text
stringlengths 150
542k
| id
stringlengths 47
47
| dump
stringclasses 1
value | url
stringlengths 15
499
| file_path
stringlengths 138
138
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 39
159k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
Early ASL Awkwardness
Don't be afraid of making errors. Remember: To err is human. Everyone makes mistakes. It's really no big deal if you make an error while learning ASL. It's all just part of the learning process and has no serious consequences. Your mistakes might even produce a few laughs! Silly signing errors happen consistently in Level I ASL classes. Just have a good giggle, move on, and learn from your errors.
Whatever you do, don't get discouraged. Don't give up. You can learn ASL, and have fun while you are learning. Although there are no shortcuts to learning how to form each sign, there is plenty of support in these pages. With a little determination, a positive attitude, and a dab of courage, you'll be signing with confidence in no time.
Those new to ASL often express frustration and discomfort during the first few weeks of learning. Have patience until you get past this awkward stage. You may experience these feelings:
You are not in control of your arms and hands.
You have no idea why your hands formed a particular sign.
What you have signed is not what you intended.
These are all normal feelings. They will all soon dissipate, and then you can look back and smile about your early ASL awkwardness. Be patient. This is a new and different way of communicating, and acclimating to a visual language takes time. Just dig in your heels, and go to it. | <urn:uuid:85835b58-a558-4464-8f0e-19a8a991d37a> | CC-MAIN-2013-20 | http://www.netplaces.com/sign-language/strategies-for-learning/early-asl-awkwardness.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.957118 | 307 | 2.859375 | 3 |
NetWellness is a global, community service providing quality, unbiased health information from our partner university faculty. NetWellness is commercial-free and does not accept advertising.
Wednesday, June 19, 2013
For many people, the Memorial Day holiday marks the unofficial beginning of summer. Across the Tristate, families host holiday cookouts and neighborhood pools open their gates for kids and sunbathers alike.
But while the sun's rays can be dangerous without proper skin protection, the sun has some benefits, too.
Small doses of sunlight can help trigger vitamin D synthesis in the skin, which is key for aiding in the absorption of calcium for our bones.
Vitamin D is a fat-soluble vitamin found in some foods and can be made in your body after exposure to ultraviolet rays from the sun. It helps the body maintain normal blood levels of calcium and phosphorus and promotes calcium absorption to help form and maintain strong bones.
Take caution to protect your skin from sun damage, but don't avoid sunlight altogether.
For other people, who get up before sunup and put on sunblock first thing, a supplement of vitamin D is usually required, which are readily available without a prescription.
It's possible to get too much vitamin D. The safe "upper limit" is 2,000 IU daily, but it's impossible to get vitamin D toxicity from sun exposure and toxicity from over-the-counter doses is unlikely.
This article originally appeared in UC Health Line (5/22/2008), a service of the University of Cincinnati Academic Health Center Public Relations Communications Department and was adapted for use on NetWellness with permission, 2006.
Last Reviewed: May 23, 2008
Nelson Watts, MD, FACP, MACE
Professor of Medicine
Director, Bone Health and Osteoporosis Center
College of Medicine
University of Cincinnati | <urn:uuid:ff31e250-1650-42f0-9ec6-107190a9f372> | CC-MAIN-2013-20 | http://www.netwellness.uc.edu/healthtopics/osteoporosis/sunrays.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.92527 | 381 | 2.9375 | 3 |
New Albany School District Implements District Wide Bully Free Program & Bully Message Lines
The New Albany School District is dedicated to assuring that all students have a safe, happy school experience and continues to take positive steps to create safe, bully-free schools. Since this past spring, administrators, counselors, and teachers have received extensive training to help create a "bully free" school environment.
The school system has adopted the Bully Free Program, available from Bully Free Systems (www.bullyfree.com). These lesson plans will be used on a regular basis in each school across the district to help students understand the different types of bullying and how to prevent it. In addition, the schools will schedule programs and guest speakers to emphasize the importance of "bully free" schools.
Recently, the NASD has implemented the Bullying Message Line at New Albany Elementary School, New Albany Middle School, and New Albany High School.
The Bullying Message lines can be used by parents or students to report bullying incidents that occur at school. The phone lines are equipped to take messages, which will be checked daily. All messages will be kept in strict confidentiality. When reporting an incident, please include the following information: name of person being bullied, when the bullying is happening, and where the bullying is happening.
The numbers for the Bullying Message Lines are as follows:
New Albany Elementary School
New Albany Middle School
New Albany High School
"We want all of our students to feel safe when they are in our schools and have a positive learning environment," said John Ferrell, New Albany High School Assistant Principal. Ferrell is the Bullying Prevention Coordinator for the school district. "Our school district takes bullying seriously and every report will be investigated, | <urn:uuid:bea1207b-0b6c-4865-ad0a-3c12d07b88e0> | CC-MAIN-2013-20 | http://www.newalbanyschools.us/bullyline.php | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.951758 | 359 | 2.84375 | 3 |
Forget invisible ink or lemon juice – spies can now send messages hidden in genetically engineered bacteria. The new method, dubbed steganography by printed arrays of microbes (SPAM), uses a collection of Escherichia coli strains modified with fluorescent proteins that glow in a range of seven colours.
Each character of the message is encoded using two colours, creating 49 possible combinations – enough for the alphabet, the figures 0 to 9 and a few other symbols. "You can think of all sorts of secret spy applications," says David Walt, a chemist at Tufts University in Medford, Massachusetts, who led the research.
Messages are grown on agar plates then transferred to a thin film that can be sent in the post to the recipient. The film appears blank in everyday conditions, but the message is revealed when the recipient transfers the bacteria to an appropriate growth medium.
As well as giving the bacteria their fluorescent palette, genetic modification also defines which growth medium they will respond to – so the medium type can act as a secret key. For example, bacteria engineered with resistance to a certain antibiotic will display a message only when treated with that particular chemical – any other antibiotic will produce gibberish, or could even display a message warning that the wrong key has been used. Walt says that combining a number of genetic traits could lead to thousands of possible keys.
It is also possible to develop bacteria that lose their fluorescent properties over time, creating a message that self-destructs in the style of Mission Impossible.
Small secrets only
The new technique is not the first example of biological encryption – researchers have previously hidden messages in DNA – but Walt says his method is easier to use. "If you're out in the field and trying to send a message, you're not going to have access to a DNA synthesiser," he says, whereas you could carry vials of bacteria.
The bacterial code has a much lower information density than DNA, however, which would limit the size of a message. "You probably could send 500 to 1000 symbols on a regular piece of paper," says Walt – enough for a quick mission update, but it probably won't let you smuggle state secrets out of a country.
"It's a nice piece of work, but I'm really doubtful about the practical relevance," says Dominik Heider, who researches DNA cryptography at the University of Duisburg-Essen, Germany. He says that simply sending an encrypted email would be a more useful way of transmitting secret messages; the DNA method, for instance, is normally used to watermark genetically modified organisms rather than help spies complete their mission. Heider also points out that many countries place restrictions on sending genetically engineered bacteria through the post.
Journal reference: Proceedings of the National Academy of Sciences, DOI: 10.1073/pnas.1109554108
If you would like to reuse any content from New Scientist, either in print or online, please contact the syndication department first for permission. New Scientist does not own rights to photos, but there are a variety of licensing options available for use of articles and graphics we own the copyright to.
Have your say
Only subscribers may leave comments on this article. Please log in.
Only personal subscribers may leave comments on this article | <urn:uuid:c7fade67-3d80-44bd-b94f-3603bec90242> | CC-MAIN-2013-20 | http://www.newscientist.com/article/dn20965-spies-could-hide-messages-in-genemodified-microbes.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.93376 | 665 | 3.359375 | 3 |
Grammar may have gone out of fashion in English lessons, but it is making a comeback as a weapon for fighting disease.
Some short chains of amino acids have been found to kill antibiotic-resistant pathogens. Gregory Stephanopoulos at the Massachusetts Institute of Technology and his colleagues reasoned that if the amino acid sequences of these peptides were treated as a language with grammatical rules, the rules could be used to create new peptides with similar properties.
The team studied 526 known antimicrobial peptides, looking for clusters of amino acids that often appeared together. They identified 684 of these regular patterns, built a set of rules to describe them and then used the rules to create 42 more peptides. Of these, 20 inhibited the growth of bacteria, including Staphylococcus aureus and Bacillus anthracis (Nature, vol 443, p 867).
