text
stringlengths 199
648k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 14
419
| file_path
stringlengths 139
140
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 50
235k
| score
float64 2.52
5.34
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Limerick Riverpaths – Canal Guided Walk
On the 23rd September 2012 we were asked to give a talk as part of the “Harvest Time Guided Walk” in association with Limerick Riverpaths these are the bullet points of the talk.
The Canal while still fully in use.
- The idea for a canal connecting Limerick and Killaloe was first suggested in 1697, in 1715 draining of certain bogs and the building of canals in Ireland began in earnest. In June 1757 William Ockenden began work on the Limerick canal.
- In 1767 the Limerick Navigation Company was established, with a budget of £6,000 to complete this project.
- It was not until 1799 that the first boats travelled this route.
- In 1831 the cost per passenger to O’Briensbridge was 2 pence. 100,000 people per year used this route. It was a 4 day trip to Dublin using this route. The passenger boats were known as “flyboats”.
- It would take four days to travel to Dublin by canal in 1840.
- Lock Quay Bridge – designed by Dutch architect Uzuld who also designed the Lock Mill.
- Bridge Bollards – Made by Harrison Lee & Sons ironmongers, who operated out of Mungret Street and High Street from the 1840s into the 20th century.
- Lock Keepers House – Built in 1770 it was the headquarters of the Canal Management Committee. In 1820s a garrison was posted here during the flour controversy, when flour prices were so high, the poor rebelled and led to an uprising.
- Northside Old Brewery – Built in 1814 by Walker & Co. Cork at a cost of £25,000. Closed due to pressure put on them by the Guinness warehouse.
- Northside Russell Mill – The arch which remains today with the inscription : ‘Lock Mills John Norris Russell 1844’ was erected about 1890. It was situated in front of the Lock Mills which were built by Andrew Walsh in 1765. It incorporated some of the most advanced milling equipment in the British Isles at the time. John Norris Russell was a corn merchant as a ship builder, Linen Manufacture, Iron Monger.
The archway and mill can be seen in the image above.
- Southside Houses – Occupied butchers, fishmongers (McInerney who were one of the main buyers from the Abbey fisherman, had their store there) and publicans.
- Southside Crank – Shannon Navigation, used to lift goods onto and off of barges.
- Southside Warehouse – single-bay two-storey limestone former canal warehouse, built c. 1840, on the south bank of the canal east of Lock Quay, this was later used as a Guinness Warehouse. It was an impressive structure with a natural slate roof terracotta comb ridge tiles, limestone walls.
- Other warehouses in this area were run by Bernard, Conway, Lynch, McCawley, Murray, O’Connell.
- Troy’s Lock – Lock keepers were Troys, Maddens and Ryans. Prior to the construction of the canal this area was known as Bartletts Bog.
- Canal – To connect Limerick and Killaloe. Dredged by Sandmen, who supplied the sand for most of the building works in Limerick prior to 1920. Closed to traffic 1962.
- Tow path for horses to walk while dragging canal barges, further downstream there is a bridge with a lower wall on the river side, this was so the rope could pass more easily along. Barges were dragged about 20-30 yards behind the horses.
- Park Bridge – Lowered after 1960 to allow cars to pass more easily. There was once a boreen near here for courting couples called “Paddy’s Hedge”.
- Harrold Family – Richard Harrold owned a hotel in this site which was once known as “Nun’s Field”. The Harrold family paid for the erection of St. Patrick’s Church.
- City Boundary Plaque – An iron plaque on Park Bridge which was erected during the Mayorship of Patrick Riordan who only served one term in 1891.
- Guinness Bridge – Planned in 1996. Contentious name as Local Historian Kevin Hannon passed away that year and it was proposed that the bridge be named after him. The same issue arose with the naming of the Abbey Bridge, which had the originally name of the Kemmy bridge after historian and politician Jim Kemmy. The Museum would be later named after him. Why Guinness – In the 1880s, Guinness began sending their porter to Limerick by canal, undercutting the local breweries.
- The mile stone by the Guinness Bridge signifying the distant to Limerick and to Kilalloe by waterway was erected in1814.
- In 1860 the bell for St. John’s Cathedral was brought from Dublin by barge, as were sections of the organ for St. Mary’s Cathedral.
- The canal was closed as a commercial highway on the 1st January 1960. | <urn:uuid:1bcbf948-e6e0-49c9-8c5e-1d4bf2600784> | CC-MAIN-2016-26 | http://limerickslife.com/limericks-canal-walk/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00108-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.977871 | 1,085 | 2.8125 | 3 |
Dyslexic Talents and Nobel Prizes
By: Thomas G. West
Editor's Note: An alternative version of this article was published in different form in the February 2001 issue of ACM-SIGGRAPH Computer Graphics.
Recognition in the old tradition
"I didn't expect a Nobel Prize at all," he said, "in part because of the nature of the work. There was less science [and more engineering] in it than the things customarily honored by the prizes." This is the observation of Jack S. Kilby (Texas Instruments) co-inventor of the integrated circuit, on being notified of his award in October 2000.
The Nobel Prize for chemistry awarded at the same time to Alan J. Heeger (UC-Santa Barbara) and Hideki Shirakawa (University of Tsukuba) for their work on conductive polymers also reflected the recognition of broad effects rather than pure science. " We're very excited," said Daryle H. Busch of the American Chemical Society, "because this award is in the old tradition. That is, it was given for work that has a very substantial impact on society." (Suplee)
The shift back to an earlier tradition by the Nobel prize committee may reflect a growing recognition in the larger world of the deep value of applied work of broad impact as opposed to the highly theoretical work of relatively low impact which has commanded such high prestige in recent decades.
Thus these changes might be read as the small beginnings of a larger and more gradual swing back toward a greater respect for hand and eye and image building in the brain.
For some time the major contributions of strong visual thinkers have been eclipsed in many fields by theoretical approaches that did not lend themselves to pictures or images or imagined models and hands-on manipulation. For a long time, we have been told with confidence that visual approaches were old fashioned and somehow primitive. Most serious scientists and mathematicians, we were told, did not really need images. Pictures and diagrams were for non-professionals and lay persons. Mostly, pictures are for children.
But we now see that things are going back the other way. With new computer information visualization technologies, and a new sense of missed opportunities with the old narrow methods, researchers in many fields are becoming aware that in order to do really creative work, they may need to go back to visual approaches once again.
So, perhaps, we come back to the place where much of the most advanced and creative work is done by visual thinkers using visual methods and visual technologies. Once again, pictures are not only for children.
Reassessing visual roots at green college
Quiet indicators of these powerful changes are beginning, here and there, to gain broader attention. In one instance, on a bleak and rainy Saturday last November, a small but historic conference took place at Green College, Oxford University. With observations that will gladden the hearts of many dyslexics and strong visual thinkers, the conference presentations focused on high level achievements in the arts and the sciences within families over several generations. Titled "Genius in the Genes?" and sponsored by the Arts Dyslexia Trust, the conference included an associated exhibition of art and scientific work from eight families. All these families showed evidence of high visual and spatial talents along with troubles with words. Several members of each family were also dyslexic.
In a view that is contrary to most of the generally held beliefs in educational testing and recent educational reform, the speakers indicated that very high level and creative achievement in the sciences has often come from the neurological resources linked to success in the arts. The speakers indicated that some of those who have excelled most in their scientific achievements are from families with varied visual and spatial talents -- ones which often have troubles with words. As we are becoming increasingly aware, there does seem to be a kind of trade off -- very early brain development (largely controlled by genetic factors), often seems to gain unusual visual and spatial proficiencies at the cost of some lack of proficiency in some language system.
Consequently, there may be various family members who have special strengths in art, design, computer graphics, visual mathematics, mechanics or engineering -- yet may have unusual difficulties with reading, spelling, arithmetic, rote memorization or foreign languages. It is all part of a familiar pattern -- which is continually repeated with variations generation after generation. The pattern continues through families, parents to children, always different in details but often quite similar in the overall pattern of high visual strengths with notable language difficulties.
The pattern has often been observed, but little studied in any systematic way. There are still many uncertainties, but a pattern does seem to be emerging which merits further investigation. Many visually-oriented families are familiar with this sort of pattern. But this should not be surprising, The chosen occupations become a kind of filter. For example, the pattern is not uncommon among artists and designers, craftsmen and mechanics, surgeons and radiologists, architects and engineers. Even when the occupation may not be a giveaway, the hobbies often are.
Four nobel prizes
One of the speakers at the Green College conference was Patience Thomson, the former head of Fairley House School for dyslexics in London and now a publisher of "books for reluctant readers" (Barrington Stoke). She spoke of her family where there are many visual-spatial occupations in the arts and the sciences and no less that four Nobel prize winners. She explained that all of the prize-winning achievements have a high visual component. Thus, in a most remarkable example of the larger pattern, in this extended family the exceptional visual and spatial capabilities that have contributed to so much creativity and innovation, seem to be balanced by problems in other specific areas.
On her side of the family, the Nobel Laureates are her grandfather Sir William Bragg (1862-1942) and her father Sir Lawrence Bragg (1890-1971). They received a joint prize for x-ray crystallography. On her husband's (David Thomson) side, the Nobel Laureates are his grandfather Sir Joseph Thomson (1856-1940) for discovery of the electron and his father Sir George Thomson (1892-1925) for discovery of electron defraction.
She spoke of her famous father and the other outstanding scientists in her remarkable family, her gifted children, and the way the power of visual-spatial thinking has colored their lives and has contributed to many of the considerable achievements in the family. Along with the scientists among the Braggs and the Thomsons, there have been several artists, architects, TV producers and computer experts and one actor along with a number of other occupations where the role of visual-spatial proficiencies is not so obvious.
However, in five generations of these families, with many children and grandchildren, there have been 12 who are (or were) mildly dyslexic and 11 who are dyslexic. There are many great grandchildren who are "too young to tell." Along with the award medals and family photographs, the exhibition showed drawings and paintings by family members including a self portrait sketch by Sir Lawrence Bragg.
An indicator of the enduring importance of Lawrence Bragg's work is that when James Watson wrote The Double Helix -- about his discovery of the structure of DNA with Francis Crick -- he asked Bragg to write the Foreword to his book. The use of x-ray crystallography pioneered by the two Braggs was fundamental to understanding the structure of this molecule which carries all genetic information.
The art in medicine
Another speaker at the Oxford conference was Terence Ryan. Dr. Ryan described what turned out to be his own life story as man who was a leader in his field of medicine (dermatology) but had unusual difficulties with his early education and his medical education because of his dyslexia. For example, with exams, he would usually recognize accurately symptoms and conditions but would sometimes come up with the wrong Latin medical names.
However, in his practice and clinical observations, he found he could be a leader and innovator because he could recognize disease patterns that his medical colleagues could not easily see. He suspected that he had greater powers of visual observation than many of his associates. He also thought his dyslexia helped him to be more flexible and innovative in his thinking, coming up with theoretical approaches quite different from others in his field.
As an example of the creative inverted thinking that dyslexics sometimes exhibit, he described one of his own theories that is still controversial. Generally, it is taught that skin grows as its lowest layers and older cells allow themselves to rise to the top layers to slough off at the surface. He explained that from his point of view, cells would be unlikely to allow themselves to automatically rise to the top layers -- as they would thereby be moving further and further away from their food supply in the bottom layers. Consequently, he uses the novel alternative explanation that the cells which rise to the top are in fact inadvertently pushed out of the way by other cells which are in fact making their own way down toward the nutrient supplies in the bottom layers. In many ways the final results are the same, but the actual process is quite different. Consequently, his associates see him as one of the important "lateral" thinkers in the field.
In spite of his extensive educational difficulties, his medical career has been highly successful. Now retired, he was Clinical Professor of Dermatology at Oxford University and Vice Warden of one of the Oxford Colleges. He has been president of many of the national and international professional societies in his field as well as being active in establishing regional dermatology training centers in Africa and Central America. He is "not easily confined by definitions" which has helped him break new ground and produce about 500 publications.
As a hobby, Dr. Ryan does colorful flower paintings -- often exploiting visual ambiguities in which it may not be clear whether a garden stair goes up or down or whether a flower is inside or outside a frame.
Always at the leading edge
While it is clearly difficult to properly identify dyslexia at a distance in time and space, viewing visual strengths and verbal difficulties over many generations (through many changes in technologies and economies) can be remarkably instructive. Accordingly, we may be led to ask whether it is true, as some believe, that many of the early dyslexics and strong visual thinkers with language problems quit their schools and conventional towns as quickly as they could and headed for newest frontiers available to them -- the sailing ships and the wind or water powered mills, the railroads and telegraph lines, the gold mines and oil fields.
Did they mostly leave settled places like London, Boston and Philadelphia -- and seek their fortune (in disproportionate numbers) in places like Australia, New Zealand, Canada, Texas, Alaska and California? Did all the early Swedes who could not read (and so were not permitted to marry), really immigrate to America (as one Swedish researcher speculates)?
We may ask how strong and varied visual traits have contributed over time to both school difficulties and to remarkable innovations and inventions, within a shifting technological context. Why do these individuals seem always to be out in front of everyone else, especially when they can move ahead with the minimum of book learning and paper credentials -- while using their special visual-spatial abilities, creative imagination and hands-on skills -- often taking great risks?
Why do so many of today's technologists and entrepreneurs seem to fit this pattern? Why do there seem to be so many of these individuals in places like Silicon Valley? Whatever the time or place, some individuals seem to find ways to get away from the traditional books and the old settled ways by creating things that are entirely new. It seems to be a pattern that is familiar to many families. Perhaps it is worth looking at artistic and scientific families to see whether there is evidence of these enduring traits over generations -- visual thinkers doing the things they can do best in whatever technological context is made available by their time and place. The patterns may be more clear and enlightening than we might imagine.
Click the "References" link above to hide these references.
Caroe, G.M., 1978. William Henry Bragg -- 1892-1942 Man and Scientist. Cambridge: Cambridge University Press.
Suplee, Curt, 2000. "Six Awarded Nobel Prizes in Chemistry, Physics -- 'Information Age' Contributions Honored.' " The Washington Post, October 11, 2000. p. A2.
Watson, James D., 1968. The Double Helix -- A Personal Account of the Discovery of DNA. With a Foreword by Sir Lawrence Bragg. New York: Atheneum.
West, Thomas G., 1997. In the Mind's Eye. Amherst, N.Y.: Prometheus Books.
West, Thomas, G. 1999. "The Abilities of Those with Reading Disabilities: Focusing on the Talents of People with Dyslexia." Chapter 11, Reading and Attention Disorders -- Neurobiological Correlates. Edited by Drake D. Duane, M.D. Baltimore, MD: York Press, Inc. Based on a conference sponsored by the National Dyslexia Research Foundation.
Thomas G. West invites readers to contact him with their own stories about families with visual-spatial strengths and verbal difficulties or other learning differences. Information about Barrington Stoke books can be found at www.barringtonstoke.co.uk.
Information about the Arts Dyslexia Trust can be obtained by contacting Susan Parkinson at: [email protected]
Thomas G. West (2001) | <urn:uuid:41f5e19c-f57d-4286-b5b6-bf16c26ffbb2> | CC-MAIN-2016-26 | http://www.ldonline.org/article/Dyslexic_Talents_and_Nobel_Prizes | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403826.29/warc/CC-MAIN-20160624155003-00047-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.967402 | 2,781 | 2.65625 | 3 |
Q From Tony: My wife is Japanese and we were discussing why Japanese have 10 different names for the same number. I asked why? She returned with a really tough one. Why are eleven and twelve so named? Why not eleventeen and twelveteen? She had a point. Where did those words originate?
A The ending -teen is just an old form of ten, so that sixteen is “six-ten” or “six plus ten”. If you were following the rule of such numbers strictly, you ought to count oneteen, twoteen, threeteen, fourteen, and so on. (Thirteen is actually a modified form of threeteen, a word that existed at one time, though written as threteen.)
As you say, eleven and twelve don’t fit this neat system. That’s probably because people a thousand years ago didn’t necessarily think in tens all the time, but often preferred twelves. The posh name for it is the duodecimal system; think of 12 inches to the foot or 12 pence to the shilling in old British money and the way that items even now can be counted out by dozens or by the gross. It may also in part be tied up with the idea of the dual number, in which things were classed as one, two, or many (singular, dual, plural); Old English had a dual number, as do other languages. So ten plus one and ten plus two were special numbers, not quite in the same situation as ten plus three or the higher examples.
The oldest form of eleven in English is endleofan (which appears in King Alfred’s translation from the Latin of Bede’s Ecclesiastical History). It’s made up of two words that mean “one left over”, that is, after one has counted ten, there’s one remaining. Similarly twelve is from Old English words that meant “two left over”. So why didn’t people talk about “three left over” and so on? It seems that once they had got past the magic twelve, people swapped to counting in a more direct way.
Note, though, that this pattern isn’t by any means universal even among European languages. Though German and Dutch match it, French and the other Romance tongues don’t (French, for example, has unique words up as far as seventeen). The pattern seems to be peculiar to the Germanic languages.
Search World Wide Words
Recently added or updated
By hook or by crook; Polish off; Loggerhead; Lame duck; But and ben; Logomaniac; Type louse; Corium; Lie Doggo; Fewmet; Dingbat; Kibosh; Caucus; Oryzivorous; Kick the bucket; Satisficer; Beside oneself; Words of the Year 2015; Peradventure; Sconce; Orchidelirium; How’s your father; Goon; Emoji; Thank your mother for the rabbits; Nonplussed; Bob’s-a-dying; Methinks; Bill of goods.
Support World Wide Words!
Donate via PayPal. Select your currency from the list and click Donate.
Buy from Amazon and get me a small commission at no cost to you. Select your preferred site and click Go! | <urn:uuid:3dd7e759-3144-480c-8690-58d19f06c3c3> | CC-MAIN-2016-26 | http://www.worldwidewords.org/qa/qa-num1.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396455.95/warc/CC-MAIN-20160624154956-00189-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.955287 | 712 | 3.328125 | 3 |
This circuit will supply up to about 20ma at 12 volts. It uses capacitive reactance instead of resistance; and it doesn’t generate very much heat.The circuit draws about 30ma AC. Always use a fuse and/or a fusible resistor to be on the safe side. The values given are only a guide. There should be more than enough power available for timers, light operated switches, temperature controllers etc,
provided that you use an optical isolator as your circuit’s output device. (E.g. MOC 3010/3020) If a relay is unavoidable, use one with a mains voltage coil and switch the coil using the optical isolator.C1 should be of the ’suppressor type’; made to be connected directly across the incoming Mains Supply. They are generally covered with the logos of several different Safety Standards Authorities. If you need more current, use a larger value capacitor; or put two in parallel; but be careful of what you are doing to the Watts. The low voltage ‘AC’ is supplied by ZD1 and ZD2. The bridge rectifier can be any of the small ‘Round’, ‘In-line’, or ‘DIL’ types; or you could use four separate diodes. If you want to, you can replace R2 and ZD3 with a 78 Series regulator. The full sized ones will work; but if space is tight, there are some small 100ma versions available in TO 92 type cases. They look like a BC 547. It is also worth noting that many small circuits will work with an unregulated supply. You can, of course, alter any or all of the Zenner diodes in order to produce a different output voltage. As for the mains voltage, the suggestion regarding the 110v version is just that, a suggestion. I haven’t built it, so be prepared to experiment a little. | <urn:uuid:6d63b416-b943-40d7-adb1-546d9f950d8f> | CC-MAIN-2016-26 | http://kumpulanrangkaianelektronik.blogspot.com/2012/03/power-supplay-12-volt-non-trafo.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.25/warc/CC-MAIN-20160624154956-00190-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.900116 | 409 | 2.875 | 3 |
Quartz is a mineral composed of silica and oxygen (silicon dioxide - SiO2). Unlike the silica in glass, silica in quartz is crystalline. Quartz is the most common ingredient in most sand...and sand is the primary ingredient in glass.
Agate, amethyst, citrine, jasper, onyx, and opal are all varieties of quartz.
The melting temperature of quartz is over 2900F (1600C). It has a hardness of 7 on Mohs harness scale and a specific gravity of 2.65. | <urn:uuid:5ea73f0a-33fc-4248-bd21-d2395e06f677> | CC-MAIN-2016-26 | http://www.glassfacts.info/indexa1db.html?fid=68 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00112-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.891115 | 114 | 3.25 | 3 |
In number theory, a perfect number is a positive integer that is equal to the sum of its proper positive divisors, that is, the sum of its positive divisors excluding the number itself (also known as its aliquot sum). Equivalently, a perfect number is a number that is half the sum of all of its positive divisors (including itself) i.e. σ1(n) = 2n.
This definition is ancient, appearing as early as Euclid's Elements (VII.22) where it is called τέλειος ἀριθμός (perfect, ideal, or complete number). Euclid also proved a formation rule (IX.36) whereby is an even perfect number whenever is what is now called a Mersenne prime—a prime of the form for prime Much later, Euler proved that all even perfect numbers are of this form. This is known as the Euclid–Euler theorem.
It is not known whether there are any odd perfect numbers, nor whether infinitely many perfect numbers exist.
The first perfect number is 6, because 1, 2, and 3 are its proper positive divisors, and 1 + 2 + 3 = 6. Equivalently, the number 6 is equal to half the sum of all its positive divisors: ( 1 + 2 + 3 + 6 ) / 2 = 6. The next perfect number is 28 = 1 + 2 + 4 + 7 + 14. This is followed by the perfect numbers 496 and 8128 (sequence A000396 in OEIS).
In about 300 BC Euclid showed that if 2p−1 is prime then (2p−1)2p−1 is perfect. The first four perfect numbers were the only ones known to early Greek mathematics, and the mathematician Nicomachus had noted 8128 as early as 100 AD. Philo of Alexandria in his first-century book "On the creation" mentions perfect numbers, claiming that the world was created in 6 days and the moon orbits in 28 days because 6 and 28 are perfect. Philo is followed by Origen, and by Didymus the Blind, who adds the observation that there are only four perfect numbers that are less than 10,000. (Commentary on Genesis 1. 14-19). St Augustine defines perfect numbers in City of God (Part XI, Chapter 30) in the early 5th century AD, repeating the claim that God created the world in 6 days because 6 is the smallest perfect number. The Egyptian mathematician Ismail ibn Fallūs (1194–1252) mentioned the next three perfect numbers (33,550,336, 8,589,869,056 and 137,438,691,328) and listed a few more which are now known to be incorrect. In a manuscript written between 1456 and 1461, an unknown mathematician recorded the earliest European reference to a fifth perfect number, with 33,550,336 being correctly identified for the first time. In 1588, the Italian mathematician Pietro Cataldi also identified the sixth (8,589,869,056) and the seventh (137,438,691,328) perfect numbers, and also proved that every perfect number obtained from Euclid's rule ends with a 6 or an 8.
Even perfect numbers
|Unsolved problem in mathematics:
Are there infinitely many perfect numbers?
(more unsolved problems in mathematics)
Euclid proved that 2p−1(2p − 1) is an even perfect number whenever 2p − 1 is prime (Euclid, Prop. IX.36).
For example, the first four perfect numbers are generated by the formula 2p−1(2p − 1), with p a prime number, as follows:
- for p = 2: 21(22 − 1) = 6
- for p = 3: 22(23 − 1) = 28
- for p = 5: 24(25 − 1) = 496
- for p = 7: 26(27 − 1) = 8128.
Prime numbers of the form 2p − 1 are known as Mersenne primes, after the seventeenth-century monk Marin Mersenne, who studied number theory and perfect numbers. For 2p − 1 to be prime, it is necessary that p itself be prime. However, not all numbers of the form 2p − 1 with a prime p are prime; for example, 211 − 1 = 2047 = 23 × 89 is not a prime number. In fact, Mersenne primes are very rare—of the 9,592 prime numbers p less than 100,000, 2p − 1 is prime for only 28 of them.
Over a millennium after Euclid, Ibn al-Haytham (Alhazen) circa 1000 AD conjectured that every even perfect number is of the form 2p−1(2p − 1) where 2p − 1 is prime, but he was not able to prove this result. It was not until the 18th century that Leonhard Euler proved that the formula 2p−1(2p − 1) will yield all the even perfect numbers. Thus, there is a one-to-one correspondence between even perfect numbers and Mersenne primes; each Mersenne prime generates one even perfect number, and vice versa. This result is often referred to as the Euclid–Euler theorem. As of January 2016[update], 49 Mersenne primes are known, and therefore 49 even perfect numbers (the largest of which is 274207280 × (274207281 − 1) with 44,677,235 digits).
An exhaustive search by the GIMPS distributed computing project has shown that the first 44 even perfect numbers are 2p−1(2p − 1) for
- p = 2, 3, 5, 7, 13, 17, 19, 31, 61, 89, 107, 127, 521, 607, 1279, 2203, 2281, 3217, 4253, 4423, 9689, 9941, 11213, 19937, 21701, 23209, 44497, 86243, 110503, 132049, 216091, 756839, 859433, 1257787, 1398269, 2976221, 3021377, 6972593, 13466917, 20996011, 24036583, 25964951, 30402457, and 32582657 (sequence A000043 in OEIS).
Five higher perfect numbers have also been discovered, namely those for which p = 37156667, 42643801, 43112609, 57885161, and 74207281, though there may be others within this range. It is not known whether there are infinitely many perfect numbers, nor whether there are infinitely many Mersenne primes.
As well as having the form 2p−1(2p − 1), each even perfect number is the (2p − 1)th triangular number (and hence equal to the sum of the integers from 1 to 2p − 1) and the 2p−1th hexagonal number. Furthermore, each even perfect number except for 6 is the ((2p + 1)/3)th centered nonagonal number and is equal to the sum of the first 2(p−1)/2 odd cubes:
Even perfect numbers (except 6) are of the form
with each resulting triangular number (after subtracting 1 from the perfect number and dividing the result by 9) ending in 3 or 5, the sequence starting with 3, 55, 903, 3727815, .... This can be reformulated as follows: adding the digits of any even perfect number (except 6), then adding the digits of the resulting number, and repeating this process until a single digit (called the digital root) is obtained, always produces the number 1. For example, the digital root of 8128 is 1, because 8 + 1 + 2 + 8 = 19, 1 + 9 = 10, and 1 + 0 = 1. This works with all perfect numbers 2p−1(2p − 1) with odd prime p and, in fact, with all numbers of the form 2m−1(2m − 1) for odd integer (not necessarily prime) m.
Owing to their form, 2p−1(2p − 1), every even perfect number is represented in binary as p ones followed by p − 1 zeros:
- 610 = 1102
- 2810 = 111002
- 49610 = 1111100002
- 812810 = 11111110000002
- 3355033610 = 11111111111110000000000002.
Thus every even perfect number is a pernicious number.
Odd perfect numbers
|Unsolved problem in mathematics:
Are there any odd perfect numbers?
(more unsolved problems in mathematics)
It is unknown whether there is any odd perfect number, though various results have been obtained. In 1496, Jacques Lefèvre stated that Euclid's rule gives all perfect numbers, thus implying that no odd perfect number exists. More recently, Carl Pomerance has presented a heuristic argument suggesting that indeed no odd perfect number should exist. All perfect numbers are also Ore's harmonic numbers, and it has been conjectured as well that there are no odd Ore's harmonic numbers other than 1.
Any odd perfect number N must satisfy the following conditions:
- N > 101500.
- N is not divisible by 105.
- N is of the form N ≡ 1 (mod 12), N ≡ 117 (mod 468), or N ≡ 81 (mod 324).
- N is of the form
- The largest prime factor of N is greater than 108.
- The second largest prime factor is greater than 104, and the third largest prime factor is greater than 100.
- N has at least 101 prime factors and at least 10 distinct prime factors. If 3 is not one of the factors of N, then N has at least 12 distinct prime factors.
...a prolonged meditation on the subject has satisfied me that the existence of any one such [odd perfect number] — its escape, so to say, from the complex web of conditions which hem it in on all sides — would be little short of a miracle.
Euler stated: "Whether (...) there are any odd perfect numbers is a most difficult question".
All even perfect numbers have a very precise form; odd perfect numbers either do not exist or are rare. There are a number of results on perfect numbers that are actually quite easy to prove but nevertheless superficially impressive; some of them also come under Richard Guy's strong law of small numbers:
- The only even perfect number of the form x3 + 1 is 28 (Makowski 1962).
- 28 is also the only even perfect number that is a sum of two positive integral cubes (Gallardo 2010).
- The reciprocals of the divisors of a perfect number N must add up to 2 (to get this, take the definition of a perfect number, , and divide both sides by n):
- For 6, we have ;
- For 28, we have , etc.
- The number of divisors of a perfect number (whether even or odd) must be even, because N cannot be a perfect square.
- From these two results it follows that every perfect number is an Ore's harmonic number.
- The even perfect numbers are not trapezoidal numbers; that is, they cannot be represented as the difference of two positive non-consecutive triangular numbers. There are only three types of non-trapezoidal numbers: even perfect numbers, powers of two, and the numbers of the form formed as the product of a Fermat prime with a power of two in a similar way to the construction of even perfect numbers from Mersenne primes.
- The number of perfect numbers less than n is less than , where c > 0 is a constant. In fact it is , using little-o notation.
- Every even perfect number ends in 6 or 28, base ten; and, with the only exception of 6, ends in 1, base 9.
- The only square-free perfect number is 6.
The sum of proper divisors gives various other kinds of numbers. Numbers where the sum is less than the number itself are called deficient, and where it is greater than the number, abundant. These terms, together with perfect itself, come from Greek numerology. A pair of numbers which are the sum of each other's proper divisors are called amicable, and larger cycles of numbers are called sociable. A positive integer such that every smaller positive integer is a sum of distinct divisors of it is a practical number.
By definition, a perfect number is a fixed point of the restricted divisor function s(n) = σ(n) − n, and the aliquot sequence associated with a perfect number is a constant sequence. All perfect numbers are also -perfect numbers, or Granville numbers.
A semiperfect number is a natural number that is equal to the sum of all or some of its proper divisors. A semiperfect number that is equal to the sum of all its proper divisors is a perfect number. Most abundant numbers are also semiperfect; abundant numbers which are not semiperfect are called weird numbers.
- Caldwell, Chris, "A proof that all even perfect numbers are a power of two times a Mersenne prime".
- Dickson, L. E. (1919). History of the Theory of Numbers, Vol. I. Washington: Carnegie Institution of Washington. p. 4.
- Commentary on the Gospel of John 28.1.1-4, with further references in the Sources Chrétiennes edition: vol. 385, 58-61.
- Roshdi Rashed, The Development of Arabic Mathematics: Between Arithmetic and Algebra (Dordrecht: Kluwer Academic Publishers, 1994), pp. 328–329.
- Munich, Bayerische Staatsbibliothek, Clm 14908
- Smith, DE (1958). The History of Mathematics: Volume II. New York: Dover. p. 21. ISBN 0-486-20430-8.
- Dickson, L. E. (1919). History of the Theory of Numbers, Vol. I. Washington: Carnegie Institution of Washington. p. 10.
- Pickover, C (2001). Wonders of Numbers: Adventures in Mathematics, Mind, and Meaning. Oxford: Oxford University Press. p. 360. ISBN 0-19-515799-0.
- Peterson, I (2002). Mathematical Treks: From Surreal Numbers to Magic Circles. Washington: Mathematical Association of America. p. 132. ISBN 88-8358-537-2.
- All factors of 2p − 1 are congruent to 1 mod 2p. For example, 211 − 1 = 2047 = 23 × 89, and both 23 and 89 yield a remainder of 1 when divided by 11. Furthermore, whenever p is a Sophie Germain prime—that is, 2p + 1 is also prime—and 2p + 1 is congruent to 1 or 7 mod 8, then 2p + 1 will be a factor of 2p − 1, which is the case for p = 11, 23, 83, 131, 179, 191, 239, 251, ... A002515.
- Song Y. Yan (2009). Primality Testing and Integer Factorization in Public-Key Cryptography. Advances in Information Security 11 (2nd ed.). Springer-Verlag. p. 199. ISBN 0-387-77268-5.
- O'Connor, John J.; Robertson, Edmund F., "Abu Ali al-Hasan ibn al-Haytham", MacTutor History of Mathematics archive, University of St Andrews.
- "GIMPS Home". Mersenne.org. Retrieved 2013-02-05.
- GIMPS Milestones Report. Retrieved 2014-02-24
- Weisstein, Eric W., "Perfect Number", MathWorld.
- Dickson, L. E. (1919). History of the Theory of Numbers, Vol. I. Washington: Carnegie Institution of Washington. p. 6.
- Ochem, Pascal; Rao, Michaël (2012). "Odd perfect numbers are greater than 101500" (PDF). Mathematics of Computation 81 (279): 1869–1877. doi:10.1090/S0025-5718-2012-02563-4. ISSN 0025-5718. Zbl pre06051364.
- Kühnel, U (1949). "Verschärfung der notwendigen Bedingungen für die Existenz von ungeraden vollkommenen Zahlen". Mathematische Zeitschrift 52: 201–211. doi:10.1515/crll.1941.183.98. Retrieved 30 March 2011.
- Roberts, T (2008). "On the Form of an Odd Perfect Number" (PDF). Australian Mathematical Gazette 35 (4): 244.
- Grün, O (1952). "Über ungerade vollkommene Zahlen". Mathematische Zeitschrift 55 (3): 353–354. doi:10.1007/BF01181133. Retrieved 30 March 2011.
- Nielsen, PP (2003). "An upper bound for odd perfect numbers". Integers 3: A14–A22. Retrieved 30 March 2011.
- Goto, T; Ohno, Y (2008). "Odd perfect numbers have a prime factor exceeding 108" (PDF). Mathematics of Computation 77 (263): 1859–1868. doi:10.1090/S0025-5718-08-02050-9. Retrieved 30 March 2011.
- Iannucci, DE (1999). "The second largest prime divisor of an odd perfect number exceeds ten thousand" (PDF). Mathematics of Computation 68 (228): 1749–1760. doi:10.1090/S0025-5718-99-01126-6. Retrieved 30 March 2011.
- Iannucci, DE (2000). "The third largest prime divisor of an odd perfect number exceeds one hundred" (PDF). Mathematics of Computation 69 (230): 867–879. doi:10.1090/S0025-5718-99-01127-8. Retrieved 30 March 2011.
- Nielsen, PP (2015). "Odd perfect numbers, Diophantine equations, and upper bounds" (PDF). Mathematics of Computation 84 (0): 2549–2567. doi:10.1090/S0025-5718-2015-02941-X. Retrieved 13 August 2015.
- Nielsen, PP (2007). "Odd perfect numbers have at least nine distinct prime factors" (PDF). Mathematics of Computation 76 (260): 2109–2126. doi:10.1090/S0025-5718-07-01990-4. Retrieved 30 March 2011.
- The Collected Mathematical Papers of James Joseph Sylvester p. 590, tr. from "Sur les nombres dits de Hamilton", Compte Rendu de l'Association Française (Toulouse, 1887), pp. 164–168.
- Makowski, A. (1962). "Remark on perfect numbers". Elem. Math. 17 (5): 109.
- Gallardo, Luis H. (2010). "On a remark of Makowski about perfect numbers". Elem. Math. 65: 121–126..
- Jones, Chris; Lord, Nick (1999). "Characterising non-trapezoidal numbers". The Mathematical Gazette (The Mathematical Association) 83 (497): 262–263. doi:10.2307/3619053. JSTOR 3619053
- Hornfeck, B (1955). "Zur Dichte der Menge der vollkommenen zahlen". Arch. Math. 6 (6): 442–443. doi:10.1007/BF01901120.
- Kanold, HJ (1956). "Eine Bemerkung ¨uber die Menge der vollkommenen zahlen". Math. Ann. 131 (4): 390–392. doi:10.1007/BF01350108.
- H. Novarese. Note sur les nombres parfaits Texeira J. VIII (1886), 11–16.
- Dickson, L. E. (1919). History of the Theory of Numbers, Vol. I. Washington: Carnegie Institution of Washington. p. 25.
- Redmond, Don (1996). Number Theory: An Introduction to Pure and Applied Mathematics. Chapman & Hall/CRC Pure and Applied Mathematics 201. CRC Press. Problem 7.4.11, p. 428. ISBN 9780824796969..
- Euclid, Elements, Book IX, Proposition 36. See D.E. Joyce's website for a translation and discussion of this proposition and its proof.
- Kanold, H.-J. (1941). "Untersuchungen über ungerade vollkommene Zahlen". Journal für die Reine und Angewandte Mathematik 183: 98–109.
- Steuerwald, R. "Verschärfung einer notwendigen Bedingung für die Existenz einer ungeraden vollkommenen Zahl". S.-B. Bayer. Akad. Wiss. 1937: 69–72.
- Nankar, M.L.: "History of perfect numbers," Ganita Bharati 1, no. 1–2 (1979), 7–8.
- Hagis, P. (1973). "A Lower Bound for the set of odd Perfect Prime Numbers". Mathematics of Computation 27: 951–953. doi:10.2307/2005530.
- Riele, H.J.J. "Perfect Numbers and Aliquot Sequences" in H.W. Lenstra and R. Tijdeman (eds.): Computational Methods in Number Theory, Vol. 154, Amsterdam, 1982, pp. 141–157.
- Riesel, H. Prime Numbers and Computer Methods for Factorisation, Birkhauser, 1985.
- Sándor, Jozsef; Crstici, Borislav (2004). Handbook of number theory II. Dordrecht: Kluwer Academic. pp. 15–98. ISBN 1-4020-2546-7. Zbl 1079.11001.
- Hazewinkel, Michiel, ed. (2001), "Perfect number", Encyclopedia of Mathematics, Springer, ISBN 978-1-55608-010-4
- David Moews: Perfect, amicable and sociable numbers
- Perfect numbers – History and Theory
- Weisstein, Eric W., "Perfect Number", MathWorld.
- "Sloane's A000396 : Perfect numbers", The On-Line Encyclopedia of Integer Sequences. OEIS Foundation.
- OddPerfect.org A projected distributed computing project to search for odd perfect numbers.
- Great Internet Mersenne Prime Search
- Perfect Numbers, math forum at Drexel.
- Grimes, James. "8128: Perfect Numbers". Numberphile. Brady Haran. | <urn:uuid:55c0bc93-6153-491e-b016-76cfd61ee69e> | CC-MAIN-2016-26 | https://en.wikipedia.org/wiki/Perfect_numbers | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783392159.3/warc/CC-MAIN-20160624154952-00002-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.792966 | 4,993 | 3.890625 | 4 |
Nosebleeds are very common in children. Although a bleeding nose can be scary for both you and your child, you don’t usually need to worry about it. The amount of blood your child loses from a nosebleed won’t usually harm him.
Causes of a bleeding nose
Children can get a nosebleed if they:
- pick at their nose
- bump their nose or blow their nose too hard
- get something stuck up their nose
- have allergies
- get an infection in their nose, throat or sinuses
- use medications like nose sprays
- strain to do a poo when they’re constipated.
Some children get a lot of nosebleeds. This can happen if their noses are irritated by dry air, nasal medication or infection. Cold weather and low humidity make nosebleeds more likely because these conditions dry out the mucus in children’s noses.
More rare causes of nosebleeds include bleeding disorders and other systemic diseases.
The medical name for a bleeding nose is epistaxis.
With a nosebleed, it helps to remember that although it might look like a lot of blood, usually there isn’t that much.
When to see a doctor about nosebleeds
You should take your child to see your GP if:
- the bleeding hasn’t stopped after 20 minutes, despite firm pressure on the nose
- your child is also generally unwell, looks pale or has unexplained bruises on her body
- your child is less than two years old and has a bleeding nose
- your child has regular nosebleeds.
The first step to treating a nosebleed is staying calm. This will help settle your child if he’s upset by the sight and taste of blood. Crying can make the nosebleed worse.
Then the next step is to apply firm pressure with your finger and thumb on the sides of the nostrils (the soft part of the nose).
Continue this for 10 minutes with your child sitting up and keeping her head still and slightly tilted forward. Don’t lie her down or tilt her head back. Wait the full 10 minutes – don’t keep checking to see whether the bleeding has stopped.
If your child’s nose is still bleeding after 10 minutes of pressure, repeat the process again for another 10 minutes.
Once the bleeding has stopped, encourage your child not to blow or pick his nose for about 24 hours. This will help the blood clot in his nose to strengthen.
Your child might vomit during or after a nosebleed if she has swallowed some blood. This is pretty normal, and your child should spit out the blood.
When the bleeding won’t stop
If you can’t stop the bleeding with the treatment steps above, you should take your child to the GP or hospital emergency department.
The doctor might put some cream or ointment up your child’s nose to help stop the bleeding.
Another treatment can involve nose-packing. This is where the doctor puts a special cloth dressing into your child’s nose. Your child will need a follow-up appointment 24-48 hours later to have the dressing taken out.
Cautery is another common treatment. This is where a special chemical is used to seal off the bleeding and ‘freeze’ the blood vessel. Doctors usually use anaesthetic for cautery.
Very rarely your child might need to see an ear, nose and throat specialist and go into hospital for treatment.
After a bleeding nose
Here’s what to do after your child has had a bleeding nose:
- Ensure your child rests over the next 24 hours.
- Keep your child out of hot baths.
- Encourage your child not to pick or blow her nose.
Sometimes a doctor will recommend that your child uses a saline nasal spray or lubricating ointment to help with dryness. The doctor might also recommend using an antibiotic ointment, which you’ll need to put up your child’s nose. | <urn:uuid:6f6ad1ea-d9cc-41d2-9807-a45185cb80dc> | CC-MAIN-2016-26 | http://raisingchildren.net.au/articles/nosebleeds.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393442.26/warc/CC-MAIN-20160624154953-00118-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.929496 | 847 | 2.96875 | 3 |
Hull focuses on seven cases in which each government’s response was shaped by its understanding of and respect for the law: Belgian neutrality, the land war in the west, the occupation of enemy territory, the blockade, unrestricted submarine warfare, the introduction of new weaponry (including poison gas and the zeppelin), and reprisals. Drawing on voluminous research in German, British, and French archives, the author reconstructs the debates over military decision making and clarifies the role played by law—where it constrained action, where it was manipulated to serve military need, where it was simply ignored, and how it developed in the crucible of combat. She concludes that Germany did not speak the same legal language as the two liberal democracies, with disastrous and far-reaching consequences. The first book on international law and the Great War published since 1920, A Scrap of Paper is a passionate defense of the role that the law must play to govern interstate relations in both peace and war.A few blurbs:
"Over the last decade, with wars in Iraq and Afghanistan, the laws of armed conflict have become matters of popular and public interest. Despite the growth of international humanitarian law, much of the law with which we still operate dates from the fifteen years just before the First World War and was applied within it. A Scrap of Paper is the first book to pay sustained attention to the subject of international law in the First World War since 1920. It is not only a timely book, it is an overdue one, and its impact on the study of the war will be important and game-changing. Isabel V. Hull has the linguistic range and scholarly tools to tackle the subject in the truly comparative fashion that its complexity demands."—Sir Hew Strachan
"Isabel V. Hull's passionate narrative of the role of international law in the decision-making processes in Berlin and London during the First World War opens a strikingly original perspective on the consciousness of the wartime actors. This was a war waged also by legal arguments. In the end, the inability and unwillingness of Imperial Germany to defend its case in legal terms crucially undermined its war effort. This is not only superb history, but also the most powerful defense of the role of law in international crisis that I have read, and as such is of obvious contemporary relevance."—Martti KoskenniemiMore information is available here. | <urn:uuid:557465fe-68f2-4301-b1b8-b1d0d167c153> | CC-MAIN-2016-26 | http://legalhistoryblog.blogspot.com/2014/03/new-release-hull-on-international-law.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00123-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.965117 | 483 | 3.078125 | 3 |
Researchers Push for Healthier Water Drinking Requirements in Schools
Researchers are helping push for new policies in day care and education centers across the country to implement better water drinking requirements based on the findings of a recent study.
Published in the this months 2013 issue of the Journal of Nutrition Education and Behavior, the study is the first to document the availability and accessibility of water in compliance with state and federal policy and accreditation standards in child care centers.
According to the United States Department of Education, nearly 60 percent of 3- to 5-year-olds attend licensed childcare centers. Previous research published in the journal Future Child and the Journal of Nutrition Education and Behavior shows that the availability of water, culture of the child care center, and how the staff promotes and models water consumption can have a significant impact on development of health habits and future health.
As reports show that one-third of U.S. children are considered overweight or obese, the act expands access to drinking water in schools, particularly during meal times.
