary Rate Interface (PRI): it offers 30 data B-channels at 64 kbps and 1 signaling D-channel at 16 kbps → total: 2 Mbps (good for companies). The transmission is based on Time Division Multiplexing (TDM); all channels go to a Network Termination and enter the network over a digital wire called 'local loop'. The channels inherit the logics from telecom operators: they keep being alive also when no data is exchanged. PDH PDH hierarchy. Plesiochronous Digital Hierarchy (PDH) is an old standard designed to transfer digital voice channels at 64 Kb/s (PCM) over TDM-based digital telephone networks. The system is called 'plesiochronous' because a tight synchronization between transmitter and receiver is required, even if each device has its own clock. Data flows are organized in a hierarchical way: channels are aggregated into flows from the lowest layer to the highest one (grooming), and the higher the hierarchical layer, the higher is the bit rate. For example, at layer T1 24 T0-layer channels are put into a single frame one next to another: as the frame has to last 125 µs for all layers, at layer T1 the bit rate will be 24 times higher than the one at layer T0.[1] SDH SDH physical and protocol architectures. Synchronous Digital Hierarchy (SDH), the European equivalent of the international standard SONET, differs from PDH for its higher speeds: a single clock exists for the whole system → a synchronization network is required for a tighter synchronization; copper cables need to be replaced with optical fibers; the flow multiplexing is more complex than PDH, because it is designed to optimize the hardware processing. The protocol architecture is organized as a layer stack, and each node in the physical network architecture implements them according to its functionality: path layer: end-to-end interconnection between two terminals; line layer: a path is split into lines by multiplexers; section layer: a line is split into sections by repeaters (for long distances); photonic layer: the lowest layer for optical fibers. Each time frame lasts 125 µs and its header includes synchronization information used to combine and separate channels, and OAM (Operation, Administration and Management) information used to detect failures and recover from them. SDH and PDH represent the transport layer which ATM and Frame Relay operate on. Frame Relay Frame Relay is a layer 2 connection-oriented standard to set up permanent virtual circuits over packet-switching networks. Each permanent circuit is identified by a Data Link Connection Identifier (DLCI). The standard is very flexible: in fact it does not specify the technology at upper layer (ATM, X.25...) used internally in the network. CIR The service is guaranteed for the blue user but not for the green one because his burstiness is too high. The maximum supported bit rate is not enough to describe the performance of a Frame Relay network, because an user may send bits consecutively at the maximum bit rate (wire speed) for a long period of time causing congestion in the network. Therefore the network provider provides also the Committed Information Rate (CIR), that is the maximum number B C {\displaystyle B_{\text{C}}} of bits the user can transmit within a certain interval of time T C {\displaystyle T_{\text{C}}} so that the service is guaranteed: CIR = B C ⋅ T C {\displaystyle {\text{CIR}}=B_{\text{C}}\cdot T_{\text{C}}} where B C {\displaystyle B_{\text{C}}} is called committed burst size: low burstiness: the user rarely sends packets → the service is always guaranteed; high burstiness: the user keeps sending packets consecutively at wire speed → when he exceeds the <|fim▁hole|> will not be guaranteed anymore. The user's Data Terminal Equipment (DTE) can stop the transmission when the maximum burstiness is reached. ATM Asynchronous Transfer Mode (ATM) is a connection-oriented standard to set up virtual circuits over B-ISDN networks. Each circuit is identified by a Virtual Path Identifier (VPI) and a Virtual Circuit Identifier (VCI), and it can be permanent or dynamically set up through signaling messages. ATM cells are very small: each ATM cell is 53 bytes long, made up of a 5-bytes-long header, containing the connection identifiers, and a 48-bytes-long payload → low latency and low packetization delays. ATM networks have a very complex model, derived from a telecom-operator mentality to have the full control of the network and guarantee a high fault tolerance. AAL 5 When ATM was designed, it was thought to be implemented ubiquitously in the network, also at its edges in the network cards of the user PCs. Nowadays PCs at the edges are implementing only the IP protocol because its implementation is cheaper, and ATM can be found only as transport layer in the core of the network hidden from the user. ATM Adaptation Layer (AAL) of type 5 is used for Segmentation and Reassembly (SAR): Segmentation: IP packets are split into ATM cells; Reassembly: ATM cells are combined into IP packets. AAL makes interaction between IP and ATM complex, because IP addresses should be translated to ATM connection identifiers and vice versa → nowadays the tendency is abandoning the ATM control plane and adopting the MPLS control plane. Optical networks In optical networks data are transmitted over electromagnetic waves multiplexed by using WDM, transported via optical fibers and switched by mirror-based optical switching systems. Wavelength Division Multiplexing (WDM) allows to put multiple optical signals into a single optical fiber → the transmission capacity of fibers is increased: Coarse WDM (CWDM): it allows to transmit a lower number of signals with wavelengths well-separated one from each other → cheaper because demultiplexing is easier; Dense WDM (DWDM): it allows to transmit a higher number of signals with any wavelength → more expensive because demultiplexing is more complex. Optical switching is based on mirrors controlled by micro-electro-mechanical systems (MEMS), reflecting electromagnetic signals from an input fiber to an output fiber. Optical switching is very flexible: it exploits physical properties of electromagnetic waves without caring about bits → networks can be upgraded to higher speeds because optical switches keep working independently of the bit rate. Several types of optical switches exist: add/drop multiplexer: it is the simplest optical switch: it can be interposed between two fibers to optically insert (add) signals coming from transmitters into the network, and extract (drop) signals from the network towards the receivers; cross-connect: it can connect multiple input fibers to multiple output fibers: fiber cross-connect: all the electromagnetic waves coming from an input fiber are switched to an output fiber; waveband cross-connect: a set of electromagnetic waves with close wavelengths coming from an input fiber is switched to an output fiber; wavelength cross-connect: a set of electromagnetic waves with the same wavelength coming from an input fiber is switched to an output fiber; wavelength switch: configuration is dynamic, that is switches can change circuits faster than cross-connects → fault recovering is fast. Two signals with the same wavelength may be coming from two different input fibers but they may need to be switched to the same output fiber → through the wavelength conversion an optical switch can change the wavelength of a signal to one not still used in the output fiber, in order to keep all signals separated. Optical switches can be used in the network backbone to interconnect the major access points, by setting up optical paths via optical fibers among the cities in the world. Optical switches can set up optical paths by using signaling and routing protocols such as LDP and RSVP. Optical switches are fault tolerant: when a link breaks, they can reflect the waves along another optical path. WDM can be deployed as the transport layer on which any layer 2 protocol (SONET, Ethernet...) can operate delimiting the frames. However the technology for pure optical switching is still in an embryonic stage: nowadays WDM switches are more expensive than packet-switching ones, and they can have few interfaces because the mirror system would be very complex for a lot of interfaces. Moreover optical switching is connection-oriented: when a circuit is set up, the resources keep being allocated even if the circuit is not currently used → optical switching is good for the network backbone where the traffic is quite continuous. Cheaper solutions try to overcome technological limits by replacing mirrors with an electrical switching matrix: each optical signal is converted to a sequence of bits through an optical-to-electrical (OE) conversion so that it can be switched more easily, then it is converted again into an optical signal. The reconverted signal is regenerated, being able to travel for a longer distance before losing power, but this solution has a lot of disadvantages: the switches consume a lot of power with respect to all-optical switches, and changing the bit rate requires to upgrade the switches. References ↑ Signaling bits are not considered. « Computer network technologies and servicesWAN » MPLS <|fim▁end|> | committed burst size the service |
<|fim▁begin|> Dunst Opening a b c d e f g h 8 8 7 7 6 6 5 5 4 4 3 3 2 2 1 1 a b c d e f g h Position in Forsyth-Edwards Notation (FEN) rnbqkbnr/pp1ppppp/8/2p5/8/2N5/PPPPPPPP/R1BQKBNR Moves: 1.Nc3 c5 ECO code: A00 Parent: Dunst Opening Contents 1 Dunst Opening 1.1 1...c5 1.2 Statistics 1.3 Theory table 1.4 References Dunst Opening 1...c5 Statistics Theory table 1.Nc3 c5 2 Closed Siclian e4Nc6 to 1.e4 c5 2.Nc3 Nf3Nc6 to 1.Nf3 c5 2.Nc3 When contributing to this Wikibook, please follow the Conventions for organization. Wikipedia has related information at Dunst Opening References Nunn's Chess Openings. 1999. John Nunn (Editor), Graham Burgess, John Emms, Joe Gallagher. ISBN 1-8574-4221-0. v • d • e Chess Openings1. e4 e5 Open Game · King's Gambit · Bishop's Opening · Vienna · Petrov · Latvian Gambit · Scotch · Giuoco Piano · Two <|fim▁hole|> Philidor Defence1. e4 c5 Sicilian Defence · Closed Sicilian · Taimanov · Sveshnikov · Kan Sicilian · Sicilian Dragon · Scheveningen · Najdorf · Alapin1. e4 other French Defence · Caro-Kann Defence · Pirc Defence · Alekhine Defence · Modern · Scandinavian · Nimzowitsch 1. d4 Nf6 Indian Defence · King's Indian · Nimzo-Indian · Queen's Indian · Grünfeld · Benoni · Budapest · Catalan1. d4 d5 Closed Game · Queen's Gambit · Queen's Gambit Accepted · Queen's Gambit Declined · Chigorin · Slav · Semi-Slav · Marshall1. d4 other Dutch Defence · Old Benoni Defence · Englund Gambit · English Defence · King's Indian Attack · Réti Opening1. a3 · Na3 · a4 · b3 · b4 · c3 · Nc3 · c4 · d3 · d4 · e3 · e4 · f3 · Nf3 · f4 · g3 · g4 · h3 · Nh3 · h4 <|fim▁end|> | Knights · Ruy Lopez · |
<|fim▁begin|> Contents 1 Rutherford backscattering 2 Neutron diffraction 3 X-ray diffraction 4 Nuclear reaction analysis 5 Analytical chemistry Rutherford backscattering Rutherford backscattering (or RBS, for Rutherford Backscattering Spectrometry) is an analytical technique in materials science. It is named for Ernest Rutherford who in 1911 first explained Geiger and Marsden's experimental results for alpha particle scattering from a very thin gold foil in a backward direction by using the Coulomb electrostatic force between the positively charged nucleus and the positively charged alpha particle. Rutherford first correctly described the atom as a tiny positive nucleus surrounded by negatively charged electrons (essentially the Bohr atom) on the basis of this experiment. This contradicted J.J. Thomson's "plum pudding model," the popularly accepted model of the atom at that time. Rutherford famously expressed his surprise at this experiment: "It was as though one fired a bullet at a piece of paper, and it bounced back at you!" A high energy beam ( 2 to 4 MeV ) of low mass ions ( e.g. He++ ) is directed at a sample. A detector is placed such that particles which scatter from the sample at close to a 180 degree angle will be collected. The energy of these ions will depend on their incident energy and on the mass of the sample atom which they hit, because the amount of energy transferred to the sample atom in the collision depends on the ratio of masses between the ion and the sample atom. Thus, measuring the energy of scattered ions indicates the chemical composition of the sample. Additionally, in the case that the incident ion doesn't hit any of the atoms near the surface of the sample, but instead hits an atom deeper in, the incident ion loses energy gradually as it passes through the solid, and again as it leaves the solid. This means that RBS can be used as a means to perform a depth profile of the composition of a sample. This is especially useful in analysis of thin-film materials. For example, films about half a micrometre in thickness can be profiled using a 2 MeV He beam, or films up to about 10 micrometres thick can be profiled with a 2 MeV H beam. RBS is now a very widely used analytical technique, which has the great advantage that it is absolute, requiring no standards for quantification (since the probability of interaction - the cross-section - is given by the Coulomb potential). It is one of a family of techniques, collectively known as Ion beam analysis. Neutron diffraction Neutron diffraction is a crystallographic method for the determination of the atomic structure of a material. This is a form of elastic scattering where the neutrons exiting the experiment have more or less the same energy as the incident neutrons. The technique is similar to X-ray diffraction but the different type of radiation gives complementary information. A sample to be examined is placed in a beam of thermal or cold neutrons and the intensity pattern around the sample gives information of the structure of the material. Neutrons are particles found in the atomic nucleus. In a nuclear reactor, neutrons can be set free when nuclei decay (fission, radioactivity). All quantum particles can exhibit wave phenomena we typically associate with light or sound. Diffraction is one of these phenomena; it occurs when waves encounter obstacles whose size is comparable with the wavelength. If the wavelength of a quantum particle is short enough, atoms or their nuclei can serve as diffraction obstacles. When neutrons from a reactor are slowed down and selected properly, their wavelength lies near one angstrom (0.1 nanometer), the typical separation between atoms in a solid material. A neutron diffraction measurement requires a neutron source (e.g. a nuclear reactor or spallation source), a sample (the material to be studied), and a detector. At a research reactor other components such as crystal monochromators or filters may be needed to select the desired neutron wavelength. Some parts of the setup may also be movable. At a spallation source the time of flight technique is used to sort the energies of the incident neutrons, so no monochromator is needed, just a bunch of electronics. (Higher energy neutrons are faster - v. simple) Neutrons interact with matter differently than x-rays. X-rays interact primarily with the electron cloud surrounding each atom. The contribution to the diffracted x-ray intensity is therefore larger for atoms with a large atomic number (Z) than it is for atoms with a small Z. On the other hand, neutrons interact directly with the nucleus of the atom, and the contribution to the diffracted intensity is different for each isotope; for example, regular hydrogen and deuterium contribute differently. It is also often the case that light (low Z) atoms contribute strongly to the diffracted intensity even in the presence of large Z atoms. Non-magnetic neutron diffraction is directly sensitive to the positions of the nuclei of the atoms. Although neutrons are uncharged, they carry a spin, and therefore interact with magnetic moments, including those arising from the electron cloud around an atom. Neutron diffraction can therefore reveal the microscopic magnetic structure of a material. Neutron diffraction can be used to establish the structure of low atomic number materials like proteins and surfactants much more easily with lower flux than at a synchrotron radiation source. This is because some low atomic number materials have a higher cross section for neutron interaction than higher atomic weight materials. The first neutron diffraction experiments were carried out in 1945 by Ernest O. Wollan using the Graphite Reactor at Oak Ridge. He was joined shortly thereafter by Clifford Shull, and together they established the basic principles of the technique, and applied it successfully to many different materials, addressing problems like the structure of ice and the microscopic arrangements of magnetic moments in materials. For this achievement Shull was awarded one half of the 1994 Nobel Prize in Physics. Wollan had passed away in the 1990's. (The other half of the 1994 Nobel Prize for Physics went to Bert <|fim▁hole|> the inelastic scattering technique at the Chalk River facility of AECL. This also involved the invention of the triple axis spectrometer). Brockhouse and Shull jointly take the somewhat dubious distinction of the longest gap between the work being done (1945) and the Nobel Prize being awarded (1994). One unusual application of elastic neutron scattering/diffraction is that the lattice constant of metals can be very accurately measured. Together with an accurately aligned micropositioner a map of the lattice constant through the metal can be derived. This can easily be converted to the stress field experienced by the material. This has been used to analyse stresses in aerospace and automotive components to give just two examples. X-ray diffraction X-ray scattering techniques are a family of non-destructive analytical techniques which reveal information about the crystallographic structure, chemical composition, and physical properties of materials and thin films. These techniques are based on observing the scattered intensity of an x-ray beam hitting a sample as a function of incident and scattered angle, polarization, and wavelength or energy. Nuclear reaction analysis Nuclear reaction analysis (NRA) is a nuclear method in materials science to obtain concentration vs. depth distributions for certain target chemical elements in a solid thin film. If irradiated with select projectile nuclei at kinetic energies Ekin these target elements can undergo a nuclear reaction under resonance conditions for a sharply defined resonance energy. The reaction product is usually a nucleus in an excited state which immediately decays, emitting ionizing radiation. To obtain depth information the initial kinetic energy of the projectile nucleus (which has to exceed the resonance energy) and its stopping power (energy loss per distance travelled) in the sample has to be known. To contribute to the nuclear reaction the projectile nuclei have to slow down in the sample to reach the resonance energy. Thus each initial kinetic energy corresponds to a depth in the sample where the reaction occurs (the higher the energy, the deeper the reaction). Analytical chemistry Analytical chemistry is the analysis of material samples to gain an understanding of their chemical composition, structure and function. Analytical chemistry is a sub discipline of chemistry that has the broad mission of understanding the chemical nature of all matter. This differs from other sub disciplines of chemistry in that it is not intended to understand the physical basis for the observed chemistry as with physical chemistry and it is not intended to control or direct chemistry as is often the case in organic chemistry. Analytical chemistry generally does not attempt to use chemistry or understand its basis; however, these are common outgrowths of analytical chemistry research. Analytical chemistry has significant overlap with other branches of chemistry, especially those that are focused on a certain broad class of chemicals, such as organic chemistry, inorganic chemistry or biochemistry, as opposed to a particular way of understanding chemistry, such as theoretical chemistry. For example the field of bioanalytical chemistry is a growing area of analytical chemistry that addresses all analytical questions in biochemistry, (the chemistry of life). Analytical chemistry and experimental physical chemistry, however, have a unique relationship in that they are very unrelated in their mission but often share the most in common in the tools used in experiments. Analytical chemistry is particularly concerned with the questions of "what chemicals are present, what are their characteristics and in what quantities are they present?" These questions are often involved in questions that are more dynamic such as what chemical reaction an enzyme catalyzes or how fast it does it, or even more dynamic such as what is the transition state of the reaction. Although analytical chemistry addresses these types of questions it stops after they are answered. The logical next steps of understanding what it means, how it fits into a larger system, how can this result be generalized into theory or how it can be used are not analytical chemistry. Since analytical chemistry is based on firm experimental evidence and limits itself to some fairly simple questions to the general public it is most closely associated with hard numbers such as how much lead is in drinking water. Modern analytical chemistry is dominated by instrumental analysis. There are so many different types of instruments today that it can seem like a confusing array of acronyms rather than a unified field of study. Many analytical chemists focus on a single type of instrument. Academics tend to either focus on new applications and discoveries or on new methods of analysis. The discovery of a chemical present in blood that increases the risk of cancer would be a discovery that an analytical chemist might be involved in. An effort to develop a new method might involve the use of a tunable laser to increase the specificity and sensitivity of a spectrometric method. Many methods, once developed, are kept purposely static so that data can be compared over long periods of time. This is particularly true in industrial quality assurance (QA), forensic and environmental applications. Analytical chemistry plays an increasingly important role in the pharmaceutical industry where, aside from QA, it is used in discovery of new drug candidates and in clinical applications where understanding the interactions between the drug and the patient are critical. Analytical methods rely on scrupulous attention to cleanliness, sample preparation, accuracy and precision. Many practitioners will keep all their glassware in acid to prevent contamination, samples will be re-run many times over, and equipment will be washed in specially pure solvents. A standard method for analysis of concentration involves the creation of a calibration curve. If the concentration of element or compound in a sample is too high for the detection range of the technique, it can simply be diluted in a pure solvent. If the amount in the sample is below an instrument's range of measurement, the method of addition can be used. In this method a known quantity of the element or compound under study is added, and the difference between the concentration added, and the concentration observed is the amount actually in the sample. <|fim▁end|> | Brockhouse for development of |
<|fim▁begin|> Queen's Gambit Accepted a b c d e f g h 8 8 7 7 6 6 5 5 4 4 3 3 2 2 1 1 a b c d e f g h Position in Forsyth-Edwards Notation (FEN) rnbqkbnr/ppp1pppp/8/8/2pP4/8/PP2PPPP/RNBQKBNR Moves: 1.d4 d5 2.c4 dxc4 ECO code: D20-D29 Contents 1 Queen's Gambit Accepted 1.1 2...dxc4 1.2 Theory table 1.3 References Queen's Gambit Accepted 2...dxc4 The Queen's Gambit Accepted has a rich heritage in chess, both sides played by many of the world champions through the years. It is not really much of a gambit since white can recover the pawn immediately with 3. Qa4+, though unless white wants the Q placed on c4, this is unnecessary. Black does better not to hold on to the pawn. Attempts to immediately support it with either 3...b5 or 3...Be6 are not advisable. 3...b5 is countered by 4. a4, threatening black's pawn chain at its base, and 3...Be6 allows 4. e4, with white grabbing a large share of the center and threatening a later d5 to kick away the bishop. Black's biggest concern is to take advantage of the time it takes white to recover the pawn to get the pieces active and prepare for key pawn breaks in the center (usually ...c5 or ...e5). White usually has better control of the center and has an easier time developing an advantage, but must play well to achieve this. Major continuations: 3. Nf3 - The classical main line. White develops while maintaining some flexibility. 3. e4 - A newer, but explored continuation. It tends to be more immediately tactical than 3. Nf3 and puts the question to black on which plan regarding the center black wishes to pursue. 3. e3 - Not as aggressive as 3. e4, but otherwise similar in intention. This often transposes into 3. Nf3 lines since white ends up playing e2-e3 anyway. 3. Qa4+ - This is a more modern continuation. While classical theory <|fim▁hole|> queen early, this line aims at posting the queen in an active role, similar to lines of the Catalan. This also avoids any monkey business in trying to hold on to c4. 3.Nc3 - This move looks misguided, as d4 and e5 are not controlled, and the knight is vulnerable to a ...b5 advance. Theory table For explanation of theory tables see theory table and for notation see algebraic notation. 1. d4 d5 2. c4 dxc4 3 4 5 Queen's Gambit Accepted, Classical Nf3Nf6 e3e6 Bxc4c5 = Queen's Gambit AcceptedNc3 c6 e3 b5 a4 b4 = e4e5 Nf3exd4 Bxc4Bb4+ = e3Nf6 Bxc4e6 Nc3a6 = Qa4+Nc6 Nf3Nf6 Nc3Nd5 = When contributing to this Wikibook, please follow the Conventions for organization. References Wikipedia has related information at Queen's Gambit Accepted Batsford Chess Openings 2 (1989, 1994). Garry Kasparov, Raymond Keene. ISBN 0-8050-3409-9. v • d • e Chess Openings1. e4 e5 Open Game · King's Gambit · Bishop's Opening · Vienna · Petrov · Latvian Gambit · Scotch · Giuoco Piano · Two Knights · Ruy Lopez · Philidor Defence1. e4 c5 Sicilian Defence · Closed Sicilian · Taimanov · Sveshnikov · Kan Sicilian · Sicilian Dragon · Scheveningen · Najdorf · Alapin1. e4 other French Defence · Caro-Kann Defence · Pirc Defence · Alekhine Defence · Modern · Scandinavian · Nimzowitsch 1. d4 Nf6 Indian Defence · King's Indian · Nimzo-Indian · Queen's Indian · Grünfeld · Benoni · Budapest · Catalan1. d4 d5 Closed Game · Queen's Gambit · Queen's Gambit Accepted · Queen's Gambit Declined · Chigorin · Slav · Semi-Slav · Marshall1. d4 other Dutch Defence · Old Benoni Defence · Englund Gambit · English Defence · King's Indian Attack · Réti Opening1. a3 · Na3 · a4 · b3 · b4 · c3 · Nc3 · c4 · d3 · d4 · e3 · e4 · f3 · Nf3 · f4 · g3 · g4 · h3 · Nh3 · h4 <|fim▁end|> | shied away from developing the |
<|fim▁begin|> The first thing that needs to be established before making a FLV video is the target audience. The size of a video will be largely dependent on a users available bandwidth. Use the following guide to determine about what video dimension is appropriate for a certain internet connection: Playback from a hard drive or CD: 640 x 480 High-speed Internet: 320 x 240, or 240 x 180 Dial-up: 120 x 90 If you are unsure of the video size of your source video, do the following: In Windows Media Player, choose File > Properties. In Quicktime, choose Window > Show Movie Info. Figure 1 below is a dialogue box for Quicktime. Windows Media will have a similar one. Figure 1: Quicktime movie info. Take note of the dimension and framerate of the movie. Do not resize to a bigger dimension than its original one, otherwise the movie will incur a serious loss of quality, much like resizing an image in Adobe Photoshop to a bigger size. Resizing a video improperly -- whether it is down or up -- may also have its repercussions. Make sure that the aspect ratio stays the same, otherwise the video will become distorted. Do not ignore the framerate. A general rule to consider is that if your video has a lot of fast motion, such as a sports video, then it is better to have a higher framerate. Be careful. The higher the framerate, the more resource intensive the video becomes, and that can lead to slow downs and a choppy video. For a movie encoded at or near 30FPS, such as NTSC video, it is recommended to keep the movie at 15FPS. A movie with a smaller framerate, such as PAL video which is recorded at 25FPS, should be encoded at 12FPS. After establishing the size, framerate, and target audience of the video, it is time to encode it. If you are targeting Flash 8 or 9 users, then use the On2 <|fim▁hole|> are target Flash 6 or 7 users, then use the Sorensen Spark codec. After opening up Flash Video Encoder and adding the movie file to be encoded, click on the "Settings" tab. Here you will be greeted with several preset options. Ignore them. Chances are, the presets will do more damage and provide an undesired result. Click the "Advanced Settings" tab. Refer to Figure 2. Figure 2: Flash 8 Video Encoder The important part is to know whether you want to use On2 VP6 or the Sorensen Spark codec. As stated earlier, it depends largely on your target audience, but only On2 VP6 allows for the use of custom UI with FLVPlayback and skins in Flash Professional 8. If your movie has an alpha channel (transparency), then use On2 VP6, as the earlier codec does not support it. Select either 15FPS or 12FPS. Remember, if your video has a lot of motion, go with the higher framerate if you must. One of the most overlooked aspects of FLV encoding is the keyframe setting. A movie with a lower keyframe setting will usually result in a larger filesize. If your video has to be as small in size as possible, a good bet is to use a keyframe setting of 5 seconds -- that is, multiply your video's framerate times 5 to get the desired keyframe interval. If your movie is encoded at 12FPS, then the keyframe interval should be 60. If you are not satisfied with the quality of the video, then reduce the keyframe interval by a second. In regards to quality, there are a few things to keep in mind. Note, the data rate is a combination of both audio and video: Do not exceed 350kbps in the Data Rate field for broadband situations. Do not exceed 100kbps for dial-up. Oftentimes, a mono soundtrack is all that is required for audio. A mono soundtrack also requires less bandwidth. Generally, 48kbps or 64kbps is sufficient for audio. <|fim▁end|> | VP6 codec. If you |
<|fim▁begin|> Contents 1 Format 2 Opcode 3 Example usage 4 Typical Usage 5 Availability 6 Operation 7 Condition Codes 8 Exceptions and Faults 9 Most Closely-related Instruction 9.1 32-Bit Instructions 9.2 64-Bit Instructions LR - Load Register - RR Instruction - Opcode 18 Format LR 2,6 Copy the contents of register 6 into register 2, replacing the existing contents of register 2 The specific syntax is LR target register, source register. Opcode RR Instruction (2 bytes) Byte 1bits (0-7) Byte 2 target register(8-11) source register (12-15) (in hex) Opcode 18 (4 bits)0..F / (dec 0..15) (4 bits)0..F / (dec 0..15) The first argument is a target register which value is affected by the instruction. The second argument is the source register. The target register and source register values are 0 to 15. Example usage The LR instruction is used to copy the contents of the second register argument (the source register) into the first register argument (the target register), replacing the contents of the target register with the contents of the source register. The following is an example of how the instruction would assemble in various forms from an assembly language listing: 1826 LR 2,6 1892 LR 9,2 18FA LR 15,10 Typical Usage When it is necessary to copy the contents of a register in order to preserve the value in the original register, or where the purpose is to propagate the value contained in one register to another register. Availability The LR instruction is available on all models of the 360, 370 and z/System. Operation The LR instruction copies the 32-bit value from the register specified by the second argument to the register specified by the first argument. Register 0 is valid for either register and is not ignored as in some other instructions. Condition Codes Condition codes are not changed. Exceptions and Faults None. Most Closely-related Instruction[edit source] The most closely-related instruction is Add Logical Register (ALR) and not Load Address (LA), as is sometimes assumed. Whereas L loads a value from memory, LA does not access memory; it only calculates a <|fim▁hole|> does not have to be an address. 32-Bit Instructions[edit source] To load an 8-bit byte (character) value from memory, see IC. To load one or more 8-bit byte values into a register according to a mask, see ICM To load a 16-bit half-word value from memory, see LH. To load a 12-bit unsigned value into a register or add up to 4095 to the values in one or two 32-bit registers, see LA. To copy a 32-bit word value from one register to another register, see LR. To load a 32-bit word value from memory, see L. To store an 8-bit byte (character) value in memory, see STC. To store one or more 8-bit byte values into memory according to a mask, see STCM To store a 16-bit half-word value in memory, see STH. To store a 32-bit word value in memory, see ST. 64-Bit Instructions[edit source] To load a 20-bit signed value into a 32-bit or 64-bit register from an extended (20-bit) signed memory offset, see LAY. To load a 32-bit value into a 64-bit register from an extended (20-bit) signed memory offset, see LGF. To copy a 64-bit value from one 64-bit register to another 64-bit register, see LGR. To load a 64-bit value into a 64-bit register from memory, see LG. To store a 32-bit value from a register to an extended (20-bit) signed memory offset, see STY. To store a 64-bit value from a 64-bit register to an address in memory, see STG. Previous InstructionLPXR 360 Assembly Instructions {{{name}}} Next InstructionLRA Previous Opcode17 Next Opcode19 360 Assembly Language 360 Family Introduction · Basic FAQ · 360 Family · 360 Architecture 360 Instruction Set 360 Instructions · Branch Instructions · Data Transfer Instructions · Control Flow Instructions · Arithmetic Instructions · Logic Instructions · Shift and Rotate Instructions · Other Instructions Syntaxes and Assemblers 360 Assemblers· Pseudo Instructions Instruction Extensions Floating Point · High-Level Languages This page or section is an undeveloped draft or outline.You can help to develop the work, or you can ask for assistance in the project room. <|fim▁end|> | number, which can but |
<|fim▁begin|> Amar Opening a b c d e f g h 8 8 7 7 6 6 5 5 4 4 3 3 2 2 1 1 a b c d e f g h Position in Forsyth-Edwards Notation (FEN) rnbqkbnr/pppp1ppp/8/4p3/8/7N/PPPPPPPP/RNBQKB1R Moves: 1. Nh3 e5 ECO code: A00 Parent: Amar Opening 1... e5 - Amar Opening Refusing to threaten the Knight. Thus, calling White's bluff. A different way, emphasizing the correctness of one's own Knight, might be 1... Nc6. Then 2. d4 is the Mozarabic Opening — trying to put Black's riposte in the wrong equally. When contributing to this Wikibook, please follow the Conventions for organization. References Wikipedia has related information at Amar Opening v • d • e Chess Openings1. e4 e5 Open Game · King's Gambit · Bishop's Opening · Vienna · Petrov · Latvian Gambit · Scotch · Giuoco Piano · Two Knights · Ruy Lopez · Philidor Defence1. e4 c5 <|fim▁hole|> · Taimanov · Sveshnikov · Kan Sicilian · Sicilian Dragon · Scheveningen · Najdorf · Alapin1. e4 other French Defence · Caro-Kann Defence · Pirc Defence · Alekhine Defence · Modern · Scandinavian · Nimzowitsch 1. d4 Nf6 Indian Defence · King's Indian · Nimzo-Indian · Queen's Indian · Grünfeld · Benoni · Budapest · Catalan1. d4 d5 Closed Game · Queen's Gambit · Queen's Gambit Accepted · Queen's Gambit Declined · Chigorin · Slav · Semi-Slav · Marshall1. d4 other Dutch Defence · Old Benoni Defence · Englund Gambit · English Defence · King's Indian Attack · Réti Opening1. a3 · Na3 · a4 · b3 · b4 · c3 · Nc3 · c4 · d3 · d4 · e3 · e4 · f3 · Nf3 · f4 · g3 · g4 · h3 · Nh3 · h4 This Chess related article is a Wikibooks:Chess stub. Please assist Wikibooks by expanding it. <|fim▁end|> | Sicilian Defence · Closed Sicilian |
<|fim▁begin|> Cotransporters Cotransporters are protein pumps used to export or import small molecules. It is sometimes equated with symporter, but the term "cotransporter" refers both to symporters and antiporters (though not uniporters). They utilize active transport, meaning that they require some sort of energy to carry out its process. Cotransporters are secondary active transporters, which means they use an electrochemical gradient as a means of energy. It works by binding to two molecules or ions at a time and using the gradient of one solute's concentration to force the other molecule or ion against its gradient. Primary active transporters, on the other hand, use chemical energy like ATP. The electrochemical gradient for the cotransporter is due to the movement of Na + and H+ ions. This powers the movement of another substance that is pumped either in or out, against the concentration gradient. An example is the movement of glucose. In order for the transportation of glucose to be in the opposite direction of the concentration gradient, sodium ions are needed. Na+ ions are moved across the cell membrane by a transmembrane voltage gradient (movement from an area of positive charge to negative charge), and by a concentration gradient (from an area of high concentration to low concentration). Glucose is then coupled and moved against its concentration gradient. When the Na+ ion, an example of a cotransported ion, moves in the same direction as the coupled substance, it is call symporter; movement in the opposite direction of a substance is called antiporter.' Transport of glucose in animal cells by symporters A symporter is an integral membrane protein that is involved in movement of two or more different molecules or ions across a phospholipid membrane such as the plasma membrane in the same direction, and is therefore a type of cotransporter. Cotransporters are used for the transport of glucose in the cell. Glucose is needed in different organs, but there is already an abundance of glucose in these areas. This prevents glucose from entering by passive transport. Active transport is thus used, using a 2Na+/1Glucose symporter. The transporter moves one glucose in for every two <|fim▁hole|> in the same ratio. What forces are used to drive the substances in and out of the cells? As mentioned before, the electrochemical gradient and the concentration gradient of the Na+ ion allows this process to happen. This is done by the free energy change (ΔG) of transportation of Na+ ions. The concentration of Na+ ions is either higher or lower inside the cell than outside. The charge of the cell is also either inside negative or inside positive. The flow of Na+ ions is either to the inside or the outside, depending on which side has more Na+ ions and the charge of each side. Na+, like all particles, will go from an area of low concentration to high concentration. In addition, Na+ will move from an area of positive charge to negative charge, until there is a balance between the concentration of Na+ and a balance between the charges. This is the equilibrium potential, and it can be calculated by the Nernst equation. There is a free energy change of the cell for the transport of Na+ ions, which will affect the concentration of glucose inside and outside the membrane. Transport of calcium ions from cardiac muscle cells by antiporter An antiporter (also called exchanger or counter-transporter) is an integral membrane protein which is involved in secondary active transport of two or more different molecules or ions (i.e. solutes) across a phospholipid membrane such as the plasma membrane in opposite directions. In secondary active transport, one species of solute moves along its electrochemical gradient, allowing a different species to move against its own electrochemical gradient. This movement is in contrast to primary active transport, in which all solutes are moved against their concentration gradients, fueled by ATP. Antiporters play a key role in movement of calcium ions out of cardiac muscle cells. For every 3 Na+ ions out (or in) the membrane, 1 Ca2+ ions are pumped oppositely in (or out) the membrane. This is significant for different physiological functions, such as relaxation of cardiac muscles, maintenance of calcium ion concentration in different cellular organelles, control of neurosecretion, and other functions. <|fim▁end|> | sodium ion, and moves them out |
<|fim▁begin|> Почта СССР CPA catalogue ← 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 → CPA Nr 1857-1971 (115 stamps, 49 series) Here complete descriptions of 1956 USSR stamps are given. Здесь приведены полные описания почтовых марок СССР 1956 года. All available images of 1956 USSR stamps are on the Wikimedia Commons: Все имеющиеся изображения почтовых марок СССР 1956 года находятся на Викискладе: Stamps of the Soviet Union, 1956 You can also see standard images of 1956 USSR stamps on Wikimedia commons: Типовые изображения почтовых марок СССР 1956 года можно также посмотреть на Викискладе: Каталог ЦФА (1001-2000) Attention! The stamps are sorted by CPA (Central Philatelic Agency) catalog numbers, not by dates of their issue! Внимание! Марки отсортированы по номерам каталога ЦФА, а не по дате выпуска! The names of stamps and stamp series are made according to all used 7 catalogues[1][2][3][4][5][6][7]. Названия марок и серий марок составлены по всем используемым 7 каталогам. Names of articles of Wikipedia are whenever possible used in names of stamps and series. В названия марок и серий по возможности использованы названия статей Википедии. Contents 1 Short descriptions / Краткие описания 1.1 48 1956.12.31 (Writers) 1.2 49 1956.12.31 (First Theater) 2 Sources / Источники Short descriptions / Краткие описания C - Commemorative stamp (Коммеморативная марка) 48 1956.12.31 (Writers) 48 Famous Writers of our Homeland[5] (Writers) Beginining of the series (CPA 1966-1970, 1972-1976, 2117-2118, 2289-2295, 2442) (20 stamps) 48. Писатели нашей Родины. Начало серии # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1956.110-48.1 C 40k Mikhail Lomonosov (after Leontius Miropolsky) and the Kunstkamera in Saint Petersburg 1966 1873 1920 1898 (A1012) 1908 (bbp) 2040 (645) 1884 #1956.111-48.2 C 40k Alexander Pushkin and Bronze Horseman in Saint Petersburg 1967 1874 1921 1899 (A1012) 1909 (bbr) 2042 1885 #1956.112-48.3 C 40k Leo Tolstoy and Scene from War and Peace 1968 1875 <|fim▁hole|> 1887 #1956.113-48.4 C 40k Maxim Gorky (after Vasily Yefanov) and Scene from The Mother 1969 1876 1923 1900 (A1012) 1907 (bbo) 2041 1883 #1956.114-48.5 C 40k Shota Rustaveli and Episode from The Knight in the Panther's Skin 1970 1877 1924 1901 (A1012) 1910 (bbs) 2043 1886 49 1956.12.31 (First Theater) 49 Bicentenary of the Founding of the St. Petersburg State Theater, the First in Russia (First Theater) 49. 200-летие со дня учреждения в Петербурге первого в России государственного театра # Vol. Short description CPA SC Liapine Scott Michel SG Yvert #1956.115-49.1 C 40k Fyodor Volkov (after Anton Losenko) and Menshikov Palace[2] 1971 1872 1925 1904 (A1013) 1906 (bbn) 2039 (644) 1882 Sources / Источники ↑ Stamps of USSR. 1918-1980. 2 volums. Editor M. I. Spivak. / Каталог почтовых марок СССР. 1918-1980. В 2 томах. Ред. М. И. Спивак. М.: ЦФА "Союзпечать" Минсвязи СССР, 1983. ↑ a b Zagorsky, Valeriy. "Standard Collection". / Валерий Загорский. Стандарт-коллекция. http://standard-collection.ru/ru/catalogs/elektronnye-versii.html. Retrieved 2015-01-05. ↑ Liapine, Viktor. Catalog of stamps of Russia (1856-1991). 2008. / Ляпин Виктор. Каталог почтовых марок России (1856-1991). М.: Издатель И. В. Балабанов, 2008. ↑ Scott Standard Postage Stamp Catalogue. 2009. Volume 5 P-SL. Amos Press Inc., 2009. / Каталог Скотт за 2009 год. Том 5 P-SL. ↑ a b Michel. Europa-Katalog. Band 7. 2009/2010. Osteuropa. Schwaneberger Verlag GMBH, 2009. / Каталог Михель за 2009/2010 год. 7-я книга из 7 книг Европы. Представлена восточная Европа. ↑ Stanley Gibbons. Simplified Catalogue. Stamps of the World. 2006. Volume 4. Countries N-R. 71st Edition. Stanley Gibbons Ltd., 2005. / Стэнли Гиббонс. Упрощенный каталог. Марки мира. 2006. Том 4. Страны Н-Р. 71-я редакция. Stanley Gibbons Ltd., 2005. ↑ Yvert et Tellier. 1980. Tome 2. Timbres d'Europe. / Каталог "Ивер и Телье". 1980. Том 2. Почтовые марки Европы. Почта СССР CPA catalogue ← 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 → <|fim▁end|> | 1922 1897 (A1012) 1911 (bbt) 2044 |
<|fim▁begin|> Return to Main Page Manga Study Guide: Barefoot Gen ← Gutter Line Lines used in Manga Lines are a common use in comics. They are often used to emphasize situations or add extra information to the scene. Most commonly they are used to express action, motion, mood, power or depression. Action lines: Action lines are usually parallel straight, diagonal or curved lines. Action lines have two main categories, one being focus lines and the other speed lines. Focus lines are used to create focus towards a certain object/person by using thus focus lines via outward projections. (image) Speed lines are a combination of a lot of lines going in <|fim▁hole|> lines. It is used to indicate velocity, or speed, in the scene whilst directing where the character(s) is moving towards. (image) Mood/atmospheric lines: These lines are often curved, spiky or even shown like smoke to indicate the atmosphere or the current mood of a character or an object. They are often around –or emitted from - a character or object making it seem like steam is coming off them. (image) Depressing lines: Lines to show depression are mainly vertical straight lines. These indicate the character's feeling towards the situation. Next Page: END OF BOOK | Previous Page: Analysis (Q& A from study guide) Home: Manga Study Guide: Barefoot Gen <|fim▁end|> | the same direction, usually parallel straight |
<|fim▁begin|> Optimal filtering is a means of adaptive extraction of a weak desired signal in the presence of noise and interfering signals. The goal of optimal filtering is to design a filter that acts on the output z {\displaystyle z} of the generalized plant and optimizes the transfer matrix from w to the filtered output. Contents 1 The System: 2 The Data 3 The Optimization Problem: 4 The LMI: H ∞ {\displaystyle H_{\infty }} - Optimal filter 5 Conclusion: 6 Implementation 7 External links The System: Consider the continuous-time generalized LTI plant with minimal states-space realization x ˙ = A x + B 1 w z = C 1 x + D 11 w , y = C 2 x + D 21 w , {\displaystyle {\begin{aligned}{\dot {x}}&=Ax+B_{1}w\\z&=C_{1}x+D_{11}w,\\y&=C_{2}x+D_{21}w,\end{aligned}}} where it is assumed that A {\displaystyle A} is Hurwitz. The Data The matrices needed as inputs are A , B 1 , C 2 , C 1 , , D 11 , D 21 {\displaystyle A,B_{1},C_{2},C_{1},,D_{11},D_{21}} . The Optimization Problem: An H ∞ {\displaystyle H\infty } -optimal filter is designed to minimize the H ∞ {\displaystyle H_{\infty }} norm of P ~ ( s ) {\displaystyle {\tilde {P}}(s)} in following equation. P ~ ( s ) = C ~ 1 ( s I − A ~ ) − 1 B ~ 1 + D ~ 11 , where A ~ = [ A 0 B f C 2 A f ] < 0 B ~ 1 = [ B 1 B f D 21 ] < 0 C ~ 1 = [ C 1 − D f C 2 − C f ] < 0 D ~ 11 = D 11 − D <|fim▁hole|> {\begin{aligned}{\tilde {P}}(s)={\tilde {C}}_{1}(sI-{\tilde {A}})^{-}1{\tilde {B}}_{1}+{\tilde {D}}_{11},\\{\text{where}}\\{\tilde {A}}={\begin{bmatrix}A&&0\\B_{f}C_{2}&&A_{f}\end{bmatrix}}&<0\\{\tilde {B}}_{1}={\begin{bmatrix}B_{1}\\B_{f}D_{21}\end{bmatrix}}&<0\\{\tilde {C}}_{1}={\begin{bmatrix}C_{1}-D_{f}C_{2}-C_{f}\end{bmatrix}}&<0\\{\tilde {D}}_{11}=D_{11}-D_{f}D_{21}\\\end{aligned}}} The LMI: H ∞ {\displaystyle H_{\infty }} - Optimal filter Solve for A n ∈ R n x × n x , B n ∈ R n x × n y , C f ∈ R n x × n x {\displaystyle A_{n}\in \mathbb {R} ^{n_{x}\times n_{x}},B_{n}\in \mathbb {R} ^{n_{x}\times n_{y}},C_{f}\in \mathbb {R} ^{n_{x}\times n_{x}}} , X , Y ∈ S n x {\displaystyle X,Y\in \mathbb {S} ^{n_{x}}} and ν ∈ R > 0 {\displaystyle \nu \in \mathbb {R} _{>0}} that minimize ζ ( ν ) = ν {\displaystyle \zeta (\nu )=\nu } subject to X > 0 , Y > 0 {\displaystyle X>0,Y>0} . [ Y A + A T Y + B n C 2 A n + C 2 T B n T + A T X Y B 1 + B n D 21 C 1 T − C 2 T D f T ⋆ A n + A n T X B 1 + B n D 21 − C f T ⋆ ⋆ − γ I D 1 1 T − D 2 1 T D f T ⋆ ⋆ ⋆ − γ I ] < 0 Y − X > 0 {\displaystyle {\begin{aligned}{\begin{bmatrix}YA+A^{T}Y+B_{n}C_{2}&&A_{n}+C_{2}^{T}B_{n}^{T}+A^{T}X&&YB_{1}+B_{n}D_{21}&&{C_{1}}^{T}-{C_{2}}^{T}{D_{f}}^{T}\\\star &&A_{n}+A_{n}^{T}&&XB_{1}+B_{n}D_{21}&&-{C_{f}}^{T}\\\star &&\star &&-\gamma I&&{D_{1}1}^{T}-{D_{2}1}^{T}{D_{f}}^{T}\\\star &&\star &&\star &&-\gamma I\end{bmatrix}}&<0\\\\Y-X>0\\\end{aligned}}} Conclusion: The filter is recovered by A f = X − 1 A n {\displaystyle A_{f}=X^{-1}A_{n}} and B f = X − 1 B n {\displaystyle B_{f}=X^{-1}B_{n}} . Implementation https://github.com/Ricky-10/coding107/blob/master/Hinfinity%20Optimal%20filter- H ∞ {\displaystyle H\infty } - Optimal Filter External links [1]- Optimal Filtering LMI Properties and Applications in Systems, Stability, and Control Theory - A List of LMIs by Ryan Caverly and James Forbes. <|fim▁end|> | f D 21 {\displaystyle |
<|fim▁begin|> Contents 1 Introduction 2 Evidence in Biology 3 Evidence in Psychology 4 Evidence in Social Anthropology 5 Integration of Evidence and Conclusion 6 References Introduction Transgenderism is the phenomenon whereby a person's gender identity does not correspond to the sex they were assigned at birth.[1] Although this concept exists cross-culturally and throughout history, it is difficult to distinguish between the various terms used (e.g. transsexual, third gender) and their boundaries. Fluctuating definitions of the phenomenon are derived from different disciplines, in which evidence also takes various, conflicting forms. Psychology, biology and social anthropology tackle transgenderism from different perspectives, using various methodologies, research tools and frameworks. To formulate a comprehensive understanding of transgenderism and expand societal consciousness on the issue, it is important to identify the tensions and values behind evidence in each discipline. Evidence in Biology Biological studies on the causes of transgenderism involve different fields of the discipline: genetics, brain activity and biological factors; while employing different methodologies. In genetic research, biologists use heritability studies in families to see if inherited genes from previous generations could influence gender identity. Similarly, twin study designs are used as evidence. By comparing the concordance rate in DNA among monozygotic and dizygotic twins, they obtain data to estimate the genetic contribution of gender identity. Though this method is one of the most widely used, it yields some limitations as the instruments used to measure gender identity may be confused with gender expression.[2] Biologists also conduct molecular genetic studies to examine the consequences of prenatal hormone exposure, focusing on sex-hormones receptors that could be responsible for undermasculanisation-feminism. Studies typically investigate small sample sizes or individual genes, and conduct a statistical analysis to see which ones are overrepresented to draw conclusions. However, further work and replications in this area is needed before considering it as strong evidence.[3] Finally, biologists look for quantitative evidence in parts of the brain that account for sexual dimorphism. Typically, researchers compare brain structure and activity between cisgender and transgender people using various medical imaging techniques such as functional Magnetic Resonance Imaging (fMRI) and Positron Emission Tomography (PET).[4] This examines if brain regions in transgender people resemble the genders they identify with, rather than the one they were assigned to. Studies show that it is indeed generally the case.[5] Evidence in Psychology Psychological research into the cause of transgenderism tends to focus heavily on the experience of the individual, providing significant quantitative evidence by either quantifying qualitative evidence or using methodologies that rely on interviews and questionnaires, as well as observation.[6] Early methods of obtaining evidence were overwhelmingly case-study based, with the first research in 1949 from Cauldwell based entirely on one individual. This was useful in giving a snapshot of period typical attitudes to transgenderism as a mental immaturity brought on by a disruptive upbringing and genetic predisposition, whilst demonstrating an accurate qualitative account of personal experience.[7] However, this methodology is not conducive to generating quantifiable evidence applicable to other individuals, hence the recent shift towards alternate methodologies. Recent methods of obtaining evidence include experiments exploring the sociocultural backgrounds of transgender individuals and gender identity development during childhood.[8] These methods are more conducive to establishing universal laws within the discipline as they generate large sets of quantitative data for evidence that can be studied to identify causal relationships.[9] It has been found that children display knowledge of typical gender stereotypes long before they show a differentiation between sex based on genital information, highlighting psychology’s emphasis on the importance of ‘nurture’ over ‘nature’ and more biologically based theories. However these types of methodologies, despite rising ethical standards in recent years, tend to lack consideration for transgender individuals within the structure of the methodology, eg. continuing to use binary terms such as male and female within questionnaires.[10] Therefore, there are still improvements to be made to the methodologies used in psychological research to collect evidence. Evidence in Social Anthropology The main evidence used by anthropologists is ethnographic evidence collected by methods like fieldwork, participant observation or interviews, which are predominantly qualitative. The data is then analysed using the framework of anthropological theories or positionalities, such as structuralism, feminist or queer theory. Social anthropology’s evidence of transgenderism consists of analysing the lived experiences of transgender people through ethnography, and exploring the context-dependent existence of transgenderism and its expressions. It explains transgenderism as part of identity and often with a level of agency and performativity[11] that other disciplines neglect because social anthropology uses evidence by relational methodologies. For example, the Travesti in Brazil are biologically male but acquire female body characteristics. However, although ethnographic research shows that they are viewed as women psychologically (similar to the view in scientific disciplines), the Travesti may not see themselves as transgender.[12] The qualitative approach of social anthropology is important because the definition of transgenderism varies cross-culturally and temporally/[13] The Western male-female binary framework[14] exemplifies this need for <|fim▁hole|> not universally applicable or correct, as demonstrated by various global ethnographic studies[15], or carry colonially-impacted ideas. Furthermore, queer theory suggests that gender is distinct from sex and can be socially constructed. Thus, notions of gender may vary cross-culturally, so queer theory can be used as a framework in social anthropology to explore the relation between gender, biological sex[16] and transgenderism. Social anthropology situates lived transgender experiences within their societal context (e.g. class, race)[17], taking into account the impact of intersecting factors[18] on transgenderism, gender binaries, or labels used in various societies, such as colonialism in the history of a society having an impact on cultural perception on gender or transgender issues. Reflexivity in social anthropology takes into account the positionality[19] of the ethnographer and puts into question possible biases within their methodology, ethnographic evidence and analysis. Integration of Evidence and Conclusion By integrating evidence from the three disciplines, a more holistic understanding of transgenderism can be gained. In Biology, limitations of the twin study design (i.e. distinction between measurement of gender identity and expression) may be improved upon by using more subjective evidence from other disciplines. Psychology may use social experiments with participants in various age groups to distinguish between gender expression and identity, as childhood may be a key time in establishing stereotypes. Social anthropology may obtain evidence from individuals using interviews/testimony instead of quantitative evidence. Combining these through an interdisciplinary approach will give the most efficient use of evidence. However, interdisciplinary tensions could stem from differences in methodologies used by social anthropology and scientific disciplines. Due to reliance on qualitative evidence such as interviews or observations by ethnographers in social anthropology, clashes in evidence may happen as quantitative evidence tends to hold more authority, potentially leading to a power imbalance across the disciplines or favouring evidence from natural sciences. However, by quantifying experiences, the subjectivity of transgender experiences cannot be captured. By reducing transgenderism to biological or psychological factors, there is loss of societal context and the variety of lived transgender experiences across cultures. Causes of transgenderism are complex and it is unlikely that an exact set of explanations can be found within one discipline. In order to apply evidence to real life, it is important to be aware of why certain types of evidence are used, and what they measure and fail to capture. Awareness of these disciplinary tensions allows for a comprehensive, interdisciplinary application of evidence to be used in understanding transgenderism. References ↑ Education G. Advocacy, Inc.(2001). Gender variance: A primer. 2010. ↑ Polderman T, Kreukels B, Irwig M, Beach L, Chan Y, Derks E et al. The Biological Contributions to Gender Identity and Gender Diversity: Bringing Data to the Table. Behavior Genetics. 2018;48(2):95-108. ↑ Polderman T, Kreukels B, Irwig M, Beach L, Chan Y, Derks E et al. The Biological Contributions to Gender Identity and Gender Diversity: Bringing Data to the Table. Behavior Genetics. 2018;48(2):95-108. ↑ Demitri, M. M.D. Types of Brain Imaging Techniques [Internet]. Psych Central. 2019 [cited 3 December 2019]. Available from: https://psychcentral.com/lib/types-of-brain-imaging-techniques/ ↑ Diamant L, McAnulty R. The Psychology of sexual orientation, behavior, and identity. Westport, Conn.: Greenwood Press; 1995. ↑ Howitt D, Cramer D. Research methods in psychology. 2nd ed. Harlow: Pearson Education Limited; 2008 ↑ Stryker S, Whittle S. The Transgender Studies Reader. New York: Routledge; 2006. ↑ Ashmore R, Del Boca F. The Social Psychology of Female-Male Relations: A Critical Analysis of Central Concepts. 1st ed. London: Academic Press Inc. (London) Ltd.; 1986 ↑ Howitt D, Cramer D. Research methods in psychology. 2nd ed. Harlow: Pearson Education Limited; 2008 ↑ Vincent B. Studying trans: recommendations for ethical recruitment and collaboration with transgender participants in academic research. Psychology & Sexuality [Internet]. 2018 [cited 12 December 2020];9(2):102-116. Available from: https://www.tandfonline.com/doi/abs/10.1080/19419899.2018.1434558 ↑ Eyre S, de Guzman R, Donovan A, Boissiere C. ′Hormones is not magic wands′: Ethnography of a transgender scene in Oakland, California. Ethnography [Internet]. 2004 [cited 11 December 2020];5(2):147-172. Available from: https://www.jstor.org/stable/24047834 ↑ Kulick D. Travesti: Sex, gender, and culture among Brazilian transgendered prostitutes. University of Chicago Press; 1998 Nov 15. ↑ Ekins R, King D. The transgender phenomenon. Sage; 2006 Oct 23. p.14-16 ↑ Nanda S. Gender diversity: Crosscultural variations. Waveland Press; 2014 Jan 22. p. 1 ↑ Peletz M. Transgenderism and Gender Pluralism in Southeast Asia since Early Modern Times. Current Anthropology. 2006;47(2):309-336. ↑ Fausto-Sterling A. Sexing the body: Gender politics and the construction of sexuality. Basic Books; 2000. ↑ Towle EB, Morgan LM. Romancing the transgender native: rethinking the use of the" third gender" concept. GLQ: A journal of lesbian and gay studies. 2002;8(4):469-97. p.471 ↑ Boellstorff T. Queer studies in the house of anthropology. Annual review of anthropology. 2007 Sep 28;36. p. 26 ↑ Johnson M, Jackson P, Herdt G. Critical regionalities and the study of gender and sexual diversity in South East and East Asia. Culture, Health & Sexuality. 2000 Jan 1;2(4):361-75. p. 367 <|fim▁end|> | contextualisation of evidence as it is |
<|fim▁begin|> Embedded Systems This chapter will discuss some particular RTOS implementations. We may use some technical terms described in the Real-Time Operating Systems chapter. Requested RTOS Use this page to request or suggest a new chapter about a new RTOS. Add new RTOS's here before adding them to the main page. Do not list an RTOS on the main page if you do not intend on writing a chapter for it yourself. There are far too many different RTOS's in this world to list every instance on the main table of contents, and expect other users to fill in the blanks. Many RTOS are designed for a particular purpose, and few are common enough that other contributors can be expected to have some experience with them. µC/OS-III [1] INTEGRITY velOSity u-velOSity QNX (Operating System Design/Case Studies/QNX) VxWorks LynxOS FreeRTOS [2]. In particular there is a port of FreeRTOS as an Arduino library [3]; more generally FreeRTOS has been ported to many processors, including the ARM [4] and the AVR [5]. eCos ST OS20 FreeOSEK [6] DSPnano [7] Unison [8] Atomthreads [9] BeRTOS [10] ERIKA Enterprise [11] OPENRTOS [12] SAFERTOS [13] PikeOS® is a hard real-time operating system (RTOS) : PikeOS combines a real-time operating system (RTOS) with a virtualization platform and Eclipse-based integrated development environment (IDE) for embedded systems. RTEMS for Embedded Software Developers KRNL - an open source realtime kernel (KRNL) for the Arduino platform.[14] Everyman Kernel [15] - a well-documented simple hard-real-time kernel released under the 2-clause FreeBSD license. Many embedded systems have no "operating system" other than a Forth or BASIC interpreter. Common embedded operating systems In this book, we discuss these operating systems commonly used in embedded systems: Palm OS ( Programming for Palm OS ) Windows CE MS-DOS or DOS Clones Linux, including RTLinux and MontaVista Linux and Unison OS For further reading Wikipedia has more about this subject: Embedded operating system Wikipedia has more about this subject: List of operating systems#Embedded Wikipedia has more about this subject: Comparison of open source operating systems A variety of embedded systems and RTOS are based on Linux—see Embedded Systems/Linux for details. Embedded Control Systems Design/Operating systems Wikipedia: LynxOS: A POSIX® general-purpose, feature-rich, multi-core hard real-time real time RTOS. Wikipedia: LynxOS-178: A native POSIX® hard real-time partitioning operating system developed and certified to FAA DO-178C DAL A safety standards. Wikipedia:INTEGRITY: A small, message passing, hard real-time micro kernel with memory protection designed for safety critical and high security devices. Wikipedia:Contiki: a small, open source, operating system developed for use on a number of smallish systems ranging from 8-bit computers to embedded microcontrollers. Wikipedia: eCos (embedded Configurable operating system): an open source, royalty-free, real-time operating system intended for embedded systems and applications. ... eCos was designed for devices with memory footprints in the tens to hundreds of <|fim▁hole|> Wikipedia:DSP/BIOS: a royalty-free real-time multi-tasking kernel (mini-operating-system) created by Texas Instruments. Wikipedia:QNX Wikipedia:VxWorks: A small footprint, scalable, high-performance RTOS Wikipedia:Windows CE Wikipedia:Palm OS "pico]OS" [16] has been ported to the Atmel AVR, the ARM, and the 80x86 Wikipedia: OSEK is not an OS, but an open standard for automotive real-time operating systems. MaRTE OS - Minimal Real-Time Operating System for Embedded Applications (Is this related to Wikipedia: MARTE ?) Wikipedia: TinyOS is an open-source operating system designed for wireless embedded sensor networks ("networked sensors"). Wikipedia: ChibiOS/RT is an open-source real-time operating system that supports LPC214x, AT91SAM7X, STM32F103x and ATmega processors. Wikipedia: Fusion RTOS is a license-free embedded operating system that supports ARM, Analog Devices Blackfin, Motorola StarCore and Motorola DSP 56800E. Wikipedia: FreeRTOS is an open-source embedded operating system kernel that supports ARM, Atmel AVR, AVR32, HCS12, MicroBlaze, MSP430, PIC18, dsPIC, Renesas H8/S, x86, 8052 processors. FreeRTOS can be configured for both preemptive or cooperative operation. FreeRTOS and OPENRTOS share the same code base, SAFERTOS shares the same functional model. RTEMS for Embedded Software Developers (Wikipedia: RTEMS) (Real-Time Executive for Multiprocessor Systems) is a free open source real-time operating system (RTOS) designed for embedded systems. Wikipedia: MicroC/OS-II is an embedded RTOS intended for safety critical embedded systems such as aviation, medical systems and nuclear installations; it supports a wide variety of embedded processors. "The Real-time Operating system Nucleus" Wikipedia: TRON Project Wikipedia: DSPnano RTOS Ultra Tiny Embedded Linux and POSIX compatible RTOS for 8/16 Bit MCUs with Dual Licensing. Free open source versions and commercially supported versions for MCUs, DSCs and DSPs. Wikipedia: Unison RTOS Ultra Tiny Embedded Linux and POSIX compatible RTOS for 32 Bit MCUs with Dual Licensing. Free open source versions and commercially supported versions for MCUs, DSCs and DSPs. Wikipedia: BeRTOS is a real time open source operating system supplied with drivers and libraries designed for the rapid development of embedded software. It supports ARM, Atmel AVR, AVR32, BeRTOS can be configured for both preemptive or cooperative operation. Perfect for building commercial applications with no license costs nor royalties. NuttX is a BSD licensed real-time embedded operating system that supports various ARM (including Cortex-M3), Intel 8052, Intel x86, Freescale M68HC12, Atmel AVR32, Hitachi SuperH and Zilog Z80 systems Wikipedia: Ethernut#Nut/OS is a modular, open source, real time operating system for embedded platforms, the principal operating system of the Wikipedia: Ethernut board. It is easily configurable and optimized to run on 8 and 32 bit microcontrollers. Wikipedia: ERIKA Enterprise is an open-source implementation of the OSEK/VDX API. ERIKA Enterprise includes also RT-Druid, which is a development environment distributed as a set of Eclipse plugins. Wikipedia: Threadx is a small, fast, SIL 4 and ASIL D safety certified embedded operating system that supports ARC, ARM, PowerPC, RISC-V, Renesas RX/SH/V85x, MIPS, and Xtensa embedded processors. <|fim▁end|> | kilobytes, or with real-time requirements. |
<|fim▁begin|> Ba Zi | Heavenly Stems | Earthly Branches | Hsia Calendar (Xia Calendar) | Hour Pillar | Luck Pillar | Life Cycle | Hidden Stems | Seasonal Cycle | Symbolic Stars | Aspects Of Life | Date Selection | List Of Ba Zi Contents 1 Abbreviations 2 0F 3 1F 4 2F 5 3F 6 4F 7 5F 8 6F 9 7F 10 8F 11 9F 12 10F Abbreviations "HS" refers to Heavenly Stems, "EB" refers to Earthly Branches, and "Hid" refers to Hidden Stems. 0F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 0] in direction F (forward). Age: 70 to 74 60 to 64 50 to 54 40 to 44 30 to 34 20 to 24 10 to 14 0 to 4 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 75 to 79 65 to 69 55 to 59 45 to 49 35 to 39 25 to 29 15 to 19 5 to 9 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 1F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 1] in direction F (forward). Age: 71 to 75 61 to 65 51 to 55 41 to 45 31 to 35 21 to 25 11 to 15 1 to 5 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 76 to 80 66 to 70 56 to 60 46 to 50 36 to 40 26 to 30 16 to 20 6 to 10 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 2F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 2] in direction F (forward). Age: 72 to 76 62 to 66 52 to 56 42 to 46 32 to 36 22 to 26 12 to 16 2 to 6 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 77 to 81 67 to 71 57 to 61 47 to 51 37 to 41 27 to 31 17 to 21 7 to 11 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 3F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 3] in direction F (forward). Age: 73 to 77 63 to 67 53 to 57 43 to 47 33 to 37 23 to 27 13 to 17 3 to 7 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 78 to 82 68 to 72 58 to 62 48 to 52 38 to 42 28 to 32 18 to 22 8 to 12 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 4F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 4] in direction F (forward). Age: 74 to 78 64 to 68 54 to 58 44 to 48 34 to 38 24 to 28 14 to 18 4 to 8 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 79 to 83 69 to 73 59 to 63 49 to 53 39 to 43 29 to 33 19 to 23 9 to 13 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 5F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 5] in direction F (forward). Age: 75 to <|fim▁hole|> 55 to 59 45 to 49 35 to 39 25 to 29 15 to 19 5 to 9 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 80 to 84 70 to 74 60 to 64 50 to 54 40 to 44 30 to 34 20 to 24 10 to 14 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 6F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 6] in direction F (forward). Age: 76 to 80 66 to 70 56 to 60 46 to 50 36 to 40 26 to 30 16 to 20 6 to 10 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 81 to 85 71 to 75 61 to 65 51 to 55 41 to 45 31 to 35 21 to 25 11 to 15 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 7F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 7] in direction F (forward). Age: 77 to 81 67 to 71 57 to 61 47 to 51 37 to 41 27 to 31 17 to 21 7 to 11 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 82 to 86 72 to 76 62 to 66 52 to 56 42 to 46 32 to 36 22 to 26 12 to 16 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 8F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 8] in direction F (forward). Age: 78 to 82 68 to 72 58 to 62 48 to 52 38 to 42 28 to 32 18 to 22 8 to 12 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 83 to 87 73 to 77 63 to 67 53 to 57 43 to 47 33 to 37 23 to 27 13 to 17 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 9F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 9] in direction F (forward). Age: 79 to 83 69 to 73 59 to 63 49 to 53 39 to 43 29 to 33 19 to 23 9 to 13 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 84 to 88 74 to 78 64 to 68 54 to 58 44 to 48 34 to 38 24 to 28 14 to 18 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 10F Luck Pillars for H3 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 10] in direction F (forward). Age: 80 to 84 70 to 74 60 to 64 50 to 54 40 to 44 30 to 34 20 to 24 10 to 14 HS: H10 H9 H8 H7 H6 H5 H4 H3 Age: 85 to 89 75 to 79 65 to 69 55 to 59 45 to 49 35 to 39 25 to 29 15 to 19 EB: E8 E7 E6 E5 E4 E3 E2 E1 Hid: H4, H6, H2 H4, H6 H7, H3, H5 H10, H5, H2 H2 H5, H1, H3 H8, H6, H10 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 <|fim▁end|> | 79 65 to 69 |
<|fim▁begin|> See also Note: Pinyin tone marking Contents 1 2014-12-31 1.1 China's industry shrinks 1.2 Special economic zones create miracles 2 2014-12-30 2.1 Ebola kills 7,500 2.2 Afghanistan's bloody year 2014 3 2014-12-29 3.1 Guangzhou-Guiyang highspeed rail opened 3.2 China completes USD80bn canal 3.3 Smoking damages the whole body 4 2014-12-27 4.1 Nicaragua Canal begins construction 5 2014-12-26 5.1 China buys 60 Boeing 737 5.2 India rebel army kills 72 5.3 AU soldiers killed 6 2014-12-23 6.1 Exercise keeps body fit 6.2 Insufficient sleep causes obesity 7 2014-12-16 7.1 Executed Chinese teenage innocent 8 2014-12-08 8.1 Paris to ban diesel cars 9 2014-12-05 9.1 Obesity causes disability 10 2014-11-25 10.1 China manufacturing slows down 11 2014-11-14 11.1 China's economy slows down 12 2014-11-13 12.1 Ebola kills more than 5,000 13 2014-11-11 13.1 Afghanistan Taliban kills 10 policemen 14 2014-10-14 14.1 Taliban kills 22 Afghanistan soldiers 15 2014-10-12 15.1 Police chief of Iraq's Anbar province killed 15.2 Stock markets fall sharply 15.3 Boko Haram releases Chinese hostages 16 2014-10-11 16.1 China has confidence in HK stability 16.2 Ebola deaths exceed 4,000 17 2014-10-10 17.1 Smog spreads over northern China 18 2014-10-09 18.1 Tens of thousands displaced by China quake 18.2 UK sends troops to tackle Ebola 19 2014-10-07 19.1 Bad news hit stock markets 19.2 Colombia lightning kills 11 people 20 2014-10-06 20.1 IS occupies key town in Syria 21 2014-10-03 21.1 India stampede kills dozens 21.2 UN soldiers killed in Mali 21.3 IS attacks Syria key town 21.4 Taliban kills Afghanistan soldiers 22 2014-10-02 22.1 Libya soldiers killed by bombings 23 2014-09-26 23.1 Cancer kills three 9/11 firefighters on the same day 24 2014-09-25 24.1 China's richest person 25 2014-09-21 25.1 Bomb kills policemen in Cairo 26 2014-09-15 26.1 Migrant boat sinking kills 500 26.2 Walking or cycling is good for health 27 2014-09-12 27.1 IS number of soldiers increases sharply 28 2014-09-10 28.1 Nato kills Afghanistan civilians 29 2014-09-09 29.1 The most serious Ebola outbreak 29.2 EU adopts new sanctions on Russia 30 2014-09-08 30.1 Boko Haram occupies key town 30.2 Somalia suicide bomber kills 12 people 30.3 China's export exceeds expectation 30.4 Pound Sterling falls 30.5 Japan's economy shrinks 1.8% 31 2014-09-07 31.1 Ukraine's ceasefire is near to collapse 32 2014-09-05 32.1 A death by suicide every 40 seconds 33 2014-09-03 33.1 Ebola death number of people more than 1,900 34 2014-08-24 34.1 IS seizes Syria airbase 35 2014-08-20 35.1 Japan landslides kill 32 35.2 US reporter beheaded 36 2014-08-17 36.1 Suicide bomber kills UN soldiers 37 2014-08-13 37.1 Islamic State seizes towns 37.2 More US soldiers go to Iraq 38 2014-08-10 38.1 China car accident kills 44 39 2014-08-08 39.1 Low vitamin D increases dementia risk 40 2014-08-07 40.1 Iraq Christians flee 41 2014-08-06 41.1 Putin imposes sanctions on the West 42 2014-08-05 42.1 Afghanistan senior US soldier killed 43 2014-08-01 43.1 China Economy rises 44 2014-07-30 44.1 US economy rebounds 45 2014-07-29 45.1 Xinjiang attack kills dozens 46 2014-07-27 46.1 1,000 Palestinians killed 47 2014-07-24 47.1 Israel bombards UN school in Gaza 47.2 China economy rises 48 2014-07-23 48.1 China-Latin America business jumps up 49 2014-07-22 49.1 Afghanistan Taliban kill foreign soldiers 50 2014-07-21 50.1 Israel bombards hospital in Gaza 50.2 Hamas kills 13 Israel soldiers 51 2014-07-20 51.1 Foreign companies create 66,000 jobs in UK 51.2 Many people killed in Nigeria 51.3 Israel kills 500 people in Gaza 51.4 China typhoon kills at least 17 52 2014-07-19 52.1 Egypt rebels kill 20 soldiers 52.2 19 migrants from Africa died 52.3 Iraq bombs kill 26 52.4 Kenya bus attack kills 7 52.5 China bus crash kills 38 53 2014-07-18 53.1 Malaysia pessenger plane crashes in Ukraine 54 2014-07-17 54.1 Islamic fighters kill 14 Tunisian soldiers 54.2 Microsoft to cut 18,000 jobs 55 2014-07-16 55.1 China's economy rises 56 2014-07-15 56.1 Afghanistan suicide bomb kills 89 people 57 2014-07-14 57.1 Exercise prevents dementia 58 2014-07-12 58.1 Israel kills about 123 Palestine people 58.2 Iraq army kills 255 Sunni prisoners 59 2014-07-11 59.1 Kurds seize 2 oil fields 60 2014-07-10 60.1 Israel warplanes attack Gaza killing many 61 2014-07-09 61.1 Somalia fighters kill 14 soldiers 62 2014-07-03 62.1 Germany approves minimum wage 62.2 US adds 288,000 jobs 62.3 Two killed in Myanmar cIashes 62.4 Afghanistan suicide bomb kills 8 soldiers 62.5 Efficacious antibiotics running out 62.6 Ebola crisis meeting in West Africa 63 2014-07-01 63.1 Egypt bomb explosions kill 2 policemen 64 2014-06-30 64.1 Italy found 30 migrant bodies 64.2 Isis establishes Islamic country 65 2014-06-29 65.1 North Korea fires missiles 65.2 India building collapses kill 16 65.3 China fishing boat sinks near Diaoyutai 66 2014-06-24 66.1 China industrial output increases 66.2 Iraq rebels occupy main oil refinery 67 2014-06-14 67.1 Ukraine rebels kill 49 soldiers 68 2014-06-13 68.1 Aspirin not the best to prevent stroke 68.2 China plans to stimulate economy 69 2014-06-11 69.1 Red meat causes cancer 70 2014-06-08 70.1 Air pollution links to arrhythmia and lung clotting 70.2 Afghanistan flooding kills 73 71 2014-06-07 71.1 Migrant boat sinks near Yemen killing 62 72 2014-06-06 72.1 Lack of sleep causes serious problems 73 2014-06-05 73.1 Yemen rebels kill 14 73.2 Tesco's sales falls 74 2014-06-04 74.1 Boko Haram kills many in Nigeria 74.2 EU calls on UK to raise taxes on expansive houses 75 2014-06-03 75.1 120 die in Yemen fighting 75.2 Pakistan explosion kills 7 76 2014-06-02 76.1 China's industrial activity increases 76.2 Learning foreign language can prevent dementia 76.3 Libya fighting kills 7 76.4 Afghanistan suicide bomb kills 3 Turkish engineers 76.5 Nigeria bomb attack kills 14 77 2014-06-01 77.1 Rebels kill 6 Egypt soldiers 78 2014-05-31 78.1 India economy slows down 79 2014-05-30 79.1 Japan inflation highest in 23 years 79.2 US economic growth slows down 79.3 Tesco forms partnership with China 79.4 Ukraine rebels shoot down helicopter killing 12 80 2014-05-29 80.1 Taiwan political party calls for cooperation with Mainland China 80.2 CAR rebel army kill 11 people 81 2014-05-28 81.1 Pakistan woman stoned to death 81.2 South Korea hospital fire kills 21 82 2014-05-27 82.1 Iraq suicide bomb kills 17 82.2 India train derail kills 23 82.3 China to destroy 6 million cars 82.4 Vietnam boat sinks off Xisha 83 2014-05-26 83.1 Sony to open PlayStation factory in China 84 2014-05-24 84.1 UK house prices rise sharply 84.2 Djibouti restaurant attack kills 2 84.3 Jewish Museum attack kills 3 84.4 California shooting kills 6 84.5 Somalia attack kills 10 84.6 Syria rebel army kills 20 people 84.7 Nigeria rebel army kills 30 people 85 2014-05-23 85.1 England contains huge oil resources 86 2014-05-22 86.1 Many killed in Baghdad 86.2 Militants destroy village 86.3 Rebel army kills 14 Ukraine soldiers 86.4 Taiwan attack kills 3 86.5 Xinjiang attack kills 31 86.6 Lenovo becomes world's biggest PC maker 87 2015-05-21 87.1 Guerrillas kill 3 policemen in Cairo 87.2 Rebel army kills 27 in Nigeria 87.3 Mali rebel army occupies key town 87.4 China signs huge gas contract with Russia 87.5 China bans Windows 8 88 2015-05-20 88.1 Nigeria bomb explosions kill many 88.2 Putin arrives China for summit 89 2015-05-19 89.1 6 Mali officials killed 90 2015-05-16 90.1 China continues oil drilling offshore of Xisha Islands 90.2 Olanzapine could cause diabetes 91 2014-05-15 91.1 Sony shares fall 7% 91.2 16 Chinese killed in Vietnam anti-Chinese riot 92 2014-05-14 92.1 Vietnam protesters burn Chinese factories 92.2 China industrial growth slows in April 92.3 Turkey coal mine explosion kills many people 93 2014-05-13 93.1 Rebel army kills 7 Ukraine soldiers 93.2 High blood pressure harms health 93.3 Lack of sleep damages health 94 2014-05-12 94.1 China strengtens secuity in Beijing 94.2 UK interest rate would rise 94.3 China to build new Africa railway 95 2014-05-10 95.1 Yemen soldiers killed 96 2014-05-09 96.1 UK GDP close to last pre-crisis level 96.2 Biggest heart disease factor 96.3 300 killed in Nigeria 97 2014-05-08 97.1 Bomb kills 9 Pakistan soldiers 97.2 Barclays to cut 19,000 jobs 97.3 Toyota profit nearly doubles 97.4 China's imports and exports rebound 98 2014-05-07 98.1 Sainsbury's profit rises 98.2 China and Vietnam ships collide offshore of Xisha Islands 98.3 Kenya poisonous wine kills many 99 2014-05-06 99.1 US trade deficit falls 99.2 Guangzhou knife attack 100 2014-05-05 100.1 Ukraine rebels kill government soldiers 100.2 Nigeria rebels "to sell" abducted girls 100.3 Crew missing after ship sinks off Hong Kong 100.4 Odessa police release detainees 101 2014-05-04 101.1 Nairobi bomb attacks kill 3 101.2 China bridge collapse kills 11 101.3 India rebel army kills 32 102 2014-05-03 102.1 Ethiopia army kills dozens of students 102.2 Ukraine clashes kill dozens 102.3 Samsung ordered to pay Apple US$119.6m 102.4 US employment increases sharply 103 2014-05-02 103.1 Ukraine troops kill many people 103.2 Afghanistan landslide kills hundreds 103.3 Fiber good for heart 104 2014-05-01 104.1 Sony Predicts bigger loss 104.2 IMF approves USD17bn Ukraine bailout 104.3 Sanctions damage Russia's economy 104.4 Exercise after dinner helps to slim 105 2014-04-30 105.1 Libya car bomb kills 2 soldiers 105.2 UK economy grows 0.8% 105.3 Xinjiang attack kills 3 105.4 US economy slows 106 2O14-04-29 106.1 Samsung mobile phone sales decline 107 2014-04-28 107.1 Microsoft must release overseas data 107.2 Pakistan pupils killed in explosion 107.3 Afghanistan floods kill at least 80 108 2014-04-27 108.1 Russia rehab center fire kills 8 109 2014-04-26 109.1 Russia "to help free European observers" 109.2 Taliban "shot down" UK helicopter 109.3 China bans eating rare animals 109.4 Baghdad explosions kill 31 110 2014-04-25 110.1 Nokia sold its mobile phone business 110.2 India Maoists kill election officers 111 2014-04-24 111.1 Kenya car bomb Kills 4 people 111.2 Afghanistan policeman kills 3 foreigners 111.3 Facebook earnings rise sharply on mobile ads 112 2014-04-23 112.1 Bomb kills senior Egypt policeman 113 2014-04-22 113.1 World's fastest lift 113.2 Japan's trade deficit is 4 times 114 2014-04-20 114.1 Algeria guerrillas kill 14 soldiers 114.2 Japan to base troops near Diaoyutai 115 2014-04-19 115.1 Bahrain car explosion kills 2 115.2 China gold demand increases 116 2014-04-18 116.1 Qomolangma snowslide kills 12 117 2014-04-17 117.1 Earth-like planet discovered 118 2014-04-16 118.1 Hundreds missing as South Korea ferry sinks 118.2 China's economic growth slows down 119 2014-04-14 119.1 Global trade speeds up 120 2014-04-10 120.1 China's imports & exports decrease 121 2014-04-08 121.1 Nigeria is Africa's biggest economy 122 2014-04-07 122.1 Somalia 2 UN employees killed 123 2014-04-03 123.1 Exercise is good to heart 124 2014-04-02 124.1 Yemen al-Qaeda kills 6 soldiers 124.2 Taliban bomb kills 6 policemen 124.3 Cairo bomb attacks kill police chief 125 2014-04-01 125.1 China ex-general charged with corruption 125.2 UN bans Japan to whale in Antarctica 125.3 Kenya bomb attack kills 6 people 125.4 Nigeria's army kills 600 people 125.5 7 fruits & vegs better for health 125.6 Afghanistan Taliban attacks kill 18 126 2014-03-31 126.1 Exercise relates to dementia 126.2 Japan output slows in February 127 2014-03-30 127.1 Chad troops kill 24 people in CAR 128 2014-03-28 128.1 CAR grenade attack kills 11 128.2 US requests Russia to move back 128.3 Smoking bans improve child health 129 2014-03-27 129.1 Uganda boat capsize kills 250 129.2 North Korea fires missiles 130 2014-03-26 130.1 Thailand bus crash kills 30 131 2014-03-25 131.1 Afghanistan Taliban kills 2 policemen 131.2 Faulty genes link to delayed puberty 131.3 Active mothers have active children 132 2014-03-24 132.1 Yemen attack kills 20 soldiers 132.2 Afghanistan suicide bomb kills 15 people 132.3 Afghanistan hotel attack kills 9 people 133 2014-03-20 133.1 Taliban kill 10 police 134 2014-03-19 134.1 Two Egyptian army officers killed 134.2 Insufficient sleep causes brain cell loss 135 2014-03-18 135.1 Somalia Islamic fighters kill 6 soldiers 136 2014-03-17 136.1 Vigorous exercise cuts flu risk 136.2 Libya car bomb kills 5 soldiers 136.3 Crimea voters support joining Russia 137 2014-03-16 137.1 Cairo guerrillas kill 6 soldiers 138 2014-03-14 138.1 Cairo gunmen shoot dead soldier 139 2014-03-11 139.1 India Maoists kill at least 15 policemen 140 2014-03-01 140.1 US economic growth slows down 141 2014-02-27 141.1 Browning meat link to Alzheimer's disease 142 2014-02-23 142.1 Taliban kill at least 20 Afghanistan soldiers 143 2014-02-04 143.1 Huge rise in global cancer cases 144 2014-01-23 144.1 Egypt gunmen kill 5 police 145 2014-01-20 145.1 Pakistan Taliban kills 6 soldiers 145.2 Taliban kills Nato soldier 146 2014-01-19 146.1 Pakistan Taliban kills 20 soldiers 147 2014-01-18 147.1 India funeral stampede kills 18 148 2014-01-17 148.1 Afghanistan Taliban kills UN officials 148.2 Pakistan railway explosion kills 3 149 2014-01-16 149.1 Taliban will defeat invaders 150 2014-01-15 150.1 Green spaces good for mental health 150.2 China shoe factory fire kills 16 151 2014-01-14 151.1 Atheist given asylum in UK 152 2014-01-13 152.1 Caffeine could boost memory 153 2014-01-10 153.1 China becomes world's largest trading country 154 2014-01-09 154.1 Call to cut sugar in food 154.2 Japan chemical factory explosion kills 5 155 2014-01-07 155.1 Hong Kong movie pioneer Run Run Shaw dies 156 2014-01-06 156.1 China stampede kills 14 157 2014-01-05 157.1 Vitamin D strengthens muscle 158 2014-01-04 158.1 India house collapse kills 14 159 2014-01-03 159.1 Egypt police kill 11 people 159.2 Cambodia army kills 3 workers 160 2014-01-02 160.1 Al-Qaeda controls much of Fallujah 160.2 Somalia bombs kill 10 161 2014-01-01 161.1 Iraq violence kills 8,868 in 2013 161.2 Vitamin E good for dementia sufferers 2014-12-31 China's industry shrinks 中国工业收缩 Zhōngguó gōngyè shōusuō HSBC's survey showed that China's manufacturing activity shrank for the first time in seven months in December. HSBC 调查显示12月份中国制造业活动7个月以来首次收缩。 HSBC diàochá xiǎnshì 12 yuèfèn Zhōngguó zhìzàoyè huódòng 7 gè yuè yǐlái shǒucì shōusuō. Special economic zones create miracles jingjih tehqu chuahngzaoh qirjih In 1980s, China set up Shenzhen, Zhuhai, Shantou, Xiamen and Hainan special economic zones. In the past 3 decades, these special economic zones have created miracles that make China became the second largest economy of the world. 80 niarndaih ZG jiahnlih Shenzhehn, Zhuhaai, Shahntour, Xiahmern her Haainarn jingjih tehqu. guohquh 30 niarn zhehxie jingjih tehqu chuahngzaoh qirjih, shii ZG cherngweir shihjieh dih-2 dah jingjihtii. 2014-12-30 Ebola kills 7,500 Ebola shasii 7500 Ebola has killed more than 7,500 people in 2014, leading to an international threat. 2014 niarn Ebola shasii chaoguoh 7500 rern, duih guorjih zaohcherng weixier. Afghanistan's bloody year 2014 Afghanistan xuehxing de 2014 niarn Afghanistan's violence has increased rapidly in the year of 2014, with at least 4,600 Afghanistan soldiers having been killed by the Taliban. It is the bloodiest year since 2001. 2014 niarn Afghanistan de baohlih xuhnsuh zengjia, zhihshaao 4600 geh Afghanistan junrern beih Taliban shasii, shih 2001 niarn yiilair zuih xuehxing de yi niarn. 2014-12-29 Guangzhou-Guiyang highspeed rail opened Guaangzhou-Guihyarng gaotiee tongche China's Guangzhou-Guiyang highspeed rail with 856km long, spends RMB125.9bn. It reduces travel time from 22 hours to 4 hours and 9 minutes. ZG Guaangzhou-Guihyarng gaotiee, charng 856km, haohzi RMB125.9bn, lvvtur shirjian corng 21 xiaaoshir suojiaan zhih 4 xiaaoshir 9 fenzhong. China completes USD80bn canal ZG USD80bn yuhnher warncherng China has completed its largest canal with 1,200km long, spends USD80bn, delivering water from Chang Jiang and Huang He rivers to Beijing. ZG zuih dah yuhnher warncherng, charng 1200km, haohzi USD80bn, baa Charng Jiang her Huarng Her de shuii yuhn waang Beeijing. Smoking damages the whole body xiyan suunhaih quarnshen Study shows that besides smoking can damage heart and lung, also can damage bones, muscles, brain, teeth and eyes. yarnjiu xiaanshih xiyan churle huih suunhaih xin-feih, yee huih suunhaih guuger, jirouh, naaobuh, yarchii her yaanjing. 2014-12-27 Nicaragua Canal begins construction Nicaragua Yuhnher dohnggong Nicaragua has announced to start building of the Nicaragua Canal linking the Atlantic and Pacific Oceans. The canal to be built by China, spending USD50bn. It will be longer, deeper and wider than the Panama Canal. Nicaragua xuanbuh liarnjie Dahxi Yarng her Taihpirng Yarng de Nicaragua Yuhnher dohnggong. Yuhnher your ZG jiahnzaoh, haohzi USD50bn, bii Panama Yuhnher gehng charng, gehng shen, gehng kuan. 2014-12-26 China buys 60 Boeing 737 ZG maai 60 jiah Boeing 737 China's national airline, China Air, buys 60 Boeing 737 airplanes, total amount more than USD6bn. ZG guorjia harngkong, ZG Harngkong, maai 60 jiah Boeing 737 feiji, zoongzhir chaoguoh USD6bn. India rebel army kills 72 India 叛军杀72人 India pànjūn shā 72 rén Rebel army has attacked villages in India's northeastern province Assam, killing at least 72 people. India 东北部 Assam 省叛军袭击乡村,杀死至少72人。 India dōngběibù Assam shěng pànjūn xíjí xiāngcūn, shā sǐ zhìshǎo 72 rén. AU soldiers killed AU 军人被杀 AU jūnrén bèi shā Islamic fighters have attacked the military headquarters in Somalia's capital Mogadishu , killing at least 3 African Union's soldiers. Islam 战士袭击 Somalia 首都 Mogadishu 的军事总部,杀死至少3个非洲联盟军人。 Islam zhànshì xíjí Somalia shǒudū Mogadishu de jūnshì zǒngbù, shā sǐ zhìshǎo 3 gè Fēizhōu Liánméng jūnrén. 2014-12-23 Exercise keeps body fit 运动使身材好 Yùndòng shǐ shēncái hǎo Studies have shown that doing exercise leads to sleep well, prevents diseases, and keeps body fit. 研究显示运动使睡得好、预防疾病、身材好。 Yánjiū xiǎnshì yùndòng shǐ shuì dé hǎo, yùfáng jíbìng, shēncái hǎo. Insufficient sleep causes obesity 睡眠不足导致痴肥 Shuìmián bùzú dǎozhì chīféi A study shows that not enough sleep can cause cardiovascular disease, metabolic diseases such as obesity and diabetes, and cancer. 研究显示睡眠不足可导致心血管病,代谢病如痴肥和糖尿病,和癌症。 Yánjiū xiǎnshì shuìmián bùzú kě dǎozhì xīnxuèguǎnbìng, dàixièbìng rú chīféi hé tángniàobìng, hé áizhèng. 2014-12-16 Executed Chinese teenage innocent beih chuujuer ZG qingniarn wurgu A court in China has found an 18-year-old young man is not guilty, 18 years after he was executed. The young man had tried to help save a woman who was raped and killed, but the young man had been arrested by the police, and sentenced to death penalty. The court has compensated the victim's family RMB30,000. ZG faayuahn pirngfaan 18 niarn qiarn beih chuujuer de 18 suih narn qingniarn wurzuih. narn qingniarn shihtur zheengjiuh beih jiansha nvvrern, queh beih jiingfang jubuu bihng pahn siixirng. faayuahn peircharng shouhhaihrern jiashuu RMB30,000. 2014-12-08 Paris to ban diesel cars Paris jihnzhii chairyour che The mayor of Paris plans to ban diesel cars in the capital of France, Paris, by 2020 for fighting pollution. Paris shihzhaang jihhuah 2020 niarn zaih Faaguor shooudu Paris jihnzhii chairyour che duihkahng wuraan. 2014-12-05 Obesity causes disability chifeir daaozhih carnfeih Study shows that obesity causes cardiovascular disease, diabetes, disability and death. yarnjiu xiaanshih chifeir daaozhih xinxuehguaanbihng, tarngniaohbihng, carnfeih her siiwarng. 2014-11-25 China manufacturing slows down ZG gongyeh fahnghuaan China's industrial activity slows down in November. Manufacturing sector is a key driver of China's economy, which affects global economic growth. Zhongguor Shiryiyueh gongyeh fahnghuaan. gongyeh shih ZG jingjih de zhuuyaoh dohnglih, yiingxiaang quarnqiur jingjih zengzhaang. 2014-11-14 China's economy slows down Zhongguor jingjih fahnghuaan Economic data shows that China's economic growth is slowing down. jingjih shuhjuh xiaanshih Zhongguor jingjih zengzhaang fahnghuaan. 2014-11-13 Ebola kills more than 5,000 Ebola sii chaoguoh 5,000 The death number of people of the Ebola outbreak has exceeded 5,000. This is the worst Ebola outbreak in the history. zheh cih Ebola yihzhehng siiwarng rernshuh yiijing chaoguoh 5,000, shih lihshii shahng zuih yarnzhohng de. 2014-11-11 Afghanistan Taliban kills 10 policemen Afghanistan Taliban sha 10 jiingchar A Taliban suicide bomber has attacked a police headquarters in eastern Afghanistan, killing at least 7 policemen. Another Taliban's remote-controlled bomb has killed at least 3 policemen. Taliban zihsha zhahdahn xirji Afghanistan dongbuh jiingchar zoongjur, zhahsii zhihshaao 7 geh jiingchar. lihngyi Taliban yaorkohng zhahdahn zhahsii zhihshaao 3 geh jiingchar. 2014-10-14 Taliban kills 22 Afghanistan soldiers Taliban sha 22 Afghanistan shihbing Taliban has attacked a convoy in northern Afghanistan, killing at least 22 government soldiers. Taliban xirji Afghanistan beeibuh yi geh cheduih, shasii zhihshaao 22 geh zhehngfuujun. 2014-10-12 Police chief of Iraq's Anbar province killed Iraq de Anbar Sheeng jiingzhaang beihsha The police chief of Iraq's Anbar province has been killed in a bomb attack, as Islamic State's troops are advancing. At least 75 people have been killed in bomb attacks in Iraq this weekend alone. Islamic State de junduih tuijihn zhijih, Iraq de Anbar Sheeng jiingzhaang beih zhahdahn zhahsii. guangshih zheh geh zhoumoh, Iraq zhihshaao 75 rern beih zhahdahn zhahsii. Stock markets fall sharply guupiaoh dahfur xiahdie European and US stock markets have seen sharp falls as fears have deepened over prospects for the global economy. youryur duih shihjieh jingjih qiarnjiing de youlvh jiajuh, Ou-Meei guupiaoh shihchaang dahfurduh xiahdie. Boko Haram releases Chinese hostages Boko Haram shihfahng ZG rernzhih 10 Chinese workers kidnapped by Boko Haram have been released and arrived Cameroon's capital. Boko Haram jierchir de 10 geh ZG gongrern beih shihfahng daohdar Cameroon shooudu. 2014-10-11 China has confidence in HK stability ZG yoou xihnxin HK weendihng China's Premier Li Keqiang says that China can keep Hong Kong's stable, as the demonstration in the region reached a third week. Xianggaang shihwei jihnruh dih-3 zhou, ZG zoonglii Lii Kehqiarng shuo ZG nerng weirchir HK weendihng. Ebola deaths exceed 4,000 Ebola sii chaoguoh 4000 The number of deaths of people caused by the Ebola outbreak has risen more than 4,000, most of them in West Africa. Ebola wenyih daaozhih de siiwarng rernshuh shahngsheng chaoguoh 4000, dahbuhfehn zaih Xifei. 2014-10-10 Smog spreads over northern China Huarbeei yanwuh-mirmahn Air pollution in parts of northern China is very serious. Beijing, Tianjin and Hebei have issued an orange alert, the second highest. The elderly and those with heart or lung problems have been advised to stay indoors. Huarbeei buhfehn dihqu kongqih wuraan heen yarnzhohng. Beeijing, Tianjin, Herbeei fachu dih-2 gao de huarngseh jiingbaoh. laaorern, xinzahng her huxi jirbihng huahnzhee beih quahnyuh liur zaih shihneih. 2014-10-09 Tens of thousands displaced by China quake ZG dihzhehn jii-wahn rern shusahn A 6 magnitude earthquake has attacked the southern province of Yunnan in China, killing 1 person, injuring hundreds, and displacing tens of thousands of people. ZG narnbuh Yurnnarn Sheeng 6 jir dihzhehn, 1 rern siiwarng, jii-baai rern shouhshang, jii-wahn rern shusahn. UK sends troops to tackle Ebola UK paih junduih duihfuh Ebola The UK is sending 750 army members to Africa to cope with the Ebola outbreak. Yingguor paih 750 geh junrern daoh Feizhou duihfuh Ebola baohfa. 2014-10-07 Bad news hit stock markets huaih xiaoxi daaji guupiaoh Global stock markets have been hit by worries over global economic growth following a series of bad news. yixihlieh huaih xiaoxi daaozhih quarnqiur jingjih zengzhaang de youlvh, daaji quarnqiur guupiaoh shihchaang. Colombia lightning kills 11 people Colombia 闪电杀11人 Colombia shǎndiàn shā 11 rén Lightning has attacked a temple in northern Colombia, killing 11 people and injuring 15 others. Colombia 北部闪电袭击庙宇,杀死11人,15人受伤。 Colombia běibù shǎndiàn xíjí miàoyǔ, shāsǐ 11 rén, 15 rén shòushāng. 2014-10-06 IS occupies key town in Syria IS 占领 Syria 重镇 IS zhànlǐng Syria zhòngzhèn Islamic State's troops are reported to have seized the town of Kobane in notherh Syria near the border with Turkey. 据报 Islam 国军队夺得 Syria 北部靠近 Turkey 边境的市镇 Kobane。 Jùbào Islam Guó jūnduì duódé Syria běibù kàojìn Turkey biānjìng de shìzhèn Kobane. 2014-10-03 India stampede kills dozens India rern-caai-rern, jii-shir sii At least 32 people have died in a stampede at a Hindu religious festival in the province of Bihar in northern India. India beeibuh sheengfehn Bihar yi geh Hindu zongjiaoh jierrih rern-caai-rern, zhihshaao 32 rern siiwarng. UN soldiers killed in Mali Mali UN 军人被杀 Mali UN jūnrén bèishā Al-Qaeda related Islamic rebel army has attacked a convoy in northeast Mali, killing 9 UN soldiers. Mali 东北部 al-Qaeda 有关的 Islam 叛军袭击车队,杀死9个 UN 士兵。 Mali dōngběibù al-Qaeda yǒuguān de Islam pànjūn xíjī chēduì, shāsǐ 9 ge UN shìbīng. IS attacks Syria key town IS jihngong Syria zhohngzhehn Islamic State's troops have stepped up attack on the town of Kobane in northern Syria near the border with Turkey. Islam Guor junduih jiaqiarng jihngong Syria beeibuh kaohjihn Turkey bianjieh de shihzhehn Kobane. Taliban kills Afghanistan soldiers Taliban sha Afghanistan shihbing Taliban's suicide bombings have attacked army buses in Afghanistan's capital Kabul, killing at least 10 soldiers and injuring many. Afghanistan shooudu Taliban zihsha zhahdahn xirji junche, zhahsii zhihshaao 10 geh shihbing, duo geh shouhshang. 2014-10-02 Libya soldiers killed by bombings zhahdahn zhahsii Libya shihbing Car bombings have attacked a checkpoint near the airport of the eastern city of Benghazi in Libya, killing at least 7 soldiers and injuring about 60. qihche zhahdahn xirji Libya dongbuh cherngshih Benghazi jichaang fuhjihn guanqiaa, zhahsii zhihshaao 7 geh shihbing, yue 60 geh shouhshang. 2014-09-26 Cancer kills three 9/11 firefighters on the same day 3 geh 9/11 xiaofarngyuarn torngrih sii yur airzhehng Three firefighters who were on duty at Ground Zero during the 9/11 attacks have died on the same day from cancer. 9/11 xirji qijian zaih Ground Zero zhirban de 3 geh xiaofarngyuarn torngrih sii yur airzhehng. 2014-09-25 China's richest person Zhongguor shooufuh Jack Ma, the Executive Chairman of Alibaba Group, is the richest person of China, with a wealth of 150 billion Renminbi. Jack Ma, Alibaba Jirtuarn Doongshihzhaang, Zhongguor shooufuh, yongyoou cairfuh 1500 yih Rernmirnbih. 2014-09-21 Bomb kills policemen in Cairo Cairo zhahdahn sha jiingchar A bomb has exploded near the Egyptian foreign ministry in Cairo, killing at least 2 police officers. Rebel army has attacked the military frequently after Egypt's people-elected president Mohammed Morsi was overthrown in a military coup. Cairo de Egypt waihjiaobuh fuhjihn yi geh zhahdahn zhahsii zhihshaao 2 geh jiingchar. Egypt mirnxuaan zoongtoong Mohammed Morsi beih junshih zhehngbiahn tuifan houh, pahnjun jingcharng xirji junfang. 2014-09-15 Migrant boat sinking kills 500 yirmirn chuarn chernmoh 500 sii A migrant boat has sunk off the coast of Malta, killing about 500 people. Malta haaimiahn yirmirn chuarn chernmoh, yue 500 rern siiwarng. Walking or cycling is good for health zoouluh huoh qirche yoouyih jiahnkang A study suggests that walking or cycling to work is beneficial to health. yarnjiu xiaanshih zoouluh huoh qirche shahngban yoouyih jiahnkang. 2014-09-12 IS number of soldiers increases sharply IS junrern shuhzih dahfur zengjia The CIA's information shows the number of soldiers of Islamic State (IS) may have up to 31,000, 3 times as many as previously estimated. CIA qinrngbaoh xiaanshih Islam Guor (IS) de junrern shuhzih keenerng gaodar 3,1000, shih xianqiarn gujih de 3 beih. 2014-09-10 Nato kills Afghanistan civilians Nato sha Afghanistan pirngmirn Nato has airstriked the province of Kunar in eastern Afghanistan, killing at least 11 civilians including women and children, and injuring 16 others. Nato kongxir Afghanistan dongbuh Kunar-sheeng, zhahsii zhihshaao 11 geh pirngmirn baokuoh fuhrur, 16 rern shouhshang. 2014-09-09 The most serious Ebola outbreak zuih yarnzhohng Ebola baohfa The Ebola outbreak in West Africa has killed 2,288 people, with half of them dying in the last 3 weeks. This is the worst Ebola outbreak in the history. Xifei Ebola baohfa shasii 2288 rern, bahnshuh zaih guohquh 3 xingqi siiwarng. zheh shih lihshii shahng zuih yarnzhohng de Ebola baohfa. EU adopts new sanctions on Russia EU通过对Russia新的制裁 EU tōngguò duì Russia xīn de zhìcái European Union member states have formally adopted new sanctions on Russia over the Ukraine crisis. 由于Ukraine危机,欧盟成员国正式通过了对Russia新的制裁。 Yóuyú Ukraine wēijī, Ōuméng chéngyuánguó zhèngshì tōngguòle duì Russia xīn de zhìcái. 2014-09-08 Boko Haram occupies key town Boko Haram占领重镇 Boko Haram zhànlǐng zhòngzhèn Nigeria's Boko Haram Islamic fighters have captured the key northeastern town of Michika, trying to gain more territory for creating an Islamic country. Nigeria的Boko Haram Islam战士夺取东北重镇Michika,为创建Islam国家争取更多的领土。 Nigeria de Boko Haram Islam zhànshì duóqǔ dōngběi zhòngzhèn Michika, wèi chuàngjiàn Islam guójiā zhēngqǔ gèng duō de lǐngtǔ. Somalia suicide bomber kills 12 people Somalia zihsha zhahdahn sha 12 rern A suicide car bomber has attacked an African Union convoy near Somalia's capital Mogadishu, killing at least 12 people. zihsha zhahdahn xirji Somalia shooudu Mogadishu fuhjihn de Feizhou Liarnmerng cheduih, shasii zhihshaao 12 rern. This is the first attack after Somalia's Islamic rebel army vowed to revenge the killing of its leader in a US air strike. zheh shih Islam pahnjun shihyarn baohfur US kongxir shasii ta'men de liingxiuh zhihouh de shooucih xirji. China's export exceeds expectation ZG chukoou chaoguoh yuhqi China's export numbers have risen by 9.4% in August from a year earlier, more than the forecast of 8%. ZG Bayuehfehn chukoou shuhzih bii quhniarn torngqi shahngsheng 9.4%, chaoguoh yuhqi de 8%. Pound Sterling falls Yingbahng xiahdie The Pound Sterling has fallen to its lowest level in 10 months because of worrying about Scotland's independence. youryur youlvh Scotland durlih, Yingbahng xiahdie daoh 10 geh yueh yiilair zuih di shuiipirng. Japan's economy shrinks 1.8% Rihbeen jingjih shousuo 1.8% Japan's econony in the 2nd quarter of the year has contracted at an annualized rate of 7.1%. Rihbeen dih-2 jihduh jingjih ahn niarn suahn shousuo 7.1%. 2014-09-07 Ukraine's ceasefire is near to collapse Ukraine tirnghuoo jiejihn bengkuih Following overnight artillery attacks in Mariupol, there is new shelling near Donetsk airport, raising fears that Ukraine's truce is close to collapse. suir'zhe Mariupol zheengyeh paohzhahn, Donetsk jichaang fuhjihn yoou xin de paohhong, shii rern danxin Ukraine de xiuzhahn binlirn bengkuih. 