To continue reading this article, subscribe to receive access to all of newscientist.com, including 20 years of archive content. | <urn:uuid:18db9e68-44d7-49f8-a82f-b7f2ff525daa> | CC-MAIN-2013-20 | http://www.newscientist.com/article/mg19225744.600-fighting-disease-using-lessons-in-grammar.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.953529 | 204 | 3.296875 | 3 |
Anicius Manlius Severinus Boethius
Anicius Manlius Severinus Boethius (480 – 524 or 525 C.E.) was a polymath and a Christian philosopher of the sixth century who was instrumental in transmitting classical Greek logic to medieval Latin scholars. Born into a high-ranking Christian Roman family and highly educated, he served as an official for the kingdom of the Ostrogoths but was later executed by King Theodoric the Great on suspicion of having conspired with the Byzantine Empire. His legacy includes textbooks on geometry, arithmetic, astronomy and music which were used throughout the Latin Middle Ages; commentaries on Aristotle, Porphyry and Cicero; essays on logic and four treatises applying logic to theological doctrines such as the Trinity and the relationship between God and Jesus Christ. Until the twelfth century, two of his translations were the only works of Aristotle available to Latin scholars. His most famous work, written in prison before his execution, is Consolation of Philosophy, which became one of the most influential philosophical books of medieval Europe and an inspiration for many later poets and authors.
Anicius Manlius Severinus Boethius was born in Rome around 480 C.E. to the patrician family of Anicii, who had been Christians for almost a century. His father died soon after becoming consul in 487, leaving Boethius an orphan. He was brought up in the house of a devoted Christian, Quintus Aurelius Memmius Symmachus, who had been consul in 485; and later married Symmachus’ daughter Rusticiana. Scholars surmise that Boethius may have studied in Athens, because he was fluent in Greek and well acquainted with the works of the Greek philosophers, but there is no clear evidence for this. His education and intelligence set him apart, and he was employed by the Gothic king of Italy at Ravenna, Theodoric the Great, who commissioned him to design a water clock and also a sundial and gave him administrative responsibilities. By 507 he had received the title of “patrician” and in 510 he became consul. Two of his sons were simultaneously made consuls in 522. Boethius became Master of the Offices and it appears that his efforts to fight corruption in the government roused the anger of a few influential enemies in Ravenna. When Boethius defended the senator Albinus against charges that he had been in communication with Emperor Justin I of Constantine, a Christian, he was himself accused of treason and charged with sacrilege and the practice of magic. He was imprisoned at Pavia without being given a chance to defend himself, and was tortured and executed in 525. His father-in-law, Symmachus, who spoke out on his behalf, was executed soon afterward. While in prison, Boethius wrote Consolation of Philosophy, which later became one of the great books of medieval culture.
Thought and Works
Boethius, erudite and highly educated, lived in an era when Roman culture was dissipating under the rule of the Goths. He wrote on many subjects, and one of his intentions seems to have been to create educational materials to transmit classical Greek knowledge to Latin audiences. Several of his works were widely used as textbooks by medieval scholars.
Boethius' philosophical works include translations, with commentaries, of Aristotle's logical treatises and of Porphyry's "Isagogue;" commentaries on Porphyry's Isagoge as translated by Marius Victorinus, and on Cicero's Topica; and several original essays on logic, De Categoricis Syllogismis, Introductio ad Syllogismos Categoricos, De Divisione (of doubtful authenticity), and De Differentiis Topicis.
Boethius stated his intention to educate the West by translating all the works of Plato and Aristotle into Latin and adding commentaries; this effort was cut short, but his translations of Aristotle’s works on logic, together with his commentaries, remained the only works of Aristotle available to Latin scholars until the twelfth century. His commentary on the Isagoge by Porphyry, in which he discusses whether species are subsistent entities which would exist whether anyone thought of them, or whether they exist as ideas alone, underlay one of the most vocal controversies in medieval philosophy, the problem of universals. De Categoricis Syllogismis and Introductio ad Syllogismos Categoricos discussed categorical and hypothetical syllogisms.
Boethius’ essays and commentaries became known collectively as the Logica vetus, and were studied by medieval scholars of logic. Many of his methods, definitions, and terms such as “person” and “eternity,” became standard in medieval schools.
Mathematics and Music
Boethius wrote four textbooks on mathematics and the theory of music, the De Institutione Arithmetic Libri II, De Institutione Music Libri V, Geometria Euclidis a Boethio in Latinum translate; and De Geometri, which is considered to be a ninth- or tenth-century elaboration of a work of Boethius. (This work contains evidence which helped determine the period in which Arabic numerals were first used in Western Europe.) De Institutione Arithmetic Libri II, and De Institutione Music Libri V, were based on the work of Nicomachus of Gerasa. These works were used as textbooks for the quadrivium, a medieval course of studies consisting of arithmetic, geometry, astronomy, and the theory of music.
Five theological works of Boethius remain in existence, De Trinitate; two short treatises (opuscula) addressed to John the Deacon (who later became Pope John I); Liber contra Eutychen et Nestorium; and De Fide Catholica (some scholars question whether this was truly written by Boethius). Boethius observed the theological debates taking place between the churches of Rome and Constantinople, and applied logical analysis to clarify some of the points of doctrine. Liber contra Eutychen et Nestorium was apparently a response to a letter written by some Greek bishops around 513 C.E. proposing a new concept of Christ which they hoped could unite the Western and Eastern churches. Two treatises on the Trinity were directed at a group of Scythian monks who made a similar attempt in 519. Boethius used the techniques of Aristotelian logic to examine both the orthodox Christian doctrines and some of the heretical ideas being offered, (such as the views on Christ and human nature suggested by Eutyches and Nestorius) and pointed out logical contradictions in the heresies. He also attempted to apply Aristotelian classifications to the orthodox understanding of God. A number of glosses (for example, by scholars such as Johannes Scottus Eriugena and Remi of Auxerre) found in manuscripts dating back as early as the ninth century indicate that his treatises were widely studied during the early Middle Ages.
Consolation of Philosophy
Boethius’ final work, Consolation of Philosophy, was written in prison as he awaited execution on charges of treason, without having been granted a trial or a chance to defend himself. Written as a Menippean satire, or prosimetrum (passages of prose interspersed with verse), it is a dialogue between Boethius and Philosophy, portrayed as a woman, and exemplifies Platonic ideas. Philosophy tries to console Boethius by arguing that true happiness cannot be affected by tragic material circumstances. The work discusses providence and fate, the nature of God, the origin of the universe, prescience, and predestination. It contains a famous definition of eternity as “perfect possession all at the same time of endless life.” Though not read by his contemporaries, the book was popularized during the ninth century by Alcuin at the court of Charlemagne, and was read not only in schools but by medieval laymen interested in philosophy. It was translated into Anglo-Saxon by King Alfred, and into later English by Chaucer and by Queen Elizabeth; many manuscripts survive and it was extensively edited, translated and printed throughout Europe from the late fifteenth century onwards. Its influence is evident in Beowulf and Chaucer, in Anglo-Norman and Provencal popular poetry, in early Italian poetry, and in Dante Alighieri’s Divina Commedia (The Divine Comedy).
Boethius as a Christian Martyr
During the eighth century, Boethius was honored by many Catholics as a martyr and his feast was observed on October 23. It was believed that he had been executed for his devotion to the Catholic cause, which Emperor Justin I had been championing against the Arian King Theodoric. In 1883, the Sacred Congregation of Rites confirmed the custom prevailing in the Pavia diocese of honoring St. Severinus Boethius, on October 23. While it is clear the Boethius was a Christian, there is no clear evidence that he lost his life as a martyr for the Catholic faith.
- Boethius and P. G. Walsh. The Consolation of Philosophy (Oxford World's Classics). New York: Oxford University Press, 2000. ISBN 0192838830
- Boethius and H. Chadwick. The Consolations of Music, Logic, Theology and Philosophy. Oxford: Clarendon Press, 1986. ISBN 0198265492
- Gibson, Margaret T. (ed.). Boethius, His Life, Thought and Influence. Oxford: Blackwell, 1981. ISBN 0631111417
- Marenbon, John. Boethius. Oxford: Oxford University Press, 2003. ISBN 0195134079
- McMahon, Robert. Understanding The Medieval Meditative Ascent: Augustine, Anselm, Boethius, & Dante. Catholic University of America Press, 2006. ISBN 0813214378
All links retrieved February 14, 2013.