Researchers reviewed national, state, and child care center water regulations and observed water availability and teacher behaviors during lunch and physical activity in 40 child care centers in Connecticut, and found that many centers were in violation of water-promoting policies. While water was available in most classrooms (84 percent), it had to be requested from an adult in over half of those classrooms.
Researchers also found that water was available during only one-third of physical activity periods observed and verbal prompts from staff for children to drink water were few.
"The lack of water availability during a meal diminishes its importance as a viable beverage choice for young children and highlights a missed opportunity for centers to normalize consumption of noncaloric beverage," says Kathryn E. Henderson, PhD, Director of School and Community Initiatives at the Rudd Center.
"With child care settings' strong influence on mealtime behaviors, policy guidelines should continue to explicitly mention that water may be served with meals. This is a cost-neutral policy suggestion that reinforces low-calorie hydration to children as they form their dietary habits, but it does not encroach on milk consumption."
Researchers note that this change could help assist with better care in childcare centers and practices across the country and is needed to help centers meet existing water policies and new water requirements included in the 2010 Child Nutrition Reauthorization Act. | <urn:uuid:7cec0a69-c456-44b2-866d-08af4db99680> | CC-MAIN-2016-26 | http://www.scienceworldreport.com/articles/5428/20130307/researchers-push-healthier-water-drinking-requirements-schools.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00133-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.965214 | 476 | 3.015625 | 3 |
INITIAL RATE OF ABSORPTlON / IRA
The weight of water absorbed expressed in grams per 30 sq. in. of contact surface when a brick is partially immersed for one minute. Also called suction. See ASTM Specification C67
Originally the IRA was limited by the BIA standard (Building Code Requirements for Engineered Brick Masonry, Brick Institute of America, McLean, Virginia, August 1969.). It limited the IRA of brick at the time of laying to a maximum .025 oz per sq in. per min (approximately 20 g /30 sq in./min). Since then, the ASTM C 62 and ASTM C 216 have been changed and now recommend that the limit on IRA be 30 g /30 sq in./min. This IRA determination may be made either in the laboratory on oven-dry brick, or at the construction site as a field test.
Date: 19th century
Mutual (or reciprocal) action or influence.
Back to glossary index.
Back to Environmental loads and construction degradation.
Please click here to enter the article. | <urn:uuid:e98b4fea-45dd-4682-b9a7-3cde685ec631> | CC-MAIN-2016-26 | http://www.angelfire.com/biz/BuildingPathology/duri.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00010-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.886332 | 224 | 2.703125 | 3 |
BAER Testing Protocol
The Brainstem Auditory Evoked Response (BAER) test is the only accepted method of diagnosis. Bone stimulation transducer may be used in addition when conduction deafness is suspected.
OFA recommends this test be performed by board certified veterinary neurologists, but will accept test results from experienced veterinarians, neuroscience professionals, and audiologists. One test suffices for the lifetime of the animal.
Bilateral hearing passes the test. Unilateral or bilateral deafness
- BAER testing is done on canines at least 35 days old.
- A signal equivalent to between 70 and 105 dB nHL (normal hearing level) is used to obtain a response with peaks I and V judged present at their appropriate latencies.
- Insert earphones will be used.
- Chemical restraint is optional.
- The test is done in such a manner that movement will not cause an
artifact that could be mistaken for a response to a stimulus.
- At least 200 clicks will be used to obtain the response.
- A masking tone is not considered necessary if recordings are made
with electrodes positioned along the midline and in the ipsilateral
mastoid region; a masking tone is necessary if the electrodes are
placed along the midline at the vertex and the T-1.
- Under appropriate circumstances when an ear tests as deaf using air-conducted
stimuli, and the possibility of conduction deafness exists (chronic
otitis, excess ear wax accumulation), repeat testing with a bone stimulation
transducer is recommended.
- A printed copy of the BAER Test tracing will be provided to the owner
and the OFA.
- The Printed copy of the BAER tracing must contain the dogs
name or identification linking it to this application. | <urn:uuid:f0fd04f2-9b53-4679-99a5-da4e9ea84411> | CC-MAIN-2016-26 | http://www.offa.org/deaf_baer.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00139-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.878069 | 373 | 2.6875 | 3 |
ReadWriteThink couldn't publish all of this great content without literacy experts to write and review for us. If you've got lessons plans, videos, activities, or other ideas you'd like to contribute, we'd love to hear from you.
Find the latest in professional publications, learn new techniques and strategies, and find out how you can connect with other literacy professionals.
Teacher Resources by Grade
|1st - 2nd||3rd - 4th|
|5th - 6th||7th - 8th|
|9th - 10th||11th - 12th|
Analyzing and Comparing Medieval and Modern Ballads
|Grades||9 – 12|
|Lesson Plan Type||Standard Lesson|
|Estimated Time||Six 50-minute sessions|
Fredonia, New York
Students read, analyze, and discuss medieval English ballads and then list characteristics of the genre. They then emphasize the narrative characteristics of ballads by choosing a ballad to act out. Using the Venn diagram tool, students next compare medieval ballads with modern ones. After familiarizing themselves with ballad themes and forms, students write their own original ballads, which they will perform in small groups. Finally, students engage in self-reflection on their group performances and on the literary characteristics of their ballads.
Interactive Venn Diagram: Use this online tool to organize ideas for a compare and contrast essay, or while reading to compare and contrast two works of literature.
ReadWriteThink Notetaker: Using this online tool, students can organize, revise, and plan their writing, as well as take notes as they read and research.
Self-Reflection: Taking Part in a Group: Using this sheet, students evaluate how well they have participated in a group activity.
Students are often asked to study literature from distant time periods. This lesson uses a variety of activities that allow students to use multiple intelligences to relate literature from long ago to their modern experiences. In her article on the problems with tracking in schools, Cynthia Evans discusses the merits of teaching to multiple intelligences: "Howard Gardner's multiple intelligence theory (1983) allows us to celebrate the richness of our students who manifest musical, logical, and spatial gifts. We honor those who are talkers, rhythm-makers, quiet thinkers, actors, and poets." (64)
Gardner, Howard. 1993. Multiple Intelligences: The Theory in Practice. Basic Books.
Evans, Cynthia. "Access, Equity and Intelligence: Another Look at Tracking" English Journal 84.8. (December 1995): 63-65.
Ruggieri, Colleen A. "Multigenre, Multiple Intelligences, and Transcendentalism." English Journal 92.9 (November 2002): 60-68. | <urn:uuid:3b0b4fb3-0af3-42a1-af3f-bd36be3760e6> | CC-MAIN-2016-26 | http://www.readwritethink.org/classroom-resources/lesson-plans/analyzing-comparing-medieval-modern-1097.html?tab=1 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00017-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.892384 | 580 | 3.921875 | 4 |
Epidermal Dysplasia is a congenital disease which is identified as among the “scaling diseases” of the skin. The condition is also termed as “seborrhea”, a general term used to denote extreme dryness of the skin.
Being a pathologic condition, Epidermal Dysplasia is not just simple dryness of the skin rather it involves the abnormal proliferation of the cells of the epidermis which is the outermost layer of the skin. As the cells multiply, they eventually flake off in large clumps that look like scales.
Inherited “scaling diseases” are also referred to as “keratinization disorders”. Compared to the other disorders, Epidermal Dysplasia is usually manifested within the first year of life which is considered relatively early. The disease has only been observed in West Highland White Terriers where it is passed on as an autosomal recessive trait.
Dogs which have inherited the trait for Epidermal Dysplasia often show early signs of the disease that includes increased pigment deposition (also called hyperpigmentation) of the ear flaps and underarms. This will later on worsen and spread towards the chest and abdomen which eventually become the most affected parts of the body. Hyperpigmentation in these parts are very pronounced and is a classical sign of the disease. The limbs will undergo hyperpigmentation in the long run, which will eventually result in reddening of the skin, scaling and alopecia or hair loss. The dog may also show intense itching and the skin may appear black and greasy. Oftentimes, the affected dog may have an offensive odor. There may also be inflammation of the ears (otitis) which is accompanied by heavy buildup of earwax.
The most common complications of epidermal dysplasia in dogs include secondary fungal and bacterial infection on the skin. Examination of affected dogs may reveal a concurrent yeast growth known as Malassezia infection.
Diagnosis is made based on clinical manifestations, microscopic examination of skin scrapings and skin biopsies. The dog’s medical history coupled with the breed and age of onset are helpful tools in the identification of the disease.
Being a congenital condition, the treatment regimen is aimed only at controlling secondary infections that may possibly set in. Long-term administration of potent antimicrobial medications in topical and oral preparations is usually prescribed. Antibiotics and antifungals are prescribed in potent doses and in frequent intervals to effectively manage the symptoms and provide long-term comfort for dogs suffering from this skin problem.
Shampoos with ketoconazone, an antifungal, can also help alleviate signs of the disease. Anti-inflammatory preparations have also been successful in easing itchiness and the formation of inflammatory lesions.
Dogs which are diagnosed with Epidermal Dysplasia should never be allowed to breed. Neutering and spaying should be done to prevent passing on to the defective gene to the offspring. | <urn:uuid:9e17c86f-1b15-4f6a-a125-3b9c1c91556b> | CC-MAIN-2016-26 | http://www.thepaw.com/diseases/skin/epidermal-dysplasia | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00083-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.956433 | 624 | 3.671875 | 4 |
Part 1 - Cyber War and Human Error
Part 2 - Information Disasters (Tufte, Space Shuttles & Design Lessons that Save Lives)
Part 3 - The Iceberg Principle
Part 4 - A Common Visual Vocabulary
Part 5 - The Peaceful Data Warrior (Designing for Healthcare, Finance & Cybersecurity)
Part 1 - Cyber War and Human Error
- Richard A. Clarke, Counter-terrorism adviser to Presidents Bill Clinton and George W. Bush.
Besides the usual rhetoric of "the need for peace talks" and "a long-term solution to the problem," the most recent flare-up in the decades old conflict between Israel and Hamas this past November may have broken new ground in its use of cyber war tactics. While cyber war is not a new topic in the nation's zeitgeist, the number of reported incidents has grown exponentially over the past few years. This video from CNN describes the incidents of cyber attacks that relate to the conflict.
With some security analysts predicting that 2013 is the year nation-sponsored cyber-warfare will go mainstream, it's no wonder that leaders from several western nations have made cybersecurity a top priority within their governing agendas. In his 2013 State of the Union address, President Barack Obama outlined his executive order addressing cybersecurity: Improving Critical Infrastructure Cybersecurity. This is no longer just an issue for those in the industry. The topic has moved from the realm of tech-savvy people and digital professionals and onto our national stage. Cybersecurity has gone mainstream.
Now that cybersecurity is an integral part of Homeland Security's focus along with the vulnerability of critical infrastructure (power, water, and nuclear systems), two things have become abundantly clear. One is that with the increase in attacks (along with the proliferation of connected devices like smart phones, tablets, computers and even household appliances), the responsibility of keeping data and systems secure will require more and more input from people who are not technical professionals. The second is that we need to place a greater emphasis on User Centered Design, not just for ease of use but for the sake of our safety.
The very real (and very scary) truth is that is human error accounts for a staggering number of security breeches. Here are some frightening statistics from a chiefexecutive.net article from 2011:
- In October 2010, Microsoft blamed human error after two computers on its network were hacked and then misused by spammers to promote more than 1000 questionable online pharmaceutical websites.
- In April 2011, the State of Texas discovered that the personal and confidential data of 3.5 million teachers, state workers, retirees and recipients of unemployment checks had been left unprotected on the Internet nearly one year. According to Gartner, Inc., more than 99 percent of firewall breaches are caused by misconfigurations rather than firewall flaws.
- The State Department’s 2008 breach of the passport system was a result of under-configured access control and a defendant’s “idle curiosity” peaked by the simple discovery that he 'could'."
Hypothetically, one could have the most sophisticated technology imaginable, but if it isn't intuitive or designed to account for human error, then it simply would not be effective. So, what can public and private-sector organizations do to address the problem of human error? The first step is to design for humans.
As we'll see in the next installment, Part 2 - Information Disasters (Tufte, Space Shuttles & Design Lessons that Save Lives), smart, user-focused design can literally mean life or death. | <urn:uuid:adfc3727-d8d2-40f9-9cbc-09ac9fcd5dcb> | CC-MAIN-2016-26 | http://techdesign.blogspot.com/2013/02/cybersecurity-human-factors-user.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00134-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.942943 | 728 | 2.6875 | 3 |
Diana, the tragic British princess, inspired many fashions, but strangely, not one for her name. The classic and lovely moon-goddess name Diana hovered for years around Number 100, though now it's dipped down to Number 295, its lowest point since the late 1930s. But for us, Diana is a gorgeous and still-underused choice.
Diana is the Latin name for the Roman goddess associated with the moon, virginity, and hunting; she is the protector of wild animals, represented in myth as both beautiful and chaste.
Two of her most prominent bearers today are singers Diana (born Diane) Ross and Krall. Fictional Dianas appear in All's Well That Ends Well, Jane Eyre, and Anne of Green Gables.
Now that the Duke and Duchess of Cambridge have named their daughter Charlotte Elizabeth Diana, perhaps this name will finally attract more attention and greater use. | <urn:uuid:9adfd4ba-40bf-4c68-92d8-7afed2eb34bc> | CC-MAIN-2016-26 | http://nameberry.com/babyname/Diana | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00171-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.956501 | 189 | 2.765625 | 3 |
The NAU mission and purposes describe the university’s commitment to assist students in further development of ethical values and behavior. A significant aspect of one of the purposes relates to academic integrity and the encouragement of honesty and ethical behavior on the part of students and graduates. Academic dishonesty includes, but is not limited to, plagiarizing and/or cheating on assignments, tests or projects; or assisting someone else in these actions.
Students are encouraged to model behaviors that reflect honesty and integrity, and, therefore, may not engage in or tolerate cheating, plagiarism or other forms of academic dishonesty and/or related misconduct. Students should work in collaboration with each other to accomplish educational objectives; however, they are also responsible for their own understanding of the academic content and for their own work. Students who are unclear about the academic dishonesty examples listed below should seek clarification from a faculty member or staff members with appropriate expertise.
The most common forms of academic dishonesty include but are not limited to:
- Using or attempting to use unauthorized assistance, material or student aids in examinations or other academic work. Examples: using a cheat sheet on an exam, copying from another student’s exam, copying an exam before it is given, collaborating on an assignment without course instructor’s consent, or altering exam answers and resubmitting the exam for a better grade.
- Using the ideas, data, or language of another without specific and proper acknowledgment. Examples: failing to cite a reference or to use quotation marks where appropriate, or misrepresenting another’s work as one’s own original creation.
Fabrication and Falsification:
- Submitting contrived or altered information in an academic exercise. Examples: inventing data, research results, information or procedures in an academic exercise, reporting false information about internship or practicum experiences, or altering the record of data or experimental procedures or results.
- Submitting, without prior permission, substantial portions of the same academic work for credit more than once.
Complicity in Academic Dishonesty:
- Knowingly helping or attempting to help another commit an act of academic dishonesty; failing to report instances of academic dishonesty of which the student is aware.
Students are responsible for seeking information about accurate documentation of citations and references for specific content areas. Students who are unclear about the cheating and plagiarism examples listed above should seek clarification from a faculty member or staff members with appropriate expertise.
The university trusts the members of the faculty to enforce policies and to establish procedures in their classes that will encourage honesty and ethical behavior on the part of students. The university expects that faculty members will not only make the determination of academic dishonesty but that they will impose the sanctions described below as appropriate.
Penalties are given at the discretion of the academic dean and/or provost and are determined based on the severity of the violation and any prior history of academic dishonesty. Penalties include the following:
- Failing grade for test, assignment, or project
- Failing grade for course
- Temporary or permanent suspension (assigned only by the provost)
A student may not withdraw from the course or change the grading option for the course before an allegation of academic dishonesty has been resolved. Generally, if a student has either admitted to the allegation or has been found responsible for academic dishonesty, the student will not be permitted to withdraw from the course or change the grading option for the course. | <urn:uuid:c88bb546-4f03-4286-9d40-0c8ad15fad38> | CC-MAIN-2016-26 | http://webapps.national.edu/Smart_Catalog/Graduate_catalog/academic-integrity.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399385.17/warc/CC-MAIN-20160624154959-00122-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.932804 | 702 | 2.828125 | 3 |
Study proves for the first time that having Chronic Kidney Disease can directly damage the heart.
Very small reductions in kidney function are directly linked to subtle heart and blood vessel damage, according to new research from scientists in Birmingham funded by the British Heart Foundation (BHF). This shows for the first time that the heart damage seen in people with Chronic Kidney Disease (CKD) is a direct result of their reduced kidney function.
The study, published in the journal Hypertension, looked at healthy people who had chosen to donate a kidney to see if it resulted in any adverse changes in their heart and blood vessels after donation.
The researchers found that, even in very healthy people, a small reduction in kidney function is associated with an enlarged left-side of the heart, which makes the heart stiffer and impairs its ability to contract. This shows the clear link between reductions in kidney function and cardiovascular disease.
Dr William Moody, a BHF Research Fellow at Queen Elizabeth Hospital and the University of Birmingham, who worked on the study said: "It should be noted that the effects on the kidney donors were very small and no studies of people who have donated a kidney have shown a cardiovascular risk that is higher than that of the general population."
The results could, however, have significant consequences for people suffering with CKD. In England in 2008/09 there were over 1.5 million people registered with CKD, though it is expected that the actual number is much larger than this1. People with CKD have impaired cardiac function to the extent that this is often the cause of premature death, although the mechanism is not clear. By demonstrating that in otherwise healthy people there is small but measurable heart and blood vessel damage following kidney donation, the researchers have shown that in patients with CKD, poor kidney function has a direct adverse effect on heart function.
For one year the researchers tracked 68 kidney donors and 56 similar adults who had not donated a kidney. The adverse changes following donation included an enlarged left-side of the heart (increased left ventricular mass), increased stiffness of the aorta, the main artery providing blood to the body, and reduced heart function. However, these effects were extremely small and at an individual level the extra risk associated with the changes is very small.
Past large studies of patients with kidney disease have shown that a worse kidney function increases likelihood of an increased left ventricular mass, which is a strong predictor of risk for cardiovascular death.
A major research effort is now needed to understand what the risk is and find measures to reduce it in patients with CKD, to prevent premature death.
This research was also funded by NIHR/Wellcome Clinical Research Facility and Queen Elizabeth Hospital Birmingham Charity.
Dr William Moody, a BHF Research Fellow at the University of Birmingham and the author of the paper said: "Early stage kidney disease is a public health problem because it is common and carries an increased risk of heart and circulatory disease. A major research effort is needed to understand this risk and to find measures to prevent this damage.
"For now, people with blood tests showing slightly reduced kidney function should certainly consider discussing heart disease risk with their doctors and consider how best to reduce this."
Professor Jeremy Pearson, Associate Medical Director at the British Heart Foundation said: "By studying healthy kidney donors, this Birmingham team supported by BHF funding have been able to show convincingly for the first time that loss of kidney function has direct adverse effects on the heart, unrelated to changes in blood pressure.
"While the adverse effects in the kidney donors are small, the study suggests strongly that identification of the mechanisms involved could provide new avenues to reduce the progressive impairment of heart function seen in patients with chronic kidney disease. However it is important to note that these findings should not put anyone off donating a kidney, as those individuals are highly selected as healthy subjects and effects of kidney donation will still not even get them to an 'average' risk level". | <urn:uuid:776da6ae-c739-4e1b-8469-816d8eac998f> | CC-MAIN-2016-26 | http://www.medicalnewstoday.com/releases/305108.php | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00069-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.964487 | 804 | 2.84375 | 3 |
“All victims of human rights abuses should be able to look to the Human Rights Council as a forum and a springboard for action.”
- Ban Ki-moon, UN Secretary-General, 12 March 2007, Opening of the 4th Human Rights Council Session
The Human Rights Council is an inter-governmental body within the United Nations system responsible for strengthening the promotion and protection of human rights around the globe and for addressing situations of human rights violations and make recommendations on them. It has the ability to discuss all thematic human rights issues and situations that require its attention throughout the year. It meets at the UN Office at Geneva.
The Council is made up of 47 United Nations Member States which are elected by the UN General Assembly. The Human Rights Council replaced the former United Nations Commission on Human Rights.
1. The massive Human Rights violation in Syria.
2. The execution of Juvenile Offenders.
** The agendas may be subject to change. | <urn:uuid:e9ceb3aa-f708-48b2-9090-d7f0f004b1a1> | CC-MAIN-2016-26 | https://sites.google.com/a/chirecps.ac.in/chirecmun/committees/human-rights-council | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00069-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.924627 | 196 | 3.59375 | 4 |
Our mission is to provide optimum patient care by designing an individualized treatment plan for individuals with Lymphedema. Care is provided by qualified clinicans who have undergone extensive training in both Manual Lymphatic Drainage and Complete Decongestive Therapy.
- What is Lymphedema?
- What are the types of Lymphedema?
- What is the Treatment of Lymphedema?
- What does Complete Decongestive Therapy (CDT) consist of?
- Who is Appropriate for Treatment?
- Are there any Contraindications to Treatment?
- How do I begin treatment?
- What will happen on my initial visit?
WHATE IS LYMPHEDEMA?
Lymphedema is defined as an accumulation of protein-rich fluid in the soft tissues caused by insufficiency, blockage or removal of lymphatic vessels or nodes. Over time, this leads to chronic inflammation and fibrosis in the effected region. Individuals with lymphedema are also at increased risk for infection in involved areas.
WHAT ARE THE TYPES OF LYMPHEDEMA?
There are two types of lymphedema: primary and secondary. Primary lymphedema may present at birth or adolescence and can involve any part of the body, often for unknown reasons. Secondary lymphedema is caused by damage or injury to the lymphatic system such as lymph node removal, radiation therapy, or infection.
WHAT IS THE TREATMENT OF LYMPHEDEMA?
Lymphedema is a chronic disease for which there is no known cure. However, effective treatment does exist and long-term management of the disease is possible. Therapy is available to decrease edema which can then be maintained through a home program. This is called Complete Decongestive Therapy (CDT). Treatment is unique to each individual, based on individual needs and goals.
WHATE DOES COMPLETE DECONGESTIVE THERAPY (CDT) CONSIST OF?
- Manual Lymph Drainage (MLD) – A gentle, non-invasive manual treatment to improve the activity of the lymphatic system and re-rout lymph flow around blocked areas.
- Compression Bandaging – The application of short stretch bandages over effected areas to assist in fluid return and breakdown of scar tissue.
- Therapeutic Exercises – Exercises are performed with bandages or support garments on to increase venous and lymphatic return.
- Skin and Nail Care and Infection Prevention
- Instruction in Self-Care – Includes instruction in skin and nail care, infection prevention, lifestyle modification, self-bandaging, compression garment use, exercise, self-MLD, and need for follow-up treatment.
WHO IS APPROPRIATE FOR TREATMENT?
Individuals who have been diagnosed with lymphedema of all types are candidates for evaluation. Duration and intensity of treatment is dependent upon the severity of Lymphedema and individual goals. A physician’s referral is necessary for evaluation and treatment.
ARE THERE ANY CONTRADICTIONS TO TREATMENT?
Individuals with acute infections, cardiac edema (CHF), renal insufficiency, active malignancy, or blood clots (DVTs) may not be appropriate for treatment.
HOW DO I BEGIN TREATMENT?
Referrals are required from a Physician. We are committed to working closely with the patient, physician and family. The physician progress notes on a regular basis. In this way we work to increase communication among all involved in order to enhance patient progress and outcome.
WHAT WILL HAPPEN ON MY INITIAL VISIT?
The initial visit will consist of a one hour visit with a therapist. Please bring the referral from your doctor, a list of medications that you may be taking and arrive at least 15 minutes prior to your scheduled appointment to register. | <urn:uuid:9bb3822b-453b-422d-8f3c-ac7b64e805c3> | CC-MAIN-2016-26 | https://backushospital.org/our-services/rehabilitation-services/faqs/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396100.16/warc/CC-MAIN-20160624154956-00037-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.915313 | 816 | 2.703125 | 3 |
From The Jacket:
For Fifty years, Anna Schlemmer has refused to talk about her life in Germany during World War II. Her daughter, Trudy, was only three when she and her
mother were liberated by an American soldier and went to live with him in Minnesota. Trudy’s sole evidence of the past is an old photo graph: a family
portrait showing Anna, Trudy, and a Nazi officer. Trudy, now a professor of German history, begins investigating the past and finally unearths the heartbreaking
truth of her mother’s
life. Those Who Save Us is a profound exploration of what we endure to survive and the legacy of shame.
Those Who Save Us
by Jenna Blum
*Author’s Website http://www.jennablum.com/
*Other books by the same author- First novel
How would you categorize Those Who Save Us: as a war story, a love story, a mother-daughter story? Why? How is it different from other novels that address the issues surrounding the Holocaust? What new perspectives does it offer?
Discuss the novel's title, Those Who Save Us. In what ways do the characters save each other in the novel, and who saves whom? How does Blum play with the concept of being saved, being safe, being a savior?
In the beginning of the novel, what is Anna's attitude towards the Jewish people of Weimar? Does her attitude change? If so, where does this transformation occur and why?
While she is hiding Max, Anna thinks she would "pay a high price to be plain, for her looks pose an ever-greater danger to both herself and Max." Do you see Anna's beauty as a blessing or a curse? What role does it play in shaping her destiny? How do her looks affect her relationships with Max, Gerhard, the Obersturmfuhrer, Trudy?
When living with Mathilde, Anna asks why Mathilde risks her life to feed the Buchenwald prisoners "when everyone else turn a blind eye." Why does Mathilde take this risk? Why does Anna? Do you think American women would react differently than German women in similar circumstances, and if so, why?
What are Anna's sexual reactions to the Obersturmfuhrer, and what effect do they have on how she sees herself? How do they shape Anna's relationship with Trudy?
Do you see Anna's relationship with the Obersturmfuhrer as primarily sexual, or are there places in the novel where their relationship transcends the sexual?
Do you see the Obersturmfuhrer as a monster or as human? What are his vulnerabilities? To what degree is he a product of his time? If the Obersturmfuhrer had been born in contemporary America, what might he be doing today?
Toward the end of the novel, Anna thinks that the Obersturmfuhrer "has blighted her ability to love." Do you think he has forever affected her ability to love Jack? To love Trudy? What are Anna's real feelings for the Obersturmfuhrer, and what are his true feelings toward Anna and her daughter?
Are Trudy's difficulties with her mother caused only by the secrets Anna keeps? If the past had not come between them, what would their relationship have been like? In what ways are Trudy and Anna typical of mothers and daughters everywhere? What parallels can you draw between their relationship and yours with your own mother?
Trudy has been familiar with shame all her life, both her own shame and Anna's. How does Trudy learn about shame from Anna? Does Trudy's shame stem solely from her suspicions about her Nazi parentage or from her German heritage as well? How has her shame manifested in her adult lifestyle?
Anna's consistent response to Trudy's questions is, "The past is dead, and better it remain so." Why does Anna keep her silence? Is this fair to Trudy? Were you surprised that Anna refuses to talk about her past even when she has been confronted and deemed a heroine by Mr. Pfeffer? In her position, would you do the same?
During his German Project interview, Rainer plays what he calls "a dirty trick" on Trudy by reading a prepared statement about his aunt's experience and eventual deportation to Auschwitz instead of telling his own story. Why does he do this? Why is Rainer so angry with Trudy? Is he angry with her? Do you think his anger is justified?
Why does Trudy get involved with Rainer? Is Trudy and Rainer's relationship a healthy one? When Rainer departs for Florida, he says, "I do not deserve this . . . . I am not meant to be this happy," a statement with which Trudy agrees. If Trudy and Rainer's relationship were not affected by their wartime pasts, would it have been happy? Would it have existed at all?
What does each of Trudy's interview subjects—Frau Kluge, Rose-Grete Fischer, Rainer, Felix Pfeffe—represent about German actions during the war and how Germans feel in retrospect? What does Trudy learn from her German subjects?
At the end of Those Who Save Us, the characters' fates are ambiguous; Trudy, for instance, is left in a "vacuum between one part of life ending and another coming to take its place." Why does Blum do this? What statement, if any, is she trying to make? Do you feel that the novel's end is a happy one for Trudy? For Anna? Why or why not? And what do you think has happened to the Obersturmfuhrer? | <urn:uuid:5e912fd4-2cff-481e-ad2a-2b4ae2b1dc76> | CC-MAIN-2016-26 | http://www.princetonbookreview.com/book_pages/discussion/those_who_save_us.php | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00118-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.972984 | 1,223 | 2.90625 | 3 |
PROGRAMME 9: PEACE, SECURITY AND THE ENVIRONMENT
166. The Assistant Executive Director introduced this programme by drawing attention to the increased international interest in the concept of environmental security; he noted that it had nothing to do with disarmament.
167. One representative, while noting the commendable work being undertaken by the Peace Research Institute in Oslo (PRIO), said that it now needed redirection. It was especially important to develop the concept of environmental security and to elaborate a set of criteria to determine when a situation or activity became a threat to security. Noting that the programme linked the concept of environmental security to Earthwatch, he argued that as UREP had no mandate to make political assessments, it was necessary to establish a new decision-making body which might bring such issues before the United Nations Security Council. He said that the proposed new centre for environmental emergency assistance might be linked to this body and ended by predicting that this subject would be discussed by the General Assembly at its forty-fourth session, as well as at the 1992 United Nations conference on environment and development. | <urn:uuid:1d5036e7-5c16-487d-a1ef-c9b1e77e997f> | CC-MAIN-2016-26 | http://www.unep.org/Documents.multilingual/Default.asp?DocumentID=71&ArticleID=881&l=en | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396147.66/warc/CC-MAIN-20160624154956-00005-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.973207 | 224 | 2.59375 | 3 |
Methods | Statistics | Clinical | Educational | Industrial | Professional items | World psychology |
Biological: Behavioural genetics · Evolutionary psychology · Neuroanatomy · Neurochemistry · Neuroendocrinology · Neuroscience · Psychoneuroimmunology · Physiological Psychology · Psychopharmacology (Index, Outline)
In contrast to the two separate enantiomers, which generally have identical physical properties, a racemate often has different properties compared to either one of the pure enantiomers. Different melting points and solubilities are very common, but different boiling points are also possible.
Pharmaceuticals may be available as a racemate or as pure enantiomer, which might have different potencies. It is nowadays regulated by law that both enantiomers have to be tested separately for their pharmacological effects (see Enantiomer).
There are three ways a racemate can crystallize, this is important for the resolution of a racemate by crystallisation. Precise ways to distinguish between these crystal forms were summarised already in 1899 by H. W. B. Roozeboom.
- Conglomerate (sometimes racemic mixture or racemic conglomerate)
- A mechanical mixture of enantiomerically pure crystals of one enantiomer and its opposite. Molecules in the crystal structure have higher affinity to the same enantiomer than to the opposite enantiomer. The melting point of the racemic conglomerate is always lower than the pure enantiomer. Addition of a small amount of one enantiomer to the racemic compound increases the melting point.
- Racemic compound (sometimes true racemate)
- Molecules have a higher affinity to the opposite enantiomer than to the same enantiomer, the substance forms a single crystalline phase in which the two enantiomers are present in an ordered 1:1 ratio in the elementary cell. By addition of small amount of one enantiomer to the racemic compound, the melting point decreases. But the pure enantiomer can have higher or lower melting point than the racemic compound.
- Pseudoracemate (sometimes racemic solid solution)
- Unlike the racemic compound or conglomerate, there is no big difference in affinity between the same and opposite enantiomers. Overall, both enantiomers occur in equal proportions in the crystal but they coexist in an unordered manner in the crystal lattice. By addition of small amount of one enantiomer to the racemic compound, the melting point changes just little bit, or not at all.
The separation of a racemate into its components, the pure enantiomers, is called a resolution. There are various methods, including crystallization, chromatography and the use of enzymes. The first successful resolution of a racemate was performed by Louis Pasteur, who manually separated the crystals of a conglomerate.
Without a chiral influence (for example a chiral catalyst, solvent or starting material), a chemical reaction that makes a chiral product will always yield a racemate. That can make the synthesis of a racemate cheaper and easier than making the pure enantiomer, because it does not require special conditions. This fact also leads to the question how biological homochirality evolved on a presumably racemic primordial earth. (Possibly pointing to evidence of a contingency mechanism in evolutionary processes?)
The reagents of, and the reactions that produce, racemic mixtures are said to be "not stereospecific" or "not stereoselective", for their indecision in a particular stereoisomerism.
Some drug molecules are chiral and the enantiomers have different effects on biological entities. They can be sold as one enantiomer or as a racemic mixture. Examples include Thalidomide, Ibuprofen, and Salbutamol. Ritalin is a mixture of several different enantiomers. A single amphetamine dose combines the neutral sulfate salts of dextroamphetamine and amphetamine, with the dextro isomer of amphetamine saccharate and d, l-amphetamine aspartate monohydrate.
In some cases (e.g. Ibuprofen and Thalidomide) the enantiomers are interconverted in vivo. This means that preparing a pure enantiomer for medication is largely pointless.
In cases like Salbutamol and Thalidomide the inactive isomer may be harmful.
Methamphetamine is available by prescription under the brand name Desoxyn. The active component of Desoxyn is dextro-methamphetamine hydrochloride. This is the right-hand isomer of methamphetamine. The left-handed isomer of methamphetamine, levo-methamphetamine, is less centrally acting and more peripherally acting; therefore a racemic mixture of dextro/levo-methamphetamine isn't used in current medical practice. In the past, due to different levels of restrictions on precursor chemicals and lack of knowledge by those preparing the final product, racemic methamphetamine was produced and sold on the black market. Newer techniques typically use asymmetric synthesis methods and yield a majority of d-methamphetamine and relatively little l-methamphetamine. (Warning: Desoxyn and methamphetamine contain some of the same chemicals, but cannot be used interchangeably. Desoxyn is produced in a quality controlled factory by Ovation Pharma in a precise dosage. Methamphetamine from the street can contain a large number of toxic adulterants and accurate dosing is impossible.)
|This page uses Creative Commons Licensed content from Wikipedia (view authors).| | <urn:uuid:9c7a5308-5660-4855-810c-52baf18fb329> | CC-MAIN-2016-26 | http://psychology.wikia.com/wiki/Racemic | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395166.84/warc/CC-MAIN-20160624154955-00052-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.877488 | 1,151 | 3.625 | 4 |
You are at NWS Houston/Galveston » SE TX Climate » Houston Climate» Climate Graphs - How to read
How to Read the
For temperatures, the observed high and low are indicated by the tops and bottoms of the vertical dark blue bars, respectively. The normal temperature ranges are indicated by the green band. Record highs are shown on the top of the light pink band, and record lows are indicated along the bottom of the light blue band. Red stars indicate a high temperature that has been either tied or broken. Blue stars indicate a low temperature that has either been tied or broken. | <urn:uuid:705835f3-47ee-49dc-bcc4-3ccf01ac4c8a> | CC-MAIN-2016-26 | http://www.srh.noaa.gov/hgx/?n=climate_graphs_monthly | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00080-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.915764 | 122 | 2.96875 | 3 |
Revolutions are made by small groups of people. Most American colonists did not fight the British. And in Birmingham most people, black and white, sat out the street protests that helped end legally sanctioned racial segregation. During the Civil Rights demonstrations of April and May 1963, a few more than 1,000 adults were arrested. Not enough to fill the jails and force white officials to negotiate a truce. The shock troops of the Birmingham movement were children and teenagers who marched and were arrested by the thousands — no one is sure how many. Cynthia Levinson tells their story in We’ve Got a Job: The 1963 Birmingham Children’s March (Peachtree Publishers, 2012).
Writing for young readers age 10 and up, Levinson looks at the 1963 protests through the experiences of four young demonstrators: Audrey Faye Hendricks (age 9), James W. Stewart (age 15), Arnetta Streeter (age 16) and Washington Booker III (known as Wash, age 14). Levinson, who writes for several children’s magazines, joins an impressive group of authors writing Civil Rights history for kids. These include National Book Award winner Phillip M. Hoose, author of Claudette Colvin: Twice Toward Justice (Farrar Straus Giroux, 2009) and Larry Dane Brimner, author of Birmingham Sunday (Boyds Mills Press, 2010), a history of the Sixteenth Street Baptist Church bombing.
The young people featured in We’ve Got a Job each came to activism in their own way. Audrey Hendricks was a child of Civil Rights workers. She attended mass meetings with her parents and wanted to make her own contribution. James Stewart, son of a physician, learned that his comfortable middle-class life did not protect him from the indignities of segregation. And while his family lived in a comfortable home with a swimming pool, he saw the poverty of other African-American children. Arnetta Streeter, also a child of activists, helped found the Peace Ponies, a service club at all-black Ullman High School. Originally planning to mentor younger students and practice thrift, the Peace Ponies decided to battle segregation instead. Wash Booker, who liked to wear “a Davy Crockett coonskin cap,” remembered standing at the window of Newberry’s Department Store watching the white people inside eat banana splits at the lunch counter. He wanted one too.
During the climax of the demonstrations, the Birmingham police arrested so many young protestors that they filled the city jails. Like many of the kids who marched, Wash Booker played hooky without his mother’s knowledge to go to the demonstrations. When she dropped him at school, he went in the front door and straight out the back door with hundreds of other young people. Unable to arrest more, Bull Connor tried to drive the demonstrators from the streets with dogs and fire hoses. Young bodies absorbed many of the blasts as children and teenagers held on to one another. Arnetta Streeter recalled that she and another girl were “hugging together; and the water just washed the two of us down the street.” The pressure from the hoses tore away clothing and young girls were picked up by the force of the water and thrown over the tops of cars. But the children kept coming. Bull Connor vanquished many opponents during his long political career, but he was no match for the Peace Ponies.
As world opinion bore down on Birmingham and the peaceful demonstrations turned to riots, the city’s black and white leaders worked out a compromise. They desegregated department stores and agreed to talk about desegregating schools and the police department. Looking back over fifty years, it doesn’t seem like much. But it was more than white Birmingham had ever given up and it was an important step toward ending legal, if not actual, segregation. For the young people who helped lead the revolution, it meant they were freer to grow up as full citizens of their country, and freer to be kids. Arnetta Streeter went to the movies at the Alabama Theatre and sat on the main floor, not in the balcony. Audrey Hendricks had dinner out with her parents “at restaurants where they had never been able to eat.” James Stewart watched the world changing around him with pleasure, and like Arnetta, took in a movie at the Alabama. Wash Booker went to Newberry’s and sat on a stool at the shiny, stainless steel lunch counter. He ate ice cream.
Cynthia Levinson, Washington Booker, James W. Stewart and Arnetta Streeter will speak at the downtown Birmingham Public Library, on Thursday, Feb. 23 at 6:30 p.m. The event is free and open to the public. Copies of We’ve Got a Job will be available for purchase and signing.
Jim Baggett is Archivist at the Birmingham Public Library. He can be reached at [email protected]. Follow the Archives on Facebook. | <urn:uuid:a8fbb1ee-0323-4c3e-823b-907d144eb54d> | CC-MAIN-2016-26 | http://bplolinenews.blogspot.com/2012/02/bpl-archivist-reviews-book-on.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395992.75/warc/CC-MAIN-20160624154955-00117-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.968249 | 1,031 | 2.75 | 3 |
"What is... Unix"|
More things people think you should know.
By John Holstein, Cotse Helpdesk Coordinator
Page 2 of 2
The different Unix Operating Systems are not easy to use or learn, especially for the computer beginner. There are some very complicated issues involved. This being the case, that's where Microsoft came into the picture in the early 80's. You see, being that Unix is so complicated, Bill Gates wanted to make an easier to understand Operating System that used less resources and the operators could "operate" better. Now that may have been true in 1980, but unlike MS products, the different Flavors of Unix are not bloated and they're still very functional.
With a Unix Operating System, although nothing is perfect, there is less room for malfunctions due to kernel faults, which lead in MS products to the dreaded BSOD (Blue Screen of Death). In Unix, particularly FreeBSD, you may, at the command line, enter in the command "ps -aux" to see the current "processes" being run by a particular user or yourself. If that process has screwed up and isn't responding, you simply find the corresponding identification number (pid) and "kill" it. Simply "kill pid" or for example "kill 900" will kill the non-responsive program 900 and you may continue with your work. If possible, you may even restart the program and begin anew.
Like I was saying, this all sounds so easy to do on paper, in the practical world however, Unix is a different beast and warrants the 10-15% increase in pay between an NT Admin and a Unix Admin.
I don't recommend that a computer-beginner run right out and download a copy of a colorful Unix Flavor (yes, in most cases, you may download, various Unix Operating Systems, and most of the applications associated with them, ALL FOR FREE) and begin an installation. In order to install and operate a Unix OS, you should be moderately computer literate and able to function well by the use of command line. On the otherhand, companies such as Red Hat (www.redhat.com) have made the installation of their Unix Flavor (Redhat Linux) virtually as easy as the standard Microsoft Windows Installation.
Overall, more and more people are switching to the Unix model for their Operating System of choice. Other Operating System vendors have bloated their program code and overpriced their products. It boils down to this: Why use a high priced OS when you can get the job done more easily, with less hassle, by using a FREE OS? All it take is a bit of intelligence, a desire to learn and a little adventurous spirit and just about anyone operating a computer system right now could make the switch to Unix. Some would say I am pushing the simplicity with that statement, I say otherwise. There are many online documents that will help guide you in the setup an old computer system with a Unix flavor while you were online with another machine. If you have the ambition, you can do it.
If you decide to start from scratch and build a Unix Machine (box) of your own, I highly recommend going out and purchasing a copy. At your favorite book store, you will find copies of various Unix "how to" books. The publishers normally insert a Unix CD-Rom as a bonus. Linux Red Hat seems to be the easiest Unix Flavor to begin with (and easiest to find), but I highly recommend venturing into other avenues after you complete your first installation and get a handle for what it's all about.
Remember, the Cotse Helpdesk is always available to help out. You may stop in anytime at IRC Server irc.cotse.com, channel #helpdesk, and get real time help, for real world computer problems. If all else fails, email us!
Problems? Questions? Bugs?
Email: John Holstein, | <urn:uuid:b9846f19-a0ff-413d-864e-7f5198ce6a11> | CC-MAIN-2016-26 | http://www.cotse.com/helpdesk/documents/whatis/unix/index2.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00157-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.94178 | 804 | 3.03125 | 3 |
What is in this article?:
- Soil drought expected to end; hydrologic drought to be long-term issue
- Trouble for cities
- The drought that has covered most of the Southwest for two years is coming to an end.
- A hydrologic drought could persist for years.
- Average rainfall for several years will not refill reservoirs.
Reduced stream flow occurs with hydrologic drought.
The drought that has covered most of the Southwest for two years is coming to an end.
With the onset of an El Nino weather pattern and decline of La Nina, weather forecasters are saying that the coming winter will be cooler and wetter than normal. That situation should persist into March, says Steve Lyons, National Weather Service, San Angelo, Texas.
Lyons, speaking Thursday at the Big Country Wheat Conference in Abilene, said little will change over the next 90 days. “We predict warm and dry conditions until about Christmas, and then it turns cooler and wetter.”
The last 90 days, to no one’s surprise, has featured below average rainfall and above average temperatures.
“We’ve been running much above normal temperatures,” he said, “much like last year, and that does not help with evaporation.”
Those evaporation losses expose a situation that has longer-term and possibly more severe ramifications than the soil drought that has covered the region for two years. A return to more normal—or slightly cooler and wetter conditions this winter—could break the drought. But a hydrologic drought could persist for years.
A hydrologic drought results when surface water—including reservoirs and streams— are depleted faster than they can be replenished because of prolonged drought. Lyons says a hydrologic drought exists when catchments are depleted to zero to 30 percent of full. When reservoirs get that low, “It takes a long time to fill them back up. One rain event will not be enough. We need widespread rainfall.”
Hydrologic drought is evident in much of West Texas. Near San Angelo, the O.C. Fisher and E.V. Spence reservoirs are at zero percent; Twin Buttes is at 5 percent. Near Abilene, Abilene Lake is at 11 percent; Hords Creek Lake is at 9 percent and Lake Stamford is at 35 percent.
“It may take several years to replenish these lakes,” Lyons said. “And that is if the drought doesn’t get worse.”