2014-09-05 A death by suicide every 40 seconds meei 40 miaao 1 rern zihsha sii Somebody dies by taking their life every 40 seconds, according to a report of the WHO (World Health Organization). juh WHO (Shihjieh Weihsheng Zuuzhi) baohdaao, meei 40 miaao 1 rern zihsha siiwarng. There are about 800,000 people die by suicide per year. The main reason causes suicide is mental health problem. meei niarn yue 80,0000 rern zihsha siiwarng. zihsha de zhuuyaoh yuarnyin shih jingshern wehntir. 2014-09-03 Ebola death number of people more than 1,900 Ebola siiwarng rernshuh chaoguoh 1900 More than 1,900 people have died in West Africa's Ebola outbreak, 40% of them in the past 3 weeks, the WHO says. WHO shuo, Xi Fei Ebola baohfa chaoguoh 1900 rern siiwarng, guohquh 3 xingqi zhahn 40%. 2014-08-24 IS seizes Syria airbase IS duorquu Syria kongjun jidih Syrian TV have confirmed that Islamic State troops have taken control of its important airbase, after hundreds of people have been killed on both sides in days of fighting. Syria TV zhehngshir, jii tian zhahndouh daaozhih shuangfang shuhbaai rern beihsha houh, Islam Guor junduih zhahnliing le ta de zhohngyaoh kongjun jidih. About 200,000 people have been killed in last 3 years in Syria's war, the UN says. UN shuo, yue 200,000 rern zaih guohquh 3 niarn de Syria zhahnzheng beihsha. 2014-08-20 Japan landslides kill 32 Rihbeen shanbeng 32 sii Landslides have attacked a residential area near a mountain in the suburb of the city of Hiroshima in Japan, killing at least 32 people, and 9 people are missing. shanbeng xirji Rihbeen cherngshih Hiroshima jiaoqu yi geh dahshan fuhjihn de mirnju, shasii zhihshaao 32 rern, 9 rern shizong. US reporter beheaded US jihzhee beih kaantour The Islamic State has issued a video showing the beheading of US reporter James Foley. Islam Guor fafahng shihpirn xiaanshih US jihzhee James Foley beih kaantour. The Islamic State said the killing was revenge for US air strikes against them. Islam Guor shuo kaantour shih weihle baohfur US kongxir ta'men. 2014-08-17 Suicide bomber kills UN soldiers zihsha zhahdahn sha UN shihbing A suicide bomber has attacked a UN military base in the north of Mali, killing at least 2 UN soldiers and injuring many others. zihsha zhahdahn xirji Mali beeibuh de UN junshih jidih, shasii zhihshaao 2 geh UN shihbing, duo geh shouhshang. 2014-08-13 Islamic State seizes towns Islam Guor duorquu shihzhehn Islamic State has controlled some towns in Syria's northern province of Aleppo, according to reports from activities. juh huoryueh fehnzii baohdaao, Islam Guor kohngzhih le Syria beeibuh sheengfehn Aleppo de yixie shihzhehn. More US soldiers go to Iraq gehngduo Meeijun quh Iraq Following sending air force for bombing Islamic State, the US has sent 130 more military advisors to Iraq. suir'zhe paih kongjun hongzhah Islam Guor, US duo paih 130 geh junshih guhwehn daoh Iraq. 2014-08-10 China car accident kills 44 ZG chehuoh 44 sii A tourist bus crashed into 2 other cars and then fell off a 10m cliff at the autonomous region of Xizang in China, killing 44 people and injuring many. ZG Xizahng Zihzhihqu yi jiah lvvyour bus zhuahng 2 che houh dieluoh 10m xuarnyar, zhihshaao 44 rern siiwarng, duo rern shouhshang. China's road safty is one of the worst in the world. The death rate of China's car accident is about 20 per 200,000 each year, higher than Russia or India and double the rate of US. ZG de daohluh anquarn shih shihjieh zuih chah zhiyi, chehuoh siiwarnglvh dahyue shih meei niarn meei 200,000 rern sii 20 geh, gao yur Russia her India, shih US de 2 beih. 2014-08-08 Low vitamin D increases dementia risk di vitamin D zengjia chidaizhehng fengxiaan Old people lack of vitamin D can increase the risk of developing dementia. laao rern quefar vitamin D huih zengjia huahn chidaizhehng fengxiaan. 2014-08-07 Iraq Christians flee Iraq Jidutur taorwarng Hundreds of thousands of Christians flee as Islamic rebel army takes the minority's biggest town in northern Iraq. Islam pahnjun duorquu Iraq beeibuh shaaoshuh mirnzur de zuih dah shihzhehn, jii shir wahn Jidutur taorwarng. 2014-08-06 Putin imposes sanctions on the West Putin 制裁西方 Putin zhìcái Xīfāng Russian President Putin has banned or limited agricultural imports from countries which imposing sanctions on Russia. Russia 总统 Putin 禁止或限制从制裁 Russia 的国家进口农产品。 Russia zǒngtǒng Putin jìnzhǐ huò xiànzhì cóng zhìcái Russia de guójiā jìnkǒu nóngchǎnpǐn. 2014-08-05 Afghanistan senior US soldier killed Afghanistan gaoji Meeijun beihsha A man wearing Afghanistan's military uniform has opened fire at a British military school in the capital of Afghanistan, killing at least 4 NATO soldiers including a senior US general, and injuring many others. yi 'ge chuan Afghanistan junfur de rern zaih Afghanistan shooudu Kabul de Yingguor junxiaoh kaihuoo, shasii zhihshaao 4 'ge NATO junrern baokuoh yi 'ge gaojir US junguan, lihngwaih duo rern shouhshang. 2 British soldiers were among the wounded, along with several American soldiers, a German general and an Afghan general. shangzhee baokuoh 2 'ge Yingjun, jii 'ge Meeijun, yi 'ge Derguor junguan her yi 'ge Afghanistan junguan. 2014-08-01 China Economy rises Zhongguor jingjih shahngsheng China's manufacturing activity grows at its highest speed in more than 2 years in July. Zhongguor Qiyuehfehn gongyeh huordohng 2 niarn duo yiilair zengzhaang zuih kuaih. 2014-07-30 US economy rebounds Meeiguor jingjih faantarn The economic growth of the United States in the second quarter of the year has risen at an annual rate of 4 %. Meeiguor dih-2 jihduh jingjih zengzhaang ahn niarnduh suahn shahngsheng 4%. 2014-07-29 Xinjiang attack kills dozens Xinjiang xirji jii shir rern sii Militants have attacked a police station and government offices in Xinjiang, China, leaving dozens of people dead and many injured. wuuzhuangfehnzii xirji Zhongguor Xinjiang yi jian jiingjur her bahngongshih, daaozhih jii shir rern siiwarng, duo rern shouhshang. 2014-07-27 1,000 Palestinians killed 1,000 Palestine rern beihsha Israel's invasion in Gaza has killed more than 1,000 Palestinians recently, most of them are civilians. On the other side, the military of Gaza has killed 40 Israel soldiers. Israel zuihjihn ruhqin Gaza shasii chaoguoh 1,000 'ge Palestine rern, dahbuhfehn shih pirngmirn. lihngyi fangmiahn, Gaza junfang shasii 40 'ge Israel shihbing. 2014-07-24 Israel bombards UN school in Gaza Israel paohhong Gaza UN xuerxiaoh Israel has bombarded a UN-run school used as a shelter in Gaza, killing at least 15 people and injuring more than 200 others. Israel paohhong Gaza yi jian UN de yohngzuoh bihhuhsuoo de xuerxiaoh, shasii zhihshaao 15 rern, chaoguoh 200 rern shouhshang. Israel has killed more than 725 palestinians in recent invasion. Israel zaih zuihjihn de ruhqin shasii chaoguoh 725 'ge Palestine rern. China economy rises Zhongguor jingjih zengzhaang China's manufacturing activity rises at its fastest speed in 18 months in July, showing that its economy is good. Zhongguor Qiyuehfehn gongyeh huordohng shahngsheng 18 'ge yueh yiilair zuih Kuaih, xiaanshih jingjih haao. 2014-07-23 China-Latin America business jumps up Zhongguor Latin Meeizhou shengyih yuehsheng Chinese trade with Latin America has grown rapidly. It is now the second-largest trading partner in Argentina and Cuba, and has been Brazil's largest since 2009. Zhongguor yuu Latin Meeizhou maohyih xuhnsuh zengjia, xiahzaih shih Argentina her Cuba dih-2 dah de, 2009 niarn yiilair shih Brazil zuih dah de maohyih huoobahn. China is the second-largest market for Venezuelan oil after the United States. Zhongguor zaih Meeiguoo zhihouh, shih Venezuela shiryour zuih dah maaijia. 2014-07-22 Afghanistan Taliban kill foreign soldiers Afghanistan Taliban sha waihguor junrern A Taliban suicide bomber has attacked an anti-drug building outside the Kabul airport, killing at least 4 people, including at least 3 foreign soldiers. Taliban zihsha zhahdahn xirji Kabul jichaang waihmiahn de faan-durpiin dahlour, shasii zhihshaao 4 rern, baokuoh zhihshaao 3 'ge waihguor shihbing. 2014-07-21 Israel bombards hospital in Gaza Israel paohhong Gaza yiyuahn Israel troops have bombards a hospital in Gaza, killing at least 5 people and injuring more than 70 others. Israel junduih paohhong Gaza yi jian yiyuahn, zhahsii zhihshaao 5 rern, chaoguoh 70 rern shouhshang. Hamas kills 13 Israel soldiers Hamas shasii 13 'ge Israel junrern Hamas has killed 13 and captured one Israel soldiers since the beginning of Israel's ground invasion on Gaza at Saturday night. This is the biggest one day lost for Israel's army in years. zihcorng Xingqiliuh waanshahng Israel dihmiahn ruhqin Gaza yiilair, Hamas shasii 13 'ge her furluu yi 'ge Israel shihbing. zheh shih Israel junfang duo niarn lair zuih dah de suunshi. 2014-07-20 Foreign companies create 66,000 jobs in UK waihguor gongsi zaih Yingguor chuahngzaoh 66,000 'ge zhirweih 66,000 jobs have been created by foreign countries. The main countries are from the US, Japan, France and Germany. waihguor gongsi zaih Yingguor chuahngzaoh le 66,000 'ge zhirweih, zhuuyaoh gongsi lairzih Meeiguor, Rihbeen, Faaguor her Derguor. Many people killed in Nigeria Nigeria duo rern beih sha Rebel army has attacked a town in the northeast of Nigeria, half of the town has been burned down, killing many people. pahnjun xirji Nigeria dongbeeibuh yi 'ge shihzhehn, bahn 'ge shihzhehn beih shaohuii, shasii heen duo rern. Israel kills 500 people in Gaza Israel zaih Gaza sha 500 rern Israel has killed more than 500 Palestine people in Gaza recently. At least 87 people have been killed only today. Israel zuihjihn zaih Gaza shasii chaoguoh 500 'ge Palestine rern. zhiishih jintian jiuh sha le zhihshaao 87 rern. China typhoon kills at least 17 中国台风至少17死 Zhōngguó táifēng zhìshǎo 17 sǐ The biggest typhoon Rammasun to attack the provinces of Hainan, Guangdong and Guangxi in southern China in 40 years , killing at least 17 people, after it killed more than 94 people in the northern Philippines. 在Philippines北部杀死超过94人后,中国40年来最强台风Rammasun, 袭击华南省份海南、广东和广西,杀死至少17人。 Zài Philippines běibù shāsǐ chāoguò 94 rén hòu, Zhōngguó 40 niánlái zuì qiáng táifēng Rammasun, xíjī Huánán shěngfèn Hǎinán, Guǎngdōng hé Guǎngxī, shāsǐ zhìshǎo 17 rén. 2014-07-19 Egypt rebels kill 20 soldiers Egypt叛军杀20士兵 Egypt pànjūn shā 20 shìbīng Rebel army has attacked a checkpoint in western Egypt, killing at least 20 soldiers. 叛军袭击Egypt西部一个检查站,杀死至少20个士兵。 Pànjūn xíjī Egypt xībù yī ge jiǎncházhàn, shāsǐ zhìshǎo 20 ge shìbīng. 19 migrants from Africa died 19非洲移民死亡 19 Fēizhōu yímín sǐwáng 19 migrants have died as lack of fresh air in a crowded boat travelling from North Africa to Italy. 北非往Italy的拥挤船上19个移民缺氧死亡。 Běifēi wǎng Italy de yōngjǐ chuán shang 19 ge yímín quēyǎng sǐwáng. Iraq bombs kill 26 Iraq zhahdahn sha 26 A series of car bombs have killed at least 26 people in Iraq's capital Baghdad. Iraq shooudu Baghdad yixihlieh qihche zhadahn shasii zhihshaao 26 rern. Kenya bus attack kills 7 Kenya bus xirji 7 sii Islamic fighters have attacked a bus and then attacked a police car that arrived the scene near the resort island of Lamu in Kenya, killing 7 people including 4 policemen. Islam zhahnshih xirji Kenya duhjiah daao Lamu fuhjihn yi jiah bus her suirhouh daohdar xiahnchaang de jiingche, shasii 7 rern baokuoh 4 'ge jiingchar. China bus crash kills 38 Zhongguor bus zhuahnghuii 38 sii A lorry carring flammable liquid has driven into the back of a long-distance bus and caused a fire and an explosion in the province of Hurnarn in southern China, killing at least 38 people. Zhongguor narnbuh Hurnarn-sheeng yi jiah zaih'zhe yihrarn yehtii de huohche zhuahngxiahng yi jiah charngtur bus de cheweei, yiinqii dahhuoo her baohzhah, zhihshaao 38 rern siiwarng. 2014-07-18 Malaysia pessenger plane crashes in Ukraine Malaysia kehji Ukraine zhuihhuii A Malaysia Airlines passenger plane reportedly has been shot down by a missile in Ukraine near the border with Russia, killing all 298 passengers and crew. Malaysia Harngkong kehji juhbaoh zaih Ukraine kaohjihn Russia bianjihng beih daaodahn jiluoh, 298 'ge cherngkeh her jiyuarn quarnbuh siiwarng. 2014-07-17 Islamic fighters kill 14 Tunisian soldiers Islam zhahnshih sha 14 Tunisia junrern Islamic fighters have attacked checkpoints in the northwest of Tunisia, near the border with Algeria, killing at least 14 soldiers and injuring 20 others. Islam zhahshih xirji Tunisia dongbeeibuh kaohjihn Algeria bianjihng de jiaancharzhahn, shasii zhihshaao 14 'ge shihbing, 20 'ge shouhshang. Microsoft to cut 18,000 jobs Microsoft cairyuarn 18,000 Microsoft plans to cut 18,000 jobs, it is the biggest job cut in its history. Microsoft jihhuah cairyyarn 18,000, shih Microsoft yooushiiyiilair zuih dah de. 2014-07-16 China's economy rises Zhongguo jingji shangsheng China's economy rises in the second quarter of the year, showing that the government's stimulus moves have started to work. Zhongguo di-2 jidu jingji shangsheng, xianshi zhengfu de ciji cuoshi kaishi qi zuoyong. 2014-07-15 Afghanistan suicide bomb kills 89 people Afghanistan zihsha zhahdahn sha 89 rern A suicide car bomb has attacked a busy market in eastern Afghanistan, killing at least 89 people and injuring many others. yi 'ge zihsha qihche zhahdahn xirji Afghanistan dongbuh yi 'ge farnmarng shihchaang, shasii zhihshaao 89 rern, duo rern shouhshang. 2014-07-14 Exercise prevents dementia yuhndohng yuhfarng chidaizhehng Doing exercise can prevent obesity, hypertension, diabetes and dementia. yuhdohng nerng farngzhii chifeir, gaoxuehya, tarngniaohbihng her chidaizhehng. 2014-07-12 Israel kills about 123 Palestine people Israel shasii yue 123'g Palestine rern The UN says that Israel has killed about 123 Palestinian people recently, most of them are civilians. Liarnherguor shuo Israel zuihjihn shasii yue 123'g Palestine rern, dahbuhfehn shih pirngmirn. Iraq army kills 255 Sunni prisoners Iraq junduih sha 255'g qiurfahn A human right group says that Iraq's army has killed at least 255 Sunni prisoners recently. rernquarn zuuzhi shuo Iraq junduih zuihjihn shasii zhihshaao 255'g Sunni qiurfahn. 2014-07-11 Kurds seize 2 oil fields Kurds duorquu 2 'ge yourtiarn Kurds duorquu 2 'ge yourtiarn Kurds seize 2 oil fiels Kurdish fighters have taken over 2 oil fields in northern Iraq and plan to be independent. Kurds zhahnshih zhahnliing Iraq beeibuh 2 'ge yourtiarn bihngqiee daasuahn durlih. Kurds zhahnshih zhahnliing Iraq beeibuh 2 'ge yourtiarn bihngqiee daasuahn durlih. Kurds fighters occupy Iraq north 2 oil fiels and plan to be independent. 2014-07-10 Israel warplanes attack Gaza killing many Israel kongxir Gaza zhahsii duo rern Israel warplanes attack Gaza, killing at least 60 people including women and children, and injuring many others. Israel kongxir Gaza, shasii zhihshaao 60 rern baokuoh fuhrur, duo rern shouhshang. 2014-07-09 Somalia fighters kill 14 soldiers Somalia zhahnshih sha 14 shihbing Islamic fighters have attacked the presidential palace in Somalia's capital Mogadishu, killing at least 14 government soldiers. Islam zhahnshih xirji Somalia shooudu zoongtoongfuu, shasii zhihshaao 14 'ge zhehngfuujun. 2014-07-03 Germany approves minimum wage Derguor tongguoh zuih di gongzi Germany has approved the country's first minimum wage. The minimum wage is 8.5 Euros per hour, which is higher than the US and UK. Derguor tongguoh gai-guor shoou'ge zuih di gongzi, meei xiaaoshir 8.5 Euro, gaoyur Meeiguor her Yingguor. US adds 288,000 jobs US zengjia 288,000 zhirweih The US economy increased 288,000 jobs in June. The unemployment rate fell to 6.1%, its lowest level since September 2008. Meeiguor Liuhyueh jingjih zengjia 288,000 'ge zhirweih. shiyehlvh die zhih 6.1%, 2008 niarn Jiuuyueh yiilair zuih di. Two killed in Myanmar cIashes Myanmar chongtu 2 sii Clashes between Buddhists and Muslims in the city of Mandalay in Myanmar have killed a Buddhist and a Muslim. Myanmar cherngshih Mandalay Forjiaohtur yuu Muslim chongtu, yi 'ge Forjiaohtur her yi 'ge Muslim siiwarng. Afghanistan suicide bomb kills 8 soldiers Afghanistan zihsha zhahdahn sha 8 shihbing Taliban suicide bomb has attacked an Air force bus in Afghanistan's capital Kabul, killing at least 8 soldiers. Taliban xirji Afghanistan shooudu Kabul yi jiah Kongjun bus, shasii zhihshaao 8 'ge shihbing. Efficacious antibiotics running out yoouxiaoh kahngshengsuh kuaih yohng warn Antibiotics work by disrupting important cellular processes of bacteria or by inhibiting reproduction. kahngshengsuh yohng yur yihzhih xihjun farnzhir. Over the last 25 years there has been a stop in the invention of efficacious antibiotics. guohquh 25 niarn meiryoou famirng yoouxiaoh de kahngshengsuh. Bacteria has become resistant to antibiotics by the means of natural resistance or random mutation. Xihjun nerng biahnhuah err diikahng kahngshengsuh. The lack of useful antibiotics would make surgery or chemotherapy impossible, as these procedures rely on antibiotics. shooushuh huoh huahliaor xuyaoh kahngshengsuh, queshaao yoouxiaoh de kahngshengsuh shii shooushuh huoh huahliaor bu keenerng. In the future, it is likely that a cut or a cough would kill. jianglair geshang huoh kersouh yee huih siiwarng. Antibiotics resistance become a problem when there is an overuse of it. lahnyohng kahngshengsuh zaohcherng xihjun kahngyaoh de wehntir. Intense farming practice and over prescription of antibiotics by doctors meant that bacteria become adapted and thrive. norngye huoh yisheng lahnyohng kahngshengsuh daaozhih xihjun de kahngyaohxihng. Resistant bacteria pass to humans from farms and hospitals via water supply, humans then pass those resistant bacteria to each others via coughing or direct hand-to-hand contact. yoou diikahnglih de xihjun corng norngchaang huoh yiyuahn jingguoh gongshuii xihtoong chuarn geei rern, jingguoh ker'sou her shoou yuu shoou de jiechuh zaih rernkoou li sahnbo. There now have strains of bacteria which have become resistant to all types of antibiotics available, making infection untreatable. xiahnjin yoou duo zhoong xihjun duih geh zhoong xiahnyoou de kahngshengsuh yoou diikahnglih, shiidaoh gaanraanbihng bu nerng zhihliaor. Scientists are lagging behind in the race against killing superbug. kexuerjia zaih duihkahng chaojir xihjun de guohcherng zhong luohhouh yur xihjun. Financial incentive from the government is urgently needed to facilitate the time and ingenuity needed for the development of new antibiotics. zhehngfur yaoh corngsuh tirgong zijin bangzhuh zhengquu shirjian famirng xin de kahngshengsuh. Ebola crisis meeting in West Africa Xifei Ebola weiji huihyih The World Health Organization (WHO) hosts an emergency meeting in Ghana as Ebola outbreaks in West Africa. It is the most serious Ebola outbreak in history as more than 400 people have died. youryur lihshii shang zuih yarnzhohng de Ebola bihngdur zaih Xifei mahnyarn daaozhih chaoguoh 400 rern siiwarng, Shihjieh Weihsheng Zuuzhi (WHO) zaih Ghana zhaohkai jiinjir huihyih. 2014-07-01 Egypt bomb explosions kill 2 policemen Egypt zhahdahn zhahsii 2 'ge jiingchar 2 bombs have exploded near the presidential palace in Egypt's capital Cairo, killing 2 policemen and injuring 3 others. Egypt shooudu Cairo zoongtoongfuu fuhjihn 2 'ge zhahdahn baohzhah, zhahsii 2 'ge jiingchar, 3 'ge shouhshang. 2014-06-30 Italy found 30 migrant bodies Italy faxiahn 30'ge yirmirn shitii Italy's navy has found about 30 migrants died as lack of oxygen in a fishing boat carrying hundreds of migrants between Sicily and the North Africa's coast. Italy haaijun zaih Sicily her Beeifei zhijian haaimiahn yi-sou zaih'zhe jiibaai'ge yirmirn de yurchuarn'shang faxiahn yue 30'ge yirmirn queyaang siiwarng. Isis establishes Islamic country Isis jiahnlih Islam guorjia The Islamic rebel army Isis has declared to establish an Islamic country on the territories it controls in Iraq and Syria. Islam pahnjun Isis xuanbuh zaih ta kohngzhih de Iraq her Syria liingtuu'shang jiahnlih Islam guorjia. 2014-06-29 North Korea fires missiles Chaorxian fasheh daaodahn North Korea has test-fired 2 short-range missiles into the sea from its east coast. Chaorxian corng dong-ahn shih-sheh 2'ge duaan-cherng daaodahn ruh haai. India building collapses kill 16 India ta-lour 16 sii Two buildings have collapsed in India, killing at least 16 people and many trapped. India 2-jian lour daaota, zhihshaao 16 rern siiwarng, duo rern beihkuhn. China fishing boat sinks near Diaoyutai Zhongguor yurchuarn Diaohyurtair fuhjihn chernmoh A China's fishing boat has sunk near Diaoyutai Islands in East China Sea. 5 people are resecured and 5 are missing. Dong Haai Diaohyurtair Qurndaao fuhjihn yi-sou Zhongguor yurchuarn Chernmoh, 5 rern huohjiuh, 5 rern shizong. 2014-06-24 China industrial output increases Zhongguor gongyeh shengchaan zengjia China's manufacturing activity increases in June, showing that its recent stimulus moves are good for its economy. Zhongguor Liuhyueh zhihzaohyeh huordohng zengjia, xiaanshih zuihjihn'd cihji cuohshi duih jingjih yoou haaochuh. Iraq rebels occupy main oil refinery Iraq pahnjun zhahnliing zhuuyaoh liahnyourchaang The insurrectionary army in Iraq has fully controlled the country's key oil refinery plant in northern Iraq. Iraq qiiyihjun warnquarn kohngzhih zaih Iraq beeibuh gai guor zhuuyaoh'd liahnyourchaang. 2014-06-14 Ukraine rebels kill 49 soldiers Ukraine pahnjun sha 49 junrern The rebel army has shot down a military plane in Eastern Ukraine, killing 49 government soldiers. Ukraine dongbuh pahnjun jiluoh yi-jiah junji, 49'ge zhehngfuujun siiwarng. 2014-06-13 Aspirin not the best to prevent stroke Aspirin预防中风不是最好 Aspirin yùfáng zhòngfēng bùshì zuì hǎo Doctors are advised by NICE (National Institute for Clinical Excellence) not to prescribe aspirin for atrial fibrillation which can lead to stroke, but instead to prescribe warfarin or other anticoagulants. NICE(国家优秀医疗研究院)建议医生,由于心房颤动会导致中风,不要开aspirin药方,可用warfarin或其他抗凝剂代替。 NICE (Guōjiā Yōuxiù Yīliáo Yánjiūyuàn) jiànyì yīshēng, yóuyú xīnfáng chàndòng huì dǎozhì zhòngfēng, bùyào kāi aspirin yàofāng, kě yòng warfarin huò qítā kàngníngjì dàitì. China plans to stimulate economy 中国计划刺激经济 Zhōngguó jìhuà cìjī jīngjì China has announced new plans for boosting its economic growth. The plans include to build railways, roads and airports along the Chang Jiang River for connecting China's less developed inland provinces to Shanghai. 中国宣布新计划催谷经济增长。计划包括长江一带建造铁路、道路和机场连接内陆落后省份至上海。 Zhōngguó xuānbù xīn jìhuà cuīgǔ jīngjì zēngzhǎng. Jìhuà bāokuò Cháng Jiāng yīdài jiànzào tiělù, dàolù hé jīchǎng liánjiē nèilù luòhòu shěngfèn zhì Shànghǎi. 2014-06-11 Red meat causes cancer 红肉导至癌症 Hóngròu dǎozhì áizhèng A US study shows that eating too much red meat could cause cancer, and suggests to eat beans, peas and lentils, poultry, nuts, and fish. 美国研究显示吃太多红肉会导至癌症; 建议吃豆,豌豆,扁豆,家禽,果仁和鱼。 Měiguó yánjiū xiǎnshì chī tài duō hóngròu huì dǎozhì áizhèng; jiànyì chī dòu, wāndòu, biǎndòu, jiāqín, guǒrén hé yú. 2014-06-08 Air pollution links to arrhythmia and lung clotting 空气污染导致心律失常和肺部血凝固 Kōngqì wūrǎn dǎozhì xīnlǜ shīcháng hé fèibù xuènínggù Air pollution causes irregular heartbeat and blood clots in the lung. Elderly people were found to be at particular risk. Air pollution makes people with circulatory problems worse. 空气污染导致不规则心跳和肺部血凝块,使血液循环问题恶化,老人影响最大。 Kōngqì wūrǎn dǎozhì bù guīzé xīntiào hé fèibù xuèníngkuài, shǐ xuèyè xúnhuán wèntí èhuà, lǎorén yǐngxiǎng zuìdà. Afghanistan flooding kills 73 Afghanistan 泛滥73死 Afghanistan fànlàn 73 sǐ Flooding has attacked northern Afghanistan, killing at least 73 people, destroying about 2,000 homes, and some 200 people are missing. Afghanistan 北部泛滥,至少73人死亡,大约 2,000 住宅被毁,约200人失踪。 Afghanistan běibù fànlàn, zhìshǎo 73 rén sǐwáng, dàyuē 2,000 zhùzhái bèi huǐ, yuē 200 rén shīzōng. 2014-06-07 Migrant boat sinks near Yemen killing 62 Yemen 附近移民船沉没62死 Yemen fùjìn yímín chuán chénmò 62 sǐ A boat has sunk near Yemen, killing 60 migrants from Somalia and Ethiopia and 2 Yemen crew members. Yemen 附近沉船,60个来自 Somalia 和 Ethiopia 的移民和2个 Yemen 船员死亡。 Yemen fùjìn chénchuán, 60 gè láizì Somalia hé Ethiopia de yímín hé 2 gè Yemen chuányuán sǐwáng. 2014-06-06 Lack of sleep causes serious problems 睡眠不足引至严重问题 Shuìmián bùzú yǐnzhì yánzhòng wèntí Studies have shown that lack of sleep can lead to serious health problems such as cancer, heart disease, diabetes, infections and obesity. 研究显示睡眠不足会导至严重健康问题,如癌症、心脏病、糖尿病、感染和痴肥。 Yánjiū xiǎnshì shuìmián bùzú huì dǎozhì yánzhòng jiànkāng wèntí, rú áizhèng, xīnzàngbìng, tángniàobìng, gǎnrǎn hé chīféi. 2014-06-05 Yemen rebels kill 14 Yemen pahnjun sha 14 rern Rebel army has attacked a government military checkpoint in southern Yemen, killing 14 people including 8 government soldiers. pahnjun xirji Yemen narnbuh yi'ge zhehngfuu junshih jiaancharzhahn, shasii 14 rern baokuoh 8'ge zhehngfuujun. Tesco's sales falls Tesco yirngyeh`er xiahjiahng Tesco has announced a third continuous quarter of falling sales as increasing competition. Tesco xuanbuh, youryur jihngzheng zengjia, yirngyeh`er liarnxuh dih-3 'ge jihduh xiahjiahng. 2014-06-04 Boko Haram kills many in Nigeria Nigeria Boko Haram shasii duo rern Boko Haram has attacked villages in northern Nigeria, killing dozens. Boko Haram xirji Nigeria beeibuh xiangcun, shasii jiishir rern. EU calls on UK to raise taxes on expansive houses EU 呼吁 UK 对贵价楼收更多税 EU hūyù UK duì guìjià lóu shōu gèngduō shuì The European Commission has called on the UK to increase taxes on higher value properties and build more homes. 欧洲委员会呼吁英国对贵价楼加税,并建筑更多住宅。 Ōuzhōu Wěiyuánhuì hūyù Yīngguó duì guìjià lóu jiāshuì, bìng jiànzhú gèngduō zhùzhái. 2014-06-03 120 die in Yemen fighting Yemen zhahndouh 120 sii Fighting between government troops and rebels in the province of Amran in northern Yemen has killed more than 120 people including about 20 government soldiers. It is believed that there were civilians killed as government warplanes bombing the area. Yemen beeibuh sheengfehn Amran, zhehngfuujun yuu pahnjun zhahndouh, chaoguoh 120 rern siiwarng baokuoh yue 20'ge zhehngfuujun. youryur zhehngfuu zhahnji hongzhah gai dihqu, xiangxihn yoou pirngmirn siiwarng. Pakistan explosion kills 7 Pakistan baohzhah 7 sii A vehicle has hit a roadside bomb in the northwest of Pakistan, killing at least 7 people and injuring 3 on the car. Pakistan dongbeeibuh yi-jiah che zhuahng dihleir, che'shang zhihshaao 7 rern siiwarng, 3 rern shouhshang. 2014-06-02 China's industrial activity increases Zhongguor gongyeh huordohng zengjia China's manufacturing activity has grown in May at the fastest speed since this year after the government stimulated the economy. zhehngfuu cihji jingjih zhihouh, Zhongguor Wuuyuehfenh zhihzaohyeh huordohng zengzhaang jinniarn yiilair zuihkuaih. Learning foreign language can prevent dementia 学习外语能预防痴呆症 Xuéxí wàiyǔ néng yùfáng chīdāizhèng Study shows that learning foreign language is good for the brain and can prevent dementia. 研究显示学习外语有利于脑部,能预防痴呆症。 Yánjiū xiǎnshì xuéxí wàiyǔ yǒulìyú nǎobù, néng yùfáng chīdāizhèng. Libya fighting kills 7 Libya 战斗7 死 Libya zhàndòu 7 sǐ Fighting between rebels and government army in Libya's city Benghazi has killed at least 7 people including some soldiers. Libya 城市 Benghazi 叛军与政府军战斗杀死至少7人包括一些士兵。 Libya chéngshì Benghazi pànjūn yǔ zhèngfǔjūn zhàndòu shāsǐ zhìshǎo 7 rén bāokuò yīxiē shìbīng. Afghanistan suicide bomb kills 3 Turkish engineers Afghanistan 自杀炸弹杀死3个 Turkey 工程师 Afghanistan zìshā zhàdàn shāsǐ 3 gè Turkey gōngchéngshī A suicide motorcycle bomb has attacked a minibus in eastern Afghanistan, killing 3 Turkish construction engineers on the minibus. Afghanistan 东部自杀摩托车炸弹袭击一架小巴,杀死小巴上3个 Turkey 建筑工程师。 Afghanistan dōngbù zìshā mótuōchē zhàdàn xíjí yī jià xiǎobā, shāsǐ xiǎobā shàng 3 gè Turkey jiànzhú gōngchéngshī. Nigeria bomb attack kills 14 Nigeria zhahdahn xirji 14 sii A bomb attack targeting people watching football at a bar in northeastern Nigeria, killing at least 14 people and injuring 12 including some are severely injured. Nigeria dongbeeibuh zhahdahn xirji yi jian jiuuba kahn zurqiur de rern, shasii zhishaao 14 rern, 12 rern shouhshang baokuoh yixie zhohngshang. 2014-06-01 Rebels kill 6 Egypt soldiers 叛军杀死 6个 Egypt 士兵 Pànjūn shāsǐ 6 gè Egypt shìbīng Islamic fighters have attacked Egypt's troops near Libya's border, killing 6 soldiers. Islam 战士袭击 Libya 边境附近的 Egypt 部队,杀死 6个士兵。 Islam zhànshì xíjí Libya biānjìng fùjìn de Egypt bùduì, shāsǐ 6 gè shìbīng. 2014-05-31 India economy slows down India 经济放缓 India jīngjì fànghuǎn The economic growth of India has slowed down in the first quarter of the year as the manufacturing sector declined. 由于制造业委缩, India 首季经济增长放缓。 Yóuyú zhìzàoyè wěisuō, India shǒujì jīngjì zēngzhǎng fànghuǎn. 2014-05-30 Japan inflation highest in 23 years 日本通胀23年来最高 Rìběn tōngzhàng 23 nián lái zuìgāo Japan's consumer prices rose 3.2% in April compared with the same period last year, it is the highest in 23 years in April. 日本四月份消费物价比去年同期上升3.2%, 是23年来四月份最高的。 Rìběn Sìyuèfèn xiāofèi wùjià bǐ qùnián tóngqī shàngshēng 3.2%, shì 23 nián lái Sìyuèfèn zuìgāo de. US economic growth slows down US jingjih fahnghuaan The economic growth of the United States has reduced to 1% in the first quarter of the year, it is the worst in 3 years. Meeiguor shooujih jingjih zengzhaang xiahjiahng zhih 1%, shih 3 niarn lair zuihcha. Tesco forms partnership with China Tesco yuu Zhongguor herhuoo Tesco has signed a partnership agreement with the state-run China Resources Enterprise to establish the biggest food retailer in China. Tesco yuu guoryirng Huarruhn Chuahngyeh qiandihng herhuoo xieryih chernglih Zhongguor zuihdah shirpiin lirngshouhshang. Ukraine rebels shoot down helicopter killing 12 Ukraine pahnjun jiluoh zhirshengji 12 sii Rebel army has shot down a government military helicopter in eastern Ukraine, killing 12 army members including a general. Ukraine dongbuh pahnjun jiluoh zhehngfuujun yi-jiah zhirshengji, 12'ge junrern siiwarng baokuoh yi'ge jiangjun. 2014-05-29 Taiwan political party calls for cooperation with Mainland China 台湾政党呼吁与大陆合作 Táiwān zhèngdǎng hūyù yǔ Dàlù hézuò The chairman of the People First Party of Taiwan, James Soong, called for economic cooperation with Mainland China to make money. 台湾亲民党主席宋楚瑜呼吁与大陆经济合作赚钱。 Táiwān Qīnmín Dǎng zhǔxí Sòng Chǔyú hūyù yǔ Dàlù jīngjì hézuò zhuànqián. CAR rebel army kill 11 people CAR 叛军杀11人 CAR pànjūn shā 11 rén Rebel army have attacked a church in the Central African Republic's capital Bangui, killing at least 11 people and injuring many others. 叛军袭击中非共和国首都 Bangui 一间教堂,杀死至少11人,多人受伤。 Pànjūn xíjī Zhōngfēi Gònghéguó shǒudū Bangui yī jiān jiàotáng, shāsǐ zhìshǎo 11 rén, duō rén shòushāng. 2014-05-28 Pakistan woman stoned to death Pakistan nvvrern beih shir'tou daasii A Pakistan woman has been killed by her family using bricks and sticks, for marrying against their wishes. yi'ge Pakistan nvvrern weirbeih jiarern'd yihyuahn jiahrern, beih jiarern yohng zhuan'tou her guhnbahng daasii. South Korea hospital fire kills 21 Harnguor yiyuahn dahhuoo 21 sii A fire has attacked a hospital in South Korea, killing at least 20 patients and 1 nurse, and injuring 6 others seriously. Harnguor yi-jian yiyuahn dahhuoo, shasii zhishaao 20'ge bihngrern her 1'ge huhshih, 6'ge zhohngshang. 2014-05-27 Iraq suicide bomb kills 17 Iraq zhahdahn sha 17 A suicide bomb has attacked a Shiah mosque in the city center of Iraq's capital Baghdad, killing at least 17 people. Violence happens often since the United States invading Iraq. There are more than 3,500 people killed since this year. yi'ge zihsha zhahdahn xirji Iraq shooudu Baghdad shihzhongxin yi-jian Shiah qingzhensih, shasii zhihshaao 17 rern. Meeiguor ruhqin Iraq yiilair baohlih jingcharng fasheng. jinniarn yiilair chaoguoh 3,500 rern beihsha. India train derail kills 23 India huooche chuguii 23 sii A passenger train has derailed and hit a staionary train in India, killing 23 people and injuring 52 including at least 15 are seriously injured. India happens train accidents often, killing several hundreds of people in recent years. India zaihkeh huooche chuguii zhuahng wernjuh huooche, 23 rern siiwarng, 52'ge shouhshang baokuoh zhihshaao 15'ge zhohngshang. India jingcharng fasheng huooche yihwaih, jihnniarn jiibaai rern siiwarng. China to destroy 6 million cars Zhongguor xiaohuii 6 baaiwahn qihche China plans to destroy 6 million cars that do not meet the standard of exhaust emission by the end of the year for improving air. Zhongguor jihhuah niarndii qiarn xiaaohuii 6 baaiwahn darbudaoh feihqih pairfahng biaozhuun'd qihche yii gaaishahn kongqih. Vietnam boat sinks off Xisha Yuehnarn chuarn Xisha chernmoh A Vietnam's boat had sunk after collided with a China's ship off Xisha Islands in the South China Sea. Narn Haai Xisha Qurndaao yi-sou Yuehnarn chuarn yuu Zhongguor chuarn xiangzhuahng chernmoh. 2014-05-26 Sony to open PlayStation factory in China Sony zaih Zhongguor kai PlayStation gongchaang Japan's Sony has signed a partnership agreement with China to make and sell PlayStation in Mainland China. Rihbeen Sony yuu Zhongguor qiandihng herhuoo xieryih zaih Zhongguor Dahluh zaoh her maih PlayStation. 2014-05-24 UK house prices rise sharply UK farngjiah jizeng The house prices of 5 seaside towns in Aberdeenshire have at least doubled since 2004, Halifax has reported. Halifax baohdaao, 2004 niarn yiilair 5'ge Aberdeenshire haaibian shihzhehn farngjiah qiimaa beihzeng. Djibouti restaurant attack kills 2 Djibouti canting xirji 2 sii Attackers have thrown grenades to a restaurant popular with Westerners in Djibouti, killing at least 2 people and injuring more than 10. xirjizhee xiahng Djibouti yi-jian Xifangrern charng-quh'd canting tourzhih shoouliurdahn, shasii zhishaao 2 rern, chaoguoh 10 rern shouhshang. Jewish Museum attack kills 3 Yourtaih Borwuhguaan xirji 3 sii A gunman has attacked the Jewish Museum in the Belgium's capital Brussels, killing 3 people and injuring seriously another. yi'ge qiangshoou xirji Belgium shooudu Belgium'd Yourtaih Borwuhguaan, shasii 3 rern, 1 rern zhohngshang. California shooting kills 6 California qiangji 6 sii A gunman has killed 6 people in the city of Santa Barbara in California in the United States. Meeiguor California cherngshih Santa Barbara yi'ge qiangshoou shasii 6 rern. Somalia attack kills 10 Somalia xirji 10 sii Islamic fighters have attacked the Somalia parliament in Mogadishu, leaving at least 10 people dead. Mogadishu Islam zhahnshih xirji Somalia guorhuih, daaozhih zhihshaao 10 rern siiwarng. Syria rebel army kills 20 people Syria pahnjun sha 20 rern Rebel army has used mortars to attack an election rally in south Syria, killing at least 20 people. Syria narnbuh pahnjun yohng paaijipaoh xirji xuaanjuu jirhuih, shasii zhishaao 20 rern. Nigeria rebel army kills 30 people Nigeria pahnjun sha 30 rern Boko Haram has attacked 3 villages in northeastern Nigeria, killing more than 30 people. Boko Haram xirji Nigeria dongbeeibuh 3'ge cunzhuang, shasii chaoguoh 30 rern. 2014-05-23 England contains huge oil resources England yuhncarng dahliahng shiryour A study shows that there are several billion barrels of petroleum mineral resources under southern England. yarnjiu xiaanshih England narnbuh yuhncarng jiishir yih toong shiryour kuahngcarng. 2014-05-22 Many killed in Baghdad Baghdad duo rern beihsha 3 bomb explosions have attacked Shia Muslim pilgrims in Iraq's capital Baghdad, killing at least 24 people. Iraq shooudu Baghdad 3 cih zhahdahn baohzhah xirji Shia Muslim chaorshehngzhee, shasii zhihshaao 24 rern. Militants destroy village wuuzhuangfehnzii cuihuii cunzhuang Militants has attacked a village in northeast Nigeria, killing at least 25 people and burning down nearly all the houses. wuuzhiangfehnzii xirji Nigeria dongbeeibuh yi'ge cunzhuang, shasii zhihshaao 25 rern, shaohuii jihu suooyoou farngwu. Rebel army kills 14 Ukraine soldiers pahnjun sha 14 Ukraine shihbing Rebel army with heavy weapon has attacked a checkpoint in eastern Ukraine, killing at least 14 soldiers. zhuangbeih zhohngxirng wuuqih'd pahnjun xirji Ukraine dongbuh yi'ge jiaancharzhahn, shasii zhihshaao 14'ge shihbing. Taiwan attack kills 3 Tairwan xirji 3 sii A student holding knife has attacked passengers on an underground train near Taibei in Taiwan, killing at least 3 people and injuring more than 25. Tairwan Tairbeei fuhjihn yi'ge xuersheng chirdao xirji dihtiee che'shang cherngkeh, shasii zhihshaao 3 rern, chaoguoh 25 shouhshang. Xinjiang attack kills 31 Xinjiang xirji 31 sii Attackers have crashed 2 cars into shoppers and thrown bombs at a market in China's Xinjiang capital Urumqi, killing at least 31 people and injuring more than 90. Zhongguor Xinjiang shooufuu Urumqi yi'ge shihchaang, xirjizhee kai 2 che zhuahng gouhwuhzhee bihng tourdahn, shasii zhihshaao 31 rern, chaoguoh 90 shouhshang. Lenovo becomes world's biggest PC maker Lenovo cherngweir shihjieh zuihdah zhihzaohshang Lenovo has become the biggest PC manufacturer of the world as its full year net profit has increased sharply 29%. Lenovo niarnduh churnlih jizeng 29%, cherngweir shihjieh zuihdah PC zhihzaohshang. 2015-05-21 Guerrillas kill 3 policemen in Cairo Cairo yourjiduih sha 3 jiingchar Gunmen have killed 3 policemen in the capital of Egypt, Cairo. Rebel army has killed hundreds of military members since Egypt's first people-elected president Mohammed Morsi has been overthrown by the military in a coup. Egypt shooudu Cairo qiangshoou shasii 3'ge jiingchar. junfang zhehngbiahn tuifan Egypt shoou'ge mirnxuaan zoontoong Mohammed Morsi yiilair, pahnjun shasii'le jiibaai'ge junfang cherngyuarn. Rebel army kills 27 in Nigeria Nigeria pahnjun sha 27 rern Rebel army has attacked 2 villages in northeastern Nigeria, killing at least 27 people. pahnjun xirji Nigeria dongbeeibuh 2'ge cunzhuang, shasii zhihshaao 27 rern. Mali rebel army occupies key town Mali pahnjun zhahnliing zhohngzhen Mali rebel army says it has defeated government forces and controlled a northern key town after heavy fighting. Mali pahnjun xuanbuh jizhahn houh daabaih zhehngfuujun, zhahnliing beeibuh zhohngzhen. China signs huge gas contract with Russia Zhongguor yuu Russia qiandihng juhxirng qihtii hertorng Russia's president Putin has signed an estimated over USD400bn, 30-year natural gas agreement with China in Shanghai summit. Russia zoongtoong Putin zaih Shahghaai fenghuih yuu Zhongguor qiandihng gujih chaoguoh USD400bn 30 niarn'd tianrarnqih xieryih. China bans Windows 8 Zhongguor jihnzhii Windows 8 Because Microsoft decides to stop supporting XP operating system, China bans the use of Windows 8 on government computers. youryur Microsoft juerdihng tirngzhii zhiyuarn XP caozuoh xihtoong, Zhongguor jihnzhii zhehgfuu diahnnaao yohng Windows 8. 2015-05-20 Nigeria bomb explosions kill many Nigeria zhahdahn baohzhah duo rern sii 2 bomb explosions have attacked the city of Jos in central Nigeria, killing at least 46 people. 2 cih zhahdahn baohzhah xirji Nigeria zhongbuh cherngshih Jos, shasii zhihshaao 46 rern. Putin arrives China for summit Putin daoh Zhongguor kai fenghuih Putin has arrived Shanghai for a summit to deepen relationship with China. Putin daohdar Shahnghaai kai fenghuih jiashen yuu Zhongguor'd guanxih. 2015-05-19 6 Mali officials killed 6'ge Mali guanyuarn beihsha Rebel army has attacked a government office in Mali, killing 6 officials. Mali pahnjun xirji zhehngfuu bahngongshih, shasii 6'ge guanyuarn. 2015-05-16 China continues oil drilling offshore of Xisha Islands Zhongguor Xisha Quarndaao lir`ahn zuahnyour jihxuh China says it will continue oil drilling offshore of Xisha Islands, despite of anti-Chinese riots in Vietnam. jiinguaan Yuehnarn faan-Huar baohdohng, Zhongguor shuo huih jihxuh Xisha Qurndaao lir`ahn'd zuahnyour. Olanzapine could cause diabetes Olanzapine huih daaozhih tarngniaohbihng The US Food and Drug Administration warns that Olanzapine has a risk of causing diabetes. Meeiguor Shirpiin her Yaohwuh Xirngzhehngbuh jiinggaoh, Olanzapine yoou daaozhih tarngniaohbihng'd fengxiaan. 2014-05-15 Sony shares fall 7% Sony股票跌7% Sony gǔpiào diē 7% Sony shares have fallen by 7% after the company forecast its second continuous year of losses. 由于预计连续第二年亏损, Sony 股票下跌7%. Yóuyú yùjì liánxù dì-èr nián kuīsǔn, Sony gǔpiào xiàdié 7%. 16 Chinese killed in Vietnam anti-Chinese riot Yuehnarn faan-Huar baohdohng 16 Huarrern beihsha Anti-Chinese rioters have attacked Chinese factories in Vietnam, killing 16 Chinese and injuring many others. Yuehnarn faan-Huar baohtur xirji Huarern gongchaang, shasii 16 Huarern, duo rern shouhshang. 2014-05-14 Vietnam protesters burn Chinese factories Yuehnarn kahngyihzhee shao Huarrern gongchaang Yuehnarn kahngyihzhee shao Huarrern gongchaang Vietnam protesters burn Chinese factories Anti-Chinese protesters have attacked industrial parks in southern Vietnam, burning down at least 15 Chinese factories. Yuehnarn narnbuh faan-Huar kahngyihzhee xirji gongyehcun, shaohuii zhihshaao 15-jian Huarern gongchaang. Yuehnarn narnbuh faan-Huar kahngyihzhee xirji gongyehcun, shaohuii zhihshaao 15-jian Huarern gongchaang. Vietnam the south anti-Chinese protesters attack industrial parks, burning down at least 15 Chinese factories. China industrial growth slows in April 中国四月工业增长放缓 Zhōngguó Sìyuè gōngyè zēngzhǎng fànghuǎn China's industrial growth in April is lower than expected, making people worry about the world's second biggest economy may slow down. 中国四月工业增长比预期低,使人们忧虑这世界第二大经济体会放缓。 Zhōngguó Sìyuè gōngyè zēngzhǎng bǐ yùqí dī, shǐ rénmen yōulǜ zhè shìjiè dì-èr dà jīngjìtǐ huì fànghuǎn. Turkey coal mine explosion kills many people Turkey meirkuahng baohzhah duo rern sii A coal mine has exploded in western Turkey, killing more than 200 mine workers and injuring many. Turkey xibuh meirkuahng baohzhah, chaoguoh 200'ge kuahnggong siiwarng, duo'ge shouhshang. 2014-05-13 Rebel army kills 7 Ukraine soldiers pahnjun shasii 7'ge Ukraine shihbing Rebel army has ambushed an armored car in Donetsk, killing 7 Ukraine soldiers and injuring many. Donetsk pahnjun mairfur yi-jiah zhuangjiaache, shasii 7'ge Ukraine shihbing, duo'ge shouhshang. High blood pressure harms health gaoxuehya weihaih jiahnkang High blood pressure can cause stroke, coronary heart disease, kidney disease and heart failure. Treatments for high blood pressure include medicine therapy, diet therapy and exercise. gaoxuehya huih daaozhih zhohngfeng, guanxinbihng, shehnbihng her xinshuaijier. yizhih gaoxuehya yoou yaohwuh zhihliaor, shirliaor her yuhndohng. Lack of sleep damages health shuihmiarn buzur suunhaih jiahnkang Lack of sleep can cause cancer, heart disease, type-2 diabetes, infections and obesity. shuihmiarn buzur kee daaozhih airzhehng, xinzahngbihng, 2-xirng tarngniaohbihng, gaanraan her chifeir. 2014-05-12 China strengtens secuity in Beijing Zhongguor jiaqiarng Beeijing baao`an China has deployed armed police patrol car in Beijing following attacks have spread around the country. suir'zhe xirji mahnyarn, Zhongguor zaih Beeijing buhshuu wuujiing xurnluorche. UK interest rate would rise UK lihlvh huih shahngsheng The interest rates of the UK are predicted to increase to 0.75% from 0.5% in early 2015 as its economy growth rises again. youryur UK jingjih zengzhaang huirsheng, yuhjih 2015 niarnchu lihlvh huih corng 0.5% zengjia daoh 0.75%. China to build new Africa railway Zhongguor jiahnzaoh xin Feizhou tieeluh China will build a new railway line in Eastern Africa linking Kenya, Uganda, Rwanda and South Sudan. Zhongguor huih zaih Dongfei jiahnsheh xin tieeluhxiahn liarnjie Kenya, Uganda, Rwanda her South Sudan. 2014-05-10 Yemen soldiers killed Yemen shihbing beihsha Rebel army has attacked a gate outside the presidential palace in the capital of Yemen, Sanaa, killing at least 4 soldiers. pahnjun xirji Yemen shooudu Sanaa zoongtoongfuu waihmiahn zharmern, shasii zhihshaao 4'ge shihbing. 2014-05-09 UK GDP close to last pre-crisis level UK GDP jiejihn shahngcih weiji qiarn shuiipirng The UK's economy is close to recovering its last pre-financial crisis level of economic activity. Economic output at the end of April was just 0.17% below its last pre-recession peak. UK jingjih jiejihn huirdaoh shahngcih cairzhehng weiji qian'd jingjih huordohng shuiipirng. Sihyueh dii jingjih chaanliahng zhii 0.17% diyur shahngcih shuaituih qian'd fengdiing. Biggest heart disease factor zuihdah xinzahngbihng yinsuh Lack of exercise is the biggest risk factor for heart disease. Other factors including smoking, obesity, high blood pressure and high cholesterol. At least 30 minutes of daily exercise can reduce risk of heart disease. quefar yuhndohng shih xinzahngbihng'd zuihdah fengxiaan yinsuh. Qirta yinsuh baokuoh xiyan, chifeir, gaoxuehya her gao daanguhchurn. meeitian zhihshaao yuhndohng 30 fenzhong kee jiaanshaao xinzahngbihng fengxiaan. 300 killed in Nigeria Nigeria 300 rern beihsha Suspected Islamic rebel army Boko Haram have attacked a town in the northeast of Nigeria, killing more than 300 people. huairyir'd Islam pahnjun Boko Haram xirji Nigeria dongbeeibuh yi'ge shihzhehn, shasii chaoguoh 300 rern. 2014-05-08 Bomb kills 9 Pakistan soldiers zhahdahn sha 9 Pakistan shihbing A roadside bomb has attacked a military vehicle in Pakistan, killing at least 9 soldiers and injuring seriously several others. The military vehicle was traveling near the border with Afghanistan, in an area which is a hotbed of Taliban activity in Pakistan. Pakistan luhbian zhahdahn xirji yi-jiah junche, shasii zhihshaao 9'ge shihbing, jii'ge zhohngshang. zheh junche dangshir zaih jiejihn Afghanistan bianjing yi'ge Taliban huordohng wenchuarng dihqu xirngshii zhong. Barclays to cut 19,000 jobs Barclays cairyuarn 19,000 Barclays will cut 19,000 jobs by the end of 2016 including more than 9,000 to cut in the UK. Barclays huih yur 2016 niarndii qiarn cairyuarn 19,000 baokuoh Yingguor chaoguoh 9,000. Toyota profit nearly doubles Toyota利润几乎两倍 Toyota lìrùn jīhū liǎngbèi Toyota's full-year net profit has increased sharply nearly double to USD17.8bn in the year to March 31, as the Yen's weakness and cost cutting. 由于日元疲弱和降低成本,至3月31日 Toyota 全年纯利大幅度增加几乎两倍至 USD17.8bn. Yóuyú Rìyuán píruò hé jiàngdī chéngběn, zhì 3 yuè 31 rì Toyota quánnián chúnlì dàfúdù zēngjiā jīhū liǎngbèi zhì USD17.8bn. China's imports and exports rebound Zhongguor jihnchukoou faantarn China's imports and exports have rebounded in April, helping reduce worry about its economy could slow down. Zhongguor Siyueh jihnchukoou faantarn, yoouzhuh jiaanshaao youlvh ta'd jingjih huih fahnghuaan. 2014-05-07 Sainsbury's profit rises Sainsbury's yirnglih shahngsheng UK supermarket Sainsbury's has reported a 16.3% rise in annual pre-tax profit to £898m. UK chaoshih Sainsbury's niarnduh shuih-qiarn yirnglih shahngsheng 16.3% zhih £898m. China and Vietnam ships collide offshore of Xisha Islands Xisha Qurndaao haaimiahn Zhongguor yuu Yuehnarn chuarnzhi xiangzhuahng China's ships and Vietnam's navy vessels have collided nearby a China's oil drilling platform offshore of Xisha Islands in the South China Sea. Narn Haai Xisha Qurndaao haaimiahn Zhongguor zuahnyourtair fuhjihn, Zhongguor chuarnzhi yuu Yuehnarn chuarnjiahn xiangzhuahng. Kenya poisonous wine kills many Kenya durjiuu shasii duo rern More than 60 people have been killed and dozens of others have been blinded in Kenya, after drinking the wine believed to have been added with industrial chemicals. zaih Kenya, youryur he'le xiangxihn jia'le gongyeh huahxuerpiin'd jiuu, chaoguoh 60 rern siiwarng, jiishir rern shimirng. 2014-05-06 US trade deficit falls US nihcha xiahjiahng The US trade deficit has fallen in March, as its export has risen sharply. Meeiguor Sanyueh chukoou dahfur shahngsheng, nihcha xiahjiahng. Guangzhou knife attack Guaangzhou chirdao xirji A knife attack at a station in the city of Guangzhou in the south of China has injured at least 6 people. Zhongguor narnbuh Guaangzhou-shih yi'ge chezhahn fasheng chirdao xirji, zhihshaao 6 rern shouhshang. 2014-05-05 Ukraine rebels kill government soldiers Ukraine pahnjun sha zhehngfuujun Rebel army has killed 4 government soldiers and shot down a helicopter near the city of Sloviansk in the east of Ukraine. pahnjun zaih Ukraine dongbuh cherngshih Sloviansk fuhjihn shasii 4'ge zhehngfuujun, jiluoh yi-jiah zhirshengji. Nigeria rebels "to sell" abducted girls Nigeria pahnjun "huih maih" beih jierchir nvvhair Nigeria's Islamic rebel army Boko Haram has said it will sell the hundreds of schoolgirls it abducted 3 weeks ago. Nigeria Islam pahnjun Boko Haram shuo huih maih 3 xingqi qiarn baangjiah'd jiibaai'ge nvvxuesheng. Crew missing after ship sinks off Hong Kong Xianggaang chernchuarn, chuarnyuarn shizong At least 11 crew members are missing after 2 ships have collided off the coast of southtern Hong Kong. Xianggaang narnbuh haaimiahn 2-sou chuarn xiangzhuahng, zhihshaao 11'ge chuarnyuarn shizong. Odessa police release detainees Odessa jiingfang shihfahng beihjujihnzhee The police have released more than 60 detainees after their headquarters has been attacked by protesters in the port city of Odessa in Ukraine. Ukraine haaigaang chergshih Odessa jiingchar zoongjur beih kahngyizhee xirji houh, jiingfang shihfahng chaoguoh 60'ge beihjujihnzhee. 2014-05-04 Nairobi bomb attacks kill 3 Nairobi炸弹袭击3死 Nairobi zhàdàn xíjí 3 sǐ Two explosions on buses in the capital of Kenya, Nairobi, have killed 3 people and injured at least 62 others. Kenya首都Nairobi两架巴士爆炸,3人死亡,至少62人受伤。 Kenya shǒudū Nairobi liǎng jià bāshì bàozhà, 3 rén sǐwáng, zhìshǎo 62 rén shòushāng. China bridge collapse kills 11 Zhongguor ta qiaor 11 sii An illegal building bridge has collapsed in the province of Guaangdong in southern China, killing 11people. Zhongguor narnbuh Guaangdong-sheeng yi-tiaor feifaa jiahnzaoh-zhong'd qiaorliarng daaota, 11 rern siiwarng. India rebel army kills 32 India pahnjun sha 32 rern Separatist guerrillas have attacked a villiage living mainly immigrants in the northeastern province of Assam in India, killing 32 people. Fenlirzhuuyih yourjiduih xirji India dongbeeibuh Assam-sheeng yi'ge zhuuyaoh waihlair yirmirn juzhuh'd xiangcun, shasii 32 rern. 2014-05-03 Ethiopia army kills dozens of students Ethiopia junrern sha jiishir xuersheng Ethiopia soldiers have opened fire to protesters, killing dozens of people including many students. Ethiopia shihbing xiahng kahngyihzhee kaihuoo, shasii jiishir rern baokuoh heen duo xuersheng. Ukraine clashes kill dozens Ukraine chongtu jiishir rern sii Clashes between pro-Russia and pro-government people in southwestern Ukraine has killed at least 31 people. Ukraine xinarnbuh qin-Russia yuu qin-zhehngfuu rernshih chongtu, zhihshaao 31 rern siiwarng. Samsung ordered to pay Apple US$119.6m Samsung beih pahn fuh Apple US$119.6m A US court has ordered Samsung to pay US$119.6m to Apple for violating its patents. Meeiguor faatirng pahnjuer, youryur qinfahn zhuanlih, Samsung fuhgeei Apple US$119.6m. US employment increases sharply Meeiguor jiuhyeh dahfurduh shahngsheng US employment increased 288,000 jobs in April, the strongest monthly job creation since January 2012. The unemployment rate fell to 6.3%. Meeiguor Sihyuehfehn jiuhyeh rernshuh zengjia 288,000'ge, shih 2012 niarn Yiyueh yiilair zengjia zuih duo'd yuehfehn. Shiyelvh diezhih 6.3%. 2014-05-02 Ukraine troops kill many people Ukraine junduih shasii duo rern Troops have attacked the east of Ukraine, killing and injuring many people. Junduih gongji Ukraine dongbuh, duo rern shangwarng. Afghanistan landslide kills hundreds Afghanistan shanbeng jiibaai sii A landslide has buried hundreds of homes in the northeast of Afghanistan, killing hundreds of people and thousands are missing. Afghanistan dongbeeibuh shanbeng yanmair jiibaai zhuhzhair, jiibaai rern siiwarng, jiiqian rern shizong. Fiber good for heart Xianweir lihyur xinzahng High-fiber food improves blood pressure and cholesterol, helps to prevent and cure heart disease. Vegetables, fruits and cereals are all high-fiber foods. Gao-xianweir shirwuh gaaishahn xuehya her daanguhchurn, bangzhuh farngzhih xinzahngbihng. Shuguoo her guuleih dou shih gao-xianweir shirwuh. 2014-05-01 Sony Predicts bigger loss Sony yùcè gèng dà kuīsǔn Sony 预测更大亏损 Japan's Sony has said it will report a bigger-than-expected loss for the year to March. Rìběn Sony shuō jiānghuì gōngbù dàyú yùqí de zhì Sānyuè de niándù kuīsǔn. 日本 Sony 说将会公布大于预期的至三月的年度亏损。 IMF approves USD17bn Ukraine bailout IMF pīzhǔn yuánzhù Ukraine USD17bn IMF 批准援助 Ukraine USD17bn The IMF has approved a USD17bn bailout for Ukraine to help solve the country's economic difficulty. IMF pīzhǔn USD17bn yuánzhù Ukraine, bāngzhù jiějué gāi guó de jīngjì kùnnán. IMF 批准 USD17bn 援助 Ukraine, 帮助解决该国的经济困难。 Sanctions damage Russia's economy Zhìcái sǔnhài Russia jīngjì 制裁损害 Russia 经济 IMF has said USD100bn would leave Russia this year because of sanctions on the country. IMF shuō, yóuyú Russia bèi zhìcái, jīnnián huì yǒu USD100bn chèlí gāi guó. IMF 说,由于 Russia 被制裁,今年会有 USD100bn 撤离该国。 Exercise after dinner helps to slim Wǎnfàn hòu yùndòng yǒuzhù jiǎnféi 晚饭后运动有助减肥 To do physical exercise after dinner can help to digest fats and reduce body weight. Wǎnfàn hòu yùndòng yǒuzhù xiāohuà zhīfáng hé jiàngdī tǐzhòng. 晚饭后运动有助消化脂肪和降低体重。 2014-04-30 Libya car bomb kills 2 soldiers Libya qihche zhahdahn sha 2 shihbing A car bomb has exploded at the gates of a military barracks near the airport in the city of Benghazi in Libya, killing 2 soldiers. yi'ge qihche zhahdahn zaih Libya Benghazi-shih jichaang fuhjihn junyirng'd zharmern baohzhah, shasii 2'ge shihbing. UK economy grows 0.8% UK jingjih Zengzhaang 0.8% UK's economy has grown 0.8% in the first quarter of 2014, the fifth continuous quarter of growth. Yingguor 2014 niarn shooujih jingjih zengzhaang 0.8%, liarnxuh dih-5 'ge jihduh zengzhaang. Xinjiang attack kills 3 Xinjiang xirji 3 sii " A bomb and knife attack at a railway station in China's Xinjiang region has killed 3 people and injured 79 others. Zhongguor Xinjiang dihqu huoochezhahn zhahdahn her chirdao xirji shasii 3 rern, 79 rern shouhshang. US economy slows US jingjih fahngmahn United states' economic growth slows down sharply to 0.1% in the first quarter of the year. Meeiguor shooujih jingjih zengzhaang dahfurduh fahnghuaan zhih 0.1%. 2O14-04-29 Samsung mobile phone sales decline Samsung shǒujī xiāoshòu xiàjiàng Samsung手机销售下降 Samsung has reported a 4% decline in sales at its mobile phone business in the first quarter of 2014. Samsung gōngbù 2014 nián dìyī jìdù shǒujī yèwù xiāoshòu xiàjiàng 4%. Samsung公布2014年第一季度手机业务销售下降4%. 2014-04-28 Microsoft must release overseas data Microsoft bihxu jiaochu haaiwaih ziliaoh A US judge has ordered Microsoft to hand over a customer's emails, even though the data is held on a server in Ireland. Meeiguor faaguan mihnglihng Microsoft jiaochu yi'ge yohnghuh'd email, jiinguaan ziliaoh chuucurn zaih Ireland'd server. Pakistan pupils killed in explosion Pakistan xuéshēng bèi zhàsǐ Pakistan 学生被炸死 A grenade has exploded at a religious school in the southern city of Karachi in Pakistan, killing at least 3 children and injuring several others. Pakistan nánbù chéngshì Karachi 1 jiān zōngjiào xuéxiào 1 gè shǒuliúdàn <|fim▁hole|> jǐgè shòushāng. Pakistan南部城市Karachi 1间宗教学校1个手榴弹爆炸,炸死至少3个儿童,几个受伤。 Afghanistan floods kill at least 80 Afghanistan fànlàn zhìshǎo 80 sǐ Afghanistan 泛滥至少80死 Floods have attacked northern Afghanistan, killing at least 80 People and more than 80 people are missing. Thousands of homes are destroyed as most houses are made of mud. Hóngshuǐ xíjí Afghanistan běibù, shāsǐ zhìshǎo 80 rén, chāoguò 80 rén shīzōng. Yóuyú fángwū dàduō ní zào, shùqiān jiāyuán bèihuǐ. 洪水袭击 Afghanistan 北部,杀死至少80人,超过80人失踪。由于房屋大多泥造,数千家园被毁。 2014-04-27 Russia rehab center fire kills 8 Russia jièdúsuǒ dàhuǒ 8 sǐ Russia 戒毒所大火8死 A fire has destroyed a rehabilitation center for drug addicts in Russia's eastern Altai region, killing 8 people and injuring 6 others. Dàhuǒ shāohuǐ Russia dōngbù Altai dìqū 1 jiān jièdúsuǒ, shāosǐ 8 rén, 6 rén shòushāng. 大火烧毁 Russia 东部 Altai 地区1间戒毒所,烧死8人,6人受伤。 2014-04-26 Russia "to help free European observers" Russia "bāngzhù shìfàng Ōuzhōu guāncháyuán" Russia "帮助释放欧洲观察员" Russia says it will try its best to help free European military observers detained in eastern Ukraine by pro-Russian separatists. Russia shuō huì jìnlì bāngzhù shìfàng zài Ukraine dōngbù bèi qīn-Russia fēnlífènzǐ kòuyā de Ōuzhōu jūnshì guāncháyuán. Russia说会尽力帮助释放在Ukraine东部被亲Russia分离分子扣押的欧洲军事观察员。 Taliban "shot down" UK helicopter Taliban "jíluò" UK zhíshēngjī Taliban "击落" UK 直升机 The Taliban claims that it has shot down a UK military helicopter in southern Afghanistan, killing 5 NATO soldiers. Taliban shēngchēng zài Afghanistan nánbù jíluò 1 jià UK jūnyòng zhíshēngjī, shā sǐ 5 gè NATO jūnrén. Taliban 声称在 Afghanistan 南部击落1架 UK 军用直升机,杀死5个 NATO 军人。 China bans eating rare animals Zhōngguó jìnzhǐ chī xīyǒu dòngwù 中国禁止吃稀有动物 Caught eating rare animals in China could be jailed for up to 10 years. Zài zhōngguó bǔshí xīyǒu dòngwù huì jiānjìn gāodá 10 nián. 在中国捕食稀有动物会监禁高达10年。 Baghdad explosions kill 31 Baghdad bàozhà 31 sǐ Baghdad 爆炸31死 A series of bombs have attacked a Shiah election rally in Iraq's capital Baghdad, killing at least 31 people. Iraq shǒudū Baghdad yīxìliè zhàdàn xíjí yīgè Shiah xuǎnjǔ jíhuì, shā sǐ zhìshǎo 31 rén. Iraq 首都 Baghdad 一系列炸弹袭击一个 Shiah 选举集会,杀死至少31人。 2014-04-25 Nokia sold its mobile phone business Nokia màile shǒujī yèwù Nokia 卖了手机业务 Microsoft has bought Nokia's mobile phone business for 5.44bn Euros. Microsoft yǐ 5.44bn Euro mǎile Nokia de shǒujī yèwù. Microsoft 以 5.44bn Euro 买了 Nokia 的手机业务。 India Maoists kill election officers India Máozhǔyìzhě shā xuǎnjǔ guānyuán India 毛主义者杀选举官员 Maoist guerrillas have set off a landmine to attack a bus, killing 3 election officials and 5 policemen. Maoists say they are fighting for the poor. Máozhǔyì yóujīduì yǐnbào dìléi xíjī yī jià bāshì, shāsǐ 3 ge xuǎnjǔ guānyuán hé 5 ge jǐngchá. Máozhǔyìzhě shuō shì wèi qióngrén zhàndòu. 毛主义游击队引爆地雷袭击一架巴士,杀死3个选举官员和5个警察。毛主义者说是为穷人战斗。 2014-04-24 Kenya car bomb Kills 4 people Kenya qìchē zhàdàn shā 4 rén Kenya 汽车炸弹杀4人 A car bomb has exploded outside a police station in the capital of Kenya, Nairobi, killing 4 people, including 2 policemen. Kenya shǒudū Nairobi jǐngjú wàimiàn yīge qìchē zhàdàn bàozhà, shāsǐ 4 rén, bāokuò 2 ge jǐngchá. Kenya 首都 Nairobi 警局外面一个汽车炸弹爆炸,杀死4人,包括2个警察。 Afghanistan policeman kills 3 foreigners Afghanistan jiingchar sha 3 waihguorrern A policeman has shot dead 3 foreigners at a hospital in Afghanistan's capital Kabul. Afghanistan shooudu Kabul 1'ge jiingchar qiangsha 3'ge waihguorrern. Facebook earnings rise sharply on mobile ads Facebook guaanggaoh shouyih dahfurduh shahngsheng Facebook says its growing mobile users have helped it boost its advertising earnings. Facebook shuo ta'd shoouji yohnghuh zengzhaang bangzhuh cuhjihn guaanggaoh shouyih. 2014-04-23 Bomb kills senior Egypt policeman Zhahdahn shasii gaojir Egypt jiingchar A bomb has exploded in Egypt's capital Cairo, killing a senior police officer. Violence against the military happens often after the military coup. Egypt shoodu Cairo zhadahn zhahsii 1'ge gaojir jiingguan. junshih zhehngbiahn houh, baohlih faankahng junfang jingcharng fasheng. 2014-04-22 World's fastest lift shihjieh zuihkuaih diahnti Hitachi says it will install a lift of speeds up to 72km/h into a high building in Guangzhou, China. Hitachi shuo huih zaih Zhongguor Guaangzhou yi-jian gaolour anzhuang yi-jiah suhduh gaodar 72km/h 'd diahnti. Japan's trade deficit is 4 times Rihbeen maohyih nihcha 4 beih Japan's trade deficit is 4 times last month compared to March of 2013, because of export growth slows down and energy imports increase. youryur chukoou fahnghuaan her nerngyuarn jihnkoou zengjia, Rihbeen shahngyueh maoyih nihcha shih 2013 niarn Sanyueh'd 4 beih. 2014-04-20 Algeria guerrillas kill 14 soldiers Algeria yourjiduih sha 14 shihbing Islamic fighters have ambushed a military convoy in a mountain area east of Algeria's capital Algiers, killing 14 soldiers. Islam zhahnshih mairfur Algeria shoodu Algiers dongmiahn shanqu yi'ge junfang cheduih, shasii 14'ge shihbing. Japan to base troops near Diaoyutai Rihbeen zhuhjun Diaohyurtair fuhjihn Japan has begun to build a military base on Yonaguni island near Diaoyutai islands. Rihbeen kaishii zaih Diaohyurtair qurndaao fuhjihn'd Yunaguni daao jiahnzhuh junshih jidih. 2014-04-19 Bahrain car explosion kills 2 Bahrain qihche baohzhah 2 sii A car has exploded when traveling in Bahrain, killing 2 people and injuring another seriously. Bahrain yi-jiah xirngshii-zhong'd qihche baohzhah, 2 rern siiwarng, 1 rern zhohngshang. China gold demand increases Zhongguor huarngjin xuqiur zengjia China's demand for gold is expected to increase 20% by 2017, because of Chinese people become increasingly rich. youryur Zhongguorrern biahn'de yuehlairyueh fuhyoou, Zhongguor huarngjin xuqiur yuhjih 2017 niarn zengjia 20%. 2014-04-18 Qomolangma snowslide kills 12 Qomolangma xueebeng 12 sii A snowslide has attacked a mountaineering base on Mount Qomolangma, also known as Mount Everest, killing at least 12 people and many others are missing. xueebeng xirji Qomolangma Feng (yee jiaohzuoh Everest Feng) yi'ge dengshan jidih, zhihshaao 12 rern siiwarng, duo rern shizong. 2014-04-17 Earth-like planet discovered Earth-like planet discovered sih-Dihqiur xirngxing beih faxiahn faxiahn sih-Diqiur xirngxing faxiahn sih-Diqiur xirngxing discover Earth-like planet The Kepler telescope has discovered a planet that is simular in size to the Earth and that may contain water on its surface. The Kepler telescope has discovered a planet that is similar in size to the Earth and that may contain water on its surface. Kepler wahngyuaanjihng faxiahn'le yi'ge xirngxing nah shih jihnsih zaih dahxiaao duih Diqiir her nah keenerng harnyoou shuii zaih ta'd biaaomiahn. Kepler wahngyuaanjihng faxiahn yi'ge rur Diqur dah, biaaomiahn keenerng yoou shuii'd xirngxing. Kepler wahngyuaanjihng faxiahn yi'ge rur Diqur dah, biaaomiahn keenerng yoou shuii'd xirngxing. Kepler telescope discovers a be similar Earth big, surface probably has water's planet. 2014-04-16 Hundreds missing as South Korea ferry sinks Hundreds missing as South Korea ferry sinks shuhbaai shizong youryur Harnguor duhlurn chernmoh Harnguor duhlurn chernmoh, shuhbaai shizong Harnguor duhlurn chernmoh, shuhbaai shizong South Korea ferry sinks, hundreds are missing About 300 people are missing after a ferry carrying more than 470 people mainly students capsized and sank near South Korea's resort island Jeju. About 300 people are missing after a ferry carrying more than 470 people mainly students capsized and sank near South Korea's resort island Jeju. dahyue 300 rern shizong zaih...zhihouh yi-sou duhlurn zaih'zhe chaoguoh 470 rern zhuuyaoh'dy xuersheng fuhmoh'le kaohjihn Harnguor'd duhjiah daao Jeju. Harnguor duhjiah daao Jeju fuhjihn yi-sou zaih'zhe chaoguoh 470 rern zhuuyaoh shih xuersheng'd duhlurn fuhmoh, dahyue 300 rern shizong. Harnguor duhjiah daao Jeju fuhjihn yi-sou zaih'zhe chaoguoh 470 rern zhuuyaoh shih xuersheng'd duhlurn fuhmoh, dahyue 300 rern shizong. South Korea's resort island Jeju vicinity a carrying more than 470 people mainly are students' ferry capsizes and sinks, about 300 people are missing. China's economic growth slows down China's economic growth slows down Zhongguor'd jingjih'd zengzhaang fahnghuaan Zhongguor jngjih zengzhaang fahnghuaan Zhongguor jingjih zengzhaang fahnghuaan China's economic growth slows down China's economic growth slows down to 7.4% in the first quarter of this year from 7.7% in the fourth quarter of last year. China's economic growth slows down to 7.4% in the first quarter of this year from 7.7% in the fourth quarter of last year. Zhongguor'd jingjih'd zengzhaang fahnghuaan zhih 7.4% zaih zheh dih-1 jihduh shuuyur jinniarn corng 7.7% zaih zheh dih-4 jihduh shuuyur quhniarn. Zhongguor jingjih zengzhaang corng quhniarn di-4 jihduh'd 7.7% fahnghuaan daoh jinniarn dih-1 jihduh'd 7.4%. Zhongguor jingjih zengzhaang corng quhniarn di-4 jihduh'd 7.7% fahnghuaan daoh jinniarn dih-1 jihduh'd 7.4%. China's economic growth from last year fourth quarter's 7.7% slows down to this year first quarter's 7.4%. 2014-04-14 Global trade speeds up Global trade speeds up Quarnqiur maohyih jiakuaih Quarnqiur maohyih jiakuaih Quarnqiur maohyih jiakuaih Global trade speeds up International trade will grow 4.7% this year and 5.3% next year, the WTO says. International trade will grow 4.7% this year and 5.3% next year, the WTO says. Guorjih maohyih huih zengzhang 4.7% jinniarn err 5.3% mirngniarn, zheh WTO shuo. WTO shuo, guorjih maohyih jinniarn huih zengzhaang 4.7%, mirgniarn 5.3%. WTO shuo, guorjih maohyih jinniarn huih zengzhaang 4.7%, mirgniarn 5.3%. WTO says, international trade this year will grows 4.7%, next year 5.3%. 2014-04-10 China's imports & exports decrease China's imports & exports decrease Zhongguor'd jihnkoou & chukoou jiaanshaao Zhongguor jihnchukoou jiaanshaao Zhongguor jihnchukoou jiaanshaao China imports and exports decrease China's exports and imports have decreased sharply in March, making people worry about the slowdown of the world's second-largest economy. China's exports and imports have decreased sharply in March, making people worry about the slowdown of the world's second-largest economy. Zhongguor'd chukoou her jihnkoou jiaanshaao'le jierrarn'dy zaih Sanyueh, shii rern'men danxin zheh fahnghuaan shuuyur zheh shihjieh'd dih-2 zuihda jingjihtii. Zhongguor Sanyuehfehn jihnchukoou dahfurduh jiaanshaao, shii rern danxin zheh'ge shihjieh dih-2 dah jingjihtii fahnghuaan. Zhongguor Sanyuehfehn jihnchukoou dahfurduh jiaanshaao, shii rern danxin zheh'ge shihjieh dih-2 dah jingjihtii fahnghuaan. China March period imports and exports substantially decrease, making people worry about this world second big economy slows down. 2014-04-08 Nigeria is Africa's biggest economy Nigeria is Africa's biggest economy Nigeria shih Feizhou'd zuihdah jingjihtii Nigeria shih Feizhou zuidah jingjihtii Nigeria shih Feizhou zuidah jingjihtii Nigeria is Africa biggest economy Nigeria has exceeded South Africa and becomes the biggest economy in Africa, but its population is 3 times of South Africa's. Nigeria has exceeded South Africa and becomes the biggest economy in Africa, but its population is 3 times of South Africa's. Nigeria chaoyueh'le Narnfei her cherngweir zuihda'd jingjihtii zaih Feizhou, dahnshih ta'd rernkoou shih 3 beih duih Narnfei'd. Nigeria chaoyueh Narnfei cherngweir Feizhou zuihdah jingjihtii, dahnshih ta'd rernkoou shih Narnfei'd 3 beih. Nigeria chaoyueh Narnfei cherngweir Feizhou zuihdah jingjihtii, dahnshih ta'd rernkoou shih Narnfei'd 3 beih. Nigeria exceeds South Africa becomes Africa biggest economy, but its population is South Africa's 3 times. 2014-04-07 Somalia 2 UN employees killed Somalia 2 UN employees killed Somalia 2'ge UN guhyuarn beihsha Somalia 2 UN guhyuarn beihsha Somalia 2 UN guhyuarn beihsha Somalia 2 UN employees be killed A person wearing a police uniform has shot dead 2 United Nations employees including a British man in Somalia. A person wearing a police uniform has shot dead 2 United Nations employees including a British man in Somalia. yi'ge rern chuan yi-taoh jiingchar zhihfur qiangsha'le 2'ge Liarnherguor guhyuran baokuoh yi'ge Yingguor'd narnrern zaih Somalia. Somalia yi'ge chuan jiingfur'd rern qiangsha 2'ge Liarnherguor guhyuarn baokuoh yi'ge Yingguor narnrern. Somalia yi'ge chuan jiingfur'd rern qiangsha 2'ge Liarnherguor guhyuarn baokuoh yi'ge Yingguor narnrern. Somalia a wearing police uniform's person shoot dead 2 United Nations employees including a British man. 2014-04-03 Exercise is good to heart Exercise is good to heart yuhndohng shih haao'd duih xinzahng yuhndohng lihyur xinzahng yuhndohng lihyur xinzahng exercise is beneficial to heart Exercise makes heart muscle strong and causes heart healthy. Regular exercise especially aerobic exercise helps to burn calories, balances blood pressure, lowers bad cholesterol and boosts good cholesterol. The risk of getting heart disease of active people compared to inactive people lower 50%. Exercise makes heart muscle strong and causes heart healthy. yuhndohng shii xinzahng jirouh qiarngzhuahng her daaozhih xinzahng jiahnkang. Regular exercise especially aerobic exercise helps to burn calories, balances blood pressure, lowers bad cholesterol and boosts good cholesterol. dihngqi'd yuhndohng yourqir'dy yoouyaang'd yuhndohng bangzhuh rarnshao calorie, pirngherng xuehya, jiahngdi huaih'd daanguhchurn her cuhjihn haao'd daanguhchurn. The risk of getting heart disease of active people compared to inactive people lower 50%. zheh fengxiaan shuuyur huahn xinzahngbihng shuuyur huoryueh'd rern'men bii bu huoryueh'd rern'men jiaanshaao 50%. yuhndohng shii xinji qiarngzhuahng, xinzahng jiahnkang. dihngqi yuhndohng yourqir yoouyaang yuhndohng bangzhuh rarnshao calorie, pirngherng xuehya, jiahngdi huaih daanguhchurn, cuhjihn haao daanguhchurn. huoryueh'd rern huahn xinzahngbihng'd fengxiaan bii bu huoryueh'd shaao 50%. yuhndohng shii xinji qiarngzhuahng, xinzahng jiahnkang. exercise makes heart muscle strong, heart healthy. dihngqi yuhndohng yourqir yoouyaang yuhndohng bangzhuh rarnshao calorie, pirngherng xuehya, jiahngdi huaih daanguhchurn, cuhjihn haao daanguhchurn. regular exercise especially aerobic exercise helps to burn calorie, balances blood pressure, lowers bad cholesterol, boosts good cholesterol. huoryueh'd rern huahn xinzahngbihng'd fengxiaan bii bu huoryueh'd shaao 50%. active people getting heart disease's risk compared to inactive less 50%. 2014-04-02 Yemen al-Qaeda kills 6 soldiers Yemen al-Qaeda kills 6 soldiers Yemen's al-Qaeda shasii 6'ge shihbing Yemen al-Qaeda sha 6 shihbing Yemen al-Qaeda sha 6 shihbing Yemen's al-Qaeda kills 6 soldiers al-Qaeda has attacked an army headquarters in Yemen's capital Aden, killing at least 6 soldiers and 2 civilians. al-Qaeda has attacked an army headquarters in Yemen's capital Aden, killing at least 6 soldiers and 2 civilians. al-Qaeda xirji'le yi'ge junduih zoongbuh zaih Yemen'd shooudu Aden, shasii zhihshaao 6'ge junrern her 2'ge pirngmirn. al-Qaeda xirji Yemen shooudu Aden yi'ge junbuh, shasii zhihshaao 6'ge junrern her 2'ge pirngmirn. al-Qaeda xirji Yemen shooudu Aden yi'ge junbuh, shasii zhihshaao 6'ge junrern her 2'ge pirngmirn. al-Qaeda attacks Yemen's capital Aden an army headquarters, killing at least 6 soldiers and 2 civilians. Taliban bomb kills 6 policemen Taliban bomb kills 6 policemen Taliban'd zhahdahn shasii 6'ge jiingchar Taliban zhahdahn sha 6 jiingchar Taliban zhahdahn sha 6 jiingchar Taliban's bomb kills 6 policemen A Taliban suicide bomb has exploded outside the interior ministry in Afghanistan's capital Kabul, killing at least 6 policemen. Taliban vows to launch a lot of attacks against the coming election. A Taliban suicide bomb has exploded outside the interior ministry in Afghanistan's capital Kabul, killing at least 6 policemen. yi'ge Taliban zihsha zhahdahn baohzhah'le zaih...waihmiahn zheh neihzhehngbuh zaih Afghanistan'd shooudu Kabul, shasii zhihshaao 6'ge jiingchar. Taliban shihyarn fadohng xuuduo xirji faanduih zheh kuaihdaoh'd xuaanjuu. Taliban vows to launch a lot of attacks against the coming election. yi'ge Taliban zihsha zhahdahn zaih Afghanistan shooudu neihzhehngbuh waihmiahn baohzhah, shasii zhihshaao 6'ge jiingchar. Taliban shihyarn fadohng xuuduo xirji faanduih kuaihdaoh'd xuaanjuu. yi'ge Taliban zihsha zhahdahn zaih Afghanistan shooudu neihzhehngbuh waihmiahn baohzhah, shasii zhihshaao 6'ge jiingchar. a Taliban suicide bomb at Afghanistan capital the interior ministry outside explodes, killing at least 6 policemen. Taliban vows to launch a lot of attacks against the coming election. Taliban shihyarn fadohng xuuduo xirji faanduih kuaihdaoh'd xuaanjuu. Cairo bomb attacks kill police chief Cairo bomb attacks kill police chief Cairo zhahdahn xirji shasii jiingzhaang Cairo zhahdahn zhahsii jiingzhaang Cairo zhahdahn zhahsii jiingzhaang Cairo bombs kill by explosion police chief 3 bombs have exploded near Cairo university, killing a police chief and injuring 5 people. Violence against the military happens often after the military coup. 3 bombs have exploded near Cairo university, killing a police chief and injuring 5 people. 3 zhahdahn baohzhah'le kaohjihn Cairo dahxuer, shasii yi jiingzhaang her shanghaih 5 jiingchar. Violence against the military happens often after the military coup. baolih faanduih junfang fasheng jingcharng zhihouh- junfang zhehngbiahn. Cairo dahxuer fuhjihn 3'ge zhahdahn zhahsii yi'ge jiingzhaang, 5 rern shouhshang. junshih zhehngbiahn houh, baohlih duihkahng junfang jingcharng fasheng. Cairo dahxuer fuhjihn 3'ge zhahdahn zhahsii yi'ge jiingzhaang, 5 rern shouhshang. Cairo dahxuer vicinity 3 bombs kill by explosion a police chief, 5 people be injured. junshih zhehngbiahn houh, baohlih duihkahng junfang jingcharng fasheng. the military coup -after, violence against the military often happens. 2014-04-01 China ex-general charged with corruption China ex-general charged with corruption Zhongguor qiarn jiangjun beihkohng tanwu Zhongguor qiarn jiangjun beihkohng tanwu Zhongguor qiarn jiangjun beihkohng tanwu China former general charged with corruption China has charged former General Gu Junshan with corruption, misuse of public money and abuse of power. China has charged former General Gu Junshan with corruption, misuse of public money and abuse of power. Zhongguor kohnggaoh'le qiarn jiangjun Gu Junshan guanyur tanwu, lahnyohng gonggohng'd jinqiarn her lahnyohng quarnlih. Zhongguor kohnggaoh qiarn jiangjun Guu Juhnshan tanwu, lahnyohng gongkuaan her zhirquarn. Zhongguor kohnggaoh qiarn jiangjun Guu Juhnshan tanwu, lahnyohng gongkuaan her zhirquarn. China charges former general Gu Junshan corruption, misuse of public money and official power. UN bans Japan to whale in Antarctica UN bans Japan to whale in Antarctica UN jihnzhii Ribeen buujing zaih Narnjirzhou UN jihn Rihbeen Narnjirzhou buujing UN jihn Rihbeen Narnjirzhou buujing UN prohibits Japan Antarctica to whale The United Nations' International Court of Justice (ICJ) has banned Japanese to whale in the Antarctica. The United Nations' International Court of Justice (ICJ) has banned Japanese to whale in the Antarctica. Liarnherguor'd Guorjih Faatirng (ICJ) jihnzhii'le Rihbeenrern buujing zaih Narnjirzhou. Liarnherguor Guorjih Faayuahn (ICJ) jihnzhii Ribeen zaih Narjirzhou buujing. Liarnherguor Guorjih Faayuahn (ICJ) jihnzhii Ribeen zaih Narjirzhou buujing. United Nations' International Court of Justice (ICJ) prohibits Japan in Antarctica to whale. Kenya bomb attack kills 6 people Kenya bomb attack kills 6 people Kenya zhahdahn xirji shasii 6 rern Kenya zhahdahn xirji sha 6 rern Kenya zhahdahn xirji sha 6 rern Kenya bomb attack kills 6 people A grenade attack on a bus stop and a food kiosk has killed 6 people in Kenya's capital Nairobi. A grenade attack on a bus stop and a food kiosk has killed 6 people in Kenya's capital Nairobi. yi-cih shoouliurdahn xirji duih yi'ge bus-zhahn her yi'ge shirpiin-tirng shasii'le 6 rern zaih Kenya'd shooudu Nairobi. Kenya shooudu Nairobi shoouliurdahn xirji bus-zhahn her shirpiin-tirng, shasii 6 rern. Kenya shooudu Nairobi shoouliurdahn xirji bus-zhahn her shirpiin-tirng, shasii 6 rern. Kenya's capital Nairobi grenades attack bus stop and food kiosk, killing 6 people. Nigeria's army kills 600 people Nigeria's army kills 600 people Nigeria'd junduih shasii 600 rern Nigeria junduih shasii 600 rern Nigeria junduih shasii 600 rern Nigeria's army kills 600 people Nigeria's army killed about 600 people, half of those were civilians, after a recent attack by guerrilla on a barracks. Nigeria's army killed about 600 people, half of those were civilians, after a recent attack by guerrilla on a barracks. Nigeria'd junduih shasii'le dahyue 600 rern, yibahn shuuyur nahxie shih pirngmirn, zaih...zhihouh yi-cih zuihjihn'd xirji beih yourjiduih duih yi'ge junyirng. zuihjihn yourjiduih xirji junyirng zhihouh, Nigeria junduih shasii yue 600 rern, qizhong yibahn shih pirngmirn. zuihjihn yourjiduih xirji junyirng zhihouh, Nigeria junduih shasii yue 600 rern, qizhong yibahn shih pirngmirn. recently guerrilla attacks barracks -after, Nigeria's army kills about 600 people, among them a half is civilian. 7 fruits & vegs better for health 7 fruits & vegs better for health 7 shuiiguoo + shucaih gehnghaao duih jiahnkang 7 shuguoo gehng yooulih jiahnkang 7 shuguoo gehng yooulih jiahnkang 7 vegs & fruits more beneficial for health Eating 7 rather than 5 portions of fruits and vegetables a day is beneficial for health and could lower the risk of death. Eating 7 rather than 5 portions of fruits and vegetables a day is beneficial for health and could lower the risk of death. chi 7 err bushih 5 fehn shuiiguoo her shucaih yi tian lihyur jiahnkang her nerng jiaanshaao zheh fengxiaan shuuyur siiwarng. meeitian chi 7 zhoong shuguoo bii 5 zhoong gehng yooulih jiankahng, huih gehng chaangshouh. meeitian chi 7 zhoong shuguoo bii 5 zhoong gehng yooulih jiankahng, huih gehng chaangshouh. daily eat 7 kinds fruits and vegetables compared to 5 kinds more beneficial for health, will more long-life. Afghanistan Taliban attacks kill 18 Afghanistan Taliban attacks kill 18 Afghanistan Taliban xirji shasii 18 Afghanistan Taliban xirji 18 sii Afghanistan Taliban xirji 18 sii Afghanistan Taliban attacks 18 die Taliban has launched a series of attacks in Afghanistan while it prepares for presidential election, killing at least 18 people. Taliban has launched a series of attacks in Afghanistan while it prepares for presidential election, killing at least 18 people. Taliban fadohng'le yixihlieh xirji zaih Afghanistan dang ta zhuunbeih zoongtoong xuaanjuu, shasii zhihshaao 18 rern. Afghanistan zhuunbeih zoongtoong xuaanjuu zhijih Taliban fadohng yixihlieh xirji, shasii zhihshaao 18 rern. Afghanistan zhuunbeih zoongtoong xuaanjuu zhijih Taliban fadohng yixihlieh xirji, shasii zhihshaao 18 rern. Afghanistan prepares for presidential election -when Taliban launches a series of attacks, killing at least 18 people. 2014-03-31 Exercise relates to dementia Exercise relates to dementia yuhndohng yoouguan chidai yuhndohng yoouguan chidai yuhndohng yoouguan chidai exercise relates to dementia Exercise improves blood circulation and is good for brain function. Lack of blood circulation causes metabolism decline in brain and can develop dementia, study shows. Exercise improves blood circulation and is good for brain function. Lack of blood circulation causes metabolism decline in brain and can develop dementia, study shows. yuhndohng gaaishahn xuehyeh xurnhuarn her lihyur naao gongnerng. quefar xuehyeh xurnhuarn daaozhih xincherndaihxieh shuaituih zaih naaobuh her huih fazhaan chidaizhehng, yarnjiu xiaanshih. yarnjiu zhiichu, yuhndohng cuhjihn xuehyeh xurnhuarn, lihyur naao gongnerng. quefar xuehyeh xurnhuarn shii naao daihxieh shuaituih, huih zaocherng chidai. yarnjiu zhiichu, yuhndohng cuhjihn xuehyeh xurnhuarn, lihyur naao gongnerng. quefar xuehyeh xurnhuarn shii naao daihxieh shuaituih, huih zaocherng chidai. study points out, exercise boosts blood circulation, is good for brain function. lack of blood circulation makes brain metabalism decline, can create dementia. Japan output slows in February Japan output slows in February Rihbeen chaanliahng fahnghuaan zaih Erhyueh Rihbeen Erhyueh chaanliahng fahnghuaan Rihbeen Erhyueh chaanliahng fahnghuaan Japan February output slows down Japan's factory output has decreased by 2.3% in February, it makes people worried about the world's third-largest economy. Japan's factory output has decreased by 2.3% in February, it makes people worried about the world's third-largest economy. Rihbeen'd gongcharng shuchu jiahngdi'le 2.3% zaih Erhyueh, ta shiidaoh rern'men danxin'd duih zheh shihjie'd dih-san zuihda jingjihtii. Rihbeen Erhyueh gongyeh chaanliahng jiaanshaao 2.3%, shii rern'men danxin zheh'ge shihjieh dih-3 dah jingjihtii. Rihbeen Erhyueh gongyeh chaanliahng jiaanshaao 2.3%, shii rern'men danxin zheh'ge shihjieh dih-3 dah jingjihtii. Japen's February industrial output decreases 2.3%, makes people worry about this world's third large economy. 2014-03-30 Chad troops kill 24 people in CAR Chad troops kill 24 people in CAR Chad junduih shasii 24 rern zaih CAR CAR Chad junduih shasii 24 rern CAR Chad junduih shasii 24 rern CAR Chad troops kill 24 people Chad soldiers have opened fire on residents of mainly Christian neighborhoods in Bangui, capital of the Central African Republic, killing at least 24 people. Chad soldiers have opened fire on residents of mainly Christian neighborhoods in Bangui, capital of the Central African Republic, killing at least 24 people. Chad shihbing'men kaihuoo'le xiahng jumirn'men shuuyur zhuuyaoh'dy Jidutur shehqu zaih Bangui, shooudu shuuyur zheh Zhongbuh'd Feizhou'd Gohngherguor, shasii zhihshaao 24 rern. Zhongfei Gohngherguor shooudu Bangui Chad junduih xiahng zhuuyaoh Jidutur shehqu'd jumirn kaihuoo, shasii zhihshaao 24 rern. Zhongfei Gohngherguor shooudu Bangui Chad junduih xiahng zhuuyaoh Jidutur shehqu'd jumirn kaihuoo, shasii zhihshaao 24 rern. Central Africa Republic capital Bangui Chad troops towards mainly Christian neigbborhood's residents open fire, killing at least 24 people. 2014-03-28 CAR grenade attack kills 11 CAR grenade attack kills 11 CAR shoouliurdahn xirji shasii 11 CAR shoouliurdahn xirji 11 sii CAR shoouliurdahn xirji 11 sii CAR grenade attack 11 die A grenade attack on a funeral in bangui, capital of the Central African Republic (CAR), has killed 11 people. A grenade attack on a funeral in Bangui, capital of the Central African Republic (CAR), has killed 11 people. yi-cih shoouliurdahn xirji zaih yi'ge sanglii zaih Bangui, shooudu shuuyur zheh Zhongbuh'd Feizhou'd Gohngherguor (CAR), shasii'le 11'ge rern. shoouliurdahn xirji Zhongfei Gohngherguor (CAR) shooudu Bangui yi'ge sanglii, shasii 11 rern. shoouliurdahn xirji Zhongfei Gohngherguor (CAR) shooudu Bangui yi'ge sanglii, shasii 11 rern. grenade attacks Central Africa Republic (CAR) capital Bangui a funeral, killing 11 people. US requests Russia to move back US requests Russia to move back Meeiguor yaoqiur Russia chehtuih US yaoqiur Russia chehtuih US yaoqiur Russia chehtuih US requests Russia to withdraw The United States president Obama has strongly requested Russia troops to move back from Ukraine's border. The United States president Obama has strongly requested Russia troops to move back from Ukraine's border. Meeiguor zoongtoong Obama qiarnglieh'dy yaoqiur'le Russia junduih chehlir corng Ukraine'd bianjihng. Meeiguor zoongtoong Obama qiarnglieh yaoqiur Russia junduih chehlir Ukraine bianjihng. Meeiguor zoongtoong Obama qiarnglieh yaoqiur Russia junduih chehlir Ukraine bianjihng. the United States president Obama strongly requests Russia troops to withdraw from Ukraine border. Smoking bans improve child health Smoking bans improve child health xiyan jihnzhii gaaishahn errtorng jiahnkang jihnyan gaaishahn errtorng jiahnkang 禁烟 改善 儿童 健康 jihnyan gaaishahn errtorng jiahnkang smoking bans improve child health Study shows that laws banning smoking in public places have decreased premature births and severe childhood asthma attacks by 10%. Study shows that laws banning smoking in public places have decreased premature births and severe childhood asthma attacks by 10%. yarnjiu xiaanshih faalvh jihnzhir xiyan zaih gongzhohng dihfang jiaanshaao'le zaaochaan her yarnzhohng'd torngniarn xiaohchuaan fazuoh 10%. yarnjiu xiaanshih gongzhohng dihfang jihnyan faalvh jiaanshaao zaaochaan her yarnzhohng'd torngniarn xiaohchuaan fazuoh 10%. 研究 显示 公众 地方 禁烟 法律 减少 早产 和 严重的 童年 哮喘 发作 10%。 yarnjiu xiaanshih gongzhohng dihfang jihnyan faalvh jiaanshaao zaaochaan her yarnzhohng'd torngniarn xiaohchuaan fazuoh 10%. study shows public places smoking ban law reduces premature births and severe childhood asthma attacks 10%. 2014-03-27 Uganda boat capsize kills 250 Uganda boat capsize kills 250 Uganda chuarn qingfuh shasii 250 Uganda fuhzhou 250 sii Uganda 覆舟 250 死 Uganda fuhzhou 250 sii Uganda boat capsize 250 die A boat has capsized on Lake Albert between the Democratic Republic of Congo and Uganda, killing more than 250 people. A boat has capsized on Lake Albert between the Democratic Republic of Congo and Uganda, killing more than 250 people. yi-sou chuarn qingfuh'le zaih Hur Albert zhijian zheh Mirnzhuu'd Gohngherguor shuuyur Congo her Uganda, shasii chaoguoh 250 rern. Congo Mirnzhuu Gohngherguor her Uganda zhijian'd Albert Hur yi-sou chuarn qingfuh, chaoguoh 250 rern siiwarng. Congo 民主 共和国 和 Uganda 之间的 Albert 湖 一艘 船 倾覆,超过 250 人 死亡。 Congo Mirnzhuu Gohngherguor her Uganda zhijian'd Albert Hur yi-sou chuarn qingfuh, chaoguoh 250 rern siiwarng. Congo Democratic Republic and Uganda between's Albert Lake a boat capsizes, more than 250 people die. North Korea fires missiles North Korea fires missiles Chaorxian fasheh daaodahn Chaorxian fasheh daaodahn 朝鲜 发射 导弹 Chaorxian fasheh daaodahn North Korea fires missiles North Korea has test-fired two medium-range missiles just several hours after the United States, South Korea and Japan have held a meeting against North Korea. North Korea has test-fired two medium-range missiles just several hours after the United States, South Korea and Japan have held a meeting against North Korea. Chaorxian shihsheh'le liaang'ge zhongcherng daaodahn ganggang jii'ge xiaaoshir zhihouh- Meeiguor, Harnguor her Rihbeen juuxirng'le yi'ge huihyih zhenduih Chaorxian. Meeiguor, Harnguor her Rihbeen gang juuxirng zhenduih Chaorxian 'd huihyih shuh-xiaaoshir houh, Chaorxian jiuh shihsheh 2'ge zhongcherng daaodahn. 美国、韩国 和 日本 刚 举行 针对 朝鲜 的 会议 数小时 后,朝鲜 就 试射 2个 中程 导弹。 Meeiguor, Harnguor her Rihbeen gang juuxirng zhenduih Chaorxian 'd huihyih shuh-xiaaoshir houh, Chaorxian jiuh shihsheh 2'ge zhongcherng daaodahn. the United States, South Korea and Japan just hold against North Korea 's meeting several hours -after, North Korea then test-fires 2 mid-range missiles. 2014-03-26 Thailand bus crash kills 30 Thailand bus crash kills 30 Taihguor bus zhuahnghuii shasii 30 Taihguor bus zhuahnghuii 30 sii 泰国 巴士 撞毁 30 死 Taihguor bus zhuahnghuii 30 sii Thailand bus crash 30 die A bus has fallen into a deep valley in northern Thailand, killing at least 30 people and injuring 22. A bus has fallen into a deep valley in northern Thailand, killing at least 30 people and injuring 22. yi-jiah bus die'le jihnruh yi'ge shen'd shanguu zaih beeibuh'd Taihguor, shasii zhihshaao 30 rern her shanghaih 22. Taihguor beeibuh yi-jiah bus dieruh shenguu, zhihshaao 30 rern siiwarng, 22 shouhshang. 泰国 北部 一架 巴士 跌入 深谷,至少 30 人 死亡,22 受伤。 Taihguor beeibuh yi-jiah bus dieruh shenguu, zhihshaao 30 rern siiwarng, 22 shouhshang. Thailand north part a bus falls into deep valley, at least 30 people die, 22 be injured. 2014-03-25 Afghanistan Taliban kills 2 policemen Afghanistan Taliban kills 2 policemen Afghanistan Taliban shasii 2'ge jiingchar Afghanistan Taliban sha 2 jiingchar Afghanistan Taliban 杀 2 警察 Afghanistan Taliban sha 2 jiingchar Afghanistan Taliban kills 2 policemen Taliban fighters have attacked an election office in Kabul, killing 2 policemen and injuring 2 others. Taliban fighters have attacked an election office in Kabul, killing 2 policemen and injuring 2 others. Taliban zhahnshih'men xirji'le yi'ge xuaanjuu bahngongshih zaih Kabul, shasii 2'ge jiingchar her shanghaih 2'ge qirta'd. Taliban zhahnshih xirji Kabul yi'ge xuaanjuu bahngongshi, shasii 2'ge jiingchar, 2'ge shouhshang. Taliban 战士 袭击 Kabul 一个 选举 办公室,杀死 2个 警察,2个 受伤。 Taliban zhahnshih xirji Kabul yi'ge xuaanjuu bahngongshi, shasii 2'ge jiingchar, 2'ge shouhshang. Taliban fighters attack Kabul a election office, killing 2 policemen, 2 be injured. Faulty genes link to delayed puberty Faulty genes link to delayed puberty cuohwuh'd jiyin liarnxih yarnchir'd qingchunqi jiyin quexiahn yuu qingchunqi yarnchir yoouguan 基因 缺陷 与 青春期 延迟 有关 jiyin quexiahn yuu qingchunqi yarnchir yoouguan gene flaws with puberty delay related Faults in genes cause delay in puberty. Girls normally reaches puberty aged 13 and boys aged 14 or 15. Delay in puberty causes bone problems, reduced breast size in girls and reduced testicle size in boys. Faults in genes causes delay in puberty. quexiahn zaih jiyin daaozhih yarnchir zaih qingchunqi. Girls normally reaches puberty aged 13 and boys aged 14 or 15. nvvhair tongcharng dardaoh qingchunqi suihshuh 13 err narnhair suihshuh 14 huoh 15. Delay in puberty causes bone problems, reduced breast size in girls and reduced testicle size in boys. yarnchir zaih qingchunqi daaozhih guu'tou wehntir, jiaanxiaao ruufarng dahxiaao zaih nvvhair her jiaanxiaao gaowarn dahxiaao zaih narnhair. jiyin quexiahn daaozhih qingchunqi yarnchir. nvvhair tongcharng 13 suih daoh qingchunqi err narnhair 14 huoh 15 suih. qingchunqi yarnchir daaozhih guu'tou wehntir, nvvhair ruufarng her narnhair gaowarn xiaao. 基因 缺陷 导致 青春期 延迟。女孩 通常 13 岁 到 青春期 而 男孩 14 或 15 岁。青春期 延迟 导致 骨头 问题,女孩 乳房 和 男孩 睾丸 小。 jiyin quexiahn daaozhih qingchunqi yarnchir. genes faults cause puberty delay. nvvhair tongcharng 13 suih daoh qingchunqi err narnhair 14 huoh 15 suih. girls normally 13 years of age reach puberty and boys 14 or 15 years of age. qingchunqi yarnchir daaozhih guu'tou wehntir, nvvhair ruufarng her narnhair gaowarn xiaao. puberty delay causes bone problems, girls breasts and boys testicles small. Active mothers have active children Active mothers have active children huoryueh'd muuqin'men yoou huoryueh'd ziinvv'men huoryueh muuqin yoou huoryueh ziinvv 活跃 母亲 有 活跃 子女 huoryueh muuqin yoou huoryueh ziinvv active mothers have active children A study shows that a more physically active mother has a more physically active child. A study shows that a physically more active mother has a physically more active child. yi'ge yarnjiu xiaanshih yi'ge shentii'shang gehng huoryueh'd muuqin yoou yi'ge shentii'shang gehng huoryueh'd hair'zi. yarnjiu xiaanshih yuhndohng huoryueh'd muuqin jiuh yoou yuhndohng huoryueh'd ziinvv. 研究 显示 运动 活跃的 母亲 就 有 运动 活跃的 子女。 yarnjiu xiaanshih yuhndohng huoryueh'd muuqin jiuh yoou yuhndohng huoryueh'd ziinvv. study shows physical exercise active mother than has physical active child. 2014-03-24 Yemen attack kills 20 soldiers Yemen attack kills 20 soldiers Yemen xirji shasii 20 shihbing Yemen xirji shasii 20 shihbing Yemen xirji shasii 20 shihbing Yemen attack kills 20 soldiers Guerrillas have attacked a checkpoint in eastern Yemen, killing 20 soldiers. Guerrillas have attacked a checkpoint in eastern Yemen, killing 20 soldiers. yourjiduihyuarn'men xirji'le yi'ge jiaancharzhahn zaih dongbuh'd Yemen, shasii 20'ge shihbing. yourjiduih xirji Yemen dongbuh yi'ge jiaancharzhahn, shasii 20'ge shihbing. yourjiduih xirji Yemen dongbuh yi'ge jiaancharzhahn, shasii 20'ge shihbing. guerrillas attack Yemen east part a checkpoint, killing 20 soldiers. Afghanistan suicide bomb kills 15 people Afghanistan suicide bomb kills 15 people Afghanistan zihsha zhahdahn shasii 15 rern Afghanistan zihsha zhahdahn shasii 15 rern Afghanistan zihsha zhahdahn shasii 15 rern Afghanistan suicide bomb kills 15 people A suicide bomb has attacked a market in northern Afghanistan, killing at least 15 people including women and children. A suicide bomb has attacked a market in northern Afghanistan, killing at least 15 people including women and children. yi'ge zihsha zhahdahn xirji'le yi'ge shihchaang zaih beeibuh'd Afghanistan, shasii zhihshaao 15 rern baokuoh fuhnvv her errtorng. zihsha zhahdahn xirji Afghanistan beeibuh yi'ge shihchaang, shasii zhihshaao 15 rern baokuoh fuhrur. zihsha zhahdahn xirji Afghanistan beeibuh yi'ge shihchaang, shasii zhihshaao 15 rern baokuoh fuhrur. suicide bomb attacks Afghanistan northern part a market, killing at least 15 people including women and childeren. Afghanistan hotel attack kills 9 people Afghanistan hotel attack kills 9 people Afghanistan jiuudiahn xirji shasii 9'ge rern Afghanistan jiuudiahn xirji shasii 9 rern Afghanistan jiuudiahn xirji shasii 9 rern Afghanistan hotel attack kills 9 people Taliban fighters have attacked a hotel in Kabul, leaving 9 people die including 2 children and 4 foreigners. Taliban fighters have attacked a hotel in Kabul, leaving 9 people die including 2 children and 4 foreigners. Taliban zhahnshih'men xirji'le yi-jian jiuudiahn zaih Kabul, zaohcherng 9 rern siiwarng baokuoh 2'ge errtorng her 4'ge waihguorrern. Taliban zhahnshih xirji Kabul yi-jian jiuudiahn, 9 rern siiwarng baokuoh 2'ge errtorng her 4'ge waihguorrern. Taliban zhahnshih xirji Kabul yi-jian jiuudiahn, 9 rern siiwarng baokuoh 2'ge errtorng her 4'ge waihguorrern. Taliban fighters attack kabul a hotel, 9 people die including 2 children and 4 foreigners. 2014-03-20 Taliban kill 10 police Taliban kill 10 police Taliban shasii 10'ge jiingchar Taliban sha 10 jiingchar Taliban sha 10 jiingchar Taliban kill 10 policemen Taliban fighters have attacked a police station in the east of Afghanistan, killing at least 10 policeman. Taliban fighters have attacked a police station in the east of Afghanistan, killing at least 10 policeman. Taliban zhahnshih'men xirji'le yi'ge jiingcharjur zaih zheh dongbuh shuuyur Afgjamostan, shasii zihshaao 10'ge jiingchar. Taliban zhahshih xirji Afghanistan dongbuh yi'ge jiingjur, shasii zhihshaao 10'ge jiingchar. Taliban zhahnshih xirji Afghanistan dongbuh yi'ge jiingjur, shasii zhihshaao 10'ge jiingchar. Taliban fighters attack Afghanistan the east a police station, killing at least 10 policemen. 2014-03-19 Two Egyptian army officers killed Two Egyptian army officers killed liaang'ge Egypt'd junguan beihsha liaang'ge Egypt junguan beihsha liaang'ge Egypt junguan beihsha two Egypt army officers be killed Two Egyptian army officers and 5 guerrillas have been killed in a gunfight north of Cairo. Two Egyptian army officers and 5 guerrillas have been killed in a gunfight north of Cairo. liaang'ge Egypt'd junguan her 5'ge yourjiduih beihsha zaih yi'ge qiangzhahn beeimiahn shuuyur Cairo. Cairo beeimiahn qiangzhahn, liaang'ge Egypt junguan her 5'ge yourjiduih siiwarng. Cairo beeimiahn qiangzhahn, liaang'ge Egypt junguan her 5'ge yourjiduih siiwarng. Cairo north side gunfight, two Egypt army officers and 5 guerrillas die. Insufficient sleep causes brain cell loss Insufficient sleep causes brain cell loss buzur'd shuihmiarn daaozhih naaobuh xihbao suunshi shuihmiarn buzur daaozhih naao xihbao suunshi shuihmiarn buzur daaozhih naao xihbao suunshi sleep not enough causes brain cell loss The consequence of lack of sleep may be very serious, causing a permanent loss of brain cells, a study suggests. The consequence of lack of sleep may be very serious, causing a permanent loss of brain cells, a study suggests. zheh houhguoo shuuyur quefar shuihmiarn keenerng heen yarnzhohng, daaozhih yi'ge yoongjiuu'd suunshi shuuyur naaobuh xihbao, yi'ge yarnjiu xiaanshih. yarnjiu xiaanshih shuihmiarn buzur'd houhguoo huih heen yarnzhohng, daaozhih yoongjiuu'd naao xihbao suunshi. yarnjiu xiaanshih shuihmiarn buzur'd houhguoo huih heen yarnzhohng, daaozhih yoongjiuu'd naao xihbao suunshi. study shows sleep insufficient's consequence may very serious, causing permanent brain cell loss. 2014-03-18 Somalia Islamic fighters kill 6 soldiers Somalia Islamic fighters kill 6 soldiers Somalia'd Islam zhahnshih shasii 6'ge shihbing Somalia Islam zhahnshih sha 6 shihbing Somalia Islam zhahnshih sha 6 shihbing Somalia's Islamic fighters kill 6 soldiers Islamic fighters have attacked an army hotel in a central town in Somalia, killing 6 soldiers including a senior Somalia army commander. Islamic fighters have attacked an army hotel in a central town in Somalia, killing 6 soldiers including a senior Somalia army commander. Islam zhahnshih'men xirji'le yi-jian junrern jiuudiahn zaih yi'ge zhongbuh'd shihzhehn zaih Somalia, shasii 6'ge shihbing baokuoh yi'ge gaojir'd Somalia junduih shilihng. Islam zhahnshih xirji Somalia zhongbuh shihzhehn yi-jian junrern jiuudiahn, shasii 6'ge shihbing baokuo yi'ge gaoji'd Somalia junduih silihng. Islam zhahnshih xirji Somalia zhongbuh shihzhehn yi-jian junrern jiuudiahn, shasii 6'ge shihbing baokuo yi'ge gaoji'd Somalia junduih silihng. Islamic fighers attack Somalia zhongbuh'd shihzhehn a army hotel, killing 6 soldiers including a senior somalia army commander. 2014-03-17 Vigorous exercise cuts flu risk Vigorous exercise cuts flu risk juhlieh'd yuhndohng xuejiaan liurgaan fengxiaan juhlieh yuhndohng xuejiaan liurgaan fengxiaan 剧烈 运动 削减 流感 风险。 juhlieh yuhndohng xuejiaan liurgaan fengxiaan vigorous exercise cuts flu risk New data suggests doing at least two and a half hours of vigorous exercise each week cuts the risk of developing flu. New data suggests doing at least two and a half hours of vigorous exercise each week cuts the risk of developing flu. xin'd ziliaoh xiaanshih zuoh zhihshaao erh her yibahn xiaaoshir'd juhlieh yuhndohng meei xingqi xuejiaan zheh fengxiaan shuuyur fazhaan liurgaan. xin ziliaoh xiaanshih meei xingqi juhlieh yuhndohng zhihshaao liaang'ge-bahn xiaaoshir xuejiaan huahn liurgaan'd fengxiaan. 新 资料 显示 每 星期 剧烈 运动 至少 两个半 小时 削减 患 流感 的 风险。 xin ziliaoh xiaanshih meei xingqi juhlieh yuhndohng zhihshaao liaang'ge-bahn xiaaoshir xuejiaan huahn liurgaan'd fengxiaan. new data shows every week vigorously exercise at least two and a half hours cuts contracting flu's risk. Libya car bomb kills 5 soldiers Libya car bomb kills 5 soldiers Libya qihche zhahdahn shasii 5'ge shihbing Libya qihche zhahdahn sha 5 shihbing Libya 汽车 炸弹 杀 5 士兵 Libya qihche zhahdahn sha 5 shihbing Libya car bomb kills 5 soldiers A car bomb has attacked a barracks in the eastern city of Benghazi in Libya, killing at least 5 soldiers. A car bomb has attacked a barracks in the eastern city of Benghazi in Libya, killing at least 5 soldiers. yi'ge qihche zhahdahn xirji'le yi'ge junyirng zaih zheh dongbuh'd cherngshih Benghazi zaih Libya, shasii zhihshaao 5'ge shihbing. Libya dongbuh cherngshih Benghazi yi'ge qihche zhahdahn xirji junyirng, shasii zhihshaao 5'ge shihbing. Libya 东部 城市 Benghazi 一个 汽车 炸弹 袭击 军营,杀死 至少 5个 士兵。 Libya dongbuh cherngshih Benghazi yi'ge qihche zhahdahn xirji junyirng, shasii zhihshaao 5'ge shihbing. Libya eastern city Benghazi a car bomb attacks barracks, killing at least 5 soldiers. Crimea voters support joining Russia Crimea voters support joining Russia Crimea'd xuaanmirn'men zhichir jiaruh Russia Crimea xuaanmirn zhichir jiaruh Russia Crimea 选民 支持 加入 Russia Crimea xuaanmirn zhichir jiaruh Russia Crimea's voters support joining Russia About 95.5% of voters have supported joining Russia, after half of the votes have been counted in a referendum in Crimea. About 95.5% of voters have supported joining Russia, after half of the votes have-been-counted in a referendum in Crimea. dahyue 95.5% xuaanmirn zhichir'le jiaruh Russia, zaih...yiihouh bahnshuh'd tourpiaoh zoongshuh beih-jihsuahn'le zaih yi-cih gongmirn tourpiaoh zaih Crimea. Crimea'd gongmirn tourpiaoh yiijing diaansuahn'le bahnshuh xuaanpiaoh, yue 95.5% xuaanmirn zhichir jiaruh Russia. Crimea 的 公民 投票 已经 点算了 半数 选票,约 95.5% 选民 支持 加入 Russia。 Crimea'd gongmirn tourpiaoh yiijing diaansuahn'le bahnshuh xuaanpiaoh, yue 95.5% xuaanmirn zhichir jiaruh Russia. Crimea's citizen voting already counted half votes, about 95.5% voters support joining Russia. 2014-03-16 Cairo guerrillas kill 6 soldiers Cairo guerrillas kill 6 soldiers Cairo'd yourjiduihyuarn'men shasii 6'ge shihbing Cairo yourjiduih sha 6 shihbing Cairo 游击队 杀 6 士兵 Cairo yourjiduih sha 6 shihbing Cairo's guerrillas kill 6 soldiers Guerrillas have attacked a checkpoint in a northern suburb of Cairo, shooting dead 6 Egyptian soldiers. Guerrillas have attacked a checkpoint in a northern suburb of Cairo, shooting dead 6 Egyptian soldiers. yourjiduihyuarn'men xirji'le yi'ge jiaancharzhahn zaih yi'ge beeifang'd jiaoqu shuuyur Cairo, qiangsha 6'ge Egypt'd shihbing. yourjiduih xirji Cairo beeijiao yi'ge jiaancharzhahn, qiangsha 6'ge Egypt shihbing. 游击队 袭击 Cairo 北郊 一个 检查站,枪杀 6个 Egypt 士兵。 yourjiduih xirji Cairo beeijiao yi'ge jiaancharzhahn, qiangsha 6'ge Egypt shihbing. guerrillas attack Cairo's northern suburb a checkpoint, shooting dead 6 Egyptian soldiers. 2014-03-14 Cairo gunmen shoot dead soldier Cairo gunmen shoot dead soldier Cairo qiangshoou'men qiangsha shihbing Cairo qiangshoou qiangsha shihbing Cairo qiangshoou qiangsha shihbing Cairo gunmen shoot dead soldier Suspected Islamic fighters have attacked a military vehicle in eastern Cairo, killing a soldier and injuring 3 others. Militants often attack the military after the first people-elected Egyptian president Mohammed Morsi was overthrown in a military coup. Suspected Islamic fighters have attacked a military vehicle in eastern Cairo, killing a soldier and injuring 3 others. huairyir'd Islam'd zhahnshih'men xirji'le yi-jia junshih'd cheliahng zaih dongbuh'd Cairo, shasii yi'ge shihbing her shanghaih 3'ge qita'd. Militants often attack the military after the first people-elected Egyptian president Mohammed Morsi was overthrown in a military coup. wuuzhuangfehnzii jingcharng xirji junfang zaih...yiihouh shoou'ge mirnxuaan'd Egypt'd zoongtoong Mohammed Morsi beih tuifan'le zaih yi'ge junshih'd zhehngbiahn. Cairo dongbuh huairyir'd Islam zhahnshih xirji yi-jiah junche, shasii yi'ge shihbing, 3'ge shouhshang. shoou'ge mirnxuaan'd Egypt zoongtoong Mohammed Morsi beih junshih zhehngbiahn tuifan yiihouh, wuuzhuangfehnzii jingcharng xirji junfang. Cairo dongbuh huairyir'd Islam zhahnshih xirji yi-jiah junche, shasii yi'ge shihbing, 3'ge shouhshang. Cairo east suspected Islam fighters attack a military vehicle, killing a soldier, 3 be injured. shoou'ge mirnxuaan'd Egypt zoongtoong Mohammed Morsi beih junshih zhehngbiahn tuifan yiihouh, wuuzhuangfehnzii jingcharng xirji junfang. the first popularly elected Egypt'd president Mohammed Morsi by military coup be overthrown -after, militants often attack the military. 2014-03-11 India Maoists kill at least 15 policemen India Maoists kill at least 15 policemen India Maorzhuuyihzhee shasii zhihshaao 15 jiingchar India Maorzhuuyihzhee shasii zhihshaao 15 jiingchar India Maorzhuuyihzhee shasii zhihshaao 15 jiingchar India Maoists kill at least 15 policemen Maoist rebel army has killed at least 15 policemen in the province of Chhattisgarh in India. Chhattisgarh is a stronghold of the Maoists who say they are fighting for poor people. The Maoist insurgency began in the late 1960s and has become, according to the description of India's prime minister, the country's "biggest threat". Nowadays, the Maoists are active in more than a third of India's districts and control large areas of several provinces from northeast to central India. Maoist rebel army has killed at least 15 policemen in the province of Chhattisgarh in India. Maorzhuuyihzhee pahnjun shasii'le zhihshaao 15'ge jiingchar zaih zheh sheengfehn Chhattisgarh zaih India. Chhattisgarh is a stronghold of the Maoists who say they are fighting for poor people. Chhattisgarh shih yi'ge genjuhdih shuuyur zheh Maorzhuuyihzhee ta'men shuo ta'men shih zhahndouh'zhe weih'le qiorngrern. The Maoist insurgency began in the late 1960s and has become, according to the description of India's prime minister, the country's "biggest threat". zheh Maorzhuuyihzhee'd qiiyih kaishii'le zaih zheh mohqi'd 60-niarndaih her cherngweir'le, genjuh zheh miaorshuh shuuyur India'd zoonglii, zheh guorjia'd "zuihdah'd weixier". Nowadays, the Maoists are active in more than a third of India's districts and control large areas of several provinces from northeast to central India. dangjin, zheh Maorzhuuyihzhee'men shih huoryueh'd zaih chaoguoh san-fenzhi-yi'd India'd dihqu her kohngzhih dahliahng'd qihquh shuuyur jii'ge sheengfehn corng dongbeei zhih zhongbuh'd India. India Chhattisgarh-sheeng Maorzhuuyih pahnjun shasii zhihshaao 15'ge jiingchar. Chhattisgarh shih Maorzhuuyihzhee'd genjuhdih, ta'men shuo shih weih qiorngrern zhahndouh. Maorzhuuyihzhee zaih 60-niarndaih-moh qiiyih bihng cherngweih juh India zoonglii shuo'd guorjia'd "zuihdah weixier". jintian, Maorzhuuyihzhee huoryueh yur chaoguoh san-fenzhi-yi'd India dihqu bihng kohngzhih corng dongbeei zhih zhongbuh jii'ge sheeng'd dahliahng dihqu. India Chhattisgarh-sheeng Maorzhuuyih pahnjun shasii zhihshaao 15'ge jiingchar. India Chhattisgarh province Maoist rebel army kills at least 15 policemen. Chhattisgarh shih Maorzhuuyihzhee'd genjuhdih, ta'men shuo shih weih qiorngrern zhahndouh. Chhattisgarh is Maoists' stronghold, they say is for the poor to fight. Maorzhuuyihzhee zaih 60-niarndaih-moh qiiyih bihng cherngweih juh India zoonglii shuo'd guorjia'd "zuihdah weixier". Maoists at 1960s -end to revolt and become according to India prime minister says that the country's "biggest threat". jintian, Maorzhuuyihzhee huoryueh yur chaoguoh san-fenzhi-yi'd India dihqu bihng kohngzhih corng dongbeei zhih zhongbuh jii'ge sheeng'd dahliahng dihqu. today, Maoists are active in more than a third of India districts and controd from the northeast to the central several provinces' large areas. 