text
stringlengths 229
520k
|
|---|
Author, educator and literacy expert Pam Allyn says, “writing helps to cultivate emotional growth, develop critical thinking skills and improve school performance”. Being able to freely express yourself is something all children should experience. Allyn outlines 5 keys that parents can reference when encouraging their child to start writing. They are as follows…
1. Word Power
Children learn new words very quickly. Encourage this by talking about new words you hear in a song, making an effort to write down new words you hear, or make a word jar and place a new word in it every day, then review the words at the end of the week.
2. Reading Aloud
Reading aloud to your child not only indirectly teaches them about grammar and syntax, but it can also spark their imagination and encourage them to write as well.
Everyone writes in a different way. It is important to encourage and praise your child for unique features in their writing. They may use humor, interesting dialogue, or they may have a nice flow to their writing. Creating a book to showcase their work or sharing it with others is another great way to encourage them.
Between school and extracurricular activities, your child may feel overwhelmed. But in fact, it provides your child an outlet to unwind from their busy day and contemplate what they have accomplished.
Create a special space for your child so that they feel this is their writing area. Having inspiring books nearby will also encourage their writing.
Tartakovsky, M. (2011). How To Inspire Your Kids To Write and Why It’s So Important. Psych Central. Retrieved on December 10, 2012, from http://psychcentral.com/blog/archives/2011/09/19/how-to-inspire-your-kids-to-write-and-why-its-so-important/
|
MySQL Database Training
MySQL Training Course Objectives
* How to use SQL to get output reports with MySQL.
* How to modify MySQL data with SQL.
* How to create a simple MySQL database Table.
MySQL Create Database
This tutorial explains you how to create a database in MySQL using the MySQL Command Line Client. You can also use the Table Editor which contains both the MySQL Query Browser and MySQL Administrator, enabling the visual creation and modification of tables. It also allows you the create the MySQL database.
PHP Mysql Database Connection
PHP Mysql Database Connection is used to build a connection between the PHP on the server-side and Mysql on the backend.
|
People who are fond of grammar would argue that when the word `percentage’ is preceded by the definite article `the’, then the verb is usually singular. It doesn’t really matter if the noun preceding the verb is singular or plural.
*The percentage of students from Delhi is relatively small.
Although the noun (`students’) is plural, the verb that follows (`is’) is singular.
*The percentage of people willing to participate keeps decreasing every year.
When you talk about `a percentage’, on the other hand, it can be followed by a singular or plural verb. It depends on the noun which follows `percentage’.
*A very small percentage of the students are from Delhi.
*I’m told that a small percentage of Padma’s income goes to charity.
|
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: ACTSC 445: Asset-Liability Management – Fall 2008 Department of Statistics and Actuarial Science, University of Waterloo Unit 8 (Part II) – Continuous-time interest rate models References (recommended readings): Chap. 28 of Hull. Introduction • The binomial model is simple to use, but not very realistic unless each time-step represents a small enough amount of time. But then there are too many nodes and it is likely to become too cumbersome from a computational point of view. • Rather than taking very small time steps in a tree, it is better to work with a continuous-time model , where we described the behavior of r ( t ) = short rate at time t for all t ≥ 0. • Continuous-time models require the use of the Brownian motion (BM). We’ll be avoiding getting into the foundations of BM and will simply attempt to learn how to use these models. • The models presented here are all risk-neutral models, which means r ( t )Δ represents the amount of interest earned on average by all investors over a short period of time Δ. Some examples of models Example: a very simple model would be dr ( t ) = σr ( t ) dB ( t ) which means that for a small amount of time Δ, we have that Δ r ( t ) := r ( t + Δ)- r ( t ) = σr ( t )( B ( t + Δ)- B ( t )) . We can use the properties of BM, stating that B ( t + Δ)- B ( t ) ∼ N (0 , Δ) , to conclude that Δ r ( t ) r ( t ) ∼ N (0 ,σ 2 Δ) . We can show that, in turn, this implies we have r ( t ) = r (0) e- σ 2 t/ 2+ σB ( t ) 1 where, again by the properties of the BM, B ( t ) ∼ N (0 ,t ). Hence for each t , r ( t ) has a lognormal distribution. This model is a special case of the Rendleman&Bartter model. It is an equilibrium model, and thus the prices for zero-coupon bonds returned by this model may be different from market prices. It is also called a lognormal model, since, as we just pointed out, for this model r ( t ) has a lognormal distribution. A drawback of this model is that it doesn’t include a “mean-reversion” feature, which is believed to be an important property that interest-rate models should have. Question: how do we get the price of a zero-coupon bond for a continuous-time model (came up when we said above model was an equilibrium model)? Answer: use the formula P (0 ,t ) = E e- R t r ( s ) ds , which is the expectation of the discounted value of $1 paid at time t . To compute this expectation, we need mathematical tools that we won’t develop here. Example: Vasicek model. This model is described by dr ( t ) = a ( b- r ( t )) dt + σB ( t ) . Therefore, Δ r ( t ) = a ( b- r ( t ))Δ + σZ where Z ∼ N (0 , Δ) and the term ( b- r ( t )) captures the mean-reversion feature. For this model, we can show that r ( t ) = r (0) e- at + b (1- e- at ) + σe- at Z t a as dB ( s ) and therefore E( r ( t )) = r (0) e- at + b (1- e- at ) → b as t → ∞ ....
View Full Document
This note was uploaded on 10/24/2010 for the course ACTSC 445 taught by Professor Christianelemieux during the Fall '09 term at Waterloo.
- Fall '09
|
America's Voice En Español »
Donald Trump has a plan to remove 11 million people from the United States in 18 months. If his plan were successful, it would be one of the worst global humanitarian atrocities in recent history:
Only 52% of the 11 million would be deported to Mexico, and the other 5.7 million people would be shipped countries all over the globe:
President Trump plans to deport the 4.5 million US citizen children who were born in the U.S. to undocumented parents.
President Trump’s immigration plan would remove 5.1% of the U.S. labor force:
Trump’s immigration plan would still leave hundreds of thousands jobs unfilled in California, Nevada, Texas and New Jersey where, the share of the labor force occupied by undocumented immigrants in is much greater than the jobless rate.
Trump’s plan would wreak havoc inside private homes, where nearly 60% of the nation’s five million undocumented immigrant women work as domestic workers or caregivers of children, the elderly, and disabled.
President Trump’s immigration plan would remove $11.2 billion in tax revenue from state and federal programs.
President Trump’s immigration plan would cost between $735 and $935 billion, according to some estimates. The federal government would have to spend close to $52 billion dollars a month in order to carry out a deportation strategy of this magnitude.
President Trump’s plan would shrink the economy by 6% over the next 20 years, which would translate to $1.6 trillion lost wages.
In order for President Trump to deport 11 million immigrants, the United States would have to fill up and fly out “30 or more 747s every single day for two years” – as described by Jorge Ramos.
It’s an absurd and impossible plan. And since Trump won’t give out his specifics about how he’d go about carrying it out, a new infographic from America’s Voice visualizes the sheer magnitude of what could happen:
|
Let’s go back to a structure defined in the introductory post:
1 2 3 4 5
If you were testing an application that read a
pascal_t, what kind of data would you feed it in an attempt to break it? One strategy might be to throw random data at the program: this is called fuzzing. Because reading
string is dependent upon the value of
length, it would follow that fuzzing
length is more likely to surface vulnerabilities than fuzzing
string. This is a classic buffer overflow exploitation.
Binspector knows a lot about a file being analyzed. As it turns out, the knowledge it collects makes this kind of intelligent fuzzing heuristic pretty straightforward to implement.
Consider the following change to the sample binary:
According to the format grammar, the binary file is no longer well-formed because the
length does not match the amount of ensuing data. At this point, what happens during reading depends entirely on the application. For example, binspector will produce the following:
1 2 3 4
Binspector (and any other application reading a
length to derive the contents of
string. Intelligent fuzzing is based on the observation that the more interesting values are the ones used to drive further reading of the file. With a well-formed binary and an associated format grammar, Binspector can produce a series of derivative files that have been strategically altered. (The fuzzing engine used to be a separate tool I called Hairbrain. Despite my love of the name, it was easier to maintain the tools as one codebase than keep them apart.)
The first attack type starts with Binspector keeping track of the atoms in the binary that were evaluated to continue analysis. Since Binspector knows the types of these atoms (that is, how they will be interpreted) it can tweak them to try and throw off file reading code. Let’s take a look at what Binspector produces with our sample file and grammar:
1 2 3 4
Binspector has generated four files, each one a corruption of
file.bin in a known way. It also produces an attack summary file which details what it has done:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
The file is delineated per-attack. You will notice there are two atoms Binspector decided to attack: the
lengths of the two
pascal_t structures. The lines prefixed by
? reveal what Binspector knows about those particular atoms that are relevant to fuzzing them. The lines prefixed by
> reveal files derived from the known good file but that have been attacked. For the case of integer atoms it changes the values to all-zeroes (
_z) and all-ones (
You now have four files against which you can harden the file code of your
pascal_t-reading application, each of which may throw it completely off the rails.
Many file formats or substructures within them are block-based. For example, a PNG contains a series of chunks that flesh out its contents. A PNG always starts with an IHDR chunk, and always finishes with an IEND chunk, and in the middle can be a varying number of others. For example:
A shuffle attack is based on the observation that contiguous chunks of data may affect input code differently if they are rearranged. We know that these chunks together occupy N bytes in the file, and this is true regardless of the order they are in. Therefore we are free to shuffle them in-place, and we know the rest of the file should still hold up. For example what if we tried to open the above PNG that had been altered thusly:
Whether or not the above reordering still constitutes a valid PNG is irrelevant. What matters is how input code will handle it. It may look enough like a PNG to begin the file input process, only to be thrown into the weeds when it is faced with an unexpected chunk.
Since we may not want to shuffle every array found in a binary, Binspector has a special keyword to enable this kind of attack. Lets modify the format grammar slightly and see what kind of fuzzing result comes out:
1 2 3 4 5 6 7 8 9 10 11 12 13 14
In this format grammar we have consolidated
last into a two-element array, and have suffixed the statement with the
shuffle keyword. This lets Binspector know that we are interested in producing a shuffle attack on what it finds. The resulting fuzz produces the following attack summary:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
In a hex editor, it is easy to see the shuffle file’s contents have been reordered:
In this particular case the shuffle attack is unlikely to reveal any problems with an application’s read code. However (as is the case with PNG) it does not take much to turn an innocuous file on its head, and perhaps cause input code to nosedive in turn.
Fuzzing as a means of security testing is as much art as it is science. Many enhancements can go into Binspector’s current engine to make it more useful than it is (for example, producing files that have been attacked in several ways, not just one). Also, intelligent fuzzing itself should be augmented with more broad-spectrum tests, including more traditional fuzzing. Nevertheless, Binspector does provide a valuable subset of attacks, and makes them easily available to users.
|
Energy balance during two days of continuous stationary cycling
© Stewart and Stewart; licensee BioMed Central Ltd. 2007
Received: 21 August 2007
Accepted: 31 October 2007
Published: 31 October 2007
This study examined the capabilities of an ultraendurance athlete to self-regulate their diet during an attempt on the record for the longest period of stationary cycling. The attempt required the athlete to complete at least 20 km/hr, with a 15 minute break allowed every eight hours. Laboratory tests determined a heart rate-oxygen consumption regression equation enabling calculation of energy expenditure from heart rate during the attempt. Energy intake was determined by a non-weighed dietary record collected at the time of consumption. The athlete completed 46.7 hours, covering 1126 km, at a speed of 24 ± 1.6 km/hr. He expended 14486 kcal and consumed 11098 kcal resulting in an energy deficit (-3290 kcal) and a weight loss (-0.55 kg). The carbohydrate (42 ± 32 g/hr), water (422 ± 441 ml/hr), and sodium (306 ± 465 mg/hr) intake were all below current recommendations. The athlete was unable to self-regulate his diet or exercise intensity to prevent a negative energy balance.
Ultraendurance athletes' are challenged in attempting to balance the high energy requirements of their sport with the high energy consumption required to compete successfully. When the energy intake exceeds 4500 kcal/d, the athlete will commonly have to ingest and digest food while actually competing . In order to meet these energy requirements while competing and prevent abdominal distress and diarrhoea, the athlete typically selects energy dense foods, gels and liquids . These types of foods allow gastric volumes to be kept to a comfortable level and dehydration to be prevented [2, 3]. An exercise-induced suppression of appetite, in combination with a nibbling eating pattern of continuous snacking, often leads to an insufficient energy intake during prolonged exercise . Disciplined eating by athletes plus appropriately prescribed diets by sports dietitians are required for the athlete to prevent a negative energy balance and its associated detrimental influence on prolonged endurance performance.
Few athletes have the discipline required to successfully self regulate their energy intake during ultraendurance exercise, but one previous casestudy occurred during the 1000 km running race from Sydney to Melbourne in Australia. Greek ultra marathoner, Yiannis Kouros', self regulated diet across the five days was almost entirely comprised of carbohydrate (95%). Energy dense Greek sweets and honey soaked biscuits were snacked on every 30 minutes, enabling Kouros to consume on average an amazing 11,074 kcal/d .
The purpose of this case study was to assess the capabilities of an experienced ultraendurance athlete to appropriately self regulate his energy intake during an attempt on the world record for the longest period of stationary cycling.
The subject was a 35 year old male amateur cyclist (height 172 cm; weight 72 kg) with previous experience in ultraendurance events. The subject gave informed consent to collect data during the record attempt.
The subject completed an intense program of endurance training spanning 6 months. He was provided with guidelines about the amounts and types of foods/fluids to consume throughout the world record attempt with specific emphasis on carbohydrate, sodium and fluid amounts. The subject was then responsible for planning and preparing the appropriate items for the ride. He began the attempt with access to ample sports drinks, protein bars and energy gels (Endura™).
Pre-record attempt laboratory testing
The athlete completed two cycle ergometer protocols a week prior to the record attempt. The first comprised four submaximal workloads, commencing at 0 W and increasing by 25 W every 2.5 minutes. This test was conducted to develop a relationship between heart rate and oxygen uptake (VO2) in order to estimate energy expenditure during the record attempt . The second cycle protocol was an incremental (30 W/min) test to exhaustion to determine aerobic capacity (VO2max), ventilatory threshold, and peak power.
All testing was undertaken on a cycle ergometer (Excalibur Sport, Lode, Gronigen, The Netherlands) with ventilation and expired gas collected and analysed every 15 seconds using a metabolic cart (Moxus, AEI Technologies, Pennsylvania, USA). Oxygen consumption (VO2), minute ventilation (VE), carbon dioxide production (VCO2), and respiratory exchange ratio (RER) were calculated. Before testing, the gas analysers were calibrated with a known gas mixture and room air. Heart rate was measured by telemetry (Polar Vantage XL, Kemple, Finland) and recorded every 15 seconds.
The VO2 and heart rate values obtained during the multiple submaximal workload test were averaged over the final minute of each of the four workloads and a linear regression was fitted to the data. Standard indicators for achieving VO2 max were applied to the incremental test to exhaustion: volitional fatigue; a plateau in oxygen consumption with increasing work rate; heart rate ≥ 90% of age predicted maximum; and a respiratory exchange ratio ≥ 1.15. Given that three of the preceding criteria were met, values for maximal oxygen consumption were determined by averaging the four highest consecutive 15 second values.
World record attempt
The previous world record stood at 77 hours and 15 minutes. The attempt required the athlete to complete at least 20 km per hour, with a 15 minute break off the bike allowed every eight hours. The record was attempted on a stationary cycle ergometer (Tempo, Giant, Australia). The distance covered and the speed maintained was calculated by a calibrated bike computer (VELO5, Cat Eye, Japan). Throughout the record attempt, the athlete's heart rate (s610i, Polar Electro Oy, Kempele, Finland) and blood pressure was monitored, and the self regulated fluid and food intake recorded. Heart rate was recorded every minute and energy expenditure calculated from the equation obtained from the laboratory submaximal workload test. Blood pressure was recorded every hour. Body mass was measured every eight hours and urine output was weighed throughout. The total energy, carbohydrate, protein, fat and sodium consumed by the athlete was analysed using a dietary software program (Foodworks Professional Version 4.00, Xyris Software, Australia).
Throughout the attempt the athlete was provided with verbal encouragement and physical assistance to continue eating and drinking and encouragement to continue cycling.
The subject's VO2 max from the incremental test was 60.3 ml/kg/min and he achieved a peak power of 315 W. The relationship between heart rate and VO2 determined with the multiple submaximal workloads was represented by the following equation (VO2 (ml/min) = 26.826 * heart rate – 1434.6, r2 = 0.9974). The energy expenditure measured in kcal was calculated by multiplying the estimated VO2 (in L/min) by 4.948. This conversion factor was calculated from the average non-protein respiratory quotient measured during the multiple submaximal workloads .
Cardiovascular and performance data during the record attempt
Heart Rate (bpm)
Blood Pressure (mmHg)
Eight hour (and 24 hour total) energy intake, derived from carbohydrate (CHO), fat and protein, and the calculated energy expenditure during the record attempt
Total EI (kcal)
Total EE (kcal)
0–24 hour total
24–48 hour total #
The major finding of this case study was that the athlete was unable to self regulate his energy intake or his exercise intensity to prevent an energy deficit situation.
In comparison to the direct measurement of energy expenditure by calorimetry the individually determined heart rate VO2 relationship method, employed in the present study, has been shown to be an acceptable measure of energy expenditure during low intensity exercise . As the energy intake was undertaken by a non-weighed dietary analysis, recorded at the time of consumption, it is possible that the food weights may have been underreported therefore underestimating the total energy intake . Undereating may also result in an energy deficit situation. However the quite remarkable agreement between the estimated energy deficit (3290 kcal) and that calculated from the reduced body mass (3286 kcal) indicates that, on this occasion, the methodologies employed provided an accurate representation of the energy deficit. An alternative explanation is that the methodologies over or underestimated by the same magnitude, which is unlikely given the methodologies for expenditure and intake generally over and underestimate, respectively .
The intensity of the ride was 20% higher than required to set the record, therefore unnecessarily increasing the energy expenditure. During the first 24 hour period the athlete's energy expenditure was 9975 kcal (41.8 MJ), less than the 17430 kcal (72.9 MJ) reported during the 2004 XXAlps ultraendurance cycle race or the 23,280 kcal (97.3 MJ) during the 2003 Race Across America (RAAM) . These results, however, were estimated with a Polar S710 heart rate monitor that has been shown to overestimate energy expenditure by 38% compared with the individual relationship between heart rate and oxygen consumption . The energy expenditure during the first 24 hour period compares favourably against values reported during the Tour de France (24.7 – 38.4 MJ) [3, 13], cross-country skiing (25.4 – 34.9 MJ) , or Artic/Antarctic expeditions (23.6 – 32.4 MJ) [15, 16]. The highest recorded daily energy expenditure values were obtained during a trans-Antarctica crossing where for a period of nine days two trekkers averaged 10,564 and 11,634 kcal/d (44.2 and 48.7 MJ/d, respectively) , while the theoretical ceiling has been calculated to be 13,675 kcal/d (57.2 MJ/d) .
Based on an estimated basal metabolic rate (BMR) for a 70 kg male of 1640 kcal/day , the first 24 hour period also represents an expenditure of 6.1 times BMR. Sedentary humans on a daily basis generally expend 1.7 times BMR, while during the 1984 Tour de France cyclists achieved 5.4 times BMR . The highest reported daily expenditure values, 6.7 times BMR, belong to lactating rodents . The results of the current study indicate that the athlete, while exercising at a low intensity (Table 1), did expend an incredible amount of energy over the course of the attempt. The result, however, is inflated in comparison to sustained daily expenditure values [13, 19] as the athlete exercised for all but 30 minutes of that 24 hour period.
The athlete averaged a fluid intake of 422 ml/h, nearly identical to the 417 ml/h recorded during a 24 hour road race in Britain , but substantially less than the 700 and 1300 ml/h averaged during the RAAM and Tour de France , respectively. The fluid intake was also less than the 500–800 ml/h recommended for the cycling leg of Ironman triathlons but considering the extended duration and lower intensity of the exercise the self-regulated fluid intake appeared to be appropriate to maintain euhdryation.
The total volume of fluid consumed, plus the water contained within food, was 13 litres greater than the volume of urine produced. This positive balance did not result in an increase in unexplained body mass as the intensity of exercise maintained has been shown to produce sweat at a rate of 233 ml/hour , and insensible water loss and faeces, while not measured, could have accounted for the unexplained 2.4 litres. Ultraendurance exercise has also been shown to increase total body water and it is possible that the loss of water due to sweat may be less than estimated, as the rate of sweat production would have fluctuated with the changing climatic conditions particularly overnight.
The minimal sweat rate maintained throughout the attempt would also have enabled the athlete to reabsorb, within the sweat duct, the majority of the sodium secreted by the gland. In more humid and hot conditions, and in unacclimatised individuals, the increased risk of exercise associated hyponatremia resulting from minimal sodium ingestion or excessive water intake, can result in complications that are potentially life-threatening . The American College of Sports Medicine therefore recommends sodium supplementation at a rate of 0.5–0.7 g/L (8.6–12 mmol/L) in their position stand on fluid replacement for events lasting more than one hour . In longer ultraendurance events the risk of hyponatremia is substantially increased and supplementation rates of up to 1.15 g/L (50 mmol/L) have been proposed for events lasting 24 hours [27, 28]. In the current case study the athletes sodium intake of 0.008 g/L (0.03 mmol/L) was significantly below the recommended levels and, regardless of his calculated sweat rate resulting in minimal sodium loss, may have resulted in the athlete suffering from hyponatremia as evidenced by the athlete's inability to stand, dizziness, and confused state upon retiring from the attempt.
The current recommendations for CHO supplementation during ultraendurance exercise range from 30 – 90 g/h [21, 27, 29]. The modality, running compared with cycling , and the definition of ultraendurance, hours [21, 29] compared with days , could explain the substantial range prescribed. During the current study the athlete averaged only 42 g/h and consumed greater than the minimum recommended CHO dose only 52% of the time. CHO is essential in prolonged low intensity exercise in order to provide essential intermediaries (ie oxaloacetate and pyruvate) for fat oxidation. The levels of CHO intake, in the current study, may have resulted in depletion of endogenous stores and subsequent hypoglycaemia. Sufficient CHO intake is necessary to maintain exercise for prolonged periods without the onset of fatigue .
Despite being provided with appropriate guidelines, the athlete did not pre-plan or prepare his energy intake for the record attempt. He supplemented his intake of sports drinks, protein bars, and energy gels (Endura™) with impulse selections from nearby commercial food outlets. These impulse selections included fried rice, McDonalds™, and bacon and eggs. In any ultraendurance event, requiring the athlete to eat while competing, it would be strongly recommended that the athlete commence the event with all meals and fluids planned and prepared according to nutritional recommendations, likes and dislikes, and ability to store items to be consumed. Alternatives also need to be prepared for when food and flavour fatigue occurs, as is often the case during ultraendurance events (unpublished – personal observation). Poor planning and preparation, as well as other common factors such as gastrointestinal discomfort and loss of appetite , may be reasons for the athlete failing to match his energy requirements.
It is unknown from the current data exactly why the athlete was unable to complete the record attempt. An energy deficit situation, and therefore loss of body mass, is common in ultraendurance events [6, 16, 20, 27, 31] and therefore cannot directly account for the failed attempt. The insufficient CHO intake may have contributed, as it has previously been correlated with poor performance and associated with the onset of fatigue in ultraendurance triathlon. Aside from the insufficient CHO intake, the lack of sleep and a compromised immune system due to an undisclosed viral complaint, could have potentially contributed to the failed attempt. It should be noted however that the athlete had had previous experience at ultraendurance races that involved sleep deprivation and his preparation for this event was similar.
The initial eight hour period particularly highlights the inadequacies of self-regulation with a lower than required total energy, and particularly CHO, intake, and an elevated energy expenditure. Overcoming such a large initial energy deficit, while the athlete is still competing, is difficult due to the limited digestive capacity of the gastrointestinal tract . The inability for the athlete to balance their own energy requirements reflects the importance of the role(s) played by the sports dietitian and exercise physiologist in planning and monitoring the energy intake and expenditure, respectively, for ultraendurance performance.
The authors would like to acknowledge the assistance of Jane Stockwell in the collection of data during the record attempt.
- Brouns F, Saris WH, Stroecken J, Beckers E, Thijssen R, Rehrer NJ, ten Hoor F: Eating, drinking, and cycling. A controlled Tour de France simulation study, Part II. Effect of diet manipulation. Int J Sports Med. 1989, 10 Suppl 1: S41-8.View ArticlePubMedGoogle Scholar
- Brouns F, Saris WH, Stroecken J, Beckers E, Thijssen R, Rehrer NJ, ten Hoor F: Eating, drinking, and cycling. A controlled Tour de France simulation study, Part I. Int J Sports Med. 1989, 10 Suppl 1: S32-40.View ArticlePubMedGoogle Scholar
- Saris WH, van Erp-Baart MA, Brouns F, Westerterp KR, ten Hoor F: Study on food intake and energy expenditure during extreme sustained exercise: the Tour de France. Int J Sports Med. 1989, 10 Suppl 1: S26-31.View ArticlePubMedGoogle Scholar
- King NA, Burley VJ, Blundell JE: Exercise-induced suppression of appetite: effects on food intake and implications for energy balance. Eur J Clin Nutr. 1994, 48: 715-724.PubMedGoogle Scholar
- Rontoyannis GP, Skoulis T, Pavlou KN: Energy balance in ultramarathon running. Am J Clinical Nutrition. 1989, 49: 976S-979.Google Scholar
- Bircher S, Enggist A, Jehle T, Knechtle B: Effects of an extreme endurance race on energy balance and body composition - a case study. Journal of Sports Science and Medicine. 2006, 5: 154-162.PubMed CentralPubMedGoogle Scholar
- Zuntz N: Ueber die Bedeutung der verschiedenen Nahrstoffe als Erzeuger der Muskelkraft. Pflugers Archiv European Journal of Physiology. 1901, 83: 557-571. 10.1007/BF01746509.View ArticleGoogle Scholar
- Spurr GB, Prentice AM, Murgatroyd PR, Goldberg GR, Reina JC, Christman NT: Energy expenditure from minute-by-minute heart-rate recording: comparison with indirect calorimetry. Am J Clinical Nutrition. 1988, 48: 552-559.Google Scholar
- Goris AHC, Westerterp KR: Underreporting of Habitual Food Intake Is Explained by Undereating in Highly Motivated Lean Women. J Nutr. 1999, 129: 878-882.PubMedGoogle Scholar
- Elia M: Energy expenditure in the whole body. Energy Metabolism: Tissue Determinants and Cellular Calories. Edited by: Kinney JMT. 1992, New York, Raven Press Ltd, 19-49.Google Scholar
- Seale JL: Energy expenditure measurements in relation to energy requirements. Am J Clinical Nutrition. 1995, 62: 1042S-1046.Google Scholar
- Knechtle B, Enggist A, Jehle T: Energy turnover at the Race Across AMerica (RAAM) - a case report. Int J Sports Med. 2005, 26: 499-503. 10.1055/s-2004-821136.View ArticlePubMedGoogle Scholar
- Westerterp KR, Saris WH, van Es M, ten Hoor F: Use of the doubly labeled water technique in humans during heavy sustained exercise. J Appl Physiol. 1986, 61: 2162-2167.PubMedGoogle Scholar
- Sjodin AM, Andersson AB, Hogberg JM, Westerterp KR: Energy balance in cross-country skiers: a study using doubly labeled water. Med Sci Sports Exerc. 1994, 26: 720-724. 10.1249/00005768-199406000-00011.View ArticlePubMedGoogle Scholar
- Stroud MA: Nutrition and energy balance on the 'Footsteps of Scott' expedition 1984-86. Hum Nutr Appl Nutr. 1987, 41: 426-433.PubMedGoogle Scholar
- Stroud MA, Coward WA, Sawyer MB: Measurements of energy expenditure using isotope-labelled water (2H2(18)O) during an Arctic expedition. Eur J Appl Physiol Occup Physiol. 1993, 67: 375-379. 10.1007/BF00357638.View ArticlePubMedGoogle Scholar
- Stroud MA, Ritz P, Coward WA, Sawyer MB, Constantin-Teodos D, Greenhaff PL, Macdonald IA: Energy expenditure using isotope-labelled water (2H218O), exercise performance, skeletal muscle enzyme activities and plasma biochemical parameters in humans during 95 days of endurance exercise with inadequate energy intake. Eur J Appl Physiol Occup Physiol. 1997, 76: 243-252. 10.1007/s004210050243.View ArticlePubMedGoogle Scholar
- Davies CT, Thompson MW: Aerobic performance of female marathon and male ultramarathon athletes. Eur J Appl Physiol Occup Physiol. 1979, 41: 233-245. 10.1007/BF00429740.View ArticlePubMedGoogle Scholar
- Hammond KA, Diamond J: Maximal sustained energy budgets in humans and animals. Nature. 1997, 386: 457-462. 10.1038/386457a0.View ArticlePubMedGoogle Scholar
- White JA, Ward C, Nelson H: Ergogenic demands of a 24 hour cycling event. Br J Sports Med. 1984, 18: 165-171.PubMed CentralView ArticlePubMedGoogle Scholar
- Peters EM: Nutritional aspects in ultra-endurance exercise. Curr Opin Clin Nutr Metab Care. 2003, 6: 427-434. 10.1097/00075197-200307000-00012.PubMedGoogle Scholar
- Montain SJ, Latzka WA, Sawka MN: Control of thermoregulatory sweating is altered by hydration level and exercise intensity. J Appl Physiol. 1995, 79: 1434-1439.PubMedGoogle Scholar
- Williams ES, Ward MP, Milledge JS, Withey WR, Older MW, Forsling ML: Effect of the exercise of seven consecutive days hill-walking on fluid homeostasis. Clin Sci (Lond). 1979, 56: 305-316.View ArticleGoogle Scholar
- Noakes TD, Norman RJ, Buck RH, Godlonton J, Stevenson K, Pittaway D: The incidence of hyponatremia during prolonged ultraendurance exercise. Med Sci Sports Exerc. 1990, 22: 165-170.View ArticlePubMedGoogle Scholar
- Surgenor S, Uphold RE: Acute hyponatremia in ultra-endurance athletes. Am J Emerg Med. 1994, 12: 441-444. 10.1016/0735-6757(94)90057-4.View ArticlePubMedGoogle Scholar
- Convertino VA, Armstrong LE, Coyle EF, Mack GW, Sawka MN, Senay LC, Sherman WM: American College of Sports Medicine position stand. Exercise and fluid replacement. Med Sci Sports Exerc. 1996, 28: i-vii.View ArticlePubMedGoogle Scholar
- Rehrer NJ: Fluid and electrolyte balance in ultra-endurance sport. Sports Med. 2001, 31: 701-715. 10.2165/00007256-200131100-00001.View ArticlePubMedGoogle Scholar
- Maughan RJ: Fluid and electrolyte loss and replacement in exercise. J Sports Sci. 1991, 9 Spec No: 117-142.View ArticlePubMedGoogle Scholar
- Burke LM, Hawley JA: Carbohydrate and exercise. Curr Opin Clin Nutr Metab Care. 1999, 2: 515-520. 10.1097/00075197-199911000-00015.View ArticlePubMedGoogle Scholar
- Laursen PB, Rhodes EC: Factors affecting performance in an ultraendurance triathlon. Sports Med. 2001, 31: 195-209. 10.2165/00007256-200131030-00004.View ArticlePubMedGoogle Scholar
- Kimber NE, Ross JJ, Mason SL, Speedy DB: Energy balance during an ironman triathlon in male and female triathletes. Int J Sport Nutr Exerc Metab. 2002, 12: 47-62.PubMedGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
|
There is a fascinating review of a very recent Nature paper on the “brown clouds” in Green Car Congress. These clouds have been observed in several parts of the world, especially over the densely populated and polluted countries in Asia, by V. Ramanathan and his colleagues at Scripps. These clouds have been found to be persistent, filled with dust and soot, and linked to increases in a masking of the full magnitude of global warming impact in the region, adverse human health, decreases in food crop cultivation, and also extreme weather events. See some of my other related posts:
A new analysis of pollution-filled “brown clouds” over south Asia by researchers at the Scripps Institution of Oceanography in La Jolla, Calif., suggests that the region may be able to arrest some of the alarming melting of Himalayan and other tropical glaciers by reducing its air pollution. The team, led by atmospheric chemist V. Ramanathan of Scripps, found that atmospheric brown clouds enhanced solar heating of the lower atmosphere by about 50%. The results are in a paper in this week’s issue of the journal Nature. The combined heating effect of greenhouse gases and brown clouds, which contain soot, trace metals and other particles from urban, industrial and agricultural sources, is enough to account for the retreat of Himalayan glaciers in the past half century, the researchers concluded. These glaciers supply water to major Asian rivers, including the Yangtze, Ganges and Indus. These rivers are the chief water supply for billions of people in China, India and other south Asian countries.
If it becomes widespread and continues for several more decades, the rapid melting of these glaciers, the third-largest ice mass on the planet, will have unprecedented effects on southern and eastern Asia.
The scientists based their conclusions on data gathered by a fleet of unmanned aircraft during a landmark field campaign conducted in March 2006, in the skies over the Maldives, an island nation in the Indian Ocean south of India. The Maldives Autonomous unmanned aerial vehicle Campaign (MAC) took place during the region’s dry season when polluted air masses travel south from the continent to the Indian Ocean. (Earlier post.) The air typically contains particles released from industrial and vehicle emissions, and through biomass burning. Such polluted air has a dual effect of warming the atmosphere as particles absorb sunlight, and of cooling Earth’s surface as the particles reduce the amount of sunlight that reaches the ground.
Atmospheric brown clouds are mostly the result of biomass burning and fossil fuel consumption. They consist of a mixture of light-absorbing and light-scattering aerosols and therefore contribute to atmospheric solar heating and surface cooling. The sum of the two climate forcing terms—the net aerosol forcing effect—is thought to be negative and may have masked as much as half of the global warming attributed to the recent rapid rise in greenhouse gases. There is, however, at least a fourfold uncertainty in the aerosol forcing effect. Atmospheric solar heating is a significant source of the uncertainty, because current estimates are largely derived from model studies.
…We found that atmospheric brown clouds enhanced lower atmospheric solar heating by about 50 per cent. Our general circulation model simulations, which take into account the recently observed widespread occurrence of vertically extended atmospheric brown clouds over the Indian Ocean and Asia, suggest that atmospheric brown clouds contribute as much as the recent increase in anthropogenic greenhouse gases to regional lower atmospheric warming trends.
—“Warming trends in Asia amplified by brown cloud solar absorption”
During 18 flight missions, the aircraft, flying in stacked formations, made nearly simultaneous measurements of brown clouds from different altitudes, creating a profile of soot concentrations and light absorption that was unprecedented in its level of vertical detail. The researchers validated the data from the aircraft with ground-based measurements taken at a station at the Maldivian island Hanimadhoo.
The main cause of climate change is the buildup of greenhouse gases from the burning of fossil fuels. But brown clouds, whose environmental and economic impacts are beginning to be unraveled by scientists, are complicating and in some cases aggravating their effects. It is likely that in curbing greenhouse gases we can tackle the twin challenges of climate change and brown clouds, and in doing so, reap wider benefits–from reduced air pollution to improved agricultural yields.
—Achim Steiner, United Nations under-secretary general and executive director of the UN Environment Programme (UNEP)
The analysis reveals that the effect of the brown clouds explains temperature changes observed in the region over the last half-century. It also indicates that south Asia’s warming trend is more pronounced at higher altitudes.
The conventional thinking is that brown clouds have masked as much as 50 percent of global warming by greenhouse gases through so-called global dimming. While this is true globally, this study reveals that over southern and eastern Asia, the soot particles in the brown clouds are in fact amplifying the atmospheric warming trend caused by greenhouse gases by as much as 50 percent.
In addition to Ramanathan, the report’s authors include Muvva Ramana, Gregory Roberts, Dohyeong Kim, Craig Corrigan, Chul Chung from Scripps Oceanography and David Winkler from NASA’s Langley Research Center. The National Ocean and Atmospheric Administration (NOAA) and NASA also provided funding, as did UNEP, which sponsors the Atmospheric Brown Clouds (ABC) project and operates the Maldives ABC observatory in collaboration with Scripps.
- “Warming trends in Asia amplified by brown cloud solar absorption”; Veerabhadran Ramanathan, Muvva V. Ramana, Gregory Roberts, Dohyeong Kim, Craig Corrigan, Chul Chung and David Winker; Nature 448, 575-578 (2 August 2007) | doi:10.1038/nature06019
|
HIV-1 group M viruses account for most infections internationally1 and based on genetic similarity are classified into nine different subtypes (A–D, F–H, J, and K). Variants, however, diverge 25%–35% in envelope (env), important for viral attachment to target cells during infection, and 10%–15% in the pol region, under selection pressure from common antiretrovirals (ARVs).1–3 Subtypes A and F are further divided into sub–subtypes A1, A2 and F1, F2, respectively. Although subtypes B and D are as similar as sub–subtypes, for historical reasons, they maintain separate subtype classification.1 Formerly, HIV-1 genotype assignments were based on gene fragments. Later, when gag and pol regions were genotyped, subtype E env viruses were found to include subtype A sections in the other regions of the viral genome, resulting in reclassification of subtype E as an A/E recombinant, CRF01_AE.4 Circulating recombinant forms (CRFs) result from recombination between HIV-1 genotypes within a dually infected person,1 but no complete subtype E genome has been found, leaving CRF01_AE’s recombinant status inconclusive.
Subtype B is the genotype historically common in developed countries, and nucleotide substitutions (mutations or naturally occurring polymorphisms), insertions, and deletions in the HIV-1 genome are made in reference to the earliest characterized subtype B wild-type strain, HXB2.5,6 ARVs, commonly designed on subtype B, are classified based on where the HIV-1 life cycle is interrupted. Synergistic combinations of ARVs, known as highly active antiretroviral therapy (HAART), suppress viral load (VL) thereby reducing the risk of opportunistic infections and death.7,8 However, natural drug-resistant polymorphisms may exist in patients pretherapy with higher frequencies being found in non–B subtypes.9
In vitro studies suggest differences in viral transmission characteristics between genotypes, and viral heterogeneity may have implications for disease progression. HIV-1 infection depends on the interaction of env gp120 with the target cell CD4 receptor,10 and this interaction promotes binding to a coreceptor, viral tropism being determined by the env amino acid sequence and structure. Most genotypes use R5 coreceptors during transmission and in early stages of infection with X4 using syncytium-inducing variants emerging later.11,12 Subtype C studies generally report a lack of coreceptor switching from R5 to X4, possibly affecting transmission,11 and dual tropic virus (X4/R5) found in other genotypes have not been reported in subtype D viruses.13 Where subtypes A and D cocirculate, more rapid disease progression has been found for subtype D compared with subtype A,14 although the literature suggests that subtype A infections are outpacing subtype D.15 A retrospective analysis found faster rates of CD4 decline and virologic failure in subtype D infection compared with subtypes A, B, or C, suggesting differences in HIV-1 genotypes with respect to patient response to therapy.16
In Asia, predominant genotypes are subtypes B and C, CRF01_AE, and their recombinants with country-specific epidemics featuring different group M genotypes. During 2000–2007, in India, approximately 97% of infections were from subtype C, whereas 4 Mekong River countries (Cambodia, Myanmar, Thailand, and Vietnam) reported almost 80% of infections were from CRF01_AE.17 Subtype B infections are primarily reported in Japan and the Republic of Korea (South Korea).17–20 In China’s Special Administrative Region of Hong Kong and in Malaysia, subtype B and CRF01_AE cocirculate,17,21,22 whereas in Taiwan, subtype B, CRF01_AE, and CRF07_BC have been found.23,24 Epidemic distributions differ depending on the subpopulations at risk with subtype B frequently found in injecting drug users and men who have sex with men (MSM), whereas CRF01_AE is more commonly found in heterosexual populations.25
Previously, we reported that mainly CRF01_AE and subtype B were infecting patients from Thailand, Hong Kong, and Malaysia.26 The objectives were to determine whether treatment responses (clinical deterioration, immunologic response, or virologic suppression) differed between these genotypes in treatment-naive patients initiating a first-line HAART regimen.
Patients providing data were enrolled in either the TREAT Asia Studies to Evaluate Resistance monitoring protocol (TASER-M)26 or the TREAT Asia HIV Observational Database (TAHOD).27 Data for these longitudinal cohort studies are collected prospectively. Most TASER-M sites are selected from TAHOD sites, which consist of government-based or university-based clinics and hospitals or private clinics, situated in major cities and other urban areas. Pretreatment drug resistance prevalence for the TASER-M cohort has been published elsewhere.28 Clinical interventions and testing procedures were implemented according to local practices, excepting HIV-1 genotyping in TASER-M that was collected under the protocol.
Treatment-naive patients were eligible for inclusion if they were initiating first-line HAART regimens and had HIV-1 genotype available. Eligible patients enrolled at March 2010 from 11 clinic locations in Thailand (4), Hong Kong (China) (2), Malaysia (2), Japan (1), Taiwan (1), and South Korea (1) provided prospective and retrospective data (TAHOD) for analysis. Patient covariates included demographics [age at entry to cohort, gender, HIV source exposure), hepatitis B virus and hepatitis C virus (HCV) coinfections, and baseline indices of illness severity (CD4 lymphocyte count, HIV-1 RNA, and Centers for Disease Control and Prevention (CDC) classification29]. The most severe pretherapy CDC category recorded was used as the baseline clinical status. Hepatitis B virus (HCV)–positive status was defined as having any HBsAg (HCV-Ab)-positive result before enrollment. HIV-1 genotypes were determined by Virco BVBA (Beerse, Belgium). For assessing associations between patient covariates and genotype, patients were restricted to those infected with subtype B or CRF01_AE whose sequences passed the quality control procedures of Virco. Due to small numbers, patients reporting injecting drug use exposure, receipt of blood products, perinatal transmission, or unknown exposure were collapsed into an “other” transmission category.
Patients were required to have at least 1 clinic visit or test procedure recorded post therapy initiation for inclusion. Clinical deterioration was determined as a new diagnosis of a CDC B or C (AIDS-defining) illness or death from any cause. Patient follow-up commenced at HAART initiation and ended at earliest clinical deterioration endpoint or censored at the most recent contact. Surrogate endpoints were plasma HIV-1 RNA viral suppression (<400 copies/mL) and change in CD4 cell count from baseline at 12 months post-HAART. For calculating the 12-month immunologic change, the surrogate marker value closest to the 12-month target date was chosen from windows of 9–15 months, and the CD4 count sampled within the 91 days prior and closest to therapy initiation was selected as the baseline value.
For eligible patients, baseline comparisons by country (χ2, Fisher exact or Cochrane–Armitage test for trend) were performed, as appropriate. Determinants of change in CD4 cell count and 12-month HIV-1 RNA suppression were assessed via linear regression and logistic regression, respectively. Proportional hazards models were used to evaluate predictors of time to progression to a new clinical deterioration endpoint. Analyses were based on an intention-to-continue treatment approach in that we did not take into account regimen changes or interruptions post therapy. Forward stepwise techniques were used to determine the best fitting models. Binary covariate P values and multicategorical parameter P values (from tests for trend/heterogeneity) of <0.1, in univariate analyses, were considered for inclusion in multivariate patient covariate models. Final models consisted of patient covariates remaining significant at the 0.05 level. Then, because of our a priori interest in the effect of HIV-1 genotype on outcomes, we assessed the effect of HIV-1 genotype, adjusting for any significant patient covariates, and tested for interactions between genotype and cohort. Analyses were performed using SAS version 9.2 (SAS Institute Inc, Cary, NC) and STATA version 10 (STATA Corp, College Station, TX).
A total of 1105 ARV-naive patients had HIV-1 genotype information available [TASER-M: n = 922 (83.4%); Thailand: n = 675 (73.2%); Hong Kong: n = 160 (17.4%); Malaysia: n = 87 (9.4%); TAHOD: n = 183 (16.6%); Japan: n = 65 (35.5%); Hong Kong: n = 49 (26.8%); Taiwan: n = 43 (23.5%); South Korea: n = 15 (8.2%)]. Differences in ethnicity reflected population distributions within countries contributing data [TASER-M; Thai: n = 675 (73.2%), Chinese: n = 177 (19.2%), Malay: n = 37 (4.0%), Indian: n = 11 (1.2%), white: n = 5 (0.5%); and TAHOD; Thai: n = 14 (7.7%), Chinese: n = 88 (48.1%), Japanese: n = 65 (35.5%), Korean: n = 15 (8.2%), white: n = 1 (0.5%)].
Years of enrollment differed as a function of cohort recruitment, and 80% of TAHOD patients were enrolled before opening of the TASER-M cohort. Patients initiated therapy from 2003 to 2010 (TASER-M: 2007–2010; TAHOD: 2003–2010), and significant differences between cohorts were noted for covariates as shown in Table 1. All Table 1 covariates were evaluated for significance in endpoint analyses.