That also assumes wetter than average years. With a “wetter than normal,” prediction for the coming winter, a situation the region “has not seen for awhile,” reservoirs will not make appreciable progress to refill, Lyons said. | <urn:uuid:6ed04eeb-239f-462c-8b38-19f4d688ee77> | CC-MAIN-2016-26 | http://southwestfarmpress.com/management/soil-drought-expected-end-hydrologic-drought-be-long-term-issue | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00127-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.941306 | 585 | 2.9375 | 3 |
Margaret Higgins Sanger (September 14, 1879 – September 6, 1966) was an American birth control activist, sex educator, and nurse. Sanger popularized the term birth control, opened the first birth control clinic in the United States, and established organizations that evolved into the Planned Parenthood Federation of America. Sanger’s efforts contributed to several judicial cases that helped legalize contraception in the United States. Sanger is a frequent target of criticism by opponents of birth control and has also been criticized for supporting eugenics, but remains an iconic figure in the American reproductive rights movement
As liberals excoriate Republican Congressman Steve Scalise for speaking to a group with a reported connection to David Duke, former KKK member, I’m reminded today—on the anniversary of Roe v. Wade—of a moment that liberals will never dare acknowledge: a 1926 speech to the KKK by one of their most revered ideological darlings, Planned Parenthood founder Margaret Sanger.
—Reflections on Roe: When Margaret Sanger Spoke to the KKK
And here is the Wikiquote:
Always to me any aroused group was a good group, and therefore I accepted an invitation to talk to the women’s branch of the Ku Klux Klan at Silver Lake, New Jersey, one of the weirdest experiences I had in lecturing. […] Never before had I looked into a sea of faces like these. I was sure that if I uttered one word, such as abortion, outside the usual vocabulary of these women they would go off into hysteria. And so my address that night had to be in the most elementary terms, as though I were trying to make children understand.
In the end, through simple illustrations I believed I had accomplished my purpose. A dozen invitations to speak to similar groups were proffered. The conversation went on and on, and when we were finally through it was too late to return to New York.
Chapter 29, “While the Doctors Consult”, p. 366. Margaret Sanger: An Autobiography (1938)
And this is the woman who founded Planned Parenthood. She was a racist and a vile human being. Yet she’s lauded by the wackos in the left and the media who believe that the Earth is in a “population crisis”. Like the KKK, she targets the handicapped and minorities.
And yet Planned Parenthood gets taxpayer money. | <urn:uuid:b95e5fdb-1a7b-4ef8-9a4d-f314c382e707> | CC-MAIN-2016-26 | https://chockblock.wordpress.com/tag/president-obama/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00059-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.969371 | 494 | 2.78125 | 3 |
Clock, sometimes called clock solitaire, is a very fun card game played by one person. The goal is to put all the cards into their right time space before finding all the Kings. It is a game of luck.
The goal of the game is to move all the cards in the 13 piles into different places around the clock with each card in the right spot. All four ace cards should be in the one o'clock spot, all four "2" cards should be in the 2 o'clock spot and so on. Look at the picture to see where all the cards should be. The "jack" cards go in the eleven o'clock space and the "queen" card goes into the twelve o'clock space. The Kings go in the center.
- Find a pack of cards. There should not be any jokers in the pack. Mix up all the cards.
- Split up all the cards into 13 piles. Each pile should have the same number of cards.
- Take 12 of the card piles and make them into a circle shape. Put the 13th pile in the middle of all the cards.
Note: The 13th pile, the one in the middle of the circle is also called "the hand".
How to play
- Take the top card from the hand and look at it.
- Put the card that you just picked up and put it on its right place on the piles. If it's a "six" card, put it on the six o'clock pile at the bottom of the circle. If you picked a "three" card, put it on the three o'clock pile on the right, and so on.
- Pick up another card from the pile you put the first card on. Look at it, then put it on its pile. Again, if it's a "9" card, put it on the nine o'clock spot and so on. Do this over and over. The game is over when all the cards are in the right spots, or when all the kings are in the middle. If the game ends because all the Kings are in the middle, you lose, but if the game ends because the cards are all on their right spots then you win. | <urn:uuid:3a6c4b2d-8782-478b-b27d-0c71536a1340> | CC-MAIN-2016-26 | https://en.wikibooks.org/wiki/Card_Games/Clock | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396538.42/warc/CC-MAIN-20160624154956-00152-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.958673 | 460 | 2.78125 | 3 |
2 Answers | Add Yours
The figures Knowles suggests for andragogy (teaching adult learners) are the art and science of learning. In his 1980 edition of his book, Knowles modifies his first position by saying pedagogy and androgoy are opposite ends of a spectrum of teaching/learning techniques that may be applicable for a given student. The utility of the art-science continuum to the learner is that they can select from the elements on that spectrum to meets their needs for learning and application to real-life needs.
The term "andragogy" was originally coined in the nineteenth century to refer to adult education. The term "pedagogy" is Greek, meaning, literally "the leading of children", from the Greek word pais (stem, "paid-") meaning "child" and "ago" (lead). The term andragogy takes as its root ἀνήρ (genitive ἀνδρός), which means "man", and thus refers to educating adult men. The particular coinage reveals either a strongly patriarchal bias or ignorance of the Greek language, as the term ἀνήρ is specifically used to distinguish men from women, as opposed to the term άνθρωπος, used to refer to human beings without respect to gender.
The American educator Malcolm Shepherd Knowles (1913 – 1997) popularized this in English as a generic term for adult learning (either unaware of the significance of the Greek roots or not particularly concerned with educating women).
The main elements of Knowles' theory have to do with the differences in motivation and learning styles between adult and younger learners. He argues that adults are more likely to be internally motivated and self-directed in their learning and respond best when made equal partners in the learning experience. He also argues that adult learners are most interested in directing their own learning in directions that are specifically relevant to their own lives and careers.
We’ve answered 327,557 questions. We can answer yours, too.Ask a question | <urn:uuid:9786e5a5-d332-44c7-bdad-8fa29fecbc98> | CC-MAIN-2016-26 | http://www.enotes.com/homework-help/discuss-utility-andragogy-practice-figure-from-438377 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00194-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.969479 | 429 | 3.15625 | 3 |
If you snapped a picture of Mt. St. Helens at the beginning of 1980, it appeared to be an ordinary mountain. At 9,677 feet high, it was the fifth-highest place in Washington State and had a snow-capped peak just like any other mountain did in January.
Then in March 1980, a small earthquake (4.1 on the Richter scale) occurred. This earthquake was located directly underneath Mount St. Helens and it was the first sign that something was happening in a volcano that had been dormant for more than a century. A week later, an explosion blew out a 250-foot diameter crater on the peak and covered the snow on the top of the mountain with ash.
Over the next several weeks there were more earthquakes. Explosions blew ice and ash into the sky. The crater expanded. And there were two indicators that magma was moving inside the mountain. First, the earthquake tremors that scientists were seeing had a pattern that signals magma movement. Second, the side of the mountain started to bulge outward.
Then, on May 18, all hell broke loose. A 5.1-magnitude earthquake triggered a landslide, which took off pressure that had been holding in magma. And with that release, a gigantic explosion occurred. It is hard for us to imagine the size of the explosion, but it was like a small nuclear bomb. Something approaching a cubic mile of earth, rock and ice blasted away from the mountain. The altitude of Mt. St. Helens fell by more than a thousand feet to 8,360 feet and one side of the mountain disappeared. The blast leveled trees in a 100,000+ acre swath of land, and even today that land is still recovering. Fifty-seven people were killed or went missing.
You can see the mountain today both in-person and through satellite imagery. The scars, ash and erosion are all plainly visible in this Google Earth image:
Or you can drive up and see it yourself. Either way, you are witnessing the aftermath of what was the biggest landslide in human history, as well as a massive natural explosion.
For lots more information on Mount St. Helens and volcanoes, check out the links on the next page. | <urn:uuid:73ba38ca-7c2f-4b1f-b236-2bcf00c2df95> | CC-MAIN-2016-26 | http://science.howstuffworks.com/nature/natural-disasters/mount-st-helens.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00166-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.981033 | 458 | 4.03125 | 4 |
Holistic health does not just mean being healthy. It is a way of life. Health and wellness is achieved by integrating the body, mind, and spirit. This treats the whole person and not just one aspect. Holistic health is normally about preventing illness rather than treating a specific ailment. Holistic healing techniques can be used in conjunction with conventional or alternative medicine.
There are many techniques that can be used to achieve overall health and wellness. These techniques include lifestyle choices, diet, exercise, energy work, massage, bodywork, aromatherapy and more. Religion or spirituality can also play an important role in holistic health. This is by no means a complete list.
Diet and Exercise
Diet plays an important role in holistic health. Eating whole foods like fruits, vegetables, nuts and grains provides a healthy mix of food and nutrients. There are many diets that people can follow. It is a personal decision based on an individualís preference or health issues. You should choose a diet that makes you feel healthier whether it is vegan, fruitarian, vegetarian or gluten free. The most important thing is to minimize processed and prepackaged food.
Exercise is important for health and well-being. It can help you relax, release tension, lower blood pressure, lower cholesterol and be strong. Feel good endorphins are also released into the body. There are many types of exercise to choose from so there is something for everyone. Yoga is great for strength and flexibility. It also has a meditative aspect that can help you relax. Pilates is also great for strength and flexibility. The breathing techniques are great for overall health. You should include strength training, cardio and exercises for flexibility into you exercise routine.
Energy and Spiritual Healing
Energy work can have long lasting effects on the body, mind and spirit. Energetic healing techniques can include reiki, shamanic healing, chakra balancing, healing touch and cranial sacral therapy. These techniques help balance the energy in the body and enhance the bodyís ability to heal itself.
Reiki is universal life force energy that works for the greatest good of the recipient. Shamanic healing techniques are deeply rooted in nature. These techniques are used to removes blockages in the energy system and get stagnant energy moving again. Balancing the chakras also removes blockages in the energy system. All energetic healing techniques are basically used to balance the energy in the body and remove harmful blockages. Blockages in the energetic system can cause illness in the body, mind and spirit.
Meditation can also be considered an energy or spiritual healing technique. It gives a person a chance to relax, breath, and improve health. Breathing and visualization techniques are employed in a meditation practice. Potential benefits of meditation include relaxation, lower blood pressure, lower anxiety levels, stress relief, and a sense of inner peace. Meditation gives you a chance to take some time out for yourself.
Massage and Bodywork
Body work is a term that can include a wide range of modalities including massage therapy, acupressure, reflexology and trigger point therapy. These techniques do work on the body but they also work on the mind and the spirit as well. Potential benefits of bodywork can include relief from stress, chronic pain, headaches, muscle aches and chronic conditions. Other benefits may include relaxation, sense of well-being and inner peace.
Acupressure and reflexology stimulate the pressure points in the body. This releases tension and releases blockages in the energetic system. The concept is based on Chinese medicine and the energetic meridians in the body. By treating these meridians, you can treat almost any ailment in the body.
Herbs and Oils
Herbal supplements and aromatherapy can be incorporated into a holistic health regime. Herbal supplementation has been used for centuries to enhance health and well-being. Aromatherapy uses essential oils for treatment and prevention of ailments. It can also be used in conjunction with meditation, massage and body work. Herbs and essential oils are all natural and can provide many benefits.
Holistic Health is very personal. It is always tailored to the individual person. Everyone has different aspects of their mind, body and spirit that need attention. Holistic health is meant to maintain the health of the whole person. | <urn:uuid:03b776fe-f4be-4fd4-90e3-6e2e0f698ef5> | CC-MAIN-2016-26 | http://www.bellaonline.com/ArticlesP/art11703.asp | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398209.20/warc/CC-MAIN-20160624154958-00020-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.943452 | 879 | 2.78125 | 3 |
Introduction Great Plains,
extensive grassland region on the continental slope of central North America. They extend from the Canadian provinces of Alberta, Saskatchewan, and Manitoba south through W central United States into W Texas. In the United States the Plains include parts of North Dakota, South Dakota, Montana, Wyoming, Colorado, Nebraska, Kansas, Oklahoma, New Mexico, and Texas.
Sections in this article:
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. | <urn:uuid:c7bf6fd8-65bc-46c2-b318-010128143d1e> | CC-MAIN-2016-26 | http://www.factmonster.com/encyclopedia/us/great-plains.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00150-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.830358 | 105 | 3.296875 | 3 |
Adeyinka Ebo from Cancer Research UK says the figures may be partly down to men avoiding their GPs
Cancer Research UK said each year, the most serious type of skin cancer, malignant melanoma, kills 1,300 men and 900 women, a gap expected to widen.
A reason could be men delaying seeking help, but biology may also play a part.
Prof Julia Newton-Bishop, a Cancer Research UK dermatologist, suspects women have stronger immune systems.
German researchers have already identified a gene that appears to make men, but not women, more susceptible to melanoma.
Prof Newton-Bishop, from the University of Leeds, said: "Research has suggested the difference between the sexes could be in part because men are more likely to be diagnosed when melanoma is at a more advanced stage.
"But there also seem to be strong biological reasons behind the differences, and we're working on research to better understand why men and women's bodies deal with their melanomas in different ways.
"Stage for stage, men do less well with this cancer so there's something very important that this is telling us about how the body deals it.
"We think it is something to do with the immune system rather than hormones because pre- and post-menopausal fare the same."
Another concern is late diagnosis.
Men, unlike women, more often develop the cancer on their back rather than arms and legs which may make it more difficult for them to spot.
"Asking your partner to check your back is a good idea," said Prof Newton-Bishop.
Malignant melanoma death rates have been increasing in the UK since the early 1970s, largely because more people are developing the disease.
Male incidence rates are now more than five times higher than they were 30 years ago - rising from 2.7 per 100,000 to 17.2 per 100,000.
Getting too much sun and using sun beds increases the risk of this largely preventable disease.
To protect their skin, people are advised to use a sunscreen with at least SPF15 and good UVA protection - the higher the star rating, the better - and to be aware of changes in the skin, including a new growth or a spot or mole that itches, hurts, bleeds or will not heal.
Treatment is more likely to be successful if melanoma is spotted early. | <urn:uuid:310227ad-c271-4fdd-a862-27aecb3b23c3> | CC-MAIN-2016-26 | http://lifestyle.myjoyonline.com/pages/health/201308/111828.php | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402479.21/warc/CC-MAIN-20160624155002-00073-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.964952 | 491 | 2.90625 | 3 |
Standard wiring practices is a basic guidelines for Electrical Engineer or Electrical Technician when involve in Electrical installation project.From the guideline,we can minimize the electrical safety issues,have a proper electrical route and more tidy installation and follow standard requirement.
Actually I had involved in many of Electrical installation projects and this standard wiring practices guide me a lot to get a best quality and perfection on my Electrical Installation project.Below I had listed some beneficial guideline when do you have a Electrical Wiring Installation.I hope it’s can give some basics information or guide to get a best result.
Standard Wiring Practices for Electrical Installation
1) For multi-conductor cables, there may be additional conductors within these cables that are not needed or used for the application. All unused conductors within the multi-conductor cable shall be bent back and taped. The conductors shall not be exposed.
2) Motor cables shall run continuously from one piece of apparatus to another with no splices in between. Junction boxes with terminals may be used for control wiring as a means to connect or extend cables on the machine.
3) If the machine is so constructed that cabling shall be disconnected for shipment, plugs or terminal strips shall be provided at the sectional points.
4) For power cables, no plugs are permitted unless approved by the Electrical Engineer. Use terminal strips or leave sufficient lengths of power cables on the machine that can be terminated to the machine power source(s) in the field are other acceptable means for power cables.
5) The supplier shall not route power and signal conductors in close proximity of one another unless approved by the Electrical Engineer.
6) The supplier should keep a minimum separation between power and signal conductors per the following table. If these separations cannot be maintained, the Electrical Engineer shall be consulted. Where power and signal conductors are required to cross, the lower voltage conductor should cross the higher voltage conductor at right angles.
Minimum Separation Distances between Twisted Pair Signal Wires and AC Power Lines
7) Terminal blocks shall be grouped by signal, power and safety.Only one wire shall be connected to a terminal, unless the terminal/device is rated for multiple wires.
8) Shield on cables shall be grounded per the equipment suppliers or manufacturers recommendations. Vendor recommendations and wiring practices will be reviewed with the responsible Electrical Engineer prior to implementation.
9) All terminal strips are to be located within the enclosure in such a location as to make them readily accessible.
10) All terminal strips, terminals and wires shall have unique identification, shall be clearly labeled and shall match the equipment documentation. Wires shall be labeled identically at both ends.
11) Electrical conductors at voltages above 50VAC/DC shall not be run through equipment frame members as this is a violation of the NEC and presents a safety concern if the equipment frame is cut, drilled or torched into.
12) In the event that cables at voltages below 50VAC/DC such as sensors or guard switch cables enter into a frame member, a label shown to the left shall be placed on the frame member in a location clearly visible from the normal operating location.
13) Bends in cables shall be made so as not to cause undue stress. Radius of the curve (measured from the inside edge of the bend) shall not be less than five times the diameter of the cable.
14) Any conductors that occupy the same equipment enclosure, cable, or raceway shall have the same insulation rating as the maximum circuit voltage applied to any conductor within that enclosure, cable or raceway – Reference NEC Article 300.3(C)(1). In addition, supplemental or double insulation will also have to be used per the requirements of IEC-60664-1. | <urn:uuid:be3ba535-2039-4e33-b39d-4431365573d8> | CC-MAIN-2016-26 | http://www.electricneutron.com/wiring-techniques/standard-wiring-practices/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00193-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.887613 | 768 | 2.640625 | 3 |
Have you ever thought about questions like these and wanted to find out what answers there might be for them?
- Why is it a serious matter to accuse someone of being a witch in some societies, but not in others?
- Did Neanderthals sing as they buried their dead?
- Have societies really evolved from simple to complex?
- Why did Europeans conquer the Americas after 1492, not the other way round?
- Who built Stonehenge and why?
- Why did anyone ever start to farm?
- When did people start developing museums and why?
- Why do some cultures insist that you marry your cousin and others make it impossible?
- How can we reconstruct past climates and ecologies and can this tell us anything about possible future patterns of environmental change?
- Where did people like us first develop and how did they spread to the rest of the world?
- Why do we walk on two legs not four?
- How can archaeologists date objects from the past?
If so, then Archaeology & Anthropology at Oxford is probably the degree course that you’re looking for. Drawing on well over a century of experience in teaching and research, outstanding museum and library resources and the cumulative knowledge of literally dozens of academics, Oxford’s Arch & Anth course offers a comprehensive guide to the richness and diversity of human cultural experience throughout space and time. By choosing to study here you will be able to:
- explore how humans evolved
- get to grips with major transformational processes in human history such as the development of farming, the emergence of towns, trading systems and the spread of world religions
- assess the relative importance of environmental, genetic and social factors in understanding patterns of human growth and nutrition
- learn why societies structure their families, economies and political systems in the ways that they do
- and investigate the purposes that art and other forms of material culture serve in the representation and reproduction of beliefs and ideologies
And as well as that, you’ll take part in an archaeological excavation, have the opportunity of participating in other archaeological or anthropological projects anywhere in the world and undertake your own original research. Combine all of this with a superb quality of teaching, an unparalleled level of personal attention from those tutoring and lecturing you, a wealth of extra-curricular activities and excellent career opportunities and you’ll wonder why you didn’t think of Archaeology & Anthropology before now.
But maybe you’re concerned that Oxford may not be your kind of place? Don’t be! Our students body is drawn from all parts of the United Kingdom and from across the world. Selected purely on academic grounds, without any concern for background or schooling, its diversity, enthusiasm and vitality mirror the subjects that form the Arch & Anth degree. And getting in is not difficult as you might think - roughly two in every five candidates are offered a place, so give it a go!
Finally, if you don’t find that your questions are answered here, then please contact us at once. | <urn:uuid:7c4d3685-2854-460d-ae6c-9e23e6ce655b> | CC-MAIN-2016-26 | http://www.arch.ox.ac.uk/undergraduate-studies.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.92/warc/CC-MAIN-20160624154955-00146-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.948444 | 622 | 3.15625 | 3 |
Secrets To Treating Martial Arts Injuries
Martial arts, such as karate and tae kwon do, have become very popular in recent years for both adults and children. Karate and tae kwon do have been promoted as excellent activities for maintaining good health and fitness. People frequently perform these activities after school or work. Given that the foot and ankle account for at least 10 percent of the total injuries sustained in the martial arts — and may even be higher due to the lack of reporting of many digital injuries such as contusions, toenail trauma and uncomplicated fractures — most podiatrists are likely to encounter these athletes in their offices. Students of the martial arts practice kicking and punching to improve their techniques and power. Students start with simpler kicks and work up to more difficult techniques. Attempting a more difficult kick without the appropriate training will often cause injury. The culmination of all the training efforts occurs during sparring matches either at the student’s martial arts school or in a tournament. Sparring too early without the proper training is also a common cause of injury. The student becomes injured due to either a lack of balance, flexibility, strength or speed. For example, one can kick and punch while standing in one location or while moving. The ability to deliver an appropriate kick or punch depends on the student’s flexibility and balance. In delivering a front snap kick, which requires an upward movement of the foot and leg, lack of hamstring flexibility can either reduce the effective height of the kick or tear the hamstrings while the athlete executes the kick. A lack of balance while performing this move will cause the support foot to be loaded without stability. This can produce sprains or strains of the foot and ankle. Strength and speed also play a role for those who participate in the martial arts, especially when they attempt sparring. The ability to move in and execute an attack on an opponent and retreat prior to being attacked is critical. If an athlete lacks speed and strength, the opponent has the ability to execute countermeasures. The countermeasures may throw the initial aggressor off balance, which can result in an injury.
What Causes Common Types Of Martial Arts Injuries?
Blunt force trauma and sprains are the two basic categories of martial arts injuries that occur in the foot. Blunt force trauma injury is a direct result of the foot hitting another solid object. The object could be a sparring bag, a board, an opponent or other firm objects used in the practice of martial arts. Students frequently use heavy canvas sparring bags for kicking and punching in order to improve strength and technique. If one dorsiflexes the digits as opposed to plantarflexing the digits while striking the bag with a roundhouse kick, this improper technique will result in blunt force trauma. Boards varying from 1/2 inch to 1 inch in thickness are used as part of promotion tests as a student passes to the next level throughout the training experience. The boards are lined up (either singularly or in multiples) and students use their hands or feet to break them. If the student has not built up the power, speed or accuracy to strike the board with the correct technique, there can be resulting trauma to the foot or hand. Martial arts instructors assess each student to determine the level of breaking skill. Inappropriate execution on the part of the student can be very painful. Misjudging the opponent’s intended next move can result in trauma. Normally, students step back from the kick and prepare to counter the kick with another kick. This cannot always be executed as trained due to the speed of the opponent. The consequences of missing a step or inappropriately positioning the foot while attacking or retreating from an opponent can be trauma to the ankle and foot, resulting in a sprain or fracture.
A Guide To Treating Fractures
As a result of blunt force trauma, the martial arts student may suffer a fracture, a contusion or a laceration. Fractures require early diagnosis and immobilization to expedite healing. The most common foot fractures occur as spiral oblique injuries of either the digits or the metatarsals. They are usually the result of the torsion generated by the impact of the moving foot hitting a fixed object such as an opponent. If one suspects a fracture, do not allow the athlete to continue the competition. Further trauma from competition can convert a simple non-displaced fracture into a displaced, comminuted fracture or even a compound fracture. If a martial arts athlete sustains an acute injury, instruct him or her not to move from the fallen position on the mat. It usually takes at least a few minutes until the initial shock of the injury wears off before even a cursory examination has any real value in determining the extent of the injury. If one suspects a fracture, immobilize the injured part or at least move the athlete without moving the injured area. Apply ice and elevate the limb after achieving initial immobilization. Do not permit athletes to resume any martial arts activity that may subject them to blunt force trauma until the fracture is completely healed, which is usually eight weeks. The athlete should engage in appropriate exercises to maintain strength and flexibility during the bone healing process.
Addressing Common Contusions
Contusions, which are usually less severe than fractures, are a common result of sparring or board breaking. While sparring, the student wears a chest protector, a helmet and a mouth guard as well as pads on the arm, hand, foot and lower leg. During sparring, one must perform each kick and punch in a fraction of a second to be effective. From a tactical standpoint, when students see an opening in the opponent’s defense, they will usually execute three to four moves sequentially to further reduce the opponent’s defenses. However, the opponent will also counter the attack. Both participants are vulnerable when each is trying to anticipate the other’s move. Advancing opponents often cut short well-intentioned kicks, which land in an unintended area. A kick meant for the opponent’s torso might land on a non-padded upper thigh area, resulting in a thigh contusion. Any non-padded area such as the thigh or knees can now be a vulnerable target. Accordingly, the common areas to receive contusions are: • the lateral aspect of the foot when one performs a sidekick (driving the lateral portion of the foot into the board); • the plantar metatarsal heads when one performs a forward snap kick (kicking the plantar forefoot forward and upward); and • the plantar calcaneus when one performs a turn kick. If the student misses the center of the board or does not deliver enough force with the kick, the end result will be pain. If the error is large enough, the martial artist will have a significant contusion or fracture. Contusion injuries may have symptoms for up to six weeks although one can usually recommend an early return to martial arts activities.
How To Handle Nail Bed Lacerations
Lacerations need immediate attention in order to stop any bleeding and assess the level of severity. A common laceration is the result of the nail plate impacting the distal tuft of the digit. Another laceration is the result of the nail plate being forcibly lifted off the nail bed. Both of these lacerations commonly occur when athletes kick the sparring bag or while they are sparring. While these lacerations usually do not result in any permanent disability, both these injuries are very painful and require podiatric intervention to excise the damaged nail plate. The athlete must also learn to dress the involved toe and apply protective padding to the toe to promote both healing and the ability to resume martial arts activities.
Key Pearls On Treating Sprains
Ankle sprains occur most often in the martial arts during sparring when the student is changing positions rapidly. The most common type is the lateral ankle sprain. Sudden changes in direction during sparring can result in the student being caught off balance. A slow progression of training is essential to promote increased balance, flexibility and strength while reducing the risks of foot and ankle sprains. Pay careful attention to the sprain in order to rule out a fracture. Disability from an ankle sprain can last four months or more. It is essential that all ankle injuries be totally healed before permitting the martial arts athlete to return to rigorous activities such as performing difficult maneuvers or competitive sparring. The athlete should have a pain-free ankle, subtalar joint range of motion and be capable of walking and running without a limp. There should be equal and symmetrical ankle proprioception for both limbs. One can assess this by evaluating athletes as they hop on one leg. These athletes should also have symmetrical muscle strength in the three muscle compartments of both limbs. One can determine this via manual muscle testing. A common sprain to the foot is a hyperextension injury to the first MPJ. This sprain is usually the result of sparring and changing directions rapidly. The hallux becomes forcibly dorsiflexed while the athlete lunges forward to attack an opponent, resulting in a sprain of the first MPJ. While most of these injuries are mild, be aware there are severe cases in which the sesamoids may be partially or completely torn from their bed. A forced dorsiflexion of the proximal phalanx against the first metatarsal head may also result in a fleck of cartilage being shorn from the metatarsal head. The hyperextended first MPJ sprain can last up to four months or longer. During this time, one should follow initial immobilization with physical therapy as this is essential for maximum recovery. Dr. Caselli (pictured) is a staff podiatrist at the VA Hudson Valley Health Care System in Montrose, N.Y. He is also an Adjunct Professor at the New York College of Podiatric Medicine and is a Fellow of the American College of Sports Medicine. Dr. Rzonca is a Staff Podiatrist at the VA Hudson Valley Health Care System, Montrose, N.Y. He is a Former Chairman of the Department of Orthopedic Sciences at the New York College of Podiatric Medicine. Dr. Rzonca is a black belt candidate in tae kwon do.
1. Caselli MA, Rzonca RC: Ankle Answers. OrthoKinetic Review 2002 April; 2(3): 22- 25
2. Fetto JF: Judo and Karate. In Fu FH, Stone DA (ed) Sports Injuries, Mechanisms, Prevention, Treatment (2nd Edition). Philadelphia, Lippincott Williams & Wilkins, 2001, pp 545-557
3. Muller-Rath R, Bolte S, Petersen P, Mommsen U: Injury profile in modern competitive karate--analysis of 1999 WKC-Karate World Championship Games in Bochum. Sportverletz Sportschaden 2000 Mar;14(1):20-24 | <urn:uuid:cda25c5e-8054-4780-8360-285ef3e338ac> | CC-MAIN-2016-26 | http://www.podiatrytoday.com/article/4121?page=1 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00176-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.936423 | 2,254 | 3.015625 | 3 |
Sanfilippo syndrome is metabolism disorder passed down through families. It makes the body unable to properly break down long chains of sugar molecules called glycosaminoglycans (formerly called mucopolysaccharides).
The syndrome belongs to a group of diseases called mucopolysaccharidoses (MPS). Specifically, it is known as MPS III.
Sanfilippo syndrome occurs when the substances (enzymes) needed to break down the heparan sulfate sugar chain are missing or are defective.
There are four main types of Sanfilippo syndrome, also called MPS III. Which type a person has depends on which enzyme is affected.
The syndrome is inherited as an autosomal recessive trait. That means both your parents must pass you the defective gene in order for you to get this disease.
Sanfilippo syndrome is possibly the most common forms of MPS. It is seen in about 1 in 70,000 births. A family history of Sanfilippo syndrome increases one's risk for this condition.
Unlike other forms of MPS, symptoms appear after the first year of life. A decline in learning ability typically occurs between ages 2 and 6. The child may have normal growth during the first few years, but final height is below average. Delayed development is followed by deteriorating mental status.
Other symptoms include:
A physical exam may show signs of liver and spleen swelling. An eye exam will show clear corneas, unlike the cloudy corneas seen in persons with Hurler syndrome (MPS I H). Neurological testing will reveal signs of seizures and mental retardation.
Urine tests will be done. Persons with Sanfilippo syndrome have large amounts of a mucopolysaccharide called heparan sulfate in the urine.
Other tests may include:
There is no specific treatment available for Sanfilippo syndrome.
Additional information and resources are available from the National MPS Society.
The syndrome causes significant neurological symptoms, including severe retardation. IQs may be below 50. Most persons with Sanfilippo syndrome live into their teenage years. Some patients live longer, while others with severe forms die at an earlier age. Symptoms appear most severe in persons with type A Sanfilippo syndrome.
Call your health care provider if your child does not seem to be growing or developing normally.
Call for an appointment with your health care provider if you plan to have children and you have a family history of Sanfilippo syndrome.
Genetic counseling is recommended for prospective parents with a family history of Sanfilippo syndrome. Counseling is also recommended for families who have a child with Sanfilippo syndrome, to help them understand the condition and possible treatments. | <urn:uuid:4eda24bc-70ad-424d-9f8b-103ccb53f424> | CC-MAIN-2016-26 | http://www.northside.com/HealthLibrary/?Path=HIE+Multimedia%5C1%5C001210.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395546.12/warc/CC-MAIN-20160624154955-00115-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.946179 | 564 | 3.625 | 4 |
The Story Of Ishi, The “Last Native American”
On August 29th 1911, Ishi, the last of the Yahi, walked out of the Sierra wilderness and into American culture. Estimated to have been born around 1860-1862, Ishi’s life was marred by fighting and massacre. As the last of his people, a tribe thought to be extinct, Ishi provided a vital link to cultural information about North America’s Native American history.
Born at the decline of the Yahi population, at a time when gold mining had damaged water supplies, decimated fishing and scared away deer, Ishi survived the Three Knolls Massacre, an attack that reduced the Yahi people to approximately sixty. To avoid further clashes, Ishi and his family went into hiding for the next forty years, avoiding the world being built by the new settlers of the California Gold Rush.
Known then as the ‘last wild Indian’, Ishi, which means ‘man’ in the Yahi language, was given his name by anthropologist Alfred Kroeber after explaining that it was rude to ask someone’s name in the Yahi culture. With no one left to speak his name he couldn’t reveal it and said ‘I have none, because there were no people to name me’. Within the University of California, Ishi worked to shed light on the Yahi culture for a more modern world, describing family units, naming patterns and the ceremonies he knew. But Ishi had been alone for so long that many of his traditions had been forgotten or lost in the wilderness.
Sadly, Ishi had no immunity to the diseases of European-American civilization and was often ill. Five years after joining American society, Ishi contracted tuberculosis which led to his death. Upon his death in 1916, his brain was put in a deerskin-wrapped Pueblo Indian pottery jar and sent to the Smithsonian Institution.
But Ishi’s legacy lived on: a recording of Ishi speaking, singing and telling stories is held in the National Recording Registry and his techniques in stone tool making are widely imitated by modern lithic tool manufactures, where he is considered to have been one of the last native tool makers in North America.
Ishi’s life was an academic fascination far beyond his lifetime. In the mid-1990s, studies began to appear that suggested that while in their decline, the Yahi tribes intermarried with tribes that had previously been enemies. The end result of this theory, which is still being debated, is that Ishi’s heritage may well live on in descendants of the Redding Rancheria and the Pit River tribes. His remains were returned to these tribes in 2000 to be laid to rest in line with the traditions he taught to a new and emerging world as the last of the Yahi. | <urn:uuid:3877fb16-352d-4631-ac3b-71b3ccac1629> | CC-MAIN-2016-26 | http://all-that-is-interesting.com/story-ishi-last-native-american | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00027-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.984564 | 596 | 3.6875 | 4 |
Published July 26, 2012
This article was also featured on The Huffington Post.
Every weekday morning, the staff at Hopital Albert Schweitzer (HAS) convenes in the hospital’s bibliyotek to discuss deaths and complex cases from the prior day. On October 18, 2010, a Monday, the doctors and nurses sat in the stuffy room under dim lights to discuss a patient with severe diarrhea and vomiting who had died the night before. “It was strange, but it was one person, so it might be something. We didn’t know,” said Dr. Silvia Ernst, the medical director, about the mysteriously rapid death.
When Dr. Ernst heard about this first perplexing case, it was her second month in Haiti. “By Wednesday many people were coming in with diarrhea” she said. At that point they knew “something was going on.”
Only a few weeks later, this 130-bed hospital in Deschapelles was running a cholera treatment center that housed 250 to 300 people at a time.
Deschapelles is remote. So remote, in fact, that the medical staff of Hopital Albert Schweitzer began to see injuries from the January 2010 earthquake trucked to their doors before they even heard what had happened. As a result of its location and long-standing relationship with the community this hospital, which opened its doors in 1956, fell into a unique role as steward of community health.
Although the hospital has run its Integrated Community Services for decades, the outbreak of cholera instilled new urgency in improving basic sanitation and water treatment. Even in years before the earthquake, projects to build wells and latrines and to improve sanitation attempted to patch a fundamental gap in the country’s infrastructure, but did little to stop the explosive spread of cholera. Now, HAS and similar organizations face a simply stated question: Almost two years after cholera erupted in Haiti, how do we stop people from getting sick?
Preventing cholera is now especially pressing because HAS recently closed their cholera treatment center. Others have also shut their doors: In Port-au-Prince, Doctors Without Borders consolidated five cholera treatment centers into two. The one in Verettes was empty the day we visited. As a result of faltering funding and resource clustering across the country, families in Deschapelles who have gone to HAS for generations may be sent elsewhere for cholera.
In order to stop cholera, a water-borne illness, you need to change the ways people interact with water. It is no easy task.
A Saturation Campaign
In 2002, when the British Centre for Ecology and Hydrology ranked 147 countries in water security, a metric for the accessibility of potable water, Haiti came in last place. “During this [rainy] season we also have a lot of children with other diarrheal diseases. Even before cholera, this was the season,” Ernst said about other pathogens that thrive because of poor water quality and sanitation. Typhoid, norovirus, shigella, and other diseases are commonplace, but treatment centers in rural areas do not have the resources to do anything more than provide rehydration therapies for these diarrhea-causing pathogens. Lab diagnosis is both costly and unnecessary.
Cholera posed an unprecedented challenge to medical practitioners in Haiti. The crescendo of dying patients that reached 3,000 in the first few months of the epidemic brought an equally large response – a saturation of information on how to wash your hands, cook food, defecate in the right place, and treat your water. The government ran segments on the radio, sound trucks with stacks of amplifiers blared the message from the dusty streets, and thousands of community health workers permeated the rice paddies and mountain towns.
Haiti lacks infrastructure to distribute treated water and deal with sewage, so prevention falls largely onto the shoulders of individuals. This burden is especially difficult because 70 percent of people infected by cholera can cause others to get sick, but they do not show symptoms. The goal of the saturation campaign was to inundate communities with information and resources until basic sanitation and hygiene became second nature. Unfortunately, when people do not perceive themselves to be affected by a disease, it is incredibly difficult to achieve behavioral change.
Around Deschapelles, HAS distributed water sanitation tablets, soap, and oral rehydration solution so people could start to treat cholera before they left for the hospital. Since cholera is theoretically easy to prevent, the goal was simple: Prevent it.
In November 2011, one year after the outbreak started, a Study by the Center for Disease Control indicated high percentages of the population knew ways to protect themselves from cholera. Around Port-au-Prince, 86 percent of those surveyed recognized hand washing as a way to stop cholera. The news was positive and many Haitians hungrily internalized the information.
But in public health there is often an appalling gap between knowledge and action.
In the early summer of 2011, the rainy season flushed cholera out of the sewage systems and into the rivers. Once again, the death toll rose into the thousands. The United Nations Human Development Index from that year, a metric compiled through various quality of life indicators, ranked Haiti 158 out of 187 countries. In the same report, 54.9 percent of the country fell below the poverty line – in Haiti considered to be those living on less than $1.25 a day. Simply stated, there was a massive deficit of resources.
At HAS and other institutions that interact with some of the poorest populations in the country, the question remained the same: How do we stop people from getting sick? But now there was a new twist: Did Haitians lack the resources necessary to wash their hands, defecate in the right places, and drink treated water, or were they choosing not to do so? The answer, in many places, is both.
Information and Inaction
“Some people are very compliant,” said Dr. Alain Bien-Aime, a community health physician at HAS. “Others, we can explain what to do, but they don’t do it.” Dr. Bien-Aime remembers seeing someone eating in the market: “He could explain to you how you get cholera, but he doesn’t wash his hands.” This disconnect between knowledge and action is not unique.
For example, after Haiti became one of the first high-risk groups for HIV/AIDS in the early 1980s, a widespread condom use campaign started. In 2010, a survey performed by Dr. Paul Farmer and others indicated that 93 percent of Haitians recognized condoms as a barrier to HIV/AIDS, but less than half the men had used them in their last act of high-risk sex. (“High-risk” is defined by number of partners, sex work, and other factors).
Nor are Haitians the only ones susceptible. After all, how many Americans don’t “eat healthy” despite massive education campaigns about obesity and its risk for type II diabetes and heart conditions? When measured by how many of us are obese, the answer is 35.7 percent according to CDC data – more than a third of our country. So is the gap because of access (it’s easier and cheaper to get unhealthy food) or choice (fast food is delicious and cathartic)? For Dr. Bien-Aime and other community health workers, the need to transform information into action is much more urgent. Cholera, unlike obesity, can be contracted in a moment and kill you within hours.
In Coupon, a small town downriver from HAS, latrines are often built by nearby organizations without walls. The idea, on paper, is that families can build temporary walls with palm fronds and stronger walls with mortar. Meanwhile, because the organization saved money on walls, they can build more latrines for more families. HAS hopes that having families build part of the structure will promote the use of latrines and dissuade a culture of reliance.
In practice, however, palm trees are hard to find. Local builders recognize a niche market and charge more for latrine walls. Many latrines sit unused, without walls and in plain sight (no one wants to use a latrine in plain sight) with a large rock covering the yawning toilet mouth. Therefore, even though most everyone knows that using a latrine will protect the water table of this alluvial plane (a vital task because it is shallow and easy to contaminate), there are unused latrines with no walls spattering the dirt yards of families in rural Haiti.
For many, there is a logistical and financial reason for the disuse. This summer in Coupon, people passing by stopped on their tired-looking horses and old motorbikes to talk about why latrines need walls. Dawn Johnson, the Technical Coordinator of Integrated Community Services at HAS, sometimes rides into towns on horseback, but today she arrived in a Jeep.
For every logical suggestion Johnson made to build walls (you can buy enough bags to make walls with the money for one round-trip ride to the capital), the 10 or 12 people gathered around her posited an equally logical counterpoint (termites will quickly eat the bags). In most cases, it is a financial impossibility to build walls; in some cases, it is a matter of postponing it until an easier time.
Johnson, in many ways, is a translator. She understands both the language of aid programs as well as the culture of Coupon, so she must connect the two worlds. Her job is to take a latrine or piece of information about sanitation and make it fit reasonably into the life of this bare bones agrarian community. “This is my life,” joked Johnson while bantering with people in town about what obstacles they need to overcome to put walls on the latrine – after 15 years at HAS, it is indeed much of her life.
There is a scale in people’s mind that dictates what is important, so information about sanitation and the prevalence of cholera must outweigh the daily concerns of farmers in Haiti in order for walls to be the most pressing thing on their mind.
How exactly you tip the scales is an extremely complicated matter. In the fields and rice paddies when people need to use the bathroom, they just go. By the river, when people are thirsty in this heat that makes your breath draw like gel, they just have a drink. It is the muscle memory of their lifetime.
“We don’t have any place to get water, we don’t have any money to get water,” said Donnie Dusanville, a dapper man who farmed around Coupon for 28 years. When asked about what people do when they cannot afford a truck ride to go purchase water, he said, “If they are in this area, you can figure they are drinking river water.”
Some people are unable to drink treated water because they can’t afford to purchase it everyday. Others don’t wash their hands because it is easier not to.
“Why should we?” is absolutely not a question of naivety or sloth. It is a question of whether paying for the latrine wall is more important than paying for food, a child’s education, or other necessities.
Working against Johnson and tipping the scales against new healthy behaviors, the El Niño rainy season was light and early this year so cholera cases didn’t spike as they did in 2011. Right now, thousands are not dying, and there seems to be little incentive to build walls – the daily routine in Coupon proceeds undisturbed.
Charting a Course
In public health, the disciplines of social and behavioral sciences attempt to vivisect the relationship between programs and their acceptance in communities. The goal is to accurately chart every factor that will influence behavioral change – from family pressures to stigma to fear of a disease. It may be all of the above. Ideally, a well-conceived chart will lead to latrine walls.
Complex public health models have fancy names in programmatic vernacular, a language that Johnson speaks fluently: the Transtheoretical model and the Health Belief model are some of the more arcane titles. The paradox is that in practice these multi-faceted and dynamic models are supposed to play out in accessible and near thoughtless behavioral change exactly because they are perfectly tailored to the community and individual. It should be as simple to apply the models as it is to say: “Cholera is theoretically easy to prevent – so prevent it.”
The Haitian Ministry of Health and Population and the Division of Water Supply and Sanitation are working to create infrastructure that will protect people from disease, but it will be a long time before the pipes reach Deschapelles. Until then, the burden of healthy behaviors remains on the shoulders of individual Haitians, both those with the financial and logistical capacity to carry the weight – and those without.
In a race against the next rainy season, community health workers try to marry programmatic services with the motivation to use them. One without the other is about as useful as a latrine without walls.
But, as Dr. Bien-Aime said, “to change minds, it takes a long time.” | <urn:uuid:1028b412-ae33-485b-ad48-7b084d2b50b3> | CC-MAIN-2016-26 | http://pulitzercenter.org/reporting/haiti-cholera-epidemic-latrines-walls-public-health-aid-workers | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396959.83/warc/CC-MAIN-20160624154956-00001-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.96162 | 2,813 | 3.046875 | 3 |
It is important to rule out other illnesses, as sometimes people suffer severe mental symptoms or even psychosis due to undetected underlying medical conditions. For this reason, a medical history should be taken and a physical examination and laboratory tests should be done to rule out other possible causes of the symptoms before concluding that a person has schizophrenia. In addition, since commonly abused drugs may cause symptoms resembling schizophrenia, blood or urine samples from the person can be tested at hospitals or physicians' offices for the presence of these drugs.
At times, it is difficult to tell one mental disorder from another. For instance, some people with symptoms of schizophrenia exhibit prolonged extremes of elated or depressed mood, and it is important to determine whether such a patient has schizophrenia or actually has a manic-depressive (or bipolar) disorder or major depressive disorder. Persons whose symptoms cannot be clearly categorized are sometimes diagnosed as having a 'schizoaffective disorder.'
NIH - 1999 Posted 04/09/2004
David Oliver is the nation's leading experts on helping and supporting a loved one with bipolar disorder. You can get learn about many of David's little known, yet effective strategies to cope and deal with your loved one's bipolar by clicking here right now. View all articles by David Oliver | <urn:uuid:dc4646e3-9560-4d1c-be13-b4ab458f303a> | CC-MAIN-2016-26 | http://www.bipolarcentral.com/articles/articles-325-1-Schizophrenia-Making-a-Diagnosis.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00171-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.948279 | 252 | 2.953125 | 3 |
VIDEO: Click on the above video to hear Paul Isely discuss health care costs, especially related to diabetes and coronary heart disease; and Sonia Dalmia discuss how to keep young people in West Michigan.