- Texts of Boethius from Project Gutenberg
- A tenth-century manuscript of Institutio Arithmetica is available online from Lund University, Sweden
- The Geoffrey Freudlin 1885 edition of the Arithmetica from the Cornell University Library Historical Mathematics Monographs
- Patron Saint Index: Blessed Severinus Boethius
- Boethius from MacTutor Biography
- Stanford Encyclopedia of Philosophy entry
General Philosophy Sources
- Stanford Encyclopedia of Philosophy
- Guide to Philosophy on the Internet
- Paideia Project Online
- The Internet Encyclopedia of Philosophy
- Project Gutenberg
New World Encyclopedia writers and editors rewrote and completed the Wikipedia article in accordance with New World Encyclopedia standards. This article abides by terms of the Creative Commons CC-by-sa 3.0 License (CC-by-sa), which may be used and disseminated with proper attribution. Credit is due under the terms of this license that can reference both the New World Encyclopedia contributors and the selfless volunteer contributors of the Wikimedia Foundation. To cite this article click here for a list of acceptable citing formats.The history of earlier contributions by wikipedians is accessible to researchers here:
Note: Some restrictions may apply to use of individual images which are separately licensed. | <urn:uuid:eb7bda98-0f87-4d3e-aee3-4236ab83b97a> | CC-MAIN-2013-20 | http://www.newworldencyclopedia.org/entry/Anicius_Manlius_Severinus_Boethius | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.957512 | 2,345 | 3.015625 | 3 |
In the 1880s a new generation of artists, including Vincent van Gogh, Paul Gauguin, Paul Cézanne and Georges Seurat, burst onto the cultural scene in France. They announced a break with Impressionism, competing with the older painters and with each other, to develop the range of styles now known as Post-Impressionism. Masterpieces from Paris displays key paintings by famous and influential artists along with the work of their peers, revealing the artistic diversity of the times.
This exhibition explores movements such as Pointillism, Neo-Impressionism, Synthetism and Symbolism, as well as the groups of artists known as the School of Pont-Aven and the Nabis. Emile Bernard, Pierre Bonnard, Maurice Denis, Claude Monet, Gustave Moreau, Henri de Toulouse-Lautrec, Paul Signac and Edouard Vuillard, among others, are well represented. Masterpieces from Paris shows how the radical experiments of Post-Impressionism are the basis for modern art in the twentieth century. | <urn:uuid:78d69d15-58bd-41d6-8ebc-df866e19f3f4> | CC-MAIN-2013-20 | http://www.nga.gov.au/Exhibition/MASTERPIECESfromPARIS/Default.cfm?mystartrow=25&realstartrow=25&MnuID=3&GalID=0 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.932132 | 220 | 3.015625 | 3 |
Molds are microscopic organisms that play an important role in the breakdown of plant and animal matter. Outdoors, molds can be found in shady, damp areas, or places where leaves or other vegetation is decomposing. Indoor molds can grow on virtually any surface, as long as moisture, oxygen, and organic material are present. When molds are disturbed, they release tiny cells called spores into the surrounding air.
What are the most common forms of mold?
According to the Centers for Disease Control and Prevention, the most common indoor molds are:
What are some of the health effects associated with mold exposure?
Symptoms stemming from mold spore exposure may include:
- Nasal and sinus congestion
- Eye irritation
- Blurred vision
- Sore throat
- Chronic cough
- Skin rash
After contact with certain molds, individuals with chronic respiratory disease may have difficulty breathing, and people who are immunocompromised may be at increased risk for lung infection. A study conducted by NIEHS-funded scientists shows that mold exposure during the first year of life may increase the risk of childhood asthma.
What can I do to get rid of mold in my home?
According to the U.S. Department of Housing and Urban Development (HUD), residents can do any of the following to prevent, and or get rid of, mold in their homes:
- Keep your house clean and dry.
- Fix water problems, such as roof leaks, wet basements, and leaking pipes or faucets.
- Make sure your home is well ventilated, and always use ventilation fans in bathrooms and kitchens.
- If possible, keep humidity in your house below 50 percent, by using an air conditioner or dehumidifier.
- Avoid using carpeting in areas of the home that may become wet, such as kitchens, bathrooms, and basements.
- Dry floor mats regularly.
What NIEHS is Doing on Mold
NIEHS is involved in several studies on mold.
The HEAL Study
The Head-off Environmental Asthma in Louisiana (HEAL) Project is a collaborative study conducted by the Tulane University Health Sciences Center and the New Orleans Department of Health. The purpose of the project is to learn about the effects of mold and other indoor allergens on children with asthma in post-Katrina New Orleans.
To learn more, visit the NIEHS HEAL website (http://heal.niehs.nih.gov/) .
Additional mold studies sponsored by NIEHS
- Guidelines for the Protection and Training of Workers Engaged In Maintenance and Remediation Work Associated with Mold (http://tools.niehs.nih.gov/wetp/public/hasl_get_blob.cfm?ID=2034)
- Study Identifies Role of Mold in Asthma Development (http://www.niehs.nih.gov/news/newsletter/2011/september/science-asthma/index.cfm)
- Centers for Disease Control and Prevention - Mold
- Occupational Safety and Health Administration - Mold
- Profile: Report on Carcinogens: Captafol (http://ntp.niehs.nih.gov/ntp/roc/twelfth/profiles/Captafol.pdf)
- U.S. Environmental Protection Agency - Mold | <urn:uuid:8c936a3d-0d36-4cce-9e1c-11dc73b837e4> | CC-MAIN-2013-20 | http://www.niehs.nih.gov/health/topics/agents/mold/index.cfm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.90703 | 701 | 3.65625 | 4 |
Declaration of Independence
Proclamation of the Nagorno Karabakh Republic
With the participation of delegates from all levels of councils in a joint session of peoples deputies of the Nagomo Karabakh (NK) regional and Shahumian district councils, by the expression of the popular will supported by a documented referendum, and by the decision taken by the authorities of the NK autonomous region and the Shahimian district between 1988-91 concerning its freedom, independence, equal rights, and neighborly relations;
Noting specifically the Azerbijani Republic's declaration of restoring its national independence according to its 1918-20 boundaries;
Recognizing that Azerbaijan's policies of apartheid and discrimination have created an atmosphere of hatred and intolerance toward the Republic's Armenian population, and led to armed clashes, casualties, and the deportation of Armenian civilians from peaceful villages;
Establishing itself on the basis of the current constitution and the laws of the Union of the Soviet Socialist Republic (USSR), which, upon the secession of a union republic from the USSR, allow the peoples of autonomous formations and coexisting ethnic groups the right to self-determination of its national-legal status;
Noting that the territory of the Shahumian district was forcibly detached from Nagorno Karabakh, and recognizing the intentions of the Armenian population to reunify as commensurate with the norms of natural and international law;
Intending that neighborly relations between the peoples of Armenia and Azerbaijan will be restored based on mutual respect for each other's rights;
Taking into consideration both the complexity and controversial nature of the situation in the country, the future of the [Soviet] Union, and the uncertain future of the [Soviet] Union structures of ruling authority and government;
Respecting and abiding by the Universal Declaration of Human Rights, the International Covenant on Economic, Social and Cultural Rights, the principles of the International Covenant on Civil and Political Rights, and trusting in the understanding and support of the international community;
The Nagorno Karabakh Republic within the current boundaries of the NK autonomous region and the adjacent Shahumian district, the NKR
The Nagorno Karabakh Republic, basing itself on the authority given to republics by the constitution and legislation of the USSR, reserves the right to decide independently its legal status as a state on the basis of political consultations and negotiations with the leadership of other countries and republics.
Prior to the acceptance of the constitution and laws of the NKR, the constitution and legislation of the USSR, as well as other existing laws shall be in effect on the territory of the NKR unless they contradict the purposes and principles of this declaration and the specific nature of the republic.
Delegates of all levels participating in the joint
session of the NK regional
The Central Election Committee on conducting the referendum notes that in accordance with the November 27, 1991 decision of the session of the NKR Soviet of people's deputies and the Temporary Provision on Referendum in the NKR, confirmed by the same session, on December 10, 1991 a referendum was held on the whole territory of Nagorno Karabakh in order to finally determine its status, the forms of state structure and interrelation with other states and commonwealths.
On the day of the referendum the whole territory of the Nagorno Karabakh Republic, especially its capital - Stepanakert - was the subject of heavy artillery and rocket shelling by Azerbaijani band formations trying to suppress the voice of the Artsakh people striving for freedom from national oppression. A great number of houses and administrative buildings were destroyed in towns and regions of the republic. 10 people deceased only on the day of the referendum.
However, the population of the republic, having overcame the incredible hardships, as a single unity participated in the elections in order to unite voices against the centuries-old tyranny.
108,736 or 82.2 per cent of the total number of 132,328 registered voters participated in the elections.
Voters of Azerbaijani nationality - 22,747 persons - did not take part in the referendum, although the CEC (Central Election Committee) made attempts to get in contact with them in order to reach consensus on those issues. The corresponding documents as well as the Temporary Provision on referendum and parliamentary elections in NKR were sent to them in due time.