Most first-line regimens included lamivudine (3TC) as a nucleoside/nucleotide reverse transcriptase inhibitor backbone component [n = 1013 (91.7%)]. Regimens for the cohorts differed in the second nucleoside/nucleotide reverse transcriptase inhibitor component [TASER-M—stavudine: n = 479 (52.0%), zidovudine (AZT): n = 221 (24.0%), abacavir: n = 67 (7.3%); TAHOD—stavudine: n = 37 (20.2%), zidovudine: n = 84 (45.9%), abacavir: n = 26 (14.2%); P < 0.001]. Most regimens were based on nonnucleoside reverse transcriptase inhibitors with more TAHOD patients being prescribed efavirenz (EFV) and TASER-M patients’ regimens including higher proportions of nevirapine (NVP) [TASER—NVP: n = 484 (58.9%), EFV: n = 338 (41.1%); TAHOD—EFV: n = 77 (82.8%), NVP: n = 16 (17.2%); P < 0.001]. Of protease inhibitor regimens, most included ritonavir-boosted atazanavir (ATZ) or lopinavir (LPV), proportions of which marginally differed between cohorts [TASER-M—ATZ/r: n = 28 (38.9%), LPV/r: n = 44 (61.1%); TAHOD—ATZ/r: n = 17 (22.7%), LPV/r: n = 58 (77.3%); P = 0.048].
In East Asia, there is higher odds of CRF01_AE infecting heterosexual populations, and subtype B is more frequently found in MSM. We found differences in genotype proportions consistent with patient-reported HIV source exposures (Table 1) [TASER-M—CRF01_AE: n = 740 (86.8%), subtype B: n = 113 (13.2%); TAHOD—CRF01_AE: n = 38 (20.8%), subtype B: n = 145 (79.2)%; P < 0.001]. In TASER-M, both HIV-1 pol protease (PR) and reverse transcriptase (RT) genotypes are recorded and 59 (6.4%) of TASER-M patients were infected with discordant PR and RT genotypes, reflecting possible dual infection and/or recombination. Of discordant genotypes, 28 (47.5%) included subtype B components (assessed as including subtype B, CRF08_BC, CRF08_BC or CRF15_01B) and 23 (39.0%) were CRF01_AE recombinants (assessed including CRF01_AE or CRF15_01B). The remaining discordant genomes [n = 8 (13.6%)] included both B and AE components. Discordant genotypes and subtypes CRF02_AG (n = 1), CRF 07_BC (n = 3), C (n = 5), subtype D (n = 1) were excluded from further evaluation.
Progression to CDC B or CDC C (AIDS-Defining) Illness or Death
A total of 1036 patients (93.8%) infected with CRF01_AE or subtype B were eligible for inclusion in clinical deterioration analyses (Table 2) and contributed 1546.7 person-years of retrospective and prospective follow-up [median: 413 days, interquartile range (IQR): 169–672 days]. During this time, there were a total of 104 events (22 CDC B diagnoses, 63 AIDS diagnoses, and 19 deaths) giving an event rate of 6.7 per 100 person-years (95% confidence interval: 5.5 to 8.1). Clinical deterioration endpoints were recorded between 2003 and 2010 (TASER: n = 76, range: 2007–2010; TAHOD: n = 28, range: 2003–2009). Significant univariate associations were found with age group, baseline CD4 count, and HIV-1 RNA VL. After adjustment for Table 1 covariates, patients older than 40 years had higher risk of clinical deterioration (hazard ratio = 2.17; P = 0.008), whereas patients having baseline CD4 cell counts greater than 200 cells per microliter had lower risk of clinical deterioration (hazard ratio = 0.373; P < 0.003). A total of 450 (43.4%) patients contributing to the clinical deterioration analyses were also included in immunological and virological analyses.
Change in CD4 Cell Count at 12 Months After HAART
For immunologic analyses, 532 patients (48.1% of eligible) had CD4 counts available at baseline and at 12 months, with a median increase of 187.2 cells per microliter over the period (Table 3). To calculate the change in CD4 over the period, baseline CD4 was subtracted from the 12-month result. In unadjusted analyses, smaller increases in CD4 counts were associated with age older than 40 years, whereas larger improvements were associated with being infected with subtype B. Excluding patients with unknown baseline VL, compared with patients with less than 10,000 copies per milliliter, patients with higher VLs evidenced larger increases. These associations were maintained after adjustment for other covariates (age > 40 years, P = 0.002; subtype B; P = 0.024; HIV-1 RNA ≥ 10,000 copies/mL, P = 0.024). There was no interaction between HIV-1 genotype and cohort membership (change in CD4: TASER-M—median: 168 cells/μL, IQR: 100–252 cells/μL; TAHOD—median: 166 cells/μL, IQR: 101–250 cells/μL; interaction; P < 0.402). As shown in Table 3, 459 (86.3%) patients had greater than 10,000 copies per milliliter at study entry. Median CD4 count increases for these patients, in all age categories, were higher for subtype B–infected patients (age < 30 years; subtype B—median: 185 cells/μL, IQR: 138–289; CRF01_AE—median: 178.5 cells/μL, IQR: 120–276; age: 30–40 years; subtype B—median: 251 cells/μL, IQR: 165–299; CRF01_AE—median: 176 cells/μL, IQR: 99–250; age > 40 years; subtype B—median: 157.5 cells/μL, IQR: 101.5-217; CRF01_AE—median: 152.5 cells/μL, IQR: 76–218). Most patients infected with CRF01_AE came from Thailand [Thailand: n = 288 (75.0%), Hong Kong: n = 68 (17.7%), Malaysia: n = 27 (7.0%), Taiwan: n = 1 (0.3%)], whereas the majority of subtype B patients came from high-income economies [Hong Kong: n = 74 (50.0%), Taiwan: n = 32 (21.6%), Japan: n = 13 (8.8%) South Korea: n = 11(7.4%) vs. Thailand: n = 15 (10.1%), Malaysia: n = 3 (2.0%)]. TAHOD patients from Japan and South Korea were only infected with subtype B, but excluding these patients from analyses did not impact upon interpretations.
HIV RNA at 12 Months After HAART
Due to the heterogeneity of virology assays and associated dynamic ranges across sites, we defined the lower limit of detection as 400 copies per milliliter. Analyses included 530 patients (48.0% of eligible) who had an HIV-1 RNA result available at 12 months and 92.6% of patients were virologically suppressed below the lower limit of detection [TASER: n = 383 (94.3%), TAHOD n = 108 (87.1%)]. Multivariate analyses showed no associations between the patient characteristics shown in Table 1 and the virologic outcome.
Subtype B and CRF01_AE have been circulating in Asia for more than 10 years,30 and we report on the first evaluation of treatment responses in these genotypes in ARV-naive patients. Patients initiated therapy from 2003 to 2010, and findings from adjusted analyses demonstrated that patients infected with subtype B had increased immunological response to therapy, compared with CRF01_AE. A retrospective cross-sectional study of mainly treated patients also found lower immunologic response in CRF01_AE patients compared with subtype B.9 However, our finding in treatment-naive patients is uncomplicated by genomic variation attributable to drug selection pressures. A study from Singapore found increased CD4+ T-cell loss in predominantly Chinese males infected with CRF01_AE31 and, as mentioned previously, studies in other cohorts have reported differences in HIV-1 transmission and disease progression. Several in vitro studies have suggested structural reasons for these differences.
Patients older than 40 years had reduced immunologic response at 12 months, whereas baseline HIV-1 RNA greater than 10,000 copies per milliliter at study entry was predictive of larger CD4 counts increases, compared with patients with lower viral burdens. Older patients with low CD4 counts pretherapy had increased risk of clinical deterioration, consistent with the literature.32 Comparisons of virological suppression in other genotypes have yielded mixed results16,33 but no differences were found in virologic suppression post-HAART, and approximately 90% of patients achieved virologic suppression at 12 months post therapy.
Patients being followed under protocol at funded study sites or with HIV-1 genotype recorded in observational data suggest that site clinicians have diagnostic technologies available to guide patient treatment. Consequently, treatment outcomes for our patients may be better than those experienced in general clinic populations. Adherence information was not available, and limited follow-up for TASER-M patients may have contributed to our nonsignificant finding in relation to clinical deterioration. Country differences were not specifically controlled although cohort membership may serve as a surrogate for these effects. Separate PR and RT genotypes are not reported in TAHOD, and 6.4% of discordant genotypes was noted among the TASER-M patients. Therefore, a small proportion of TAHOD patients with discordant genotypes may have been misclassified.
ARVs are commonly designed on subtype B. If immunologic response in the year after HAART affects patient prognosis, our findings of a reduced response for patients infected with CRF01_AE may possibly translate to a higher burden on country health systems, for these patients than for their subtype-B–infected counterparts. Studies of longer duration in representative patient populations, including socioeconomic information and in vitro studies are required to investigate this hypothesis. Patients starting therapy with low CD4 counts have been infected for some time and are commencing therapy later than recommended by international guidelines.34,35 Late therapy initiation for patients from developing economies generally reflects resource issues. However, for patients from high-income Asian economies, this may be due to ignorance of HIV-positive status. Increased testing to alert of HIV infection, before CD4 counts decrease substantially, should be encouraged, particularly in high-risk groups.
Our finding of no differences in virologic response to treatment suggests that with appropriate diagnostic testing, all patients have opportunities to suppress circulating virus to nondetectable levels, thereby potentially increasing disease-free survival. In addition to being a welcome outcome for individual patients, levels of onward transmission are reduced in virologically suppressed individuals.36
The HIV pandemic is of increasing complexity and where genotypes cocirculate, individuals coinfected with multiple variants provide HIV-1 opportunities for recombination, augmenting viral diversity.37 We found discordant PR and RT genotypes in 6.4% of our patients, reflecting possible dual infection and/or recombination. Strategies such as serosorting, where same HIV status partners are sought for unprotected sex, have been reported in MSM, as have higher frequencies of multivariant transmission.38 Serosorting is not supported as a risk-reduction strategy and increases opportunities for recombination,39 further complicating vaccine initiatives that seek to target transmitted virus.
Assays which evaluate patient circulating viral sequence for the presence of drug-resistant mutations also determine the circulating viral genotype. Although phylogenetic investigations cannot determine the direction of HIV evolution, and, consequently the direction of transmission in humans,40 mechanisms to capture genotypes resulting from HIVDR testing at country-level may contribute to monitoring and quantification of HIV-1 diversity and genotypic proliferation in at-risk population networks.41 Genotyping sequencing is expensive, but there have been recent improvements in dried blood spot methodologies, a less expensive alternative for specimen collection.42 Increased availability of low-cost genotyping may contribute to local surveillance efforts.
In summary, our finding of reduced immunological response in CRF01_AE-infected patients, compared with subtype B, suggests that genotypic diversity impacts upon patient response to treatment. Evidence of dual infection and recombination in our patients may suggest a need for regional epidemic surveillance. Tracking of local variants may help to identify increasing incidence of HIV-1 genotypes in at-risk groups and contribute to monitoring HIV-1 diversity and proliferation in the region.
1. Robertson DL, Anderson JP, Bradac JA, et al.. HIV-1 nomenclature proposal. Science. 2000;288:55–56.
2. Korber B, Gaschen B, Yusim K, et al.. Evolutionary and immunological implications of contemporary HIV-1 variation. Br Med Bull. 2001;58:19–42.
3. Kantor R, Katzenstein D. Polymorphism in HIV-1 non-subtype B protease and reverse transcriptase and its potential impact on drug susceptibility and drug resistance evolution. AIDS Rev. 2003;5:25–35.
4. Carr JK, Salminen MO, Koch C, et al.. Full-length sequence and mosaic structure of a human immunodeficiency virus type 1 isolate from Thailand. J Virol. 1996;70:5935–5943.
5. Barre-Sinoussi F, Chermann JC, Rey F, et al.. Isolation of a T-lymphotropic retrovirus from a patient at risk for acquired immune deficiency syndrome (AIDS). Science. 1983;220:868–871.
6. Korber B, Foley BT, Kuiken C, et al.. Numbering Positions in HIV Relative to HXB2CG: Theoretical Biology and Biophysics Group. Los Alamos, NM: Los Alamos National Laboratory; 1998.
7. Robbins GK, De Gruttola V, Shafer RW, et al.. Comparison of sequential three-drug regimens as initial therapy for HIV-1 infection. N Engl J Med. 2003;349:2293–2303.
8. Shafer RW, Smeaton LM, Robbins GK, et al.. Comparison of four-drug regimens and pairs of sequential three-drug regimens as initial therapy for HIV-1 infection. N Engl J Med. 2003;349:2304–2315.
9. Ariyoshi K, Matsuda M, Miura H, et al.. Patterns of point mutations associated with antiretroviral drug treatment failure in CRF01_AE (subtype E) infection differ from subtype B infection. J Acquir Immune Defic Syndr. 2003;33:336–342.
10. Dalgleish AG, Beverley PC, Clapham PR, et al.. The CD4 (T4) antigen is an essential component of the receptor for the AIDS retrovirus. Nature. 1984;312:763–767.
11. Ping LH, Nelson JA, Hoffman IF, et al.. Characterization of V3 sequence heterogeneity in subtype C human immunodeficiency virus type 1 isolates from Malawi: underrepresentation of X4 variants. J Virol. 1999;73:6271–6281.
12. Connor RI, Sheridan KE, Ceradini D, et al.. Change in coreceptor use correlates with disease progression in HIV-1–infected individuals. J Exp Med. 1997;185:621–628.
13. Tscherning C, Alaeus A, Fredriksson R, et al.. Differences in chemokine coreceptor usage between genetic subtypes of HIV-1. Virology. 1998;241:181–188.
14. Kaleebu P, French N, Mahe C, et al.. Effect of human immunodeficiency virus (HIV) type 1 envelope subtypes A and D on disease progression in a large cohort of HIV-1-positive persons in Uganda. J Infect Dis. 2002;185:1244–1250.
15. Kiwanuka N, Laeyendecker O, Quinn TC, et al.. HIV-1 subtypes and differences in heterosexual HIV transmission among HIV-discordant couples in Rakai, Uganda. AIDS. 2009;23:2479–2484.
16. Easterbrook PJ, Smith M, Mullen J, et al.. Impact of HIV-1 viral subtype on disease progression and response to antiretroviral therapy. J Int AIDS Soc. 2010;13:4.
17. Hemelaar J, Gouws E, Ghys PD, et al.. Global trends in molecular epidemiology of HIV-1 during 2000–2007. AIDS. 2011;25:679–689.
18. Kato S, Saito R, Hiraishi Y, et al.. Differential prevalence of HIV type 1 subtype B and CRF01_AE among different sexual transmission groups in Tokyo, Japan, as revealed by subtype-specific PCR. AIDS Res Hum Retroviruses. 2003;19:1057–1063.
19. Choi JY, Kim EJ, Park YK, et al.. National survey for drug-resistant variants in newly diagnosed antiretroviral drug-naive patients with HIV/AIDS in South Korea: 1999–2005. J Acquir Immune Defic Syndr. 2008;49:237–242.
20. Kim JY, Kim EJ, Choi JY, et al.. Genetic variation of the HIV-1 integrase region in newly diagnosed anti-retroviral drug-naive patients with HIV/AIDS in Korea. Clin Microbiol Infect. 2011;17:1155–1159.
21. Chen JH, Wong KH, Chen Z, et al.. Increased genetic diversity of HIV-1 circulating in Hong Kong. PLoS One. 2010;5(8):e12198.
22. Tee KK, Li XJ, Nohtomi K, et al.. Identification of a novel circulating recombinant form (CRF33_01B) disseminating widely among various risk populations in Kuala Lumpur, Malaysia. J Acquir Immune Defic Syndr. 2006;43:523–529.
23. Chen YJ, Huang YH, Chuang SY, et al.. Molecular epidemiology of HIV-1 subtype B, CRF01_AE, and CRF07_BC infection among injection drug users in Taiwan. J Acquir Immune Defic Syndr. 2010;53:425–439.
24. Kao CF, Chang SY, Hsia KT, et al.. Surveillance of HIV type 1 recent infection and molecular epidemiology among different risk behaviors between 2007 and 2009 after the HIV type 1 CRF07_BC outbreak in Taiwan. AIDS Res Hum Retroviruses. 2011;27:745–749.
25. Oyomopito R. Epidemiology and phylogenetic analysis of HIV-1 infection in Asia. In: Monitoring HIV-1 Group M in the Asia-Pacific: PhD Thesis. Sydney, Australia: Faculty of Medicine, The University of New South Wales (UNSW); 2011:170–181. Available at: http://handle.unsw.edu.au/1959.4/51620
26. Hamers RL, Oyomopito R, Kityo C, et al.. Cohort profile: The PharmAccess African (PASER-M) and the TREAT Asia (TASER-M) monitoring studies to evaluate resistance—HIV drug resistance in sub-Saharan Africa and the Asia-Pacific. Int J Epidemiol. 2012;41:43–54.
27. Zhou J, Kumarasamy N, Ditangco R, et al.. The TREAT Asia HIV Observational Database: baseline and retrospective data. J Acquir Immune Defic Syndr. 2005;38:174–179.
28. Sungkanuparph S, Oyomopito R, Sirivichayakul S, et al.. HIV-1 drug resistance mutations among antiretroviral-naïve HIV-1-infected patients in Asia: results from the TREAT Asia Studies to Evaluate Resistance-Monitoring Study (TASER-M). Clin Infect Dis. 2011;52:1053–1057.
29. CDC. Revised surveillance case definitions for HIV infection among adults, adolescents, and children aged <18 months and for HIV infection and AIDS among children aged 18 months to <13 years—United States, 2008. MMWR Recomm Rep. 2008;57:1–16.
30. Tovanabutra S, Watanaveeradej V, Viputtikul K, et al.. A new circulating recombinant form, CRF15_01B, reinforces the linkage between IDU and heterosexual epidemics in Thailand. AIDS Res Hum Retroviruses. 2003;19:561–567.
31. Ng OT, Lin L, Laeyendecker O, et al.. Increased rate of CD4+ T-cell decline and faster time to antiretroviral therapy in HIV-1 subtype CRF01_AE infected seroconverters in Singapore. PLoS One. 2011;6(1):e15738.
32. Egger M, May M, Chene G, et al.. Prognosis of HIV-1-infected patients starting highly active antiretroviral therapy: a collaborative analysis of prospective studies. Lancet. 2002;360:119–129.
33. Geretti AM, Harrison L, Green H, et al.. Effect of HIV-1 subtype on virologic and immunologic response to starting highly active antiretroviral therapy. Clin Infect Dis. 2009;48:1296–1305.
35. EACS. Guidelines for the clinical management and treatment of HIV infected adults in Europe version 5-2: European AIDS Clinical Society. 2010. Available at: http://www.europeanaidsclinicalsociety.org
. Accessed January 12, 2011.
36. Quinn TC, Wawer MJ, Sewankambo N, et al.. Viral load and heterosexual transmission of human immunodeficiency virus type 1. Rakai Project Study Group. N Engl J Med. 2000;342:921–929.
38. Li H, Bar KJ, Wang S, et al.. High multiplicity infection by HIV-1 in men who have sex with men. PLoS Pathog. 2010;6:e1000890.
39. Heymer KJ, Wilson DP. Available evidence does not support serosorting as an HIV risk reduction strategy. AIDS. 2010;24:935–936.
40. Kaye M, Chibo D, Birch C. Comparison of Bayesian and maximum-likelihood phylogenetic approaches in two legal cases involving accusations of transmission of HIV. AIDS Res Hum Retroviruses. 2009;25:741–748.
41. Zhang M, Foley B, Schultz AK, et al.. The role of recombination in the emergence of a complex and dynamic HIV epidemic. Retrovirology. 2010;7:25.
42. Charpentier C, Gody JC, Tisserand P, et al.. Usefulness of a genotypic resistance test using dried blood spot specimens in African HIV-infected children with virological failure according to the 2010-revised WHO criteria. Arch Virol. 2011;159:1603–1606.
TAHOD–TASER STUDY MEMBERS
A. Kamarulzaman (current Steering Committee Chairs), A. Kajindran, and L.Y. Ong, University Malaya Medical Center, Kuala Lumpur, Malaysia; C. K. C. Lee, R. David, and B LH Sim, Hospital Sungai Buloh, Kuala Lumpur, Malaysia; C. V. Mean, V. Saphonn, and K. Vohith, National Center for HIV/AIDS, Dermatology and STDs, Phnom Penh, Cambodia; E. Yunihastuti, Working Group on AIDS Faculty of Medicine, University of Indonesia/Ciptomangunkusumo Hospital, Jakarta, Indonesia; F. J. Zhang, H. X. Zhao, and N. Han, Beijing Ditan Hospital, Capital Medical University, Beijing, China; J. Y. Choi, S. H. Han, and J. M. Kim, Division of Infectious Diseases, Department of Internal Medicine, Yonsei University College of Medicine, Seoul, South Korea; M. Mustafa and N. Nordin, Hospital Raja Perempuan Zainab II, Kota Bharu, Malaysia; N. Kumarasamy, S. Saghayam, and C. Ezhilarasi, Y. R. G. Centre for AIDS Research and Education, Chennai, India; O. T. Ng, A. Chua, L. S. Lee, and A. Loh, Tan Tock Seng Hospital, Singapore; P. C. K. Li (Current Steering Committee Chairs) and M. P. Lee, Queen Elizabeth Hospital and K. H. Wong, Integrated Treatment Centre, Hong Kong, China; P. Kantipong and P. Kambua, Chiang Rai Prachanukroh Hospital, Chiang Rai, Thailand; P. Phanuphak, K. Ruxrungtham, M. Khongphattanayothin, and S. Sirivichayakul, HIV-NAT/Thai Red Cross AIDS Research Centre, Bangkok, Thailand; R. Ditangco, E. Uy, and R. Bantique, Research Institute for Tropical Medicine, Manila, Philippines; R. Kantor, Brown University, Rhode Island; S. Oka, J. Tanuma, and T. Nishijima, National Center for Global Health and Medicine, Tokyo, Japan; S. Pujari, K. Joshi, and A. Makane, Institute of Infectious Diseases, Pune, India; S. Sungkanuparph, S. Kiertiburanakul (co-Chairs), L. Chumla, and N. Sanmeema, Faculty of Medicine, Ramathibodi Hospital, Mahidol University, Bangkok, Thailand; T. P. Merati (co-Chairs), D. N. Wirawan, and F. Yuliana, Faculty of Medicine, Udayana University and Sanglah Hospital, Bali, Indonesia; T Sirisanthana, R Chaiwarith, W Kotarathititum, and J Praparattanapan, Research Institute for Health Sciences, Chiang Mai University, Chiang Mai, Thailand; T. T. Pham, D. D. Cuong, and H. L. Ha, Bach Mai Hospital, Hanoi, Vietnam; V. K. Nguyen, V. H. Bui, and T. T. Cao, National Hospital for Tropical Diseases, Hanoi, Vietnam; W. Ratanasuwan and R. Sriondee, Faculty of Medicine, Siriraj Hospital, Mahidol University, Bangkok, Thailand; Y. M. A. Chen, W. W. Wong, Y. J. Chen, L. H. Kuo, and Y. T. Lin, Taipei Veterans General Hospital and AIDS Prevention and Research Centre, National Yang-Ming University, Taipei, Taiwan; A. H. Sohn, N. Durier, B. Petersen, and T. Singtoroj, TREAT Asia, amfAR—The Foundation for AIDS Research, Bangkok, Thailand; D. A. Cooper, M. G. Law, and A. Jiamsakul, The Kirby Institute, University of New South Wales, Sydney, Australia. Cited Here...
|
Here is a photo of a bird found dead that we can’t identify. Do you know what it may be?
Your photo (not used here) shows a juvenile striated pardalote, a tiny bird of the gumleaves and treetops. It would have been about four or five months old. Perhaps its relative inexperience resulted in some mishap.
Pardalotes of two species (striated and spotted) seem to be more numerous in the Ballarat region during autumn and early winter. Food would be the main reason for their movement.
Because of their small size and treetop habits, pardalotes tend to be missed by most people. Although their calls indicate that they are fairly common. Sometimes there are several in one tree.
They feed on a small insects among the gumleaves.
- Questions and photos are welcome. Send to Roger Thomas at The Courier, PO Box 21, Ballarat, 3353, or email to [email protected]
|
Vine-covered buildings and homes conjure up images of old-world Europe, where taverns and inns have been covered in foliage for centuries. Climbing plants that grow to cover walls anchor themselves through the use of aerial roots--small rootlet protrusions along the runner stems that penetrate and stick to bricks, stone, masonry, and wood. The best climbing plants for walls are perennial plants--evergreens that stay alive all year-round.
Virginia creeper is a climbing vine that grows on walls, reaching heights of up to 60 feet. The plant's botanical name is Parthenocissus quniguefolia. Virginia creeper tolerates shady conditions, so it will even grow well on the usually-avoided north end of a building. In the northern United States, the plant's foliage turns deep red during the fall. The vine is cold-hardy in gardening zones 3 through 9.
Boston ivy grows quickly, though not as tall as Virginia creeper. With the support of a wall to climb up, Boston ivy grows up to 50 feet tall. Boston ivy prefers filtered light, but tolerates partial shade. The Boston ivy climbs up walls with the use of suckers at the tips of their rootlets, which stick to surfaces. The leaves of the Boston ivy are dark green. The plant is cold hardy in gardening zones 4 through 9.
The potato vine is a flowering perennial climbing plant. Its botanical name is solanum jasminoides album. The vine produces small white flowers. Potato vine grows well in filtered sun or shady areas. The vine blooms from spring or summer through late fall or early winter.
The Chinese trumpet is a climbing vining plant that produces flowers in orange to red. The flowers are produced in clusters of 6 to 12 flowers per group. Chinese trumpet, as the name implies, is native to China. In the United States, the plant is cold hardy in gardening zones 5 through 9, although it prefers the warmer climes of zones 7 through 9. Chinese trumpets survive the deep freezes common in the Northeast, and come back to life each spring.
English ivy--also known by its Latin botanical name, Hedera helix--is the most common of all the ivies. This ivy is a fast grower, and climbs up walls with ease. English ivy anchors itself to walls with the use of rootlet suction cups called "hold fasts." Hold fasts adhere themselves to masonry, stone, and brick so tightly that they remain stuck to walls long after ivy is torn down. Gerald Klingaman, retired horticulturalist at the University of Arkansas Division of Agriculture, says that "nothing short of sandblasting" will remove the hold-fasts once they adhere to a wall.
While the English ivy poses no threat to the structural integrity of a brick or stone wall, they should not be permitted to anchor to and grow on wooden walls. The English ivy traps moisture between itself and the wall, which eventually encourages wood rot on wooden walls.
|
Blood transfusion using a fixed ratio of red blood cells, plasma, and platelets is a feasible approach for patients with severe trauma, though at a cost of wasting plasma, a randomized trial found.
A total of 57% of patients assigned to receive fixed-ratio transfusions successfully achieved a ratio of 1:1:1 for the three components, compared with 6% of patients treated according to a standard protocol, which was an absolute difference of 51% (95% CI 32-68), according to Sandro Rizoli, MD, PhD, and colleagues from the University of Toronto.
However, 22% of the total number of plasma units were wasted in the fixed-ratio group compared with only 10% in the control group, the researchers reported online in CMAJ.
The use of fixed-ratio transfusion, rather than basing treatment decisions on repeat lab test results, has grown in popularity for trauma patients, despite a lack of reliable data on feasibility, safety, or efficacy.
"This balanced transfusion strategy aims to correct both the early coagulopathy of trauma and the volume status of patients in hemorrhagic shock, thus targeting preventable hemorrhage-related deaths," they wrote.
An advantage of the fixed-ratio approach is that it avoids delays while awaiting test results, they explained.
However, adoption of this strategy offers challenges in that it requires thawing of frozen type AB blood, which is found in only 4% of donors.
Fixed-ratio transfusions also have been associated with an increased likelihood of lung injury and organ failure.
"The full and widespread implementation of such a protocol will challenge blood suppliers because of the increased demand (and wastage) of plasma," they stated.
With the goal of providing initial feasibility data, Rizoli's team enrolled 69 trauma patients between 2009 and 2011 who were expected to require 10 or more units of red blood cells during the first 24 hours.
Those assigned to receive fixed-ratio transfusions were given red blood cell units as indicated until the frozen plasma was thawed, at which time four units of plasma, a single pool of platelets, and four additional units of red blood cells were administered.
Controls were transfused according to a standard protocol with blood work being done every 2 hours. Red blood cells were given if hemoglobin fell below 7.0 g/dL, plasma transfusion aimed to maintain the international normalized ratio below 1.8, and platelets were transfused if the platelet count was lower than 50 x 109/L.
Patients were determined to have reached the 1:1:1 ratio if they were given 0.8 to 1.3 units of red blood cells and 0.8 units of platelets for each unit of frozen plasma.
Two-thirds of the patients were men, and most were in their 30s. The median time elapsed after the injury until arrival at the hospital was 45 minutes, and median systolic blood pressure was 81 mm Hg.
As with the 1:1:1 ratio, more patients in the fixed-ratio group had a 1:1 ratio of red blood cells to frozen plasma (73% versus 22%), for an absolute difference of 51% (95% CI 31-71), Rizoli and colleagues reported.
"These findings suggest that a fixed-ratio transfusion protocol is feasible," they observed.
The researchers also assessed the safety of the two approaches and found all-cause mortality at 1 month to be 32% in the fixed-ratio group and 14% among controls (relative risk 2.27, 95% CI 0.98-9.63).
Excessive bleeding was the cause of death in 22% of the fixed-ratio group and in 9% of controls, while event-free survival occurred in 54% of the fixed-ratio group and in 78% of controls.
There were no cases of transfusion-related reactions or pulmonary injury in either treatment group.
A higher proportion of patients achieving the fixed-ratio transfusions might have occurred if pre-thawed plasma had been available, the researchers noted. When the study began, thawed plasma could be used only within 24 hours, but this has since been extended to 5 days in Canada.
A limitation of the study was the possibility of "survivorship bias," with some patients dying before the fixed-ratio transfusions could be administered.
In addition, cautious interpretation of the clinical data is needed because of the preliminary nature of the study.
"A larger trial (the Pragmatic, Randomized Optimal Platelet and Plasma Ratios [PROPPR] trial), powered to evaluate the efficacy and safety of ratio-based transfusion strategies has begun ... and may clarify the role of a 1:1:1 transfusion strategy," Rizoli and colleagues concluded.
The study was funded by the Canadian Forces Health Services, Defense Research and Development Canada, and the American Association of Blood Banks.
Rizoli reported relationships with NovoNordisk, CSL, and Behring. One co-author has received a grant from the National Blood Foundation, and a second has ties to a registry funded by NovoNordisk.
- Reviewed by F. Perry Wilson, MD, MSCE Instructor of Medicine, Perelman School of Medicine at the University of Pennsylvania and Dorothy Caputo, MA, BSN, RN, Nurse Planner
|
The Environment Centre NT is partnering with research, consulting, power distribution and renewable energy organisations in Australia and Indonesia to host a workshop to scope connecting the electricity grids in Northern Australia and Southeast Asia to catalyse the generation and distribution of renewable energy across the region.
Grid integration between Northern Australia and Southeast Asia with an ‘Australia-Asia Interconnector’ offers the tantalising opportunity to stimulate regional renewable energy production, substantially cut energy poverty, and avoid the risks and escalating costs from fossil fuels and nuclear power.
An interconnected regional grid tapping into utility-scale renewable energy is a long-term option in this Asian Century for reducing reliance on fossil fuels and associated pollution, buffering rising energy prices and reducing energy security risks.
Technological advances in high voltage direct current (HVDC) cables and falling renewable energy costs make an Australia-Asia Electricity link a real possibility in the next two decades.
Key Questions that were explored at the workshop:
Business case: is there a business case in the medium term, what’s the likely cost of renewable energy produced, and when would it be cost competitive?
Technical and engineering: is it feasible to transmit power across such long distances and across the Java Trench, can HVDC subsea cables maintain electrical supply under all contingencies, where would the link attach to existing grids?
Renewable energy resources: how much renewable energy could be produced from the different sources across the region, what challenges does intermittency create?
Regulatory and political: Do Southeast Asian nations want to import renewable energy from Australia, what are energy security concerns, what are the co-benefits of regional grid integration?
Workshop documents are available below for download.
|
Inquiry’s audience is a worldwide one of academic communities and an educated general public. Inquiry’s authors and editors work hard to make often complex research projects accessible and interesting to this audience. The revision questions under SUBMISSIONS are a first step in finding the right level and style of writing for each article.
Below are basic guidelines to keep in mind while writing and revising. (See MANUSCRIPT FORMAT for the structure and format of a completed article.)
Respect the word limits: In their final forms, the texts of research articles should not exceed 2500 words and commentaries should be kept to 1000.
Respect your readers: Aim to make your subject clear, interesting, and relevant to a wide audience, many of whom will know little about your research discipline but are willing to be informed.
Tell your readers right away exactly what your research subject or question is, why it’s important, and why they should be interested in it.
Establish a context for your research project: Who are you? Why did you do the research? When and where did you do it? Who was your mentor? How—what was your methodology?
Be kind to your readers:
- Use the active voice—even say “I”— to let your interest and enthusiasm be heard.
- Use technical terms sparingly, and always define them.
- Clarify difficult concepts with examples and analogies, or with pictures, charts, and graphs. However, remember that these only illustrate a point which has already been made.
- Minimize the number of acronyms whose meanings readers must remember.
- Be sure all pronouns have antecedents—and this includes such words as “this” and “that.”
Know when to let go: At some point you and your editor will say “It’s not perfect but it’s good enough and the final deadline is here.” A staff editor will go over your text for completeness and a final check on grammar, style, and punctuation correctness before it is formatted for the Web site. You will get a look at what you and your editor have produced on a test site before the issue goes online. You may make any necessary corrections at that time.
Most articles and commentaries require significant revision to make them suitable for Inquiry’s academic and general audiences. Authors work throughout the academic year with staff and student editors along with their faculty research mentors in person and by email. It can be a long process lasting into March, but in the end you will be pleased with yourself and with the results. (See EDITORIAL AND REVISION PROCESS for details.)
|
I know it can be hard to limit your added sugars intake—just last week I tried to drink a cup of coffee without any sugar
thinking I might not notice. I did! But a new study published today in the Journal of the American Medical
, which adds to evidence that eating too many added
sugars may be taking a toll on our heart health,
gives us another good reason to keep trying.
Added sugars are those added to food by consumers or during manufacturing by food producers and include sweeteners like
honey, molasses and agave nectar as well as table sugar and high-fructose corn syrup. (Get a more complete list of added
sugars and its aliases here.)
Last fall, the American Heart Association recommended that women should eat no more than 100 calories per day from added
sugars, or about 6 teaspoons, and men should stick to less than 150 calories, approximately 9teaspoons. (Here are 3 ways to cut
back on your sugar intake.)
For reference, a 12-ounce can of cola contains about 8 teaspoons of added sugars.
out what that soda is actually doing to your body.)
This new study “strengthens and substantiates the American Heart Association’s recommendations for limiting added sugars
intake,” says Rachel Johnson, Ph.D., R.D., M.P.H,EatingWell’s senior nutrition advisor, Professor of Nutrition, University of
Vermont, member of the American Heart Association Nutrition Committee and AHA spokesperson.
In the study of more than 6,000Americans, those who ate more added sugars had lower levels of “good” HDL cholesterol and
higher levels of triglycerides (“bad” fats in the blood)—two risk factors for cardiovascular disease—than people who ate less
added sugars. (Stay healthy with recipes for delicious
sweet treats with surprisingly low added sugars here.)
While it might not come as a surprise that sugars are bad for your heart health, this is the first study to look specifically
at consumption of added sugars and blood lipids. These new findings add to the ever-growing research on added sugars and
their effects on your heart health. Last fall, the American Heart Association (AHA) recommended limiting added sugars based
on the idea that too much sugar is likely contributing to our growing waistlines and therefore raising the risk for heart
|
What is a water trail?
A water trail is any route along a river, lake, or bay that is specifically designed for the use of small boats such as kayaks, canoes, paddleboards, etc. Water trails have developed access and launch points that are accessible to the public. These trails encourage tourism and healthy activities, and assist in showcasing Michigan's incredible water resources, local pride, and economic growth. A water trail, or blueway, is similar to a hiking trail, or greenway.
Water trail Goals
- Protect and enhance watershed values, including water quality
- Provide public education about the historic, ecological, recreational, and economic values of the river and its tributaries
- Develop individual and collective stewardship for watershed values
- Promote recreational use and enhancement of public facilities, information, and safety
- Coordinate all sub-watershed groups for the Grand River
Photo credit Rex Larsen
The Grand River Water trail
The Grand River is the longest river in Michigan, spanning 262 miles long. The Grand River watertrail is split into three sections, the upper, middle, and lower Grand River. Each section has its own committee, or alliance who has taken responsibility in the future development and oversight of these areas. Each one of the three sections is working together to develop a sustainable, enjoyable, and safe water trail for residents and tourists alike. With the help from citizens, access and launch points will be established, potential water way hazards will be reported, and heritage sites will be identified.
The Upper Grand River Watershed Alliance (UGRWA)
Formed in 2003 and centered in Jackson, Michigan, this watershed alliance covers headwater area from northern Hillsdale County to Eaton Rapids. "In 2003, communities and nonprofit agencies, from across the watershed, came together and developed a Watershed Management Plan for the Upper Grand River. One of the recommendations in that Plan was the creation of an umbrella organization to address water quality and land use issues that cross political boundaries. The Upper Grand River Watershed Council was formed initially, under Michigan's Local River Management Act. In 2008, the Watershed Council changed to a Watershed Alliance, under Michigan's Watershed Alliance Act, providing non-profit status. The Alliance is a partnership of many different groups all working to one end: restoring the river to meet water quality standards and to provide quality habitat and recreation".
For more information see the map below and visit http://www.uppergrandriver.org/index.php
The Middle Grand River Organization of Watersheds (MGROW)
MGROW was formed in 2011 as a 501(c)(3) non-profit organization and is associated with the portion of the Grand River from Eaton Rapids to Lyons and includes the Maple, Looking Glass, and Red Cedar river watersheds. Its mission is to "protect and preserve the history and the natural resources of the Middle Grand River watershed by promoting education, conservation, restoration, and wise use of watershed resources".
For a full list of access points, hazards, and heritage sites in the middle Grand River visit http://mgrow.org/hwt/
The Lower Grand River Organization of Watersheds (LGROW)
LGROW, an agency attached to the Grand Valley Metro Council (GVMC), began as a coalition of storm water regulation in the lower Grand River watershed. LGROW later expanded in 2009 to provide basin-wide oversight, implement watershed-wide initiatives and prioritize water quality concerns for the lower Grand River and tributaries. The lower Grand River runs through Kent and Ionia counties with its tributaries extending into Muskegon, Mecosta, Newaygo, Montcalm, Ottawa, Allegan, Barry, and Eaton counties.
For more information and to find your watershed visit lgrow.org
Michigan Department of Natural Resources
For a full list of all Michigan watertrails and events visit Michigan.gov/DNR
|
Description - Handbook of Episodic Memory by Ekrem Dere
Episodic memory is the name of the kind of memory that records personal experiences instead of the mere remembering of impersonal facts and rules. This type of memory is extremely sensitive to ageing and disease so an understanding of the mechanisms of episodic memory might lead to the development of therapies suited to improve memory in some patient populations. Episodic memory is unique in that it includes an aspect of self-awareness and helps us to remember who we are in terms of what we did and what we have been passed through and what we should do in the future. This book brings together a renowned team of contributors from the fields of cognitive psychology, neuropsychology and behavioural and molecular neuroscience. It provides a detailed and comprehensive overview of recent developments in understanding human episodic memory and animal episodic-like memory in terms of concepts, methods, mechanisms, neurobiology and pathology. The work presented within this book will have a profound effect on the direction that future research in this topic will take.
Buy Handbook of Episodic Memory by Ekrem Dere from Australia's Online Independent Bookstore, Boomerang Books.
(262mm x 192mm x 33mm)
Elsevier Science Ltd
Publisher: Elsevier Science & Technology
Country of Publication:
Book Reviews - Handbook of Episodic Memory by Ekrem Dere
Author Biography - Ekrem Dere
Ekrem Dere is full professor for the Pathophysiology of Cerebral Aging at the Pierre et Marie Curie University in Paris, France. His former team at the University in Dusseldorf, Germany, has provided the first behavioral evidence demonstrating that gap junctions in the brain play an important role in various behavioral processes.
|
On Sept. 7, 1533, Queen Elizabeth I of England was born.
In 1822 Brazil declared its independence from Portugal.
In 1825 the Marquis de Lafayette, French hero of the American Revolution, said his last farewell to President John Quincy Adams at the White House while on his tour of the United States.
In 1892 James J. Corbett knocked out John L. Sullivan in the 21st round to win the world heavyweight crown in New Orleans. The fight was the first major bout under the Marquis of Queensberry rules.
In 1901 the Boxer Rebellion in China ended with the Peace of Peking.
In 1936 Boulder Dam, now known as Hoover Dam, went into operation. On the same day, rock star Buddy Holly was born Charles Hardin Holley in Lubbock, Tex.
In 1940 German aircraft began their World War II blitz of London.
In 1945 President Harry Truman received the surrender papers signed by the Japanese ending World War II.
In 1971 an unsuccessful attempt was made to assassinate the U.S. ambassador to Cambodia in Phnom Penh.
In 1975 Czechoslovak tennis star Martina Navratilova, in New York for the U.S. Open tournament, requested political asylum.
In 1977 the Panama Canal treaties, granting eventual control of the canal to Panama, were signed by President Jimmy Carter and Gen. Omar Torrijos Herrera.
In 1979 President Jimmy Carter announced a $33 billion plan for deploying 200 MX missiles.
In 1980 Chinese Premier Hua Guofeng formally told a party Congress he was resigning his government post in favor of economist Zhao Ziyang.
In 1986 Rev. Desmond Tutu was installed as the first black to head the Anglican Church in South Africa.
|
Keeping teeth healthy can be hard when many of the foods you like to eat can be harmful. Different attributes of food can treat teeth differently either promoting and preserving healthy enamel, or breaking down enamel and building plaque. Foods that include large amounts acidity, sugars, and starches are usually promoters of enamel erosion leading to many different factors such as tooth decay, cavities, and gum disease. Here are 7 different food types to stay away from or at least limit consumption to for good oral health.
- Sticky Foods – Candy is widely known for not being beneficial toward oral health. Almost all candy (at least the good kind) has copious amounts of sugar. Depending on the candy type, most candies will get stuck in the crevasses and pockets of teeth leaving the sugars to sit and accumulate bacteria to begin building plaque. Candies that have a sour flavor do double damage because they have higher acidic properties to create that sour flavor.
The sugary and sticky consistency isn’t limited to just candy. Many dried fruits are also sugar coated and have a gummy texture that will find its way to the cracks and crevasses of the teeth.
- Starches – Foods that have a starchy make up such as bread, crackers, and chips. When saliva breaks down the sugars in the starch, the consistency changes to an almost gooey substance that easily gets stuck in between teeth. This allows the sugars to sit and decay the tooth if not cleaned right away.
- Fruit – Fruits are great for the body’s health, but when it comes to oral health many fruits have a high acidity that can speed up tooth decay. Fruits like apples, oranges, lemons, and tomatoes have higher acidity levels.
- Ice – Technically one wouldn’t consider ice a food but, when ice is chewed it is not good for teeth. Chewing ice can cause tooth chipping and tooth cracking that can lead to bigger oral problems and a much higher risk of rapid tooth decay if not treated in a timely manner.
- Wine – A glass of red wine at dinner has many health benefits, but can also take a toll on your teeth. Red wine can be very acidic and when consumed regularly can stain your teeth.
- Coffee – Coffee is a morning must for many people. Whether your drink is from home, Starbucks, or anywhere else, most of the time sugar is added to the coffee. Coffee, like wine, has health benefits but when consumed regularly can stain teeth, as well as speed up tooth decay when sugar is added.
- Soda – Last but not least, Soda. Soda has a huge amount of sugars that stick to your teeth. Not only does soda have more acid to attack the enamel, but darker sodas can have the same effect that wine and coffee do to stain your teeth.
When looking at this list you might be thinking, then what can I eat? All of these foods can still be enjoyed in reasonable amount without hurting your teeth if other actions take place.
For example, when eating a food with high acidity whether it be wine or fruit, eat something with it that has a higher PH. Any dairy food like a glass of milk or a slice of cheese can counter balance the acidity so it is not sitting on your teeth for long.
While eating starchy foods, drink water to break up the food that has collected in the crevasses to prevent it from accumulating and attacking the enamel.
With anything having to do with sugary foods, there’s usually always a sugar free option when it comes to candy and other snacks. Not only will sugar free be better for your body’s health but your mouth will thank you as well.
Brushing your teeth after eating can also help keep teeth healthy. See your dentist regularly for cleaning and checkups to be sure you teeth are sparkling and strong.
|
The first origami robots arrive
Researchers at Harvard University and MIT have developed a technique inspired by origami folding which is able to move from a platform in an articulated structure and move independently robot. A compound of the copper layers, paper and shape memory polymer, this robot can be manufactured inexpensively with a laser cutter.
Within four minutes, the robot consisting of a composite material sensitive to heat unfolds to take another form and moves independently. © MIT-Harvard University
Transformers, these robots capable of changing well-known to children and fans of sci-fi form, now have everything there was more real competitor. http://enjoycoloring.com/activity/ A team including researchers at the Wyss Institute at Harvard University and the Massachusetts Institute of Technology has unveiled a prototype robot that changes shape to move from a flat structure to a quadruped able to move, all without any external intervention.
The transformation takes four minutes and then the robot can move at a speed of about two inches per second. The scientific paper published in the journal Science explains that the design principle of this self assembly robot based on the Japanese art of origami folding. A traditional method has already been used to manufacture a lithium ion battery foldable and deformable. The robot is designed from a composite heat-sensitive surface of which is carved with cuts and grooves to create hinges. The resistors will be heated so that the deformable regions bend and cool and form the three-dimensional structure. Small engine then allow the robot to move.
|
EKOPOWER has a
lot experience in the field of measuring and monitoring, since 1983 in over
90 countries, especially wind monitoring
systems for wind energy applications and meteorological stations.