West Michigan's increasing aging population and decreasing number of young people will likely result in higher age-related health care costs, according to a report from Grand Valley researchers.
“Health Check: Analyzing Trends in West Michigan 2013” was released January 11 during a health care summit hosted by the Office of the Vice Provost for Health and held at the Eberhard Center. The report was compiled by Seidman College of Business professors Sonia Dalmia and Paul Isely; it was made possible by a grant from Blue Cross Blue Shield of Michigan, Blue Care Network, and Priority Health.
The fourth annual report studies ongoing trends in Kent, Ottawa, Muskegon and Allegan counties, looking at the job market, medical patents, demographics, health care profiles and economics; key findings are below.
• There are more people over age 65 in West Michigan than in prime working ages of 35-44. Also, there are more people ages 45-64 than people ages 20-34. Researchers said these two factors are significant as an aging population results in higher health care costs, and there are fewer workers to replace retirees.
• The poverty rate in West Michigan has increased 6.1 percent since 1999 (from 8 percent to 14 percent in 2011).
• Risk factors like heavy drinking, smoking and inadequate physical activity have also increased. Researchers said about 17 percent of the area’s population reports having five or more drinks at least once in the previous month; that number is higher than populations in Detroit and the U.S.
• Cancer rates in West Michigan are lower than other areas in Michigan and the U.S., and rates of diabetes are lower but tracking closely with obesity. Researchers said people with asthma increased by 3 percent from 2004 to 2011.
Jean Nagelkerk, vice provost for health at GVSU, said while health-related statistics are similar to last year’s findings, the report shows increases in health care jobs and the number of medical patents awarded in West Michigan. “The information provided in this presentation will help inform health care policy and community decisions about the types of health care professionals, services, costs and delivery systems that best serve the needs of our community,” she said.
Nagelkerk added that Health Check 2013 provides a framework to understand the health care needs of West Michigan residents. Jeff Connolly, president of West Michigan operations and managed care for Blue Cross Blue Shield of Michigan, agreed.
“We want to help guide this discussion so the public can make the most informed decisions for themselves and their family members,” Connolly said. | <urn:uuid:59e48d47-3217-44ac-99f2-3926378af3d3> | CC-MAIN-2016-26 | http://www.gvsu.edu/gvnow/index.htm?articleId=7B492246-F741-91ED-D57F11A7FADDA5E8&tab=video | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395621.98/warc/CC-MAIN-20160624154955-00187-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.957176 | 578 | 2.546875 | 3 |
Other Taxonomic Groupings:
Potentially Misidentified Species:
could be mistaken for C. tenuissimum. However, the budding pattern in C.
tenuissimum is slightly more regular than in C. seurati due to C.
tenuissimum's somewhat larger zooid size and distal-proximal budding
pattern. Additionally, lateral walls in individual zooids are more calcified in C.
seurati, and its distal spines are longer and more pointed. C. seurati
has fewer lateral spines than C. tenuissimum in water of the same
salinity: 1 - 3 for C. seurati vs. 5 for C. tenuissimum.
II. HABITAT AND
C. seurati typically
occurs in Northern Europe and the Mediterranean. Prior to Winston's 1982 study,
this species had not been reported in the western hemisphere. Its range now
includes estuarine habitats on Florida's east coast.
C. seurati is likely to be widespread in the
IRL, but it has been primarily collected from Link Port (Winston 1982).
III. LIFE HISTORY AND POPULATION BIOLOGY
Age, Size, Lifespan:
Individual zooids measure an average of 0.55 X 0.33
mm in size. Lophophore diameter measures 0.621 on average.
C. seurati is
among the most abundant bryozoan species in the IRL. It is most common from
December through May (Winston 1982). In the IRL, it is considered a fouling
organism (Winston 1995).
No ovicells are present in this species and eggs
are not brooded. Reproduction is accomplished by releasing eggs into the water
column for fertilization. Peak reproductive season occurs from late winter to
C. seurati and C.
tenuissimum co-occur in estuarine habitats, but their reproductive seasons
are apparently offset. During December, when C. tenuissimum larvae are
settling in their greatest numbers, they can outnumber C. seurati by
a ratio of 99:1. However, throughout January, settlement rates between both
species tend to equalize, and by May, only C. seurati is still settling.
After fertilization, embryos develop into
IV. PHYSICAL TOLERANCES
C. seurati is
considered a winter species in the IRL, being most common from December through
May (Winston 1982, 1995).
C. seurati is
one of 3 truly estuarine bryozoan species in the Indian River Lagoon. It was not
collected from coastal stations, but was routinely collected in the IRL in
waters where salinity ranged between 18 - 40 ‰ (Winston 1982, 1995). In
Europe, it has been collected in estuaries where salinity is less than 1 ‰
V. COMMUNITY ECOLOGY
like all bryozoans, is a suspension feeder. Each individual zooid in a colony
has an average of 15 ciliated tentacles that are extended to filter
phytoplankton less than 0.045 mm in size (about 1/1800 of an inch) from the
water column. Bullivant ( 1967; 1968) showed that the average individual zooid
in a colony can clear 8.8 ml of water per day.
Winston (1982) reported that C. seurati may
be a better space competitor than C. tenuissimum, because its colonies
were often observed to overgrow C. tenuissimum.
Typical habitat for ectoprocts in the Indian River
Lagoon include seagrasses, drift algae, oyster reef, dock, pilings, breakwaters,
and man-made debris (Winston 1995).
Seagrasses as well as floating macroalgae, provide
support for bryozoan colonies. In turn, bryozoans provide habitat for many
species of juvenile fishes and their invertebrate prey such as polychaete worms,
amphipods and copepods (Winston 1995). Bryozoans are also found in association
with other species that act as support structures: mangrove roots, oyster beds,
VI. SPECIAL STATUS
Benefit in IRL:
Bryozoans are ecologically important in the Indian
River Lagoon due to their feeding method. As suspension feeders, they act as
living filters in the marine environment. For example, Winston (1995) reported
that bryozoan colonies located in 1 square meter of seagrass bed could
potentially filter and recirculate
an average of 48,000 gallons of seawater per day.
Report by: K. Hill,
Smithsonian Marine Station
Submit additional information,
or comments to:
Page last updated: July 25, 2001 | <urn:uuid:03b36e89-db53-4685-b772-ffca2a4d7e26> | CC-MAIN-2016-26 | http://www.sms.si.edu/irlspec/Conope_seurat.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00197-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.875522 | 1,055 | 3.0625 | 3 |
Marbled Murrelet. Courtesy USFWS.
A tiny Northwestern seabird got some great news on Jan 20. The United States Fish and Wildlife Service declared that the marbled murrelet is still in need of federal protection and declined petitions to remove the bird from the list of threatened species under the Endangered Species Act.
The Fish and Wildlife Service cited declining populations in Oregon, Washington, and California as proof that the marbled murrelet was not ready to be removed from the protective measures that have been in place since the early 1990s.
The decision came in response to a petition filed by the American Forest Resource Council and other interests to have the bird removed from the protection of the Endangered Species Act. Their claim was based on a 2004 report which declared the rapidly declining population in Oregon, Washington, and California was not distinct from that of Canada, and did not need to be under federal protection. This report, however, was found to be “fundamentally flawed,” and last week’s decision by the Fish and Wildlife Service was based on a 2009 study that determined the tri-state birds are a population group distinct from the Canadian birds.
Marbled murrelets in the contiguous United States have experienced a dramatic decline, last year’s study found: 26% of the population in the Pacific Northwest disappeared between 2002 and 2008, leaving only 18,000 birds in the region as compared to Canada’s 66,000. The 2009 study also cited greater breeding success in Canada and differences in the amount of the bird’s habitat between the two regions as evidence for two distinct population groups.
The murrelets depend on old-growth forest close to the ocean for their nesting habitat. These birds spend most of their life out on the sea, but return to land in order to reproduce. They lay their eggs in the lichen and moss of large old-growth Douglas fir, Sitka Spruce, and hemlocks and rely on the safety of these trees to raise their young. The species was originally listed as threatened under the Endangered Species Act in 1992 due to logging of old-growth forests in the Pacific Northwest. The protections put in place at the time dramatically slowed logging in the region, though other factors including the effects of climate change on the ocean and continuing habitat loss are credited with the decline of the tri-state population.
The marbled murrelet, like the northern spotted owl and many other wildlife species needs the towering old-growth forests of the Pacific Northwest to survive. These forests are important to humans as well providing pristine drinking water for our communities, wonderful recreational opportunities, and helping control floods through natural water storage. The strong, federal protection extended to the bird by the Fish and Wildlife Service will continue to protect this dwindling resource and work towards a healthy habitat for the marbled murrelet, and all creatures who find benefits from these forests, including us Pacific Northwesterners. | <urn:uuid:4ab5661e-b9f8-49f1-8c0e-3757da8d0d25> | CC-MAIN-2016-26 | http://wilderness.org/blog/marbled-murrelet-retains-federal-protections | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397865.91/warc/CC-MAIN-20160624154957-00153-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.961383 | 600 | 3.453125 | 3 |
In a recent study, Oxford University researchers reported that although radiation therapy is a critical tool for the treatment of women with breast cancer, it can also raise their risk of a heart attack or heart disease later in life. The study was based on a review of medical records of 2,168 women in Sweden and Denmark who received radiation therapy for breast cancer between 1958 and 2001, and who were under age 70 at the time.
News coverage of the study, published in the New England Journal of Medicine, has drawn new attention to the heart risks associated with radiation therapy even as it underscores such therapy’s role in improving survival rates for breast cancer patients.
Jay Harris, MD, chair of the Department of Radiation Oncology at Dana-Farber, notes that radiation therapy today is delivered more precisely and in smaller doses than when many of the women in the study were treated, reducing the damage to nearby heart tissue.
“For patients with cancer in the left breast, we use a variety of techniques to ensure that very low doses reach the heart,” he explains. “These include using blocks to shield the heart and having patients hold a deep breath while receiving radiation, which moves the heart away from the chest wall.
“With the low doses currently in use, the risk of heart problems is far lower than in the past and is now very low in absolute terms,” he continues. “The increases in patient survival achieved by radiation therapy are far greater than the very slightly elevated risk for heart disease in such patients.” | <urn:uuid:76457cc5-16ab-4746-955d-b70839d78704> | CC-MAIN-2016-26 | http://blog.dana-farber.org/insight/2013/03/dr-jay-harris-discusses-the-link-between-radiation-therapy-for-breast-cancer-and-heart-disease/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395346.6/warc/CC-MAIN-20160624154955-00001-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.967105 | 315 | 3.25 | 3 |
By Andre Damon in the USA:
One in five US children do not have enough to eat
19 April 2014
Feeding America, the US national network of food banks, released its annual report on local food insecurity Thursday, showing that there are dozens of counties throughout in the US where a third of children do not get enough to eat.
Fourteen million people, or 16 percent of the population, lived in food insecure households in 2012, the latest year for which figures are available. This is up from 11.1 percent in 2007. The level of food insecurity among children is even worse, affecting a staggering 16 million children, or 21.6 percent.
“Food insecurity is higher than at any time since the Great Depression,” said Ross Fraser, director of media relations for Feeding America, the national network of charitable food banks. “One in six Americans live at risk of hunger, as do one in five children,” he added.
Broken down by state and county, the situation is far worse in many parts of the country. For instance, in Mississippi, 22.3 percent of the population, or almost one in four, are food insecure. So are 29 percent of children in New Mexico, nearly one third of all children.
There are sixteen states—including California, the most populous state in the country—where more than one in four children are food insecure.
Food insecurity means that a household does not “always have access to adequate amounts of food to maintain an active, healthy lifestyle,” Fraser explained to the WSWS. “Sometimes they’re either missing meals or fill their bellies with something that isn’t as nutritious as it should be, like a bowl of rice instead of a balanced meal.”
“When the recession hit, the number of food insecure people skyrocketed, from about 38 million people to about 50 million,” Fraser added. “Despite the proclamation that the recession is over, what this data shows is that people are having a very tough time making ends meet and securing enough food for themselves and their families.”
Los Angeles County, the New York metropolitan area, and Cook County (which includes Chicago) had the highest numbers of food insecure people in the US. There are 1.6 million food insecure people in Los Angeles, 1.4 million in New York’s five boroughs, and 0.8 million in Cook County. Twenty-one percent of residents (more than one in five) in Wayne County, which includes Detroit, were food insecure in 2012, as were 20 percent of residents in Dallas, Texas.
In the District of Columbia, home to the US capital, 28 percent of children live in food insecure households.
Rural poverty and hunger are pervasive. Four out of the five counties with the highest levels of food insecurity in the US were in rural Mississippi. Holmes County in the southern state reported 32 percent food insecurity, and Yazoo County reported a rate of 27 percent.
While hunger is most alarmingly high in inner cities and in rural America, Fraser warned that it is by no means confined to those areas. “Hunger exists in every county in America. This is a country where great wealth exists at the same time as great poverty.” He noted the example of Louden County, an affluent suburb of Washington DC, where the local food bank reported that demand for food assistance has quadrupled.
The Feeding America report is based on the organization’s analysis of 2012 data published last year by the US Department of Agriculture. Other, less comprehensive surveys indicate that food insecurity has grown significantly since then. According to the US Conference of Mayors, demand for emergency food assistance in 25 major cities increased seven percent in 2013, following an increase of 22 percent in 2012.
In particular, Feeding America’s report does not take into account the impact of two consecutive cuts to food stamp benefits over the past six months. On November 1, 2013, Congress allowed emergency food stamps funding implemented in 2009 to expire, resulting in a reduction of $36 per month for a family of four. This was followed by $8.7 billion in cuts over 10 years signed by President Obama earlier this year.
The annual cut to food stamp benefits was $5 billion from the first cut alone, amounting to the entire operating budget of the Feeding America network. “It was like wiping out everything we do,” said Fraser.
Federal food stamp benefits now pay an average of $134 per month for individuals and $290 for families, or about $1.40 per person per meal. “Our food banks are where people go when they run out of food stamps,” Fraser said, noting that most people depleted their funds by the 21st of any given month.
Fraser also noted that a significant portion of people who visit the network’s food banks are employed, but do not make enough money to afford enough food. “They’re not able to make ends meet on low-wage jobs. You can’t even rent an apartment in the city limits of Chicago for what a minimum wage worker makes.”
The pervasive growth of poverty, hunger, and homelessness, is the result of the deliberate policies pursued by the ruling class since the 2008 economic crash. First under Bush and then Obama, trillions of dollars have been handed to Wall Street in the form of bank bailouts, followed by unending cuts in wages, benefits and social programs.
These measures have resulted in a historic redistribution of wealth, from the working class to the rich. Just last week, executive compensation research firm Equilar reported that the 100 top-earning CEOs in the US saw their median yearly pay increase by 9 percent in 2013, to $13.9 million each.
The US’s billionaires have seen their wealth double since 2009. The 400 richest individuals in the US now have a collective wealth of more than $2 trillion, or 400 times the annual budget of Feeding America and more than one billion times the average annual income for an individual on food stamps. | <urn:uuid:8b83c4d2-b1aa-4f98-b7fe-3001e07f54bc> | CC-MAIN-2016-26 | https://dearkitty1.wordpress.com/2014/04/19/hungry-children-in-the-usa/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00083-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.96469 | 1,256 | 2.765625 | 3 |
Python and Pygame are simple yet powerful tools that make up a great combination for rapid game development. This tutorial will guide you step by step in using these two tools to make the classic Breakout game.
See below a video of the game in action.
Click here to download the full source code.
What you will need:
NOTE: If you don’t have Python and/or Pygame installed, please check the tutorial How to Install Python and Pygame.
In the game, there are rows of bricks in the top of the screen. The objective of the game is to destroy all the bricks with a small ball that travels across the screen. A brick is destroyed when hit by the ball. The ball bounces off when hits the screen borders, the bricks and the paddle. The player must avoid the ball to touch the bottom of the screen (or in common words, falling to the ground). To prevent this from happening, the player uses the paddle to bounce the ball upward, keeping it in play.
Your score increases when you destroy bricks. On the other hand, you lose one life each time the ball falls in the ground.
The game has 4 states:
- Ball in paddle – we get in this state when the game starts or when we lose the ball.
- Playing – we get in this state when we press SPACE to launch the ball.
- Game over – when we lose all of our lives we get in this state.
- Won – we get in this state when we destroy all the bricks.
This is the sequence of events. The game begins in the state “ball in paddle”. In this state, the ball is glued to the paddle. We can move the paddle, and when we do so, the ball follows the paddle, because it is glued to the paddle. Then, when we press SPACE the game goes into “Playing” state. In this state the ball travels across the screen bouncing off the screen borders, bricks and the paddle. Each time the ball hits a brick we increase the score. On the other hand, if we lose the ball, we decrease the life count and if it is greater than zero we enter the “ball in paddle state”. Otherwise, we enter the “game over” state.
While in the “playing” state, if we destroy all the bricks, we enter the “won” state. We transit from the “game over” and “won” states to “ball in paddle” state by pressing the ENTER key. Actually, this means playing again.
We move the paddle using the LEFT and RIGHT arrow keys. When moving the paddle we make sure it stays inside the screen.
The ball moves in 4 directions: up-right, up-left, down-right, down-left. To simulate this we use a velocity vector. Wait, don’t be afraid of this expression. It just means we use separate values to update the position of the ball. For example, to simulate the up-right movement we use velX = 5, velY = -5 (the velY is negative to make the ball go up). Below I show more examples of velocity vector values.
[X,Y] [5,-5] --> up-right direction [-5,-5] --> up-left direction [-5,5] --> down-right direction [-5,-5] --> down-left direction
We make sure the ball is inside the screen. When it hits the left and right borders we invert the X velocity component. So, if it was going to the left it will end up going to the right and vice versa. On the other hand, if the ball hits the paddle, top or bottom borders or one brick, we invert the Y velocity component. So, if the ball was going up it ends up going down and vice versa.
Collision detection is a technique used to know if two objects collide or not. Basically, two objects collide if they overlap. We employ collision detection to determine if the ball collides with the bricks and the paddle.
import pygame SCREEN_SIZE = 640,480 # Object dimensions BRICK_WIDTH = 60 BRICK_HEIGHT = 15 PADDLE_WIDTH = 60 PADDLE_HEIGHT = 12 BALL_DIAMETER = 16 BALL_RADIUS = BALL_DIAMETER / 2 MAX_PADDLE_X = SCREEN_SIZE - PADDLE_WIDTH MAX_BALL_X = SCREEN_SIZE - BALL_DIAMETER MAX_BALL_Y = SCREEN_SIZE - BALL_DIAMETER # Paddle Y coordinate PADDLE_Y = SCREEN_SIZE - PADDLE_HEIGHT - 10 # Color constants BLACK = (0,0,0) WHITE = (255,255,255) BLUE = (0,0,255) BRICK_COLOR = (200,200,0) # State constants STATE_BALL_IN_PADDLE = 0 STATE_PLAYING = 1 STATE_WON = 2 STATE_GAME_OVER = 3
We begin by importing the pygame module. Next we define some constants. The first constant defines the screen dimensions. Then, we have constants that define the dimensions of the paddle, ball and bricks. After that, we define constants that specify the maximum X coordinate for the ball and paddle. These constants will be used later to enforce the paddle and ball stay inside the screen. Finally, we define color and state constants.
class Bricka: def __init__(self): pygame.init() self.screen = pygame.display.set_mode(SCREEN_SIZE) pygame.display.set_caption("bricka (a breakout clone by codeNtronix.com)") self.clock = pygame.time.Clock() if pygame.font: self.font = pygame.font.Font(None,30) else: self.font = None self.init_game()
We have encapsulated the game code inside the Bricka class. In the constructor, firstly, we initialize the pygame modules. Next, we create the game window and we set a title for it. Next we create a clock object that will be used later to lock our frame rate to a constant value. Next, we create a font object, only if the font module is available. This object will be used later to draw text in the screen. Finally, we call the init_game() function. This function is described below.
def init_game(self): self.lives = 3 self.score = 0 self.state = STATE_BALL_IN_PADDLE self.paddle = pygame.Rect(300,PADDLE_Y,PADDLE_WIDTH,PADDLE_HEIGHT) self.ball = pygame.Rect(300,PADDLE_Y - BALL_DIAMETER,BALL_DIAMETER,BALL_DIAMETER) self.ball_vel = [5,-5] self.create_bricks() def create_bricks(self): y_ofs = 35 self.bricks = for i in range(7): x_ofs = 35 for j in range(8): self.bricks.append(pygame.Rect(x_ofs,y_ofs,BRICK_WIDTH,BRICK_HEIGHT)) x_ofs += BRICK_WIDTH + 10 y_ofs += BRICK_HEIGHT + 5
In the init_game() function we reset some variables. We start with 3 lives, score 0, and state set to STATE_BALL_IN_PADDLE. Next we define the rectangles for the paddle and ball. We will, later, use these rectangles for movement, drawing, and for collision detection. Then, we initialize the ball velocity, setting it to go up-right. Finally, we call the create_bricks() function that will create the bricks. The bricks are maintained in a list.
def check_input(self): keys = pygame.key.get_pressed() if keys[pygame.K_LEFT]: self.paddle.left -= 5 if self.paddle.left < 0: self.paddle.left = 0 if keys[pygame.K_RIGHT]: self.paddle.left += 5 if self.paddle.left > MAX_PADDLE_X: self.paddle.left = MAX_PADDLE_X if keys[pygame.K_SPACE] and self.state == STATE_BALL_IN_PADDLE: self.ball_vel = [5,-5] self.state = STATE_PLAYING elif keys[pygame.K_RETURN] and (self.state == STATE_GAME_OVER or self.state == STATE_WON): self.init_game()
The check_input() function handles keyboard input. Firstly, we get a list with the states of all keys. After that, if the LEFT arrow key is pressed we move the paddle left. Likewise, if the RIGHT arrow key is pressed we move the paddle right. During the movement, we make sure the paddle stays inside the screen. Then, if the SPACE key is pressed while we are in state Ball in Paddle, we change the velocity to make it go up-right and change the state to Playing. This causes the ball to be launched. Finally, if the ENTER key is pressed while in the game over or won states, we call init_game() to restart the game.
def move_ball(self): self.ball.left += self.ball_vel self.ball.top += self.ball_vel if self.ball.left <= 0: self.ball.left = 0 self.ball_vel = -self.ball_vel elif self.ball.left >= MAX_BALL_X: self.ball.left = MAX_BALL_X self.ball_vel = -self.ball_vel if self.ball.top < 0: self.ball.top = 0 self.ball_vel = -self.ball_vel def handle_collisions(self): for brick in self.bricks: if self.ball.colliderect(brick): self.score += 3 self.ball_vel = -self.ball_vel self.bricks.remove(brick) break if len(self.bricks) == 0: self.state = STATE_WON if self.ball.colliderect(self.paddle): self.ball.top = PADDLE_Y - BALL_DIAMETER self.ball_vel = -self.ball_vel elif self.ball.top > self.paddle.top: self.lives -= 1 if self.lives > 0: self.state = STATE_BALL_IN_PADDLE else: self.state = STATE_GAME_OVER
The move_ball() functions takes care of moving the ball. First, it updates the position coordinates adding the velocity components. After that, it checks if the ball hit the left or right screen border. If true, the X velocity component is inverted making it bounce. Finally, it checks if the ball hit the top border, inverting the Y velocity component, if true.
def handle_collisions(self): for brick in self.bricks: if self.ball.colliderect(brick): self.score += 3 self.ball_vel = -self.ball_vel self.bricks.remove(brick) break if len(self.bricks) == 0: self.state = STATE_WON if self.ball.colliderect(self.paddle): self.ball.top = PADDLE_Y - BALL_DIAMETER self.ball_vel = -self.ball_vel elif self.ball.top > self.paddle.top: self.lives -= 1 if self.lives > 0: self.state = STATE_BALL_IN_PADDLE else: self.state = STATE_GAME_OVER
The handle_collisions() function determines if the ball collided with a brick, the paddle, or has fallen to the ground. First, it checks if the ball has collided with a brick. If true, it increments the score by 3 units and removes the brick from the brick list. After making the brick collision test, it checks if there are remaining bricks. If not, it changes the state to Won. Finally, it checks if the ball hit the paddle. If true, the ball is repositioned so that is right above the paddle and the Y velocity component is inverted. Otherwise, it checks if the ball is below the paddle (going to the ground), and if true, decreases the life count. If the count drops to zero, it changes the state to Ball in paddle. Otherwise, changes the state to Ball in paddle.
def show_stats(self): if self.font: font_surface = self.font.render("SCORE: " + str(self.score) + " LIVES: " + str(self.lives), False, WHITE) self.screen.blit(font_surface, (205,5)) def show_message(self,message): if self.font: size = self.font.size(message) font_surface = self.font.render(message,False, WHITE) x = (SCREEN_SIZE - size) / 2 y = (SCREEN_SIZE - size) / 2 self.screen.blit(font_surface, (x,y))
These 2 functions draw texts in the screen. The show_stats() shows score and life info while show_message() is used to show game state related messages.
def run(self): while 1: for event in pygame.event.get(): if event.type == pygame.QUIT: sys.exit self.clock.tick(50) self.screen.fill(BLACK) self.check_input() if self.state == STATE_PLAYING: self.move_ball() self.handle_collisions() elif self.state == STATE_BALL_IN_PADDLE: self.ball.left = self.paddle.left + self.paddle.width / 2 self.ball.top = self.paddle.top - self.ball.height self.show_message("PRESS SPACE TO LAUNCH THE BALL") elif self.state == STATE_GAME_OVER: self.show_message("GAME OVER. PRESS ENTER TO PLAY AGAIN") elif self.state == STATE_WON: self.show_message("YOU WON! PRESS ENTER TO PLAY AGAIN") self.draw_bricks() # Draw paddle pygame.draw.rect(self.screen, BLUE, self.paddle) # Draw ball pygame.draw.circle(self.screen, WHITE, (self.ball.left + BALL_RADIUS, self.ball.top + BALL_RADIUS), BALL_RADIUS) self.show_stats() pygame.display.flip()
This is the game loop. First, we handle the window events. If a request to quit the application exists, we do quit the application. After handling the events, we use the clock object to lock the frame rate to 50 FPS. Then, we handle keyboard input. After that, the next action depends on the game state. If we are in Playing state, we move the ball calling move_ball(), and handle collisions calling handle_collisions(). Otherwise, we print a message with instructions. In state Ball in paddle we ensure the ball is glued to the paddle. After that, we draw the paddle, the ball, and display the score and lives text. Finally, we call pygame.display.flip() to display everything that has been drawn in the frame.
if __name__ == "__main__": Bricka().run()
Finally, this piece of code creates an instance of the game class and runs it. It makes sure the file is run directly and not imported from a module.
As you can see, game programming with Python and Pygame is pretty easy and fun. We have assembled a game in a few lines of code. Click here to download the full source code. | <urn:uuid:92a7ef19-9158-4993-a35d-cfd7a0eacce2> | CC-MAIN-2016-26 | http://codentronix.com/2011/04/14/game-programming-with-python-and-pygame-making-breakout/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398869.97/warc/CC-MAIN-20160624154958-00167-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.707391 | 3,491 | 3.515625 | 4 |
Next: 3 Estimating Exposure Times
Previous: 2.3 4-m Cryogenic Camera
The 2.1-m GoldCam spectrometer has proven to be one of the most popular spectroscopic instruments at Kitt Peak. While one cannot go as faint with it as one can with the 4-m on stellar sources, many programs simply need more observing time than can typically be accommodated during short 4-m runs. The total system throughput (telescope + spectrograph + CCD) is 15-18% under typical seeing conditions with a nominal slit width (24% peak throughput under excellent seeing conditions). GoldCam offers resolutions from 300 to 4500 using a variety of gratings. The detector in GoldCam is a Ford 3K x 1K CCD with 15m pixels and fairly good cosmetics. The full 5.2 slit projects to 400 rows, and so only half of the chip is used. The camera design does not give good focus over the entire 3K length, although we find that the central 2000 pixels are in relatively good focus. A TV camera views the slit, and guiding is accomplished using a second TV which is moved around the xy axis outside of the instrument field of view.
It is possible to rotate the slit to specific position angles at the 2.1-m, but doing so requires moving the telescope to zenith and must be done manually by the telescope operator. Allow a minimum of 10 minutes of overhead for each rotation.
The following table lists the available gratings and wavelengths coverage.
|2.1m GoldCam Gratings|
Notes: (a) Based on 2.7 pixels FHWM corresponding to 100 m slit (1.3 arcsec). Resolution will degrade to 3 pixels at 150 m slit (2 arcsec). (b) Spectral coverage limited by overlapping orders. (c) Spectral coverage limited by grating efficiency and atmospheric cut-off.
The grating efficiencies have been measured in the laboratory and are shown in Fig. 5
Figure 5: The efficiencies of the various GoldCam gratings are shown in this figure.
There are a variety of order-separation filters available for use in GoldCam. These filters are listed below and their transmission curves are shown in Fig. 6 and Fig. 7.
|Blocking Filters for GoldCam|
|Long cut-off||Short cut-off|
Figure 6: The transmission curves for the various GoldCam long- cut-off filters.
Figure 7: The transmission curves for the various GoldCam short- cut-off filters. | <urn:uuid:16457b92-f656-402d-b64d-1125d659b2c1> | CC-MAIN-2016-26 | http://www.noao.edu/kpno/manuals/l2mspect/node10.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391766.5/warc/CC-MAIN-20160624154951-00178-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.787166 | 534 | 2.71875 | 3 |
In this Treehouse Quick Tip, we’re going to get started with HTML or Hyper Text Markup Language, which is the basic language of websites.
Nick: Hi, I’m Nick. In this Treehouse Quick Tip we’re going to get
started with HTML or hypertext markup language, which is
the basic language of websites. There might be several
more. Those are part of making websites too. However, the
only language that is required is HTML. So, when your first
learning you’ll want to focus your attention there.
Here we have a very basic looking HTML website. There
hasn’t been any sort of fancy styling or images applied.
Let’s see how this code looks. We’re going to switch over
to a program called a text editor, and let’s take a look at
some of our HTML code.
HTML is called a markup language because it marks up our
content. In this example we have several tags that are
describing to the browser what’s actually here. We have
headline elements, like this H1 here and this H2, which are
just like headlines in a newspaper. Then there are
paragraph elements represented by these P tags here and
here. It’s actually pretty simple.
If a block of text is a paragraph, then you should wrap it
in a paragraph element. In addition we have the overall
structure of the document, which represented by the HTML
head and body tags. The body is where all the visible parts
of your document will go. The head is where you can include
things, like the title of your website or other files such
elements, and these are just a few.
When you type in the address of your favorite website,
there are three basic layers that get delivered to you,
structural, presentational, and behavioral. HTML forms the
structure of a website, CSS is presentational and
write your content. CSS makes it look pretty visually and
aren’t always necessary, you will always need HTML.
Announcer: If you’d liked to see more advanced videos and tutorials like
this one, go to teamtreehouse.com and start learning for | <urn:uuid:b63fe9e1-73f7-458a-a812-bfb9cb58878e> | CC-MAIN-2016-26 | http://blog.teamtreehouse.com/quick-tip-getting-started-with-html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396222.11/warc/CC-MAIN-20160624154956-00045-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.908359 | 480 | 3.734375 | 4 |
EV (exposure values)
Combination of a camera exposure time and lens aperture giving the same sensor exposure. By convention, EV is expressed on a logarithm 2 basis, so doubling the sensor exposure corresponds to EV+1.
Amount of light that falls on a sensor or a film during the exposure time, expressed in lux.sIt is dependent upon scene luminance, aperture and exposure time.
Time during which a sensor acquires ambient light.
Operation that creates values from a sequence of known values.
Field of view
Angular extent of the part of the scene viewed by a camera.
Optical component that removes some light, either to lower intensity (neutral filters) or to change the light spectrum (colored filters).
Optical artifact coming from reflection on lenses, usually visible with a bright light source (such as the sun). Can lead to “ghosts” of the light source or “veiling glare” (loss of contrast) that creates a foggy effect on the image.
Plane perpendicular to the optical axis at which an object at infinity is in focus.
Distance at which objects are in focus.
Choosing the part of a scene that is visible in a photo.
By reference to silver-halide photography, sensors whose dimensions are 36x24mm.
Multiplicative numerical value used to amplify a signal.
Appearance of the noise in a homogeneous part of an image.
Numerical values related to the amount of light a pixel receives.
Uniform part of a color-neutral chart.
Gretag Macbeth Color Checker
Target commercialized by Xrite, containing 24 colored patches, commonly used for color reproduction testing.
Exposure levels close to or beyond saturation. Burned areas appear white and uniform.
Perceptual property of colors like red, blue, yellow... | <urn:uuid:eff7fdef-3704-4b51-9dab-d93f3c9d75c5> | CC-MAIN-2016-26 | http://www.dxomark.com/About/Glossary/E-F-G-H | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.0/warc/CC-MAIN-20160624154951-00138-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.856573 | 387 | 3.375 | 3 |
Pyramids in General
Other Pyramid Topics
About Egyptian Pyramids
By Jimmy Dunn writing as Kelly Smith
The history of Nubia, the land south of Egypt, often in conflict with Egypt, frequently under at least partial control of Egypt and late in history, in control of Egypt, is an integral part of Egyptian history. When Egypt was strong, and expanding its territory, it often did so into Nubia, but when Egypt was weak, Nubian territory grew to the north.
Nubia was known to the Egyptians as Kush. During the Middle Kingdom, its principal town was Kerma, which lies just below the Third Cataract of the Nile River. It was ruled by chiefs, or kings who the Egyptians of the Middle Kingdom evidently viewed as a threat, for the Egyptians built a series of fortresses in Northern Nubia to protect Egypt's borders.
During Egypt's New Kingdom, the empire period, Nubia was for the most part a province of Egypt, ruled by the "King's Son of Kush". The southern limits of this control may have been Gebel (mountain of) Barkal, where a Temple of Amun was situated. Then, as the New Kingdom waned and Egypt declined into rival principalities, Egyptian control of Nubia was once more lost. For almost two centuries after the end of the New Kingdom, we find very scant records of Egypt's southern neighbor.
Then, a new Kushite kingdom suddenly appeared, not surprisingly at a time when Egypt was at her weakest. As early as 770 BC, a powerful ruler named Kashta arose out of Napata, located at the foot of Gebel Barkal, to take control not only of Lower, or Northern Nubia, but also of Upper, or Southern Egypt as far north as Thebes. There, he had his sister installed as "Divine Adoratice of Amun", a position that had become as important, if not more so, than High Priest. While the people of Thebes acknowledged Kashta as King of Upper and Lower Egypt, it would be his successor, Piye (Piankhi), who would truly rule a more or less complete Egypt. He left behind remarkable documents at Karnak, Memphis and Gebel Barkal, though only the last survives, that casts himself in the traditional role of Pharaoh, the restorer of order against the forces of chaos.
"...stood by himself alone. Breaking the seals of the bolts, opening the doors; viewing his father Re in the holy Pyramidion House; adorning the Morning Bark of Re and the Evening Bark of Amun."
Afterwards, he returned to Napata where he founded a Nubian dynasty, Egypt's 25th, that would last for about a century. Upon his death, he became the first Egyptian king in 800 years to be buried in a pyramid. He built it at el-Kurru, about thirteen kilometers downstream from the Temple of Amun at Gebel Barkal, and his was the first of an estimated 223 pyramids that would be built in Nubia over the next thousand or so years. We think that his palace may have been located nearby, though it has never been unearthed. Between 1918 and 1919, George Reisner conducted excavations at el-Kurru, but by then only one pyramid was still standing. He found under low mounds of rubble the tombs of Piye and his successors of the 25th Dynasty, Shebaka, Shebitku and Tantamani. Their tombs had once been covered by pyramids, but by the early 20th century, they had been entirely removed.
These pyramids bore much more in common with the private ones that can still be found on the West Bank at Thebes (modern Luxor) than with the Great Pyramids of northern Egypt, though it is commonly assumed that he was inspired by the latter. Even though the superstructure of his own tomb had been removed, its foundation trench indicated a pyramid with a base length of only about eight meters, and a slope of probably about 68 degrees. Nineteen steps led down from the east to the burial chamber that was cut into the bedrock as an open trench and covered with a corbelled masonry roof. Piye's body had been placed on a bed that rested in the middle of the chamber on a stone bench with its four corners cut away to receive the legs of the the bed, so that the bed platform lay directly on the bench. This was probably a Nubian custom, though fragments of canopic jars were discovered, leading Egyptologists to believe that he was most likely embalmed in Egyptian style. There were also the remains of Shabti figures, more typically found in Egyptian tombs. There had been a chapel built over and covering the stairway to the burial chamber, but it too was completely destroyed.
The pyramid of his successor, Shebaka, had a similar layout although the burial chamber was completely subterranean, and included a vaulted ceiling cut in the natural rock. Here, the entrance to the pyramid itself was built far enough to the east to allow it to be entered after the mortuary temple was built. A stairway led down to a short tunnel that than led into the burial chamber.
Along with the kings of the 25th Dynasty, there were also fourteen queens' pyramids built at el-Kurru, measuring between six and seven meters square, actually only slightly smaller than the kings' pyramids, which measured from eight to eleven meters squared.
Reisner also found the graves of 24 horses and two dogs nearby. Four of the horses belonged to Piye, and four more to Tantamani. Scholars speculate that they may have each belonged to a chariot team. There were also ten horses belonging each to Shebaka and Shebitku. All of the animals had been sacrificially decapitated, and their skulls were missing. They were each buried in a standing position, and their bodies were draped with beaded nets hung with cowrie shells and heavy bronze beads. They also had silver collars and gilded sliver plume holders. There is also some speculation whether these horses might correspond with the boat burials of earlier pyramids.
One of the last kings of the 25th Dynasty, Taharqa (known in the bible, Kings 19:9, as Tirakah), moved to Nuri, a site just on the other side of the river from Gebel Barkal, to build his pyramid. There, he built a much larger pyramid measuring some 51.75 meters square with a height of between 40 and 50 meters. It was the largest pyramid ever built at Nuri, and is unique among the Nubian pyramids in having been built in two stages. The first pyramid was encased in smooth sandstone. Drawings and written reports of the early 19th century reveal the truncated top of the inner pyramid projecting from the top of the decaying outer pyramid. The outer pyramid was the first of a type with stepped courses and planed corners. It had a sloped angle of about 69 degrees. An enclosure wall tightly encircled the pyramid, but Reisner was not able to unearth any traces of a chapel.
However, the subterranean chambers of this pyramid are the most elaborate of any Nubian tomb. The entrance was by way of an eastern stairway trench, north of the pyramid's central axis, but in alignment with the original smaller pyramid. Three steps led down to a doorway with a molded frame and cavetto cornice. The doorway then led to a tunnel that widened and opened into an antechamber with a barrel- vaulted ceiling. Six huge pillars carved from the natural rock divided the burial chamber into two side aisles and a central nave, each with a barrel-vaulted ceiling.
Though a rectangular recess was cut into the floor of the burial chamber for a sarcophagus, no sarcophagus was found. In addition, there were four rectangular niches in the north and south walls and two in the west wall. The whole of the chamber was surrounded by a moat-like corridor that could be entered by way of steps leading down from in front of the antechamber doorway. Another set of steps led to the corridor from the west end of the nave. Indeed, the whole arrangement is not unlike the Osireion, a symbolic Osiris tomb built by Seti I at Abydos.
During the reign of Taharqa, the Assyrians were becoming a growing threat. In fact, his successor, Tantamani, after having briefly received the submission of all the Egyptian Delta rulers, was then forced back by the Assyrians to Napata. Nubian rule of Egypt gradually came to and end as Psamtik I, an Egyptian under Assyrian control, consolidated his powerbase in Egypt. Nevertheless, Tantamani and his successors would rule a territory that extended from the First Cataract (at Aswan) south to the White Nile for the next 350 years.
Though Tantamani returned to el-Kurru to build his pyramid, 21 kings and 53 queens and princes were buried at Nuri under pyramids built of good masonry, using blocks of local red sandstone. In general, they were all much larger than those at el-Kurru, reaching heights of twenty to thirty meters. They had mostly consistent plans, with chapels built against the eastern faces decorated with reliefs and a stela built into the pyramid masonry depicting the king before the gods. The substructures almost always include stairway trenches to the east of the chapels that gave access to chambers, including two or three rooms, which were sometimes inscribed with the "Negative Confession" from the Egyptian Book of the Dead.
Their burial practices were largely Egyptian. They were mummified in Egyptian fashion, and their burials included multiple shabtis (some 1070 in Taharqa's pyramid alone). The royal mummies were adorned with gold jewelry, green stone heart scarabs, gold chest pectorals and gold caps on on the fingers and toes. The kings were also equipped with crooks and flails. The coffins were anthropid, made of wood and covered with gold leaf and inlaid with colored stone. There were sometimes outer coffins that were even more elaborate, covered with gold and stone inlays with the motif of falcon and vulture wings. Several bodies of kings, notably those of Anlami and Aspelta (about 568 BC), were placed in huge granite sarcophagi. Aspelta's in particular weighed 15.5 tons and had a lit weighing four tons, carved with Pyramid Texts, chapters form the Book of the Dead, and depicting various Egyptian gods.
The Nubian pyramid field at Nuri continued to receive the bodies of the royalty until about 308 BC. Afterwards, the site of Meroe, further south between the Fifth and Sixth Cataracts rose to prominence as a royal cemetery. No evidence has really surfaced about why this transfer was made, though there is some speculation that the Meroe may have slowly gained importance beginning as early as 590 BC, after Psamtik II campaigned in northern Nubia. He may have defeated King Aspelta's army and marched on Napata, but much of this is very uncertain.
In fact, Peter Shinnie, one of the excavators at Meroe, has pointed out that no settlement has ever been found at Napata (near Nuri), and no royal residence may have ever been located at that site. On the other hand, Meroe was settled as early as the 8th century BC. It may have predated Napata, and even been the cultural and political center all along. At any rate, it provided a somewhat more comfortable cushion of land separating it from Egypt.
Meroe would remain the royal cemetery for 600 years, until about 350 AD. The main heartland in this area, known today as Butana, was better known to ancient writers as the "Island of Meroe". It is bounded on three sides by the rivers Nile, the Atbara and the Blue Nile. Most traffic from Napata to Meroe, however, took the road along the Wadi Abu Dom that cuts across the great bend of the Nile from the Fourth to the Sixth Cataracts. Meroe was repeatedly a refuge for Napatan and Meroitic kings when they retreated from world powers who penetrated down the Nile. It lay just beyond the reach of the Roman Empire, with which it was tied economically through trade.
The Pyramid Fields of Meroe in Nubia (The Sudan)
Some writers have described Meroe as one of the largest archeological sites in the world. The actual settlement of Meroe is just about one half mile east of the river and its cemeteries lie in the desert somewhat farther east. The first known, major king to build his tomb at Meroe was Arkamaniqo (sometimes referred to as Arikakaman, known to Diodorus as Ergamenes). He ruled at about the same time as Ptolemy II in Egypt. His pyramid was built in the South Cemetery, which had actually been in use since the time of Piye. There were as many as three kings buried here, including Yesruwaman and Kaltaly, as well as six queens, but the crowding caused by more than 200 individual graves prompted future royalty to move across a narrow valley to a curving ridge, where they initiated a North Cemetery. As many as 30 kings may have been buried in the North Cemetery. A third cemetery at Meroe, known as the West Cemetery, includes brick-faced and rubble pyramids of lesser royalty surrounded by a host of graves, many of which are well furnished, belonging to important private households of Meroe.
Like Nuri, these pyramid are fairly standardized. They are all steep-sided pyramids built of sandstone, with a height between ten and thirty meters. As at Nuri, they are stepped and built on a plinth, though here each triangular face was framed by smooth bands of raised masonry along the edges where the faces meet. Note that the pyramids at Gebel Barkal also have this feature.
Against the eastern side of the pyramids was situated a chapel, often fronted by miniature pylons.
Towards the end of the Meroitic period, the pyramids are no longer stepped, but smooth and the casing blocks become much smaller laid on a poorly constructed core. In fact, the last of these pyramids were built of rubble and brick and had a plastered surface.