The servicemen of the military base, allocated in Stepanakert, did not participate in the referendum because of political motives.
The referendum took place in 70 of the total number of 81 constituencies. In the 10 of 11 constituencies, where the referendum did not take place, Azerbaijani population lived.
"Do you agree that the proclaimed Nagorno Karabakh republic be an independent state acting on its own authority to decide forms of co-operation with other states and communities?"
108,615 persons or 99.9 per cent of the total number of voters answered "Yes" and 24 persons or 0.02 per cent answered "No" to the aforementioned question. 95 ballots or 0.09 per cent were recognised invalid.
The referendum was conducted in accordance with the international norms as well as the Temporary Provision on Referendum in the NKR. The Central Election Committee has not received any complaints or statements about any breaches.
Deputies of the Supreme Soviet of the USSR, Russia and Moscow as well as representatives of different international organisations and foreign states were present at the referendum as observers and made positive comments.
Thus, the will of the people of the Nagorno Karabakh Republic to build an independent state became an objective reality.
Proceeding from the peoples' inherent right for self-determination, as well as the will of the people of Nagorno Karabakh expressed in December 10, 1991 republic referendum;
understanding the responsibility for the fate of the historical Motherland;
confirming adherence to the principles of the September 2, 1991 Declaration on the Proclamation of the Nagorno Karabakh Republic;
striving for normalization of relations between the Armenian and Azerbaijani peoples;
willing to protect the NKR population from aggression and threat of physical extermination;
developing on the experience of people's self-government in Nagorno Karabakh in 1918-1920;
expressing readiness to establish equal and mutually beneficial relations with all the states and commonwealths;
respecting and following the principles of the Universal Declaration of Human Rights and International Pact on Economic, Social and Cultural Rights, final document of the Vienna meeting between the European Conference on Security and Cooperation member-states, other universally recognized norms of international law.
The Supreme Soviet of the Nagorno Karabakh Republic
The NKR is an independent state. It has its own national flag, emblem and anthem. The NKR Constitution and laws, as well as international and legal acts regulating respect of human rights and freedoms are in force in the NKR territory.
Whole power in the NKR belongs to the people of the Nagorno Karabakh Republic, which realizes its power and will through nationwide referendum or via representative bodies.
All the residents of Nagorno Karabakh are citizens of the NKR. The NKR allows double citizenship. The NKR protects its citizens. The NKR guarantees rights and freedoms of all its citizens regardless of their nationality, race and creed.
Armed forces, law enforcement and state security bodies are established in the NKR subordinate to supreme authorities to ensure the protection of its citizens and the security the population. The NKR citizens serve in the military on the territory of the NKR. The NKR citizens' military service in other states, as well as presence of foreign armed forces in the NKR territory is realized on the basis of interstate agreements and arrangements.
As a subject of international law, the NKR conducts an independent foreign policy, establishes direct relations with other states, and participates in the activities of international organizations.
Land, depths, air space, natural, material and spiritual wealth of the NKR is the property of its people. The NKR laws regulate their usage and ownership.
The NKR economy is based on the principle of equality of all forms of property. It ensures equal opportunities of full and free participation in the economic life for all citizens of the NKR.
The NKR recognizes the priority of human rights, ensures the freedom of speech, conscience, political and social activity and all the other universally recognized civil rights and freedoms. National minorities are under protection by the state. The NKR state structure ensures for national minorities the possibility of a full-fledged participation in political, economic and spiritual life of the Republic. The law prosecutes any national discrimination.
The NKR state language is Armenian. The NKR recognizes the national minorities' right for using, without any restrictions, their native language in economic, cultural and educational spheres.
This Declaration and General Declaration on Human Rights form the basis of the NKR Constitution and legislation. | <urn:uuid:cf7b8848-e6d9-4c45-92d7-258364d3bd8b> | CC-MAIN-2013-20 | http://www.nkrusa.org/nk_conflict/declaration_independence.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.941422 | 1,810 | 3.171875 | 3 |
With moderate frequency induction heating, power is supplied to a series of coils, creating a fluctuating magnetic field. Steel can ends or bodies that pass through the coils are heated by the eddy currents produced by the steel. This provides fast, controllable heating, typically using 70 percent less energy than conventional gas systems.
- Induction technology provides fast, energy efficient heating
- Air-cooled, moderate frequency induction process is simple, safe and reliable
- Temperature sensor guards against under-temperature ends or bodies
- Instant on/off operation saves energy
- Temperature and power control for consistent performance
- Solid-state components provide reliable operation | <urn:uuid:b94c615d-376c-4368-bec9-e03d5f2fa30d> | CC-MAIN-2013-20 | http://www.nordson.com/EN-US/DIVISIONS/INDUSTRIAL-COATING/PRODUCTS/CONTAINER-COATING-CURING/CURING-SYSTEMS/Pages/Can-End-Sterilizers.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.926549 | 132 | 2.640625 | 3 |
|Bas-Relief of Odin & Thor in Reykjavík - July 4, 2010|
One legendary figure who epitomizes this complicated tangle of myth is Haldan, a Danish king whose exploits are related in Book VII of Saxo. He is roughly equivalent to Helgi in the Icelandic Hrólfs Saga Kraka and Helgo in the Skjöldunga Saga. There are aspects of Haldan’s adventures similar to those of Amleth, whose story is told by Saxo in Book III and whose tale formed the basis for Shakespeare’s Hamlet. Saxo’s Haldan is important for the study of Norse mythology because of his special relationship to the god Thor – a relationship with some elements that are clearly stated and others that are only obliquely suggested in Book VII.
In Saxo’s telling, Haldan is portrayed as a champion of Thor – as a warrior who is particularly dedicated to the cult of the thunder god and who is in opposition to the cult of Odin. In Book VII, Haldan exhibits attributes of Thor, calls on his patron god for help, is venerated by the Swedes as Thor’s son, and comes into conflict with characters associated with Odin. A close reading of Haldan’s tale can uncover long-buried forms of Thor-worship and differences between those who followed Thor and those who followed Odin.
Throughout Haldan’s adventures, he is associated with the oak, a tree that was particularly sacred to Thor among the continental Germanic tribes. The Anglo-Saxon monk known as Saint Boniface famously cut down the massive “Thor’s Oak” in Hesse as a dramatic move in his conversion of the local pagans. The oak is not associated with Thor in Icelandic sources, as the tree is a rare species on that far northern island; he is linked, instead, to the smaller and wirier rowan. It seems understandable that Denmark, with its closer proximity to the ancient German forests described by Julius Caesar and Tacitus, would preserve the oak’s association with the god.
Young Haldan’s guardians hide him inside a hollow oak to save him from the wrath of his murderous uncle Frothi, who had previously murdered Harald (father of Haldan, brother of Frothi). In light of the later importance of oak trees in the text and the adult Haldan’s appeal to Thor for help, this act may represent a ritualized call for divine protection or a sanctifying of the child to the thunder god. One explanation for the sacredness of the oak to Thor was that, as one of the largest trees of the ancient forest, it was often hit by lightning – a sign that it was a favorite target of the thunder god. Perhaps Haldan’s hollow oak was one of these lightning-hallowed trees.
In an attempt to discover the hidden child, Frothi enlists the aid of a sorceress with powers of divination. She is able to “summon to her hands something in the distance, visible to her alone, even when it was tied up tightly with knots.” This is the first adversary encountered by Haldan who is associated with Odin, even if her connection is not stated explicitly.
In poetry and saga, Odin is connected to the form of magic known as seiðr. According to Snorri, seiðr enabled the god to know “the fate of men and future pitfalls.” The divining power of Frothi’s sorceress thus forms the first of her links to the god. For somewhat obscure reasons, seiðr was considered an unmanly art; Snorri writes that “men believed that they could not practice it without dishonor, and so they taught this art to the priestesses.” The sorceress appears to be one of these priestesses. She is tied yet more strongly to Odin by her ability to summon an object “tied up tightly with knots.” In the Eddic poem Hávamál (“Sayings of the High One”), Odin relates his mystic ability to unbind chains and fetters, and the sorceress evinces a similar Odinic power.
Haldan feels that he and his likewise hidden brother are “being drawn out of their recess by the weird potency of the enchantress’s spells and pulled under her very gaze.” Odin is known to sit on high-seat Hliðskjálf and watch over the events of the world with his one eye; the pagan seeresses known as völva similarly sit on raised chairs when they offer prophecies. All of this ties Frothi’s sorceress to the cult of Odin and sets up an opposition between Haldan and Odinic forces. Haldan and his brother ultimately prevent the nameless enchantress from revealing them by giving her a small bribe, an incident which negatively portrays the followers of Odin as devious and dishonorable. | <urn:uuid:899726d6-57ca-475b-b6ad-6164f5aa6122> | CC-MAIN-2013-20 | http://www.norsemyth.org/2011/03/champion-of-thor-part-one.html?showComment=1299533534669 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.971667 | 1,066 | 2.765625 | 3 |
Non-native, invasive species threaten endangered animals and plants at Point Reyes National Seashore and are costly to control. Learn how you can help prevent the introduction and spread of non-native species before they become a problem.