Application notes & literature concerning wind energy &
1. Accuracy of wind speed data: a key-factor in the economic analysis of wind energy projects
2. The truth about wind speed wind power measurements. pdf file:appnote2
3. Technical notes about accuracy of wind monitoring systems for wind energy applications.
4. Calculation utilities for wind energy analysis
5. Meteorology:what means......?
6. What is a datalogger?
7. Book "Introduction to Wind Energy" by ir Erik H. Lysen
Very good information about wind energy basics and windmeasurements/analysis
(link available on request)
8. Book "Windklimaat van Nederland" by prof J Wieringa (Dutch)
A standard work about the behaviour of wind (link available on request)
Contact us: we would like to offer you our solution!
|
MND Association-funded researcher Dr Sharon Abrahams (University of Edinburgh) has recently published an article on the Edinburgh Cognitive ALS Screen (ECAS) in the prestigious journal Amyotrophic Lateral Sclerosis and Frontotemporal Degeneration.
It is now recognised that, in up to 50% of people living with MND not only the motor system (walking, talking breathing etc) but also other areas of the brain, particularly those involved in thinking, language and behaviour are affected.
Cognitive and behavioural changes are increasingly common in MND. It is also well known that a small proportion of people living with MND display features of frontotemporal dementia.
For more information on cognitive change see our care information sheet.
Frontotemporal dementia (previously known as Pick’s disease) is caused by progressive degeneration in the brain’s frontal and temporal lobes (the areas of the brain involved in personality, language, higher order thinking such as decision making and behaviour). Frontotemporal dementia has an earlier age of onset compared to other forms of dementia (such as Alzheimer’s) and is usually diagnosed in the 50s and early 60s.
Back in 2011, an international collaboration, including three MND Association-funded researchers showed a link between MND and frontotemporal dementia. This link was due to the newly discovered C9orf72 gene found to be present in both sets of individuals with a family history (known as inherited MND and inherited frontotemporal dementia). Inherited MND is a rare form of MND (5-10% of total MND cases), that is characterised by a family history of the disease.
More information on inherited MND can be found via our website.
Edinburgh Cognitive and Behavioural ALS Screen (ECAS)
ECAS is a brief 15-20 minute assessment of a range of cognitive and behavioural changes, which is designed specifically for people living with MND. This screen, unlike existing measures of cognitive change, can be used in the clinic or in the home by a specialist nurse. ECAS can tell whether someone living with MND has experienced changes in their thinking, language or behaviour. The screen not only looks at changes that may occur in MND, but also assesses changes in memory, which might be found in other neurological diseases such as Alzheimer’s.An example of a question from the screen to assess executive function is: How many words can you think of beginning with a specific letter?
Dr Abrahams research published in June on 40 ‘healthy’ controls and 48 people living with MND found that the screen was successful in detecting cognitive impairment in MND. More specifically it was able to identify specific areas of change, including language impairment as well as changes in the ability to make decisions. From these results ECAS has shown to be a quick and effective in-clinic assessment for measuring cognitive and behaviour changes in MND.
On completion of this research Dr Abrahams believes that clinicians will be able to have confidence in a rapid and easy-to-use method for detecting cognitive change, allowing for appropriate adjustments to be made in the care and support for people living with MND.
Dr Abrahams has also established collaborations with European researchers in the Netherlands, Ireland, Italy, Switzerland and Germany to use ECAS more widely, with local translations into other languages.
Commenting on her research, Dr Abrahams explained what it all means: “Although cognitive and behaviour changes are increasingly recognized within MND, the cognitive status of the majority of people attending clinics is unknown. The ECAS is a brief within clinic assessment we have developed with funding from the MND Association.
“It is designed for a specialist nurse to provide information on whether a person has experienced changes in cognition or behaviour in addition to the motor symptoms. This short interview will determine who has these changes, how severe they are and what type of changes the person is experiencing.
“Using this information we can then help with providing appropriate care and support to those individuals. We are delighted that it has begun to be adopted widely by centres in the UK and in Europe, and are very much thankful for the MND Association for supporting this work.”
|
Image-based methods can be considered as the passive version of SL. In principle, image-based methods involve stereo calibration, feature extraction, feature correspondence analysis and depth computation based on corresponding points. It is a simple and low cost (in terms of equipment) approach, but it involves the challenging task of correctly identifying common points between images. Photogrammetry is the primary image-based method that is used to determine the 2D and 3D geometric properties of the objects that are visible in an image set.
The determination of the attitude, the position and the intrinsic geometric characteristics of the camera is known as the fundamental photogrammetric problem. It can be described as the determination of camera interior and exterior orientation parameters, as well as the determination of the 3D coordinates of points on the images. Photogrammetry can be divided into two categories. These are the aerial and the terrestrial photogrammetry.
In aerial photogrammetry, images are acquired via overhead shots from an aircraft or an UAV, whilst in terrestrial photogrammetry images are captured from locations near or on the surface of the earth. Additionally, when the object size and the distance between the camera and object are less than 100m then terrestrial photogrammetry is also defined as close range photogrammetry. The accuracy of photogrammetric measurements is largely a function of the camera’s optics quality and sensor resolution. Current commercial and open photogrammetric software solutions are able to quickly perform tasks such as camera calibration, epipolar geometry computations and textured map 3D mesh generation. Common digital images can be used and under suitable conditions high accuracy measurements can be obtained. The method can be considered objective and reliable. Using modern software solutions it can be relatively simple to apply and has a low cost. When combined with accurate measurements derived from a total station for example it can produce models of high accuracy for scales of 1:100 and even higher.
Semi Automated Image Based Methods
In recent times, the increase in the computation power has allowed the introduction of semi automated image-based methods. Such an example is the combination of Structure-From-Motion (SFM) and Dense Multi-View 3D Reconstruction (DMVR) methods. They can be considered as the current extension of image-based methods. Over the last few years a number of software solutions implementing the SFM-DMVR algorithms from unordered image collections have been made available to the broad public. More specifically SFM is considered an extension of stereo vision, where instead of image pairs the method attempts to reconstruct depth from a number of unordered images that depict a static scene or an object from arbitrary viewpoints.
Apart from the feature extraction phase, the trajectories of corresponding features over the image collection are also computed. The method mainly uses the corresponding features, which are shared between different images that depict overlapping areas, to calculate the intrinsic and extrinsic parameters of the camera. These parameters are related to the focal length, the image format, the principal point, the lens distortion coefficients, the location of the projection centre and the image orientation in 3D space. Many systems involve the bundle adjustment method in order to improve the accuracy of calculating the camera trajectory within the image collection, minimise the projection error and prevent the error-built up of the camera position tracking.
|
New York State Capitol gets behind 2017 women’s suffrage centennial: Suffrage Wagon Cafe
NYS Gov. Andrew M. Cuomo and Lt. Gov. Kathy Hochul launched the 100th anniversary of women voting in the state by announcing the Women’s Suffrage Commission’s website: www.ny.gov/suffrage. It provides information about upcoming events across the state, profiles New York suffragists, and draws attention to historic destinations relevant to the suffrage movement and women’s rights.
“This month, we celebrate the critical role that New York played in the fight for a woman’s right to vote from the Seneca Falls Convention all the way to the passage of the Women’s Equality Agenda in 2015 because in New York we know that women’s rights are human rights,” Governor Cuomo said. “I encourage all New Yorkers and visitors alike to visit one of these exhibits and trace the historic timeline that New York’s women pioneered and to learn about the obstacles that they conquered in the fight for equality.”
New York was home to the first-ever Women’s Rights Convention, held in Seneca Falls, on July 19 and 20, 1848 and organized by Lucretia Mott and Elizabeth Cady Stanton. Sixty-nine years later, on Nov. 6, 1917, women in New York State won the right to vote.
THE LEGACY OF SENECA FALLS, NEW YORK
“New York women have an enduring legacy in the pursuit of equal rights that began nearly 170 years ago in Seneca Falls, and as a result of their advocacy this state passed women’s suffrage three years before the rest of the nation. This year we celebrate the accomplishments of the women who led the fight for equality, setting the stage for future battles against workplace discrimination, in support of pay equity, and to preserve a woman’s right to make decisions about her health care,” said NYS Women’s Suffrage Commission Chair, Lieutenant Governor Kathy Hochul. “As the state’s highest ranking elected woman, I consider it my mission to inspire the next generation of women to rise up and shape a more just, equitable society.”
The 14-member NYS Women’s Suffrage Commission chaired by Kathy Hochul, will plan and execute a series of statewide programs starting in 2017 and lasting through 2020.
As part of New York’s recognition of Women’s History Month, a number of exhibits will be available for public viewing in both the Empire State Plaza and the New York State Capitol Building. The exhibit “Women’s Suffrage in New York State,” located in the Capitol corridor which connects the state house to the Empire State Plaza, includes imagery of pro- and anti-suffrage propaganda with historic photographs of the women who organized and marched until the vote was won.
“SPIRIT OF 1776” SUFFRAGE WAGON ON VIEW ON SECOND FLOOR OF STATE CAPITOL
The exhibit, “New York State Women’s Suffrage 1917 – 2017 | The Fight for the Vote and the March for Full Equality,” is located in the East Gallery on the second floor of the Capitol and traces the almost 70-year struggle for the vote. The exhibit highlights the lives of 12 influential Suffragists and the critical role they played in securing the vote by African Americans and working women. This month-long exhibit features the “Spirit of 1776” wooden suffrage wagon in which a Long Island suffragist edna Kearns and her eight-year-old daughter traveled throughout Long Island and Manhattan during the summer of 1913 to gather support for votes for women, a 1917 banner carried by suffragists, as well as Elizabeth Cady Stanton’s 1854 address to the New York State Legislature.
One of the highlights of the New York State Capitol is the Great Western Staircase featuring a gallery of historic Americans brought to life in elaborate stone carvings. As the staircase was nearing completion, it was observed that not one famous woman was represented. Located in the area just outside the Empire State Plaza Visitor Center and Gift Shop this exhibit will feature photographs of the six carvings of women that were added to the staircase: Harriet Beecher Stowe, Clara Barton, Frances E. Willard, Molly Pitcher, Elmina Spencer, and Susan B. Anthony. Also on view outside the Visitor Center is the mural Harriet Tubman and the Underground Railroad created by students from the Monroe Community College Art Department in Rochester, NY.
STATE CAPITOL TOURS FEATURING SUFFRAGE MOVEMENT ARE A HIGHLIGHT
Throughout March, special one-hour Capitol tours focusing on the suffrage movement are available to visitors. The tours feature artifacts selected to showcase the suffragists’ journey. For more information about the Capitol tours, visit www.empirestateplaza.org.
Stop by Suffrage Wagon Cafe for special programs.
Celebrate women’s freedom to vote at Suffrage Wagon News Channel.
News & events at SuffrageCentennials.com
Suffrage Wagon News Channel has been publishing since 2009.
|
Would you like to make this site your homepage? It's fast and easy...
Yes, Please make this my home page!
first Froebel grave stone
created in 1852 by Ernst Luther to the design of Wilhelm Middendorff
The sphere, cylinder and cube of Froebel's second gift are the basis for this design by Wilhelm Middendorf. Created in 1852 by Ernst Luther a descendant of the family Martin Luther. In 1817, the three hundredth anniversary of the Reformation, Froebel became concerned that two of the descendants of Martin Luther were living in poverty. He undertook the education of Ernst and his brother at Keilhau
Some years later a new gravestone was donated, which incorporated Middendorf's design.
The sphere and the cube together represented Knowledge, Beauty and Life. The sphere predominantly corresponds with the feelings or heart, (affective) and the cube to thought and intellect (cognitive). This design also appears on the cover of the book Inventing Kindergarten
recollections of death of Froebel
. grave stone
Copyright © 1998-2002 Froebel Web All Rights Reserved. [email protected]
|
LONDON (The Borowitz Report) - The Church of England, an institution whose origins date back to the sixth century A.D., has far more modern views about the rights of women than Supreme Court Justice Antonin Scalia, experts said today.
“In recognizing that women are the equals of men, the Church of England has embraced a position that is centuries ahead of Scalia’s,” Davis Logsdon, a professor of religion at the University of Minnesota, said. “This is a remarkable achievement, given that Scalia was born in 1936 and the Church began in the late five hundreds.”
But Dr. Carol Foyler, a history professor at the University of Sussex, took issue with that assessment. “I date the beginning of the Church of England to 1534, when it was officially established under Henry VIII,” she said. “But regardless of whether the Church is fourteen centuries old or five centuries old, it’s unquestionably more modern than Scalia.”
As for Justice Scalia, he seemed to dismiss the controversy, issuing a terse official statement Monday afternoon. “I do not keep up with the goings on of every newfangled institution,” he said.
Illustration: Museum of London/Heritage Images/Getty.
|
The basic ‘syntax’ of MathML is defined using XML syntax, but other syntaxes that can encode labeled trees are possible. Notably the HTML parser may also be used with MathML. Upon this, we layer a ‘grammar’, being the rules for allowed elements, the order in which they can appear, and how they may be contained within each other, as well as additional syntactic rules for the values of attributes. These rules are defined by this specification, and formalized by a RelaxNG schema [RELAX-NG]. The RelaxNG Schema is normative, but a DTD (Document Type Definition) and an XML Schema [XMLSchemas] are provided for continuity (they were normative for MathML2). See Appendix A Parsing MathML.
MathML's character set consists of legal characters as specified by Unicode [Unicode], further restricted by the characters not allowed in XML. The use of Unicode characters for mathematics is discussed in Chapter 7 Characters, Entities and Fonts.
The following sections discuss the general aspects of the MathML grammar as well as describe the syntaxes used for attribute values.
An XML namespace [Namespaces] is a collection of names identified by a URI. The URI for the MathML namespace is:
To declare a namespace when using the XML serialisation of MathML,
one uses an
attribute, or an attribute with an
xmlns attribute is used alone, it sets
the default namespace for the element on which it
appears, and for any child elements. For example:
<math xmlns="http://www.w3.org/1998/Math/MathML"> <mrow>...</mrow> </math>
xmlns attribute is used as a
prefix, it declares a prefix which can then be used to explicitly associate other elements
and attributes with a particular namespace.
When embedding MathML within XHTML, one might use:
<body xmlns:m="http://www.w3.org/1998/Math/MathML"> ... <m:math><m:mrow>...</m:mrow></m:math> ... </body>
HTML does not support namespace extensibility in the same way, the HTML parser
has in-built knowledge of the HTML, SVG and MathML namespaces.
xmlns attributes are
just treated as normal attributes. Thus when using the HTML serialisation of MathML,
prefixed element names must not be used.
may be used on the
math element, it will be ignored by the HTML parser,
which always places
math elements and its descendents in the MathML namespace
(other than special rules described in Appendix A Parsing MathMLfor invalid input, and for
If a MathML expression is likely to be in contexts where it may be parsed by an XML parser or an HTML parser, it SHOULD
use the following form to ensure maximum compatibility:
<math xmlns="http://www.w3.org/1998/Math/MathML"> ... </math>
Most MathML elements act as ‘containers’; such an element's
children are not distinguished from each other except as individual members of the
list of children. Commonly there is no limit imposed on the number of children
an element may have. This is the case for most presentation
elements and some content elements such as
MathML elements require a specific number of children, or
attach a particular meaning to children in certain positions.
Such elements are best considered to represent constructors of mathematical
objects, and hence thought of as functions of their children. Therefore
children of such a MathML element
will often be referred to as its arguments instead of merely as children.
Examples of this can be found, say, in Section 3.1.3 Required Arguments.
There are presentation elements that conceptually accept only
a single argument, but which for convenience have been written to accept any number of children;
then we infer an
mrow containing those children which acts as
the argument to the element in question; see Section 220.127.116.11 Inferred
In the detailed discussions of element syntax given with each element throughout the MathML specification, the correspondence of children with arguments, the number of arguments required and their order, as well as other constraints on the content, are specified. This information is also tabulated for the presentation elements in Section 3.1.3 Required Arguments.
MathML presentation elements only recommend (i.e., do not require) specific ways of rendering; this is in order to allow for medium-dependent rendering and for individual preferences of style.
Nevertheless, some parts of this specification describe these recommended visual rendering rules in detail; in those descriptions it is often assumed that the model of rendering used supports the concepts of a well-defined 'current rendering environment' which, in particular, specifies a 'current font', a 'current display' (for pixel size) and a 'current baseline'. The 'current font' provides certain metric properties and an encoding of glyphs.
MathML elements take attributes with values that further specialize
the meaning or effect of the element. Attribute names are shown in a
monospaced font throughout this document. The meanings of attributes and their
allowed values are described within the specification of each element.
The syntax notation explained in this section is used in specifying allowed values.
Except when explicitly forbidden by the specification for an attribute, MathML attribute values may contain any legal characters specified by the XML recommendation. See Chapter 7 Characters, Entities and Fonts for further clarification.
To describe the MathML-specific syntax of attribute values, the following conventions and notations are used for most attributes in the present document. We use below the notation beginning with U+ that is recommended by Unicode for referring to Unicode characters [see [Unicode], page xxviii].
|Notation||What it matches|
|decimal-digit||a decimal digit from the range U+0030 to U+0039|
|hexadecimal-digit||a hexadecimal (base 16) digit from the ranges U+0030 to U+0039, U+0041 to U+0046 and U+0061 to U+0066|
|unsigned-integer||a string of decimal-digits, representing a non-negative integer|
|positive-integer||a string of decimal-digits, but not consisting solely of "0"s (U+0030), representing a positive integer|
|integer||an optional "-" (U+002D), followed by a string of decimal digits, and representing an integer|
|unsigned-number||a string of decimal digits with up to one decimal point (U+002E), representing a non-negative terminating decimal number (a type of rational number)|
|number||an optional prefix of "-" (U+002D), followed by an unsigned number, representing a terminating decimal number (a type of rational number)|
|character||a single non-whitespace character|
|string||an arbitrary, nonempty and finite, string of characters|
|length||a length, as explained below, Section 18.104.22.168 Length Valued Attributes|
|unit||a unit, typically used as part of a length, as explained below, Section 22.214.171.124 Length Valued Attributes|
|namedlength||a named length, as explained below, Section 126.96.36.199 Length Valued Attributes|
|color||a color, as explained below, Section 188.8.131.52 Color Valued Attributes|
|id||an identifier, unique within the document; must satisfy the NAME syntax of the XML recommendation [XML]|
|idref||an identifier referring to another element within the document; must satisfy the NAME syntax of the XML recommendation [XML]|
|URI||a Uniform Resource Identifier [RFC3986]. Note that the attribute value is typed in the schema as anyURI which allows any sequence of XML characters. Systems needing to use this string as a URI must encode the bytes of the UTF-8 encoding of any characters not allowed in URI using %HH encoding where HH are the byte value in hexadecimal. This ensures that such an attribute value may be interpreted as an IRI, or more generally a LEIRI, see [IRI].|
|italicized word||values as explained in the text for each attribute; see Section 184.108.40.206 Default values of attributes|
|"literal"||quoted symbol, literally present in the attribute value (e.g. "+" or '+')|
The ‘types’ described above, except for string, may be combined into composite patterns using the following operators. The whole attribute value must be delimited by single (') or double (") quotation marks in the marked up document. Note that double quotation marks are often used in this specification to mark up literal expressions; an example is the "-" in line 5 of the table above.
In the table below a form f means an instance of a type described in the table above. The combining operators are shown in order of precedence from highest to lowest:
|Notation||What it matches|
|( f )||same as f|
||an optional instance of f|
||zero or more instances of f, with separating whitespace characters|
|f +||one or more instances of f, with separating whitespace characters|
|f1 f2 ... fn||one instance of each form fi, in sequence, with no separating whitespace|
|f1, f2, ..., fn||one instance of each form fi, in sequence, with separating whitespace characters (but no commas)|
|f1 | f2 | ... | fn||any one of the specified forms fi|
The notation we have chosen here is in the style of the syntactical notation of the RelaxNG used for MathML's basic schema, Appendix A Parsing MathML.
Since some applications are inconsistent about normalization of whitespace, for maximum interoperability it is advisable to use only a single whitespace character for separating parts of a value. Moreover, leading and trailing whitespace in attribute values should be avoided.
For most numerical attributes, only those in a subset of the expressible values are sensible; values outside this subset are not errors, unless otherwise specified, but rather are rounded up or down (at the discretion of the renderer) to the closest value within the allowed subset. The set of allowed values may depend on the renderer, and is not specified by MathML.
If a numerical value within an attribute value syntax description
is declared to allow a minus sign ('-'), e.g.,
integer, it is not a syntax error when one is provided in
cases where a negative value is not sensible. Instead, the value
should be handled by the processing application as described in the
preceding paragraph. An explicit plus sign ('+') is not allowed as
part of a numerical value except when it is specifically listed in the
syntax (as a quoted '+' or "+"), and its presence can change the
meaning of the attribute value (as documented with each attribute
which permits it).
Most presentation elements have attributes that accept values representing lengths to be used for size, spacing or similar properties. The syntax of a length is specified as
|length||number | number unit | namedspace|
There should be no space between the number and the unit of a length.
The possible units and namedspaces, along with their interpretations, are
shown below. Note that although the units and their meanings are taken from
CSS, the syntax of lengths is not identical. A few MathML elements
have length attributes that accept additional keywords; these are termed pseudo-units
in the description of those particular elements; see, for instance, Section 3.3.6 Adjust Space Around Content
A trailing "%" represents a percent of a reference value; unless otherwise stated, the reference value is the default value. The default value, or how it is obtained, is listed in the table of attributes for each element along with the reference value when it differs from the default. (See also Section 220.127.116.11 Default values of attributes.) A number without a unit is intepreted as a multiple of the reference value. This form is primarily for backward compatibility and should be avoided, prefering explicit units for clarity.
In some cases, the range of acceptable values for a particular attribute may be restricted; implementations are free to round up or down to the closest allowable value.
The possible units in MathML are:
||an em (font-relative unit traditionally used for horizontal lengths)|
||an ex (font-relative unit traditionally used for vertical lengths)|
||pixels, or size of a pixel in the current display|
||inches (1 inch = 2.54 centimeters)|
||points (1 point = 1/72 inch)|
||picas (1 pica = 12 points)|
||percentage of the default value|
Some additional aspects of units are discussed further below, in Section 18.104.22.168.1 Additional notes about units.
The following constants, namedspaces, may also be used where a length is needed; they are typically used for spacing or padding between tokens. Recommended default values for these constants are shown; the actual spacing used is implementation specific.
Lengths are only used in MathML for presentation, and presentation
will ultimately involve rendering in or on some medium. For visual media,
the display context is assumed to have certain properties available to
the rendering agent. A
px corresponds to a pixel on the display, to
the extent that is meaningful. The resolution of the display device
will affect the correspondence of pixels to the units
Moreover, the display context will also provide a default for the font size;
the parameters of this font determine the initial values used to interpret
ex, and thus indirectly the sizes
of namedspaces. Since these units track the display context, and in particular,
the user's preferences for display, the relative units
are generally to be preferred over absolute units such as
Two additional aspects of relative units must be clarified, however.
First, some elements such as Section 3.4 Script and Limit Schemata or
implicitly switch to smaller font sizes for some of their arguments.
mstyle can be used to explicitly change
the current font size. In such cases, the effective values of
ex inside those contexts will be
different than outside. The second point is that the effective value
ex used for an attribute value
can be affected by changes to the current font size.
Thus, attributes that affect the current font size,
scriptlevel, must be processed before
evaluating other length valued attributes.
If, and how, lengths might affect non-visual media is implementation specific.
The color, or background color, of presentation elements may be specified as a color using the following syntax:
|color||#RGB | #RRGGBB | html-color-name|
A color is specified either by "#" followed
by hexadecimal values for the red, green, and blue components,
with no intervening whitespace, or by an html-color-name.
The color components can be either 1-digit or 2-digit, but
must all have the same number of digits; the component
ranges from 0 (component not present) to
FF (component fully present).
Note that, for example, by the digit-doubling rule specified under Colors in
#123 is a short form for
Color values can also be specified as an html-color-name, one of the color-name keywords defined in [HTML4] ("aqua", "black", "blue", "fuchsia", "gray", "green", "lime", "maroon", "navy", "olive", "purple", "red", "silver", "teal", "white", and "yellow"). Note that the color name keywords are not case-sensitive, unlike most keywords in MathML attribute values, for compatibility with CSS and HTML.
When a color is applied to an element,
it is the color in which the content of tokens is rendered.
Additionally, when inherited from a surrounding element or from the environment in which the complete MathML expression is
embedded, it controls the color of
all other drawing due to MathML elements, including the lines
or radical signs that can be drawn in rendering
When used to specify a background color, the keyword "transparent"
is also allowed.
The recommended MathML visual rendering rules do not define the
precise extent of the region whose background is affected by using the
background attribute on an element,
except that, when the element's content does not have
negative dimensions and its drawing region is not overlapped by other
drawing due to surrounding negative spacing, this region should lie
behind all the drawing done to render the content of the
element, but should not lie behind any of the
drawing done to render surrounding expressions. The effect of overlap
of drawing regions caused by negative spacing on the extent of the
region affected by the
background attribute is not
defined by these rules.
Default values for MathML attributes are, in general, given along with the detailed descriptions of specific elements in the text. Default values shown in plain text in the tables of attributes for an element are literal, but when italicized are descriptions of how default values can be computed.
Default values described as inherited are taken from the
rendering environment, as described in Section 3.3.4 Style Change
or in some cases (which are described individually) taken from the values of other
attributes of surrounding elements, or from certain parts of those
values. The value used will always be one which could have been specified
explicitly, had it been known; it will never depend on the content or
attributes of the same element, only on its environment. (What it means
when used may, however, depend on those attributes or the content.)
Default values described as automatic should be computed by a MathML renderer in a way which will produce a high-quality rendering; how to do this is not usually specified by the MathML specification. The value computed will always be one which could have been specified explicitly, had it been known, but it will usually depend on the element content and possibly on the context in which the element is rendered.
Other italicized descriptions of default values which appear in the tables of attributes are explained individually for each attribute.
The single or double quotes which are required around attribute values in an XML start tag are not shown in the tables of attribute value syntax for each element, but are around attribute values in examples in the text, so that the pieces of code shown are correct.
Note that, in general, there is no mechanism in MathML to simulate the
effect of not specifying attributes which are inherited or
automatic. Giving the words "inherited" or
"automatic" explicitly will not work, and is not generally
allowed. Furthermore, the
mstyle element (Section 3.3.4 Style Change
can even be used to change the default values of presentation attributes
for its children.
Note also that these defaults describe the behavior of MathML applications when an attribute is not supplied; they do not indicate a value that will be filled in by an XML parser, as is sometimes mandated by DTD-based specifications.
In general, there are a number of
properties of MathML rendering that may be thought of as overall
properties of a document, or at least of sections of a large
document. Examples might be
mathsize (the math font
size: see Section 3.2.2 Mathematics style attributes common to token elements), or the
behavior in setting limits on operators such as integrals or sums
upon breaking formulas over lines (e.g.
linebreakstyle); for such attributes see several
elements in Section 3.2 Token Elements.
These may be thought to be inherited from some such
containing scope. Just above we have mentioned the setting of default
values of MathML attributes as inherited or
automatic; there is a third source of global default values
for behavior in rendering MathML, a MathML operator dictionary. A
default example is provided in Appendix C Operator Dictionary.
This is also discussed in Section 22.214.171.124.1 The operator dictionary and examples are given in
Section 126.96.36.199.1 Dictionary-based attributes.
In addition to the attributes described specifically for each element,
the attributes in the following table are allowed on every MathML element.
Also allowed are attributes from the xml namespace, such as
and attributes from namespaces other than MathML,
which are ignored by default.
Establishes a unique identifier associated with the element
to support linking, cross-references and parallel markup.
References another element within the document.
|Associates the element with a set of style classes for use with [XSLT] and [CSS21]. Typically this would be a space separated sequence of words, but this is not specified by MathML. See Section 6.5 Using CSS with MathML for discussion of the interaction of MathML and CSS.|
|Associates style information with the element for use with [XSLT] and [CSS21]. This typically would be an inline CSS style, but this is not specified by MathML. See Section 6.5 Using CSS with MathML for discussion of the interaction of MathML and CSS.|
|Can be used to establish the element as a hyperlink to the specfied URI.|
Note that MathML 2 had no direct support for linking, and instead
followed the W3C Recommendation "XML Linking Language"
[XLink] in defining links using the
xlink:href attribute. This has changed, and MathML 3 now
href attribute. However, particular compound
document formats may specify the use of XML linking with MathML
elements, so user agents that support XML linking should continue to
support the use of the
xlink:href attribute with MathML 3
See also Section 3.2.2 Mathematics style attributes common to token elements for a list of MathML attributes which can be used on most presentation token elements.
|DEPRECATED but in MathML 1.0.|
In MathML, as in XML, "whitespace" means simple spaces, tabs, newlines, or carriage returns, i.e., characters with hexadecimal Unicode codes U+0020, U+0009, U+000A, or U+000D, respectively; see also the discussion of whitespace in Section 2.3 of [XML].
MathML ignores whitespace occurring outside token elements.
Non-whitespace characters are not allowed there. Whitespace occurring
within the content of token elements , except for
<cs>, is normalized as follows. All whitespace at the beginning and end of the content is
removed, and whitespace internal to content of the element is
collapsed canonically, i.e., each sequence of 1 or more
whitespace characters is replaced with one space character (U+0020, sometimes
called a blank character).
<mo> ( </mo> is equivalent to
<mtext> Theorem 1: </mtext>
is equivalent to
Authors wishing to encode white space characters at the start or end of
the content of a token, or in sequences other than a single space, without
having them ignored, must use
or other non-marking characters that are not trimmed.
For example, compare the above use of an
<mtext> <!--NO-BREAK SPACE-->Theorem <!--NO-BREAK SPACE-->1: </mtext>
When the first example is rendered, there is nothing before "Theorem", one Unicode space character between "Theorem" and "1:", and nothing after "1:". In the second example, a single space character is to be rendered before "Theorem"; two spaces, one a Unicode space character and one a Unicode no-break space character, are to be rendered before "1:"; and there is nothing after the "1:".
Note that the value of the
xml:space attribute is not relevant
in this situation since XML processors pass whitespace in tokens to a
MathML processor; it is the requirements of MathML processing which specify that
whitespace is trimmed and collapsed.
For whitespace occurring outside the content of the token elements
mspace element should be used, as opposed to an
mtext element containing
only whitespace entities.
MathML specifies a single top-level or root
which encapsulates each instance of
MathML markup within a document. All other MathML content must be
contained in a
math element; in other words,
every valid MathML expression is wrapped in outer
<math> tags. The
element must always be the outermost element in a MathML expression;
it is an error for one
math element to contain
another. These considerations also apply when sub-expressions are
passed between applications, such as for cut-and-paste operations;
See Section 6.3 Transferring MathML.
math element can contain an arbitrary number
of child elements. They render by default as if they
were contained in an
math element accepts any of the attributes that can be set on
Section 3.3.4 Style Change
<mstyle>, including the common attributes
specified in Section 2.1.6 Attributes Shared by all MathML Elements.
In particular, it accepts the
dir attribute for
setting the overall directionality; the
math element is usually
the most useful place to specify the directionality
(See Section 3.1.5 Directionality for further discussion).
Note that the
dir attribute defaults to "ltr"
math element (but inherits on all other elements
which accept the
dir attribute); this provides for backward
compatibility with MathML 2.0 which had no notion of directionality.
Also, it accepts the
mathbackground attribute in the same sense
mstyle and other presentation elements to set the background
color of the bounding box, rather than specifying a default for the attribute
(see Section 3.1.10 Mathematics style attributes common to presentation elements)
In addition to those attributes, the
math element accepts:
|display||"block" | "inline"||inline|
specifies whether the enclosed MathML expression should be rendered
as a separate vertical block (in display style)
or inline, aligned with adjacent text.
|specifies the maximum width to be used for linebreaking. The default is the maximum width available in the surrounding environment. If that value cannot be determined, the renderer should assume an infinite rendering width.|
|overflow||"linebreak" | "scroll" | "elide" | "truncate" | "scale"||linebreak|
|specifies the preferred handing in cases where an expression is too long to fit in the allowed width. See the discussion below.|
|provides a URI referring to an image to display as a fall-back for user agents that do not support embedded MathML.|
specifies the width to display
specifies the height to display
|altimg-valign||length | "top" | "middle" | "bottom"||0ex|
specifies the vertical alignment of the image with respect to adjacent inline material.
A positive value of
|provides a textual alternative as a fall-back for user agents that do not support embedded MathML or images.|
specifies a CD group file that acts as a catalogue of CD bases for locating
OpenMath content dictionaries of
In cases where size negotiation is not possible or fails
(for example in the case of an expression that is too long to fit in the allowed width),
overflow attribute is provided to suggest a processing method to the renderer.
Allowed values are:
|"linebreak"||The expression will be broken across several lines. See Section 3.1.7 Linebreaking of Expressions for further discussion.|
|"scroll"||The window provides a viewport into the larger complete display of the mathematical expression. Horizontal or vertical scroll bars are added to the window as necessary to allow the viewport to be moved to a different position.|
|"elide"||The display is abbreviated by removing enough of it so that the remainder fits into the window. For example, a large polynomial might have the first and last terms displayed with "+ ... +" between them. Advanced renderers may provide a facility to zoom in on elided areas.|
|"truncate"||The display is abbreviated by simply truncating it at the right and bottom borders. It is recommended that some indication of truncation is made to the viewer.|
|"scale"||The fonts used to display the mathematical expression are chosen so that the full expression fits in the window. Note that this only happens if the expression is too large. In the case of a window larger than necessary, the expression is shown at its normal size within the larger window.|
The following attributes of
math are deprecated:
|intended to provide a way of pointing to external macro definition files. Macros are not part of the MathML specification.|
|mode||"display" | "inline"||inline|
specified whether the enclosed MathML expression should be rendered in
a display style or an inline style.
This attribute is deprecated in
favor of the
Information nowadays is commonly generated, processed and rendered by software tools. The exponential growth of the Web is fueling the development of advanced systems for automatically searching, categorizing, and interconnecting information. In addition, there are increasing numbers of Web services, some of which offer technically based materials and activities. Thus, although MathML can be written by hand and read by humans, whether machine-aided or just with much concentration, the future of MathML is largely tied to the ability to process it with software tools.
There are many different kinds of MathML processors: editors for authoring MathML expressions, translators for converting to and from other encodings, validators for checking MathML expressions, computation engines that evaluate, manipulate, or compare MathML expressions, and rendering engines that produce visual, aural, or tactile representations of mathematical notation. What it means to support MathML varies widely between applications. For example, the issues that arise with a validating parser are very different from those for an equation editor.
This section gives guidelines that describe different types of MathML support and make clear the extent of MathML support in a given application. Developers, users, and reviewers are encouraged to use these guidelines in characterizing products. The intention behind these guidelines is to facilitate reuse by and interoperability of MathML applications by accurately setting out their capabilities in quantifiable terms.
The W3C Math Working Group maintains MathML Compliance Guidelines. Consult this document for future updates on conformance activities and resources.
A valid MathML expression is an XML construct determined by the MathML RelaxNG Schema together with the additional requirements given in this specification.
We shall use the phrase "a MathML processor" to mean any application that can accept or produce a valid MathML expression. A MathML processor that both accepts and produces valid MathML expressions may be able to "round-trip" MathML. Perhaps the simplest example of an application that might round-trip a MathML expression would be an editor that writes it to a new file without modifications.
Three forms of MathML conformance are specified:
A MathML-input-conformant processor must accept all valid MathML expressions; it should appropriately translate all MathML expressions into application-specific form allowing native application operations to be performed.
A MathML-output-conformant processor must generate valid MathML, appropriately representing all application-specific data.
A MathML-round-trip-conformant processor must preserve MathML equivalence. Two MathML expressions are "equivalent" if and only if both expressions have the same interpretation (as stated by the MathML Schema and specification) under any relevant circumstances, by any MathML processor. Equivalence on an element-by-element basis is discussed elsewhere in this document.
Beyond the above definitions, the MathML specification makes no demands of individual processors. In order to guide developers, the MathML specification includes advisory material; for example, there are many recommended rendering rules throughout Chapter 3 Presentation Markup. However, in general, developers are given wide latitude to interpret what kind of MathML implementation is meaningful for their own particular application.
To clarify the difference between conformance and interpretation of what is meaningful, consider some examples:
In order to be MathML-input-conformant, a validating parser needs only to accept expressions, and return "true" for expressions that are valid MathML. In particular, it need not render or interpret the MathML expressions at all.
A MathML computer-algebra interface based on content markup might choose to ignore all presentation markup. Provided the interface accepts all valid MathML expressions including those containing presentation markup, it would be technically correct to characterize the application as MathML-input-conformant.
An equation editor might have an internal data representation that makes it easy to export some equations as MathML but not others. If the editor exports the simple equations as valid MathML, and merely displays an error message to the effect that conversion failed for the others, it is still technically MathML-output-conformant.
As the previous examples show, to be useful, the concept of MathML conformance frequently involves a judgment about what parts of the language are meaningfully implemented, as opposed to parts that are merely processed in a technically correct way with respect to the definitions of conformance. This requires some mechanism for giving a quantitative statement about which parts of MathML are meaningfully implemented by a given application. To this end, the W3C Math Working Group has provided a test suite.
The test suite consists of a large number of MathML expressions categorized by markup category and dominant MathML element being tested. The existence of this test suite makes it possible, for example, to characterize quantitatively the hypothetical computer algebra interface mentioned above by saying that it is a MathML-input-conformant processor which meaningfully implements MathML content markup, including all of the expressions in the content markup section of the test suite.
Developers who choose not to implement parts of the MathML specification in a meaningful way are encouraged to itemize the parts they leave out by referring to specific categories in the test suite.
For MathML-output-conformant processors, information about currently available tools to validate MathML is maintained at the W3C MathML Validator. Developers of MathML-output-conformant processors are encouraged to verify their output using this validator.
Customers of MathML applications who wish to verify claims as to which parts of the MathML specification are implemented by an application are encouraged to use the test suites as a part of their decision processes.
MathML 3.0 contains a number of features of earlier MathML which are now deprecated. The following points define what it means for a feature to be deprecated, and clarify the relation between deprecated features and current MathML conformance.
In order to be MathML-output-conformant, authoring tools may not generate MathML markup containing deprecated features.
In order to be MathML-input-conformant, rendering and reading tools must support deprecated features if they are to be in conformance with MathML 1.x or MathML 2.x. They do not have to support deprecated features to be considered in conformance with MathML 3.0. However, all tools are encouraged to support the old forms as much as possible.
In order to be MathML-round-trip-conformant, a processor need only preserve MathML equivalence on expressions containing no deprecated features.
MathML 3.0 defines three basic extension mechanisms: the
element provides a way of displaying glyphs for non-Unicode
characters, and glyph variants for existing Unicode characters; the
maction element uses attributes from other namespaces to obtain
implementation-specific parameters; and content markup makes use of
definitionURL attribute, as well as
Content Dictionaries and the
cd attribute, to point to external
definitions of mathematical semantics.
These extension mechanisms are important because they provide a way
of encoding concepts that are beyond the scope of MathML 3.0 as presently
explicitly specified, which
allows MathML to be used for exploring new ideas not yet susceptible
to standardization. However, as new ideas take hold, they may become
part of future standards. For example, an emerging character that
must be represented by an
mglyph element today may be
assigned a Unicode code point in the future. At that time,
representing the character directly by its Unicode code point would be
preferable. This transition into Unicode has
already taken place for hundreds of characters used for mathematics.
Because the possibility of future obsolescence is inherent in the
use of extension mechanisms to facilitate the discussion of new ideas,
MathML can reasonably make
no conformance requirements concerning the use of
extension mechanisms, even when alternative standard markup is
available. For example, using an
mglyph element to represent
an 'x' is permitted. However, authors and implementers are
strongly encouraged to use standard markup whenever possible.
Similarly, maintainers of documents employing MathML 3.0 extension
mechanisms are encouraged to monitor relevant standards activity
(e.g., Unicode, OpenMath, etc.) and to update documents as more
standardized markup becomes available.
If a MathML-input-conformant application receives
input containing one or more elements with an illegal number or type
of attributes or child schemata, it should nonetheless attempt to
render all the input in an intelligible way, i.e., to render normally
those parts of the input that were valid, and to render error messages
(rendered as if enclosed in an
merror element) in place of
MathML-output-conformant applications such as
editors and translators may choose to generate
expressions to signal errors in their input. This is usually
preferable to generating valid, but possibly erroneous, MathML.
The MathML attributes described in the MathML specification are intended to allow for good presentation and content markup. However it is never possible to cover all users' needs for markup. Ideally, the MathML attributes should be an open-ended list so that users can add specific attributes for specific renderers. However, this cannot be done within the confines of a single XML DTD or in a Schema. Although it can be done using extensions of the standard DTD, say, some authors will wish to use non-standard attributes to take advantage of renderer-specific capabilities while remaining strictly in conformance with the standard DTD.
To allow this, the MathML 1.0 specification [MathML1]
allowed the attribute
other on all elements, for use as a hook to pass
on renderer-specific information. In particular, it was intended as a hook for
passing information to audio renderers, computer algebra systems, and for pattern
matching in future macro/extension mechanisms. The motivation for this approach to
the problem was historical, looking to PostScript, for example, where comments are
widely used to pass information that is not part of PostScript.
In the next period of evolution of MathML the
development of a general XML namespace mechanism
seemed to make the use of the
attribute obsolete. In MathML 2.0, the
other attribute is
deprecated in favor of the use of
namespace prefixes to identify non-MathML attributes. The
other attribute remains deprecated in MathML 3.0.
For example, in MathML 1.0, it was recommended that if additional information
was used in a renderer-specific implementation for the
(Section 3.7.1 Bind Action to Sub-Expression
that information should be passed in using the
<maction actiontype="highlight" other="color='#ff0000'"> expression </maction>
From MathML 2.0 onwards, a
attribute from another namespace would be used:
<body xmlns:my="http://www.example.com/MathML/extensions"> ... <maction actiontype="highlight" my:color="#ff0000"> expression </maction> ... </body>
Note that the intent of allowing non-standard attributes is not to encourage software developers to use this as a loophole for circumventing the core conventions for MathML markup. Authors and applications should use non-standard attributes judiciously.
|
The butterfly-shaped gland in your neck, the thyroid has a dramatic impact on a variety of bodily functions. According to estimates if you’re woman of over 35 your chances of a thyroid disorder are more by 30 percent. Experts say that women are as much as ten times as likely as men to have a thyroid problem.
Your thyroid gland is located above Adam’s apple. The thyroid hormone (TH) among other things regulates your body’s temperature, metabolism, and heartbeat. When your thyroid gland turns sluggish, it produces too little TH. The condition is known as hypothyroidism.
Hypothyroidism in India is 11 percent. Cities like Delhi, Kolkata, Bangalore, Ahmadabad, and Hyderabad has a higher prevalence compared to coastal cities such as Mumbai, Goa, and Chennai. Thyroid hormone has a far reach in the body from your brain to bowels, so diagnosing a disorder can be challenging. Here are some tell-tale signs to find whether your thyroid is on the blink.
ü You’re exhausted
ü You’re feeling weak
ü Always suffer from cold
ü Your muscles aches and cramps
ü You may suffer from constipation
ü You may gain weight
ü Have difficulty losing weight
ü You have a poor appetite
ü You have dull, dry and rough skin
ü You suffer from swelling in your face and legs
ü Your hair is falling
ü You have a hoarse voice
ü Your tongue is enlarged
ü You may be depressed
ü Your eyes have lost its luster
ü Your eyebrows are thinning
ü You suffer from irregular or heavy menstrual periods
ü You have memory loss
ü You have reduced mental activity
ü Your cholesterol levels are high
ü You suffer from miscarriages
Hypothyroidism will slow down your metabolism, thus contributing to weight gain. Science has proved that obesity affects your thyroid function. Your thyroid gland uses iodine mostly available from food sources such as seafood, bread, and salt to produce the thyroid hormone. When your thyroid hormone level decreases, your pituitary gland releases thyroid stimulating hormone. Medical professionals use TSH hormonal levels for confirming whether you have hypothyroidism. If you suffer from hypothyroidism, there is a persistent low level of circulating thyroid hormones in your blood.
The standard range for thyroid stimulating hormone is 0.6-4.6 micro units/ml. Above six states that you suffer from Hypothyroidism. If you are in the borderline range, then your levels will be 4-6 micro units/ml.
Regular medication, active lifestyle, and de-stressing techniques will improve the quality of your life. But still you need guidance from experts so what are you going to do?
VLCC has customized a World Class Weight Management Program, Get Well Soon
Why don’t you join the program?
VLCC with the large panel of Doctors, Dieticians, Physiotherapists, Therapist works on the perfect science of weight management. Thereby helping you to take care of your medical conditions.
The specialty of VLCC Weight loss programs include
· No Crash Diets
· No artificial food supplement
· No appetite suppressants
· No Side effect
|
A bruise occurs when capillaries (small blood vessels) break and bleed into the surrounding tissue. According to the National Institutes of Health, a bruise can occur underneath the skin, within the belly of a muscle or within a bone. Most bruises heal on their own; however, a bruise can result in compartment syndrome. Compartment syndrome is an increase in pressure that can decrease the blood supply to tissues or organs around the bruise. You will notice excessive pain, swelling, numbness, tingling or weakness in your lower limb if compartment syndrome develops because of a deep bone bruise of the knee. This complication is life threatening, and you should seek immediate medical treatment. Use the following guidelines to promptly treat a deep bone bruise of the knee.