For the substructure, they have an eastern stairway descending to a blocked doorway in front of usually three adjoining chambers. Normally, two of the chambers had square pillars carved from natural rock, with a third, innermost smaller chamber. Ceilings were slightly vaulted in earlier chambers and more roughly hewn, round vaulted in later ones.
At Meroe, the body of the deceased was buried in the innermost chamber in a wooden anthropoid coffin placed on a raised masonry bier. The finer ones were carved with divine figures. Relief scenes in the chapels attached to the pyramids, including depictions of mummies and the remains of canopic equipment, suggest that at least the royal bodies were still mummified. Excavations unearthed bodies that were adorned with gold and silver jewelry, along with bows, quivers of arrows, archers' thumb rings, horse trappings, wood boxes and furniture, bronze lamps, bronze and silver vessels, glass bottles and pottery. The chamber nearest the entrance often contained wine amphorae and food storage jars.
Here, and elsewhere in Nubia, kings and even wealthy commoners also took with them to their graves servants who were apparently sacrificed at the time of their master's funeral. Animals, including yoked horses, oxen, camels and dogs were also slaughtered and interred outside the entrances of the burial chambers.
A famous treasure, known as the Ferlini Treasure named for its discoverer, the Italian explorer, Giuseppe Ferlini, was unearthed in 1830 in one of the North Cemetery Pyramids (Beg. N.6). This was the pyramid of Queen Amanishakhto who lived during the late 1st century BC. Ferlini reported that this cache of gold rings, necklaces and other ornaments was found in a secret chamber at the top of one of the pyramids, with obvious results. Soon, other treasure hunters were lopping off the tops of the other pyramids. In fact, the treasure was almost certainly found in one of the subterranean chambers.
The re-emergence of the royal pyramid after some 800 years is an interesting case of the transfer of an architectural, as well as a religious idea from one region and culture to another. It seems that the Nubians, for a considerable period of time, probably had a rather high regard for their neighboring culture to the north. When Egypt floundered, the earlier Nubian kings who took control of Egypt sought to turn back time to a more classical Egyptian past, and they took some of this past home when they left Egypt.
The Nubian pyramids are characterized by smaller scale, with steeper slopes, but they are far more numerous, considerably more standardized and owned by more members of the royal households (and probably non-royals as well) than the classical Egyptian pyramids. When the Nubians stopped building them, the pyramid as a marker for a royal tomb would be no more.
Who are we?
Tour Egypt aims to offer the ultimate Egyptian adventure and intimate knowledge about the country. We offer this unique experience in two ways, the first one is by organizing a tour and coming to Egypt for a visit, whether alone or in a group, and living it firsthand. The second way to experience Egypt is from the comfort of your own home: online. | <urn:uuid:b7d14962-ed78-4d35-8de4-473ca9e3922d> | CC-MAIN-2016-26 | http://www.touregypt.net/featurestories/nubiapyramids.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402699.36/warc/CC-MAIN-20160624155002-00044-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.983254 | 3,708 | 3.609375 | 4 |
Magic, Witches & Devils in the Early Modern World
21 January - 21 August 2016, free entry
A depiction of a magic circle, in Pseudo-Roger Bacon, Tractatus de nigromatia (Book of Black Magic), England, late 1500s. Courtesy of Chetham's Library. Byrom Collection. MUN Mun.A.4.98
Ghosts, witches, sorcerers and demons: our fascination with the supernatural stretches back centuries. Experience how supernatural forces shaped the lives of everyone from kings and queens to clergymen and maidservants.
Magic, Witches & Devils in the Early Modern World reveals how magic, diabolical witchcraft, and ghostly encounters inspired fear and curiosity on an unprecedented scale between the 15th and 18th centuries. The exhibition illuminates the roots of our obsession with supernatural power and explores a world where the Devil was understood as a real and present danger in daily life.
Join the conversation #jrlmagic.
Located in the cross corridor, open daily, free entry.
The exhibition booklet is also available to download as an accessible, plain text word document:
Want to find out more?
- Wolfgang Behringer, Witches and Witch-Hunts: A Global History (Cambridge: Polity Press, 2004).
- Abolqasem Ferdowsi, Shahnameh: The Persian Book of Kings, trans. Dick Davis (London: Penguin, 2007).
- Stephen Gordon, ‘Conjuring Spirits in the “Tractatus de Nigromatia”’, Chetham’s Library blog, 14 August 2015.
- Sasha Handley, Visions of an Unseen World: Ghost Beliefs and Ghost Stories in Eighteenth-Century England (London: Pickering & Chatto, 2007).
- Brian Levack, The Devil Within: Possession and Exorcism in the Christian West (New Haven: Yale University Press, 2013).
- Darren Oldridge, The Devil: A Very Short Introduction (Oxford: Oxford University Press, 2012).
- Sophie Page, Magic in Medieval Manuscripts (London: The British Library, 2004).
- Glyn Parry, The Arch Conjurer of England: John Dee (New Haven: Yale University Press, 2013).
- Deanna Petherbridge, Witches and Wicked Bodies, exhibition catalogue (Edinburgh: National Galleries of Scotland / British Museum, 2013).
- Lyndal Roper, Witch Craze: Terror and Fantasy in Baroque Germany (New Haven: Yale University Press, 2004).
- Vesta Sarkosh Curtis, The Legendary Past: Persian Myths (London: British Museum Press, 1993).
- Charles Zika, The Appearance of Witchcraft: Print and Visual Culture in Sixteenth-century Europe (London: Routledge, 2007).
Working in collaboration with:
• Stephen Gordon, Postdoctoral Research Associate, The University of Manchester
With thanks to:
• Chetham's Library – Michael Powell and Fergus Wilde
• The Whitworth, The University of Manchester – David Morris
• Hannah Barker, Aaron Moore, Natalia Smelova, Michael Smith and Edward Wouk
• The John Rylands Research Institute (seed corn grant awarded to Jennifer Spinks and Sasha Handley).
• Arts and Humanities Research Council Early Career Fellowship awarded to Jennifer Spinks: grant number AH/L015013
Update and correction: the image on pp. 26-27 of the exhibition booklet depicts 'Mar Ab'disho on horseback attacking an evil spirit in the form of a woman', not 'Mar Zay'ā attacking the angel of death'. You can see the latter image on display in the exhibition.' | <urn:uuid:ae1ec095-15d5-4d68-b50c-9f5767088e29> | CC-MAIN-2016-26 | http://www.library.manchester.ac.uk/rylands/whats-on/exhibitions/magic/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00115-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.754877 | 769 | 2.859375 | 3 |
27 November 2013
The distances between stars are so immense that we can't use miles or kilometres to measure them, the numbers would become too large. For example, the closest star to our Solar System, is a whopping 38,000,000,000,000 kilometres away! And that's the closest star. There are stars that are billions of times farther away than that. No one wants to write or talk about numbers that have 20 digits in them!
So, for distances in space we use a different measurement: the time taken for a light beam to travel. When travelling through space, light moves at a set speed of nearly 300,000 kilometres per second. Nothing in the known universe travels faster than the speed of light.
If you somehow managed to cheat the laws of physics and travel as fast as a ray of light, it would still take 160 000 years to reach the object in this photograph! And this cloud is inside one of the Milky Way’s closest neighbours, a nearby galaxy called the Large Magellanic Cloud. This new image explores colourful clouds of gas and dust called NGC 2035 (seen on the right), sometimes nicknamed the Dragon’s Head Nebula.
The colourful clouds of gas and dust are filled with hot new-born stars which make these clouds glow. They're also regions where stars have ended their lives in terrific blazes of glory as supernova explosions.
Looking at this image, it may be difficult to grasp the sheer size of these clouds — we call the distance light can travel in a year a “light-year” and each one is several hundred light-years across! The Large Magellanic Cloud is enormous, but when compared to our own galaxy it seems very humble indeed, stretching just 14 000 light-years, which is about ten times smaller than the Milky Way!
Cool fact: If you look up into a starry night sky, the most distant object you can see with your naked eye is the Andromeda Galaxy, which is over two and a half million light-years away! Think how big it must be, to be so far away and still be bright enough for you to see it without a telescope! | <urn:uuid:1fc8f40d-b7f0-4c16-a6ea-62d93e5c167f> | CC-MAIN-2016-26 | http://www.eso.org/public/ireland/news/eso1348/kids/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00100-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.950195 | 444 | 4.4375 | 4 |
How to make a programming language?Ok, anyone else? Aramil I found stuff on it but I wasnt sure what to do.. could you explain more?
How to make a programming language?Ok, first please no one tell me how hard it is and stuff I know that. Any pointers? I want to make...
Sleep For windowsworks like a charm :)
Sleep For windowsiF I REMOVE THE \N IT WORKs but it need a line break.
Sleep For windowsOk works. This is my full code
while (pause == 1)
date += 1;
cout << date + "\n";...
This user does not accept Private Messages | <urn:uuid:4f815da8-0898-43be-8c02-c16570226126> | CC-MAIN-2016-26 | http://www.cplusplus.com/user/sherlock/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00049-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.926425 | 141 | 3.0625 | 3 |
Examines the aesthetics of Plotinus, Friedrich Wilhelm Joseph von Schelling, and Georg Wilhelm Friedrich Hegel. Describes the Platonic bases of the aesthetics of Plotinus, and the Plotinian bases of the aesthetics of Schelling and Hegel in the Philosophy of Spirit, Identity Philosophy (the relation between intellect and nature), and Transcendental Idealism. The book explores the concept of art as philosophy, as a product of mind, and as an instrument of intellect in the relation between reason and perception. Particular concepts analyzed include the dialectics of universal and particular, subjective and objective, consciousness and self-consciousness, thought and matter in representation (Darstellung), and being-in-itself (Ansich) and being-for-self (Fursich), as they are manifest in artistic representation.
Chapters: 1. Introduction; 2. The Symposium and the Aesthetics of Plotinus; 3. The Aesthetics of Schelling: The Philosophy of Art; Bruno, or On the Natural and the Divine Principle of Things; System of Transcendental Idealism; 4. Plotinian Hypostases in Hegel's Phenomenology of Spirit; 5. The Aesthetics of Hegel: Introductory Lectures on Aesthetics; Phenomenology of Spirit; Philosophy of Mind; 6. Architecture and the Philosophy of Spirit
My Role: Author | <urn:uuid:bef8dcdf-c28c-4531-8c17-d7d96493038a> | CC-MAIN-2016-26 | http://archinect.com/johnhendrix/project/aesthetics-and-the-philosophy-of-spirit | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00017-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.835095 | 281 | 3.25 | 3 |
The guinea pig portraits in Pryde’s Scale series conjure associations both with pets in stock photography and with laboratory research, where rodents are commonly used. Additionally, there are historical links to the slave trade. Originally from South America, in the 1600s guinea pigs were shipped to Europe as curiosities aboard slave-trading vessels, called Guineamen, that traveled between Guinea, England, and South America—one possible source for the animals’ name. Pryde deploys words and props—ribbon, string, and Mylar—to instill personality in the animals’ deadpan expressions but also plays with photographic conventions, manipulating the subjects through closeups, double exposures, and shifts in focus.
In her series It’s Not My Body, Pryde makes reference to the history of darkroom experimentation and to contemporary medical-imaging techniques. She superimposes low-resolution MRI scans of a human embryo in its mother against desert landscapes shot through tinted filters, engaging questions about the reproduction of images and the impact visuals have on political debates surrounding “personhood” and a woman’s right to choose. | <urn:uuid:2190069d-2685-4998-a0b4-96999822a2b5> | CC-MAIN-2016-26 | http://www.moma.org/interactives/exhibitions/2013/newphotography/josephine-pryde/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00196-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.938645 | 237 | 2.546875 | 3 |
The following readings are suggested for Music Theory majors when they first begin their study. Music Theory is a widely diverse field, with many different topics and approaches. While this list is but a mere sampling of possible readings, it gives a sense of the breadth and depth of the field.
See also: Additional Readings
Bent, Ian. Analysis (New York: W. W. Norton, 1980 & 1987).
Cone, Edward T. Music: A View from Delft, ed., Morgan, Robert P. (Chicago & London: University of Chicago Press, 1989).
- Cone, Edward T., "Beyond Analysis." Perspectives of New Music 6/1 (1967): 33-51.
- Lewin, David, "Beyond the Beyond." Perspectives of New Music 7/2 (1969): 59-69.
- Cone's response: Perspectives of New Music 7/2: 70-72.
Cook, Nicholas. A Guide to Musical Analysis (New York: George Braziller, 1987).
Dunsby, Jonathan and Whitall, Arnold. Music Analysis in Theory and Practice (London, Boston: Faber Music, c1988): 11-73 [tonal] & 105-172 [atonal]; 209-232 [music & meaning].
Katz, Adele T. "Heinrich Schenker’s Method of Analysis," Musical Quarterly, XXI/3 (1935): 311-29.
McCreless, Patrick. "Rethinking Contemporary Music Theory," in Keeping Score: Music, Disciplinarity, Culture, eds. Schwarz, David, Kassabian, Anahid, and Siegel, Lawrence (University Press of Virginia, 1997): 13-53.
Tovey, Donald F., "The Larger Tonality," in Beethoven (Oxford: Oxford University Press, 1944): 28-40.
Models of Analysis
Stein, Deborah. Engaging Music: Essays in Music Analysis (New York & Oxford: Oxford University Press, 2005) [Introductory essays on Phrase Rhythm, Hypermeter, 12-tone analysis, Form in Rock, atonal music].
Writing Analytical Prose
Guck, Marion A. "Analytical Fictions," Music Theory Spectrum 16/2 (1994): 216-231.
Marvin, William. "Introduction to Writing Analytical Essays," in Engaging Music: Essays in Music Analysis (New York & Oxford: Oxford University Press, 2005).
Bailey, Robert, ed. "Analytical Study" in Richard Wagner: Prelude and Transfiguration from Tristan und Isolde. (New York: W. W. Norton, 1985): 116-134.
Harrison, Daniel. "Supplement to the Theory of Augmented-Sixth Chords," Music Theory Spectrum, Vol. 17, No. 2 (Autumn, 1995): 170-195.
Rosen, Charles. The Romantic Generation (Cambridge, MA: Harvard University Press): 1-115.
Stein, Deborah and Spillman, Robert. Poetry into Song: Performance & Analysis of Lieder (NY & Oxford: Oxford University Press, 1996): 125-137.
Tovey, Donald. "Tonality in Schubert," in The Main Stream of Music and Other Essays (Meridian Books, Inc: New York, 1949): 134-159.
Music and Cognition
Davidson, Lyle, and Scripp, Larry. "Surveying the coordinates of cognitive skills in music," in The Handbook for Research in Music Teaching and Learning, ed. Colwell, Richard (New York: Macmillan, 1992): 392-413.
Huron, David. Sweet Anticipation: Music and the Psychology of Expectation (Bradford Books, 2008): 1-18.
Lewin, David. "Music Theory, Phenomenology, and Modes of Perception," Music Perception 3/4 (1986): 327-92.
Caplin, William. Classical Form (New York and Oxford: Oxford University Press, 1999): 1–21.
Hepokoski, James and Darcy, Warren. Elements of Sonata Theory (New York and Oxford: Oxford University Press, 2006): 23–50.
Rosen, Charles. The Classical Style (New York: W.W. Norton, 1972): 19-42.
____________. Sonata Forms (New York: W.W. Norton, 1980: 96-126.
History of Theory
Christensen, Thomas. "Music Theory and its Histories," Music Theory and the Exploration of the Past, eds. Hatch, Christopher and Bernstein, David (New York & Chicago: University of Chicago Press, 1993).
Music and Meaning
Agawu, Kofi. Playing with Signs: A Semiotic Interpretation of Classic Music (Princeton, New Jersey: Princeton University Press, 1991): 26-50.
__________. Music as Discourse: Semiotic Adventures in Romantic Music (Oxford & New York: Oxford University Press, 2009): 41-74.
Hatten, Robert. Musical Meaning in Beethoven: Markedness, Correlation, and Interpretation. (Bloomington: Indiana University Press, 1994): 29-66.
Maus, Fred. "Music as Drama," in Music and Meaning, ed. Robinson, Jenefer Robinson (Ithaca & London: Cornell University Press): 105-130.
Cohn, Richard. "Introduction to Neo-Riemannian Theory: A Survey and a Historical Perspective," Journal of Music Theory 42/2 (1998): 167-80.
Music Theory Pedagogy
__________. "A developmental view of sight-singing: The internalization of tonal and temporal space," Journal of Music Theory Pedagogy, 2/1 (1988): 10-23.
__________. "Framing the dimensions of sight-singing: Teaching towards musical development," Journal of Music Theory Pedagogy, 2/1 (1988): 24-50.
_________ and Meyaard, J. Sight-singing ability: A quantitative and a qualitative point of view. Journal of Music Theory Pedagogy, 2/1 (1988): 51-68.
Rogers, Michael. Teaching Approaches to Music Theory, 2nd ed. (Carbondale, IL: Southern Illinois University Press, 2003).
Karpinski, Gary. Aural Skills Acquisition: The Development of Listening, Reading, and Performing Skills in College-Level Musicians (Oxford, UK & New York: Oxford University Press, 2000).
Performance and Analysis
Cook, Nicholas. "Analysing Performance and Performing Analysis," in Rethinking Music, eds. Cook, Nicholas and Everist, Mark (NY and Oxford: Oxford University Press, 1999): 239-61.
Lester, Joel. "Performance and analysis: interaction and interpretation," in The Practice of Performance, ed. Rink, John, (Cambridge, UK & New York: Cambridge University Press, 1995): 197-216.
Levy, Janet. "Beginning-Ending Ambiguity: Consequences of Performance Choices," in The Practice of Performance, ed. Rink, John, (Cambridge, UK & New York: Cambridge University Press, 1995): 150-69.
Rink, John. "Analysis and (or?) performance," Musical Performance: A Guide to Understanding, (Cambridge, UK & New York: Cambridge University Press, 2002): 35-58.
Rhythm and Meter
Lerdahl, Fred and Jackendoff, Ray. A Generative Theory of Tonal Music (Cambridge, MA: The MIT Press, 1983).
Lester, Joel. The Rhythms of Tonal Music (Carbondale, ILL: Southern Illinois University Press, 1986).
Rothstein, William. Phrase Rhythm in Tonal Music (New York: Schirmer, 1989): 3-63.
Temperley, David. "Hypermetrical Transitions," Music Theory Spectrum 30/2 (2008): 305-25.
Straus, Joseph N. "A Primer for Atonal Set Theory," College Music Symposium, vol. 31, pp. 1-26. (College Music Society, 1991).
____________. “Two Post-tonal Analyses,” in Engaging Music: Essays in Music Analysis (New York & Oxford: Oxford University Press, 2005): 215-225.
See also: Additional Readings | <urn:uuid:b99d93fd-bfae-4615-9ec7-5e7a855d5abc> | CC-MAIN-2016-26 | http://necmusic.edu/music-theory/readings-intro | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00141-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.676005 | 1,789 | 2.640625 | 3 |
What are Bioretention Facilities?
Bioretention is a practice to manage and treat stormwater runoff by using a conditioned planting soil bed and planting materials to filter runoff stored within a shallow depression.
The system can include the following components: a pretreatment filter strip of grass area, a shallow surface water ponding area, a bioretention planting area, a soil zone, an under drain system, and an overflow outlet structure.
Bioretention facilities can be distributed across a development site which can result in smaller, more manageable stormwater management, and thus, helping control runoff close to the source where it is generated.
Bioretention facilities capture rainwater runoff to be filtered through a prepared soil medium.
Once the soil medium reaches capacity, stormwater begins to pool at the surface of the planting soil. | <urn:uuid:a33e05d5-6849-48a8-bda0-05ca4b90eae9> | CC-MAIN-2016-26 | http://owatonna.lib.mn.us/stormwater/post-development/bioretention-facilities | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393997.50/warc/CC-MAIN-20160624154953-00063-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.903537 | 166 | 3.078125 | 3 |
Reinhart spoke at a Lunchtime Expedition lecture at Buffalo Bill Historical Center’s Draper Museum of Natural History on Nov. 1.
Whitebark is called a keystone species — keystone meaning wildlife such as red squirrels, Clark’s nutcracker, grizzly bears and other fauna depend on the the tree’s pine nuts for food, Reinhart said.
Whitebark helps regulate snow melt and reduce soil erosion, said a June 2012 report from the U.S. Department of Agriculture.
There are about 2.5 million acres of whitebark pine in the Greater Yellowstone Area’s 24 million acres, Reinhart said.
Whitebark pine stands are in peril, but Reinhart conveyed optimism in an American Forests video he showed.
Managers and conservation groups are working together to understand and protect whitebark pine across high-elevation landscapes. “I am hopeful about whitebark pine in the Greater Yellowstone Area,” he said in the video.
Whitebark pine was considered for Endangered Species Act listing in 2011. The U.S. Fish and Wildlife Service said listing was warranted, but precluded listing it because other species are in greater need of immediate listing. The service will review the tree’s condition annually, said a statement from the service in July 2011.
A whitebark pine may produce good cone crops every three to five years. Other years, production may be good, fair or poor, Reinhart said.
Almost all natural regeneration is accomplished by the nutcracker jay, which caches the seeds. The nutcrackers pick the seeds from the cones and initiate the germination process while transporting the seeds to their stockpiles. The old seed stashes will grow into clumps of five to seven trees, Reinhart said.
Seeds cached in open areas germinate the best, said Ellen Jungck, south zone silviculturist and timber management assistant for the U.S. Forest Service in Dubois.
In northwestern Montana’s Glacier Park, there is 50 to 90 percent whitebark mortality. In the Bob Marshall Wilderness, also mostly in northwestern Montana, mortality is 20 to 60 percent. In the Greater Yellowstone Area, mortality is 10 to 30 percent, Reinhart said.
Blister rust fares better in the wetter climes such as northwestern Montana, Reinhart said.
Rust fungus spores start on ribes species such as ferns and currants and spread to white pine from there. Spores can travel 10 to 12 miles. Tell signs are cankers, oozing sap and aecia, or roughened bark, Reinhart said.
Blister rust arrived in the United States in the early 1900s. By 1945, blister rust was discovered in the Greater Yellowstone Area.
“We’ve had it here for quite a while,” Reinhart said.
Beetles infested many Rocky Mountain forests in the 1930s and other subsequent times, but then only in increments of a few years. The latest beetle infestation has been in the Greater Yellowstone Area since 2000.
It takes winters with extended periods of temperatures of 20 degrees below zero or colder to kill beetles, and milder winters seem more common now, Reinhart said.
To help offset whitebark pine mortality due to blister rust, the Greater Yellowstone Coordinating Committee’s Whitebark Pine Subcommittee is planting rust-resistant whitebark pine in the Greater Yellowstone Area, said Reinhart, who is a subcommittee member.
A 15-acre nursery is located in the Gallatin National Forest south of Bozeman, Mont. There, seedlings resistant to blister rust are being grown, and limbs from older trees are being grafted onto the young trees to hasten seed production, said an Associated Press article in April.
Normally, it takes 30 to 50 years for whitebark to produce cones, said Jay Frederick, a wildlife biologist in the Beaverhead-Deerlodge National Forest in the AP story.
The plan was to plant seedlings in 306 acres in the Caribou-Targhee, Shoshone and other national forests this year. In 2013, 345 acres are planned for planting and 473 acres in 2014, said the AP story.
More than 50 percent of whitebark pine in the Greater Yellowstone Area grows in wilderness areas, Reinhart said.
Fire suppression is not necessarily beneficial in wilderness areas, because natural fires create mosaic or checkerboard patterns, making it harder for beetles or rust to hopscotch from tree to tree. And fires create different age classes within the mosaics. Beetles usually prefer older trees, Reinhart said.
Designated wilderness areas mandate little or no intervention by humans, but a high percentage of whitebark inhabit those places.
Planting whitebark in wilderness should be considered. After all, Reinhart said, invasive species such as weeds are attacked in wilderness areas, and climate change is human-caused.
“It’s just something we need to consider for the future,” Reinhart said. | <urn:uuid:1933b021-8040-427e-8357-b8de6e62a7a1> | CC-MAIN-2016-26 | http://www.powelltribune.com/news/item/10338-protecting-vanishing-whitebark-pine | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00130-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.928015 | 1,059 | 3.296875 | 3 |
- An example of disclosure is the announcement of a family secret.
- An example of a disclosure is the family secret which is told.
- a disclosing or being disclosed
- a thing disclosed; revelation
- The act or process of revealing or uncovering.
- Something uncovered; a revelation.
From Latin dis-+clausus, literally away+enclosed.
disclosure - Investment & Finance Definition
Information released to the public by companies in order to comply with stock exchange and Securities and Exchange Commission rules requiring that the public and professional investors have simultaneous access to information about the company, its products, and specific transactions.
disclosure - Legal Definition | <urn:uuid:087426f0-4b16-4110-b69f-185af98c8d7c> | CC-MAIN-2016-26 | http://www.yourdictionary.com/disclosure | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00078-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.893961 | 135 | 3.03125 | 3 |
A bloodstained primer and a jarful of pennies represent freedom in this story about the real-life Alec Turner, who was born a slave in Virginia in 1845. Based on the recollections of his daughter Daisy, young Alecs journey takes shape in the form of soldier-shaped cookies, a cruel mistress, and her kind granddaughter, Miss Zephie. Like many slave narratives written for adults, this inspiring tale locates the longing for freedom in cruel punishments, exemplary perseverance, and the importance of learning to read.
Five-year-old Alec is sentenced to labor under the hot plantation sun for biting the heads off a plateful of soldier cookies. After three years, the overseer rewards his diligence by sending him to work in the milk house, where he fills bottles and makes deliveries. He saves the pennies he receives as tips in a jar that he keeps hidden in his cabin.
Alec is reluctant when Miss Zephie announces her intention to teach him to read. His mother reminds him, “they put you in the field for eating cookies,” and insists that Miss Zephie is “trouble.” With refreshing honesty, the story refuses to idealize Miss Zephie, a privileged young woman used to having her own way, and instead focuses on Alecs awareness that she might not be entirely trustworthy. The connection between literacy and freedom is irresistible, however, and Alec allows his thirst for knowledge to conquer his fears.
Alecs Primer is one of several texts about the Turner family produced by the Vermont Folklife Center. Daisy and the Doll recounts a story from Daisy Turners childhood in rural Vermont. The cassette, Journeys End: The Memories and Traditions of Daisy Turner and Her Family, won the Peabody Award for Documentary Radio Programming in 1990.
The author, a renowned writer, scholar, and Coretta Scott King Award winner (for Justin and the Best Biscuits in the World) tells Alecs story in clear, understated prose that complements the illustrators evocative artwork. Johnson has exhibited his paintings in galleries around the country and illustrated several books, including Daisy and the Doll and If You Traveled on the Underground Railroad. His Mistress Gouldin is a vision of evil as she squints and shouts, and Alec glowers his responses more realistically than any words could render. The result is an expressive book to which children will respond on many levels.
Disclosure: This article is not an endorsement, but a review. The author provided free copies of his/her book to have his/her book reviewed by a professional reviewer. No fee was paid by the author for this review. Foreword Reviews only recommends books that we love and make no guarantee that the author will receive a positive review. Foreword Magazine, Inc. is disclosing this in accordance with the Federal Trade Commission’s 16 CFR, Part 255. | <urn:uuid:f878e918-245a-4f46-aa17-2ff25e120b9c> | CC-MAIN-2016-26 | https://www.forewordreviews.com/reviews/alecs-primer/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00087-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.962857 | 593 | 2.671875 | 3 |
Recent years have seen an expansion in the number of conditions that are recognized as having a link with diabetes. In people with sleep apnoea breathing stops briefly but repeatedly during sleep. It is commonly associated with obesity, and therefore frequently occurs in people with type 2 diabetes. However, recent research demonstrates the likelihood of a relationship between obstructive sleep apnoea and diabetes that is independent of obesity. The links between the conditions are particularly important as both increase the risk of cardiovascular disease. While the enormity of the type 2 diabetes epidemic is well recognized, disorders of breathing during sleep are not, in spite of the significant contribution they make to the burden of disease in people and the financial burden on communities.
obstructive sleep apnoea, snoring, sleeping, continuous positive airways pressure, CPAP | <urn:uuid:06a61d76-e68e-40e7-a3ce-843f62adbfe2> | CC-MAIN-2016-26 | http://www.idf.org/diabetesvoice/articles/obstructive-sleep-apnoea-and-type-2-diabetes-the-idf-consensus?language=en | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397695.90/warc/CC-MAIN-20160624154957-00162-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.970513 | 165 | 2.828125 | 3 |
Researchers at the University of Michigan announced they’ve developed a crucial new equation that can describe “the relationship of current to voltage at the junctions of organic semiconductors,” which could lead to big breakthroughs in solar cells and high-efficiency lighting.
Computer chips only became possible through a 1949 equation developed by William Shockley that accurately described the relationship between voltage and electric current in silicon and other inorganic semiconductors. One technology site notes that this new equation “will lead to better organic semiconductors that could conceivably change the future as much as the computer has changed our lives in the last 61 years.”
“We’re not making complicated circuits with them yet…” explains the school’s Vice President of Research, but “from my perspective, it’s a very significant advance.”
Latest posts by moezilla (see all)
- Amazon Patents Strange New Lightweight, Transparent Kindle - Apr 7, 2013
- Cypherpunk Pioneers Warn of a “Coming Surveillance Dystopia” - Mar 13, 2013
- How a Chinese Hacker Tried to Blackmail a Top Executive - Feb 11, 2013 | <urn:uuid:552563ea-b300-4e5a-953c-261a265d2416> | CC-MAIN-2016-26 | http://disinfo.com/2010/10/new-equation-breakthrough-in-solar-research/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394937.4/warc/CC-MAIN-20160624154954-00192-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.948621 | 250 | 3.25 | 3 |
As part of his PhD research work at York University, Toronto J Scott MacIvor samples pollen from bees and flowers to study pollination in cities. The installation at Grow Op seeks to increase awareness of flowers as providers of pollen and the role urban citizens play in structuring urban food webs.
Pollen is essential in flowering plant reproduction. Pollen moves from one flower to another, which develop into seeds, nuts, and fruit. Many flowers need insects to move their pollen grains. Bees are the best movers-of-pollen, but they don’t do it for free. Bees eat pollen from flowering plants, shrubs, and trees. Bees are also very diverse, with over 150 species in Toronto, each hungry for different pollen types at different times of the year.
GROW OP will be on public display at the Gladstone April 24 – 27, 2014
Curated by Victoria Taylor, and featuring 26 new projects, Grow Op 2014 is the Gladstone Hotel’s annual alternative landscape and urban design event, celebrating innovative ideas and conceptual responses to sustainable placemaking across a broad range of creative practices.
For press and media inquiries please contact the Gladstone Hotel’s Managing Director – Artistic Projects, Britt Welter-Nolan | <urn:uuid:57cbe17b-166a-4665-8d02-aae5b0677bf6> | CC-MAIN-2016-26 | http://www.gladstonehotel.com/grow-op/gladstone-grow-op-j-scott-macivor-ally-ruttan-pollen-party/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397797.77/warc/CC-MAIN-20160624154957-00030-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.927692 | 257 | 2.640625 | 3 |
In urban planning, sophisticated simulation models are key tools to estimate future population growth for measuring the impact of planning decisions on urban developments and the environment. Simulated population projections usually result in large, macro-scale, multivariate geospatial data sets. Millions of records have to be processed, stored, and visualized to help planners explore and analyze complex population patterns. We introduce a database driven framework for visualizing geospatial multidimensional simulation data based on the output from UrbanSim, a software for the analysis and planning of urban developments. The designed framework is extendable and aims at integrating empirical-stochastic methods and urban simulation models with techniques developed for information visualization and cartography. First, we develop an empirical model for the estimation of residential building types based on demographic household characteristics. The predicted dwelling type information is important for the analysis of future material use, carbon footprint calculations, and for visualizing simultaneously the results of land usage, density, and other significant parameters in 3D space. Our model uses multinomial logistic regression to derive building types at different scales. The estimated regression coefficients are applied to UrbanSim output in order to predict residential building types. The simulation results and the estimated building types are managed in an object-relational geodatabase. From the database, density, building types, and significant demographic variables are visually encoded as scalable, georeferenced 3D geometries and displayed on top of aerial photographs in a Google Earth visual synthesis. The geodatabase can be accessed and the visualization parameters can be chosen through a web-based user interface. The geometries are encoded in KML, Google's markup language, as ready-to-visualize data sets. The goal is to enhance human cognition by displaying abstract representations of multidimensional data sets in a realistic context and thus to support decision making in planning processes.
The visualization of numerical fluid flow datasets is essential to the engineering processes that motivate their computational simulation. To address the need for visual representations that convey meaningful relations and enable a deep understanding of flow structures, the discipline of Flow Visualization has produced many methods and schemes that are tailored to a variety of visualization tasks. The ever increasing complexity of modern flow simulations, however, puts an enormous demand on these methods. The study of vortex breakdown, for example, which is a highly transient and inherently three-dimensional flow pattern with substantial impact wherever it appears, has driven current techniques to their limits. In this thesis, we propose several novel visualization methods that significantly advance the state of the art in the visualization of complex flow structures. First, we propose a novel scheme for the construction of stream surfaces from the trajectories of particles embedded in a flow. These surfaces are extremely useful since they naturally exploit coherence between neighboring trajectories and are highly illustrative in nature. We overcome the limitations of existing stream surface algorithms that yield poor results in complex flows, and show how the resulting surfaces can be used a building blocks for advanced flow visualization techniques. Moreover, we present a visualization method that is based on moving section planes that travel through a dataset and sample the flow. By considering the changes to the flow topology on the plane as it moves, we obtain a method of visualizing topological structures in three-dimensional flows that are not accessible by conventional topological methods. On the same algorithmic basis, we construct an algorithm for the tracking of critical points in such flows, thereby enabling the treatment of time-dependent datasets. Last, we address some problems with the recently introduced Lagrangian techniques. While conceptually elegant and generally applicable, they suffer from an enormous computational cost that we significantly use by developing an adaptive approximation algorithm. This allows the application of such methods on very large and complex numerical simulations. Throughout this thesis, we will be concerned with flow visualization aspect of general practical significance but we will particularly emphasize the remarkably challenging visualization of the vortex breakdown phenomenon.
This technical report is the Emerging Trends proceedings of the 20th International Conference on Theorem Proving in Higher Order Logics (TPHOLs 2007), which was held during 10-13 September in Kaiserslautern, Germany. TPHOLs covers all aspects of theorem proving in higher order logics as well as related topics in theorem proving and verification.
Modelling languages are important in the process of software development. The suitability of a modelling language for a project depends on its applicability to the target domain. Here, domain-specific languages have an advantage over more general modelling languages. On the other hand, modelling languages like the Unified Modeling Language can be used in a wide range of domains, which supports the reuse of development knowledge between projects. This thesis treats the syntactical and semantical harmonisation of modelling languages and their combined use, and the handling of complexity of modelling languages by providing language subsets - called language profiles - with tailor-made formal semantics definitions, generated by a profile tool. We focus on the widely-used modelling languages SDL and UML, and formal semantics definitions specified using Abstract State Machines.
Calibration of robots has become a research field of great importance over the last decades especially in the field industrial robotics. The main reason for this is that the field of application was significantly broadened due to an increasing number of fully automated or robot assisted tasks to be performed. Those applications require significantly higher level of accuracy due to more delicate tasks that need to be fulfilled (e.g. assembly in the semiconductor industry or robot assisted medical surgery). In the past, (industrial) robot calibration had to be performed manually for every single robot under lab conditions in a long and cost intensive process. Expensive and complex measurement systems had to be operated by highly trained personnel. The result of this process is a set of measurements representing the robot pose in the task space (i.e. world coordinate system) and as joint encoder values. To determine the deviation, the robot pose indicated by the internal joint encoder values has to be compared to the physical pose (i.e. external measurement data). Hence, the errors in the kinematic model of the robot can be computed and therefore later on compensated. These errors are inevitable and caused by varying manufacturing tolerances and other sources of error (e.g. friction and deflection). They have to be compensated in order to achieve sufficient accuracy for the given tasks. Furthermore for performance, maintenance, or quality assurance reasons the robots may have to undergo the calibration process in constant time intervals to monitor and compensate e.g. ageing effects such as wear and tear. In modern production processes old fashioned procedures like the one mentioned above are no longer suitable. Therefore a new method has to be found that is less time consuming, more cost effective, and involves less (or in the long term even no) human interaction in the calibration process.
The provision of quality-of-service (QoS) on the network layer is a major challenge in communication networks. This applies particularly to mobile ad-hoc networks (MANETs) in the area of Ambient Intelligence (AmI), especially with the increasing use of delay and bandwidth sensitive applications. The focus of this survey lies on the classification and analysis of selected QoS routing protocols in the domain of mobile ad-hoc networks. Each protocol is briefly described and assessed, and the results are summarized in multiple tables.
Abstraction is intensively used in the verification of large, complex or infinite-state systems. With abstractions getting more complex it is often difficult to see whether they are valid. However, for using abstraction in model checking it has to be ensured that properties are preserved. In this paper, we use a translation validation approach to verify property preservation of system abstractions. We formulate a correctness criterion based on simulation between concrete and abstract system for a property to be verified. For each distinct run of the abstraction procedure the correctness is verified in the theorem prover Isabelle/HOL. This technique is applied in the verification of embedded adaptive systems. This paper is an extended version a previously published work.
The Super-Peer Selection Problem is an optimization problem in network topology construction. It may be cast as a special case of a Hub Location Problem, more exactly an Uncapacitated Single Allocation p-Hub Median Problem with equal weights. We show that this problem is still NP-hard by reduction from Max Clique.
Guaranteeing correctness of compilation is a ma jor precondition for correct software. Code generation can be one of the most error-prone tasks in a compiler. One way to achieve trusted compilation is certifying compilation. A certifying compiler generates for each run a proof that it has performed the compilation run correctly. The proof is checked in a separate theorem prover. If the theorem prover is content with the proof, one can be sure that the compiler produced correct code. This paper presents a certifying code generation phase for a compiler translating an intermediate language into assembler code. The time spent for checking the proofs is the bottleneck of certifying compilation. We exhibit an improved framework for certifying compilation and considerable advances to overcome this bottleneck. We compare our implementation featuring the Coq theorem prover to an older implementation. Our current implementation is feasible for medium to large sized programs.
The provision of network Quality-of-Service (network QoS) in wireless (ad-hoc) networks is a major challenge in the development of future communication systems. Before designing and implementing these systems, the network QoS requirements are to be specified. Since QoS functionalities are integrated across layers and hence QoS specifications exist on different system layers, a QoS mapping technique is needed to translate the specifications into each other. In this paper, we formalize the relationship between layers. Based on a comprehensive and holistic formalization of network QoS requirements, we define two kinds of QoS mappings. QoS domain mappings associate QoS domains of two abstraction levels. QoS scalability mappings associate utility and cost functions of two abstraction levels. We illustrate our approach by examples from the case study Wireless Video Transmission. | <urn:uuid:67775683-3b32-47a0-89e5-2c50c75cb5ef> | CC-MAIN-2016-26 | https://kluedo.ub.uni-kl.de/solrsearch/index/search/searchtype/collection/id/15995/start/0/rows/10/yearfq/2007/sortfield/title/sortorder/desc | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397873.63/warc/CC-MAIN-20160624154957-00199-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.915147 | 2,048 | 2.59375 | 3 |
David Nasaw has written a sparkling social history of twentieth-century show business and of the new American public that assembled in the city's pleasure palaces, parks, theaters, nickelodeons, world's fair midways, and dance halls. The new amusement centers welcomed women, men, and children, native-born and immigrant, rich, poor and middling. Only African Americans were excluded or segregated in the audience, though they were overrepresented in parodic form on stage. This stigmatization of the African American, Nasaw argues, was the glue that cemented an otherwise disparate audience, muting social distinctions among "whites," and creating a common national culture.
Back to top
Rent Going Out 1st edition today, or search our site for other textbooks by David Nasaw. Every textbook comes with a 21-day "Any Reason" guarantee. Published by Harvard University Press.
Need help ASAP? We have you covered with 24/7 instant online tutoring. Connect with one of our tutors now. | <urn:uuid:53c4f519-a9ab-4b0d-9039-61b950cecda4> | CC-MAIN-2016-26 | http://www.chegg.com/textbooks/going-out-1st-edition-9780674356221-0674356225 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00053-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.952375 | 209 | 2.90625 | 3 |
Article 12 - Equal recognition as a person before the law
Documents | Article
Seventh Session | Fifth Session | Fourth Session | Third Session
Working Group | References
International Disability Caucus
Access to Justice
States Parties shall ensure effective access to justice for persons with disabilities on an equal basis with others, facilitating their effective role as direct and indirect participants in all legal proceedings, including investigative and other preliminary stages.
Colombia - Draft Article 9
EQUAL RECOGNITION AS A PERSON BEFORE THE LAW
States Parties shall:
(a) Recognize persons with disabilities as individuals with equal rights before the law;
(b) Accept that persons with disabilities have full legal capacity on an equal basis except as provided by law;
(c) Ensure that where assistance is necessary to exercise that legal capacity:
(i) The assistance is to the extent possible proportional to the degree of assistance required by the person concerned and tailored to their circumstances, and does not undermine the legal capacity, rights and freedoms of the person;
(ii) Relevant decisions are taken by a competent, (independent) and impartial authority in accordance with a procedure established by law and with the application of relevant legal safeguards (including periodic review)
(d) Ensure that persons with disabilities who experience difficulty in asserting their rights, in understanding information and in communicating have access to assistance to understand information presented to them and to express their decisions, choices and preferences, to participate in all stages of procedure in courts and tribunals, as well as to enter into binding agreements or contracts, to sign documents and act as witnesses;
(e) Take all appropriate and effective measures to ensure the equal right of persons with disabilities to own, inherit, use or otherwise dispose of property, to control their own financial affairs and to have equal access to bank loans, mortgages and other forms of financial credit;
[Proposal by the African Group excluding its paragraph iii)]
Costa Rica- Draft Article 9
EQUAL RECOGNITION AS A PERSON BEFORE THE LAW
States Parties shall:
a. Recognize persons with disabilities as individuals with equal rights and obligations before the law [from proposals by Mexico and EU]
b. Recognize the legal capacity of persons with disabilities on an equal basis with others in all fields [new language based on ideas of WG]
c. Ensure that where assistance is necessary to exercise that legal capacity:
i. Such assistance is adequate to meet the person's requirements and does not undermine his/her rights and freedoms [from proposals by WG and Uganda ]
ii Relevant decisions are taken by a competent, independent and impartial authority in accordance with a procedure established by law and with the application of relevant legal safeguards, including provisions for periodic review [from proposals by EU and Costa Rica]
d. Take all necessary measures to ensure everyone whose rights and freedoms as recognized in this convention are violated should have an effective remedy before a national authority, notwithstanding that the violation has be committed in an official capacity [from proposal by Costa Rica, this could be placed elsewhere]
Delete paras d), e), f) and g) of the proposal by Japan because their content is already covered in this proposal and also in art. 19.
EQUAL RECOGNITION AS A PERSON BEFORE THE LAW
States Parties shall:
(a) Recognise persons with disabilities as individuals with rights before the law equal to all other persons;
(b) Accept that persons with disabilities have full legal capacity on an equal basis as others 1 , including in financial matters;
EU Proposal: EU suggests replacing (a) and (b) with the following paragraph:“Recognise persons with disabilities as individuals with equal rights before the law and guarantee equality before the law, without discrimination against persons with disabilities;”.
(c) ensure that where assistance is necessary to exercise that legal capacity:
(i) the assistance is proportional to the degree of assistance required by the person concerned and tailored to their circumstances, and does not interfere with the legal capacity, rights and freedoms of the person;
Proposal: EU suggests ending paragraph (c) (i) after “their circumstances”.
(ii)relevant decisions are taken by a competent, independent and impartical authority in accordance with a procedure established by law and with the application of relevant legal safeguards including provisions for review; 2
EU Proposal 4th AHC: replace paragraph (c) with Canadian language:
States Parties shall ensure that where
adults persons with disabilities
need support to exercise their legal capacity, including assistance to understand
information and to express their decisions, choices and wishes, the assistance
is proportional to the degree of support required and tailored to the adult's
person's individual circumstances.
1. Relevant decisions, inter alia on the loss or restriction of legal capacity, are taken by a competent, independent and impartial authority in accordance with a procedure established by law and with the application of relevant legal safeguards including provisions for review;
States Parties shall provide by law for a procedure with appropriate safeguards
for the appointment of a personal representative to exercise legal capacity
adult's person's behalf. Such an appointment
should be guided by principles consistent with this Convention and international
human rights law, including:
ensuring that the appointment is proportional to the
person's degree of legal incapacity and tailored to the adult's
person's individual circumstances; and
(b) ensuring that personal representatives take into account, to the maximum extent possible, the
adult's person's decisions, choices and wishes.”