2014-03-01 US economic growth slows down US economic growth slows down US jingjih zengzhaang fahnghuaan Meeiguor jingjih zengzhaang fahnghuaan Meeiguor jingjih zengzhaang fahnghuaan United States economic growth slows down The US economy grew at a rate of 2.4% in the fourth quarter of 2013, down from a first estimate of 3.2%, as consumer spending is weaker than expected. The US economy grew at a rate of 2.4% in the fourth quarter of 2013, down from a first estimate of 3.2%, as consumer spending is weaker than expected. Meeiguor jingjih zengzhaang'le zaih yi'ge biilvh 2.4% zaih zheh dih-4 jihduh 2013, xiahjiahng corng yi'ge xianqiarn'd gujih 3.2%, youryur xiaofeihzhee xiaofeih shih geng ruoh bii yuhqi. youryur xiaofeih bii yuhqi pirruoh, Meeiguor 2013 niarn dih-4 jihduh jingjih zengzhaang corng xianqiarn'd gujih 3.2% xiahjiahng daoh 2.4%. youryur xiaofeih bii yuhqi pirruoh, Meeiguor 2013 niarn dih-4 jihduh jingjih zengzhaang corng xianqiarn'd gujih 3.2% xiahjiahng daoh 2.4%. because of spending compared to expectation weak, US 2013 year fourth quarter economic growth from previous estimate 3.2% falls to 2.4%. 2014-02-27 Browning meat link to Alzheimer's disease Browning meat link to Alzheimer's disease jianzhar'd rouh daaozhih chidaizhehng jianzhar rouh daaozhih chidaizhehng jianzhar rouh daaozhih chidaizhehng browning meat causes Alzheimer's disease Browning meat by roasting and frying lead to the formation of advanced glycation end products (AGE), when fat and protein in meat react with sugar. AGE lead to the build up of beta-amyloid protein in brain, which lead to Alzheimer's disease. A diet high in AGE also lead to type 2 diabetes. Browning meat by roasting and frying lead to the formation of advanced glycation end products (AGE), when fat and protein in meat react with sugar. jianchar'd rouh beih shaokaao her jianchar daaozhih xirngcherng "advanced glycation end products (AGE)", deng zhifarng her dahnbairzhih zaih rouh qii zuohyohng yuu tarng. AGE lead to the build up of beta-amyloid protein in brain, which lead to Alzheimer's disease. AGE daaozhih jileei beta-amyloid dahnbairzhih zaih naaobuh, nah daaozhih chidaizhehng. A diet high in AGE also lead to type 2 diabetes. yi'ge yiinshir gao'd zaih AGE yee daaozhih 2-xirng tarngniaohbihng. rouh'd zhifarng her dahnbairzhih zaih shaokaao her jianzhar guohcherng zhong yuu tarng zuohyohng chaansheng "advanced glycation end products (AGE)". AGE shii naaobuh jileei beta-amyloid dahnbairzhih daaozhih chidaizhehng. AGE gao'd yiinshir yee daaozhih 2-xirng tarngniaohbihng. rouh'd zhifarng her dahnbairzhih zaih shaokaao her jianzhar guohcherng zhong yuu tarng zuohyohng chaansheng "advanced glycation end products (AGE)". meat's fat and protein in roasting and frying process inside with sugar react produce advanced glycation end products (AGE). AGE shii naaobuh jileei beta-amyloid dahnbairzhih daaozhih chidaizhehng. AGE makes brain accumulates beta-amyloid protein causing Alzheimer's disease. AGE gao'd yiinshir yee daaozhih 2-xirng tarngniaohbihng. AGE high's diet also causes type-2 diabetes. 2014-02-23 Taliban kill at least 20 Afghanistan soldiers Taliban kill at least 20 Afghanistan soldiers Taliban shasii zhihshaao 20'ge Afghanistan shihbing Taliban shasii zhihshaao 20'ge Afghanistan shihbing Taliban shasii zhihshaao 20'ge Afghanistan shihbing Taliban kill at least 20 Afghanistan soldiers Taliban fighters have attacked a checkpoint in Kunar Province in Afghanistan near the border with Pakistan, killing at least 20 and capturing 7 Afghanistan soldiers. Taliban fighters have attacked a checkpoint in Kunar province in Afghanistan near the border with Pakistan, killing at least 20 and capturing 7 Afghanistan soldiers. Taliban zhahnshih'men xirji'le yi'ge jiaancharzhahn zaih Kunar-sheeng zaih Afghanistan kaohjihn zheh bianjieh yuu Pakistan, shasii zhihshaao 20'ge her furluu 7'ge Afghanistan shihbing. Taliban zhahnshih xirji jieraang Pakistan'd Afghanistan Kunar-sheeng yi'ge jiaancharzhahn, shasii zhihshaao 20'ge her furluu 7'ge Afghanistan shihbing. Taliban zhahnshih xirji jieraang Pakistan'd Afghanistan Kunar-sheeng yi'ge jiaancharzhahn, shasii zhihshaao 20'ge her furluu 7'ge Afghanistan shihbing. Taliban fighters attack border with Pakistan's Afghanistan Kunar province a checkpoint, killing at least 20 and capturing 7 Afghanistan soldiers. 2014-02-04 Huge rise in global cancer cases Huge rise in global cancer cases juhdah'd shahngsheng zaih quarnqiur'd air`zhehng bihnglih quarnqiur airzhehng bihnglih dahfurduh shahngsheng quarnqiur airzhehng bihnglih dahfurduh shahngsheng global cancer cases substantially rise The world is seeing a huge rise in cancer and the need to tackle smoking, obesity and alcohol consumption need to be considered. The global incidence of cancer is increasing quite markedly due to the aging of the population and the increase in the world population. The world is seeing a huge rise in cancer and the need to tackle smoking, obesity and alcohol consumption need to be considered. zheh shihjieh kahndaoh yi'ge juhdah'd shahngsheng zaih airzhehng her zheh xuyaoh jieejuer xiyan, chifeir her xuhjiuu xuyaoh kaaolvh. The global incidence of cancer is increasing quite markedly due to the aging of the population and the increase in the world population. zheh quarnqiur bihnglih shuuyur airzhehng zaih zengjia zhong xiangdang mirngxiaan'dy youryur zheh laaohuah shuuyur zheh rernkoou her zheh zengjia zaih zheh shihjieh rernkoou. shihjieh airzhehng dahfurduh shahngsheng, xuyaoh kaaolvh jieejuer chouyan, chifeir her xuhjiuu'd wehntir. youryur quarnqiur rernkoou zengjia her laaohuah, air`zhehng bihnglih xiaanzhuh'dy shahngsheng. shihjieh airzhehng dahfurduh shahngsheng, xuyaoh kaaolvh jieejuer chouyan, chifeir her xuhjiuu'd wehntir. the world cancer substantially rises, need to consider tackle smoking, obesity and alcohol consumption problems. youryur quarnqiur rernkoou zengjia her laaohuah, air`zhehng bihnglih xiaanzhuh'dy shahngsheng. because of global population increases and aging, cancer incidence markedly rises. 2014-01-23 Egypt gunmen kill 5 police Egypt gunmen kill 5 police Egypt qiangshoou'men shasii 5'ge jiingchar Egypt qiangshoou shasii 5'ge jiingchar Egypt qiangshoou shasii 5'ge jiingchar Egypt gunmen kill 5 police 2 gunmen have attacked a checkpoint south of the capital of Egypt, Cairo, killing 5 policemen and injuring 2 others. 2 gunmen have attacked a checkpoint south of the capital of Egypt, Cairo, killing 5 policemen and injuring 2 others. 2'ge qiangshoou'men xirji'le yi'ge jiaancharzhahn narngfang shuuyur zheh shoouduh shuuyur Egypt, Cairo, shasii 5'ge jiingchar her shanghaih 2'ge. 2'ge qiangshoou xirji Egypt shooudu Cairo narnfang yi'ge jiaancharzhahn, shasii 5'ge jiingchar, 2'ge shouhshang. 2'ge qiangshoou xirji Egypt shooudu Cairo narnfang yi'ge jiaancharzhahn, shasii 5'ge jiingchar, 2'ge shouhshang. 2 gunmen attack Egypt capital Cairo south a checkpoint, killing 5 policemen, 2 are injured. 2014-01-20 Pakistan Taliban kills 6 soldiers Pakistan Taliban kills 6 soldiers Pakistan Taliban shasii 6'ge junrern Pakistan Taliban shasii 6'ge shihbing Pakistan Taliban shasii 6'ge shihbing Pakistan Taliban kills 6 soldiers A suicide bomb has exploded in a busy market near Pakistan's army headquarters in the northeastern city of Rawalpindi in Pakistan, killing at least 14 people including 6 soldiers. Pakistan's Taliban has said that it carried out this attack. A suicide bomb has exploded in a busy market near Pakistan's army headquarters in the northeastern city of Rawalpindi in Pakistan, killing at least 14 people including 6 soldiers. yi'ge zihsha zhahdahn baohzhah'le zaih yi'ge farnmarng'd shihchaang kaohjihn Pakistan'd junrern zoongbuh zaih dongbeeibuh'd cherngshih Rawalpindi zaih Pakistan, shasii zhihshaao 14 rern Pakistan's Taliban has said that it carried out this attack. Pakistan'd Taliban shuo'le ta jihnxirng'le zheh-cih xirji. Pakistan dongbeeibuh Rawalpindi-shih kaohjihn Pakistan junrern zoongbuh'd farnmarng shihchaang yi'ge zihsha zhahdahn zhahsii zhihshaao 14 rern baokuoh 6'ge shihbing. Pakistan'd Taliban shengcheng fadohng'le zheh-cih xirji. Pakistan dongbeeibuh Rawalpindi-shih kaohjihn Pakistan junrern zoongbuh'd farnmarng shihchaang yi'ge zihsha zhahdahn zhahsii zhihshaao 14 rern baokuoh 6'ge shihbing. Pakistan northeastern Rawalpindi city near Pakistan army headquarters' busy market a suicide bomb kills by explosion at least 14 people including 6 soldiers. Pakistan'd Taliban shengcheng fadohng'le zheh-cih xirji. Pakistan's Taliban claims carried out this attack. Taliban kills Nato soldier Taliban kills Nato soldier Taliban shasii Nato shihbing Taliban shasii Nato shihbing Taliban shasii Nato shihbing the Taliban kills Nato soldier The Taliban has attacked a military base in the southern province of Kandahar in Afghanistan, killing a Nato soldier. The Taliban has attacked a military base in the southern province of Kandahar in Afghanistan, killing a Nato soldier. Taliban xirji'le yi'ge junshih'd jidih zaih narnbuh'd sheengfehn Kandahar zaih Afghanistan, shasii yi'ge Nato shihbing. Taliban xirji Afghanistan narnbuh sheengfehn Kandahar yi'ge junshih jidih, shasii yi'ge Nato shihbing. Taliban xirji Afghanistan narnbuh sheengfehn Kandahar yi'ge junshih jidih, shasii yi'ge Nato shihbing. the Taliban attacks Afghanistan southern province Kandahar a military base, killing a Nato soldier. 2014-01-19 Pakistan Taliban kills 20 soldiers Pakistan Taliban kills 20 soldiers Palistan'd Taliban shasii 20'ge shihbing Pakistan Taliban shasii 20'ge shihbing Pakistan Taliban shasii 20'ge shihbing Pakistan's Taliban kills 20 soldiers A bomb has attacked an army convoy in the northwestern Pakistan, killing at least 20 soldiers and injuring more than 24. Pakistan's Taliban has claimed that it carried out the attack and there will be many such attacks. A bomb has attacked an army convoy in the northwestern Pakistan, killing at least 20 soldiers and injuring more than 24. yi'ge zhahdahn xirji'le yi'ge junrern cheduih zaih xibeeibuh'd Pakistan, shasii zhihshaao 20'ge shihbing her shanghaih chaoguoh 24'ge. Pakistan's Taliban has claimed that it carried out the attack and there will be many such attacks. Pakistan'd Taliban shengcheng'le ta jihnxirng'le zheh-cih xirji her jianghuih yoou xuuduo zhehyahng'd xirji. Pakistan xibeeibuh yi'ge zhahdahn xirji junrern cheduih, shasii zhihshaao 20'ge shihbing, chaoguoh 24'ge shouhshang. Pakistan'd Taliban shengcheng fadohng'le zhe'cih xirji her jianghuih yoou xuuduo zhehyahng'd xirji. Pakistan xibeeibuh yi'ge zhahdahn xirji junrern cheduih, shasii zhihshaao 20'ge shihbing, chaoguoh 24'ge shouhshang. Pakistan northwest a bomb attacks army convoy, killing at least 20 soldiers, more than 24 are injured. Pakistan'd Taliban shengcheng fadohng'le zhe'cih xirji her jianghuih yoou xuuduo zhehyahng'd xirji. Pakistan's Taliban claims carried out this attack and will have many such attacks. 2014-01-18 India funeral stampede kills 18 India funeral stampede kills 18 India zahnglii rern caai rern shasii 18 India zahnglii rern caai rern, 18 sii India zahnglii rern caai rern, 18 sii India funeral people trample people, 18 die At least 18 people have been killed and more than 40 people injured in a stampede at a funeral in the western city of Mumbai in India. At least 18 people have been killed and more than 40 people injured in a stampede at a funeral in the western city of Mumbai in India. zhihshaao 18 rern beihsha'le her chaoguoh 40 rern shouhshang zaih yi-cih rern caai rern zaih yi'ge zahnglii zaih xibuh'd cherngshih Mumbai zaih India. India xibuh chernghsih Mumbai yi-cih zahnglii rern caai rern, zhihshaao 18 rern siiwarng, chaoguoh 40 rern shouhshang. India xibuh chernghsih Mumbai yi-cih zahnglii rern caai rern, zhihshaao 18 rern siiwarng, chaoguoh 40 rern shouhshang. India western city Mumbai a funeral people trample people, at least 18 people die, more than 40 people are injured. 2014-01-17 Afghanistan Taliban kills UN officials Afghanistan Taliban kills UN officials Afghanistan'd Taliban shasii UN'd guanyuarn'men Afghanistan Taliban shasii UN guanyuarn'men Afghanistan Taliban shasii UN guanyuarn'men Afghanistan's Taliban kills UN's officials A suicide bomb and gunmen have attacked a restaurant popular with foreigners in Afghanistan's capital Kabul, killing 13 foreigners and 8 Afghanistan people, including a senior IMF official and 4 staff members of the United Nations. The Taliban has claimed that it carried out the attack targeting foreign officials. A suicide bomb and gunmen have attacked a restaurant popular with foreigners in Afghanistan's capital Kabul, killing 13 foreigners and 8 Afghanistan people, including a senior IMF official and 4 staff members of the United Nations. yi'ge zihsha zhahdahn her qiangshoou'men xirji'le yi-jian canting shouh huanyirng'd duih waihguorrern zaih Afghanistan'd shooudu Kabul, shasii 13'ge waihguorrern her 8'ge Afghanistan-rern, baokuoh yi'ge gaoji'd IMF'd guanyuarn her 4'ge zhiryuarn shuuyur Liarnherguor. The Taliban has claimed that it carried out the attack targeting foreign officials. Taliban shengcheng'le ta jihnxirng'le zheh-cih xirji zhenduih waihguor'd guanyuarn'men. Afghanistan shooudu Kabul yi'ge zihsha zhahdahn her qiangshoou'men xirji yi-jian waihguorrern charngquh'd canting, shasii 13'ge waihguorrern her 8'ge Afghanistan-rern, baokuoh Liarnherguor'd yi'ge gaoji IMF guanyuarn her 4'ge zhiryuarn. Taliban shengcheng fadohng'le zheh-cih zhenduih waihguor guanyuarn'd xirji. Afghanistan shooudu Kabul yi'ge zihsha zhahdahn her qiangshoou'men xirji yi-jian waihguorrern charngquh'd canting, shasii 13'ge waihguorrern her 8'ge Afghanistan-rern, baokuoh Liarnherguor'd yi'ge gaoji IMF guanyuarn her 4'ge zhiryuarn. Afghanistan's capital (of a country) Kabul a suicide bomb her gunmen attack a foreigners go often restaurant, killing 13 foreigners and 8 Afghanistan people, including United Nations' a senior IMF's official and 4 staff members. Taliban shengcheng fadohng'le zheh-cih zhenduih waihguor guanyuarn'd xirji. the Taliban claims carried out this targeting foreign officials' attack. Pakistan railway explosion kills 3 Pakistan railway explosion kills 3 Pakistan'd tieeluh baohzhah shasii 3 Pakistan tieeluh baohzhah 3 sii Pakistan tieeluh baohzhah 3 sii Pakistan railway's explosion 3 die An explosion has derailed a train in central Pakistan, killing at least 3 people and injuring 15. An explosion has derailed a train in central Pakistan, killing at least 3 people and injuring 15. yi-cih baohzhah shii chuguii'le yi-jiah huooche zaih zhongbuh'd Pakistan, shasii zhihshaao 3 rern her shanghaih'le 15'ge. Pakistan zhongbuh huooche baohzhah chuguii, zhihshaao 3 rern siiwarng, 15 rern shouhshang. Pakistan zhongbuh huooche baohzhah chuguii, zhihshaao 3 rern siiwarng, 15 rern shouhshang. Pakistan's central part a train explodes and derails, at least 3 people die, 15 people are injured. 2014-01-16 Taliban will defeat invaders Taliban will defeat invaders Taliban huih daabaih qinluezhee Taliban huih daabaih ruhqinzhee Taliban huih daabaih ruhqinzhee the Taliban will defeat invaders An Afghanistan's Taliban spokesman has told the BBC that the Taliban already controls most parts of Afghanistan and will defeat foreign invaders completely. An Afghanistan's Taliban spokesman has told the BBC that the Taliban already controls most parts of Afghanistan and will defeat foreign invaders completely. yi'ge Afghanistan'd Taliban fayarnrern gaohsuh'le BBC Taliban yiijing kohngzhih dahbuhfehn shuuyur Afghanistan her jianghuih daabaih waihguor'd qinluezhee chehdii'dy. Afghanistan Taliban fayarnrern gaohsuh BBC, Taliban yiijing kohngzhih Afghanistan dahbuhfehn, jianghuih chehdii'dy daabaih waihguor qinluehzhee. Afghanistan Taliban fayarnrern gaohsuh BBC, Taliban yiijing kohngzhih Afghanistan dahbuhfehn, jianghuih chehdii'dy daabaih waihguor qinluehzhee. Afghanistan's Taliban spokesman tells the BBC, the Taliban already controls Afghanistan's major part, will thoroughtly defeats foreign invaders. 2014-01-15 Green spaces good for mental health Green spaces good for mental health lvhseh'd kongjian yooulihyur jingshern'd jiahnkang lvhseh kongjian duih jingshern jiahnkang haao lvhseh kongjian duih jingshern jiahnkang haao green spaces towards mental health is good A study suggested living in urban area with green spaces had a long-lasting positive effect on mental health. It was found that people living in green urban spaces show fewer signs of depression or anxiety. A study suggested living in urban area with green spaces had a long-lasting positive effect on mental health. yi'ge yarnjiu xiaanshih'le zhuh zaih shihqu dihqu yoou lvhseh'd kongjian yoou yi'ge chirjiuu'd haao'chu duih jingshern'd jiahnkang. It was found that people living in green urban spaces show fewer signs of depression or anxiety. ta beih faxiahn'le rern'men zhuh zaih lvseh'd shihqu'd kongjian xiaanshih jiaohshaao'd zhehngzhuahng shuuyur yihyuh huohzhee jiaolvh. yarnjiu xiaanshih zhuh zaih yoou lvhseh kongjian'd shihqu duih jingshern jiahnkang yoou chirjiuu'd haao'chu, zhuh zaih lvhseh shihqu kongjian'd rern jiaohshaao yoou yihyuh huoh jiaolvh. yarnjiu xiaanshih zhuh zaih yoou lvhseh kongjian'd shihqu duih jingshern jiahnkang yoou chirjiuu'd haao'chu, zhuh zaih lvhseh shihqu kongjian'd rern jiaohshaao yoou yihyuh huoh jiaolvh. study shows living in have green spaces' urban area towards mental health have long-lasting benefits, living in green urban spaces' people less have depression or anxiety. China shoe factory fire kills 16 China shoe factory fire kills 16 Zhongguor xierchaang huoozai shasii 16 Zhongguor xierchaang dahhuoo, 16 sii Zhongguor xierchaang dahhuoo, 16 sii China shoe factory big fire, 16 die A shoe factory has caught fire in the city of Wenling in Zhejiang province in eastern China, killing at least 16 people. A shoe factory has caught fire in the city of Wenling in Zhejiang province in eastern China, killing at least 16 people. yi-jian xierchaang zhaorhuoo'le zaih zheh'ge cherngshih Wenliing zaih Zhehjiang-sheeng zaih dongbuh'd Zhongguor. Zhongguor dongbuh zhehjiang-sheeng Wenliing-shih yi-jian xierchaang zhaorhuoo, zhihshaao 16 rern siiwarng. Zhongguor dongbuh zhehjiang-sheeng Wenliing-shih yi-jian xierchaang zhaorhuoo, zhihshaao 16 rern siiwarng. China east zhejiang province Wenling city a shoe factory catches fire, at least 16 people die. 2014-01-14 Atheist given asylum in UK Atheist given asylum in UK wurshernluhnzhee geeiyuu bihhuh zaih Yingguor UK bihhuh wurshernluhnzhee UK bihhuh wurshernluhnzhee UK gives asylum to atheist An Afghanistan citizen has been given asylum in the UK for religious reason because he is an atheist. An Afghanistan citizen has been given asylum in the UK for religious reason because he is an atheist. yi'ge Afghanistan gongmirn beih geeiyuu'le bihhuh zaih Yingguor weih'le zongjiaoh'd liiyour youryur ta shih yi'ge wurshernluhnzhee. UK yi'ge Afghanistan gongmirn youryur shih wurshernluhn, beih geeiyuu zongjiaoh liiyour'd bihhuh. UK yi'ge Afghanistan gongmirn youryur shih wurshernluhn, beih geeiyuu zongjiaoh liiyour'd bihhuh. UK an Afghanistan citizen because of is atheist, be given religious reason's asylum. 2014-01-13 Caffeine could boost memory Caffeine could boost memory caffeine nernggouh tirgao jihyih caffeine nerng tirgao jihyih caffeine nerng tirgao jihyih caffeine could boost memory A US study has found that caffeine could boost memory besides using as a stimulant. It found those who took caffeine tablets did better than dummy pills on the memory tests. However, experts warned people that caffeine could cause negative effects such as jitteriness and anxiety. A US study has found that caffeine could boost memory besides using as a stimulant. yi'ge Meeiguor yarnjiu faxiahn'le caffeine nerng tirgao jihyih chur'le yohngzuoh yi'ge xingfehnjih. It found those who took caffeine tablets did better than dummy pills on the memory tests. ta faxiahn'le nahxie furyohng'le caffeine yaohpiahn zuoh'de gehnghaao bii faangzhih'd yaohwarn zaih zheh'ge jihyih cehshih. However, experts warned people that caffeine could cause negative effects such as jitteriness and anxiety. dahnshih, zhuanjia'men jiinggaoh'le rern'men caffeine nerng daaozhih fuhzuohyohng, rur jiinzhang her youlvh. Meeiguor yarnjiu faxiahn caffeine chur'le yohngzuoh xingfehnjih yee nerng tirgao jihyih, furyohng caffeine yaohwarn cuhjihn jihyih bii anweihjih haao. dahnshih zhuanjia jiinggaoh caffeine yoou fuhzuohyohng rur jiinzhang her youlvh. Meeiguor yarnjiu faxiahn caffeine chur'le yohngzuoh xingfehnjih yee nerng tirgao jihyih, furyohng caffeine yaohwarn cuhjihn jihyih bii anweihjih haao. US study discovers caffeine besides using as stimulant also can boost memory, taking caffeine pills to boost memory compared to placebo is good. dahnshih zhuanjia jiinggaoh caffeine yoou fuhzuohyohng rur jiinzhang her youlvh. but experts warn caffeine has side effects such as jitteriness and anxiety. 2014-01-10 China becomes world's largest trading country China becomes world's largest trading country Zhongguor cherngweir shihjieh'd zuihdah'd maohyih guorjia Zhongguor cherngweir shihjieh zuihdah maohyih guorjia Zhongguor cherngweir shihjieh zuihdah maohyih guorjia China becomes world largest trading country China's latest trade figures show that it has replaced the US as the biggest trading nation in the world, a position the US has held for decades. China's latest trade figures show that it has replaced the US as the biggest trading nation in the world, a position the US has held for decades. Zhongguor'd zuihxin'd maohyih shuhzih xiaanshih ta quudaih'le Meeiguor cherngweir zuihdah'd maohyih guorjia zaih zheh shihjieh, yi'ge dihweih Meeiguor baaochir'le jii-shir niarn lair. Zhongguor zuihxin'd maohyih shuhzih xiaanshih ta quudaih Meeiguor baaochir'le jii-shir niarn'd dihweih, cherngweir shihjieh zuihdah maohyih guorjia. Zhongguor zuihxin'd maohyih shuhzih xiaanshih ta quudaih Meeiguor baaochir'le jii-shir niarn'd dihweih, cherngweir shihjieh zuihdah maohyih guorjia. China newest trade figures show it replaces the US kept several tens of years' position, becomes the world biggest trading nation. 2014-01-09 Call to cut sugar in food Call to cut sugar in food huyuh xuejiaan tarng zaih shirwuh huyuh shirwuh xuejiaan tarng huyuh shirwuh xuejiaan tarng call for food to cut sugar A social movement group has been established calling for reducing the amount of added sugar in food and soft drinks in order to solve the problems of obesity and diabetes in the UK. A social movement group has been established calling for reducing the amount of added sugar in food and soft drinks in order to solve the problems of obesity and diabetes in the UK. yi'ge shehhuih'd yuhndohng tuarntii beih chernglih'le huyuh jiaanshaao zheh fehnliahng shuuyur tianjia'd tarng zaih shirwuh her ruaanyiinpiin weih'le jieejuer zheh wehntir shuuyur chifeir her tarngniaohbihng zaih Yingguor. wei'le jieejuer chifeir her tarngniaohbihng'd wehntir, Yingguor yi'ge shehhuih yuhndohng tuarntii chernglih huyuh jiaanshaao shirwuh her ruaanyiinpiin tianjia'd tarngfehn. wei'le jieejuer chifeir her tarngniaohbihng'd wehntir, Yingguor yi'ge shehhuih yuhndohng tuarntii chernglih huyuh jiaanshaao shirwuh her ruaanyiinpiin tianjia'd tarngfehn. for solving obesity and diabetes' problems, UK a social movement group established calling for reducing food and soft drinks added sugar content. Japan chemical factory explosion kills 5 Japan chemical factory explosion kills 5 Rihbeen huahxuer'd gongchaang baohzhah shasii 5 Rihbeen huahgongchaang baohzhah 5 sii Rihbeen huahgongchaang baohzhah 5 sii Japan chemical factory explosion 5 die An explosion at Mitsubishi Materials factory in Japan's Yokkaichi city in Mie county in Kansai region has killed at least 5 people and injured 12 people. An explosion at Mitsubishi Materials factory in Japan's Yokkaichi city in Mie county in Kansai region has killed at least 5 people and injured 12 people. yi-cih baohzhah zaih Mitsubishi Cairliaoh gongchaang zaih Rihbeen'd Yokkaichi cherngshih zaih Mie-xiahn zaih Kansai dihqu shasii'le zhihshaao 5 rern her shanghaih'le 12 rern. Rihbeen Kansai dihqu Mie-xiahn Yokkaichi-shih'd Mitsubishi Cairliaoh-chaang baohzhah shasii zhihshaao 5 rern, 12 rern shouhshang. Rihbeen Kansai dihqu Mie-xiahn Yokkaichi-shih'd Mitsubishi Cairliaoh-chaang baohzhah shasii zhihshaao 5 rern, 12 rern shouhshang. Japan Kansai region Mie county Yokkaichi city's Mitsubishi Materials factory explosion kills at least 5 people, 12 people be injured. 2014-01-07 Hong Kong movie pioneer Run Run Shaw dies Hong Kong movie pioneer Run Run Shaw dies Xianggaang diahnyiing xianqu Shaoh Yihfu shihshih Xianggaang diahnyiing xianqu Shaoh Yihfu shihshih Xianggaang diahnyiing xianqu Shaoh Yihfu shihshih Hong Kong movie pioneer Shao Yifu passes away Entertainment tycoon Run Run Shaw, a major figure in Asia's movie industry, has passed away at the age of 107. Entertainment tycoon Run Run Shaw, a major figure in Asia's movie industry, has passed away at the age of 107. yurlehyeh dahkeng Shaoh Yihfu, yi'ge zhohngyaoh'd rernwuh zaih Yahzhou'd diahnyiing gongyeh, shihshih'le zaih zheh niarnlirng shuuyur 107. Yahzhou diahnyiingyeh zhohngyaoh rernwuh, yurlehyeh dahheng Shaoh Yihfu shihshih, xiaangniarn 107 suih. Yahzhou diahnyiingyeh zhohngyaoh rernwuh, yurlehyeh dahheng Shaoh Yihfu shihshih, xiaangniarn 107 suih. Asia movie industry important figure, entertainment industry tycoon Shao Yifu passes away, dies at the age of 107 years of age. 2014-01-06 China stampede kills 14 China stampede kills 14 Zhongguor rern caai rern shasii 14 Zhongguor rern caai rern 14 sii Zhongguor rern caai rern 14 sii China people trample people 14 die A stampede has killed 14 people and injured 10 at a mosque in China's northwest Ningxia region. A stampede has killed 14 people and injured 10 at a mosque in China's northwest Ningxia region. yi-cih rern caai rern shasii'le 14 rern her shanghaih'le 10'ge zaih yi-jian Qingzhensih zaih Zhongguor'd xibeeibuh Nirngxiah dihqu. Zhongguor xibeeibuh Nirngxiah dihqu yi-jian Qingzhensih rern caai rern, 14 sii 10 shang. Zhongguor xibeeibuh Nirngxiah dihqu yi-jian Qingzhensih rern caai rern, 14 sii 10 shang. China northwest Ningxia region a mosque people trample people, 14 die 10 are injured. 2014-01-05 Vitamin D strengthens muscle Vitamin D strengthens muscle vitamin D qiarnghuah jirouh Vitamin D qiarnghuah jirouh Vitamin D qiarnghuah jirouh Vitamin D strengthens muscle A study has shown that high level of maternal vitamin D during pregnancy strengthens baby's grip strength at the age of four. The study has shown that vitamin D intake during late stage of pregnancy improves muscle strength. Evidence has shown that vitamin D deficiency decreases the amount of fast muscle fibers and increases the amount of fat in muscle. Muscle strength peaks in young adulthood before declining in older age. Low grip strength at adulthood is associated with problems such as diabetes, falls and fractures. It is likely that high vitamin D during pregnancy has benefit to a child that continue until old age and reduces the burden of illness associated with loss of muscle mass in old age. A study has shown that high level of maternal vitamin D during pregnancy strengthens baby's grip strength at the age of four. yi'ge yarnjiu xiaanshih'le gao'd shuiipirng shuuyur muuqin'd vitamin D dang huairyuhn qianghuah ying`err'd wohzhuorlih zaih zheh niarnlirng shuuyur 4. The study has shown that vitamin D intake during late stage of pregnancy improves muscle strength. zheh yarnjiu xiaanshih'le vitamin D shehquu dang waanqi shuuyur huairyuhn gaaishahn jirouh qiarngduh. Evidence has shown that vitamin D deficiency decreases the amount of fast muscle fibers and increases the amount of fat in muscle. zhehngjuh xiaanshih'le vitamin D quefar jiaanshaao zheh fehnliahng shuuyur kuaihsuh jirouh xianweir her zengjia zheh fehnliahng shuuyur zhifarng zaih jirouh. Muscle strength peaks in young adulthood before declining in older age. jirouh qiarngduh dardaoh gaofeng zaih niarnqing'd cherngniarnqi zaih...zhiqiarn shuaituih zaih gehng laao'd niarnlirng. Low grip strength at adulthood is associated with problems such as diabetes, falls and fractures.. di wohlih zaih cherngniarnqi shih yoou liarnxih'd yuu wehntir rur tahngniaohbihng, diedaao her guuzher. It is likely that high vitamin D during pregnancy has benefit to a child that continue until old age and reduces the burden of illness associated with loss of muscle mass in old age. ta shih keenerng'd nah gao vitamin D dang huairyuhn yoou haaochuh duih yi'ge errtorng chirxuh zhirzhih laaoniarn her jiaanshaao zheh fuhdan shuuyur jirbihng liarnxih'le yuu suunshih shuuyur jirouh zhihliahng zaih laaoniarn. yarnjiu zhiichu huairyuhnqi muuqin'd gao vitamin D shuiipirng qiarnghuah ying`err 4 suih shir'd wohzhuorlih. yarnjiu xiaanshih huairyuhn houhqi furyohng vitamin D gaaishahn jirouh qiarngduh. zhehngjuh xiaanshih quehfar vitamin D jiaanshaao kuaihsuh jirouh xianweir fehnliahng her zengjia jirouh zhifarng'd fehnliahng. jirouh qiarngduh zaih cherngniarn zaaoqih daadaoh gaofeng rarnhouh zhurbuh shuaituih. cherngniarnqi wohlih di huih daaozhih tarngniaohbihng, diedaao her guuzher wehntir. huairyuhnqi gao vitammin D duih errtorng zhirzhih laaoniarn yoou haaochuh, jiaanshaao laaoniarn jirouh suunshi daaozhih'd jirbihng. yarnjiu zhiichu huairyuhnqi muuqin'd gao vitamin D shuiipirng qiarnghuah ying`err 4 suih shir'd wohzhuorlih. study points out pregnancy period mother's high vitamin D level strengthens baby 4 years of age time's grip strength. yarnjiu xiaanshih huairyuhn houhqi furyohng vitamin D gaaishahn jirouh qiarngduh. study shows pregnancy late stage to take vitamin D improves muscle strength. zhehngjuh xiaanshih quehfar vitamin D jiaanshaao kuaihsuh jirouh xianweir fehnliahng her zengjia jirouh zhifarng'd fehnliahng. evidence shows lack of vitamin D reduces fast muscle fibers amount her increases muscle fat's amount. jirouh qiarngduh zaih cherngniarn zaaoqih daadaoh gaofeng rarnhouh zhurbuh shuaituih. muscle strength at adulthood early stage reaches peak then gradually declines. cherngniarnqi wohlih di huih daaozhih tarngniaohbihng, diedaao her guuzher wehntir. adulthood grip strength low will causes diabetes, falls and fractures problems. huairyuhnqi gao vitammin D duih errtorng zhirzhih laaoniarn yoou haaochuh, jiaanshaao laaoniarn jirouh suunshi daaozhih'd jirbihng. pregnancy period high vitamin D towards children until old age has benefits, reduces old age muscle loss caused disease. 2014-01-04 India house collapse kills 14 India house collapse kills 14 India farngwu daaotah shasii 14 India farngwuh daaotah, 14 sii India farngwuh daaotah, 14 si India house collapses, 14 die A constructing building has collapsed in the western province of Goa in India, killing at least 14 workers and dozens are missing. Lack of safety is the main reason for frequent collapses of buildings. A constructing building has collapsed in the western province of Goa in India, killing at least 14 workers and dozens are missing. yi-jian jiahnzhuh-zhong'd jiahnzhuhwuh daaotah'le zaih zheh xibuh'd sheengfehn Goa zaih India, shasii zhihshaao 14'ge gongrern her jii-shir'ge shizong. Lack of safety is the main reason for frequent collapses of buildings. quefar anquarn shih zheh zhuuyaoh'd yuarnyin daaozhih pirnfarn'd daaotah shuuyur jiahnzhuhwuh. Indian xibuh sheengfehn Goa yi-jian jiahnzhuh-zhong'd jiahnzhuhwuh daaotah, zhihshaao 14'ge gongrern siiwarng, jii-shir'ge shizong. quefar anquarn shih jiahnzhuhwuh jiingcharng daaotah'd zhuuyin. Indian xibuh sheengfehn Goa yi-jian jiahnzhuh-zhong'd jiahnzhuhwuh daaotah, zhihshaao 14'ge gongrern siiwarng, jii-shir'ge shizong. India west province Goa a constructing building collapses, at least 14 workers die, several tens are missing. quefar anquarn shih jiahnzhuhwuh jiingcharng daaotah'd zhuuyin. lack of safety is buildings often collapse's main reason. 2014-01-03 Egypt police kill 11 people Egypt police kill 11 people Egypt jiingchar shasii 11 rern Egypt jiingchar shasii 11 rern Egypt jiingchar shasii 11 rern Egypt police kill 11 people Police have killed at least 11 protesters in the latest protests across Egypt. More than a thousand protesters were killed since the first popularly elected Egyptian president Mohammed Morsi was overthrown in a military coup. Police have killed at least 11 protesters in the latest protests across Egypt. jiingchar shasii'le zhihshaao 11'ge kahngyihzhee zaih zuihjihn'd kahngyih biahnbuh Egypt. More than a thousand protesters were killed since the first popularly elected Egyptian president Mohammed Morsi was overthrown in a military coup. chaoguoh yiqian'ge kahngyihzhee beihsha'le zihcorng shoou'ge mirnxuaan'd Egypt'd zoongtoong Mohammed Morsi beih tuifan'le zaih yi-cih junshih zhehngbiahn. zuihjihn biahnbuh Egypt'd kahngyih, jiingchar shasii zhihshaao 11'ge kahngyihzhee. junshih zhehngbiahn tuifan shoou'ge mirnxuaan Egypt zoongtoong Mohammed Morsi yiilair chaoguoh yiqian'ge kahngyihzhee beihsha. zuihjihn biahnbuh Egypt'd kahngyih, jiingchar shasii zhihshaao 11'ge kahngyihzhee. recently be spread all over Egypt's protests, police kill at least 11 protesters. junshih zhehngbiahn tuifan shoou'ge mirnxuaan Egypt zoongtoong Mohammed Morsi yiilair chaoguoh yiqian'ge kahngyihzhee beihsha. military coup overthrows the first popularly elected Egypt president Mohammed Morsi -since more than a thousand protesters are killed. Cambodia army kills 3 workers Cambodia army kills 3 workers Cambodia juhndiuh shasii 3'ge gongrern Cambodia junduih shasii 3'ge gongrern Cambodia junduih shasii 3'ge gongrern Cambodia army kills 3 workers Military police have opened fire on striking garment workers in the south of the capital of Cambodia, Phnom Penh, killing three and injuring several. The workers are requesting a minimum wage of USD160 instead of USD80 per month. Military police have opened fire on striking garment workers in the south of the capital of Cambodia, Phnom Penh, killing three and injuring several. junjiing kaihuoo'le xiahng bahgong'd furzhuang gongrern zaih zheh narnbuh shuuyur zheh shooudu shuuyur Cambodia, Phnom Penh, shasii 3'ge her shanghaih jii'ge. The workers are requesting a minimum wage of USD160 instead of USD80 per month. zhehxie gongrern shih yaoqiur yi'ge zuihdi gongzi USD160 daihtih USD80 meei yueh. Cambodia shooudu Phnom Penh narnbuh junjiing xiahng bahgong'd furzhuang gongrern kaihuoo, shasii 3'ge gongrern, jii'ge shouhshang. gongrern yaoqiur meei yueh zuihdi gongzi USD160 daihtih USD80. Cambodia shooudu Phnom Penh narnbuh junjiing xiahng bahgong'd furzhuang gongrern kaihuoo, shasii 3'ge gongrern, jii'ge shouhshang. Cambodia capital Phnom Penh south military police towards striking garment workers open fire, killing 3 workers, several be injured. gongrern yaoqiur meei yueh zuihdi gongzi USD160 daihtih USD80. workers demand every month lowest wage USD160 substitutes for USD80. 2014-01-02 Al-Qaeda controls much of Fallujah Al-Qaeda controls much of Fallujah al-Qaeda kohngzhih xuuduo shuuyur Fallujah al-Qaeda kohngzhih Fallujah dah-piahn dihfang al-Qaeda kohngzhih Fallujah dah-piahn dihfang al-Qaeda controls Fallujah large piece of place Al-Qaeda-linked rebel army has occupied much of Fallujah that became a hotbed of insurgency following the US invasion of Iraq. Al-Qaeda-linked rebel army has occupied much of Fallujah that became a hotbed of insurgency following the-US invasion of Iraq. al-Qaeda-yoouguan'd pahnjun zhahnliing'le xuuduo shuuyur Fallujah nah cherngweir yi'ge wenchuarng shuuyur qiiyih suir'zhe US ruhqin Iraq. al-Qaeda-yoouguan'd pahnjun zhahnliing'le US ruhqin Iraq houh cherngweir qiiyih wenchuarng'd Fallujah'd dah-piahn dihfang. al-Qaeda-yoouguan'd pahnjun zhahnliing'le US ruhqin Iraq houh cherngweir qiiyih wenchuarng'd Fallujah'd dah-piahn dihfang. al-Qaeda-linked rebel army occupied US invades Iraq -after becomes insurgency hotbed's Fallujah's large piece of place. Somalia bombs kill 10 Somalia bombs kill 10 Somalia zhahdahn shasii 10 Somalia zhahdahn shasii 10 rern Somalia zhahdahn shasii 10 rern Somalia bombs kill 10 people Two car bombs have exploded outside a hotel in Somalia's capital Mogadishu, killing at least 10 people. Al-Qaeda-linked al-Shabab said that it carried out the attack. Two car bombs have exploded outside a hotel in Somalia's capital Mogadishu, killing at least 10 people. Al-Qaeda-linked al-Shabab said that they carried out the attack. 2'ge qihche zhahdahn baohzhah'le zaih waihmiahn yi-jian jiuudiahn zaih Somalia'd shooudu Mogadishu, shasii zhihshaao 10 rern. al-Qaeda yoouguan'd al-Shabab shuo ta'men zhirxirng'le zheh xirji. Somalia shooudu yi-jian jiuudiahn waihmiahn 2'ge qihche zhahdahn baohzhah, shasii zhihsaao 10 rern. al-Qaeda yoouguan'd al-Shabab shengcheng fadohng zheh-cih xirji. Somalia shooudu yi-jian jiuudiahn waihmiahn 2'ge qihche zhahdahn baohzhah, shasii zhihsaao 10 rern. Somalia capital a hotel outside 2 car bomb explode, killing at least 10 people. al-Qaeda yoouguan'd al-Shabab shengcheng fadohng zheh-cih xirji. al-Qaeda related al-Shabab claims carries out this attack. 2014-01-01 Iraq violence kills 8,868 in 2013 Iraq violence kills 8,868 in 2013 Iraq baohlih shasii 8,868 zaih 2013 2013 niarn Iraq baohlih shasii 8,868 rern 2013 niarn Iraq baohlih shasii 8,868 rern 2013 year Iraq violence kills 8,868 people Violent attacks across Iraq in 2013 killed at least 7,818 civilians and 1,050 soldiers, the highest in 5 years, the United Nations says. Violent attacks across Iraq in 2013 killed at least 7,818 civilians and 1,050 soldiers, the highest in 5 years, the United Nations says. baohlih'd xirji biahnbuh Iraq zaih 2013 shasii'le zhihshaao 7,818'ge pirngmirn her 1,050'ge shihbing, zuihgao zaih 5 niarn, Liarnherguor shuo. 2013 niarn biahnbuh Iraq'd baohlih xirji shasii zhihshaao 7,818'ge pirngmirn her 1,050'ge shihbing, 5 niarn lair zuihgao, Liarnherguor shuo. 2013 niarn biahnbuh Iraq'd baohlih xirji shasii zhihshaao 7,818'ge pirngmirn her 1,050'ge shihbing, 5 niarn lair zuihgao, Liarnherguor shuo. 2013 year be spread all over Iraq's violence attacks kill at least 7,818 civilians and 1,050 soldiers, 5 year -since the highest, the United Nations says. Vitamin E good for dementia sufferers Vitamin E good for dementia sufferers vitamin E yooulihyur chidaizhehng huahnzhee vitamin E yooulihyur chidaizhehng huahnzhee vitamin E yooulihyur chidaizhehng huahnzhee vitamin E is beneficial for dementia sufferers A study trial has shown that those with Alzheimer's disease shown improvement if taken vitamin E. Patients were able to carry out everyday tasks for longer and needed less help from carers. Vitamin E is found in foods such as eggs, nuts and oils. A study trial has shown that those with Alzheimer's disease shown improvement if taken vitamin E. yi'ge yarnjiu shihyahn xiaanshih'le nahxie yoou Alzheimer jirbihng xiaanshih'le gaaijihn rurguoo furyohng'le vitamin E. Patients were able to carry out everyday tasks for longer and needed less help from carers. huahnzhee nernggouh jihnxirng rihcharng'd gongzuoh weih'le gehng charng'd her xuyaoh gehng shaao'd bangzhuh corng huhliizhee. Vitamin E is found in foods such as eggs, nuts and oils. vitamin E beih faxiahn zaih shirwuh rur jidahn, guoorern her your. yarnjiu shihyahn xiaanshih furyohng vitamin E nerng gaaijihn Alzheimer huanzhee. huahnzhee nerng gehng charng'dy jihnxirng rihcharng'd gongzuoh her xuyaoh gehng shaao'd huhlii. yoou vitamin E'd shirwuh baokuoh jidahn, guoorern her your. yarnjiu shihyahn xiaanshih furyohng vitamin E nerng gaaijihn Alzheimer huanzhee. study trial shows taking vitamin E can improve Alzheimer sufferers. huahnzhee nerng gehng-charng'dy jihnxirng rihcharng'd gongzuoh her xuyaoh gehng-shaao'd huhlii. sufferers can longer carry out daily tasks and need less care. yoou vitamin E'd shirwuh baokuoh jidahn, guoorern her your. having vitamin E's foods include eggs, nuts and oils. <|fim▁end|> | bàozhà, zhàsǐ zhìshǎo 3 gè ertóng, |
<|fim▁begin|> Wikipedia has related information at Nissan 240SX This guide is intended to give in-depth descriptions and exact procedures to modify the Nissan 240SX to be a more proficient sports car. This guide is not intended to provide styling advice or to provide info on body conversions or bodykits. If you are new to the Nissan 240SX and not familliar with the vehicle at all you should probably start with the Nissan 240SX entry on Wikipedia.org Power Modifications The goal of power modifications are to increase the overall power of your 240SX. Power goals can be attained through modifications of the stock engine, or by swapping in an altogether different engine than the KA24 that came in your car. A more detailed write up on nissan 240sx swaps can be <|fim▁hole|> KA24E Engine Swaps Non Nissan Engine Swaps Ignition and Fuel Management Drivetrain Modification Power is nothing unless you can get it to the wheels. If you plan on upping the horsepower of your vehicle you should also look into modifying your drivetrain to handle it. Transmission Differential Driveshaft Final Drive Suspension and Brake Modification What good is all that power if you can't turn or stop? Overlooking suspension and brake upgrades is a common and sometimes costly mistake. Shocks and Springs Coilovers Control Arms Sway Bars Brakes Chassis Modification Trying to get that extra bit of performance out of your car? Making it lighter and stiffer is a good way to make the car handle better. Chassis Strengthening Weight Reduction 4 lug to 5 lug conversion Useful Links Weblinks <|fim▁end|> | found here: http://240sxlisted.com/240sx-swaps-p23 KA24DE and |
<|fim▁begin|> 69. What is a website? It is a set of pages written in computer language that host texts, images, videos, data or other means of interaction (e.g. chat, forum), disseminated through standard protocols and identified by a domain (see below). 70. What is a blog or video blog? Personal page operated on the Internet, hosted by a domain. It is a specific type of website characterized by the chronological “diary” form: it might be commented by readers, host videos, images, etc. If the content of the blog is mostly video, it is also called video-blog. 71. Who rules the Internet and Domain Name System (DNS)? At a global level, no one natural person, company, organization or government runs and rules the Internet. Each State or inter-States treaty is setting and enforcing its own policies, rules and regulations. On the pure technical-IT level, there is a set of technical rules developed and applied by the Internet Corporation for Assigned Names and Numbers (ICANN), a non-profit organization, under US law, responsible for the management and coordination of the domain name system (so-called DNS, Domain Name System), to ensure that each address is unique and that users are able to find valid (IP, Internet Protocol) addresses. ICANN is organized according to the plural participatory model (so called multi-stakeholder), to which the public and private sectors contribute. At domestic or European Union level, there are different laws governing access, use and disputes on the subject matter. 72. Does copyright also apply to the Internet? Yes. The Internet is not a free zone. The digital world is regulated by international (e.g. multilateral treaties, <|fim▁hole|> legislation on the subject matter. 73. What basic rules do I have to follow to publish on my site? The rule of due diligence requires those who intend to disseminate content via Internet, and therefore also through a site, to verify the domestic, European and international legislation applicable, for example, to the cultural sector. For example, carrying out the copyright, the expiry of such rights, if there is any license and the type of license. To this generic rule, the cultural institution, owner of the site, may foresee further provisions for the visitors and users of the site. These specific rules can be provided in the so-called terms and conditions of the site or, if the site offers products or services for sale in the so-called general conditions of contract. If the user-buyer of products or services is an individual (consumer), the more rigorous consumer protection legislation (so-called “B2C”) will be applied; if the user-buyer of products or services is a business, the general rules on contract will be applied (so-called “B2B”). Author's Right, Copyright and Free Licenses for Culture on the Web Introduction to the FAQs • I – Definitions II – Types of Content (Photographs • 2D-3D Reproductions • Texts • Databases • Open Data • Audio Content) III – Web Tools (Podcast and Webinar • Sharing • Websites • Domain Name • App • Social Network • Instant Messaging) IV – Licenses and Reuse (Data and Licenses • Images of Cultural Goods in Public Domain • Open Access and License) V – Problems and Solutions (Infringements • Contracts and Consents • Legal Notices • Exceptions) <|fim▁end|> | agreements between States), European and State |
<|fim▁begin|> Understanding monads Contents 1 Definition 1.1 Motivation: Maybe 1.2 Type class 1.3 Monad and Applicative 2 Notions of Computation 3 Monad Laws 3.1 Return as neutral element 3.2 Associativity of bind 3.2.1 Monadic composition 4 Monads and Category Theory 5 liftM and Friends 6 Notes Monads Prologue: IO, an applicative functor Understanding monads MaybeList do notation IOState Alternative and MonadPlus Monad transformers edit this chapter There is a certain mystique about monads, and even about the word "monad" itself. While one of our goals of this set of chapters is removing the shroud of mystery that is often wrapped around them, it is not difficult to understand how it comes about. Monads are very useful in Haskell, but the concept is often difficult to grasp at first. Since monads have so many applications, people often explain them from a particular point of view, which can derail your efforts towards understanding them in their full glory. Historically, monads were introduced into Haskell to perform input and output – that is, I/O operations of the sort we dealt with in the Simple input and output chapter and the prologue to this unit. A predetermined execution order is crucial for things like reading and writing files, and monadic operations lend themselves naturally to sequencing. However, monads are by no means limited to input and output. They can be used to provide a whole range of features, such as exceptions, state, non-determinism, continuations, coroutines, and more. In fact, thanks to the versatility of monads, none of these constructs needed to be built into Haskell as a language; rather, they are defined by the standard libraries. In the Prologue chapter, we began with an example and used it to steadily introduce several new ideas. Here, we will do it the other way around, starting with a definition of monad and, from that, building connections with what we already know. Definition A monad is defined by three things: a type constructor m; a function return;[1] an operator (>>=) which is pronounced "bind". The function and operator are methods of the Monad type class and have types return :: a -> m a (>>=) :: m a -> (a -> m b) -> m b and are required to obey three laws that will be explained later on. For a concrete example, take the Maybe monad. The type constructor is m = Maybe, while return and (>>=) are defined like this: return :: a -> Maybe a return x = Just x (>>=) :: Maybe a -> (a -> Maybe b) -> Maybe b m >>= g = case m of Nothing -> Nothing Just x -> g x Maybe is the monad, and return brings a value into it by wrapping it with Just. As for (>>=), it takes a m :: Maybe a value and a g :: a -> Maybe b function. If m is Nothing, there is nothing to do and the result is Nothing. Otherwise, in the Just x case, g is applied to x, the underlying value wrapped in Just, to give a Maybe b result. Note that this result may or may not be Nothing, depending on what g does to x. To sum it all up, if there is an underlying value of type a in m, we apply g to it, which brings the underlying value back into the Maybe monad. The key first step to understand how return and (>>=) work is tracking which values and arguments are monadic and which ones aren't. As in so many other cases, type signatures are our guide to the process. Motivation: Maybe To see the usefulness of (>>=) and the Maybe monad, consider the following example: Imagine a family database that provides two functions: father :: Person -> Maybe Person mother :: Person -> Maybe Person These look up the name of someone's father or mother. In case our database is missing some relevant information, Maybe allows us to return a Nothing value to indicate that the lookup failed, rather than crashing the program. Let's combine our functions to query various grandparents. For instance, the following function looks up the maternal grandfather (the father of one's mother): maternalGrandfather :: Person -> Maybe Person maternalGrandfather p = case mother p of Nothing -> Nothing Just mom -> father mom Or consider a function that checks whether both grandfathers are in the database: bothGrandfathers :: Person -> Maybe (Person, Person) bothGrandfathers p = case father p of Nothing -> Nothing Just dad -> case father dad of Nothing -> Nothing Just gf1 -> -- found first grandfather case mother p of Nothing -> Nothing Just mom -> case father mom of Nothing -> Nothing Just gf2 -> -- found second grandfather Just (gf1, gf2) What a mouthful! Every single query might fail by returning Nothing and the whole function must fail with Nothing if that happens. Clearly there has to be a better way to write that instead of repeating the case of Nothing again and again! Indeed, that's what the Maybe monad is set out to do. For instance, the function retrieving the maternal grandfather has exactly the same structure as the (>>=) operator, so we can rewrite it as: maternalGrandfather p = mother p >>= father With the help of lambda expressions and return, we can rewrite the two grandfathers function as well: bothGrandfathers p = father p >>= (\dad -> father dad >>= (\gf1 -> mother p >>= -- gf1 is only used in the final return (\mom -> father mom >>= (\gf2 -> return (gf1,gf2) )))) While these nested lambda expressions may look confusing to you, the thing to take away here is that (>>=) releases us from listing all the Nothings, shifting the focus back to the interesting part of the code. To be a little more precise: The result of father p is a monadic value (in this case, either Just dad or Nothing, depending on whether p's father is in the database). As the father function takes a regular (non-monadic) value, the (>>=) feeds p's dad to it as a non-monadic value. The result of father dad is then monadic again, and the process continues. So, (>>=) helps us pass non-monadic values to functions without actually leaving a monad. In the case of the Maybe monad, the monadic aspect is the uncertainty about whether a value will be found. Type class In Haskell, the Monad type class is used to implement monads. It is provided by the Control.Monad module and included in the Prelude. The class has the following methods: class Applicative m => Monad m where return :: a -> m a (>>=) :: m a -> (a -> m b) -> m b (>>) :: m a -> m b -> m b fail :: String -> m a Aside from return and bind, there are two additional methods, (>>) and fail. Both of them have default implementations, and so you don't need to provide them when writing an instance. The operator (>>), spelled "then", is a mere convenience and has the default implementation m >> n = m >>= \_ -> n (>>) sequences two monadic actions when the second action does not involve the result of the first, which is a common scenario for monads such as IO. printSomethingTwice :: String -> IO () printSomethingTwice str = putStrLn str >> putStrLn str The function fail handles pattern match failures in do notation. It's an unfortunate technical necessity and doesn't really have anything to do with monads. You are advised not to call fail directly in your code. Monad and Applicative An important thing to note is that Applicative is a superclass of Monad.[2] That has a few consequences worth highlighting. First of all, every Monad is also a Functor and an Applicative, and so fmap, pure, (<*>) can all be used with monads. Secondly, actually writing a Monad instance also requires providing Functor and Applicative instances. We will discuss ways of doing that later in this chapter. Thirdly, if you have worked through the Prologue, the types and roles of return and (>>) should look familiar... (*>) :: Applicative f => f a -> f b -> f b (>>) :: Monad m => m a -> m b -> m b pure :: Applicative f => a -> f a return :: Monad m => a -> m a The only difference between the types of (*>) and (>>) is that the constraint changes from Applicative to Monad. In fact, that is the only difference between the methods: if you are dealing with a Monad you can always replace (*>) and (>>), and vice-versa. The same goes for pure/return – in fact, it is not even necessary to implement return if there is an independent definition of pure in the Applicative instance, as return = pure is provided as a default definition of return. Notions of Computation We have seen how (>>=) and return are very handy for removing boilerplate code that crops up when using Maybe. That, however, is not enough to justify why monads matter so much. Our next step towards that will be rewriting the two-grandfathers function in a quite different-looking style: using do notation with explicit braces and semicolons. Depending on your experience with other programming languages, you may find this very suggestive: bothGrandfathers p = do { dad <- father p; gf1 <- father dad; mom <- mother p; gf2 <- father mom; return (gf1, gf2); } If this looks like a code snippet in an imperative programming language to you, that's because it is. In particular, this imperative language supports exceptions : father and mother are functions that might fail to produce results, raising an exception instead; when that happens, the whole do-block will fail, i.e. terminate with an exception (meaning, evaluate to Nothing, here). In other words, the expression father p, which has type Maybe Person, is interpreted as a statement in an imperative language that returns a Person as the result, or fails. This is true for all monads: a value of type M a is interpreted as a statement in an imperative language M that returns a value of type a as its result; the semantics of this language are determined by the monad M.[3] Under this interpretation, the then operator (>>) is simply an implementation of the semicolon, and (>>=) of the semicolon and assignment (binding) of the result of <|fim▁hole|> a let expression can be written as a function application, let x = foo in (x + 3) corresponds to foo & (\x -> id (x + 3)) -- v & f = f v an assignment and semicolon can be written with the bind operator: x <- foo; return (x + 3) corresponds to foo >>= (\x -> return (x + 3)) In case of functions, & and id are trivial; in case of a monad, >>= and return are substantial. The & operator combines two pure calculations, foo and id (x + 3), while creating a new binding for the variable x to hold foo's value, making x available to the second calculational step, id (x + 3). The bind operator >>= combines two computational steps, foo and return (x + 3), in a manner particular to the monad M, while creating a new binding for the variable x to hold foo's result, making x available to the next computational step, return (x + 3). In the particular case of Maybe, if foo will fail to produce a result, the second step is skipped and the whole combined computation will fail right away as well. The function return lifts a plain value a to M a, a statement in the imperative language M, which statement, when executed / run, will result in the value a without any additional effects particular to M. This is ensured by Monad Laws, foo >>= return === foo and return x >>= k === k x; see below. Note The fact that (>>=), and therefore Monad, lies behind the left arrows in do-blocks explains why we were not able to explain them in the Prologue, when we only knew about Functor and Applicative. Applicative would be enough to provide some, but not all, of the functionality of a do-block. Different semantics of the imperative language correspond to different monads. The following table shows the classic selection that every Haskell programmer should know. If the idea behind monads is still unclear to you, studying each of the examples in the following chapters will not only give you a well-rounded toolbox but also help you understand the common abstraction behind them. Monad Imperative Semantics Wikibook chapter Maybe Exception (anonymous) Haskell/Understanding monads/Maybe Error Exception (with error description) Haskell/Understanding monads/Error IO Input/Output Haskell/Understanding monads/IO [] (lists) Nondeterminism Haskell/Understanding monads/List Reader Environment Haskell/Understanding monads/Reader Writer Logger Haskell/Understanding monads/Writer State Global state Haskell/Understanding monads/State Furthermore, these different semantics need not occur in isolation. As we will see in a few chapters, it is possible to mix and match them by using monad transformers to combine the semantics of multiple monads in a single monad. Monad Laws In Haskell, every instance of the Monad type class (and thus all implementations of bind (>>=) and return) must obey the following three laws: m >>= return = m -- right unit return x >>= f = f x -- left unit (m >>= f) >>= g = m >>= (\x -> f x >>= g) -- associativity Return as neutral element The behavior of return is specified by the left and right unit laws. They state that return doesn't perform any computation, it just collects values. For instance, maternalGrandfather p = do mom <- mother p gf <- father mom return gf is exactly the same as maternalGrandfather p = do mom <- mother p father mom by virtue of the right unit law. Associativity of bind The law of associativity makes sure that (like the semicolon) the bind operator (>>=) only cares about the order of computations, not about their nesting; e.g. we could have written bothGrandfathers like this (compare with our earliest version without do): bothGrandfathers p = (father p >>= father) >>= (\gf1 -> (mother p >>= father) >>= (\gf2 -> return (gf1,gf2) )) The associativity of the then operator (>>) is a special case: (m >> n) >> o = m >> (n >> o) Monadic composition It is easier to picture the associativity of bind by recasting the law as (f >=> g) >=> h = f >=> (g >=> h) where (>=>) is the monad composition operator, a close analogue of the function composition operator (.), only with flipped arguments. It is defined as: (>=>) :: Monad m => (a -> m b) -> (b -> m c) -> a -> m c f >=> g = \x -> f x >>= g There is also (<=<), which is flipped version of (>=>). When using it, the order of composition matches that of (.), so that in (f <=< g) g comes first.[4] Monads and Category Theory Monads originally come from a branch of mathematics called Category Theory. Fortunately, it is entirely unnecessary to understand category theory in order to understand and use monads in Haskell. The definition of monads in Category Theory actually uses a slightly different presentation. Translated into Haskell, this presentation gives an alternative yet equivalent definition of a monad, which can give us some additional insight on the Monad class.[5] So far, we have defined monads in terms of (>>=) and return. The alternative definition, instead, treats monads as functors with two additional combinators: fmap :: (a -> b) -> M a -> M b -- functor return :: a -> M a join :: M (M a) -> M a For the purposes of this discussion, we will use the functors-as-containers metaphor discussed in the chapter on the functor class. According to it, a functor M can be thought of as container, so that M a "contains" values of type a, with a corresponding mapping function, i.e. fmap, that allows functions to be applied to values inside it. Under this interpretation, the functions behave as follows: fmap applies a given function to every element in a container return packages an element into a container, join takes a container of containers and flattens it into a single container. With these functions, the bind combinator can be defined as follows: m >>= g = join (fmap g m) Likewise, we could give a definition of fmap and join in terms of (>>=) and return: fmap f x = x >>= (return . f) join x = x >>= id liftM and Friends Earlier, we pointed out that every Monad is an Applicative, and therefore also a Functor. One of the consequences of that was return and (>>) being monad-only versions of pure and (*>) respectively. It doesn't stop there, though. For one, Control.Monad defines liftM, a function with a strangely familiar type signature... liftM :: (Monad m) => (a1 -> r) -> m a1 -> m r As you might suspect, liftM is merely fmap implemented with (>>=) and return, just as we have done in the previous section. liftM and fmap are therefore interchangeable. Another Control.Monad function with an uncanny type is ap: ap :: Monad m => m (a -> b) -> m a -> m b Analogously to the other cases, ap is a monad-only version of (<*>). There are quite a few more examples of Applicative functions that have versions specialised to Monad in Control.Monad and other base library modules. Their existence is primarily due to historical reasons: several years went by between the introductions of Monad and Applicative in Haskell, and it took an even longer time for Applicative to become a superclass of Monad, thus making usage of the specialised variants optional. While in principle there is little need for using the monad-only versions nowadays, in practice you will see return and (>>) all the time in other people's code – at this point, their usage is well established thanks to more than two decades of Haskell praxis without Applicative being a superclass of Monad. Note Given that Applicative is a superclass of Monad, the most obvious way of implementing Monad begins by writing the Functor instance and then moving down the class hierarchy: instance Functor Foo where fmap = -- etc. instance Applicative Foo where pure = -- etc. (<*>) = -- etc. instance Monad Foo where (>>=) = -- etc. While following the next few chapters, you will likely want to write instances of Monad and try them out, be it to run the examples in the book or to do other experiments you might think of. However, writing the instances in the manner shown above requires implementing pure and (<*>), which is not a comfortable task at this point of the book as we haven't covered the Applicative laws yet (we will only do so at the applicative functors chapter). Fortunately, there is a workaround: implementing just (>>=) and return, thus providing a self-sufficient Monad instance, and then using liftM, ap and return to fill in the other instances: instance Monad Foo where return = -- etc. (>>=) = -- etc. instance Applicative Foo where pure = return (<*>) = ap instance Functor Foo where fmap = liftM The examples and exercises in this initial series of chapters about monads will not demand writing Applicative instances, and so you can use this workaround until we discuss Applicative in detail. Notes ↑ This return function has nothing to do with the return keyword found in imperative languages like C or Java; don't conflate these two. ↑ This important superclass relationship was, thanks to historic accidents, only implemented quite recently (early 2015) in GHC (version 7.10). If you are using a GHC version older than that, this class constraint will not exist, and so some of the practical considerations we will make next will not apply. ↑ By "semantics" we mean what the language allows you to say. In the case of Maybe, the semantics allow us to express failure, as statements may fail to produce a result, leading to the statements that follow it being skipped. ↑ Of course, the functions in regular function composition are non-monadic functions whereas monadic composition takes only monadic functions. ↑ Deep into the Advanced Track, we will cover the theoretical side of the story in the chapter on Category Theory. Understanding monads Solutions to exercises Monads Prologue: IO, an applicative functor >> Understanding monads >> Maybe >> List >> do notation >> IO >> State >> Alternative and MonadPlus >> Monad transformers edit this chapter Haskell Haskell Basics >> Elementary Haskell >> Intermediate Haskell >> Monads Advanced Haskell >> Fun with Types >> Wider Theory >> Haskell Performance Libraries Reference >> General Practices >> Specialised Tasks edit book structure <|fim▁end|> | a previous computational step. Just like |
<|fim▁begin|> Contents 1 Overview 2 Species Distribution 2.1 Lab: Species Distribution Modeling Using Maximum Entropy 3 Sources Overview Biodiversity is the "totality of genes, species, and ecosystems of a region".[1][2] The scale of biodiversity ranges from the variation of genes within a given species population, to the variation of life forms across an ecosystem, biome, or an entire planet. Biodiversity is considered to be a measure of the health of ecosystems, since it depends on climate and interactions among different species. Species Distribution Partial map of North America, showing the Native range of the painted turtle (C. picta), separated into its four sub-species. Eastern (C. p. picta) Midland (C. p. marginata) Southern (C. p. dorsalis) Western (C. p. bellii) Mixing of Western and Midland Painted Turtles Mixing of Eastern and Midland Painted Turtles Mixing of Southern and Eastern Painted Turtles The distribution of a species describes the spatial arrangement of a biological taxon. The pattern of distribution is determined by a variety of factors, including climate, resources, and dependence on other species. Distribution patterns can change seasonally in response to the availability of resources, and over time in response to environmental changes. The distribution of a species, also called a species range, can be represented using a species range map. Note that species distribution should not be confused <|fim▁hole|> the movement of individuals away from their area of origin or from centers of high population density. Dispersion usually takes place at the time of reproduction, or through translocation by people, animals, wind and water. Globalization and the transportation industry are significant factors in species translocation, causing a wider distribution for many species. Species distribution modeling is the process of using computational methods to predict the geographic distribution of one or more species based on a combination of environmental factors (including climate, land cover, water depth, etc.), resource availability, and the distribution of other species. Species distribution modeling can also incorporate dispersal factors, migration patterns, and environmental changes to predict changes over time. The particular distribution of a species also depends on the scale at which it is viewed. Species distribution models can be used to assess climate change impacts, evaluate conservation policies, measure the effects of deforestation, and prioritize areas for policy intervention. Lab: Species Distribution Modeling Using Maximum Entropy See Machine Learning For Prediction / Lab: Species Distribution Modeling Using Maximum Entropy Sources ↑ Tor-Björn Larsson (2001). Biodiversity evaluation tools for European forests. Wiley-Blackwell. p. 178. ISBN 978-87-16-16434-6. http://books.google.com/books?id=zeTU8QauENcC&pg=PA178. Retrieved 28 June 2011. ↑ Davis. Intro To Env Engg (Sie), 4E. McGraw-Hill Education (India) Pvt Ltd. pp. 4–. ISBN 978-0-07-067117-1. http://books.google.com/books?id=n0FvYeoHtAIC&pg=SA4-PA40. Retrieved 28 June 2011. <|fim▁end|> | with dispersal, which is |
<|fim▁begin|> Molecular Geometry Contents 1 Definitions 2 VSEPR Theory 3 Ring Molecular Geometry 4 Bent Molecular Geometry 5 Hybridization and Geometry 6 Polarity and Geometry 7 Reactivity and Geometry 8 Determination of Geometry 8.1 1. X-ray Crystallography 8.2 2. Nuclear Magnetic Resonance Spectroscopy 8.3 3. Electron Microscopy Definitions Molecular geometry is the 3-dimensional shape that a molecule occupies in space. It is determined by the central atom and the surrounding atoms and electron pairs. The shape of most molecules can be predicted using the Valence Shell Electron Pair Repulsion (VSEPR) method. This method states a few rules to help one determine the shape of a substance without using high technology methods such as X-ray crystallography, NMR Spectroscopy, or electron microscopy. Some of the most common shapes that can be taken are linear, trigonal planar, tetrahedral, pyramidal, and angular (or bent). VSEPR Theory Valence Shell Electron Pair Repulsion (VSEPR) theory Electron pairs around a central atom arrange themselves so that they can be as far apart as possible from each other. The valence shell is the outermost electron-occupied shell of an atom that holds the electrons involved in bonding. In a covalent bond, a pair of electrons is shared between two atoms. In a polyatomic molecule, several atoms are bonded to a central atom using two or more electron pairs. The repulsion between negatively charged electron pairs in bonds or as lone pairs causes them to spread apart as much as possible. The idea of "electron pair repulsion can be demonstrated by tying several inflated balloons together at their necks. Each balloon represents an electron pair. The balloons will try to minimize the crowding and will spread as far apart as possible. According to VSEPR theory, molecular geometry can be predicted by starting with the electron pair geometry about the central atom and adding atoms to some or all of the electron pairs. This model produces good agreement with experimental determinations for simple molecules. With this model in mind, the molecular geometry can be determined in a systematic way. Molecules can then be divided into two groups: Group 1: Molecules with NO lone electron pairs. In this case the molecular geometry is identical to the electron pair geometry. Group 2: Molecules with one or more lone electron pairs. In this case an extra step is needed to to translate from electron pair geometry to the final molecular geometry, since only the positions of bonded atoms are considered in molecular geometry. The VSEPR theory says that: 1) The electron pairs and atoms around a central atom will give a molecule its shape. 2) Electron pairs around a central atom in a molecule will attempt to be as far away from each other as possible. 3) Lone pairs around the central atom will have an effect on the shape of the entire molecule, just like an atom would. 4) Lone pairs of electrons repel each other more strongly than a lone pair and a shared pair, which in turn repel each other more than two shared pairs (or bonds between the central atom and another atom). These are just a few of the basic postulates of the VSEPR theory that, along with the lewis dot structure of a molecule, allow us to determine the shape it will have. Ring Molecular Geometry Many organic compounds contain rings of carbon atoms or other atoms such as oxygen or nitrogen. The simplest ring compound contains 3 carbons as in cyclopropane. The most common ring compounds contain either 5 or 6 carbons. These compounds are also called cyclic. Bent Molecular Geometry The molecule that is made up of 4 equally spaced sp3 hybrid orbitals forming bond angles of approximately 109.5o. The shape of the orbitals is tetrahedral. Two of the orbitals contain lone pairs of electrons. The two atoms connected to the central atom form a molecule with a bent shape. Hybridization and Geometry There is a simple relationship between the hybridization of an atom and its geometry, i.e., the way or ways in which other atoms can be disposed about it in space. This module examines the allowed bonding patterns for the representative elements B, C, N, O, and F, as well as their geometries as a function of their hybridization and formal charge. Finding Hybridization For Hybridization of molecules: 1. Count total number of valence Electrons 2. Divide by 8, if no of e- > 8. Divide by 2, if no of e- ≤ 8. File:Hybridization and molecular shape, png Hybridization and Molecular Shapes Polarity and Geometry The geometry of a molecule determines many properties such as polarity, reactivity, state, and much more. The polarity is directly related to the shape because many molecules with polar bonds can be non polar as a whole due to symmetry of the molecule that has equal electron pull outwards or inward. One such example is carbon dioxide. The electronegative oxygens on either side of the carbon pull atoms toward them selves, cause a partial negative charge on each end, while the less electronegative carbon is left with <|fim▁hole|> are both double bonded to the carbon leaving no lone pairs to bend the molecule, which is linear and has 180 degree bond angles. The equal pull of both partial negative charges balance each other out because the are of equal magnitude and exact opposite directions and the whole molecule is non polar. . CO2 On the other hand, a molecule can have polar bonds and a different shape that does not balance out the electronegative pull. For example, the hydrogen dioxide molecule, which also contains three atoms but has a different shape. Water is tetrahedral and bent because it has two extra electron pairs which push the hydrogen atoms into a 109.5 degree angle. As a result, the partial negative charge on oxygen is balanced on each side, but is pointed up and inwards, giving the whole molecule polar properties. Water with 4 single electrons The polarity in turn then affects many properties itself, such as melting point, boiling point, vapor pressure, solubility and the types of bonds that can be formed, just to name a few. Polar molecules will have higher melting and boiling points and lower vapor pressure due to the attraction between the molecules. Polar molecules also tend to dissolve other polar molecules while non polar molecules also dissolve other non polar substances. This is often referred to as "like dissolves like" as a quick way to remember this property. Reactivity and Geometry Another property determined by molecular geometry is reactivity. The reactivity is affected in many ways. One example is the type of bonds the molecule makes based on polarity. For example, some polar molecule can react in hydrogen bonds while non polar molecules react in london dispersion forces. But there are other ways that the geometry directly affects sections that a molecule partakes in. Large bulky molecules often react using the unhindered side, even if it is not as favorable of a product, because of the easier reaction. Another example is enzymes and the way the "fit" certain substrates based on their own sake and the shape of the substrates. These are just a couple examples of the many ways that molecular shape can help determine reactivity. Determination of Geometry Although VSEPR and a few similar methods can be used to determine the geometry of a molecule, there are high tech methods that can show us the shape of much larger molecules, usually proteins, without a doubt. These methods include X-ray crystallography, NMR Spectroscopy, and electron microscopy. X-ray crystallography is one of the best methods because of the very high resolution that is a result of the wavelength, which is very close to that of the bonds between the atoms. 1. X-ray Crystallography The first step in this method is to turn the protein into a crystal, which is done by adding certain salts that crystalize the macromolecule. Once it is in its crystal form, an X-ray beam is aimed at the protein and what happens to the light is observed. Some light will be absorbed, some will be scattered, and some will be diffracted. All of the rays are studied closely and their information, such as amplitude for example, give biochemists information about the atom in the molecule. 2. Nuclear Magnetic Resonance Spectroscopy Another technique, called Nuclear Magnetic Resonance Spectroscopy, allows protein structure to be studied without being first converted into a crystal. It is one of the very few methods that allows the substance to be studied in solution, which is usually CDCl3. The two types of NMRs commonly used are proton NMR and carbon NMR, due to the magnetic resonance of the elements. For H-NMR, when a molecule is exposed to a magnetic and proton get excited and line up, four things can be observed that tell us about the environment of each identical group of protons. The chemical shift (how far downfield the signal is) tells what functional groups are surrounding the proton(s). The signal integration gives us a ratio that compares the amount of protons in each family. The splitting(amount of peaks in one signal, such as a doublet,triplet, etc) tells us how many neighboring hydrogens there are. And finally, the number of signals itself tells us how many different families of protons there are. C-NMR works the same way except for integration, which is not always clear as it is in H-NMR. So all this information is gathered for a molecule and its exact connectivity can usually be determined, even if it was an unknown molecule. 3. Electron Microscopy The third method is electron microscopy, which uses uses an electron microscope that conducts an electron ray. The electron beams are aimed at the macromolecules and then impose an image of the molecule and its structure upon fluorescent or photographic film for us to see. Sometimes they are even sent directly to a screen, such as a computer screen. This image is a black a white picture but is still very useful in determining structure. Sources http://chem-guide.blogspot.com/2010/04/valence-shell-electron-pair-repulsion.html http://www.rcsb.org/pdb/101/static101.do?p=education_discussion/Looking-at-Structures/methods.html Biochemistry 6th Edition by Berg, Tymoczko, and Stryer http://chemwiki.ucdavis.edu/Inorganic_Chemistry/Molecular_Geometry <|fim▁end|> | a partial positive charge. The oxygens |
<|fim▁begin|> strftime Syntax #include <ctime> size_t strftime( char *str, size_t maxsize, const char *fmt, struct tm *time ); The function strftime() formats date and time information from time to a format specified by fmt, then stores the result in str (up to maxsize characters). Certain codes may be used in fmt to specify different types of time: Code Meaning %a abbreviated weekday name (e.g. Fri) %A full weekday name (e.g. Friday) %b abbreviated month name (e.g. Oct) %B full month name (e.g. October) %c the standard date and time string %d day of the month, as a number (01-31) with a leading zero %-d day of the month, as a number (1-31) without a leading zero %H hour, 24 hour format (0-23) %I hour, 12 hour format <|fim▁hole|> the year, as a number (1-366) %m month as a number (1-12). %M minute as a number (0-59) %p locale's equivalent of AM or PM %S second as a number (0-59) %U week of the year, (0-53), where week 1 has the first Sunday %w weekday as a decimal (0-6), where Sunday is 0 %W week of the year, (0-53), where week 1 has the first Monday %x standard date string %X standard time string %y year in decimal, without the century (0-99) %Y year in decimal, with the century %Z time zone name %% a percent sign Note: Some versions of Microsoft Visual C++ may use values that range from 0-11 to describe %m (month as a number). Related topics gmtime - localtime - time <|fim▁end|> | (1-12) %j day of |
<|fim▁begin|> Contents 1 Parasite Queen 1.1 Flaahgra 1.2 Thardus 1.3 Omega Pirate 1.4 Meta Ridley 1.5 Metroid Prime Parasite Queen The first boss in Metroid Prime, the Parasite Queen is located on the Space Pirate Frigate in the main reactor. It is surrounded by rotating shields and fires acid from its mouth. Plug missiles and beam shots into its mouth to defeat it. Flaahgra Flaahgra is a large mutated plant that is the source of the poisonous waters in the Chozo Ruins. It is surrounded by four dishes that reflect sunlight and needs constant solar energy. Its roots are its weak spot. Flaahgra gives up the Varia Suit when it's defeated, which protects Samus from super-heated areas in Magmoor Caverns. Thardus File:Thardus.jpg Thardus (cinema) Thardus is an experiment created by the Space Pirates who used Phazon on a group of rocks, but the Pirates gave up trying to pacify it since it became too dangerous. Thardus has the ability to control the weather, roll into a ball, hurl large rocks, and encase enemies in ice. It resides in a Quarantine Cave in the Phendrana Drifts. Defeating <|fim▁hole|> Omega Pirate The Omega Pirate resides in the Phazon Mines. It is an extremely large Elite Pirate which is able to become invisible and regenerate health. It is considered by many fans to be one of the game's toughest bosses. It attacks with its powerful hands, a Wave Quake Generator, and a Missle Launcher. Defeating the Omega Pirate gives Samus the Phazon Suit, which protects her from Phazon damage. File:Omegapirate.jpg Omega Pirate (concept art) Meta Ridley The fight with Meta-Ridley occurs above the crater in the Tallon Overworld. Meta-Ridley has two forms: a flying form and ground form, who uses a number of weapons and melee attacks. His weak spot is the gem on his chest. Metroid Prime The final boss of the game. It exists in two forms: the first being a spider-like creature with mainly projectile attacks. This form is weak against Power Beam if yellow, Wave Beam if blue/purple, Ice Beam if white, and Plasma Beam if red. The second form being a hovering, ethereal tentacled entity. Stand in the pools of Phazon it creates and blast it with your new Phazon Beam. <|fim▁end|> | Thardus gives you the Spider Ball. |
<|fim▁begin|> What do you need? Was brauchen Sie? Что вам нужно? De quoi avez-vous besoin ? ንኽንሕግዘኩም ኢና ኣብዚ ዘለና። Contents 1 What do you need? Was brauchen Sie? Что вам нужно? De quoi avez-vous besoin ? ንኽንሕግዘኩም ኢና ኣብዚ ዘለና። 2 Care Section This booklet is based on data from the community project "Refugee Phrasebook". Here you find other language resources. All content can be copied, adapted and redistributed freely (Creative Commons License, CC0). Something to be changed/added? Please insert your suggestion at https://pad.okfn.org/p/rpb-suggestions , or contact us at feedback@refugeephrasebook.de. Thanks! Online versions at: http:www.refugeephrasebook.de and https://en.wikibooks.org/wiki/Refugee_Phrasebook Care Section Italian English French Arabic Arabic phontecis Tigrinya Tigrinya phonetics Riesci a trovare qui [in questo frasario] quello che vuoi dire? Ha varie lingue. Possiamo provare a comunicare in questo modo. Can you find what you want to say here (in this phrasebook)? It has several languages. We can try to communicate this way. Pouvez-vous trouver ce que vous voulez dire ici [dans ce phrasebook]? Il contient plusieurs langues. Nous pouvons ainsi essayer de communiquer. عم تلاقي بقاموس الكلامات هاد الشي اللي بدك تقولو؟هون في لغات كتيرة. ممكن نتواصل هيك Am tlaki bi Qamus El-Kalimat had El-Shi eli bdak tkulu,houn fi Ligat Ktira, momken nitwasah haik/Hal yumkinuka an tajida fi Al-kamus hatha ma turid an takulahu? Al-kamus yatadaman aded men Al-Lughat, rubama yumkinuna an natauasal bi hathihi Al-Tarika / እንታይ ክትብል ከም ዝደለኻ ካብዚ መጵሓፍ ክትረክቦ ምከኣልካዶ፧ ብዙሕ ቋንቋ ኣለዎ፥ በዚ ጌርና ክንረዳዳእ ኒፈቲን፥ Entay kitibil kemzideleka kabzi metshaft kitrekibo mikealka do? Buzuh quanqua alewo. Bezi gerna kinredadae niftin. Salve/ Ciao Hello bonjour / salut مرحبا / اهلا Saalam / Marhaba ሰላም፣ሰላማት selam/selamat Buongiorno Good day bonjour صباح الخیر Sabáh alchayr ደሓንዶ ውዒልኩም deHando we´ilkum Buonasera gevening bonsoir مساء الخیر Masa alchayr ከመይ አምሲም። dehan dom sichum Arrivederci goodbye au revoir مع السلامة باي ma‘a 's-saláma / Bye ደሓን ኵን deHan kun Di dove sei? Where do you come from? D'où venez-vous? من وين انت / من أي بلد أنت؟ Min Ouin inta(m) inti(f)? / min ay balad ant? ካበይ መጺእካ፧ kabey metsie´ka? Non ho capito. I don’t understand Je ne comprends pas. ما فهمت / لم أفهم Ma Fhimt / Lam Afham ኣይተረደኣንን ayterdeanin Riesci a trovare qui [in questo frasario] quello che vuoi dire? Ha varie lingue. Possiamo provare a comunicare in questo modo. Can you find what you want to say here [=in this phrasebook]? It has several languages. We can try to communicate this way. Pouvez-vous trouver ce que vous voulez dire [dans ce phrasebook]? Il contient plusieurs langues. Nous pouvons essayer de communiquer ainsi. فيك اتلاقي في هدا الكتاب شو بدك تحكي. في هادا الكتاب اكتر من لغة، منشان نقدر نحكي مع بعض. fek etlaqi fe hada alketab shu bedak tehki. Fe hada alketab aktar min logha, minshan neqdar nehki ma'a ba'ad እንታይ ክትብል ከም ዝደለኻ ካብዚ መጵሓፍ ክትረክቦ ምከኣልካዶ፧ ብዙሕ ቋንቋ ኣለዎ፥ በዚ ጌርና ክንረዳዳእ ኒፈቲን፥ Entay kitibil kemzideleka kabzi metshaft kitrekibo mikealka do? Buzuh quanqua alewo. Bezi gerna kinredadae niftin. Come sta? How are you? Comment allez-vous ? كيفكم شلونكم kifkum? schlounkum? ከመይ ኣለኺ/ኻ፧ kemey al-leKhi/a? Come stai? How are you? Comment vas-tu? كيفك/شلونك kifak(m) Kifek(f)? Schlouunak? ከመይ ኣለኺ/ኻ፧ kemey al-leKhi/a? Porto qualcuno che puo' aiutare. I'm getting somebody who can help. Je vais chercher quelqu'un qui peut aider. بدي جيب حدا يساعدك bdi ajeeb hada yesa'adak ክሕግዘኒ ዚክእል ሰብ ረኪበ ኣለኩ፥ Kihigizeni zikiel seb rekibe aleku. Aspetta qui per favore. Please wait here. Attendez ici s'il vous plaît. استنوا لو سمحتوا Esstanou Laou Samahtou / Alraga´a Alintidar Lau Samahtom ብክብረትካ ኣብዚ ተጸበይ B'kbretka abzi tetsebe Tornero'. I'll come back. Je vais revenir. راجع بعد شوي Rage'ae Ba'aed Shouai / saouf a´aoud laheqan ክምለስ እየ Kimiles eye Voglio aiutarti. I want to help you. Je veux vous aider. بدي اساعدك bdi asa'adak ኣነ ክሕግዘካ ደልየ፥ ane Kihigizeka delye. Potete fidarvi di me. You can <|fim▁hole|> faire confiance. بتقدر تثق في bteqdar tekhiq feye ንዓይ እመነኒ፥ Ni'ay emeneni. Aspettero' qui con te, non ti preoccupare. I will wait here with you, don't worry. Je vais attendre ici avec vous, pas de soucis. لا تقلق، راح استنا معك la taqlaq, rah astana ma'ak ኣብዚ ምሳካ ክጽበ አየ። ቡዙሕ ኣይሸገር፥ Abzi misaka kitsibey eye. Buzuh aytisheger. Qualcuno verra' ad aiutarti. Somebody will come and help you. Quelqu'un va venir vous aider. راح يجي حدا يساعدك rah yegi hada yesa'adak ካልእ ሰብ ክመጸካ ክሕግዘካ እዩ፥ Kalie seb kmetseka kihigizeka eyu. Questa persona puo' aiutarti. This person can help you. Cette personne peut vous aider هادا بقدر يساعدك hada beqdar yesa'dak እዚ ሰብ ክሕግዘካ እዩ፥ Ezi Seb kihigizega eyu. Dobbiamo solo aspettare un po'. We just have to wait a little. Nous devons attendre un petit peu احنا لازم نستنا شوي ehna lazim nestana schuai ቑሩብ ክንጽበ ኣለና፥ Kurub kintsibe alena. Sei molto coraggioso. You're very brave. Vous êtes très courageux / courageuse. انت كتير شجاع inta kteer schoga'a ብጣዕሚ ንፉዕ ኢካ፥ Bitaemi Nifue eka. Sei forte! You're great. Vous êtes super. انت عزيم inta a'azem ኣዚኻ ክኢላ ኢኻ፥ Azicha kiela icha. Guarira' presto. It will heal quickly. Ça va guérir rapidement. راح يطيب بسرعة rah yetib besora'a ቐልቲፉ ክሓዊ እዩ፥ Keltifu kihawi eyu. Andra' tutto bene. She will be OK / He will be OK Elle va aller mieux / Il ira mieux هى راح تكون منيحة / هو راح يكون منيح hiye rah itkun mniha(f)/hu'wi rah ykon mnih (m) ደሓን ክከዉን/ክትከውን እዩ/እያ፥ Dehan kikewin/kitkewn eyu/eya. Sono felice di vederti. I'm happy to see you. Je suis content(e) de vous voir. انا مبسوط اني شفتك ana mabsoota ini shoftak ንዓኻ ምርኣየይ ሕጉስ እየ፥ niacha me´rayey H´gus eyu. Fai attenzione, e buona fortuna. Take care and all the best Prenez soin de vous, et meilleurs voeux. دير بالك على حالك وبتمنالك الخير dir balak ala halak o batmanalak alkhier ጽቡቕ ዕድል፥ Tsibuk edil. Scrivimi quando puoi, questo e' il mio indirizzo. Write to me when you can, here is my address Écrivez-moi quand vous pouvez, voici mon adresse راسلني لما تقدر، هادا عنواني raslni lama teqdar, hada a'anwani ኣብ ዝጠዓመካ ጸሓፈለይ፥ ኣድራሻይ እንሀልካ፥ Ab ziteameka Tsehafely. Adrashay enehalka. Cos’è successo? What happened? Qu’est-ce qui s’est passé? شو صار Schou saar / Madha hassal እንታይ ደኣ ተረኺቡ፧ Entay dea Terechibu? Non lo so I don’t know Je ne sais pas ما يعرف Ma Baáref / La Aáref ኣይፈለጥኩን Ayfeletkun Mi dispiace, non è rimasto più niente Sorry, there is nothing left. Désolé, il ne reste plus rien. ما ظل شي Ma Dal Schi / Assef lam Yabka shi ይቕረታ። ዝተረፈ የለን Yikreta. Ziterefe yelen grazie thank you merci شكراً shokran ምስጋና ፨ የቀንየለይ Ms´gana / yekenyeley per favore Please s'il vous plait عفواً afwan በጃኺ ፨ በጃኻ bejakhi / bejakha benvenuto Welcome bienvenue اهلا وسهلا Ahlan wa sahlan መርሓባ merhaba posso aiutare? Can I help you? Puis-je vous aider? بقدر اساعدك؟ Bi'adar sa'dak ክሕግዘካ´ዶ ይኽእል፧ khegzeka´do ychiel? prendi take this prenez خود / اتفضل khod/ Itfadal ወሰድ wesed è buono That's good C'est bien / C'est bon هادا منيح hatha mnih እዚ ጽቡቅ ኢዩ ezi tsbuq iyu scusa Sorry pardon اسف aseef ይቕረታ (jirireta) Come stai? How are you? Comment allez vous? Comment vas tu? كيف حالك؟ kif halak(m)/halek(f) ከመይ ኣለኻ፧ kemey al-echa? Non deve dispiacerti. Don't be sorry ne soyez pas désolée ما لازم تتأسف على شي ma lazem titassaf ዘሕፍር የብሉን፥ zehfr yeblun Cosa ti serve? What do you want? Que voulez-vous? شو بدك / شو بتحب Shou biddak(m)/ biddek(f) እንታይ ትደሊ ኣለኻ entay tdeli alecha Di che cosa hai bisogno? What do you need? De quoi avez-vous besoin? እንታይ ትደሊ ኣለኻ entay tdeli alecha Purtroppo non ti posso aiutare. I can't help you unfortunately. Malheureusement, je ne peux pas vous aider. ክሕግዘካ ኣይክእልን ኢየ፥ kihgzeka aykelin iye. <|fim▁end|> | trust me. Vous pouvez me |
<|fim▁begin|> Contents 1 The Introduction of Hub and Spoke Network 2 Hub and Spoke Network in Transport 3 The History of Hub and Spoke Network 4 Characteristics of Hub and Spoke Network 4.1 The Main Features 4.2 The Main Advantages of Establishing a Hub Airport 5 Limitation of Hub and Spoke Network 6 Basic Conditions for Building a Hub Airport 7 Point-to-Point versus Hub-and-Spoke Networks 8 Discussion 8.1 Some Possible Issues of Hub and Spoke Network 9 Conclusion 10 Reference The Introduction of Hub and Spoke Network The hub-and-spoke system is the best known network system. The spokes in the network are linear services between regional terminals and the hubs. Hubs are terminals or, in railway systems, they may be marshalling yards. At the hub the transport units are transferred from one liner service to another connecting the hub with the destination terminal. Ideally, hubs are located near to the centre of gravity of transport demand. In this way detour distances and trip times between origin and destination terminals can be minimised. The dotted arrow in the picture indicates that two services (spokes) are needed to connect different regions. The total terminal-to-terminal trip time is increased because of the extra distance for the call at the hub and the time spent in the hub itself. A hub-and-spoke system is designed to combine small flows arriving and departing in different directions. In the case of railways the spokes can be of any type of liner service with any frequency <ref> Hub-and-Spoke Network[1] Hub and Spoke Network in Transport In the hub-and-spoke case for air freight or passengers, the hub airport refers to an airport with dense international and domestic routes. Passengers can easily transfer to other airports, and it also can provide an efficient, convenient and low-cost service, allowing airlines to choose it as their own route destination, allowing passengers to choose it as a transit port for transiting other airports. The hub airport is both a demand for national economic development and a demand for the development of airport enterprises. The hub and spoke network system is an advanced form of air transport production organisation commonly used by large airlines and airports in the world today. It has multiple functions such as optimising the route structure, rationally allocating resources, enhancing the competitiveness of enterprises, and promoting airport prosperity. The History of Hub and Spoke Network The Hob and Spoke airport network structure is a new route layout pattern first appeared in the United States in the 1970s. It is characterized by the fact that cities with smaller passenger flows are not directly navigable, but are all connected to a hub airport. Through the hub airport, the flight connection, transit passengers and goods are used to achieve the purpose of fast transportation of passengers and goods. The adoption of a central route structure has the following advantages for airlines: Optimize configuration resources and reduce operating costs. The Hub and Spoke network system is more economical than the city's route structure in terms of the number of aircraft, crew, routes and ground maintenance personnel. Improve the passenger load factor and load rate of aircraft and improve the economic efficiency of airlines. As the source of the feeder line is concentrated on the trunk line, it is possible to enable large and small airlines to develop their strengths and avoid weaknesses. Play to the rapid advantages of air transportation and improve the competitiveness of the industry. Efficient flight connections shorten travel time and increase the attractiveness of air transportation. Characteristics of Hub and Spoke Network The Main Features The hub airport is the node of the Hub and Spoke network and the distribution centre of air passenger and cargo. Its main features are: A high proportion of transit business. Efficient flight connection capabilities. The Main Advantages of Establishing a Hub Airport Promote the increase in airport traffic and attract more flights to the airport. Increase the aeronautical and non-aeronautical revenues of the airport. Drive the development of the surrounding economy and related industries. For example, the development of tertiary industries such as restaurants, restaurants and tourism services. Created conditions for the development of the surrounding regional airport. Convenient service stimulates the demand for air transportation and brings vitality to small and medium airports. Limitation of Hub and Spoke Network The hub and spoke network system has both advantages and disadvantages. The shortcoming is that if the airport capacity is too small or inefficient, the airport and route are prone to congestion and congestion, which may cause flight delays and may affect the entire network. In order to solve these problems, in addition to paying attention to improving the level of airport management, some hub airports should also pay attention to the long-term planning of the airport and gradually expand the scale of the airport. In addition, some airports have adopted the method of constructing an auxiliary airport <|fim▁hole|> the passenger and cargo volume of the hub airport, which has alleviated the flight delay caused by congestion. Basic Conditions for Building a Hub Airport The construction of hub airports requires certain conditions, which include the following aspects: Excellent buried location. That is, the location of the airport should be favourable for airlines to adopt the central route layout mode. It should consider the economy of voyage, the potential development market and the future development strategy. Huge air transport market and transit demand. One of the conditions for establishing a hub airport is that there should be a large market demand for air transportation and potential demand for transferring international passengers and goods. Foreign gateway airports, the proportion of international transfer passengers and goods generally to account for more than 30% of the airport throughput. High proportion of international passenger and cargo transfer is one of the important signs of hub airport. Complete airport transit facilities. It includes several airstrips, reasonable transfer facilities, advanced flight information system, and related supporting services. Strong base airline. The performance is, the capacity is sufficient, the fleet structure is reasonable and can satisfy the trunk line and the branch line need. It can have domestic and even foreign backbone airlines as partners. When one company is short of capacity, it can combine the strength of other airlines. Stable and coordinated relationship between departments. Close coordination among hub airports, base airlines, air traffic control, customs, border inspection and other departments. Loose policy and legal environment. It means that the government gives a loose operating environment, so that airlines have moderate decision-making power in the aspects of routes, fares, models and flight times, while airports enjoy certain autonomy in the design process, charging standards and operating projects. Point-to-Point versus Hub-and-Spoke Networks A point-to-point network connects directly a set of locations without any interruption of services (e.g. pick up or drop off) even if the route itself may not be direct. A (pure) hub-and-spoke network connects every location through a single intermediary location called a hub. Hub-and-spoke, as a network structure, allows for a greater flexibility within the transport system through a concentration of flows. Many transportation services have adapted to include a hub-and-spoke structure. The most common examples involve air passenger and freight services which have developed global, national and regional hubs, such as those used by parcel carriers such as UPS. Discussion Some Possible Issues of Hub and Spoke Network Some airports and airlines have not reached a consensus on the construction of aviation hubs. In essence, the construction of an aviation hub is a development strategy of airlines. It is an effective means for air transport enterprises to obtain competitive advantages and survive and develop in a competitive environment. However, due to the limitation of subjective and objective conditions, some domestic airlines have little enthusiasm and an insufficient understanding of the construction of aviation hubs. Transfer support capacity is insufficient. Although some governments have transformed some airports so that they have a certain transfer capacity, they cannot fundamentally meet the needs of future airport development. To improve the airport transit support capacity, it is necessary to design the transit process with the concept of hub aviation, improve the capacity of runway, apron, terminal building and boarding gate, strengthen the scientific management of airspace, improve flight connection capacity and shorten the transit time of passengers. Base airline scale needs to be guaranteed. To implement a hub aviation system, airports must rely on base airlines. Throughout the world's large hub airports, the business volume of its base airlines generally accounts for more than 50% of the airport's business volume. For example, American airlines accounted for 73.5% of its Atlanta hub flights, northwest airlines accounted for 79.8% of its Detroit hub flights, and Lufthansa accounted for 60.8% of its Frankfurt hub flights. Air France handles more than 52 per cent of passenger and cargo traffic at its Paris hub. Conclusion In a word, the hub and spoke network system is an advanced mode of air transport organization. It is not only necessary but also urgent to continue the development of the hub aviation system. As the hub and spoke network is a complex and huge system project, it requires the cooperation of government departments at all levels, airlines, airports and other relevant units to create conditions, so as to promote the development of the hub and spoke network system. Generally speaking, many transportation services have adapted to include a hub-and-spoke structure. The most common examples involve air passenger and freight services which have developed global, national and regional hubs, such as those used by parcel carriers such as UPS, FedEx and DHL. However, potential disadvantages may also occur such as additional transshipment as fewer point-to-point services are offered, which for some connections may involve delays and potential congestion as the hub becomes the major point of transshipment. Reference https://gc21.giz.de/ibt/en/opt/site/ilt/ibt/regionalportale/sadc/inhalt/logistics/module_01/231_hubandspoke_network.html [2019-Sep-03] <|fim▁end|> | near the hub airport to divert |