The Threat of Non-Native Plants and Animals
Native plants and animals living near urban areas are especially vulnerable to extinction due to habitat loss and the introduction of non-native, invasive species. "Non-native" species are also called "introduced" or "exotic" species; this term refers to plants that originate elsewhere and are brought into a new area. Not all introduced species are invasive, but those which are may dominate the local species or in some way negatively impact the environment for native species.
For example, many non-native, invasive weed species are plants that grow or spread aggressively, taking over important wildlife habitat, devastating shelter and forage, and reducing the diversity and quality of native habitat. These weeds often do not hold and protect the soil the way native plants do, so erosion increases and causes sedimentation of streams, harming fish populations and water quality.
Roads, trails and parking lots are often where we first find non-native, invasive species. Nearly half of the endangered plants and animals in the United States have been negatively affected by non-native, invasive species. In addition, these species cause an estimated $138 billion in economic damage each year in the United States.
How You Can Help
If you plan to visit Point Reyes National Seashore, you probably care a great deal about protecting park resources from harm. Ironically, those who enjoy visiting Point Reyes can also be responsible for spreading non-native, invasive species. You can help prevent the introduction and spread of non-native plants and animals, which is far more effective than costly eradication programs.
- Clean and Inspect Clothing, Gear, and Containers for Weeds and Other "Hitchhikers"
Many weed seeds readily stick to clothing and camping gear. These seeds can later fall off and germinate, establishing new weed colonies. Weeds and other non-native organisms can hitch a ride in camping equipment, food containers and baggage. Visitors should clean and inspect their footwear, clothing, and gear (especially shoe treads and Velcro) for seeds and soil before traveling to Point Reyes and before departing the park. Socks and cuffs of pants should be given particular attention. Sleeping bags, sleeping pads, and tents should be cleaned and inspected for soil, invertebrates, and seeds before leaving home.
- While Hiking
Trails can be pathways for a lot more than just people. Weeds often spread along trails and then to adjacent un-infested areas. You can help prevent this from happening by always staying on designated trails, avoiding weed-infested areas, and by not picking or transporting plants when hiking in the Seashore. Pack out all trash. Just because some trash—apple cores, orange seeds, etc.—is “natural” or organic, doesn’t mean it can be left behind. Please be sure to pack out all trash. While most domestic fruit and vegetable species are not invasive, some can germinate and become pests. Food sources associated with people can turn wild animals into habituated, problem animals.
Campfires are prohibited throughout most of the Seashore and are only allowed on beaches, if you have obtained a Beach Fire Permit from a park Visitor Center or ranger. Common sense will tell you that campfires can be dangerous and potentially harmful in more ways than one. In addition to the threat of wildfire, firewood brought from elsewhere can harbor organisms that can be very destructive. This includes the fungal-like disease Sudden Oak Death that kills several species of native trees. You can help prevent the spread of this disease and other harmful organisms by only bringing pine or almond to the park to use as firewood.
See our Beach Fires page for more information.
- Domestic Animals
Although many people know that pets are prohibited throughout much of the National Seashore, they probably never imagine the danger domestic animals can pose to wildlife. Diseases carried by domestic animals can spread to wild animals, or vice versa. A variety of wild animals are sensitive to disease, and pets and their droppings can spread pathogens and cause other problems for wildlife. Even vaccinated and apparently healthy animals can be carriers of diseases that are potentially lethal to wildlife. Although few pet owners like to leave their pets at home, this is probably the best way of avoiding the temptation to take your pet to locations at Point Reyes where they are not permitted.
See our Pets page for more information.
- Boaters and Invasive Species
Private boaters should be particularly diligent to ensure that no unwelcome plants, animals and other organisms are living on their boats that could be accidentally transferred to the waters surrounding Point Reyes. A variety of aquatic invasive species can hitch a ride on our clothing, boats, and items used in the water. When boaters go to other bodies of water, the invasive species can be released. And, if the conditions are right, these introduced species can become established and create drastic results. By following the following guidelines each time you leave the water, you can help stop aquatic hitchhikers.
- Remove any visible mud, plants, fish or animals before transporting equipment to the Point Reyes area.
- Eliminate water from equipment before transporting to the Point Reyes area.
- Clean and dry anything that came in contact with water (Boats, trailers, equipment, clothing, dogs, etc.).
- Never release plants, fish or animals into a body of water unless they came out of that body of water.
Go to the Protect Your Waters and Stop Aquatic Hitchhikers! website for more information.
Thank you for doing your part to stop the spread of non-native, invasive species at Point Reyes National Seashore. If you want to do more to help preserve Point Reyes' ecosystem, you may wish to participate in the Habitat Restoration Program or a variety of other volunteer opportunities.
Top of Page | <urn:uuid:90fadf2d-7c4c-4de9-b29d-d05bbbac709d> | CC-MAIN-2013-20 | http://www.nps.gov/pore/planyourvisit/stop_invasive_species.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.933268 | 1,239 | 3.875 | 4 |
Blacktail Prairie Dog - Cynomys ludovicianus
Wind Cave National Park is really two parks in one. The surface is 28,000 acres of a complex mix of prairie grasses and ponderosa pine forest ecosystems. Seventy-five percent of the Park is open grassland, and living in that ecosystem is a large variety of mammals.
One of the more interesting sociable wild animals of the grasslands is the prairie dog, a rodent that belongs to the squirrel family. The name "prairie dog" came from their bark-like call, not from their appearance. They were called "petit chien" or little dog, by early French explorers and were scientifically described in the journals of Lewis and Clark.
The park has only one species of prairie dog, the blacktail prairie dog, named for the black tip of its tail. Blacktail prairie dogs have small ears, short tails, and muscular legs. Their fur is buff-colored and often blends with the earth in which they dig their burrows.
Listen to the prairie dog (84k wma file)
Prairie dogs rely on keen hearing, excellent eyesight and a communal warning system for protection against predators. They are social animals and the areas they inhabit are known as towns or colonies. Town is a good term because, in a way, their towns are much like ours. A dog town may vary in size from an acre to several hundred acres. In the 1800's, dog towns were described as stretching for miles; some extremely large towns are still found in South Dakota.
A typical prairie dog town consists of groups of prairie dogs that occupy and protect small areas within the town. These groups of prairie dogs are known as coteries, which may be compared to "neighborhoods" of human towns. Individual prairie dogs stay in their own neighborhoods. A typical coterie consists of one adult male, three or four adults females, and their young up to one year of age. The residents of each coterie protect their territory from intruders, including prairie dogs from other coteries within the town.
NPS Photo by Tom Bean
Members of the coterie cooperate with one another. Competition for food and shelter is uncommon within the coteries, and all members occupy a nearly equal social position. Members of the coterie recognize each other with a "kiss." They may also be seen grooming each other, cooperating in the construction of a burrow, aiding each other in defense of the territory, eating together, playing with one another, or standing side by side on a mound of earth.
Communication between the members of a town is very important and highly specialized. As many as ten different calls have been described, including sounds for warning, defense, territoriality, fear, or fighting. A warning cry from one prairie dog sends all within earshot hustling for their burrows.
NPS Photo by Tom Bean
Prairie dog burrows have not been studied intensively, but some general features are known. Depth of the burrow system is often governed by the local soils. In deep soil, the burrows may extend downward for ten or more feet, averaging 24 feet of tunnel per entrance. The prairie dogs pack a conical mound of soil around the entrance of the main burrow to serve as a lookout post and as protection against flooding. The entrance tunnel section extends steeply downward for several feet with the next tunnel section being gently inclined, descending down to the nest. The nest chamber is usually lined with grasses. Some tunnels then return to the surface, often with a depressed, crater-like opening marking their terminus. Several burrows may be connected underground. Tunnel plugs are common, but may be quickly re-excavated in emergencies.
NPS Photo by Allan Lovaas
Prairie dogs only give birth to one litter per year. The breeding season is mid-March to mid-April, with the young being born 4 to 5 weeks later. The size of the litter varies from 2 to 8 young, which are nursed by the mother for about 6 weeks. During May and the early part of June, the young begin to emerge from their burrows for the first time. At this time, yearlings (young from the previous year) and some adults may relocate, leaving the young pups to feel secure both socially and environmentally in the old burrow. When prairie dogs relocate, they take over abandoned holes or dig new holes at the edge of the town. A few may travel miles in search of new areas, but once away form the communal warning system, most are easy prey for predators.