(d) ensure that persons with disabilities who experience difficulty in asserting their rights, in understanding information, and in communicating, have access to assistance to understand information presented to them and to express their decisions, choices and preferences, as well as to enter into binding agreements or contracts, to sign documents, and act as witnesses; 3
EU proposal: Delete 9(d)
(e) take all appropriate and effective measures to ensure the equal right of persons with disabilities to own or inherit property, to control their own financial affairs, and to have equal access to bank loans, mortgage and other forms of financial credit;
EU proposal: Delete 9(e)
(f) ensure that persons with disabilities are not arbitrarily deprived of their property.
EU proposal 4th AHC to renumber 9(f) into 9(4)(5)
As stated in the course of the current session, the Government of Japan wishes to see that our proposal on article 9 paragraph (g) tabled in the 3rd and 4th AHC will now find a place under article 9 bis [Access to Justice] proposed by Chile, as a separate paragraph, which reads :
"Take appropriate and effective measures to eliminate physical and communication barriers and to reduce understanding difficulty of persons with disabilities in order to exercise the rights provided in Article 14 of the International Covenant on Civil and Political Rights."
To facilitate the effective role of the persons with disabilities in legal proceedings as stated in Art.9 bis, on an equal basis with others, reduction or removal of physical and communication barriers as well as understanding difficulty is fundamental for all persons with disabilities regardless their type of disability.
Article 9 bis is well drafted as a general statement, but has a room to be a bit further elaborated how we should facilitate their effective role, although we should avoid over-prescriptive languages.
- Information sheet
Supported Decision- Making vs. Guardianship
Guardianship is an ancient mechanism that was constructed without consulting people with disabilities. Guardianship laws assume that some people do not have the capacity to make legally binding decisions. We invite the Ad Hoc Committee to adopt a paradigm shift in which everyone has an equal legal capacity, without distinction based on disability.
Supported Decision-Making means a person may accept help in making decisions without relinquishing the right to make decisions. In supported decision-making, freedom of choice is never violated. Supported decision-making does not question the wisdom of a person's choices but allows everyone the dignity of risk.
Supported Decision-Making helps a person to understand information and make decisions based on his or her own preferences. A person with a learning disability might need help with reading, or may need support in focusing attention to make a decision. A person who has no verbal communication might have a trusted family member who interprets their non-verbal communications, such as positive or negative physical reactions, or uses Alternative and Augmentative Communication.
Guardianship laws theoretically protect people with disabilities from abuse but in practice they open the door to abuse. Guardianship facilitates institutionalization; the guardian can easily give consent even when the person opposes being institutionalized. One decision by the authorities and a person loses the right to decide where to live, loses the right to vote, the right to choose who to marry, the right to start a business. This results in living in a humiliating and degrading way.
- Draft proposal
1) States Parties reaffirm that persons with disabilities have the right to recognition everywhere as a person before the law.
2) States Parties shall recognise that persons with disabilities have, and are entitled to exercise and enjoy, legal capacity on an equal basis with others, in all fields.
3) States Parties shall:
a ) ensure that persons with disabilities are entitled to use support to exercise legal capacity, and that such support is adequate to meet the person's requirements , does not undermine the legal capacity or rights of the person , respect s the will and preferences of the person, and is free from conflict of interest and undue influence ;
b ) enact legislation and devise suitable procedures to facilitate access to, while preventing abuse of, supported decision-making.
- IDC on Article 9
If Disabled Peoples Organizations have no say in the decision-making about a convention to protect and defend our rights, that convention will be fatally flawed. We see the results in the discussion and amended text for articles 9 and 10.
Any form of substituted decision-making – guardianship, appointment of a personal representative, or determination of legal incapacity – excludes people with disabilities from rights that non-disabled men and women take for granted.
- IDC Response on Article 9
International Disability Caucus Rejects the Provision of Article 9 Dealing with Appointment of a Personal Representative
This Convention is aimed at promoting and protecting the rights of persons with disabilities, and not at maintaining discriminatory laws and practice that take away the personhood of persons with disabilities. The Convention must accordingly establish the principles required to empower persons with disabilities in the eyes of the law.
The Article on General Principles which received wide support from this Ad Hoc Committee includes
Article 2 is a substantive obligation as well as a means to interpret all the substantive obligations in this Convention.
The current draft of 9(3)(b) undermines, is inconsistent with, and violates these principles and obligations as well as the purpose of this Convention. Accordingly, paragraph 3(b) of article 9, providing for appointment of a personal representative for people with disabilities, is unacceptable to the International Disability Caucus.
Although an attempt was made to avoid offensive language, the effect of paragraph 2(b) is to endorse substituted decision-making, which is based on a concept of incapacity and takes away the person's right to make his or her own decisions. “Personal representative” is a term of art meaning “guardian”.
We applaud the delegations of Costa Rica and others that have called for deletion of paragraph b. The International Disability Caucus affirms that Supported Decision Making is the only paradigm for legal capacity that upholds the principles articulated in Article 2 of this Convention.
The International Disability Caucus is also concerned about two other aspects of this draft article. First, there is language in the chapeau of paragraph 3 that may inadvertently limit all the substantive obligations in that paragraph. We advocate moving the phrase ‘to the extent possible” so that it limits only the assurance that support will be provided, which is a resource-sensitive obligation and subject to the concept of progressive obligation that has been extensively discussed by this Committee.
Second, legal capacity has been differentiated from the capacity to act or exercise that legal capacity, and only equal legal capacity – not equal capacity to act - is guaranteed to people with disabilities. CEDAW, in guaranteeing women and men identical legal capacity, treats it as including capacity to act, for example by concluding contracts. Women and men with disabilities will have inferior rights to non-disabled women and men if equal capacity to act is not guaranteed in our Convention.
- Legal Capacity note
Capacity in law constructed by society:
The first thing to appreciate in relation to legal capacity is that it is socially constructed and is thus reflective of choices societies have made at different points of time. Historically capacity has been an attribute or a presumption that the law has conferred or denied from populations. A useful illustration of this process is provided by the legal management of the capacity of women. The negotiable content of the concept is again demonstrated by the Convention on the Rights of the Child acknowledging the evolving capacities of the child and explicitly incorporating the right to participation. (article 12) Therefore when we are asking for the legal disqualifications applicable against us (persons with psychosocial disability) to be lifted we are in a manner of speaking treading paths traversed by other excluded groups. We are saying that the allegation of incapacity that society makes in relation to some or all of us is false and we have a right to live like any other on our own terms.
Cognitive Capabilities Privileged in Legal Construction of Capacity
Whilst accepting the constructed nature of legal capacity (it is necessary to understand) that it is primarily constructed from a normative standard of cognitive capabilities. This privileging of cognitive capabilities is questionable as not all of us use cognitive capabilities to make our decisions. Should those of us who use an emotive or intuitive basis for reaching decisions be considered incapable? The law by according primacy to a certain way of being in the world seems to be manufacturing incapacity labels. If the presumption comes into being because of the way in which the law treats different kinds of intelligences then evidently a Disability Rights Convention needs to change this presumption and recognize these differences. This process would stand initiated if the Convention should unequivocally state that all persons with disabilities have legal capacity.
Legal Capacity not to do with Wisdom of Choices
One of the arguments put forth for substituted decision-making is that a number of persons do not have the wisdom to exercise legal capacity. But legal capacity is about the freedom to make choices and not the wisdom of those choices. There is an inherent freedom for all human beings to make the same or new mistakes and to learn or not learn from them. This liberty to learn from mistakes is at other than legal sites referred to as experimentation or even learning from trial and error. Humanity has progressed by allowing people the freedom to make mistakes. This may be because it has often been found that the blunder of today becomes the discovery of tomorrow. Whenever any people are not accorded the freedom to make their own errors they are in effect not being allowed to develop in accordance with their own genius and it is this discrimination and deprivation that needs to be addressed in relation to persons with psychosocial disability. Dignity of risk and the right not to be protected are inherent rights of all adults. A Convention which is being negotiated to return to persons with disability their full personhood has necessarily to interrogate all stereotypes because if it were to get entrapped by stereotypes it would not just reinforce a mistaken impression it would legitimize it.
Need to Distinguish between a Norm and its Implementation
It is next contended by the proponents of guardianship that supported decision-making cannot substitute for guardianship and even if it could such support is not available. These arguments it is submitted conflate the concerns of implementation into the adoption of norms. Should these constraints of implementation provide the basis for adoption of norms under the Convention especially when the norms adopted under the Convention will be the basis of all future discourse on rights of person with disabilities? A pragmatic approach for the implementation of norms is acceptable but a similar perspective towards the adoption of norms is questionable because this is letting the limitations of today confine the developments of tomorrow.
Substituted Decision Making will apply to all persons with psychosocial disability
A further argument by proponents of some form of substituted decision-making is that as a rule all persons with disability have legal capacity but there are a very small percentage of persons with severe disability for whom supported decision-making will not be sufficient and for whom guardianship will need to be provided. Proponents argue that these guardianship arrangements should be put in place subsequent to determination by a judicial body after due observance of fair procedure safeguards. They contend that this substituted decision-making will be the exception not the rule and would apply to a small percentage of cases.
The first consequence of accepting this argument will be that the rule of substituted decision-making will need to be incorporated in the Convention. Now the rule according to its proponents has been incorporated only for a very small percentage of persons with psychosocial disability. It therefore becomes necessary to ask by what procedure this small percentage of persons will be identified. Evidently this will be done from case to case. This process of identification will render the capacity of all persons with psychosocial disability open to question.
This would give rise to a situation where for questionable advantages to a small group of persons all persons with psychosocial disability shall be disadvantaged. The contention of questionable advantage is being made because studies evaluating the functioning of guardianship have found abuse isn't in fact prevented with guardianship, it is facilitated. Further these arrangements once made cause the guardian to take all decisions on behalf of and without consultation with the ward. This ouster makes for the civil death of the persons subjected to guardianship.
Supported Decision Making the Sole Model
In the circumstances it may be worthwhile to ask if the paradigm of supported decision-making would be a preferable option for all persons with disability as it would keep us at the centre of all decisions affecting us. It would interrogate the cognitive privileging existing in present laws and yet allow persons with disabilities along with others needing help to seek assistance in those tasks which require higher reliance on cognitive capabilities.
An assistance provided irrespective of the will of the recipient is an infliction and not a support. In making this statement the general humanitarian impulse of helping people in distress or in life endangering situations is not being questioned, what are being questioned are the procedures whereby persons with psychosocial disability are displaced from governing their own lives. Whilst an acknowledgement of human interdependence furthers the human rights of all persons; the imposition of dependence is a negation of human aspiration, respect and choice. It is for this recognition of human interdependence that supported decision-making needs to displace guardianship in legal constructions of capacity.
- Intervention on Legal Capacity at the Fifth Session
Address by Amita Dhanda on behalf of IDC on Legal Capacity
Mindful of the time constraints within which this Committee is functioning the International Disability Caucus wishes to raise those issues only which are of foundational concern to us. Our suggestions n drafting sequencing etc we will continue to you in memorandums.
I am speaking to you in relation to article 9 and the first point I wish to make is that the entire discussion on legal capacity has been textually and not contextually made. Consequently the social and legal history which has prompted the introduction of this article has not been acknowledged. It has not been recognized that disability has been long equated with incompetence. This equation has not just been confined to social prejudice but has in fact passed into the law. Legal incorporation has been both at the normative level and at the level of practice. It is the incorporation at the level of practice which explains why my visually impaired friend –colleague is prevented from opening a bank account. And the normative induction prevents persons with psychosocial disability to conclude contracts.
In view of these disqualifications and exclusions it is essential for us that article 9 should unequivocally declare that all persons with disability have full legal capacity. On similar grounds of exclusion and disqualification article 15(2) was incorporated in CEDAW to state that women had legal capacity identical to that of men. A provision which has provided a basis for challenging laws and practices where women were excluded only because they were women; the induction of this article in the Convention would provide a similar opportunity to persons with disability.
In such a situation it is specious to say that persons with disability cannot be allowed legal capacity as such capacity is denied to them in the national laws. Instead it is precisely because such disqualifications subsist in national laws that the Convention needs to incorporate norms which supersede the national laws.
The other reason why persons with disability are supposed to lack capacity is because some of us for some things and others for all matters may need support whilst carrying out their life activities and taking decisions in relation to them. It may be worthwhile here to ask that are persons with disability being singled because they are the only ones needing support to carry out life activities or are they being discriminated against because they are the only ones seeking this support openly and explicitly. It is important to appreciate that for us persons with disability supported decision-making is about seeking help to live life on our terms. It is for this reason that we do not wish that support in this Convention be viewed as a negative and reactive activity. Instead our contention is that this Convention should recognize as a principle that persons with disability are entitled to support. And the seeking or provision of this support will in no way undermine or negate their legal capacity. In fact Supported Decision-Making provides us with the opportunity to expand our capabilities. It is due to this opportunity of capability development whilst support from a scale to 0-100 is acceptable the legal device of substituted decision-making or guardianship is unacceptable.
Guardianship is unacceptable because it is premised on the incapacity of persons with disability. It is a device by which whilst the life affairs of persons with disability are managed our rights to growth and development are thwarted.
Legal Capacity has been constructed in ignorance of the disability experience. It is a protection which has been mechanically extended to persons with disability without asking us as to what it does to our lives and the quality of our living. It is on the basis of our lived experience that we are demanding that this Convention should accord recognition to us as persons before the law with full legal capacity. Any principle whereby we are denied the capacity to act would be no more than a legitimization of subsisting discriminatory laws.
We also demand that in acknowledgement of the principle of human interdependence-- which we hold is going to be disability's special contribution to human rights jurisprudence— the Convention should recognize that we are entitled to support and the provision or obtaining of such support in no way negates our capacity.
Lastly we are aware that the system we are proposing is not without its pitfalls and there would be need to devise regulatory measures to prevent abuse. However we believe that these legislative procedures both for facilitating access to supported decision making and to prevent its abuse should be individually designed by State Parties in consonance with their ground level realities. The Convention should again lay down the principle that such procedures are required but the details of the procedure should be worked out by each State Party.
In conclusion honourable Delegates we urge you to negotiate a Convention which is a charter for our hopes and aspirations and not a stranglehold on our future. | <urn:uuid:56d4d95a-3b39-424a-a94f-192e9a321650> | CC-MAIN-2016-26 | http://www.un.org/esa/socdev/enable/rights/ahcstata12fiscomment.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403508.34/warc/CC-MAIN-20160624155003-00027-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.954885 | 4,805 | 2.53125 | 3 |
But eating healthy doesn't reduce the odds of developing metabolic syndrome, said Lyn M. Steffen, Ph.D., M.P.H., R.D., of the University of Minnesota, who studied the eating habits of more than 9,514 middle-age Americans.
After nine years of follow-up, 3,782 of the participants in the Atherosclerosis Risk in Communities study had three or more of the risk factors that are used to define metabolic syndrome, Dr. Steffen and colleagues reported online in Circulation, Journal of the American Heart Association.
Unlike other studies that have investigated relationships between nutrients and cardiovascular risk, "we specifically studied food intake, since when we start to think about making recommendations it is easier to do so using the framework of real foods, eaten by real people," Dr. Steffen said.
The researchers assessed food intake using a 66-item food frequency questionnaire administered at three-year intervals. From the responses to those questions, they were able to categorize people into a Western-pattern diet or a prudent-pattern diet.
A Western diet contained high amounts of refined grains, processed meat, fried foods, red meat, eggs, and soda with little consumption of low-fat dairy products, fruits, and vegetables.
Prudent eating patterns, by contrast, favored cruciferous vegetables, carotinoid vegetables, fruit, fish and seafood, poultry, and whole grains, along with low-fat dairy products.
At baseline from 1987 through 1989, the study participants were between 45 and 64 years old, a population at risk for weight gain, which is associated with metabolic syndrome.
"After adjusting for demographic factors, smoking, physical activity, and energy intake, consumption of a Western dietary pattern (Ptrend≤0.03) was adversely associated with incident [metabolic syndrome]," the researchers found.
When they analyzed the results by specific foods, they found that meat (Ptrend <0.001), fried foods (Ptrend=0.02), and diet soda (Ptrend≤0.001) were all significantly associated with increased risk of metabolic syndrome, but consumption of dairy products -- especially yogurt and low-fat milk -- was beneficial (Ptrend=0.006).
Regular soda, which Dr. Steffen said was expected to increase risk of metabolic syndrome, was not associated with increased risk.
Dr. Steffen said the soda findings might reflect poorer glycemic control, which has been reported in other studies of diet sodas. Moreover, she said a study in rats suggested that the consumption of artificial sweeteners "impairs the body's ability to predict the caloric content of foods, and may lead to increased intake and body weight."
Dr. Steffen said the association between a Western-type diet and metabolic syndrome, although expected, was nonetheless striking for some individual foods.
"For example, we looked specifically at french fries and found that eating one serving a day increased the risk of developing incident metabolic syndrome by 10%," she said in an interview.
An unexpected finding was that consuming a prudent diet (i.e. one that had a high concentration of fruits, vegetables, whole grains) and low-fat dairy products did not reduce the risk of metabolic syndrome. "We had expected to see a benefit because we have seen a beneficial relationship in other studies," she said.
The researchers noted that their study was limited by its use of a questionnaire to calculate food intake, which may have allowed for reporting bias as well as misclassification of some foods. For example, the questionnaire was "not designed to differentiate whole grain from refined grain items in the food list," they wrote.
|The study was funded by the National Heart, Lung, and Blood Institute.
- Reviewed by Robert Jasmer, MD Associate Clinical Professor of Medicine, University of California, San Francisco
Circulation, Journal of the American Heart AssociationSource Reference: Lutsey PL, et al "Dietary intake and the development of the metabolic syndrome: the ARIC study" Circulation 2008; DOI: 10.1161/CIRCULATIONAHA.107.716159. | <urn:uuid:cc4a58cb-3e6c-4e1e-8a06-e23dfb110388> | CC-MAIN-2016-26 | http://www.medpagetoday.com/endocrinology/metabolicsyndrome/8051 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783402746.23/warc/CC-MAIN-20160624155002-00115-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.965237 | 857 | 3.15625 | 3 |
Rao, M Umamaheswara (1967) Seaweed Resources of India. In: Souvenir 20th Anniversary Central Marine Fisheries Research Institute, 3 February 1967, Mandapam.
Seaweeds yield valuable phycocolloids like agar-agar and algin which are widely Bsed in many industries. They are also utilised as food, fodder and fertiliser. Survey of natural seaweed resources and investigation of the chemical composition, methods of extraction, ecology, cultivation and other aspects related to their utilisation are therefore of utmost importance. Majority of the economic seaweeds come under three classes namely the Green algae (Chlorophyceae), the Brown algae (Phaeophyceae) and the Red algae (Rhodophyceae) and they are generally restricted to the relatively narrow littoral and sublittorial belts of the marine environment.
|Item Type:||Conference or Workshop Item (Other)|
|Uncontrolled Keywords:||Seaweed; India|
|Subjects:||Algae > Seaweed|
|Divisions:||CMFRI-Kochi > Marine Capture
Subject Area > CMFRI Brochures > CMFRI-Kochi > Marine Capture
CMFRI-Kochi > Marine Capture
|Depositing User:||Arun Surendran|
|Date Deposited:||19 Oct 2010 10:02|
|Last Modified:||09 Sep 2015 15:33|
Actions (login required) | <urn:uuid:06c3e668-41a1-472a-bdba-3fa0c79389ae> | CC-MAIN-2016-26 | http://eprints.cmfri.org.in/5581/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00037-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.743808 | 320 | 2.625 | 3 |
The next great advance in television will be the adoption of a high-definition television (HDTV) system. Non-experimental analog HDTV broadcasting began in Japan in 1991. In 1994 the FCC approved a U.S. standard for an all-digital system, to be used by all commercial broadcast stations by mid-2002. Although it was hoped that the transition to digital broadcasting would be largely completed by 2006, less than a third of all stations had begun transmitting digital signals by the mid-2002 deadline. In 2005 the U.S. government mandated an end to digital broadcasting in Feb., 2009 (changed to June, 2009, shortly before the deadline in 2009), but by Apr., 2008, only 80% of those stations required to end analog broadcasting had begun digital broadcasting.
The most noticeable difference between the current system and the HDTV system is the aspect ratio of the picture. While the ratio of the width of a current TV picture to its height is 4:3, the HDTV system has a ratio of 16:9, about the same as the screen used in a typical motion-picture theater. HDTV also provides higher picture resolution and high quality audio. Each frame of video consists of 720 or 1,125 horizontally scanned lines instead of the current 525. Furthermore, the lines are scanned sequentially, not interlaced as they are now.
The wide availability of television has raised concerns about the amount of time children spend watching TV, as well as the increasingly violent and graphic sexual content of TV programming. Starting in 1999 the FCC required TV set manufacturers to install "V-Chip" technology that allows parents to block the viewing of specific programs; that same year the television industry adopted a voluntary ratings system to indicate the content of each program.
Various interactive television systems have been tested or proposed. An interactive system could be used for instant public-opinion polls or for home shopping. Many cable television systems use an interactive system for instant ordering of "pay-per-view" programming. Others systems poll their subscribers' equipment to compile information on program preferences. Several competing commercial systems have connected televisions to the Internet.
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved. | <urn:uuid:a23397eb-35bd-4101-9e18-5636b0656408> | CC-MAIN-2016-26 | http://www.factmonster.com/encyclopedia/science/television-television-technology-innovations.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397562.76/warc/CC-MAIN-20160624154957-00018-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.949961 | 453 | 2.921875 | 3 |
TCDT: Hands-on Launch Training
3, 2, 1 and … and well, everything comes to a halt. It's not an aborted liftoff; it's TCDT, the Terminal Countdown Demonstration Test!
Prior to every launch, the current mission's astronauts and ground crew participate in launch-related activities at NASA's Kennedy Space Center in Florida, for their final on-site preparations before liftoff.
During a few days at Kennedy, the flight crew checks the fit of their spacesuits, practice emergency evacuation procedures at the launch pad, check out their mission's cargo in the shuttle's payload bay, review firefighting methods, and participate in briefings on security and range safety.
Closeout Crew Lead Travis Tod Thompson, with United Space Alliance, has been assisting each mission's crew members for more than 27 years during TCDT and on launch day. Thompson's first assignment was supporting the crew of Challenger's STS-8 mission in 1983.
TCDT frequently is the first time members of the crew have had an opportunity to see the flight hardware and launch pad. Until this time training has been on simulators and with computer programs at their home base at NASA's Johnson Space Center in Houston.
This training allows them to familiarize themselves with the vehicle, become acclimated with the safety equipment and procedures and become comfortable with the White Room and the emergency measures that may have to be put into action, if necessary, on launch day.
"It's great for us to get comfortable with them (the astronauts) during TCDT and for them to get comfortable with us and their surroundings -- it's just a big help. The dress rehearsal helps to get rid of a lot of butterflies, plus gives us more time with them to learn what they're going to need on launch day," said Thompson. "Anything we can do to make launch day go smooth is well worth it."
The astronauts also receive instruction on hopping into the launch pad's slidewire baskets and driving the M-113 armored personnel carriers as part of their emergency pad escape training.
According to Thompson, the slidewire baskets were part of the pad's emergency egress system since STS-1 but have never been used for an emergency. But if the White Room had to be evacuated quickly, fire nozzles that spray heavy amounts of water would activate and the teams would only be able to see their feet.
Painted on the open grating of the pad floor is a bright yellow path marked with black chevrons or arrows, which point the way to the slidewire baskets. Thompson mentioned that these path markings have been humorously referred to as "the yellow brick road."
Another aspect of TCDT, explained Thompson, is the M-113 armored personnel carrier emergency egress vehicle driver training. Instruction is provided by Kennedy's fire chief to each astronaut who gets a chance to ride in and drive the M-113. Typically, Thompson joins the crew in the field, and this is the first time he meets them.
"This exercise gives me a good time to get to know the crew a little bit on a comfortable basis -- before we really have to do a lot of work. And it's fun for them and they like it," Thompson said.
In addition to pad and field training, the commander and pilot practice touch-and-go landings in NASA's Shuttle Training Aircraft -- Gulfstream jets which have been modified to simulate the orbiter's unpowered, high-speed glide -- at Kennedy's Shuttle Landing Facility.
TCDT has changed and evolved over the years, recalls Thompson. "We've grown in crew size, from 2 crew members on STS-1 through 5, and then it was expanded to four, and then up to seven."
Thompson recalled that one of his best shuttle memories happened on his birthday a few years ago -- but it was also launch day. He was waiting in the pad's White Room for the flight crew to arrive in the Astrovan. Typically after arrival, the astronauts hop into the pad's elevator for the short ride up to the 195' level. Thompson and his team were going through their last-minute checks while waiting for the crew to come out of the elevator.
"So they're out on the level here and normally the commander will come in," said Thompson." Well, that didn't happen and one of my guys came in instead to say 'the commander wants to see you outside.' I thought, 'uh oh, something's wrong,' so I trot on out and found they'd formed a semi-circle around me and the crew sang "Happy Birthday" to me. That was an awesome time and I enjoyed that very much."
"But then I had to say, 'Let's go back in. We've got work to do!'"
There are many pretest briefings to attend and the test team briefs Thompson on what to expect and what he and his Closeout Crew will be involved in during the mission's TCDT. The training is tailored around the exact number of crew members there are, a process that takes many weeks to schedule. "But when the astronauts finally arrive at Kennedy, everything is ready for their training," Thompson said.
Once everything is in place, Thompson's crew shows up at the launch pad at about 5 a.m. for the full launch dress rehearsal and prepares the White Room, located in the pad's rotating service structure, for the astronauts' arrival at about three hours later.
That's when the launch countdown moves into its final phase. It takes about 50 minutes for the flight crew to board the vehicle, the hatch to be closed and then they run through all of the operations and communication checks of a real launch, right down to a mock engine start.
"There were some instances when it was the first time a member of the flight crew had even seen the vehicle in person, and it was a big excitement for them," Thompson said. "So TCDT's a great time for us to get to know what their comfort level is and what they're going to need on launch day. It makes the day go smoother."
Thompson talked about a tradition he's followed through the years at the pad on launch day. He tells of a large pipe that has liquid oxygen running through it that frosts up and develops an ice buildup. Before the flight crew arrives, Thompson scrapes the STS mission number in the frost along with a "thumbs-up" print in the frost.
"It's kind of our way of telling them we're behind them...kind of a personal note to them. It's one of the cool things about the pad that many people don't know about. And it doesn't happen every day. It only happens on launch day -- it's special."
It's evident how much satisfaction Thompson and his team gets out of the work they do keeping the astronauts safe and comfortable during training and on launch day.
"I take a lot of pride in that, and I'm happy that I can say that some of them are my friends."
Elaine M. Marconi
NASA's John F. Kennedy Space Center | <urn:uuid:dc6ae277-5c98-4b55-b9e8-3e239f3df5b4> | CC-MAIN-2016-26 | http://www.nasa.gov/mission_pages/shuttle/flyout/tcdt.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397213.30/warc/CC-MAIN-20160624154957-00000-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.977839 | 1,465 | 2.625 | 3 |
"The Universe Within" by Neil Shubin
In his last book, Your Inner Fish, Neil Shubin delved into the amazing connections between human anatomy—our hands, our jaws—and the structures in the fish that first took over land 375 million years ago.
Now, he takes an even more expansive approach to the question of why we are the way we are in his new book, The Universe Within: Discovering the Common History of Rocks, Planets, and People. Starting once again with fossils, Shubin turns his gaze skyward. He shows how the entirety of the universe's 14-billion-year history can be seen in our bodies.
From our very molecular composition, he makes clear, through the working of our eyes, how the evolution of the cosmos has had profound effects on the development of human life on earth.
Neil Shubin has been one of the major forces behind a new evolutionary synthesis of expeditionary paleontology, developmental genetics, and genomics. Trained at Columbia, Harvard, and UC Berkeley, Shubin is currently associate dean of biological sciences at the University of Chicago. | <urn:uuid:689c5cef-7803-4424-903c-4f7c4882ef5e> | CC-MAIN-2016-26 | http://wamc.org/post/universe-within-neil-shubin | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00107-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.957039 | 232 | 2.53125 | 3 |
Forty years after abortion was made legal by the momentous Supreme Court ruling in Roe v. Wade, women’s access to reproductive health options are more restricted than they have been since. Although support for Roe v. Wade is at an all-time high of 64 percent, state anti-abortion legislation and federal restrictions continue to create steep barriers to access by many women. These barriers undermine religious liberty for women. The reenactment each year of the Hyde Amendment, restricting coverage of abortion services is especially troubling.
While the political uproar over restrictions on abortion and contraception that erupted during the presidential campaign prevented further backsliding on women’s reproductive freedom for now, it has not yet led to any effort to reverse the most egregious measures still in effect. The current legal status quo ensures, as a practical matter, that millions of women who might need an abortion will be unable to exercise their right to access one in accordance with their own moral and religious beliefs. The Hyde Amendment’s language, which dates to 1977, has varied from year to year; when abortion opponents in Congress are strong, its exceptions are limited to saving the life of the woman or in cases of rape, or incest; when abortion rights forces gain strength, it expands a bit to include cases where a woman’s health is endangered by a pregnancy. Regardless of the exceptions, the Hyde Amendment has always been the bulwark of the anti-abortion agenda.
Hyde started as a limit on Medicaid coverage. Poor women were an easy target. It has been expanded to include federal employees and their dependents, a share of whose health insurance is paid for by the federal government. It now includes military personnel and their dependents, disabled women on Medicare, federal prisoners, Native American women using the Indian Health Service, and even Peace Corps volunteers (who don’t even get the exceptions mentioned earlier). From year to year it has barred the District of Columbia from using locally raised taxes to cover abortions.
The pervasiveness of the Hyde Amendment led to the insertion of similarly unjust restrictions in the Affordable Care Act. That language requires that, for health plans operating in the state-based exchanges, insurance premiums to cover abortion be segregated from premiums for all other health care services, lest federal subsidies somehow enable abortions. As a result, it is not at all clear that private insurance companies will continue to offer any abortion coverage under the new law due to these convoluted provisions – a significant step backward – and that’s just what abortion opponents wanted.
This special treatment for abortion services is driven by a desire to eliminate all access. Its proponents make no secret of their intent. State and federal laws have adopted the views of a minority driven on religious grounds to end access to abortion altogether, regardless of its constitutional status. This isn’t a secret or inferred truth – certain religious groups have made the elimination of abortion a central point of their policy agendas, based on their religious teachings and beliefs.
That the government is enlisted in this battle puts it in opposition to those seeking to exercise what the Supreme Court deems to be a constitutional right. It puts the government in the position of making a moral judgment according to the religious criteria of abortion opponents. When it does so, it deprives every woman whom Roe was supposed to protect of her religious liberty. It is women who are denied access to abortion on the same basis as other health care because of some groups’ religious objections, as embraced by the government. It is one thing for opponents to work privately to persuade women not to have abortions. It is quite another for their views to become public policy. In some ways, whether public opinion supports access to abortion or not is beside the point. The Constitution supports it, and therefore no government body should be involved in undermining it.
We must reverse course and assert our support of the principles of Roe. President Obama should put forward a budget without the Hyde language – one that ensures every woman is accorded her constitutional right to make her own faith-informed decision about abortion rather than privileging the views of those who oppose it. Removing the Hyde language would undoubtedly lead to a vigorous and emotional debate in Congress. It would force the hand of proponents to justify it on something other than religious grounds. It would be a beginning to restore the promise of Roe for every woman, regardless of her income – that the question be decided, as Justice Blackmun wrote, “by constitutional measurement, free of emotion and of predilection.”
Nancy K. Kaufman is the chief executive officer of the National Council of Jewish Women, a grassroots organization inspired by Jewish values that strives to improve the quality of life for women, children, and families and to safeguard individual rights and freedoms. | <urn:uuid:d9e7a132-0f3b-47b9-9a66-e2aca41700dd> | CC-MAIN-2016-26 | http://www.faithstreet.com/onfaith/2013/01/22/roe-a-matter-of-religious-liberty/15512 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00070-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.962533 | 960 | 2.59375 | 3 |
Bo Bochansky, a Payson resident for the last 20 years, is one of Pearl Harbor’s survivors. As America remembers the attack on Pearl Harbor, Bochansky shares his recollections of the event.
It was a Sunday morning and Robert “Bo” Bochansky was sleeping in. As one of the ship’s storekeepers, he bunked in the supply office of the USS Rigel.
He woke up to the sound of explosions and cracking noises.
“I thought it was the Fourth of July at first,” Bochansky said.
Next he heard someone yell, “Everybody get below.”
He said he thought one of the rummies on board was fooling around with a gun, so he turned over, and went back to sleep.
But then a fellow storekeeper, Wiggins, rushed in yelling, “Bo get up! The Japs are attacking!”
Bochansky didn’t believe him and, using the colorful language so common among sailors, told him so. Wiggins, using equally colorful language, told Bochansky to get out of bed and see for himself.
Still in his Skivvies, Bochansky went out on the deck and saw a plane fly by and, “I saw the fish (torpedo) drop.”
It was Dec. 7, 1941, and the Rigel was docked at Pearl Harbor for an overhaul.
The fire and rescue alarm sounded and Bochansky went to his station at one of the (wire basket-like) stretchers.
He said only about a quarter of the crew was on board; the balance of the ship’s company had liberty. With so few men aboard, different duties were assigned in the event of an emergency. For fire and rescue duty, he was stationed on the deck below the top deck.
Bombs started dropping on the ships and two dropped between the Rigel and USS New Orleans, which was moored next to it.
Bochansky said the bomb that fell near the rear of the ship exploded, sending about 100 pieces of shrapnel into the hull while the one that fell toward the front was a dud. The damage from the shrapnel raised the Rigel partly out of the water.
“We lost shore power and the ship went dark,” he said. Below deck they were in total darkness, so all they could do was listen to the sounds around them.
Bochansky said Wiggins had no duty assignment that day, and was on the deck watching the attack. When the bomb exploded near the ship, he was injured, one of only five men aboard the Rigel who were hurt.
Since Bochansky’s ship was a repair ship and being overhauled, it wasn’t exactly equipped to defend itself, still one of the chiefs found a machine gun and started firing at the Japanese planes, Bochansky said.
He did not see any panic among his shipmates. Nor did he see much change in them after the attack.
“The married men were worried. Most of them were older,” he said.
As for himself, Bochansky said, “I just told myself, ‘Remember this date. It may be important.’”
It was a memory Bochansky shared with his father, Frank, who was aboard a sea plane repair ship, the USS Tangier, also in Pearl Harbor.
Frank had been in the Navy since 1914 and had served in World War I. He was ready to retire, but stayed in until 1944. Frank Bochansky died in 1985.
After the attack, Bo and another man took a walk around the shipyard to see the damage. “We had the feeling it was like a football game. The one side scored, but we’ll get back at them,” he said.
While making that shipyard tour, he said he heard someone call his name. Turning around he saw a boy he had grown up with in San Diego, Doug Quiner.
Quiner was in the National Guard and they had been activated. He was helping the Army set up machine guns in the shipyard in case of another attack.
Bochansky saw him much later in New Zealand and he was wearing a Marine uniform.
“I asked him what he was doing in the uniform. He said the Guard had discharged him because he was too young. He turned around and joined the Marines. I asked him where he was going and he told me they were headed for Guadalcanal. Later, when I was in San Diego, I went to his house and asked his mother how he was doing. She said he had been killed at Guadalcanal,” Bochansky said, his voice cracking as he finished, remembering a friend he’d last seen almost 60 years ago.
Bochansky said it wasn’t until the night of Dec. 7 that he felt frightened. It was pitch black that night, no lights anywhere.
“Five of our planes were coming in to land at Ford Island from one of the carriers,” he said. “There was no ship-to-ship communication. We were sitting around and heard firing. One ship started firing at the planes and then others started. The pilots put on their wing lights and were flapping them to try to let us know they were ours. The lights only made them better targets. All five of the planes were shot down.”
The night of Dec. 7, 1941 may have been the first time that day Bochansky felt frightened, but it was not the last.
The Rigel was at Pearl Harbor until April, 1942, when it was sent to Auckland, New Zealand to set up an advance base.
Bochansky said the Rigel made the 30-day voyage through the South Pacific at about 5 mph. At the same time, the ship’s radio crackled with news about U.S. ships being sunk in the Battle of the Coral Sea.
“We had one destroyer accompany us. There were no ships to spare,” he said. “Pearl was a surprise. Now we knew what we were in and that was more frightening.”
His father, Frank, left Pearl about a month before he did. Frank was part of the force that was sent to reinforce Wake Island. Before his father left, Bochansky went to see him.
“He took me up to the (acid storage), behind the signal bridge and showed me where he had stowed a cot and a fishing line. In World War I, his ship was hit and he went into the drink. He never wanted to do that again. He said if he went into the drink again, he was going to be prepared. That was one of only two things I was really afraid of, going into the drink. The other was being a prisoner of war,” Bochansky said.
He spent 20 years and three days in the Navy and never went into the water. | <urn:uuid:ba1de16b-4ac9-4400-9f59-3557571e1a22> | CC-MAIN-2016-26 | http://www.paysonroundup.com/news/2002/dec/05/remember_this_date/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00107-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.993774 | 1,481 | 2.59375 | 3 |
IN EDO LAND
Ademola Iyi-eweka, Ph.D
marriage in Edo land would definitely require a definition of the
Edos, especially in view of discussions that are taking place right now.
Who are the Edos? Where are they located? Where did they come from?
lot of theories have been propounded by different scholars and academicians
in this regards. Put briefly, the Edo-speaking people are the
founded an empire on the coast of West Africa, stretching through the "
whole of the then Midwestern part of Nigeria, parts of the southwest region
of modern Oyo, Ondo, Ogun, Ekiti and Lagos states. The eastern end
stretched across the Niger River into the commercial region of Onitsha. It
was bounded in the north by the Igala kingdom now Kogi state on the
confluence of the Niger and Benue. This empire was bounded in the south by
the Atlantic Ocean, and as far west as the ancient kingdom of Dahomey, now
known as the Republic of Benin, " ( Introduction in IBOTA: A
Folk tales from Benin By Ademola Iyi-Eweka) This empire spilled into the
Izon (ijaw-speaking areas) of Bayelsa and River states of Nigeria especailly
Ogbaland and DIOBU areas of modern day Port Harcourt and Ghana ( the Gas
Remember that the second son of the Enogie of Brass in modern Balyesa state
became the Iyase of Benin. He is fondly remembered as IYASE NE OHENMWEN.
Chief Egharevba took a shot at the origin of the Edos. He simply
and agreed with the theory of Rev Samuel Johnson, author of the History of
the Yorubas, who desperately trying to write the history of the yoruba with
UNITY in mind, simply crafted the history of the yorubas in the form of the
HAUSA/FULANI FLAG BEARER THEORY. Chief Egharevba was wrong.
the Edo nationalistic politician, Chief Oronsaye tried to undo what he
termed as Egharevba's damage. He too went overboard. Chief
taking the RELIGIOUS ROUTE, simply compiled what looked liked fairy tales,
without any proof whatsoever, and turned it into the history of the Edos.
Here is my comment about Chief Oronsaye's theory in the introduction to
OKHOGISO, A COLLECTION OF FOLKTALES FROM BENIN, NIGERIA by Ademola Iyi-Eweka:
" This brings us to the question of who the Edo people are and where they
came from. Although some contemporary historians, tend to associate the
people with the migration theory of people who came from the Middle East, we
have to point that there is no evidence in Benin or anywhere else to support
that theory. Again, Chief D.N. Oronsaye, apparently using religious
lumped the EDO with the Greeks, Persians, Medes, Egyptians, Nubians, and the
Sudanese. He linked the Edo religion to the ZOROASTRIAN TEMPLE of ancient
Persia, the BROTHERHOOD OF BABYLONIAN( CHALDEA), the secret cults of the 5th
and 4th century B.C. Greece. There is the tradition that Benin City
CRADDLE OF MANKIND, the center of the universe, or a place where the creator
God sometimes came down in a chain ladder to get involved in the affairs of
mankind. This is shown in the title borne by some chiefs.
There is a
sizeable group, though, who can trace their origin to UHE which is
identified as modern day ILE-IFE. They came with legendary Oranmiyan
Omonoyan) , the father of Oba Eweka I between 1000 AD and 1200 AD."
This group is represented by the CHIEFS EDIGIN OF USE, BAMAWO OF BENIN AND
ELAWURE OF USEN. Infact Edigin is a corruption of the yoruba
OLIGI-THE HEAD OF THE FIREWOOD CUTTERS in Oranmiyan's entourage.
left to take care of the infant boy who became Oba Eweka I.
And I commented further: " We have to point out again that the appearance
similarities between Edo religious thought and practices to that of
civilizations of 5th to 3rd centuries B.C or older time is most likely a
mere coincidence. The Edo language according to linguist belongs to
KWA group of the Niger-Congo family. The greatest influence on Edo
religious thought and practices could be traced to the Portuguese, Spanish
Roman Catholic Missionaries and European traders who were very active in
Benin Religion, wars and political systems between the 14th and 19th
centuries A.D." Besides, religious
concept spread like wild fire. You
do not have to be conquered or occupied for neighboring communities to copy
religious practices of one another. You do not also need a wave of
R. Bradbury, the author of BENIN STUDIES was right when he wrote the following:
" There are many villages in the Benin Kingdom whose inhabitants have no
tradition that their ancestors came from elsewhere. Some informants
vaguely of general migration from the east and others trace everything back
to IFE---a tendency which may simply follow from the fact IFE is the
accepted origin of the present ruling dynasty. In Benin City,
wards claim to have been on the spot from the beginning, but of the
remainder say that their founders came from Ife as followers of the father
of the first Oba or at a later date.
Therefore, despite the diggings by archeologists in and around Benin City,
none had said with certainty that the Edos came from Egypt, Sudan or
elsewhere. We have the EDO ORE ISI OGHE AGBON (Edorisiagbon) school
UHE school of thought. The Mid-east theory is an
attempt to link the
African tribes to the biblical ADAM AND EVE.
Edo-speaking people of West Africa, especially in Southern Nigeria, have
lived where they are now, for THOUSANDS OF YEARS. The
beginning of Edo
history is lost in antiquity-in a mythical time frame work.
Edo history did not begin from the 7th century A.D. People have moved in
and out. The Edo people people did not migrate en-masse from Sudan, Egypt,
Babylon, or Greece. It is doubtful if they even emigrate in waves.
Jacob Egharevba in chapter one of his book BINI Titles (1956), quoted his
source as P Amaury Talbot, " According to P.Amaury Talbot in his Book
Peoples of Southern Nigeria," Vol.II Chapter. Paragraph 6 and 7: "
Considerably later, perhaps about the seventh millennium B.C., a further wave
of Sudanese People began to pour in , first the Edo ( Benin) and EWE (Popo)
and then the Ibo, followed may be about the second millennium B.C.by the
earliest Yoruba." Then he gave his own
interpretation-" Perhaps in a more
correct phrase, " The Sudanese, therefore come first-Yoruba, Popo, Edo
(Benin), Ijaw and Ibo, then the Semi-Bantu Ibibio, Ukelle and other tribes
of the Northwest followed by the Boki, Ekoi, and Bafumbu-Bansaw; and finally
the Bantu." Almost every African tribe came from the Mid-east.
For thousands of years, Edos have been getting married. It is
that , there is no more powerful corresponding word in Edo lexicon than
ORONMWEN, that captures the meaning of the word MARRIAGE,
as in the
anglosaxon sense. The closest word we have is ORONMWEN
All we have are
descriptive phrases about marriage-
" Okhia ye omo ye oronmwen,"-he wants to give the daughter away
" Okhia rie Okhuo,"- he wants to marry a woman.
" Okhia romwen odo," she wants to marry a husband
But sometimes an Edo man/ person would say, " Ma khia du ugie oronmwen,"
want to perform the festival of marriage.
Before 1897, girls were generally regarded as ready for marriage between the
ages of 15 through 18. Courtship can begin among the individuals
the trip to the river to fetch water or during the moonlight play-EVIONTOI.