<|fim▁begin|> Contents 1 Topic Article 2 What is the background to this research? 3 Where is the research from? 4 What kind of research was this? 5 What did the research involve? 6 What were the basic results? 7 How did the researchers interpret the results? 8 What conclusions should be taken away from this research? 9 What are the implications of this research? 10 For Further Information 10.1 Diabetes Australia 10.2 The Royal Women’s Hospital 11 References Topic Article Cordero, Y., Mottola, M., Vargas, J., Blanco, M., & Barakat R. (2015). Exercise Is Associated with a Reduction in Gestational Diabetes Mellitus. Medicine and Science in Sport and Exercise, 47(7), 1328-1333. Doi: 10.1249/MSS.0000000000000547 What is the background to this research? Gestational diabetes is a condition which arises during pregnancy and is characterised by high blood glucose levels1. Complications including pre-term birth, high blood pressure, and an increased risk of developing type II diabetes later in life can occur if the condition goes undiagnosed or untreated2. Researchers believe physical activity is the key to preventing, or reducing the prevalence of gestational diabetes because it assists in the metabolic control of glucose3. It does this by increasing the number of glucose transporters on a cells surface, resulting in improved glucose uptake into skeletal muscle, and decreased blood glucose levels1,4. However, there is currently minimal conclusive evidence to support the relationship between physical activity and the prevention of gestational diabetes5,6. A study by Cordero in 2015 increased the amount of reliable and valid evidence in this area by examining how a combination of aerobic and strength exercise can prevent gestational diabetes in women1. Where is the research from? The Technical University of Madrid in Spain provided the majority of funds for Cordero’s study1. The university also volunteered their facilities for the land based physical activity sessions. The Ministerio de Ciencia e Innovation in Spain contributed the remaining funds, and the Torreelodones Municipal Pool supplied facilities for the water based activities1. The completed study was published in the journal ‘Medicine and Science in Sports and Exercise’1. What kind of research was this? Cordero’s study was a randomised control trial consisting of a behavioural intervention1. The intervention comprised of supervised physical activity three times per week, one water and two land based sessions1. The randomised control trial is considered a level two research method by the National health and Medical Research Council, and is also the most appropriate design for clinical trials7. This means the results from the study provide strong evidence and support in regards to the relationship between physical activity and gestational diabetes prevalence. What did the research involve? Cordero’s study had 257 pregnant women complete the trial with a mean age of 33 years and a minimum of 80% compliance for the behavioural intervention. The women were divided into an intervention group and a control group. The intervention group participated in two 60min land based activity sessions, and one 50min water based activity session each week starting at 10–12 weeks gestation. Their intensity levels were monitored through Borgs scale of exertion, and heart rate measures. The control group were sedentary and only received usual antenatal care. The researchers were looking for changes to both primary and secondary outcomes. The primary outcome was the diagnosis of gestational diabetes, and secondary outcomes included excessive maternal weight gain, gestational age at delivery, delivery type, and birth weight and length1. What were the basic results? The results of Cordero’s study showed three significant differences between the intervention and control groups. These were… The intervention group had less diagnosed cases of gestational diabetes (1% compared to 8.8%) The intervention group had lower glucose values at the 180min mark in the fasted oral glucose tolerance test. The intervention group had fewer individuals with excessive maternal weight gain in accordance to their pre-pregnancy BMI (22.8% compared to 34.8%) How did the researchers interpret the results? Cordero’s study found the prescription of an aerobic and strength based exercise intervention decreased the prevalence of gestational diabetes. This finding contradicted the results from other level II research papers and a Cochrane review1,6. Cordero and those he collaborated with, believe their results differed because they initiated the intervention earlier in the pregnancy, <18 weeks gestation1. The Cochrane review included five studies, two of which initiated a physical activity intervention early within the gestation period. However, neither study found a significant difference between the control and intervention groups6. This suggests the intervention timing may not be the key to preventing gestational diabetes, and <|fim▁hole|> Cordero’s trial methods mimicked a study done in 2012 by Barakat, but there were two main differences within the methods. One, Cordero’s participants exercised for longer durations, and two, their heart rate did not rise above 60% of their estimated maximum in comparison to 70% in Barakat’s study1,8. Therefore, intensity or duration may be a significant factor in the prevention of gestational diabetes. Cordero’s study examined several secondary outcomes and the intervention group showed significant differences in excessive maternal weight gain, and the metabolic control of glucose1. These findings support previous research which has shown improving these outcomes reduces the risk of developing gestational diabetes and type II diabetes1,9. Cordero also suggested that excessive weight gain influences the sensitivity of insulin increasing gestational diabetes risk, but the relationship between the two variables was not significant1. Differences in blood glucose levels after consuming high and low GI foods By Studio34 at en.wikipedia (Transferred from en.wikipedia) [Public domain], from Wikimedia Commons What conclusions should be taken away from this research? Cordero study has concluded there is a strong association between an aerobic and strength exercise intervention and prevention of gestational diabetes1. However, they believe the efficacy and effectiveness of the intervention is dependent on the compliancy rates of participants. Many studies have similar notions and exclude individuals who do not meet minimum requirements1,8. Cordero’s research confirms the association between physical activity, enhanced glucose metabolism and gestational diabetes intervention. They state participating in moderate exercise 3 times per week for a minimum of 50min, is effective in enhancing glucose metabolism and insulin sensitivity which reduces the prevalence of gestational diabetes1. Cordero identifies a lack of nutritional intervention or analysis as an important limitation to this research1. This is because an individual’s nutrition can affect their insulin sensitivity and glucose metabolism (eg. differences in high and low GI foods). Therefore, not controlling or considering these factors may limit the reliability of Cordero findings. What are the implications of this research? Cordero’s study has provided an exercise intervention which successfully reduces the incidence of gestational diabetes and some secondary outcomes. This is important because few randomised control trials have developed successful exercise protocols showing significant differences1,6. The protocols employed by Cordero should be replicated with similar compliance rates, to ensure the results are valid and reliable. If successful, the intervention could significantly improve maternal health around the world, especially in at risk populations such as Indigenous Australians9. Cordero’s study may also stimulate further research because he identifies there is the lack of knowledge and specificity regarding effective interventions1. For Further Information Diabetes Australia Web page: https://www.diabetesaustralia.com.au/managing-gestational-diabetes Phone: 1300 136 588 The Royal Women’s Hospital Web page: https://www.thewomens.org.au/health-information/pregnancy-and-birth/pregnancy-problems/pregnancy-problems-in-later-pregnancy/gestational-diabetes/ References Cordero, Y., Mottola, M., Vargas, J., Blanco, M., & Barakat R. (2015). Exercise Is Associated with a Reduction in Gestational Diabetes Mellitus. Medicine and Science in Sport and Exercise, 47(7), 1328-1333. Doi: 10.1249/MSS.0000000000000547 Chamberlain, C., McLean, A., Oats, J., Oldenburg, B., Eades, S., Sinha, A., & Wolfs, R. 2015. Low Rates of Postpartum Glucose Screening Among Indigenous and non-Indigenous Women in Australia with Gestational Diabetes. Maternal Child and Health Journal, 19(3): 651-663. DOI: 10.1007/s10995-014-1555-3 Bain, E., Crane, M., Tieu, J., Crowther, C.A., & Middleton, P. (2015).Diet and exercise interventions for preventing gestational diabetes mellitus (Review). The Cochrane database of systematic reviews, 2015(4): 1-146 . DOI: 10.1002/14651858.CD010443.pub2 Harizopoulou, V., Kritikos, A., Papanikolaou, Z., Saranti, E., Vavilis, D., Klonos, E., Papadimas, I., & Goulis, D. (2010). Maternal physical activity before and during early pregnancy as a risk factor for gestational diabetes mellitus. Acta Diabetologica, 47(1), 83-89. DOI: 10.1007/s00592-009-0136-1. Available from: http://link.springer.com.ezproxy.canberra.edu.au/article/10.1007/s00592-009-0136-1/fulltext.html Tobias, D.k., Zhang, C., Dam, R., Bowers, K., & Hu, F. (2011).Physical Activity Before and During Pregnancy and Risk of Gestational Diabetes Mellitus. Diabetes Care, 34(1), 223-229. DOI: 10.2337/dc10-1368 Han, S., Middleton, P., & Crowther, C. (2012). Exercise for pregnant women for preventing gestational diabetes mellitus (Review). The Cochrane Collaboration, 2012(7): 1-50. DOI: 10.1002/14651858.CD009021.pub2. National health and Medical Research Council. (2009). NHMRC additional levels of evidence and grades for recommendations for developers of guidelines. NHMRC. Available from: https://www.nhmrc.gov.au/_files_nhmrc/file/guidelines/developers/nhmrc_levels_grades_evidence_120423.pdf Barakat, R., Cordero, Y., Coteron, J., luaces, M., & Montejo, R. (2012). Exercise during pregnancy improves maternal glucose screen at 24–28 weeks: a randomized controlled trial. British Journal of Sports Medicine, 46(9): 656-661. DOI: 10.1136/656 bjsports-2011-090009 Chamberlain, C., McLean, A., Oats, J., Oldenburg, B., Eades, S., Sinha, A., & Wolfs, R. 2015. Low Rates of Postpartum Glucose Screening Among Indigenous and non-Indigenous Women in Australia with Gestational Diabetes. Maternal Child and Health Journal, 19(3): 651-663. DOI: 10.1007/s10995-014-1555-3 <|fim▁end|> | other factors should be explored. |
<|fim▁begin|> Contents 1 BA Software Tools 1.1 Introduction 1.2 Business Process Management (BPM) and Diagramming Tools 1.3 Requirements Management Tools BA Software Tools Introduction This section contains information regarding various business analysis software tools, including business process and requirement management tools and their features that are being used in NYS agencies. This list is current as of June 2014. Business Process Management <|fim▁hole|> Software Website NYS Agency Using Tool Microsoft Visio www.microsoft.com ITS, DOH, WCB OpenText ProVision www.opentext.com WCB Oracle BPM www.oracle.com ITS Industry Print Example ITS JIRA www.atlassian.com ITS JAMA www.jamasoftware.com ITS Requirements Management Tools Tool Software Website NYS Agency Using Tool Microsoft (Access, Excel, Word) www.office.microsoft.com ITS, DOH IBM Rational Suite www-01.ibm.com/software/awdtools/reqpro/ ITS IBM ClearQuest/Clear Case www-03.ibm.com/software/products/en/clearquest/ ITS Microsoft SharePoint http://office.microsoft.com/en-us/sharepoint ITS <|fim▁end|> | (BPM) and Diagramming Tools Tool |
<|fim▁begin|> Return to Main Page Manga Study Guide: Barefoot Gen ← Use of cartoon violence Humour Facial features ( esp. eyes) → Humour Gag manga is a type of Japanese manga that portrays humor. Gag manga started from the Taisyou era to the Syouwa era. At that time, humor was essential to every manga and people called it the ponch picture. But in the 1960s a new type of manga called Gekiga was created that had no elements of humor. Because of this, manga was divided in groups and the Gag manga was born. For example one of the techniques used in gag manga is ‘chibikyara’: Chibikyara are mini version of a character. Chibikyara are usually a used in a comedy manga. Authors also create mangas that include only Chibikyara for a sub story. Tsukkomi is a technique to create humor in Japan. This technique usually has two <|fim▁hole|> and the Tsukkomi role (straight man). Usually Boke role says something funny or does something silly. In response, the Tsukkomi role points out the mistake that the Boke role did and starts rectify what the Boke role said or did. By pulling back the topic, it creates a tempo making it easier for the Boke role to say more jokes. In Japanese manga, sometimes the authors use words with similar meanings, spellings, sounds etc. A sentence such as “Friends for dinner” is a good example. It has two meanings, one is having dinner with your friends. The other definition would be eating friends for dinner. Like this manga also uses this technique to make the manga funny. It also helps the Tsukkomi technique to create a topic. Next Page: Facial features ( esp. eyes) | Previous Page: Use of cartoon violence Home: Manga Study Guide: Barefoot Gen <|fim▁end|> | roles, the Boke role (funny man) |
<|fim▁begin|> UTC vs TDB Versions of Celestia before v1.5.0 use UTC to calculate times and positions. Unfortunately, UTC includes "leap seconds" in order to stay aligned with the Earth's varying rotation. Leap seconds happen essentially randomly, when they are needed. Although Celestia does incorporate a table of leap second times, its use of UTC causes problems when used with ephemerides which are defined using TDB. Starting with v1.5.0, although it still displays UTC on the screen, Celestia uses the TDB time scale internally for everything else. As a result, Celestia places objects much more accurately than before. Time Scales It may be helpful for Celestia users to understand the various time scales that are used in the field of astronomy. The most familiar is local time, which is probably what you see if you look at a nearby clock. The local time zone determines the difference between local time and Coordinated Universal Time, or UTC. UTC is the current time at the zero degree meridian; it replaces Greenwich Mean Time as the standard world clock. Astronomical ephemerides are typically defined in terms of Barycentric Dynamical Time, or TDB. TDB is the time measured by a clock at the solar system barycenter. It differs from Terrestrial Time (TT)--the time <|fim▁hole|> the Earth--because of relativistic effects, but the difference between the two scales is always less than 0.002 seconds. The two scales can usually be considered equivalent in Celestia. TT is ahead of International Atomic Time (TAI) by constant value of 32.184 seconds. Finally, UTC differs from TAI by some integer number of leap seconds. Leap seconds are inserted occasionally because the Earth's rotation is irregular, and it's desirable to keep our everyday time scale from drifting with respect to the terrestrial day-night cycle--except at the poles, the sun should be in the sky at noon. The most recent leap second occurred at 23:59:60 on December 31, 2016 and made UTC 37 seconds behind TAI. (See Wikipedia on TAI) To briefly summarize the relationship between time scales: TT = TAI + 32.184 TAI = UTC + leap second count Thus, TT = UTC + 32.184 + leap second count UTC is used in the Celestia's Set Time dialog and it's also the time displayed in the upper right of the screen. Unless you're creating scripts or add-ons for Celestia, UTC is all that you will see. But everywhere else, the time scale is TDB: xyz trajectory files, attitude files, beginning, ending, and epoch times in .ssc files. <|fim▁end|> | measured by a clock on |
<|fim▁begin|> Hermit crabs that usually prefer shells with circular or oval openings are: Indonesian hermit crabs or "Indos" (Coenobita brevimanus) Caribbean hermit crab or "Purple Pinchers" (Coenobita clypeatus) Strawberry hermit crabs "Strawberries" (Coenobita perlatus) Rugosus hermit crabs or "Rugs" (Coenobita rugosus) As pets they tend to give preference to particular snail (class Gastropoda, phylum Mollusca) shells (bold if known to be within the Purple Pincher's normal range; Picture2 links may contain pictures of shells that have been misidentified; not all shells at the "common names" links may be appropriate for hermit crabs): Superorder Vetigastropoda - Order under revision turban shells (common names ; family Turbinidae - Family pictures ) - Examples: Silvermouth Turban (Turbo argyrostomus ) - Region: Indo-W.Pacific - ZipCodeZoo entry - Picture - Picture2 Filose Turban (Turbo cailletii ) - Region: Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Channeled Turban (Turbo canaliculatus ) - Region: Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Chestnut or Knobby Turban (Turbo castanea ) - Region: Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Goldmouth Turban (Turbo chrysostomus ) - Region: SE Africa-W.Pacific - ZipCodeZoo entry - Picture - Picture2 Smooth Moon Turban (Turbo cinereus ) - Regions: Indo-Australia area, China - ZipCodeZoo entry - Picture - Picture2 Fluctuating Turban, Pacific Turban or Mexican Turbo (Turbo fluctuosus ) - Region: Baja California,Mexico-Peru; Galápagos - ZipCodeZoo entry - Picture - Picture2 Green Turban (Turbo marmoratus ) - Regions: Indo-Australia area, Japan, Africa - ZipCodeZoo entry - Picture - Picture2 Tapestry Turban (Turbo petholatus ) - Regions: India, Philippines, South Africa - ZipCodeZoo entry - Picture - Picture2 South African Turban (Turbo sarmaticus ) - Region: South Africa - ZipCodeZoo entry - Picture - Picture2 Stenogyrus Turban (Turbo stenogyrum ) - Region: SW Pacific, Japan-Indonesia - ZipCodeZoo entry - Picture - Picture2 Wavy Turban or Common Warrener (Turbo undulata ) - Region: New Zealand - ZipCodeZoo entry - Picture - Picture2 West Indian Topshell shells (Cittarium pica - was Turbo pica ; family Trochidae - - Family Pictures ) - also called the Magpie, the West Indian Topsnail, or erroneously the West Indian Whelk. Over fishing of this snail (Bermuda) has been known to negatively effect the Purple Pincher population. - Region: C.Americas-Bahamas - ZipCodeZoo entry - Picture - Picture2 Superorder Caenogastropoda - Order Sorbeoconcha murex shells (common names; family Muricidae - Family pictures ) - Examples: Ramose Murex (Chicoreus ramosus ) - Region: Indo-W.Pacific; Red Sea - ZipCodeZoo entry - Picture - Picture2 Virgin Murex (Chicoreus virgineus ) - Region: Red Sea-Bay of Bengal - Picture - Picture2 Endive Murex (Hexaplex endivia ) - ZipCodeZoo entry - Picture - Picture2 Pink Mouthed Murex (Hexaplex/Phyllonotus erythrostomus ) - Region: Sea of Cortèz, Mexico-Peru - ZipCodeZoo entry - Picture - Picture2 Black Murex (Hexaplex nigritus ) - Region: Sea of Cortèz, Mexico - ZipCodeZoo entry - Picture - Picture2 Apple Murex (Phyllonotus pomum ) - ZipCodeZoo entry - - Picture - Picture2 "rock shell" shells (common names ; family Muricidae - Family pictures ) - Examples: Belligerent Rock Shell (Thais armigera ) - Region: SW Pacific-Japan; Réunion - ZipcodeZoo entry - Picture - Picture2 Chestnut Rock Shell (Thais bitubercularis ) - Region: E.Africa-Philippines & Australia - ZipcodeZoo entry - Picture - Picture2 Blanford's Rock Shell (Thais blanfordi ) - Region: Durban,RSA-Arabian Gulf - Picture - Picture2 Coronate Rock Shell (Thais coronata ) - Region: Mauritania-Angola; Colombia-NE Brazil - ZipcodeZoo entry - Picture - Picture2 Deltoid Rock Shell (Thais deltoidea ) - Region: Bermuda; Florida, USA; W.Indies; Brazil - ZipcodeZoo entry - Picture - Picture2 Kiosque Rock Shell (Thais kiosquiformis ) - Region: Baja California, Mexico-Peru - ZipcodeZoo entry - Picture - Picture2 Carinate Rock Shell (Thais lacera/mutabilis ) - Region: Durban Bay, RSA-Red Sea-SE Asia; E.Mediterranean - ZipcodeZoo entry - Picture - Picture2 Gourd Rock Shell (Thais melones ) - Region: Pacific Mexico- Peru; Galápagos - ZipcodeZoo entry - Picture - Picture2 White Rock Shell (Thais orbita ) - Region: N.New Zealand; S.-E.Australia <|fim▁hole|> Picture - Picture2 Orb Rock Shell (Thais orbita aegrota ) - Region: W.Australia - Picture - Picture2 Orb Rock Shell (Thais orbita textilosa ) - Region: Victoria; S.Australia - Picture - Picture2 Rugose Rock Shell (Thais sacellum ) - Region: Bermuda; Florida, USA; W.Indies; Brazil - Picture - Picture2 Tissot's Rock Shell (Thais tissoti ) - Region: KwaZuluNatal,RSA-Red Sea & E.Africa-Sri Lanka - Picture - Picture2 "tulip shell" shells (common names ; family Fasciolariidae - Family pictures ) - Examples: Yellow Tulip Shell (Fasciolaria bullisi ) - Region: Western Atlantic Ocean - ZipCodeZoo entry - Picture Mediterranean Tulip Shell (Fasciolaria lignaria ) - ZipCodeZoo entry - Picture - Picture2 Hunter's Tulip Shell (Fasciolaria lilium hunteria ) - Region: Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Banded Tulip Shell (Fasciolaria lilium tortugana ) - Region: the Americas - ZipCodeZoo entry - Picture - Picture2 True Tulip Shell (Fasciolaria tulipa ) - Regions: Americas, India, etc. - ZipCodeZoo entry - Picture - Picture2 Atlantic Striped Fox shells (Fasciolaria trapezium audouini ; family Fasciolariidae) - Regions: E Africa, Indo-W.Pacific - ZipCodeZoo entry - Picture - Picture2 periwinkle shells (common names ; family Littorinidae - Family Pictures ) - Examples: Slender Periwinkle (Echinolittorina/Nodilittorina angustior ) - Regions: N.America, Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Lineolate Periwinkle (Echinolittorina/Nodilittorina lineolata ) - Region: Florida,USA-Mexico-Uruguay - ZipCodeZoo entry - Picture - Picture2 White-Spotted Periwinkle (Echinolittorina/Nodilittorina meleagris ) - Regions: N.America, Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Dwarf Brown Periwinkle (Echinolittorina/Nodilittorina mespillum ) - Regions: N.America, Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Zebra Periwinkle (Echinolittorina/Nodilittorina ziczac ) - Regions: E.Pacific, N.America, Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Mangrove Periwinkle (Littoraria angulifera ) - Regions: North America, Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Marsh Periwinkle (Littoraria irrorata ) - Regions: North America, Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Cloudy Periwinkle (Littoraria nebulosa ) - Regions: North America, Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 Common Periwinkle (Littorina littorea ) - Regions: North America, Caribbean, Europe, India, etc. - ZipCodeZoo entry - Picture - Picture2 Checkered Periwinkle (Littorina scutulata ) - Regions: the Americas, Australia - ZipCodeZoo entry - Picture - Picture2 frog shells (common names ; family Bursidae - Family pictures ) - Examples: Spiny Frogsnail (Bufonaria echinata/Bursa Spinosa ) - Regions: Philippines; Indian Ocean; China - Picture - Picture2 Common Frogsnail (Bufonaria/Bursa rana ) - Regions: Japan-E. & W. Australia - Picture - Picture2 Granular Frogsnail (Bursa granularis cubaniana ) - Regions: SE Florida,USA-Colombia; Jamaica-NE.Brazil - ZipCodeZoo entry - Picture - Picture2 Elegant/Pacamon Frogsnail (Bursa grayana ) - Regions: Florida Keys; Cuba; Curaçao-NE.Brazil - ZipCodeZoo entry - Picture - Picture2 California Frogsnail (Crossata californica ) - Regions: C.California,USA-Sea of Cortèz, Mexico - ZipCodeZoo entry - Picture - Picture2 Red-ringed/Red-mouth Frogsnail (Tutufa bufo ) - Region: Indo-W.Pacific - ZipCodeZoo entry - Picture - Picture2 Ruddy/Red-mouthed Frogsnail (Tutufa rubeta ) - Region: Indo-W.Pacific - ZipCodeZoo entry - Picture - Picture2 nutmeg shells (common names ; family Cancellariidae - - Family pictures ) - Examples: Basket Nutmeg (Gerdiella crobicula ) - Region: E.Pacific - ZipCodeZoo Rugosa Nutmeg (Trigonostoma rugosum ) - Regions: Florida, E.Pacific, Western Atlantic - ZipCodeZoo entry - Picture - Picture2 King's Crown Conch shells (Melongena corona ; family Melongenidae - Family pictures ) - Region: Western Atlantic Ocean - ZipCodeZoo entry - Picture - Picture2 order Pulmonata - have lungs rather than gills Haitian Tree Snail shells [also called "Candy Striped" or "Rainbow" shells] (Liguus virgineus|Liguus virgineus ; family Orthalicidae) - Region: Cuba - ZipCodeZoo entry - Picture - Picture2 Japanese Land Snail shells [also called "Land Fairy" shells] (Euhadra peliomphala hickonis , family Bradybaenidae) - Region: Japan - ZipCodeZoo entry - Picture - Picture2 Giant African Snail or Ghana Tiger Snail shells (Achatina achatina ; family Achatinidae) - Regions: Asia, Pacific and Indian Oceans islands, West Indies - Picture - Picture2 <|fim▁end|> | - ZipcodeZoo entry - |
<|fim▁begin|> Contents 1 Resources 1.1 Textbooks 1.2 Journals 1.3 Websites Resources Edexcel recommend the following resources. Textbooks Attwood G, Dyer G and Skipworth G — Revise for Statistics: No. 1 (Heinemann Modular Mathematics for Edexcel AS & A Level Statistics) (Heinemann Educational Secondary Division, 2001) ISBN 0435511165 Attwood G, Dyer G and Skipworth G — Revise for Statistics: No. 2 (Heinemann Modular Mathematics for Edexcel AS & A Level Statistics) (Heinemann Educational Secondary Division, 2001) ISBN 0435511173 Attwood G, Dyer G and Skipworth <|fim▁hole|> Statistics: No. 3 (Heinemann Modular Mathematics for Edexcel AS & A Level Statistics) (Heinemann Educational Secondary Division, 2001) ISBN 0435511181 School Mathematics Project — Statistics 1 for Edexcel (SMP AS/A2 Mathematics for Edexcel) (Cambridge University Press, 2004) ISBN 0521605350 School Mathematics Project — Statistics 2 for Edexcel (SMP AS/A2 Mathematics for Edexcel) (Cambridge University Press, 2005) ISBN 0521605393 Journals Journal of Applied Statistics Statistical Methods in Medical Research ISSN 09622802 Statistical Modelling: An International Journal ISSN 1471082X Websites Blackwell Statistics Royal Statistical Society <|fim▁end|> | G — Revise for |
<|fim▁begin|> TradescantiaTradescantiaTradescantia Spiderworts Genus:Tradescantia Spiderworts (Tradescantia) are a genus of an estimated 71 species of perennial plants in the family Commelinaceae, native to the New World from southern Canada south to northern Argentina. Though sometimes accounted a weed, spiderwort is cultivated for borders and also used in containers. Where it appears as a volunteer, it is often welcomed and allowed to stay. The genus takes its name from John Tradescant the elder, a 17th-century English plant collector and nurseryman. The first species described, Virginia Spiderwort T. virginiana, is native to the eastern United States from Maine to Alabama, and Canada in southern Ontario. Virginia Spiderwort was introduced to Europe in 1629, where it is cultivated as a garden flower. The Western Spiderwort T. occidentalis is listed as an endangered species in Canada, where the northernmost populations of the species are found at a few sites in southern Saskatchewan, Manitoba and Alberta; it is however more common further south in the United States south to Texas and Arizona. The three species of Wandering Jew, one native to eastern Mexico, also belong to the tradescantia genus. Other names used for various species include Spider-lily, Cradle-lily, Oyster-plant and Flowering Inch Plant. Description They are weakly upright to scrambling plants, growing to 30-60 cm tall, and <|fim▁hole|> clumps in wooded areas and fields. The leaves are long, thin and bladelike to lanceolate, from 3-45 cm long. The flowers are white, pink or purple but most commonly bright blue, with three petals and six yellow anthers. The sap is mucilaginous and clear. A number of the species flower in the morning and when the sun shines on the flowers in the afternoon they close up, but the flowers can remain open on cloudy days until evening. Hoverfly at Tradescantia flower; note the blue stamen hairs Growing Conditions Varieties Uses The cells of the stamen hairs of some Tradescantia are colored blue, but when exposed to sources of ionizing radiation such as gamma rays, the cells mutate and change color to pink; they are one of the few tissues known to serve as an effective bioassay for ambient radiation levels. [1] Maintenance Propagation Harvest Pests and Diseases References ↑ http://www.journalarchive.jst.go.jp/english/jnlabstract_en.php?cdjournal=ggs1921&cdvol=47&noissue=6&startpage=411 Front view of leaves of Tradescantia pallida cv. "Purple Heart". Back view of leaves of Tradescantia pallida cv. "Purple Heart". Front view of leaves of Tradescantia zebrina cv. "Tricolor". Back view of leaves of Tradescantia zebrina cv. "Tricolor". Tradescantia ohiensis Ohio Spiderwort Wikimedia Commons has media related to: Tradescantia Wikiversity is collecting bloom time data for Tradescantia on the Bloom Clock <|fim▁end|> | are commonly found individually or in |
<|fim▁begin|> Method of Whole Body Vibration The Whole Body Vibration is the method which powerBIKE™ is equipped with. The original Whole Body Vibration Training (WBV) stands for the transfer of mechanical vibrations onto the body via a WBV platform. Currently the most common WBV platforms used are Power Plate® and Galileo. Initially WBV training was mainly used in the fitness industry, but has been expanding into the wellness sector, professional sports sector (e.g. Formula 1, Golf), physical therapy and rehabilitation (Kelderman, 2001) as either a supplement to the regular treatment and training or main equipment. The average WBV machine consists of a vibration platform (e.g. Power Plate® pro5™ 87 cm by 107 cm, Galileo Advance 65 cm by 61 cm) and mostly handlebars. The vibrations are generated by motors underneath the platform and then transmitted to the exerciser standing on or in front of the machine. During these vibrations the exerciser is either holding static poses or performing dynamic exercises, depending on the individual training goal: stretch, balance, core, strength, massage or full workouts. The intensity of the Whole Body Vibration platforms is defined by the frequency, amplitude, magnitude and direction and might vary between the common WBV brands. The effects of WBV have <|fim▁hole|> research has been going on since the 60s (see ‘History of WBV). Numerous studies show: positive effects on the neuromuscular system and blood circulation, increased muscle strength, positive influence on the mobility, muscular tension and passive structures, faster results when compared to conventional training methods (Link to study and Advertisement PP), massive reduction of pain caused by arthritis, increasing hip bone mineral density in road cyclists History of Whole Body Vibration In the 60s the first scientific effects have been shown by Prof. Dr. Biermann (Ex-DDR). In the 70s ongoing development was achieved by researchers and scientists in the Sowjet Union (Dr. Nasarov) and it was published that Russian cosmonauts, who used vibration training technology, had stayed for 420 days outer space; American cosmonauts, who didn’t use vibration training technology, only 120 days. 1999 on Guus van der Meer, trainer of various national sports teams in the Netherlands developed the Power Plate® Classic. From then on Power Plate®’s popularity has been increasing and it became known as a machine used in the fitness, beauty, wellness and anti-aging industry. Famous sports clubs are equipped with the Power Plate®, for example the German National Soccer Club, the Paralympic Skiteam Alpin and the German Ski National Club. <|fim▁end|> | been discussed and voluminous |
<|fim▁begin|> This page was imported and needs to be de-wikified.Books should use wikilinks rather sparsely, and only to reference technical or esoteric terms that are critical to understanding the content. Most if not all wikilinks should simply be removed. Please remove {{dewikify}} after the page is dewikified. An optode or optrode is an optical sensor device that optically measures a specific substance usually with the aid of a chemical transducer. Construction An optode requires three components to function: a chemical that responds to an analyte, a polymer to immobilise the chemical transducer and instrumentation (optical fibre, light source, detector and other electronics). Optodes usually have the polymer matrix coated onto the tip of an optical fibre, but in the case of evanescent wave optodes the polymer is coated on a section of fibre that has been unsheathed. Operation Optodes can apply various optical measurement schemes such as reflection, absorption, evanescent wave, luminescence (fluorescence and phosphorescences), chemiluminescence, surface plasmon resonance. By far the most popular methodology is luminescence. Luminescence in solution obeys the linear Stern-Volmer relationship. Fluorescence of a molecule is quenched by specific analytes, e.g. ruthenium complexes are quenched by <|fim▁hole|> immobilised within a polymer matrix a myriad of micro-environments are created. The micro-environments reflect varying diffusion co-efficients for the analyte. This leads to a non-linear relationship between the fluorescence and the quencher (analyte). This relationship is modelled in various ways, the most popular model is the two site model created by James Demas (University of Virginia). The signal (fluorescence) to oxygen ratio is not linear, and an optode is most sensitive at low oxygen concentration, i.e. the sensitivity decreases as oxygen concentration increases. The optode sensors can however work in the whole region 0–100% oxygen saturation in water, and the calibration is done the same way as with the Clark type sensor. No oxygen is consumed and hence the sensor is stirring insensitive, but the signal will stabilize more quickly if the sensor is stirred after being put into the sample. Popularity Optical sensors are growing in popularity due to the low-cost, low power requirements and long term stability. They provide viable alternatives to electrode-based sensors or more complicated analytical instrumentation. Major international conferences are devoted to their development e.g. Europtrode VIII Tübingen 2006, OFS 18, Cancun 2006. <|fim▁end|> | oxygen. When a fluorophore is |
<|fim▁begin|> Contents 1 Pauli Exclusion Principle 2 Aufbau Principle 2.1 1-Dimensional Wells 2.2 2-Dimensional Wells 2.3 Degeneracy and Hund's Rule 2.4 3-Dimensional Wells Pauli Exclusion Principle The Pauli Exclusion Principle states that no two fermions (particles with half-integer spin such as electrons, protons, neutrons) can have identical wavefunctions. This principle follows from the definition of the rotation operator in quantum mechanics, and the derivation is outside the scope of this book. More information can be found on the Wikipedia page. What this means for a quantum well (in any number of dimensions) is that for each quantum state, there can be only two electrons - one spin-down and one spin-up. Aufbau Principle The Aufbau Principle, from the German for "build up", states that electrons in a well tend to occupy the lowest available energy levels first, before occupying higher levels. Before a higher state is used, the lowest state will have both a spin-up and spin-down electron in it. 1-Dimensional Wells The digram below shows a 1D quantum well being filled by electrons. The electron are represented by a upwards arrow for spin-up and downward arrow for spin down. States with just one occupying electron are yellow and states with two are red. When a state has only one electron, it could be either spin-up or spin-down. However, according the Pauli Exclusion Principle, when there are two in a state, there must be one of each. 2-Dimensional Wells When we have a 2-dimensional well, we can plot all the possible states in a 2D array. This is called the state space. The digram below showns a quantum well containing 39 electrons (19 full states, and one half-full state): The energy of a given state is given by: E n x , n y {\displaystyle E_{n_{x},n_{y}}} = {\displaystyle =\,} ℏ 2 2 m [ ( n x π L ) 2 + ( n y π L ) 2 ] {\displaystyle {\frac {\hbar ^{2}}{2m}}\left[\left({\frac <|fim▁hole|> {\displaystyle =\,} ℏ 2 π 2 2 m L 2 ( n x 2 + n y 2 ) {\displaystyle {\frac {\hbar ^{2}\pi ^{2}}{2mL^{2}}}\left(n_{x}^{2}+n_{y}^{2}\right)} Notice that the distance from the origin to the state in state space is given by the Pythagorean Theorem: d = n x 2 + n y 2 {\displaystyle d={\sqrt {n_{x}^{2}+n_{y}^{2}}}} This means that the energy of a state is proportional to the square of the distance from origin in state space. By the Aufbau Principle, the states closest to the origin fill with electrons first. Degeneracy and Hund's Rule Now, consider the two wavefunctions ψ1,2 and ψ2,1 in a square 2D box. The wavefunctions are given by: ψ n x , n y = ψ 0 sin ( n x π x L ) sin ( n y π y L ) {\displaystyle \psi _{n_{x},n_{y}}=\psi _{0}\sin \left({\frac {n_{x}\pi x}{L}}\right)\sin \left({\frac {n_{y}\pi y}{L}}\right)} The wavefunctions, along with their associated energies, are shown below: z = ψ 1 , 2 {\displaystyle z=\psi _{1,2}\,} z = ψ 2 , 1 {\displaystyle z=\psi _{2,1}\,} E 1 , 2 = ℏ 2 2 m [ ( π L ) 2 + ( 2 π L ) 2 ] {\displaystyle E_{1,2}={\frac {\hbar ^{2}}{2m}}\left[\left({\frac {\pi }{L}}\right)^{2}+\left({\frac {2\pi }{L}}\right)^{2}\right]} E 2 , 1 = ℏ 2 2 m [ ( 2 π L ) 2 + ( π L ) 2 ] {\displaystyle E_{2,1}={\frac {\hbar ^{2}}{2m}}\left[\left({\frac {2\pi }{L}}\right)^{2}+\left({\frac {\pi }{L}}\right)^{2}\right]} We can easily see that the two energies are the same. Wavefunctions with the same energies are said to be degenerate. When the well is filling, neither one of these states will be prefered over the other for getting the first electron. However, once one state has one electron, a principle called Hund's Rule states that the other state will get the next electron before the first state receives its second. Thus, only one state is ever half-filled at one time. 3-Dimensional Wells <|fim▁end|> | {n_{x}\pi }{L}}\right)^{2}+\left({\frac {n_{y}\pi }{L}}\right)^{2}\right]} = |
<|fim▁begin|> Depending on the classification chosen, there are either three or five genders in Polish: masculine (męski): masculine personal (męski osobowy) masculine animate (męski nieosobowy żywotny) masculine inanimate (męski nieosobowy nieżywotny) feminine (żeński) neuter (nijaki) In plural męskoosobowy (masculine-personal) and niemęskoosobowy (non-masculine-personal) are used for masculine personal and the remaining ones respectively. Unlike German, and more like Italian, it is usually possible to find out gender by looking at the noun ending and the meaning of the noun. Nouns that end in -a are usually feminine. Exceptions include words that end in -ista which mean followers of some ideology (like komunista, communist) - they are person-masculine And words that end in -awca/-owca and describe professions (like sprzedawca, salesman; kierowca, driver) that are also person-masculine One particularly annoying word is "mężczyzna" which means adult male person - obviously person-masculine. Some other masculine words, like "tata" (dad), "poeta" (poet), "sędzia" (judge). Some words that end in a consonant are feminine, eg. gałąź (branch), jesień (autumn), łódź (boat or a Polish city), myśl (thought), noc (night), podróż (journey), pomoc (help), postać (figure), północ (north and midnight), rzecz (thing), sól (salt), twarz (face), and wieś (countryside). Their declension is quite similar to declension of feminine nouns that end in "-a". Nouns that end in -ść are usually feminine. They are often abstract nouns, like miłość (love, from adjective miły, nice, <|fim▁hole|> wysokość (height, from adjective wysoki, high) Nouns that end in -o, -e, -ę or -um are usually neuter. Examples: dziecko (child), zawiniątko (package), jedzenie (food), wyjście (departure, exit, solution), zwierzę (animal), muzeum (museum). NOTE: Some nouns that end in -e are plural and require plural verbs, eg. grabie (rake), Katowice, nożyce (scissors), skrzypce (violin), spodnie (pants), and szczypce (pliers). Most other nouns that end in a consonant are masculine, and their exact gender depends on their meaning. The most usual exceptions are nouns that are animate-masculine which aren't really animate, especially in the spoken language. Nouns that end in -i or -u in nominative singular are rare and are mostly of foreign origin. Native Polish words ending in -i are feminine, like gospodyni (hostess or farmer's wife) or pani (lady). NOTE: Some nouns that end in -i are plural and require plural verbs, eg. drzwi (door), Helsinki, nożyczki (scissors), and obcęgi (tongs). Now some examples: Gender Meaning Nominative Accusative Feminine Coffee Kawa Kawę Neuter Milk Mleko Mleko Person-masculine Adam (male name) Adam Adama Animate-masculine Cat Kot Kota Inanimate-masculine Computer Komputer Komputer "Adam pije kawę" - Adam drinks coffee "Kasia widzi Adama" - Kasia sees Adam "Kot pije mleko" - A cat drinks milk "Adam widzi kota" - Adam sees a cat "Adam ma komputer" - Adam has a computer < Polish pronunciation < ^ Polish ^ <|fim▁end|> | old Polish "loved") and |
<|fim▁begin|> This chapter introduces the cui2d framework, which is used (and explained in detail) in the following chapters. cui2d is a light-weight collection of JavaScript functions that supports the creation of user interfaces with the canvas 2D context. Thus, instead of starting from scratch in every chapter and introducing GUI elements one by one, a framework is presented that includes these GUI elements. There are a couple of advantages to this approach: You can get started and apply the GUI elements without having to work through the details of their implementation. All GUI elements that are discussed in this wikibook are available by including one script file (cui2d.js) and they (are supposed to) work together without problems. Automatically generated (by JSDoc3) reference documentation of cui2d is available online. It is easier to understand the implementation of individual GUI elements by seeing the big picture of how they work together. In fact, some of the aspects of the implementation just don't make sense without this big picture. Next, the framework is introduced with the help of an example. Contents 1 A “Hello, World!” Example 2 Discussion 3 Implementation of the Render Loop 4 Benefits of a Render Loop A “Hello, World!” Example The example of this chapter just shows a page with the text “Hello, World!” using cui2d. It is also available online and should work fine on desktop and mobile web browsers. The parts for downloading the web app to a mobile device are missing but a version that includes them is available online. (See the chapter on iOS web apps for a discussion of these parts.) <!DOCTYPE HTML> <html> <head> <meta http-equiv="Content-type" content="text/html;charset=UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no"> <script src="cui2d.js"></script> <script> function init() { // set defaults for all pages cuiBackgroundFillStyle = "#A06000"; cuiDefaultFont = "bold 40px Helvetica, sans-serif"; cuiDefaultFillStyle = "#402000"; // initialize cui2d and start with myPage cuiInit(myPage); } // create a new page of size 400x300 and attach myPageProcess var myPage = new cuiPage(400, 300, myPageProcess); // a function to repaint the canvas and return false (if null == event) // or to process user events (if null != event) and return true // if the event has been processed function myPageProcess(event) { if (null == event) { // repaint this page cuiContext.fillText("Hello, World!", 200, 150); cuiContext.fillStyle = "#E0FFE0"; // set page color cuiContext.fillRect(0, 0, this.width, this.height); } return false; // event has not been processed } </script> </head> <body bgcolor="#000000" onload="init()" style="-webkit-user-drag:none; -webkit-user-select:none; "> <font color="white">A canvas element cannot be displayed.</font> </body> </html> Discussion The first few lines just start the HTML file. The line <meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=no"> was included to avoid complications with scaling the content on mobile devices. In fact, the page in this example is not only scalable but can also be rotated and dragged around with two-finger gestures. (With a mouse, the page can only be dragged. Sorry.) However, all these transformations are controlled by the web app instead of the operating system. The line <script src="cui2d.js"></script> includes the file cui2d.js; thus, that file should be in the same directory as the HTML page such that the web browser can find it. The function init() is specified in the body tag at the end of the HTML page and will be called after the page has been loaded. ... <script> function init() { // set defaults for all pages cuiBackgroundFillStyle = "#A06000"; cuiDefaultFont = "bold 40px Helvetica, sans-serif"; cuiDefaultFillStyle = "#402000"; // initialize cui2d and start with myPage cuiInit(myPage); } ... init() first sets some default options, which are applied by the cui2d framework before any page is repainted. This makes it possible to change these options for all pages in a single place. After that, it uses the call cuiInit(myPage); to initialize the cui2d framework and start with displaying myPage which is defined next: ... // create a new page of size 400x300 and attach myPageProcess var myPage = new cuiPage(400, 300, myPageProcess); ... This defines a global variable myPage and creates a new cuiPage object of width 400 pixels and height 300 pixels. The coordinate system for this page has its origin (0,0) in the top, left corner, is 400 pixels wide and 300 pixels high. The content and the behavior of the page is defined by the function myPageProcess(), which is specified as third argument in the constructor of the cuiPage object and is defined next: ... // a function to repaint the canvas and return false (if null == event) // or to process user events (if null != event) and return true // if the event has been processed function myPageProcess(event) { if (null == event) { // repaint this page cuiContext.fillText("Hello, World!", 200, 150); cuiContext.fillStyle = "#E0FFE0"; // set page color cuiContext.fillRect(0, 0, this.width, this.height); } return false; // event has not been processed } </script> </head> ... Every GUI component in cui2d has a single “process” function, which repaints the GUI component (or the whole canvas in the case of a page) if the argument event is null. Otherwise (if event is not null), it tries to process the user event. Thus, each process function has two tasks. Even myPageProcess in this example performs both tasks; however, for user events it only returns false, which means that the user event has not been processed. In this example, these events allow the page to be dragged with a mouse or transformed in multiple ways with two-finger gestures. If you change the code to return true then it is assumed that the process function has “consumed” these events and, thus, the page cannot be transformed in any way (except by changing the orientation of a mobile device). In the case that no event has been specified, the function just writes some text at the center of the page, sets a new fill color and fills the whole page. Note that we render from front to back, which is the standard in cui2d. Also note that “this” refers to the cuiPage object; thus, this.width and this.height are just the width and height of myPage. Lastly, the HTML code defines the body tag with a message in case the canvas is not displayed for some reason; for example, if the web browser does not support the canvas element. ... <body bgcolor="#000000" onload="init()" style="-webkit-user-drag:none; -webkit-user-select:none; "> <font color="white">A canvas element cannot be displayed.</font> </body> </html> The function init() is specified as the handler of the onload event; thus, it is called when the page is loaded. The background color is set to black. This background color is sometimes visible when the window of a desktop browser is being resized and during the animation of an orientation change of a mobile device. The WebKit style attributes help to <|fim▁hole|> interaction with the HTML page. The code is rather long for a hello-world example. This is partly due to the fact that it supports multiple platforms, partly due to the definition of customized colors, and partly due to the structure of the cui2d framework, which requires a cuiPage object in order to display anything. The next section discusses how the cui2d framework actually works internally. Implementation of the Render Loop This section discusses how the cui2d framework renders dynamic graphics, i.e. interactively manipulated graphics and animations. This is particularly useful if you want to modify or extend the framework, or if you want to implement your own framework. The code in cui2d.js starts with many global variables. Most of them will only make sense once you see how they are used. They are included here just for completeness: /** * @file cui2d.js is a light-weight collection of JavaScript functions for creating * graphical user interfaces in an HTML5 canvas 2d context. * @version 0.30814 * @license public domain * @author Martin Kraus <martin@create.aau.dk> */ /** The canvas element. Set by cuiInit(). */ var cuiCanvas; /** The 2d context of the canvas element. Set by cuiInit(). */ var cuiContext; /** Boolean flag for requesting a repaint of the canvas. Cleared only by cuiProcess(). */ var cuiCanvasNeedsRepaint; /** * Currently displayed page. * @type {cuiPage} */ var cuiCurrentPage; /** Time (in milliseconds after January 1, 1970) when events are no longer ignored. */ var cuiIgnoringEventsEnd; /** Minimum time between frames in milliseconds. */ var cuiAnimationStep = 15; /** Time (in milliseconds after January 1, 1970) when the last animation should stop. */ var cuiAnimationsEnd; /** Boolean flag indicating whether any animation is playing. Set by cuiPlayTransition(). */ var cuiAnimationsArePlaying; /** * The animation for all transition effects. * @type {cuiAnimation} */ var cuiAnimationForTransitions; /** * The page for all transition effects. * @type {cuiPage} */ var cuiPageForTransitions; /** Background color. */ var cuiBackgroundFillStyle = "#000000"; /** Default font. */ var cuiDefaultFont = "bold 20px Helvetica, sans-serif"; /** Default horizontal text alignment. */ var cuiDefaultTextAlign = "center"; /** Default vertical text alignment. */ var cuiDefaultTextBaseline = "middle"; /** Default fill style (e.g. for text). */ var cuiDefaultFillStyle = "#000000"; ... These global variables are followed by the definition of the functions cuiInit(), cuiResize(), some more user event handlers (which are discussed in a later chapter), cuiRepaint(), and cuiProcess(). Before reading the code, you should understand how they work together. Consider the following diagram: cuiInit(startPage) → calls cuiRepaint() ↓ calls cuiRenderLoop() → calls itself in an infinite loop ↓ calls (if repainting requested with cuiRepaint()) cuiProcess(null) ↓ calls cuiCurrentPage.process(null) → calls process() for all elements on the page As illustrated, the call cuiInit(myPage) in the example starts a chain reaction that in the end calls cuiCurrentPage.process(null), i.e. myPage.process(null) in our example, which is nothing but myPageProcess(null), i.e. the process function that we have defined for our page. Furthermore, cuiRenderLoop() calls itself in an infinite loop such that it keeps calling myPageProcess(null) to repaint our page whenever necessary (for example, when the user has dragged the page). In technical terms, repainting is “necessary” whenever cuiRepaint() has been called since the last repaint. The diagram also includes cuiProcess(), which is responsible for the correct geometric transformation of the current page (and for the processing of events for which the process function of the page returns false). The definition of cuiInit() mainly adds a canvas element to the body of the HTML page, adds event listeners (which will be discussed later), and then initializes global variables for various parts of the cui2d framework. In the last two lines, it calls cuiRepaint() and cuiRenderLoop(). ... /** * Initializes cui2d. * @param {cuiPage} startPage - The page to display first. */ function cuiInit(startPage) { cuiCanvas = document.createElement("canvas"); cuiCanvas.style.position = "absolute"; cuiCanvas.style.top = 0; cuiCanvas.style.left = 0; document.body.appendChild(cuiCanvas); window.addEventListener("resize", cuiResize); document.body.addEventListener("click", cuiIgnoreEvent); document.body.addEventListener("mousedown", cuiMouse); document.body.addEventListener("mouseup", cuiMouse); document.body.addEventListener("mousemove", cuiMouse); document.body.addEventListener("touchstart", cuiTouch); document.body.addEventListener("touchmove", cuiTouch); document.body.addEventListener("touchcancel", cuiTouch); document.body.addEventListener("touchend", cuiTouch); // initialize globals cuiContext = cuiCanvas.getContext("2d"); cuiCurrentPage = startPage; cuiIgnoringEventsEnd = 0; cuiAnimationsEnd = 0; cuiAnimationsArePlaying = false; if (undefined == cuiAnimationStep || 0 >= cuiAnimationStep) { animationStep = 15; } // initialize transitions cuiAnimationForTransitions = new cuiAnimation(); cuiAnimationForTransitions.previousCanvas = null; cuiAnimationForTransitions.nextCanvas = null; cuiAnimationForTransitions.nextPage = ""; cuiAnimationForTransitions.isPreviousOverNext = false; cuiAnimationForTransitions.isFrontMaskAnimated = false; cuiPageForTransitions = new cuiPage(); cuiPageForTransitions.process = function(event) { if (null == event) { cuiDrawTransition(); } } cuiRepaint(); cuiRenderLoop(); } ... The only event handler that we mention here is cuiResize() because it is extremely simple: ... /** Resize handler. */ function cuiResize() { cuiRepaint(); } ... I.e., it just calls cuiRepaint(): ... /** Request to repaint the canvas (usually because some state change requires it). */ function cuiRepaint() { cuiCanvasNeedsRepaint = true; // is checked by cuiRenderLoop() and cleared by cuiProcess(null) } ... cuiRepaint() just sets the global variable cuiCanvasNeedsRepaint to true. This variable is checked by cuiRenderLoop(): ... /** Render loop of cui2d, which calls cuiProcess(null) if needed. */ function cuiRenderLoop() { var now = (new Date()).getTime(); if (cuiAnimationsEnd < now ) { // all animations over? if (cuiAnimationsArePlaying) { cuiRepaint(); // repaint one more time since the rendering might differ // after the animations have stopped } cuiAnimationsArePlaying = false; } else { cuiAnimationsArePlaying = true; } if (cuiCanvasNeedsRepaint || cuiAnimationsArePlaying) { cuiProcess(null); } window.setTimeout("cuiRenderLoop()", cuiAnimationStep); // call myself again // using setTimeout allows to easily change cuiAnimationStep dynamically } ... cuiRenderLoop() calls cuiProcess(null) to repaint the current page if cuiCanvasNeedsRepaint is true (and also if cuiAnimationsArePlaying is true but that is another story). In the last line, cuiRenderLoop() calls itself (after a time specified by cuiAnimationStep) by using the HTML5 function setTimeout. Since it always calls itself again, it continues in an endless loop until the web app is closed. The next function is cuiProcess(). However, this function makes heavy use of draggable objects, which will be discussed later. Thus, the discussion of cuiProcess has to wait until then. Benefits of a Render Loop A render loop might appear to be a complicated way to do such a simple thing as calling a render function (i.e. the process function with argument null in cui2d). However, there are good reasons for a render loop: The render function should not be called for every user event since there can be too many user events; for example, a new event for every movement of the mouse. In animations, the render function should be called regularly (e.g., 60 frames per second) without any event triggering the rendering. A render loop solves these problems by calling the render function as often as necessary but not more often. page traffic for 90 days < Canvas 2D Web Apps Unless stated otherwise, all example source code on this page is granted to the public domain. <|fim▁end|> | avoid any default user |
<|fim▁begin|> Lanham, Richard A. "The 'Q' Question." The Electronic Word / Democracy, Technology, and the Arts. Chicago, IL: U of Chicago P, 1993. "There is only one subject-matter for education, and that is Life in all its manifestations" (Whitehead, qtd in Lanham 172) Lanham's essay opens with a simple question, taken from book 12 of Quintilian's Institution oratoria: "is the perfect orator [...] a good man as well as a good orator?" (155). Lanham argues that this question--ultimately not only a curricular and pedagogical question, but also a metaphysical and moral one--underlies the entire history of Western thought. Put otherwise, Western thought can be traced back to different responses to this question, and we might categorize these responses as "philosophy" and "rhetoric." Lanham notes that there are two basic responses to the "Q" Question, which he labels as the strong and weak defense. Our contemporary institutions, dating back to at least Ramus and, really, all the way back to Plato are haunted by the weak defense. The strong defense, if it ever existed, Lanham locates in the Greek and Roman conceptions of rhetorical paideia, and advocates as the best response to the contemporary attacks on the Humanities. It is hard, I think, to digest all of Lanham's argument on a first reading, given its scope, complexity, and nuance. But it goes something like this: the weak defense argues that Truth exists outside of the play of language. Language is ornament and adornment for Truth. Thus, a proponent of the weak defense would argue that rhetoric is good when in service of the Truth, and bad when used by those without it. Thist is, of course, Plato 101 (the "Gorgias" dialogue) and Plato 102 (the "Phaedrus"): "Plato allows as 'good rhetoric' only the kind that enhances an argument we already know from a priori grounds, to be true" (160). Lanham locates the institutional dedication to the weak defense in Ramus; we will explore why Ramus endorses such a split. The short version has to do with a core element of "strong" rhetoric: its insistence upon (not) teaching moral character. Lanham notes that it is Ramus who turned "humanism" into the "humanities"--which turned a messy/organic dedication to "liberal education that is moral in its essence" to the humanities, a series of disciplines each dedicated to providing "a series of techniques that anyone could use to get ahead in any field" (164). Centuries later, the schism between disciplines is exponentially amplified by the Modern University. Lanham, Latour, and Cicero all oppose the carving up of thought into disciplines; Latour considers this the crime of modernity and strives for "Enlightenment without Modernity." We might ask ourselves if Lanham is searching for the same thing. Also note that Lanham argues that Ramus cuts up the curriculum to make it easier to teach; we might add, in the aftermath of NCLB, that it makes it easier to test, too. The strong defense, on the other hand, doesn't endorse an a priori sense of the Truth. Rather: "The Strong Defense assumes that truth is determined by social dramas, some more formal than others but all man-made. Rhetoric in such a world is not ornamental but determinative, essentially creative. Truth once created this way becomes referential, as in legal precedent" (156). He finds one of the strongest endorsements of the Strong defense in the work of Richard McKeon, highlighting McKeon's concept of "architectonic" rhetoric (166-167). This architectonic rhetoric would orient itself around "the needs of the present" (167). I will conclude by stressing how radical such an orientation might be. McKeon: In a technological age all men should have an art of creativity, of judgement, of disposition, and of organization. This should be adapted to their individual development and to their contribution to forming a common field in which the subject of inquiry is not how to devise means to achieve accepted ends arranged in hierarchies [the modern curriculum] but the calculations of uses and applications that might be made of the vastly increased available means in order to devise new ends and to eliminate oppositions and segregations based on past competitions for scarce means. (168) Weak Defense: plays within the non-world of the University (thought/action is located in disciplines) language can be thought of as free of value (157) (169) reduces rhetorical instruction to skills Truth exists outside of language and human action carves up knowledge into discreet disciplines (159) emphasizes objectivity (169) relies on an already existing Universal Human Subject (see the discussion of Bloom, 176) Lanham quoting McCloskey: "Rhetoric is merely a tool, no bad thing in itself. Or rather, it is the box of tools for persuasion taken together, available for persuaders good and bad" (169) Just the facts Plato, Ramus, Bloom & Hirsch Strong Defense: takes the play of the University to the world (thought/action is located in public dramas) (see 161, language is always, already embedded in (and reinforcing) systems of value Truth is produced, sustained, and revised via human dramas "In the rhetoric paideia, facts and opinions are always used for something, enlisted in argument of one kind or another. They are, as Dewey argued, always enmeshed in the rough-and-tumble argumentative purposes of life" (172). seeks to construct a rhetorically active subject equal parts agonism, exigence, and play Quintilian, Dewey, McKeon, Burke There are three paragraphs later in the text that clarify Lanham's goals for Humanism (as opposed to the Humanities) and explicate the Strong defense. Here goes: What rescues the humanities from this poisonous enclosure, when they are rescued, is some external circumstance, some problem, that puts this formal pleasure to work. [...] Could this mixture of motives (formal pleasure, practical purpose, competition) have been what animated and supported Quintilian's optimism? Might the good man, for him, have been the man whose motives were deeply mixed, and who knew how and why? I would argue that this mixture of play, game, and purpose was the characteristic product (if not always the avowed purpose) of the rhetorical, as against the philosophical, paideia. It did not try to purify our motives but to radically mix them. It created not a self-enclosed humanism but one connected at every juncture to what Whitehead called "the insistent present." It aimed, that is, to address what McKeon thought the characteristic problem that became a problem when Ramus "purified" thought of rhetoric, and thus of action as well. Humanism, construed in this rhetorical way, is above all an education in politics and management. Can it also be construed as an education in civic virtue? To answer this question, we must revert to what I have called the Strong Defense of rhetoric. The Strong Defense argues that, since truth comes to humankind in so many diverse and disagreeing forms, we cannot base a polity upon it. We must, <|fim▁hole|> we can agree on a series of contingent operating premises. [...] We stage a public drama, empanel an audience whom we call a jury, and offer contending versions of reality. [...]The magic moment of transmutation, what drives the system, is the need to reach a decision. [...] That decision is made by people, not handed down by God [or, I would add, logos], but the system does all it can to strengthen the decision by arriving at it in a certain way. [...] And these two motives, play and game, are driven and controlled by purpose, by the need to reach a decision" "Somewhat we must do." (187-188; 189- rhetoric as "a dedication to making things happen in the world" (189)) Thus, rhetorical Humanism, the paideia, is where practical purpose meets competition and formal play. It is thoroughly democratic: Perhaps now we can comprehend how Quintilian might have felt that a rhetorical education as he had traced it conduced to civic virtue. It trained people in the Strong Defense, in the skills needed to create and sustain a public, as against a private, reality. It did not simply train, it created, the public person. It is the perfect training for the pattern of government Plato hated the most, a genuine, open-ended democracy. (189) Lanham is very clear that rhetoric, when the center of education, aims at exploring questions of morality. Philosophy plays with knowledge (thought), rhetoric, I am tempted to say, plays with ethics (action). The modern University is built around knowledge--Kant's plan for the University explicitly left action out of the hands of faculty and students and in the hands of the "higher" administration. Thus, the University stands as Bloom's playground, sequestered from the real world. Lanham doesn't want to lose the possibility of play; but we could say that his main goal is to articulate an understanding of rhetoric that cripples this idea of a University predicated upon the divorce of thought and action, knowledge and politics. Of course, given our contemporary political climate, it is quite dangerous for University professors (and all teachers) to argue that their primary job is teaching values. Such a statement would seem reprehensible... children go to school to learn knowledge, not to learn morals. That's what television church and family are for. Secular humanism is for Lanham a metaphysical orientation to the world--he sees any kind of transcendental fundamentalism, whether religious, philosophical (Plato), or cultural (Bloom) as dangerous to sustaining democracy (see 176). Lanham finds this argument deployed by what I would label as "Kantian" faculty; Lanham paraphrases Taylor's response to Blunt's communist treachery: "In other words, humanist inquiry, indeed the whole life of the mind, has nothing to do with the moral life. Even to ask the question is infamous" (180). ). One thing that Lanham stresses is that the Humanities should not fall back into the traditional arguments that assume a weak "Yes" to the Q Question. As the example of Sir Anthony Blunt points out, there is no assurance that a humanities education will produce a "good" person. This is because "good" and "bad" are not essentials, but are valences of the social drama. It is enough to say that the Humanities teach students how to, when to, and where to invest themselves in our common, human struggles. So, yes, part of Humanities education concerns "providing tools," but that is not the entirety of such education. "At the heart of the 'Q' Question stands the need to demonstrate a connection between specific reading and writing practices and the moral life" (173). Lanham asserts that literary study has never managed to make this connection. We have talked much this semester about the closing of the Gorgias dialogue and Socrates's martyrdom at the close of the Apology. Put simply, Socrates doesn't do politics. Lanham: Socrates is the secular messiah; we [those of Bloom's ilk, the old Great Books guard of the Humanities] are apostles studying the book that chronicles his deeds, sayings, and martyrdom; and we do so in a monastery that shuts out a fundamentally corrupt and irredeemable world. (178) We cannot afford this playful indulgence any longer--for that "irredeemable world," that "sludge," now flows into our home. We cannot cleanse ourselves of it, however much we might desire a pure knowledge/home. Once again, rhetoric stands as embracing, without necessarily celebrating, the whirl. But the whirl isn't a "formalist pleasure," rather a rhetorical Humanism would direct its energy to those points in which the whirl inspires and necessitates the construction of homes. Read Lanham's favorable review of Hooks' life: The truth he served was contingent rather than absolute, secular rather than religious [in the Platonic/Bloomian sense], and texts were admitted to his canon only after screening by a tough street-kid's experienced crap-detector. He devoted his life to political and social activism, and in his conception the university served society as much as society served it. Both Bloom and Hook were horrified at the campus disruptions of the sixties, but Bloom's response is the jeremiad in his book; Hook, characteristically, founded a national organization and pursued the issues it raised until the day he died. (185) It should be recognized that Lanham's "strong" defense is not a ringing endorsement for the contemporary Humanities, even if it is a powerful call to renew secular Humanism. It is very hard to justify much of the teaching of contemporary literature from Lanham's perspective (not, I do not say all). Lanham is not offering us solace--rather, this is a call to arms: the public and agonistic orientation of his version of Humanities education would have to begin by blowing up the very structure of the contemporary University (departments, disciplines, majors). Instead, learning might be organized around particular (temporal) problems. In place of fragmented Humanities, each teaching how to play with a particular piece of the human condition, we might return to a program of Humanism, which explores the question of how to live a good life. Some random observations: Lanham's note on Graff: "he [Graff] suggests that, since we cannot resolve this debate [between the Arnoldian "humanists" and the Derridean "theorists"; but, moreover, the Q Question itself], we dramatize it instead—make the students privy to our private debates through team-teaching and other pedagogical techniques. a LOL moment: "to consult one's own teaching experience, in which student enthusiasm for the categorical imperative may in fact know bounds" (176). Note that Hook's discussion of American universities leads him to reconsider the role of moral courage. Latour's re-reading of Plato's Gorgias centers around how Callicles advocates for a form of courage antithetical to Plato's "good" (Phaedrus) rhetoric. To have courage, we might say, is to have a willingness to consult the multitude. Return the fear of the test (rote memorization and regurgitation for its Ramus-like simplicity) (see 186) <|fim▁end|> | instead, devise some system by which |
<|fim▁begin|> Synthetic peptides are peptides of defined sequence that are most often produced through solid-phase peptide synthesis. Solid-phase peptide synthesis allows for the formation of synthetic peptides that would not exist naturally because of their unnatural amino acids. Though peptide synthesis serves various purposes such as verifying the correct determination of naturally occurring peptides, identification of protein isolation, and stimulating the formation of specific antibodies, peptide synthesis is becoming increasingly important because of their ability to produce synthetic peptides with potential in vaccine development and drug design. Synthetic peptides show promise in research for drug design because peptide synthesis allows for the generation of libraries of peptides that show diverse biological properties. These biological properties <|fim▁hole|> lead to cell-penetrating peptides that can introduce various substances into cells and act as drug delivery systems. Furthermore, these synthetic peptides can act as synthetic analogs to vital hormones that could be missing in a person. Vasopressin is a hormone peptide that stimulates the reabsorption of water in the distal tubules of the kidney. This allows for the formation of more concentrated urine excretion. Patients who are deficient in vasopressin, such as those with diabetes insipidus, excrete large volumes of dilute urine and are continuously thirsty. Peptide synthesis has offered a solution to vasopressin deficiency through the development of its synthetic analog, 1-desamino-8-D-arginine vasopressin. This synthetic peptide treats the defect caused by the missing hormone. <|fim▁end|> | have the potential to |
<|fim▁begin|> Sodium dodecyl sulphate polyacrylamide gel electrophoresis (SDS-PAGE)is a method of gel elctrophoresis to separate proteins based on the their mass.Sodium dodecyl sulfate (SDS) is a detergent that breaks up the interactions between proteins. The proteins are dissolved in SDS and then electrophorised. The smallest molecules move through the gel fast, while larger molecules take longer and result in bands closer to the top of the gel. Contents 1 Procedure 2 Gel 3 Electrophoresis 4 Staining and analysis 5 References Procedure The samples are treated with SDS (sodium dodecyl sulfate), an anionic detergent which denatures the protein by breaking the disulfide bonds and gives negative charge to each protein in proportion to its mass. Without SDS, different proteins with similar molecular weights would migrate differently due to differences in folding, as differences in folding patterns would cause some proteins to better fit through the gel matrix than others. SDS linearizes the proteins so that they may be separated strictly by molecular weight. The SDS binds to the protein in a ratio of approximately 1.4 g SDS per 1.0 g protein [[1]], giving an approximately uniform mass:charge ratio for most proteins, so that the distance of migration through the gel can be assumed to be directly related to only the size of the protein.Proteins may be further treated with reducing agent, such as dithiothreitol (DTT) or TRP(Tributyl phosphine) to break any reformed disulfide bonds and then alkalated with iodoacetamide to prevent reformation of disulfide bonds. A tracking dye like bromophenol blue may be added to the protein solution to track the progress of the protein solution through the gel during the electrophoretic run. Picture of an SDS-PAGE. The molecular marker is in the left lane Two SDS-PAGE-gels after a completed run Gel The gel used for SDS-PAGE <|fim▁hole|> form cross-linked polymers of polyacrylamide. Standard gels are typically composed of two layers, one top-most layer called the stacking gel and a lower layer called separating or resolving gel.The stacking layer contains a low percentage of acrylamide and has low pH , while the acrylamide concentration of the separating gel varies according to the samples to be run and has higher pH.The difference in pH and acrylamide concentration at the stacking and separating gel provides better resolution and sharper bands in the separating gel. Electrophoresis The proteins denatured by SDS are applied to one end of a layer of polyacrylamide gel submerged in a buffer.Buffer provide uniform pH and ions for conducting electric potential. When an electric current is applied across the gel,the negatively-charged proteins migrate across the gel to the positive pole. Short proteins will more easily fit through the pores in the gel and move fast, while larger ones will have more difficulty.Due to differential migration based on their size, smaller proteins move farther down the gel, while larger ones stay closer to the point of origin.After a given period of time,proteins might have separated roughly according to their sizes.Proteins of known molecular weight (marker proteins)can be run in a separate lane in the gel to calibrate the gel. Staining and analysis Following electrophoresis, the gel may be stained with Coomassie Brilliant Blue or silver stain to visualize the separated proteins.After staining, different proteins will appear as distinct bands within the gel accroding to their sizes(and therefore by molecular weights). The molecular weight of a protein in the band can be estimated by comparing it with the marker proteins of known molecular weights.The separatesd protens can be cut from the gel and further analyzed by other proteomics techniques. References http://lifesciences.asu.edu/resources/mamajis/sds-page/sds-page.html http://en.wikipedia.org/wiki/SDS-PAGE http://www.ruf.rice.edu/~bioslabs/studies/sds-page/gellab2.html http://mullinslab.ucsf.edu/protocols/html/SDS_PAGE_protocol.htm <|fim▁end|> | is made out of acrylamide which |
<|fim▁begin|> Ba Zi | Heavenly Stems | Earthly Branches | Hsia Calendar (Xia Calendar) | Hour Pillar | Luck Pillar | Life Cycle | Hidden Stems | Seasonal Cycle | Symbolic Stars | Aspects Of Life | Date Selection | List Of Ba Zi Contents 1 Abbreviations 2 0R 3 1R 4 2R 5 3R 6 4R 7 5R 8 6R 9 7R 10 8R 11 9R 12 10R Abbreviations "HS" refers to Heavenly Stems, "EB" refers to Earthly Branches, and "Hid" refers to Hidden Stems. 0R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 0] in direction R (reverse). Age: 70 to 74 60 to 64 50 to 54 40 to 44 30 to 34 20 to 24 10 to 14 0 to 4 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 75 to 79 65 to 69 55 to 59 45 to 49 35 to 39 25 to 29 15 to 19 5 to 9 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 1R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 1] in direction R (reverse). Age: 71 to 75 61 to 65 51 to 55 41 to 45 31 to 35 21 to 25 11 to 15 1 to 5 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 76 to 80 66 to 70 56 to 60 46 to 50 36 to 40 26 to 30 16 to 20 6 to 10 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 2R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 2] in direction R (reverse). Age: 72 to 76 62 to 66 52 to 56 42 to 46 32 to 36 22 to 26 12 to 16 2 to 6 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 77 to 81 67 to 71 57 to 61 47 to 51 37 to 41 27 to 31 17 to 21 7 to 11 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 3R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 3] in direction R (reverse). Age: 73 to 77 63 to 67 53 to 57 43 to 47 33 to 37 23 to 27 13 to 17 3 to 7 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 78 to 82 68 to 72 58 to 62 48 to 52 38 to 42 28 to 32 18 to 22 8 to 12 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 4R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 4] in direction R (reverse). Age: 74 to 78 64 to 68 54 to 58 44 to 48 34 to 38 24 to 28 14 to 18 4 to 8 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 79 to 83 69 to 73 59 to 63 49 to 53 39 to 43 29 to 33 19 to 23 9 to 13 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 5R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 5] in direction R (reverse). Age: 75 <|fim▁hole|> 69 55 to 59 45 to 49 35 to 39 25 to 29 15 to 19 5 to 9 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 80 to 84 70 to 74 60 to 64 50 to 54 40 to 44 30 to 34 20 to 24 10 to 14 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 6R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 6] in direction R (reverse). Age: 76 to 80 66 to 70 56 to 60 46 to 50 36 to 40 26 to 30 16 to 20 6 to 10 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 81 to 85 71 to 75 61 to 65 51 to 55 41 to 45 31 to 35 21 to 25 11 to 15 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 7R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 7] in direction R (reverse). Age: 77 to 81 67 to 71 57 to 61 47 to 51 37 to 41 27 to 31 17 to 21 7 to 11 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 82 to 86 72 to 76 62 to 66 52 to 56 42 to 46 32 to 36 22 to 26 12 to 16 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 8R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 8] in direction R (reverse). Age: 78 to 82 68 to 72 58 to 62 48 to 52 38 to 42 28 to 32 18 to 22 8 to 12 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 83 to 87 73 to 77 63 to 67 53 to 57 43 to 47 33 to 37 23 to 27 13 to 17 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 9R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 9] in direction R (reverse). Age: 79 to 83 69 to 73 59 to 63 49 to 53 39 to 43 29 to 33 19 to 23 9 to 13 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 84 to 88 74 to 78 64 to 68 54 to 58 44 to 48 34 to 38 24 to 28 14 to 18 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 10R Luck Pillars for H8 - E1 (Heavenly Stem - Earthly Branch) starting from [Age 10] in direction R (reverse). Age: 80 to 84 70 to 74 60 to 64 50 to 54 40 to 44 30 to 34 20 to 24 10 to 14 HS: H1 H2 H3 H4 H5 H6 H7 H8 Age: 85 to 89 75 to 79 65 to 69 55 to 59 45 to 49 35 to 39 25 to 29 15 to 19 EB: E6 E7 E8 E9 E10 E11 E12 E1 Hid: H7, H3, H5 H4, H6 H4, H6, H2 H5, H7, H9 H8 H4, H5, H8 H9, H1 H10 Luck Pillars | Ba Zi | Age0 | Age1 | Age2 | Age3 | Age4 | Age5 | Age6 | Age7 | Age8 | Age9 | Age10 <|fim▁end|> | to 79 65 to |
<|fim▁begin|> Contents 1 Summary 1.1 Rules for magistrates 1.2 Abhorrent practices 1.3 Court of referral 1.4 Rules for kings 1.5 Rules for Levites 1.6 Rules for prophets 1.7 Cities of refuge 1.8 Landmarks 1.9 Rules for witnesses 1.10 Rules for war 1.11 The found corpse 2 Questions 3 Notes Summary As told in Deuteronomy 16:18–21:9, this is the story of the Torah reading Shoftim: "They shall show you the sentence of judgment." (Deuteronomy 17:9) (illustration circa 1890–1910 by Paul Hardy) Rules for magistrates Moses directed the Israelites to appoint magistrates and officials for their tribes to govern the people with justice, with impartiality, and without bribes. "Justice, justice shall you pursue," he said. Abhorrent practices Moses warned the Israelites against setting up a sacred post beside God's altar or erecting a stone pillar. Moses warned the Israelites against sacrificing an ox or sheep with any serious defect. If the Israelites found a person who worshiped other gods — the sun, the moon, or any celestial body — then they were to make a thorough inquiry, and if they established the fact on the testimony of two or more witnesses, then they were to stone the person to death, with the witnesses throwing the first stones. Court of referral If a case proved too baffling for the Israelites to decide, then they were promptly to go to God's shrine, appear before the priests or the magistrate in charge and present their problem, and carry out any verdict that was announced there without deviating either to the right or to the left. They were to execute any man who presumptuously disregarded the priest or the magistrate, so that all the people would hear, be afraid, and not act presumptuously again. King David (statue by F.A. Jerichau) Rules for kings If, after the Israelites had settled the land, they decided to set a king over them, they were to be free to do so, taking an Israelite chosen by God. The king was not to keep many horses, marry many wives, or amass excess silver and gold. The king was to write in his own hand a copy of this Teaching to remain with him and read all his life, so that he might learn to revere God and faithfully observe these laws. He would thus not act haughtily toward his people nor deviate from the law, and as a consequence, he and his descendants would enjoy a long reign. Rules for Levites The Levites were to have no territorial portion, but were to live only off of offerings, for God was to be their portion. In exchange for their service to God, the priests were to receive the shoulder, cheeks, and stomach of sacrifices, the first fruits of the Israelites' grain, wine, and oil, and the first shearing of sheep. Levites were to be free to come from their settlements to the place that God chose as a shrine to serve with their fellow Levites, and there they were to receive equal shares of the dues. Rules for prophets The Israelites were not to imitate the abhorrent practices of the nations that they were displacing, consign their children to fire, or act as an augur, soothsayer, diviner, sorcerer, one who casts spells, one who consults ghosts or familiar spirits, or one who inquires of the dead, for it was because of those abhorrent acts that God was dispossessing the residents of the land. God would raise a prophet from among them like Moses, and the Israelites were to heed him. When at Horeb (Mount Sinai) the Israelites asked God not to hear God's voice directly, God created the role of the prophet to speak God's words, promising to hold to account anybody who failed to heed the prophet's words. But any prophet who presumed to speak an oracle in God's name that God had not commanded, or who spoke in the name of other gods, was to die. This was how the people were to determine whether God spoke the oracle: If the prophet spoke in the name of God and the oracle did not come true, then God had not spoken that oracle, the prophet had uttered it presumptuously, and the people were not to fear him. The City of Refuge (illustration from the 1897 Bible Pictures and What They Teach Us by Charles Foster) Cities of refuge When the Israelites had settled in the land, they were to divide the land into three parts and set aside three cities of refuge, so that any manslayer could have a place to which to flee. And if the Israelites faithfully observed all the law and God enlarged the territory, then they were to add three more towns to those three. Only a manslayer who had killed another unwittingly, without being the other's enemy, might flee there and live. For instance, if a man went with his neighbor into a grove to cut wood, and as he swung an ax, the ax-head flew off the handle and struck and killed the neighbor, then the man could flee to one of the cities of refuge and live. If, however, one who was the enemy of another lay in wait, struck the other a fatal blow, and then fled to a city of refuge, the elders of the slayer's town were to have the slayer turned over to the blood-avenger to be put to death. Landmarks The Israelites were not to move their countrymen's landmarks, set up by previous generations, in the property that they were allotted in the land. Rules for witnesses An Israelite could be found guilty of an offense only on the testimony of two or more witnesses. If one person gave false testimony against another, then the two parties were to appear before God and the priests or magistrates, the magistrates were to make a thorough investigation, and if the magistrates found the person to have testified falsely, then they were to do to the witness as the witness schemed to do to the other. Rules for war Before the Israelites joined battle, the priest was to tell the troops not to fear, for God would accompany them. Then the officials were to ask the troop whether anyone had built a new house but not dedicated it, planted a vineyard but never harvested it, paid the bride-price for a wife but not yet married her, or become afraid and disheartened, and all these they were to send back to their homes. When <|fim▁hole|> attack a town, they were to offer it terms of peace, and if the town surrendered, then all the people of the town were to serve the Israelites as forced labor. But if the town did not surrender, then the Israelites were to lay siege to the town, and when God granted victory, kill all its men and take as booty the women, children, livestock, and everything else in the town. Those were the rules for towns that lay very far from Israel, but for the towns of the nations in the land — the Hittites, Amorites, Canaanites, Perizzites, Hivites, and Jebusites — the Israelites were to kill everyone, lest they lead the Israelites into doing all the abhorrent things that those nations had done for their gods. When the Israelites besieged a city for a long time, they could eat the fruit of the city's trees, but they were not to cut down any trees that could yield food. The found corpse If, in the land, someone slain was found lying in the open, and the slayer could not be determined, then the elders and magistrates were to measure the distances from the corpse to the nearby towns. The elders of the nearest town were to take a heifer that had never worked down to an ever-flowing wadi and break its neck. The priests were to come forward, all the elders were to wash their hands over the heifer, and the elders were to declare that their hands did not shed the blood nor their eyes see it done. The elders were to ask God to absolve the Israelites, and not let guilt for the blood of the innocent remain among them, and God would absolve them of bloodguilt. Questions Here are a few of the questions that the Rabbis raised about this Torah reading: Why does the discussion of appointment of judges follow the discussion of the Three Pilgrimage Festivals?[1] Why is the discussion of appointment of judges placed near the discussion of idolatrous practices?[2] Who appointed the judges?[3] What is entailed in the admonition “Justice, justice shall you pursue”?[4] How important is the correct appointment of judges?[5] Why does the Torah say that God hates stone pillars, if the Patriarchs set some of them up?[6] What is meant by the requirement for “two witnesses, or three witnesses”?[7] Why does the Torah instruct “you shall come . . . to the judge who shall be in those days”? How could a person go to a judge who was not in that person’s days?[8] How authoritative is the law handed down by the Sages?[9] What was the law of the rebellious elder?[10] Did God command Israel to have a king or merely acknowledge that Israel would inevitably want one?[11] What role does God play in the section of earthly leaders?[12] What were the appropriate powers of the king?[13] How many were too many wives for the king?[14] How much wealth was too much for the king?[15] What purpose was served by the limitations on the king?[16] What is symbolized by the parts of the offerings that the priests receive?[17] What are diviners, soothsayers, enchanters, and sorcerers?[18] Since astrologers and diviners also purport to foretell the future, how do they differ from prophets?[19] What does Deuteronomy 18:13 mean when it directs us to be “whole-hearted with the Lord”?[20] What qualities do prophets have?[21] What distinguishes a false prophet?[22] What happened to prophecy?[23] What is the connection between false prophecy and cities of refuge?[24] What were the laws of the cities of refuge?[25] What is meant by the command not to move a neighbor’s landmark?[26] What were the Torah’s laws of perjury?[27] What did the Torah mean by “eye for eye”?[28] If all who were “fearful and fainthearted” were going to be excused from the war anyway, then why does the Torah go through all the exceptions for those who built a house, planted a vineyard, or became engaged?[29] What were the laws of the found corpse and the calf whose neck was to be broken (eglah arufah)?[30] Notes ↑ Deuteronomy Rabbah 5:3; Ibn Ezra; Munk. ↑ Babylonian Talmud Sanhedrin 7b; Avodah Zarah 52a. ↑ 1 Sam. 8:1–3; 2 Chron. 19:5–11; Mishnah Sanhedrin 4:4; Milgrom; Tigay. ↑ Babylonian Talmud Sanhedrin 32b; Mishnah Peah 8:9. ↑ Sifre to Deuteronomy 144:6. ↑ Rashi; Tigay. ↑ Mishnah Makkot 1:7–8; Babylonian Talmud Makkot 5b–6b. ↑ Babylonian Talmud Rosh Hashanah 25b. ↑ Babylonian Talmud Berakot 19b. ↑ Mishnah Sanhedrin 11:2; Babylonian Talmud Sanhedrin 86b. ↑ 1 Samuel 8; Babylonian Talmud Sanhedrin 20b; Deuteronomy Rabbah 5:8–9; Nachmanides; Maimonides; Abarbanel; Munk. ↑ Babylonian Talmud Bava Batra 91b. ↑ Mishnah Sanhedrin 2:4; Babylonian Talmud Sanhedrin 20b. ↑ Babylonian Talmud Sanhedrin 21a. ↑ Mishnah Sanhedrin 2:4; Babylonian Talmud Sanhedrin 21b. ↑ Meir Schweiger. 5769 — Shoftim — “The Monarchy.” At http://podcasts.pardesusa.org/?p=235. ↑ Babylonian Talmud Chullin 134b. Maimonides. Guide for the Perplexed 3:39. ↑ Sifre to Deuteronomy 171. Land of Israel, circa 250–350 CE. Reprinted in, e.g., Sifre to Deuteronomy: An Analytical Translation. Translated by Jacob Neusner, vol. 2, at 47–48. Atlanta: Scholars Press, 1987. ISBN 1-55540-145-7. ↑ Moses Maimonides. Hilchot Yesodei Hatorah: The Laws, Which Are the Foundations of the Torah, 10:3. Reprinted in, e.g., Eliyahu Touger. Mishneh Torah. New York: Moznaim Publishing, 1989. ISBN 0940118416. Elie Munk. The Call of the Torah: An Anthology of Interpretation and Commentary on the Five Books of Moses: Devarim. Translated by E.S. Mazer, 192. Brooklyn: Mesorah Publications, 1995. ISBN 0-89906-048-4 Invalid ISBN. ↑ Rashi; Leibowitz. ↑ Babylonian Talmud Nedarim 38a. ↑ Mishnah Sanhedrin 11:5. Reprinted in, e.g., The Mishnah: A New Translation. Translated by Jacob Neusner, at 608–09. Babylonian Talmud Sanhedrin 89a. Reprinted in, e.g., Talmud Bavli. Elucidated by Asher Dicker, Joseph Elias, and Dovid Katz; edited by Yisroel Simcha Schorr and Chaim Malinowitz, vol. 48, at 89a2–3. ↑ Babylonian Talmud Yoma 9b, Sotah 48b. ↑ Elie Munk. The Call of the Torah: An Anthology of Interpretation and Commentary on the Five Books of Moses: Devarim, 192. ↑ Mishnah Makkot 2:1–8;Tosefta Makkot 2:1–3:10; Babylonian Talmud Makkot 7a–13a. ↑ Babylonian Talmud Shabbat 85a; Sifre 188; Mishnah Peah 5:6. ↑ Mishnah Makkot 1:1–9; Tosefta Makkot 1:1–11; Babylonian Talmud Makkot 2a–7a. ↑ Babylonian Talmud Bava Kamma 84a. ↑ Mishnah Sotah 8:5. Reprinted in, e.g., The Mishnah: A New Translation. Translated by Jacob Neusner, 461. Babylonian Talmud Sotah 44a. Reprinted in, e.g., Talmud Bavli. Edited by Yisroel Simcha Schorr and Chaim Malinowitz, vol. 33b, at 44a5–6. ↑ Mishnah Sotah 9:1–9; Tosefta Sotah 9:1–2; Babylonian Talmud Sotah 44b–47b. <|fim▁end|> | the Israelites approached to |
<|fim▁begin|> Editing Wikitext Contents 1 Heading levels 1.1 Summary of Headings 1.2 Hiding Headings 1.3 Numbered Headings 1.4 Drop Capitals 2 The Table of Contents 3 CSS Heading Styles 4 References Formal heading styles are used in nearly all WikiBooks pages and for that matter, for all of the sister projects' pages as well. They clearly show a degree of organization in the work, and they are absolutely essential if the user intends to take advantage of the automatically generated table of contents, (TOC). The following notes explain how to make wiki headings, and introduces the table of contents. Notes are provided on moving the TOC around, and constraining its behavior. For those who intend to put the TOC into a table cell at the top of a page, refer to Images in Containers, and Templates Ready to Use. Heading levels There are six levels of heading styles and all of them are made by surrounding the heading text with an appropriate number of equals signs. The HTML heading styles are equivalent and so optionally, the heading text can be surrounded by the HTML tags instead. As an example; to make a level two heading, the largest practical heading, write either of the following at the left margin: ==Heading Text== or; <h2>Heading Text</h2> To make smaller headings just increase the number of equals signs, or use larger numbers in the HTML tags. It was stated above that there are six levels but the first level is usually reserved for the page heading, and making a table of contents with more that three levels can be messy. As a result it is most common to stick to levels two, three and four, or to use the HTML equivalent, h2, h3 and h4. By insuring that smaller headings come below larger headings in the text, the TOC will indent the sub-levels accordingly, and automatically insert the required links. At times a heading is needed for text in a table. Wikitext heading codes can have an adverse effect on tables and templates. When this happens, changing to the HTML versions of the heading will often solve the problem. The level two heading style inserts a line across the page whether it is needed or not, but to add a similar line with the other headings, just type four hyphens at the left margin as follows: ---- Summary of Headings The following table contains a summary of the headings that can be made. Summary of Wikitext and HTML Heading Codes Wikitext Result HTML Description =Text= Text <h1>Text</h1> h1 is mostly for page headings ==Text== Text <h2>Text</h2> h2 heads a section ===Text=== Text <h3>Text</h3> h3 heads a subsection of h2 ====Text==== Text <h4>Text</h4> h4 heads a subsection of h3 =====Text===== Text <h5>Text</h5> h5 is rarely used ======Text====== Text <h6>Text</h6> h6 is rarely used Hiding Headings As was mentioned above, the headings are used to make the table of contents, (TOC). Sometimes, when the TOC is looking a bit full, or when a heading does not seem to warrant listing, it would be useful to have the benefits of the heading's formats, but to miss it out on the TOC. A set of templates has been made to do this. They are the six templates Hiddenh1 through Hiddenh6. The way to use say, a level three heading style without a TOC listing is just: {{hiddenh3|Hidden Heading Here}} Just choose a different template for other heading sizes. As an alternative, set the limit parameter on the table of contents to display only major headings. Numbered Headings Numbered headings are made only by typing them yourself, and the nested heading sizes are made in usual way. The conventional numbering method is to assign a separate number sequence to each level of heading. Although an automatic method purports to exist in the user's preferences, it affects only the local view and will not be seen by others. A fairly standard approach for numbered headings is seen below, but the indentation that is preferred for numbered sub-sections cannot be obtained with a simple use of tags or wiki code. Templates could be made to indent the sub-sections properly, setting left margins for the paragraphs accordingly, and for those who might attempt it, the existing CSS styles for headings have been provided below. 1 Some Flowering Plants 1.1 Monocots 1.1.1 Orchids 1.1.2 Onions 2 Trees <|fim▁hole|> are used for work where heading styles are intrusive, though the rules for their use are by no means clear. T here is no drop capital code in Wikitext at this time, but a template exists. The drop capital at the start of this paragraph was added using the Drop template. Users who need a different drop capital can find the basic coding on the template's editing window. The code used to call this template into use was just: {{Drop|T}}here is no drop capital... Notice that only the first character of the paragraph was included within the double curly brackets, and that the remainder of the text was dressed tightly to the left. The Table of Contents The table of contents habitually resides at the top-left of the page. In fact, it will position itself at the left margin and just above the first heading that is made. The TOC lists all of the headings and makes links to their positions in the page. Selecting a link causes the page to shift so that the selected heading is at the top of the screen. A table of contents will not be generated unless at least four headings are made. The width and length of the TOC adjusts as more heading text is added. The width adjusts to the longest heading and the box extends downward as more headings are added. At some point the text is wrapped rather than continuously widening the box. The default behavior of the TOC is not always appropriate, so methods exist to customize it. It is possible to remove the TOC by typing: __NOTOC__ anywhere on the page.[1] (Note that there are two underscores on each side). The usual Wiki page includes a table of contents, but it is unclear how strict the convention is. Note the section above on Hiding Headings to avoid individual headings being added to the TOC, or the note on the limit parameter below To move the TOC to a place that it would not normally appear, for example, in a table cell at say the top of the page, just type the following code in the cell as if it were text: __TOC__ Such a method can be used to position the TOC with some accuracy, as well as running text or images level with it in the top section. The table of contents can only appear once; if __TOC__ is used multiple times, the first use takes priority.[1] The template Tocright can be used to place a table of contents at the right side of the WikiBooks page. The TOC will appear adjacent to the position on the page that the template is called. To call the template type {{tocright}}. Other suitable templates for repositioning the table of contents include {{TOC}}, and {{TOC left}}. All three of these templates have a limit parameter, which allows lower-level headings to be omitted. The colors of the TOC are fixed, set by the toc class and element ID. CSS Heading Styles At times, for example for templates, users need to know the details of certain wiki styles. These can be found in the wikibooks style sheets. An example of these styles for the main wiki headings can be found in the drop-box below. Heading style extract CSS Heading Styles from main.css h1, h2, h3, h4, h5, h6 { color: black; background: none; font-weight: normal; margin: 0; padding-top: .5em; padding-bottom: .17em; border-bottom: 1px solid #aaa; } h1 { font-size: 188%; } h1 .editsection { font-size: 53%; } h2 { font-size: 150%; } h2 .editsection { font-size: 67%; } h3, h4, h5, h6 { border-bottom: none; font-weight: bold; } h3 { font-size: 132%; } h3 .editsection { font-size: 76%; font-weight: normal; } h4 { font-size: 116%; } h4 .editsection { font-size: 86%; font-weight: normal; } h5 { font-size: 100%; } h5 .editsection { font-weight: normal; } h6 { font-size: 80%; } h6 .editsection { font-size: 125%; font-weight: normal; } References ↑ a b MediaWiki reference: mw:Help:Magic_words#Behavior_switches v • d • e Pages in Editing WikitextEditing Wikitext Emphasis and Links · Indents and Lists · Headings · Preformatted Text · The Quick Image Course · Tiled Images · Images in Containers · Tables · Tables Ready to Use · Making Templates A101 · Templates Ready to Use · Class and Style Notes · Indexing Your Work <|fim▁end|> | etc. Drop Capitals Drop capitals |
<|fim▁begin|> See also Note: Pinyin#Pinyin tone marking Contents 1 人之初 性本善 性相近 习相远 2 苟不教 性乃迁 教之道 贵以专 3 昔孟母 择邻处 子不学 断机杼 4 窦燕山 有义方 教五子 名俱扬 5 养不教 父之过 教不严 师之惰 6 子不学 非所宜 幼不学 老何为 7 玉不琢 不成器 人不学 不知义 8 为人子 方少时 亲师友 习礼仪 9 香九龄 能温席 孝於亲 所当执 10 融四岁 能让梨 弟於长 宜先知 11 首孝弟 次见闻 知某数 识某文 12 一而十 十而百 百而千 千而万 13 三才者 天地人 三光者 日月星 14 三纲者 君臣义 父子亲 夫妇顺 15 曰春夏 曰秋冬 此四时 运不穷 16 曰南北 曰西东 此四方 应乎中 17 曰火水 木金土 此五行 本乎数 人之初 性本善 性相近 习相远 Men at their birth, are naturally good. Their natures are much the same; their habits become widely different. rénmen shēng xiàlái de shíhòu dōu shì hǎo de, zhǐshì yóuyú chéngzhǎng guòchéng zhōng, hòutiān de xuéxí huánjìng bù yīyàng, xìngqíng yě jiù yǒule hǎo yǔ huài de chābié. 苟不教 性乃迁 教之道 贵以专 If there is no teaching, the nature will become worse. The right way in teaching, is to attach the utmost importance in thoroughness. rúguǒ cóngxiǎo bù hǎohǎo jiàoyù, shànliáng de běnxìng jiù huì biàn huài. wèile shǐ rén bù biàn huài, zuì zhòngyào de fāngfǎ jiùshì yào zhuānxīn yīzhì de qù jiàoyù háizi. 昔孟母 择邻处 子不学 断机杼 Of old, the mother of Mencius chose a neighborhood and when her child would not learn, she broke the shuttle from the loom. Zhànguó shí, Mèngzǐ de mǔqīn céng 3 cì bānjiā, shì wèile shǐ Mèngzǐ yǒu gè hǎo de xuéxí huánjìng. yī cì Mèngzǐ táoxué, Mèngmǔ jiù gēduàn zhījī de bù lái jiàozǐ. 窦燕山 有义方 教五子 名俱扬 Mr Dou of Yanshan had the right method. He taught 5 sons, each of whom raised the family reputation. Wǔdài shí, Yānshān rén Dòu Yǔjūn jiàoyù érzi hěn yǒu fāngfǎ, tā jiàoyù de 5 gè érzi dōu hěn yǒu chéngjiù, tóngshí kējǔ chéngmíng. 养不教 父之过 教不严 师之惰 To feed without teaching, is the father's fault. To teach without severity, is the teacher's laziness. jǐnjǐn shì gongyaang érnǚ chī-chuān, ér bù hǎohǎo jiàoyù, shì fùqīn de guòcuò. zhǐshì jiàoyù, dàn bù yángé yāoqiú jiùshì zuò lǎoshī de lǎnduò le. 子不学 非所宜 幼不学 老何为 If the child does not learn, this is not as it should be. If he does not learn while young, what will he be when old ? xiǎoháizi bù kěn hǎohǎo xuéxí, shì hěn bù yīnggāi de. yī gè rén tǎngruò xiǎoshíhòu bù hǎohǎo xuéxí, dào lǎo de shíhòu jì bùdǒng zuòrén de dàolǐ, yòu wú zhīshí, néng yǒu shénme yòng ne? 玉不琢 不成器 人不学 不知义 If jade is not polished, it cannot become a thing of use. If a man does not learn, he cannot know his duty towards his neighbor. yù bù dǎmó diāokè, bù huì chéngwéi jīngměi de qìwù; rén ruòshì bù xuéxí, jiù bù dǒngdé lǐyí, bù néng chéngcái. 为人子 方少时 亲师友 习礼仪 He who is the son of a man, when he is young, should attach himself to his teachers and friends; and practise ceremonial usages. zuò érnǚ de, cóng xiǎoshíhòu jiù yào qīnjìn lǎoshī hé péngyǒu, yǐbiàn cóng tāmen nàlǐ xuéxí dào xǔduō wéirén-chǔshì de lǐjié hé zhīshí. 香九龄 能温席 <|fim▁hole|> years of age, could warm his parent's bed. To love parents, is that to which we should hold fast. Dōnghàn rén Huáng Xiāng, 9 suì shí jiù zhīdào xiàojìng fùqīn, tì fùqīn nuǎn bèiwō. zhè shì měi gè xiàoshùn fùmǔ de rén dōu yīnggāi shíxíng hé xiàofǎng de. 融四岁 能让梨 弟於长 宜先知 Rong, at 4 years of age, could yield the (bigger) pears. To behave as a younger brother towards elders, is one of the first things to know. Hàndài rén Kǒng Róng 4 suì shí, jiù zhīdào bǎ dà de lí ràng gěi gēgē chī, zhè zhǒng zūnjìng hé yǒu'ài xiōngzhǎng de dàolǐ, shì měi gè rén cóngxiǎo jiù yīnggāi zhīdào de. 首孝弟 次见闻 知某数 识某文 Begin with loving parents and the love between brothers and sisters, and then see and hear. Learn to count, and learn to read. yī gè rén shǒuxiān yào xué de shì xiàojìng fùmǔ hé xiōngdì jiěmèi yǒu'ài de dàolǐ, jiēxiàlái shì xuéxí kàn dào hé tīng dào de zhīshí. bìngqiě yào zhīdào jīběn de suànshù hé gāoshēn de shùxué, yǐjí rènshí wénzì, yuèdú wénxué. 一而十 十而百 百而千 千而万 Units and tens, then tens and hundreds, hundreds and thousands, thousands and then tens of thousands. wǒguó cǎiyòng shíjìnwèi suànshù fāngfǎ: 1 dào 10 shì jīběn de shùzì, ránhòu 10 gè 10 shì 100, 10 gè 100 shì 1,000, 10 gè 1,000 shì 10,000……yīzhí biànhuà xiàqù. 三才者 天地人 三光者 日月星 The Three Forces, are heaven, earth and man. The Three Luminaries, are the Sun, the Moon and the stars. hái yīnggāi zhīdào yīxiē rìcháng shēnghuó chángshí, rú shénme jiào “Sāncái”? Sāncái zhǐ de shì tiān, dì, rén 3 gè fāngmiàn. shénme jiào “Sānguāng" ne? Sānguāng jiùshì Tàiyáng, Yuèliàng, xīngxīng. 三纲者 君臣义 父子亲 夫妇顺 The Three Bonds, are the obligation between soverign and subject, the love between father and child, the harmony between husband and wife. shénme shì “Sāngāng” ne? Sāngāng shì rén yǔ rén zhījiān guānxì yīnggāi zūnshǒu de 3 gè xíngwéi zhǔnzé, jiùshì jūnwáng yǔ chénzǐ de yánxíng yào héhū yìlǐ, fùmǔ zǐnǚ zhījiān xiāngqīn-xiāng'ài, fūqī zhījiān héshùn xiāngchǔ. 曰春夏 曰秋冬 此四时 运不穷 We speak of spring and summer, we speak of autumn and winter, These 4 seasons, revolve without ceasing. zài ràng wǒmen kàn yī kàn sìzhōu huánjìng, chūn, xià, qiū, dōng jiàozuò sìjì. zhè 4 gè jìjié bùduàn biànhuà, chūn qù xià lái, qiū qù dōng lái, rúcǐ xúnhuán wǎngfù, yǒngbù tíngzhǐ. 曰南北 曰西东 此四方 应乎中 We speak of North and South, we speak of East and West, These four directions, respond to the requirements of the center. shuō dào Dōng, Nán, Xī, Běi, zhè jiàozuò “sìfāng”, shì zhǐ gège fāngxiàng de wèizhì. zhè 4 gè fāngwèi, bìxū yǒu gè zhōngyāng wèizhì duìyìng, cái néng bǎ gège fāngwèi dìng chūlái. 曰火水 木金土 此五行 本乎数 We speak of Water, Fire, Wood, Metal and Earth. These Five Elements, have their origin in number. zhìyú shuō dào “Wǔxíng”, nà jiùshì Jīn, Mù, Shuǐ, Huǒ, Tǔ. zhè shì Zhōngguó gǔdài yònglái zhǐ Yǔzhòu gèzhǒng shìwù de chōuxiàng gàiniàn, shì gēnjù 1, 2, 3, 4, 5 zhè 5 gè shùzì hé zǔhé biànhuà ér chǎnshēng de. <|fim▁end|> | 孝於亲 所当执 Xiang, at 9 |