Elevate the injured knee above the level of your heart, advises the Mayo Clinic. Lie down and place your knee and foot on a pillow so that your entire lower leg is elevated to ease swelling.
Apply an ice pack to the bruised knee for 20 minutes. Remove the ice pack for 20 minutes. Repeat this cycle several times during the day to reduce pain and swelling in the knee.
Consider taking over-the-counter nonsteroidal anti-inflammatory drugs (NSAIDs), such as Aleve, ibuprofen or Motrin, to reduce pain and swelling. Follow the instructions on the drug label and use as directed. Consult your doctor about taking these medications.
Rest the bruised knee as much as possible. Avoid using crutches, if possible, to prevent the knee from becoming stiff.
See your doctor if you have extreme pain or an unusually large bruise, if you heard a "pop" or a "snap," if you have a history of a bleeding disorder or if you are bleeding from other areas of your body.
|
By Wes Annac, Editor, Openhearted Rebel
Jiddu Krishnamurti was a sage, philosopher, and free thinker who encouraged people to look within for solutions to their problems and the problems in the world. He was born to a middle class family in South India on May 11, 1895, and left this earth on February 17, 1986. (1)
As followers of his work might know, Krishnamurti was “discovered” as a child by Theosophical Society leaders Annie Besant and Bishop Leadbeater. They claimed he was the “world teacher” the society had been waiting for. He would go on to have “mystical experiences” as a young man that provided him with a new, unique vision on life. (1)
This would lead him to disconnect from all religions, organizations, and philosophy-driven movements, including the Theosophical Society, and set out on a lone mission to enlighten the people with his unique philosophy. (1)
Throughout this lifelong journey, he wrote, traveled, and spoke in front of audiences (as less of a leader figure and more of a friend or equal) from the 1920s all the way until his passing in 1986. (1)
People loved Krishnamurti’s perspective on life. Rather than being based on the guidelines of some religious movement, his words were based on self-empowerment and the peeling away of the layers of mind and ego to reveal the sacred, enlightened Self that can shine through.
Here are 7 quotes from Krishnamurti about nothing. In these quotes, he speaks about the power of nothingness and emptiness to induce spiritual awareness and bring about evolution. He also speaks about the extensive role the mind plays in maintaining this illusion we call life.
1. “We are empty in ourselves and we try to fill this emptiness with words, sensations, hopes and imagination; but the emptiness continues.” (2)
Everything you can think, imagine, or do, fills the inner emptiness we all feel and instinctively try to avoid. Little do we know, this emptiness – the isolation and sadness some people fear the most – is the key to true healing and evolution.
When we realize this, we’ll no longer be afraid to explore all that stuff we avoid.
2. “It is this fear of being nothing that drives the self into activity; but it is nothing, it is an emptiness.” (3)
The fear of death is rooted partially in the fear of nothingness; of being, feeling, experiencing, and thinking nothing at all. Since we try to cover up the emptiness through incessant mental or physical activity, we don’t realize we can already access that state of unconsciousness.
When we do finally access it, it reveals the spiritual “secrets” the mind covers up.
3. “The things to which we are attached – property, people, ideas – become all-important, for without the many things which fill its emptiness, the self is not. The fear of not being makes for possession; and fear breeds illusion.” (4)
Comedian Bill Hicks, who admittedly had a radically different personality from Krishnamurti’s, once said we have a choice between fear and love. Fear makes us defensive and closes our higher senses. Love opens them back up, but only if ego is out of the way.
Fear invades our inner sanctuary with infinite worries and concerns about all those things we’re attached to. But when we let go and let the mind be at peace, we discover an effortless state of being in which we can thrive.
4. “You are nothing. You may have your name and title, your property and bank account, you may have power and be famous; but in spite of all these safeguards, you are as nothing. You may be totally unaware of this emptiness, this nothingness, or you may simply not want to be aware of it; but it is there, do what you will to avoid it.
“You may try to escape from it in devious ways, through personal or collective violence, through individual or collective worship, through knowledge or amusement; but whether you are asleep or awake, it is always there.” (5)
We could easily take being called “nothing” in a bad way, but it’s not meant to be disempowering.
Nothingness is your true nature – the original state of mind you inhabited before everything you see around you came into form. You can return to this incredibly peaceful, blissful state with a few deep breaths and the willingness to sit in silence.
This brings us to our next quote:
5. “If we are able to face that emptiness, to be with that aching loneliness, then fear altogether disappears, and a fundamental transformation takes place. For this to happen, there must be the experiencing of that nothingness — which is prevented if there is an experiencer.” (6)
The mind – the experiencer – can block or prohibit awareness of the present moment through those fears and concerns we discussed earlier.
Krishnamurti consistently expressed that emptiness, a clear mind, and minimal ego were the keys to a peaceful life. The only real war we’re fighting is one within ourselves; between the mind and heart. Like Bill Hicks said, we can choose fear or love. We can be selfish or compassionate.
We can avoid the emptiness or consider that it has something real to offer. In all three cases, I choose the latter.
6. “When there is the discovery, the experiencing of this nothingness as you, then fear – which exists only when the thinker is separate from his thoughts and so tries to establish a relationship with them – completely drops away. Only then is it possible for the mind to be still; and in this tranquility, truth comes into being.” (7)
Complex, complicated philosophy is unnecessary. All we need is to surrender to simplicity. We can waste our time doing everything under the sun in the name of some belief or organization, or we can relax, simply be, and liberate ourselves.
You don’t even have to read or watch this to find what you truly need. It already exists in the void.
7. “Belief conditions experience, and experience then strengthens belief. What you believe, you experience. … Belief is another cloak of desire.
“Knowledge, belief, conviction, conclusion and experience are hindrances to truth; they are the very structure of the self. … The unknown can never be experienced by the known; the known, the experienced must cease for the unknown to be.” (8)
I could spend more words making a point that has long been made, but I think by now, you get the gist of it. This might have been meatier if there were a more complex philosophy to dive into, but the message for today is simple: the emptiness we fear is the path to the enlightenment we seek.
Here’s a bonus quote on the nature of violence:
“Violence is not merely killing another. It is violence when we use a sharp word, when we make a gesture to brush away a person, when we obey because there is fear. So violence isn’t merely organized butchery in the name of God, in the name of society or country.
“Violence is much more subtle, much deeper, and we are inquiring into the very depths of violence.
“When you call yourself an Indian or a Muslim or a Christian or a European, or anything else, you are being violent. Do you see why it is violent? Because you are separating yourself from the rest of mankind.
“When you separate yourself by belief, by nationality, by tradition, it breeds violence. So a man who is seeking to understand violence does not belong to any country, to any religion, to any political party or partial system; he is concerned with the total understanding of mankind.” (9)
If I were asked to explain in so many words what Krishnamurti’s message was, it would be this: We should explore and fall in love with the emptiness we avoid. We should dive deep into the subconscious and all the “negative” stuff it contains.
We should be unafraid to sit in darkness or silence and be completely alone. In this non-activity most normal people would avoid, we find what every teacher and philosopher has tried to highlight.
We discussed this briefly in my introduction video, and I believe it’s at the heart of Krishnamurti’s philosophy. Let me know what you think in the comments below, and remember to make some time for silent soul searching.
You might find answers to problems that have been plaguing you for a long time.
- “About Krishnamurti” Kinfo. net – http://www.kinfonet.org/krishnamurti/about
- Krishnamurti, Commentaries on Living. First Series. Bombay, etc.: B.I. Publications, 1972; c1974, 62.
- Ibid., 54.
- Ibid., 113.
- Ibid., 92.
- Ibid., 54.
- Ibid., 92.
- Ibid., 89.
- “Jiddu Krishnamurti Quotes About Violence”, AZ Quotes – http://www.azquotes.com/author/8281-Jiddu_Krishnamurti/tag/violence
About the author:
I’m a twenty-something writer & blogger with an interest in spirituality, revolution, music and the transformative creative force known as love. I run Openhearted Rebel, a daily news blog dedicated to igniting a revolution of love by raising social and spiritual awareness.
I also have a personal blog, Wes Annac’s Personal Blog, in which I share writings related to spiritual philosophy, creativity, heart consciousness and revolution (among other topics).
I write from the heart and try to share informative and enlightening reading material with the rest of the conscious community. When I’m not writing or exploring nature, I’m usually making music.
If you enjoyed this post and want to support my work, consider a donation (no PayPal account required):
Recent articles and videos:
- My Introduction: New Openhearted Rebel Video
- Marijuana and the Sacred
- Removing the Mask
- I Stand for Love
- How Did Spiritualism Begin?
- Last Week in Review: 8 News Stories
- The Middle
- These 5 Psychedelic Drugs Provide Profound Psychological Benefits
- 8 Cannabis Facts That Defy Traditional Stereotypes
- Indications of a Global Shift in Consciousness
|
Beads are small decorative objects that have a see through hole, they have been witnessed dating back to three thousand years and is one amongst the oldest form of arts. Earlier days they were also used for trade purposes. The very early manufacture of beads is accounted to be at Europe and the use of beads were most observed at West Africa, as neck pieces, bracelets and more. There are various shaped beads- spheres, oval, tube shaped, square or even cube and seed beads (that is called for uniformly spheroidal beads). Antique beads are of great importance as it helps to study the composition and the sources used earlier to make beads. The beads are often seen with ornamental qualities and are made out of various media. They are seen in various forms and sizes ranging from a millimeter to a centimeter in materials such as stone, shell, wood, bone, plastic, glass or pearl. Beads are known for their decorative assets, they are used as jewelry and embellishment for clothing mostly.
Beads in India have played a vital role. There is a constant movement in the field of bead making, trading and the use of beads. There are various ancient centers in India for bead making and its trades. These centers have produced beads, gems and valuable ornaments which have been evidenced to be exported to distant places. Among the various materials used for making of beads there is an emergent demand for glass beads. One of the interesting places where talks of glass bead making and transporting in particular witnessed is Arikamedu, Puducherry, where the presence of Roman and Tamilnadu trade relation is observed. The presence of beads date back to Roman times. Glass beads out of all the other kinds of beads are a good sign of trade and spread of bead making knowledge. Over the years bead making has transformed and bead making at present is carried out in bulk production where it includes machinery work mostly. Glass beads are manufactured in many ways, there are more than three methods where one can adopt to produce beads, among which are handmade beads, pressed beads and tube grinding method. One of the well-known glass beads manufacturers is Banaras Beads Limited, a government recognized export house, Varanasi. The company is in the business and has grown over last ten years. It stands out among all the others and is the biggest in the trade. The company has well-equipped machines that carry out standard performance and quality maintenance is ensured. The company is specialized in manufacturing fashion jewelry and all other types of related accessories. The beads are made by tube cutting or glass melting ways that go through washing and getting polished after. There are numerous kinds of beads produced and they have multiple cards displaying the variety of beads. There are bugle beads, chatons, crystal beads, delica beads, faceted beads, flat backs, hex cut and more.
The beads are polished, faceted or matt finished, they come in various sizes, some are hand painted with imported acrylic colors. Beads are available in shades of opaque, transparent, luster, rain bow and pastel colors. The artist paints on the beads with a thin brush, another way is that the glass rods are melted and rolled to form a bead, and another rod is heated and the bead is decorated without actually having to paint on it. There are number of handicrafts that are seen at Varanasi among which Banaras beads are well-known and are exported to foreign countries as well. The technique that is seen at Varanasi is called lamp winding making it stand out in which glass is altered to rods. They are melted at a small source of heat generally a hand torch or bench burner that looks similar to a lamp hence the name lamp winding. The glass is wound onto mandrel and is shaped when it is still hot, the beads are decorated with the help of glass sticks. The price range and the quality of beads are maintained to retain strong at the business. The Banaras Beads Limited exports beads to European countries- Germany, United Kingdom, Russia and also to South Africa and USA. Beads are available at markets as strings and also at loose. Price ranges from INR 90 to INR 1900 per kilogram. Few facets designs are inspired from the diamond cuts. Bead sticking powders are used to attach the beads to the facets machine which is locally called as Chapari (mix of resin). Emery powder (Aluminium oxide), Sulphuric acid and nitric acid are used while polishing and washing beads. 700 to 800 employees work at Banaras Beads Ltd and the company also focuses on the welfare of women. Earlier about the beads they were only plain round beads. Now there are countless shapes and forms. New colors and designs are adapted. There are endless designs to follow. The colors that are not available within country are imported from China in order not to lose the orders and to satisfy and sustain the orders. In this way the business of beads is saved and ongoing.
|
Everyone says that you need to listen to a podcast or watch a movie to grasp the Italian Language or even doing an Italian immersion trip. What if it does not work for you? Is there something wrong with you? No. The odds are you are more of a visual learner than an auditory one.
Have you ever felt frustrated while taking an Italian language course? Have you ever experienced feeling lost amongst endless vocabulary lists, grammar rules, must-see Italian movies or audio lessons? A myriad of inputs, and nevertheless, that feeling of stagnating is still there?
Maybe you already know or perhaps not, but every single person learns differently. No secret recipe works for every learner of Italian. We are humans, very dissimilar one another and thus, we absorb information in a variety of ways.
If you feel or if you have felt a little bit like this, at some point of your Italian learning journey, it is likely that you have been using a studying method which is not ideal for you.
The thing is, every single person is born with a different learning style, hence, knowing what style suits you best, is crucial to learn how to learn Italian smartly and efficiently. Using the most suitable learning method for you is vital to make the most out of the time spent with Italian (or anything other subject you want to master).
you is vital to make the most out of the time spent with Italian (or anything else).
HOW MANY LEARNING STYLES ARE THERE?
Neil Fleming, a New Zealand teacher, has divided people in three different styles of learning: a visual one, an auditory one and a kinesthetic one. The letter can coexist in the same person or one or two can be predominant. No need to say, knowing your prevalent learning aspect will pave your way to a more effective Italian language learning journey. .
If you don’t know yet what your learning style is, take the take the VARK test, designed by Fleming and start optimizing your Italian learning time.
WHAT ARE THE CHARACTERISTICS OF THE THREE LEARNING STYLES?
Visual (or spatial) learning style
The typical visual person is the one that won’t remember a person name, but would definitely remember a personal appearance. Visual students learn efficiently through mental visualization. This means that they need to visualize what they study, in the shape of an image or a graphic or by writing down words. Visual students would better retain an Italian grammar rule while reading, rather than when listening to it, for instance.
Auditory (or musical) learning style
The typical auditory person is the one that remembers the people appearance but skips their names. Auditory students retain what they listen to and, thus, learn efficiently through conversation and listening activities, such as songs or podcasts. Memorizing endless wordlists without writing them down shouldn’t be a big deal for them.
Kinesthetic (or physical) learning style
The kinesthetic person is one that does not remember a person’s appearance or what he says, instead, he reminds people for what they do. Kinesthetic students tend to learn through experience. Doing is far more important than listening or reading. Learning on the move (using role plays or simulation) is one of their strengths.
WHAT ARE THE MOST PRODUCTIVE LEARNING ACTIVITIES FOR EACH STYLE?
- reading (Italian novels, newspaper) for expanding the vocabulary
- using a solid textbook for grasping the grammar
- using pictures to describe situations
- making vocabulary lists
- working in small groups
- quiet study place
methods e.g. Assimil or Pimsleur
learning in groups
learning through Tv series or Italian movies
- role plays and simulations
- learning on the move (e.g. through podcasts)
- writing down on a notebooks or index cards the new words
Why knowing your learning style is important?
Long story short, knowing how your mind absorb information, will allow you to design your very own Italian learning routine. Using an approach which best suits your peculiarities, means that you will be most likely to maximize your linguistic potential and less likely to get bored, carrying out Italian learning activities that don’t suit you.
In my experience, the VARK test showed I am someone with a prevalent visual and kinesthetic learning style. This sums up my learning preferences: visualizing words, by writing them down, in the shape of lists. When learning German, jotting down and copying sentences helps me to magically memorize words with very little effort. Well, this is me! As an online Italian Language Coach, I have come across a great wealth of students with a surprising auditory style, who would learn anything just by listening to it.
No matter what your learning style is, the secret for an exciting Italian language journey is to customize, as much as possible, your studying strategies to your potential.
Serena is a proud polyglot, teacher and language expert. After learning 8+ foreign languages and working long hours a job she was not born for, she decided she urged a significant life change. She is now combining what she loves doing with what she is good at, helping people to learn Italian online. She has been sharing her love for Italy and the Bella Lingua across the world for the last four years. Her goal is helping enthusiastic humans to transform Italian Language Learning into a habit in their lives.
|
The “alien megastructure” star that has been puzzling us for the past few years might have a more ordinary explanation: an orbiting Saturn-like planet, complete with wobbling rings.
In 2015, a group led by Tabetha Boyajian, then of Yale University, found that a star called KIC 8462852 had dimmed several times over a few years in a way they couldn’t explain.
Learn more about distant worlds: See our expert talk at New Scientist Live in London
The star had been observed by the Kepler space telescope between 2009 and 2013 as it hunted for exoplanets by staring at a patch of sky. When a planet passes in front of a star, an event called a transit, the light intensity dips slightly and then returns to normal.
But KIC 8462852, since dubbed Tabby’s star, didn’t behave that way, with the amount of dimming varying wildly. Speculation abounded, with explanations ranging from exoplanetary comets to a vast orbiting “megastructure” built by an advanced alien civilisation.
Now Mario Sucerquia and his colleagues at the University of Antioquia in Colombia have proposed another possibility: a ringed planet, similar to Saturn, orbiting close to the star. Such a planet would dim the star’s light in an irregular way during a transit.
First, the rings would block some of the star’s light, followed by the planet, which would dim it further. Then, after the planet passes, the rings would block some light again.
But because the rings would be at a different angle each time, the small dips at the beginning and end of the transits would be larger or smaller. Without seeing many transits, there would be no obvious pattern to this.
To test this idea and measure the irregularity, Sucerquia and his colleagues simulated a light curve from a ringed planet about one-tenth the Earth-sun distance from its star. They found another effect: the star would tug on the rings, making them wobble. This would make the silhouette of the rings as seen by an earthbound observer even more irregular from transit to transit.
A ringed planet has been floated to explain Tabby’s star before, but that would have required a world many times the mass of Jupiter, enough to make it a small star. This new-found wobble means the planet could be the mass of Neptune.
Keivan Stassun at Vanderbilt University in Nashville, Tennessee, is not convinced the explanation works, as even wobbly rings would create a regular dimming pattern in the star’s light. “To my knowledge, there has not yet been a claim of quasiperiodic or periodic dimming in Tabby’s star, as one would expect with something linked to material orbiting that star,” he says.
Sucerquia says there are other explanations for the weird light curve as well – it might even be a moon breaking up. To further solidify his findings, he is comparing new simulations with the data from Tabby’s star and others.
“The point of this work is to show the community that there are mechanisms that can alter the light curves,” Sucerquia says. “These changes can be generated by the dynamics of the moons or the rings, and the changes in these systems can occur in such short scales as to be detected in just a few years.”
Journal reference: arXiv, 1708.04600
More on these topics:
|
Set up a compost pile in your yard – Just do it!
You can recycle your kitchen scraps and yard debris. It’s the smart thing to do to improve your garden soil and help the environment.
These tips from the Columbia Springs Master Composter/Recycler program are just the thing that you need to begin smart composting.
The SMART Composting Recipe
Size Matters – The ideal size for backyard composting is a bin or pile 3′ x 3′ x 3′ or 1 cubic yard. Even on their own, piles this size decompose quicker. Strive to have your raw materials the same size too. Taking the time to cut, chop or shred the organic matter is one of the best ways to speed up the decomposition process.
Moisture – Compost should feel about as wet as a wrung-out sponge. You may need to water it in the summer and cover your pile during your rainy season.
Aeration – Compost needs oxygen to support microbial activity and prevent bad smells. Aeration is just as important as the size of the materials, so pile your materials loosely. Consider a three sided enclosure or build on pallets for better airflow.
Ratio – Compost should have a ratio 1:1 by volume of “green” materials and “brown” materials. A pile of nothing but brown materials will eventually decompose, however adding even a bit of green energizes the process.
Turn – your compost pile periodically to speed up the decomposing process. Whether you create a simple pile and let nature take its course or decide on a more active roll in the process turning is the single most important thing you can do. Give it a good turn, now and then, it will benefit your compost.
For further reading you may want to take a look at some of our previous posts –Teach Your Family to Compost Kitchen Scraps and Create a Mini-Compost Bin. Plus the University of Wisconsin Master Composter resources page for workshop handouts and compost bin plans.
Do you find composting fascinating? Become a Master Composter! Find information at your local extension office.
Do you already compost? Tell us about it on our Facebook page or in the comments below and click through to our Pinterest board – Composting Turn Your Spoil into Soil.
More from PreparednessMama
PreparednessMama provides women with reliable, realistic and practical information about preparedness, self-reliance, gardening, food storage and everyday life – without the hype. Come ask an expert how you can prepare your family for the big and small disasters in life.
|
The search of German War Graves is planned in Kvemo Kartli region of Georgia. The works will be carried out by the German War Graves Commission, an organization responsible for the maintenance and upkeep of German war graves in Europe and North Africa.
The Commission will conduct the works based on the agreement signed between the governments of Georgia and Germany in 1993. The remains of German soldiers will be repatriated to a military graveyard.
The works will take place in Rustavi town, New Samgori village of Gardabani district and Kapanakhchi-Iaghlurji territory of Marneuli district. The German side will be allowed to use the necessary equipment and heavy vehicles and employ locals who will work under the supervision of an archaeologist.
The German War Graves Commission cares for the graves, at 832 cemeteries in 46 countries, of more than 2.7 million persons killed during World War I and World War II. The German war graves are intended to remember all groups of war dead: military personnel, those dead by aerial warfare, murdered in the Holocaust, and all other persons persecuted to death.
|
Key words: liminality, identity, positionality, reflexivity
As of March 15, 2018, Syria entered into its eighth year of civil war. An estimate of 470,000 people were killed, including around 55,000 children (Barnard 2016). The war produced dire humanitarian situations as thousands of people were arrested, killed, tortured, injured, or displaced. One major disaster became known as the Syrian Refugee Crisis. Displaced Syrians flooded into neighboring Arab countries and Europe to escape the war.
The United States resettled a total of 18,007 Syrian refugees between October of 2011
and December of 2016 (Zong and Batalova 2017). After the election of President Donald Trump, the numbers of admitted Syrian refugees dwindled and then became suspended indefinitely (Krogstad and Radford 2017). The current administration’s negative rhetoric linking Syrian refugees to terrorism or the Islamic States of Iraq and the Levant (ISIL) and their anti-refugee and anti-migrant discourse frightened newly resettled Syrian refugees (Whittaker 2016). Particularly after the Paris attacks, refugees were afraid to leave their apartments because they were confronted with anti-muslim rhetoric (Whittaker 2016).
Between 2015 and 2016, assaults and hate crime on Muslims in the United States increased significantly—there were 127 reported cases of aggravated or simple assault on Muslims (Kishi 2017). Around two-thirds of Muslim Americans at that time expressed dissatisfaction with the current United States political environment, with nearly three-quarters stating that Donald Trump was unfriendly towards Muslims (Pew Research Center 2017). Being singled out by airport security or other law officials and getting physically attacked and called offensive names in addition to Trump’s policies and attitude toward them has made it more difficult to be a Muslim in America (Pew Research Center 2017).
Since this political administration began, many Syrian refugees reported increasing
xenophobic occurrences in the United States (Whittaker 2016). Exposure to xenophobia and discrimination can lead to physical, emotional, and social problems in refugees (Doner, Ozkara, and Kahveci 2013; Koca 2016). These incidents (Doner, Ozkara, and Kahveci 2013; Koca 2016) may also cause problems for identity formation and change. Issues of identity and self-personhood became an interest to me as I volunteered with Syrian refugees in the United States.
Therefore, I conducted my thesis research with Syrian refugees in Austin, Texas, to understand their experiences with identity loss and change. I was interested in examining the concept of liminality because it was a principal reference in refugee research (Eyles and Dam 2012; Siganporia 2016). Liminality, developed by Arnold van Gennep (1960) and used by anthropologists, such as Victor Turner (1969), originally marked an intermediate stage in a culture’s rites of passage ceremony (Szakolczai 2009; Thomassen 2014). Later studies on liminality highlighted the experiences of refugees or migrants living in a state of uncertainty or in “limbo” (Malkki 1995; Turton 2004). As liminal persons living in an uncertain state, refugees can experience problems with their identity (Beneduce 2008).
I also focused on identity because refugees usually experience displacement and loss of social structure and personhood (Smith 2013). Within a liminal existence, refugees or migrants become individuals or groups that struggle to maintain their native identity markers as they attempt to recreate themselves in new places (Eyles and Dam 2012; Siganporia 2016). Although identity can be constantly changing, liminality can also become a space for persons to redefine themselves with the expectation that society will reincorporate them (El-Shaarawi 2015).
Continue reading the in the January issue of Practicing Anthropology!
|
A new science teaching app that engages and educates youth through hands-on experiences was just developed by Michelle Williams, a UT marketing alumna and CEO of Williams Learning Solutions.
The app is from Williams Learning Solutions and guides students through science-based experiences, which help children understand the application of complex science concepts. In Williams’ first product, titled “Eco Challenge,” kindergarten through second grade students explore the relationships between predator and prey in the grasslands.
“I always had a passion about education,” Williams said. “My teaching is where I saw a need … I started seeing how technology was an opportunity to integrate science teaching. That’s when I decided I wanted to pursue a Ph.D. I wanted the opportunity to work with more teachers and more kids, and to go beyond my classroom to have an impact on more children.”
While the goal of the original product was to provide science content, Williams said she and her team realized they needed to build their own algorithm, or a system that adapts to the way you learn by recognizing patterns in app responses.
“It’s really important you have a fundamental understanding of the needs of the people you’re trying to build something for,” Williams said. “We create tools and features that encourage self-monitoring and reflection. That’s crucial for any learning.”
Moreover, Williams said their product is based on systems thinking — meaning students learn concepts in the context of the larger picture.
“Even with this first product, we’re trying to help make thinking visible early on in the learning process,” Williams said. “We’re … focusing on real-world problems with opportunities to connect visual, underlying phenomena.”
Williams said perspective is crucial. Trusting the feedback of people on the ground who interact with students can lead to changes in the program to accommodate student needs, said Tyne Sanders, an East Lansing Public School District kindergarten teacher.
“Especially for our kindergarten-level … everything has to be read to them and be very clear on where to push buttons,” Sanders said. “The kids are definitely motivated and engaged when they are using (the product). After they use it, they definitely have a better sense of how things are intertwined, and how creatures rely on each other.”
Williams also has a few teachers on the design team for the product. This gives young students, such as those in Sanders’ class, the accommodations they need, she added. Allie Brenner, East Lansing Public School District first grade teacher, said her students are engaged with the app despite it being educational.
“Any time I’ve had any classes work with it, they were always … really excited when they were making discoveries,” Brenner said. “In terms of being authentic, I think it really covers science topics in depth and is engaging. It presents it in a way they understand and will remember well.”
The app will officially launch in November and will charge $1–$2 for the first product, Williams said. She said her team intends to move toward a subscription model in the future, which would provide continuous content to users for a set rate.
“We are building something teachers and parents have told us they want,” Williams said. “There are a lot of ideas in science that can be abstract and difficult to understand. These ideas are building blocks that are essential.”
|
For some individuals and couples undergoing fertility treatments, the consideration of their religious attitudes towards fertility can be significant. For fertility practitioners it’s important to be aware of these attitudes in order to have the most understanding of their patients. In this blog, an extract from a research article ‘Religious attitudes to gamete donation’, we explore the relationship between fertility and hinduism.
Children have always been important since time immemorial and the continuity of the family unit has been of major significance in Hindu culture. Indian mythology is full of stories about what couples have done in the past to overcome their problem of infertility. Hindu Religion has tried to understand the natural hurdles infertile couples may face to fulfil their social obligations and made alternatives available.
The following story of sage Agastya from the great Hindu epic Mahabharata (written 2000 years ago) tells us why Hindus are so obsessed with children. Besides social factors like ‘someone to take care of me in my old age’, it directs our attention to a profound religious demand for a child.
Each individual is bound by Dharma to produce one child who must perform the annual ceremony of Shraadha (offering oblations to ancestors). This child is a Dharma Putra. The Shraadha offerings enable the ancestors to nourish themselves in their abode – Pitr loka. Without a Dharma Putra to make that offering, ancestors suffer torture, hunger and thirst on Pitr Loka
Dharma is essentially duty that must be performed for the well- being of self and society. Failure to do so leads to social anarchy and cosmic chaos. Producing a child is one’s earthly duty and necessary
for maintaining the stability of society. One can only renounce the world after they had fulfilled all worldly duties.(Manusmriti 3:37)
When a man could not produce a child from his wife, he was given the benefit of the doubt and allowed to marry again, and again. If despite this, he failed to father a child, it confirmed his sterility. The Scriptures suggest that another man (in the same lineage) be invited to cohabit with the wives (with the permission of the husband). This practice is known as niyoga. (Bühler, George,1886).
In the Mahabharata, when king Vichitravirya dies, his mother invites the sage Vyasa to produce children through her widowed daughters-in-law. Children thus produced were called children of Vichitravirya (the legal father), not the children of Vyasa (the biological father). The donor is not allowed to give his name to the offspring conceived from his donated sperm. The children born from such an act would be children of the legal husband and retain rights of inheritance from the legal father
King Pandu could not have sexual intercourse with his wives. Since he could not father offspring for succession, he renounced the throne. Dharma demanded children. His senior wife Kunti quoted that Dharma permitted demi-gods to impregnate his wives to have children who would be known as the child of Pandu. Thus came the five warrior kings of the Mahabharata who were acclaimed to be the righteous and the heroes of India (CandrabalıTripat.hı, 2005).
In the Kathasaritsagar, a collection of stories written in the 11th century A.D., there is a story of a king who makes an offering of rice balls to his ancestors. As he is about to throw the offering in the river, three hands reach up – one of a farmer, one of a priest and one of a warrior. The oracles revealed,’ The farmer is the man who married your mother, the priest is the man who made your mother pregnant and the warrior is the man who took care of you.’ The king is advised to give the rice ball to the farmer because scriptures describe him as the true father. (Penzer, 1924),
Through many centuries, religious law allowed for donor insemination when approved by the couple and like today, the family name would continue and this would be accepted by society.
In the Bhagavata Purana, there is a story that suggests the practice of surrogate motherhood. King Kamsa imprisoned his sister Devaki and her husband Vasudeva because oracles had informed him that her child would be his killer. He killed six children of Devaki and Vasudeva. The Gods intervened and had her transfer the seventh foetus from the womb of Devaki to the womb of Rohini (Vasudeva’s other wife). A child conceived in one womb was incubated in and delivered through another womb.
Hindu mythology contains numerous incidents where sexual interactions serve as a non-sexual and often a sacred purpose.
From the many stories expressed in the Hindu texts, it is clear that the scriptures provide an indication to the moral and ethical problems faced by the rapid advances of infertility technology. There is no doubt that having a child is the forefront of a Hindu couple’s duty and the philosophies have given some evidence that different techniques may be tried to help the couple to conceive. Though ART was not known in ancient times, examples are cited demonstrating that the ancient sages understood the problems of infertile couples and justified treatments outside natural means of conception.
|
Figs have an important symbolic value in many cultures and originate from the countries around the Mediterranean Sea and the Middle East. Fresh figs are very vulnerable, which is why most of the figs produced across the world are dried. The drying process of the fig, as with dates, starts on the tree. There are various fig varieties, some which have a red, purple, or green skin, and bright-red flesh.
Basic techniques: poaching, baking, grilling, ice cream, puréeing, caramelising, flambéing, marinating, preserving.
Taste combinations: almond, blue cheese, goat's cheese, hard cheeses, liver, mint, orange, raspberry, walnuts vanilla, chocolate, aniseed.
|
|Hans Hofmann’s painting ‘The Gate’
Abstract expressionist art in the style of, say, Hans Hofmann or Jackson Pollock, often looks as though it has been thrown at random upon the canvas. It’s common to hear sceptics scoff that a child or even an animal could have produced it, the implication being that the so-called art is indistinguishable from the mess and scribblings produced by infants and animals. A new study in the Journal of Cognition and Development challenges such claims.
The researchers at Boston College in America presented children with unlabelled abstract paintings paired with superficially similar art work by children and animals (chimps, monkeys and gorillas), and found that even the youngest group aged 4 to 7 could discriminate the professional art from the decoys, albeit that this was revealed through the fact that they consistently said they preferred the paintings by children and animals and saw them as better quality.
The researchers led by Jenny Nissel see this as a positive result for abstract artists and their fans:
“Those who deride abstract expressionists’ work do so because they view such works as no better than child art: Both kinds of works are considered low in quality,” the researchers write. “Children apparently have an equally low view of abstract expressionism: They see such works as lesser in quality than child and animal art. But the most important point, in our view, is that children, like adults, can tell the difference between these two classes of images. The fact that even preschoolers can make this discrimination should help to counter museum goers’ claims that a Jackson Pollock painting is no different from paintings on the preschool classroom wall.”
— Can Young Children Distinguish Abstract Expressionist Art From Superficially Similar Works by Preschoolers and Animals?
Post written by Christian Jarrett (@psych_writer) for the BPS Research Digest.
Our free fortnightly email will keep you up-to-date with all the psychology research we digest: Sign up!
|
FORMAT is the shape and size of a book. In bibliographical contexts, it is used to indicate the size of a volume in terms of the number of times the original printed sheet has been folded to form its constituent leaves. Thus, in a folio each sheet has been folded once, in a quarto twice, in an octavo three times; the size being respectively a half, a quarter, and an eighth of the original sheet.
A FOLIO is 1) a leaf numbered on the recto, or front; 2) the numeral itself in a foliated book or manuscript; 3)A book of folio size, whose quires consist of full sheets of papers folded once, and double the size of the ordinary octavo.
A QUARTO is a book essentially squarish in shape and normally lying between folio and octavo in size. A full sheet of paper is folded twice.
An OCTAVO is the most common size of book since the 17th century, based on a sheet folded three times
RECTO is the front, or obverse, side of the leaf; i.e.the right hand page of an open book or manuscript.
VERSO is the back, or reverse, side of the leaf; i.e. the left-hand page of an open book or manuscript.
A CATCHWORD is the first word of the following page inserted at the right-hand lower corner of each page of a book, below the last line.
SIGNATURES are the letters (or in some modern books, numerals) printed in the tail margin of the first leaf (at least) of each gathering or section of a book, as a guide to the binder in assembling them correctly. Signatures normally run from A to Z, omitting by convention, J and U, which in earlier days were capitalised as I and V, and also W. If the whole alphabet has been run through, they usually proceed to AA, BB, or Aa, Bb, etc.
A GATHERING (or QUIRE) is the group of leaves formed after the printed sheet has been folded to the size of the book and before it is combined in the proper order with its fellows for binding. The SHEET is the printer's unit, the LEAF the bibliographer's. The GATHERING is the binder's unit. In octavos, the gathering usually comprises one sheet folded three times.
FOLIATION is the numbering of leaves, as opposed to pagination which is the numbering of pages. It is rare in books printed before 1475, when the majority bore no consecutive numeration at all; or after 1600, by which time it had generally given place to pagination.
PAGINATION is the sequence of figures with which the pages of a book are numbered. These are known individually as page-numerals, collectively as pagination.
DECKLE EDGES are the rough, untrimmed edges of a sheet of hand-made paper (the deckle being the frame or band which condines it in manufacture)
INTAGLIO is the engraving processes in which the image is incised into the plate, as opposed to those where the surfaceis cut away leaving the image in relief.
FOUNT or FONT (OF TYPE) is the style and size of the type. in the strict sense, a printer would order from the typefounder a "fount (i.e. a complete set) of pica (= 12-point) Caslon".
|
Abuna Marqos (who lived in the 17th century), an Egyptian monk originally known as father Arimimios, was Metropolitan, or Abuna, of Ethiopia from 1634 until he was deposed in 1649.
He was consecrated as Abuna (head of the Ethiopian Church) in Alexandria, Egypt, and left for Ethiopia with the German Lutheran scholar, Peter Heyerling of Leipzig (died 1647), on October 16, 1634. En route, he stayed for a while at Suakin, the Red Sea port in what is now the Sudan, where in 1635 he was in friendly touch with the Catholic missionaries recently sent into exile there from Ethiopia.
When he arrived in Ethiopia, he issued a proclamation on Christian marriage in which he condemned concubinage and challenged the value of the Ethiopian custom of celebrating the Feast of the Epiphany on the borders or rivers as a second baptism. The influence of the Ethiopian clergy led him, however, to become less friendly towards foreign missionaries, who were in the country illegally. Though he would not condemn the acts of the Portuguese Jesuit bishop Apollinaris d’Almeida, he was powerless to prevent the execution of his friends, the French Capuchin monks Father Agathange of Vendôme and Father Cassien of Nantes, both Catholics, who had tried to revive Catholicism in Ethiopia, where all foreign Catholics had been denied entry since 1632.
Marqos was considered too moderate in ecclesiastical disputes, and thus made enemies. He tried to win the favor of Emperor Fasilidas (q.v.) [ruled 1632-67] by disclosing to him the conspiracy of his brother Galawdéwos to ascend the throne. But later the enemies of Marqos accused him of violating the competence of civil courts and of enlarging the jurisdiction of ecclesiastical courts, and the emperor ordered an enquiry. In 1648 he was attacked by the Echage (chief of the monastic orders) for the conduct of his private life, and after an enquiry had found him unworthy of his dignity, he was deposed in 1649.
C.Beccari, Rerum Aethiopicarum Scriptores Occidentales (“Western Writers on Ethiopian Matters”), Rome, 1917; J.B. Coulbeaux, Historie politique et religieuse de l’Abyssinie (Political and Religious History of Abyssinia”), Paris, 1929.
This article was reprinted from The Encyclopaedia Africana Dictionary of African Biography (in 20 Volumes). Volume One Ethiopia-Ghana, ©1997 by L. H. Ofosu-Appiah, editor-in-chief, Reference Publications Inc., New York, NY. All rights reserved.
|
From: Jet Propulsion Laboratory
Posted: Wednesday, November 28, 2012
Forecasters could soon be better able to predict how intense tropical cyclones like Hurricane Sandy will be by analyzing relative-humidity levels within their large-scale environments, finds a new NASA-led study.
Scientists from NASA's Jet Propulsion Laboratory, Pasadena, Calif., UCLA and the University of Hawaii at Manoa analyzed relative humidity data from the Atmospheric Infrared Sounder (AIRS) instrument on NASA's Aqua spacecraft for nearly 200 North Atlantic hurricanes between 2002 and 2010. The AIRS data were then compared with various types of post-storm data collected from all available sources by the National Oceanic and Atmospheric Administration's National Hurricane Center, including measured maximum sustained winds.
The researchers found the hurricanes that rapidly intensified tended to exist within a moister large-scale environment than weaker storms. The rapidly intensifying hurricanes had statistically significant higher relative-humidity levels in their environments than storms whose intensity was weakening or unchanged.
Lead author and former JPL postdoctoral scholar Longtao Wu, now an assistant researcher at the UCLA-JPL Joint Institute for Regional Earth System Science and Engineering, said the study could lead to improvements in hurricane intensity forecasts.
"Our results show relative humidity and its variations within a hurricane's large-scale environment may be useful predictors in improving intensity forecast models," Wu said. "This is the first satellite analysis to quantify this small but statistically significant correlation." Results of the study were published recently in the journal Geophysical Research Letters.
Hurricane forecasters strive to predict where a storm is heading and how strong it will be. Since the early 1990s, they have significantly improved forecasts of hurricane paths in the Atlantic basin, by about two to four percent a year. But forecasts of hurricane intensity have improved much slower -- less than one percent a year in the Atlantic basin since the mid-1980s. In other ocean basins, like the eastern and western North Pacific, improvements in tropical cyclone intensity forecasts are nearly 10 times smaller than those of track forecasts.
Changes in hurricane intensity are sensitive to numerous factors, both within the storms themselves and also in their surrounding environments. Environmental relative humidity is one factor, and it generally decreases the farther you get from a storm's center. Other factors include sea surface temperature, ocean heat content and vertical wind shear.
Wu and his colleagues sorted the AIRS relative humidity data by storm intensity and intensification rates, and classified them based on their distance from storm center and also by what quadrant of the storm they came from relative to the storm's direction of travel (front right, front left, rear right and rear left). Generally, a hurricane's right side relative to its direction of travel is the most dangerous. This is because a hurricane's wind speed is amplified by the speed of its steering winds. Storm surge is also higher on a hurricane's right side.
The team found substantial differences in relative-humidity levels between storm quadrants. One factor may be the shape of the Atlantic basin. Hurricanes in the Atlantic usually travel to the west or northwest -- regions that are drier, climatologically-speaking, than from where the storms originated. This causes the front two quadrants of Atlantic hurricanes to be drier than their rear two quadrants.
A unique result the team found is that in their front-right quadrants, rapidly intensifying hurricanes tended to have sharply higher amounts of upper tropospheric moisture near their centers than they did farther from their centers.
"We speculate that decreasing relative humidity levels farther from a storm's center may be an important factor in a cyclone's rapid intensification," said JPL co-author Hui Su. "A drier environment farther from a storm's center limits the development of its outer rain bands and favors the growth of its inner core. Conversely, a wet environment farther from a storm's center can weaken a cyclone by making it easier for rain bands to form outside the storm's core, which compete with the inner core's growth."
"Most scientists have tended to view hurricane intensification as a process that takes place within a cyclone's inner core and depends more on smaller-scale processes than on a storm's large-scale environment," said JPL co-author Bjorn Lambrigtsen. "This study shows a different path, and the usefulness of incorporating large-scale environmental data collected far away from a storm's center."
Su said NASA is exploring collaborations with NOAA forecasters to incorporate AIRS relative humidity data into NOAA's real-time hurricane prediction system.
For more on AIRS, visit: http://airs.jpl.nasa.gov/ .
The California Institute of Technology in Pasadena manages JPL for NASA.
// end //
|
Pranta, aka: Prānta; 6 Definition(s)
Pranta means something in Hinduism, Sanskrit, Marathi. If you want to know the exact meaning, history, etymology or English translation of this term then check out the descriptions on this page. Add your comment or reference to a book if you want to contribute to this summary article.
Prānta (प्रान्त) refers to a type of temple (prāsāda) classified under the group named Kailāśa, according to Samarāṅgaṇasūtradhāra chapter 49. The Kailāśa group contains ten out of a sixty-four total prāsādas (temples) classified under five prime vimānas (aerial car/palace), which were created by Brahmā for as many gods (including himself). This group represents temples (eg. Prānta) that are to be globular shaped. The prāsādas, or ‘temples’, represent the dwelling place of God and are to be built in towns. The Samarāṅgaṇasūtradhāra is an 11th-century encyclopedia dealing with various topics from the Vāstuśāstra.Source: Wisdom Library: Vāstu-śāstra
Vastushastra (वास्तुशास्त्र, vāstuśāstra) refers to the ancient Indian science (shastra) of architecture (vastu), dealing with topics such architecture, sculpture, town-building, fort building and various other constructions. Vastu also deals with the philosophy of the architectural relation with the cosmic universe.
Languages of India and abroad
prānta (प्रांत).—m (S) A subdivision of a country; a district, county, shire. See dēśa. 2 A region, tract, country. 3 A place or spot. 4 End, finale, ulti- mate state. Ex. hyā naṣṭārācapō barēpaṇīṃ prānta vhāvā kaṭhīṇa disatēṃ. 5 Edge, verge, margin, border: also extremity or end.Source: DDSA: The Molesworth Marathi and English Dictionary
prānta (प्रांत).—m A subdivision of a country; a district. A region, tract. A place or spot. End. Edge, extremity.Source: DDSA: The Aryabhusan school dictionary, Marathi-English
Marathi is an Indo-European language having over 70 million native speakers people in (predominantly) Maharashtra India. Marathi, like many other Indo-Aryan languages, evolved from early forms of Prakrit, which itself is a subset of Sanskrit, one of the most ancient languages of the world.
1) Edge, margin, border, skirt, verge; प्रान्तसंस्तीर्णदर्भाः (prāntasaṃstīrṇadarbhāḥ) Ś.4.8.
2) Corner (as of the lips, eyes &c.); ईषत्तिर्यग्वलनविषमं कूणितप्रान्तमेतत् (īṣattiryagvalanaviṣamaṃ kūṇitaprāntametat) Māl.4.2; ओष्ठ°, नयन° (oṣṭha°, nayana°).
3) Boundary, extremity.
4) Extreme verge, end; यौवनप्रान्त (yauvanaprānta) Pt.4.
5) A point, tip.
6) The back part.