But sometimes parents actually go looking for a wife or husband for their
children. This led to the BETROTHAL SYSTEM where
marriage were conducted
with or without the consent of the individuals involved. Sometimes such
betrothal, took place when a baby girl was born. Suitors would begin
approach the parents by sending a log of wood or bundle of yams to the
parents of the child. You are likely to hear statements such as
Ikerhan gboto"-I have dropped a log of firewood. When
a boy decides to
get married and the parents have accepted the bride as a prospective
daughter-in-law, messages go up and down between the two families. This is
called IVBUOMO-SEEKING FOR A BRIDE. Series of investigations
by both families-about disease, scandals and crimes which may affect the
families. The term of the marriage which of course may include the DOWRY
would be settled in some families. Gifts for mother of the bride and
IROGHAE- members of the extended family would be part of the settlement.
Then a date would be set for the ceremony which would take place in the home
of the woman's family. This was called IWANIEN OMO in the old
go-between for the two families must be somebody well known by both
families. There would of course be a lot of merriment on the day of
marriage when the bride and the bridegroom are presented openly to the two
families. Kola nuts and wine are presented
The OKA EGBE of the woman's
family would normally preside over the ceremony. Prayers are
kola nuts broken at the family shrine.
Rituals vary from family to family. The woman always sit on her
lap before she is given away. Amidst prayers, laughter and
tears, the woman would be carefully hoisted on the lap of the OKA EGBE of
the bride's family. Many years ago, the woman would be sent to the
bridegroom house about thirteen days after IWANIEN OMO and gingerly
either on her husband's lap or the OKAEGBE of his family.
They are done
immediately nowadays in the home of the bridegroom.
The bride, now known as OVBIOHA would be led by her relatives to
husband's house with all her property Meanwhile the family and
the bridegroom are feasting,drinking, singing and dancing while waiting for
the bride to arrive. As the family and friends of the bridegroom
the OVBIOHA, messages will arrive suggesting that there are
UGHUNGHUN-barriers on the road. The bridegroom has to remove the
by sending money to the party, bringing the wife to him or else the wife
will not arrive
As they approach the house of the bridegroom, you can hear the echo of
OVBIOHA GHA MIEN ARO-ARO, meaning " Bride ! be proud/ the Bride is
Arrival at the bridegroom's house is immediately followed by the ceremony of
IKPOBO-OVBIOHA-washing of the bride's hands. A bowl of water with
it would be brought out. A woman in the bride's family, sometimes his senior
wife would bring out a new head tie, wash the hand of the Ovbioha
bowl and dries her hand with the head tie. Both the new headtie and the
money in the bowl belong to the bride.
A few days later, the bride would taken to the family altar and prayers
said for her. She undergoes what is called the IGBIKHIAVBO
of OKRO on the falt mortar. This would be followed by a visit
bride's mother-in-law and other female members of the family to the
wed, if they are not living in the same house. She would
bed-spread on which they both slept when they had their " first sexual
relationship " after the wedding. If the bed-spread was
blood, the bride was regarded as a virgin and she would be given many
presents including money. If it is proven that she was not a
the preparation for the ceremony of IVIHEN-OATH TAKING ceremony would be
in motion. First, she has has to confess to the older women,
the " other
men " in her life before she got married. The husband
would never be told
any of her confessions. Then, she would be
summoned to the family
shrine early in the morning , without warning to take an oath of FIDELITY,
FAITHFULNESS, TRUSTWORTHINESS, HONESTY ETC, to her husband and family.
This ceremony is the equivalent of the oath people take in the church,
mosque or marriage registry. Once the oath taking ceremony is over, she
would be fully accepted into the family. She immediately
not only to her husband but to the family and sometimes to the community.
Christianity, Islam and Westernization has already weaken the Edo
traditional system of marriage The traditional ceremony, is
the same day with many of the rituals avoided in the name of Christianity or
Many women would rather die than take the oath we described above. It was
the oath that kept our women out of prostitution for many years. Edo women
were regarded as very faithful, trustworthy, honest with strong fidelity to
their husbands. Neighboring tribes wanted them as wives.
divorce on the ground of adultery, less common in those days. The
of prostitution which has eaten deep into Edo women's life ( as reported in
the news media) should be placed on the shoulders of Christianity, Islam and | <urn:uuid:2e888c0b-ecf0-4113-9e1b-c4192e31aaed> | CC-MAIN-2016-26 | http://www.edo-nation.net/edomar.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393463.1/warc/CC-MAIN-20160624154953-00009-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.95595 | 3,154 | 2.515625 | 3 |
Tim Harford. The Logic of Life: Uncovering the new Economics of Everything.
|Article Type:||Book review|
|Subject:||Books (Book reviews)|
|Publication:||Name: Pakistan Development Review Publisher: Pakistan Institute of Development Economics Audience: Academic Format: Magazine/Journal Subject: Business, international; Social sciences Copyright: COPYRIGHT 2010 Reproduced with permission of the Publications Division, Pakistan Institute of Development Economies, Islamabad, Pakistan. ISSN: 0030-9729|
|Issue:||Date: Spring, 2010 Source Volume: 49 Source Issue: 1|
|Topic:||NamedWork: The Logic of Life: Uncovering the New Economics of Everything (Nonfiction work)|
|Persons:||Reviewee: Harford, Tim|
Tim Harford. The Logic of Life: Uncovering the new Economics
of" Everything. London: Little, Brown, 2008.272 pages, Price 12.99
The Logic of Life, Tim Harford looks at everyday experiences of people from economic perspective. The book talks about the rational foundations of human behaviour. The central theme of the book is that human behaviour is based on rational concepts and that rational behaviour is much wider than one can expect. However, a rational choice does not always mean a feasible outcome rather the outcome may be random. The author argues that if one cannot understand the rational behaviour, s/he cannot understand the world. To explain the logic behind human behaviour, the book covers a wide range of situations such as the causes of the higher divorce rates, marriages, smoking, drug-dealing, high pays to corporate officers, industrial revolution, role and importance of cities, sugar subsidies, sex, splitting the bill at meal, institutional racism, to explain the theory of rational behaviour. The author convincingly argues, without employing the rigour of mathematics and statistics, that human behaviour in aforementioned situation is almost always rational.
For instance, the author explains how racism can become a vicious circle for the society. If a Black person, with sound education, fails to find decent jobs he is not likely to pay enough attention towards education of his children. This in turn, will strengthen employer discrimination towards blacks. Similarly, while explaining why corporate officers are overpaid and many talented employees are underpaid, the author describes that this problem occurs due to the lack of information about talent, honesty, hard work, and difficulty in measuring the contribution of the employees accurately, particularly when there is subjective performance evaluation system in the company. The book shows that making rational decisions in our routine life causes economic growth.
The book is an outstanding summary of the latest research in the, as yet, developing field of behavioural economics. It highlights that despite making irrational decisions in laboratory experiments, in real world we are more likely to act rationally. The author argues that we may act irrationally when confronted with a new or abnormal situation but then the experience crafts us into making rational decisions. The book shows that standard economics explains the novelties of life. It recommended to all those with an interest in understanding the economic rationale of human behaviour.
|Gale Copyright:||Copyright 2010 Gale, Cengage Learning. All rights reserved.| | <urn:uuid:87d16f14-6ee1-4d35-90c8-f4ef73b1ae58> | CC-MAIN-2016-26 | http://www.biomedsearch.com/article/Tim-Harford-Logic-Life-Uncovering/238556931.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396887.54/warc/CC-MAIN-20160624154956-00059-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.898092 | 658 | 2.546875 | 3 |
Excel sports a large number of worksheet functions that can be used to slice and dice data. One of the qualities that makes Excel so fascinating is the endless variety that these functions can be combined into formulas producing powerful, surprising, even elegant solutions. There is much to learn here and the user is easily bewildered, wondering which function or combination to work with to produce the desired results.
Just knowing where to start in a given situation requires experience. There's a science to it, but truly inspired solutions are as much art as science. Think of this series of articles as a treasure map, as I will attempt to lead you to the most productive paths.
Before we delve in, I need to backup. We must understand what a range is and how it is specified. A range is a group of one or more cells. The range is NOT the values in those cells. This distinction is important. Some functions (and hence formulas) return values. Some return ranges. Still others can return either in varying circumstances. The value is just one property of a cell. Other properties include color, type of border, font, etc. Typically just the value property is directly accessed from a formula, but many of these other properties can be manipulated via formulas when using Conditional Formatting. All range properties can be accessed when using VBA.
Ranges can be specified by either R1C1 notation or A1 notation. R1C1 is no longer common and requires an option setting. This article will discuss A1 notation exclusively.
Excel recognizes three reference operators. These three operators combine input ranges and produce an output range.
The first is the Range Operator, which produces a minimum rectangle around the inputs. The Range Operator is the COLON:
You've seen this in action a million times, I'm sure, but you may have never realized what it means. The colon specifies the range defined by the minimum rectangle circumscribing the input ranges. The input ranges can be specified by any method that describes a range, including defined names, functions, and formulas:
In each case the Range Operator returns the range that circumscribes the input ranges with the tightest rectangle. At first glance, the first example seems redundant, and in fact, it can be simplified:
but by substituting formulas for the input ranges, novel ways of controlling other formulas begin to present themselves.
There are two other reference operators and you may not even know about them. These are the Union and Intersect operators. The Union Operator is the COMMA. The Intersect Operator is the SPACE character (space bar).
While the Range Operator always returns a rectangular range, these two other operators can return ranges of any shape, contiguous or not, as long as all of the input ranges are on the same worksheet:
The first of these five examples returns a range in the shape of a diagonal. The second returns a range in the shape of a plus sign. The third returns a range composed solely of C3. The fourth returns a range of four disconnected cells in the shape of the vertices of a square. The last returns the range where the named formulas intersect. This last example is probably the most overlooked lookup method in Excel and can be used to conveniently return information from a list or a table of data. Again, the caveat is that all of the input ranges must be on one worksheet.
Another note is in order for the Union and Intersect Range Operators. In math, a union of two or more sets will only include an element once, but the Excel Union Range Operator does not work this way (pity):
=SUM( (A2:B2,B2:C2) )
The above formula uses the Union Range Operator. It should be the equivalent of:
But it is not. Whatever is in B2, gets summed twice in this example. Also, notice the parentheses around the compound range. This is good practice since functions that require multiple input parameters use commas to separate those inputs. The parentheses ensure that Excel is not confused by ambiguous input.
So the Union Range Operator joins input ranges but is not a true Set Union Operator. On the other hand, the Intersect Range Operator is a true Set Intersect Operator, returning only elements (cells) in common.
There's at least one more twist to range referencing that deserves mention. Ranges can also be 3-D:
Notice that the Range Operator is used twice in this 3-D range example. This returns a range composed of A14:Z14 for twelve worksheets. This could be useful for adding monthly sheets, for example. The other two reference operators do not work on 3-D ranges. Here is an article from Microsoft explaining 3-D ranges
in greater detail and specifying which functions work with them. There's actually more functions than listed there, but that is a topic for another day.
Now that we know what a range is, we need to realize that the roster of functions that we can use to slice and dice our data, use these ranges as inputs. This is most commonly done with rectangular ranges, but the others can produce interesting results.
There is a lot to go over here and so I am going to break it up into a series of articles. To begin with, I thought I would share a video presentation I made a couple of years ago on the VLOOKUP function, long before I began this blog. I had the idea for the blog at the time, but really did not know the direction I would take with it. Here is the VLOOKUP video:
It's a long video; 27 minutes on a simple function! Probably too long. But I'd like to hear your feedback. I've always wanted to host a masters class in Excel, and after seeing the popularity of Chandoo's foundational Excel School
, I started thinking of this once again. The production is not as polished as I would like, but hey it was a couple of years ago when I was just learning how to make videos.
The idea behind the masters series is to explore each function in detail and then see how they can be combined into elegant formulas. Of course it would have to have advanced charting, excelhero style. So what do you think? Is this something I should invest my time in?
If you liked this article, please share it! | <urn:uuid:06588f90-75bd-4c93-8e71-f749e3af0af8> | CC-MAIN-2016-26 | http://www.excelhero.com/blog/2010/06/which-function-to-use---part-1.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398628.62/warc/CC-MAIN-20160624154958-00126-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.920929 | 1,307 | 3.1875 | 3 |
Basic H2S Training
This four-hour Basic H2S Training course is OPITO-approved and aimed at all personnel who risk exposure to hydrogen sulphide contamination at work. The fire training covers the detection and measurement of the flammable gas, plus the correct emergency response to an H2S leak. Basic H2S Training certification should be revalidated every two years.
The course includes theoretical input, demonstrations and practical exercises coupled with a written examination for delegates to demonstrate an acceptable level of competence.
The syllabus focuses on:
- Actions to be taken in the event of an alarm
- Common definitions: PPM, WEL
- How H2S is detected and the use of onsite and personnel detection equipment
- H2S gas, it's common name where it can be ordinarily found
- Measurement and the WEL of H2S
- Physical properties and characteristics of H2S
- Physiological effects of exposure to H2S
- Role of the emergency response teams in an H2S emergency
- Types of respiratory equipment available including escape breathing apparatus and self-contained breathing apparatus
- Importance of a correct facemask fit
This course is intended for personnel working in an environment that could become contaminated by H2S gas.
OPITO-approved certification will be issued on successful completion of the course.
Every two years
Items to bring
Towel, toiletries, and a change of clothing. Photographic ID
Requisite training for
Crane Op, Assist Crane Op, Roustabout, Welder, OIM, Toolpusher, Driller, Assistant Driller, Derrickman, Floorman, Electrician, Mechanic, Brge Engineer, Medic, Radio Op, HSE Tech | <urn:uuid:f546ef46-dd0a-488c-99b3-48c061c7c5f1> | CC-MAIN-2016-26 | http://www.petrofactrainingcourses.com/training-courses/course/basic-h2s-training/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395679.18/warc/CC-MAIN-20160624154955-00144-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.892219 | 367 | 2.625 | 3 |
History of Pittsford
In 1535, French explorer, Jacques Cartier was the first European to see the territory which is now Vermont. In 1609, Samuel de Champlain traveled up the Richelieu River and discovered what is now known as Lake Champlain which is named after him.
During the early 1600’s, the area was still a contested territory. In 1763, England was granted the territory via the Treaty of Paris and this ended the French and Indian War. The Green Mountains were then quickly opened to settlement and to squabbling between the colonies of New Hampshire and New York as to which had the proper claim to the territory then known as the New Hampshire Grants. The governor of New Hampshire granted land in the territory to settlers. New York, also claiming the land, granted it to other settlers. In 1764, King George of England ruled that New York owned the land. A group of New Hampshire settlers, the Green Mountain Boys, fought to keep their land and forced the New Yorkers out of the region.
The settlers of the New Hampshire Grants united and on January 17, 1777, Vermont was declared an independent republic at a meeting held at Westminster and subsequently acquired its own minted coins and postal service. Vermont remained an independent republic until March 4, 1791 when it joined the Union as the 14th state. Vermont had settled the dispute with the New York in 1790 by paying $30,000 to the state.
On October 12, 1761, The New Hampshire Royal Governor, Bennington Wentworth, granted a charter to a new town in New Hampshire Grants to be known as Pitts’ Ford which later changed to Pittsford. The name came from a ford on Otter Creek and named after William Pitt, prime minister of England at the time. That same year, 25,000 acres were granted to 63 proprietors. Half brothers, Gideon and Benjamin Cooley, settled here in 1767 as farmers.
Clusters of sawmills, grist mills, tanneries, blacksmith shops and schools sprung up to support the community and Pittsford Village soon developed on the post road running north from Rutland. After 1795, Grangerville formed on Furnace Road, around the Granger family’s iron blast furnace and foundry. Many of the workers were Irish immigrants. After the War of 1812, French Canadian farmers arrived and settlement quickened for several decades.
Sheep farming became the principal agricultural activity with the arrival of Spanish Merino sheep. Thousands of sheep browsed the logged off hills. Mills sprung up to treat the wool creating a major industry that lasted until after the Civil War. With the demise of sheep farming, dairy farming became the dominant occupation and the farmers were able to sell their milk to two creameries that were established in town. Florence farmers opened several small marble quarries in the early 1800’s. The marble industry grew changing Florence to a mix of farms and quarrying by 1850. By 1910, immigrant marble workers from many European and Scandinavian countries swelled the Florence population. They worked and lived in Vermont Marble Company owned quarries, farms and houses. The Florence mill, built in 1898-1902, sawed marble blocks, produced finished marble products, and shipped to markets via the Clarendon and Pittsford Railroad.
During post Civil War prosperity, residential housing boomed from the 1870’s and late 1890’s. Successful farmers, lawyers, merchants, and doctors built new homes or remodeled old ones. Marble sidewalks, the Walker Memorial Building/Maclure Library, and the Pittsford Aquaduct system improved the Town’s appearance and life in general until a recession weakened the economy at the end of the 19th century.
Electricity and telephones came to town in the early 1900’s. The Vermont Sanatorium, the new Town Clerk’s Office, and Lothrop School were erected, although many outlying schools remained open.
World War I interrupted progress, followed by a surge until the 1927 flood and the 1929 Great Depression. Hard times lasted until 1941 when Pearl Harbor plunged us into World War II, followed by the Korean Conflict.
In the 1960’s, we joined the Otter Valley Union School District, adopted a Zoning Ordinance, and built the Recreation Area.
Designated an “urban community” since the 1980’s, farming has declined and forests are reclaiming pastures as we become a bedroom community with 70% of the working population employed outside of Pittsford. The town still maintains a largely rural appearance outside the Village, however, residential construction continues to encroach on agricultural land.
The Town of Pittsford lies between the Taconic Mountains to the west and the Green Mountains to the east. Otter Creek, which winds its way between Florence and Pittsford, is the second largest watershed in the State of Vermont which flows into Lake Champlain. Florence and Pittsford are located within the Vermont Valley biophysical region. Furnace Brook also flows southwesterly through the town and has provided the source for power in the past.
On the west side of the Otter Creek, in a wide valley, is the Village of Florence, a rural and industrial zone of Pittsford. While the valley floor is generally within the 100-year flood plain, there are several farms in operation. Because of its history as a source of marble and crushed stone, the valley is also Pittsford’s primary industrial area. | <urn:uuid:f7562ee1-edc7-459f-8a9a-f9b88d2cd3b9> | CC-MAIN-2016-26 | http://pittsfordvermont.com/about-pittsford-vt/history/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396224.52/warc/CC-MAIN-20160624154956-00169-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.969391 | 1,137 | 3.21875 | 3 |
EPA Targets Greenhouse Gases
ROBERT SIEGEL, host:
From NPR News, this is ALL THINGS CONSIDERED. I'm Robert Siegel.
MICHELE NORRIS, host:
And I'm Michele Norris. A major shift in environmental policy today from the federal government. The EPA declared that greenhouse gases linked to climate change endanger public health and welfare. Scientists and environmentalists have been waiting years to hear that acknowledgment, and the declaration is a big, first step toward regulating carbon dioxide. It's also a new restriction on almost every part of the economy. Coming up, we'll hear what a warming planet may mean for your health. But first, NPR's Jeff Brady has the details of today's declaration.
JEFF BRADY: The EPA says six gases associated with climate change pose a potential threat to the environment and people. The biggies, you've probably heard of: carbon dioxide and methane. The others are nitrous oxide, hydrofluorocarbons, perfluorocarbons and sulfur hexafluoride. With that finding, the agency opens the door to regulating everything from the car you drive to the electricity produced for your home. In a written statement, EPA administrator Lisa Jackson said, quote: This finding confirms that greenhouse gas pollution is a serious problem now and for future generations.
Mr. DAVID DONIGER (Policy Director, NRDC): There's a well, duh factor about this.
BRADY: David Doniger is with the Natural Resources Defense Council. He worked on the U.S. Supreme Court case that concluded two years ago that the EPA has the right to regulate greenhouse gases.
Mr. DONIGER: The debate over the science is over. The thing that's been missing, though, is the government needs to make this official statement under the Clean Air Act that there's a danger to our health and to our environment.
BRADY: The EPA under the Bush administration had been reluctant to make that statement for fear of the economic consequences of the agency regulating everything from new cars to power plants. Bill Kovacs with the U.S. Chamber of Commerce shares that concern. He worries the EPA could become a huge regulator involved in every part of American life.
Mr. WILLIAM L. KOVACS (Vice president, Environment, Technology & Regulatory Affairs Division, U.S. Chamber of Commerce): They would also be regulating office buildings, warehouses, torches. They would be regulating parts of the farm industry - 25 cows produce enough methane to be a regulated entity.
BRADY: Kovacs wants the government to focus its efforts on developing new technologies to reduce greenhouse gas emissions, such as capturing CO2 before it gets into the air. The EPA will now begin a public comment process that could take a year or two before actual regulations are put in place. Meantime, the White House and members of Congress have said they prefer to address the climate issue with so called cap-and-trade legislation.
Democratic Representative Ed Markey of Massachusetts says members are working on a bill that would address both the environmental and economic concerns that various interests have. Hearings are set to begin next week.
Jeff Brady, NPR News.
NPR transcripts are created on a rush deadline by Verb8tm, Inc., an NPR contractor, and produced using a proprietary transcription process developed with NPR. This text may not be in its final form and may be updated or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio record. | <urn:uuid:af439705-1dca-46ba-82dd-dd632b73ce66> | CC-MAIN-2016-26 | http://www.npr.org/templates/story/story.php?storyId=103224919 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00013-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.945781 | 737 | 2.75 | 3 |
The Vedanta Treatises
by Dr. Jyotsna Kamat
First Online: July 04, 2009
Hinduism in the broadest sense is not only a religion but includes ways of life and philosophy as well. The four Vedas, which are considered revelations and not written by human beings, were evolved more than six thousand years ago. Mainly oral Vedic mantras (reflections that protect) passed on orally, from mouth to ear when writing was centuries away. Slowly the Upanishads took shape to interpret esoteric aphorisms and mantras of the Vedas. Upanishads are Books of Knowledge and the important ones are ten in number. When Upanishadic knowledge became too vast, condensation was found necessary for the process of understanding God and godliness. Brahmasutras came to be written, which are again in sutra form.
But still, the difficulty with the commoners continued to learn the underlying philosophy regarding God and ways of realizing Him. The Bhagavadgita, popularly known as Gita evolved, which is considered the kernel of Hindu religion and philosophy and an outstanding religious classic in the world. All the three, the Upanishads, the Brahmasutras and the Bhagavadgita form the basics of Vedanta. It means crux or end (veda+anta=end) as the name itself suggests.
There are more than thirty Upanishads out of which ten are considered most authoritative. Upanishads advocate ultimate triumph of human spirit over matter. They spiritually point out the divinity in man, which could be brought with various means and efforts and man can become one with God himself. The little formula, tat tvam si (That, thou art) or soham (I am He) has umpteen dimensions. These are brought out in the Upanishads in the form of anecdotes, dialogues which help interpret esoteric aphorisms of Vedas. Upanishads are most authoritative text and form part of Shruti (sacred literature of Hindus).
The Brahmasutras are aphorisms dealing with nature of Brahman (God) the ultimate reality. They are ascribed to sage Badarayana who probably lived in 500 B.C. He systematized the teachings of Upanishads in the form of sutras, which could be memorized, reproduced and interpreted. Vedic and upanishadic knowledge received new dimension of meta-physical frame at this stage. From Shankarcharaya onward all the great acharyas and Preceptors have written commentaries (Bhashya) on Upanishads, Brahmasutras and Bhagavadgita to advocate their philosophical school.
Most Hindus are familiar with the Hindu sacred book of Bhagavadgita which is summary of ancient Vedic learning. This single text binds Hindus of all castes and creeds together, which they held in great respect. Bhagavadgita or simply Gita forms integral part of Mahabharata epic which is considered as fifth Veda. Its setting on the great battle-field of Kurukshetra is in the form of dialogue form between Arjuna and Krishna. It has dramatic element which provides visualization (battle effects, blowing conches, beating drums and Viswaroopa darshana or cosmic revelation of Krishna). Along with religious and philosophical tenets it relates to realities of life of birth, death, endless struggles and aspirations of human life.
Merchandise and Link Suggestions | <urn:uuid:738e006f-43b6-41fc-9eb2-7f9e3f0e96ff> | CC-MAIN-2016-26 | http://www.kamat.com/indica/culture/vedanta.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395160.19/warc/CC-MAIN-20160624154955-00160-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.938916 | 724 | 3.296875 | 3 |
Probably the best known deserter in the Revolutionary War was Benedict Arnold. Because he took valuable military information with him (sent it ahead, actually) he is more often called a ‘traitor’ than a deserter, but he did quit his side in the fighting without leave. He deserted. Another man you are less likely to have heard of was Daniel McGirt. He quit his militia unit to stop an officer from appropriating his horse, and then he stole other horses. Both of these men went over to the other side and served the enemy. Arnold tore up Connecticut and Virginia ports and things awaiting export during the war's second half. McGirt was a superior horseman and had ridden the interior of Georgia and northern Florida, so he was able to lead Tory militiamen to distant plantations to steal horses and slaves.
Not every deserter went over to the other side. Some, mostly Americans, didn’t. What a man did after he left his unit depended on his situation. Why had he run away?
Surprisingly few men ran away because of a fear of getting shot and possibly killed. Physical cowardice led to few desertions. The cowards hadn’t enlisted, in the first place. Even if an American militiaman changed his mind after signing up, he likely wouldn’t desert. He was serving with his neighbors and friends. If he ran away, how would he face them when they came home? A deserter not only had to live down what he had done, he had to get family and friends to shield him from outsiders (in case someone came looking for him) or he had to entirely give up his previous life and go somewhere else. Did he have a wife and children to take with him? Some men who deserted did move west of the Allegheny Mountains to start life over. Others went to an area in Vermont.
An American soldier ran away because he thought military punishments given out were too severe. Small infractions could get up to fifty lashes. Some court sentences were for two hundred lashes.
An American soldier ran away because the officer who commanded his unit had been replaced by a Continental Army officer. The officer who had gotten him to enlist for six months to a year by promising to be fair with him had given way to an arrogant swine who treated enlisted men like dogs.
An American soldier ran away to do the spring planting or fall harvesting on his farm. His wife and kids couldn’t do it by themselves and his neighbors had their own fields to take care of. His family might starve over the winter and certainly wouldn’t have enough extra to barter for things they needed. (He more often than not returned to duty after his chores were done.)
An American soldier ran away to enlist in another militia unit. When he signed up, he had been promised one or several month’s pay as a bonus. As soon as he collected it, he ran off to sign up for another bonus from some other outfit. One man who did this seven times was caught and hung.
As many as one out of four American soldiers during the Revolutionary War deserted. This happened more in the first years, 1775-77. By 1778, men were signing up for longer enlistments and getting better training. The increase in their morale led to fewer desertions.
Both soldiers in the Royal Army and mercenary Hessian units deserted, but not in the numbers that the Americans did. A few hundred men ran away from the Royal Army every year. If he was English, it was likely he wanted to escape the army because of its rigidity of structure and discipline, its treating him as if it did not matter whether he lived or died, or its giving rewards to officers for valorous action, but not to him. He might have done something wrong and was due for three or five hundred lashes. English military justice was draconian. It destroyed the guilty and instilled fear into men who were forced to watch.
An English deserter was unlikely to join the Continental Army. If he had a skill (also unlikely) he went to a place where he could practice it and not meet anyone from the Royal Army who might know him. He otherwise hired himself out to a farmer for a season or indentured himself to a craftsman. He might also become a petty thief to support himself, which he might have done in England before becoming a soldier.
Hessian mercenaries deserted so they wouldn't be sent home after the war or be sent to another one to fight for the English. But do you suppose many of them spoke the local language? That might have had something to do with their deserting in only small numbers (up until 1781). An English soldier could change his clothes and be thought an American by another Englishmen, if the latter had never met the former. (Americans would quickly catch onto his not being an American.) A Hessian would give himself away every time he tried to make his wants known.
One way a Hessian could desert and get along was to enlist in the Continental Army. The Americans were desperate for bodies. They didn’t turn down foreigners just because of a simple language problem. If he was shouted at enough times and hit in the head enough times, he would learn. By 1780, there were units in the French Army fighting in the war that were comprised entirely of Hessian deserters. (A few thousand deserted in the last two years of the war. Most of them went north to Canada and farmed.)
The Continental Congress tried to encourage Royal Army soldiers and Hessian mercenaries to desert. Within months of the Royal Army and Hessians landing on Long Island in 1776 and crossing to New York, paper broadsides were printed and mysteriously distributed among the enemy ranks. On 29 April 1778, the Congress promised to give fifty acres to any mercenary who deserted and made his way to American authorities. An officer who deserted and brought forty of his men with him was to get eight hundred acres and a dozen farm animals. These men would not have to fight on the American side in the war, but could stop fighting and become civilians.
The ground forces were not the only military units to suffer desertions. The Continental Navy and the Royal Navy both had the problem. Most sailors on both sides deserted for the same reason: Being a merchant sailor paid a lot more than being a navy sailor. An added bonus was that a man was far less likely to become involved in a naval battle (where most men who were wounded later died of their wounds). | <urn:uuid:b85ddb97-746a-41bd-82d5-d7e9dc3be354> | CC-MAIN-2016-26 | http://www.davidwebbfowler.com/2012/10/desertion-during-revolutionary-war.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403825.35/warc/CC-MAIN-20160624155003-00126-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.992366 | 1,343 | 3.8125 | 4 |
From Wikibooks, open books for an open world
Lesson 3.1: Scene Size-Up
By the end of this lesson, the EMT-Basic should be able to:
- Recognize hazards/potential hazards.
- Describe common hazards found at the scene of a trauma and a medical patient.
- Determine if the scene is safe to enter.
- Discuss common mechanisms of injury and common natures of illnesses.
- Discuss the reason for identifying the total number of patients at the scene.
- Explain the reason for identifying the need for additional help or assistance.
- Explain the rationale for crew members to evaluate scene safety prior to entering.
- Serve as a model for others explaining how patient situations affect your evaluation of mechanism of injury or nature of illness.
- Observe various scenarios and identify potential hazards.
The period from when you are called to a scene and when you interact with a patient is your scene size-up. | <urn:uuid:05639dfb-fb3f-43a2-b1c1-d7e567b0c095> | CC-MAIN-2016-26 | https://en.wikibooks.org/wiki/EMT-Basic/Assessment/Size-up | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395613.65/warc/CC-MAIN-20160624154955-00175-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.85584 | 201 | 3.640625 | 4 |
The rocks that cause meteors orbit the sun in streams, along the path of the space body that they originated from (usually a comet or a shattered asteroid). When Earth passes through this debris trail in space, a meteor shower is visible in the sky. An exceptionally intense shower is called a meteor storm. One meteor shower with the potential to become a storm is 2014’s Camelopardalids (kah-MEL-oh-PAR-dal-ids).
On the night of May 23-24, 2014, Earth passes through the debris trail of Comet 209P/LINEAR. Observers in North America will get a good view of the meteors.
The intensity of the meteor shower depends on how active the comet was centuries ago. Currently, the comet produces few meteors, but fragments that broke off the comet 100 to 300 years ago will be strewn along the path where the Earth crosses.
Due to perspective, meteors appear to radiate from a point on the sky, in this case the constellation Camelopardalis (kah-MEL-oh-PAR-dal-iss). The radiant is very close to the north celestial pole, the point around which the sky appears to turn each day. | <urn:uuid:ffd8368f-f02b-4bba-975d-2e4edeedbf79> | CC-MAIN-2016-26 | http://www.space.com/25917-how-meteor-storms-work-infographics.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395620.56/warc/CC-MAIN-20160624154955-00188-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.891102 | 251 | 4.0625 | 4 |
Open Sources: Voices from the Open Source Revolution
1st Edition January 1999
1-56592-582-3, Order Number: 5823
280 pages, $24.95
The Internet Engineering Task Force
The Internet Engineering Task Force
For something that does not exist, the Internet Engineering Task Force (IETF) has had quite an impact. Apart from TCP/IP itself, all of the basic technology of the Internet was developed or has been refined in the IETF. IETF working groups created the routing, management, and transport standards without which the Internet would not exist. IETF working groups have defined the security standards that will help secure the Internet, the quality of service standards that will make the Internet a more predictable environment, and the standard for the next generation of the Internet protocol itself.
These standards have been phenomenally successful. The Internet is growing faster than any single technology in history, far faster than the railroad, electric light, telephone, or television, and it is only getting started. All of this has been accomplished with voluntary standards. No government requires the use of IETF standards. Competing standards, some mandated by governments around the world, have come and gone and the IETF standards flourish. But not all IETF standards succeed. It is only the standards that meet specific real-world requirements and do well that become true standards in fact as well as in name.
The IETF and its standards have succeeded for the same sorts of reasons that the Open Source community is taking off. IETF standards are developed in an open, all-inclusive process in which any interested individual can participate. All IETF documents are freely available over the Internet and can be reproduced at will. In fact the IETF's open document process is a case study in the potential of the Open Source movement.
This essay will give a short history of the IETF, a review of the IETF organization and processes and, at the end, some additional thoughts on the importance of open standards, open documents, and Open Source.
The History of the IETF
The IETF started in January of 1986 as a quarterly meeting of U.S. government funded researchers. Representatives from non-government vendors were invited, starting with the fourth IETF meeting in October of that year. Since that time all IETF meetings are open to anyone who would like to attend. The initial meetings were very small, with less than 35 people in attendance at each of the first five meetings and with the peak attendance in the first 13 meetings only 120 attendees, at the 12th meeting in January of 1989. The IETF has grown quite a bit since then, with more than 500 attendees at the 23rd meeting in March 1992, more than 750 attendees at the 29th meeting in March 1994, more than 1,000 attendees at the 31st meeting in December 1994, and almost 2,000 attendees at the 37th meeting in December 1996. The rate of growth in attendance has slowed to the point that there were 2,100 attendees at the 43rd meeting in December 1998. Along the way, in 1991, the IETF reduced the number of meetings from four to three per year.
The IETF makes use of a small Secretariat, currently operating out of Reston, VA, and an RFC Editor, currently operated by the University of Southern California's Information Sciences Institute.
The IETF itself has never been incorporated as a legal entity. It has merely been an activity without legal substance. Up until the end of 1997, the IETF's expenses were covered by a combination of U.S. government grants and meeting fees. Since the beginning of 1998 the expenses have been covered by meeting fees and the Internet Society.
The Internet Society was formed in 1992, partially to provide a legal umbrella over the IETF standards process and to provide some funding for IETF-related activities. The Internet Society, an international membership-based non-profit organization, also evangelizes for the Internet in parts of the world that the Internet has not yet reached. At this time the IETF can be best described as a standards development function operating under the auspices of the Internet Society.
The concept of working groups was introduced at the 5th IETF meeting in February 1987 and there are now over 110 working groups operating within the IETF.
IETF Structure and Features
The IETF can be described as a membership organization without a defined membership. There are no specific criteria for membership other than to note that people and not organizations or companies are members of the IETF. Any individual who participates in an IETF mailing list or attends an IETF meeting can be said to be an IETF member.
At this writing there are 115 officially chartered working groups in the IETF. These working groups are organized into eight areas: Applications, General, Internet, Operations and Management, Routing, Security, Transport, and User Services. Each of the areas is managed by one or two volunteer Area Directors. The Area Directors sitting as a group, along with the chair of the IETF, form the Internet Engineering Steering Group (IESG). The IESG is the standards approval board for the IETF. In addition there is a 12-member Internet Architecture Board (IAB), which provides advice to the IESG on working group formation and the architectural implications of IETF working group efforts.
The members of the IAB and the Area Directors are selected for their two year terms by a nominations committee randomly selected each year from among volunteers who have attended at least two out of the previous three IETF meetings.
IETF Working Groups
One of the principal differences between the IETF and many other standards organizations is that the IETF is very much a bottom-up organization. It is quite rare for the IESG or the IAB to create a working group on their own to work on some problem that is felt to be an important one. Almost all working groups are formed when a small group of interested individuals get together on their own and then propose a working group to an Area Director. This does mean that the IETF cannot create task plans for future work, but at the same time it helps ensure that there is enough enthusiasm and expertise to make the working group a success.
The Area Director works with the people proposing the working group to develop a charter. Working group charters are used to list the specific deliverables of the working group, any liaison activities that might be needed with other groups, and, often most important, the limits on what the working group will explore. The proposed charter is then circulated to the IESG and IAB mailing lists for their comments. If significant issues do not arise within a week the charter is posted to the public IETF list and to a list of liaisons from other standards organizations to see if there is work going on in other forums which the IETF should be aware of. After another week for any additional comments, the IESG can then approve the charter and thereby create the working group.
All IETF documents are public documents freely available over the Internet. The IETF does get a limited copyright from the authors when the documents are published to ensure the document remains freely available (the author can not decide to withdraw the document at some future time), republishable in its entirety by anyone, and, for most documents, that the IETF can make derivative works within the IETF standards process. The author retains all other rights.
The basic publication series for the IETF is the RFC series. RFC once stood for "Request for Comments," but since documents published as RFCs have generally gone through an extensive review process before publication, RFC is now best understood to mean "RFC." RFCs fall into two basic categories: standards track and non-standards track. Standards track RFCs can have Proposed Standard, Draft Standard, or Internet Standard status. Non-standards track RFCs can be classified as Informational, Experimental, or Historic.
In addition to RFCs, the IETF makes use of Internet-Drafts. These are temporary documents whose purpose is close to the original "request for comment" concept of RFCs and which are automatically removed after six months. Internet-Drafts are not to be cited or otherwise referenced other than as works in progress.
The IETF Process
The IETF motto is "rough consensus and running code." Working group unanimity is not required for a proposal to be adopted, but a proposal that cannot demonstrate that most of the working group members think that it is the right thing to do will not be approved. There is no fixed percentage support that a proposal must achieve, but most proposals that have more than 90% support can be approved and those with less than 80% can often be rejected. IETF working groups do not actually vote, but can resort to a show of hands to see if the consensus is clear.
Non standards track documents can originate in IETF working group activity or from individuals who would like to make their thoughts or technical proposals available to the Internet community. Almost all proposals for RFC publication are reviewed by the IESG, after which the IESG will provide advice to the RFC Editor on the advisability of publishing the document. The RFC Editor then decides whether to publish the document and, if the IESG offers one, weather to include a note from the IESG in the document. IESG notes in this case are used to indicate discomfort with the proposal if the IESG feels that some sort of warning label would be helpful.
In the normal case of a standards track document an IETF working group will produce an Internet-Draft to be published as the RFC. The final step in the working group evaluation of the proposal is a "last call," normally two weeks long, where the working group chair asks the working group mailing list if there are any outstanding issues with the proposal. If the result of the working group last call indicates that the consensus of the group is that the proposal should be accepted, the proposal is then forwarded to the IESG for their evaluation. The first step in the IESG evaluation is an IETF-wide last call sent to the main IETF announcement mailing list. This is so that people who have not been following the working group work can comment on the proposal. The normal IETF last call is two weeks for proposals that come from IETF working groups and four weeks for proposals not originating from IETF working groups.
The IESG uses the results of the IETF last-call as input to its deliberations about the proposal. The IESG can approve the document and request its publication, or it can send the proposal back to the author(s) for revision based on the IESG's evaluation of the proposal. This same process is used for each stage of the standards track.
Proposals normally enter the standards track as Proposed Standards, but occasionally if there is uncertainty about the technology or if additional testing is felt to be useful a document is initially published as an Experimental RFC. Proposed Standards are meant to be good ideas with no known technical flaws. After a minimum of six months as a Proposed Standard, a proposal can be considered for Draft Standard status. Draft Standards must have demonstrated that the documentation is clear and that any intellectual property rights issues with the proposal are understood and resolvable. This is done by requiring that there be at least two genetically independent, interoperable implementations of the proposal with separate exercises of licensing procedures if there are any. Note that it also requires that all of the separate features of the protocol be multiply-implemented. Any feature not meeting these requirements must be removed before the proposal can advance. Thus IETF standards can get simpler as they progress. This is the "running code" part of the IETF motto.
The final step in the IETF standards process is Internet Standard. After being at Draft Standard status for at least four months and demonstrating significant marketplace success, a proposal can be considered for Internet Standard status.
Two major differences stand out if one compares the IETF standards track with the process in other standards organizations. First, the final result of most standards bodies is approximately equivalent to the IETF Proposed Standard status. A good idea but with no requirement for actual running code. The second is that rough consensus instead of unanimity can produce proposals with fewer features added to quiet a noisy individual.
In brief, the IETF operates in a bottom-up task creation mode and believes in "fly before you buy."
Open Standards, Open Documents,
and Open Source
It is quite clear that one of the major reasons that the IETF standards have been as successful as they have been is the IETF's open documentation and standards development policies. The IETF is one of the very few major standards organizations that make all of their documents openly available, as well as all of its mailing lists and meetings. In many of the traditional standards organizations, and even in some of the newer Internet-related groups, access to documents and meetings is restricted to members or only available by paying a fee. Sometimes this is because the organizations raise some of the funds to support themselves through the sale of their standards. In other cases it is because the organization has fee-based memberships, and one of the reasons for becoming a member is to be able participate in the standards development process and to get access to the standards as they are being developed.
Restricting participation in the standards development process often results in standards that do not do as good a job of meeting the needs of the user or vendor communities as they might or are more complex than the operator community can reasonably support. Restricting access to work-in-progress documents makes it harder for implementors to understand what the genesis and rational is for specific features in the standard, and this can lead to flawed implementations. Restricting access to the final standards inhibits the ability for students or developers from small startups to understand, and thus make use of, the standards.
The IETF supported the concept of open sources long before the Open Source movement was formed. Up until recently, it was the normal case that "reference implementations" of IETF technologies were done as part of the multiple implementations requirement for advancement on the standards track. This has never been a formal part of the IETF process, but it was generally a very useful by-product. Unfortunately this has slowed down somewhat in this age of more complex standards and higher economic implications for standards. The practice has never stopped, but it would be very good if the Open Source movement were to reinvigorate this unofficial part of the IETF standards process.
It may not be immediately apparent, but the availability of open standards processes and documentation is vital to the Open Source movement. Without a clear agreement on what is being worked on, normally articulated in standards documents, it is quite easy for distributed development projects, such as the Open Sources movement, to become fragmented and to flounder. There is an intrinsic partnership between open standards processes, open documentation, and open sources. This partnership produced the Internet and will produce additional wonders in the future.
Next Chapter --->
© 2000, O'Reilly & Associates, Inc. | <urn:uuid:e381ca99-4cbb-4bf4-8d3a-2a3e30f86b89> | CC-MAIN-2016-26 | http://www.oreilly.com/openbook/opensources/book/ietf.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00156-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.954168 | 3,089 | 2.671875 | 3 |
This class contains about 600 species of sedentary animals commonly known as chitons, marine forms found from shallow waters to depths of about 1,300 ft (400 m). A chiton has a broad foot and a shell consisting of eight overlapping plates.
Sections in this article:
The Columbia Electronic Encyclopedia, 6th ed. Copyright © 2012, Columbia University Press. All rights reserved.
See more Encyclopedia articles on: Zoology: Invertebrates | <urn:uuid:4e2b9186-0819-49d5-a9c7-97d618a4a441> | CC-MAIN-2016-26 | http://www.infoplease.com/encyclopedia/science/mollusca-class-polyplacophora.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397567.28/warc/CC-MAIN-20160624154957-00154-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.850056 | 95 | 2.859375 | 3 |
Editor’s note appended.
As we sit down this week and give thanks for the many blessings of this life, we should also take time to reflect on a Thanksgiving lesson, brought to us courtesy of Governor William Bradford of the Plymouth Colony. Although the Pilgrims landed on that lonely outcropping of Massachusetts shoreland almost 400 years ago, their communist experiment didn’t work then and, as much as some of our esteemed political leaders want us to believe otherwise, it won’t work now.
That’s right, the Pilgrims were communists, according to some. At least, they started off that way. There was no private property, women did chores for everyone, not only their own families, and the men planted, grew and harvested the food that was grown and equally distributed among all the colonists. However, three years into this imagined economic utopia, or “the common course and condition,” as they called it, the colonists found themselves on the brink of starvation, barely producing enough food to keep everyone alive.
Aware that supplies from the mother country were few and far between at best, a desperate Governor Bradford convened his wisest compatriots and, after much debate, made a fateful decision that would profoundly change the way Americans would ever thereafter view themselves. His insightful pronouncement? Self-determination.
Each family was assigned a parcel of land, proportionate to the number of family members. And what do you know – as the governor’s very detailed diaries noted, “This had very good success, for it made all hands industrious, so as much more corn was planted than otherwise would have been by any means… The women now went willingly into the field, and took their little ones with them to set corn; which before would allege weakness and inability; whom to have compelled would have been thought great tyranny and oppression.” (Stop me if any of this is sounding vaguely familiar.)