<|fim▁begin|> Contents 1 Learning Objectives 2 Triangles and Their Interior Angles 3 Similar Triangles 4 Applications of Similar Triangles 5 Lesson Summary 6 Points to Consider 7 Review Questions 8 Review Answers 9 Vocabulary The word trigonometry derives from two Greek words meaning triangle and measure. As you will learn throughout this chapter, trigonometry involves the measurement of angles, both in triangles, and in rotation (e.g, like the hands of a clock.) Given the important of angles in the study of trigonometry, in this lesson we will review some important aspects of triangles and their angles. We’ll begin by categorizing different kinds of triangles. Learning Objectives Categorize triangles by their sides and angles. Determine the measures of angles in triangles using the triangle angle sum. Determine whether or not triangles are similar. Solve problems using similar triangles. Triangles and Their Interior Angles Formally, a triangle is defined as a 3−sided polygon. This means that a triangle has 3 sides, all of which are (straight) line segments. We can categorize triangles either by their sides, or by their angles. The table below summarizes the different types of triangles. Table 1.6: Types of triangles Name Description Note Equilateral/equi-angular A triangle with three equal sides and three congruent angles. This type of triangle is acute Isosceles A triangle with two equal sides and two equal angles. An equilateral triangle is also isosceles. Scalene A triangle with no pairs of equal sides. Right A triangle with one 90° angle. It is not possible for a triangle to have more than one 90° angle (see below). Acute A triangle in which all three angles measure less than 90°. Obtuse A triangle in which one angle is greater than 90°. It is not possible for a triangle to have more than one obtuse angle (see below). In the following example, we will categorize specific triangles. Example 1 Determine which category best describes the triangle: a. A triangle with side lengths 3, 7, and 8. b. A triangle with side lengths 5, 5, and 5. c. A triangle with side lengths 3, 4, and 5. Solution: a. This is a scalene triangle. b. This is an equilateral, or equiangular triangle. It is also acute. c. This is a scalene triangle, but it is also a right triangle. While there are different types of triangles, all triangles have one thing in common: the sum of the interior angles in a triangle is always 180°. You can see why this true if you remember that a straight line forms a "straight angle", which measures 180°. Now consider the diagram below, which shows the triangle ABC, and a line drawn through vertex B, parallel to side AC. Below the figure is a proof of the triangle angle sum. If we consider sides AB and CB as transversals between the parallel lines, then we can see that angle A and angle 1 are alternate interior angles. Similarly, angle C and angle 2 are alternate interior angles. Therefore angle A and angle 1 are congruent, and angle C and angle 2 are congruent. Now note that angles 1, 2, and B form a straight line. Therefore the sum of the three angles is 180°. We can complete the proof using substitution: m ∠ 1 + m ∠ B + m ∠ 2 = 180 {\displaystyle m\angle 1+m\angle B+m\angle 2=180} m ∠ A + m ∠ B + m ∠ C = 180 {\displaystyle m\angle A+m\angle B+m\angle C=180} We can use this result to determine the measure of the angles of a triangle. In particular, if we know the measures of two angles, we can always find the third. Example 3 Find the measures of the missing angles. a. A triangle has two angles that measures 30° and 50°. b. A right triangle has an angle that measures 30°. c. An isosceles triangle has an angle that measures 50°. Solution: a. 100° 180 - 30 - 50 = 100 b. 60° The triangle is a right triangle, which means that one angle measures 90°. So we have: 180 − 90 − 30 = 60 c. 50° and 80°, or 65° and 65° There are two possibilities. First, if a second angle measures 50°, then the third angle measures 80° as 180 − 50 − 50 = 80. In the second case, the 50° angle is not one of the congruent angles. In this case, the sum of the other two angles is 180 − 50 = 130. Therefore the two angles each measure 65°. Notice that information about the angles of a triangle does not tell us the lengths of the sides. For example, two triangles could have the same three angles, but the triangles are not congruent. That is, the corresponding sides and the corresponding angles do not have the same measures. However, these two triangles will be similar. Next we define similarity and discuss the criteria for triangles to be similar. Similar Triangles Consider the situation in which two triangles have three pairs of congruent angles. These triangles are similar. This means that the corresponding angles are congruent, and the corresponding sides are proportional. In the triangles shown above, we have the following: Three pairs of congruent angles: ∠ A ≅ ∠ D , ∠ B ≅ ∠ E and ∠ C ≅ ∠ F {\displaystyle \angle A\cong \angle D,\angle B\cong \angle E{\text{and }}\angle C\cong \angle F} The ratios of sides within one triangle are equal to the ratios of sides within the second triangle: A B ¯ B C ¯ = D E ¯ E F ¯ , A B ¯ A C ¯ = D E ¯ D F ¯ , and A C ¯ B C ¯ = D F ¯ E F ¯ {\displaystyle {\tfrac {\overline {AB}}{\overline {BC}}}={\tfrac {\overline {DE}}{\overline {EF}}},{\tfrac {\overline {AB}}{\overline {AC}}}={\tfrac {\overline {DE}}{\overline {DF}}},{\text{and }}{\tfrac {\overline {AC}}{\overline {BC}}}={\tfrac {\overline {DF}}{\overline {EF}}}} The ratios of corresponding sides are equal: A B ¯ D E ¯ = B C ¯ E F ¯ , A B ¯ D E ¯ = A C ¯ D F ¯ , and B C ¯ E F ¯ = A C ¯ D F ¯ {\displaystyle {\tfrac {\overline {AB}}{\overline {DE}}}={\tfrac {\overline {BC}}{\overline {EF}}},{\tfrac {\overline {AB}}{\overline {DE}}}={\tfrac {\overline {AC}}{\overline {DF}}},{\text{and }}{\tfrac {\overline {BC}}{\overline {EF}}}={\tfrac {\overline {AC}}{\overline {DF}}}} Example 4 In the triangles shown above, A B ¯ = 8 , B C ¯ = 7 , A C ¯ = 5 , and D E ¯ = 4 {\displaystyle {\overline {AB}}=8,{\overline {BC}}=7,{\overline {AC}}=5,{\text{and }}{\overline {DE}}=4} . What are the lengths of sides DF and EF? Solution: Given that A B ¯ D E ¯ = B C ¯ E F ¯ {\displaystyle {\tfrac {\overline {AB}}{\overline {DE}}}={\tfrac {\overline {BC}}{\overline {EF}}}} , we have 8 4 = 7 E F ⇒ 2 = 7 E F ⇒ 2 E F = 7 ⇒ E F = 7 2 = 3.5 {\displaystyle {\tfrac {8}{4}}={\tfrac {7}{EF}}\Rightarrow 2={\tfrac {7}{EF}}\Rightarrow 2EF=7\Rightarrow EF={\tfrac {7}{2}}=3.5} . Similarly, as A B ¯ D E ¯ = A C ¯ D F ¯ {\displaystyle {\tfrac {\overline {AB}}{\overline <|fim▁hole|> , we have 8 4 = 5 E F ⇒ 2 = 5 E F ⇒ 2 E F = 5 ⇒ E F = 5 2 = 2.5 {\displaystyle {\tfrac {8}{4}}={\tfrac {5}{EF}}\Rightarrow 2={\tfrac {5}{EF}}\Rightarrow 2EF=5\Rightarrow EF={\tfrac {5}{2}}=2.5} . Recall that these triangles are considered to be similar because they have three pairs of congruent angles. This is just one of three ways to determine that two triangles are similar. The table below summarizes criteria for determining if two triangles are similar. Table 1.7: Criteria for similar triangles Criteria Description Example AAA Two triangles are similar if they have have three pairs of congruent angles SSS Two triangles are similar if all three pairs of corresponding sides are in the same proportion SAS Two triangles are similar if two pair of corresponding sides are in the same proportion, and the included angles are congruent. A special case of SSS is "HL", or "hypotenuse leg". This is the case of two right triangles being similar. This case is examined in example 5 below. Example 5 Determine if the triangles are similar. Solution: The triangles are similar. Recall that for every right triangle, we can use the Pythagorean Theorem to find the length of a missing side. In ABC we have: (AC)2 + 82 = 102 (AC)2 + 64 = 100 (AC)2 = 36 AC = 6 Similarly, in triangle DEF we have: (DF)2 + 42 = 52 (DF)2 + 16 = 25 (DF)2 = 9 DF = 3 Therefore the sides of the triangles are proportional, with a ratio of 2:1. Because we will always be able to use the Pythagorean Theorem in this way, two right triangles will be similar if the hypotenuse and one leg of one triangle are in proportion with the hypotenuse and one leg of the second triangle. This is the HL criteria. Applications of Similar Triangles Similar triangles can be used to solve problems in which lengths or distances are proportional. The following example will show you how to solve such problems. Example 6 Use similar triangles to solve the problem: A tree casts a shadow that is 24 feet long. A person who is 5 feet tall is standing in front of the tree, and his shadow is 8 feet long. Approximately how tall is the tree? Solution: The picture shows us similar right triangles: the person and his shadow are the legs of one triangle, and the tree and its shadow form the legs of the larger triangle. The triangles are similar because of their angles: they both have a right angle, and they share one angle. Therefore the third angles are also congruent, and the triangles are similar. The ratio of the triangles' lengths is 3:1. If we let h represent the height of the tree, we have: h 24 = 5 8 ⇒ h = 24 ( 5 8 ) = 15 f t . {\displaystyle {\frac {h}{24}}={\frac {5}{8}}\Rightarrow h=24\left({\frac {5}{8}}\right)=15ft.} Lesson Summary In this lesson we have reviewed key aspects of triangles, including the names of different types of triangles, the triangle angle sum, and criteria for similar triangles. In the last example, we used similar triangles to solve a problem involving an unknown height. In general, triangles are useful for solving such problems, but notice that we did not use the angles of the triangles to solve this problem. This technique will be the focus of problems you will solve later in the chapter. Points to Consider Why is it impossible for a triangle to have more than one right angle? Why is it impossible for a triangle to have more than one obtuse angle? How big can the measure of an angle get? Review Questions Triangle ABC is an isosceles triangle. If side AB is 5 inches long, and side BC is 7 inches long, how long is side AC? Can a right triangle be an obtuse triangle? Explain. A triangle has one angle that measures 48° and a second angle that measures 28°. What is the measure of the third angle in the triangle? Claim: the two non-right angles in any right triangle are complements. (a) Explain why this claim is true. (b) Use this claim to find the measure of the third angle in the triangle below. In triangle DOG, the measure of angle O is twice the measure of angle D, and the measure of angle G is three times the measure of angle D. What are the measures of the three angles? Triangles ABC and DEF shown below are similar. What is the length of D F ¯ {\displaystyle {\overline {DF}}} ? In triangles ABC and DEF above, if angle A measures 30°, what is the measure of angle E? Determine if the triangles are similar: (a) (b) A building casts a 100−foot shadow, while a 20 foot flagpole next to the building casts a 24 foot shadow. How tall is the building? Explain in your own words what it means for triangles to be similar. Review Answers Either 5 inches or 7 inches. A right triangle cannot be an obtuse triangle. If a triangle is right triangle, one angle measures 90 degrees. If a triangle is obtuse, one angle measures greater than 90. Therefore the sum of the two angles would be greater than 180 degrees, which is not possible. 104° (a) The angle sum in the triangle is 180. If you subtract the 90−degree angle, you have 180 − 90 = 90 degrees, which is the sum of the remaining angles. (b) 90 − 23 = 67° m ∠ D = 36 ∘ {\displaystyle m\angle D=36^{\circ }} m ∠ O = 72 ∘ {\displaystyle m\angle O=72^{\circ }} m ∠ G = 108 ∘ {\displaystyle m\angle G=108^{\circ }} 7.5 130° (a) No (b) Yes, by SSS or HL 83 1 3 {\displaystyle {\tfrac {1}{3}}} ft Answers will vary. Responses should include (1) three pairs of congruent angles and (2) sides in proportion, or some other notion of "scaling up" or "scaling down". Vocabulary acute angle An acute angle has a measure of less than 90 degrees. congruent Two angles are congruent if they have the same measure. Two segments are congruent if they have the same lengths. acute triangle A triangle with all acute angles. isosceles triangle A triangle with two congruent sides, and, consequentially, two congruent angles. equilateral triangle A triangle with all sides congruent, and, consequently, all angles congruent. scalene triangle A triangle with no pairs of sides congruent. leg One of the two shorter sides of a right triangle. hypotenuse The longest side of a right triangle, opposite the right angle. obtuse angle An angle that measures more than 90 degrees. parallel lines Lines that never intersect. right angle An angle that measures 90 degrees. transversal A line that intersects parallel lines. ← Basic Functions · Measuring Rotation →← Basic Functions · High School Trigonometry · Measuring Rotation → This material was adapted from the original CK-12 book that can be found here. This work is licensed under the Creative Commons Attribution-Share Alike 3.0 United States License <|fim▁end|> | {DE}}}={\tfrac {\overline {AC}}{\overline {DF}}}} |
<|fim▁begin|> Gurmukhi Muharni Vocabulary Conversation Grammar Row 1 • Vowels • Diacritics • Row 2 • Row 3 • Row 4 • Row 5 • Row 6 • Row 7 • Row 8 • Conjuncts • Practice Practice writing ਯ by following its animation or click below to practice writing a different letter. ੳ ਅ ੲ ਸ ਹ ਕ ਖ ਗ ਘ ਙ ਚ ਛ ਜ ਝ ਞ ਟ ਠ ਡ ਢ ਣ ਤ ਥ ਦ ਧ ਨ ਪ ਫ ਬ ਭ ਮ ਯ ਰ ਲ ਵ ੜ v • d • e PunjabiGurmukhi Row 1 • Vowels • Diacritics • Row 2 • Row 3 • Row 4 • Row 5 • Row 6 • Row 7 • Row 8 • Conjuncts • PracticeMuharni First row • Second row • Third row • Fourth row • Fifth row • Sixth row • Seventh row • Full muharniVocabulary Colors • Birds • Animals • Flowers • Fruits • Trees • Vegetables • Food • Body parts • Jewellery • Transport • Sports • Metals • Furniture • Relations • Weekdays • Months • Festivals • <|fim▁hole|> • Introducing Yourself • Parting • Drawing Attention • Making Phone Call • Making Telephonic Inquiries • Placing Telephonic Order • Go Shopping • Seeking Advice • Talking About People • Expressing Emotions • Asking For Directions • Sending Messages • Talking About SuccessGrammar Parts of speech • Noun • Pronoun • Adjective • Verb • Participle • Adverb • Postposition • Conjunction • InterjectionMore about Punjabi Punjabi Language • Punjabi Literature • Punjabi Culture • Punjabi Wikibook • Using Punjabi Wikibook • ContributorsAppendices Appendix 1 : Phonetics • Appendix 2 : Numbers Appendix 3 : Dictionary - ੳ ਅ ੲ ਸ ਹ ਕ ਖ ਗ ਘ ਙ ਚ ਛ ਜ ਝ ਞ ਟ ਠ ਡ ਢ ਣ ਤ ਥ ਦ ਧ ਨ ਪ ਫ ਬ ਭ ਮ ਯ ਰ ਲ ਵ ੜReferences Punjabi grammar - Wikipedia, the free encyclopedia • Online Punjabi Teaching -- ACTDPL, Punjabi University, Patiala • Omniglot: Useful Punjabi phrasesFurther readings ਪੰਜਾਬੀ ਕਵਿਤਾ Punjabi Kavita • ਤਿੰਨ ਰੰਗ ਨਹੀਉਂ ਲਭਣੇ - Wikisource • ਅਜੀਤ Ajit Jalandhar • ਪੰਜਾਬੀ ਟ੍ਰਿਬਿਊਨ Punjabi Tribune • ਜਗਬਾਣੀ Jagbani • ਪੰਜਾਬੀ ਪੋਸਟ Punjabi Post (Canada) <|fim▁end|> | Numbers • MiscellaneousConversation Meeting People |
<|fim▁begin|> About Io We cannot give a significantly better executive summary of what Io is than what's already on the Io language website[1]: Io is a small, prototype-based programming language. The ideas in Io are mostly inspired by Smalltalk (all values are objects), Self (prototype-based), NewtonScript (differential inheritance), Act1 (actors and futures for concurrency), LISP (code is a runtime inspectable/modifiable tree) and Lua (small, embeddable). Still, it hardly does much to capture the essence of what Io actually is, how to use it to solve problems, or to extend its functionality with new features. This wikibook aims to cover all of these aspects, in varying degrees of detail. We start with the basics, of course; we assume that you, the reader, have had relatively little programming experience in the past. One thing you should know is that Io has not yet received its 1.0 badge of honor. The language and its libraries are, while becoming more and more stable every day, still maturing. This wikibook was written with Io 20070410. This means <|fim▁hole|> Io that was "released" on 2007 April 10. While it doesn't mean that the entirety of the book will be invalid in the next release, please be aware that Io is an extremely fluid language (and is so by design!), and is prone to change over time as developers and users require. About This Book This work is disjointly licensed under the GNU FDL, the CC BY SA, and Io's license. The authors of this tutorial are: Daniel Ehrenberg (LittleDan) Samuel A. Falvo II Olle Jonsson (just a note on String concatenation) And many others who wish to remain anonymous. Io Language Websites and Community The Official Io Language Site The quintessential root of it all, the Io homepage. Todo Stuff that needs to be done. Examples Paste your example code here. Binding to C++ Learn how to bind Io using C++. CGI Accessing Io through CGI Style Guide How to write good Io code. To talk to people working with Io and/or to get help, visit irc.freenode.net #io. ↑ http://www.iolanguage.com <|fim▁end|> | that I used a version of |
<|fim▁begin|> File:SMB3-Level4.png Contents 1 World 4-5 2 World 4-6 3 World 4 2nd Fortress 3.1 Main Section 3.2 Hidden Quarter 4 World 4 Airship 4.1 B: Iggy Koopa 4.2 Aloha to Big Island World 4-5 Guided Missile Bills guard the fabulously furry Tanooki Suit. You have to like the Tanooki Suit. Not only is it cool looking, it gives Mario the same powers as the Raccoon Suit, as well as the ability to turn into a Statue! Statue Mario is a powerful form The Tanooki Suit has the power to turn into an invincible Statue for 5 seconds. But it's not generally know that this power can be used offensively against enemies like the Lava Lotus. Statue Mario can even fit through small gaps! File:SMB3 W4 S5 a.png 1: Kick the Green Gargantua Koopa Troopa's shell into the ? Block to reveal a power-up. You'll get a Super Leaf if you're Super Mario. 2: Missile Bills are guided, so they won't give up until they've hunted you down. They'll track back and forth waiting for you, but you merely have to stomp on them to disarm them. File:SMB3 W4 S5 b.png File:SMB3 W4 S5 c.png 3: Don't become plant food—stand next to the cannon and wait until the Piranha Plant goes down the pipe before you jump 4: The Tanooki Suit. While standing on a cannon below, jump on top of a passing Bullet Bill to bump the ? Block to make a vine grow into the sky. Climb it and enter the pipe to gain access to a secret area (shown right) containing the cute and furry Tanooki Suit. When you enter the secret room, get the suit first. Then hit the Switch Block and quickly exit the room the same way you entered. Follow the trail of coins on your way down. World 4-6 Step through Magic Doors to enter alternate dimensions big and small. Here's a stage where you can change the size of giant enemies. Two magic doors accomplish this feat, and also make different items come out of the ? Blocks. In effect, this stage contains a giant side, and a regular side. This being Giant World, you naturally begin the stage on the giant side. File:SMB3 W4 S6 a.png 1: On the giant side where you begin, crush the blocks to reveal a 1-Up. On the small side, you'll find a Starman in a different block instead. 2: This is the second of two doors that, when you pass through them, not only change the size of the enemies, but they also reset the items once they've been collected, making repeated collection possible. 3: On both the regular and giant sides, fly to the clouds to collect some coins. Only on the regular side, however, will you find a 1-Up as well. File:SMB3 W4 S6 b.png 4: Jump to reveal hidden blocks on the regular side and you'll be rewarded with a 1-Up. Be careful not to let the Koopa Troopa corner you, and watch yourself—if you kick the Koopa shell, it could spell trouble. 5: Enter a Magic Door to reset all of the blocks in the stage. You can pass through the door to collect coins several times, but don't expect to collect 1-Ups over and over again—they won't be there the second time. World 4 2nd Fortress Don't dawdle on a Donut Lift, or you'll be in for a very hot bath. A Switch Block will reveal the way to a Hidden Quarter of the Fortress which gives you a chance to gain some extra coins and, of course, 1-Ups; plus some extra practice with pipe maze tactics that will come in handy in World 7. Main Section File:SMB3 W4 F2 a.png 1: Defeat Dry Bones first! You'll have to act fast on these Donut Lifts. Stomp Dry Bones, collect the item, and hit the road. Try not to panic. 2: Use the B button dash here. Hesitate on the upper donut lifts for just a moment and Dry Bones will fall into the lava. Be careful not to hesitate too long! When the coast is clear, hold down the B button and run and jump to the upper platform. File:SMB3 W4 F2 b.png 3: When you hit the Switch Block the <|fim▁hole|> Quarter will be framed by silver coins. Run to the door and press Up on the D-Pad to enter the secret area. The Hidden Quarter is the long way to BOOM-BOOM but it gives you a chance for four extra lives and some coins. You will enter at the bottom of the left map below. B: Get in position just to the right of the center floating block to take on BOOM-BOOM or use platforms to pounce from above and bust him up with three quick smacks on the head. Hidden Quarter File:SMB3 W4 F2 c.png 4: Arrow Lifts: These lifts will move in one direction, whichever way the arrow is pointing. They also disappear if you hit your head on something while standing on them. All Directional Lifts will also fade after a short time. 5: Directional Lifts: Every time you jump while riding on this lift, it will change direction. You need to plan which way you go carefully; if you hit your head on a wall while you're standing on it, the lift will disappear. You can jump off the lift, hit something, and get back on, and it won't fade away. 6: Go up through the maze of pipes. Carefully observe the way these pipes function. You'll encounter similar pipe mazes and Directional Lifts in later stages, especially in World 7. File:SMB3 W4 F2 d.png 7: Use Hidden Blocks to make your way to the 1-Up. You'll catch a glimpse of the 1-Up Block as you fall. Make invisible blocks appear to form a stairway up to it. You'll have to jump up off the screen to reach this 1-Up. File:SMB3 W4 F2 e.png 8: More bonus coins for Raccoon Mario! Fly up to the upper left corner of this room and you'll end up in another area where you can get 30 extra coins. World 4 Airship It'll take quick wits and iron nerves to traverse Iggy Koopa's enormous rocket-powered airship. Unlike the other Koopaling's Airships, Iggy's ship has no cannons or Bullet Bills, only thrusters, but it can be tricky! File:SMB3 W4 AS a.png 1: If you're confident in your jumping skills, you might want to utilize the Bolt Lift. The upper path is safer than the lower. Jump repeatedly to move the Bolt Lift across the pit lined with Rocket Engines. If you fall off, you'll be scorched. 2: If you're forced to take the lower route, wait until these thrusters fire before you jump over them. If you don't watch your timing, you might get a blasted with flame. File:SMB3 W4 AS b.png 3: It's kind of tough to get the power-up if you take the lower path through the Airship. Rocky Wrench will attempt to ambush you as you collect the power-up in the ? Block. If you're small, make sure the Super Mushroom falls to the right or you won't be able to collect it. 4: Don't get burned. It's easy to avoid the flames here by kneeling on the step. The two upper rockets are hard to get through, but there's a second power-up item in case you get hit. 5: Before you eagerly plunge down the pipe to face the boss, grab the power-up sealed in a ? Block. This is the only airship with two power-ups. Two power-ups, no cannons… always make the most of a good situation. B: Iggy Koopa File:SMB3 W4 Boss.png Iggy Koopa's wand isn't as dangerous as his sister Wendy's, but he fires it rapidly and the uneven terrain can make dodging difficult. Iggy may look like a bookworm, but he's no genius. Quickly jump on Iggy before he can shoot at you. Remember, Iggy is most dangerous when he spins inside of his shell. Jump to avoid the rings from Iggy's wand. Be sure to stay mobile and attack quickly, and don't allow him to corner you. The faster you can defeat Iggy, the less time you'll be in danger. Three strikes to the head will finish the job. Aloha to Big Island Another grateful King bids Mario good-bye. Mario's next challenge will take him into the clouds in Sky World. The Princess, thoughtful friend that she is, left a P-Wing behind for Mario to use. And he'll need it in the Sky! <|fim▁end|> | door to the Hidden |
<|fim▁begin|> Contents 1 Partition Management 1.1 Block Devices 1.2 Overview of Partitions 1.3 Creating a partition 1.3.1 Using the fdisk utility 1.3.2 the Mkfs Command 1.4 Sysfs filesystem vs. Proc filesystem 1.5 Inodes 1.5.1 = Mounting the file system 2 Filesystems 2.1 ext2 and ext3 2.2 jfs 2.3 reiserfs 3 Labeling Filesystems and Block Devices 4 Mounting Filesystems 4.1 The mount Command 4.2 /etc/fstab 5 AutoFS - Automounting 5.1 Basics 5.2 Automounting Home Directories 5.3 AutoFS Scripts 5.4 The /net Example Partition Management A partition is a place on disk which contains at the fdisk prompt: n - create a new partition e - create an extended partition p - will print the table Block Devices Overview of Partitions Using Radified's [1] analogy, a partition is like Creating a partition Using the fdisk utility "fdisk -l" ---> listed fdisk -l the Mkfs Command mkfs, then hit the tab key twice gives you a list mkfs -t * which equals mkfs.* so mkfs.reiserfs equals mkfs -t reiserfs VFAT filesystem - tends to be used for usb mkfs -b ----> mkfs -t every partition has 4k is what you want -> optimized for speed rat mkfs -f [fragment size] fdisk -> enters the interactive prompt w - write n - new m - manual +100m - creates a partition q - quit the command "q" will quit fdisk. if you exit with "q" rather than "w" 1000 bytes is kb 1024 bytes is a kib "kibibytes" running the command "cat /proc/partitions" looking at the file /proc/partitions will tell you what block devices the kernel knows about partprobe - speaks to a higher level of the kernel it is a good idea to check with "partprobe" if the kernel agrees with <|fim▁hole|> Proc filesystem Inodes Metadata is stored in the inode we have goto our filesystem formatted ctime - when was the inode created mtime - when was the inode last modified ext2 had to make sure it assigns them to the correct filesystem - tune2fs -l /dev/xvda1 dumpe2fs /dev/xvda1 holding = Mounting the file system if something is to show up on the desktop, then it will show up as mnt if we "touch /home/share/unmounted" the command to mount the every directory has an inode for the current directory ( in the . entry) dump e2fs will tell us if Filesystems ext2 and ext3 ext3 is the ext2 filesystem with journaling added. Journaling keeps track of what will be written to the disk prior to the write operation beginning. When the write is done, it is noted in the journal. If the system crashes during a write, it can recover the operation when it comes back up. This prevents incomplete writes from occurring on the disk and eliminates the need to do a filesystem check after a system crash. jfs JFS is a high a performance filesystem made by IBM and ported to Linux in 2001. It uses B+ trees,extents, and a journal to guarantee the consistency of the file system in the event of a crash. reiserfs Labeling Filesystems and Block Devices Mounting Filesystems The mount Command /etc/fstab AutoFS - Automounting AutoFS allows the system to automatically mount devices and network shares as they are requested and even unmount them again when no longer in use. The main configuration for the automounter is /etc/auto.master. Initially, this file will only contain comments, including examples for a /etc/auto.misc and /etc/auto.net. Basics Automounting Home Directories AutoFS Scripts The /net Example <|fim▁end|> | our partitions Sysfs filesystem vs. |
<|fim▁begin|> Contents 1 Introduction 2 History 3 Content 4 Side Effects 5 Chemistry 6 References Introduction Benadryl, also known as Diphenhydramine, is an antihistamine drug. It is usually found as a crystalline, white powder and is soluble in water and alcohol. Diphenhydramine is typically used for treating allergic reactions. In the body, histamine is released when one suffers through an allergic reaction or even viral infections. The histamine then binds to cell receptors, triggering changes in the cell that lead to allergy symptoms such as itching and sneezing. As an antihistamine drug, diphenhydramine competes against the histamine for the cell receptors. The antihistamine not only prevents histamines from binding and stimulating the cells but while doing so, it also binds to the receptors—they do not stimulate the cells, therefore allergy symptoms will not show. History Benadryl was discovered by George Rieveschl, who took part in many experiments with focus on relieving muscle pain at University of Cincinnati. Benadryl is an antihistamine drug that used <|fim▁hole|> suffer with allergy. Benadryl was first available through prescription in 1946. Later in 1980s, it was approved as over-the-counter drug. Content Benadryl contains the histamine-blocker diphenhydramine. This drug will help patients to recover from common symptoms: sneezing, watery eyes, runny nose, and sore throat. One application of Benadryl is Benadryl Chesty Cough & Nasal Congestion: a drugs that is used to relieve the symptoms of chesty cough and cold. Side Effects Do not use this drugs if you are currently treating with depression, heart condition, blood pressure, and behavioral disorder. As many other drugs, Benadryl does have some common side effects: sleepiness dizziness headache dry mouth difficulty urinating. Chemistry Diphenhydramine is synthesized as shown below. The molecular formula of Diphenhydramine is C17H21NO • HCl. References "Benadryl (Diphenhydramine) Drug Information". RXList. 2009. Retrieved March 6, 2009 Ohio History central: Benadryl; accessed Jan. 5, 2011 Benadryl for the Family Chesty Cough & Nasal Congestion Oral Liquid ; accessed Oct. 13, 2011 http://www.medicinenet.com/diphenhydramine/article.htm Image from Wikipedia Commons <|fim▁end|> | for treating people who |
<|fim▁begin|> Timing You can work out the time that an algorithm takes to run by timing it: Dim timer As New Stopwatch() timer.Start() For x = 1 to 1000000000 'count to one billion! Next timer.Stop() ' Get the elapsed time as a TimeSpan value. Dim el As TimeSpan = stopWatch.Elapsed ' Format and display the TimeSpan value. Dim formattedTime As String = String.Format("{0}:{1}:{2}.{3}", el.Hours, el.Minutes, el.Seconds, el.Milliseconds / 10) Console.WriteLine( "Time Elapsed: " + formattedTime) Code Output Time Elapsed: 0:0:21:3249 However, this isn't always suitable. What happens if you run some code on a 33 MHz processor, and some code on a 3.4 GHz processor. Timing a function tells you a lot about the speed of a computer and very little about the speed of an algorithm. Refining algorithms dim N as integer = 7483647 dim sum as double= 0 for i = 1 to N sum = sum + i loop console.writeline(sum) optimised version dim N as integer = 7483647 dim sum as double = N * (1 + N) / 2 console.writeline(sum) Notation Name Example O ( 1 ) {\displaystyle O(1)\,} constant Determining if a number is even or odd; using a constant-size lookup table O ( log n ) {\displaystyle O(\log n)\,} logarithmic Finding <|fim▁hole|> array with a binary search or a balanced search tree as well as all operations in a Binomial heap. O ( n ) {\displaystyle O(n)\,} linear Finding an item in an unsorted list or a malformed tree (worst case) or in an unsorted array; Adding two n-bit integers by ripple carry. O ( n log n ) = O ( log n ! ) {\displaystyle O(n\log n)=O(\log n!)\,} linearithmic, loglinear, or quasilinear Performing a Fast Fourier transform; heapsort, quicksort (best and average case), or merge sort O ( n 2 ) {\displaystyle O(n^{2})\,} quadratic Multiplying two n-digit numbers by a simple algorithm; bubble sort (worst case or naive implementation), Shell sort, quicksort (worst case), selection sort or insertion sort O ( n c ) , c > 1 {\displaystyle O(n^{c}),\;c>1} polynomial or algebraic Tree-adjoining grammar parsing; maximum matching for bipartite graphs O ( c n ) , c > 1 {\displaystyle O(c^{n}),\;c>1} exponential Finding the (exact) solution to the travelling salesman problem using dynamic programming; determining if two logical statements are equivalent using brute-force search O ( n ! ) {\displaystyle O(n!)\,} factorial Solving the travelling salesman problem via brute-force search; generating all unrestricted permutations of a poset; finding the determinant with expansion by minors. <|fim▁end|> | an item in a sorted |
<|fim▁begin|> Manchester United was first introduced to GPSports technology in early 2010. During the year 2010, Manchester United FC had the lowest injury rates in the English Premier league.[1] According to the coaching staff, the technology was an exciting addition to their already impressive training programming and facilities. As a result, after months of testing and optimisation, Manchester United FC decided in late 2010 to fully integrate GPSports technology as part of their training and rehab strategy for the 2010-2011 EPL season[2] - Manchester United <|fim▁hole|> “We use GPSports tracking devices as part of our training and rehab strategy, this type of athlete monitoring ensures that the correct training stimulus can be achieved. Information is gathered and reported to players and coaches so that decision can be made on individual player conditioning needs and future training sessions. The quality and accuracy of the data gives us confidence in the decisions we make.” – Robin Thorpe, Sports Science Research, Manchester Uniter Football Club, UK Back to GPSports References ↑ http://www.socawarriors.net/forum/index.php?topic=50154.0 ↑ http://www.facebook.com/pages/GPSports/105496552835885 <|fim▁end|> | raised the 2011 Premier League trophy. |
<|fim▁begin|> This tutorial covers how to model a basic two bladed aircraft propeller. Originally this was going to be a part of the Junkers F13 modeling tutorial, but I decided this part would be generic enough that providing a separate tutorial just for it would be useful. This should also help those who claim that modeling a good looking aircraft propeller is tricky, so the benefit of this goes to all aircraft modelers. Contents 1 Prop Shaft 2 Propeller 2.1 Propeller Hub 2.2 Propeller Blades 3 "Bullet" or Nose Cap 4 UV Mapping Prop Shaft It's just a cylinder, plain and simple. Depending on the vintage of the aircraft, this will either go into one end of the propeller or poke all the way through it. It doesn't need to be modeled into the propeller itself (unless you really want to.) For purposes of smoothing, setting the edges at the ends to hard will keep it from distoring. You can also use contour and collapse on the ends to keep the mesh all quads and tris. File:PropellerTut 01.jpg Propeller The propeller consists of the hub and blades. In the case of a carved wooden propeller, the hub and blades are a single piece. So I'll show how to model them in that manner. For other propeller types, you can follow the methods for a single piece propeller and cut/modify into separate parts as appropriate. Propeller Hub When making the propeller hub, we start with yet another cylinder. Right click with no other objects selected. This time right click on the cylinder option. This will bring up a menu. In this case, we want 24 sections (to give some extra geometry to work with), a height of 0.1 (estimated 0.1m in reference to a drawing), and a diameter of 0.2m (also in reference to the drawing). Now is a good time to check the size of the propeller shaft cylinder and make sure it fits through the hub ok. Now lets hide the shaft and work on the ends of the propeller hub. Use contour to inset the end faces. Then add indents by extruding inwards. Contour again for some control edges, and then collapse the n-gon faces to create a star at the center. Next select a vertical edge on the side. Hit the G key for edge rinG. Then hit 4 on the keyboard. This will cut all the selected edges into 4 sections. At this point there should be vertices selected. Then hit C to Connect. You should have something like this. Select a region like so, and make a contour with 0 value. You can use tab and set Dx to 0 while the contour command is active. This will be the starting area of the blade root. With the contour area still active, press L for Loop. Then with the edge loop selected, circularize by 100%. You can also save a flatten step by using the flatten option while circularize is active. Look at your status bar to find the appropriate keystroke to enable it. Then press shift-L to select the region inside the loop. Then dissolve the faces. Now move it outward by a little bit. This forms the blade root edgeloop. So onto modeling the blade portion of the propeller. Propeller Blades To start the blade, extrude out from where the blade root face is on the hub. Then scale it on two separate axes to make the end face ovoid in shape. Then rotate it to approximate the inner blade pitch. Then move the vertices around the perimeter of the ovoid face to approximate an airfoil shape. Using Move|Planar can be handy for this. Now extrude the airfoil face out just a bit short of the length of the blade. (The extra bit is for the blade tip that comes later.) Now select the edge ring that makes up the length of the blade. Then hit a number (I'm using 8) to divide it into sections, then C to Connect. This is the step where you add "twist" to the blade. Most aircraft blades are not a constant pitch throughout their entire length, so we're going to model in the change of pitch. The pitch at the blade root should be a higher angle relative to the blade travel then the tip. So now we twist the blade back the other way. Select the end face on the blade tip. Then pick rotate. Then when selecting the axis of rotation that corresponds to the blade (in this case Z), hold down the alt key to enable magnets. When it asks for a point to limit magnet influence, select the inner loop where the airfoil shape begins. Notice there are different magnet modes indicated in the status area, each will twist the blade in a different manner. Now we taper or flare the blade by using magnets, but this time using scale operations. (It's easier if the blade extends along an axis. Since my example extends along the Z-axis, I use X and Y for the scaling.) Hold down the alt-key when picking a scale axis to enable the magnet. I'll leave it as an user exercise as to where to scale from and where to extend the magnet influence. Then model the blade tip. For rounded or pointed propeller blade tips, this involves a bit of manual work. First by connecting opposing vertices on the end face. Then by cutting those edges, moving vertices, and connecting again. Try to keep quad geometry when possible. Also note that the rear facing inside of the blade may be slightly cupped. Doing blunt or paddle tip blades is much easier, even though I don't show it here. Just inset (contour) and inset again, then collapse. Because I intend for this propeller to be a single-piece wooden one, I'm going to blend the blade root by tweaking vertices and using the tighten command. For metal or composite blade propellers, this step probably isn't necessary. On more modern props that have variable pitch blades, you'd probably cut the blades off instead and rework the geometry for separate parts. (Not shown here, but should be easy enough to figure out on one's own.) To do the other blade, loop-cut off the half of the hub with no blade and discard it. Now select the remaining half in body mode. Then duplicate w/o moving by selecting duplicate via the middle mouse button. Without deselecting, use the rotate command and pick the Y axis by right clicking. <|fim▁hole|> pick the vertex that was the middle of the hub. Then rotate 180 degrees. Then select both pieces in body mode and weld. If you followed all those steps correctly, you should have a completed propeller. You can use it as it is, or step ahead to the UV mapping instructions if you want to put a texture on it. "Bullet" or Nose Cap This piece is optional and not all aircraft use it. But I'll show you how to make it since it's very simple. First start with a sphere that is the same diameter as the hub section, and position the sphere such that its "equator" is where the bullet will connect. Now select the vertex at the top pole of the sphere. Select move, then alt-click on Y for a magnet move. Set the magnet boundary to the edgeloop one step below the "equator". Now move the vertex up and down and change magnet modes for different shapes. Pick one that's suitable. Loop cut off the other half that's not visible, and set edges to hard. Inset (via contour) the remaining face and collapse. Pretty simple, isn't it? UV Mapping Typically, you can use front and rear projection to produce two halves for a map. In most cases, this "simple" mapping method works well for propellers. In this particular case, mapping via body mode is probably the best way to go. So select the propeller in body mode and pick UV mapping. A new window should pop up over the main geometry window. Although it looks the same as the geometry window, this is used for segmenting the UV maps instead. Thus you can pick different areas and assign them to different charts. Notice that you have an edge mode and face mode in the segmenting window. The face mode has multiple charts which can be applied like materials. The edge mode has the ability to mark/or unmark edges for cut. Also note that any hard edges may also automatically be marked for cut. We don't always want this behavior, so you may want to unmark any green edges you find at this time. There is also a Segment By option, this can map things automatically. But in this case, it's probably better to do it manually. If you kept good edge flow when modeling the propeller tips, there should be a loop that goes around the "sharp" edges of the propeller. Select that edge loop and mark it for cut. Next, find the faces on the sides of the propeller hub and set them to a separate chart. This is done because the way we will project to generate the maps would cause heavy stretching/distortion in those areas otherwise. Now its time to start charting. But just before starting with the option to create the chart, hit the O key for Orthographic and then hit Y for the top down Y-axis view. After those two things are done, pick continue and then projection camera. (The camera projection is why we switched to orthographic. Otherwise there would be perspective distortions introduced into the chart templates.) When it's done projecting charts, the segmenting window will disappear and a new charting window will pop up. This is where you will move the templates around. Note that the way it places and scales things automatically isn't always the best one. Move in close and select these little bits. (In the charting window: scrolling/dragging MMB zooms, clicking MMB pans.) Notice that in the main window (provided you don't resize or position the charting window to obstruct it) they correspond to the separate segments we placed on the propeller hub earlier. Having both windows visible at the same time is useful for figuring out what "mystery" bits may be. (But since we didn't automatically chart, there shouldn't be any mystery bits in this case.) In the charting window, we'll remap the bits because they're projected side on right now. Pick the project normal option under remap on the charting window right click menu. They should change to something like this. Next reposition the charts to something like this. The little side pieces can be matched up by looking on the main window. The colored alphabet blocks also help in matching up pieces that fit. Now scale the side piece bits to match up properly in size. Comparing the edge spacing should be a good clue in regards to how much they should be scaled up. At this stage of mapping, the top and bottom groupings should look something like this. Now position and scale the chart groupings to take advantage of the most space in the square. Yet note that you still need room around and between things. This room is necessary to allow slight overpainting of the templates when texturing. Hint: To rotate or scale charts while keeping their spatial relationships, switch to vertex mode first. Now it's time to create a texture. Note the options available and feel free to explore them. Personally, I don't like texuremap guide templates smaller than 512x512 because they tend to pixelate. But you do have the option to generate smaller ones if needed. Other options like edge color, using a different background or color, etc. can be useful too. When done creating texture, you should have something similar to this. For some wierd reason, I like my guides remniscent of blueprints. So I have blue lines on a white background. But you can do it however you want. Also note that in most compression formats, having light lines on a black background actually makes a smaller file as RGB (0,0,0) zeros out. But this is arbitrary that you can decide for yourself. All later painting or other texture work requires the use of a 2D program. (Good examples are: GIMP, PhotoShop, InkScape, Illustrator, Paint Shop Pro, Dogwaffle, Corel Paint, MS Paint, etc.) When overpainting a template guide during texturing, I recommended to always use a new layer in the 2D app if it's possible. Now you can close the UV charting window. Provided materials and textures are turned on in the view menu, you should see them visible on the model. You will also see the UV material and texture listed in the outliner. Also note that you are free to rename those things in the outliner, so don't hesitate to do so if the automated conventions are not to your own liking. That wraps up UV mapping in regards to making a propeller. That wasn't so hard, was it? <|fim▁end|> | For the reference point, |
<|fim▁begin|> Conditions for a situation to be normally distributed If a situation is to be binomially distributed it must satisfy the following conditions. 1. The event must have only two possible outcomes.The outcomes are normally termed as 'success' ( denoted by p {\displaystyle p} ) and failure ( denoted by q {\displaystyle q} ) 2. The two outcomes must be independent. Converting Binomial distribution <|fim▁hole|> If an event is to be repeated n {\displaystyle n} number of times with constant (independent) probabilities of both the possible outcomes occurring, by calculating the mean ( n ∗ p {\displaystyle n*p} ) of the distribution and the variance ( n ∗ p ∗ q {\displaystyle n*p*q} ) of the distribution, the binomial distribution can be converted into an approximate normal distribution. <|fim▁end|> | into a Normal Distribution |
<|fim▁begin|> Muggles' Guide to Harry Potter - Character Nott Gender Male Hair color Unknown Eye color Unknown Related Family son Theodore Nott Loyalty Lord Voldemort Contents 1 Overview 2 Role in the Books 2.1 Goblet of Fire 2.2 Order of the Phoenix 2.3 Half-Blood Prince 2.4 Outside the series 3 Strengths 4 Weaknesses 5 Relationships with Other Characters 6 Analysis 7 Questions 8 Greater Picture Overview Nott is a Death Eater, whose son Theodore is a Slytherin in Harry's year. He is never given a first name. Role in the Books Beginner warning: Details follow which you may not wish to read at your current level. Goblet of Fire Nott is first seen as one of the Death Eaters to appear after Lord Voldemort's re-embodiment. He tried to profess his loyalty to Voldemort before being interrupted. Order of the Phoenix Nott is injured in the first skirmish in the battle at the Ministry, presumably by falling shelves, to the extent that Lucius Malfoy instructs the other Death Eaters there present to leave him. It's likely that he did not take part in the final battle (in the Room of the Veil) due to his injuries. He was presumably sent to Azkaban afterwards along with the other Death Eaters who had been captured in that battle by the Order of the Phoenix. Half-Blood Prince Nott is mentioned at the beginning of the book by Blaise Zabini. Apparently he was an old friend and ex-student of Professor Slughorn's, however his son was not invited to the Slug Club due to Nott Sr's recent arrest, apparently Slughorn does not wish to have any association with the Death Eaters. When Lord Voldemort, or Tom Riddle as he is then known, is seen in Albus Dumbledore's memories returning to Hogwarts to apply for the job of teacher of Defence Against the Dark Arts, Dumbledore asks him about his "friends" waiting for him in Hogsmeade. Nott <|fim▁hole|> by name, along with Mulciber, Antonin Dolohov, and Evan Rosier. Outside the series Nott originally had a scene in which he and Lucius Malfoy discussed Death Eater business off camera, while their sons Theodore Nott and Draco Malfoy discussed Harry and Albus Dumbledore. The author mentions that while she tried to fit the scene into two different books, it didn't work well either place and so was laid to rest. Strengths Weaknesses Relationships with Other Characters Analysis Nott was one of Lord Voldemort's earliest followers, along with Avery, Lestrange, Rosier, Mulciber, and Dolohov. Unlike the others (with the possible exception of Dolohov) Nott seems to be the only one of the original Death Eaters who are still fighting for Voldemort. The others seem to have been replaced by their sons (or other relatives). It's possible that the Nott we see is also a descendant of the original Nott, though this is unlikely as Harry refers to him as "stooped," generally a descriptions that applies to elders. Additionally, in interviews following the release of the series, JK Rowling has described him as "an elderly widower" when he had Theodore (who is Harry's age). Due to this it's possible that Nott is the longest serving follower of Voldemort's who still serves him today, or at least of the Death Eaters that we've seen. Questions Study questions are meant to be left for each student to answer; please don't answer them here. Greater Picture Seeing as his son was originally supposed to have a larger role in the series, it's possible that the elder Nott was going to have a slightly larger role too. At the very least he was supposed to appear in a discarded scene involving his son and Draco Malfoy where he would have arrived at Malfoy Manor to discuss Death Eater affairs with Lucius. Intermediate warning: Details follow which you may not wish to read at your current level. <|fim▁end|> | is one of the friends mentioned |
<|fim▁begin|> Contents 1 Guatemala 1.1 GROUP A: Upright or square frank with straight-line outer border 1.2 GROUP B: Horizontal frank with partial outer border 1.2.1 Sub-group BA: Quetzal bird facing left between TM and value box 1.2.2 Sub-group BB: Ornamental leaf between TM and value box 1.2.3 Sub-group BC: Quetzal bird facing right between TM and value box 1.3 GROUP C: Open design without outer frame or country name Guatemala The first meter was installed in 1947. All stamps have “GUATEMALA” in the frank except for those in Group C. Most stamps are printed in red although black is seen occasionally. The stamps are grouped according to appearance as follows:A – Upright or square frank B – Horizontal frank without complete outer frame C – Open design without outer frame or country name GROUP A: Upright or square frank with straight-line outer border“CORREOS DE GUATEMALA” at top, meter number at bottom. Note that several meter numbers were used with more than one meter stamp type. A1. Universal "Multi-Value" (MV), 1947. Currency is CENTAVOS. M# U-1 up. TM: DC V/F: 00 (A) 00 (O) 00■ (A) 000 (O) 000■ (O) 00½ (G) a. Printed in black (meter U-3 seen) NOTE: Most TMs contain "GUATEMALA / CENTRO AMERICA", but a few are blank at top with "GUATEMALA C.A." at bottom. A2. Universal "Multi-Value" (MV). [$10] Very similar to Type A1 but the TM is lowered with 4-digit impression counter above. TM: DC V/F: 00 (O) 00■ (O) A3. Pitney Bowes "Automax" (MV). Very similar to Type A1 but currency is QUETZALES. The lines of the value figures are of equal thickness unlike those of Types A1 and A2. M# P.B. 1001 u TM: DC. V/F: 0.00= =.00= a. Meter number without "P.B." prefix, no. 1008 seen The Pitney Bowes "Simplex" stamp previously cataloged as Type A4 is known only as a proof and probably was never used to frank mail. GROUP B: Horizontal frank with partial outer border“CORREOS DE GUATEMALA” at top, meter number at bottom. Several meter numbers are known used with more than one stamp type.Sub-group BA: Quetzal bird facing left between TM and value box BA1. Pitney Bowes "R" series (MV), 1948. "CORREOS / DE / GUATEMALA" at the top <|fim▁hole|> around the V/F is narrow, 14-15mm wide, and has the meter number below. M# with "P.B." prefix. Meter numbers known: 4-6, 71-152. TM: SC, most contain "GUATEMALA/ C.A." V/F: ≋00 : (The points of the colon are found both closely and widely spaced.) a. Post Office stamp. Town mark reads "CORREOS DE GUATEMALA". Meter numbers 1, 2, 3, and 4 are known. b. Meter number with "RT" prefix, RT4 seen BA2. Pitney Bowes "5000" series (MV), 1969. Similar to Type B1 but the inner frame around the value figures is wider, 18mm. The meter number is below the Quetzal in the center. M# P.B. 1001 up. TM: SC V/F: ≋.00 ≋0.00 BA3. Pitney Bowes "5300" series (MV), 1974. Similar to Type B2 but the inner frame around the value figures is wider, 22mm. M# P.B. 5001 up. TM: DC V/F: 0.00 BA4. Pitney Bowes "A900" (MV), 1994. Similar to Type B3 but "GUATEMALA" is at the bottom, below the value figures. M# P.B. 10001 up V/F: ≋00.00 Sub-group BB: Ornamental leaf between TM and value box BB1. Pitney Bowes "DM" (LV-21). "CORREOS DE GUATEMALA" across the top. A portion of CORREOS is hidden by the town mark. M# at bottom center with "P.B." prefix. TM: SC, normally containing "GUATEMALA / C.A." Values: 1 through 20 or 21 a. Mobile Post Office stamp, with "AMBULANTE" at top of TM " GUATEMALA-AYUTLA" (78) " GUATEMALA-PUERTO BARRIOS" (80, 81) " GUATEMALA-ANGIATU" (82) b. TM with "QUEZALTENANGO" (10) [scarce] c. TM with "CHIQUIMULA / CHIQ." (24) [scarce] d. TM with “COBAN/ A.V.” (14) [very scarce] Sub-group BC: Quetzal bird facing right between TM and value box BC1. Pitney Bowes "6300" series (MV). Scroll work at bottom below V/F with M# at bottom. TM separated from rest of frank. M# P.B. 6001 up. TM: DC V/F: 0.00 GROUP C: Open design without outer frame or country name C1. Pitney Bowes-GB “A/B900”series (MV). Plain design with Quetzal bird logo at top center above the meter number. “EL CORREO” above value figures at right. The country name, if present, is in the town mark only. M# with “PB” prefix. TM: DC V/F: ≋00.00 Return to main catalog ⇒ International Postage Meter Stamp Catalog Return to top ⇒ Guatemala <|fim▁end|> | above the V/F. The frame line |
<|fim▁begin|> This is the print version of Apache AntYou won't see this message or any elements not part of the book's content when you print or preview this page. Apache Ant The current, editable version of this book is available in Wikibooks, the open-content textbooks collection, at https://en.wikibooks.org/wiki/Apache_Ant Permission is granted to copy, distribute, and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 3.0 License. Contents 1 Background 1.1 What is Apache Ant? 1.1.1 History of Ant 1.1.2 Why is Ant Strategic? 1.1.3 Ant is a Process Discipline 1.1.4 Software Project Lifecycle 1.1.5 Ant is Operating System and Language Neutral 1.1.6 Ant and XML 1.2 Next Chapter 2 Adoption 2.1 Organizational Ant Adoption 2.1.1 The three stages of learning core Ant functionality 2.1.2 Transform Your Organization! 2.2 Next Chapter 3 XML Summary 3.1 Brief Overview of XML 3.1.1 Data Element Nesting 3.1.2 XML Attributes 3.2 Next Section 4 Getting Started 5 Getting Started/Installation 6 Getting Started/Testing 7 Getting Started/Hello World 7.1 Hello World in Ant 7.2 Output of Hello World 7.3 Variations 8 Core Concepts 9 Core Concepts/Terminology 9.1 Ant Terminology 10 Build File Structure 11 Property 12 Depends 12.1 Example of using the depends attribute 12.2 Redundant dependency 12.3 Circular dependency 13 Fileset 13.1 Wildcards 13.2 Examples 13.3 Finally 14 Best Practices 14.1 Learn Ant Best Practices 14.2 What to do about local file system paths 14.3 Standard Targets 15 Best Practices/Standard Targets 16 Standard Targets 16.1 build.xml 16.2 Folder standards 16.3 Standard ant targets 16.3.1 init 16.3.2 clean 16.3.3 build 16.3.4 install 16.4 Other Standards 17 Best Practices/Local Property Files 18 Using a Property file 19 Best Practices/Local File Systems 20 Dealing with Local File System Issues 21 Depends 21.1 Example of using the depends attribute 21.2 Redundant dependency 21.3 Circular dependency 22 Property 23 Fileset 23.1 Wildcards 23.2 Examples 23.3 Finally 24 XML 25 XMLwellformed 25.1 See also 26 XMLvalidate 26.1 Motivation 26.2 Method 26.3 Sample Ant Task to Validate All XML Files in a Folder 26.4 Sample XML Schema MyMessages.xsd 26.5 Sample Valid Data File 26.6 Sample Invalid Data File 26.7 Sample Output 26.8 Supplying an XML Schema definition file 26.9 Schematron Validate 26.10 Navigation 26.11 See also 26.12 References 27 XSLT 27.1 Hello World XSLT Transform 27.1.1 Transforming Files containing external References 27.2 Passing Parameters from Ant into an XSLT script 27.3 Other ways to use XSLT within Apache Ant 27.3.1 Checking dependencies 27.4 References 28 Running Saxon 28.1 Motivation 28.2 Method 28.3 Source Code 28.3.1 Build File 28.4 XSLT Version Check 28.5 Results for XALAN 28.6 Results for Saxon 29 Passing Parameters to XSLT 29.1 Motivation 29.2 Build File Target 29.3 Input null.xml 29.4 XSLT 30 XQuery 30.1 Motivation 30.2 Method 30.2.1 Sample Ant Target 31 Converting Excel to XML 31.1 Motivation 31.2 Method 31.3 Input File 31.4 Sources 31.5 Run 31.6 Sample Output 32 Cleaning up HTML 33 Motivation 34 Sample Ant File 34.1 Sample Input 34.2 Sample Output 35 Converting PDF to XML 36 Apache Ant Project to Extract Text From PDF 37 Store XML data 37.1 Motivation 37.2 Method 37.3 Sample Code 37.4 Using a local.properties File to Load XML Data 37.5 References 38 Reindex a Collection 38.1 Motivation 38.2 Method 38.2.1 Call a remote XQuery by file name 38.2.2 Supply the Body of an XQuery 39 Execute an XQuery 39.1 Motivation 39.1.1 Remote execution of an inline query 39.1.2 Execute an XQuery Stored in Local Drive 39.1.3 Adding Execute Permissions 40 Creating a .xar file 40.1 Motivation 40.2 Method 40.3 GUI Package vs. On-Disk Library vs. In DB Library 40.4 Sample Package Structure 40.5 Sample Apache Ant Target to Generate an Application .xar file 40.6 Sample Apache Ant Target to Generate a Library .xar file 40.7 Sample XSLT Script 40.8 Sample XQuery Script 40.9 Acknowledgements 41 References 41.1 References 41.1.1 Links 41.1.2 Books 41.1.3 Articles Background What is Apache Ant? An operating system and language neutral XML based "Build Tool" A scripting language for executing any complex file-system processes that can be run from a command line interface A.N.T. – Another Neat Tool Used for Building the Project History of Ant Built by James Duncan Davidson Frustrated with the UNIX "make" Invented while turning a product from Sun into open source Make used "tab" as a record separator Tabs frequently got converted to spaces during copy/paste operations Why is Ant Strategic? Ant is important because it helps organizations create repeatable build processes. Repeatability is critical to organizations reaching the next level of CMU's Capability Maturity Model : Initial Repeatable Defined Managed Optimized Ant helps you get from the Initial to the Repeatable level. Ant is a Process Discipline Process discipline helps ensure that existing practices are retained during times of stress When these practices are in place, projects are performed and managed according to their documented plans Answers the Question: How did the prior developer compile, test and install their system? Excellent aid for software archeologists Software Project Lifecycle Version 1 and version 2 of a software package are frequently done by different groups Sometimes version 1 and 2 are done years apart by different teams in different countries Contractors and internal staff need to use the same tools Shared development processes, like those used in the Open Source community, would be almost impossible without tools like Ant Ant is Operating System and Language Neutral Builds run on both Windows and UNIX/Linux systems Should run anywhere a Java VM runs Ant files "know" about file separators "/" vs. "\" Build targets can still do OS-specific tasks Works with anything that can be done from the command line Easy to extend (with Java) It is possible to extend with other languages as long as they have Java bindings but in practice, most people use Java to extend Ant Ant and XML If you are familiar with XML (or even HTML) you will probably learn Ant quickly If you are not already familiar with XML you will need to learn some XML before you use Ant One of the best ways of doing this is to read many small Ant sample tasks This book should help you do this Next Chapter Adoption Adoption Organizational Ant Adoption We have found that most people new to Ant go through several stages of learning Ant. The three stages of learning core Ant functionality Learn the grammar and syntax of XML and a build file- this goes quickly if you know any XML or HTML (about 15 minutes) Learn the Ant concepts of properties, dependencies and task (about two hours) Build your vocabulary: Learn the basic Ant tasks you need to get your job done (duration depends on what you are doing) Transform Your Organization! Integrating it into your development/QA process Making it a requirement of all projects Specifying that all vendor deliverables MUST include a reproducible build process Problematic for Microsoft developers that are not familiar with Ant Problematic for "visual only" development environments (Microsoft Visual Studio, Microsoft Analysis Services) Next Chapter XML Summary XML Summary Brief Overview of XML This chapter has a summary of the things you need to know about XML to use Apache Ant. It is not a lot of information and users that are already familiar with HTML will pick up the concepts very quickly. You do not need to know a lot about XML to use Ant. Just a few syntaxical items. First, you must be very careful to match up the "begin" and "end" tags. Begin tags start with a "<" and end tags have the same name but start with a "</". Here is an simple example: <MyDataElement> Data Inside... </MyDataElement> Train your eye to look for the </ that ends a tag. If it does not match up something is wrong. Tags that do not match up will cause errors. Data Element Nesting All XML Data Elements must be paired using matching start and end tags: <Parent_XML_Element> <Child_XML_Element> <Sub_Child_XML_Element> </Sub_Child_XML_Element> </Child_XML_Element> </Parent_XML_Element > Understanding this paired nesting structure is critical to creating working Ant build files. XML Attributes The XML begin tag may also have attributes. <MyTag attribute1="nothing" attribute2="nothing else">Text</MyTag> Next Section Getting Started Getting Started This section contains three chapters: Installation How to download, install Apache Ant Testing Testing Apache Ant Hello World How to run a small ant program that prints "Hello World!" Getting Started/Installation Before starting, you will need to have a running version of the Java Development Kit (JDK) 1.2 or later. For Ant 1.7, JDK 1.5 is recommended. Ant will need a JAXP-compliant XML parser installed and available in your classpath. The binary distribution of Ant includes the latest version of the Apache Xerces2 XML parser. To install Ant on Windows, you can use WinAnt the Windows installer for Apache Ant. Download and run the latest version of WinAnt, and follow the directions in the installer. WinAnt will place the "ant" executable on your system path, which allows you to run the command "ant" from the command line at any directory in your system. Or, you can follow these directions: The first step is to download Apache Ant. There are two options. You can compile the program from the source or for beginners we recommend just downloading a binary file called a zip file. You can find the download page here: http://ant.apache.org/bindownload.cgi You will need to download a file such as apache-ant-1.7.0-bin.zip This is a compressed archive file. You will need to uncompress it. If you are not familiar with the process of uncompressing a file you should consult your computer operating system manual. After this is done, you will see a folder such as: apache-ant-1.7.0 This folder contains another folder called "bin". Within that there is a file called ant.bat that you can run directly from the command line. Next Chapter Getting Started/Testing To test that apache ant is installed correctly type "ant -version" from the command line: C:\ ant -version Apache Ant version 1.6.5 compiled on June 2, 2005 C:\ If you do not see this, you have to check your PATH variable to make sure that ant is in your path. You can do this by opening a prompt and typing the "set" command. To add the path in Windows: Right click on "My Computer" and find the Environment Variables button. Find the System Variable "Path", and add the path for Ant's bin folder (C:\ant\bin or whatever it is) separating it from other paths with a semicolon. Next Chapter Getting Started/Hello World Hello World in Ant Create a directory "My Project". Use a text editor such as Kate, Gedit or Notepad to create a file called build.xml within directory "My Project": <?xml version="1.0"?> <project name="My Project" default="hello"> <target name="hello"> <echo>Hello World!</echo> </target> </project> The first line in the file is flush left (no indentation). It tells ant that this is an XML file: <?xml version="1.0"?> The next line names the (required) project "My Project" and its default target "hello": <project name="My Project" default="hello"> The central three lines name and define the only target ("hello") and task ("echo") in the file: <target name="hello"> <echo>Hello World!</echo> </target> You can now open a shell and cd to the "My Project" directory you created and type "ant" Output of Hello World Buildfile: build.xml hello: [echo] Hello World! Build Successful Total time 0 seconds Variations Try changing the echo line to be the following: <echo message="Hello There!"></echo> What is the result? Try the following also: <echo message="Hello There!"/> [[../../Core Concepts|Next Section]] Core Concepts There are several things you must learn to use Apache Ant successfully: Basic terminology Apache Ant/Core Concepts/Terminology The structure of a build file Apache Ant/Build File Structure Using Properties Apache Ant/Property Setting up Dependencies Apache Ant/Depends Using Fileset Apache Ant/Fileset Core Concepts/Terminology Ant Terminology [[../../Task|Ant Task]] – something that ant can execute such as a compile, copy or replace. Most tasks have very convenient default values. See the Ant manual for a complete list of tasks. Ant Target – a fixed series of ant tasks in a specified order that can depend on other named targets. Targets can depend only on other targets, not on projects or tasks. A target represents a particular item to be created, it can be a single item like a jar, or a group of items, like classes. Ant Project – a collection of named targets that can run in any order depending on the time stamps of the files in the file system. Each build file contains one project. [[../../Build File Structure/|Next Chapter]] Build File Structure Here is the structure of a typical build.xml file: <?xml version="1.0"?> <project name="MyFirstAntProject" default="MyTarget"> <target name="init"> <echo>Running target init</echo> </target> <target name="MyTarget" depends="init"> <echo>Running target MyTarget</echo> </target> </project> Here are a few things to note: The Begin and End tags for project (<project> and </project>) MUST start and end the file. The Begin <project> MUST have an attribute called default which is the name of one of the targets. Each build file must have at least one target. The Begin and End tags for <target> and </target> must also match EXACTLY. Each target MUST have a name. Targets depend only on other targets and reference them by their target name. Targets NEVER depend on projects or tasks. Target depends are optional. Anything between <echo> and </echo> tags is outputted to the console if the surrounding target is called. Every task has to be in a target. You can execute this from a DOS or UNIX command prompt by creating a file called build.xml and typing: ant Ant will search for the build file in the current directory and run the build.xml file. Here is a sample output of this build: Buildfile: C:\AntClass\Lab01\build.xml init: [echo] Running target init MyTarget: [echo] Running target MyTarget BUILD SUCCESSFUL Total time: 188 milliseconds Optionally you can also pass ant the name of the target to run as a command line argument ant init Which triggers only the init target Buildfile: C:\AntClass\Lab01\build.xml init: [echo] Running target init BUILD SUCCESSFUL Total time: 188 milliseconds Next Chapter Property Ant does not have variables like in most standard programming languages. Ant has a structure called properties. Understanding how properties work is critical to understanding how (and why) Ant works so well. Here is a simple demonstration of how to set and use properties <project name="My Project" default="MyTarget"> <!-- set global properties --> <property name="SrcDir" value="src"/> <property name="BuildDir" value="build"/> <target name="MyTarget"> <echo message = "Source directory is = ${SrcDir}"/> <echo message = "Build directory is ${BuildDir}"/> </target> </project> Note that to use a property you have to put a dollar sign and left curly brace before it and a right curly brace after it. Don't get these confused with parens. When you run this you should get the following: Buildfile: C:\AntClass\PropertiesLab\build.xml MyTarget: [echo] Source directory is = src [echo] Build directory is build BUILD SUCCESSFUL Total time: 204 milliseconds Ant properties are immutable meaning that once they are set they cannot be changed within a build process! This may seem somewhat odd at first, but it is one of the core reasons that once targets are written they tend to run consistently without side effects. This is because targets only run if they have to and you cannot predict the order a target will run. Properties do not have to be used only inside a target. They can be set anywhere in a build file (or an external property file) and referenced anywhere in a build file after they are set. Here is a small Ant project that demonstrates the immutability of a property: <project name="My Project" default="MyTarget"> <target name="MyTarget"> <property name="MyProperty" value="One"/> <!-- check to see that the property gets set --> <echo>MyProperty = ${MyProperty}</echo> <!-- now try to change it to a new value --> <property name="MyProperty" value="Two"/> <echo>MyProperty = ${MyProperty}</echo> </target> </project> When you run this, you should get the following output: Buildfile: C:\AntClass\PropertiesLab\build.xml MyTarget: [echo] MyProperty = One [echo] MyProperty = One BUILD SUCCESSFUL Total time: 343 milliseconds Note that despite trying to change MyProperty to be "Two", the value of MyProperty does not change. Ant will not warn you of this. For newcomers this might seem strange, but this is ideally suited for building up complex trees of values that are set once and used over and over again. It makes your build scripts easy to maintain and reliable. Ant also has a nice set of "built in" properties that you can use: This demonstrates how to read system properties <project name="MyProject" default="Display-Builtins"> <target name="Display-Builtins" description="Display Builtin Properties"> <!-- the absolute path to the location of the buildfile --> <echo>${basedir}</echo> <!-- the absolute path of the buildfile --> <echo>${ant.file}</echo> <!-- ant.version - the version of Ant that you are running --> <echo>${ant.version}</echo> <!-- ant.project.name - the name of the project that is currently executing; it is set in the name attribute of <project>. --> <echo>${ant.project.name}</echo> <!-- ant.java.version - the JVM version Ant detected; currently it can hold the values "1.1", "1.2", "1.3", "1.4" and "1.5". --> <echo>${ant.java.version}</echo> </target> </project> When you run this program you should get an output similar to the following: Buildfile: C:\eclipse\workspace\Ant Examples\build.xml Display-Builtins: [echo] C:\AntClass\PropertiesLab [echo] C:\AntClass\PropertiesLab\build.xml [echo] Apache Ant version 1.6.2 compiled on July 16, 2004 [echo] MyProject [echo] 1.5 BUILD SUCCESSFUL Total time: 188 milliseconds See the ant reference manual for a full list of built-in ant and Java properties or you can try the following link for the Java properties: getProperties Next Chapter, Next Cookbook Chapter Depends The depends attribute can be included in the target tag to specify that this target requires another target to be executed prior to being executed itself. Multiple targets can be specified and separated with commas. <target name="one" depends="two, three"> Here, target "one" will not be executed until the targets named "two" and "three" are, first. Example of using the depends attribute Here is an example of a build file that executes three targets in order, first, middle and last. Note that the order the targets appear in the build file is unimportant: <?xml version="1.0" encoding="UTF-8"?> <project default="three"> <target name="one"> <echo>Running One</echo> </target> <target name="two" depends="one"> <echo>Running Two</echo> </target> <target name="three" depends="two"> <echo>Running Three</echo> </target> </project> Sample Output: Buildfile: build.xml one: [echo] Running One two: [echo] Running Two three: [echo] Running Three BUILD SUCCESSFUL Total time: 0 seconds Redundant dependency Ant keeps track of what targets have already run and will skip over targets that have not changed since they were run elsewhere in the file, for example: <?xml version="1.0" encoding="UTF-8"?> <project default="three"> <target name="one"> <echo>Running One</echo> </target> <target name="two" depends="one"> <echo>Running Two</echo> </target> <target name="three" depends="one, two"> <echo>Running Three</echo> </target> </project> will produce the same output as above - the target "one" will not be executed twice, even though both "two" and "three" targets are run and each specifies a dependency on one. Circular dependency Similarly, ant guards against circular dependencies - one target depending on another which, directly or indirectly, depends on the first. So the build file: <?xml version="1.0" encoding="UTF-8"?> <project default="one"> <target name="one" depends="two"> <echo>Running One</echo> </target> <target name="two" depends="one"> <echo>Running Two</echo> </target> </project> Will yield an error: Buildfile: build.xml BUILD FAILED Circular dependency: one <- two <- one Total time: 1 second Next Chapter, Next Cookbook Chapter Fileset FileSets are ant's way of creating groups of files to do work on. These files can be found in a directory tree starting in a base directory and are matched by patterns taken from a number of PatternSets and Selectors. FileSet identifies the base directory tree with its dir attribute. Then the FileSet's enclosed pattern elements, both named (PatternSets) and selected by wildcards (Selectors), choose the files and folders within the base tree. If any selector within the FileSet do not select a given file, that file is not considered part of the FileSet. This makes FileSets equivalent to an <and> selector container. Wildcards Wildcards are used by ant to specify groups of files that have a pattern to their names. ? : is used to match any character. * : is used to match zero or more characters. ** : is used to match zero or more directories. Examples The below FileSets all select the files in directory ${server.src} that are Java source files without "Test" in their name. <fileset dir="${server.src}" casesensitive="yes"> <include name="**/*.java"/> <exclude name="**/*Test*"/> </fileset> <fileset dir="${server.src}" casesensitive="yes"> <patternset id="non.test.sources"> <include name="**/*.java"/> <exclude name="**/*Test*"/> </patternset> </fileset> <fileset dir="${client.src}"> <patternset refid="non.test.sources"/> </fileset> <fileset dir="${server.src}" casesensitive="yes"> <filename name="**/*.java"/> <filename name="**/*Test*" negate="true"/> </fileset> <fileset dir="${server.src}" casesensitive="yes"> <filename name="**/*.java"/> <not> <filename name="**/*Test*"/> </not> </fileset> Finally FileSets can appear as children of the project element or inside tasks that support this feature. Next Section, Next Cookbook Chapter Best Practices Here are some of the Ant best practices that have been identified for creating maintainable Ant build files. Best Practices are not enforced by any compiler but they are conventions that allow people that are maintaining many projects to become quickly familiar with your build process. Learn Ant Best Practices Building your Ant Vocabulary Study ant build scripts for other Open Source projects Learn domain-specific targets such as building jar files, doing XML transforms or complex installs Depending on diversity of tasks this might take a few hours to a few weeks What to do about local file system paths Local Property Files Local File Systems Standard Targets Standard Targets Best Practices/Standard Targets Standard Targets One of the things that you learn is that if you name things consistently between projects, it is much easier to find things you are looking for. When you work with other people, you also want to have targets that you both are familiar with. build.xml Place your main build in a file called build.xml in the main directory of your project. Do not put references to local file systems (Windows C:\ etc.) in your build file. Isolate these all in a local.properties file in the main directory. Folder standards src - the location of your source code build - the output of a build process Standard ant targets init This target should create all temporary directories within the build folder. clean This target should remove all compiled and intermediate files leaving only source files. It should remove anything that can be derived from other files. This would be run just prior to creating a zip file of the project, and in case of gremlins occurring during the build process. build This target should compile sources and perform transforms of raw data. install The install target should be used to copy files to a testing or production system. Other Standards Use the <description> element to describe what your target does. If you have more than around 100 targets in your build file, it becomes unwieldy. You could consider calling a separate build file, but that adds other complications such as the dependency between targets. Best Practices/Local Property Files Using a Property file One of the best ways to keep your build files free of local dependencies is to use a local property file <property file="local.properties"/> Here is a sample of a property file: # Property file for Project X # Author # Date # Note that the format of this file adheres to the Java Property file specification # http://docs.oracle.com/javase/7/docs/api/java/util/Properties.html#load(java.io.Reader) # to use the file put the following in your ant file: # <propertyfile file="my.properties"> # All file names on local hard drives should be stored in this directory # Where Ant is installed. Will not work with 1.5 due to exec/spawn calls antHome=C:/Apps/apache-ant-1.6.5 Saxon8HomeDir=C:/Apps/saxon8 saxon8jar=${Saxon8HomeDir}/saxon8.jar # used to make sure Saxon gets the right XSLT 2.0 processor processor=trax Best Practices/Local File Systems Dealing with Local File System Issues Each developer or user has the right (or is forced by administrators) to put resource such as jar files and libraries in different locations Try to avoid having ANY local file system location dependencies in your build files. Make sure you NEVER put C: in a build file. This is just plain bad behavior Separate local file system access points in an external "property file" Warning: property files are read by Java tools and are not always path separator aware. You can use "\\" on java, or, knowing that Ant expands existing properties, ${path.separator} Allow people to check out all the files in a project including the build.xml file, customize their local library paths and build Third party projects such as Ivy and Maven2 Ant tasks try to automate the entire library management process. Consider these on a very large/complex project. Depends The depends attribute can be included in the target tag to specify that this target requires another target to be executed prior to being executed itself. Multiple targets can be specified and separated with commas. <target name="one" depends="two, three"> Here, target "one" will not be executed until the targets named "two" and "three" are, first. Example of using the depends attribute Here is an example of a build file that executes three targets in order, first, middle and last. Note that the order the targets appear in the build file is unimportant: <?xml version="1.0" encoding="UTF-8"?> <project default="three"> <target name="one"> <echo>Running One</echo> </target> <target name="two" depends="one"> <echo>Running Two</echo> </target> <target name="three" depends="two"> <echo>Running Three</echo> </target> </project> Sample Output: Buildfile: build.xml one: [echo] Running One two: [echo] Running Two three: [echo] Running Three BUILD SUCCESSFUL Total time: 0 seconds Redundant dependency Ant keeps track of what targets have already run and will skip over targets that have not changed since they were run elsewhere in the file, for example: <?xml version="1.0" encoding="UTF-8"?> <project default="three"> <target name="one"> <echo>Running One</echo> </target> <target name="two" depends="one"> <echo>Running Two</echo> </target> <target name="three" depends="one, two"> <echo>Running Three</echo> </target> </project> will produce the same output as above - the target "one" will not be executed twice, even though both "two" and "three" targets are run and each specifies a dependency on one. Circular dependency Similarly, ant guards against circular dependencies - one target depending on another which, directly or indirectly, depends on the first. So the build file: <?xml version="1.0" encoding="UTF-8"?> <project default="one"> <target name="one" depends="two"> <echo>Running One</echo> </target> <target name="two" depends="one"> <echo>Running Two</echo> </target> </project> Will yield an error: Buildfile: build.xml BUILD FAILED Circular dependency: one <- two <- one Total time: 1 second Next Chapter, Next Cookbook Chapter Property Ant does not have variables like in most standard programming languages. Ant has a structure called properties. Understanding how properties work is critical to understanding how (and why) Ant works so well. Here is a simple demonstration of how to set and use properties <project name="My Project" default="MyTarget"> <!-- set global properties --> <property name="SrcDir" value="src"/> <property name="BuildDir" value="build"/> <target name="MyTarget"> <echo message = "Source directory is = ${SrcDir}"/> <echo message = "Build directory is ${BuildDir}"/> </target> </project> Note that to use a property you have to put a dollar sign and left curly brace before it and a right curly brace after it. Don't get these confused with parens. When you run this you should get the following: Buildfile: C:\AntClass\PropertiesLab\build.xml MyTarget: [echo] Source directory is = src [echo] Build directory is build BUILD SUCCESSFUL Total time: 204 milliseconds Ant properties are immutable meaning that once they are set they cannot be changed within a build process! This may seem somewhat odd at first, but it is one of the core reasons that once targets are written they tend to run consistently without side effects. This is because targets only run if they have to and you cannot predict the order a target will run. Properties do not have to be used only inside a target. They can be set anywhere in a build file (or an external property file) and referenced anywhere in a build file after they are set. Here is a small Ant project that demonstrates the immutability of a property: <project name="My Project" default="MyTarget"> <target name="MyTarget"> <property name="MyProperty" value="One"/> <!-- check to see that the property gets set --> <echo>MyProperty = ${MyProperty}</echo> <!-- now try to change it to a new value --> <property name="MyProperty" value="Two"/> <echo>MyProperty = ${MyProperty}</echo> </target> </project> When you run this, you should get the following output: Buildfile: C:\AntClass\PropertiesLab\build.xml MyTarget: [echo] MyProperty = One [echo] MyProperty = One BUILD SUCCESSFUL Total time: 343 milliseconds Note that <|fim▁hole|> be "Two", the value of MyProperty does not change. Ant will not warn you of this. For newcomers this might seem strange, but this is ideally suited for building up complex trees of values that are set once and used over and over again. It makes your build scripts easy to maintain and reliable. Ant also has a nice set of "built in" properties that you can use: This demonstrates how to read system properties <project name="MyProject" default="Display-Builtins"> <target name="Display-Builtins" description="Display Builtin Properties"> <!-- the absolute path to the location of the buildfile --> <echo>${basedir}</echo> <!-- the absolute path of the buildfile --> <echo>${ant.file}</echo> <!-- ant.version - the version of Ant that you are running --> <echo>${ant.version}</echo> <!-- ant.project.name - the name of the project that is currently executing; it is set in the name attribute of <project>. --> <echo>${ant.project.name}</echo> <!-- ant.java.version - the JVM version Ant detected; currently it can hold the values "1.1", "1.2", "1.3", "1.4" and "1.5". --> <echo>${ant.java.version}</echo> </target> </project> When you run this program you should get an output similar to the following: Buildfile: C:\eclipse\workspace\Ant Examples\build.xml Display-Builtins: [echo] C:\AntClass\PropertiesLab [echo] C:\AntClass\PropertiesLab\build.xml [echo] Apache Ant version 1.6.2 compiled on July 16, 2004 [echo] MyProject [echo] 1.5 BUILD SUCCESSFUL Total time: 188 milliseconds See the ant reference manual for a full list of built-in ant and Java properties or you can try the following link for the Java properties: getProperties Next Chapter, Next Cookbook Chapter Fileset FileSets are ant's way of creating groups of files to do work on. These files can be found in a directory tree starting in a base directory and are matched by patterns taken from a number of PatternSets and Selectors. FileSet identifies the base directory tree with its dir attribute. Then the FileSet's enclosed pattern elements, both named (PatternSets) and selected by wildcards (Selectors), choose the files and folders within the base tree. If any selector within the FileSet do not select a given file, that file is not considered part of the FileSet. This makes FileSets equivalent to an <and> selector container. Wildcards Wildcards are used by ant to specify groups of files that have a pattern to their names. ? : is used to match any character. * : is used to match zero or more characters. ** : is used to match zero or more directories. Examples The below FileSets all select the files in directory ${server.src} that are Java source files without "Test" in their name. <fileset dir="${server.src}" casesensitive="yes"> <include name="**/*.java"/> <exclude name="**/*Test*"/> </fileset> <fileset dir="${server.src}" casesensitive="yes"> <patternset id="non.test.sources"> <include name="**/*.java"/> <exclude name="**/*Test*"/> </patternset> </fileset> <fileset dir="${client.src}"> <patternset refid="non.test.sources"/> </fileset> <fileset dir="${server.src}" casesensitive="yes"> <filename name="**/*.java"/> <filename name="**/*Test*" negate="true"/> </fileset> <fileset dir="${server.src}" casesensitive="yes"> <filename name="**/*.java"/> <not> <filename name="**/*Test*"/> </not> </fileset> Finally FileSets can appear as children of the project element or inside tasks that support this feature. Next Section, Next Cookbook Chapter XML Ant provides targets to validate and transform XML documents. XMLwellformed - how to use Apache ant to check an XML file for well formedness XMLvalidate - how to use Apache ant to validate an XML file against an XML Schema XSLT - how to use Apache ant to run an XML transform XMLwellformed You can use Apache ant to check a file or group of files for well-formedness. This is different from validation. Checking for well formedness simply checks for the consistency of begin and end tags. No XML Schema file is used. This is done by using the <xmlvalidate> task. The xmlvalidate ant task will use a standard ant <fileset> and go through each file. In the example below, we specify a directory called "in" using a property. We then use the fileset to find all XML files in that directory and all subdirectories of that directory. <project default="CheckXML"> <property name="MYROOTDIR" value="in"/> <target name="CheckXML" description="Checks that all files at or below MYROOTDIR are well formed"> <xmlvalidate> <fileset dir="${MYROOTDIR}" includes="**/*.xml"/> <attribute name="http://xml.org/sax/features/validation" value="false"/> <attribute name="http://apache.org/xml/features/validation/schema" value="false"/> </xmlvalidate> </target> </project> This target will run the default XML parser that comes with Ant (usually Xerces) and report any file that is not well-formed. To test this example, add a folder called "in" and put several XML files in the folder that are malformed. In this case we created a mal-formed file called MyInputBad.xml. When we type "build" at the command line the following was the output: CheckXML: [xmlvalidate] C:\XMLClass\Ant\in\MyInputBad.xml:5:32: The element type "MyMessag e" must be terminated by the matching end-tag "</MyMessage>". See also XML Validate Task XMLvalidate Motivation You want a command-line interface to validate one or more XML files. Instructors Note: This file is used as a lab exercise for an Apache Ant class that includes extensive use of XML. Method You can use Apache ant to check a file or group of files for their validity. This is done by using the <xmlvalidate> Apache Ant task. The xmlvalidate ant task will use a standard ant <fileset> and go through and check each file. In the example below, we specify a directory called "in" using a property. We then use the fileset to find all XML files in that directory and all subdirectories of that directory. Each file is successfully checked for validity against an XML schema. Sample Ant Task to Validate All XML Files in a Folder <project default="ValidateXML"> <property name="MYROOTDIR" value="in"/> <target name="ValidateXML" description="Checks that all files at or below MYROOTDIR are well formed"> <xmlvalidate> <fileset dir="${MYROOTDIR}" includes="**/*.xml"/> <attribute name="http://xml.org/sax/features/validation" value="true"/> <attribute name="http://apache.org/xml/features/validation/schema" value="true"/> <attribute name="http://xml.org/sax/features/namespaces" value="true"/> </xmlvalidate> </target> </project> In the above example, we assume that each XML file has a directive that tells it where to get its XML Schema. This target will run the default XML parser that comes with Ant (usually Xerces) and report any file that is not well-formed. Sample XML Schema MyMessages.xsd To test this you will need a small XML Schema file. The following file read a files of three messages: <?xml version="1.0" encoding="UTF-8" standalone="yes"?> <xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema" elementFormDefault="qualified"> <xs:element name="MyMessage" type="xs:string"/> <xs:element name="MyMessages"> <xs:complexType> <xs:sequence> <xs:element ref="MyMessage" maxOccurs="3"/> </xs:sequence> </xs:complexType> </xs:element> </xs:schema> Sample Valid Data File Here is a sample message file: <?xml version="1.0" encoding="UTF-8"?> <MyMessages xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="MyMessages.xsd"> <MyMessage>Hello World!</MyMessage> <MyMessage>ANT AND XML Schema ROCK</MyMessage> </MyMessages> Note that the noNamespaceSchemaLocation attribute of the root element tells it to look in the current directory to find the XML schema file (MyMessages.xsd) Sample Invalid Data File If you add a fourth message the file should fail validation according to the rules in the XML Schema above. <?xml version="1.0" encoding="UTF-8"?> <MyMessages xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceSchemaLocation="MyMessages.xsd"> <MyMessage>Hello From XSLT</MyMessage> <MyMessage>From input: Hi</MyMessage> <MyMessage>ANT AND XSLT ROCK</MyMessage> <MyMessage>I am the fourth message.</MyMessage> </MyMessages> To test this example, add a folder called "in" and put several XML files in the folder that are not valid. In this case we created a invalid file called MyInputBad.xml. When we type "build" at the command line the following was the output: Sample Output ValidateXML: [xmlvalidate] C:\XMLClass\Ant\validate\in\MyInput.xml:6:15: cvc-complex type.2.4.d: Invalid content was found starting with element 'MyMessage'. No child element is expected at this point. This is a sample output. Note that the error message does not indicate that you exceed a count of 3 data elements. Supplying an XML Schema definition file If you are working in the null namespace add the following attribute: <attribute name="http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation" value="${xsd.file}"/> If your documents have a namespace use the following: <attribute name="http://xml.org/sax/features/namespaces" value="true"/> <attribute name="http://apache.org/xml/properties/schema/external-schemaLocation" value="${xsd.file}"/> If the XML files do not include their own schema, you can also create an ant task that includes where to find the XML schema. This is done using an special ant property. <property name="http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation" value="${xsd.file}"/> <xmlvalidate file="xml/endpiece-noSchema.xml" lenient="false" failonerror="true" warn="true"> <attribute name="http://apache.org/xml/features/validation/schema" value="true"/> <attribute name="http://xml.org/sax/features/namespaces" value="true"/> </xmlvalidate> Schematron Validate Apache ant also has an element to validate against a schematron rules file <taskdef name="schematron" classname="com.schematron.ant.SchematronTask" classpath="lib/ant-schematron.jar"/> <schematron schema="rules.sch" failonerror="false"> <fileset includes="schmatron-input.xml"/> </schematron> See http://www.schematron.com/resource/Using_Schematron_for_Ant.pdf for more details. Navigation Previous Chapter, Next Chapter See also XML Validate Task References Apache Xerces properties XSLT Apache Ant has a task called <xslt> (or its synonym <style>) that performs an XML transform on a file or group of files. Here is an example XML transformation target: <target name="MyXSLT"> <xslt in="MyInput.xml" out="MyOutput.xml" style="MyTransform.xslt"> </xslt> </target> In the ant target there are three files you must specify: in The name of the source XML input file out The name of the XML output file style The name of the XSLT file To test this you can create a "dummy" input file: <?xml version="1.0" encoding="UTF-8"?> <root> <Input>Hi</Input> </root> Hello World XSLT Transform To get started, here is a small "hello world" transform file. The transform looks for the root data element of the input file but does not actually process any of the input file data elements: <?xml version="1.0" encoding="UTF-8"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output method="xml" version="1.0" encoding="UTF-8" indent="yes"/> <xsl:template match="/"> <MyMessage>Hello World!</MyMessage> </xsl:template> </xsl:stylesheet> You can now execute this from a command line. The following is an example run from a Microsoft Windows command shell: C:\XMLClass\XSLT\Lab1>ant Buildfile: build.xml MyXSLT: [xslt] Processing C:\XMLClass\XSLT\Lab1\MyInput.xml to C:\XMLClass\XSLT\Lab 1\MyOutput.xml [xslt] Loading stylesheet C:\XMLClass\XSLT\Lab1\MyTransform.xslt BUILD SUCCESSFUL Total time: 1 second The output will appear in a file called MyOutput.xml <?xml version="1.0" encoding="UTF-8"?> <MyMessage>Hello World!</MyMessage> Transforming Files containing external References Sometimes you may need to transform XML files containing external references, like URLs in DTDs or Schema definitions. Quite often, parsing or validating against such external files can not be totally disabled. Saxon for example will want to read DTDs even if parsing them is disabled (parameter "-dtd:off" or equivalent). In such cases it may also occur, that the development workstation is connected to a company intranet that is protected by a firewall from the internet, and needs some sort of proxy or socks configuration. In these cases, the only solution to successfully execute the transformation is by adding this connection configuration to the ant script. Example (taken from a bigger build.xml file): <target name="xdoclet-merge-top" depends="init, proxy-set" > <xslt style="${XDocletDescDir}/merge.xslt" in="${XDocletDescDir}/merge1.xml" out="${XDocletDescDir}/jboss-2.xml" force="true" > <classpath location="${ZubehoerDir}/SaxonHE9-4-0-1J/saxon9he.jar" /> </xslt> </target> <target name="proxy-set"> <setproxy proxyhost="proxy.mynet.de" proxyport="8080" proxyuser="" proxypassword=""/> </target> Passing Parameters from Ant into an XSLT script You can also pass parameters from an ant build file into an XSLT. This is handy if you need to run the same transform with small variations. You can do this by simply adding the param tag the <xslt> target: <param name="MyParameter" expression="ANT AND XSLT ROCK"/> The ant task now looks like the following: <?xml version="1.0" encoding="UTF-8"?> <project default="MyXSLT"> <target name="MyXSLT"> <xslt in="MyInput.xml" out="MyOutput.xml" style="MyTransform.xslt"> <param name="MyParameter" expression="ANT AND XSLT ROCK"/> </xslt> </target> </project> Here is a sample transform that takes a single input parameter: <?xml version="1.0" encoding="UTF-8"?> <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output method="xml" version="1.0" encoding="UTF-8" indent="yes"/> <xsl:param name="MyParameter"/> <xsl:template match="/"> <MyMessages> <MyMessage>Hello From XSLT</MyMessage> <MyMessage>From input: <xsl:value-of select="/root/Input"/> </MyMessage> <MyMessage> <xsl:value-of select="$MyParameter"/> </MyMessage> </MyMessages> </xsl:template> </xsl:stylesheet> This will create the following output: <?xml version="1.0" encoding="UTF-8"?