NPS Photo by P.T. Bromley
Blacktail prairie dogs have incomplete hibernation, their activity and appetite are decreased during the winter. They may sleep for many days at a time, but the town is usually active during the milder days of the winter.
Common predators of the prairie dog include coyotes, bobcats, eagles, hawks, badgers, and weasels. One member of the weasel family, the black-footed ferret, deserves special mention. They are perhaps the rarest mammals in North America, depending primarily upon prairie dogs for food. Widespread poisoning of prairie dog towns endangered the existence of this interesting mammal.
Other animals may also be found in prairie dog towns. Snakes, including rattlesnakes, are fond of using abandoned burrows as homes, as are burrowing owls, birds with long legs and short tails. The owls can sometimes be seen standing on a mound in the midst of a prairie dog colony, creating little or no disturbance among the other inhabitants of the town.
For more information about Wind Cave National Park's prairie dog management plan click on management plan.
Did You Know?
The scientific name for the Stemless Hymenoxys is Hymemoxys acaulis. Acaulis means "stemless" and referes to the leafless stalks which bear the flower heads. More... | <urn:uuid:4b6b7640-3fe0-4498-b305-43a0998a9e25> | CC-MAIN-2013-20 | http://www.nps.gov/wica/naturescience/blacktail-prairie-dog-cynomys-ludovicianus.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.967738 | 1,263 | 3.234375 | 3 |
HISTORY OF FLIGHT Use your browsers 'back' function to return to synopsisReturn to Query Page
On April 7, 2001, approximately 1250 central daylight time, a Cessna 190 single-engine, tail wheel-equipped airplane, N1055D, was destroyed when it impacted terrain near Lurton, Arkansas. The airplane was registered to and operated by the pilot. The non-instrument rated private pilot and his passenger sustained fatal injuries. Instrument meteorological conditions prevailed and a visual flight rules (VFR) flight plan was filed for the 14 Code of Federal Regulations Part 91 personal flight. The cross-country flight originated from the Cook Airfield, Derby, Kansas, approximately 1100, and was destined for Lakeland, Florida. The VFR flight plan listed Tupelo, Mississippi, as an intermediate fuel stop.
Review of the flight's radar data and communications with air traffic control (ATC) revealed that the airplane was flying at 7,500 feet, and at 1223:34, the pilot requested a lower altitude due to haze. The flight then descended to 5,200 feet. The pilot requested another descent at 1238:30, stating that "I'm starting to get above the clouds, I'd like to go down to 3,500." The controller informed the pilot that they would not have radar contact with the airplane below 5,500 feet. The pilot stated "okay, I'll stay up here on top then...it's just kind of hazy. I'll stay right here, 5,500." From 1245:48 until the last radar return at 1246:49, the radar data depicted the airplane in a right corkscrewing ground track. The last altitude return was at 1246:24, depicting the airplane at 5,100 feet.
According to a witness, who was located in the vicinity of the accident site, he heard the sound of a "motor speed up," and heard the aircraft clear a ridge and impact the ground. After the impact, he saw the "flash of a fire ball." The witness added that it was "too foggy" to see the airplane. According to local residents, the weather was foggy and misty at the time of the accident.
ATC reported the loss of radar contact to the Arkansas Civil Air Patrol (CAP). The Arkansas CAP initiated a search for the missing airplane on the afternoon of the 7th and located the aircraft on April 9, 2001.
The pilot was issued a private pilot certificate with an airplane single-engine land rating on October 30, 1999. The pilot was issued a third class medical certificate on April 27, 2000, without any limitations. According to the medical application, the pilot had accumulated 369 hours at the time of the examination. The pilot's logbook was not located and it was estimated by his family that he had accumulated a total of 475 hours of flight time, of which 150 hours were in the same make and model as the accident airplane. It is unknown how much instrument or simulated instrument flight training the pilot had accumulated.
The 1951-model airplane was manufactured by Cessna Aircraft Company, and was powered by a Jacobs radial engine. The aircraft maintenance records were not located. The mechanic, who performed the last annual inspection on the airplane (April 1, 2001) provided the following information concerning the aircraft:
Aircraft Total Time: 2,744.0 Hours
Engine Time Since Major Overhaul: 98.1 Hours
Propeller Time Since Major Overhaul: 1,004.6 Hours
At 0653, the pilot obtained a weather briefing from the Wichita Flight Service Station (FSS). The weather briefer informed the pilot that through central Arkansas the clouds were 3,000 feet scattered and that Harrison, Arkansas (located approximately 27 miles north of the accident site), was reporting overcast clouds at 3,700 feet and unrestricted visibilities. The weather briefer also informed the pilot about turbulence along the pilot's route of flight and read a pilot report, which indicated that 70 miles northwest of Little Rock, Arkansas, an airplane had experienced a "smooth ride" above the tops of the clouds, which were reported at 7,000 feet. The forecasted weather across northern Arkansas until 1200, called for broken clouds at 3,000 feet with tops to 10,000 feet. After 1200, the forecast for that area called for scattered clouds at 4,000 feet and "strong wind" with "gusts up to 30 knots." The winds aloft over Little Rock, at 6,000 feet, were reported from 240 degrees at 45 knots.
At 1253, the Boone County Airport (Harrison, Arkansas) reported the wind from 250 degrees at 14 knots gusting to 23 knots, visibility 8 statute miles, clear sky, temperature 27 degrees Celsius, dew point 13 degrees Celsius, altimeter setting of 29.89 inches of mercury.
At 1253, the Russellville Regional Airport, (located approximately 30 miles south of the accident site) reported the wind from 240 degrees at 9 knots, visibility 10 statute miles, overcast clouds at 3,100 feet agl, temperature 24 degrees Celsius, dew point 18 degrees Celsius, altimeter setting of 29.96 inches of mercury.
A pilot report, issued at 1219, between Russellville and Fort Smith, Arkansas, indicated that at 1,500 feet there was continuous light turbulence and occasional moderate turbulence. In addition, the pilot report indicated that the visibility in the Russellville area was 4 to 5 miles.
WRECKAGE AND IMPACT INFORMATION
The aircraft wreckage was distributed along both sides of a heavily wooded ridge line. A 5-foot section of the right outboard wing and a 7-foot section of the left outboard wing came to rest on new growth trees on the north side of the ridge approximately 0.2 miles from the main wreckage. The outboard wing fracture surfaces were consistent with overload failure. The fuselage, along with the inboard sections of both wings, impacted trees and terrain on the south side of the ridge on a magnetic heading of 130 degrees, creating an initial impact crater approximately 6 feet wide, 12 feet long, and 2 feet deep. Approximately 75 feet northwest of the main impact crater were freshly cut trees. Adjacent to the trees was a 2-foot wing section that displayed a circular impact mark, equal in size to the tree, in its leading edge. The tops of the cut and broken trees came to rest in the impact crater. An inclinometer was used to determine the angle made with the cut trees and the impact crater. The descent angle was determined to be 50 degrees. On the left side of the crater was a 5-foot section of wing, which was accordion crushed aft. Inside the impact crater were pieces of engine valve springs and the propeller governor.
The propeller and engine came to rest approximately 12 feet from the impact crater. The propeller remained attached to the engine crankshaft; however, all of the cylinders were found separated from the engine. One piston and connecting rod remained attached to the engine crankshaft. The engine data plate was not located during the investigation. The fuselage came to rest approximately 40 feet from the impact crater. The empennage remained intact with the exception of the vertical stabilizer and the rudder. The empennage came to rest on its right side and was found twisted and fire damaged. The vertical stabilizer was found laying adjacent to the horizontal stabilizer and displayed a circular indentation on its left side. The cockpit was destroyed by impact forces and fire damage. Flight control continuity could not be confirmed due to the extent of the damage; however, the flight control separations were consistent with overload failures. The attitude indicator was located in the wreckage and it displayed a nose low, left wing low attitude. The heading indicator was destroyed and its gyro rotor was found among the wreckage. The rotor displayed impact damage around its circumference. The wet type vacuum pump was found separated from the engine accessory case and was disassembled by the NTSB investigator-in-charge. The vanes were found intact and appeared to display an even wear. The internal components of the wet vacuum pump were coated with oil and its bearing rotated freely.