Derivable forms: prāntaḥ (प्रान्तः).Source: DDSA: The practical Sanskrit-English dictionary
Prānta (प्रान्त).—adj. (see next two; = Pali panta, said to occur only with senāsana; Sanskrit as noun only, border, etc.), secluded, solitary, distant, remote, perh. sometimes with implication of in the jungle; orig. bordering, on the border (between jungle and settled country?): in Mvy °taḥ, alone, 2990 = Tibetan nags mthaḥ, forest border; 7224 = Tibetan mthaḥ, border; but in prānta(ṃ) śayyāsanaṃ 2988 = Tibetan bas mthaḥi, of border country; vṛkṣamūlāni prāsādikāni… prāntāni viviktāni Mv ii.123.17; prānto pravivikto iii.130.6, lonely and solitary; prānta-vāṭikā Divy 631.14; (bodhi- sattvaḥ) saputradāraḥ prānta (mss. prāpta) eva tu Jm 60.6 (paradox; tho with son and wife, he was quite solitary); prāntavane…abhinivasanti RP 31.14; prānta-śayyāsana (compare Pali, above) Mv ii.212.9; iii.422.9 (verse); RP 14.14; in Mvy 2988 printed prānta(ṃ) śayyāsanaṃ, Mironov °taṃ śa°, no v.l.; śayyāsanāni…prāntāni Mv iii.200.16; °ntāni ca śayyāsanāni 348.4; prānta-śayanāsana-(sevinas) Divy 312.9; prānta-śayanāsana-bhakta(ḥ) Divy 88.14; 132.21 (°śayana-bhaktā); 191.26; 538.17; 582.8; °tāni śayanāsanāni Divy 344.10; Av ii.119.12; °taṃ ca śayanā- sanam Ud xxxii.27(32).Source: Cologne Digital Sanskrit Dictionaries: Edgerton Buddhist Hybrid Sanskrit Dictionary
(-ntaḥ) Edge, margin, border, end. E. pra before, anta end.Source: Cologne Digital Sanskrit Dictionaries: Shabda-Sagara Sanskrit-English Dictionary
Sanskrit, also spelled संस्कृतम् (saṃskṛtam), is an ancient language of India commonly seen as the grandmother of the Indo-European language family. Closely allied with Prakrit and Pali, Sanskrit is more exhaustive in both grammar and terms and has the most extensive collection of literature in the world, greatly surpassing its sister-languages Greek and Latin.
Search found 29 related definition(s) that might help you understand this better. Below you will find the 15 most relevant articles:
Prāntastha (प्रान्तस्थ).—a. one who inhabits the borders.Prāntastha is a Sanskrit compound cons...
Prāntapāla.—(IE 8-3; EI 18, 29, 31), warden of the marches; also explained as the governor of a...
Kṛta-prānta.—cf. sa-kṛta-prānta (IE 8-5), Prakrit sa-kuta- ppanta; probably, demarcated boundar...
Sa-kṛta-prānta.—cf. Prakrit sa-kutu-ppanta (EI 26), ‘together with the demarcated boundaries’; ...
Paṭalaprānta (पटलप्रान्त).—the edge of a roof.Derivable forms: paṭalaprāntaḥ (पटलप्रान्तः).Paṭa...
Prāntabhūmau (प्रान्तभूमौ).—ind. finally, at last. Prāntabhūmau is a Sanskrit compound consisti...
Prāntavirasa (प्रान्तविरस).—a. tasteless in the end. Prāntavirasa is a Sanskrit compound consis...
Prāntaga (प्रान्तग).—a. living close by. Prāntaga is a Sanskrit compound consisting of the term...
Nagaraprānta (नगरप्रान्त).—a suburb. Derivable forms: nagaraprāntaḥ (नगरप्रान्तः).Nagaraprānta ...
Prāntabhūmi (प्रान्तभूमि).—final place or term. Derivable forms: prāntabhūmiḥ (प्रान्तभूमिः).Pr...
Karṇaprānta (कर्णप्रान्त).—the lobe of the ear. Derivable forms: karṇaprāntaḥ (कर्णप्रान्तः).Ka...
Prāntadurga (प्रान्तदुर्ग).—a suburb outside the walls of a town, a town near a fort. Derivable...
Prāntanivāsin (प्रान्तनिवासिन्).—a. dwelling near the boundaries. Prāntanivāsin is a Sanskrit c...
Yauvanaprānta (यौवनप्रान्त).—the verge of youth. Derivable forms: yauvanaprāntaḥ (यौवनप्रान्तः)...
Prāntaśūnya (प्रान्तशून्य).—a. see प्रान्तरशून्य (prāntaraśūnya). Prāntaśūnya is a Sanskrit com...
Search found 7 books and stories containing Pranta, Prānta; (plurals include: Prantas, Prāntas). You can also click to the full overview containing English textual excerpts. Below are direct links for the most relevant articles:
Brihad Bhagavatamrita (by Śrīla Sanātana Gosvāmī)
Verse 2.6.363 < [Chapter 6 - Abhīṣṭa-lābha: The Attainment of All Desires]
Verse 2.4.47 < [Chapter 4 - Vaikuṇṭha: The Spiritual Kingdom]
Verse 2.5.249 < [Chapter 5 - Prema: Love of God]
Sri Bhakti-rasamrta-sindhu (by Śrīla Rūpa Gosvāmī)
A Brief Outline of Buddhism (by U Po Sa)
Yoga Sutras with Vedanta Commentaries (by Patañjali)
Shri Gaudiya Kanthahara (by Srila Bhaktisiddhanta Sarasvati)
The Mahavastu (great story) (by J. J. Jones)
Chapter XXXI - The Jātaka of Ājñāta Kauṇḍinya < [Volume III]
Chapter XIV - The great renunciation < [Volume II]
|
Electrical stimulation of the brain through the vagus nerve increases the motivations to work for food, according to recent findings of a research group at the University of Tübingen. These findings, which were presented at the annual meeting of the Society for the Study of Ingestive Behavior this week in Utrecht, Netherlands, demonstrate a novel method to alter motivation to obtain food.
“Vigorous work is costly and has to be recuperated by energy intake. That makes it vital for us to know when it is worth the effort. The vagus nerve helps set the tone for actions by signaling, for example, if energy is readily available for that action or not,” says Dr. Nils B. Kroemer, the Principal Investigator of the study and junior group leader of the University’s Neuroscience of Motivation, Action, and Desire Laboratory (neuroMADLAB) . “We knew that vagus nerve stimulation changes dopamine levels in animals and that chronic stimulation improves depressive symptoms in humans, but it was not known if it could acutely improve motivation. We found that it may provide a much-needed technique to rapidly change reward-related behavior such as eating.”
The researchers invited 81 hungry participants to their laboratory on two occasions. Everyone was offered a tasty breakfast, but there was a catch. Participants had to exert physical effort to win reward points that could be “cashed in” for their favorite cereals. At one of the two sessions, participants completed the task while receiving electrical stimulation of the vagus nerve; during the other session, they received placebo stimulation. Results showed that stimulation boosted how vigorously participants exerted effort for the rewards at stake compared to the control condition.
“This ambitious experiment is one of the first to study motivational changes during acute vagus nerve stimulation,” said Monja P. Neuser, a Ph.D. student in the neuroMADLAB and lead study author. “The motivational effects elicited by the stimulation are very promising and encourage us to further unravel the exact neural mechanisms. We think that the stimulation increases dopamine levels in the brain, which is known to enhance vigor. “
By using concurrent functional neuroimaging, researchers of the neuroMADLAB will continue investigating how non-invasive vagus nerve stimulation can be administered to maximize its benefits. Most notably, researchers plan to apply this technique in people suffering from anhedonia — an absence of desire to engage in normally pleasurable activities such as eating — to determine whether it increases their motivation to seek out and consume food.
Source: Read Full Article
|
Organisation’s aim: The BirdLife International Partnership strives to conserve birds, their habitats and global biodiversity, working with people towards sustainability in the use of natural resources. BirdLife is the world’s largest partnership of conservation organisations, all who have the aim of conserving birds, their habitats, and global biodiversity.
BirdLife International was founded in 1993, previously known as the International Council for Bird Preservation, which had been founded in the 1930s.
Other projects and activities
As well as BirdLife’s in-country and regional conservation, capacity building, advocacy and awareness-raising work, they work on a number of international programmes:
- Climate change: developing a shared position for the BirdLife partnership on climate change;
- Forests of Hope programme: aiming to prevent destruction of natural forest across different sites, totalling five million hectares by 2015, through forest conservation management work and national and international policy and advocacy work;
- Seabirds programme: to address seabird conservation issues;
- Birdlife’s Flyways: a programme which uses BirdLife global network of partners to conserve migratory species;
- Important Bird Areas: selecting important sites for bird conservation.
CEO: Patricia Zurita
The David Attenborough Building,
1st Floor, Pembroke Street,
Cambridge, CB2 3QZ,
|
What is a hiatal hernia?
A hiatal hernia is an esophageal condition that occurs when part of the stomach or other intra-abdominal contents have abnormally protruded through the diaphragm into the chest.
Hiatal Hernia Types
Hiatal hernias may be classified into different types depending on the position of the gastro-esophageal junction relative to the diaphragm and the degree to which organs have herniated into the chest.
A less common type of hiatal hernia is a paraesophageal hernia, which happens if the gastroesophageal junction remains in its proper place and a fold of the stomach slips into the chest, pressed between the gastroesophageal junction and the diaphragm.
Hiatal Hernia Causes
The exact cause of hiatal hernias is typically not known but they may result from and be made worse by any condition that results in increased abdominal pressure, such as:
- Persistent cough
- Straining from constipation
- Heavy lifting (usually repetitive, like for an occupation)
Hiatal Hernia Symptoms
Hiatal hernias may not cause any symptoms or may cause heartburn that is worse when you lean forward, strain or lie down.
Other symptoms include:
- Chronic belching
- Chest or abdominal pain
- Difficulty swallowing
Hernia-like symptoms should be addressed immediately, as they may develop into more serious problems requiring emergency surgery.
Diagnosis of Hiatal Hernia
Your doctor may order one or more of the following tests:
- Chest X-ray
- Esophagoscopy: A thin, lighted tube is inserted down the throat to inspect the esophagus
- Barium swallow: The path of the barium can outline the position of the hernia in the chest or can show if stomach contents are leaking backward into the esophagus
- Manometry: This test diagnoses abnormal muscle movements inside the esophagus
- CT scan
Hiatal Hernia Treatment
Most people with hiatal hernias do not require surgical treatment. When associated with reflux symptoms, hiatal hernias can be treated similarly to heartburn, which could include lifestyle modifications or medications like proton pump inhibitors or other acid blockers.
Fewer than 5 percent of people with hiatal hernias require surgery. You may need surgery to repair the hernia if you have persistent reflux symptoms or inflammation of the esophagus (esophagitis) that does not heal with medication. Surgical hernia repair is often done laparoscopically, which allows for a shorter hospital stay, less pain and a quicker recovery.
|
Comb filtering occurs when a sound adds to itself within a short time interval. This interval typically ranges from less than one ms to approximately 25 ms. Comb filtering can emerge in two ways:
- Due to reflections
- Because more than one microphone is open and picking up the same signal at different positions.
In addition, in order for comb filtering to occur, the levels of the signals must be within 10 dB from each other. This phenomenom is called comb filtering because the effect acts as a filter with a frequency response looking like a comb for the hair.
This curve shows the resulting filter response of a direct sound and a delayed sound when added. This filter function could be the result of a single reflection picked up by the microphone or it could be the result of adding the signals of two microphones of which one is 0.6 m (1.9 ft) further apart compared to the other.
Comb filtering caused by reflections
Sound is reflected when it hits hard surfaces, like a floor, a wall, a window - or even when the sound hits a water surface.
When making a recording setup, it is important to look for reflecting surfaces near the microphone. Even the musical instruments, such as a piano, a cello, a double bass, a kick drum, etc., that you are recording may act as reflectors. In addition, loudspeaker cabinets and amplifiers can generate comb-filtering challenges.
Choosing directional microphones can help, but you should always prioritize better positioning.
In film sound, it can be a problem to record the dialog of people talking facing a window, whether they be in a room, car or other setting.
Reflections from nearby surfaces cause comb filtering.
In situations where you, for instance, are measuring the frequency response of a PA-system, you will also experience the comb-filtering problem. You may have heard it at an empty venue, if the system is playing pink noise, when walking the empty floor from the back to the front it sounds more or less like a jet plane taking off. (The problem disappears when an audience fills the floor).
Top: The microphone points its "deaf end" at the sound source and only a small amount of sound is picked up (off-axis).
Bottom: A reflecting surface makes the sound bounce back into the microphone’s sensitive end (on-axis).
Pink noise from a loudspeaker is recorded by a 4011 Cardioid Microphone from its' backside. Then a guitar body is put in front of the microphone perpendicular to the direction of the sound field. Now the sound is reflected back into the front of the microphone. This is done twice. The distance between loudspeaker and microphone is 1.5 m (4.9 ft). The distance between guitar body and microphone is 10 cm (3.4 in).
The same as above; however, now the guitar body is put in front of the microphone at reflecting angle of 45° to the direction of the sound field.
Comb filtering caused by several open microphones
The other way to create comb filtering is by having more than one microphone open simultaneously. In a talk studio, sometimes you can hear that the host’s microphone may sound a little muddy, while the interviewed guest’s microphone sounds much cleaner. Why? The host is speaking loud, so the host’s microphone is somewhat attenuated. The guest may speak in a weaker voice; thus, this microphone is turned up. So, the voice of the host is picked up by two microphones with some distance between them. The guest is literally only picked up by the nearest microphone as the other microphone is further away and even attenuated.
In addition, microphone setups for panel discussions or choir setups may generate the filtering. In fact, the problem even exists when using headset microphones on stage – the voices of two actors standing close may be picked up by both microphones.
Avoiding comb filtering
If the problem is caused by reflecting surfaces, you can remove the reflector. However, sometimes it is enough to turn/move the reflecting element and redirect the reflections. Furthermore, using absorbing material on the reflecting surface may help.
In some cases, it is possible to place the microphone so close to the reflecting surface, that there is no delay between the direct sound and the reflected sound. In the instance mentioned above of a person looking out the window while talking, or in the car, it is sometimes better to place the microphone on the window glass or the windshield. In this way, it becomes a boundary layer microphone.
If several open microphones are causing the comb filtering, there is a (golden) rule:; Attenuate delayed sound picked up by the microphone by at least 10 dB to minimize the problem of comb filtering.
The 3:1 rule
As mentioned, when several microphones are used simultaneously, the same sound source is often picked up by more than one microphone.
In this case, the distance between the sound source and microphones comes into play. The golden rule is that a neighboring microphone should be at least three times further away, (given the sensitivity and the gain is the same on both microphones).
(20 *log (1/3) ≈ -10 dB).
However, if you arrange two or more microphones at an equidistant lineup, the distance between the source and the neighboring microphones, in theory, should be 4.5:1 (again given the sensitivity and the gain is the same on all microphones).
However, when using directional microphones, the directionality of the microphones comes into play. In this case, a distance factor of 3 is normally ok even though there are two neighboring microphones. So, apply the rule like this: The distance to neighboring microphones should be at least three times that of the distance to the primary (nearest) microphone.
As mentioned, the sensitivity and the gain of the individual microphones play a role. If one microphone has a higher gain than the other microphones, it will pick up more of the distant sound.
What comb filtering sounds like
The file contains a male voice originally recorded in mono. The signal is added to itself at the same level and with a delay of 0 ms, 1 ms, 10 ms, 20 ms, 50 ms, and 100 ms respectively.
Notice that the sound is clear and well defined when the added sound is not delayed. However, at a 1 ms delay, the timbre of the sound is colored. Increasing the delay makes the sound more “robotic”. When the delay is 50 ms, the ear begins to perceive the delayed sound as an echo, which is even more evident at 100 ms delay.
The file contains a male voice originally recorded in mono. The signal is added to itself at a reduced level (5 dB attenuation), and with a delay of 0 ms, 1 ms, 10 ms, 20 ms, 50 ms, and 100 ms respectively.
The coloration of the 1 ms delay is now less noticeable. However, when the delay increases the effect of the delay is still very audible.
The file contains a male voice originally recorded in mono. The signal is added to itself at a reduced level (10 dB attenuation), and with a delay of 0 ms, 1 ms, 10 ms, 20 ms, 50 ms, and 100 ms respectively. Notice that the 3:1 rule provides a 10 dB reduction at the microphone that is three times further away.
The coloration of the 1 ms delay is now almost unnoticeable. However, when the delay increases the effect of the delay is still audible.
The file contains a male voice originally recorded in mono. The signal is added to itself at a reduced level (15 dB attenuation), and with a delay of 0 ms, 1 ms, 10 ms, 20 ms, 50 ms, and 100 ms respectively. Notice that the 3:1 rule provides a 10 dB reduction at the microphone that is three times further away.
The coloration of the 1 ms delay is inaudible. Even the 10 ms and 20 ms delays are hardly noticeable. However, when the delay increases to 50 and 100 ms, the effect is still clearly heard.
General rules from psychoacoustics
We know from various psychoacoustic studies that any delayed sound that arrives within the first 15 ms after the direct sound (for instance in the form of a reflection or recording by two microphones on one channel) should be attenuated by 15 dB. Another rule (from another study) is that all reflections within the first 20 ms should be attenuated by at least 20 dB.
Why we only use a 10 dB reduction in the general microphone technique is due to the fact, that often other sounds sufficiently mask the coloration, especially in sound reinforcement.
Delay due to 3:1 rule
In the diagram below, you can see the delay between two microphones of which one is placed three times further away compared to the nearest microphone (according to the 3:1 rule). The calculation is based on normal room temperature (20⁰C/68⁰F).
How to use this diagram:
Define the distance to the nearest microphone and find it – cm or inch – on the X-axis.
From that point go vertically upwards until you hit the curve (blue if you use cm or red if you use inches). Now, look at the corresponding value on the Y-axis to find the related delay.
Example: The distance to the nearest microphone is 100 cm (hence, the distance to the second microphone is 300 cm). The blue curve at 100 cm corresponds to a delay of 6 ms.
Hass, H: Über den Einfluss eines Einfachechos auf die Hörsamkeit von Sprache. Acoustica. (1951).
Brixen, Eddy B.: Audio Metering. Focal Press 2010, ISBN 13: 9780240814674.
Brixen, Eddy B.; Voetmann, Jan: Electroacústica Práctica. Editorial Tebar. ISBN 978-84-7360-482-6, 2013. ISBN 978-84-7360-625-7, 2018.
|
In an attempt to raise awareness about the overall inequality women in China face, various groups have been performing an assortment of “stunts” in the hopes to provoke a positive response in favor of feminism in China.
Within the past few years, displays have included women wearing wedding dresses covered in red in an effort to stand up to domestic violence, disapproving of the lack of female facilities by participating in “Occupy the Men’s Toilets” and shaving their heads to address the more demanding requirements women need to meet to attend college.
While feminism is not as widespread in China as some of these activists would like, it is by no means a new movement. In the 19th and 20th centuries, women such as Lin Zongsu fought for female suffrage and women such as Qiu Jin wrote and spoke out about the practice of footbinding and the limited education of young girls.
Li Mizai explains to a Guardian reporter that despite the plethora of past feminist figures the activists use for inspiration, “gender discrimination is getting worse.”
Only two women serve on the politiburo and “the proportion of women on the party’s 200-strong central committee has slipped to less than 5 percent, lower than in Mao’s day.” Less than a fifth of land use contacts are in or include the name of the wife, and in 2011 rights to marital property were legally reduced. Moreover, the percentage of urban working women has decreased from 77 percent to 61 percent in the past two decades.
Part of the discrimination starts at birth, and while the gender gap has decreased in the past two years, there are still 118 male births for every 100 female births.
Interviewee Xiao Men comments that although sex discrimination is illegal in the work place, companies are unlikely to receive legal punishment for such actions. She comments that “when women face discrimination they don’t fight against it because they weren’t raised this way, and even if they try to, they don’t know how to do it. I think all women know something’s wrong, but they don’t know what it is or why.”
Activists, however, have not been discouraged thus far, and keep advocating for women’s equality across the country by trying to make women recognize their right to advocate for themselves.
– Jordyn Horowitz
|
Nuts are powerful for our health. The evidence is in and there’s a lot of it. Nuts, such as cashews, walnuts, hazelnuts and almonds, can reduce the risk of death from diabetes by 40 percent, cut heart disease by 30 percent, and reduce the risk of cancer by 15 percent. They also lower the risk of high blood pressure and gall stones, and can even lower cholesterol and triglycerides. Even more good news – it only takes a handful or two of nuts two or three times a week to gain these benefits. Read more
Tag Archives: hazelnuts
Good news for nut lovers: Nuts do more than add texture and flavor to meatless meals such as salads, veggie burgers, and pilafs—they also add nutrients. Nuts have protein, vitamins, minerals and fiber. They also have excellent array of phytonutrients and some are very high in omega 3 essential fatty acids. Nuts have been shown to lower the risk of many common diseases such as heart disease, high blood pressure, inflammation and some cancers.
Some nuts of note: Chestnuts are actually low in calories and contain some very special probiotics. Hazelnuts have high levels of phytonutrients especially if the skin is eaten with the nut. Pistachios are a good choice for those looking for extra fiber as they contain as much fiber as oatmeal. Walnuts are an excellent source of Omega 3 essential fatty acids. Just one ounce of walnuts contain a full day’s requirement. Cashews are a good source for zinc, one of the harder to find minerals. Almonds are a good choice for vitamin E and calcium.
A little goes a long way when it comes to nuts. A one ounce serving five to seven times a week is all that is needed to reap the benefits. Beware of nut spoilers! Many nuts are sold fried in oil and heavily salted. This is a shame because it spoils to some extent the health value of nuts and overshadows their desirable natural nutty taste. Instead choose dry roasted unsalted nuts. When shopping, buy whole nuts and chop them yourself; small chopped pieces are more vulnerable to oxidation (exposure to air, which can make them stale). Store nuts in a cool place to help keep them fresh.
When considering the crunch factor, don’t forget about seeds. Chia seeds and flaxseeds are excellent choices for omega 3 essential fatty acids. Hemp seeds are a good choice for fiber and protein. Sesame seeds are a good choice for those looking for some extra calcium in their diet. Pumpkin seeds have a generous amount of zinc.
Just as with nuts, a little goes a long way. Seeds need only be eaten in moderation for the best health benefit. Also beware of seeds fried in oil and then salted. Look for dry roasted unsalted whole seeds for both best flavor and health. For storage and best shelf life only chop or grind seeds just before you use them.
Nuts provide an almost endless variety of scrumptious culinary uses. We recommend The Nut Gourmet by Zel Allen, a cookbook that features 150 plant-based recipes that put nuts at center stage.
|
This discussion about the science and technology underpinning the plant was broadcast on Today with Sean O’Rourke on (08/08/16)
Dubliners and visitors to the city in recent months may have noticed a huge addition being made to the skyline with a large structure under construction next to the two iconic chimney stacks at the Poolbeg ESB Station at Ringsend.
This is Dublin’s first ‘waste to energy’ plant, which its opponents, and there are many, would prefer to call an incinerator. According to its operators, Covanta, it will be capable of handling 600,000 tonnes of black bin waste, the vast majority of which will come from the city and the three Dublin county council areas
The plant will begin operating here in September 2017. Covanta state that it will convert waste from the city’s black bins – most of which would otherwise end up in landfill – into electricity for the grid and reduce our reliance on fossil fuels.
I went along to the plant last week (4/08/16) to see how the construction phase is progressing, and to have a look at some of the engineering and science that will underpin the plant’s operation.
The Dublin waste to energy plant, or incinerator, is a highly contentious project. The story dates back to the late 1990s when the plan for an ‘incinerator’ or ‘waste to energy plant – the name depends on your view on it – was first mooted.
At that stage it had become obvious that Ireland needed to be able to tackle its own waste, rather than simply putting it into landfill, or exporting it.
In 2005 Dublin City Council awarded the contract for the plant to a Danish company called Elsam. Elsam was subsequently bought out by DONG energy generation, another Danish company. In 2007 the City Council sent a letter agreeing to engage DONG and Covanta Energy, a US company, to design build operate a Dublin waste to energy plant as a joint venture.
The EPA gave the plant a licence in 2008 and after the Commission for Energy Regulation gave authorizations to allow the plant to generate and supply energy (via electricity) in September 2009 there was a green light to start building.
It didn’t happen, and construction was suspended because the companies were unable to obtain a foreshore license to allow a development to take place on the coastline. The Minister for the Environment at the time, John Gormley, was opposed to granting the license and represented the local Dublin 4 area.
Finally, the license was granted, and Covanta re-commenced construction in 2014. There is significant progress now at the site, with the main structures in place, and it will began to accept waste from the local area in September 2017.
Covanta, is US based, but has built many ‘waste to energy’ plants on this side of the Atlantic and is looking to expand further into Europe. The firm has about 30 years of experience operating 45 ‘waste to energy’ facilities around the world.
Covanta like to think of themselves as being in the recycling business because they recycle about 500,000 of metals from the residual bottom ash left behind after municipal waste is incinerated or burned.
The majority of Covanta plants are based in the US and the company claim that there facilities there operator up to 90% better than government standards require.
In Dublin, they have an almost exclusively Irish management team, and have been able to easily hire people with the required expertise based here, or to lure back Irish people that have worked on waste to energy plants overseas.
The Poolbeg site for the plant is currently a hive of activity, with construction workers in yellow safety jackets, and helmets everywhere to be seen, swarming over the site. There is a sense of purpose, organisation and urgency as the company are working to a tight deadline and they are determined to began accepting waste in September of next year from local waste operators as they are required to do.
There are all manner of specialist construction workers at the site, as the piece of this gigantic puzzle are put into place. It is like watching a large football stadium, or a huge cruise liner being built, and it’s fascinating to watch.
Most informed observers agree that Dublin, and Ireland, has a major problem with its waste, most of which is being exported.
There is very little capacity to deal with the large amount of waste being produced in the Dublin region, and Ireland as a whole, as there are just 5 landfills operational here that accept waste, and there is little or no likelihood of new landfills being set up as they are a health risk and no-one wants them.
This has been the situation for many years now, and what Ireland has been doing is exporting its waste, both its hazardous wastes, and the ‘ordinary’ black bin household waste overseas by ship, where plants in other countries burn the waste and recover energy, and dispose of the unusable or dangerous remnants.
The EU wants member states, and regions to deal with their waste in their own area, and this is also a key part of our national and regional waste policies here. That means that Dublin must deal with its own waste in Dublin, rather than the situation where hundreds of thousands of tonnes of waste are sent to towns like Drogheda and Arklow where they are ‘bailed’ and exported by ship. This is wrong in principle and storing waste like this represent a fire and health risk too.
We currently export about 560,000 tonnes of waste from Ireland each year, and the new Covanta plant has a capacity for about 600,000 tonnes.
Recycling does not appear to be solution to our waste problems, as even if we hit the predicted recycling rate here of 45-50% by 2020 there will still be a substantial amount of waste that has to be dealt with one way or another.
The waste that we produced can, with this plant, be put to good use to produce electricity and to reduce the need to important fossil fuels, such as gas from Russia and oil from the middle east, which are burned to produce electricity.
We need it. If we don’t, then in the absence of new landfill sites, the EU could decide that Ireland is no longer permitted to export its waste on a massive scale in contradiction of EU policies, and our own national policies. The EU have been very patient with us on this issue, going back almost two decades now.
The plant is huge. Is located at the end of South Bank Road, which is off the roundabout at Ringsend as you head south onto the coast road past Sandymount for those that know Dublin. It is next to the Poolbeg Power Plant, and beside the Irish sea, the river liffey, a sewage treatment plant, and a nature reserve.
The shape of it is very distinctive, it is very sleek and modern, and reminded me of a streamlined version, without the lifeboats and all the extras, of the kind of large cruise liner that we have grown used to seeing in Dublin Port these days.
The footprint of the plant covers about 3 football pitches, and at 52 metres at its highest point, it almost identical in height to the nearby Aviva Stadium, which is 4 metres shorter.
There will be two chimney stacks, which are not yet in place. These will be 100 metres tall, and from which will emerge, the company state, mostly water vapour at the end of the waste-to-energy process. That can be compared to the existing Poolbeg stacks, which stand at 207 metres, more than twice as tall.
The design is a kind of shell-like wrap around design, and the Covanta manager said that about 100 million euro was spent on design, to make the plant better fit in with its surroundings. In my opinion they have done a pretty good job in that, as it doesn’t look like a typical dirty power plant or industrial factory site.
In terms of the materials, there will be an extraordinary amount put into the construction such as 6,000 tons of reinforcing steel, enough concrete to fill about 6,500 concrete trucks and enough vertical supporting piles to run – if all the piles were laid out on the ground – the 64km from Poolbeg to Kildare town.
Waste to energy
When the plant is up and running, it will operate 24-7, although it is not permitted to take waste on a 24 hours basis.
The waste trucks will arrive from around Dublin – the busy time is often the mornings at these plants I’m’ told – they will be weighed and checked in before they go to a tipping hall when they unload their waste in a designated ‘bay’.
The waste will be unloaded out onto the floor and then put into a huge storage pit and thoroughly mixed before being lifted with a big mechanical grabber and put into what are called ‘hoppers’, and from the hoppers the waste travels to the combustion area where it is burned.
In the combustion chamber the waste will be burned at about 2,000F and the combustion a single load of waste from a hopper takes one or two hours. As waste is burned the heat will convert water in the steel tube lined walls that rise through ‘boiler tubes’ where it is superheated.
The steam will turns a turbine driven generator to produce electricity. The electricity produced by the turbine generator is will be exported to the grid for use by homes and business in the immediate Dublin 4, south city area.
Steam from this electricity generating process will be condensed back into water and returned to the boiler tubes, giving a efficient ‘closed loop’ system.
After this process, the volume of waste, Covanta tells me, will be reduced by 90%, with mainly ash and metal remaining. The ash can be landfilled or re-used. The metal such as iron and steel are recovered for re-use.A separate process recovers other metals like aluminium and copper.
The plant has pollution control equipment to ensure, the company states, that emissions are below limits to protect human health.
The Environmental Protection Agency (EPA) can come onto the site whenever they wish, and they can access Covanta’s emission monitoring computers.
The goal, Covanta say is to have real time information on emissions available to whomever is interested on the company website when the plant is running.
In terms of air pollution, acid gases will be neutralised using lime and a scrubbing, or cleaning, process, and carbon will be injected into the gaseous mixture for better control of heavy metal emissions.
Small particulates – which can cause human health problems, particularly breathing difficulties – are removed as emissions pass through a ‘bag house’. This uses thousands of fabric filter bags to catch and hold particulates.
All gases pass through the bags before leaving the stack. The control room monitors emissions through a real time emissions monitoring system and controls steam flow and other automated processes in the plant.
In Dublin, Covanta are using the nearby Liffey water to act as a coolant in the plant, and they are capturing rainwater and surface water for the same purpose.
The plant will produce 60 megawatts of electricity per year, enough to heat 80,000 homes, and to provide district (local) heating for 50,000 homes.
It makes use of ‘grey water’ from the nearby sewage treatment plant – which would otherwise require energy to be further treated – to cool the process, which is important, as temperature regulation is central to the safe and efficient operation of the plant.
Most importantly, it has the capacity to take up to 1,800 tonnes of black bin waste per day, and up to 600,000 tonnes per year.
This will greatly benefit our environment, as some of this waste may have been going to landfill, which has health and safety risks attached. It will help us to comply with the EU requirement that we deal with our own waste, and it will mean that waste is dealt with close to where it is produced in Dublin and not stored around the city, or in port towns where it can be a fire or health risk. This was caused by waste storage and it was a dangerous fire.
It should also be remembered that in many places in Europe plants like this are welcomed by ‘green’ political parties as they help move us away from landfill, and promote the idea that waste should be treated as a recoverable resource.
A note of caution was sounded when it was reported last month by The Irish Times that a Covanta run plant in Canada did not meet emissions targets on dioxins and furans as set out by the Canadian Ministry of Environment.
I asked Covanta, based on that story, how could they reassure people in Dublin that the plant there was safe and would meet emissions targets.
Covanta responded that they had measures in place in the Canadian plant to shut it down as soon as a problem arose on one of two emissions stacks. This ensured that there was no risk to the environment or health of local residents, and that this was, Covanta told me, confirmed and supported by the Canadian authorities.
Furthermore, Covanta said all emissions from the Dublin plant will be independently monitored and verified by the Environmental Protection Agency.
Statement in full (for those that are interested) below from Covanta in response to my question about the issue that arose at Canadian plant.
A stack test in May 2016 at the Canadian plant indicated that the limit for dioxins and furans were exceeded on one line. The emissions exceedance for this unit was not representative of normal operations and previous stack tests and engineering runs have demonstrated compliance. Unit 2 continues to operate without issue with dioxin emissions at only 20% of the permitted levels.
While the emissions for unit 1 exceeded the limit at the stack, ambient air monitoring results of dioxins and furans upwind and downwind of the Canadian plant were well below the air quality standards set by the local environmental regulations. Soil sampling was also done and the testing found no elevated levels of dioxin/furans. The testing regime that Covanta had in place in Canada enabled the shut-down of Unit 1 as soon as the problem arose and thus ensured there was no risk at all to either the environment or the health of local residents which was confirmed by the relevant authorities.
The Dublin plant is technically different from the Canadian plant in many ways and the Poolbeg waste-to-energy process provider has successfully delivered 29 new plants across Europe since 2000 – 10 of these in the last 5 years and without any environmental incident. In addition Dublin Waste to Energy has invested heavily in experienced management and staff for the Poolbeg plant which will ensure smooth commissioning, start-up and operations.
The emissions limit values permitted for the Dublin plant have been set out by the EPA in accordance with best practice and EU legislation. In addition, the frequency and testing regime has been set out by the EPA and all emissions (in addition to be monitored by DWtE) will be independently monitored and verified by the EPA. As an indicator of Covanta’s diligence and commitment to the monitoring of stack emissions to ensure continuous compliance to the EU requirements, the plant has a full CEMS (Continuous Emission Monitoring System) as a stand-by to the two CEMS systems which monitor the emissions from the two lines.
|
Arrival February 2012
The nation of Cuba consists of the main island of Cuba, the Isla de la Juventud, and several archipelagos.
In 1492, Christopher Columbus landed on what is now the island of Cuba and claimed it for the Kingdom of Spain. Cuba remained a colony of Spain until the Spanish–American War of 1898, after which it came briefly under the administration of the United States until gaining formal independence in 1902. Its fragile democracy became increasingly dominated by radical politics, and while the Cuban Constitution of 1940 sought to strengthen its democratic system, the country came under the dictatorship of former president Fulgencio Batista in 1952, who intensified already rampant corruption, political repression and crippling economic regulations. Growing unrest and instability led to the ousting of Batista in January 1959 by the July 26 movement, which afterward established a new administration under Fidel Castro. By 1965, the country had developed into a single-party state under the revived Communist Party of Cuba, which holds power to date.
Cuba is the largest island in the Caribbean, and with over 11 million people, it is also the most populous, albeit with a much lower population density than most Caribbean nations. Its people, culture, and customs draw from diverse sources, such as the aboriginal Taíno and Ciboney peoples, the period of Spanish colonialism, the introduction of African slaves and its proximity to the United States.
Cuba is a poor developing country but it still has a both high life expectancy and literacy rate. The country operates a national health system and assumes fiscal and administrative responsibility for the health care of all its citizens; the infant death rate is lower than some developed countries, and the average life expectancy at birth is 78 years Cuba has a 99.8% literacy rate with free education at every level. According to the United Nations, Cuba was the only nation in the world in 2006 that met the World Wide Fund for Nature's definition of sustainable development, with an ecological footprint of less than 1.8 hectares per capita and a Human Development Index of over 0.8 for 2007
Jamaica is a Commonwealth realm with Elizabeth II as Queen of Jamaica and head of state.
13 March 2012
Fourteen days in Cienfuegos are a long time, unless you have a good crowd around you, most of the „Port Antonio-gang" arrived here almost at the same time. We had to wait for our go ahead from the boat insurance that we are allowed to go west of 90°. Some of the others went to Havanna with their bikes on the roof of the taxi, others flew or went by bus. Havanna seems to be the place, everyone thoroughly enjoyed it. We went to Trinidad and thought it was a bit overated, very touristy with the usual traps, an afternoon is plenty. We are planning to go to Havanna by boat after we have spent the hurricane season in the Rio Dulce.
We are now in Cayos Logos, one of the Islands reserved for tourists only, lots of white sandy beaches, beautiful water, palm trees, reefs for snorkeling. Nice, but not the real Cuba, it could be anywhere in the Caribbean. Cubans come here only to work for 20 days on and one week off . There is no school, no hospital or village shop or farm garden anywhere, just Hotels, bars and restaurants and an international airport. All so different to the many islands we went to in the Jardines de la Reina. Or to Marea de Papillon, everyone tried to get us into their houses and sell some of their produce, at dusk the fishermen came swimming out to our boat with eggs and tomatoes and wanted to sell diesel, which they would have swam out to our boat at night, for at least a mile to our anchorage. We have seen a lot of very creative art and handcrafted things and of course the old cars, just amazing!
The marinas are in a very bad state of repair, the tap water smells and is salty, food supplies limited (no limes for your lobster or mojito ). Still, we love to come back to this country, our heart goes out to these wonderful people of Cuba.
15 February 2012
I have about 30 sec. , we enjoy Cuba, speak to you later. I wrote that sentence almost two month ago in a hotel lobby, where you had access to a computer. The Cuban internet is prehistoric, painfully slow and very scarce to have. We are in Mexico now and have internet access on our boat, nice..but ...
The passage from Jamica to Cuba started with some strong winds and after two thirds of the way I put the engine on during my nightwatch, the wind just died down completely. We buddied with the German boat "Nirvana", they caught a Blue Marlin of 2,3 m , never heard of a sailboat catching a Marlin! It took Rolf over an hour to reel the fish in, it put up a mighty fight. We ate the fish in the Yachtclub prepared by the Cuban staff - what a toughy that was, very dry meat from that athletic fish, did not enjoy it much, in fact I could not eat it at all.
The checking in procedure was lengthly and very repetitive, we had 6 people coming aboard from different departments, the sniffer dog was cute, as much as the handler. All were very courteous and some spoke a bit of English. I had to show the boat to all of them and it was more like a visit than a serious search. Only one of them asked for something, he wanted a USB stick and Richard gave him an old one, he was very disappointed it was not 2 GB, days later another wanted a razor and was overjoyed when I gave him the whole packet. Things like that they can only buy in the Panamerican shops with hard currency.
The habour of Santiago de Cuba it indeed very polluted, you can see it, smell it and feel it everywhere, our boat looks dreadful, will take endless hours of polishing and cleaning. But I think it is worth it. Santiago is a very special place. We took a local bus into town, which is 16km away from the Marina, you have to make sure you take a seat before it is too late you will be squashed and you will not be able to hang onto anything. Walking down the "Music Street" during daytime hours is quite something, you come to the famous "Buena Vista Social Club" and there will always be somebody singing and playing the guitar or a band playing in one of the many café´s or bars. At night you have to pay entrance fees and put up with big loudspeakers, lovely to watch people dance. Taking Salsa lessons is one of the tourist attractions, as well as Spanish lessons.
29 March 2012
Surfing, what a pleasure it was, jumping from the boat straight onto our surfboards. We had four super surfdays in Cayo Largo, we could zoom up and down the lagoon from one shallow spot to the next. I can´t remember a more enjoyable surfsession. I did not have to share my board this time, since Richard could use his small board in this lovely strong breeze as well. Sailing or Surfing? I take the surfing any day, its like riding a motorbike compared to riding a bus.
We had a wonderful time in Cayo Largo, meeting lovely people, lots of long beach walks, always ending up our round at the Dolphin show, which made us laugh every time, when the people were lifted up by two dolphins and stood on their noses screaming with joy and surprise. We could also use the kajak a lot and the swimming was wonderful. The anchorage was very peaceful, no disco music, no venders approaching our boat, just perfect. One evening we spent in one of the hotel ´s enjoyed a good buffet and plenty of Mojitos at the bar.
Checking out of Kuba was easy, just three officials came aboard, filled in a lot of the same boat details again, we had our $10,- worth of stamp duty bought in a bank and we were free to leave. The next stop was so to speak "illeagal", we stayed for several nights at a very beautiful deserted little Island to brake up our trip to Mexico, Yucatan. Our fridge was totally empty of fresh produce, the only vegetable you could buy in Cayo Largo were tomatoes, onions and potatos, all at a premium . When we arrived in Isla Mujeres I was greeted by Romy from "TiTaRo" with a mango and a kiwi..oh..my God I devoured the fruit greedily, I missed fruits and went out quickly to get lots. Now we are back to our fruit breakfast, feels such a good start ot the day.
|
For thousands of years, turmeric (Curcuma longa) has been a staple of Indian Ayurveda and Chinese medicine. Prized for its use as both a culinary spice and for its powerful healing properties, the roots of the turmeric plant (a creeping root system called a “rhizome” because the root is a mass of stems and shoots branching off of the nodes) are sun-dried and then ground into a yellow powder that has a warm, bitter taste and is frequently used to flavor or color curry powders, mustards, butters and cheeses.
The active constituent that gives turmeric powder its color and health benefits is curcumin, an active phenol compound which is known to provide health benefits through its potent antioxidant and anti- inflammatory properties.
Today, more than 6,000 studies have been conducted on turmeric and extensive clinical trials over the past quarter century have addressed the pharmacokinetics, safety and efficacy of turmeric in humans, with many promising effects observed. Turmeric works through its ability to reduce inflammation in the digestive tract and throughout the body.
|
What is Wilson’s Disease Wilson’s disease is an inherited disorder in which a…
A Rare Disease Foundation microgrant to Drs. Sylvia Stockler and Clara van Karnebeek enabled these researchers to identify 75 inborn errors of metabolism in children that are treatable if diagnosed early. Based on this study, Dr. Stockler, the Head of the Division of Biochemical Diseases, and other researchers from several different disciplines were awarded the BC Children’s Hospital Foundations’ first Collaborative Area of Innovation grant in April 2011. The goal of this grant is to break down the silos of research and treatment by bringing together clinicians and researchers to collaborate in providing early diagnoses of these and other intellectual disabilities and to develop new treatment strategies. The TIDE Complex Diagnostic Clinic is one of the new innovations developed as part of this grant.
From Rare Disease Report
Researchers at TIDE BC (Treatable Intellectual Disability Endeavor in British Columbia, www.tidebc.org), a group of dedicated clinical scientists at the Children’s Hospital in Vancouver, Canada recently developed a webApp to help diagn ose a total of 81 treatable rare diseases that cause intellectual disability. Led by Drs. Sylvia Stockler and Clara van Karnebeek, the research team developed a means to help doctors identify a small portion of the children who develop intellectual disability for which causal therapy is available – with the potential to prevent brain damage and improve developmental outcome. Their work was recently published in Orphanet Journal of Rare Disease and Molecular Genetics and Metabolism , and is the first set of studies to dramatically shift the approach in intellectual disability from descriptive to interventional. Their work has been translated into an interactive website at http://www.treatable-id.org/. Recently, Dr. van Karnebeek talked with Rare Disease Report about TIDE BC’s research and clinical successes.
Using standard screening tests more efficiently
Dr. Van Karnebeek has been looking for more efficient ways to determine the etiology of intellectual disability for almost 15 years. Dr. van Karnebeek said, “the causes of this common condition (2.5% of the worldwide population affected) are numerous, thus posing a huge dilemma for physicians. Often these children go from test to test, physician to physician …..without success.” Fortunately, Dr. van Karnebeek was able to team up with the equally passionate Dr. Stockler and they, along with team of researchers at TIDE BC, developed a means to better identify the etiology of patients with intellectual disability. To begin, they have focused on identifying patients with inborn errors in metabolism since they can be fairly easily identified and many can be treated. In an exhaustive literature review, Drs. Stockler and Van Karnebeek identified 81 treatable conditions that can improve the lives of children with intellectual disability .
Dr. van Karnebeek noted that all children brought to TIDE BC are screened for treatable and non-treatable causal conditions so that even if a treatment is not available now, it may be in the future. Furthermore, knowledge of a causal factor can lead to better counseling, management, and prognosis. It may also provide families with new resources if a causal disease is known.
Regarding the 81 treatable inborn errors of metabolism, the team at TIDE BC found that over 65% of these conditions could be identified using group tests; each child with intellectual disability should be screened with these tests. The remaining 35% disorders could be identified with a single disease specific test; the choice of test to perform can be facilitated by the webApp. Once a treatable condition has been identified, the webApp also provides clinicians with a host of evidence based documents to aid in the treatment decision making process (see figure for an example).
Increasing the level of evidence
Although TIDE BC has identified 81 treatable diseases, many of those treatments have not been properly vented with randomized controlled trials. The research team determined that the levels of available evidence for the various treatments were: Level 1 (n=5); Level 2 (n=14); Level 4 (n=45); and Level 4-5 (n=27). Why so many seemingly safe and effective treatments are at low evidence levels is largely due to two limiting factors. First, there are often limited funds to perform such trials in such a small population of patients. Second, many of the conditions have treatment regimens that successfully use vitamins, diets, or nutritional supplements. Since those are not controlled by regulatory agencies, properly designed clinical trials are generally not performed. Unfortunately, it also means that even if those treatments are safe and effective, the level of evidence will always be suspect. On the plus side, TIDE BC is also developing new clinical trial strategies to increase the level of evidence for some of these treatment modalities by collaborating with other clinical researchers on a global scale. Dr. van Karnebeek said, “We are using digital technologies to unite researchers and patients worldwide to participate in trials and share data. Take for example our pyridoxine dependent epilepsy trial – there are impressive pilot study results of lysine restriction as therapy but we now need to perform larger scale study and thus have created a digital registry and website (www.pdeonline.org).”
Making their work accessible to others
While the evidence may be limited, there is no denying that these 81 identifiable disease can be treated and more importantly, those treatments can dramatically alter the outcomes of these children that otherwise may go untreated. www.treatable-id.org the team collaborates with Mr. Roderick Houben, whose company www.health2media.com is dedicated to translating medical knowledge into better care, especially for rare diseases.Knowledge dissemination is a huge obstacle in research for rare diseases; therefore TIDE BC is making optimal use of digital technologies and of the energetic online presence of rare disease families. For their freely available WebAPP at
If you are interested in learning more about treatable inborn errors in metabolism associated with intellectual disability and possibly collaborating with TIDE BC on one of the many ongoing trials, please visit www.tidebc.org.