> <MyMessages> <MyMessage>Hello From XSLT</MyMessage> <MyMessage>From input: Hi</MyMessage> <MyMessage>ANT AND XSLT ROCK</MyMessage> </MyMessages> Note that there are three different lines. One came from the transform file, one came from the input XML file and one was passed directly in from the ant file. Other ways to use XSLT within Apache Ant Checking dependencies By default, the XSLT task will check the file time stamps to see if the output file is newer than the input file. If the outputs are newer the task should not have to re-run the transform. But sometimes a transform will import other transforms files and Ant does not check the timestamps of imported files. (Perhaps they will add that as an option in the future.) But all is not lost. We can achieve the same results by using the <dependset> tag. Here is an example: <dependset> <srcfilelist dir="${XSLTDir}" files="Content2HTML.xsl, HTMLHeader.xsl,PageHeader.xsl,LeftNav.xsl,PageFooter.xsl"/> <targetfileset dir="${BuildDir}" includes="*.htm"/> </dependset> In the above example the source transform (Content2HTML.xsl) imported the other four page fragment transforms located in the XSLTDir (HTMLHeader.xsl, PageHeader.xsl, LeftNav.xsl and PageFooter.xsl). It created the files in the BuildDir directory. If any of the inputs files change, the outputs will be regenerated. This is a handy way to build a little ant-based web content management system. You just put the HTML content in a directory and the transform can wrap the HTML headers, navigation bars and footers around your content. The HTML for each page can just be a <div> section that is copied into the output using the <xsl:copy-of> command. References Apache Ant XSLT command http://ant.apache.org/manual/Tasks/xslt.html Running Saxon Motivation You want to have an Apache Ant task that runs the Saxon XSLT transform. Method Download the Saxon jar file. Put the saxon.jar file in a lib folder. Run the following test. Source Code Build File The following is how Saxon is invoked from Apache Ant. <target name="test-saxon"> <xslt classpath="lib\saxon8.jar" in="in.xml" out="out.html" style="check-version.xsl"> <factory name="net.sf.saxon.TransformerFactoryImpl"/> </xslt> </target> Note that if you are running in Eclipse you will have to go to the "Preferences" menu and add the saxon9.jar file to Ant/Runtime/Ant Home Entries. Just click the "Add JARs" and add the saxon9jar file the end of this list. XSLT Version Check check-version.xsl: <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:output omit-xml-declaration="yes" indent="yes"/> <xsl:template match="/"> <results> <Version><xsl:value-of select="system-property('xsl:version')" /></Version> <Vendor><xsl:value-of select="system-property('xsl:vendor')" /></Vendor> <Vendor-URL><xsl:value-of select="system-property('xsl:vendor-url')" /></Vendor-URL> </results> </xsl:template> </xsl:stylesheet> Or if you are generating a web page: <xsl:stylesheet version="1.0" xmlns:xsl="http://www.w3.org/1999/XSL/Transform"> <xsl:template match="/"> <html> <head> <title>XSL Version</title> </head> <body> <p>Version: <xsl:value-of select="system-property('xsl:version')" /> <br /> Vendor: <xsl:value-of select="system-property('xsl:vendor')" /> <br /> Vendor URL: <xsl:value-of select="system-property('xsl:vendor-url')" /> </p> </body> </html> </xsl:template> </xsl:stylesheet> Results for XALAN Results for Apache XALAN 1.0 Vendor: Apache Software Foundation (Xalan XSLT) Vendor URL: http://xml.apache.org/xalan-j Results for Saxon Version: 2.0 Vendor: SAXON 9.1.0.7 from Saxonica Vendor URL: http://www.saxonica.com/ Passing Parameters to XSLT Motivation You want to call a transform with a set of parameters. You want to be able to set these parameters from a build file. Build File Target <!-- sample target to demonstrate the use of passing parameters from an ant file to a XSL tranform --> <target name="Parameterized XSLT Test"> <echo>Running conditional XSLT test</echo> <xslt in="null.xml" out="tmp/param-output.xhtml" style="xslt/TransformWithParametersTest.xsl"> <factory name="net.sf.saxon.TransformerFactoryImpl"/> <param name="Parameter1" expression="true"/> <param name="Parameter2" expression="Hello World"/> <param name="Parameter3" expression="1234567"/> </xslt> <concat> <fileset dir="tmp" file="param-output.xml"/> </concat> </target> Input null.xml XSLT must have an input, but this example does not use it. <root/> XSLT <?xml version="1.0" encoding="UTF-8"?> <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" xmlns:xs="http://www.w3.org/2001/XMLSchema" version="2.0"> <xsl:param name="Parameter1" select="true()" as="xs:boolean"/> <xsl:param name="Parameter2" required="yes" as="xs:string"/> <xsl:param name="Parameter3" required="yes" as="xs:integer"/> <xsl:output method="xhtml" omit-xml-declaration="yes"/> <xsl:template match="/"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>Test of Passing Three Parameters (boolean, string, integer)</title> </head> <body> <h1>Test of Passing Three Parameters (boolean, string, integer)</h1> <p>The following parameters have been set by the Apache Ant build file.</p> <ul> <li><b>Parameter1: </b><xsl:value-of select="$Parameter1"/> </li> <li><b>Parameter2: </b><xsl:value-of select="$Parameter2"/> </li> <li><b>Parameter3: </b><xsl:value-of select="$Parameter3"/> </li> </ul> </body> </html> </xsl:template> </xsl:stylesheet> XQuery Motivation You want to transform an XML document with XQuery using an ant task. Method We will use the Saxon library to demonstrate this. Steps: Download the Saxon library from Sourceforge Download a sample XQuery from the samples (for example tour.xq from the samples area) Copy the Saxon jar file into your project. In the example below just a single jar file is copied into the location saxonhe9-2-0-6j/saxon9he.jar Sample Ant Target This sample uses the java task to run an XQuery program using the Saxon Java library. In the example below the XQuery tour.xq is executed and the output is copied into the file output.html. Note that the starting point is set by passing the arg as a parameter to the XQuery. <target name="run-saxon-xquery"> <java classname="net.sf.saxon.Query" output="output.html"> <arg value="tour.xq"/> <classpath> <pathelement location="saxonhe9-2-0-6j/saxon9he.jar"/> </classpath> <arg value="start=e5"/> </java> <!-- On Windows, this will open FireFox after the Transform is done --> <exec command="C:\Program Files\Mozilla Firefox\firefox.exe C:\ws\Saxon-Test\output.html"/> </target> Converting Excel to XML Motivation You want to automatically extract a well-formed XML file from a binary Excel document. Method We will us the java Ant task within a build target. Input File We will create a sample Microsoft Excel file that has two columns like the following: Save this into a file 'sample.xls'. Next, download the Apache Tika jar file and put is on your local hard drive. You can get the downloads from here: http://tika.apache.org/download.html the Main Tika jar file is about 27MB. I put the tika jar file in D:\Apps\tika but you can change this. Create a file called "build.xml" Sources <project name="extract-xml-from-xsl" default="extract-xml-from-xsl"> <description>Sample Extract XML from Excel xsl file with Apache Tika</description> <property name="lib.dir" value="D:\Apps\tika"/> <property name="input-file" value="sample.xls"/> <target name="extract-xml-from-xsl"> <echo message="Extracting XML from Excel file: ${input-file}"/> <java jar="${lib.dir}/tika-app-1.3.jar" fork="true" failonerror="true" maxmemory="128m" input="${input-file}" output="sample.xml"> <arg value="-x" /> </java> </target> </project> The <java> task will run tika. The argument "-x" (for XML will extract the XML from the input. Other command line options are listed here: http://tika.apache.org/1.3/gettingstarted.html Now open your DOS or UNIX shell and cd into the place with your build file. Type "ant" into a command shell. Run $ ant Buildfile: D:\ws\doc-gen\trunk\build\tika\build.xml extract-xml-from-xsl: [echo] Extracting XML from Excel file: sample.xls BUILD SUCCESSFUL Total time: 1 second Sample Output Note that the output is a well formed HTML file with a table in it: <html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta name="meta:last-author" content="Dan" /> <meta name="meta:creation-date" content="2013-03-04T17:20:19Z" /> <meta name="dcterms:modified" content="2013-03-04T17:22:01Z" /> <meta name="meta:save-date" content="2013-03-04T17:22:01Z" /> <meta name="Last-Author" content="Dan" /> <meta name="Application-Name" content="Microsoft Excel" /> <meta name="dc:creator" content="Dan" /> <meta name="Last-Modified" content="2013-03-04T17:22:01Z" /> <meta name="Author" content="Dan" /> <meta name="dcterms:created" content="2013-03-04T17:20:19Z" /> <meta name="date" content="2013-03-04T17:22:01Z" /> <meta name="modified" content="2013-03-04T17:22:01Z" /> <meta name="creator" content="Dan" /> <meta name="Creation-Date" content="2013-03-04T17:20:19Z" /> <meta name="meta:author" content="Dan" /> <meta name="extended-properties:Application" content="Microsoft Excel" /> <meta name="Content-Type" content="application/vnd.ms-excel" /> <meta name="Last-Save-Date" content="2013-03-04T17:22:01Z" /> <title></title> </head> <body> <div class="page"><h1>Sheet1</h1> <table> <tbody> <tr> <td>Name</td> <td>Phone</td> </tr> <tr> <td>Peg</td> <td>123</td> </tr> <tr> <td>Dan</td> <td>456</td> </tr> <tr> <td>John</td> <td>789</td> </tr> <tr> <td>Sue</td> <td>912</td> </tr> </tbody> </table> </div> </html> Cleaning up HTML Motivation We want to clean up HTML that is not well formed. We will use the Apache Tika tools to convert dirty HTML to well-formed XHTML. Sample Ant File <project name="tika tests" default="extract-xhtml-from-html"> <description>Sample invocations of Apache Tika</description> <property name="lib.dir" value="../lib"/> <property name="input-dirty-html-file" value="input-dirty.html"/> <property name="output-clean-xhtml-file" value="output-clean.xhtml"/> <target name="extract-xhtml-from-html"> <echo message="Cleaning up dirty HTML file: ${input-dirty-html-file} to ${output-clean-xhtml-file}"/> <java jar="${lib.dir}/tika-app-1.3.jar" fork="true" failonerror="true" maxmemory="128m" input="${input-dirty-html-file}" output="${output-clean-xhtml-file}"> <arg value="-x" /> </java> </target> </project> Sample Input <html xmlns="http://www.w3.org/1999/xhtml"> <head> <title>Dirty HTML</title> </head> <body> <p><b>test</b></p> <p><b>test<b></p> <p>test<br/>test</p> <p>test<br>test<br>test</p> <p>This is <B>bold, <I>bold italic, </b>italic, </i>normal text</p> </body> </html> Sample Output <?xml version="1.0" encoding="UTF-8"?><html xmlns="http://www.w3.org/1999/xhtml"> <head> <meta name="Content-Encoding" content="ISO-8859-1"/> <meta name="Content-Type" content="application/xhtml+xml"/> <meta name="dc:title" content="Dirty HTML"/> <title>Dirty HTML</title> </head> <body> <p>test</p> <p>test</p> <p>test test</p> <p>test test test</p> <p>This is bold, bold italic, italic, normal text</p> </body></html> Converting PDF to XML Apache Ant Project to Extract Text From PDF <project name="extract-text-from-pdf" default="extract-text-from-pdf"> <description>Sample invocations of Apache Tika</description> <property name="lib.dir" value="../lib"/> <property name="input-pdf-file" value="myDocument.pdf"/> <property name="output-clean-xhtml-file" value="output-clean.xhtml"/> <target name="extract-text-from-pdf"> <echo message="Extracting XML from PDF: ${input-pdf-file} to ${output-clean-xhtml-file}"/> <java jar="${lib.dir}/tika-app-1.3.jar" fork="true" failonerror="true" maxmemory="128m" input="${input-pdf-file}" output="${output-clean-xhtml-file}"> <arg value="-x" /> </java> </target> </project> Store XML data Motivation You want to upload a file or a hierarchy of files into eXist. Method We will use the xdb:store function and demonstrate how to use its options to load subfolders. Sample Code Each build file must have four key components a reference to internal files on your hard drive (ideally in a properties file) a typedef for your Ant eXist extensions a path to tell it where to get the jar files a target to do the load <project xmlns:xdb="http://exist-db.org/ant" default="upload-collection-to-exist"> <!-- This is where I put my copy of the eXist trunk code --> <!-- It is the result of a subversion checkout from https://exist.svn.sourceforge.net/svnroot/exist/trunk --> <property name="exist-home" value="C:\ws\exist-trunk"/> <!-- this tells us where to find the key jar files relative to the ${exist-home} property --> <path id="classpath.core"> <fileset dir="${exist-home}/lib/core"> <include name="*.jar"/> </fileset> <pathelement path="${exist-home}/exist.jar"/> <pathelement path="${exist-home}/exist-optional.jar"/> </path> <typedef resource="org/exist/ant/antlib.xml" uri="http://exist-db.org/ant"> <classpath refid="classpath.core"/> </typedef> <target name="upload-collection-to-exist"> <echo message="Loading Documents to eXist."/> <xdb:store uri="xmldb:exist://localhost:8080/xmlrpc/db/my-project" createcollection="true" createsubcollections="true" user="admin" password=""> <fileset dir="C:\ws\my-project\trunk\db\my-project"> <include name="**/*.*"/> </fileset> </xdb:store> </target> </project> Using a local.properties File to Load XML Data The script above will work fine if you have a single use with one set of local files. But if you have many user each user may put their local files in a different location. If that is the case then you will want to isolate all local file references in a file called local.properties. The following example is from the eXist documentation project for a server running on port 8080 with the context being set to be "/": # Local Property file for eXist documentation project # # this file is loaded into the build.xml file using the <property file="local.properties"/> # it contains any local references to your # Properties on a Windows system exist-home=C:\\ws\\exist-trunk exist-docs=C:\\ws\\exist-docs user=admin password= uri=xmldb:exist://localhost:8080/xmlrpc/db/apps/exist-docs <project xmlns:xdb="http://exist-db.org/ant" default="upload-exist-docs-app" name="eXist Load Example"> <!-- this is where we set our exist-home, user, password and the place that we will load the docs --> <property file="local.properties"/> <!-- this tells us where to find the key jar files relative to the ${exist-home} property --> <path id="classpath.core"> <fileset dir="${exist-home}/lib/core"> <include name="*.jar"/> </fileset> <pathelement path="${exist-home}/exist.jar"/> <pathelement path="${exist-home}/exist-optional.jar"/> </path> <typedef resource="org/exist/ant/antlib.xml" uri="http://exist-db.org/ant"> <classpath refid="classpath.core"/> </typedef> <!-- upload app --> <target name="upload-exist-docs-app"> <echo message="Loading eXist documentation system to eXist."/> <xdb:store uri="${uri}" createcollection="true" createsubcollections="true" user="admin" password=""> <fileset dir="${exist-docs}"> <include name="**/*.*"/> </fileset> </xdb:store> </target> <target name="show-properties"> <echo message="exist-home=${exist-home}"/> <echo message="exist-docs=${exist-docs}"/> <echo message="uri=${uri}"/> </target> </project> References The eXist store task is documented here: http://exist-db.org/exist/apps/doc/ant-tasks.xml#D2.2.10 Reindex a Collection Motivation You want a simple ant task that will reindex a collection. Method We will us the ant task that will call an XQuery that has the reindex() command in it. Because there is no ant task that does this we will use the xquery task to execute a remote XQuery that performs this task. Here is a link to the ant task to run an XQuery http://exist-db.org/ant-tasks.html#N1041F Call a remote XQuery by file name <target name="reindex-collection"> <xdb:xquery user="${user}" password="${password}" uri="${test-server}$(collection)" query="reindex.xq" outputproperty="result"> </xdb:xquery> <echo message="Result = ${result}"/> </target> Supply the Body of an XQuery <target name="inline-query"> <xdb:xquery uri="${test-server}/db" user="${user}" password="${password}" outputproperty="result"> reindex('/db/mycollection') </xdb:xquery> <!-- note, this only returns a SINGLE line --> <echo message="Result = ${result}"/> </target> Execute an XQuery Motivation You want to execute an XQuery that is stored in an eXist database. Remote execution of an inline query <target name="run-one-inline-test-local"> <description>Execute a single xUnit test on a local system</description> <echo message="Run an inline XQuery"/> <xdb:xquery uri="xmldb:exist://localhost/xmlrpc/db" user="${user}" password="${password}" outputproperty="result"> xquery version "1.0"; let $message := 'Hello World!' return $message </xdb:xquery> <echo message="Result = ${result}"/> </target> Note that you only can return a string in this example. Any XML content in the query will generate an error. If you want to return an XML file into a property you will need to wrap you query in a CDATA structure: <!-- This version uses CDATA to put an XML file into the result property --> <target name="run-xquery-cdata"> <xdb:xquery user="admin" password="" uri="${test-server}/db" outputproperty="result"><![CDATA[ xquery version "1.0"; let $message := 'Hello World' return <result>{$message}</result> ]]></xdb:xquery> <echo message="Result = ${result}"/> </target> Execute an XQuery Stored in Local Drive hello-world.xq: xquery version "1.0"; let $message := 'Hello World' return <result>{$message}</result> This is similar to the version above but you will note that the queryfile attribute has been added. <target name="run-in-database-query" depends="load-test-resources"> <xdb:xquery user="${user}" password="${password}" uri="xmldb:exist://localhost/xmlrpc/db" queryfile="hello-world.xq" outputproperty="result"/> <echo message="Result = ${result}"/> </target> Note for the above to work the file hello-word.xq MUST be in the same directory as the build script. Adding Execute Permissions <target name="add-execute"> <!-- make the controller.xql file executable --> <xdb:chmod uri="${local-uri}/apps/myapp" resource="controller.xql" permissions="group=+execute,other=+execute"/> </target> Where the local-uri is something like: xmldb:exist://localhost:8080/exist/xmlrpc/db for the default installation path Creating a .xar file Motivation This example is under development! You want to create an XML archive file (.xar file) directly from your source code that can be used to load library modules or applications into a native XML database. This makes it much easier for users to install your module or application. The packaging process does all the work of uploading your files into the correct location on a running eXist server and also sets all the permissions of the XQuery files (.xq) for you automatically. Method We need to create a "zip" file with all the right components in it. The format of the package is here: http://expath.org/spec/pkg The eXist-specific package documentation is here: http://demo.exist-db.org/exist/apps/doc/repo.xml GUI Package vs. On-Disk Library vs. In DB Library There are three types of installation packages: A external library that is not in the database A library that is loaded into the database A full application with a GUI For all library apps without GUI but deployed into db you must use two attributes, one for the target the type="library" use the following structure: target="some /db path" + type="library" For a simple XQuery library package, which only needs to be registered with eXist but not deployed within the exist database the target attribute should not be used. no target + type="library" Sample Package Structure The archive must contain two XML descriptor files in the root directory: expath-pkg.xml and repo.xml Sample expath-pkg.xml file <package xmlns="http://expath.org/ns/pkg" name="http://example.com/apps/myapp" abbrev="myapp" version="0.1" spec="1.0"> <title>My Cool Application</title> <dependency package="http://exist-db.org/apps/xsltforms"/> </package> Note that the file name and the string in the namespace are "pkg" but the element name and the attribute in the dependency are "package". Make sure to keep these clear. The format of this XML file is describe in the EXPath documentation. Sample repo.xml file that contains instructions for the eXist-specific packaging <meta xmlns="http://exist-db.org/xquery/repo"> <description>My eXist application</description> <author>Dan McCreary</author> <website>http://danmccreary.com</website> <status>alpha</status> <license>GNU-LGPL</license> <copyright>true</copyright> <!-- set this to "application" (without quotes) for system that have a GUI --> <type>application</type> <target>myapp</target> <prepare>pre-install.xql</prepare> <finish>post-install.xql</finish> <permissions user="admin" password="" group="dba" mode="rw-rw-r--"/> <!-- this element is automatically added by the deployment tool --> <deployed>2012-11-28T23:15:39.646+01:00</deployed> </meta> Sample Apache Ant Target to Generate an Application .xar file This ant target needs the following inputs: source-dir - the place you keep your source code package-dir - a temp dir such as /tmp/my-package to store temporary files app-name - the name of your application app-version - the version of your application verify that repo.xml and expath-package.xml exist in the source dir and copy them into temp.dir copy all application files temp.dir create zip file from contents of temp.dir in the packages area and upload it to repositories if needed <target name="generate-app-xar" description="Generate Application xar archive file"> <echo>Making Package for ${app-name} use source from ${source-dir}</echo> <zip destfile="${package-dir}/${app-name}-${app-version}.xar"> <fileset dir="${source-dir}"> <include name="**/*.*" /> <exclude name="**/.svn" /> </fileset> </zip> <echo>Package is stored at ${package-dir}/${app-name}-${app-version}.xar</echo> </target> Sample Apache Ant Target to Generate a Library .xar file This script depends on the following Ant properties: ant.project.name - the name of the project xslt.dir - the directory that the XSLT script are stored temp.dir - a temp dir such as /tmp to store temporary files web.specs.dir - the place to put the results <target name="generate-xar" description="Generate xar archive"> <echo>Making ${ant.project.name}.xar...</echo> <!-- run a transform in the input specification file to create the a.xml file --> <xslt force="true" style="${xslt.dir}/generate-xar-descriptors.xsl" in="${web.specs.dir}/${ant.project.name}/${ant.project.name}.xml" out="${temp.dir}/files/a.xml"> <param name="module-version" expression="${module-version}" /> <param name="eXist-main-class-name" expression="${eXist-main-class-name}" /> </xslt> <delete file="${temp.dir}/files/a.xml" /> <!-- now create the .xar file with all our files in the right place --> <zip destfile="${temp.dir}/archives/${ant.project.name}-${module-version}.xar"> <fileset dir="${temp.dir}/files"> <include name="**/*.*" /> <exclude name="*-tests.jar" /> </fileset> </zip> </target> Sample XSLT Script <xsl:stylesheet xmlns:xsl="http://www.w3.org/1999/XSL/Transform" version="2.0"> <xsl:output method="xml" /> <xsl:param name="module-version" /> <xsl:param name="eXist-main-class-name" /> <xsl:template match="/"> <xsl:variable name="module-namespace"> <xsl:copy-of select="//element()[@id = 'module-namespace']" /> </xsl:variable> <xsl:variable name="module-prefix"> <xsl:copy-of select="//element()[@id = 'module-prefix']" /> </xsl:variable> <xsl:variable name="spec-title"> <xsl:copy-of select="concat('EXPath ', //element()[local-name() = 'title'])" /> </xsl:variable> <xsl:variable name="author"> <xsl:copy-of select="//element()[local-name() = 'author'][1]/element()[1]" /> </xsl:variable> <xsl:result-document href="target/files/expath-pkg.xml"> <package xmlns="http://expath.org/ns/pkg" name="http://expath.org/lib/{$module-prefix}" abbrev="{concat('expath-', $module-prefix)}" version="{$module-version}" spec="1.0"> <title> <xsl:value-of select="$spec-title" /> </title> <dependency processor="http://exist-db.org/" /> </package> </xsl:result-document> <xsl:result-document href="target/files/repo.xml"> <meta xmlns="http://exist-db.org/xquery/repo"> <description> <xsl:value-of select="$spec-title" /> </description> <author> <xsl:value-of select="$author" /> </author> <website /> <status>stable</status> <license>GNU-LGPL</license> <copyright>true</copyright> <type>library</type> </meta> </xsl:result-document> <xsl:result-document href="target/files/exist.xml"> <package xmlns="http://exist-db.org/ns/expath-pkg"> <jar> <xsl:value-of select="concat('expath-', $module-prefix, '.jar')" /> </jar> <java> <namespace> <xsl:value-of select="$module-namespace" /> </namespace> <class> <xsl:value-of select="concat('org.expath.exist.', $eXist-main-class-name)" /> </class> </java> </package> </xsl:result-document> <xsl:result-document href="target/files/cxan.xml"> <package xmlns="http://cxan.org/ns/package" id="{concat('expath-', $module-prefix, '-exist')}" name="http://expath.org/lib/{$module-prefix}" version="{$module-version}"> <author id="{$author/element()/@id}"> <xsl:value-of select="$author" /> </author> <category id="libs">Libraries</category> <category id="exist">eXist extensions</category> <tag> <xsl:value-of select="$module-prefix" /> </tag> <tag>expath</tag> <tag>library</tag> <tag>exist</tag> </package> </xsl:result-document> </xsl:template> </xsl:stylesheet> Sample XQuery Script Acknowledgements The Apache Ant target and the XSLT script were provided by Claudius Teodorescu. References References Links ant.apache.org Manual Wikipedia.org Books Ant: The Definitive Guide, 2nd Edition by Holzner Steve (April 14, 2005) Pro Apache Ant by Matthew Moodie (Nov 16, 2005) Java Development with Ant by Erik Hatcher and Steve Loughran (Aug 2002) Ant Developer's Handbook by Allan Williamson, et al. (Nov 1, 2002) Articles Top 15 Ant Best Practices <|fim▁end|> | despite trying to change MyProperty to |
<|fim▁begin|> Contents | Previous | Next Contents 1 3 Variables 1.1 3.1 Assignment 1.2 3.2 User Input 1.3 3.3 Variable Rules 1.4 3.4 Case Sensitivity 3 Variables 3.1 Assignment OK, let's get back to coding. Where were we? Ah, yes. We explained data types such as integers and strings. But would it be cool if we could store data in some way, after your computer already stored data in files on a hard disk, on memory, online, etc. Data changes all the time, so storage is a must. Programming languages store data in variables. Let's see this example. a = 12 b = "I have" c = "ideas" print(b+" "+str(a)+" "+c) OK, let's take this step by step. On the first line, we define a variable called “a”, and we store inside it the 12, an int value. Assigning variables is that easy. You basically provide the name, equal sign, and a value. On the second line, we define a variable called “b”, stored inside "I have", a str value. Last but not least, the third line defines “c”, is assigned "ideas", another str value. The next line takes a bit of explaining, but is easy to figure it out. It's a print function. It's a function because it has a name, a parameter, and opening and closing parentheses. The “+” is used as an operator to unite the strings. A variable can be of any type, but as I said, Python does not like it when you mix different types because our print function only takes string values. If we just let it be “+a”, it would complain with an error because it is an integer (int value). What we need to do is convert variable “a”'s value to a string. Since we can use int() and float() to convert a type to an integer or float, we should be able to convert a type to a string by using str(). Therefore, the function str() is used with the parameter “a”. Notice that we used +" " as part of the parameter of the print function to type spaces between the strings. We could have as well included those spaces in the strings when we assigned the variables. The beauty of coding is that it allows us to be flexible. 3.2 User Input A program that does not interact with a user is not a very useful program. What if we could communicate with the user in some way? We can, using the input() function. Make sure you have your OS terminal / console open before running this code or it may freeze Blender. name = input("What's your name?") print("Hello "+name+". My name is Python, nice to meet you." ) (Note by contributer 9-1-2012: Sample code crashes with “NameError: name 'John' is not defined”) This code will freeze Blender, but don't worry, the code won't harm it; actually, it freezes because it's waiting for an input. Switch to the terminal/console window and it will display the line "What's your name?". Go ahead and type your name and hit enter. If you typed John, it will print "Hello John. My name is Python, nice to meet you". Isn't Python fun?! As you can see, we assign the output of the function input() to a variable. Functions can take input with parameters and can output data with returning types. In this case, it returns data type 'str', and to be precise, a string with the name we input. From there on we just unite the name variable with the 2 other strings to form <|fim▁hole|> following code: number1 = int(input("Give me the first number : ")) number2 = int(input("Give me the second number : ")) print( "If I add " + str(number1) + " and "+str(number2)+" it equals to "+str(number1+number2)) Don't let this give you a complex; it's still easy to understand. The first thing you observe is that it is possible for a function to take another function as a parameter. What we did in line 1 and 2 is that we take input from the user and convert it into integer, remembering that input returns only strings. Then in the print function, we reconvert the variables to strings in order to unite them in one string. After that, we add variable number1 and number2 together. The result is converted to a string, which is then united to the final string. There is another way of doing this, shown below: number1 = input("Give me the first number : ") number2 = input("Give me the second number : ") print( "If I add %s and %s it equals to %d" %(number1 ,number2, int(number1)+int(number2))) So this is doing the exact same thing, it only does it differently. The “%s” inside our string is not actually part of string. It only tells print that it should place a string here, which is defined inside %(). So the first %s places the string value of number1 the second %s places the string value of number2. However, %d places an integer which is the result of converting number1 variable and number2 variable to integers and then adding them together. As you see, with this way we don't have to convert our variables except only when we add them together. This process is called string formatting. It is useful for when you do many conversions between different types and want to join everything in a single string. What you use is up to you. Want to learn more about string formatting? Then go here. 3.3 Variable Rules There are some rules to be followed for variables. First, when you name them, you are allowed to use numbers inside but the name of the variable must start with a letter. Below is what NOT to do: 123 = 3 Do not do this either: 123b = 3 Don't put spaces in variable names: number 1= 3 You can do this though: number_1= 3 Oddly enough, you also can do this, because it's possible to give a variable a different value at any time: number_1= 3 number_1 = 4 Variables can also be assigned values contained in other variables. The final value of the variable in this case will be 4. number_1= 3 number_2 = 4 number_1 = number_2 However, if we do this, again the final value of number_1 will be 4. Why is this? Because the variable change of number_2 doesn't change the value of number_1 after assignment. number_1= 3 number_2 = 4 number_1 = number_2 number_2 =10 3.4 Case Sensitivity Another extremely important rule that applies to everything in Python is case sensitivity. Case sensitivity is the capitalization of letters. For example, Var1 and var1 are two different variables. That means that capitalization matters A LOT. Many programmers use it for naming. MyFirstVariable is, of course, different from myfirstvariable or mYfirsTvariable, etc. Personally, I don't use capitalization to name anything I define or assign. I prefer the use of underscores, but it's completely up to you. Bare in mind that capitalization applies to everything inside Python, so you need to be careful how you type your commands. Contents | Previous | Next <|fim▁end|> | the final print. Let's try the |
<|fim▁begin|> Contents 1 Am I Ready? 2 Introduction 3 Background 4 Determining Kindergarten Readiness: Age or Skills 5 Determining Kindergarten Readiness: What qualities must a student have to be ready? 6 Determining Kindergarten Readiness: Parents or Educators 7 What needs to be done to help ensure all children are ready for kindergarten? 8 Conclusion 9 Works Cited 10 Multiple Choice Questions 11 Essay Question 12 Multiple Choice Answers 13 Essay Question Sample Answer Am I Ready? A Glance into What Kindergarten Readiness Really Means Introduction Getting ready to start school can be a stressful experience for any student, but it can be even more stressful for kindergarteners going for the first time! Likewise, parents and educators are burdened with the responsibility of deciding if the student is ready for kindergarten or not. The issue of kindergarten readiness has always been an issue; now, it is receiving more focus than ever. Some of the issues surrounding kindergarten readiness include: what determines if a student is ready (should it be age or other skills), what qualities must a student already possess before entering kindergarten, and who should get to make the discussion of whether or not a student is ready to attend—parents or educators? These and other issues surrounding kindergarten readiness will be expressed in the following article. Background Kindergarten is not the same as it was a few years ago. It used to be used as a way to transition children into the regular routine of school to acquire the necessary social skills for the future. Now it is full of academics. If a student is lacking certain knowledge at the beginning of kindergarten, he or she is already behind. Who knew a student could already be behind at the beginning of kindergarten? With academics overriding social skills, kindergarten can seem very foreign to many parents (Plevyak & Morris, 2002, pp. 23–26). The shift is enormous. Moreover, kindergarten has become an “integral part of the elementary school’s curriculum,” which is mainly cognitive or academic in approach (Nurss, 1987). All the fun and excitement about going to kindergarten seems to be being overrun by pressures for success. Students are going to have at least twelve more years to deal with hardcore academic pressures; kindergarten is not where it should start. Furthermore, parents are their children’s first teacher and need to be aware of the presence of academics in their child’s kindergarten class to help them be better prepared (Hodges, 2000). Educators need to provide parents with the knowledge of what is expected as the students enter and what will be expected as the students continue throughout kindergarten. Working together is key! Determining Kindergarten Readiness: Age or Skills Now, lets address several key factors that affect kindergarten readiness. Today, most schools use age as the ultimate factor of whether or not a child can go to kindergarten (Saluja, Scott-Little, & Clifford, 2000). For the most part, children have to be five years old by a certain date. The dates for this cut-off vary widely, but can range from summer to December. Researchers and teachers feel that a child’s chronological age should not be the only factor, and that previous experience in a school setting is a better readiness predictor (Nurss, 1987 and Hodges, 2000). Since every child is different, age alone does not seem that it can absolutely define a child’s readiness. Children need to be looked at as a whole. Everything about the child needs to be ready for school, since this will be their first experience with school. Likewise, there is so much variety of development that can be achieved for children between the ages of four and seven, that age seems to be very irrelevant (Dixon, 2007). The school systems need to do away with age as the sole entrance requirement. Schools need to acknowledge that kindergarten is more than just being old enough. Students are immersed into very academic and unfamiliar environments. Students need to be ready “physically, socially, and cognitively” and this takes time (www.parentcenter.babycenter.com, 2007). Rushing children into situations they are not developmentally ready for will lead to failures and unnecessary stress for both parents and children. Waiting for children to grasp certain social skills, for example, will better help them get along with other classmates and feel more successful. Determining Kindergarten Readiness: What qualities must a student have to be ready? Another factor that goes into deciding if a child is ready for kindergarten is what skills or qualities the child already has? Is the child able to communicate his or her needs and wants? Can the child follow simple directions? These are some simple, but important skills that a child should possess prior to entrance into kindergarten. Parents and educators seem to disagree on what the most important qualities a child should have acquired. Parents focus on “pre-academic skills” while educators focus on “the child’s enthusiasm, effective communication, and appropriate behaviors” as most important (Protheroe, 2006, pp. 32–36). If parents and educators cannot agree, how is a child going to be ready? Parents and educators should work together to come up with objectives or standards of qualities that children should have before kindergarten. This would help parents give their children a boost. Some of the other qualities that most agree are critical to kindergarten readiness include: the child’s physical development, whether or not they can work cooperatively, as well as independently, and if they have an attention span of at least 15 to 20 minutes (Dixon, 2007 and Nurss, 1987). These are just a few of the qualities that most teachers are looking for on the first day of kindergarten, but most of all they want children who are ready to learn. Determining Kindergarten Readiness: Parents or Educators Lastly, who should get to make the decision of whether or not a child is ready for kindergarten, their parent or educators? This is a tough question to answer. Educators have the experience and knowledge about children, but parents know their child better than anyone (www.parentcenter.babycenter.com, 2007). The decision should be made with as much collaboration between the two groups as possible. Parents need to be aware of what the expectations are of the school their child will be attending and this could alleviate some of the mystery (Hodges, 2000). Awareness is critical to helping a child be ready. Schools need to do more to get their expectations across to parents in order to best serve future students. Working <|fim▁hole|> seems to be the best solution. What needs to be done to help ensure all children are ready for kindergarten? Ensuring that all children are ready for kindergarten needs to be the responsibility of society. This may seem like a burden to those without children, but research shows that those students who do better and have more fulfilling experiences in early preschool and elementary grades are not as costly on society in the future (Lynch, 2004/2005, pp. 26–35). In turn, this benefits everyone. Some suggestions on how to make kindergarten readiness obtainable for all children is to make preschool available for all children. Even if children’s families can not afford preschool, the states need to have funds available to provide them with quality preschools. Secondly, parents need to be made aware of what expectations their children will have in the kindergarten they will be attending. Parents need to be invited into the class a year or so before their child will attend, in order to see what is going on. Likewise, parents would be able to meet with teachers who can give them valuable information on activities they could do with their child (Protheroe, 2006, pp. 32–36). This could also help to make parents feel more comfortable with the transition to kindergarten for their child and possibly make them more active in their child’s school career. Lastly, preschool and kindergarten teachers need to come together and focus on solutions that they can do to ensure kindergarten readiness for all children (Fratt, 2005, pp. 31–33). Kindergarten teachers can explain to preschool teachers skills that are expected and these can be incorporated into the preschool curriculum. By working together, the students will definitely benefit. Conclusion Making sure children are ready for kindergarten is a task that should not be taken lightly. If a child is not meeting the expectations in the beginning of their school experience, they are going to be behind for the remainder of their school years. All of this leads to problems that possibly could have been avoided had a plan been in place. Whether age or skills are chosen as the sign of kindergarten readiness or parents or educators decide if it is the child’s right time, one thing is the same—all children deserve to be equipped with the proper tools so they will be able to learn whenever the time is right. “Childhood should be a journey, not a race.” By Unknown Works Cited Dixon, Suzanne. A Kindergarten Readiness Guide. www.us.pampers.com, 2007. Fratt, Lisa. Building Blocks. www.DistrictAdministration.com, 2005, 31-33. Hodges, Felicia. Is Your Child Ready for Kindergarten? www.preschoolerstoday.com, 2007. Lynch, Robert G. Preschool Pays. American Educator, 2004/2005, 26-35. Nurss, Joanne R. Readiness For Kindergarten. ERIC/EECE Digest, 1987. Plevyak, Linda H., & Morris, Kathy. Why is Kindergarten an Endangered Species? The Education Digest, 2002, 23-26. Protheroe, Nancy. Readiness for Kindergarten: What Schools Can Do. Principal, 2006, 32-36. Saluja, Gitanjali, Scott-Little, Catherine, & Clifford, Richard M. Readiness for School: A Survey of State Policies and Definitions. Early Childhood Research & Practice, 2000, 2 (2). www.parentcenter.babycenter.com, 2007. Multiple Choice Questions 1. In schools today, what is the main criterion for entrance into kindergarten? A. The achievement of certain skills. B. The child is age 5 by the cut-off date. C. The child is able to read. 2. Who focuses more on “pre-academic skills” when deciding what qualities a child should have before entering kindergarten? A. Parents B. Educators C. Both parent and educators 3. Kindergarten’s main focus today is on A. Learning social skills B. Learning how to behave C. Learning academic skills 4. What is NOT a solution on how to ensure all children are ready for kindergarten? A. Preschool and Kindergarten teachers need to work together to collaborate on curriculums. B. Parents need to be invited into kindergarten classrooms to get to understand expectations and to receive guidance to help their children. C. Preschool should remain voluntary. 5. What is the main theme of kindergarten readiness expressed in this article? A. Parents and educators working together is best to ensure kindergarten readiness for all children. B. Parents know their children best so they have all the say. C. Educators have the educational background to make the decision without other’s input Essay Question Does a student’s readiness for kindergarten really affect his or her overall school experience or can the skills be made up with extra focus during school? Explain your position with examples. Multiple Choice Answers 1. B 2. A 3. C 4. C 5. A Essay Question Sample Answer A student’s readiness for kindergarten really does affect his or her overall school experience. The degree of readiness that the child has achieved can be beneficial, as well as detrimental. If a child is ready in physical, cognitive, and academic areas he or she will do great. Having a positive first school experience will lead to a promising future during their school career. But, if the child is lagging in his or her social skills, for example, this will be a disadvantage for the child which will lead to a less exciting first school experience. This seems like a situation which could have been avoided with a little preparation. Moreover, if a student comes to kindergarten without the expectations that teachers have, the student will already be behind before even really beginning school. This could lead to feelings of failure and stress for the student. The teacher and student would have to play catch-up which research has shown will only really amount to an achievement gap between the students who are adequately prepared for kindergarten and those who are not. Likewise, the student never really is able to get to the levels that the other students who were ready are at. Lastly, when students have achieved kindergarten readiness, the teacher does not have to spend time helping them with remedial work and can then engage students in more in-depth activities, more hands-on activities, and cover more topics of interest of the students. The students will have more time to explore which can keep them from becoming bored which leads to behavior problems and less excitement about school. Parents, educators, and society need to come together to focus on the far-reaching effects that children who have obtained the necessary attributes to be considered ready for kindergarten can have. These qualities can lead to either positive or negative experiences for the students. Everyone will agree positive experiences are the goal! <|fim▁end|> | together in this tough decision |
<|fim▁begin|> PAPER 2 - ⇑ Fundamentals of databases ⇑ ← SELECT UPDATE INSERT → Database aren't always perfect and there may be times that we want to change the data inside our database. For example in Facebook if someone is annoying you and you limit their access to your profile, you'd update the access field from 'normal' to 'restricted'. Or if one of our crooks gets an additional scar you'd have to update the numScars field. Let's take a look at that example, where our crook Peter gains a scar on his right cheek. This was his initial state: name: Peter numScars: 7 UPDATE crooks SET numScars = 8 But we have a problem here, this statement updates all records to numScars = 8. This means that every crook will now have 8 scars! ID name gender DoB town numScars 1 Geoff male 12/05/1982 Hull 8 2 Jane female 05/08/1956 York 8 3 Keith <|fim▁hole|> male 22/08/1976 Blaxhall 8 5 Kelly female 11/11/1911 East Ham 8 6 Marea female 14/07/1940 Wythenshawe 8 We need to specify which crooks we want to update by using a WHERE clause, you saw it earlier in the SELECT example. UPDATE crooks SET numScars = 8 WHERE name = "Peter" --only updates those people who are called Peter Exercise: UPDATE statements Using the above data set, write an UPDATE statement to change Geoff's DoB to 17/12/1939 Answer: UPDATE crooks SET DoB = '17/12/1939' WHERE name = 'Geoff' All the crooks have moved to Canary Wharf, update the table to show this Answer: UPDATE crooks SET town = 'Canary Wharf' All the female crooks named Sheila have lied about their ages and they were all born on January 16, 1984 Answer: UPDATE crooks SET DoB = '16/01/1984' ---be careful with dates, they might be using American format WHERE name = 'Sheila' AND gender = 'Female' <|fim▁end|> | male 07/02/1999 Snape 8 4 Oliver |
<|fim▁begin|> Почта СССР CPA catalogue ← 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 → CPA Nr 3148-3303 (156 stamps) Here complete descriptions of 1965 USSR stamps are given. Здесь приведены полные описания почтовых марок СССР 1965 года. All available images of 1965 USSR stamps are on the Wikimedia Commons: Все имеющиеся изображения почтовых марок СССР 1965 года находятся на Викискладе: Stamps of the Soviet Union, 1965 You can also see standard images of 1965 USSR stamps on Wikimedia commons: Типовые изображения почтовых марок СССР 1965 года можно также посмотреть на Викискладе: Каталог ЦФА (3001-4000) Attention! The stamps are sorted by CPA (Central Philatelic Agency) catalog numbers, not by dates of their issue! Внимание! Марки отсортированы по номерам каталога ЦФА, а не по дате выпуска! The names of stamps and stamp series are made according to all used 7 catalogues[1][2][3][4][5][6][7]. Названия марок и серий марок составлены по всем используемым 7 каталогам. Names of articles of Wikipedia are whenever possible used in names of stamps and series. В названия марок и серий по возможности использованы названия статей Википедии. Short descriptions / Краткие описания C - Commemorative stamp (Коммеморативная марка) 1 1965.01.29 (Heroes of World War II) 1 Heroes of World War II (Heroes of World War II) Continuation of the series (CPA 2401-2402, 2547, 2591, 2663-2664, 2826-2827, 2828, 3002-3003, 3004-3005, 3148-3149, 3324-3326, 3462-3463, 3490, 3509, 3595-3597, 3727-3728, 3746, 3802, 3855-3856, 3976-3977) (33 stamps) 1. Герои Великой Отечественной войны. Продолжение серии # Vol. Short description <|fim▁hole|> Yvert #1965.1-1.1 C 4k World War II Hero Landing Seaman Ivan Sivko and Battle 3148 3065 3100 2862A (A1444) 3013 (cwh) 3085 (1137) 2911 #1965.2-1.2 C 4k World War II Twice Hero Major General of the Air force Ivan Polbin and Air-Sea Battle 3149 3066 3101 2862B (A1444) 3012 (cwg) 3086 2910 Sources / Источники ↑ Stamps of USSR. 1918-1980. 2 volums. Editor M. I. Spivak. / Каталог почтовых марок СССР. 1918-1980. В 2 томах. Ред. М. И. Спивак. М.: ЦФА "Союзпечать" Минсвязи СССР, 1983. ↑ Zagorsky, Valeriy. "Standard Collection". / Валерий Загорский. Стандарт-коллекция. http://standard-collection.ru/ru/catalogs/elektronnye-versii.html. Retrieved 2015-01-05. ↑ Liapine, Viktor. Catalog of stamps of Russia (1856-1991). 2008. / Ляпин Виктор. Каталог почтовых марок России (1856-1991). М.: Издатель И. В. Балабанов, 2008. ↑ Scott Standard Postage Stamp Catalogue. 2009. Volume 5 P-SL. Amos Press Inc., 2009. / Каталог Скотт за 2009 год. Том 5 P-SL. ↑ Michel. Europa-Katalog. Band 7. 2009/2010. Osteuropa. Schwaneberger Verlag GMBH, 2009. / Каталог Михель за 2009/2010 год. 7-я книга из 7 книг Европы. Представлена восточная Европа. ↑ Stanley Gibbons. Simplified Catalogue. Stamps of the World. 2006. Volume 4. Countries N-R. 71st Edition. Stanley Gibbons Ltd., 2005. / Стэнли Гиббонс. Упрощенный каталог. Марки мира. 2006. Том 4. Страны Н-Р. 71-я редакция. Stanley Gibbons Ltd., 2005. ↑ Yvert et Tellier. 1980. Tome 2. Timbres d'Europe. / Каталог "Ивер и Телье". 1980. Том 2. Почтовые марки Европы. Почта СССР CPA catalogue ← 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 → <|fim▁end|> | CPA SC Liapine Scott Michel SG |
<|fim▁begin|> < Gamespurge this page's server cache Board games Books on this shelf deal with board games, which use a custom playing surface and pieces. Completed books Category:Shelf:Board gamesCategory:Completed booksCategory:Book:Wikibooks Stacks/Shelves In subsections: Chess Chess Strategy Category:Shelf:Board games/all booksCategory:Completed booksCategory:Shelf:Board gamesCategory:Book:Wikibooks Stacks/Shelves Books nearing completion Allies vs. Axis Arimaa Scrabble Category:Shelf:Board gamesCategory:Books nearing completionCategory:Book:Wikibooks Stacks/Shelves In subsections: Category:Shelf:Board games/all booksCategory:Books nearing completionCategory:Shelf:Board gamesCategory:Book:Wikibooks Stacks/Shelves Half-finished books 5 in a Row Allies vs. Axis v1.0 Backgammon Monopoly Category:Shelf:Board gamesCategory:Half-finished booksCategory:Book:Wikibooks Stacks/Shelves In subsections: Chess Opening Theory Category:Shelf:Board games/all booksCategory:Half-finished booksCategory:Shelf:Board gamesCategory:Book:Wikibooks Stacks/Shelves <|fim▁hole|> Computer Go Diplomacy Go Reversi Category:Shelf:Board gamesCategory:Partly developed booksCategory:Book:Wikibooks Stacks/Shelves In subsections: Category:Shelf:Board games/all booksCategory:Partly developed booksCategory:Shelf:Board gamesCategory:Book:Wikibooks Stacks/Shelves Freshly started books Learning Arimaa Category:Shelf:Board gamesCategory:Freshly started booksCategory:Book:Wikibooks Stacks/Shelves In subsections: Chess Guide for the Intermediate Player Category:Shelf:Board games/all booksCategory:Freshly started booksCategory:Shelf:Board gamesCategory:Book:Wikibooks Stacks/Shelves Unknown completion Role Playing Games Category:Shelf:Board gamesCategory:Books by completion status/all booksCategory:Book:Wikibooks Stacks/Shelves In subsections: Shogi Opening Theory Top Tips For Chess Organisers Category:Shelf:Board games/all booksCategory:Shelf:Board gamesCategory:Books by completion status/all booksCategory:Book:Wikibooks Stacks/Shelves Subsections Shelf:Chess Shelf:Shogi Category:Shelf:Board gamesCategory:Book:Wikibooks Stacks/Shelves Featured Books Arimaa Chess Category:Shelf:Board games/all booksCategory:Featured booksCategory:Book:Wikibooks Stacks/Shelves <|fim▁end|> | Partly developed books Chinese Checkers |
<|fim▁begin|> Computing » Computer Science » Computer Programming » Ada Programming This language feature is only available from Ada 2005 on. Contents 1 Specification 2 See also 2.1 Wikibook 2.2 External examples 2.3 Ada Reference Manual 2.3.1 Ada 2005 2.3.2 Ada 2012 Ada.Strings.Wide_Wide_Bounded.Wide_Wide_Hash is a unit of the Predefined Language Environment since Ada 2005. This page is a stub. You can improve the Ada Programming wikibook by reading the contributing guidelines and expanding it. Specification -- Standard Ada library specification -- Copyright (c) 2003-2018 Maxim Reznik <reznikmm@gmail.com> -- Copyright (c) 2004-2016 AXE Consultants -- Copyright (c) 2004, 2005, 2006 <|fim▁hole|> 2000 The MITRE Corporation, Inc. -- Copyright (c) 1992, 1993, 1994, 1995 Intermetrics, Inc. -- SPDX-License-Identifier: BSD-3-Clause and LicenseRef-AdaReferenceManual -- ------------------------------------------------------------------------- .mw-parser-output .ada-kw{background:none;border:none;padding:0;margin:0;color:DodgerBlue;font-weight:bold}.mw-parser-output .ada-kw a,.mw-parser-output .ada-kw a:visited{color:inherit}with Ada.Containers; generic with package Bounded is new Ada.Strings.Wide_Wide_Bounded.Generic_Bounded_Length (<>); function Ada.Strings.Wide_Wide_Bounded.Wide_Wide_Hash (Key : in Wide_Wide_Bounded.Bounded_Wide_Wide_String) return Containers.Hash_Type; pragma Preelaborate (Wide_Wide_Hash); See also Wikibook Ada Programming/Libraries/Ada External examples[edit source] Search for examples of Ada.Strings.Wide_Wide_Bounded.Wide_Wide_Hash in: Rosetta Code, GitHub or this Wikibook. Search for any post related to Ada.Strings.Wide_Wide_Bounded.Wide_Wide_Hash in: Stack Overflow, comp.lang.ada or any Ada related page. Ada Reference Manual Ada 2005 A.4.8: Wide_Wide_String Handling (Annotated) Ada 2012 A.4.8: Wide_Wide_String Handling (Annotated) <|fim▁end|> | Ada-Europe -- Copyright (c) |
<|fim▁begin|> (Work In Progress) In the previous section, we implemented a basic working portal system. One annoying issue is the flicker we experience when passing the portal. Let's see how to fix it. Contents 1 The issue 2 The fix 2.1 Modifying zNear 2.2 Drawing the volumetric portal The issue The camera frustum To understand the flicker, we need to understand how the OpenGL camera works. When we position the camera using its transformation matrix, we do not really position the screen itself. As we can see on the figure, the OpenGL camera is a truncated pyramid (a frustum, in maths slang). We defined it with glm::perspective when setting the Projection matrix in the onIdle function: // Projection glm::mat4 camera2screen = glm::perspective( 45.0f, // FOVy 1.0f*screen_width/screen_height, // aspect ratio 0.1f, // zNear 100.0f // zFar ); The perspective matrix takes all objects between zNear and zFar, and project them on the near clipping plane. It does not display at all what is between the camera position and the near clipping plane. The flicker happens when the camera is at a distance less than zNear to the portal: in that case the camera position is before the portal, but the screen is behind already! The flicker is actually a quick flash of the scene behind the portal, just before we teleport the camera. The fix The intuitive idea is the teleport ahead of time: if the camera comes at a distance of zNear close to the portal, we could teleport it straight away. This works well when facing the portal - but what about when we strafe (move sideway) through the portal? The problem will not be fixed in that case. The real problem is mainly in the stencil buffer, given that it defines the drawn portal scene parts. The stencil buffer is built by rendering the portal onto it, and so is affected by the camera near clipping plane moving beyond the portal. If we can keep drawing on the stencil buffer when the camera's near clipping plane is behind it, we've won. The fix we propose in this document is to make the portal volumetric, matching the volume bounded by the camera position and the near clipping plane. As the near clipping plane passes behind the portal front-face, a tailored back-face will appear and be rendered to the stencil buffer. In all directions. Basically it's all about cheating; but we've been cheating from the start :) Modifying zNear There is still a slight issue: even if the near <|fim▁hole|> the portal volumetric shape, there may be things inside the portal, typically the ground. A more complete fix would be to draw the stencil buffer more precisely by computing the intersection between the portal volume and the camera near clipping rectangle. But normally, you apply the portal on a wall, so there shouldn't be anything at all behind it. In our demo, the ground issue can be fixed using a reasonably small value for zNear, such as 0.01. /* Global */ static float zNear = 0.01; static float fovy = 45; With this value the ground can only be slightly noticed if the player passes the portal while looking at its feet. It is tempting to set zNear to a really small value, such as 0.000001. However, if zNear is too small compared to zFar, the depth buffer will lose its precision. You will then notice a flicker in your meshes, because triangles will alternatively be drawn one in front of the other. So don't :) Modifying zNear will come in handy when developping our fix, because we can set it to a large value such as 1.0 to have a clearer view of the near clipping plane postponement. Drawing the volumetric portal TODO: explain maths void create_portal(Mesh* portal, int screen_width, int screen_height, float zNear, float fovy) { portal->vertices.clear(); portal->elements.clear(); float aspect = 1.0 * screen_width / screen_height; float fovy_rad = fovy * M_PI / 180; float fovx_rad = fovy_rad / aspect; float dz = max(zNear/cos(fovx_rad), zNear/cos(fovy_rad)); float dx = tan(fovx_rad) * dz; float dy = tan(fovy_rad) * dz; glm::vec4 portal_vertices[] = { glm::vec4(-1, -1, 0, 1), glm::vec4( 1, -1, 0, 1), glm::vec4(-1, 1, 0, 1), glm::vec4( 1, 1, 0, 1), glm::vec4(-(1+dx), -(1+dy), 0-dz, 1), glm::vec4( (1+dx), -(1+dy), 0-dz, 1), glm::vec4(-(1+dx), (1+dy), 0-dz, 1), glm::vec4( (1+dx), (1+dy), 0-dz, 1), }; for (unsigned int i = 0; i < sizeof(portal_vertices)/sizeof(portal_vertices[0]); i++) { portal->vertices.push_back(portal_vertices[i]); } GLushort portal_elements[] = { 0,1,2, 2,1,3, 4,5,6, 6,5,7, 0,4,2, 2,4,6, 5,1,7, 7,1,3, }; for (unsigned int i = 0; i < sizeof(portal_elements)/sizeof(portal_elements[0]); i++) { portal->elements.push_back(portal_elements[i]); } } We see that the portal depends on screen_width and screen_height (for the perspective aspect ratio). Consequently we need to rebuild the portal shape when the OpenGL window is resized - let's modify GLUT's reshape callback: void onReshape(int width, int height) { screen_width = width; screen_height = height; glViewport(0, 0, screen_width, screen_height); create_portal(&portals[0], screen_width, screen_height, zNear, fovy); create_portal(&portals[1], screen_width, screen_height, zNear, fovy); } - Comment on this page - Recent stats < OpenGL Programming Browse & download complete code <|fim▁end|> | clipping plane is in |
<|fim▁begin|> This is Jumarkese, an introduction to create conlang that suitable to all speakers of different languages in the world... Eto es jumarkeo, an introduction por creati conlang ke sutabol a todo parlorantos de diferente bāhsas en la dunya... Contents 1 The intention to create a conlang (La intention por creati planbahsa) 2 Alphabet (Alfabeto) 2.1 Names of Letters of the Alphabet - Nomes de la Leteras de la Alfabeto 2.2 Pronunciation of vowels - Pronunciation de vocales 2.3 Pronunciation of consonants - Pronunciation de consonantes 2.4 Digraphs - Digrafos 2.5 Orthography - Ortografía 3 Grammar - (Gramatica) 4 Numbers - (Numeros) 4.1 Cardinal numbers - Cardinal numeros 4.2 Tuples - Tupols 4.3 Ordinal numbers - Ordinal numeros 5 Basic words - Nouns (Basico wortos - Sustantivos) 6 Auxiliary words (Auxiliar wortos) 7 Greetings (Salutos) 8 Pronouns (Pronomes) 9 Verbs (Verbos) 10 Adjectives and Adverbs (Ajectivos dan Adverbos) 11 Geographical names (Geografica names) 11.1 Directions (Direxiones) 11.2 Names of Countries (Nomes de Bangsas) 12 Colors - Colores 13 Lord's Prayer - Oratio de Tuhan 14 John 3:16 - Yohan 3:16 15 Origin of words - Origine de wordes The intention to create a conlang (La intention por creati planbahsa) The intention to create a conlangs is to have a language that is very related to every language in the world. La intention por creati planbahsa es por havi lingua ke es veri relato a cada bāhsa en la dunya. Alphabet (Alfabeto) Names of Letters of the Alphabet - Nomes de la Leteras de la Alfabeto A - /ah/ B - /beh/ C - /ceh/ D - /deh/ E - /eh/ F - /ef/ G - /geh/ H - /heh/ I - /ee/ J - /jeh/ K - /keh/ L - /el/ M - /em/ N - /en/ O - /oh/ P - /peh/ Q - /ku/ R - /er/ S - /es/ T - /teh/ U - /oo/ V - /veh/ W - /weh/ X - /exe/ Y - /yeh/ Z - /zeh/ Pronunciation of vowels - Pronunciation de vocales a - [a] e - [e]/[ɛ] ë - [ə] i - [i] o - [o]/[ɔ] u - [u] Dipthongs (Diptongos) Use ai, oi and au for dipthongs Usi ai, oi dan au por diptongos Pronunciation of consonants - Pronunciation de consonantes b - [b] c - [k] before a, o and u and [s] before e and i and with h pronunced as [tʃ] d - /d/ f - /f/ g - /g/ before a, o u /dʒ/ before e and i, to make /g/ before e and i, make it double g (gg) h - /h/ j - /dʒ/ k - /k/ l - /l/ m - /m/ n - /n/ and with g pronounced as /ŋ/, and if you want to pronounce a /g/ sound, use should double the letter g as this ngg p - /p/ q - with u pronounced as /kw/ r - /r/ s - /s/ and with h pronounced as /ʃ/ t - /t/ v - /v/ w - /w/ x - /ks/ y - /j/ z - /z/ Digraphs - Digrafos Ch - /tʃ/ Ng - /ŋ/, to seperate the /n/ from /g/, make it ngg Sh - /ʃ/ Orthography - Ortografía All are phoenetic, no silent letters... Diacritics are used for stressing and long vowels... Todo es fonetico, no hay silente leteras... Díacriticos es usado por stresing dan long vocales... Grammar - (Gramatica) The grammar is very simple... La gramatica es veri simple... subject-verb-object agreement adjective-noun agreement Numbers - (Numeros) Cardinal numbers - Cardinal numeros 0 zero - cero (ge/la) 1 one - satu (au) 2 two - dúa (my) 3 three - tri (ge) 4 four - chār (in) 5 five - pet (sv) 6 six - ses (ge) 7 seven - sem 8 eight - hachi (jp) 9 nine - nau 10 ten - shi (cn) 11 eleven - shi-satu 12 twelve - shi-dúa 13 thirteen - shi-tri 14 fourteen - shi-chār 15 fifteen - shi-pet 16 sixteen - shi-ses 17 seventeen - shi-sem 18 eighteen - shi-hachi 19 nineteen - shi-nau 20 twenty - dúashi 21 twenty-one - dúashi-satu 30 thirty - trishi 40 forty - chārshi 100 one hundred - cento 101 one hundred one - cento satu 200 two hundred - dúacento 1,000 one thousand - mil 10,000 ten thousand - shimil 20,000 twenty thousand - dúashimil 100,000 one hundred thousand - centomil 1,000,000 one million - milion 2,000,000 two million - dúamilion 100,000,000 one hundred million - cento milion 1,000,000,000 one billion - bilion Tuples - Tupols 0 empty - nol 1 single - singgol 2 double - dupol 3 triple - trepol 4 quadrople - chārtupol 5 quintuple/pentuple - pettupol 6 sextuple/hextuple - sestupol 7 septuple/heptuple - semtupol 8 octuple - hachitupol 9 nonuple - nonupol 10 decuple - shitupol 11 undecuple/hendecuple - shisatupol 12 duodecuple - shidupol 13 tredecuple - shitripol 14 quattuordecuple - shichārtupol 15 quindecuple - shipettupol 16 sexdecuple - shisestupol 17 septendecuple - shisemtupol 18 octodecuple - shihachitupol 19 novemdecuple - shinautupol 20 vigintuple - dúashitupol 21 unvigintuple - dúashisatupol 22 duovigintuple - dúashidupol 23 trevigintuple - dúashitripol 24 quattuorvigintuple - dúashichārtupol 25 quinvigintuple - dúashipettupol 26 sexvigintuple - dúashisestupol 27 septenvigintuple - dúashisemtupol 28 octovigintuple - dúashihachitupol 29 novemvigintuple - dúashinautupol 30 trigintuple - trishitupol 31 untrigintuple -trishisatupol 40 quadragintuple - chārshitupol 41 unquadragintuple - chārshisatupol 50 quinquagintuple - petshitupol 60 sexagintuple - sesshitupol 70 septuagintuple -semshitupol 80 octogintuple - hachishitupol 90 nongentuple - naushitupol 100 centuple - centopol 1,000 milluple - milupol Ordinal numbers - Ordinal numeros 1st - first - primero (1o) 2nd - second - secondo (2o) 3rd - third - tricero (3o) 4th - fourth - chārto (4o) 5th - fifth - petto (5o) 6th - sixth - sesto (6o) 7th - seventh - semtimo (7o) 8th - eight - hachivo (8o) 9th - ninth - nauveno (9o) 10th- tenth - deshimo (10o) 11th - eleventh - deshimoprimero (11o) 12th - twelfth - deshimosecondo (12o) 13th - thirteenth - thirteenth - deshimotricero (13o) 14th - fourteenth - deshimochārto (14o) 15th - fifteenth - deshimopetto (15o) 16th - sixteenth - deshimosesto (16o) 17th - seventeenth - deshimosemtimo (17o) 18th - eighteenth - deshihachivo (18o) 19th - nineteenth - deshimonauveno (19o) 20th - twentieth - dúadeshimo (20o) 21th - twenty-first - dúadeshimoprimero (21o) 30th - thirtieth - trideshimo (30o 100th - one hundredth - centisimo (100o) 200th - two hundredth - dúacentisimo (200o) 1000th - one thousandth - milesimo (1000o) 1000000th - one millionth - milionesimo (1000000o) Basic words - Nouns (Basico wortos - Sustantivos) Further information: Jumarkese Dictionary alcohol - alcohol alleluia - aleluya amen - amen animal - animal apple - pinggwo (cn) ash - abú (au) avocado - avocado banana - banana Bible - Biblía bird - bird bomb - bomba book - kitab bottle - botel bottle cap/crown - tansan (jp/au) brain - brein (en) bread - pan brother - brater car - auto cat - pusa (au) computer - compiuter coffee - cafe corn - maís cyclone - ciclon dance - dansa dancer - danser desire/will - desair (en) dog - anjing (au) duck - gana (au) earth - erda (ge) face - muká (in/au) father - pater fire - fairo (eo) grass - damó God - Dío gold - chīn (cn) guitar - ggitara hotel - hotél house - baláy hurricane - hurican forest/jungle - janggal (in) karaoke - karaóke ketchup - kechap king - rege kingdom - regno Kung fu - kungfu lamb - agno language - bāhsa link - link lord/master - tuhan (au) love - amor lover - amorer (la) meat - yok (cn) moon - bulan (au) mother - mater mountain - parvat (in) no - no OK - okey open - kai papaya - papaya person - orang pineapple - ananas plant - planta potato - patata prayer - oratio prince - principe princess - princesa queen - rejina rat - rato school - scola sex - sex sister - sister slave - ulipon spaghetti - spageti soap - sabún singer - canter song - canta stone - batu <|fim▁hole|> sugarcane - sucarcana sun - adlao (au) sweet - suwit sweetpotato - camote (es) taxi - taxi tea - cha teacher - guru typhoon - taifon vase - bin water - voda wealth - chaifu world - dunya yes - yes yo-yo - yoyo Auxiliary words (Auxiliar wortos) the - la this/these - eto that/those - eso here - chitie there - tie there is/are - hay some - sam and - dan (au) is/are/be - es or - au of - de from - dari but - sed (la/eo) for/to - por if - se to - a as - como with - con without - sin who - kien whose/whom - deki what - ke which - qual where - onji (pt/kr) when - quando why - way (en) how - como how many/much - quanto (es/it) for a yes/no question - chu (eo) in/on/at - en today - kyō (jp) yesterday - kinō (jp) tomorrow - nālei (tm) also/too - ankaw (eo) again - zai (cn) because - bicós (en) Greetings (Salutos) greeting - saluto hello - haló good - bon bad - mal good day - bon día good morning - bon mateno good highnoon - bon mezodía good afternoon - bon postmezodía good evening - bon vespero good night - bon nokte goodbye - adio help! / help me! - ayuta! / ayuta mi! How are you? - Como es tu? thanks - obricato (la/jp) cheers! - kampái sorry - gomenasai (jp) excuse me/us - sumimasen (jp) welcome - swāgat (in) good luck - bon atirshdam please! - prosīm (sv) Pronouns (Pronomes) First Person: I - mi Second Person: you (singular) - tu Third Person: he/she/it - le First Person: we - nos Second Person you (plural) - vos Third Person: they - oni (sv) All pronouns can be use in all aspects, as: subjects, objects, and reflexive... For possessive pronouns, just add a suffix: "-a" mia, tua, lea, nosa, vosa and onia... Verbs (Verbos) Further information: Jumarkese Dictionary aboliti - abolition; to abolish (la) admiri - to admire; admiration (la) amori - to love (la) audi - to hear (la) canti - to sing (la) creati - to create (la) dansi - to dance (la) fini - to finish (la) faciti - to do/make (la) havi - to have (la) leti - to let happen, to let be done (en) orati - to pray (la) speak/talk - paroli (la) sidi - to sit (la) skribi - to write (la) vidi - to see (la) * Take note: No conjugations, just simply also add the words: kyō (today), kinō (yesterday), nālei (tomorrow), etc. Adjectives and Adverbs (Ajectivos dan Adverbos) always - lagi (au) available - aveilabol (en) cute - kwiyun (kr) full - plena (la) good - bon long - long (en) lucky - atirshdama (tm) new - nova (la) suitable - sutabol (en) Geographical names (Geografica names) Directions (Direxiones) North - Norte (la) South - Sude (la) West - Occidente (la) East - Oriente (la) Center - Centro (la) Northwest - Norteoccidente (la) Northeast - Norteoriente (la) Southwest - Sudeoccidente (la) Southeast - Sudeoriente (la) Names of Countries (Nomes de Bangsas) Afghanistan - Afganistan Albania - Albania Algeria - Algeria American Samoa Andorra - Andora Angola - Anggola Antigua and Barbuda - Antigua dan Barbuda Argentina - Arhentina Armenia -Armenia Aruba Australia - Australia Austria - Austria Azerbaijan - Azerbaijan Bahamas, The - La Bahamas Bahrain - Bahrain Bangladesh - Bangladesh Barbados - Barbados Belarus - Byelarus Belgium Belize - Belicia Benin - Benin Bhutan - Butan Bolivia - Bolivia Bosnia and Herzegovina - Bosnia dan Herzegovina Botswana - Botswana Brazil - Brasíl Brunei - Brunéi Bulgaria - Bulgaria Burkina Faso - Burkina Faso Burundi - Burundi Cambodia - Cambodia Cameroon - Camerun Canada Cape Verde - Cabo Verde Central African Republic Chad - Chadía Chile - Chilea China - Jongwo Colombia - Colombia Comoros - Comoros Congo, Democratic Republic of the Congo, Republic of the Costa Rica - Costa Rica Cote d'Ivoire - Ivori Costa / Costa de Ivori Croatia Cuba Curacao Cyprus Czechia - Chekia Denmark Djibouti Dominica Dominican Republic - Dominicano Republica East Timor - Oriente Timora Ecuador - Ecuator Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Fiji Finland France Gabon Gambia, The - Gambia Georgia - Kartvela Germany - Doitchlandia Ghana Greece Grenada Guam Guatemala Guinea Guinea-Bissau Guyana Haiti - Haiti Honduras Hong Kong - Hongkong Hungary - Hunggaria Iceland - Aislandia India - Barat/India Indonesia - Indonesia Iran - Irania Iraq - Iraca Ireland - Irlandia Israel - Israéla Italy - Italia Jamaica - Jamaica Japan - Nipona Jordan - Jordana Kazakhstan Kenya - Kenia Kiribati - Kiribas Korea, North - Norte Korea Korea, South - Sude Korea Kosovo Kuwait Kyrgyzstan Laos - Lao Latvia Lebanon Lesotho Liberia Libya - Libia Liechtenstein Lithuania Luxembourg - Luxemborgia Macau - Macau Macedonia Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands - Marshal Nusas Mauritania Mauritius Mexico - Mehico Micronesia Moldova Monaco Mongolia Montenegro Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands New Zealand - Nova Zilandia Nicaragua Niger Nigeria Norway Oman Pakistan Palau Palestine - Palestina Panama Papua New Guinea - Papua Nova Ghinea Paraguay Peru - Perú Philippines - Filipinas Poland - Polsca Portugal - Portugal Puerto Rico - Porto Rico Qatar - Catar Romania - Romania Russia - Rusia Rwanda - Rúanda Saint Kitts and Nevis Saint Lucia Saint Vincent and the Grenadines Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Singapore Sint Maarten Slovakia Slovenia Solomon Islands - Solomon Nusas Somalia South Africa - Sude Africa Spain - Spania Sri Lanka - Sri Lanka Sudan - Sudán Sudan, South - Sude Sudan Suriname - Surinám Swaziland Sweden Switzerland Syria Taiwan - Taiwan Tajikistan Tanzania Thailand - Tailandia Togo Tonga Trinidad and Tobago - Trinitat dan Tobago Tunisia Turkey - Turkía Turkmenistan Tuvalu Uganda Ukraine United Arab Emirates United Kingdom - Unitido Regno United States of America - Unitido Statos de America Uruguay Uzbekistan Vanuatu Vatican City (Holy See) - Vaticana Cita / Cita de Vaticana Venezuela Vietnam Yemen - Yemen Zambia - Zambia Zimbabwe - Zimbabue Colors - Colores yellow(-ish) - wang (cn) / wangish green - verde (la) / verdish blue - asúl (la) /asulish red - red (ge) / redish white - shiro (jp) / shiroísh brown - braun (ge) / braunish black - hitam (au) / hitamish pink - rosa (la) / rosaísh orange - naranggi (in) / naranggish violet - violeta (la) / violetish Lord's Prayer - Oratio de Tuhan Our Father, who is in heaven Nosa Pader, ki es di swarga Hallowed be your name Sanctifi tua nome Your kingdom come Tua regno veni Your will be done Tua desair leti On earth as it is in heaven En erda como lo es di cielo Give us today our daily bread Tu givi nos kyō nos cada-día pan And forgive our sins Dan pardoni nos pecatos As we forgive those who trespass against us Como nos pardoni a los pecati contra nos And lead us not into temptation Dan tu no leti nos dalam temtation But deliver us from evil. Amen. Sed tu liberi nos de la mal. Amen. John 3:16 - Yohan 3:16 For God so loved the world Por Dio tan lovi la dunya that he gave his one and only Son, ke kinō givi lea satu dan solo Filio that whoever believes in him shall not perish but have eternal life. Origin of words - Origine de wordes Latin and other Romance languages (such Spanish, Italian, French, Portuguese, Romanian, etc.) - la Spanish - es Portuguese - pt Italian - it Germanic (e.g English, German, Dutch, etc.) - ge English - en Esperanto - eo Slavic (e.g. Polish, Russian, etc.) - sv Greek - gr Turkish - tr Semetic (e.g. Arabic, Hebrew) - sm Indo-Iranian (i.e. Hindi, Urdu, Sanskrit or Persian) - in Tamil and other Dravidian languages - tm Chinese - cn Korean - kr Japanese - jp Thai - th Vietnamese - vn Austronesian (esp. Malay-Indonesian, Tagalog, Cebuano, Malagasy) - au Malay/Indonesian - my <|fim▁end|> | sugar - sucar sugar-apple - atis |
<|fim▁begin|> Building your ROM is one of the most rewarding experiences you can have. Imagine having your own version of Android on your own phone! We'll take the popular custom OS LineageOS as a guiding reference. Contents 1 What you'll need 2 Build LineageOS and LineageOS Recovery 2.1 Install the Android SDK 2.2 Install the build packages 2.3 Create the directories 2.4 Install the repo command 2.5 Put the ~/bin directory in your path of execution 2.6 Initialize the LineageOS source repository 2.7 Download the source code 2.8 Prepare the device-specific code 2.9 Turn on caching to speed up build 2.10 Build it! 3 Install the build 4 References What you'll need The phone which you need to develop. A relatively recent 64-bit computer (Linux, OS X, or Windows) with a reasonable amount of RAM and about 100 GB of free storage (more if you enable ccacheor build for multiple devices). The less RAM you have, the longer the build will take (aim for 8 GB or more). Using SSDs results in considerably faster build times than traditional hard drives. A USB cable compatible with your phone. A decent internet connection and reliable electricity :) Some familiarity with basic Android operation and terminology. It would help if you’ve installed custom roms on other devices and are familiar with recovery. It may also be useful to know some basic command line concepts such as cd, which stands for “change directory”, the concept of directory hierarchies, and that in Linux they are separated by /, etc. Build LineageOS and LineageOS Recovery Install the Android SDK If you haven’t previously installed adb and fastboot, you can download them from Google. Extract it running: unzip platform-tools-latest-linux.zip -d ~ Now you have to add adb and fastboot to your PATH. Open ~/.profile and add the following: # add Android SDK platform tools to path if [ -d "$HOME/platform-tools" ] ; then PATH="$HOME/platform-tools:$PATH" fi Then, run source ~/.profile to update your environment. Install the build packages Several packages are needed to build LineageOS. You can install these using your distribution’s package manager. To build LineageOS, you'll need bc bison build-essential ccache curl flex g++-multilib gcc-multilib git gnupg gperf imagemagick lib32ncurses5-dev lib32readline-dev lib32z1-dev liblz4-tool libncurses5-dev libsdl1.2-dev libssl-dev libwxgtk3.0-dev libxml2 libxml2-utils lzop pngcrush rsync schedtool squashfs-tools xsltproc zip zlib1g-dev (take libwxgtk2.8-dev instead of libwxgtk3.0-dev if you're on older than Ubuntu 16.04) You'll also need Java. Different versions of LineageOS require different JDK (Java Development Kit) versions. LineageOS 14.1-15.1: OpenJDK 1.8 (install openjdk-8-jdk) LineageOS 11.0-13.0: OpenJDK 1.7 (install openjdk-7-jdk)* * Ubuntu 16.04 and newer do not have OpenJDK 1.7 in the standard package repositories. See the Ask Ubuntu question “How do I install openjdk 7 on Ubuntu 16.04 or higher?”. Note that the suggestion to use PPA openjdk-r is outdated (the PPA has never updated their offering of openjdk-7-jdk, so it lacks security fixes); skip that answer even if it is the most upvoted. Create the directories You’ll need to set up some directories in your build environment. To create them: mkdir -p ~/bin mkdir -p ~/android/lineage The ~/bin directory will contain the git-repo tool (commonly named “repo”) and the ~/android/lineage directory will contain the source code of LineageOS. Install the repo command Enter the following to download the repo binary and make it executable (runnable): curl https://storage.googleapis.com/git-repo-downloads/repo > ~/bin/repo chmod a+x ~/bin/repo Put the ~/bin directory in your path of execution In recent versions of Ubuntu, ~/bin should already be in your PATH. You can check this by opening ~/.profile with a text editor and verifying the following code exists (add it if it is missing): # set PATH so it includes user's private bin if it exists if [ -d "$HOME/bin" ] ; then PATH="$HOME/bin:$PATH" fi Then, run source ~/.profile to update your environment. Initialize the LineageOS source repository Enter the following to initialize the repository: cd ~/android/lineage repo init -u https://github.com/LineageOS/android.git -b lineage-X where X is the LineageOS version supported by your device. Download the source code To start the download of the source code to your computer, type repo sync. The LineageOS manifests include a sensible default configuration for repo, which we strongly suggest you use (i.e. don’t add any options to sync). For reference, our default values are -j 4 and -c. The -j 4 part means that there will be four simultaneous threads/connections. If you experience problems syncing, you can lower this to -j 3 or -j 2. On the other hand, -c will ask repo to pull in only the current branch instead of all branches that are available on GitHub. Prepare the device-specific code This depends on your device. Turn on caching to speed up build Make use of ccache if you want to speed up subsequent builds by running: export USE_CCACHE=1 and adding that line to your ~/.bashrc file. Then, specify the maximum amount of <|fim▁hole|> ccache to use by typing this: ccache -M 50G where 50G corresponds to 50GB of cache. This needs to be run once. Anywhere from 25GB-100GB will result in very noticeably increased build speeds (for instance, a typical 1hr build time can be reduced to 20min). If you’re only building for one device, 25GB-50GB is fine. If you plan to build for several devices that do not share the same kernel source, aim for 75GB-100GB. This space will be permanently occupied on your drive, so take this into consideration. See more information about ccache on Google’s Android build environment initialization page. You can also enable the optional ccache compression. While this may involve a slight performance slowdown, it increases the number of files that fit in the cache. To enable it, run: export CCACHE_COMPRESS=1 or add that line to your ~/.bashrc file. Build it! Type source ./build/envsetup.sh Type hmm to get the help text, currently (2020-11-16): Run "m help" for help with the build system itself. Invoke ". build/envsetup.sh" from your shell to add the following functions to your environment: - lunch: lunch <product_name>-<build_variant> Selects <product_name> as the product to build, and <build_variant> as the variant to build, and stores those selections in the environment to be read by subsequent invocations of 'm' etc. - tapas: tapas [<App1> <App2> ...] [arm|x86|mips|arm64|x86_64|mips64] [eng|userdebug|user] - croot: Changes directory to the top of the tree, or a subdirectory thereof. - m: Makes from the top of the tree. - mm: Builds all of the modules in the current directory, but not their dependencies. - mmm: Builds all of the modules in the supplied directories, but not their dependencies. To limit the modules being built use the syntax: mmm dir/:target1,target2. - mma: Builds all of the modules in the current directory, and their dependencies. - mmma: Builds all of the modules in the supplied directories, and their dependencies. - provision: Flash device with all required partitions. Options will be passed on to fastboot. - cgrep: Greps on all local C/C++ files. - ggrep: Greps on all local Gradle files. - jgrep: Greps on all local Java files. - resgrep: Greps on all local res/*.xml files. - mangrep: Greps on all local AndroidManifest.xml files. - mgrep: Greps on all local Makefiles files. - sepgrep: Greps on all local sepolicy files. - sgrep: Greps on all local source files. - godir: Go to the directory containing a file. - allmod: List all modules. - gomod: Go to the directory containing a module. - pathmod: Get the directory containing a module. - refreshmod: Refresh list of modules for allmod/gomod. .... (there's more, omitted for brevity) ... Running m help outputs: # m help The basic Android build process is: cd /mnt/aosp/lineage source build/envsetup.sh # Add "lunch" (and other utilities and variables) # to the shell environment. lunch [<product>-<variant>] # Choose the device to target. m -j [<goals>] # Execute the configured build. Usage of "m" imitates usage of the program "make". See /mnt/aosp/lineage/build/make/Usage.txt for more info about build usage and concepts. Common goals are: clean (aka clobber) equivalent to rm -rf out/ checkbuild Build every module defined in the source tree droid Default target nothing Do not build anything, just parse and validate the build structure java Build all the java code in the source tree native Build all the native code in the source tree host Build all the host code (not to be run on a device) in the source tree target Build all the target code (to be run on the device) in the source tree (java|native)-(host|target) (host|target)-(java|native) Build the intersection of the two given arguments snod Quickly rebuild the system image from built packages Stands for "System, NO Dependencies" vnod Quickly rebuild the vendor image from built packages Stands for "Vendor, NO Dependencies" pnod Quickly rebuild the product image from built packages Stands for "Product, NO Dependencies" psnod Quickly rebuild the product_services image from built packages Stands for "ProductServices, NO Dependencies" onod Quickly rebuild the odm image from built packages Stands for "ODM, NO Dependencies" So, for example, you could run: cd /mnt/aosp/lineage source build/envsetup.sh lunch aosp_arm-userdebug m -j java to build all of the java code for the userdebug variant of the aosp_arm device. #### build completed successfully (16 seconds) #### Install the build Assuming the build completed without errors (it will be obvious when it finishes), type the following in the terminal window the build ran in: cd $OUT There you’ll find all the files that were created. The two files of more interest are: recovery.img, which is the LineageOS recovery image. lineage-14.1-20180808-UNOFFICIAL-a5y17lte.zip, which is the LineageOS installer package. This will vary depending on your phone and version. And that's it! You can use your ROM as any other custom ROM that you'll download off the internet. References This article was taken mainly from LineageOS's wiki. <|fim▁end|> | disk space you want |
<|fim▁begin|> Contents 1 Bolivia 1.1 GROUP A: Horizontal design with condor and sun between TM and frank 1.2 GROUP B: Upright frank with double straight-line border inscribed “CORREOS DE/ BOLIVIA” across the top 1.3 GROUP C: Rectangular frank with simulated-perforation border 1.4 GROUP PO: Stamps from meters used only in Post Offices Bolivia The first meters were installed in post offices in 1950. All stamps have “BOLIVIA” in the frank. The stamps are grouped according to appearance and function: A - horizontal design with condor and sun between TM and frank B - upright frank, double straight-lined border C - rectangle with simulated-perforation border PO - designs found only on Post Office meters GROUP A: Horizontal design with condor and sun between TM and frank A1. Pitney Bowes “5300” (MV). [$10] Value box 22 mm wide, wider than tall. Inscribed “FRANQUEO PAGADO” across top of value box. “CORREOS Value $b” above “No” below condor and sun. None seen with meter number. TM: SC V/F: 00.00 NOTE: See Type PO1 for a similar stamp. A2. Pitney Bowes-GB “6600” (MV). Eagle and sun inside value box. Large “CORREOS $b” below value figures. M# with “P.B.” prefix. TM: DC V/F: 00.oo GROUP B: Upright frank with double straight-line border inscribed “CORREOS DE/ BOLIVIA” across the top B1. Postalia (MV), 1959 or earlier “FRANQUEO PAGADO” above meter number centered at bottom. M# with “P” prefix. TM: DC A. Value indicator “Bs”. V/F: 00.00 00000 B. Value indicator “$b”. V/F: 000.oo 000.000 B2. Postalia (MV). As Type B1, but M# with “POSTALIA” prefix. TM: DC A. Value indicator “$b”. V/F: 00.00 0.000 00000 000.00 000.oo 00.0000 B. Without value indicator. V/F: 00.oo B3. Postalia (MV). [$5] With “ULTIMA HORA” above “POSTALIA” and M# at bottom. Value indicator “$b” TM: DC V/F: 000.00 B4. Postalia (MV). With postal logo centered at bottom. M# without prefix at bottom right. Value indicator “Bs” TM: DC <|fim▁hole|> Rectangular frank with simulated-perforation border C1. Satas “Rotary” (MV), 1962. Nearly square frank with single-line border with corners slightly extended. Inscribed “CORREOS DE/ BOLIVIA” at top and “FRANQUEO PAGADO” above ME at bottom. M# with “S“ prefix. Date figures tall or short. A. Value indicator “$b” B. Without value indicator TM: SC V/F: 00.oo 00.oo 0.oo o a. With “AEREO” vertical between TM and frank C2. Pitney Bowes-GB “Automax” (MV). Frank slightly larger than for Type C1. Inscribed “CORREOS/ DE BOLIVIA” at top. Straight line ornaments at sides and bottom. M# with “P.B.” or “P.B.P.” prefix at bottom. A. With “BOLIVIANOS” above meter number B. With “ Value $b” above meter number TM: DC V/F: =0.oo =00oo GROUP PO: Stamps from meters used only in Post Offices PO1. Pitney Bowes “Model R” (MV), 1950. Post Office stamp. Similar to Type A1 but value box is narrower, almost square. “CORREOS” and currency indicator below condor and sun at center bottom. M# with “No” prefix below left of TM. M# 1 up. A. Currency indicator “Bs.” B. Currency indicator “$b.” TM: SC V/F: 00: 000 0.00 PO2. Francotyp “Taxograph” (MV), 1977. Both frank and town mark are horizontal rectangles, the town mark having rounded corners. “REPUBLICA” at top of frank and “BOLIVIA” at bottom. Meter number vertical with “T” prefix reading up and breaking left frame line of frank. A. V/F: $b 00.oo B. V/F: Bs 00.oo C. V/F: 0000.ooo (without currency indicator) a. Five wavy lines between TM and frank b. “R” in right side of TM frame line and number between TM and frank (for registered mail) c. Service indicator “CERIFICADA” beneath TM (certified mail) d. Service indicator “CERT.AEREA” beneath TM (certified airmail) e. With small letter ("A" and "B" seen) lying on its side facing up between M# and V/F Return to main catalog ⇒ International Postage Meter Stamp Catalog Return to top ⇒ Bolivia <|fim▁end|> | V/F: 00.00 GROUP C: |
<|fim▁begin|> IB Psychology Levels of Analysis — Options — Research Methodology — Internal Assessment — External Assessment Revision Sites — Other Resources The Options are a compulsory area of the IB Psychology syllabus. Students doing Standard Level (SL) Psychology must choose one option, and students doing Higher Level (HL) Psychology must choose two options. The five options are abnormal psychology, developmental psychology, health psychology, psychology of human relationships, and sport psychology. Contents 1 Options 1.1 Abnormal Psychology 1.2 Developmental Psychology 1.3 Health Psychology 1.4 Psychology of Human Relationships 1.5 Sport Psychology Options Abnormal Psychology General Framework GF1: To what extent do biological, cognitive and sociocultural factors influence abnormal behaviour? GF2: Evaluate psychological research (that is, theories and/or studies) relevant to the study of abnormal behaviour. Concepts and Diagnosis CD1: Examine the concepts of normality and abnormality. CD2: Discuss validity and reliability of diagnosis. CD3: Discuss cultural and ethical considerations in diagnosis. Psychological Disorders PD1: Describe symptoms and prevalence of one disorder from two of the following groups: – anxiety disorders – affective disorders – eating disorders. PD2: Analyse etiologies (in terms of biological, cognitive and/or sociocultural factors) of one disorder from two of the following groups: – anxiety disorders – affective disorders – eating disorders. PD3: Discuss cultural and gender variations in prevalence of disorders. Implementing Treatment IT1: Examine biomedical, individual and group approaches to treatment. IT2: Evaluate the use of biomedical, individual and group approaches to the treatment of one disorder. IT3: Discuss the use of eclectic approaches to treatment. IT4: Discuss the relationship between etiology and therapeutic approach in relation to one disorder. Developmental Psychology General Framework GF1: Evaluate psychological research (that is, theories and/or studies) relevant to developmental psychology. GF2: Evaluate psychological research relevant to developmental psychology. Cognitive Development CD1: Evaluate theories of cognitive development. CD2: Discuss how social and environmental variables may affect cognitive development. Social Development SD1: Examine attachment in childhood and its role in the subsequent formation of relationships. SD2: Discuss potential effects of deprivation or trauma in childhood on later development. SD3: Define resilience. SD4: Discuss strategies to build resilience. Identity Development ID1: Discuss the formation and development of gender roles. ID2: Explain cultural variations in gender role ID3: Describe adolescence. ID4: Discuss the relationship between physical change and development of identity during adolescence. ID5: Examine psychological research into adolescence. Health Psychology General Framework GF1: To what extent do biological, cognitive and sociocultural factors influence health-related behaviour? GF2: Evaluate psychological <|fim▁hole|> relevant to health psychology. Stress S1: Describe stressors. S2: Discuss physiological, psychological and social aspects of stress. S3: Evaluate strategies for coping with stress. Substance Abuse, Addictive Behaviour and Obesity SAABO1: Explain factors related to the development of substance abuse or addictive behaviour. SAABO2: Examine prevention strategies and treatments for substance abuse and addictive behaviour. SAABO3: Discuss factors related to overeating and the development of obesity. SAABO4: Discuss prevention strategies and treatments for overeating and obesity. Health Promotion HP1: Examine models and theories of health promotion. HP2: Discuss the effectiveness of health promotion strategies. Psychology of Human Relationships General Framework GF1: To what extent do biological, cognitive and sociocultural factors influence human relationships? GF2: Evaluate psychological research (that is, theories and/or studies) relevant to the study of human relationships. Social Responsibility SR1: Distinguish between altruism and prosocial behaviour. SR2: Contrast two theories explaining altruism in humans. SR3: Using one or more research studies, explain cross-cultural differences in prosocial behaviour. SR4: Examine factors influencing bystanderism. Interpersonal Relationships IR1: Examine biological, psychological and social origins of attraction. IR2: Discuss the role of communication in maintaining relationships. IR3: Explain the role that culture plays in the formation and maintenance of relationships. IR4: Analyse why relationships may change or end. Violence V1: Evaluate sociocultural explanations of the origins of violence. V2: Discuss the relative effectiveness of two strategies for reducing violence. V3: Discuss the effects of short-term and long-term exposure to violence. Sport Psychology General Framework GF1: To what extent do biological, cognitive and sociocultural factors influence behaviour in sport? GF2: Evaluate psychological research (that is, theories and/or studies) relevant to the study of sport psychology. Emotion and Motivation EM1: Evaluate theories of motivation in sport. EM2: Using one or more research studies, explain the role of goal-setting in the motivation of individuals. EM3: Discuss theories relating arousal and anxiety to performance. Skill Development and Performance SDP1: Evaluate techniques for skill development used in sport. SDP2: To what extent does the role of coaches affect individual or team behaviour in sport? SDP3: Explain relationships between team cohesion and performance. SDP4: Describe aids and barriers to team cohesion. Problems in Sports PS1: Discuss athlete response to stress and chronic injury. PS2: Examine reasons for using drugs in sport. PS3: Discuss effects of drug use in sport. PS4: Compare models of causes and prevention of burnout. Options Abnormal Psychology — Developmental Psychology — Health psychology — Psychology of Human Relationships — Sport psychology <|fim▁end|> | research (that is, theories and/or studies) |
<|fim▁begin|> Miskitu Aisas! Miskito Language Course Vocabulary (English) Miskito-English vocabulary > Next Contents Instructions: Scroll down the alphabetical list of Miskito words. Click on the "Show" button to the right of a word to see its meaning and other information. Hover the mouse pointer over the word to see the first lesson in which the word in introduced in the course. Click on the word itself to open the lesson at the appropriate section. Vocabulary Miskito vocabulary · English vocabulary · Abbreviations · Subject index A -------------------- A ahkia adv when ai his, her ailal quan much, many aisa n father aisaia v speak stem aisa- aisikam your father aisiki my father ani det which ani wina where from anira int adv where apia no apia not atkaia v buy au yes aula negative of balaia auya negative of waia awala n river B -------------------- B ba det the baha det that baha pron that baha wina from there bahara adv there balaia irreg v come pres. aula, balisa baman adv only banghwaia plural auxiliary bara con and then, and so bara sa there is, there are briaia v have stem bri- buk n book (Eng.) D -------------------- D daiwan n animal dama n old man daukaia v make, do dia int pron what dia muni why diaia v drink stem di- diara n/pron thing, anything dimaia v go in, enter dur n door (Eng.) dus n tree lig. -a H -------------------- H hilp munaia cpd v help (Eng.) I -------------------- I ikaia v kill inaia v cry Inglis n English (Eng.) inska n fish Ispail n Spanish iwaia v sit K -------------------- K kaia irreg v be stem ka-, pres. sa kaikaia v see kalila n chicken kalila wîna cpd n chicken meat kî n key (Eng.) ki question particle krikri n bed kum det a, an kum kum det some, a few kwakaia v open L -------------------- L laik kaia cpd v like (Eng.) lalah n cordoba, dollar, money lan takaia cpd v learn (Eng.) li n water lig. laya M -------------------- M mairin <|fim▁hole|> pron you man nani pron you (plural) mangu n mango Miriki n American (from the US) Miskitu n. Miskito Miskitu bila cpd n Miskito (language) N -------------------- N na det this naha det this naha pron this naha wina from here nahara adv here nahwala adv yesterday naiwa adv today nanara adv now nani plural marker ninam your name ningkara adv afterwards nini my name nu kaia cpd v know (Eng. "know") P -------------------- P pain adv well (Eng. "fine") pali very piaia v eat stem pi- piakaia v cook plikaia v look for plun n food prias watla cpd n church (prias: Eng. "prayers") pulaia v play R -------------------- R ra post in, on, at rum n room S -------------------- S sa present of kaia sap (shap) n shop, store (Eng.) sin too, also sirpi adj small skul n school (Eng.) sut quan all swiaia v leave, let, forget stem swi- T -------------------- T takaia v go out takaskaia v stay tara adj big tasba n ground, floor lig. -ya taura adv first tawan n village tiara adj young tiara n young woman tibil n table (Eng.) tisku adv soon truk n car, truck, motor vehicle (Eng.) tuktan n child lig. tuktika tuktikam your child tuktiki my child U -------------------- U umpira adj poor utla n house W -------------------- W wahma n young man, youth waia irreg v go stem wa-, pres. auya, wisa waitna n man wal post with wâl quan two wala quan other walaia v hear walpa n stone lig. -ya wan our (inclusive) want kaia cpd v want (Eng.) wark n work (Eng.) wark takaia cpd v work wiaia v say stem wi- wina post from windar n window (Eng.) witin pron she, he witin nani pron they Y -------------------- Y ya int pron who yabal n path, road yakwra adj tall, high yang pron I, me yang nani pron we (exclusive) yapaia v sleep yapti n mother yaptikam your mother yaptiki my mother yauhka adv tomorrow yaura see yawan pron we (inclusive) yul n dog yumhpa quan three <|fim▁end|> | n woman lig. mairka man |
<|fim▁begin|> Chapters: 1 - 2 - 3 - 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 About Firefox Mozilla Firefox (originally known as "Phoenix" and briefly as "Mozilla Firebird") is a free, cross-platform, graphical web browser developed by the Mozilla Foundation and hundreds of volunteers. Its current release is Firefox 81.0.1, released on October 1, 2020, and ESR (Extended Support Release) build is version 78.3.0, released on June 30, 2020. Firefox strives to be a lightweight, fast, intuitive, and highly extensible standalone browser. Firefox has now become the foundation's main development focus. Firefox includes an integrated pop-up blocker, tabbed browsing, live bookmarks, built in Phishing protection, support for open standards, an extension mechanism for adding functionality and localization for Firefox in different languages. Firefox also attempts to produce secure software and fix security holes promptly. Although other browsers have introduced these features, Firefox is the first such browser to achieve wide adoption. Firefox has attracted attention as an alternative to other browsers such as Microsoft Edge or Google Chrome (or Chromium on Linux). Currently, Firefox is the 3rd most popular browser in the world. Since its release, Firefox has significantly reduced Internet Explorer's dominant usage share. History of Firefox Before its 1.0 release on November 9, 2004, Firefox had already gained acclaim from numerous media outlets, including Forbes and the Wall Street Journal. With over 25 million downloads in the 99 days after its release, Firefox became one of the most downloaded free and open source applications, especially among home users. On October 19, 2005, Firefox had its 100 millionth download, just 344 days after the release of version <|fim▁hole|> had been downloaded 1 billion times. Firefox has become the foundation's main development focus (along with its Thunderbird email client), and has replaced the Mozilla Suite as their official main software release. Blake Ross began working on the Firefox project as an experimental branch of the Mozilla project. They believed that the commercial requirements of Netscape's sponsorship and developer-driven feature creep compromised the utility of the Mozilla browser. To combat what they saw as the Mozilla Suite's software bloat, they created a pared-down browser (then known as Phoenix, today known as Firefox), with which they intended to replace the Mozilla Suite. Ben Goodger currently works as the lead developer of Firefox. Mozilla Firefox retains the cross-platform nature of the original Mozilla browser by using the XUL user interface markup language. Through Firefox's support of XUL, users may extend their browser's capabilities by applying themes and extensions. Initially, these add-ons raised security concerns, so with the release of Firefox 0.9, the Mozilla Foundation opened Mozilla Update, a website containing themes and extensions "approved" as not harmful. Standards Support for software standards The Mozilla Foundation takes pride in Firefox's compliance with existing standards, especially W3C web standards. Firefox has extensive support for most basic standards including HTML, XML, XHTML, CSS, ECMAScript (JavaScript), DOM, MathML, SVG, DTD, XSL and XPath. Firefox also supports PNG images and variable transparency. Mozilla contributors constantly improve Firefox's support for existing standards. Firefox has already implemented most of CSS Level 2 and some of the not-yet-completed CSS Level 3 standard. Also, work continues on implementing standards currently missing, including APNG and XForms. Some of the Mozilla standards like XBL is also making its way to open standards (via WHATWG). <|fim▁end|> | 1.0. By January 31, 2009 Firefox |
<|fim▁begin|> Geometric assumption of the Effective Notch method. The aim of this work is to present a rich discussion of the various aspects of modern structural analysis, ranging from elementary continuum mechanics theory to advanced analysis using open-source software. The text is geared towards practical engineering problems and attempts to cover all essential analysis considerations and techniques present in the daily work of the experienced professional. The content is divided in two main parts: Part I - Theory, and Part II - Application. The idea is that Part I - Theory provides the foundation for the analysis described in <|fim▁hole|> Ideally, all the reasoning described in Part II - Application should stem from and refer to statements in Part I - Theory. The work may refer to any high-quality open-source software, such as Code Aster and wxMaxima. Commercial tools are not incorporated unless related information is of exceptional interest and no open-source alternative exists. It is important that all users of this resource realize that the material is subordinated to relevant normative documents and that its content might be incorrect; and act accordingly! Chapters Motivation Participate Layout Part I - Theory Part II - Application References The Contributors <|fim▁end|> | Part II - Application. |