An autopsy on the pilot was conducted by the Arkansas State Crime Lab. Toxicology tests on the pilot detected in muscle tissue: 74 mg/dl of ethanol, 4 mg/dl of acetaldehyde, 17 mg/dl of n-butanol, 1mg/dl of n-propanol, 0.048 ug/ml of benzoylecgonine, and unquantified amounts of ecgonine ethyl ester and ecgonine methyl ester. The alcohol and other volatiles may be a result of post-mortem production; however, the benzolylecgonine and ecgonine esters found are metabolites of cocaine. It could not be determined when the pilot may have used cocaine.
The wreckage was released to the owner's representative on July 17, 2001. | <urn:uuid:5580f7ec-edf7-4baa-8768-21354e1ab6d4> | CC-MAIN-2013-20 | http://www.ntsb.gov/aviationquery/brief2.aspx?ev_id=20010416X00763&ntsbno=FTW01FA095&akey=1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.965729 | 1,848 | 3.25 | 3 |
Effects of Negative Emotions on the Heart Can Lead to Cardiac Problems
< Feb. 11, 2009 > -- Taking a few minutes to relax, calm down, and simply enjoy life can do more than soothe frayed nerves or a troubled mind - it may save your life.
Emotional upheaval - whether in the form of stress, worry, depression, or anger - can increase the risk of heart disease, heart attack, and stroke, a growing body of research studies have found.
In 2007, Jesse Stewart, Ph.D., an assistant professor of psychology at Indiana University-Purdue University, Indianapolis, led a three-year research study published in the Archives of General Psychiatry that has linked negative emotions - depression, anxiety, hostility, anger - with atherosclerosis, or thickening of the inside walls of the coronary arteries. Thickening of these walls can slow or block the flow of blood to the heart and brain, which can lead to a heart attack or stroke.
"The current evidence suggests that there is a link between negative emotions and risk for heart disease" - the leading cause of death in the United States, says Dr. Stewart. "In these observational studies, the strength of the connection is comparable to other well-known cardiovascular risk factors. It's not a weak correlation."
"Depression can be considered an emerging risk factor for heart disease," Dr. Stewart adds. "It can be thought of as much the same way as cholesterol or high blood pressure or smoking, although the evidence base is not the highest available."
Negative Emotions and the Heart
There are two primary reasons why negative emotions can have such an impact on the heart, says clinical psychologist Barry J. Jacobs, Psy.D., a spokesman for the American Heart Association (AHA).
First, emotions such as stress and depression can have a behavioral effect, that lead individuals to do a terrible job taking care of themselves, and participate in unhealthy activities. "People who are stressed out and depressed are less likely to practice good self-care," says Dr. Jacobs, a faculty member at the Crozer-Keystone Family Medicine Residency Program in Springfield, Pa. "They may eat poorly, indulge in alcohol too much, fail to stick to a prescribed medical regimen, or sleep poorly."
According to Dr. Jacobs, there is growing evidence regarding the biological effects of psychological stress. "For example, there's mounting research that when people get stressed out, their hormonal system produces more cortisol," a hormone released by the adrenal gland, says Dr. Jacobs. "This has been associated with heart disease and diabetes," he says.
Continuous stress also affects the circulatory system. "The arteries tend to narrow when people are in situations of very high stress," Dr. Jacobs says. "That causes increased blood pressure."
Second, depression can also have a negative effect on the heart. "Depression has been linked with increased inflammation, as measured by markers in the blood," Dr. Stewart says. "These markers have been shown to predict future heart attacks. Depression also has an effect on the immune system, which then affects cardiopulmonary health."
Healthy Strategies to Reduce Heart Disease
Taking better care of the body can lead to a healthier heart. "The same things doctors tell people for physical health are good for mental health," Dr. Jacobs says. "Physical exercise, for example. Exercise has many health benefits and it also decreases stress and depression."
Sleeping through the night works wonders, too. "When people get a full night's sleep, they are more resilient to handling stress in their lives," Dr. Jacobs adds.
The American Medical Association (AMA) recommends a diet full of fruits, vegetables, and whole grains. Alcoholic beverages should be consumed in moderation. Smoking and situations that cause stress should be avoided.
Reading, praying, quiet time, yoga, or meditation can also decrease stress. Dr. Stewart recommends counseling if negative emotions seem out of control. The AMA suggests developing a support systems that consists of family, friends, and/or co-workers to discuss problems.
Having a little fun once in a while is also helpful. A recent study found that listening to music that a person enjoys can increase blood flow dramatically as the arteries dilate or expand.
"People need to build into their daily lives time for relaxation, whether that be spending time with friends, reading, playing video games, whatever," Dr. Jacobs says. "People need the opportunity to unwind."
February is American Heart Month
The purpose of American Heart Month is to encourage people to assess their heart health and some of the forces that may be harming it, whether it is marital discord, financial problems, job stress, or even loneliness.
Always consult your physician for more information
For more information on health and wellness, please visit health information modules on this Web site.
Change Your Life, Reduce Your Stress
Stress as we know it is part of life. From being late to work to falling behind on monthly bills, stress is so common that we begin to see it as normal.
Too much stress, especially the kind experienced daily, overloads our capacity to recover. It can lead to short- and long-term illnesses, such as immune-system impairment, high blood pressure, heart disease, high cholesterol, and an increased risk for heart attack and stroke.
“The fight-or-flight stress response is a primitive hormonal reaction initiated by any threat to our physical safety,” says Dr. Stephen Reed. “But in today’s world, this reaction occurs in response to perceived threats, such as work deadlines or traffic jams, even though they aren’t physically harmful. As a result, the body becomes overloaded with repeated doses of cortisol and adrenaline.”
In an ideal environment, once a threat or stressor is gone, our physical responses are designed to return to normal.
“However, when we experience chronic stress, the type triggered by a bad marriage or an extremely taxing job, the lack of recovery and ongoing low-level secretion of cortisol cause damage to the body,” explains Penny Kendall-Reed, who co-authored a book on stress with Dr. Reed.
Fortunately, you can take proactive steps to prevent the toll stress takes on your life.
Solutions for chronic stress are varied. Approaches are more or less helpful depending on your mental and physical strengths and weaknesses.
Learn to say no
Avoid known stressors
Put a priority on sleep
Learn and practice relaxation techniques
Eat a healthy diet
(Our Organization is not responsible for the content of Internet sites.) | <urn:uuid:ef4b1d9a-96cd-4002-bbfa-6f04dfd9b01b> | CC-MAIN-2013-20 | http://www.nyhq.org/diw/Content.asp?PageID=DIW009694 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.9467 | 1,358 | 2.578125 | 3 |
13/08/2009 – Society at a Glance – Asia/Pacific Edition shows that in terms of income inequality in Asia, China stands out with the poorest 10% sharing only 1.6% of national income, while the top 10% on the income scale own almost 35% of the country’s wealth. Similarly, the wealthiest 10% of the population hold almost a third of the country’s income in India, Indonesia, Singapore, Thailand, the Philippines, and Cambodia. At the bottom of the scale, the poorest 10% of the population receives just over 3% of the national income in Mongolia, Bangladesh, Viet Nam, and India. The average share of national income held by the highest 10% for 30 OECD countries is 24.2%, while the 10% poorest hold 3.1%.
Women may wield more influence in the Philippines and Mongolia than they do on average in OECD countries. Over half of Filipino legislators and managers are women, compared to only one in 10 in Korea and Japan at the low end of the scale. In 30 OECD countries, an average of 30.2% of legislators and managers are women.
Marriage statistics show that women in the Asia-Pacific economies always marry at a younger age than men. Mean ages at marriage for women range from 18-19 years old in Bangladesh, Nepal, and India, to 26-28 years old in Korea, New Zealand, Japan, Australia, Singapore, and Hong Kong-China, closer to the average for 30 OECD countries (26 years). Mean ages at marriage for men range from 22-23 years old in Nepal, China, and India, to 30 years old in Japan and Hong Kong-China, more than the average for 30 OECD countries (28.8 years).
High rates of diabetes are not confined to high-income OECD countries. In 2006 the average prevalence of diabetes for 14 Asian countries was almost identical to that for 28 OECD countries, at respectively 6.2% and 6.4%. Malaysia, Singapore and Hong Kong-China had the highest cases of diabetes, with 8% or more of the population aged 20-79, while Mongolia, Indonesia, and Viet Nam reported the lowest prevalence (less than 3%).
Tuberculosis is one of the main causes of death among adults in Asian countries. In 2006 the average incidence of tuberculosis in 14 Asian countries was 143 per 100,000 people, a level almost 10 times higher than the average for 28 OECD countries (16 per 100,000). The Philippines reported the highest number of tuberculosis cases at 287, while Australia and New Zealand had the lowest levels, less than 10 per 100,000.