- van Karnebeek CD, Houben RF, Lafek M, Giannasi W, Stockler S. The treatable intellectual disability APP www.treatable-id.org: A digital tool to enhance diagnosis & care for rare diseases. Orphanet J Rare Dis. 2012;7(1):47.
- van Karnebeek CDM, Stockler S. Treatable inborn errors of metabolism causing intellectual disability: A systematic literature review. Mol Genet Metab. 2012;105(3):368-381.
Treatable rare diseases with randomized clinical trial evidence (level 1)
- Pyrimidine 5-nucleotidase superactivity
- Wilson’s disease
- Niemann-Pick disease type C
- Mucopolysaccharidosis I (MPS I)
- (X-linked) adrenoleukodystrophy
Some of the advocacy groups for the above treatable rare diseases
Possible treatment options for the above treatable rare diseases
- Pyrimidine 5-nucleotidase superactivity: [Uridine supplements]
- Wilson’s disease: [zinc and tetrathiomolybdate; trientine dihydrochloride; Syprine (trientine hydrochloride); Cuprime (penicillamine); Depen (penicillamine)]
- Niemann-Pick disease type C: [(Zavesca (miglustat)] (approved in Canada and other countries for Niemann-Pick type C but in the United States, it is currently only approved for Gaucher disease)]
- Mucopolysaccharidosis I: [Aldurazyme (laronidase)]
- (X-linked) adrenoleukodystrophy: [Stem cell transplantation]
Aug 10 2012 to Aug 12 2012
Aug 16 2012 to Aug 19 2012
Aug 16 2012 to Aug 19 2012
Oct 2 2012
Oct 2 2012
|
You have almost certainly heard of the infamous “credit score,” that critical number that not only impacts what credit cards you can qualify for but may even be considered for a hiring decision. But what actually is a credit score and why is it important?
Why Do We Need a Credit Score
Let’s imagine a world without credit scores. Imagine you’re a banker. A customer walks in and says she wants a 5-year, $20,000 loan for a car. She shows paystubs for the last month that seems to indicate that she has an annual salary of $80,000. Do you give her the loan and at what interest rate?
Of course, you don’t have enough information. She could be an outstanding borrower and pay you every month, on time and in full. If that’s the case, you should certainly give her the loan and at a low interest rate. However, she could be grossly irresponsible and default within the first year. In this case, you shouldn’t approve the loan. This lack of information is called information asymmetry, because the lender has far less knowledge of the borrower than the borrower, herself.
Credit scores help to solve this information asymmetry by estimating a probability of default. This probability is mathematically determined using significant amounts of data that are collected by credit reporting reporting bureaus.
How a Credit Score is Calculated
The most common credit score is the FICO Score, named after the initials of the company that created it. The FICO score is based on a proprietary algorithm created by FICO (the company), and it will vary based on the data used to create it. The three major credit bureaus–EquiFax, Experian, and TransUnion–each have their own set of credit data. This is why your credit score differs based on the data used. The best credit score is the one that is calculated using the data of all of the credit bureaus, but this is often NOT the score you will see when you get a “free credit score.”
Your FICO score, regardless of the data used, is based on:
- 35%: Payment History
Do you pay your bills on-time? Of course, default or bankruptcy will significantly hurt your credit score. The best way to improve your credit score is to always pay bills on time.
Note, it doesn’t matter if you pay your bills early, but any late payment will impact your credit score.
- 30%: Credit Utilization
How much of your credit are you using? In general, you want to limit your credit card utilization to less than 30%. Paying off your balance every month is typically important for reducing your credit card utilization.
Note, utilization on your credit card is based on your monthly statement, not the amount of debt you carry month-to-month. If you have a $10,000 credit limit, rack up $10,000 in purchases every month, but pay it off every month, you are still seen as having 100% utilization on that credit card. This may negatively impact your credit score.
- 15%: Length of Credit History
How long have you had credit? There are essentially two factors in this: average age of your credit accounts and the age of your oldest account. The longer you have credit, the better your credit score will be, assuming you are a good borrower.
- 10%: Credit Mix
What types of loans do you have? Ideally, you want to have a diverse mix of both revolving (e.g. credit cards) and installment (e.g. mortgage) loans.
- 10%: Credit Inquiries
How many times have you applied for credit? Essentially, you don’t want to apply for too many loans within a year or two.
How To Improve Your Credit Score
Based on how a credit score is calculated, it should be relatively obvious that the general ways to improve your credit score is:
- Always pay your bills in full and on-time
- Limit your credit card utilization
- Get installment loans, like a car loan or mortgage
- Don’t apply for too many (i.e. 10+) financial products within a two year timeframe
|
In mild climates, plant seeds in autumn or early spring every where else. This is a quick growing herb. Be sure to plant coriander away from fennel. The fennel doesn't do as well around it. coriander/cilantro does very well grown indoors in pots. Make sure you give it a good draining soil and full sun. When harvesting the leaves, make sure to only pick them as needed because they don't keep well for long. When seeds turn brown they can be harvested and stored in glass jars.
History of Coriander and Cilantro
The Chinese put coriander into aphrodisiacs and used them as love potions. They also believed it gave them immortality. The Romans mixed coriander with cumin and vinegar and used it as a preservative for their meat. Coriander has also been used by tribes in Central and South America.
Cooking with Coriander and Cilantro
Coriander is the fruit, or seed and is considered a spice. These seeds are used either whole or ground. Coriander is used in curries, pickles, soups, and stews. Cilantro is the Spanish word for coriander and refers to the tender lower leaves. It is considered an herb. It is used fresh because dried cilantro does not have nearly the same scent or flavor. Fresh cilantro is a major ingredient in Mexican and Chinese cooking. Here are some recipes showcasing Coriander and Cilantro.
- Steep cilantro leaves along with mint leaves to make a toner. Apply it to the face to help with acne.
- Make a tea out of the coriander seed to aide in digestion or use as a mild sedative.
- Use to add flavor to medicines.
|
The presence of the G# in the Harmonic Minor scale changes the names of the modes, because they now contain a different tone. For example, D Dorian has now become D Dorian (Augmented fourth): This mode differs from D Dorian by one note, the G#, which is an augmented fourth away from the Tonic, hence its name D Dorian (Augmented fourth). In the same scale, the mode constructed on E has now become E Phrygian (Major third). Since a Phrygian mode is by definition a minor mode, some people prefer to call it Mixolydian (Minor second, Minor sixth).
Generation Hip Hop was created by the Universal Hip Hop Museum and the Africa Rising Foundation to establish a network of non-profit organizations committed to promoting hip hop culture and creative practices globally. With satellite affiliates listed in over 50 countries, GHH also aims to support localized, globally-connected community development, with music and creative expression at its core.
Read moreGangster music mp3 download
|
The main trait of my story originates from a village in what's now the Belgian city of Tongeren, around 1000 BC in our timeline. Anyone born there after that trait arrived will have the trait, as will their children, recursively, regardless of where they are born. The trait doesn't have a single Patient Zero like Mitochondrial Eve or comparable people, but rather that everyone born in that village after the date the trait started appearing has the trait.
In the backstory, the Belgian empire that sprung from this city gradually takes control of Earth, with Europe being fully theirs in 500 BC, The Middle East around 1 AD, Africa and the rest of Asia at 500 AD, the Americas at around 1000 AD and the remaining landmasses of Earth at around 1200 AD, with tech being roughly at our level at around 1400 AD. These are rough estimates that aren't fully established yet, but the idea is that in 2050 AD, the Belgian Empire has developed interstellar travel, contacted and befriended other aliens and is a relatively new player at the galactic table.
Judging by the above estimates, how likely would it be for humans WITHOUT this trait to exist and be adults in 2050 AD?
information requested in comments:
the trait always gets passed to the descendants and is always active. The trait doesn't directly increase survival through resistances or similar, but it does indirectly increase survival by providing the affected party with additional inherited knowledge, increased mental acuity and being able to use senses remotely. There are ways to lose personal access to the trait, but it doesn't affect how the trait gets passed on.
the trait is not genetic in nature! I see many people assume it's genetics and thus obeys the normal Survival of the Fittest criteria where it only gets passed on if the trait is beneficial for survival. The trait is not dependent on the genes of either the mother or the father and will always be passed on to any children of the person affected.
The empire achieved global dominance through a mix of diplomacy and military strength. Where possible, countries were annexed through treaties, royal marriages and other nonviolent means. when the empire is attacked, the offending nation is conquered, although this is mostly happened in the pre-BC days, when the Romans invaded from Italy and were conquered.
|
Compare apples to apples with this unique set! Sort and classify apples by 5 attributes including size, color and physical features (stem, leaf, worm).
** 27 apples
** Activity guide - features uses of Venn diagrams
Largest apple measures 1.75''D
Common Core State Standards Alignment: Measurement & Data
Learning Style: Tactile, Visual
Fine Motor- Refine pincer and whole hand grasp with the different apple sizes and practice hand-eye coordination to reach for and grasp the apples in or out of the bucket.
Basic Concepts- Learn to recognize and identify colors, sizes, physical attributes and details (stem, leaf, and worm) of the apples. In doing so, students gain insight on similarities and differences.
|
New National Child Measurement Programme (NCMP) data show the number of obese children in reception year has risen for the second consecutive year – to 9.6% in the 2016 to 2017 school year, up from 9.3% in 2015 to 2016. For year 6 children, it has remained stable at 20%.
The latest data from the NCMP, overseen by Public Health England (PHE), also shows a stubborn gap between the richest and poorest. In the most deprived areas, 12.7% of children in reception year are obese, compared to 5.8% in the least deprived. Obesity in year 6 is 26.3% in the most deprived areas, compared to 11.4% in the least deprived.
Today’s report (19 October 2017) underlines the importance of PHE’s work to tackle childhood obesity. This includes working with the food industry to reduce sugar and calories in the foods children eat the most.
Dr Alison Tedstone, Chief Nutritionist at PHE, said:
Children deserve a healthy future and these figures are a reminder that addressing childhood obesity requires urgent action.
There is no single solution to reverse what’s been decades in the making. We need sustained actions to tackle poor diets and excess calorie intakes. We’re working with industry to make food healthier, we’ve produced guidance for councils on planning healthier towns and we’ve delivered campaigns encouraging people to choose healthier food and lead healthier lives.
Children who are overweight or obese are more likely to suffer from poor self-esteem, bullying and tooth decay in childhood. They are also more likely to be overweight or obese adults, which can lead to a range of preventable illnesses including heart disease, Type 2 diabetes and some cancers.
With the government’s Childhood Obesity Plan published a year ago, significant steps are already being taken to help children avoid a lifetime of poor health.
In addition to PHE’s work to reduce sugar and calories in food, the Soft Drinks Industry Levy has become law and will take effect from April 2018. Leading retailers and manufacturers have announced they are, or already have, lowered the amount of sugar in their products as a result of these programmes.
PHE’s Change4Life campaign is also helping millions of families to make healthier choices through meal swap suggestions and the Be Food Smart app, helping parents to identify the sugar, salt and fat in food. It also supports schools to help them embed healthier habits into everyday school life.
Progress on childhood obesity will be monitored through the yearly NCMP data but, with obesity rates increasing over many years, significant change will take time.
Eustace De Sousa, National Lead for Children, Young People and Families at PHE, said:
A healthy weight in childhood lays the foundations for decades of healthy life as an adult. This data underlines how important it is for families to talk about health and weight as part of everyday life.
Each year, more children leave primary school overweight or obese and our most deprived areas are the worst affected. It’s never too soon to make a change and there is lots of support from councils and Change4Life to help.
PHE press office
020 7654 8039
Link: Press release: Latest NCMP data show obesity in reception children rises again
Source: Gov Press Releases
|
Saudi Arabia announced on Thursday that it would undertake a training programme in order to send its own astronauts, including a woman, into space in 2019. As part of its extensive Vision 2030 strategy to overhaul its economy and lessen its reliance on oil, the monarchy is actively encouraging science and technology.
The initiative, which is supported by Saudi Arabia’s popular Crown Prince Mohammed bin Salman, also asks for more women to be employed in the traditionally Muslim nation. The ambitious Saudi Vision 2030 programme, which includes the Saudi Astronaut Program, “will send Saudi astronauts into space to assist better serve humanity,” according to a statement from the Saudi Space Commission. A Saudi woman will be one of the astronauts, marking a first for the country by travelling to space thereby creating history for the country.
In November, the UAE intends to launch its first lunar rover. The UAE and Japan, which is contributing the lunar lander, would become the fourth country after the US, Russia, and China to send a spacecraft to the moon’s surface if the moon mission is successful.
|
Meet A Neurobiologist Who’s Mapping The Human Brain
Cori Bargmann, co-chair of the BRAIN Initiative, envisions where the project is heading
Arguably more ambitious than the Human Genome Project or the Apollo program, the Brain Research Advancing Innovative Neurotechnologies Initiative endeavors to demystify our least understood organ—and the one that makes us most human. Announced by President Obama in 2013, the 12-year, $4.5-billion undertaking aims to establish links between brain function and behavior, and to develop tools that will help us finally get to the bottom of conditions such as Alzheimer’s, autism, and depression. As the project’s planning co-chair, Rockefeller University neurobiologist Cori Bargmann spent the past year assembling expert teams and vetting research ideas. Now, she says, the real work begins. In her own words:
“The brain is the most complicated object in the universe. What could be cooler than understanding that?”
—As told to Breanna Draxler
This article was originally published in the February 2015 issue of Popular Science.
|
The Russian Orthodox Church Outside Russia (ROCOR) is on the track toward reconciliation and unity with the Moscow Patriarchate, thus ending a 80 year old rift.
The decision was made at the All-Diaspora Council meeting of the ROCOR in San Francisco in May, which gathered representatives of dioceses and church-related organizations, both clergy and laity. Following the turmoil of the communist revolution and the emigration of a large number of Russians, ROCOR had been formed as a temporary administration of Russian bishops in exile, based upon provisions made by then Patriarch Tikhon. ROCOR’s founders had hoped to return some day to Russia and carefully kept all the traditions of the Russian Church. Following the fall of the Communist regime in Russia, the question of restoring links with Moscow soon emerged, since canonical justification for the continuation of a separate existence seemed to have disappeared. And an increasing number of newly-arrived Russians are now attending ROCOR parishes in the West.
Long-held suspicions do not disappear overnight, however. Some within ROCOR continued to consider the Russian Church as a “Soviet Church”. Moreover, moves by the Patriarchate in order to take control of ROCOR properties (e.g. in the Holy Land) gave rise to new questions about Moscow’s intents. Another point of contention was the fact that ROCOR accepted within its ranks some clergy and parishes within Russia. A few years ago, as then reported in RW (January 2002), a split took place within ROCOR over the issue of the rapprochement with Moscow, while negotiations with the Patriarchate were undertaken by the main ROCOR group (RW, June 2004)
Participants at the Council–the fourth meeting of its kind since 1921–held widely different views on the pace toward unity. However, following sometimes heated debates among the 134 delegates, a resolution was adopted nearly unanimously, expressing the hope for unity with the Russian Church “in the appropriate time” – thus leaving in fact the decision on the timing to the bishops. ROCOR would become a self-governing part of the Russian Church, with its own bishops and administrative structure. The resolution did not ask the Patriarchate to repent of its collaboration with the Soviet State, but it expressed a desire (though not making it a precondition for unity, since it was not one of the original issues) to see the Russian Church leave the World Council of Churches. Such a view is reported to be widely shared among Orthodox in Russia, but not by the Department of External Relations of the Patriarchate.
While no date has yet been set by the bishops, it is expected that unity might be achieved soon, although persisting reluctance within some parishes and sectors of ROCOR will have to be dealt with in order to prevent a new schism. The move should be put into the wider context of adjustments in the Russian diaspora. Following a “clash of cultures” with the Department of External Relations and newly-arrived Russians, some parts of the Russian Diocese under the Moscow Patriarchate in Great Britain (which was developed largely as a missionary diocese) are currently making a move to switch jurisdiction to Constantinople. In Russia, decisions of the ROCOR Council and bishops seemed to be widely welcomed — and not only in church circles. Some observers have interpreted the move in strategic terms, for instance Vyacheslav Nikonov, president of the Politika Fund think tank, claimed that church unification would “strengthen Russia’s international position,” reports Interfax (May 12).
(The documents of the Council are available on a bilingual website:http://www.sobor2006.com)
— By Jean-Francois Mayer, RW Contributing Editor and founder of the website religioscope (http://www.religion.info)
|
About 15 Carat Gold Antique Jewellery2 min read
Are you fascinated by Antique Jewellery and vintage jewellery or just want to buy a piece as a special gift or heirloom? If so you you need to know that the piece you are buying is a genuine antique and not a modern copy. There are many things to check and look out for such as the materials the piece is made from, the way the jewellery is made and the shape of the catches and hinges. All of these factors are just guidelines but with British Antique Jewellery you can sometimes tell the exact date of a piece from its hallmarks.
Hallmarking law is complex, it varied from city to city and has changed many times over the years since it was introduced in the middle ages. It takes a set of tables to work out the exact age of a piece but there are certain pieces of antique jewellery that it is easy to work out the age of. One of these is British antique jewellery made from 15 carat gold.
What is 15 carat Gold?
15 carat gold is gold of.625 purity, that is 625 parts of pure gold per 1000 parts. Pure gold is very expensive and also quite soft so it is mixed with other materials to give a harder and cheaper material that is more suitable and longer lasting than pure gold for use in jewellery. The other materials include copper, silver, iron, platinum and aluminium. The colour of the gold can be altered using different metals in the blend, for example rose gold is produced by having a high level of copper in the mix. 15 carat gold can theoretically be any colour that gold can be made in but normally you will find it as yellow or rose gold
How can i Identify 15 carat gold?
British antique jewellery which is made of 15 carat gold will be hallmarked with the number 15 and.625. If the piece of jewellery is quite light weight it may just be stamped 15ct. If there are the full hallmarks you would also expect to find a town mark, a date letter and the gold standard mark for the town which would help to give an exact date.
When was 15 carat gold used?
It was only a legal standard of gold in British jewellery between 1854 and 1931. During this time 12 carat (.5 or 500 parts per thousand) was also used. These two standards were replaced by 14 carat in 1932. Neither 12 or 15 carat gold were legal standards before 1854. This means tat any piece of antique gold jewellery from Britain with the 15 carat hallmark dates somewhere between 1854 and 1931 and you have a genuine piece of antique or vintage jewellery.
|
Please answer the following questions:
- What is risk management?
- What are the benefits an organization can receive from the adoption of a risk management program?
- Describe the risk management process.
- What roles do security and capacity play within the risk management process?
- What is the purpose of a risk management methodology?
- Describe the various risk management methodologies used for risk assessment.
Write a paper consisting of at least two pages in APA format. You may also use outside sources. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
"Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results."
|
You’ve heard about the importance of education. Most likely, you’ve been hearing it throughout your childhood. You should study to acquire the profession that will help you to land the job of your dream. Moreover, every ten to twenty years there was that specific profession that everybody wanted to acquire.
Things do change with time, and we get more and more chances to be successful in our college studies without working as hard as students before us had to. If you are carefree, you can order your essay or research paper from some writing services. The only thing you need to do is to check if the final work fully corresponds to the requirements. If you are more cautious about your studies, you can write the paper on your own. But then you need to make sure that it’s neatly edited and proofread. But you don’t have to do it on your own. You can pick an online service that has a “proofread my essay” feature, and relax while your work will be proofread by professionals.
But there are certain things that you need to study hard if you want to succeed.
But it’s quite difficult to pick the language you should start learning first. And the question of which one a student and paper writer should learn first remains controversial among educators even today. One group will claim that any of the C family is the language you should start your programming journey with. Another group is sure that you should pick Java. Smaller groups offer to focus on the likes of Python.
Unfortunately, there is no definitive answer to this question. After all, you will have to make your own choice. Most likely you will learn more than one later in your career, as the majority of software engineers know at least two programming languages. So here are five of them that are highly in demand.
|Table of Contents|
You can listen to the audio of this article (or bookmark for listening later) :
Java is one of the most popular programming languages. You can’t be a software engineer nowadays without utilizing Java, at least to some extent. According to various surveys, Java remains the most popular one among developers since the mid-nineties.
A bit younger than the previous entry, C# (C sharp) was created by the Danish software developer Anders Hejilsberg in 2000. Originally designed as a part of the .NET framework for creating Windows applications, it became one of the most popular C family of languages, on par with C++.
While originally designed for Microsoft, C# is no longer used exclusively for Windows. It’s quite frequently utilized for building cross-platform apps among mobile developers. Moreover, it is also the go-to for creating 2D and 3D games. Almost one-third of the top games on the market are created with C#.
Because C# can be used for Microsoft applications, as well as for mobile apps, and for creating video games, it comes as no surprise that the language is one of the most popular among software engineers. Thus, if you want to become a software developer then you can start with C#.
If you’re interested in computer science and mathematics, then Python is your go-to, thanks to libraries like NumPy and Scipy. Other Python libraries are frequently used for building programs in machine learning and data science. Thus, it is a perfect choice if you want to become a software developer, especially an academically inclined one.
A C# contemporary — Ruby was created by the Japanese computer scientist and developer Yukihiro Matsumoto in 1995. Ruby is frequently used for web development. In 2004 it became the basis for the popular framework Ruby on Rails, which is commonly used for building web applications. Ruby attracts newbies for its active and responsive community of users.
If you start using Ruby, you will not be left to your own devices, as there are always developers to give you a helping hand when needed. Aside from the newbies-friendly community, Ruby is quite easy to use thanks to its straightforward syntax. Shopify, Bloomberg, and Airbnb utilized Ruby on Rails to create their sites at some point.
While it is great to learn the basics, you need to keep your skills up to date. Thus, you should learn some younger languages as well. Elixir was released only a decade ago and is in high demand. Elixir is most commonly used for building fault-tolerant applications. Elixir was used to develop sites like Pinterest and Discord. How more up-to-date can one be?
So, you have five programming languages to start your software developer career with. You can pick them based on their flexibility, like Python. Your choice can be influenced by the association with big businesses, like in the case of Ruby. Regardless of which one you will pick, you can never go wrong. Each of those languages has its own merits.Tagged With https://thecustomizewindows com/2021/10/which-programming-language-is-the-best-for-a-tech-student/
|
Feelings and Emotions: The Essay, Part Two (FEAR, ANGER, GRIEF, JOY)
© Al Turtle 2000
Print this Paper in PDF
Now, I want to address the four prime emotions of fear, anger, grief and joy. Why only four? Well, these are the ones that give most people lots of trouble, both in having them, dealing with them and communicating about them.
Also, there are four unique chemical processes, one for each. There may be many words for fear, but only one chemical. The same is true for anger, grief and joy.
Since there are different chemistries, one can have more than one of these emotions at a time. I believe it quite possible to have large doses of all four emotions. What would you report on, then. I feel scared that my anger makes me so sad that I feel happy! What a mix! But it is possible.
Also I want you to recall that emotions have intensity. For low levels of Fear people often use words like nervous, uneasy, and uncomfortable. For hi levels people use words like terror. For low levels of Anger people speak of testy, ticked off, bugged, growly. For high levels they speak of rage.
For low levels of Grief people say they are blue, moody. For High levels they speak of inconsolable grief. For low levels of Joy people speak of feeling good. For high levels they refer to ecstasy.
For a list of words used for different emotions click here.
Fear is the first emotion. It is primitive in its function, and is a normal function of the old brain. Check out my paper on Safety: The Lizard for the psycho-social issues of fear.
The primary chemical of fear is adrenaline – sometimes call epinephrine. While many parts of the body produce this hormone, its major source is part of the adrenal gland in the middle of your back. When the brain interprets the situation as deserving fear, it squirts a dose of adrenaline into your blood stream, which carries it in less than a second to all parts of your body – to your finger tips. Since the brain is filled with blood, whole new memories become available and others are forgotten when adrenaline floods it. This is how the emotion of fear affects thinking processes.
The feeling of Fear functions to prepare the body for survival. The chemistry flows when the old brain (the Lizard) senses imminent threat to life. As you may have read, this part of the body can misunderstand things easily. Still it prepares things. The chemical shuts down non-necessary functions (digestion, immune system), it empties useless weight (bowels and bladder), and it prepares for “last ditch efforts.” It is designed to be very short lived — 20 minutes or less. It is the chemical experience that the gazelle experiences when it notices the approaching lion. In our culture this is a terrible problem as most of us live in a “short-term survival” status for years. We aren’t designed for this. Stress kills. Here’s a link for a to the best, readable, book I know on Stress.
The experience of adrenaline is very quick and profound. Consider you are driving a car peacefully, and then hearing a police siren directly behind you, very close. That sensation in your body is the adrenaline flooding you. The word “flooding” is a good one for this experience. The feeling is not fun. If you were to receive an injection of adrenaline, your body tends to go “ugh”. It is not pleasant.
(Note: People speak of an adrenaline high, but that is different from fear and results from other chemicals.)
Lasts a minimum of 20 minutes
Once the adrenaline hits your body it takes at least 20 minutes for your body to filter it out of your blood stream.
You are driving peacefully, hear a siren, have the adrenaline flooding experience, and then notice the police is after someone else. Fifteen minutes later you are still reacting to the adrenaline in your body. For that length of time your body continues to experience the effects of that hormone.
The experience is pretty strong, but the body habituates (gets used) to it quickly. And so people often lose their awareness of the adrenaline in, say, 6 minutes. Yet it is still there affecting thinking and a lot of other things. This issue of timing is pretty important. What is means is that after a person receives a fright, they will not return to normal for at least 20 minutes even though they will experience the “feeling” going away.
Can go on forever
What is even more interesting is that the part of our bodies that produces adrenaline seems extremely over engineered. It can go on producing for ever. It never gets tired.
It can kill you
And it seems so over engineered that it can produce enough adrenaline right now to kill you. Adrenaline is remarkably toxic. Enough will stop various organs from functioning, like your heart. And your body can produce enough to do the job.
It doesn’t, normally, because adrenaline production is in the hands of the survival mechanism of your old brain. It doesn’t want to kill you as its function is to keep you alive at all costs.
Still people can and do “die of fear”. The first time I heard of this was in stories of prisoners in concentration camps in the 2nd World War. People would receive a shock and drop over dead. How would this happen?
Here is the story I tell clients.
In the 1950's some researchers were interested in habituating (getting used to) effects of adrenaline. They found that people accustomed to high levels could perform remarkably well. Soldiers for years were trained using fear techniques and the researchers were interested in the effects.
What they did was to get a large number of white rats. First they determined how much adrenaline would kill a rat – let’s say 55 units. Then they gave all their rats the equivalent of 50 units daily for two weeks – just less than the lethal dose. At the end of that time the previous killing dose of 55 did not kill a rat. It now took 95 units to kill. The rats’ bodies had become habituated or immune to a dose that would have killed them.
So now they gave the rats 90 units of adrenaline daily for two weeks. At the end of that time, it took 135 units to kill the rats. So they tried 130 units – and so on and so forth. They finally reached an upper limit beyond which the rats could not survive. The number was 450 units of adrenaline, around 9 times the dose that would have killed the rats in the first place. They had now a small collection of rats living with this high level of adrenaline. The rats were not exactly “normal.” They had stopped reproduction activities. Their immune systems were very weak. Much of their behavior was quite odd. But they were alive!
This gave the researchers an analogy to soldiers. Soldiers have traditionally been habituated to high levels of adrenaline. Many years ago these soldliers were called berserkers and were highly valued as extremely useful warriors who fought with wild unrestrained aggression.
While in the military, I heard that the North Vietnamese had used these techniques to train soldiers. A friend of mine described such a soldier running across a landing zone during a fire fight. The soldier was carrying a heavy M-60 rifle he had grabbed. He had no feet. He was running on the shattered bones of his legs.
The study also pointed out that people can live with very high levels of adrenaline and not be aware of it. A person can be in great fear, and not know it.
There are many, many tests of how high a level fear people are living with. These “stress tests” often let a person score how many “stressful” events have happened to them recently. Such events as death of a family member, loss of a job, arrest, etc. increase basic stress levels for months. The Polynesians know that when a man loses a wife it may take as much as a year for him to recover. This is consistent with bringing down the high level of adrenaline that his body will start to produce after the death. In our culture, such a man may be given a week off from work to recover, while in the Pacific islands he may get his year.
By the way, you may wonder what they did with those surviving rats. Well it was simple but quite interesting. They set up their cages in a room on tables. Then they created a large noise, a bang, in the room. Every rat rolled over dead. You see, adrenaline is additive. They were already living at the upper limit of their capacity and the noise triggered another bit, which was too much. This is how the people in prison camps died. They were already at too high a level, a level close to a lethal one, and the shock sent them over their limit.
Thus I’ve learned that fear is additive; that is, one source of fear adds to another. I also learned that one can live with high levels of fear and not be aware of it. High levels of adrenaline in your blood stream, and no conscious awareness of it, can be a big problem. It seems easy and common for people to say, “I’m not scared or fearful,” when they have been fearful all their lives.
Social Value: Useful, desirable
And so, what do you think is the social value of FEAR. Is it a “good” or a “bad”? To me, the amazing answer is that it is a very desirable emotion from the point of view of our culture. Our culture is, in my opinion, a control-freak culture. We want people to be obedient and manageable. Thus we use threat, tactic that cause fear in others, everywhere and often in order to obtain control. Think of the terms “fear of God” as used in many religions. Think of the way police dress and act – in threatening ways. Our culture uses fear since our culture likes obedience.
When I went to teach school (I got my degree in teaching) for the first time, the more experienced teachers took me aside before the school season began to tell me the ropes. One piece of advice really stands out after all these years. “If you try to make friends with them in the first couple of days, you will pay for it. Scare the bejeesus out of them for at least 4 days. Pile on the homework. If they look frightened, you are doing your job.”
Every couple that I see is, among other things, doing one specific thing wrong. They are using “threat in an attempt to get love.” I think this foolishness is a direct result of our culture’s love affair with using the emotion of FEAR.
Anger is the next emotion. It is also is primitive in its function. However, I think it is the most misunderstood of emotions and is talked about so casually that I am going to go slowly here.
First I want you re-call that Emotional/Feelings are 1) Events in the Body, 2) are chemical in nature, 3) involve awareness, 4) about which we talk or report and 5) that have social value. I want you to recall this because Anger is the first of the Emotions that has “negative” social value, is frequently reported incorrectly, about which we have more awareness of in others. Thus most seem quite confused about it. I may change your views of anger. I may not. I will share mine with you and see where we all end up.
Nor-epinephrine or nor-adrenaline
The chemical the gives rise to anger is another secreted primarily by the adrenal glands and injected into the blood stream. Thus its effect on the body is very quick, like that of adrenaline – Fear. It saturates the brain in a split second. But……. oh, well. Let me share this with you, as I do in my office.
I want you to answer a question and I want you to force yourself to go for a yes or no answer. Here’s the question. When you feel anger is it a pleasant experience or an unpleasant experience? Now, just go for a yes or now. I hope this will be instructive.
When I asked this question in a class I was teaching at college about 2 out of 3 said “anger is unpleasant”. About 1/3 saw “anger as pleasant.” The class had almost 120 students in it. If I was using that class to determine whether Anger was pleasant or not, I don’t think that would have been a good test. About 80 said unpleasant and didn’t debate it. Lots of you reading this will say that. About 40 said anger was pleasant. And so lots of you reading this will say so. Now how can this be?
How could so many disagree? But I have found this split to be pretty normal. Most people experience Anger as an undesireable experience while a large minority experience it as fun.
Now before I solve the puzzle for you, let me ask one more question. When you get angry, really angry, what is the longest that your anger has lasted? (Seconds, minutes, hours, etc.) Be honest with yourself. And I will explain what is going on.
The people who experienced Anger unpleasant described their anger as lasting hours, days, weeks, and one guy even said, “all my life.” The people how experienced Anger as pleasant described their anger as lasting 2 minutes, 4 minutes, 7 minutes, 12 minutes, but never longer than 15 minutes.
Nor-epinephrine feels GREAT!
I call it the “Tony the Tiger” emotion. If you got it in a injection, it would make you breathe deeply, and chill you deliciously. Wow is it nice.
Nor—epinephrine can only last 15 minutes MAXIMUM
The part of your body that produces it, is very short functioning. After 10 to 15 minutes, it must rest. It cannot keep producing the hormone steadily.
These two pieces of data explain the answers the 1/3 of my class gave. Anger is a relatively short-term but pleasant experience. They are people who have learned that anger is an “ok” emotion. I think most of them are Irish.
The Others – their confusion
But what explains the answers of the majority of my class, of the majority of people I’ve seen, and my original answers. When I was studying this material, I had experienced what I called very unpleasant anger for a long time.
Well, you already have the answer. What emotion can last forever and feels unpleasant? Sure, Fear does. Most people are fearful of Anger. When anger comes, they get fear at the same time. Their body secretes adrenaline and nor-epinephrine at the same time. And then in about 15 minutes, they are left with the adrenaline only and the thoughts that started the whole thing off. Their angry thoughts, their hostility, feels awful, because those thoughts are accompanied by Fear. But they have been calling this state “Anger.”
I recall tell this to the guy who said, “I’ve been angry all my life.” He looked shocked and quiet for a while. Then he said, “So I’ve been scared all my life. Damn that makes sense.”
Making money off of this confusion
To help you really experience this difference between pleasant Anger and unpleasant Anger, I tell this story.
There is an industry in this country that takes advantage of our misunderstanding about Anger and makes BILLIONS of dollars off of us all. They know that for most people anger feels bad. They know the potential of the good feeling of anger. So they give it to us for $5 to $10. They know that in the U.S. and most western nations, we are all taught that anger is free from the connected fear “if the anger is justified.” This is a powerful rule for most people. So this industry takes advantage of this.
They take us into a dark room, show us moving pictures on the wall in which somebody does bad things. Then at the last moment, John Wayne or Jean Claude Van Damme, or some other hero, beats the tar out of the bad guy, and most everyone in the audience experiences pure Anger without Fear. That glorious sensation you get in your body when the bad witch falls off the cliff in Snow White, when the maid, Eowyn, stabs the Witch King, oooh you can name many movies and cartoons, that wonderful sensation is caused by nor-epinephrine. Ain’t it cool! It hits your body, makes you cheer, makes you feel great. If it happens very close to the end of the film, you strut out of the theatre, stride to your car, but it wears off before you make it to the restaurant.
I recall the movie Raiders of the Lost Ark where Speilberg put the nor-epinephrine events too close together. The movie is just exhausting for most people. That adrenal gland can produce the first rush, but needs some rest time to produce the next. Get that film. Play it, but stop for 10 minutes after each high charged event. I think you may enjoy the movie more.
This pattern became so clear to me, that I used to tell my children stories by starting with how bad someone was. And it is also so clear to me that when someone comes into my office and talks about how “bad” their partner is, they are just Angry at them, and are running the “first part of a film” to justify the anger they already feel. One of my great teachers used to say, “To get angry at someone, first you must put them in the wrong.” I’ve witnessed politicians and military leaders doing this for years.
The feeling of Anger functions to raise a person’s energy level in order to push through blocks. The chemistry flows when the old brain (the Lizard) senses something blocking it from achieving its goal. This is the feeling the lion feels when it sees the gazelle on the other side of the clearing. This is the feeling produced automatically when we face frustration. If you want something and can’t get it, you feel frustrated and the chemical of anger is produced. However, for most of us, the chemical of fear is also produced.
Social Value: Undesirable, except when "justified"
In our culture, the general idea seems to be that we should all contain our anger. That means we should not express it, unless of course it is justified. Soldiers can express it. Police can express it when it is proper. But I was taught from childhood that I was not supposed to express anger.
This is a funny thing. Because a large majority of parents express anger. Just ask their kids. I sometimes do. Here are my questions.
When your daddy got angry, what did he do? List these things. When your momma got angry, what did she do? List those things. Now when you got angry what were you allowed to do? That is often an instructive lesson. It might be worth noting that whatever your parents did when they got angry, you probably were scared.
This emotion is chemical in nature (nor-epinephrine), feels good, lasts a very short time, is mislabled by most of us, and is socially unacceptable to express – unless “justified.”
The next major emotion is Grief or Sadness. (I am going to be quicker with these last two emotions as I want get on to the bigger lesson about feelings.)
The chemical involved with Grief is Prolactin and it is a neurotransmitter in the brain, rather than a hormone injected in the bloodstream. This piece of information will come in handy latter.
One interesting thing I read about Prolactin is that its production decreases in males somewhere after the age of 10. What I think this means is that there is a chemical basis for some of the difficulty men have in weeping.
On the other hand, I think men generally have a lot more to weep about.
The feeling of grief functions to help us adjust to loss. Where Anger helps us push through blocks to get what we want, Grief is there to help adjust to life when we don’t have what we want. Humans are strongly capable of developing desires. Grief is there to allow us to let go. A person who cannot express grief is hamstrung in their ability to let go. Most indigenous cultures believe that our culture will fall apart because we teach people not to grieve. They believe grieving is essential to healthy life both for the individual and for the culture.
Prolactin is produced by the Mid-Brain and its effect on the other functions of the brain are enormous. Generally speaking, when a person weeps they lose control of themselves, their bodies, their consciousness. When they finish, they “come back to the world.” A person should never drive a car while crying as they are likely to crash. Grief is an emotion of losing control.
And when you grieve of one thing, it seems you grieve for all losses. Thus crying at a sad movie can help you adjust to the loss of things in your life.
Social Value: Undesirable, especially in men
Many men are taught at an early age that crying is for “sissies.” They are mocked for sadness and told to keep a stiff upper lip. “Heck, I’ll give you something to cry about.”
Many girls are taught that it is ok to cry but not ok to get mad. The result is that many women I have met, tend to cry when they get angry.
The last major emotion is joy or happiness.
The primary chemical in pleasure or joy is endorphins, yet another brain chemical. Endorphins go directly to work in the brain and strongly effect the thinking processes.
I imagine the purpose of joy is to give us something to live for. Joy signals that all is going well. I remember a picture I saw as a kid that said, “Man is the only animal that doesn’t know that the purpose of life is to take joy.”
Social Value: Undesirable, in public
I think it amazing to note that most kids learn early that parents don’t want them to be happy. Kids are designed for high levels of joy, but most times you see them being told to be quiet. Kids are built for hardware stores and to run up and down the aisles pulling things off shelves. Kids are designed to run around restaurants yelling and laughing. One time I was asked, “How do you take a kid to a nice restaurant and have peace.” I replied, “You don’t. Kids aren’t designed for that.” Kids are designed for campgrounds and parks. Joy is noisy. Learn to live with it.
Because endorphins are produced in the mid-brain, like Grief, the emotion of Joy is an emotion of losing control. People who are laughing very hard can get into car accidents as the brain is slightly incapacitated when in very high joy. Perhaps that is why people hold onto each other during love making – so they don’t fly off into outer space.
Chart of Feelings
So here we have the four major emotions. Three of them are frequently socially unacceptable, and the one that is socially acceptable feels ugly.
Pingback:Safety and The Lizard: The Essay – Al Turtle's Relationship Wisdom
Hi Al, I come back to your site repeatedly since we did Imago with you years ago. I am digging in right now because my husband is at recurrent stage four cancer and my emotions are all over the map. I wish we had conquered all the great things you have in here and perhaps I can get better at some of them as we move through the stages of this next round of chemo and all it entails in our relationship, our family and just doing life. Thanks for posting all the things here; it helps me understanding why I cry all the time and get angry while my husband seems to be moving forward pretty peacefully. I wish I had your skills at reading him. You would think after 41 years I would have this done.
Dear Carol, as I get older I am getting more and more messages like yours. People are passing on. It provides me an opportunity to feel sorrowful and to send my prayers to you, to him and to the people around you. Long ago a wise man pointed me out the window at the steady rain and said, “God spends a fair amount of time weeping!” Just keep putting one step in front of the other, is all the advice I have. Oh oh, and forgive yourself and him for only being the best you could be.
Skies are cloudy and it’s raining. I’m glad we met along the way.
Here is a series of emails that John and I exchanged some time ago.
To me, your's is a serious question, and I will be happy to answer it. Could you say a bit more, so that I can be clear that you are not part of a marketing company trying to use my website to sell their product. I do not mind their trying, but I would rather put energy into a response that is valuable to my readers.
Thank you for your response.
I suffer from PTSD, and I've been doing some research, and when I came across your site (well done by the way) I found that with my PTSD fear is the primary emotion that then triggers my symptoms such as anger as an example. I am thinking that if perhaps I can regulate the amount of adrenalin that my body puts out that I can counter the symptoms, or at least minimize them.
I'm not on any prescribed medications, and I'm hoping that I can use vitamins and or herbal supplements to do that. I just got in from the health food store which I purchased some L- Tyrosine. That is the main ingredient in Green Tea which my research seems to show the best results for stress relief, and relaxing without drowsiness. Also, I purchased some Melatonin for help with proper sleep.
If you know of anything that might slow my racing mind, which I think occurs due to too much adrenalin so that I can have a moment to address my emotions before reacting that would be great.
I'm also aware that regardless of what I take to help I will need to modify my responses to my emotions, and I'm perfectly willing to do the work needed.
Any suggestions that you might have are welcome.
I may want to post this on my blog, but for the time being, I will just respond directly to you. I really applaud your effort of find a solution for what is going on for you. Keep going.
As I read your letter, I was struck by how several times you seem head off in what I think are non-productive areas of thinking. You may not 'like' what I am writing. All I can share is what I believe.
First, I do not believe stress happens to you. I believe stress is your conscious (and mostly unconscious) response to what is going on around and inside of you. It is more like a “fever” than a disease. The fever is a symptom, or sign, of the body doing its normal job, reacting to an abnormal or ugly situation. I find generally that thinking of curing the symptom is not very useful. It sometimes is damn destructive. Go get and cure that disease that is causing the symptom.
Now, it is true that chemicals (prescribed or over the counter or natural) can effect the cycle of reaction. And I have used and recommend chemicals when the emotional reaction prevents working on the sources of the stress. An example of this is when a person gets so upset (fear, anger, grief) that they cannot sleep for several days. But, my thinking is to use those chemicals to gain a “breather” from the reaction in order to work on a more reliable, drug-free, and permanent solution. (By the way, I don't think the pharmaceutical companies want me to say this.)
I am not in favor of the phrase “under stress.” It leads the mind to think that stress is coming at you from the outside. This is an easy delusion, I believe.
I like your noticing that when you are in stress, one of your reactions is anger or irritability. You can use this to go backwards and say, “If I am irritable or angry, perhaps my Lizard is trying to protect me from something.”
A useful clue is that your anger triggered by “discussing it. “ This suggests that you don't have much experience with chatting peacefully with people about this topic. What is that all about? Is it normal for you to “argue over the truth?” Quit it, if it is.
I really don't like your thinking that the “stress is out of your control.” I much prefer you stubbornly finding out what you can do to get a sense of control in your life. I find that just “feeling out of control” will trigger stress. The Lizard loves to be in control of itself.
Now to the phrase “work on finding solutions to express myself to the person causing this stress.” This is a big point, to my way of thinking. That person is not causing your stress. That is the firm way I would say it. I understand that it seems that they are “causing” your stress, but they are not. The “language of blame” leads to not solving the problem. I think it leads to keeping the problem for longer and longer times. It is all about learning Boundaries, and about Passivity and Master/Slave. What I find is that the solution lies in learning how to “remain calm and peaceful” while dealing with a person like that. This I like your working on finding ways to express yourself, but not in blaming that person.
regarding the question:
“Do you know if there are any vitamins or herbal supplements that can help reduce or regulate the emotional adrenalin?
I know that adrenalin causing situations also dump sugar into the blood stream as a part of the fight or flight response. As the adrenalin recedes, we need to balance out the blood sugar. Post alarming situation, I like to eat, take Rescue Remedy (a Bach Flower Essence) and use the large muscles in the body to allow the body to express itself. A fear dance, a walk around the block and vocalizing all help. Long term stress induced adrenalin dumping could be helped by supporting the 'Kidney Qi' per Chinese Medicine and by taking Chromium supplements and flowers essences like Rescue Remedy or homeopathics like Ignacia.
Do you know if there are any vitamins or herbal supplements that can help reduce or regulate the emotional adrenalin?
|
By Jacqueline Beauchere, Global Digital Safety Advocate at Microsoft
It’s a new year and a new decade, and teens and adults around the world hope that respect, safety and freedom will define online life in the 2020s, new Microsoft research shows.
For the past four years, we’ve been invested in research as part of a campaign to promote digital civility – safer, healthier and more respectful online interactions among all people. With the advent of the new decade, we wanted to enhance that work and seek insight into people’s “2020s vision.”
We asked respondents to select three words to best describe what they hope will come to define online experiences and digital interactions over the next 10 years. “Respect” was by far the preferred option, chosen by two-thirds (66%) of participants. “Safety” followed at a rather close second (57%), while “freedom” (33%), “civility” (32%) and “kindness” (26%) rounded out the top five. “Empathy” was the only other choice to receive more than 20% of the vote – 21% precisely. Meanwhile, “well-being,” “inclusivity,” “health,” “compassion” and “curiosity” all scored between 11% and 15%.
In addition, we asked survey participants to pull out their crystal balls and predict the tone and tenor of online behaviors in the next decade, particularly with respect to some specific — and sometimes troubling — scenarios. Here are some of their responses:
- Half (50%) say technology and social media companies will create tools and implement policies to encourage more respectful and civil online behavior and punish poor conduct.