Communism could perhaps work if we were all perfect, but basically we are by nature corrupt. In fact, Governor Bradford went on to articulate the reasons the communal system failed among their “godly and sober men.” Their community was permeated by an unwillingness to work; by loss of mutual respect; by confusion and discontent; by resentment of treating the unproductive the same as the productive; and by a prevailing sense of slavery and injustice. And this in a very religious community in which drunkenness was almost unheard of and gluttony and laziness were considered sins (yes, the word “sin” actually meant something to them) — much different from our current society.
As Governor Bradford also discovered, no society can survive with a husband growing food for other people’s families and wives and children doing chores for other people’s families, all at the expense of their own. Communism undermines the basic societal foundational building block — the family unit.
Taking on the free riders who took advantage of those pulling more than their fair share, he privatized property, which brought “very good success.” He observed that the colonists immediately became personally responsible for their own actions rather than those of the whole community. They were incentivized to work harder because the fruits of their labor would go directly to them and their dependents. No work, no food.
We can study the continued fallout from the communist experiment of the former Soviet Union, but really all we need to do is look back 400 years at our own American ancestors to understand that communism, “the common course and condition,” wealth redistribution or whatever name you might want to give it, simply doesn’t work. Encouraging and rewarding sloth, laziness and inefficiency while destroying individual initiative portends certain disaster. The liberty of self-determination and free market forces, however imperfect, will win every time.
Editor’s note: This post included ideas from and should have given proper credit to a November 2004 post on FreeRepublic.net. | <urn:uuid:d0bf297a-fb57-4119-bb8a-8a0ba94a1b9c> | CC-MAIN-2016-26 | https://susandench.bangordailynews.com/2013/11/27/conservatives/the-other-pilgrims-tale-or-why-communism-doesnt-work/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00002-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.984229 | 822 | 2.796875 | 3 |
What is a Therapy Dog?
Therapy dogs are trained to provide comfort and companionship to patients in hospitals, people going through mental health counseling, elderly individuals living in retirement or assisted living communities and more. Unlike service dogs, they're not paired with a specific individual or covered by the Americans with Disabilities Act. Instead, they're trained to comfort all different types of people. They've even been used to help autistic children learn to socialize.
Therapy dogs can be of any size or breed but are generally at least a year old. (Puppies' temperaments are more likely to change over time.) A therapy dog is calm, sensitive to emotions, patient and gentle, and, perhaps most important, enjoys being petted and touched.
Therapy Dog Certification
There are a variety of organizations that certify therapy dogs, both on the regional and national levels, and credentialing varies by organization. For example, Therapy Dogs Inc. is a national organization with more than 12,000 dog/handler teams. Along with a variety of behavioral traits, the organization requires dogs to complete several supervised visits before allowing a dog and its handler to begin official visits.
At the New York-based Good Dog Foundation, dogs are pre-screened by a trainer, then enrolled with their handlers in therapy courses led by experts to learn obedience and practice responding to unfamiliar environments, such as schools or nursing homes, and unexpected behaviors, such as an uneven gait or clumsy touch. Finally, a veterinarian assesses each dog before it is certified. Therapy teams are recertified annually.
Other programs focus less on training than on registration, such as the American Kennel Club Therapy Dog Program, which bestows the Therapy Dog title to animals that have completed 50 visits, are registered by an AKC-recognized organization and are AKC-registered or listed themselves.
Benefits of Therapy Dogs
Sometimes called "animal-assisted therapy" or "animal-assisted activities," depending on how spontaneous the encounter is, the process of interacting with a therapy dog can be as simple as hugging, holding or petting the animal. For people with post-traumatic stress disorder, a dog can provide emotional support, evoke feelings of love and offer companionship and stress relief, as well as a reason to socialize with other humans.
How Therapy Dogs Can Help You Live a Healthier Life
Dogs Can Help Everyone from Young to Old
Page 1 of 3 Next Page ›Got a story idea? Give us a shout! | <urn:uuid:5408fee5-6951-452b-912d-3f613c35c546> | CC-MAIN-2016-26 | http://www.sparkpeople.com/resource/wellness_articles.asp?id=1903 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397748.48/warc/CC-MAIN-20160624154957-00180-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.953866 | 509 | 2.84375 | 3 |
- how a child evolves the skill of using language: at first he just accompanies gestures with inarticulate shouts, then progressively uses articulated words but still as an almost-automatic companion to gestures, then progressively learns how the words he articulates can produce effects on the environment by their own, etc
- memories do not necessarily have to be associated with a sensory modality: e.g. the memory of a phone number, or of a theorem, are not associated with neither vision, nor sound, nor touch, etc.
- cognition as the activity of storing and manipulating mental entities; these mental entities are all interconnected and thus operating on one entity also involves operating on many other entities, much in the way one would operate on a physical entity which is physically connected to other physical entities. In this metaphor, some of the mental entities are accurate representations of physical entities by effectively integrating immediate sensations, while other mental entities may be "purely mental"; in this way the line between a physical action and a cognitive process is blurred, and, at the limit, eliminated all together.
- coordination defines entities, and various kinds of coordination define various types of entities. e.g. an actuator is a physical entity for which the mechanical parts act in coordination in order to achieve a goal, i.e. each movement of each part contributes to achieving the actuator's final objective
- attention as a coordinator of cognitive sub-processes; similarity with the role of the central nervous system: whereas the CNS coordinates mechanical components (the body parts), attention coordinates processes (the mental processes)
- distributed coordination mechanisms as an alternative to centralized coordination mechanisms: for example, fish swarms, or bird flocks, exhibit spatio-temporal coordination by virtue of a distributed system represented by a set of rules that is followed by each element in the swarm. In other words, although coordination in a multi-element entity may be achieved via a central coordination mechanism that gives different instructions to each element, it may also be achieved by having one single set of rules that is followed by every element.
- note that the requirements for the elements' control structures in the two cases above are very different: whereas in the first case differentiation is not only allowed but also beneficial, in the second case the elements should have a more-or-less common control structure in order to be able to execute a set of commands that is common for all of them. This observation also leads to a third model for the elements which is a generalization of the first two, where each element includes both a specialized control structure (to be used for receiving specific control messages) and a common control structure (used to receive non-differentiated control messages).
- the analysis of the centralized coordination mechanisms can be made from an evolutionist perspective: while a body of [nearly] identical elements can be coordinated by a uniformly distributed mechanism (e.g. a set of rules that governs a homogeneous environment in which the elements operate), as specialization occurs among the body elements the control signals that they will receive will also have to become specialized; this specialization of control signals, together with the need for coordination of the body elements, may constitute an evolutionist pressure that drives the appearance of a centralized control structure as we know it in the evolved creatures (note that this approach can be used to analyze the way societies of living beings are organized, depending on the level of specialization of their members).
- an evolutionist approach to intelligence: what are its parts (or components, or "organs"), how might these parts have evolved as a response to evolutionist pressures (and how attention might have evolved as the coordinator of these organs), what kind of evolutionist pressures was intelligence subjected to - both as a whole and its comprising parts, how did the evolution of intelligence (and its components) might have pressured the evolution of its material substrate, etc
- the importance of specialization, and the implication that there may be several distinct mechanism responsible for the various abilities that an agent possesses; however, also note that evolution is incremental, such that many sub-modules may well be reused
- an intriguing aspect when investigating language from an evolutionist perspective: whereas most of the features/abilities that a living being possesses can be analyzed as an evolutionary advantage that an individual gains in its relations with a given environment, for language to be evolutionarily useful it apparently requires that a rather large number of individuals all gain the ability of language simultaneously. However, there are (at least) two immediate objections that can be brought to the above remark: 1) a harmless mutation can well spread in a population even if it's not immediately useful, and only become an evolutionary advantage after a certain period of time when the environment (as a whole) "is ready to make use of it", and 2) maybe one should also investigate the emergence of language as a form of communication with a given environment instead of with other individuals, or as a form of making better use of the information that an individual is learning, or even as a form of "communicating with oneself"
- note: the remark that a harmless mutation may propagate throughout a population without any immediate benefits, while providing a delayed evolutionary advantage, should be kept in mind when analyzing other traits apart from language
- a wonderful and not immediately obvious example of how apparently non-conflicting features do actually conflict, and thus one of them can loose ground in face of the other in the course of evolution (in this example, trichromacy vs bicrhomacy):
In the case of primate color vision, trichromacy based on the "new" M and L pigments (along with the S pigment) presumably conferred a selective advantage over dichromats in some environments. The colors of ripe fruit, for example, frequently contrast with the surrounding foliage, but dichromats are less able to see such contrast because they have low sensitivity to color differences in the red, yellow and green regions of the visual spectrum. An improved ability to identify edible fruit would likely aid the survival of individuals harboring the mutations that confer trichromacy and lead to the spread of those mutant genes in the population.
Scientific American - Color Vision: How Our Eyes Reflect Primate Evolution | <urn:uuid:27b0fa39-04b3-4796-9f0e-5e463505e5d9> | CC-MAIN-2016-26 | http://theaiproject.blogspot.com/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783394414.43/warc/CC-MAIN-20160624154954-00031-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.944453 | 1,267 | 3.4375 | 3 |
Edgar Lee Masters, whose Spoon River Anthology will have a deep influence on writers of the 1920s, is born in Garnett, Kansas, on this day in 1869.
As a child, Masters lived in small towns in Illinois. His mother, from New England, was homesick for her old East Coast life filled with music and literature, and his father, an attorney, was a cold and distant man. As a result, Masters gained a sense of the unhappiness and lack of fulfillment that could lie below small-town America’s pastoral facade.
Masters studied for a year at Knox College in Galesburg, Illinois, then studied law in his father’s office. He passed the bar, then moved to Chicago in 1891. There, he found himself surrounded by writers taking part in the Chicago Renaissance and began writing undistinguished poetry himself. He published a collection of verse in 1898, and various essays and blank-verse dramas in the early 1900s. He married twice and had three children
In 1909, a friend gave him a copy of Epigrams from the Greek Anthology, a collection of 4,000 poems written between 700 B.C. and 1000 A.D. The short autobiographical poems inspired Masters to write his masterpiece, Spoon River Anthology. The book contained a series of short, unrhymed poems, the meditations of deceased residents of the small town of Spoon River. In just a handful of lines, the speakers outline their lives-mostly unhappy, unfulfilled, and full of bitterness, anger, or love for other speakers. The poems expose the sterility and small-minded element of small-town life, which became a theme of other writers in the 1920s, notably Sinclair Lewis. The book was a huge success, breaking sales records and allowing Masters to retire from his legal practice and write full time. Although he wrote more than 50 books, including poetry collections and biographies, he is chiefly remembered for Spoon River. He died in 1950. | <urn:uuid:bdaa94ee-4eb8-4ccf-84bf-e8e0b08ff633> | CC-MAIN-2016-26 | http://www.history.com/this-day-in-history/edgar-lee-masters-author-of-spoon-river-anthology-is-born?catId=8 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396459.32/warc/CC-MAIN-20160624154956-00074-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.973958 | 413 | 2.671875 | 3 |
Click the following link to bring up a new window with an automated collection of images related to the term: Humanhood Images
Lexicographical Neighbors of Humanhood
Literary usage of Humanhood
Below you will find example usage of this term as found in modern and/or classical literature:
1. The New Republic: A Discourse of the Prospects, Dangers, Duties and Safeties by Thomas Lake Harris (1891)
"Humanly he is a germ that cannot grow excepting as it finds a substance and form of humanhood that shall serve as environment. ..."
2. Journal of Social Science by Franklin Benjamin Sanborn, Frederick Stanley Root, American Social Science Association, Isaac Franklin Russell (1881)
"Only thru " les hours " of daily toil can mankind rise and dwel in their higher humanhood, and acquire sufficient strength to seize and hold that larger ..."
3. Journal of Social Science: Containing the Proceedings of the American by American Social Science Association, Franklin Benjamin Sanborn, Frederick Stanley Root (1882)
"Only thru " les hours " of daily toil can mankind rise aud dwel in their higher humanhood, and acquire sufficient strength to seize aud hold that larger ..."
4. The Christian Science Journal by Mary Baker Eddy (1895)
"A certain coincident of true humanhood must be uniform kindliness of demeanor toward, and a careful consideration of, the rights and prerogatives of others. ..."
5. Poverty and Un-British Rule in India by Dadabhai Naoroji (1901)
"... of this very right of humanhood for which they are so proud for themselves, that they reduced the people of India from humanhood to beasts of burden, ..."
6. The Elements of Individualism: A Series of Lectures by William Maccall (1847)
"When a man is faithful to his humanhood, he not merely runs counter to his age, ... If a man attempt to benefit humanity by being faithful to his humanhood, ..." | <urn:uuid:4688f4ed-945b-4a99-b371-48342ff83d14> | CC-MAIN-2016-26 | http://www.lexic.us/definition-of/humanhood | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396029.85/warc/CC-MAIN-20160624154956-00021-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.919005 | 420 | 2.84375 | 3 |
Tyr (pronounced like the English word “tear”; Old Norse Týr, Old English Tiw, Old High German *Ziu, Gothic Tyz, Proto-Germanic *Tiwaz, “god”) is a relatively minor Aesir god in Viking Age Norse mythology. However, his name and attributes along with evidence from the study of comparative religion divulge to us that his Viking Age form is a severely diminished version of a divine figure who, in earlier ages, was the highest god of the Norse and other Germanic peoples. (By the Viking Age, this role had been usurped by Odin.)
Tyr in the Viking Age
While mentions of Tyr in Old Norse literature are few, he certainly seems to have been regarded as one of the principal war gods of the Norse, along with Odin and Thor. For example, in the Sigrdrífumál, one of the Eddic poems, the valkyrie Sigrdrífa instructs the human hero Sigurðr to invoke Tyr for victory in battle. Another Eddic poem, the Lokasenna, corroborates this picture by having Loki taunt that Tyr could only stir people to strife, and could never reconcile them.
The Lokasenna also mentions that Tyr lost one of his hands to the wolf Fenrir. Indeed, Tyr’s one-handed-ness seems to be one of his defining attributes. The only full explanation of this handicap comes from the Prose Edda, which recounts how, when the gods endeavored to bind Fenrir for their own safety, the wolf refused to allow the suspiciously innocent-looking cord to be put around him unless one of the deities put his or her hand in his mouth as a pledge of good faith. Only Tyr was brave and honorable enough to comply with the beast’s request, and, when Fenrir found himself unable to break free of his fetters, he accordingly helped himself to the god’s hand.
The tale of the loss of his hand suggests that Tyr was appealed to not only in matters of war but also in matters involving law, justice, honor, oaths, and upholding traditional sources of authority. As will be shown below, Tyr was certainly associated with these spheres of life before the Viking Age, and the nature of his handicap shows that he was still associated with these conceptions in the Viking Age, however much his importance had been lessened amongst the northern Germanic peoples who had not yet been Christianized by this time.
Tyr Before the Viking Age
Just as the Norse languages and religion are part of the larger Germanic family of languages and religious modes, so the Germanic languages and religions are part of the larger Indo-European family, which also includes Greek, Sanskrit, the Celtic and Romance languages, and several others besides, as well as the religious traditions practiced by the speakers of those languages. One can potentially learn much about an aspect of a religious tradition that’s an offshoot of the Proto-Indo-European parent tradition by studying the parent tradition itself.
Such is certainly the case with Tyr. Tyr is a continuation of the Proto-Germanic deity *Tiwaz, who is himself a continuation of the Proto-Indo-European god *Dyeus. Both the name *Dyeus and the basic Proto-Indo-European word for god, *deiwós, are variations of the root *dyeu-, “the daytime sky.” *Dyeus was the archetypal “Sky Father” and likely the head of the Proto-Indo-European pantheon. After all, his name was effectively identical with the word for godhood itself. Other gods derived from him include the Greek Zeus and the Roman Jupiter (from *Dyeus Phater, “Sky Father”). Fascinatingly, the modern English words “day” and “deity” both come from this same root.
The use of this same word to denote both the name of *Dyeus and “god” more generally survived into the Viking Age. As was noted above, Tyr’s name simply means “god,” and its use can be found in contexts that have nothing to do with Tyr with a capital “T.” For example, one of Odin’s bynames is Hangatýr, “God of the Hanged.”
One of *Dyeus‘s roles was that of a guarantor of justice, one before whom oaths were sworn. As we’ve seen, this role remained consistent up through the Viking Age.
Some of the spatiotemporal gaps between these two distant periods are filled in with evidence from the Germanic tribes of the first few centuries CE. In the Elder Futhark, the oldest runic alphabet, the T-rune, named *Tiwaz after Tyr’s name in the Proto-Germanic language that was spoken at the time, is in the shape of an arrow pointed upward toward the heavens, which is clearly emblematic of the god’s associations with both war and the diurnal sky. The Romans glossed *Tiwaz as “Mars” due to his military role, and a third century votive stone erected by a Germanic warrior in the Roman army features an inscription dedicated to a “Mars of the Þing” (the Germanic judicial/legislative assembly); surely this is addressed to Tyr.
Also through his association with Mars, Tyr lent his name to the modern English “Tuesday,” from Old English “day of Tiw” (Tiwesdæg), which was in turn based on the Latin Dies Martis.
Thus, however humble Tyr’s place in Viking Age religion and mythology, he was once as indispensable as daylight in the minds and hearts of the Germanic peoples.
Looking for more great information on Norse mythology and religion? While this site provides the ultimate online introduction to the topic, my book The Viking Spirit provides the ultimate introduction to Norse mythology and religion period. I’ve also written a popular list of The 10 Best Norse Mythology Books, which you’ll probably find helpful in your pursuit.
de Vries, Jan. 2000. Altnordisches Etymologisches Wörterbuch. p. 603.
Orel, Vladimir. 2003. A Handbook of Germanic Etymology. p. 408.
The Poetic Edda. Sigrdrífumál, stanza 6.
The Poetic Edda. Lokasenna, stanza 38.
Snorri Sturluson. The Prose Edda. Gylfaginning 25.
Mallory, J.P., and D.Q. Adams. The Oxford Introduction to Proto-Indo-European and the Proto-Indo-European World. p. 408.
Ibid. p. 409.
Snorri Sturluson. The Prose Edda. Skáldskaparmál 9.
West, M.L. 2009. Indo-European Poetry and Myth. p. 172.
Turville-Petre, E.O.G. 1964. Myth and Religion of the North: The Religion of Ancient Scandinavia. p. 181. | <urn:uuid:ffcad601-cc48-49e8-a5cb-1d2b2caf65be> | CC-MAIN-2016-26 | http://norse-mythology.org/gods-and-creatures/the-aesir-gods-and-goddesses/tyr/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783391519.2/warc/CC-MAIN-20160624154951-00048-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.953943 | 1,541 | 3.25 | 3 |
How is egg different from sperm?
Egg and sperm are both gametes, or reproductive cells. Notice how different they are, however. The egg is much larger than the sperm. The egg also does not have a tail. And the female only releases one egg at time, while the male releases millions of sperm at a time.
Eggs and Egg Production
When a baby girl is born, her ovaries contain all of the eggs they will ever produce. But these eggs are not fully developed. They develop only after she starts having menstrual periods at about age 12 or 13. Just one egg develops each month. A woman will release an egg once each month until she is in her 40s.
Eggs are very big cells. In fact, they are the biggest cells in the human body. An egg is about 30 times as wide as a sperm cell!
You can even see an egg cell without a microscope. Like a sperm cell, the egg contains a nucleus with half the number of chromosomes as other body cells. Unlike a sperm cell, the egg contains a lot of cytoplasm, the contents of the cell, which is why it is so big. The egg also does not have a tail.
Egg production takes place in the ovaries. It takes several steps to make an egg:
- Before birth, special cells in the ovaries go through mitosis (cell division).
- The daughter cells then start to divide by meiosis. But they only go through the first of the two cell divisions of meiosis at that time. They go through the second stage of cell division after the female goes through puberty.
- In a mature female, an egg develops in an ovary about once a month. The drawing in Figure below shows how this happens.
As you can see from the figure, the egg rests in a nest of cells called a follicle. The follicle and egg grow larger and go through other changes. After a couple of weeks, the egg bursts out of the follicle and through the wall of the ovary. This is called ovulation. The moving fingers of the nearby fallopian tube sweep the egg into the tube.
This diagram shows how an egg and its follicle develop in an ovary. After it develops, the egg leaves the ovary and enters the fallopian tube. (1) Undeveloped eggs, (2) Egg and follicle developing, (3) Egg and follicle developing, (4) Ovulation.
Fertilization occurs if a sperm enters the egg while it is passing through the fallopian tube. When this happens, the egg finally completes meiosis. This results in two daughter cells that are different in size. The smaller cell is called a polar body. It contains very little cytoplasm. It soon breaks down and disappears. The larger cell is the egg. It contains most of the cytoplasm. This will develop into a child.
cytoplasm: The entire contents of the cell inside the plasma membrane, excluding the nucleus.
fallopian tube: Female reproductive organs that carry eggs from the ovary to the uterus.
follicle: Structure in the ovary where eggs mature.
meiosis: The process in cell division during which chromosome number is halved in order to produce gametes.
mitosis: The division of the nucleus.
ovulation: Release of the egg out of the follicle and through the wall of the ovary.
polar body: Small cells formed by the unequal meiotic divisions of cytoplasm as an egg develops.
- Eggs are female gametes that form in the ovaries and are released into the Fallopian tubes.
- The eggs are formed before a baby girl is born, but these eggs are not fully developed.
Use the resources below to answer the questions that follow.
- What happens during ovulation? What happens to an egg after ovulation?
- At what point is a zygote formed? How many chromosomes does a zygote have?
- Where does implantation occur? Where does development occur?
- At what point in a human female's development do oogonia become primary oocytes?
- What happens to primary oocytes when a female enters puberty?
- What happens to a secondary oocyte when it is fertilized?
- What happens to a secondary oocyte if it is not fertilized?
- Describe what happens during ovulation.
- Explain how an egg develops in an ovary of a mature female. | <urn:uuid:5452a3d2-ef54-46fa-9101-7f0762df0287> | CC-MAIN-2016-26 | http://www.ck12.org/book/CK-12-Life-Science-Concepts-For-Middle-School/r3/section/11.70/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397744.64/warc/CC-MAIN-20160624154957-00044-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.952292 | 942 | 4.125 | 4 |
Israel's History in Pictures: Shiloh
And the whole congregation of the children of Israel assembled themselves together at Shiloh, and set up the Tabernacle there, and the land was subdued before them. (Joshua 18:1)
When Joshua brought the children of Israel across the Jordan River he was really leading a new nation, born in Egypt and Sinai but forged for 40 years in the furnace of the desert.
Their journey had started hundreds of years earlier when Jacob's sons, grazing their flocks near Shechem (Nablus), sold Joseph into slavery in Egypt. Their descendants returned to the same area in Samaria bearing Joseph's body for burial in Shechem. They chose the nearby village of Shiloh as the resting place for the Tabernacle which housed altars, the menorah, the ark of the Covenant and more.
Ruins of Shiloh (circa 1910, Library of Congress)
There the Tabernacle would remain for almost 400 years, the place for pilgrimages and sacrifices. In Shiloh, Joshua drew lots to divide up the land among the Israelite tribes. Eli the High Priest officiated.
A woman named Hannah came to Shiloh to pray for a son and promised he would serve the Lord if he was born. Samuel was born to Hannah. He served in the Tabernacle and was the prophet who anointed Saul and then David as kings. David shifted his capital first to Hebron and then to Jerusalem.
Archaeologists today have little doubt that the area known as Sailun was the location of biblical Shiloh. Evidence
of early synagogues, churches and mosques can be found there.
In the Talmudic period and the Middle Ages, Shiloh was a destination for pilgrims.
We recently discovered online an antique book, "A Month in Palestine and Syria, April 1891," posted by the New Boston Fine and Rare Books. The book includes a travelogue and several dozen photographs of tourists and pilgrims. They also visited Shiloh.
Unfortunately, the antique book shop does not know the name of the photographer or author. We would welcome suggestions from our readers.
Today, religious pilgrims are usually found in the south, in a place called Jerusalem, but those visiting Shiloh, located in the Binyamin district of Samaria, can see new and exciting excavations of the Tabernacle site and meet a vibrant community of Israeli families. The temple in the main photograph is now closed. | <urn:uuid:de2532a9-1edd-491e-a6ae-ee69e6c141d5> | CC-MAIN-2016-26 | http://www.israelnationalnews.com/News/News.aspx/170601 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399522.99/warc/CC-MAIN-20160624154959-00130-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.969385 | 514 | 3.4375 | 3 |
Linking Generations through Radio
Radio practitioners, children and youth who wish to produce quality programmes using participatory and autonomous approaches for young people’s radio can now refer to UNESCO’s radio toolkit – Linking Generations through Radio.
The open access document is inspired by children and youth who make up one-third of the world’s population. The majority may listen to radio but the likelihood they are invited to regularly produce interviews and programmes, express their information needs or their opinions about productions made for them is very low.
“People are shocked that we are on the radio and that we can do this by ourselves as children,” recounted Mwajuma, 14, from Dar Es Salaam during the preparatory phase of the toolkit.
“The radio programme has helped me build my confidence . . .,” said Cecelia, 10, from Moshi, Tanzania who is already involved in a children’s radio project. She claims that learning to ask questions for radio has helped her overcome her fear of asking questions in the classroom.
During a 2010 survey conducted amongst three low-income countries, broadcasting managers did not see the need to ask children or youth about their opinion when creating programmes for them. In a separate project, young and employed broadcasting producers were not sure how to frame questions because they did not know enough about the topic they were covering. Pre-testing the toolkit demonstrated that involving teachers, parents and guardians facilitates young people’s involvement in media development and media literacy. Many examples can be cited to underline that initiatives that use cost-effective and widespread technology can help to bridge the gap between generations and enhance knowledge creation.
The 62-page, spiral bound publication is divided in to four parts that guide the reader through a step-by-step process clarifying linkages between conceptualizing and planning radio programmes with and for young people. It provides inclusive examples to allow free exchange of ideas between girls and boys and increase awareness of radio producers and managers about ethical and legal requirements particularly when working with minors. It may serve as a routine training or programming handbook in radio stations, a reference and resource for young people, and an advocacy tool to inform policy makers as well as the general public.
The toolkit is being used to strengthen the performance of 32 radio stations in seven Sub-Saharan African countries in collaboration with the Children Radio Foundation based in South Africa. It is also being piloted amongst international youth delegates, observers and participants attending the 8th Youth Forum at UNESCO’s Headquarters in Paris.
The youth radio toolkit is a product of the project “Empowering Local Radios through ICTs” financed through the generous contribution of Sweden.
<- Back to: All news | <urn:uuid:137b8de8-ba0d-4d3e-a2c3-3e4763e886dc> | CC-MAIN-2016-26 | http://www.unesco.org/new/en/media-services/single-view/news/linking_generations_through_radio/back/9597/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00172-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.958174 | 567 | 3.5 | 4 |
Aaron's parents were Amram and Jochebed. He had a
brother, Moses, and a sister, Miriam. When he was
grown he had a family of his own. His wife's name
was Elisheba and his sons were: Eleazar, Ithamar, Nadab
and Abihu. Nadab and Abihu were struck dead by God
when they offered strange fire in the role of priests.
Eleazar and Ithamar took their place as priests and did
a good job.
Job/Occupation: Aaron is known for his role as the
first high priest. In Old Testament times, the
high priest was the one that represented people before
God. We also know that before he was high priest.
Aaron was the spokesman for his brother, Moses.
God knew that Aaron could 'speak well' and Moses was
'slow of speech'. So Aaron spoke for Moses when
they represented God before Pharaoh. Aaron also
performed many miracles with Moses that we read about in
the book of Exodus.
Aaron was 83 years old when he and Moses spoke for God
to Pharaoh. They told him that God wanted his
people, the Israelites, to be freed from Egypt so that
they could worship God in the desert. Pharaoh
would not listen and many plagues, showing God's power,
came upon his land until he finally let God's people go.
These are referred to as the 10 plagues and can be read
about in Exodus 7-12.
Once the Israelites
were free from Egypt, they wandered in the desert for 40
years. Aaron was their high priest during this time.
Although Aaron was a good man, he made some bad choices
that made God angry such as making a golden calf, an
idol, for the people to worship while Moses was on Mount
Sinai (Exodus 32:5). He also shared in Moses' sin
at Merbah when Moses struck a rock to get water for the
people instead of speaking to the rock as he had been
commanded by God.
Death of Aaron:
Aaron died on Mount Hor. His robes, which the high
priest wore, were taken and given to his son, Eleazar,
who became the next high priest. Moses, his
brother, and Eleazar, his son, were present at his death
and buried him. The entire Israelite community
mourned his death for 30 days. (Numbers 20: 22-29)
Pharaoh's court - God turned his rod into a serpent.
When Pharaoh's magicians turned their rods into
serpents, Aaron's gobbled theirs up.
Aaron was 123
years old when he died.
name means 'enlightener'.
Amram married his
father's sister, Jochebed | <urn:uuid:3f0cc89c-fa87-44bb-9048-3a7d37cd7fc6> | CC-MAIN-2016-26 | http://www.biblebios.com/aaron/aaron.htm | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395548.53/warc/CC-MAIN-20160624154955-00011-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.98978 | 595 | 3.109375 | 3 |
May 21, 2009 -- It is well known that people use head motion during conversation to convey a range of meanings and emotions, and that women use more active head motion when conversing with each other than men use when they talk with each other.
When women and men converse together, the men use a little more head motion and the women use a little less. But the men and women might be adapting because of their gender-based expectations or because of the movements they perceive from each other.
What would happen if you could change the apparent gender of a conversant while keeping all of the motion dynamics of head movement and facial expression?
Using new videoconferencing technology, a team of psychologists and computer scientists - led by Steven Boker, a professor of psychology at the University of Virginia - were able to switch the apparent gender of study participants during conversation and found that head motion was more important than gender in determining how people coordinate with each other while engaging in conversation.
The scientists found that gender-based social expectations are unlikely to be the source of reported gender differences in the way people coordinate their head movements during two-way conversation.
The researchers used synthesized faces - known as avatars - in videoconferences with naïve participants, who believed they were conversing onscreen with an actual person rather than a synthetic version of a person.
In some conversations, the researchers changed the gender of the avatars and the vocal pitch of the avatar's voice - while still maintaining their actual head movements and facial expressions - convincing naïve participants that they were speaking with, for example, a male when they were in fact speaking with a female, or vice versa.
"We found that people simply adapt to each other's head movements and facial expressions, regardless of the apparent sex of the person they are talking to," Boker said. "This is important because it indicates that how you appear is less important than how you move when it comes to what other people feel when they speak with you."
He will present the findings Sunday at the annual convention of the Association for Psychological Science in San Francisco. A paper detailing the results is scheduled for publication in the Journal of Experimental Psychology: Human Perception and Performance.
The study, funded by the National Science Foundation, used a low-bandwidth, high-frame-rate videoconferencing technology to record and recreate facial expressions to see how people alter their behavior based on the slightest changes in expression of another person. The U.Va.-based team also includes researchers at the University of Pittsburgh, University of East Anglia, Carnegie Mellon University and Disney Research.
A video demonstration is available online at: http://faculty.
The technology uses statistical representations of a person's face to track and reconstruct that face. This allows the principal components of facial expression - only dozens in number - to be transmitted as a close rendition of the actual face. It's a sort of connect-the-dots fabrication that can be transmitted frame by frame in near-real time.
Boker and his team are trying to understand how people interact during conversation, and how factors such as gender or race may alter the dynamics of a conversation. To do so, they needed a way to capture facial expressions people use when conversing.
"From a psychological standpoint, our interest is in how people interact and how they coordinate their facial expressions as they talk with one another, such as when one person nods while speaking, or listening, the other person likewise nods," Boker said.
It is this "mirroring process" of coordination that helps people to feel a connection with each other.
"When I coordinate my facial expressions or head movements with yours, I activate a system that helps me empathize with your feelings," Boker said.
The technology the team developed further allows them to map the facial expressions of one person onto the face of another in a real time videoconference. In this way they can change the apparent gender or race of a participant and closely track how a naïve participant reacts when speaking to a woman, say, as opposed to a man.
"In this way we can distinguish between how people coordinate their facial expressions and what their social expectation is," Boker said.
Invited talk web page: http://www. | <urn:uuid:19f00ecd-6a1f-4966-8e77-09915208859a> | CC-MAIN-2016-26 | http://www.eurekalert.org/pub_releases/2009-05/uov-pft052109.php | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783398075.47/warc/CC-MAIN-20160624154958-00018-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.949759 | 869 | 3.3125 | 3 |
A lawsuit brought by the ACLU and allied groups against the U.S. Patent and Trademark Office has challenged the notion of patents on isolated native DNA sequences. The court's summary judgment in favor of the plaintiffs held that such patents covered parts of the natural world and were therefore inappropriate subject matter. The U.S. Department of Justice has now filed an amicus brief against gene patents, but in a more restricted sense than the original judgment. Specifically, manipulations as minor as producing complementary DNA from the natural sequence qualify the product as a patentable invention.
What is clear from this is that patents on genetically engineered organisms, which were designated appropriate subject matter under U.S. law by the Chakrabarty Supreme Court decision of 1980, are unlikely to come under serious legal challenge. The position of such organisms within the wider culture is also unassailed given the high penetration of GM crops in the human and animal food chains, the extensive use of transgenic mice-and soon, rats-in biomedical research, and the increasing presence of transgenic livestock in manufacturing and meat production operations. Patent protection is just one component of the drive to produce genetically engineered organisms, but it represents a strong financial motivation for (in the words of the philosopher Francis Bacon) "effecting of all things possible" in pursuit of utility and profit.
The cultural currency of transgenic animals, in particular, and the prospect of more extensive manipulation in the future, threatens a number of civilizational norms and precepts. In contrast to plants, which in their natural state exhibit wide ranging environment-dependent phenotypic plasticity, animal forms and identities are relatively stable, and are icons and constants of the visual arts and literature, particularly traditional works and those meant for children. Genetic engineering and other methods of reconfiguring animal biology, such as trans-species cloning and chimerism, inevitably blur the boundaries between different kinds of organisms, as well as between organisms and artifacts. Given the phylogenetic continuity of all animal species, this technology will inescapably come to threaten received notions of human uniqueness.
While most members of contemporary societies are willing to tolerate, or ignore, the warehousing, instrumentalization and cruelty visited on animals raised for food, research, or other human utility, the privileged status of the human body, even of those individuals defined as criminals or outcasts, has long been normative across the main political and religious spectrums. However, with the rise of religion-based states and social movements that deny the human value of outsiders, official and popular adherence to a common humanity has markedly weakened over the past decade even in modernizing societies committed to classically liberal values. Justification of torture of suspects by the highest U.S. officials, for example, unwillingness to prosecute its perpetrators or those performing grievous acts against bystanders in targeted groups, and nonchalance of the public about military methods guaranteed to kill civilians and noncombatants (in contrast, for example, to the Vietnam war era), have risen in concert with the innovations in the murderous tactics of the U.S.'s opponents.
It might seem incidental that this stark change in attitude (extending across the conservative-liberal and religious-secular divides) toward the bodily integrity of those defined as "other" has come about simultaneously with the capability to genetically engineer animals, including (absent some loose and internationally nonuniform legal prohibitions) humans. But the following contemporaneous trends should also be considered by way of context: (i) an ageing population in the U.S. and elsewhere, in need of spare body parts, is creating a demand for tissues and organs the provision of which will only occur under patent protection; (ii) such repair tissues and organs will be most useful if their sources are close to human, but most patentable if they are not exactly human; (iii) "reprogenetic" technology now permits production of human, or humanoid, individuals from stem cells derived from anonymous discarded tissues rather than any parent-associated embryos; (iv) for genetically modified organisms of human origin, the precise boundary between non-human and human is no less socially constructed than is the boundary between "us" and "them" in the political realm.
It is difficult to avoid the conclusion that as medicine becomes increasingly high-tech and personalized for those who can afford it, and the disparity in national wealth and income remains at its record levels in the U.S., there will be scientific and economic incentives to produce near-humans for research and therapy. The decline in the allegiance to a notion of human social commonality, along with the rise in the scientific understanding of human biological commonality and the means to manipulate and exploit it through, among other things, patent protection of genetically modified animals, seems to be an explosive combination.
Stuart A. Newman, PhD, is Professor of Cell Biology and Anatomy at New York Medical College and former member of CRG's Board of Directors. | <urn:uuid:5b20db6f-81b7-4fba-b8a1-75d411cfb60a> | CC-MAIN-2016-26 | http://www.councilforresponsiblegenetics.org/GeneWatch/GeneWatchPage.aspx?pageId=309&archive=yes | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396949.33/warc/CC-MAIN-20160624154956-00053-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.951188 | 1,000 | 2.796875 | 3 |
Graphene robot has some smooth moves
27 October 2011
The graphene robot can pick up a round object, move it and drop it into a container, all controlled by infrared light
Yi Xie at the University of Science and Technology of China, Hefei, and colleagues made the robot by combining an actuator, a device that converts energy into motion, with an electronic device, which responds to infrared light to curl and uncurl to pick up and drop objects.
'Integrating microelectronic devices with micromechanical devices represents an important step for developing intelligent electronics,' says Xie. 'Transparent flexible electronics such as fold-out displays have received considerable attention, but integrating actuators with electronic devices requires excellent mechanical actuating behaviour and high transparency.' So far, it has been difficult to find suitable transparent materials, adds Xie.
The team prepared the actuator by layering a polyethylene film onto a glass layer. On top of this, they added a graphene layer, which can absorb infrared light and convert this energy into heat with a high efficiency. The graphene - a sheet of carbon atoms one atom thick - also combines high transparency with strong mechanical performance. A strip of graphene on polyethylene that was 3mm by 12mm was then cut out and peeled off the glass, after which the strip curled up.
The team found that the strip uncurled in the presence of infrared light so switching the IR light on and off transformed the strip into a moving robot. The team demonstrated that their robot could pick up a small round object, move it and drop it into a container. They placed the uncurled strip above the object and turned the infrared light on, making the strip curl around the object. With the object in its grip, the strip was moved to a container, the infrared light was switched off, and the strip uncurled to drop its cargo.
'This is an elegant demonstration of photothermal energy conversion by graphene based actuators,' says Jiaxing Huang, who studies graphene-based functional materials at Northwestern University in the US. 'It could inspire the design of transparent artificial muscles.'
Interesting? Spread the word using the 'tools' menu on the left.
Link to journal article
Large-area graphene realizing ultrasensitive photothermal actuator with high transparency: new prototype robotic motions under infrared-light stimuli
Changzheng Wu, Jun Feng, Lele Peng, Yong Ni, Haiyi Liang, Linhui He and Yi Xie, J. Mater. Chem., 2011, 21, 18584
Also of interest
05 October 2010
Andre Geim and Kostya Novoselov are this year's winners for discovering that peeling sticky tape from graphite could produce an amazing new material
20 June 2010
Researchers have made a 30-inch touch-screen based on layers of graphene - sheets of carbon a single atom thick
Atom-thin sheets of carbon are taking the materials world by storm. Richard Van Noorden discovers that now is the perfect time for chemists to join the party
Comment on this story at the Chemistry World blog
Read other posts and join in the discussion
External links will open in a new browser window | <urn:uuid:2bdf1d36-2f03-4a6c-a2cc-9e851e830d5b> | CC-MAIN-2016-26 | http://www.rsc.org/chemistryworld/News/2011/October/27101101.asp | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783400031.51/warc/CC-MAIN-20160624155000-00113-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.920792 | 655 | 3.015625 | 3 |
BRUSSELS — The European Union has outlawed the practice of slaughtering sharks for their fins, which are sold to Asia to make soup, according to an official regulation posted Friday.
Much shark meat is of little value as it is considered tough to eat, and the practice of "finning" -- hacking the fins off living sharks and dumping them back in the sea where they die -- has been blamed for pushing some species close to extinction.
"The practice of shark finning may contribute to the excessive mortality of sharks to such an extent that many stocks of sharks are depleted, and their future sustainability may be endangered," the EU said in its Official Journal.
European fishing fleets have become major exporters of fins to Hong Kong, the most significant shark fin market in Asia.
Shark fin soup is frequently served at Chinese wedding banquets as a symbol of generosity and wealth, and as many as 40 sharks can be killed to supply each wedding. In some restaurants in the region, a bowl of the soup can cost $100. | <urn:uuid:77b91054-2f80-4341-8ec0-efe5a3b8f2ba> | CC-MAIN-2016-26 | http://articles.latimes.com/2003/jul/05/world/fg-fin5 | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393518.22/warc/CC-MAIN-20160624154953-00148-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.964198 | 210 | 2.71875 | 3 |
Auschwitz no. 9228 B
Samuel Kops was born to Jacob and Sara (née Zwaaf) on the 29th of July 1916 in Amsterdam. He had a brother, Joseph, who was five years younger than him.
In February 1941 his parents lived in Amsterdam at Waterlooplein 76 III. Samuel's family suffered from financial difficulties and so Samuel was placed into the care of the Dutch-Jewish orphanage for boys on the Amstell where he was raised and educated.
Following the completion of his secondary education he asked the management of the orphanage to help him to achieve his dream and to finance his medical studies. After lengthy discussions they approved the financing of his studies on condition that he would work as an educator in the orphanage itself. On the 20th of September 1942 Samuel Kops passed his final medical exam but continued to live and work in the orphanage. He was a full member of staff and his work was highly valued.
On the 27th of December 1942, on the orders of the German Appointee Dr Leitersdorf, the orphanage ceased functioning as an independent institution and was subsumed within the network of welfare institutions placed under the supervision of the German occupation authorities.
On the 5th of March 1943 the orphanage was surrounded by officers of the Amsterdam Police. The children and staff were gathered in the main playground of the orphanage. There was no way to escape. The rumour that the orphanage was surrounded and that its members were about to be deported spread throughout Amsterdam. Relatives hurried to see their children for the last time and to part from them. The police surrounded the area and when the families tried to enter the site fire-fighters became involved and the crowds were dispersed with water cannon. The SS informed the orphanage management that the deportation order concerned only the boys who were under the care of the orphanage. The manageress of the orphanage, Mrs. Hamburger, her assistant Mrs. Bing and Samuel Kops could leave and save themselves but of their own free will and in a show of dedication to their charges the three decided to attach themselves to the orphans. They found the courage and the spiritual strength to tell the Germans that they were not interested in the freedom that they had been offered and that they did not intend to abandon the 100 children of the orphanage in their hour of need. Not one of those deported that day, the children or the three staff members, survived.
On the 14th of July 1944 Samuel Kops was deported to the Transit Camp Westerbork where he was housed in barrack no. 67 in the camp – the criminals' barrack.
Less than two months later, on the 3rd of September, Samuel Kops was sent from Westerbork to Auschwitz as a Strafgeval, a term used to refer to those who were caught trying to escape or who were active in the underground.
On arrival at Auschwitz, on the 5th of September, he underwent the selection, received the number 9228 B and became an inmate of the camp.
The last mention of Kops in camp documents is from the 6th of December 1944.
Jacob and Sara Kops were murdered on the 7th of December 1942 at Auschwitz. Joseph died at the age of 22, on the 28th of February 1943, in Seibersdorf - a forced labor camp in Upper Silesia.
On the 3rd of September 1944 an RSHA transport left the transit camp Westerbork in Holland. It contained 1,019 Jews, among them 498 men, 442 women and 79 children. They arrived at Auschwitz on the 5th of September 1944. Following the selection 258 men received the numbers 9108B – 9365B and 212 women received the numbers 25060A – 25271A and became inmates of the camp. The remainder, 549 people, were murdered immediately in the gas chambers.
Anne Frank, the famous diarist, her father Otto, mother Edith and sister Margot were also sent to Auschwitz on this transport.
Otto Frank received the number 9174B. He survived and was liberated from the camp on the 27th of January 1945. The mother, Edith, did not survive until liberation; she succumbed to exhaustion and disease in January 1945 in Auschwitz. Anne and Margot were transferred from Auschwitz to Bergen-Belsen where both perished. Margot died first, from typhus on the 31st of March, followed by her sister Anne, aged 16 at her death.
Do you have additional information about this person? Contact Yad Vashem. | <urn:uuid:6a72b794-4687-4913-9073-b9f1b32461fa> | CC-MAIN-2016-26 | http://www.yadvashem.org/yv/en/exhibitions/death_march/9228b.asp | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783397795.31/warc/CC-MAIN-20160624154957-00054-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.988731 | 942 | 2.546875 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.