<|fim▁begin|> BanderlogCharacteristicsType monstrous humanoid Publication historyFirst appearance Monster Manual II (1983) In the Dungeons & Dragons fantasy role-playing game, the banderlog is a monstrous humanoid. Contents 1 Publication history 2 Description 3 Other publishers 4 References Publication history The banderlog first appeared in the first edition Monster Manual II (1983).[1] The banderlog appeared in the second edition in Monstrous Compendium Volume Two (1989), and in the Monstrous Manual (1993).[2] Description The Banderlog resembles a fat Baboon with green skin, brown fur (this creates an almost violet look) and a large mouth and lips. It is a mischievous, fun-loving creature which lurks <|fim▁hole|> such as mangos and coconuts filled with a nauseatting juice down at passersby. If it is throwing these at an enemy, they cause poisoning and strength damage as well. They are clearly inspired by the Bandar-log monkeys from Rudyard Kipling's The Jungle Book. Banderlogs cannot speak, being animals. They are neutral in alignment. Other publishers The banderlog appeared in the Tome of Horrors (2002) from Necromancer Games.[3] References ↑ Gygax, Gary. Monster Manual II (TSR, 1983) ↑ Stewart, Doug, ed. Monstrous Manual (TSR, 1994) ↑ Green, Scott; Peterson, Clark (2002). Tome of Horrors. Necromancer Games. pp. 14-15. ISBN 1-58846-112-2. <|fim▁end|> | in trees and throws fruits |
<|fim▁begin|> This book has maps and pictures of all hidden areas in Spira but is not a game Walktrough. For a detailed Walktrough see GameFAQs for Final Fantasy X or GameFAQs for Final Fantasy X-2. This is a more detailed look at the world of Spira, written with fanfiction writers and other FFX or FFX-2 fanatics in mind. People who write fanfiction for both FFX and FFX-2 often want to describe a place or someone from the game, but can't find any pictures on the web. Now they can. Contents 1 Economy 1.1 Currency 1.2 Commerce 2 Geography 2.1 Climate 2.2 Flora/Fauna 3 Cultural aspects 3.1 Religion 3.2 Mythology 3.3 Hymn of the Fayth 3.4 Entertainment 4 Population 4.1 Races / Ethnic Groups 4.2 Magical Beings 5 Places to go 6 Spira's History 6.1 Calendar 6.2 Significant Events 6.3 Notable Figures in Spira's History 7 Lost Cities 7.1 Dream City 7.2 City Ruins 8 Temples 8.1 Open Temples 8.2 Lost Temples 9 Hidden Dungeons 9.1 Dungeons available in FFX 9.2 Additional dungeons available in FFX-2 10 Architecture 11 Sources File:Sphere break 2.jpg Ancient coins found in Bikanel Desert Economy Currency Spira currently uses gil as its official currency, but evidence dug out in Bikanel Desert recently (FFX-2) indicates it may have used gold coins in the past. For notation we will use "G" for gil amounts. Commerce People in Spira can be seen weaving (Besaid), working in shops, bars and travel agencies, playing blitzball, raising chocobos, driving boats, managing shoopufs and performing in a variety of entertainment shows. One assumes some Spira residents fish and grow produce to supply their fellow Spirans with consumable goods and that there must be a market in every city/village. File:FFXMAPs.jpg Spira Geography The world of Spira is covered in large part with water, having only one large continent that spans from Spira's south pole—viewable in the distance in Besaid— to well above Spira's equator. Climate On the southern part of the continent, Spira's climate resembles the climate of the south pacific on Earth. The climate gets colder as one approaches Guadosalam, further to the north, as we can see by the clothing worn by the Guado and Bevelle natives. Macalania seems to be positioned at a high altitude, as vast icy areas can be seen on the road to Macalania Temple, yet ice is not present in the neighboring city of Bevelle. With the exception of the snowy high mountain trails of Mt. Gagazet, the northern tip of the continent seems to have a temperate or mildly warm climate since lighter clothing is worn by Yunalesca, Maechen and other Zanarkand natives and by the travel agency patrons on the Calm Lands. File:Macalania.jpg The Woods of Macalania Flora/Fauna Spira has its own unique fauna, composed mainly of fiends, which are hostile monsters that attack any passerby. Other animals that can be seen in Spira are small monkeys, dogs, cats and chocobos and shoopuf. All plant species in Spira resemble the vegetation on Earth with three notable exceptions: The magical woods of Macalania Forest, the moon lilies of the Moonflow and the plant fiends, plant-like monsters such as the Ochu. Cultural aspects From Wikipedia: Many elements of Final Fantasy X are drawn from Japanese culture and folklore. The names of most of the main cast are drawn from either Okinawan or Ainu words ("Yuna" meaning "blossom" in the former and "Wakka" "water" in the latter). The world of Spira itself is modeled on southeast asia, most notably with respect to its vegetation, topography, and architecture Illustrated Guide to the world of Spira (FFX and FFX-2)/Culture. Religion The Teachings of Yevon—said to have been left by Yevon to his daughter, Lady Yunalesca—were implemented by Bevelle to maintain order through giving the people hope that Spira may someday be free of Sin should they atone for their "sins." Until Yuna exposed their lies, the Church of Yevon taught that machina were forbidden, that Sin was a result of humanity's pride and use of machina in the past, and that Sin could only be vanquished when humanity had attained purity and been cleansed of its past sins. Until then, it was said that only the ritual known as "the Final Summoning" would provide brief reprieves from Sin's terror (called "Calms"). Mythology Like many of the precedent Final Fantasy games, the story lines of the role-playing games Final Fantasy X and Final Fantasy X-2 borrow ideas and names from ancient mythological figures and from past and present cultures such as Indian, Roman, Greek and Arabian, but the two games also have their own distinct mythology. The concepts of magic, spiritual energy, the power of memories, and the spirituality of the people are heavily intertwined, and their effects manifest in a number of situations, including sporting events, religious practices, the technology used by Spirans and even in some of the native wildlife of the planet. Hymn of the Fayth The Hymn of the Fayth—composed by Japanese composer Nobuo Uematsu—serves as a transitional song and an indicator of religious importance or solemnity. In actuality, the Hymn of the Fayth was originally an Al Bhed song sung in defiance of Yu Yevon. In the real world, the lyrics of the song require some deciphering to find their true meaning. Entertainment Final Fantasy X/Blitzball Final Fantasy X-2/Sphere Break Population File:Hypello drawing.png Hypello Races / Ethnic Groups Most intelligent beings in Spira belong to one of the five sentient humanoid races that inhabit the planet. The exception are the Cactuars, intelligent, talking cacti that can even move around Spira during certain phases of their life stages. The Catcuars have been the protectors of Bikanel Desert for many generations. Humanoids — Humanoids in Spira belong to one of the following five sentient races: Ronso, Guado, Hypello, Al Bhed and regular humans. Among Spira's regular humans there are several small ethnic subgroups that share some distinctive clothing and/or physical traits. 50 px Cactuar — The Cactuars are intelligent, talking cacti that appear in the games Final Fantasy X and its <|fim▁hole|> go through several life stages, including one where they are small mobile cacti. Yuna's Aeon Valefor Magical Beings File:LENNE U.jpg Lenne is an unsent In Spira, we have the regular humanoid persons and animals that can be killed or die of natural causes, but we also have several magical classes of beings. There are two types of "immortal" beings that look, move and talk as living humans yet are not alive and cannot die: The unsent and the fayth. All five humanoid races can technically become either, depending on circumstance and the individuals in question. There are also two classes of magical fauna in Spira: the helpful aeons and the aggressive fiends. Places to go 400 px Besaid Kilika Luca Mi'hen Highroad Mushroom Rock Djose Moonflow Guadosalam Thunder Plains Macalania Woods Bevelle Calm Lands Mt. Gagazet Zanarkand Spira's History Calendar For clarity's sake, we will divide Spira's calendar into two periods: before and after the events on first game of the series (FFX) take place, abbreviated as "BG" and "AG" respectively. Following this notation, FFX-2 takes place in the year AG 2 and the Bevelle/Zanarkand war takes place in year 1,000 BG. File:TIMELINE.jpg Significant Events One thousand years before the events of Final Fantasy X take place, the world of Spira was much different than what we see in the game. Zanarkand, now a dead city, was a vibrant metropolis with many skyscrapers and a thriving civilization of mages, lead by Summoner Yu Yevon. Bevelle was also a large, vibrant city, though at this time, its leaders were not preoccupied with the Church of Yevon, for they were actually enemies of both Yevon and Zanarkand. A war began between Zanarkand and Bevelle, and Sin was born of an attempt by Yu Yevon to preserve his city, if only in memories. Sin destroyed all living things it encountered, but had been programmed to especially target advanced technology and large populations of people. Yu Yevon's daughter, Yunalesca, defeated Sin 1,000 years ago and brought temporary peace to Spira with the first Calm. After Yunalesca, the title of "high summoner" was bestowed on summoners that were sucessful in defeating Sin. There are currently only 6 High Summoners known to have defeated Sin after Yunalesca: Lord Gandof defeated Sin 400 years ago (400 BG), becoming the first high summoner since Yunalesca. Lord Ohalland defeated Sin 230 years ago(230 BG). Lady Yocun defeated Sin approximately 100 years ago (100 BG). Lord Braska, Yuna's father, defeated Sin ten years before the events of FFX took place (10 BG). Lady Yuna defeated Sin during FFX, bringing the Eternal Calm and becoming the last high summoner, and also defeated Vegnagun two years later during FFX-2 (AG 2). Notable Figures in Spira's History Gandof.jpg Gandof - Second Calm Orhaland.jpg Ohalland - Third Calm Braskascan1.jpg Braska - Fifth Calm Reunion 8.jpg Tidus - Eternal Calm Lost Cities All large ruins share Zanarkand's distinctive architectural style, which differs widely from Spira's current style for cities such as Luca. Dream City In addition to the ruined cities, Spira also has Dream Zanarkand, Tidus' home town, which is shown as a very advanced technological city, featuring little to no magic. City Ruins After 1,000 years of Sin's attacks, as one might expect, the world of Spira plays host to the ruins of many old cities and buildings. They are the "lost cities of Spira": Zanarkand Ruins - A city dead for 1,000 years; not the same city as Tidus' home town of Dream Zanarkand. Moonflow river - Submerged city ruins Mi'hen Highroad - City ruins Bikanel Desert ruins Thunder Plains ruins Macalania Lake - Submerged city ruins Besaid ruins Calm Lands ruins Temples Each temple has a distinctive architectural style, and bears differences to that seen in the temple at Zanarkand. This can be easily explained in that the temples that are part of a summoner's pilgrimage were all built after Zanarkand fell, and were constructed by the Church of Yevon. Open Temples Besaid Temple - Valefor's fayth - No element Kilika Temple - Ifrit's fayth - Fire element Djose Temple - Ixion's aeon - Thunder element Macalania Temple - Shiva's aeon - Ice element Bevelle Temple - Bahamut's aeon - No element Lost Temples Baaj Temple - Anima's fayth - No element Remien Temple - Magus Sisters' fayth - No element Floating Ruins - No fayth; only accessible in FFX-2; very distinctive architecture, possibly indicative of a Water element theme Hidden Dungeons There are fourteen dungeons that have been discovered so far in Spira: Dungeons available in FFX Calm Lands Gorge - Cavern of the Stolen Fayth Omega Ruins - Omega Dungeon Bevelle - Underwater Dungeon - Via Purifico Gagazet Summit - Small Underwater/Cave dungeon Additional dungeons available in FFX-2 Mi'hen Highroad - Old Road; hover crashsite dungeon Zanarkand - Zanarkand Dungeon Floating Ruins - Small dungeon Chocobo Ranch dungeon Thunder Plains - Tower dungeon Thunder Plains - Dragon dungeon Bikanel Desert - Cactuar dungeon Mushroom Rock - Den of Woe Bevelle - Via Infinito Besaid - Wakka's Cave Architecture Many places in Spira have ruins showcasing a distinctive architetural style of tall round towers with pointed cones and a band of decorative runes around each cone. The tower colors resemble terracotta with decorations are usually blue/green and windows that tend to be circular. This architectural style is in stark contrast to that of modern Spiran settlements, indicating that the modern cities of Spira were probably built after the Machina War and the desolation of the machina cities, explaining why they have a very different style from that of Zanarkand and the other machina cities of the past. Different Architectural styles in Spira: Luca 6.jpg The modern city of Luca at the time of FFX Grabbed Frame 15.jpg Tidus' hometown of Dream Zanarkand Macalania 17.jpg Macalania Lake Bottom Ruins Float 13.jpg Floating Ruins at Gagazet Sources Final Fantasy X Scenario Ultimania Guide Final Fantasy X Battle Ultimania Guide Final Fantasy X Ultimania Omega Guide Final Fantasy X-2 Ultimania Guide Spira's page at Wikipedia <|fim▁end|> | sequel, Final Fantasy X-2. They |
<|fim▁begin|> Recall that an L p {\displaystyle {\mathcal {L}}^{p}} space is defined as L p ( X ) = { f : X → C : f is measurable, ∫ X | f | p d μ < ∞ } {\displaystyle {\mathcal {L}}^{p}(X)=\{f:X\to \mathbb {C} :f{\text{ is measurable,}}\int _{X}|f|^{p}d\mu <\infty \}} Contents 1 Jensen's inequality 1.1 Corollary 2 Holder's inequality 2.1 Corollary 3 Theorem Jensen's inequality Let ( X , Σ , μ ) {\displaystyle (X,\Sigma ,\mu )} be a probability measure space. Let f : X → R {\displaystyle f:X\to \mathbb {R} } , f ∈ L 1 {\displaystyle f\in {\mathcal {L}}^{1}} be such that there exist a , b ∈ R {\displaystyle a,b\in \mathbb {R} } with a < f ( x ) < b {\displaystyle a<f(x)<b} If ϕ {\displaystyle \phi } is a convex function on ( a , b ) {\displaystyle (a,b)} then, ϕ ( ∫ X f d μ ) ≤ ∫ X ϕ ∘ f d μ {\displaystyle \displaystyle \phi \left(\int _{X}fd\mu \right)\leq \int _{X}\phi \circ fd\mu } Proof Let t = ∫ X f d μ {\displaystyle t=\displaystyle \int _{X}fd\mu } . As μ {\displaystyle \mu } is a probability measure, a < t < b {\displaystyle a<t<b} Let β = sup { ϕ ( t ) − ϕ ( s ) t − s : a < s < t < b } {\displaystyle \beta =\sup\{{\frac {\phi (t)-\phi (s)}{t-s}}:a<s<t<b\}} Let t < u < b {\displaystyle t<u<b} ; then β ≤ ϕ ( u ) − ϕ ( t ) u − t {\displaystyle \beta \leq \displaystyle {\frac {\phi (u)-\phi (t)}{u-t}}} Thus, ϕ ( t ) − ϕ ( s ) t − s ≤ ϕ ( u ) − ϕ ( t ) u − t {\displaystyle \displaystyle {\frac {\phi (t)-\phi (s)}{t-s}}\leq {\frac {\phi (u)-\phi (t)}{u-t}}} , that is ϕ ( t ) − ϕ ( s ) ≤ β ( t − s ) {\displaystyle \phi (t)-\phi (s)\leq \beta (t-s)} Put s = f ( x ) {\displaystyle s=f(x)} ϕ ( ∫ X f d μ ) − ϕ f ( x ) ≤ β ( f ( x ) − ∫ X f d μ ) {\displaystyle \phi \left(\int _{X}fd\mu \right)-\phi f(x)\leq \beta \left(f(x)-\int _{X}fd\mu \right)} , which completes the proof. Corollary Putting ϕ ( x ) = e x {\displaystyle \phi (x)=e^{x}} , e ( ∫ X f d μ ) ≤ ∫ X e f d μ {\displaystyle \displaystyle e^{(\int _{X}fd\mu )}\leq \int _{X}e^{f}d\mu } If X {\displaystyle X} is finite, μ {\displaystyle \mu } is a counting measure, and if f ( x i ) = p i {\displaystyle f(x_{i})=p_{i}} , then e ( p 1 + … + p n n ) ≤ 1 n ( e p 1 + e p 2 + … + e p n ) {\displaystyle \displaystyle e^{\left({\frac {p_{1}+\ldots +p_{n}}{n}}\right)}\leq {\frac {1}{n}}\left(e^{p_{1}}+e^{p_{2}}+\ldots +e^{p_{n}}\right)} For every f ∈ L p {\displaystyle f\in {\mathcal {L}}^{p}} , define ‖ f ‖ p = ( ∫ X | f | p d μ ) 1 p {\displaystyle \|f\|_{p}=\left(\int _{X}|f|^{p}d\mu \right)^{\frac {1}{p}}} Holder's inequality Let 1 < p , q < ∞ {\displaystyle 1<p,q<\infty } such that 1 p + 1 q = 1 {\displaystyle \displaystyle {\frac {1}{p}}+{\frac {1}{q}}=1} . Let f ∈ L p {\displaystyle f\in {\mathcal {L}}^{p}} and g ∈ L q {\displaystyle g\in {\mathcal {L}}^{q}} . Then, f g ∈ L 1 {\displaystyle fg\in {\mathcal {L}}^{1}} and ‖ f g ‖ ≤ ‖ f ‖ p ‖ g ‖ q {\displaystyle \|fg\|\leq \|f\|_{p}\|g\|_{q}} Proof We know that log {\displaystyle \log } is a concave function Let 0 ≤ t ≤ 1 {\displaystyle 0\leq t\leq 1} , 0 < a < b {\displaystyle 0<a<b} . Then t log a + ( 1 − t ) log b ≤ log ( a t + b ( 1 − t ) ) {\displaystyle t\log a+(1-t)\log b\leq \log(at+b(1-t))} That is, a t b 1 − t ≤ t a + ( 1 − t ) b {\displaystyle a^{t}b^{1-t}\leq ta+(1-t)b} Let t = 1 p {\displaystyle t={\frac {1}{p}}} , a = ( | f | ‖ f ‖ p ) p {\displaystyle a=\left({\frac {|f|}{\|f\|_{p}}}\right)^{p}} , b = ( | f | ‖ f ‖ q ) q {\displaystyle b=\left({\frac {|f|}{\|f\|_{q}}}\right)^{q}} | f | ‖ f ‖ p | g | ‖ g ‖ q ≤ 1 p | f | p ‖ f ‖ p p + 1 q | g | q ‖ g ‖ q q {\displaystyle \displaystyle {\frac {|f|}{\|f\|_{p}}}{\frac {|g|}{\|g\|_{q}}}\leq {\frac {1}{p}}{\frac {|f|^{p}}{\|f\|_{p}^{p}}}+{\frac {1}{q}}{\frac {|g|^{q}}{\|g\|_{q}^{q}}}} Then, 1 ‖ f ‖ p ‖ g ‖ q ∫ X | f | | g | d μ ≤ 1 p ‖ f ‖ <|fim▁hole|> | p d μ + 1 p ‖ g ‖ q q ∫ X | g | q d μ = 1 {\displaystyle \displaystyle {\frac {1}{\|f\|_{p}\|g\|_{q}}}\int _{X}|f||g|d\mu \leq {\frac {1}{p\|f\|_{p}^{p}}}\int _{X}|f|^{p}d\mu +{\frac {1}{p\|g\|_{q}^{q}}}\int _{X}|g|^{q}d\mu =1} , which proves the result Corollary If μ ( X ) < ∞ {\displaystyle \mu (X)<\infty } , 1 < s < r < ∞ {\displaystyle 1<s<r<\infty } then L r ⊂ L s {\displaystyle {\mathcal {L}}^{r}\subset {\mathcal {L}}^{s}} Proof Let ϕ ∈ L s {\displaystyle \phi \in {\mathcal {L}}^{s}} , p = r s ≥ 1 {\displaystyle p={\frac {r}{s}}\geq 1} , g ≡ 1 {\displaystyle g\equiv 1} Then, f = | ϕ | s ∈ L 1 {\displaystyle f=|\phi |^{s}\in {\mathcal {L}}^{1}} , and hence ∫ X | ϕ | s d μ ≤ ( ∫ X ( | ϕ | s ) r s d μ ) s r μ ( X ) 1 − s r {\displaystyle \displaystyle \int _{X}|\phi |^{s}d\mu \leq \left(\int _{X}\left(|\phi |^{s}\right)^{\frac {r}{s}}d\mu \right)^{\frac {s}{r}}\mu (X)^{1-{\frac {s}{r}}}} We say that if f , g : X → C {\displaystyle f,g:X\to \mathbb {C} } , f = g {\displaystyle f=g} almost everywhere on X {\displaystyle X} if μ ( { x | f ( x ) ≠ g ( x ) } ) = 0 {\displaystyle \mu (\{x|f(x)\neq g(x)\})=0} . Observe that this is an equivalence relation on L p {\displaystyle {\mathcal {L}}^{p}} If ( X , Σ , μ ) {\displaystyle (X,\Sigma ,\mu )} is a measure space, define the space L p {\displaystyle L^{p}} to be the set of all equivalence classes of functions in L p {\displaystyle {\mathcal {L}}^{p}} Theorem The L p {\displaystyle L^{p}} space with the ‖ ⋅ ‖ p {\displaystyle \|\cdot \|_{p}} norm is a normed linear space, that is, ‖ f ‖ p ≥ 0 {\displaystyle \|f\|_{p}\geq 0} for every f ∈ L p {\displaystyle f\in L^{p}} , further, ‖ f ‖ p = 0 ⟺ f = 0 {\displaystyle \|f\|_{p}=0\iff f=0} ‖ λ ‖ p = | λ | ‖ f ‖ p {\displaystyle \|\lambda \|_{p}=|\lambda |\|f\|_{p}} ‖ f + g ‖ p ≤ ‖ f ‖ p + ‖ g ‖ p {\displaystyle \|f+g\|_{p}\leq \|f\|_{p}+\|g\|_{p}} . . . (Minkowski's inequality) Proof 1. and 2. are clear, so we prove only 3. The cases p = 1 {\displaystyle p=1} and p = ∞ {\displaystyle p=\infty } (see below) are obvious, so assume that 0 < p < ∞ {\displaystyle 0<p<\infty } and let f , g ∈ L p {\displaystyle f,g\in L^{p}} be given. Hölder's inequality yields the following, where q {\displaystyle q} is chosen such that 1 / q + 1 / p = 1 {\displaystyle 1/q+1/p=1} so that p / q = p − 1 {\displaystyle p/q=p-1} : ∫ X | f + g | p d μ = ∫ X | f + g | p − 1 | f + g | d μ ≤ ∫ X | f + g | p − 1 ( | f | + | g | ) d μ {\displaystyle \displaystyle \int _{X}|f+g|^{p}d\mu =\int _{X}|f+g|^{p-1}|f+g|d\mu \leq \int _{X}|f+g|^{p-1}(|f|+|g|)d\mu } ≤ ( ∫ X | f + g | ( p − 1 ) q d μ ) 1 q ‖ f ‖ p + ( ∫ X | f + g | ( p − 1 ) q d μ ) 1 q ‖ g ‖ p = ‖ f + g ‖ p p q ‖ f ‖ p + ‖ f + g ‖ p p q ‖ g ‖ p . {\displaystyle \leq \displaystyle \left(\int _{X}|f+g|^{(p-1)q}d\mu \right)^{\frac {1}{q}}\|f\|_{p}+\left(\int _{X}|f+g|^{(p-1)q}d\mu \right)^{\frac {1}{q}}\|g\|_{p}=\|f+g\|_{p}^{\frac {p}{q}}\|f\|_{p}+\|f+g\|_{p}^{\frac {p}{q}}\|g\|_{p}.} Moreover, as t ↦ t p {\displaystyle t\mapsto t^{p}} is convex for p > 1 {\displaystyle p>1} , | f + g | p 2 p = | f 2 + g 2 | p ≤ ( | f | 2 + | g | 2 ) p ≤ 1 2 | f | p + 1 2 | g | p . {\displaystyle \displaystyle {\frac {|f+g|^{p}}{2^{p}}}=\left|{\frac {f}{2}}+{\frac {g}{2}}\right|^{p}\leq \left({\frac {|f|}{2}}+{\frac {|g|}{2}}\right)^{p}\leq {\frac {1}{2}}|f|^{p}+{\frac {1}{2}}|g|^{p}.} This shows that ‖ f + g ‖ p < ∞ {\displaystyle \|f+g\|_{p}<\infty } so that we may divide by it in the previous calculation to obtain ‖ f + g ‖ p ≤ ‖ f ‖ p + ‖ g ‖ p {\displaystyle \|f+g\|_{p}\leq \|f\|_{p}+\|g\|_{p}} . Define the space L ∞ = { f | X → C , f is bounded almost everywhere } {\displaystyle L^{\infty }=\{f|X\to \mathbb {C} ,f{\text{ is bounded almost everywhere}}\}} . Further, for f ∈ L ∞ {\displaystyle f\in L^{\infty }} define ‖ f ‖ ∞ = sup { | f ( x ) | : x ∉ E } {\displaystyle \|f\|_{\infty }=\sup\{|f(x)|:x\notin E\}} <|fim▁end|> | p p ∫ X | f |
<|fim▁begin|> And here is the new typing exercise for this chapter: onetoten = range(1, 11) for count in onetoten: print(count) and the ever-present output: 1 2 3 4 5 6 7 8 9 10 The output looks awfully familiar but the program code looks different. The first line uses the range function. The range function uses two arguments like this range(start, finish). start is the first number that is produced. finish is one larger than the last number. Note that this program could have been done in a shorter way: for count in range(1, 11): print(count) The range function returns an iterable. This can be converted into a list with the list function. which will then be the dominant number. Here are some examples to show what happens with the range command: >>> range(1, 10) range(1, 10) >>> list(range(1, 10)) [1, 2, 3, 4, 5, 6, 7, 8, 9] >>> list(range(-32, -20)) [-32, -31, -30, -29, -28, -27, -26, -25, -24, -23, -22, -21] >>> list(range(5,21)) [5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20] >>> list(range(5)) [0, 1, 2, 3, 4] >>> list(range(21, 5)) [] The next line for count in onetoten: uses the for control structure. A for control structure looks like for variable in list:. list is gone through starting with the first element of the list and going to the last. As for goes through each element in a list it puts each into variable. That allows variable to be used in each successive time the for loop is run through. Here is another example (you don't have to type this) to demonstrate: demolist = ['life', 42, 'the universe', 6, 'and', 7, 'everything'] for item in demolist: print("The current item is:",item) The output is: The current item is: life The current item is: 42 The current item is: the universe The current item is: 6 The current item is: and The current item is: 7 The current item is: everything Notice how the for loop goes through and sets item to each element in the list. So, what is for good for? The first use is to go through all the elements of a list and do something with each of them. Here's a quick way to add up all the elements: list = [2, 4, 6, 8] sum = 0 for num in list: sum = sum + num print("The sum is:", sum) with the output simply being: The sum is: 20 Or you could write a program to find out if there are any duplicates in a list like this program does: list = [4, 5, 7, 8, 9, 1, 0, 7, 10] list.sort() prev = None for item in list: if prev == item: print("Duplicate of", prev, "found") prev = item and for good measure: Duplicate of 7 found Okay, so how does it work? Here is a special debugging version to help you understand (you don't need to type this in): l = [4, 5, 7, 8, 9, 1, 0, 7, 10] print("l = [4, 5, 7, 8, 9, 1, 0, 7, 10]", "\t\tl:", l) l.sort() print("l.sort()", "\t\tl:", l) <|fim▁hole|> = l[0]", "\t\tprev:", prev) del l[0] print("del l[0]", "\t\tl:", l) for item in l: if prev == item: print("Duplicate of", prev, "found") print("if prev == item:", "\t\tprev:", prev, "\titem:", item) prev = item print("prev = item", "\t\tprev:", prev, "\titem:", item) with the output being: l = [4, 5, 7, 8, 9, 1, 0, 7, 10] l: [4, 5, 7, 8, 9, 1, 0, 7, 10] l.sort() l: [0, 1, 4, 5, 7, 7, 8, 9, 10] prev = l[0] prev: 0 del l[0] l: [1, 4, 5, 7, 7, 8, 9, 10] if prev == item: prev: 0 item: 1 prev = item prev: 1 item: 1 if prev == item: prev: 1 item: 4 prev = item prev: 4 item: 4 if prev == item: prev: 4 item: 5 prev = item prev: 5 item: 5 if prev == item: prev: 5 item: 7 prev = item prev: 7 item: 7 Duplicate of 7 found if prev == item: prev: 7 item: 7 prev = item prev: 7 item: 7 if prev == item: prev: 7 item: 8 prev = item prev: 8 item: 8 if prev == item: prev: 8 item: 9 prev = item prev: 9 item: 9 if prev == item: prev: 9 item: 10 prev = item prev: 10 item: 10 The reason I put so many print statements in the code was so that you can see what is happening in each line. (By the way, if you can't figure out why a program is not working, try putting in lots of print statements in places where you want to know what is happening.) First the program starts with a boring old list. Next the program sorts the list. This is so that any duplicates get put next to each other. The program then initializes a prev(ious) variable. Next the first element of the list is deleted so that the first item is not incorrectly thought to be a duplicate. Next a for loop is gone into. Each item of the list is checked to see if it is the same as the previous. If it is a duplicate was found. The value of prev is then changed so that the next time the for loop is run through prev is the previous item to the current. Sure enough, the 7 is found to be a duplicate. (Notice how \t is used to print a tab.) The other way to use for loops is to do something a certain number of times. Here is some code to print out the first 9 numbers of the Fibonacci series: a = 1 b = 1 for c in range(1, 10): print(a, end=" ") n = a + b a = b b = n with the surprising output: 1 1 2 3 5 8 13 21 34 Everything that can be done with for loops can also be done with while loops but for loops give an easy way to go through all the elements in a list or to do something a certain number of times. Non-Programmer's Tutorial for Python 3 ← Lists For Loops Boolean Expressions → <|fim▁end|> | prev = l[0] print("prev |
<|fim▁begin|> General Chemistry Book Cover · Introduction · v • d • e Units: Matter · Atomic Structure · Bonding · Reactions · Solutions · Phases of Matter · Equilibria · Kinetics · Thermodynamics · The Elements Appendices: Periodic Table · Units · Constants · Equations · Reduction Potentials · Elements and their Properties Answers to Gas Laws Questions 1. The Ideal Gas Law accounts for chemical change. The Combined Gas Law accounts for changes in pressure, volume, and temperature. These are physical properties. The Ideal Gas Law accounts for these properties along with molar mass. Although molar mass is a physical property as well, the amount of molecules in an isolated gas would only change in the event of a chemical reaction. Thus, the Ideal Gas Law can account for chemical reactions. 2. Density is mass divided by volume, and the number of <|fim▁hole|> divided by molecular weight. So: D = m V {\displaystyle D={\frac {m}{V}}} and P V = n R T {\displaystyle PV=nRT} so n V = P R T {\displaystyle {\frac {n}{V}}={\frac {P}{RT}}} and D = P × ( M W ) R T {\displaystyle D={\frac {P\times (MW)}{RT}}} Substituting and solving gives us a density of 80.7 g/m3. Remember that hydrogen is diatomic, so its molecular mass is 2.0 g/mol. 3. Simply substitute into the Ideal Gas Law and solve. 0.144 m3. 4. Stoichometrically, one mole of H2 is needed for each mole of H2S. We must determine the number of moles in 7.4L of hydrogen sulfide, then convert that number of moles into liters of hydrogen. This is a two-step problem, both using the Ideal Gas Law. Solving for moles of hydrogen sulfide: 0.330 mol Solving for liters of hydrogen: 7.39 L H2 <|fim▁end|> | moles equals the mass |
<|fim▁begin|> Electrodynamics Contents 1 Flux 2 Surfaces 3 Gauss' Law 3.1 Charge Inside the Surface 4 Example: Infinite Charged Plate 5 Expressing Gauss's Law in Terms of Divergence Flux Flux is effectively the amount of Field passing through a surface. In other words, it is analogous to a stream of water; if you put a screen in a creek, then water will pass through it. The amount of water moving through it is the flux. Using the water analogy, point charges can be viewed as a source (such as a hose or faucet where water comes from), or a drain. Water comes out of a source, flows around the field, and travels into the drain. If we draw our electric field lines so that our lines from our sinks connect to the lines from our drains, and if we ensure that no lines cross, the flux is essentially represented by the density of lines in our drawing. If we use the common convention that charge "flows out of" a positive charge, and "flows into" a negative charge, we can have a better understanding of what flux is. Surfaces A surface is an abstract mathematical tool that we can use to explore various phenomena. What a surface is, is a shell around a region of space. Consider a common inflatable ball, such as a soccer ball, or a basketball. The "ball" itself is just a rubberized shell around a pocket of air. Like a ball, a surface is just a shape in space that encloses a certain volume. Like a ball, the surface cannot have any gaps in it (if a ball has gaps, air will escape, and the ball will deflate). Gauss' Law If the surface we have is a closed one, so it has no gaps, then you can imagine that in a river the same amount of water that enters the surface must also exit the surface. The only time that more water can be coming out of a surface is if there is a hose inside the surface. The only time more water can be entering the surface is if there is a drain inside the surface. Or if we go back to Electric Field, the only time the flux in a surface is not zero, is when there is a charge inside that surface. [Gauss' Law for Electric Fields (zero charge)] ∮ S E ⋅ d a = 0 {\displaystyle \oint _{S}{\mathbf {E} \cdot d\mathbf {a} }=0} If no charge is inside the surface, where da is an infinitesimally small area. Now what happens if we place a charge inside the surface, you can imagine that if we had a water tap inside that we would get a net flux leaving the surface. The same is true for the electric field. Charge Inside the Surface Imagine a sphere with a charge in the center. We will denote the sphere in spherical coordinates, for ease of use: ∮ S E ⋅ d a = ∫ 1 4 π ϵ 0 ( q r 2 r ^ ) ⋅ ( r 2 sin θ d θ d ρ r ^ ) = 1 ϵ 0 q {\displaystyle \oint _{S}{\mathbf {E} \cdot d\mathbf {a} }=\int {\frac {1}{4\pi \epsilon _{0}}}\left({\frac {q}{r^{2}}}\mathbf {\hat {r}} \right)\cdot (r^{2}\sin \theta d\theta d\rho \mathbf {\hat {r}} )={\frac {1}{\epsilon _{0}}}q} Now notice that <|fim▁hole|> sphere has no influence upon the Net Flux, this means no matter what size the sphere is the answer is the same. This can be extended to mean that there is no dependence upon the shape of S at all. So therefore: [Gauss' Law of Electric Fields (non-zero charge)] ∮ S E ⋅ d a = 1 ϵ 0 Q e n c l o s e d {\displaystyle \oint _{S}{\mathbf {E} \cdot d\mathbf {a} }={\frac {1}{\epsilon _{0}}}Q_{enclosed}} Where Qenclosed is the total amount of charge located inside the surface. This is Gauss's Law for Electric Fields . Example: Infinite Charged Plate Imagine an infinite uniformly charged metal plate, with charge density σ. What is the electric field around the plate? In this case, because we have a plate with charge density σ, but no object of the opposite charge, we assume that there is an oppositely charged object at infinity, for our electric field lines to be drawn towards. Solution Place a Gaussian Surface through the surface of the metal plate, with sides only perpendicular and parallel to the surface. For ease, we will say that our gaussian surface is a cube or a rectangle. Let A be the area of the side of the cube that is parallel to the plate. To find the total charge inside the plate we can multiply the charge density σ with the total area. Therefore there is an enclosed charge of σ A. Because the plate is infinite and symmetrical the only direction the E Field can go is perpendicular to the plate. If the E field lines were not perpendicular to the plate, they would eventually cross each other. ∮ S E ⋅ d a = | E | ∫ S d a = 2 A | E | {\displaystyle \oint _{S}{\mathbf {E} \cdot d\mathbf {a} }=|\mathbf {E} |\int _{S}{d\mathbf {a} }=2A|\mathbf {E} |} ∮ S E ⋅ d a = 1 ϵ 0 Q e n c l o s e d {\displaystyle \oint _{S}{\mathbf {E} \cdot d\mathbf {a} }={\frac {1}{\epsilon _{0}}}Q_{enclosed}} Therefore: E = σ 2 ϵ 0 n ^ {\displaystyle \mathbf {E} ={\frac {\sigma }{2\epsilon _{0}}}\mathbf {\hat {n}} } Where n ^ {\displaystyle \mathbf {\hat {n}} } is a unit vector perpendicular to the plate. Expressing Gauss's Law in Terms of Divergence Perhaps a more useful way of Expressing Gauss's Law is by using the Divergence of the Electric Field: ∇ ⋅ E {\displaystyle \nabla \cdot \mathbf {E} } This turns our original integral equation into a differential one by using the Divergence Theorem: ∮ E ⋅ d a = ∫ ( ∇ ⋅ E ) d V {\displaystyle \oint {\mathbf {E} \cdot d\mathbf {a} }=\int (\nabla \cdot \mathbf {E} )dV} Now if we rewrite Q in terms of charge density ρ, then we have: Q E n c = ∫ ρ d V {\displaystyle Q_{Enc}=\int \rho dV} Substituting this in we get: ∫ ( ∇ ⋅ E ) d V = ∫ ( ρ ϵ 0 ) d V {\displaystyle \int (\nabla \cdot \mathbf {E} )dV=\int \left({\frac {\rho }{\epsilon _{0}}}\right)dV} ∇ ⋅ E = ρ ϵ 0 {\displaystyle \nabla \cdot \mathbf {E} ={\frac {\rho }{\epsilon _{0}}}} Note that Gauss's Law is always true, but not always useful. You need a certain amount of symmetry and a good Gaussian Surface in order to use it effectively. <|fim▁end|> | the radius of the |
<|fim▁begin|> Chapter II: The State of Marriage Prior to Christianity, marriage was a social controlling act to produce children, as much for the group, as the couple... most were either arranged, whilst others expected. It was not until much later that all weddings were performed ‘at the church door’, and then later still, the priest attended the ceremony... it took a further hundred years before the priest actually conducted the service. Marriage in the Middle Ages was mostly a practical affair with economic overtones. It took the French Revolution to introduce the compulsory civil marriage... leading towards a magistrate or civil official making the ceremony valid. If couples wanted a religious weddings this came after the civil ceremony. Parents lost their influence over the marital choice by the middle of the nineteenth century. Marriage now is a legal contract – as a governmental institution and changes the personal and social status of the participants. In 1950, a quarter of all future married couples met at the local dance hall. A further quarter met at some social event and fifteen per cent met at work. The vast majority admitted that they had been in love at the time of their marriage the remainder said they had not... many walk down the aisle full of doubt whether in love or not. A quarter of men and over half of all women were virgins... a quarter married the person they had first had sexual relations with. Marriage continued to be sustained as the most popular state for at least the next thirty years. Thereafter cohabitation began to erode the figures. Marriage is a very natural act. To be married shows: conformity, optimism, and faith... Society believes the act provides stability and a safe environment for children... which should be a shared desire - as well as a universal longing for happiness and contentment. The marriage ceremony, church or civil, is a declaration of intent, before each other, each other's family, and wider society. This social act is prevalent throughout all societies... although the timing, preparedness and courting behavior differs... the union is entered into as a serious lifetime commitment. The majority of couples – taking part in the act of courting or forming a partnership, still hope to get married eventually... believing that the state of marriage to be a culmination of all their hopes and desires. Marriage is therefore an end to casualness and frivolity - a start to greater responsibility, home building and possible parenthood... perpetuating the belief that marriage is the key to social stability. Nursery rhymes, children's books, television programs, romantic novels, motion pictures, newspapers and magazines all speak of the marriage state: as a rite, a religious ceremony, an act of love, and a perspicuous act - to produce a new generation. Taken from the Office for National Statistics for marriages the figures show there has been a quite rapid fall in the number of couples getting married. The plotted curve for all marriages, and first marriages, are almost identical. Of those marriages 67 per cent were civil marriages... showing a steady increase? Remarriages remain fairly consistent at just over a hundred thousand per annum. The graph shows a trend, that within ten years the curve for first marriages and remarriages will join... Even though these are depressing statistics individuals still believe the positive act something to strive for – perhaps as a romantic goal rather than an institutional necessity. In England and Wales, in 2007, it was recorded the lowest number of marriages since 1895. The long term picture of marriage is one of decline. The reason why marriage declines is the emancipation of women - freedom from moral, intellectual and legal restraints. Equal rights, equal opportunities, equal pay, have all contributed to women seeking equal power in the workplace, freedom from mundane work, and greater rewards. Women have a choice when to start a family and how long they wish to be away from the: workplace, increase in salary scale, responsible position, and pension increase.The choice for women to engage a baby-minder, play school, and kindergarten - to allow them to return to work early, is relatively new. The long-term results from this are yet to be fully evaluated. To help achieve a greater understanding about each other's hopes and fears prospective couples are encouraged to discuss their fill in a simple statement, in the form of a questionnaire. This joint statement Main page is not a legal undertaking but to serve as a prompt to help. To that end I have set out some questions that prospective partners can consider which might make the task that much easier... the completed questionnaire can be kept as a reminder, and updated when necessary. I accept that some couples may not want, or are unable to have, children. Fostering, caring or adopting can be a rewarding occupation - but equally demanding, making our questionnaire still relevant and worthwhile. No one could possibly imagine individuals not altering their wants and needs over time – there are so many choices; unforeseen natural events, unsolicited outside influences, and unmasked personal fears. These variables mean that everyone has to be flexible and adapt... It is to what degree we hope to unearth, and to help catch those changes as they occur. 2009 was not only a year of an election but a statistic downward curve in children's stable home life. There are ample statistics and research projects which tell us of the dire consequences of divorce on children. There are so many options for parents, particularly for mothers, to seek personal fulfillment. Having latchkey children is bad enough but parking them out in the first critical years is a disaster. Although a few are parented at home by the father it is the mother who is mentally, naturally and socially more fitting to take on this close parenting role. Divorce interrupts, interferes and upsets children's equilibrium; children drop out of school, become stressed, show distress symptoms, confront the law, and dabble with smoking and drugs. Their lives are not happy ones. Without knowing intimately each and every case it is impossible to speculate what the damaged child would have been like had the parents not been divorced. There are as many types of parents as there are types of child. Within those numbers there are bound to be parents who are totally unfitting and those who have not bonded with their offspring. It is no good blaming individuals for the ills of society. The more individuals understand about relationships and parenting the better off they and society will be. The most intelligent person, the lucky billionaire and the professor's son can all be equally bad parents. Its about due regard - which is about compassion, patience – having a low irritation rate, displaying care, being concerned, and responsible, giving off positive vibrations by being in control. This is a relatively modern approach to test out a relationship. It is considered a reasonable pre-marriage trial period. In reality cohabiting couples rarely stay together longer than a couple of years. It is seen as a stress free way to sleep with a partner without the binding act of promises before witnesses. It is clear that if couples had to suffer a very painful initiation ceremony before marriage, and later, a stringent financial penalty after - to end it, there would be fewer marriages. Research figures show a trend towards cohabitation... the act of marriage to come later... present marriage statistics show a trend towards delayed parenting. Couples splitting up results in lone parenting, adding to the high numbers of young girls raising a child alone; and those losing custody, usually the male, living alone. The average age for couples getting married is rising... maintaining the partnership figures. The figures for cohabitating couples are rising too, as are the numbers for dependant children. Cohabitation figures are expected to double by 2021. The trend is for cohabitation couples to take two years to decide whether or not to get married... eventually 60 per cent of them do, the remainders split up, within ten years... those, now single, engage once again in cohabitation, which lasts a further five years. Statistics show that conventional marriage rates are falling and the birth rate dropping. Cohabitation, and lone parenting figures, are rising, and that all these figures, both rising and falling, are acting together – in unison... that one in six children will soon be experiencing life in a stepfamily. Slowly the figures for marriage are dropping... These depressing figures make one wonder: ‘if couples are any more committed to the state of marriage than previous ages,’ even though there is ample evidence that the impact of divorce on children is of great concern. You might think that the rising age rate for first marriages would produce less family break up – that older couples would be more stable, committed and reliable. The overwhelming belief is still, [the older the person the more they believe this to be so] that marriage is the most fitting place for having and raising children... Therefore, society is still capable of relying on the act of marriage to: ‘offer all that it has ever done’. However, that the reality is not confirmed by the statistics does not change people's opinions. It follows therefore, that society's moral behaviour is weaker than its desires. Reviewing these statistics it would seem that there must be a method whereby couples can embark upon marriage with a greater degree of sureness – that what they are doing is right and lasting - that their partner is the right one for them. As the divorce figures are almost seventy per cent, and steadily rising... they ought to take more care - in their choice of partner. It is how this can be done that I <|fim▁hole|> a suggestion... The aim of couples seeking to plan their family: Choosing an appropriate time when the female can have time off work. Plan when there is sufficient capital saved - to afford a reduction of income. Choose a suitable period when the mother is fit and healthy. Limit family size to accommodate the plans for child care. Help overcome hereditary problems – give the new baby a better chance in life. Improve environmental conditions – spacing out births. Provide the correct, clothing, equipment, and furniture. All responsible couples give the above matters considerable thought. One or more of the list may not be accomplished - believing that by the time the child is born they will be in place. However hard up for cash or however well heeled they can choose the time and place. The latest contraception methods ensure this to be so and at the same time take care of proper reproductive health-care systems to support the mother. If the parents believe they should not copulate unless they are ready for a hoped for pregnancy that is their choice, they will have talked this through before marriage. It is of course imperative that all these questions and others are thoroughly discussed by the couple before embarking on marriage. That takes us back to my original premise that all couple should have a preconceived idea of each other's hopes and fears in marriage. Women want all the information they can possibly get about keeping control over what is happening to them, and to share in making decisions about having children with their partner. It is so important that she understands everything that is happening to her – to feel positive about the decisions made. Whether to have the baby at home and will all the necessary preparations are made on time. It is a stressful time. After the birth the mother watches every movement of the baby. Listening to each intake of breath, every twitch and turn, whimper and cry... this is a special psychological process that should not be interfered with... the mother and child's flow of communication... theory both need nurturing together and separately. Loving support from your partner or someone close is all important. The importance of ‘bonding’ is enormous. A warm, comfortable, loving environment is essential to make the mother feel secure – able to express her own emotions. Mothering grows with the realization of the enormity of the event ‘the act of birth’. Bonding is not just from the spiritual joy but from the pain of birth too. It is having the responsibility, commitment and maternal love to be you - to have given life... thereafter, continuing the bonding by breast feeding - to give strength and energy... an act which resonates throughout the mother's whole body. Statistics show that cohabiting couples who have children do not stay together longer because they are tied to ‘the family’, but the reverse – it drives them apart. It seems that the results of a pregnancy, in all its forms, weaken the sexual desires of both partners and diverts their energies. The long-term vision – starting to form a family, doesn't draw the couple together to complete their desires for: the woman temporally loses her sexual vulnerability and looks, and the man no longer becomes necessary to impregnate her. The pressure of withholding sexual advances and the thought of losing wealth, and employment opportunities - of his partner, creates emotional problems... and can promote his physical punishment of his female partner. Statistics record that cohabiting couples experience greater strains on their relationship than married couples, and that children from cohabiting couples suffer from emotional problems as a result of insecurity. Households with stepparents are considered unsafe for young children of both sexes. In times of stress and unhappiness both couples can resort to physical punishment of the child. In a cohabitating household the woman frequently comes off worse. The male quickly loses his emotional tie with the increasing strain associated with parenting and the household budget. Women with young children not only have less money to keep the household going but lose position in their previous employment pay structure. In many cases it comes down to exploitation as the male disappears out the door leaving the mother to provide care until the child is old enough the look after itself. Children from single parent homes suffer from the problems of the parent – the parents: concerns, loneliness, anxiety, strains, depression, anger and sadness. These negativities are passed on to the child in many different guises... the child suffers from doubts – feels annoyed at the lack of support – loses confidence and sometimes cannot account why they feel so alone. Natural growth becomes stunted and misshapen. It may take many years before the guilt, resentments and hatreds subside sufficiently to enable the child to make a commitment towards another person. As for the children of that child, they too take on some of the anger of the parent. In many cases the child cannot explain why the parent is angry or recount the details surrounding the original case. Over the years some minor upset is magnified out of all proportion, to become an enormous mountain..., in the past, a vendetta. Time does take away or mask the original cause allowing some repair to be made, allowing the formation of a proper relationship... but underneath the fire still smolders ready to break out at a moments notice. It takes a great deal of personal happiness to make the person forgive completely – for their positive thoughts to come to the fore. Unfortunately by that time others have become affected. Grudges are harbored and hardships remembered... errors and slip-ups put down to the parent's single status. In later life there is an urge to seek out the missing parent to either confront them, explain the pain they caused, or ease the pain of separation. Both the single parent and the child share the lack of the absent parent and whenever life becomes hard the absent parent gets the blame. This becomes a standard let out for all moments of stress and even if the absent parent did not cause the split-up in the first place they are made to feel, and shoulder, the blame. The conventional married couple is a unit bound by vows of duty and honour – a union created - to secure a fit home for children. It takes regard for most eventualities including absence, illness or death of one of the partners. In some single parent homes, where a decision is made purposely to omit one parent the possibility of total collapse, disruption or mental bruising, of the child or children, is considerable. These results in one or more helpers, friends or relatives, being permanently affected. The children from such homes carry around an inbuilt insecurity. Pregnancy occurs two weeks after the prospective mother's period begins. The sperm travels along the fallopian tube uniting with the released mother's egg to fertilize – becoming a one-celled zygote. This zygote has number of chromosomes – half from the father and half from the mother determine sex and colour etc., still travels down the tube to the uterus, growing as it does so. This growth is now the multi-celled blast cyst having inner and outer cells. The inner the embryo and the outer the membrane sack which nourishes and protects the embryo. When the blast cyst reaches the uterus it burrows into the sidewall – the uterine wall, to obtain nourishment. The placenta – the membrane sack, also begins to grow. We now reach the beginning of the embryonic period when the brain, and other organs, begins to form. The embryo has three layers: The top the ectoderm, the middle the mesoderm, and outer the peripheral. The brain develops along with the other systems. From the fifth week the brain makes links to the main organs and makes connections - that relate to learning, knowledge and awareness. The mother's diet, peace of mind, and settled state, is associated with her child's cognitive and neurological development - is part of the child's normal shaping of neurological connections in the early development of cognitive functioning. Neurological development of the child is firmly linked to a mother's healthy life style. A mother's depression, alcohol and nicotine intake, low education level, and negative lifestyle – including outside the home work levels, are significant factors of impaired cerebral development in the child. The mother's happiness and well socialized state is transmitted to the unborn child. This is thought to start at the tenth week of pregnancy, or seventh week conception period. A calm voice, unhurried work level, and harmonious relationships with those around the mother are the beginning of the child's social skills. This continues through the pregnancy and birth, responding to others, engaging in discovering those things around him all the while the mother's bond to her child is reinforced... touching, cuddling, holding and stoking are all part of the process. Continuing these positive features the child will enjoy playing whilst interacting with others. At first he will be possessive but in a short space of time will share and empathize with others, making friends. You will become aware how fixed his attentions are and how direct his actions develop. His neurological understanding advances through visual perception, desires, beliefs, to making up imaginary situations – these stages are the basis of ‘The theory of mind development’. The pregnant women's diet is all important in the first two months. Put away all those pet hatreds for cabbage, curly kale, sprouts and spinach. This is just what you should have for they are rich in folic acid. Whole grain bread, become accustomed to muesli, and do eat an apple a day. Try and eat natural unprocessed meals. <|fim▁end|> | write this account and offer |
<|fim▁begin|> Restoration is the process of attempting to wind-back the ravages of time on a photograph. Types of damage that photos (positives) and/or film (negatives) may incur include: Dust Folding Scratching Chemical staining due to oil, solvents, impurities in development chemicals, physical proximity to other materials, water, condensation, oxidization, etc. Loss of contrast Tearing Sticking to other surfaces Most of these types of damage can be repaired to some extent, usually by digitizing the photo or negative (if it's not already digitized) and then using image editing software such as the Darktable or the GIMP (both free and open source software), Lightroom or Photoshop (both commercial products from Adobe) or similar software packages. Contents 1 Strategies 1.1 Cloning 1.2 Obfuscation 1.3 Contrast restoration 1.4 Cropping Strategies Some of the strategies or general approaches that may be taken to restoration include the following. Cloning Cloning is the act of duplicating the subject, color, texture or other visual properties from one part of an image to another. In restoration, this is usually used to mask out damaged areas such as dust, folding, staining or scratches. Obfuscation Obfuscation is the act of reducing the <|fim▁hole|> impact of part of an image. This may be achieved, for instance, by reducing its contrast, lightening or darkening it, or changing its color to a more neutral tone. Contrast restoration Faded images may often be significantly enhanced by restoring their original contrast, or even digitally enhancing contrast beyond what was probably originally there. This process is generally very easy to achieve with photo manipulation software, either through a dedicated image contrast function (generally preserving the existing color balance of the image) or through finer grained control over individual color channels such as red, green and blue. Cropping Cropping or outright removing parts of an image is sometimes the fastest and cheapest way to restore an image to a higher apparent overall quality, and can be particularly useful if significant damage has occurred at the edges or corners of an image, for example through a bent or dog-eared corner. Unfortunately, it is not always possible since it relies upon no other significant elements within the image being similarly close to the cropped-away edge. For example, in a portrait it is generally unacceptable to cut away part of the subject's head. <|fim▁end|> | apparent visual presence or |
<|fim▁begin|> Current Awareness, Reviews, and Document Delivery Contents 1 Introduction 2 Current Awareness: Auto-Alerts 2.1 Search Alerts 2.2 TOC (Table of Contents) Alerts 2.3 Citation Alerts 2.4 Additional Options 3 Reviews 4 Document Delivery and Interlibrary Loan 5 Summary Introduction With the tremendous volume of primary chemical literature appearing each year, chemists need efficient methods for identifying newly published articles focused on their research areas. Current Awareness or Auto-Alert, services provide a range of simple and effective tools that can help scientists keep up with newly published articles critical to their research. The numerous Current Awareness options described below make it possible to: define an area of interest and receive alerts when new articles are published in that area; have tables of contents sent to you when journals you specify publish a new issue; and notify you when a given article is cited. Just as Current Awareness services are useful for managing newly published literature, Review Articles can be useful for sifting through previously published literature, since they typically survey large bodies of literature, summarize significant findings, and provide critical reviews on particular topics. This can be especially useful when there is the need to get up to speed quickly on an new topic, or when beginning a large project. Methods for identifying research articles and book chapters are given below. Since it is likely that all of the items needed will not be found in any one local library, it may be necessary to use Document Delivery or Interlibrary Loan services to obtain articles and books, these services are described below. Current Awareness: Auto-Alerts An impressive variety of current awareness services, or auto-alerts, are available to help chemists stay current on the published research literature. Auto-alerts allow you to save a search specific to your research interests, have it automatically re-run each time new citations are added to a database or publisher website, and have the new citations delivered to you, as an email or an RSS feed. Other names for these current awareness services include: email alerts, and SDI (selective dissemination of information). Auto-alerts were formerly available only from subscription article/research databases, but are now also available from: publishers, Google Scholar, and additional less formal (and generally less comprehensive) options including: Twitter feeds; user communities or social networks; podcasts; YouTube Channels; smart phone and tablet apps; and search widgets. To identify the auto-alert(s) that best meet their needs, researchers need to be aware of the different types that are available: Search Alerts: Allow you to save a search on a: topic, substance, reaction, author, or journal name (options vary by database and publisher). Your search is rerun either when new records are added, or at an interval you specify. TOC (Table of Contents) Alerts: Send you the table of contents when a new journal issue is published (also called journal issue alerts). Citation Alerts: Notify you when article(s) you specify are cited. The Search Alerts, TOC Alerts, and Citation Alerts sections below list options for creating various types of auto-alerts using chemistry and general databases, major chemistry publishers, and Google Scholar. Each section indicates what each type of alert is Best for, and which option is the Best choice, for setting up an alert (database, publisher, etc.) Within each section, the most robust options are listed first. Each entry includes: a brief description; the provider's name for the alert; links to web pages or PDFs that explain how to set up each type of alert; coverage; requirements for access; and available formats. Search Alerts Allow you to save a search on a: topic, substance, reaction, author, or journal name (options vary by database and publisher). Your search is rerun either when new records are added, or at an interval you specify. Best for: staying current on a topic, substance/reaction or author Best choice: article/research databases, significant publishers in your field A) Database Search Alerts: Most databases listed here require subscription (paid) access, which is generally provided through your academic institution library or employer. For those with access, a free login/account is usually required to use the alerts service. CHEMISTRY DATABASES: SciFinder: Keep Me Posted (KMP): KMP Alerts can be set up for both topics and substances. Coverage: SciFinder indexes all of chemistry and chemical aspects of other fields and includes journal articles, patents, dissertations, meeting abstracts, and additional sources. This makes SciFinder Alerts the most robust option for staying current on the chemical literature. Required: Access to SciFinder, personal login (a prerequisite for SciFinder access). How To Set Up: How To Create A Keep Me Posted Alert (PDF) How To Set Up A Keep Me Posted Alert: Format: email only. Reaxys: My Alerts: Reaxys MyAlerts can be set up for: keywords, authors, journal titles, patent numbers, substances, and reactions. Coverage: Reaxys indexes selected chemistry journals and patents – those that focus on experimental data in organic, inorganic, and organometallic chemistry. Required: Access to Reaxys, personal login. How To Set Up: Reaxys My Alerts Reaxys My Alerts Help Format: email only. Additional Info: up to 50 alerts can be saved. GENERAL DATABASES: Web of Science: My Saved Searches: Any search that can be done in Web of Science (WOS) can be saved and turned into a Search Alert. Options include: topic, title, author, publication (i.e., journal) name, and others. Both WOS and Current Contents are products of Thomson Reuters (formerly ISI) and use the same Web of Knowledge platform, so the process of setting up Search Alerts for these databases is very similar. Coverage: Web of Science indexes all academic disciplines. As such, it covers fewer chemistry journals than SciFinder, but provides a broader focus of all of science. Required: Access to Web of Science, register for personal login (sign in). How To Set Up: WOS Help: Save History/Create Alert WOS Help: Save Search History Format: email or RSS feed. Scopus: Search Alerts: Coverage: All academic disciplines. As with WOS and Current Contents, Scopus can be expected to cover less chemistry than SciFinder, but provides a broader focus on all of science. See also: Summary of Scopus Coverage, Full Content Coverage Guide. Required: Access to Scopus, Register for personal login. How To Set Up: Scopus Search Alerts PDF Format: email only. Current Contents: Search Alerts: Searches done in Current Contents can be saved and turned into Search Alerts. Both WOS and Current Contents are products of Thomson Reuters (formerly ISI) and use the same Web of Knowledge platform, so the process of setting up Search Alerts for these databases is very similar. Coverage: All academic disciplines. As with WOS and Scopus, Current Contents can be expected to cover fewer chemistry journals than SciFinder, but provides a broader focus on all of science. Required: Access to Current Contents, personal login. How To Set Up: Current Contents Help - Save History/Create Alert Current Contents Help - Save Search History Format: email or RSS feed. B) Google Scholar Search Alerts: Google Scholar: Email Alerts: Coverage: As with all things Google, coverage is not specified, and may not be consistent, but Google Scholar is freely available. For more on Google Scholar coverage see: Content Coverage, Google Scholar Help Required: nothing. Google Scholar alerts do not require: a subscription, a login, or even a Google account (simply enter the email address where you want the alerts sent). Accessing most journal articles will still require a personal or institutional subscription. How To Set Up: Google Scholar Email Alerts Format: email only C) Publisher Search Alerts Many publishers offer the ability to save searches on a given topic and have them run automatically. Search alert options available from some major chemistry publishers are listed below. No attempt is made to list all relevant publishers. See the next section for Publisher TOC Alerts. Coverage: Note that Search Alerts from publishers will ONLY include their own publications. Requirements: A free login/account is usually required to use publisher alert services, an institutional or personal subscription will required to access journal articles, but citations and article abstracts are usually freely available on the internet. American Chemical Society (ACS) Publications: Register for ACS ID Use the search form or Advanced Search Form to create searches To set up an alert, use the “Save This Search” option which appears on the search results display (lower left). After logging in, use YOUR PROFILE page to access, edit, and manage Saved Searches. Help Searching ACS Journals Royal Society of Chemistry (RSC) Publishing: Register for RSC account or Log In to your RSC Account Use the Search Box or Advanced Search page to conduct a search Click SAVE THIS SEARCH (top right) to set up an alert. Use MY PROFILE to access, edit, and manage Saved Searches (My Saved Search link: http://pubs.rsc.org/en/search/history). After logging in, access your saved searches within My Profile. Elsevier (ScienceDirect): Register for an Account or Log In. Use the Search Form or Advanced Search page to create a search. Select SAVE AS SEARCH ALERT to set up an alert. After logging in, use the My Settings or My Alerts links to access, edit, and manage Saved Searches. How To Set Up: ScienceDirect Help: Saving A Search Alert ScienceDirect Help: Alerts Wiley: Register for an Account or log in (top right). Use the search form or the Advanced Search page to create a search. From search results screen, click SAVE SEARCH to activate Search Alert. After logging in, use the Alert Manager and the Saved Searches links (both available under My Profile to access, edit, and manage Search Alerts. How To Set Up: Wiley Help: eAlerts Wiley Help: Registering for Email Alerts TOC (Table of Contents) Alerts TOC Alerts, or Journal Issue Alerts, send you the table of contents when a new issue is published. Best for: keeping up with specific journals Best choice: the journal’s publisher A) Publisher TOC Alerts TOC Alerts available from some major chemistry publishers are listed below. No attempt is made to list all relevant publishers. Note that most major publishers offer TOC Alerts. Databases may offer TOC alerts as well, but generally provide less timely results than publishers for this type of alert. Requirements: A free login/account is usually required to use publisher alert services, an institutional or personal subscription will required to access most journal articles, but citations and article abstracts are usually freely available on the internet. Coverage: TOC Alerts, by definition, provide a Table of Contents for newly published journals. Some publishers, also provide ASAP, or As Soon As Publishable alerts as well. American Chemical Society (ACS) Publications: Register for ACS ID You can receive TOC Alerts as either: email e-Alerts RSS feeds After logging in, use YOUR PROFILE page to access, edit, and manage saved TOC Alerts. Help:Help Searching ACS Journals Royal Society of Chemistry (RSC) Publishing: Register for RSC account or Log In to your RSC Account Sign up for TOC Alerts as either: email eAlerts RSS feeds To manage your TOC alerts, use the ‘personalized subscription page’ link included on each emailed alert or the registration form Help: RSC eAlert FAQ Page Elsevier (ScienceDirect): Register for an Account or Log In. Browse through journal and book series titles published by Elsevier to identify TOC Alerts you would like to receive. Check the Volume/Issue Alerts box to receive emailed TOC Alerts. Check the Article Feed box to receive RSS TOC Alerts. Also available: Articles in Press alerts. After logging in, use the My Settings or My Alerts links to access, edit, and manage TOC Alerts. Help: ScienceDirect Help: Managing Volume/Issue Alerts ScienceDirect Help: Adding RSS Feeds ScienceDirect HELP: Alerts Wiley: Register for an Account or log in (top right). To set up an alert you can either: Use the Publications or Browse By Subject links to navigate the home page of the journal. Then, from the journal’s home page, click either the “Get New Content Alerts” link for an email alert or the “Get RSS Feed” link. Use Browse By Subject, select the relevant subject (i.e., "inorganic chemistry"), then choose “View All Products in [subject]” and limit to journals. This will get you a list of Wiley journals in that subject area. To set up a TOC Alert for any journals listed, click the check-box by the journal name, then click “Get Email Alerts”. After logging in, use My Profile to access, edit, and manage TOC Alerts. Help: Wiley Help: e-Alerts Wiley Online Library Quick Guide Wiley Online Library User Guide Springer: Register for an Account or log in (top right). To set up an alert, use the SpringerAlerts page to: browse journals by title or browse journals by subject Use the check box to identify TOC alerts you would like receive. To manage alerts (unsubscribe or change settings) use the Change Alert Profile (under My Springer). Help: Springer Alerts My Springer Account Help B) Database TOC Alerts Note: TOC Alerts from databases generally provide less timely results than those from publishers. To set up a TOC Alert in an article database, follow the instructions given <|fim▁hole|> section. Instead of searching for articles on a topic, search for the name of the journal you want TOC Alerts for, and limit your search to the Journal Name/Publication Name field (the name of the field varies from one database to another). See “How to Set Up” links for each database given in Database Search Alerts section. C) JournalTOCs Alerts Service JournalTOCs: This is a free service that searches tables of contents (TOCs) of current issues of journals that produce TOC RSS feeds. Coverage: Only includes journals that produce TOC RSS feeds. Covers over 18,000 journals from over 1,000 publishers, with over 600 chemistry journals. Publishers include: Elsevier, Springer, Wiley, ACS, RSC and open access journals. See: publishers included, or journals by subject. Required: Register for personal login or sign in. How To Set Up: See "Following" subheading in: Instructions on setting up an RSS feed Instructions on Exporting your List of Journals to an RSS Reader. Format: Email and RSS feed. Citation Alerts Citation Alerts notify you when article(s) you specify are cited. This is a good way to keep track of who is citing your articles, or articles related to your research. Note that there are limited options for obtaining this type of alert. Best for: Keeping track of citations to article(s) of interest Best choice: article/research databases that provide this service A) Database Citation Alerts The databases listed here require subscription (paid) access, which is generally provided through your academic institution library or employer. For those with access, a free login/account is usually required to use the alerts service. Web of Science: Citation Alert: Web of Science (WOS), which includes the well-known Science Citation Index, was the first database that allowed researchers to easily identify and retrieve articles citing other articles. Coverage: Web of Science indexes all academic disciplines, but does not index as many chemistry journals as SciFinder. It is however, one of the few databases that provide Citation Alerts. Required: Access to Web of Science, register for personal login (sign in). How To Set Up: Sign in to WOS, and search for the article of interest. Click on the article’s title to get to the full record page, then click CREATE CITATION ALERT icon (on right). To manage or modify alerts: While signed into WOS, click MY CITATION ALERTS link (in toolbar at top of page) and click the MODIFY SETTINGS button. My Cited Articles List WOS Help Index Format: email or RSS feed. Scopus: Document Citation Alert: Scopus and Web of Science are currently the major players among general databases which provide citation tracking features. Coverage: Scopus indexes all academic disciplines, but does not index as many chemistry journals as SciFinder. It is however, one of the few databases that provide Citation Alerts. See also: Summary of Scopus Coverage, Full Content Coverage Guide. Required: Access to Scopus, register for personal login. How To Set Up: Document Citation Alerts Note, this document indicates: “Non-Scopus documents (abstracts available on platforms external to Scopus) and citations derived from Scopus references are not included in Document Citation alerts.” Format: email or RSS feed. B) Google Scholar Citation Alerts Google Scholar: Citation Alerts: Coverage: As with all things Google, coverage is not specified, and may not be consistent, but Google Scholar is freely available. For more on Google Scholar coverage see: Content Coverage, Google Scholar Help Required: nothing. Google Scholar alerts do not require: a subscription, a login, or even a Google account (simply enter the email address where you want the alerts sent). Accessing most journal articles will still require a personal or institutional subscription. How To Set Up: Google Scholar Help See Email Alerts section, headings for: How do I get notified when my papers are cited? and How do I get notified when a particular paper is cited? Format: email only C) Publisher Citation Alerts Coverage: Note that Citation Alerts from publishers can be expected to include only citations from their own publications. Requirements: A free login/account is usually required to use publisher alert services, an institutional or personal subscription will required to access journal articles, but citations and article abstracts are usually freely available on the internet. American Chemical Society (ACS) Publications: Citation Alerts: Register for ACS ID How To Set Up: After logging in, use the ACS Publications page navigate to the journal and article of interest. Click on the article’s title to bring up the full record for the article. In the Toolbar on the right, click on CITATION ALERTS. This will add the article to your ACS Citation Alerts list, and you will receive an email alert whenever the article is “cited by newly published content.” Use the YOUR PROFILE page to manage Citation Alerts. Wiley: Register for an Account or log in (top right). How To Set Up: After logging in, navigate to the journal and article of interest. Click on the article’s title to bring up the full record for the article. In the ARTICLE TOOLS toolbar on the right, click on “GET CITATION ALERTS”. Citation alerts for this article will be added to your profile. Use My Profile to manage Citation Alerts. Help: Wiley Help: e-Alerts Additional Options Current Awareness services began in the late 1950s, well before both Internet access to article databases, and digital publication of journal articles, became ubiquitous. During the 1950s and 1960s, these services were commonly called “selective dissemination of information” (or SDI). These services used computer programs to identify and collect abstracts for recently published journal articles. “Interest profiles” (searches on topics, based on keywords) were developed for broad areas. The resulting collections of abstracts, focused on broad topics, were distributed in print to subscribers. Some services based on this model are still available (see below). Their primary advantage is that they offer a more thorough literature search than can be accomplished via free options (Google Scholar, Journal TOCs, etc.), and although these services are fee-based, they do not require on-going subscriptions to article databases. STN: Provides various search interfaces, analysis and visualization tools geared to information professionals, available from CAS division of ACS. Current awareness alerts are available from the STN Express and STN on the Web products. STN Current Awareness User Guide provides more information about the current awareness alert options avialable on STN. Thomson Reuters Personal Alert: Profile-based current awareness service, available from Thomson Reuters. Results delivered via email, sent daily or weekly. For additional information on SDI, see: Hensley, C. B. 1963. Selective Dissemination of Information (SDI): state of the art in May, 1963. AFIPS '63, Proceedings of the May 21–23, 1963 Spring Joint Computer Conference: 257-262. Accessed December 11, 2012, DOI: 10.1145/1461551.1461584 Connor, J. H. 1967. Selective Dissemination of Information - review of literature and issues. The Library Quarterly 37 (4): 373-391. Accessed December 11, 2012, URL: http://www.jstor.org/stable/4305823. Reviews All of the sources in the previous section are aimed at making you aware of the existence of new primary literature as soon as it is available. REVIEW articles (or book chapters) serve a different purpose: they provide critical reviews of the published literature on particular topics. This can be very useful when there is a need to get up-to-speed on a new topic quickly, or when beginning a large project. Reviews generally: are written by experts in a field, survey a large body of literature, summarize significant findings, and sometimes provide novel interpretations of results. Compared to “standard” journal articles, reviews generally: do not present new results, are longer, and provide substantially more references. Reviews may be published in: primary journals, conference proceedings, journals that specialize in publishing reviews, serial works that look like books, or multi-volume monograph sets. Examples of sources for reviews are given at the end of this section. Finding Reviews Many, but not all databases, permit searchers to limit results to only review articles, often as a second step after executing a search. The exact definition of what qualifies as a review article varies somewhat from vendor to vendor. To find reviews either use an article database, and limit your results to document type "review" (see below for instructions); or go to a known source for reviews in your area, such as those listed at the end of this section. The librarian at your institution, or a nearby academic library can help you locate additional sources for reviews. Using SciFinder to Find Reviews: First conduct your search. From the results page, use the REFINE tab (on the right) to limit your results to DOCUMENT TYPE: REVIEW. Using Web Of Science to Find Reviews: First conduct your search. From the results page, use the REFINE RESULTS tool bar (on the left) to limit your results to DOCUMENT TYPES: REVIEW. Examples of sources for reviews: Title (Publisher) Review Journals Accounts of Chemical Research (ACS) Chemical Reviews (ACS) Chemical Society Reviews (RSC) Serials Annual Reviews in Analytical Chemistry (Annual Reviews) Annual Reviews in Biochemistry (Annual Reviews) Annual Reviews in Physical Chemistry (Annual Reviews) Annual Reviews in Chemical and Biomolecular Engineering (Annual Reviews) Reviews in Computational Chemistry (Wiley) Chemistry of Heterocyclic Compounds (Wiley) Multi-Volume Sets Comprehensive Chemistry series (Pergamon/Elsevier), many titles including: Comprehensive Coordination Chemistry Comprehensive Heterocyclic Chemistry Comprehensive Inorganic Chemistry Comprehensive Medicinal Chemistry Comprehensive Organic Chemistry Comprehensive Organometallic Chemistry Comprehensive Supramolecular Chemistry Document Delivery and Interlibrary Loan DOCUMENT DELIVERY and INTERLIBRARY LOAN are terms used in libraries to refer to methods of providing access to items the library either does not own, or does not own in the desired format. Interlibrary Loan refers to the process where a library patron requests an item not owned by the library they are affiliated with (i.e., their university or public library). The library where the request is made: identifies libraries that own the desired item, borrows it from another library, loans it to the patron, then returns it to the owning library. The lending library generally sets the due date, any usage restrictions (i.e., library use only), and has total discretion over what in their collection they choose to lend. Print copies of journals generally are not lent, instead a photocopy or PDF of the article is usually sent. Libraries generally pay fees to obtain materials through interlibrary loan, these may or may not be passed on to the end users. Because costs are involved, libraries generally provide Interlibrary Loan only for patrons affiliated with their library (e.g., the affiliated users of a university library are usually current students, faculty and staff at that university). Interlibrary loan policies and fees vary between libraries and institutions. Copyright restrictions can affect what can be lent, and in what format, particularly for digital materials (online books and journals). Document Delivery can refer to the practice of purchasing individual copies of items (usually articles or documents) to be given to the end user (perhaps at no charge or only a partial charge to the end user). Document Delivery can also refer to the practice of providing a digital copy of a print item owned by the library (almost always limited to articles and documents, may be fee-based or free). Making an Interlibrary Loan Request: OpenURL Link Resolvers Most libraries have online forms that allow patrons to request Interlibrary Loan or Document Delivery services. In addition, patrons can usually request an Interlibrary Loan from within article databases via OpenURL link resolvers, when their library does not own the desired item(s). OpenURL link resolvers are used by libraries to allow patrons to connect from article databases (and other resources) directly to subscription content (such as journal articles and books). If the library has a subscription to electronic content, the link will resolve to the online article or book. If the library has a print subscription, the link will resolve to the library's catalog, which provides the information needed to access the print journal or book. If online or print access is not available, most OpenURL link resolvers also include the option of requesting an item via Interlibrary Loan. Examples of OpenURL link resolvers include: Ex Libris SFX, OCLC WorldShare License Manager, Swets SwetsWise Linker, Serials Solutions 360 Link, Innovative Interfaces WebBridge, Ovid LinkSolver, and others. Many educational institutions apply "local branding" to the OpenURL link resolver they use. Summary Given the volume of scientific literature produced today, scientists need to be able to identify newly published items relevant to their research. A wide range of mainly web-based current awareness, or alerting services, have been developed to meet this need, providing an efficient and focused approach to the new literature. A focused approach for scanning the older literature is to identify review articles, either by using the search features in an article database, or by reviewing known sources for reviews in your research areas. When publications are needed that are not owned by the library you are affiliated with, Interlibrary Loan and Document Delivery can be relied upon to provide the needed materials in the majority of cases. SIRch Link for Keeping Up and Looking Back Problem Set on this topic <|fim▁end|> | in the Database Search Alerts |
<|fim▁begin|> Two Knights Defence a b c d e f g h 8 8 7 7 6 6 5 5 4 4 3 3 2 2 1 1 a b c d e f g h Position in Forsyth-Edwards Notation (FEN) r1bqk2r/p4pp1/2pb1n1p/n3N3/4p3/8/PPPPBPPP/RNBQK2R Contents 1 Two Knights Defence 1.1 10...Bd6 1.2 Theory table 1.3 Statistics 1.4 References Two Knights Defence 10...Bd6 Theory table For explanation of theory tables see theory table and for notation see algebraic notation. 1.e4 e5 2.Nf3 Nc6 3.Bc4 Nf6 4.Ng5 d5 5.exd5 Na5 6.Bb5+ c6 7. dxc6 bxc6 8. Be2 h6 9. Nf3 e4 10. Ne5 Bd6 11 12 13 14 1 d4exd3 Nxd3Qc7 b3O-O Bb2Ne4 2 f4- Statistics Estimated next move likelihood d4 75%, f4 23%, Ng4 2% When contributing to this Wikibook, please follow the Conventions for organization. References Wikipedia has related information at Two Knights Defence v • d • e Chess Openings1. e4 e5 Open Game · King's Gambit · Bishop's Opening · Vienna <|fim▁hole|> Gambit · Scotch · Giuoco Piano · Two Knights · Ruy Lopez · Philidor Defence1. e4 c5 Sicilian Defence · Closed Sicilian · Taimanov · Sveshnikov · Kan Sicilian · Sicilian Dragon · Scheveningen · Najdorf · Alapin1. e4 other French Defence · Caro-Kann Defence · Pirc Defence · Alekhine Defence · Modern · Scandinavian · Nimzowitsch 1. d4 Nf6 Indian Defence · King's Indian · Nimzo-Indian · Queen's Indian · Grünfeld · Benoni · Budapest · Catalan1. d4 d5 Closed Game · Queen's Gambit · Queen's Gambit Accepted · Queen's Gambit Declined · Chigorin · Slav · Semi-Slav · Marshall1. d4 other Dutch Defence · Old Benoni Defence · Englund Gambit · English Defence · King's Indian Attack · Réti Opening1. a3 · Na3 · a4 · b3 · b4 · c3 · Nc3 · c4 · d3 · d4 · e3 · e4 · f3 · Nf3 · f4 · g3 · g4 · h3 · Nh3 · h4 <|fim▁end|> | · Petrov · Latvian |
<|fim▁begin|> Content for the Ancient Language. Suffixes -ar: pluralises nouns ending on consonants. If the noun already ends with "r", place an "a" before it. For example, "draumr" (dream) becomes "draumar" (dreams). However, if the noun already has a vowel before the "r", the suffix "-ya" is used. For example, "edur" (tor) becomes "edya" (tors). -í: changes verbs ending with any letter (except for "i" and "r") to past tense. For example, "haina" (harm) becomes "hainaí" (harmed). -o: forms the past tense of verbs ending with "i" and "r". For example, "skölir" (shield) <|fim▁hole|> a masculine connotation. For example, "älf" (elf) becomes "älfr" (male elf), which is also he. -s: makes nouns possessive. For example, "könungr" (king) becomes "könungrs" (king's). -sja: adds "-looking" to the end of adjectives. For example, "ramr" (strong) becomes "ramrsja" (strong-looking). -ya: pluralises nouns ending on vowels. It also replaces the last vowel. For example, "agaetí" (celebration) becomes "agaetya" (celebrations). If the "-ya" interferes with the word's pronunciation, the vowel it would normally replace isn't removed. The vowels "a" and "i" are usually changed to "e". For example, "celöbra" (honour) becomes "celöbreya" (honours). <|fim▁end|> | becomes "sköliro" (shielded). -r: gives nouns |
<|fim▁begin|> The Subsaharan region of africa had the largest number of water-stressed countries of any other place on the globe. In Africa, the struggle for access to clean drinking water is one of today's most obvious examples of how water scarcity leads to the stalling and reversal of human progress. While each individual living in the United States uses on average 100 to 175 gallons of water per day in the home, the average African family uses only 5 gallons of water per day. [1] This vast disparity of clean water availability and consumption is reflected in a number of different developmental aspects. These consequences include the effects on health, opportunities for women, children's education, agricultural practices, regional conflict, and productivity and development. Contents 1 Impact on development 1.1 Health 1.2 Women, children, and education 1.3 Agriculture 1.4 Conflict 1.5 Productivity and development 2 Reasons for scarcity 2.1 Climate change 2.2 Physical scarcity and economic scarcity 3 Addressing the issue 3.1 International efforts 3.2 Non-governmental organizations' efforts 3.3 Solutions and technologies 3.4 Limitations 4 External links 5 References Impact on development Health The most immediately apparent impact of water scarcity in Africa is on the continent's health. Infants and children are especially susceptible to these diseases because of their inexperienced immune systems,[2] which lends to elevated infant mortality rates in many regions of Africa. When infected with these waterborne diseases, those living in African communities suffering from water scarcity cannot contribute to the community’s productivity and development because of a simple lack of strength. Additionally, economic resources are sapped by the cost of medicine to treat waterborne diseases, which takes away from resources that might have been used for food or school fees.[2] This also takes a toll on the governmental funds. The Water Supply and Sanitation Collaborative Council (WSSCC) estimates that in Sub-Saharan Africa, treatment of diarrhea due to water contamination consumes 12 percent of the country’s health budget. With better water conditions, the burden on healthcare would be less substantial and a healthier workforce[3] would stimulate economic growth and pull many people out of poverty. Women, children, and education African women are disproportionally burdened by scarcity of clean drinking water. In most African societies, women are seen as the collectors, managers, and guardians of water, especially within the domestic sphere that includes household chores, cooking, washing, and child rearing.[4] Because of these traditional gender labor roles, women are forced to spend around sixty percent of each day collecting water, which translates to approximately 200 million collective work hours by women globally per day.[5] For African women, this often means carrying the typical jerrycan that can weigh over 40 pounds when full[2] for an average of six kilometers each day.[1] As a result of this, many women are unable to hold professional employment. Additionally, this prevents many young girls from attending school and receiving an education. They are expected to not only aid their mothers in water retrieval, but to also help with the demands of household chores that are made more time-intensive because of a lack of readily available water. Furthermore, a lack of clean water means the absence of sanitary facilities and latrines in schools, and so once puberty hits, this has the largest impact on female children. In terms of lost educational opportunity, if adequate investment were made in drinking water and sanitation, it is estimated that it would result in 272 million more school attendance days per year.[5] This lost number of potential school days and education results in the hindrance of the next generation’s African females from breaking out of the cycle of unequal opportunity for gainful employment. Because of this, available clean water for women and children translates to Africans with potential for education, prosperity, power, literacy, hygiene, security, and equality.[6] Agriculture The majority of Africa remains dependent on an agricultural lifestyle and so water scarcity translates to a loss of food security. At this point, the majority of rural African communities are not tapping into their irrigation potential, and according to the UN Economic Commission for Africa and New Partnership for Africa’s Development, "irrigation is key to achieving increased agricultural production that is important for economic development and for attaining food security".[7] But for many regions, there is a lack of financial and human resources to support infrastructure and technology required for proper crop irrigation. Because of this, the impact of droughts, floods, and desertification is greater in terms of both African economic loss and human life loss due to crop failure and starvation. Additionally, lack of water causes many Africans to use wastewater for crop growth, then causing a large number of people to consume foods that can contain chemicals or disease-causing organisms transferred by the wastewater.[8] Thus, for the extremely high number of African areas suffering from water scarcity issues, investing in development means sustainably withdrawing from clean freshwater sources, ensuring food security by expanding irrigation areas, and effectively managing the effects of climate change.[7] Conflict The explosion of populations in developing nations within Africa combined with climate change is causing extreme strain within and between nations. In the past, countries have worked to resolve water tensions through negotiation, but there is predicted to be an escalation in aggression over water accessibility. Federal intelligence agencies have issued the joint judgment that in the next ten years, water issues are not likely to cause internal and external tensions to intensify to war, but after 2022 there is expected to be a change.[9] Based on the classified National Intelligence Estimate on water security, requested by Secretary of State Hillary Rodham Clinton and completed in Fall 2011, after 2022 water will be more likely to be used as a weapon of war and potential tool for terrorism, especially in w:North Africa.[9] On World Water Day, the State Department stated that water stress, "will likely increase the risk of instability and state failure, exacerbate regional tensions and distract countries from working with the United States on important policy objectives." Specifically referring to the Nile in Egypt, Sudan, and nations further south, the report predicts that upstream nations will limit access to water for political reasons, and that terrorists may target water related infrastructures, such as reservoirs and dams, more frequently.[9] Because of this, the World Economic Forum's 2011 Global Risk Report has included water as one of the world’s top five risks for the first time. Productivity and development Poverty is directly related to the accessibility of clean drinking water- without it, the chances of breaking out of the poverty trap is extremely slim. The social and economic consequences of a lack of clean water penetrate into realms of education, opportunities for gainful employment, physical strength and health, agricultural and industrial development, and thus the overall productive potential of a community, nation, and/or region. Because of this, the UN estimates that Sub-Saharan Africa alone loses 40 billion potential work hours per year collecting water.[2] Because of this, the United Nations Development Programme estimated that in Africa, every dollar spent on water and sanitation generates a nine-fold return in saved time, increased productivity and reduced health cost.[citation needed] Reasons for scarcity Climate change According to the Africa Partnership Forum, “Although Africa is the continent least responsible for climate change, it is particularly vulnerable to the effects,” and the long-term impacts include, “changing rainfall patterns affecting agriculture and reducing food security; worsening water security; decreasing fish resources in large lakes due to rising temperature; shifting vector-borne diseases; rising sea level affecting low-lying costal areas with large populations; and rising water stress”.[10] Because of Africa’s dependence on rain-fed agriculture, widespread poverty, and weak capacity, the water issues caused by climate change impact the continent much more violently compared to developed nations that have the resources and economic diversity to deal with such global changes. The Intergovernmental Panel on Climate Change reports that climate change in Africa has manifested itself in more intense and longer droughts in the subtropics and tropics, while arid or semi-arid areas in northern, western, eastern, and parts of southern Africa are becoming drier and more susceptible to variability of precipitation and storms.[10] <|fim▁hole|> water stress caused by changing amounts of precipitation is particularly damaging to Africa and thus climate change is one of the major obstacles the continent must face when trying to secure reliable and clean sources of water. Physical scarcity and economic scarcity Water scarcity is both a natural and human-made phenomenon.[11] It is thus essential to break it down into two general types: Economic scarcity and physical scarcity. Economic scarcity refers to the fact that finding a reliable source of safe water is time consuming and expensive. Alternatively, physical scarcity is when there simply is not enough water.[2] The 2006 United Nations Economic Commission for Africa estimates that 300 million out of the 800 million who live on the African continent live in a water-scarce environment.[7] Specifically in the very north of Africa, as well the very south of Africa, the rising global temperatures accompanying climate change have intensified the hydrological cycle that leads to dryer dry seasons, thus increasing the risk of more extreme and frequent droughts. This significantly impacts the availability, quality and quantity of water due to reduced river flows and reservoir storage, lowering of water tables and drying up of aquifers in the northern and southern regions of Africa. The majority of Sub-Saharan Africa suffers from economic scarcity that exists because of population’s lack of the necessary monetary means to utilize adequate sources of water. Both political reasons and ethnic conflict have contributed to this unequal distribution of resources. Out of the two forms of water scarcity, economic scarcity can be addressed quickly and effectively with simple infrastructure to collect rainwater from roofs and dams, but this requires economic resources that many of these areas lack due to an absence of industrial development and widespread poverty.[2] Addressing the issue International efforts To adequately address the issue of water scarcity in Africa, the United Nations Economic Commission for Africa emphasizes the need to invest in the development of Africa’s potential water resources to reduce unnecessary suffering, ensure food security, and protect economic gains by effectively managing droughts, floods, and desertification.[7] Some suggested and on going efforts to achieve this include digging wells, rainwater harvesting, and building clean-water catchment and storage tanks. Non-governmental organizations' efforts In addition to the role the United States, the United Nations, and international governmental aid are all playing in helping bring clean water to water stressed regions of Africa, a number of NGOs have formed water charities to work towards that same goal of providing clean water for the continent by 2015. These charities are based on individual and group donations, which are then invested in a variety of methods and technologies to bring clean water to regions in Africa.[12] Some notable NGOs working towards this goal include, but are not limited to: A Drop In The Bucket [13] Blood: Water Mission [14] Blue Planet Network [15] charity: water [16] Generosity Water [17] H2O For Life [18] Just A Drop [19] Lifewater International [20] Living Water International [21] Pump Aid-Water for Life [22] Ok Clean Water Project [23] Ryan’s Well Foundation [24] The Water Project [25] WaterAid [26] WaterCan/ EauVive [27] Water For People [28] Water Is Life [29] Water.org [30] Thirst Relief International [31] Solutions and technologies The more basic solutions to help provide Africa with drinkable and usable water include well-digging, rain catchment systems, de-worming pills, and hand pumps, but high demand for clean water solutions has also prompted the development of some key creative solutions as well. Some non-profit organizations have focused on the aspect of drinking water contamination against sewage waste by installing cost-effective and relatively maintenance-free toilets, such as Drop In The Bucket’s “Eco-sanitation Flush Toilet” [13] or Pump Aid’s “Elephant Toilet”.[22] The Elephant Toilet uses community-sourced resources in construction to build a relatively simple waste disposal mechanism that separates solids from liquids to promote faster decomposition and lower the impact on ground water.[22] In comparison, the Eco-Sanitation Flush Toilet also uses no power of any kind, but actually treats sewage rather than just storing it so that the toilet’s output is only water.[13] Both solutions are then simple for residents of African communities to maintain and have a notable impact on the cleanliness of local water sources. Overall, a wide range of cost-effective, manageable, and innovative solutions are available to help aid Africa in producing clean, disease-free water. Also NGOs can help donate water to help Africa. Ultimately what it comes down to is using technology appropriate for each individual community’s needs. For the technology to be effective, it must conform to environmental, ethical, cultural, social, and economic aspects of each Africa community.[20] If this can be done, with sufficient funding and aid to implement such technologies, it is feasible to eliminate clean water scarcity for the African continent by the Millennium Development Goal deadline of 2015. Limitations Africa is home to both the largest number of water-scarce countries out of any region, as well as home to the most difficult countries to reach in terms of water aid. The prevalence of rural villages traps many areas in what the UN Economic Commission for Africa refers to as the "Harvesting Stage",[7] which makes water-scarce regions difficult to aid because of a lack of industrial technology to make solutions sustainable. In addition to the geographic and developmental limiting factors, a number of political, economic reasons also stand in the way of ensuring adequate aid for Africa. Politically, tensions between local governments versus foreign non-governmental organizations impact the ability to successfully bring in money and aid-workers. Economically, urban areas suffer from extreme wealth gaps in which the overwhelming poor often pay four to ten times more for sanitary water than the elite, hindering the poor from gaining access to clean water technologies and efforts.[7] As a result of all these factors, it is estimated that fifty percent of all water projects fail, less than five percent of projects are visited, and less than one percent have any long-term monitoring.[5] External links Webdossier Water in Africa (2012) References ↑ a b "The Facts About The Global Drinking Water Crisis". 2010. http://blueplanetnetwork.org/water/facts. Retrieved 18 March 2012. ↑ a b c d e f "Water Scarcity: The Importance of Water & Access". http://thewaterproject.org/water_scarcity.asp. Retrieved 18 March 2012. ↑ Sandy Cairncross (1988). "4". in Douglas Rimmer. Rural Transformation in Tropical Africa. Great Britain: Belhaven Press. pp. 49–54. ↑ "Impacts of Water Scarcity on Women's Life". http://www.worldpulse.com/node/20165. Retrieved 1 April 2012. ↑ a b c "Women Affected by the Crisis". http://water.org/learn-about-the-water-crisis/women. Retrieved 18 March 2012. ↑ "Women for Water". http://womenforwater.com. Retrieved 1 April 2012. ↑ a b c d e f "Management Options to Enhance Survival and Growth". http://www.uneca.org/awich/Water%20in%20Africa.pdf. Retrieved 18 March 2012. ↑ "10 Facts About Water Scarcity". http://www.who.int/features/factfiles/water/en/. Retrieved 11 April 2012. ↑ a b c "US Intel: Water a Cause for War in Coming Decades". http://www.twincities.com/ci_20230354/us-intel-water-cause-war-coming-decades?IADID=Search-www.twincities.com-www.twincities.com. Retrieved 23 March 2012. ↑ a b "Climate Change and Africa". http://www.oecd.org/dataoecd/57/7/38897900.pdf. Retrieved 11 April 2012. ↑ "International Decade for Action: Water for Life 2005-2015". http://www.un.org/waterforlifedecade/scarcity.shtml. Retrieved 18 March 2012. ↑ "Water Charities:A Comprehensive List". http://www.filtersfast.com/articles/Water-Charities-A-Comprehensive-List.php. Retrieved 11 April 2012. ↑ a b c "A Drop In The Bucket". http://www.dropinthebucket.org/about. Retrieved 11 April 2012. ↑ "Blood: Water Mission". http://www.bloodwatermission.com/. Retrieved 11 April 2012. ↑ "Blue Planet Network". http://blueplanetnetwork.org/. Retrieved 11 April 2012. ↑ "charity:water". http://www.charitywater.org/. Retrieved 11 April 2012. ↑ "Generosity Water". http://www.generositywater.com/. Retrieved 11 April 2012. ↑ "H2O For Life". http://www.h2oforlifeschools.org/. Retrieved 11 April 2012. ↑ "Just A Drop". http://www.justadrop.org/page.cfm/NewSection=Yes/GoSection=0. Retrieved 11 April 2012. ↑ a b "Lifewater International". http://www.lifewater.org/. Retrieved 11 April 2012. ↑ "Living Water International". https://www.water.cc/. Retrieved 11 April 2012. ↑ a b c "Pump Aid-Water For Life". http://pumpaid.org/. Retrieved 11 April 2012. ↑ "Ok Clean Water Project". http://www.okcleanwaterproject.org/. Retrieved 11 April 2012. ↑ "Ryan's Well Foundation". http://ryanswell.ca/home.aspx. Retrieved 11 April 2012. ↑ "The Water Project". http://thewaterproject.org/. Retrieved 11 April 2012. ↑ "WaterAid". http://www.wateraidamerica.org/. Retrieved 11 April 2012. ↑ "WaterCan EauVive". http://www.watercan.com/index.php. Retrieved 11 April 2012. ↑ "Water For People". http://www.waterforpeople.org/. Retrieved 11 April 2012. ↑ "Water Is Life". http://waterislife.com/. Retrieved 11 April 2012. ↑ "Water.org". http://water.org/. Retrieved 11 April 2012. ↑ "Thirst Relief International". http://www.thirstrelief.org/. Retrieved 11 April 2012. <|fim▁end|> | Overall this means that |