- Half (50%) also predict people’s ability to protect their privacy and personal data will improve.
- A third expect fewer women to be sexually harassed online (34%), fewer teens to be bullied (33%) and they expect online political discussions to become more constructive (33%).
The latest study, “Civility, Safety and Interaction Online – 2019,” polled teens aged 13-17 and adults aged 18-74 about their exposure to 21 different online risks across four categories: behavioral, sexual, reputational and personal/intrusive. This research builds on similar studies about digital civility that Microsoft has conducted in each of the last three years. The 2019/2020 installment polled respondents in 25 countries, up from 14, 23 and 22 countries from 2016 to 2018, respectively. A total of 12,520 individuals participated in this study, and we’ve surveyed more than 42,000 people on these topics since the start of this work. Full results of this poll, including the release of the latest Microsoft Digital Civility Index, will be released on international Safer Internet Day on February 11.
Less encouraging picture for 2020
Looking ahead to 2020 as a single year, respondents were less encouraged about making significant progress with respect to civil online behavior. For instance, nearly 4 in 10 feel unwanted online contact (39%), bullying (39%) and unwelcome sexual attention (39%) will worsen this year. A slightly smaller percentage (35%) expect people’s reputations, both professional and personal, will continue to be attacked online. One-quarter (25%) of respondents see improvement across each of these risk areas in 2020.
Still, those percentages show significant improvement from respondents’ assessments of the current state of digital civility. Among the countries surveyed, more than half of the respondents rated the current situation as “poor” in terms of people being contacted online without their permission or consent (60%), individuals being bullied, harassed or abused (51%), and people being solicited with unwanted relationship requests or sexual advances (51%). A lesser percentage (46%) see people’s reputations being sullied online.
Microsoft’s Digital Civility Index and Challenge
So, what can we do to improve global digital civility as we kick off the 2020s? As the new year and new decade begin, it seems an appropriate time to consider a new year’s and perhaps even a new decade’s resolution. As we have throughout the span of this research, we’re once again calling on youth, teens and adults across the globe to sign onto our Digital Civility Challenge and pledge to live by four basic tenets for life online to encourage kinder, more empathetic and more respectful interactions. Specifically:
- Live the “Golden Rule” and treat others with respect and dignity both online and off
- Respect differences of culture, geography and opinion, and when disagreements surface, engage thoughtfully
- Pause before replying to comments or posts you disagree with and ensure responses are considerate and free of name-calling and abuse
- Stand up for yourself and others if it’s safe and prudent to do so
These may sound like practical, common-sense pieces of advice — and they are. Too often in recent years, however, they appear to have fallen out of favor, as shock value and social comparisons fuel the chase for “likes” and “followers.” For evidence of this, look no further than the sentiments and work of members of our own teen Council for Digital Good. These young people and several others like them have committed to turning this tide. In 2020 and beyond, let’s hope many more follow.
Next month, when we make the complete research findings available, we will also announce the latest reading of the Microsoft Digital Civility Index, a global and country-by-country measure of civility as reported by citizen-respondents. The index measures the perceived level of online civility in a specific country based on the reported level of risk exposure of individuals in that country. The index works like a golf score: A lower reading equates to a higher level of perceived civility. In the prior three years, the index held relatively steady, averaging 66% — an indication of both risk exposure and digital civility — despite changes each year to both the number of countries and the various risks included.
This article was first published in Microsoft on the Issues on January 2, 2020
|
What is EMF?
Posted by LiLeah on
EMFs or electromagnetic fields exist everywhere in the environment. In our homes, school, and workplace. With more connected mobile devices on the market than ever and the rollout of 5G, it's crucial to increase our awareness about this all-penetrating technology.
We got used to the conveniences of modern life. But only a few of us are aware of the possible health risks presented by the everyday technologies that make our lives more convenient.
Over the years, scientists learned that many appliances that use electricity also create EMFs. These include to an increasing degree our cellphones, Wi-Fi routers, computers, and 3G/4G/5G towers. They radiate invisible frequencies that some experts are concerned about.
Various human-made sources of electromagnetic fields.
- Electrical appliances
- Cell phones, cell towers, WiFi routers
- Radio communications devices
- AM / FM radio and television
- emergency service radio (police, fire, ambulance)
- air traffic control
- 3G/4G/5G towers
In towns and cities, the technically generated level of electromagnetic radiation, which is typical nowadays, is more than 1 billion times higher than natural EMFs which are necessary for life. This means we are all constantly exposed to electromagnetic frequencies.
Dangers Of EMFs
It is scientifically proven, that EMF radiation causes harmful oxidative processes to manifest within our cells, which have overall negative effects on our health and well-being. This is the primary factor behind accelerated aging and the incurrence of chronic degenerative illnesses.
According to Martin Pall, Ph.D, non-ionizing radiation activates voltage-gated calcium channels (VGCCs) that then release calcium from outside the cell to the inside. These pathophysiological effects are produced largely through excessive calcium ion signaling that leads to excessive nitric oxide (NO), superoxide, peroxynitrite, free radical formation, and consequent oxidative stress.
Many studies suggest that this is the mechanism that leads to an increase of oxidative stress markers and damage to our DNA.
As the biological damage from EMFs is triggered by activating your VGCCs, tissues with the highest densities of VGCCs are at greatest risk of harm. These mainly include the brain, testes, nervous system, SA Node - the "natural pacemaker" of your heart, and the retina.
Below you can find different studies showing the negative effects of EMF radiation on our cells and bodies.
Damaging to Childhood Development
Radiation from Wi-Fi and cellular phones can disrupt normal cellular development, especially fetal development. A 2004 animal study linked exposure to delayed kidney development. These findings were supported by a 2009 Austrian study. In fact, the disruption of protein synthesis is so severe that authors specifically noted, "this cell property is especially pronounced in growing tissues, that is, in children and youth. Consequently, these population groups would be more susceptible than average to the described effects." In short, bathing the developmentally young in Wi-Fi increases their risk of developmental issues.
Affects Cell Growth
When a group of Danish ninth graders experienced difficulty concentrating after sleeping with their cell phones by their head, they performed an experiment to test the effect of wireless Wi-Fi routers on garden cress. One set of plants was grown in a room free of wireless radiation; the other group grew next to two routers that released the same amount of radiation as a cell phone. The results? The plants nearest the radiation didn’t grow.
Derails Brain Function
Other scientists have begun to look at the impact of 4G radiation on brain function. By using MRI technology, they found that persons exposed to 4G radiation had several areas of reduced brain activity.
Reduces Brain Activity in Females
A group of 30 healthy volunteers, 15 men and 15 women, were given a simple memory test. First, the entire group was tested without any exposure to Wi-Fi radiation — no concern. Then, they were exposed to 2.4 GHz Wi-Fi from a wireless access point for about 45 minutes. During that portion of the testing, brain activity was measured and the women had a noticeable change in brain activity and energy levels.
We’ve known for a long time that the heat generated by laptops kills sperm. Now it turned out that heat isn’t the only threat to a man’s virility. Research has found exposure to Wi-Fi frequencies reduce sperm movement and cause DNA fragmentation. Both human and animal testing has confirmed that exposure negatively affects sperm.
May Impact Fertility
The results of an animal study suggest that some wireless frequencies may prevent egg implantation. During the study, mice exposed 2 hours a day for 45 days had significantly increased oxidative stress levels. The cellular damage and impact on DNA structure from exposure suggest a strong possibility of abnormal pregnancy or failure of the egg to implant.
The Karolinska Institute in Sweden released a warning in 2011, stating:
”Pregnant women are cautioned to avoid using wireless devices themselves and distance themselves from other users, ”
”Current US [and Canada]…standards for radio frequency and microwave radiation from wireless technology are entirely inadequate, ” and
”Safety standards also ignore the developing fetus…”
Provokes Cardiac Stress
If you think your heart races when surrounded by wireless networks or 3G or LTE cell phones, it may not be in your head. A study involving 69 subjects reported that many of them experienced a real physical response to electromagnetic frequencies. Exactly what was the physical response? Increased heart rate — similar to the heart rate of an individual under stress.
This is extremely controversial but we can’t ignore that plenty of animal models indicate that exposure to electromagnetic radiation increases the risk of tumor development. While human studies are rare, reports and case studies abound. One such case involves a young 21-year-old woman who developed breast cancer. What makes this case unique was that her family did not have a predisposition to breast cancer… and she developed the tumor right on the spot she carried her cell phone in her bra.
Visit our website https://realyoustore.com/ to learn more about EMF and get the best EMF Protection Products right now!
Share this post
- 0 comments
- Tags: EMF
|
Cytometry allows the measurement of optical properties and fluorescence of large numbers of cells or particles at high speed. The main advantage of flow cytometry is the speed of acquisition of data, while collecting fluorescent parameters on large numbers of cells, therefore allowing the analysis of complex or rare subpopulations.
Flow cytometry is routinely used to quantify multiple cellular markers or functions such as cell viability, proliferation, cell cycle, cytokine secretion, protein phosphorylation, microparticles quantification… When associated with a cell sorting system, populations of interest can be isolated for cell culture or further molecular analysis.
The plateform is also equipped with an Image Cytometer, able to capture high-resolution images of shape and fluorescence from cells in flow at rates of up to 1,000 cells per second. Combination of flow cytometry high-throughput power with image resolution allows acquisition of statistically robust data on the detailed structure of cells and the location of intracellular components, and the study of endocytosis, phagocytosis, cell-cell interaction, colocalization or in situ hybridization.
- Camille Knosp: Facility Manager
- Corinne Tanchot: Scientific advisor
|
The Master Switch: The Rise and Fall of Information Empires - Tim Wu (2010)
Part III. The Rebels, the Challengers, and the Fall
Chapter 15. Esperanto for Machines
As a high school student in Bialystok, Russia, Ludwik Łazarz Zamenhof spent his spare time devising a language. He would work on it diligently for years, and in 1887, at the age of twenty-six, he published a booklet entitled Lingvo internacia. Antaŭparolo kaj plena lernolibro (International Language: Foreword and Complete Textbook). He signed it “Doctor Hopeful,” or, in the language he had invented, “Doktoro Esperanto.”1
Zamenhof’s idea for a standardized international language was an ingenious idea poorly implemented. Consequently, his noble ambition is often forgotten: to dissolve what he considered the curse of nationalism. If everyone in the world shared a second language, “the impassable wall that separates literatures and peoples,” he wrote, “would at once collapse into dust, and … the whole world would be as one family.”2 While there have been moments when it seemed that Esperanto might really take off—in 1911, for instance, the Republic of China considered adopting it as the country’s official language—Zamenhof’s invention has not remotely become a universal language.3 Nonetheless, we live in a world in which his dream of a common tongue has been achieved—though not among humans, as he would have hoped, but among machines. It goes by a less hopeful sounding name, “the Internet Protocol,” or TCP/IP, but for computer users it has succeeded where Esperanto failed.
Between Licklider’s first enunciation of an intergalactic network and the mid-1970s, the idea of computers as communications devices had actually given birth to a primitive network, known as the ARPANET. The ARPANET was an experimental network that connected university and government computers over lines leased from AT&T. But it wasn’t quite the universal network Licklider envisioned, one that could connect any network to any other. To achieve that goal of a true, universal computer network, one would need a universal language. One would need an Esperanto for computers. In 1973, this was the problem facing two young computer science graduate students named Vint Cerf and Robert Kahn.
One memorable afternoon in 2008 in a small Google conference room equipped with a whiteboard, I asked Vint Cerf what exactly was the problem he had been trying to solve when he designed the Internet protocol.4 The answer surprised me. As Cerf explained it, he and Kahn were focused on developing not some grand design but rather a very much ad hoc accommodation. Running on a collection of government lines and lines leased from AT&T, the ARPANET was at the time just one of three packet networks in development. The others were a packet radio network and a packet satellite network, both privately run. Cerf and Kahn were trying to think of some way to make these networks talk to one another. That was the immediate necessity for an “internetwork,” or a network of networks.
The Internet’s design, then, wasn’t the result of some grand theory or vision that emerged fully formed like Athena from the head of Zeus. Rather, these engineers were looking for a specific technical fix. Their solution was indeed ingenious, but only later would it become clear just how important it was. Cerf describes the open design of the Internet as necessitated by the particularities of the specific engineering challenge he faced. “A lot of the design,” Cerf said, “was forced on us.”
The Internet’s creators, mainly academics operating within and outside the government, lacked the power or ambition to create an information empire. They faced a world in which the wires were owned by AT&T and computing was a patchwork of fiefdoms centered on the gigantic mainframe computers, each with idiosyncratic protocols and systems. Now as then, the salient reality—and one that too many observers don’t grasp, or overlook—is that the Internet works over an infrastructure that doesn’t belong to those using it. The owner is always someone else, and in the 1970s, that someone was generally AT&T.5
The Internet founders built their unifying network around this fundamental constraint. There was no other choice: even with government funding they did not have the resources to create an alternative infrastructure, to wire the world as Bell had spent generations and untold billions doing. Consequently, their network was from its beginning beholden to the power and autonomy of its owners. It was designed to link human brains, but it had no more control over their activities than that, an egalitarianism born of necessity, and one which would persist as the network grew over decades to include everyone.
The stroke of genius underlying a network that could interconnect other networks was the concept of “encapsulation.” As Cerf said, “we thought of it as envelopes.” Encapsulation means wrapping information from local networks in an envelope that the internetwork could recognize and direct. It is akin to the world’s post offices agreeing to use names of countries in English, even if the local addresses are in Japanese or Hindi. In what would come to be known as TCP (or Transmission Control Protocol), Cerf and Kahn created a standard for the size and flow rate of data packets, thereby furnishing computer users with a lingua franca that could work among all networks.6
As a practical matter, this innovation would allow the Internet to run on any infrastructure, and carry any application, its packets traveling any type of wire or radio broadcast band, even those owned by an entity as given to strict controls as AT&T. It was truly a first in human history: an electronic information network independent of the physical infrastructure over which it ran. The invention of encapsulation also permitted the famous “layered” structure of the Internet, whereby communications functions are segregated, allowing the network to negotiate the differing technical standards of various devices, media, and applications. But, again, this was an idea born not of design but of the practical necessity to link different types of networks.
To ponder the design of the Internet is to be struck by its resemblance to other decentralized systems, such as the federal system of the United States. The Founding Fathers had no choice but to deal with the fact of individual states already too powerful and mature to give up most of their authority to a central government. The designs of the first two constitutions were therefore constrained—indeed, overwhelmingly informed—by the imperative of preserving states’ rights, in order to have any hope of ratification. Similarly, the Internet’s founders were forced, however fortunate the effect may now seem, to invent a protocol that took account of the existence of many networks, over which they had limited power.
Cerf and Kahn pursued a principle for Internet protocols that was the exact opposite of Vail’s mantra of “One System, One Policy, Universal Service.” Where AT&T had unified American communications in the 1910s by forcing the same telephone on every single user, Cerf and Kahn and the other Internet founders embraced a system of tolerated difference—a system that recognized and accepted the autonomy of the network’s members. Indeed, to do what Bell had done fifty years earlier might in fact have been impossible, even for an entity as powerful as Bell itself. For by the sixties, the charms of centrally planned systems generally were beginning to wear thin, soon to go the way of short-sleeved dress shirts.
The economist John Maynard Keynes once said, “When the facts change, I change my mind. What do you do, sir?”7 No apostle of central planning could live through Europe’s Fascist and Soviet experiments without admitting that directed economies had their limitations and liabilities. The same ideas that had inspired Henry Ford and Theodore Vail had, in the realm of politics, led to Hitler and Stalin. And so a general repudiation of the whole logic of centralization was a natural fact of the Cold War era.
It was an Austrian economist who would provide the most powerful critique not just of central planning but of the Taylorist fallacies underlying it. Friedrich Hayek, author of The Road to Serfdom, is a patron saint of libertarians for having assailed not only big government, in the form of socialism, but also central planning in general.8 For what he found dangerous about the centralizing tendencies of socialism applies equally well to the overbearing powers of the corporate monopolist.
Hayek would have agreed with Vail’s claim, as with the Soviets’, up to a point: ideally, planning should eliminate the senseless duplication that flows from decentralized decision making. There is a certain waste implied in having, say, two gas stations on a single street corner, and in this sense, as Vail insisted, monopolies are more efficient than competition.*
But what prevented monopoly and all centralized systems from realizing these efficiencies, in Hayek’s view, was a fundamental failure to appreciate human limitations. With perfect information, a central planner could effect the best of all possible arrangements, but no such planner could ever hope to have all the relevant facts of local, regional, and national conditions to arrive at an adequately informed, or right, decision. As he wrote:
If we possess all the relevant information, if we can start out from a given system of preferences and if we command complete knowledge of available means, the problem which remains is purely one of logic.… This, however, is emphatically not the economic problem which society faces.… [T]he “data” from which the economic calculus starts are never for the whole society “given” to a single mind which could work out the implications, and can never be so given.9
Such a rejection of central planning beginning in the sixties was hardly limited to those with conservative sensibilities. Indeed, the era’s emblematic liberal thinkers, too, were rediscovering a love for organic, disorganized systems. Another Austrian, the political scientist Leopold Kohr in the 1950s, began a lifetime campaign against empires, large nations, and bigness in general. As he wrote, “there seems to be only one cause behind all forms of social misery: bigness. Oversimplified as this may seem, we shall find the idea more easily acceptable if we consider that bigness, or oversize, is really much more than just a social problem.… Whenever something is wrong, something is too big.”10
Kohr’s student, the economist E. F. Schumacher, in 1973 wrote Small Is Beautiful: Economics As If People Mattered, developing the concept of “enoughness” and sustainable development.11 Jane Jacobs, the great theorist of urban planning, expresses a no less incendiary disdain for centralization, and as in Hayek, the indictment is based on an inherent neglect of humanity. In her classic The Death and Life of Great American Cities, she relies on careful firsthand observations made while walking around cities and new developments to determine how Olympian planners like Robert Moses were going wrong.12 There was no understanding, let alone regard, for the organic logic of the city’s neighborhoods, a logic discernible only on foot.
All of these thinkers opposed bigness and prescribed a greater humility about one’s unavoidable ignorance. No one could fully understand all the facts of the dynamic market any more than one could weigh the true costs of introducing a vast new flow of traffic through neighborhoods like New York’s SoHo and West Village, which had developed organically for centuries. These thinkers were speaking up against a moribund belief in human perfectibility, or scientific management theorist Frederick Taylor’s the “one right way.”13 Cities, like markets, had an inscrutable, idiosyncratic logic not easily grasped by the human mind but deserving of respect.
It was beginning to seem that the same might be true of information systems.
While its design had been born of necessity, through the 1970s and early 1980s the Internet’s developers began to see a virtue in it. And their awareness grew with their understanding of what a universal network needed if it was to operate, evolve, and advance in organic fashion. In the final draft of the TCP protocol, Jon Postel,* another Internet founder, inserted the following dictum:
Be conservative in what you do. Be liberal in what you accept from others.14
It may seem strange that such a philosophical, perhaps even spiritual, principle should be embedded in the articulation of the Internet, but then network design, like all design, can be understood as ideology embodied, and the Internet clearly bore the stamp of the opposition to bigness characteristic of the era. Not long thereafter, three professors of computer science, David Reed, David Clark, and Jerome Saltzer, would try to explain what made the Internet so distinctive and powerful. In a seminal paper of 1984, “End-to-End Arguments in System Design,” they argued for the enormous potential inherent in decentralizing decisional authority—giving it to the network users (the “ends”).15 The network itself (the “middle”) should, they insisted, be as nonspecialized as possible, so as to serve the “ends” in any ways they could imagine.*
What were such notions if not the computer science version of what Hayek and Jacobs, Kohr and Schumacher, had been arguing? While we cannot say exactly that the network pioneers of the 1970s were disciples of these or any particular thinker, there is no denying the general climate of thought in which computer scientists were living, along with everybody else. Coming of age concurrently with an ideological backlash against centralized planning and authority, the Internet became a creature of its times.
In 1982 Vint Cerf and his colleagues issued a rare command, drawing on the limited power they did have over their creation. “If you don’t implement TCP/IP, you’re off the Net.”16 It was with that ultimatum that the Internet truly got started, as computer systems around the world came online. As with many new things, what was there at first was more impressive in a conceptual sense than in terms of bells and whistles, but as usual, it was the human factor that made the difference, as those who joined could suddenly email or discuss matters with fellow computer scientists—the first “netizens.” The Internet of the 1980s was a mysterious, magical thing, like a secret club for those who could understand it.
What was the Internet in 1982? Certainly, it was nothing like what we think of as the Internet today. There was no World Wide Web, no Yahoo!, no Facebook. It was a text-only network, good for transmitting verbal messages alone. More important, it was not the mass medium of our experience. It still reached only large computers at universities and government agencies, and mostly ran over lines leased from AT&T (as a complement, the federal government would begin to build its own physical network in 1986, the NFSNET). As far as the internetwork had come conceptually, a different kind of revolution would be needed to bring it to the people. And that transformation, less technological than industrial, would take another decade; first, the computer would have to become personal.
* In the parlance of economists, many market failures—externalities, collective action problems, and so on—can be eliminated by a central planner.
* Postel is profiled in my first book (coauthored with Jack Goldsmith), Who Controls the Internet?
* Much later, in the early years of the twenty-first century, the phrase “net neutrality” would become a kind of shorthand for these founding principles of the Internet. The ideal of neutrality bespeaks a network that treats all it carries equally, indifferent to the nature of the content or the identity of the user. In the same spirit as the end-to-end principle, the neutrality principle holds that the big decisions concerning how to use the medium are best left to the “ends” of the network, not the carriers of information.
|
|Dimensions||30 × 11.5 in|
Self taught artist Isaac Bignell was a Cree painter, born on The Pas reserve, 400 miles north of Winnipeg, Manitoba. During his short life he lived in Winnipeg, Minneapolis and Vancouver. Isaac eventually developed his own style of sponge painting, creating wildlife images distinguished by flowing lines. Although he died at the peak of his career at the age of 37, Isaac’s presence lives on through well known first nations artists Russel Noganosh, who apprenticed under Isaac in 1979, and Garnet Tobacco, who includes Isaac as one of his artistic influences.
- “My art is strongly influenced by the traditions of my people.
I was brought up to live off the land from an early age.
Hunting and trapping, living in harmony with the earth has
taught me to respect the animals and the spirit and power
of nature. I hoop dance and sing Pow Wows to maintain
my cultural heritage. Through art and dancing I attempt to
influence native people to continue their cultural ways; the
gift that was given to us by the Great Sprit.”Isaac Bignell
Categories: First Nations | Paintings, Isaac Bignell.
|
If you spend any time looking at old English and European guns, “proof” is something you’ll hear about.
In Great Britain and throughout the continent, state-recognized “proof houses” test every new firearm built in, or imported into, that country. Basically, they do this by trying to blow the gun up. If it survives. this process “proves” the shotgun, pistol, or rifle is safe to shoot.
The UK has two proof house: The London Proof House, founded in 1637, and the Birmingham Proof House, founded in 1813. Both are still proofing guns today.
With this series of pics, photographer Matthew Brown takes viewers into the inner workings of the Birmingham house and give us a rare look at one goes on throughout the proofing process.
|
When the global real price of oil declined by about 65% between June 2014 and March 2016, many economic analysts expected a large boost to the US economy. For example, in December 2014, the IMF predicted that low energy prices would help accelerate US economic growth to 3.5% in 2016. As it turned out, average US economic growth increased only slightly from 1.8% per year before June 2014 to 2.2% after June 2014. By early 2016, the New York Times concluded that “it has been a truism of the American economy for decades: When oil prices rise, the economy suffers; when they fall, growth improves. But the decline in oil prices over the last two years has failed to deliver the usual economic benefits” (New York Times 2016).
Some observers have argued that the structure of the economy has fundamentally changed in recent years, making existing models of the transmission of oil price shocks obsolete. In two recent papers, we show that this conclusion is unwarranted (Baumeister and Kilian 2017, Baumeister et al. 2017). Notwithstanding some subtle changes in the transmission of oil price shocks to the US economy as a result of the US shale oil boom (Kilian 2017a), standard empirical models remain surprisingly useful for understanding why there was no strong stimulus.
Why the demand channel of transmission is more important than the supply channel
Oil price shocks may affect the economy by shifting domestic aggregate demand as well as by shifting domestic aggregate supply. In an oil-importing economy, unexpected oil price declines, all else equal, lower the cost of producing domestic goods and services. However, this cost or supply channel does not appear to be quantitatively important for the US economy. For example, there is no indication of a boom in the transportation sector (trucking, rail freight, air travel) after June 2014. Moreover, stock returns of companies that heavily rely on oil products as inputs in production (such as chemicals, rubber, and plastics) underperformed following the 2014-16 decline in the price of oil, while stock returns of companies catering to the needs of consumers (such as retail sales, tourism, and apparel) were much higher than average stock returns. The latter evidence suggests that the main channel of the transmission of unexpected oil price declines to the US economy is an increase in the demand for domestic goods and services, as consumers find themselves with more money in their wallet after filling up their cars at the gas station. When consumers spend this discretionary income on other goods and services, they create a stimulus for the domestic economy. Higher private consumer spending and business investment in turn has a multiplier effect on real GDP, if there is slack in the economy.
Oil price shocks as terms-of-trade shocks
The textbook model of the transmission of oil price shocks views an unexpected decline in the price of imported crude oil as a terms-of-trade shock, where the terms of trade are defined as the ratio of an economy’s import and export prices. As the terms of trade of the oil-importing economy improve, income is transferred from oil-exporting economies abroad to the US economy, creating a domestic stimulus. This basic insight, however, is incomplete because it assumes that imported crude oil may be used directly in production and consumption. In reality, no firm or consumer ever buys crude oil with the exception of refiners and some petrochemical companies. Rather, firms and consumers purchase refined products such as motor fuel. This means that we need to focus on the unexpected decline in the real price of motor fuel (henceforth referred to as gasoline) if we want to understand the implications of this terms-of-trade shock for private consumption. This decline is only about half as large as the unexpected decline in the real price of imported crude oil, given the cost share of crude oil in producing gasoline.
The consumption stimulus
Changes in the real price of gasoline affect the purchasing power of consumers to the extent that consumers spend their income on gasoline. It is straightforward to quantify the cumulative effects of unexpected changes in consumers’ purchasing power on private consumption by regression methods, accounting for changes in the dependence of the economy on imports of gasoline and crude oil. As less consumer income is transferred abroad, given the decline in the price of imported crude oil and hence in gasoline prices, consumers are able to spend more on other domestic goods and services. If there is slack in the economy, this increase in domestic demand, all else equal, raises real GDP. It can be shown that between June 2014 and March 2016, the consumption stimulus raised real GDP by 0.51%.
Are there asymmetries in the transmission of oil price shocks?
Conventional regression-based estimates of the US private consumption stimulus implicitly assume that the relationship between private consumption and unexpected changes in purchasing power is linear. This assumption is appealing because there is no compelling evidence of asymmetries in the transmission of oil price shocks to private consumption. Asymmetric responses to positive and negative oil price shocks may arise because of increased uncertainty about future oil and gasoline prices, in response to unexpected changes in the real price of oil or because frictions prevent the reallocation of labour and capital from the oil sector to other sectors of the economy. However, it can be shown that there is no evidence to support the notion that rising uncertainty about future oil and gasoline prices lowered private automobile consumption after June 2014, which casts doubt on the empirical relevance of this uncertainty channel. Nor is there evidence that the underemployment of labour and the underutilisation of capital in the US oil industry, caused by the decline in the real price of oil after June 2014, significantly slowed overall US growth. In fact, in most US states with a large oil sector, the unemployment rate between June 2014 and March 2016 declined. Even in North Dakota, which is heavily dependent on shale oil production, the unemployment rate rose only from 2.7% to 3.1%. Thus, frictions to the reallocation of capital and labour do not appear quantitatively important in the US economy either.
The investment stimulus
Unexpected oil price declines also affect investment spending. In discussing the investment stimulus from unexpectedly lower oil and gasoline prices, it is important to differentiate between investment spending by the oil sector and investment spending by other firms. Whereas most firms tend to benefit from lower oil prices, as domestic consumer demand increases, firms in the oil sector may actually cut their investment spending. Which of these two effects dominates depends on whether oil producers expect the price of oil to fall below the breakeven price for profitable oil investments, and how large the share of such oil investment projects is in overall investment. We show that the decline in oil investment lowers real GDP by 0.57% cumulatively, more than offsetting the cumulative increase by 0.19% caused by higher non-oil investment.
The net stimulus
Table 1 summarises the multiplier effect on US real GDP of the stimulus to private consumption and to non-residential investment created by the 2014-16 oil price decline. All estimates are expressed as cumulative percentage changes in US real GDP. Although non-oil business investment and private consumer spending jointly raised US real GDP by 0.7%, Table 1 shows that this increase was largely offset by the decline in the investment by the oil sector. The net effect on real GDP from unexpectedly lower oil prices has been only 0.13% (which is near zero when expressed in terms of average annual growth rates). Hence, the continued sluggish growth of the US economy after June 2014 is not a puzzle at all. It is exactly what we should have expected.
Table 1 The net stimulus from unexpectedly lower real oil prices, 2014Q2 to 2016Q1
Notes: All cumulative multipliers have been computed based on an import propensity of 15%.
What the analysis in Table 1 ignores is the fact that the 2014-16 oil price decline did not occur in a vacuum. It was associated in part with an unexpected slowdown of the global economy, which substantially lowered US export growth (Baumeister and Kilian 2016, Kilian 2017b). Controlling for this decline in exports, US real GDP between June 2014 and March 2016 would have increased by an additional 0.6%, but even this extra boost would only represent a modest overall increase in real GDP.
No one familiar with standard empirical models of the transmission of oil price shocks should have been shocked by the lacklustre performance of the US economy since June 2014. It is well documented that the consumption stimulus from lower oil prices is only modest, and the recent episode is no exception. Likewise, earlier studies of the large and sustained decline in the price of oil in 1986 already documented the sensitivity of US oil investment to falling oil prices, so the sharp decline in oil investment after June 2014 and the implied reduction in US real GDP growth should not have come as a surprise (Edelstein and Kilian 2007). Finally, it is well known that in analysing the macroeconomic consequences of declines in the price of oil, we need to take account of the overall state of the global economy and its implications for US exports.
New York Times (2016), “This Time, Cheaper Oil Does Little for U.S. Economy”, 21 January.
Baumeister, C, and L Kilian (2016), “Understanding the Decline in the Price of Oil since June 2014”, Journal of the Association of Environmental and Resource Economists 3: 131-158.
Baumeister, C, and L Kilian (2017), “Lower Oil Prices and the U.S. Economy: Is This Time Different?”, Brookings Papers on Economic Activity Fall 2016: 287-336 (see CEPR Discussion Paper No. 11792).
Baumeister, C, L Kilian, and X Zhou (2017), “Is the Discretionary Income Effect of Oil Price Shocks a Hoax?”, CEPR Discussion Paper No. 11868.
Edelstein, P, and L Kilian (2007), “The Response of Business Fixed Investment to Energy Price Changes: A Test of some Hypotheses about the Transmission of Energy Price Shocks”, B.E. Journal of Macroeconomics 7(1) (Contributions).
Kilian, L (2017a), “Global Repercussions of the U.S. Tight Oil Boom,” VoxEU.org, 2 April.
Kilian, L (2017b), “The Impact of the Fracking Boom on Arab Oil Producers”, Energy Journal 38(6): 137-160.
|
As a vegan, you may wonder if you need to have routine blood tests to make sure you’re getting all the nutrients you need. The answer is yes, routine testing is important for everyone, including vegans. In this article, we explain why routine testing is important and how Medmesafe can help you.
What are routine tests?
Routine tests are laboratory tests that are performed to measure the amount of certain nutrients, hormones, and other elements in the blood. These tests are useful for evaluating overall health status and detecting health problems early. In general, it is recommended that adults have routine blood tests every one to two years.
Why are routine tests important for vegans?
While a vegan diet can be healthy, it can be difficult to obtain certain essential nutrients through food alone. Vegans may be deficient in certain nutrients, such as vitamin B12, iron, calcium, and zinc. Deficiency in these nutrients can lead to health problems, such as anemia, osteoporosis, and other health problems.
Undergoing routine testing ensure vegans they are getting all the nutrients they need. Knowing your nutritional status help you modify your diet fo you to get everything you need. Additionally, laboratory tests detect health problems early, which allows to prevent more serious health problems in the future.
How can Medmesafe help?
Medmesafe offers routine testing for vegans that measures the levels of key nutrients in the blood. Results are delivered online within 10 days max and can be shared with a healthcare professional. In addition, we offer promotions on routine testing for vegans.
To purchase routine testing, visit our website at https://www.medmesafe.com/general-checkup-for-vegans
Medmesafe also offers a wide variety of laboratory tests to evaluate overall health.
|
Ron Smith, MD
Poxvirus in the News
Image Source. Negative-stained TEM (transmission electron microscopic) images.
All the viruses shown are members of the Poxviridae family. Variola (smallpox) infects only humans. Vaccinia (cowpox) and paravaccinia infect both humans and animals, and may be transmitted between the two. Note the common morphology of the various Poxviridae members, exhibited in their overall, barrel-shaped structure, though the paravaccinia virus tends to be more ovoid. Image 1 represents a mulberry form of the vaccinia virus. Image 2 is a paravaccinia virus. Image 3 shows three smallpox (variola) viruis particles which came from a vesicular fluid specimen.
CDC and Texas Confirm Monkeypox In U.S. Traveler
CDC Newsroom – July 16, 2021
More than 200 people being monitored for monkeypox in the U.S.: CDC
CTV News – July 22, 2021
Table of Ebola (EBV) Strains.
Kingdom: Riboviria, Phylum: Orthornavirae, Class: Negarnaviricota, Order: Monjiviricetes, Order: Mononegavirales, Family: Filoviridae, Genus: Ebolavirus, Species: (as shown below)
Scrolling Table of Current & Past Occurrences of Ebola (EBV) Infection.
Source: WHO Ebola virus disease
How To Use The Ebolavirus Map.
There well over a hundred map markers on the map. When you do a search, all available information for each marker is compared to your search criteria. If you search for “Congo” then the search will return both marker headings and descriptions that match. If you want to search only the marker labels, then use “Congo;” instead. If you want to search for a particular strain of virus, then use the correct acronym. If you want to see outbreaks in a ceration year, then you can use “1976” or “1976.” to get the correct results.
|
What is a Chaldean person?
Chaldeans are Aramaic-speaking Eastern cynic Catholics. … Chaldeans are united immediately the fable Catholic buryingground but own part Bishops and a Patriarch (Patriarch of Babylon for the Chaldeans) who oversees the Chaldean Catholic Church.
What does the term Chaldeans mean?
1a : a disintegrate of an old Semitic nation that became prevailing in Babylonia. b : the Semitic speech of the Chaldeans. 2 : a act skilled in the latent arts.
What is the Chaldean race?
(a) Historically Chaldeans commence engage north of Mesopotamia southeast of present day Turkey and northeast of Syria. numerous in those regions are considered Caucasian colorless or Middle Eastern since Chaldeans single arrange themselves as “Chaldean” or “Assyrian.”
What is the definition of Chaldeans in the Bible?
1. (biblical) A diviner or astrologer. noun. 1. A disintegrate of an old Semitic nation who ruled in Babylonia.
Is Chaldean a race or religion?
Chaldean Catholics whole population Assyrian diaspora 300 000+ United States 250 000 (2018) Canada 31 372 (2016) Australia 17 172 (2016)
Are all Chaldeans Catholic?
Most Chaldeans are members of the Eastern cynic Chaldean Catholic Church. As such they portion key beliefs of the Catholic transmitted although Chaldean churches own their own patriarch practices and rituals.
Was Nebuchadnezzar a Chaldean?
Nebuchadnezzar II is mysterious as the greatest empire of the Chaldean dynasty of Babylonia. He conquered Syria and Palestine and wetting Babylon a brilliant city.
What is a Chaldean Catholic priest?
‘Catholic buryingground of the Chaldeans’) is an Eastern Catholic local buryingground (sui juris) in full participation immediately the ant: gay See and the seize of the Catholic buryingground and is headed by the Chaldean Patriarchate See also what do lysosomes and golgi bodies own in common
Who are the Chaldeans in Habakkuk?
The studious of Habakkuk consists of five oracles almost the Chaldeans (Babylonians) and a poem of value to God. The phraseology of the studious has been praised by numerous lore suggesting that its creator was a man of big erudite talent.
Who is the Chaldeans today?
Iraq Chaldeans are Aramaic-speaking nation indigenous to Iraq. They own a history that spans good-natured sooner_than 5 500 years kind backwards to Mesopotamia mysterious as the cradle of civilization. The area encompasses at_hand day Iraq.
What is Chaldean food?
Chaldean cuisine involves sword-like spears of heavily spiced meats waste platters of greed cozy stews of potato leek and eggplant seasoned immediately pepper and lemon and showers of herbs and tangy stuffed grape leaves.
What are the Chaldeans in Daniel?
In Daniel chaldeans are usually astrologers or magicians as is frequently without_delay open engage the context: ‘So the empire commanded that the magicians the enchanters the sorcerers and the chaldeans be summoned to predict the empire his dreams’ (Dan. 2:2). single two early Chaldeans is abashed in the signification Babylonians (Dan.
Who was Nebuchadnezzar and what was his significance?
Nebuchadnezzar remains renowned for his promise campaigns in the appropriate for his composition projects in his chief Babylon and for the significant aloof he played in Jewish history. governing for 43 years Nebuchadnezzar was the longest-reigning empire of the Chaldean dynasty.
What does the Chaldean flag represent?
The two blue perpendicular lines (1987 versions and on) portray the infinite rivers Tigris and Euphrates which origin engage the north and stream inter the south of the Mesopotamian soft (The Chaldean Gulf/Tam-Ti-Sha-Mat-Kaldi) in the old Kaldee Babylonian language.
Is Chaldean the same as Aramaic?
Chaldeans are a Catholic ethno-religious aggregation that hails engage northern Iraq. briefly they betoken a rebuke of Aramaic in their villages interior Chaldeans in Iraq avow Arabic.
Did the Chaldeans live in Babylon?
These nomadic Chaldeans settled in the far southeastern assign of Babylonia chiefly on the left bank of the Euphrates See also how own maps changed dispute time
What do Chaldean Christians believe?
His buryingground originally comprised members of the Nestorian buryingground and has had a nearness in the rustic now mysterious as Iraq ant: full the 2nd Century. Members of the Nestorian buryingground believe that Jesus Christ has two natures – that of a divine being the Son of a God and that of a ant: invigorative human.
Who built the Tower of Babel?
NimrodThe Jewish-Roman historian Flavius Josephus in his Antiquities of the Jews (c. 94 CE) recounted history as confuse in the Hebrew Bible and mentioned the Tower of Babel. He wrote that it was Nimrod who had the tower built and that Nimrod was a despot who tried to nightly the nation far engage God.
How did the Chaldean Empire fall?
Belshazzar never became empire and Babylon ultimately cruel separate Nabonidus’s leadership as Cyrus the big of the Achaemenid dominion invaded Babylonia in 539 BC and put an end to the Neo-Babylonian Empire.
How many Nebuchadnezzar’s are in the Bible?
King Nebuchadnezzar’s Story in the Bible The story of empire Nebuchadnezzar comes to vitality in 2 Kings 24 25 2 Chronicles 36 Jeremiah 21-52 and Daniel 1-4.
Can Chaldean priests marry?
But accordingly are numerous Catholics who related to one of the numerous Eastern Catholic Churches these include the Ukrainians the Maronites the Chaldeans the Melkites and others. They are not correct and are no pure Catholic sooner_than members of the fable rite. But their priests can be married.
Who did God punish Judah with?
Nebuchadnezzar God abashed Nebuchadnezzar—the empire of Babylon—to arrival the nation engage Judah to Babylon since they would quick in banish for 70 years.
What did the Chaldeans invent?
The inventions of the hemispherium and the hemicyclium are attributed to Berosus (356-323 BCE) a Chaldean priest and astronomer who brought these types of sundials to Greece. twain dials use the form of a hollow hemisphere a form resembling the within of a bowl that mimics in ant: continue the obvious belly form of the sky.
What is Chaldean Astrology?
The Chaldean ant: disarray is veritably a hierarchy of the forces represented by heavenly bodies. This ant: disarray expresses itself in a timeline and is taken engage the orbits of the seven minute planets and their referring_to interval accordingly [see ail] one of the planets in its nightly rules a sponsor in the direct train of time.
Where are Chaldeans in the Bible?
Chaldea also spelled Chaldaea Assyrian Kaldu Babylonian Kasdu Hebrew Kasddim soft in southern Babylonia (modern southern Iraq) frequently mentioned in the Old Testament.
Who is Babylon today?
IraqThe boldness of Babylon whose ruins are located in present-day Iraq was false good-natured sooner_than 4 000 years ago as a little assign town on the Euphrates River See also how numerous blocks does water fertilize
What is the national dish of Iraq?
masgouf In Iraq and especially in the chief Baghdad masgouf is the country’s de friend interpolitical dish.
What is traditional Iraqi food?
Some distinction ingredients of Iraqi cuisine include: Vegetables such as eggplant tomato turnips beans shallots okra onion lentils cress potato rob courgette (zucchini) spinach lettuce leeks artichokes garlic peppers and chilli peppers. Cereals including greed bulghur wheat and barley.
What type of food do they eat in Iraq?
Wheat barley greed and dates are the staple foods of Iraq. Sheep and goats are the interior ordinary ant: [see condiment] but lamb cows chickens egotistical and sometimes camels are menacing as well.
What language did the Jesus speak?
AramaicMost pious lore and historians suit immediately Pope Francis that the historical Jesus principally plain a Galilean provincialism of Aramaic. Through traffic invasions and victory the Aramaic speech had expanded far afield by the 7th century B.C. and would befit the lingua franca in abundant of the Middle East.Mar 30 2020
Who was the Chaldean King?
Nabopolassarhistory of Mesopotamia almost 630 Nabopolassar became empire of the Chaldeans. In 626 he forced the Assyrians out of Uruk and crowned himself empire of Babylonia.
Where is Babylon today?
Babylon is one of the interior renowned cities of the old world. It was the center of a flourishing cultivation and an significant traffic hub of the Mesopotamian civilization. The ruins of Babylon can be confuse in modern-day Iraq almost 52 miles (approximately 85 kilometers) to the southwest of the Iraqi chief Baghdad.
Which Nebuchadnezzar is in the Bible?
Nebuchadnezzar appears prominently in the studious of Daniel as stop as in Kings Ezekiel Jeremiah Ezra and Nehemiah and rabbinical literature. The happen of the empire of Judah is presented in particularize in 2 Kings 24-25.
Who ate grass for 7 years in the Bible?
And in another unforgettable story in Daniel Nebuchadnezzar is punished for his hubris and wanders the wilderness resembling a beast eating grass for seven years. He was driven far engage nation and ate grass resembling the ox.
|
Use the Tab and Up, Down arrow keys to select menu items.
This course explores the processes that form and change coastal environments in New Zealand, the Pacific and worldwide. Topics examined include a selection of: sea level change today and into the future, waves and currents, the role of sediments in how beaches work to protect land and interact with oceans, plus sessions focussed on the wonders and practical realities of wetlands, tropical reefs, and human interactions with coastal environments. You will gain an understanding of models of the coastal zone, as well as an experience of field methods and laboratory techniques used in coastal investigations. The course was developed based on direct industry feedback and involvement. There is also an optional one-day field-trip, where there is an opportunity to put your learnings into practice and measure waves, currents and beach profiles, and to collect sediment and ecological data for analysis in labs, all using up-to-date professional techniques.
GEOG311 aims:- to inspire you to want to understand and learn more about coastal environments;- to provide a forum to share knowledge, experience and perspectives from different coastal sub-disciplines (that means you sharing, not just staff!),- to provide opportunities to understand the coast as a biophysical system,- to develop abilities in the application of coastal process principles for the analysis and interpretation of physical coastal environments and human issues relating to them, and- to explore with you initial-level coastal knowledge and skills relevant to the career streams of environmental science, consultancy, planning and management.Upon successful completion of GEOG311, you should gain:- understanding of the coast as a complex, biophysical system,- awareness of human impacts on various coastal environments and vice versa,- experience in analysing, interpreting and solving complex environment problems, and- experience in conducting research and written presentation to international scientific standards.
30 points of 200-level Geography, including GEOG201, orin special cases with approval of the Head of Department.
You are expected to spend about ten hours of your working week on this course (averaged over the semester). These hours should be planned as follows:- 2 hours each week in lectures;- 3 hours in selected weeks in labs;- an optional 1 day fieldtrip;- 5+ hours self-directed time for readings, online quizzes, working on your poster assignment, preparing for class, and reviewing notes.
2019 Course Handout Word Document (see learn for most recent version)
Domestic fee $877.00
International fee $4,438.00
* All fees are inclusive of NZ GST or any equivalent overseas tax, and do not include any programme level discount or additional course-related expenses.
For further information see
School of Earth and Environment on the
departments and faculties
|
A potting mix that contains peat moss and perlite is necessary to care for tropical plants. Bright indirect lighting should be provided for 12-14 hours. Tropical plants should be watered once per week. Aim for a 60% humidity. Use a liquid fertilizer to fertilize bi-weekly in spring or summer.
TROPICAL PLANTS BASICS
Although your house might not be as humid and warm as a rainforest, that doesn’t mean you can’t count the plants in it.
You can recreate their natural environment in your own home without having to turn it into a sauna.
This section will help you ensure that your tropical plants meet their essential needs.
A well-draining mix of ingredients like perlite, peat moss and vermiculite is necessary for tropical plants.
The soil in a jungle or rainforest is rich in organic matter.
It is also quite loose, which allows the water to drain to the roots of the plant.
This is something you should keep in mind when choosing the right potting mix to grow your tropical plants.
These floras will appreciate indoor potting soil made from a mix of perlite, peat moss and vermiculite.
This allows soil to absorb water efficiently and quickly. It also tends to dry out quickly.
We recommend keeping the soil slightly acidic if you can.
Drainage is the most important component of soil. Avoid choosing soils that are dense and heavy like clay.
The tropical plants can thrive on 12 to 14 hours of sunlight per day. Indirect light is usually required by tropical plants.
The light source for tropical plants is constantly changing in their natural environment.
You’ve probably seen photos of dense rainforests and noticed how they seem to grow in a way that is almost impossible for humans to see.
Because they all require light and everyone wants it, this is why there are so many of them. Even indoors, tropical plants thrive on plenty of sunlight.
The light should be bright but not direct. These leaves are large and thick but can be scorched if they are not in the right conditions.
Once the top 2 inches of soil has dried out, water tropical plants once per week. Keep the soil moist but not soggy. You must allow water to drain.
For tropical plants, the rule of thumb is that they will survive with more water than they need.
This could lead to a slippery slope. They do want their soil to be evenly saturated.
Don’t let your flora sit in water.
This could lead to root rot and wilting of leaves.
Temperatures between 65 and 75 degrees Fahrenheit (18 to 24 degrees Celsius) are ideal for tropical plants.
The tropical environment is known for being warm all year.
If there is a sudden temperature change, most owners will have to bring their plants in the evening.
When the temperature is below 50 degrees Fahrenheit (10 Celsius), these plants can become damaged. It is a good idea to keep your plants inside.
People from subtropical and tropical regions tend to be happier when they are inside the house.
Ideal houses are those that maintain temperatures between 65 and 75 degrees Fahrenheit (18 to 24 degrees Celsius).
Some species can even handle temperatures above 90 degrees Fahrenheit (32 Celsius).
Temperature requirements are simple: Keep your home warm, and don’t open any windows that could allow in drafts.
The humidity level of tropical plants is 60% or more.
Most plants don’t need to be humidified, particularly if they are in the right place.
This extra moisture is essential for tropical species to maintain their vibrant leaves and flowers.
The humidity levels in most homes range from 40 to 60 percent.
This is too low to support a tropical indoor plant. Aim for a humidity of at least sixty percent.
Any higher than eighty percent can cause damage to roots or leaves. How can you supply these levels without making your home a sauna?
Use a balanced liquid fertilizer to fertilize tropical plants bi-weekly in spring or summer.
You should definitely invest in high-quality fertilizer if you desire to have a tropical plant that is lush and beautiful.
Flashy flowers like Hibiscus can be very taxing for an individual.
Phosphorous is a key ingredient in tropical plants.
It’s also a good idea to add iron magnesium.
Balanced fertilizers should only be applied once every two weeks in spring and summer.
|
What is a Dry Socket?
A dry socket is a painful condition that occurs when the blood clot in your mouth after a tooth extraction fails to dissolve as quickly as normal. This leads to irritation and damage to the bone surrounding the affected tooth, causing it to become inflamed. Dry sockets are relatively common after third molar extractions (also known as wisdom teeth), which are often extracted due to a lack of space in your jaw.
While it’s unclear exactly why some people develop dry sockets after an extraction, there are several potential causes: The most likely culprits include poor oral hygiene prior to extraction or during recovery; smoking; taking pain medication that contains aspirin or ibuprofen; using mouthwash containing alcohol within 24 hours of surgery, and having an imbalance of calcium and phosphorus levels in your body (a condition known as hyperparathyroidism).
What Does a Dry Socket Look Like?
A dry socket is an open wound that occurs when a tooth is removed. It can range from a small, open wound to an abscess and is characterized by throbbing pain and sensitivity to hot or cold. The most common symptom of dry socket is pain, which typically worsens after the first 24 hours following extraction, but may be present for several days.
What Causes A Dry Socket?
Dry socket is caused by the loss of blood clot that forms around the tooth after it has been removed. It can also be caused when wisdom teeth or impacted teeth are removed, though this is less common than a dry socket following a regular extraction.
People who have diabetes, smokers, and those who are taking nonsteroidal anti-inflammatory drugs (NSAIDs) like aspirin and ibuprofen are much more likely to develop dry sockets.
Dry Socket Symptoms
Pain is the most common symptom of dry sockets, which can be very painful. It may feel like a toothache in the affected area or even like a migraine.
Swelling is also typical of dry sockets, so if you notice redness and swelling around your extraction site, there’s a good chance that it’s been affected by this condition as well as pain and tenderness (see below). If the swelling doesn’t go away within a few days after your procedure, contact your dentist right away to make sure that everything is okay!
Bad Taste In Mouth
Treatment Of A Dry Socket
If you’re experiencing a dry socket, the first thing to do is to seek medical treatment. You may be able to get rid of the pain by using over-the-counter pain medication. If it’s not an emergency situation, you can also try rinsing your mouth with warm salt water and applying a cold pack to the affected area. It’s important to eat soft foods for a few days until the pain subsides.
Dry Socket Prevention
Use a cold compress on an ongoing basis after brushing your teeth until the pain subsides completely (this could take up to two weeks). Applying ice cubes directly onto the socket area may sting, so try wetting paper towels in advance with cold water before placing them over the painful area. Do this for several minutes at a time until it feels numb enough for you to move comfortably.
OTC (Over-The-Counter) Medication
Take over-the-counter pain relievers such as ibuprofen or acetaminophen every eight hours until symptoms subside completely (which should happen within two weeks). If possible wait 4 hours between doses instead of taking another pill immediately after finishing off the current dosage.
Don’t Smoke, Vape, Or Use A Straw
Dry socket is a common ailment that can be painful and unpleasant. If you feel that you are experiencing a dry socket, you should immediately contact your dentist so they can treat the issue!
|
The meter is the basic unit of length in the International System of Units, and the symbol is m. One meter is equivalent to 1.09361329834 yards. It can be used to measure length, width and height.
The definition of “meter” originated in France. The length of 1 meter was originally defined as one ten-millionth of the distance from the Earth’s equator to the North Pole on the meridian passing through Paris. With the deepening of people’s understanding of metrology, the definition of the length of the meter has been revised several times. From May 20, 2019, the definition of meter is updated to: when the speed of light c in vacuum is expressed in m/s, a fixed value of 299792458 is selected to define the meter.
Yard refers to a unit of length. The symbol is yd. It is equal to 1.2 step and the equivalent of 36 inches. Conversion between imperial units and metric units is as follows: 1 yard equals 0.91144 meters.
As a unit of length, the origin of the yard is unclear. Currently it is mainly used for length measurement of some sports fields. The yard is also used for the measurement of the cricket pitch and it is also used for the measurement of the golf course. In the UK and US, yards are often used when referring to distance. In the UK, the law requires road signs for shorter distances to be represented by codes.
|
The Access Initiative and the World Resources Institute launched the first ever Environmental Democracy Index (EDI) on May 20, 2015.
The index tagged Environmental Democracy Index is the first of its kind and will offer new insights into the state of environmental democracy around the world and opportunities to use the tool to support reform. The index is the first comprehensive index designed specifically to monitor the state of environmental democracy around the world and measure procedural rights in an environmental context.
The launch event will featured an exploration of key trends that emerged from the results across the 70 countries EDI assessed and how governments and civil society can utilize these results in their efforts to strengthen environmental democracy around the world.
The Environmental Democracy Index is the first to measure the extent to which countries’ national laws protect environmental democracy rights, such as:
- the right of the public to freely access relevant and timely information,
- to provide public input and scrutiny in decision-making,
- and to seek justice before an independent and fair legal authority in cases of environmental harm or violation of rights.
The analysis EDI provides for each participating country helps to identify legal gaps in the three areas of environmental democracy. Comparison is easy when all the data is stored in one place on a user-friendly online platform. The EDI was designed for the use of a wide range of stakeholders which include: Civil Society Organizations, Government, International Finance Institutions, and Academics.
The United Nations Environment Programme’s UNEP P10 Bali Guidelines provide the EDI with an international standard against which national laws can be assessed. The EDI is an essential tool to help strengthen procedural rights given that the recent surge in laws on access has not been accompanied by a corresponding analysis of their quality, scope or implementation.
The EDI was designed with the aim of addressing global environmental problems as air and water pollution, extractive industry impacts and biodiversity loss by establishing a centralized hub of legal analysis and implementation data on procedural rights. The results will help establish both best practices and areas for improvement.
For questions and more details, email [email protected]
|
Everything you need to know about Starfish
A starfish is a fascinating creature that can be found in many places, including your local aquarium. They’re grazers and are classified as echinoderms, meaning they have no blood or brain. They have hundreds of feet at the end of their arms. In fact, there are several kinds of starfish, but here are some of the most common types. Continue reading to learn about starfish and their amazing characteristics!
Starfish are echinoderms
Echinoderms are the group of invertebrates that lack a backbone. Their name is derived from the Greek words echinos, which means “spiny skin.” Many echinoderms have a distinctive body structure that includes five radial nerves that radiate from the center of the disc, or echinosome. Other echinoderms have a more complex pentaradial symmetry, in which the body is divided into five equal-sized slices around a central disk. Echinoderms also share a common reproductive system.
Though starfish are echinoderms, they are not true fish. They have an extensive nervous system, which consists of a nerve plexus and numerous interlacing nerves. Their nervous system is equipped with sensory inputs, including touch, light, temperature, orientation, and condition of water around them. Starfish also have a hydraulic vascular system that has multiple projections that emerge from the endoskeleton.
The power of regeneration is one of the most fascinating properties of starfish. Some species regenerate entire bodies from a fragment of their body. Some species are capable of growing new arms, or even arm fragments. While this process is normally a protective function, autotomy also serves as a form of asexual reproduction. Starfish include the Allostichaster polyplax and Coscinasterias calamaria.
They have no brain or blood
It’s no secret that sea stars don’t have a brain or blood, and use water to deliver key nutrients to their organs. Because seawater is abundant, starfish don’t need a complicated blood system. They have upper skin made of calcium carbonate, which makes them tough. They have five arms, and some even have spines! But why do they have no blood or brain? Find out below.
Even though starfish have no brain or blood, they have interesting organs that make them unique. These organs allow them to move a great distance, and a Sunflower starfish can cover one meter in one minute! Starfish can also sneeze. The reason isn’t obvious, but it’s interesting nonetheless. In fact, there are many interesting facts about starfish, and the enigma of their brainless existence is one of them.
Their tiny eyes are half a millimeter wide. Their ability to respond to light is an indication of their neural system. Starfish’s nutritional needs vary wildly depending on their species. While some species feed on mollusks, others consume clams and other meaty food. Even one sea star can eat 50 tiny clams per week. But there are many myths about starfish and what they can and cannot do.
They have hundreds of feet at the end of each arm
Many animals have a central brain, but starfish do not. Their decision-making is primarily done through individual feet. These tube feet use a variety of senses to navigate their environment. The long, delicate feet on the tips of their arms are particularly sensitive. In addition to their specialized senses, starfish can also move faster than you might think. Hence, starfish have hundreds of feet on each arm.
Usually, starfish have five arms, though some species have dozens of arms. Their aboral surface may be smooth, granular, spiny, or covered with overlapping plates.
Many species are colorful, from deep-sea specimens in orange to bright blue specimens with pale tubercles. Their tube feet function as a hydraulic system. Each arm has two grooves for fluid to flow through. The pressure from the fluid in the canal allows the starfish to extend its arms.
Like other echinoderms, starfish have hundreds of feet at the end of their arms. They use these feet to channel water through tiny canals in their bodies. They can even move their tube feet by changing the pressure of water. This means that starfish can walk on the surface of the sea. They can even travel a mile in a week! A common starfish species is the Forbes’ asterias.
They are grazers
These small creatures have tube feet, suction cups, and points, which they use to capture their prey. They can live in both the abyss and the intertidal zone. Starfish graze on a variety of food sources, including algae, worms, and corals. Crown-of-thorns starfish, for example, eats coral colonies. Some starfish even move their stomach out of their bodies to digest their prey. They may live up to 35 years.
Most starfish species are carnivores, eating invertebrates such as sponges, bryozoans, and mollusks. However, some species are specialized feeders, eating life coral polyps. Unlike their predatory cousins, starfish do not have hard mouth parts to grasp their prey. They extend their stomachs over their prey, digesting it in the water before drawing it back into their bodies.
Starfish are grazers, meaning they live on a variety of organic materials and algae. While their primary diet consists of algae, organic detritus, and algae, starfish can also eat coral polyps. While starfish are grazers, they may be insatiable carnivores and are not appropriate for aquariums with live creatures. So, if you want to have one of these creatures in your home, be sure to research the species first. You may accidentally hurt a starfish by not understanding its needs.
A starfish’s vascular system helps them graze on different kinds of organisms, including plants, algae, and worms. They also have two stomachs, a cardiac and a pyloric, which both extend out from the mouth. If you think about the way starfish eat, you will understand why they are so important for our oceans. They contribute to the ecosystem and community structure of the ocean floor.
They have a spiky shell
Starfish are marine invertebrates. Commonly, starfish have five arms and a central disc. They can regenerate lost arms to escape a predator. Their spiky shell provides protection to the tube feet, nerves, and other parts of their body. The shell is made of calcium carbonate plates. Starfish have varying colors and patterns. Their spines protect their gills, which are found near the feet.
Starfish and urchins have a spiny shell. Spiny structures are part of their skin and act as gills, which help them absorb oxygen from the water. Because these animals live in water, they require oxygen to survive, making the spiky shell an important feature of their bodies. Echinoderms have a wide variety of body structures, including the spiky shell.
Some starfish have spiky shells, while others have webbed arms. Starfish with spiky shells are called spiny sea stars. Spiny sea stars have clusters of spines along the body, as opposed to pedicellariae. Gibbous starlets are common in stony bottomed European waters. Sun stars, which have a disc with a wide disk and 15 rays, are commonly found in the northern waters.
A sea star, also known as a sand dollar, belongs to the phylum Echinoderms, and contains more than 2,000 species worldwide. While most species have only five arms, some have up to 40. In addition to their spiky shells, they can display bright colors and be as large as four feet across. If you want to learn more about these creatures, try our starfish worksheet pack.
They have two stomachs
Did you know that starfish have two stomachs? Their two stomachs are paired in the center and help them break down their prey. When they eat a whole prey, the cardiac stomach begins the process of digestion. Later, the food from this first stomach is transferred to the pyloric stomach. This process occurs every few minutes. If you’ve ever wondered how starfish are able to eat so much food in one day, keep reading to learn more.
Sea stars have two stomachs and four or seven arms. Most species have five arms, but some species have up to 24. While the long arms come from the parent starfish, the rest are acquired through normal regeneration. Although starfish have two stomachs, they can regenerate them like lizards can regenerate their tails and arms. The two stomachs, paired by a single arm, give starfish the ability to survive in the cold waters of the ocean.
In the wild, starfish can only move around in water. They need water with a pH of 8.1 or higher to survive. They feed on algae, detritus, and sponges. While in the aquarium, they are not able to reproduce sexually, but they can mate. If you want to keep starfish, make sure you have the correct seawater tank to feed them. Make sure to check the salinity and pH levels before adding them to your tank.
We hope you enjoyed this article… What are your thoughts?
Feel free to share with us in the comments section below.
|
The interpretation of the pathogenicity of genetic variants is a complex process that requires the integration of molecular biology, bioinformatics and clinical knowledge, in order to combine, following a probabilistic approach, basic, epidemiologic and clinical information.
Most laboratories approach the classification following the criteria of the American Board of Medical Genetics (Richards, S et al. Genet Med 17, 405–423 (2015). Points are added depending on the evaluation of the following data:
- Population data: Pathogenic variants should be more frequent in cases than in controls. Pathogenic variants are usually very infrequent in control populations (such as the gnomAD database: https://gnomad.broadinstitute.org/)
- Computational and predictive data: based in the evaluation of the predicted effects of the variant (coding/non-coding, variants that cause loss of function (truncating, frameshift), conservation and biological relevance of the affected amino acids, and different bioinformatics predictors.
- Functional data: studies in cells and/or animal models may provide relevant information about the potential pathogenicity of a variant.
- Segregation data: evaluation of the co-segregation of the variant with disease expression in described families (which should consider different inheritance patterns).
- De novo genetic variants: variants not present in the parents associated with disease not previously found in the family should receive special consideration.
- Allelic data: for recessive conditions, the presence in association with other variant affecting other allele, or in homozygosis raises the suspicion
- Very specific phenotypes: high pre-test probability of an association of a variant in a given gene with the disease, makes the variant more suspicious.
After the evaluation of these data in a “quantitative” way, the variant may be considered definitively pathogenic, likely pathogenic, likely benign or benign, but many variants will be classified as “VUS” or “Variant of Uncertain Significance” that are sometimes defined as those variant with a probability of being pathogenic between 5 and 95%.
Many laboratories consider that those VUS should not be reported, as they do not provide actionable information, and many would not recommend further evaluation in the family. This decision may be controversial and should probably be individualized. If the VUS have a low probability of being pathogenic, and in case of being pathogenic the lack of recognition would not be dangerous for patients and relatives, not reporting (or not making additional studies) is reasonable. But if a VUS has the potential of being dangerous for the patient and/or the relatives, it may be very important to report it and do further studies. An example could be a VUS in the RYR2 gene (associated with catecholaminergic polymorphic ventricular tachycardia) or in the KNCQ1 gene (associated with long QT syndrome) found in an individual with unexplained sudden death.
Clinical and genetic study should likely be considered in first degree relatives, who may be at risk for sudden death in the absence of signs or symptoms of the disease.
The interpretation of the genetic study cannot end with determining the pathogenicity of the identified variants. We need to go a step further to provide information about the clinical consequences of the genetic variant including the age of onset, clinical manifestations and risks associated with its presence. Only with this information we will be able to support correct genetic counselling, risk stratification and clinical management of the disease.
|
Laptops are portable computers with a smaller size and weight than desktops. They are often used in places that require portability, such as the workplace. A laptop usually folds up when not in use and has a battery to keep the system worldnewsite.
Laptops can be powered by a rechargeable battery pack or an AC adapter. These batteries are typically lithium ion or lithium polymer.
Many laptops also have memory card slots, USB ports and ethernet ports. Most also have audio speakers. Some have a touch pad for pointing devices. In addition, some have a webcam for video conferencing.
Some of the more basic models have only one memory slot, while others have three or four. These slots are located at the bottom of the computer.
The most common type of memory is 8 GB. However, some higher-end models include 16 GB of news247 com.
Most laptops also have a DVD drive and an optical disc drive. Optical disc drives are becoming less and less popular. Blu-ray drives have supplanted them.
Today, many laptops have a built-in webcam and have touchscreen displays. Many laptops also have a Bluetooth connection, which allows for wireless connectivity to other peripherals.
In recent years, solid-state drives have surpassed hard drives in most laptops. This technology uses no mechanical parts and is faster. SSDs are also more power-efficient, reducing the risk of drive corruption from physical impacts.
Other common features of modern laptops include audio speakers and a touchscreen. Some even have a docking station, which allows for connecting external devices to the computer at the desk.
|
6 Ways to Help Children Cope with Changes
Written by: Megan Dell
In many ways, the South Carolina Family Court is responsible for legally changing the shapes of families. After a divorce, a family may be divided into two households, but an adoption may make a family complete under one roof. Today, a variety of types of families exist, and transitions between them occur.
In South Carolina, children’s participation in the legal process is usually very limited, despite the Family Court’s decisions having wide-ranging impacts for their lives. Helping children cope with changes to their family structure can be challenging, but it is an important for their adjustment and teaching them to be resilient.
Here are some useful tips for helping children cope with these kinds of changes:
1. Give your children advanced warning
Use age-appropriate terms to explain the changes that can be expected, and ask children for input when you can. For example, when explaining that a family will begin living in two different households, a parent could ask the child how he wants to decorate his room in the new house. Reading your child books about the upcoming change can help start these conversations. Check out our list of book suggestions here.
2. Maintain as much consistency as possible for the children’s sake
Changes are easier to manage when they do not all occur at once. When making big changes, such as adopting another child, keep other parts of your children’s lives the same to best help them cope with change.
3. Answer children’s questions with positivity
Depending on a child’s age, she may ask a lot of questions about what will be changing. Do your best to answer them all in a way that focuses on the positive aspects of the change, even if she asks the same question many times.
4. Accept children’s need to grieve
Most people do not enjoy change because it is uncomfortable, and that is true for children too! Anticipate that your child may grieve the way his life used to be, and be prepared to listen and remind him of the positive aspects of your family’s new normal.
5. Expect some regression in children’s behavior
During times of change, children’s behavior may regress, and they may resume behaviors they previously outgrew. It’s important to be patient with these regressions, as a children will take their cues from you.
6. Spend extra time with your children
During stress, a little extra attention can be a tremendous help for children coping with family changes. Give your child a little more undivided attention, and use that time to engage in activities she chooses. Extra attention and patience from you demonstrates that, despite big changes in life, your love for your child remains constant.
If you are struggling with how to manage changes in your family caused by your South Carolina Family Court case, contact Dell Family Law to schedule a consultation so we can help.
|
Cooling 5 - Coolant
|Tasks of cooling|
|Despite anti-freeze good heat transport capability|
|Gentle handling of gaskets, hoses|
|No corrosion of metal parts|
|Avoidance of the gaseous state|
First and foremost the cooling has the job of carrying excess heat from the internal combustion engine to the radiator and to the
interior heating of the vehicle. In addition, possibly also the heat developing from the oil circulation, the
exhaust gas recirculation and from the automatic gearbox. Also at low
temperatures the cooling should be ready for operation and for protection of the system against corrosion. The condenser of the air-conditioning
and of the
intercooler can also often discharge their heat directly into the open air.
Coolant consists only perhaps half of water with a low lime content. Thus, one no longer speaks of water cooling, but of liquid cooling. A number
of additives, e.g., against corrosion, are also used in summer. No later than at the beginning of the cold season, the density of the coolant and also the amount of anti-freeze should be checked. 40-50% is normal. As
one can see from the above diagram, with an amount of more than 60% anti-frost, the security against freezing once again becomes less. Very often only a certain anti-freeze is permitted by the manufacturer.
Sometimes one can even tell by the colour, that two coolants are not compatible with each other.The engine needs protection against frost, because water (apart from the metals, bismuth and gallium) has the
characteristic of expanding when freezing to ice. Then, below 0°C it contracts more than comparable substances, apparently to balance itself with the other substances. This would however, be of no use to the cast
iron- or also aluminium cylinder block. Just as freezing water can even split mountains, it would just as easily crack the cylinder block. Although there are some engines which have a frost plug which will yield to the
pressure first, but nobody should count on it. This is why, e.g. C2H6O2 (Ethylene-glycol) is added to the coolant. Other possible additives are inhibitors and colouring.
Coolant must be disposed of as a heavy metal-containing waste. 08/11
|
This is a very difficult problem, unless you are willing to plant something other than roses. Deer view roses as the equivalent of chocolates. That being said, there are some measures that you can take.
For starters, it will help to understand a little bit about deer natural history if you wish to develop an effective strategy to deter them. They live in herds (usually segregated by gender and by age). Aggregating in herds affords them some protection from predators (when there were predators that actively hunted them and not just vehicles) as they have many pairs of eyes and ears as well as noses constantly on the alert for predators. Each deer eats, on average, 5-15 pounds of browse (plant material taken from trees and shrubs) each day. If the deer herd where you live is large enough and food is scarce enough the deer will eat just about anything they can get to.
Actions that you can take to dissuade deer from browsing on your roses can be broken into 4 general categories.
Oregon State University has a publication, “Reduce deer damage in your yard,” that may also give you some ideas to consider.
Another possibility is a dog in your yard. Deer will avoid areas where they are likely to encounter potential predators. A barking dog, actively chasing the deer will soon dissuade them from feeding in your yard. However, as with mechanical deterrents, if the dog is in the yard in a predictable pattern, and you have a large hungry herd of deer, the deer will habituate to the presence of the dog and enter the yard at times they have learned that the dog is not present.
A local source of information and help is Fairfield County Extension Center.
The University of Connecticut IPM (Integrated Pest Management) program web site also has a number of excellent suggestions. The most cogent piece of advice they may have is:
"The size of the deer population in a particular season, the availability of alternative food sources, the system chosen for keeping deer away and the location can all affect your success at keeping deer out of the garden. It may be best to alternate with different garden protection methods until you find what works in your particular location."
|
In English geology
, a winterbourne
is a river
that is dry throughout the summer months
. The word comes from the Anglo Saxon bourne
, meaning 'river' and refers to the fact that the river only exists during winter.
This article is a stub. You can help Wikipedia by fixing it.
|
February 3, 2009 | 1
The last Pyrenean ibex (Capra pyrenaica pyrenaica) died nine years ago, the victim of loneliness (and a falling tree). But for a brief, seven-minute window, the extinct species may have recently been resurrected, thanks to cloning.
Using skin samples taken from the last ibex before she died, and domestic goats as the hosts for implanted embryos, scientists say they brought a cloned Pyrenean ibex to term, although severe lung defects killed it after seven minutes. (Other cloned animals, including sheep, have been born with similar lung defects, according to The Daily Telegraph, and Dolly the sheep died of a lung infection, although it may have been unrelated to her being a clone.) Project leader Jose Folch told The Independent newspaper that "the delivered kid was genetically identical to the" extinct Pyrenean ibex.
The cloning attempt — the first "successful" cloning of an extinct species outside of Jurassic Park — was led by Folch, of Spain’s Centre of Food Technology and Research of Aragon with help from colleagues at the National Research Institute of Agriculture and Food. They extracted DNA using a technique called nuclear transfer, then implanted embryos into 57 surrogate goats. Seven pregnancies, and one live birth, resulted.
"Our present work encourages appropriately storing tissues and cells of all endangered species or suitable animals, as they may be useful for future cloning-based conservation," Folch said. Following the first successful attempt to clone a troubled species in 2001, other scientists are giving it a shot: The endangered northern white rhino, the extinct Tasmanian tiger, and the mammoth, for example.
But the question remains, could an extinct species really be brought back to life through cloning? One seven-minute lifespan does not translate to much quality of life, and even if the kid had lived, it wouldn’t have had a family, so who would have taught it how to behave like a Pyrenean ibex? Could enough members of a species be cloned to allow it to be reintroduced into the wild, and could they be taught to survive on their own, or would cloned animals have to live in captivity for the rest of their lives?
Seven minutes, of course, wasn’t quite enough to answer these questions.
Image: Spanish Ibex (Capra pyrenaica) / Wikipedia
|
Servant-Leadership is a philosophy which encourages those who serve first, and then lead as a way of expanding service to individuals and institutions. Servant-leaders may or may not hold formal leadership positions. Servant-leadership encourages collaboration, trust, foresight, listening, and the ethical use of power and empowerment.
Robert K Greenleaf coined the term Servant-Leader. In his book, Servant as Leader (1970), Robert Greenleaf laid out the following description:
“The servant-leader is servant first… It begins with the natural feeling that one wants to serve, to serve first. Then conscious choice brings one to aspire to lead. He or she is sharply different from the person who is leader first, perhaps because of the need to assuage an unusual power drive or to acquire material possessions. For such it will be a later choice to serve – after leadership is established. The leader-first and the servant-first are two extreme types. Between them there are shadings and blends that are part of the infinite variety of human nature.
The difference manifests itself in the care taken by the servant-first to make sure that other people’s highest priority needs are being served. The best test, and difficult to administer, is: do those served grow as persons; do they, while being served, become healthier, wiser, freer, more autonomous, more likely themselves to become servants? And, what is the effect on the least privileged in society; will they benefit, or, at least, will they not be further deprived?”
|
No matter what writing level your students are at, this comprehensive guide has advice and tips for both the struggling and advanced writers. Spelling, handwriting, sentences, essays, proofreading and more are all addressed with teaching advice, reasoning behind rules and examples. In coordination with the Writing Skills student books, this Teachers Handbook is ideal for differentiating writing isntruction while addressing all necessary components of a writing program. 158 pages, indexed, softcover.
Customer Reviews for Writing Skills Teacher's Handbook
This product has not yet been reviewed. Click here to continue to the product details page.
|
East Asian Languages and Cultures | Fourth Year Japanese II
J544 | 27524 | Watt, Y.
P: grade of C or better in J302/J533 or equivalent proficiency
The goal of this course is to improve students' four language skills
of reading, listening, speaking and writing in culturally
The course will cover a wide range of topics taken from materials
read by educated Japanese people. The materials will cover social
and political issues, fiction, and various aspects of contemporary
Japanese culture in general. Students will also be introduced to
materials in various genres such as scholarly writings, newspaper
articles, stories, poems, haiku and manga.
By completing this course, student should be able to carry out
conversations expressing and supporting their ideas and opinions not
only on daily routine matters but also on more complex and
Students will also be able to write fairly long essays (including
journal entries), write formal letters, and communicate freely via e-
The listening exercises will mainly take place outside of class.
Students will practice grasping the gist of paragraph-level
listening materials as well as accurately identifying each word of
The class meets twice a week for 75 minutes. There will be homework
assignments, quizzes, tests, a final research paper project and a
Class meets with EALC-J 402.
|
This is a partially developed activity description. It is included in the collection because it contains ideas useful for teaching even though it is incomplete.
Metasomatism: Marble Hosted Talc Deposits
David Mogk, Department of Earth Sciences, Montana State University
Topic: Metamorphic petrology, metamorphic processes, mass balance, metasomatism
Course type: Upper level undergraduate course or graduate level course
Talc formation in southwest Montana occurs as a metasomatic replacement of dolomitic marbles. We have demonstrated that this occurs at temperatures <300 C and at pressures < 2 Kbar in what is probably a constant volume process. The formation of talc requires a huge amount of mass transfer, and a time integrated water rock (w/r) ration of >800! This is also associated with net transport of Si and Mg into the system, and Ca out of the system.
In this modeling exercise, we will demonstrate the mass fluxes required to metasomatise 1 meter of marble into a pure talc rock. But, we will construct the model so that different assumptions may be tested: 1) varying the initial bulk composition, 2) varying the physical conditions, and thus the solubilities of mobile components 3) conserving different parameters such as volume, or fix a specific component (e.g. Mg-constant) to show how the chemical and physical properties of the system must change under these different conditions.
Learning Goals or Outcomes
1. Comparison with talc deposits as observed in the field, hand sample and thin section with model outputs;
2. Reinforcement of principles of metamorphic petrology and geochemistry: phase equilibria, mass balance
3. Demonstrating to students the power of quantitative modeling approaches.
How would you assess whether those goals have been met?
Successful completion of modeling activities in which a) students have formulated hypotheses that are tested with the models, and b) written interpretion of the results.
Anderson, D.L., Mogk, D.W., and Childs, J.F. (1990) Petrogenesis and timing of talc formation in the Ruby Range, southwestern Montana. Economic Geology, 85, 585-600.
|
While the health information and fact sheets on this website relate to world-wide situations, the drug names will vary between countries – therefore the advice of your local GP should be sought.
|The health information and factsheets on this website are produced by Bupa's health information team. The information is reviewed and approved by relevant healthcare professionals, including doctors, dentists, nurses, physiotherapists and dietitians.||
|Browse the a-z list of factsheets:||
Sinusitis in children
Published by Bupa's health information team, March 2008.
This factsheet is for parents of children who have sinusitis or for people who would like information about it.
Sinusitis is inflammation of the linings of the sinuses that surround the nose. Common symptoms include a blocked or runny nose and a sore throat. It's often caused by an infection.
The sinuses are air-filled spaces behind the bones of your child's face and forehead that open up into the nose cavity. They are lined with the same membrane as the nose. This is called the mucous membrane and it produces a slimy secretion called mucus to keep the nasal passageways moist and to trap dirt particles and bacteria.
Your child has four main sets of sinuses, which will develop throughout childhood and adolescence. Your child's sinuses are not fully developed until age 20.
The maxillary sinuses are in each cheekbone.
The frontal sinuses are on either side of his/her forehead, above his/her eyes.
The smaller ethmoid sinuses are behind the bridge of his/her nose, between his/her eyes.
The sphenoid sinuses are between the upper part of his/her nose and behind his/her eyes.
The location of the frontal, ethmoid and sphenoid sinuses
What is sinusitis?
Sinusitis is inflammation of the mucous membranes of one or more of your child's sinuses.
If your child's sinusitis lasts anything from a few days up to a month it's called acute sinusitis. If it's an ongoing problem lasting three months or more it's termed chronic sinusitis. The medical terms acute and chronic refer to how long the condition lasts for, rather than how severe it is. Chronic sinusitis is relatively rare in children. If your child has symptom-free intervals between bouts of sinusitis then this usually means they have recurrent acute sinusitis rather than chronic sinusitis.
A maxillary sinus
Children often have some different symptoms to those experienced by adults. If your child has sinusitis, his/her symptoms may include:
a blocked or runny nose with green or yellow mucus, which can drain down the back of your child's nose into his/her throat and may cause a sore throat and cough
breathing through his/her mouth
a low fever
bad breath (halitosis)
feeling irritable or tired
having difficulty eating
On very rare occasions, a sinus infection can spread to the facial bones or the membranes lining the brain. Also very rarely, sinusitis can spread to form a pocket of pus (abscess) in the eye socket or the facial bone. If your child develops eye lid or cheek swelling you should take him/her to see a GP immediately.
Sinusitis is often caused by an infection of the mucous membranes with a virus, bacterium or fungus. Most bouts of acute sinusitis are caused by an infection such as a cold.
The mucus that is produced by the mucous membranes in the sinuses normally drains into his/her nose through small holes called ostia. The ostia can become narrow or even blocked if the sinuses get infected and inflamed so the mucus cannot drain properly.
This can also happen if your child's sinus membranes are irritated by something. Examples of irritants include:
airborne allergens such as grass and tree pollen
smoke and air pollution
sprays containing chemicals (eg household detergents)
overuse of nasal decongestants
Chronic sinusitis can be caused by anything that constantly or regularly irritates the lining of the nose and so results in inflammation of the mucous membranes. Children who have allergy-based asthma often have chronic sinusitis as well.
In some children, sinusitis is the result of a structural blockage, such as enlarged adenoids, or a specific medical condition such as cystic fibrosis.
Your child's GP will examine your child and will ask questions about his or her symptoms. The GP will usually be able to diagnose sinusitis just from his or her examination and no further medical tests are usually needed.
However, your child's GP may refer him/her to a doctor who specialises in ear, nose and throat conditions if further tests are needed. These may include a nasendoscopy where your child's doctor will insert a small, flexible tube with a light and a camera lens at the end (endoscope) into your child's nostril to examine the inside of the sinuses. He or she will look through this and the image will usually be projected onto a video screen. A nasendoscopy is performed under local anaesthesia, which completely blocks the feeling in the sinus area and your child will stay awake during the operation.
In some cases, the doctor may do a computerised tomography (CT) scan of your child's sinuses. A CT scan uses X-rays to build up a three-dimensional picture of the sinuses.
Most children with acute sinusitis get better without treatment.
If your child's symptoms don't get better within 10 days or if the symptoms appear to be getting worse, you may wish to visit your child's GP.
Your GP may prescribe a topical nasal steroid spray to help relieve your child's symptoms, particularly if he or she also has an allergy or has enlarged adenoids which are making the sinusitis worse. Alternatively, the GP may prescribe antibiotics if your child has a bacterial infection.
Saltwater nasal drops or sprays may help to relieve your child's symptoms by thinning the mucus in the nose. These are available from a pharmacy without prescription.
Some children find that applying a warm compress on the areas of the face that are painful, and sleeping with their head and shoulders propped up with pillows provides relief. However, there is no scientific evidence that this cures the problem.
Occasionally, surgery may be considered. A nasal endoscopy can help to improve sinus function as well as being a way of looking at the sinuses. A doctor who specialises in ear, nose and throat surgery will use an endoscope to wash out your child's sinuses and widen the drainage holes. This procedure is known as functional endoscopic nasal surgery. This can be done under a local or a general anaesthetic. A general anaesthetic means that your child will be asleep throughout the procedure.
It's a routine and generally safe procedure. For most, the benefits are much greater than the disadvantages. However, all surgery carries an element of risk. In order to make an informed decision and give consent on behalf of your child, you and your child will need to be aware of the possible side-effects and complications. Complications can include minor damage to the lining of the nose or sinuses, or damage to the skull bone.
There are a number of things you can do to help prevent your child from getting sinusitis.
Teach your child to blow his/her nose properly. When mucus is left in the nose it can get infected.
Reduce his/her exposure to environmental allergies that you know affect your child. Keep his/her allergy symptoms under control - ask your doctor or pharmacist for advice.
Reduce his/her exposure to pollutants such as cigarette smoke.
Ensure your child has good general health by encouraging him/her to eat healthily and take regular exercise.
- The British Association of Otorhinolaryngologists (ENT UK)
020 7404 8373
- Sinusitis. ENT UK. www.entuk.org, accessed 24 May 2007
- Sinusitis. Clinical Knowledge Summaries - UK Department of Health. www.cks.library.nhs.uk, accessed 23 May 2007
- Ah-See K, Evans AS. Sinusitis and its management. BMJ 2007; 334:358-361
- Sinusitis infection. National Institute of Allergy and Infectious Diseases, National Institute of Health, US department of health and human services. www.niaid.nih.gov, accessed 23 May 2007
- Collier J, Longmore M, Scally P. Oxford Handbook of Clinical Specialities. 6th ed. Oxford: Oxford University Press, 2003
- Sinusitis. Medline Plus. www.nlm.nih.gov/medlineplus, accessed 29 May 2007
This information was published by Bupa's health information team and is based on reputable sources of medical evidence. It has been peer reviewed by Bupa doctors. The content is intended for general information only and does not replace the need for personal advice from a qualified health professional.
Publication date: March 2008
|
Timeline of computingThis article presents a detailed timeline of events in the history of computing. For a narrative explaining the overall developments, see the related History of computing.
- Stephen White: A Brief History of Computing, http://ox.compsoc.net/~swhite/history.html. An excellent Computer history site; the above is a modified version of his timeline, used with permission.
- The Computer History Graphing Project tries to build a graphical image of computer history, in particular operating systems, http://comp-hist.sourceforge.net/
|
Other Australian Insects & Arachnids
Australia has a very diverse insect fauna, and much of it remains undescribed.
Being a dry state, dragonflies are much less varied and abundant in South Australia than the wetter eastern states. Even so, there are as about as many dragonfly species in South Australia as there are in Britain, so I didn't complain!
This section contains all the insects that aren't butterflies or moths (apart from the mystery caterpillars at the end of the section)!
Australia has a bad reputation for nasty arachnids, and with good reason in some cases. Some of it is exaggeration though - the 'deadly' redback is in reality a shy, timid spider. Unlike their spider cousins, Australia has no deadly scorpion species.
|
The biography of a beaver -- The king of the trout stream -- The strenuous life of a Canada lynx -- Pointers from a porcupine quill -- The adventures of a loon -- The making of a Glimmerglass buck.
ch or the poplar. It would take vigor and push and enterprise to roll the heavy billets of wood over the grass-tufts to the edge of the water. And, most of all, it would take strength and nerve and determination to tear himself away from a steel trap and leave a foot behind. So it was well for the youngster that for a time he had nothing to do but grow.
Spring came at last, and many of the male beavers prepared to leave home for a while. The ladies seemed to prefer not to be bothered by the presence of men-folk during the earliest infancy of the children; so the men, probably nothing loath, took advantage of the opportunity to see something of the world, wandering by night up and down the streams, and hiding by day in burrows under the banks. For a time they enjoyed it, but as the summer dragged by they came straggling home one after another. The new babies who had arrived in their absence had passed the most troublesome age, and it was time to begin work again. The dam and the lodges needed repairs, a
|
My newest use for GarageBand is spelling tests! Each week myself or one of my first grade teammates records the spelling words and sentences into GarageBand. Currently I have two completely different spelling lists in my classrooms and at the beginning of the year I had three. I want my kids to be working at their own level so it is important for me to have multiple spelling lists in order for kids to be successful. On Fridays, when students take their spelling tests they simply click on their test (I save the different tests under specific group names so students know where to click) and start listening!
Fridays used to be a day where I was not able to see my guided reading groups because that time was spent giving several spelling tests. Now, instead of having students take out a pencil and paper at the same exact time and me giving a whole group test kids simply take it independently at a reading center.
Students take their spelling test while listening to each word read from GarageBand. I do not have to spend time during the school day to give multiple spelling tests. Students simply take their tests independently. The Tier 3 students as well as the English Language Learners have been extremely successful using this program because they can listen to a word/sentence as many times as they need without having to raise their hand to ask for the word to be repeated.
Another benefit of using GarageBand for spelling tests: I do not have to repeat sentences five times because ONE student is not listening!! Children can listen to words and sentences as many times as they want/need which is really helpful. Also, for the quicker students their is no wait time because they can move at their own pace.
|Taking his spelling test in GarageBand at an independent reading center (which easily allows for multiple lists in a single classroom.)|
For more technology ideas please check out our blog Learning to the Core!
|
- Make a Mad, Mad, Mad Neuron
Build your own neuron with Dr. Dendristein!
- The Origins Game
Learn where scientists have made important origins-related discoveries of our time.
- Virtual Frog Builder Game
Build the frog by selecting each organ and clicking on its correct position in the image.
- Ace on the Case: Secrets@Sea
Your job: investigate why the killer whales are behaving strangely.
- Strange Dead Bird
Can you solve the Science mystery?
- Vanishing Sharks
Discover why shark populations are declining.
- Black Holes: Gravity's Relentless Pull
Learn about and interact with Black Holes.
- Blood Typing
Can you save a life by giving the right blood transfusion?
- Tree-Ring Timeline
Build a tree-ring chronology.
- The Reconstructors
Travel into the FUTURE - Solve Medicinal Mysteries from the PAST.
- Operation: Heart Transplant
The surgical team is waiting for you to complete the heart transplant.
- What on Earth?
A game of earth trivia.
- The Puma Challenge
Help the puma survive in this interactive game.
- Sled Dog Patrol
Find out how sled dog commands are used and try some out.
- Design a Roller Coaster
Try your hand at designing your own roller coaster.
- On Fire!
Explore the basics of combustion, including how a fire ignites.
- Atom Builder
Construct a carbon atom.
- Sources of Radiation
Explore an environment to learn about various types of radiation.
- The Power of Tiny Things
Test your knowledge about the equivalence of matter and energy.
- Pilot the 1903 Flyer
Manipulate the Wright Brothers' airplane to see how they piloted their plane.
- Getting Airborne and Wing Designs
Learn what allows wings to pull an aircraft aloft and experiment with various wing designs.
- Invar & Steel Alloys
Fancy a cookery course in how to make alloys?
- Fantastic Contraption
Build whimsical machines to solve each level.
- Zoo Matchmaker
Help Zoos save endangered species.
- Cerebral Commando
You are in charge of recycling dopamine at the synapse.
- Gel Electrophoresis
Run your own gel electrophoresis experiment to sort and analyze DNA strands.
- Test Neurofibromin Activity in a Cell!
Predict and test the effects of NF1 mutations.
- How Do Mutations Occur?
Investigates how DNA mutations are generated.
- Copy Cat
Calico, plain or tabby ... try and find the cloned kitten in this online game.
- Eureka Quiz
How much do you know about the greatest scientific discoveries of all time?
- Dog Breeding
Breed the ideal Border Collie by taking desirable traits from the parents.
- Chemical Element Games
Learn about the periodic table, chemistry, the elements and more with these free online quizzes and games.
- Proton Don
Quiz yourself with this FunBrain periodic table game.
- Chemistry Quiz
A Chem4Kids general chemistry quiz.
- Mixed Reception
Use your chemistry knowledge to solve the murder mystery.
- Free Rice - Chemical Symbols
Identify the chemical symbols correctly and earn rice for the United Nations World Food Program.
Refine your chemistry knowledge through Play!
- It's Elemental - Balancing Act!
Practice balancing chemical equations by picking the correct coefficients.
- Online Construction Kits
Construction Kits let you assemble problem solutions, chemical formulas, chemical equations, and other chemical objects piece by piece or step by step.
Virtual LabsRequired Plug-ins
- PCR Virtual Lab
PCR is a relatively simple tool that you can use to focus in on a segment of DNA and copy it billions of times over. Step up and see how it works!
- DNA Extraction
Enter this virtual lab to perform a cheek swab and extract DNA from human cells.
- DNA Microarray Virtual Lab
Investigate the differences between a healthy cell and a cancer cell.
- Gel Electrophoresis Virtual Lab
Have you ever wondered how scientists work with tiny molecules that they can't see? Here's your chance tosort and measure DNA strands by running your own gel electrophoresis experiment.
- The Transgenic Fly Virtual Lab
Get ready to learn the techniques used to make transgenic flies.
- The Bacterial Identification Lab
This lab will help familiarize you with the science and techniques used to identify different types of bacteria based on their DNA sequences.
- The Cardiology Lab
You must help the doctor examine and diagnose three different patients who have symptoms of heart disease.
- The Neurophysiology Lab
Use virtual electronic equipment to investigate the electrical activity of individual nerve cells.
- The Immunology Lab
This virtual laboratory will demonstrate how such a test, termed an enzyme-linked immunosorbent assay (ELISA), is carried out.
- UVA Virtual Labs
The University of Virginia created these 3D animations to explain technologies affecting our daily lives.
- Building Big
Explore what it takes to "Build Big" in the forces, materials, loads and shapes labs.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.