<|fim▁begin|> Почта СССР CPA catalogue ← 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 → CPA Nr 6279-6380 (102) Issues 1991, 1992 (Выпуски 1991, 1992 годов) Here complete descriptions of 1991 USSR stamps are given. Здесь приведены полные описания почтовых марок СССР 1991 года. All available images of 1991 USSR stamps are on the Wikimedia Commons: Все имеющиеся изображения почтовых марок СССР 1991 года находятся на Викискладе: Stamps of the Soviet Union, 1991 You can also see standard images of 1991 USSR stamps on Wikimedia commons: Типовые изображения почтовых марок СССР 1991 года можно также посмотреть на Викискладе: Каталог ЦФА (6001-6380) Attention! The stamps are sorted by CPA (Central Philatelic Agency) catalog numbers, not by dates of their issue! Внимание! Марки отсортированы по номерам каталога ЦФА, а не по дате выпуска! The names of stamps and stamp series are made according to all used 7 catalogues. Названия марок и серий марок составлены по всем используемым 7 каталогам. Contents 1 1 CPA Nr 6279-6283 (5) Fauna of Black Sea 2 2 CPA Nr 6284 (1) 75th Anniversary of Paul Keres (1916-1975), Estonian Chess Grandmaster 3 3 CPA Nr 6285 (1) 5th Anniversary of Chernobyl Nuclear Disaster 4 4 CPA Nr 6286-6289 (4) Russian Landscape Paintings 5 5 CPA Nr 6290 (1) Wildlife Management 6 6 CPA Nr 6291 (1) Wildlife Management 7 7 CPA Nr 6292-6294 (3) Let's protect the native nature 8 8 CPA Nr 6295-6297 (3) Monuments of Domestic History 9 9 CPA Nr 6298-6301 (4) 13th Standard Emission 10 10 CPA Nr 6302-6304 (3) Russian Settlements in America 11 11 CPA Nr 6305 (1) Asia and Pacific Transport Network, 10th Anniv. 12 12 CPA Nr 6306-6311 (6) Day of astronautics. The 30th anniversary of the first flight of the person in space. Yuri A. Gagarin 13 1 CPA Nr 6279-6283 (5) Fauna of Black Sea Full disain (Полное оформление). Fauna of Black Sea. 1991.01.04. The stamps with the name of animals in Russian and Latin. Designer: A. Isakov. Multicolored. Comb 11¾. Coated paper. Offset printing. Size: 32.5 x 32.5 mm. Sheet: 5 x 6 Фауна Чёрного моря. Худ. А. Исаков 1991.01.04 Zagor. 6214-6218 Liapine 6249-6253 Scott 5954-5958 Mich. 6158-6162 Gibb. 6215-6219 Yvert 5818-5822 #1991.1-1.1 White jellyfish (Rhizostoma pulmo Macri, 1778). Face value: 4k. Issued: 4,500,000.Медуза корнерот CPA 6279 Zagor. 6214 Liapine 6249 Scott 5954 Mich. 6158 Gibb. 6215 Yvert 5818 CPA 6279 stamp imperforated CPA 6279A Zagor. 6214Pa Liapine 6249A Scott ---- Mich. 6158U Gibb. ???? Yvert ???? #1991.2-1.2 Snakelocks anemone (Anemonia sulcata Thomas Pennant, 1777). Face value: 5k. Issued: 3,800,000.Морской анемон CPA 6280 Zagor. 6215 Liapine 6250 Scott 5955 Mich. 6159 Gibb. 6216 Yvert 5819 #1991.3-1.3 Spiny dogfish (Squalus acanthias Linnaeus, 1758). Face value: 10k. Issued: 3,500,000.Акула катран CPA 6281 Zagor. 6216 Liapine 6251 Scott 5956 Mich. 6160 Gibb. 6217 Yvert 5820 #1991.4-1.4 European anchovy (Engraulis encrasicolus Linnaeus, 1758). Face value: 15k. Issued: 3,000,000.Хамса CPA 6282 Zagor. 6217 Liapine 6252 Scott 5957 Mich. 6161 Gibb. 6218 Yvert 5821 #1991.5-1.5 Bottlenose dolphin (Tursiops truncatus Montagu, 1821). Face value: 20k. Issued: 2,800,000.Дельфин афалина CPA 6283 Zagor. 6218 Liapine 6253 Scott 5958 Mich. 6162 Gibb. 6219 Yvert 5822 CPA 6283 stamp imperforated CPA 6283A Zagor. 6218Pa Liapine 6253A Scott ---- Mich. 6162U Gibb. ???? Yvert ???? 2 CPA Nr 6284 (1) 75th Anniversary of Paul Keres (1916-1975), Estonian Chess Grandmaster Full disain (Полное оформление). 75th anniversary of Paul Keres (1916-1975), Estonian Chess Grandmaster. 1991.01.07. Designer: B. Ilyukhin. Face value: 15k. Dark brown. Harrow 11½. Coated paper. Photogravure. Size: 40 x 28 mm. Sheet: 5 x 10. Issued: 1,800,000 75-летие со дня рождения П. П. Кереса (1916-1975), эстонского шахматиста. Худ. Б. Илюхин #1991.6-2.11991.01.07 Portrait of the Soviet Estonian chess player Paul Keres (according to the photo) against chessmen of a knight and a bishop. Facsimile of the signature of P. Keres Портрет советского эстонского шахматиста Пауля Петровича Кереса (по фотографии) на фоне шахматных фигур коня и слона. Факсимиле подписи П. П. Кереса CPA 6284 Zagor. 6219 Liapine 6254 Scott 5964 Mich. 6163 Gibb. 6220 Yvert 5823 3 CPA Nr 6285 (1) 5th Anniversary of Chernobyl Nuclear Disaster Full disain (Полное оформление). 5th Anniversary of Chernobyl Nuclear Disaster. 1991.01.22. Designer: M. Verkholantsev. Face value: 15k. Multicolored. Harrow 11½. Coated paper. Photogravure. Size: 40 x 28 mm. Sheet: 5 x 10. Issued: 1,500,000 5-летие чернобыльской трагедии. Худ. М. Верхоланцев #1991.7-3.11991.01.22 Allegory: pernicious impact of radiation on all live Аллегория: губительное воздействие радиации на все живое CPA 6285 Zagor. 6220 Liapine 6255 Scott 5959 Mich. 6164 Gibb. 6221 Yvert 5824 4 CPA Nr 6286-6289 (4) Russian Landscape Paintings Russian landscape paintings. 1991.01.25. Designer: A. Zharov. Multicolored. C 12½:12 Российская пейзажная живопись. Многоцветные. Оформление А. Жаров 1991.01.25 Zagor. 6221-6224 Liapine 6256-6259 Scott 5960-5961 Mich. 6165-6168 Gibb. 6222-6225 Yvert 5825-5828 #1991.8-4.1 Evening in the Ukraine, 1878, by A.I. Kuindzhi. Face value: 0.10. Issued: 3,000.А. И. Куинджи "Вечер на Украине" (1878). CPA 6286 Zagor. 6223 Liapine 6256 Scott 5962 Mich. 6167 Gibb. 6224 Yvert 5825 #1991.9-4.2 Birch Grove, 1879, by A. I. Kuindzhi. Face value: 0.10. Issued: 3,000.А. И. Куинджи "Берёзовая роща" (1879). CPA 6287 Zagor. 6224 Liapine 6257 Scott 5963 Mich. 6168 Gibb. 6225 Yvert 5826 Se-tenants (6286-tablet-6287), tablet with portrait of A. I. KuindzhiМарки в сцепке: 6286-купон-6287. На купоне портрет художника А. И. Куинджи CPA ---- Zagor. ---- Liapine ---- Scott 5963a Mich. ---- Gibb. ---- Yvert ???? #1991.10-4.3 Sorrento Coast with View of Capri, 1826, by S.F. Shchedrin. Face value: 0.10. Issued: 3,000.С. Ф. Щедрин "Берег Сорренто с видом на остров Капри" (1826). CPA 6288 Zagor. 6221 Liapine 6258 Scott 5960 Mich. 6165 Gibb. 6222 Yvert 5827 #1991.11-4.4 New Rome, St. Angel’s Castle, 1823, by S. F. Shchedrin. Face value: 0.10. Issued: 3,000.С. Ф. Щедрин "Новый Рим. Вид на замок св. Ангела" (1823). CPA 6289 Zagor. 6222 Liapine 6259 Scott 5961 Mich. 6166 Gibb. 6223 Yvert 5828 Se-tenants (6288-tablet-6289), tablet with portrait of S. F. ShchedrinМарки в сцепке: 6288-купон-6289. На купоне портрет художника С. Ф. Щедрина CPA ---- Zagor. ---- Liapine ---- Scott 5961a Mich. ---- Gibb. ---- Yvert ???? 5 CPA Nr 6290 (1) Wildlife Management Birds. Surtax for the Zoo Relief Fund. 1991-02-04Птицы. Почтово-благотворительный выпуск в Фонд помощи зоопаркам #1991.12-5.11991-02-04 White stork (Ciconia Ciconia). Emblem of the Zoo Relief Fund. Birds. Surtax for the Zoo Relief Fund. Multicolored. Designer: A. Isakov. Face value: 0.10 + 0.05. Issued: 3,200. C 12:12½ Белый аист (Ciconia Ciconia). Эмблема Фонда помощи зоопаркам. Птицы. Почтово-благотворительный выпуск в Фонд помощи зоопаркам. Многоцветная. Худ. А. Исаков. CPA 6290 Zagor. 6225 Liapine 6260 Scott B179 Mich. 6172 Gibb. 6226 Yvert 5829 6 CPA Nr 6291 (1) Wildlife Management USSR Philatelic Society, 25th Anniv. 1991-02-05Почтово-благотворительный выпуск в Фонд помощи Союзу филателистов #1991.13-6.11991-02-05 Old World Swallowtail (Papilio machaon) on a flower. Wildlife management - a philately vital topic. USSR Philatelic Society Relief Fund semi-postal. Souvenir sheet. Multicolored. Designer: M. Morozov. Face value: 0.20 + 0.10. Issued: 700. H 12:12½ Махаон (Papilio machaon) на цветке. Охрана природы - актуальная тема филателии. Почтово-благотворительный выпуск в Фонд помощи Союзу филателистов. Почтовый блок. Многоцветная. Худ. М. Морозов. CPA 6291 Zagor. 6226 Liapine 6261 Scott B180 Mich. 6173 Gibb. MS6230 Yvert Block21 7 CPA Nr <|fim▁hole|> nature Let's protect the native nature. 1991.02.15. Multicolored. Designer: A. Isakov. H 11½ Защитим родную природу. Многоцветные. Худ. А. Исаков 1991.02.15 Zagor. 6227-6229 Liapine 6262-6264 Scott 5965-5967 Mich. 6169-6171 Gibb. 6227-6229 Yvert 5830-5832 #1991.14-7.1 Bell tower near Kaliazin, Volga River region. Face value: 0.10. Issued: 3,000.Волга. Затопленная колокольня. CPA 6292 Zagor. 6227 Liapine 6262 Scott 5965 Mich. 6169 Gibb. 6227 Yvert 5830 #1991.15-7.2 Lake Baikal. Face value: 0.15. Issued: 3,000.Байкал. В районе острова Ольхон. CPA 6293 Zagor. 6228 Liapine 6263 Scott 5966 Mich. 6170 Gibb. 6228 Yvert 5831 #1991.16-7.3 Desert zone of former Aral Sea. Face value: 0.20. Issued: 2,100.Арал. Морские суда, застывшие в барханах. CPA 6294 Zagor. 6229 Liapine 6264 Scott 5967 Mich. 6171 Gibb. 6229 Yvert 5832 8 CPA Nr 6295-6297 (3) Monuments of Domestic History Monuments of domestic history. 1991.03.05. Multicolored. Designer: L. Zaytsev. H 11½ Памятники отечественной истории. Многоцветные. Худ. Л. Зайцев 1991.03.05 Zagor. 6230-6232 Liapine 6265-6267 Scott 5968-5970 Mich. 6174-6176 Gibb. 623?-623? Yvert 583?-583? #1991.17-8.1 Mukhammed Bashar Mausoleum, Tadzhikstan (14 c.). Face value: 0.15. Issued: 2,800.Пенджикент. Мавзолей Мухаммеда Башшара (XIV век). CPA 6295 Zagor. 6230 Liapine 6265 Scott 5969 Mich. 6175 Gibb. 6232 Yvert 583? #1991.18-8.2 Moslem Tower, Uzgen, Kirghizia (11 c.). Face value: 0.15. Issued: 2,800.Узген. Минарет (XI век) на фоне киргизского орнаментального узора. CPA 6296 Zagor. 6231 Liapine 6266 Scott 5968 Mich. 6174 Gibb. 623? Yvert 5833 #1991.19-8.3 Talkhatan-baba Mosque, Turkmenistan (11 c.). Face value: 0.15. Issued: 2,800.Мары. Мечеть Талхатан-Баба (XI век). CPA 6297 Zagor. 6232 Liapine 6267 Scott 5970 Mich. 6176 Gibb. 623? Yvert 583? 9 CPA Nr 6298-6301 (4) 13th Standard Emission 13 standard emission on a coated paper. 1991.03.13. Litho. Designer: V. Koval. C 12½:12 /XIII стандартный выпуск на мелованной бумаге. Офсет. Худ. В. Коваль 1991.03.13 Zagor. 6233-6236 Liapine 6268-6271 Scott 5984-5987 Mich. 6177-6180 Gibb. ????-???? Yvert 5836-5839 #1991.20-9.1 Early ship, train, and carriage. Orange brown. Face value: 0.02. Issued: 1,000.Средства доставки почты (XIX век). Жёлто-коричневая. -/-/- on an ordinary paper (18.IV). Issued: mass-/-/- на обыкновенной бумаге -/-/- on an ordinary paper, imperforated (18.IV)-/-/- на обыкновенной бумаге без зубцов -/-/- UV paper CPA 6298 Zagor. 6233 Liapine 6268 Scott 5984 Mich. 6177 Gibb. ???? Yvert 5836 #1991.21-9.2 Airplane, helicopter, ocean liner, cable car, van. Bright blue. Face value: 0.07. Issued: 1,000.Современные средства доставки почты. Голубая. -/-/- on an ordinary paper (18.IV). Issued: mass-/-/- на обыкновенной бумаге -/-/- on an ordinary paper, Photogravure, H 12:11½ (25.VI)-/-/- на обыкновенной бумаге, рам. 12:11½ CPA 6299 Zagor. 6234 Liapine 6269 Scott 5985 Mich. 6178 Gibb. ???? Yvert 5837 #1991.22-9.3 Space shuttle. Dk lilac rose. Face value: 0.12. Issued: 1,000.Система "Энергия" и комплекс "Буран". Лилово-фиолетовая. -/-/- on an ordinary paper (18.IV). Issued: mass-/-/- на обыкновенной бумаге CPA 6300 Zagor. 6235 Liapine 6270 Scott 5986 Mich. 6179 Gibb. ???? Yvert 5838 #1991.23-9.4 Telecommunication satellite "Horizont". Deep violet. Face value: 0.13. Issued: 1,000.Спутник связи "Горизонт". Сине-фиолетовая. -/-/- on an ordinary paper (18.IV). Issued: mass-/-/- на обыкновенной бумаге CPA 6301 Zagor. 6236 Liapine 6271 Scott 5987 Mich. 6180 Gibb. ???? Yvert 5839 10 CPA Nr 6302-6304 (3) Russian Settlements in America Russian Settlements in America. 1991.03.14. Designer: Yu. Levinovsky. H 12:11½ Русская Америка. Худ. Ю. Левиновский 1991.03.14 Zagor. 6237-6239 Liapine 6272-6274 Scott 5971-5973 Mich. 6181-6183 Gibb. 6234-6236 Yvert 5840-5842 #1991.24-10.1 G. I. Shelekhov (1747-1795), Alaska colonizer. Brt blue & black. Face value: 0.20. Issued: 2,500.Гавань Трёх Святителей. Портрет Г. И. Шелехова. Синяя, голубая и чёрная CPA 6302 Zagor. 6237 Liapine 6272 Scott 5971 Mich. 6181 Gibb. 6234 Yvert 5840 #1991.25-10.2 A. A. Baranov, (1746-1819), first governor of Russian America. Olive brn & balk. Face value: 0.30. Issued: 2,200.Ново-Архангельск. Портрет А. А. Баранова. Оливковая и чёрная CPA 6303 Zagor. 6238 Liapine 6273 Scott 5972 Mich. 6182 Gibb. 6235 Yvert 5841 #1991.26-10.3 I. A. Kuskov, founder of Fort Ross, California. Red brn & balk. Face value: 0.50. Issued: 1,900.Форт Росс. Портрет И. А. Кускова. Красно-коричневая, оранжево-коричневая и чёрная CPA 6304 Zagor. 6239 Liapine 6274 Scott 5973 Mich. 6183 Gibb. 6236 Yvert 5842 11 CPA Nr 6305 (1) Asia and Pacific Transport Network, 10th Anniv. Asia and Pacific Transport Network, 10th Anniv. 1991.03.20 10-летие деятельности ЭСКАТО #1991.27-11.11991.03.20 Communication satellite and the ship against United Nations emblem. Multicolored. Designer: Yu. Artsimenev. Face value: 0.10. Issued: 1,500. H 11½ Спутник связи и судно на фоне эмблемы ООН. Многоцветная. Худ. Ю. Арцименев. CPA 6305 Zagor. 6240 Liapine 6275 Scott 5979 Mich. 6184 Gibb. 6237 Yvert 58?? 12 CPA Nr 6306-6311 (6) Day of astronautics. The 30th anniversary of the first flight of the person in space. Yuri A. Gagarin Day of astronautics. The 30 anniversary of the first flight of the person in space. Yuri A. Gagarin. 1991-04-06. Brown. Designer: G. Komlev. C 12 /День космонавтики, 30-летие первого полёта человека в космос. Юрий Гагарин. Коричневые. Худ. Г. Комлев 1991-04-06 Zagor. 6241-6244, Бл 221-222 Liapine 6276-6279, Блок 222-223 Scott 5974-5977 Mich. 6185-6188, Block 218-219 Gibb. 6238-6241, ???? Yvert 5844-5847, ???? #1991.28-12.1 Pilot. Face value: 0.25. Issued: 2,500.Теоретическая подготовка к полету (1960 г.) CPA 6306 Zagor. 6241 Liapine 6276 Scott 5974 Mich. 6185A Gibb. 6238 Yvert 5844 #1991.29-12.2 Cosmonaut. Face value: 0.25. Issued: 2,500.Перед стартом (1961 г.) CPA 6307 Zagor. 6242 Liapine 6277 Scott 5975 Mich. 6186A Gibb. 6239 Yvert 5845 #1991.30-12.3 Pilot, wearing hat. Face value: 0.25. Issued: 2,500.Первая зарубежная поездка. Прага (1961 г.) CPA 6308 Zagor. 6243 Liapine 6278 Scott 5976 Mich. 6187A Gibb. 6240 Yvert 5846 #1991.31-12.4 As civilian. Face value: 0.25. Issued: 2,500.Одна из последних фотографий (1968 г.) CPA 6309 Zagor. 6244 Liapine 6279 Scott 5977 Mich. 6188A Gibb. 6241 Yvert 5847 Stamps block of four. Face value: 0.25 × 4.Марки в квартблоке CPA ---- Zagor. ---- Liapine ---- Scott 5977a Mich. ---- Gibb. ---- Yvert ???? Little sheet of 4 × 2Малый лист 4 × 2 (два квартблока) CPA ---- Zagor. ---- Liapine ---- Scott 5977d Mich. ---- Gibb. ???? Yvert ???? Little sheet of 4 × 2, inscribedМалый лист 4 × 2 с чёрным дополнительным текстом: с чёрной офсетной надпечаткой текста: "Международная выставка "К звёздам-91" Космос на службе мира и прогресса" CPA ---- Zagor. ---- Liapine ---- Scott ---- Mich. ---- Gibb. ???? Yvert ???? #1991.32-12.5 Sheet of 4 stamps, imperforated. Simulated perforations. Grey-blue, brown & black. Face value: 0.25 × 4.Почтовый блок. Блок с имитационной зубцовкой. На поле блока: скульптура "К звёздам" (фрагмент) CPA 6310 Zagor. Бл 221 Liapine Блок 222 Scott 5977b Mich. Block 218 Gibb. ???? Yvert ???? #1991.33-12.6 Sheet of 4 stamps, imperforated, inscribed. Simulated perforationsПочтовый блок с чёрной офсетной надпечаткой текста: "Международная выставка "К звёздам-91" Космос на службе мира и прогресса". Блок с имитационной зубцовкой CPA 6311 Zagor. Бл 222 Liapine Блок 223 Scott 5977c Mich. Block 219 Gibb. ???? Yvert ???? 23 апреля 1991 / 23 April 1991 100-летие со дня рождения С. С. Прокофьева / 100th anniversary of Sergey S. Prokofiev Рисунок/Image Каталог ВП:Ф / WP:F Number Описание/Description Каталог ЦФА/CPA Scott Michel Yver Примечания/Notes Портрет композитора С. С. Прокофьева / Portrait of Sergey S. Prokofiev, composer 6314 5993 6191 Художник Б. Илюхин, тираж 2300 / Designer: B. Ilyukhin, issued: 2300 Почта СССР CPA catalogue ← 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 → <|fim▁end|> | 6292-6294 (3) Let's protect the native |
<|fim▁begin|> The text in its current form is incomplete. Contents 1 P.02 - Editorial Notes 2 P.02 - Contents Banner 3 P.01 - Contents Banner 4 P.02 - Contents 5 P.02 - Publication Notes P.02 - Editorial Notes Editorial Notes . . . P.02 - Contents Banner The Australasian Radio World Incorporating the All-Wave All-World DX News Managing Editor - A. Earl Read, B.Sc. Vol. 3. - January, 1939 - No. 9 P.01 - Contents Banner From 1940 03 The Australasian Radio World Incorporating the All-Wave All-World DX News Vol. 4. - MARCH, 1940 - No. 10. P.02 - Contents CONTENTS: P.02 - Publication Notes 1936 08 The "Australasian Radio World" is published monthly by A. E. Read. Editorial offices, 214 George Street, Sydney, N.S.W. Telephone BW6577. Cable address: "Repress," Sydney. Advertisers please note that copy should reach office of publication by 15th of month preceding that specified for insertion. Subscription rates: 1/- per copy, 10/6 per year (12 issues) post free to Australia and New Zealand. Subscribers in New Zealand can remit by Postal Note or Money Order. 1937 02 The "Australasian Radio World" is published monthly by Trade Publications Proprietary, Ltd. Editorial offices, 214 George Street, Sydney, N.S.W. Telephone BW6577. Cable address: "Repress," Sydney. Advertisers please note that copy should reach office of publication by 15th of month preceding that specified for insertion. Subscription rates: 1/- per copy, 10/6 per year (12 issues) post free to Australia and New Zealand. Subscribers in New Zealand can remit by Postal Note or Money Order. Printed by Bridge Printery Pty. Ltd., 214 George Street, Sydney, N.S.W., for the proprietors of the "Australasian Radio World," 214 George St., Sydney (Footnote P.XX) Only 1939 04 The "Australasian Radio World" is published monthly for the proprietors, Editorial offices, 214 George Street, Sydney, N.S.W. Telephone BW6577. Cable address: "Repress," Sydney. Advertisers please note that copy should reach office of publication by 14th of month preceding that specified for insertion. Subscription rates: 1/- per copy, 10/6 per year (12 issues) post free to Australia and New Zealand. Subscribers in New Zealand can remit by Postal Note or Money Order. Printed by Bridge Printery Pty. Ltd., 214 George Street, Sydney, N.S.W., for the proprietors of the "Australasian Radio World," 214 George St., Sydney (Footnote P.48) From 1939 05 The "Australasian Radio World" is published monthly by Read Publications. Editorial offices, 214 George Street, Sydney, N.S.W. Telephone BW6577. <|fim▁hole|> note that copy should reach office of publication by 14th of month preceding that specified for insertion. Subscription rates: 1/- per copy, 10/6 per year (12 issues) post free to Australia and New Zealand. Printed by Bridge Printery Pty. Ltd., 214 George Street, Sydney, N.S.W., for the proprietors of the "Australasian Radio World," 214 George St., Sydney (Footnote P.XX) 1939 12 The "Australasian Radio World" is published monthly by Read Publications. Editorial offices, 214 George Street, Sydney, N.S.W. Telephone BW6577. Cable address: "Repress," Sydney. Advertisers please note that copy should reach office of publication by 14th of month preceding that specified for insertion. Subscription rates: 1/- per copy, 10/6 per year (12 issues) post free to Australia and New Zealand. Note: Address of Editorial offices after December 10, 1939, will be 117 Reservoir Street, Sydney. Printed by Bridge Printery Pty. Ltd., 214 George Street, Sydney, N.S.W., for the proprietors of the "Australasian Radio World," 214 George St., Sydney (Footnote P.40) From 1940 01 The "Australasian Radio World" is published monthly by Read Publications. Editorial offices, 117 Reservoir Street, Sydney, N.S.W. Telephone FL2842. Cable address: "Repress," Sydney. Advertisers please note that copy should reach office of publication by 14th of month preceding that specified for insertion. Subscription rates: 1/- per copy, 10/6 per year (12 issues) post free to Australia and New Zealand. Printed by Bridge Printery Pty. Ltd., 117 Reservoir Street, Sydney, N.S.W., for the proprietors of the "Australasian Radio World," 117 Reservoir St., Sydney (Footnote P.XX) From 1940 03 The "Australasian Radio World" is published monthly by A. G. Hull. Editorial offices, 117 Reservoir Street, Sydney, N.S.W. Telephone FL2842. Cable address: "Repress," Sydney. Advertisers please note that copy should reach office of publication by 14th of month preceding that specified for insertion. Subscription rates: 1/- per copy, 10/6 per year (12 issues) post free to Australia and New Zealand. Printed by Bridge Printery Pty. Ltd., 117 Reservoir Street, Sydney, N.S.W., for the proprietors of the "Australasian Radio World," 117 Reservoir St., Sydney (Footnote P.XX) From 1940 10 The "Australasian Radio World" is published monthly by A. G. Hull. Editorial offices, 117 Reservoir Street, Sydney, N.S.W. Telephone MA2455. Subscription rates: 1/- per copy, 10/6 per year (12 issues) post free to Australia and New Zealand. Printed by Bridge Printery Pty. Ltd., 117 Reservoir Street, Sydney, N.S.W., for the proprietor of the "Australasian Radio World," 117 Reservoir St., Sydney (Footnote P.XX) <|fim▁end|> | Cable address: "Repress," Sydney. Advertisers please |
<|fim▁begin|> King's Gambit Accepted, 4...g4 a b c d e f g h 8 8 7 7 6 6 5 5 4 4 3 3 2 2 1 1 a b c d e f g h Position in Forsyth-Edwards Notation (FEN) rnbqkbnr/pppp1p1p/8/8/2B1Ppp1/5N2/PPPP2PP/RNBQK2R Parent: King's Gambit King's Gambit Accepted, 4...g4 With this move, Black reveals the full purpose of 3...g5 — not only did the g pawn protect Black's extra f pawn, it also threatened to dislodge White's sole defender of the h4 square, the knight on f3. White must now reconcile the dual threats of 5...gxf3 and 5...Qh4+. White can safely ignore the threat with 5.O-O!, sacrificing his knight in order to move his king to safety, develop his rook to the semi-open f file, and rapidly develop his queen to f3. If White so chooses, he can sacrifice a second piece to move the Black king to the f-file, giving White excellent practical chances. Because the Muzio and double Muzio gambits give Black an overwhelming number of problems to solve over the board, most players avoid this line completely and simply play 4...Bg7 with a good game. White's alternative fifth moves, 5.Nc3!? and 5.Bxf7+, are relics of a bygone era and thus rarely seen in tournament play. Theory table For explanation of theory tables see theory table and for notation see algebraic notation. 1.e4 e5 2.f4 exf4 3.Nf3 g5 4.Bc4 g4 5 6 7 8 9 10 11 12 13 14 Muzio Gambit O-O!gxf3 <|fim▁hole|> Bd2Nbc6 Rae1Qf5 Nd5Kd8 Qe2Qe6 Qf2Qf5 = Double Muzio Gambit ... ... ... ... ... ... Bxf7+ Kxf7 d4Qf5 g4Qg6 Bxf4Nf6 =+ McDonnell Gambit Nc3!?gxf3 ∞ Wild Muzio (Lolli) Gambit Bxf7+!?Kxf7 ∞ When contributing to this Wikibook, please follow the Conventions for organization. Wikipedia has related information at Kings Gambit References Modern Chess Openings: MCO-14. 1999. Nick de Firmian, Walter Korn. ISBN 0-8129-3084-3. v • d • e Chess Openings1. e4 e5 Open Game · King's Gambit · Bishop's Opening · Vienna · Petrov · Latvian Gambit · Scotch · Giuoco Piano · Two Knights · Ruy Lopez · Philidor Defence1. e4 c5 Sicilian Defence · Closed Sicilian · Taimanov · Sveshnikov · Kan Sicilian · Sicilian Dragon · Scheveningen · Najdorf · Alapin1. e4 other French Defence · Caro-Kann Defence · Pirc Defence · Alekhine Defence · Modern · Scandinavian · Nimzowitsch 1. d4 Nf6 Indian Defence · King's Indian · Nimzo-Indian · Queen's Indian · Grünfeld · Benoni · Budapest · Catalan1. d4 d5 Closed Game · Queen's Gambit · Queen's Gambit Accepted · Queen's Gambit Declined · Chigorin · Slav · Semi-Slav · Marshall1. d4 other Dutch Defence · Old Benoni Defence · Englund Gambit · English Defence · King's Indian Attack · Réti Opening1. a3 · Na3 · a4 · b3 · b4 · c3 · Nc3 · c4 · d3 · d4 · e3 · e4 · f3 · Nf3 · f4 · g3 · g4 · h3 · Nh3 · h4 <|fim▁end|> | Qxf3Qf6 e5!?Qxe5 d3Bh6 Nc3Ne7 |
<|fim▁begin|> Fill out all the questions, then push the button at the bottom to see how well you did. Good luck! 1 Listen, write down the Dutch and translate Dutch: ! English: ! 2 Listen, write down the Dutch and translate Dutch: ? English: ? 3 What would you say next? Ja, het was erg leuk gisteren. ....Ja, dat vonden wij ook. Wat doet u vandaag? <|fim▁hole|> uur bij de dokter zijn. .... O, dat is al over een kwartier! ! 4 Translate May I take your coat? .... Mag ik u helpen? 5 What would you say next? Nogmaals dank! .... ! 6 Select the correct translation After youPleased to meet you!Does it bother you?What a pity!May I introduce? Wat jammer! Na u Mag ik voorstellen? Aangenaam kennis te maken Hindert het? <|fim▁end|> | Ik moet om drie |
<|fim▁begin|> Contents 1 Motivation 2 Method 3 Client-Side or Server-Side Transform: Design Tradeoffs 4 Disabling betterFORM on eXist 2.0 and 2.1 5 Browser Portability Issues 6 Problem with Namespace Axis in Firefox 3.0 7 How XSLTForms works 8 Controlling Client and Server XSLT Execution 9 Server-side Transformation using the transform Function 10 Using XSLTForms on the Server Side in a URL Rewrite Filter 11 Modifying your CSS to work with XSLTForms 12 Disabling the CSS Conversion Option 13 Formatting XForms Elements 14 Rendering Block Forms 15 Aligning select1 with appearance=full 16 Using xf:load in place of xf:submission 17 Controlling Namespace Prefixes in the Output 18 Bind Restrictions 19 Set Focus on Inserts 20 Upload file with XSLTForms 21 References 22 Acknowledgements Motivation You want to port your standard XForms applications to work with XSLTForms and to be able to dynamically generate XForms from eXist XQueries. Method XSLTForms is a very lightweight XForms processor that can be configured to run either on the web server or the web client. XSLTForms transforms each XForms element in the XForms application into HTML with some JavaScript. If you are using the client to do the transform, you must be aware of some limitations in client side-browsers. Client-Side or Server-Side Transform: Design Tradeoffs The design decision of where to execute the transform, on the client or on the server, is one that may vary based on your situation. Transforming the form on the server can sometimes avoid the transmission of the full XSLT transform to the client and it also avoids browser-dependent variations. This process also may work more naturally for pipeline operations that use tools like XProc on the server. On the other hand, once the first form is loaded, the XSLT transform can be read from the local browser cache. This allows you to only have to transmit the actual XForms application specification and not the much larger JavaScript and HTML code. So this option can minimize the network traffic as well as minimize the delay in displaying the changes. The XSLTForms application is a library for doing XSL transforms based on the XForms input file. The output is a combination of HTML and JavaScript that will run across many browsers (Firefox, Internet Explorer 6, 7 and 8, Apple Safari, Google Chrome, and Opera). Note that for many internal forms on an intranet, it is possible to request that all your users use a web browser that supports in-client plugins. This means that your XForms load times are very fast and your testing process is simple. For public forms, you often can not specify what browser the users must use, so the forms developer is required to test on many different versions of many different browsers. This can dramatically slow the forms development process and can cause testing and development costs to grow. Disabling betterFORM on eXist 2.0 and 2.1 eXist 2.0 and 2.1 come with the server-side XForms processor betterFORM installed as default. In order to allow XSLTForms to process XForms, you should do one of the following: To use XLSTForms in a certain context, but allow the use of betterFORM in other contexts, set the following dummy attribute in your XQuery: let $attribute := request:set-attribute('betterform.filter.ignoreResponseBody', 'true') in the XQuery that generates your form. In order to disable betterFORM completely, change <property name="filter.ignoreResponseBody" value="false" to "true" in $EXIST_HOME/webapp/WEB-INF/betterform-config.xml or comment out the entries for XFormsFilter in $EXIST_HOME/webapp/WEB-INF/betterform-config.xml and/or in $EXIST_HOME/webapp/WEB-INF/web.xml and restart. Browser Portability Issues One of the large challenges attendant on supporting multiple versions of browsers from many vendors is that the way they render CSS can be dramatically different. Since XForms frequently leverage advanced CSS structures for form layout, this can be a large concern for XForms application developers. IE 6 can be especially troublesome due to its lack of full support for the CSS box model. This is especially true of forms that do not use HTML Table layouts to render forms. What was a simple style sheet for a single browser may often grow to be very complex and require many days of testing. For example the use of inline-block has many variations on many different browsers. The best defense against the browser incompatibilities is to keep your forms very small and simple. Use many different class attributes and don't use repeating structures unless absolutely necessary. Problem with Namespace Axis in Firefox 3.0 There is currently a namespace bug in the Mozilla Firefox browser that prevents any instances from being loaded that use the non-null namespaces. For example the following XML file cannot be loaded into an instance using the src attribute. <ex:root xmlns:ex="http://www.example.com"> <ex:string>This is a test string.</ex:string> </ex:root> The workaround is to put a dummy namespace prefix reference in the HTML root element, such as: <html xmlns="http://www.w3.org/1999/xhtml" xmlns:xf="http://www.w3.org/2002/xforms" xmlns:ex="http://www.example.com" ex:dummy="dummy" > <head> The ex:dummy="dummy" will fix the problem and the instances will load correctly into the form. This patch may not work on other versions of Firefox. Note that the instance can be loaded inline to get around this bug. Also note that using the default namespace in the instance will also not work. This is known as the Firefox Namespace Axis Problem. This is not a problem in Internet Explorer, Safari, Opera or Chrome. Firefox is the only browser that does not support namespace axis functions. XML support appears to be a low priority within Mozilla. We encourage anyone that feels that Firefox should support XML namespaces to vote for this bug fix on the Mozilla web site. See Mozilla Bug ID 94270. The comment by C. M. Sperberg-McQueen is very informative. The article by Uche Ogbuji discusses the new features Firefox 3.0 offers for XML processing. How XSLTForms works To convert your standard XForms to work with XSLTForms you only have to add the following statement as the first line of your XForms file. <?xml-stylesheet type="text/xsl" href="/exist/rest/db/xforms/xsltforms/xsltforms.xsl"?> The actual URL to use on your eXist installation may vary depending on your version. This document is large for an XSLT stylesheet (currently about 114KB and 4,500 lines long), but much smaller than many JavaScript libraries that run over 50,000 lines of code. The XSLT process also loads a 363KB JavaScript file. The key is that once it is loaded for the first form it can be stored in the web cache. A compressed version of this file may provide faster loading times in the future. This process will always be slower than a native XForms processor like the Firefox XForms extension, but the benefit is that it will work on multiple browsers once the XForms stylesheets have been tested on one browser. Controlling Client and Server XSLT Execution By default, eXist will always attempt to perform server-side XSLT processing whenever it encounters an XML Processing Instruction that signals that it should perform a transform. If your XForms are static, meaning that they do not change at all based on the context of the situation, you can store the forms anywhere on a web file system. They do not need to be stored in eXist. If you store the XForms in eXist, there are two items you must be aware of. By default, eXist processes all XML XSL processing instructions and runs them on the server BEFORE they ever reach the browser. This is not the way that XSLTForms was originally designed to work. It also requires a lot more bandwidth between the client and the server. To disable server-side XSLT processing you will need to add the following instruction to your XQuery that generates the XForms: declare option exist:serialize "method=xhtml media-type=text/xml"; declare option exist:serialize "indent=no"; declare option exist:serialize "process-xsl-pi=no"; The first line sets the XHTML serialization type and also sets the standard XML mime type. Note: Many browsers such as IE do not recognize the proper XForms mime type of application/xhtml+xml. To get around this problem you can use the incorrect mime type of text/xml. There are ways to fix IE to recognize the correct mime types by making changes to the Windows registry but these changes are difficult to make for general users. For more details see here The second line is required by the current release of XSLTForms. The last line tells the server-side to not process the transform. These three options can be combined into a single statement: declare option exist:serialize "method=xhtml media-type=text/xml indent=no process-xsl-pi=no"; Note that in the context of eXist, process-xsl-pi=no means "do not process this on the server before you send it to the browser". One approach to generating dynamic forms is to use the following style: let $form := <html xmlns="http://www.w3.org/1999/xhtml" xmlns:ev="http://www.w3.org/2001/xml-events" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:xf="http://www.w3.org/2002/xforms"> <head> <title>XForms Template</title> <xf:model> <xf:instance xmlns="" id="save-data"> <data/> </xf:instance> </xf:model> </head> <body> <h1>XForms Template</h1> <p>This XForms application has been dynamically generated from an XQuery</p> </body> </html> You can then return the following at the end of your form: let <|fim▁hole|> return ($xslt-pi,$form) For debugging you can also use: let $xslt-pi := processing-instruction xml-stylesheet {'type="text/xsl" href="/exist/rest/db/xforms/xsltforms/xsltforms.xsl"'} let $debug := processing-instruction xsltforms-options {'debug="yes"'} return ($xslt-pi, $debug, $form) Here the href points to the location you have installed your XSLTForms library. Server-side Transformation using the transform Function eXist provides a method for doing a server-side XSLT transform using the transform module. The following is an example of using this transform function to perform server-side transformation of the form. xquery version "1.0"; declare option exist:serialize "method=xhtml media-type=text/html indent=no"; let $form := <html xmlns="http://www.w3.org/1999/xhtml" xmlns:ev="http://www.w3.org/2001/xml-events" xmlns:xf="http://www.w3.org/2002/xforms"> <head> <title>XForms Template</title> <xf:model> <xf:instance xmlns="" id="save-data"> <data> <name>John Smith</name> </data> </xf:instance> </xf:model> </head> <body> <h1>XForms Test Program</h1> <xf:input ref="name"> <xf:label>Name: </xf:label> </xf:input> </body> </html> let $transform := '/exist/rest/db/xforms/xsltforms/xsltforms.xsl' let $params := <parameters> <param name="omit-xml-declaration" value="yes"/> <param name="indent" value="no"/> <param name="media-type" value="text/html"/> <param name="method" value="xhtml"/> <param name="baseuri" value="/exist/rest/db/xforms/xsltforms/"/> </parameters> let $serialization-options := 'method=xml media-type=text/html omit-xml-declaration=yes indent=no' return transform:transform($form, $transform, $params, $serialization-options) Using XSLTForms on the Server Side in a URL Rewrite Filter It is also possible to perform server-side transformation using eXist's URL Rewrite function. Sample from /eXist/webapp/xforms/controller.xql <dispatch xmlns="http://exist.sourceforge.net/NS/exist"> <view> <forward servlet="XSLTServlet"> (: Apply xsltforms.xsl stylesheet :) <set-attribute name="xslt.stylesheet" value="xsltforms/xsltforms.xsl"/> <set-attribute name="xslt.output.omit-xml-declaration" value="yes"/> <set-attribute name="xslt.output.indent" value="no"/> <set-attribute name="xslt.output.media-type" value="text/html"/> <set-attribute name="xslt.output.method" value="xhtml"/> <set-attribute name="xslt.baseuri" value="xsltforms/"/> </forward> </view> <cache-control cache="yes"/> </dispatch> See Example from eXist subversion Modifying your CSS to work with XSLTForms Because XSLTForms uses XSLT on the web client, it only knows how to parse XML files. To get your CSS files to work you will have to make each of your CSS files a well-formed XML document. This can be easily done by simply wrapping your CSS file with a root data element such as: <css> /* empty rule to recover from parse errors */ empty {} body {font-family: Arial, Helvetica, sans-serif;} label {font-weight: bold;} </css> If you wish your CSS to be both valid CSS and well-formed XML, you can use a special prolog <css><![CDATA[/**/ and epilog /*]]>*/</css> as shown in the two examples below. As interpreted by an XML parser: <!--/*--><css><![CDATA[/**/ h1 { body {font-family: Arial, Helvetica, sans-serif;} label {font-weight: bold;} } /*]]>*/<!--/*--></css><!--*/--> The same file interpreted by a CSS parser: <!--/*--><css><![CDATA[/**/ h1 { body {font-family: Arial, Helvetica, sans-serif;} label {font-weight: bold;} } /*]]>*/<!--/*--></css><!--*/--> You can then just import the CSS file into your XForms file using the link element: <link type="text/css" rel="stylesheet" href="style-with-root-wrapper.css"/> XQuery can also be used to automatically generate the CSS file from the server. On the server the CSS file can be wrapped, but for non XSLTForms clients the root element can be removed. If there are small changes in the CSS that are not global to all other forms, you can insert them directly into the <style> tag of the form. Note that if your XForms are dynamically generated from an XQuery you must enclose the style with CDATA wrappers or use double curly braces {{ and }} to escape the XQuery processing. <style type="text/css"> <![CDATA[ @namespace xf url("http://www.w3.org/2002/xforms"); .block-form xf|label { width: 15ex; } .PersonGivenName .xforms-value {width:20ex} .PersonSurName .xforms-value {width:25ex} ]]> </style> Note that in the Firefox plugin the CSS class for changing the value was .xf-value. In XSLTForms the class is .xforms-value. Disabling the CSS Conversion Option XSLTForms also allows you to add the following XML Processing Instruction flag to your XForms file. <?css-conversion no?> <?xsltforms-options debug="no"?> If you add these lines the CSS files will not need to be converted to XML files. You can not use the @namespace xf features within the CSS, and you may have to add class attributes to tags, but some users prefer this method. Formatting XForms Elements The following syntax should be used for styling XForms elements: @namespace xf url("http://www.w3.org/2002/xforms"); xf|label {font-weight: bold;} Note that this format has been tested with XSLTForms on IE 8, Firefox, Opera and Safari running on Windows, the Mac and Linux. Rendering Block Forms Block forms are forms that use a block layout for each control so each control appears on a different line. Block forms have a consistent layout and have room for hint text, required field labels and help icons. Inline forms that have multiple fields on a line should be used only when you have screen area constraints. Example of a block form To render block forms correctly we suggest you wrap all block forms in a standard div tag with a class of "block-form": <div class="block-form"> ...put the controls here... </div> This allows you to use a CSS file where the block display items are only triggered if they are decendants of the block form div element. Here are some sample CSS rules for block forms. /* formatting rule for all XForms controls elements within a block form. Each input control is on a separate line */ .block-form xf|input, .block-form xf|select, .block-form xf|select1, .block-form xf|textarea { display: block; margin: 1ex; } /* formatting rule for all labels in a block form */ .block-form xf|label { display: inline-block; width: 15ex; /* fix the width of all the labels in the block form */ float: left; text-align: right; margin-right: 1ex; /* margin to the right of the label */ } The most risky part of this is the inline-block rule. This is required to allow you to fix the width of the label. Aligning select1 with appearance=full If you want to display all the items in a selection list you can add the attribute <xf:select1 appearance="full"> To keep the item values together you must add the following to your CSS file: xf|select1 xf|item { margin-left: 21ex; } Using xf:load in place of xf:submission The current release of XSLTForms does not support the xf:submission element with the correct URL rewrite when the replace="all" attribute is used. This structure is used in many search forms, when a form is used to gather a set of parameters, such as keywords and date ranges that are used to limit the search. These search parameters are traditionally stored in a single instance in the model and used to construct a URL for a restful search service. Here is an example of search parameters stored in an instance in your model: <xf:instance xmlns="" id="search-params"> <data> <url>http://www.example.com/search.xq?q=</url> <q></q> </data> </xf:instance> XSLTForms does however support the xf:load function, and when you use xf:load with the xf:resource subelement you can achieve the same result. For example within a trigger action you can use the following: <xf:trigger> <xf:label>Search</xf:label> <xf:action ev:event="DOMActivate"> <xf:load show="replace"> <xf:resource value="concat( 'search.xq?q=', instance('search-params')/q )"/> </xf:load> </xf:action> </xf:trigger> Controlling Namespace Prefixes in the Output XSLTForms can change the way that namespace prefixes in your instance data are managed. If you load an instance with a default namespace, all the submitted data will include a namespace prefix. If your input is: <task xmlns="http://www.example.com/task"> <id/> <task-name/> <task-description/> </task> Then the saved output will become: <task:task xmlns="http://www.example.com/task"> <task:id/> <task:task-name/> <task:task-description/> </task:task> This can be controlled by the includenamespaceprefixes attribute of the submission element. Bind Restrictions With XSLTForms you can only have a single bind per element in your instance. So for example you can not put the data type in a separate bind as a required bind. It will generate an error, but will not indicate which element is bound twice. Set Focus on Inserts There is no way to set the focus on a new insert. See Repeat Test 1 Upload file with XSLTForms Versions of XSLTForms earlier than rev. 537 (April 2012) do not support the XForms Control upload. For versions 537 and later, the XForms "upload" control is supported and behaves essentially as described in the XForms 1.1 specification. For version earlier than 537, there is a work-around. In case of submission method "xml-urlencoded-post" XSLTForms dynamically build a form whose ID is "xsltforms_form" If this form still exists, XSLTForms replaces the value of the first child of the form by the serialization of the submitted instance content. Example Model <xf:model> <xf:instance> <data> <comment>Upload one or two files</comment> <data> </xf:instance> <xf:submission id="sub" method="xml-urlencoded-post" replace="all" action="load.xql"> <xf:message level="modeless" ev:event="xforms-submit-error"> Submit error. </xf:message> </xf:submission> </xf:model> Form <form name="upload" id="xsltforms_form" action="load.xql" enctype="multipart/form-data" method="post"> <input type="hidden" name="postdata"/> <input type="file" name="file1" style="width: 360px" /> <input type="file" name="file2" style="width: 360px" /> </form> Submission <xf:submit submission="sub"> <xf:label class="label">Send</xf:label> </xf:submit> XQuery load.xql ... let $collection := "/db/my/docs" let $f1 := request:get-uploaded-file-name("file1") let $f2 := request:get-uploaded-file-name("file2") let $data := request:get-parameter("postdata",()) let $o1 := if ($f1 ne "") then xdb:store($collection, xdb:encode-uri($f1), request:get-uploaded-file-data("file1")) else () let $o2 := if ($f2 ne "") then xdb:store($collection, xdb:encode-uri($f2), request:get-uploaded-file-data("file2")) else () ... This is a trick that enables uploading files within an XSLTForms application. File content is not loaded in instance. References XSLTForms Home Page XSLTForms on SourceForge XSLTForms Test Results XSLT transform the transform itself is around 3,000 lines Acknowledgements Most of the above materials were generated with the kind assistance of the XSLTForms author Alain Couthures. Back: Patching your Browser to Support XForms • Next: Configuration File Editor <|fim▁end|> | $xslt-pi := processing-instruction xml-stylesheet {'type="text/xsl" href="/exist/rest/db/xforms/xsltforms/xsltforms.xsl"'} |
<|fim▁begin|> User-Generated Content in Education This box: view • talk • edit 21st Century Physics ·· CK-12 Flexbooks ·· FreeReading.net ·· Curriki & Portals ·· PA's SAS Portal ·· Wikibook Textbooks ·· Wikipedia ·· YouTube & TeacherTube ·· Learning by Creating ·· The Internet Archive ·· Open Educational Resources ·· User-Generated Music ·· App Stores ·· iTunes University ·· Image Content Contents 1 YouTube and Teacher Tube in Education 2 History 2.1 Historical facts 3 Features 4 YouTube Guidelines 5 Privacy 6 Benefits 7 Educational Impact 8 Criticisms 9 Tosh.O 10 External Links 11 References 12 Further Readings YouTube and Teacher Tube in Education History In 2005, three employees of PayPal, Chad Hurley, Jawed Karim, and Steve Chen, founded the website [YouTube] so that people could upload and share videos. In November 2005, Sequoia Capital gave 3.5 million dollars in funding to YouTube and from there it was officially launched. In April 2006, Sequoia and Artis Capital contributed an additional 8 million dollars to the rapidly growing company. [1]. Within one year of the funding, YouTube was purchased by Google Inc. for 1.65 billion dollars. [2]. At the completion of the sale, Sequoia Capital’s Google shares were estimated at more than $442 million, Chad Hurley’s were estimated at $345 million, Steve Chen’s at more than $326 million, Artis Capital's shares were at more than $83 million, and Jawed Karim’s at more than $64 million. [3] Early Headquarters in San Mateo A lawsuit was brought up against YouTube and Google in March 2007 by Viacom, who claimed that “we must turn to the courts to prevent Google and YouTube from continuing to steal value from artists and to obtain compensation for the significant damage they have caused.” After this event, more than 100,000 videos had to be removed. However, YouTube continued to grow and released versions in many different languages, including Spanish, French, and Japanese. [4]. On March 6, 2007, TeacherTube was officially launched with the purpose of sharing instructional videos to the online community. Jason Smith was a 14-year veteran teacher, coach, and administrator who came up with the idea for this site. It provides the opportunity for teachers to teach students, as well as other teachers, concepts or skills. [5]. Most importantly, TeacherTube community members are a major part of the evolution of the site. Members are encouraged to not only upload educationally relevant videos, but also to make constructive comments and use the rating system to show appreciation for videos of value to one as an educator or learner. [6] Historical facts The domain name YouTube.com is registered on February 15, 2005.[7]. The first YouTube video is posted on April 23, 2005.[8]. By March 6, 2006, YouTube has 25 million clips, with 20,000 clips being uploaded each day.[9]. YouTube is named Time Magazines' Invention of the Year in 2006.[10]. PC World Magazine named YouTube the 9th of the Top 10 Best Products of 2006.[11]. Today, YouTube reaches over 1 Billion views per day.[12]. TeacherTube was launched on March 6, 2007. [13] By 2008, TeacherTube has over 26,000 educational videos. [14] Features YouTube is available in 24 different countries. It is available in more than 30 different languages. [15]. Both sites are free to use and watch videos. Users are able to flag any videos that they feel are inappropriate, which are then reviewed by the staff, and removed if necessary. TeacherTube offers many great resources for teachers. It also encourages members to upload videos of educational content and worth, to leave comments, and use the rating system for uploaded videos. Teachers can create a digital portfolio to share lesson plans with colleagues all over the world, thus creating a sense of community in education. [16]. YouTube Guidelines Respect the YouTube Community. Be Responsible. Don't Cross the Line--Be very aware of what you post. Free Speech is encouraged, but do not permit attacks. Do not post misleading information. Follow Copyright Laws. [17] Privacy Copyright means that when a person creates an original work of authorship, it is protected by law. Original work can be anything that can be read, heard, and/or seen. A person’s work is protected as soon as it is “created and fixed in a tangible form.” Original work can be either published or not published and still be protected by law.[1] Creative Commons (CC) is a website that promotes collaboration among the general public and creators. This site allows the general public access to work created by others. People are given the right to use or modify the works of originial authors. There are six CC licenses. These licenses will let authors decide what others can do with their original work.[18]. [2] YouTube takes copyright very seriously. They have established a new technology for copyright holders. It is called Content ID. This is a set of tools that helps people who upload videos to YouTube be able to find their content and allows them to decide what they want to do when they find it. These users may block it, leave it up, or make <|fim▁hole|> user believes that a video posted on YouTube is violating their copyright, they may flag the video and select "infringes my copyright" from the list of options provided. This information will then be reviewed by the YouTube board. [19]. Benefits There are many benefits of using YouTube and TeacherTube. Here is a list of some of those benefits: 1. It is Free to use 2. It is user friendly 3. View any video tutorial on any subject 4. Share videos globally 5. Express one’s creativity 6. One can become famous 7. Hidden talents are found 8. Videos are a powerful teaching tool 9. Stay current on any subject 10. Don’t need expensive equipment Educational Impact Both YouTube and TeacherTube provide educational lectures and instructional videos that teaches new information to the learner or reinforces material that has already been learned. Both sites contain numerous student projects, experiments, and professional development clips even for the teachers. Several colleges, such as the University of California Berkeley and Vanderbilt, have partnered with YouTube to provide the schools with channels for lectures and interactive web-sites. The video-clips allow students to explore the topic beyond the assignment. [20] Being able to share so much information with others who are so far away can change the role of teachers and students in the future. With this valuable tool, students are able to explore, problem-solve, foster debates, and think critically. Teacher Tube contains a teaching resources page. Individuals can upload video, documents, audio, and photos. The Teacher Vision section contains lesson pland, printables and more. These resources are organized by subject, grade, and theme. [21] Criticisms Some YouTube users are breaking the copyright law. It seems that users are uploading videos that they did not make and claiming as their own. Others are posting videos that may be offensive and not socially correct. There are also mature videos and videos with violence in them that are not suitable for young children. Kids also have free rein to watch any video of their choice.[3] Users have the ability to preserve the integrity of the site by flagging inappropriate videos. TeacherTube staff review flagged sites and will remove any inappropriate posts. With more collegial commentary and discussion through messaging and responses, the quality of this resource will only increase. [4] Tosh.O YouTube has been a hot topic in the news since its creation. However, on June 4, 2009 YouTube made its debut on Comedy Central in a show called Tosh.O. In its first season it recorded a startling one million viewers per episode. It was noted that by 2010, this show has had up to 2.7 million viewers per episode. This hit-TV show focused on the viral videos that are watched on YouTube. The host, Daniel Tosh, then uses comical language and discusses the videos on the spot to his viewers. There is also a section of each episode known as "Web Redemption" where they invite a person (from a viral video) onto the TV show to defend or explain their actions that were captured on the YouTube video. Daniel Tosh realized the popularity and opportunities that YouTube possessed, created this TV show, and is now extremely successful and profitable.[22] External Links http://www.SchoolTube.com is a site that allows parents to enter the classroom when they are unable to attend in person. The student-created content on this site is approved by registered teachers and is safe to share across the US. http://www.HotChalk.com is another K-12 site for teachers to collaborate with other teachers and students. It allows students to e-mail assignments to teachers and lets parents log in to check on their child’s grades and progress. http://creativecommons.org/about/licenses/ is informaiton on the six CC licenses References ↑ http://en.wikipedia.org/wiki/History_of_YouTube accessed March 1, 2011 ↑ http://www.crunchbase.com/company/youtube accessed March 3, 2010 ↑ http://logicbank.com/2007/02/09/google-sec-filing-reveals-youtube-investors-win-big/ accessed March 1, 2011 ↑ http://www.crunchbase.com/company/youtube accessed March 3, 2010 ↑ http://teachertube.com/staticPage.php?pg=about accessed March 3, 2010 ↑ http://www1.teachertube.com/staticPage.php?pg=about accessed March 6, 2011 ↑ http://www.crunchbase.com/company/youtube accessed March 3, 2010 ↑ http://mediatedcultures.net/ksudigg/?p=108 accessed March 3, 2010 ↑ http://www.crunchbase.com/company/youtube accessed March 3, 2010 ↑ http://www.crunchbase.com/company/youtube accessed March 3, 2010 ↑ http://www.pcworld.com/article/125706-2/the_100_best_products_of_2006.html accessed March 1, 2011 ↑ http://www.crunchbase.com/company/youtube accessed March 3, 2010 ↑ http://teachertube.com/staticPage.php?pg=about accessed March 3, 2010 ↑ http://teachertube.com/staticPage.php?pg=about accessed March 3, 2010 ↑ http://www.youtube.com/t/faqt accessed March 1, 2011 ↑ http://teachertube.com/staticPage.php?pg=about accessed March 3, 2010 ↑ http://www.youtube.com/t/community_guidelines.html accessed March 1, 2011 ↑ http://creativecommons.org/accessed March 1, 2011 ↑ http://www.youtube.com/t/faq accessed March 1, 2011 ↑ http://www.convergemag.com/edtech/Is-Education-Ready-For-YouTube.html accessed March 3, 2010 ↑ http://www1.teachertube.com/teachervision.php accessed March 6, 2011 ↑ http://en.wikipedia.org/wiki/Tosh.0 http://teachertube.com/staticPage.php?pg=about accessed March 3, 2010 http://www.crunchbase.com/company/youtube accessed March 3, 2010 http://www.convergemag.com/edtech/Is-Education-Ready-For-YouTube.html accessed March 3, 2010 http://mediatedcultures.net/ksudigg/?p=108 accessed March 3, 2010 http://www.copyright.gov/ accessed March 3, 2010 http://creativecommons.org/ accessed March 3, 2010 http://en.wikipedia.org/wiki/Criticism_of_YouTube accessed March 3, 2010 http://en.wikipedia.org/wiki/Tosh.0 accessed March 2, 2011 Further Readings http://www.copyright.gov/fls/fl102.html - Fair use for education http://www.archive.org/details/KarlFogel_chalktalk Karl Fogel presents the history of Copyright (2006) http://www.youtube.com/t/privacy - youtube privacy clause http://www.teachertube.com/staticPage.php?pg=privacy - teachertube privacy clause http://www.oercommons.org/ - open educational resources http://www.time.com/time/magazine/article/0,9171,1569514,00.html - Time Magazine Article http://www.educause.edu/ELI/7ThingsYouShouldKnowAboutYouTu/156821 - Educase article http://portal.acm.org/citation.cfm?id=1940761.1940851 - Learning From YouTube article http://books.google.com/books?hl=en&lr=&id=spo9X16qn30C&oi=fnd&pg=PA173&dq=Youtube+in+education+&ots=rsSJw-nSHz&sig=vsqsZzI2znY3dDn7z5MQN7PbUKc#v=onepage&q=Youtube%20in%20education&f=false - Engaging the YouTube Google-eyed Generation article <|fim▁end|> | money from it. If a |
<|fim▁begin|> Contents 1 Objects of Arrays 1.1 Shuffling 1.2 Sorting 1.3 Subdecks 1.4 Shuffling and dealing 1.5 Mergesort 1.6 Glossary Objects of Arrays deck deck array!of Cards In the previous chapter, we worked with an array of objects, but I also mentioned that it is possible to have an object that contains an array as an instance variable. In this chapter I am going to create a new object, called a Deck, that contains an array of Cards as an instance variable. instance variable variable!instance The class definition looks like this verbatim class Deck Card[] cards; public Deck (int n) cards = new Card[n]; verbatim The name of the instance variable is cards to help distinguish the Deck object from the array of Cards that it contains. Here is a state diagram showing what a Deck object looks like with no cards allocated: state diagram constructor figure=figs/deckobject.eps As usual, the constructor initializes the instance variable, but in this case it uses the new command to create the array of cards. It doesn't create any cards to go in it, though. For that we could write another constructor that creates a standard 52-card deck and populates it with Card objects: verbatim public Deck () cards = new Card[52]; int index = 0; for (int suit = 0; suit <= 3; suit++) for (int rank = 1; rank <= 13; rank++) cards[index] = new Card (suit, rank); index++; verbatim Notice how similar this method is to buildDeck, except that we had to change the syntax to make it a constructor. To invoke it, we use the new command: new statement!new verbatim Deck deck = new Deck (); verbatim Now that we have a Deck class, it makes sense to put all the methods that pertain to Decks in the Deck class definition. Looking at the methods we have written so far, one obvious candidate is printDeck (Section printdeck). Here's how it looks, rewritten to work with a Deck object: printDeck verbatim public static void printDeck (Deck deck) for (int i=0; i<deck.cards.length; i++) Card.printCard (deck.cards[i]); verbatim The most obvious thing we have to change is the type of the parameter, from Card[] to Deck. The second change is that we can no longer use deck.length to get the length of the array, because deck is a Deck object now, not an array. It contains an array, but it is not, itself, an array. Therefore, we have to write deck.cards.length to extract the array from the Deck object and get the length of the array. For the same reason, we have to use deck.cards[i] to access an element of the array, rather than just deck[i]. The last change is that the invocation of printCard has to say explicitly that printCard is defined in the Card class. For some of the other methods, it is not obvious whether they should be included in the Card class or the Deck class. For example, findCard takes a Card and a Deck as arguments; you could reasonably put it in either class. As an exercise, move findCard into the Deck class and rewrite it so that the first parameter is a Deck object rather than an array of Cards. Shuffling shuffle shuffling For most card games you need to be able to shuffle the deck; that is, put the cards in a random order. In Section random we saw how to generate random numbers, but it is not obvious how to use them to shuffle a deck. One possibility is to model the way humans shuffle, which is usually by dividing the deck in two and then reassembling the deck by choosing alternately from each deck. Since humans usually don't shuffle perfectly, after about 7 iterations the order of the deck is pretty well randomized. But a computer program would have the annoying property of doing a perfect shuffle every time, which is not really very random. In fact, after 8 perfect shuffles, you would find the deck back in the same order you started in. For a discussion of that claim, see http://www.wiskit.com/marilyn/craig.html or do a web search with the keywords ``perfect shuffle. A better shuffling algorithm is to traverse the deck one card at a time, and at each iteration choose two cards and swap them. pseudocode Here is an outline of how this algorithm works. To sketch the program, I am using a combination of Java statements and English words that is sometimes called pseudocode: verbatim for (int i=0; i<deck.cards.length; i++) // choose a random number between i and deck.cards.length // swap the ith card and the randomly-chosen card verbatim The nice thing about using pseudocode is that it often makes it clear what methods you are going to need. In this case, we need something like randomInt, which chooses a random integer between the parameters low and high, and swapCards which takes two indices and switches the cards at the indicated positions. random number You can probably figure out how to write randomInt by looking at Section random, although you will have to be careful about possibly generating indices that are out of range. swapCards reference You can also figure out swapCards yourself. The only tricky thing is to decide whether to swap just the references to the cards or the contents of the cards. Does it matter which one you choose? Which is faster? I will leave the remaining implementation of these methods as an exercise to the reader. Sorting sorting sorting Now that we have messed up the deck, we need a way to put it back in order. Ironically, there is an algorithm for sorting that is very similar to the algorithm for shuffling. This algorithm is sometimes called selection sort because it works by traversing the array repeatedly and selecting the lowest remaining card each time. selection sort During the first iteration we find the lowest card and swap it with the card in the 0th position. During the ith, we find the lowest card to the right of i and swap it with the ith card. Here is pseudocode for selection sort: verbatim for (int i=0; i<deck.cards.length; i++) // find the lowest card at or to the right of i // swap the ith card and the lowest card verbatim Again, the pseudocode helps with the design of the helper methods. In this case we can use swapCards again, so we only need one new one, called findLowestCard, that takes an array of cards and an index where it should start looking. helper method method!helper Once again, I am going to leave the implementation up to the reader. Subdecks subdeck How should we represent a hand or some other subset of a full deck? One good choice is to make a Deck object that has fewer than 52 cards. We might want a method, subdeck, that takes an array of cards and a range of indices, and that returns a new array of cards that contains the specified subset of the deck: verbatim public static Deck subdeck (Deck deck, int low, int high) Deck sub = new Deck (high-low+1); for (int i = 0; i<sub.cards.length; i++) sub.cards[i] = deck.cards[low+i]; return sub; verbatim The length of the subdeck is high-low+1 because both the low card and high card are included. This sort of computation can be confusing, and lead to ``off-by-one errors. Drawing a picture is usually the best way to avoid them. constructor <|fim▁hole|> an argument with the new command, the contructor that gets invoked will be the first one, which only allocates the array and doesn't allocate any cards. Inside the for loop, the subdeck gets populated with copies of the references from the deck. The following is a state diagram of a subdeck being created with the parameters low=3 and high=7. The result is a hand with 5 cards that are shared with the original deck; i.e. they are aliased. figure=figs/subdeck.eps aliasing reference I have suggested that aliasing is not generally a good idea, since changes in one subdeck will be reflected in others, which is not the behavior you would expect from real cards and decks. But if the objects in question are immutable, then aliasing can be a reasonable choice. In this case, there is probably no reason ever to change the rank or suit of a card. Instead we will create each card once and then treat it as an immutable object. So for Cards aliasing is a reasonable choice. As an exercise, write a version of findBisect that takes a subdeck as an argument, rather than a deck and an index range. Which version is more error-prone? Which version do you think is more efficient? Shuffling and dealing shuffling dealing In Section shuffle I wrote pseudocode for a shuffling algorithm. Assuming that we have a method called shuffleDeck that takes a deck as an argument and shuffles it, we can create and shuffle a deck: verbatim Deck deck = new Deck (); shuffleDeck (deck); verbatim Then, to deal out several hands, we can use subdeck: verbatim Deck hand1 = subdeck (deck, 0, 4); Deck hand2 = subdeck (deck, 5, 9); Deck pack = subdeck (deck, 10, 51); verbatim This code puts the first 5 cards in one hand, the next 5 cards in the other, and the rest into the pack. When you thought about dealing, did you think we should give out one card at a time to each player in the round-robin style that is common in real card games? I thought about it, but then realized that it is unnecessary for a computer program. The round-robin convention is intended to mitigate imperfect shuffling and make it more difficult for the dealer to cheat. Neither of these is an issue for a computer. This example is a useful reminder of one of the dangers of engineering metaphors: sometimes we impose restrictions on computers that are unnecessary, or expect capabilities that are lacking, because we unthinkingly extend a metaphor past its breaking point. Beware of misleading analogies. Mergesort mergesort efficiency sorting mergesort In Section sorting, we saw a simple sorting algorithm that turns out not to be very efficient. In order to sort items, it has to traverse the array times, and each traversal takes an amount of time that is proportional to . The total time, therefore, is proportional to . In this section I will sketch a more efficient algorithm called mergesort. To sort items, mergesort takes time proportional to . That may not seem impressive, but as gets big, the difference between and can be enormous. Try out a few values of and see. The basic idea behind mergesort is this: if you have two subdecks, each of which has been sorted, it is easy (and fast) to merge them into a single, sorted deck. Try this out with a deck of cards: enumerate Form two subdecks with about 10 cards each and sort them so that when they are face up the lowest cards are on top. Place both decks face up in front of you. Compare the top card from each deck and choose the lower one. Flip it over and add it to the merged deck. Repeat step two until one of the decks is empty. Then take the remaining cards and add them to the merged deck. enumerate The result should be a single sorted deck. Here's what this looks like in pseudocode: verbatim public static Deck merge (Deck d1, Deck d2) // create a new deck big enough for all the cards Deck result = new Deck (d1.cards.length + d2.cards.length); // use the index i to keep track of where we are in // the first deck, and the index j for the second deck int i = 0; int j = 0; // the index k traverses the result deck for (int k = 0; k<result.cards.length; k++) // if d1 is empty, d2 wins; if d2 is empty, d1 wins; // otherwise, compare the two cards // add the winner to the new deck return result; verbatim The best way to test merge is to build and shuffle a deck, use subdeck to form two (small) hands, and then use the sort routine from the previous chapter to sort the two halves. Then you can pass the two halves to merge to see if it works. testing If you can get that working, try a simple implementation of mergeSort: verbatim public static Deck mergeSort (Deck deck) // find the midpoint of the deck // divide the deck into two subdecks // sort the subdecks using sortDeck // merge the two halves and return the result verbatim Then, if you get that working, the real fun begins! The magical thing about mergesort is that it is recursive. At the point where you sort the subdecks, why should you invoke the old, slow version of sort? Why not invoke the spiffy new mergeSort you are in the process of writing? recursion Not only is that a good idea, it is necessary in order to achieve the performance advantage I promised. In order to make it work, though, you have to add a base case so that it doesn't recurse forever. A simple base case is a subdeck with 0 or 1 cards. If mergesort receives such a small subdeck, it can return it unmodified, since it is already sorted. The recursive version of mergesort should look something like this: verbatim public static Deck mergeSort (Deck deck) // if the deck is 0 or 1 cards, return it // find the midpoint of the deck // divide the deck into two subdecks // sort the subdecks using mergesort // merge the two halves and return the result verbatim As usual, there are two ways to think about recursive programs: you can think through the entire flow of execution, or you can make the ``leap of faith. I have deliberately constructed this example to encourage you to make the leap of faith. leap of faith When you were using sortDeck to sort the subdecks, you didn't feel compelled to follow the flow of execution, right? You just assumed that the sortDeck method would work because you already debugged it. Well, all you did to make mergeSort recursive was replace one sort algorithm with another. There is no reason to read the program differently. Well, actually you have to give some thought to getting the base case right and making sure that you reach it eventually, but other than that, writing the recursive version should be no problem. Good luck! Glossary description [pseudocode:] A way of designing programs by writing rough drafts in a combination of English and Java. [helper method:] Often a small method that does not do anything enormously useful by itself, but which helps another, more useful, method. pseudocode helper method method!helper description <|fim▁end|> | overloading Because we provide |
<|fim▁begin|> Previous: Introduction Index Next: Interfaces Contents 1 Python installation 1.1 GNU/Linux 1.2 MS Windows 2 Buildout 2.1 Introduction 2.2 Buildout configuration 2.3 MS Windows notes 3 Setting up development sandbox 4 A simple application 4.1 Configuring application 4.2 Running application 4.3 Using ZMI 4.4 Hello world 5 Overview of packages 6 Installing additional packages 7 Summary 8 See also 9 Discussions Python installation The Zope community has always recommended using a custom built Python for development and deployment. Python 2.4 is the recommended version for Zope 3, although Python 2.5 will also work, but it is not yet officially supported. GNU/Linux To install Python, you will be required to install gcc, g++ and other development tools in your system. A typical installation of Python can be done like this: $ wget -c http://www.python.org/ftp/python/2.4.5/Python-2.4.5.tar.bz2 $ tar jxvf Python-2.4.5.tar.bz2 $ cd Python-2.4.5 $ ./configure --prefix=/home/guest/usr $ make $ make install As given above, you can provide an option, --prefix to install Python in a particular location. The above steps install Python inside /home/guest/usr directory. After installation, you can invoke the Python interpreter like this (~ is an alias to /home/guest): $ ~/usr/bin/python2.4 >>> print "Hello, world!" Hello, world! If you are not getting old statements in Python interactive prompt when using up-arrow key, try installing libreadline development libraries (Hint: apt-cache search libreadline). After installing this library, you should install Python again. You also will be required to install zlib (Hint: apt-cache search zlib compression library) to properly install Zope 3. MS Windows FIXME: Write about installation of Python in MS Windows with few screen shots. Buildout Introduction We are going to use a build tool called Buildout for developing Zope 3 applications from multiple parts. Buildout will give you an isolated working environment for developing applications. The Buildout package, named zc.buildout is available for download from PyPI. This section briefly goes through the usage of Buildout for developing applications. Buildout has a boostrap.py script for initializing a buildout based project for development or deployment. It will download and install zc.buildout, setuptools and other dependency modules in a specified directory. Once bootstrapped it will create a buildout executable script inside bin directory at the top of your project source. The default configuration for each project is buildout.cfg file at the top of your project source. Whenever you run the buildout command it will look into the default configuration file and will do actions based on it. Normally, the configuration file and boostrap script will be bundled with the project source itself. Other than the default configuration file along with the project source, you may also create a system wide default configuration file at ~/.buildout/default.cfg. Buildout creator Jim Fulton recommend a custom built clean Python installation, i.e., there should not be any Python modules installed in your site-packages (ideally, a fresh Python installation). When you boostrap your project using Buildout's boostrap.py script, it will download and install all necessary packages in a specified directory. So, for an ideal project you only required a custom built clean Python and the project source with proper Buildout configuration and bootstrap script along with the source package. Buildout configuration These days, most of the Python packages are available in egg format. Buildout will download and install the eggs in directory and the location can be changed from the configuration file. It is better to give a system-wide location for eggs directory. And this configuration can be added to your system-wide configuration file. The default configuration file for Buildout is ~/.buildout/default.cfg. We are going to use eggs directory inside your home directory to keep all eggs downloaded, so first create those directories and file: $ cd $HOME $ mkdir .buildout $ mkdir eggs $ touch .buildout/default.cfg You can add the following to your ~/.buildout/default.cfg file: [buildout] newest = false eggs-directory = /home/baiju/eggs find-links = http://download.zope.org/ppix The eggs-directory is where Buildout stores the eggs that are downloaded. The last option, find-links points to a reliable mirror of the Python Package Index (PyPI). The default configurations given above will be available to all buildouts in your system. MS Windows notes FIXME: Add any specific things required for MS Windows here. Setting up development sandbox To demonstrate the concepts, tools and techniques, we are going to develop a simple ticket/issue tracking application named Ticket Collector. To begin the work, first create a directory for the project. After creating the directory, create a buildout.cfg file as given below. To bootstrap this application checkout bootstrap.py and run it inside that directory. $ mkdir ticketcollector $ cd ticketcollector $ echo "#Buildout configuration" > buildout.cfg $ svn co svn://svn.zope.org/repos/main/zc.buildout/trunk/bootstrap $ ~/usr/bin/python2.4 bootstrap/bootstrap.py You <|fim▁hole|> created inside bin directory. Now onwards, you can run this script when changing Buildout configuration. You can save bootstrap.py in a local repository. If you are using svn for managing repository, create an svn:external to the svn URL given above. Our application is basically a Python package. First we will create an src directory to place our package. Inside the src directory, you can create ticketcollector Python package. You can create the src and the ticketcollector package like this: $ mkdir src $ mkdir src/ticketcollector $ echo "#Python package" > src/ticketcollector/__init__.py To start building our package you have to create a setup.py file. The setup.py should have the minimum details as given below: We have included bare minimum packages required for installation here: zope.app.zcmlfiles, zope.app.twisted, zope.app.securitypolicy and setuptools. from setuptools import setup, find_packages setup( name='ticketcollector', version='0.1', packages=find_packages('src'), package_dir={'': 'src'}, install_requires=['setuptools', 'zope.app.zcmlfiles', 'zope.app.twisted', 'zope.app.securitypolicy', ], include_package_data=True, zip_safe=False, ) Modify buildout.cfg as given below: [buildout] develop = . parts = py [py] recipe = zc.recipe.egg eggs = ticketcollector interpreter = python Now run buildout script inside bin directory. This will download all necessary eggs and install it. So installing Zope is nothing but just setting up a buildout with setup.py with required packages install_requires for installation. Unless you specified a parts section which use ticketcollector in some way, buildout will not download dependency packages. A simple application Configuring application We are going to continue the Ticket Collector application in this section. In the last section when you run ./bin/buildout command all necessary Zope 3 packages required for running our application is downloaded inside ~/eggs directory. Now to run the bare minimum Zope 3, we have to create Zope Configuration Markup Language (ZCML) file and extend the buildout.cfg with appropriate Buildout recipes. We are going to use zc.zope3recipes:app,zc.zope3recipes:instance and zc.recipe.filestorage recipes for setting up our application. Here is our modified buildout.cfg (inside the ticketcollector project directory): [buildout] develop = . parts = ticketcollectorapp instance [zope3] location = [ticketcollectorapp] recipe = zc.zope3recipes:app site.zcml = <include package="ticketcollector" file="application.zcml" /> eggs = ticketcollector [instance] recipe = zc.zope3recipes:instance application = ticketcollectorapp zope.conf = ${database:zconfig} [database] recipe = zc.recipe.filestorage Then we will create application.zcml inside src/ticketcollector directory with the following text. Consider it as boiler plate code now, we will explain this in details later: <configure xmlns="http://namespaces.zope.org/zope" > <include package="zope.app.securitypolicy" file="meta.zcml" /> <include package="zope.app.zcmlfiles" /> <include package="zope.app.authentication" /> <include package="zope.app.securitypolicy" /> <include package="zope.app.twisted" /> <securityPolicy component="zope.app.securitypolicy.zopepolicy.ZopeSecurityPolicy" /> <role id="zope.Anonymous" title="Everybody" description="All users have this role implicitly" /> <role id="zope.Manager" title="Site Manager" /> <role id="zope.Member" title="Site Member" /> <grant permission="zope.View" role="zope.Anonymous" /> <grant permission="zope.app.dublincore.view" role="zope.Anonymous" /> <grantAll role="zope.Manager" /> <unauthenticatedPrincipal id="zope.anybody" title="Unauthenticated User" /> <unauthenticatedGroup id="zope.Anybody" title="Unauthenticated Users" /> <authenticatedGroup id="zope.Authenticated" title="Authenticated Users" /> <everybodyGroup id="zope.Everybody" title="All Users" /> <principal id="zope.manager" title="Manager" login="admin" password_manager="Plain Text" password="admin" /> <grant role="zope.Manager" principal="zope.manager" /> </configure> Running application Now you can run the application by running ./bin/buildout command followed by ./bin/instance command. $ ./bin/buildout $ ./bin/instance fg So, to run a Zope 3 application we have to use buildout recipes with proper configurations. Using ZMI After running your instance, If you open a web browser and go to http://localhost:8080 you'll see the ZMI (Zope Management Interface). Go ahead and click the Login link at the upper right. Enter the user name and password as admin, which is given in applications.zcml. Now click on [top] under Navigation on the right. Play around with adding some content objects (the Zope 3 name for instances that are visible in the ZMI). Note how content objects can be arranged in a hierarchy by adding folders which are special content objects that can hold other content objects. There is nothing special about the ZMI, it is just the default skin for Zope 3. You can modify it to your liking, or replace it entirely. When you're done exploring with the ZMI, go back to the window where you typed ./bin/instance fg and press Control-C to stop Zope 3. Hello world Now you can begin your development inside src/ticketcollector directory. Create a browser.py with following content: from zope.publisher.browser import BrowserView class HelloView(BrowserView): def __call__(self): return """ <html> <head> <title>Hello World</title> </head> <body> Hello World </body> </html> """ Now append the following text just above the last line of application.zcml: <browser:page for="*" name="hello" permission="zope.Public" class="ticketcollector.browser.HelloView" /> As you can see above, we are using page attribute from the browser namespace. So, you have to include that namespace in the beginning ZCML as shown below: <configure xmlns="http://namespaces.zope.org/zope" xmlns:browser="http://namespaces.zope.org/browser" > After restarting Zope, open http://localhost:8080/hello, you can see that it displaying Hello World !. Overview of packages Installing additional packages Summary See also Discussions Previous: Introduction Index Next: Interfaces <|fim▁end|> | can see a buildout script |
<|fim▁begin|> Contents 1 Install 1.1 Dependencies 1.2 clone 1.3 next 1.4 update 1.4.1 git 2 How to use 2.1 binaries 2.1.1 m-binangle-from-rational 2.1.2 m-binangle-to-rational 3 www 4 Code 4.1 References Install "you need to "make install" mandelbrot-symbolics lib before trying anything with mandelbrot-numerics" Dependencies pkg-config math gmp mpfr mpc pari ghci #include <stdbool.h> #include <stdlib.h> #include <gmp.h> #include <pari/pari.h> gcc -shared -ggdb -std=c99 -Wall -Wextra -pedantic -fPIC -O3 -pipe -ggdb -MMD -I../include -c -lpari -lmpc -lmpfr -lgmp -lm clone git clone https://code.mathr.co.uk/mandelbrot-symbolics.git next To install library to local prefix ~/opt/lib ~/opt/bin and so on: make -C mandelbrot-symbolics/c/lib prefix=${HOME}/opt install make -C mandelbrot-symbolics/c/bin prefix=${HOME}/opt install then to run do: export LD_LIBRARY_PATH=${HOME}/opt/lib check : echo $LD_LIBRARY_PATH result : /home/a/opt/lib or export PATH=${HOME}/opt/bin:${PATH} check : echo $PATH then the programs can be run like m-binangle-from-rational 1/2 no manual path specification necessary To set it permanently change file <|fim▁hole|> opened in the mandelbrot-numerics directory : git pull If you made some local changes you can undu them : git checkout -f then git pull Now install again How to use binaries m-binangle-from-rational from console : ./m-binangle-from-rational 1/2 result .1(0) ./m-binangle-from-rational 7/96 .00010(01) ./m-binangle-from-rational 33877456965431938318210482471113262183356704085033125021829876006886584214655562/237142198758023568227473377297792835283496928595231875152809132048206089502588927 .(001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001001010) m-binangle-to-rational from console ./m-binangle-to-rational ".(001)" result : 1/7 Note that the input format isn't checked, so bad input can give bad output ! Examples : ./m-binangle-to-rational gives nothing: no output no errors ./m-binangle-to-rational 0.(001001001001001001001001001001001001001001001001001001001001001001001001010) gives bash error : bash: błąd składni przy nieoczekiwanym znaczniku `(' ./m-binangle-to-rational "0.(001001001001001001001001001001001001001001001001001001001001001001001001010)" gives floating point error Błąd w obliczeniach zmiennoprzecinkowych ./m-binangle-to-rational ".(001001001001001001001001001001001001001001001001001001001001001001001001010)" Result: 5396990266136737387082/37778931862957161709567 ./m-binangle-to-rational ".(001001001001001001001001001001001001001001001001001001001001001001001010001)" 5396990266136737387089/37778931862957161709567 Bugs : "bug in the parsing of binary angles, it doesn't check for valid input, and bad input can give garbage values. " www http://mathr.co.uk/blog/2016-03-14_mandelbrot_symbolics_in_the_browser.html Code original repository fork repo References ↑ stackoverflow question how-to-permanently-set-path-on-linux <|fim▁end|> | .profile[1] update git From console |
<|fim▁begin|> TIA algorithm for coloring exterior of the set ( Mandelbrot or Julia) Contents 1 Names 1.1 Variants 2 History 3 Explanation 4 Parameters 5 Software 6 Examples 7 Code 7.1 Ultrafractal 7.1.1 TIA 7.1.2 CAA 7.2 Visions of Chaos = VOC 8 Video 9 References 9.1 References Names family of algorithms : Branching Average Coloring Algorithms (" because calculate an average of a function evaluated at all points in a truncated orbit ")[1] the Triangle Inequality Average Coloring algorithm = TIA = Trippie. " linear interpolation and was designed for the Mandelbrot set. Discontinuous at some points that are mapped to zero" Curvature Average Coloring Algorithm ( developed by Damien M. Jones for Ultra Fractal in 1999, continuous at points that are mapped to zero ) Variants Fibers coloring method ( from Jux program) : " First, I prefer a running average with a weight parameter (0 - 0.999), which avoids any possible precision issues and lets you adjust detail. Second, I use sin or cos instead of the plain angle, and add a frequency parameter. And some other variations" xenodreambuie History Kerry Mitchell 1999.02.05 Damien M. Jones 2000.04.02 Explanation "The triangle inequality is basically a cheap way to calculate an angle. TIA is averaging the angle over all iterations to get a smooth result. So there is some initialization and some calculations per iteration to do the sum. It has to store the sum at the previous iteration before adding the next one so you can interpolate between them to get a continuous function between iteration bands (in the same way that continuous potential is usually interpolated). This interpolation is done after the iterations bail out." xenodreambuie [2] "creates smoothly colored ... large flame-like patterns that extend from the fractal outwards" (from UltraFractal by Frederik Slijkerman )[3] Parameters escape radius : "Use very large bail-out values (1E20 = 10^20)) for good results." Ultra Fractal iteration Max = 2500 Software Ultra Fractal Fractint Fractview for android : blog - youtube - code Gnofract 4D Visions of Chaos - application for Windows ( GLSL ) - gallery Jux Examples fractals by Craig Macomber with GLSL code Code java script[4] cpp + glsl [5] python [6] Ultrafractal TIA /* http://formulas.ultrafractal.com/ comment { dmj-pub.ucl 2.1 Coloring methods for Ultra Fractal 2 by Damien M. Jones April 2, 2000 For more information about this formula collection, please visit its home page: http://www.fractalus.com/ultrafractal/dmj-pub-uf.htm Many of these coloring algorithms are general-purpose tools which work with a variety of fractals. A few are more specialized. Huge portions of this compilation build upon the techniques explored by others. } */ dmj-Triangle { ; ; This coloring method implements a variation of Kerry ; Mitchell's Triangle Inequality Average coloring ; method. Because the smoothing used in this formula ; is based on the dmj-Smooth formula, which only works ; for z^n+c and derivates, the smoothing here will only ; work for those types as well. ; init: float sum = 0.0 float sum2 = 0.0 float ac = cabs(#pixel) float il = 1/log(@power) float lp = log(log(@bailout)/2.0) float az2 = 0.0 float lowbound = 0.0 float f = 0.0 BOOL first = true float ipower = 1/@apower loop: sum2 = sum IF (!first) az2 = cabs(#z - #pixel) lowbound = abs(az2 - ac) IF (@aflavor == 0) sum = sum + ((cabs(#z) - lowbound) / (az2+ac - lowbound))^@apower ELSEIF (@aflavor == 1) sum = sum + 1-(1-(cabs(#z) - lowbound) / (az2+ac - lowbound))^ipower ENDIF ELSE first = false ENDIF final: sum = sum / (#numiter) sum2 = sum2 / (#numiter-1) f = il*lp - il*log(log(cabs(#z))) #index = sum2 + (sum-sum2) * (f+1) default: title = "Triangle Inequality Average" helpfile = "dmj-pub\dmj-pub-uf-tia.htm" param apower caption = "Average Exponent" default = 1.0 hint = "This skews the values averaged by raising them to \ this power. Use 1.0 for the classic coloring." endparam param aflavor caption = "Average Flavor" default = 0 enum = "normal" "reversed" hint = "Controls whether values are reversed before being \ raised to a power. Has no effect if Average Exponent \ is 1.0." endparam param power caption = "Exponent" default = 2.0 hint = "This should be set to match the exponent of the \ formula you are using. For Mandelbrot, this is 2." endparam param bailout caption = "Bailout" default = 1e20 min = 1 hint = "This should be set to match the bailout value in \ the Formula tab. Use a very high bailout!" endparam } // http://www.kerrymitchellart.com/tutorials/formulas2/uf2-2.htm // http://formulas.ultrafractal.com/cgi/formuladb?view;file=lkm.ufm;type=.txt comment { ; copyright Kerry Mitchell 07feb99 Triangle Inequality The triangle inequality method is based on a simple characteristic of complex numbers: the magnitude of the sum of two complex numbers, |a+b|, is strictly limited to a range determined by a and b: |a+b| >= ||a| - |b||, and |a+b| <= |a| + |b|, where |z| is the square root of the sum of the squares of the components, not the sum of the squares, as in Ultra Fractal. The extremes of this inequality are easily seen with a few examples. If a=1 and b=2, then: |a| = 1, |b| = 2; ||a| - |b|| = |1-2| = |-1| = 1; |a| + |b| = 1+2 = 3; |a+b| = |3| = 3; 1 <= 3 <= 3. The upper bound occurs when both addends have the same polar angle. The geometric interpretation of this is that the complex numbers add up, and the length of the sum is simply the sum of the individual lengths. The lower bound occurs when the polar angles of the complex numbers differ by 180 degrees; the two numbers are diametrically opposed. Then, the length of the sum is the difference of the lengths. For example, if a=3i and b=-5i, then: |a| = 3, |b| = 5; ||a| - |b|| = |3-5| = |-2| = 2; |a| + |b| = 3 + 5 = 8; |a+b| = |-2i| = 2; 2 <= 2 <= 8. In general, the length of the sum is somewhere inbetween, and can be thought of in terms of a triangle, which is how the inequality gets its name. If |a| is the length of one side of a triangle, and |b| is the length of the second side, then |a+b| is the length of the third side, and lies somewhere within the range shown above. Back to fractals. The two numbers of interest are z^n and c. Given z (the previous iterate) and c (the Mandelbrot or Julia parameter), the range for the magnitude of the new iterate can then be determined. <|fim▁hole|> magnitude of the new iterate can be rescaled to a fraction between 0 and 1 inclusive: min = ||z_old| - |c||, max = |z_old| + |c|, z_new = z_old * z_old + c fraction = (|z_new| - min) / (max - min). During the iterating, these fractions are average together. After the last iteration, this average fraction is stored in the real part of z, and the actual fraction for the last iteration is stored in the imaginary part of the z. If the orbit diverges (bails out), then renormalization techniques are used to color the outside pixels smoothly without iteration bands. This works best with large bailout values. The large bailout needs to be reduced with larger exponents, to prevent color gaps due to overflow errors. For best results, use the "basic" coloring method, with "real(z)" to show the average triangulation fraction, or "imag(z)" to show the actual fraction for the last iteration. } triangle-general-julia { ; Kerry Mitchell 05feb99 ; ; z^n+c Julia set, colors by ; triangle inequality ; init: zc=#pixel c=@julparam float rc=cabs(c) float rzc=0.0 zn=(0.0,0.0) float rnz=0.0 int iter=0 bool done=false float logn=log(@nexp) float llbail=log(log(@bailout))+log(0.5) float count=0.0 float count1=0.0 float count2=0.0 float countx=0.0 float county=0.0 float fac1=0.0 float fac2=0.0 float min=0.0 float max=0.0 float k=0.0 float kfrac=0.0 loop: iter=iter+1 if(@nexp==2.0) zn=sqr(zc) rnz=|zc| else zn=zc^@nexp rnz=cabs(zn) endif zc=zn+c min=cabs(rnz-rc) max=rnz+rc rzc=cabs(zc) county=(rzc-min)/(max-min) count=count+county countx=count/iter z=countx+flip(county) if(|zc|>@bailout) done=true count1=count/iter fac1=log(log(rzc))-llbail iter=iter+1 if(@nexp==2.0) zn=sqr(zc) rnz=|zc| else zn=zc^@nexp rnz=cabs(zn) endif min=cabs(rnz-rc) max=rnz+rc zc=zn+c rzc=cabs(zc) county=(rzc-min)/(max-min) count=count+county count2=count/iter fac2=log(log(rzc))-llbail-logn k=exp((fac1+fac2)/2.0) kfrac=(k-1.0)/(@nexp-1.0) countx=kfrac*count1+(1.0-kfrac)*count2 z=countx+flip(county) endif bailout: done==false default: title="Triangle General Julia" maxiter=100 periodicity=0 center=(0.0,0.0) magn=1.0 angle=0 param julparam caption="Julia parameter" default=(1.0,0.0) endparam param bailout caption="bailout value" default=1000000.0 min=0.0 endparam param nexp caption="exponent" default=2.0 hint="z exponent, > 1.0" min=1.0 endparam switch: type="triangle-general-mandelbrot" bailout=bailout nexp=nexp } triangle-general-mandelbrot { ; Kerry Mitchell 05feb99 ; ; z^n+c Mandelbrot set, colors by ; triangle inequality ; init: c=#pixel zc=@manparam+c float rc=cabs(c) float rzc=0.0 zn=(0.0,0.0) float rnz=0.0 int iter=0 bool done=false float logn=log(@nexp) float llbail=log(log(@bailout))+log(0.5) float count=0.5 float count1=0.0 float count2=0.0 float countx=0.0 float county=0.0 float fac1=0.0 float fac2=0.0 float min=0.0 float max=0.0 float k=0.0 float kfrac=0.0 loop: iter=iter+1 if(@nexp==2.0) zn=sqr(zc) rnz=|zc| else zn=zc^@nexp rnz=cabs(zn) endif zc=zn+c min=cabs(rnz-rc) max=rnz+rc rzc=cabs(zc) county=(rzc-min)/(max-min) count=count+county countx=count/iter z=countx+flip(county) if(|zc|>@bailout) done=true count1=count/iter fac1=log(log(rzc))-llbail iter=iter+1 if(@nexp==2.0) zn=sqr(zc) rnz=|zc| else zn=zc^@nexp rnz=cabs(zn) endif min=cabs(rnz-rc) max=rnz+rc zc=zn+c rzc=cabs(zc) county=(rzc-min)/(max-min) count=count+county count2=count/iter fac2=log(log(rzc))-llbail-logn k=exp((fac1+fac2)/2.0) kfrac=(k-1.0)/(@nexp-1.0) countx=kfrac*count1+(1.0-kfrac)*count2 z=countx+flip(county) endif bailout: done==false default: title="Triangle General Mandelbrot" maxiter=100 periodicity=0 center=(0.0,0.0) magn=1.0 angle=0 param manparam caption="Mandelbrot start" default=(0.0,0.0) hint="use (0,0) for standard Mandelbrot" endparam param bailout caption="bailout value" default=1000000.0 min=0.0 endparam param nexp caption="exponent" default=2.0 hint="z exponent, > 1.0" min=1.0 endparam switch: type="triangle-general-julia" julparam=pixel bailout=bailout nexp=nexp } CAA from dmj.ucl: comment { dmj-pub.ucl 2.1 Coloring methods for Ultra Fractal 2 by Damien M. Jones April 2, 2000 For more information about this formula collection, please visit its home page: http://www.fractalus.com/ultrafractal/dmj-pub-uf.htm Many of these coloring algorithms are general-purpose tools which work with a variety of fractals. A few are more specialized. Huge portions of this compilation build upon the techniques explored by others. } dmj-Curvature { ; ; This formula averages curvature over the course ; of all iterations by averaging the difference in ; absolute value of angles between orbit steps. The ; technique was suggested by Prof. Javier Barrallo. ; ; Note that the results are often very similar to ; Kerry Mitchell's Triangle Inequality Average method, ; but are slightly more angular. ; init: complex zold = (0,0) complex zold2 = (0,0) float a = 0.0 float a2 = 0.0 int i = 0 loop: a2 = a IF (i >= 2 && @aflavor != 2) ; zold and zold2 are valid a = a + abs(atan2((#z-zold)/(zold-zold2))) ; update average ENDIF i = i + 1 ; count the iteration zold2 = zold ; save the orbit values zold = #z final: IF (@aflavor == 0) float il = 1/log(@power) float lp = log(log(@bailout)/2.0) float f = il*lp - il*log(log(cabs(#z))) a = a / i a2 = a2 / (i-1) #index = (a2 + (a-a2) * (f+1)) / #pi ELSEIF (@aflavor == 1) #index = (a/i) / #pi + 1 ELSE a = atan2((#z-zold)/(zold-zold2)) ; update average #index = a / #pi + 1 ENDIF Visions of Chaos = VOC #version 400 // http://www.fractalforums.com/programming/triangle-inequality-average-coloring/ // code by Softology uniform vec2 resolution; uniform vec3 palette[256]; uniform double xmin; uniform double xmax; uniform double ymin; uniform double ymax; uniform double bailout; uniform int maxiters; double bailout_squared=double(bailout*bailout); double magnitude,r1,r2,g1,g2,b1,b2,tweenval; double realiters; vec4 finalcol,col; int superx,supery; double stepx=(xmax-xmin)/resolution.x; double stepy=(ymax-ymin)/resolution.y; int colval,colval1,colval2; dvec2 z,c; //triangle inequality average coloring double sum,sum2,ac,il,lp,az2,lowbound,f,index,tr,ti; int mandelbrotPower; double rval,gval,bval,rval1,gval1,bval1,rval2,gval2,bval2; void main(void) { sum=0; sum2=0; ac=0; il=0; lp=0; mandelbrotPower=2; finalcol=vec4(0,0,0,0); c.x = xmin+gl_FragCoord.x/resolution.x*(xmax-xmin); c.y = ymin+gl_FragCoord.y/resolution.y*(ymax-ymin); int i; z = dvec2(0.0,0.0); //triangle inequality average coloring sum = 0; sum2 = 0; ac = sqrt(c.x * c.x + c.y * c.y); il = 1.0 / log(mandelbrotPower); lp = log(float(log(float(bailout)) / mandelbrotPower)); az2 = 0.0; lowbound = 0.0; f = 0.0; index = 0.0; for(i=0; i<maxiters; i++) { //START OF FRACTAL FORMULA double x = (z.x * z.x - z.y * z.y) + c.x; double y = (z.y * z.x + z.x * z.y) + c.y; //END OF FRACTAL FORMULA magnitude=(x * x + y * y); if(magnitude>bailout_squared) break; z.x = x; z.y = y; //tia sum2=sum; if ((i!=0)&&(i!=maxiters-1)) { tr=z.x-c.x; ti=z.y-c.y; az2=sqrt(tr * tr + ti * ti); lowbound=abs(az2 - ac); sum+=((sqrt(z.x * z.x + z.y * z.y)-lowbound)/(az2+ac-lowbound)); } } if (i==maxiters) { col=vec4(0.0,0.0,0.0,1.0); } else { //triangle inequality average sum=sum/i; sum2=sum2/(i-1.0); f=il*lp - il*log(log(float(length(z)))); index=sum2+(sum-sum2)*(f+1.0); realiters=255*index; colval1= int(mod(realiters,255)); colval2=int(mod((colval1+1),255)); tweenval=fract(realiters); if (colval1<0) { colval1=colval1+255; } if (colval2<0) { colval2=colval2+255; } rval1 =palette[colval1].r; gval1 =palette[colval1].g; bval1 =palette[colval1].b; rval2 =palette[colval2].r; gval2 =palette[colval2].g; bval2 =palette[colval2].b; rval =rval1 +((rval2 - rval1)*tweenval); gval =gval1 +((gval2 - gval1)*tweenval); bval =bval1 +((bval2 - bval1)*tweenval); col=vec4(rval,gval,bval,1.0); } gl_FragColor = vec4(col); } Video Mandelbrot Coloring Algorithms by sfract Julia fractal animation by Jérémy Belin youtube: Mandelbrot Fractal Zoom: Bach, Fractals, and The Art of Fugue (HD) by Harlan Brothers Mandlebrot zoom Medium by Mike Koval -"it actually is the Curvature Average Coloring Algorithm, not the raw triangle inequality. " Triangle Inequality Average - Mandelbrot Fractal Mini - Zoom (8k 60fps) by Maths Town The Last Colour - mini-Mandelbrot Fractal Zoom by Maths Town References wikipedia : triangle inequality On Smooth Fractal Coloring Techniques master thesis by Jussi Haerkoenen /formulas.ultrafractal : lkm.ufm fractalforums : triangle-inequality-average-algorithm References ↑ The Coloring of Fractals by Amy Fang and Frances Ling ↑ fractalforums triangle-inequality-average-coloring ↑ ultrafractal help: solid-color/triangle-inequality-average ↑ Mandelbrot Average Colorings using ↑ GPU Fractals! By Pete Corey ↑ mandelbrot by Karol Ciszek <|fim▁end|> | With this range, the |
<|fim▁begin|> This page or section is an undeveloped draft or outline.You can help to develop the work, or you can ask for assistance in the project room. Rydia is a summoner from the town of Mist. Out of fear from seeing her mother and village destroyed, she causes a massive earthquake but becomes friendly once Cecil defends her. In the early game, she is a sage; an adequate white mage and a solid black mage. Later, she dumps the white magic for a powerful array of summons, which are more powerful than typical spells, thus becoming similar to a black mage. Her chief weakness is her lack of any physical prowess. Stats Young Main weapons: whips Other weapons: <|fim▁hole|> White, Black, Call/Summon Abilities: none Level Experience HP MP Str Agil Vit Wis Wil 1 0 3 4 2 8 5 2 44 3 3 5 3 9 6 4 238 4 6 3 10 6 5 413 4 6 3 10 7 6 662 4 7 4 11 7 7 1007 5 7 4 12 8 8 1474 5 8 4 13 8 9 2091 10 11 136 67 6 9 5 15 10 12 5184 154 75 7 9 6 16 11 13 6673 171 83 7 10 6 17 12 14 8689 187 91 8 10 7 18 13 15 10014 Adult Main weapons: whips Other weapons: rods, daggers, bows Magic: Black, Call Abilities: none <|fim▁end|> | rods, daggers, bows Magic: |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.