Drawing from a multitude of secondary data sources (UNESCAP, ADB, APEC, World Bank, ILO, WHO, etc.), this special edition of Society at a Glance looks at social trends and policy developments in Asia-Pacific countries, using indicators similar to those in OECD’s recently published Society at a Glance 2009 (focused on OECD economies). The publication provides a variety of indicators, including measures such as employment, spending on education and health, rates of marriage and divorce, labour disputes, life satisfaction, drug use, and health outcomes.
The publication along with data files and country highlights for China, Hong Kong-China, India, Indonesia, Japan, Korea, Malaysia, the Philippines, Singapore, Thailand, and Viet Nam are available free of charge at www.oecd.org/els/social/indicators/asia or at www.oecdkorea.org/Social/sag_asiapacific.asp.
Asia-Pacific economies covered in Society at a Glance - Asia/Pacific Edition
Source: United Nations Statistics Division (2008), Composition of macro-geographical (continental) regions, geographical sub-regions, and selected economic groupings
For further information, questions or feedback, please contact:
Maxime Ladaique or David Jonathan Gonzalez-Villascan from the OECD's Employment, Labour and Social Affairs Directorate, or Ko Eunkyong from the OECD/Korea Policy Centre.
Society at a Glance - Asia/Pacific Edition 2009
Society at a Glance 2009 - OECD Social Indicators | <urn:uuid:a82999b2-59db-4b4d-af02-7d12a335b138> | CC-MAIN-2013-20 | http://www.oecd.org/countries/chinesetaipei/oecdrevealsevolvingsocialtrendsinasia-pacific.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.881517 | 863 | 2.796875 | 3 |
As humid Pacific air travels eastward across Oregon, it is forced upwards by the Cascade Mountains, and releases its watery payload as the heavy precipitation for which Oregon is famous. The rains, which are heaviest during the winter months, keep the western third of the state lush and sparkling: 1,932 foot deep Crater Lake, which sits in a caldera left by a giant volcanic explosion some 7,700 years ago, is fed by them, as are hundreds of rivers and streams which flow down the steep sides of the Cascades toward the ocean. Of these rivers, the McKenzie River, Rogue River, and Clackamas River are among the most popular for rafting, canoeing, kayaking, and fishing.
At the coast, Oregon's landscape varies from rugged, rocky shorelines dotted with historic lighthouses on high bluffs, to the sandy expanses of the Oregon Dunes National Recreation Area, to forests which creep right up to the waterfront. Opportunities for wildlife viewing are plentiful, from shore birds in the Klamath Marsh National Wildlife Refuge to sea lions at Cape Arago State Park to migrating gray whales off of Newport. There are more than 70 parks, viewpoints, and recreation areas that have been set aside by the state government.
The two-thirds of the state which lie on the eastern side of the Cascades receive far less moisture than the coast. Much of the land is occupied by agriculture and cattle ranches, and feels like it has more in common with the Old West than western Oregon. The history of the Oregon Trail infuses this region, and is documented in numerous museums.
Oregon's outdoor activities are complemented by the cultural richness of the Portland Metropolitan Area, a colorful, cosmopolitan, high-tech region which hosts half the state's population. In the south, the world famous 9-month Oregon Shakespeare Festival makes the small town of Ashland another must-see cultural resource.
One way to explore Oregon and other parts of the Pacific Northwest is to take a train ride aboard the Amtrak Cascades. These sleek, European-style trains travel between Eugene, Oregon and Vancouver, BC. | <urn:uuid:1e61deff-7ef5-4619-88d5-b96122f4c419> | CC-MAIN-2013-20 | http://www.ohwy.com/or/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.944157 | 437 | 2.53125 | 3 |
Among The Lebanons
Before writing of the Holy Land, I shall devote an article to the week which we spent among the Lebanons. While the trip from Bey-rout to Baalbek and Damascus is included in the advertisement of Palestine tours, the places visited are not so intimately connected with .Bible history as those of Judea and Galilee.
Beyrout, the seaport for this section of Syria, has the best harbor to be found on the east coast of the Mediterranean, and the city is naturally a place of considerable size and importance. The population is estimated at about one hundred and 'fifty thousand, and the residence portion covers the foothills of the Lebanon range. The principal' industry is the production of raw silk, the mulberry groves extending as far as the eye can reach.
The road from Beyrout to Baalbek climbs over the Lebanon range, reaching in one place an altitude of about six thousand feet. The view is one of rare beauty—the winding shore of the Mediterranean, the terraced mountain sides and the snow clad peaks combining to form an impressive picture. The far-famed cedars of Lebanon, some of them sixteen feet in diameter, still crown the higher summits, but few of them are visible from the train. A well built carriage road follows the same general course as the railroad, but the latter now monopolizes the traffic. The main line of the railroad runs to Damascus, but in the Beka, as the valley of the Leontes is called at this point, a branch has been built to Baalbek, where a wonderful temple once stood.
The city of Baalbek was founded so long ago that history does not record its beginning. Arab tradition peoples this district with the earliest of the Bible characters. The tower of Babel has been located at Baalbek by one tradition, while another has Gain building a fortress there as a refuge. It is certain that the city ranks among the oldest known to history, the location being probably determined by the presence of a very large spring whose waters would supply a great population. The name of the city (but a few thousand inhabitants are to be found there now) indicates that it was the center of Baal, or sun, worship. It is believed by those who have made research that an ancient temple, built by the Egyptians or Phoenicians, occupied the ground now covered by the ruins of a later temple built by the Romans. It is this latter temple which has drawn tourists from all over the world. It was begun during the first century of the Christian era, and the work upon it continued for more than two hundred years. It was dedicated to Jupiter and the Sun, the worship of these two deities being combined. The Romans even adopted the Greek name, Heliopolis, for the city, but the Arabic designation, Baalbek, has survived.
This great temple was laid out upon an immense scale. First a hill was built, filled with subterranean chambers, and upon the massive walls which separated these chambers the superstructure was reared. The temple was approached by u staircase one hundred and fifty feet wide and entered through a hexagonal court two hundred feet in diameter. Next came the great court, nearly four hundred feet square, with an altar in the center. Both of these courts were open, but had broad colonnades around the sides supported by granite pillars brought from the upper Nile. These colonnades were ornamented with carvings and contained two rows of niches, three hundred and thirty altogether, formerly occupied by images. Our guide, Mr. Alouf, whose pamphlet on Baalbek gives the results of his fifteen years' study of the ruins, insists that the great court was really a pantheon and contained all of the gods at that time worshiped by the conquerors and by the native population.
The temple of Jupiter must have been a most impressive building. It stood twenty-six feet above the courts and therefore about fifty feet above the natural level of the ground around. It measured three hundred and ten feet in length and one hundred and sixty in breadth. Its outer wall supported fifty-four columns of Corinthian style, each column being seventy feet in height, seven feet in diameter and composed of three pieces. Six of these columns are still standing, having survived three earthquakes and one mountain torrent. The six columns with the capitals and cornice give some idea of the magnificence of the temple before its decay. The stone used is taken from a lime-stone quarry near the city, and the carving is excellent. Enormous masses of stone lie scattered over the ground-parts of pillars, pieces of cornice, and sections of the pediment. How these huge blocks were ever lifted into place is still a matter of conjecture. No mortar was used, and yet in some places the joints are so nicely fitted and the stone so accurately cut that a knife blade can not be inserted after a lapse of nearly twenty centuries.
Stupendous as is the plan of this wonderful temple and elaborate as is its ornamentation, the most remarkable feature is the size of the stones employed. The guide first shows a number of blocks about thirty-three feet long, fourteen feet high and ten feet thick. After one's wonder has had sufficient time to express itself, three blocks are pointed out which measure sixty-four feet in length, fourteen feet in height and twelve feet in thickness. The estimated weight of one of these stones is nearly one thousand tons, and it is calculated that it would require ten thousand horse power to lift it. At the quarry about three-quarters of a mile away a companion block, seventy-two feet long and about fifteen feet in height and thickness is to be seen, chiseled from the stone about it, but not entirely separated from the stratum beneath it. This was probably intended for the sustaining wall around the temple. Whether it remained at the quarry because the work was interrupted, or because the builders despaired of being able to move it, is a secret which the living are not able to reveal. After the decline of paganism the Christians built a church in the great court, using the stones and pillars for the walls. Then came the Mohammedans and turned the courts and temple into a fortress, making use of the walls of the church.
A little way distant from the great temple is a smaller temple dedicated to Bacchus, which would of itself be sufficient to distinguish a city, but for its more famous rival. This temple is about two hundred and twenty-five feet long by one hundred and ten feet wide, and a row of fifty columns, of which fourteen are fluted, surround it. These columns are sixty feet in height and about six feet in diameter. While smaller in its dimensions this temple is even more elaborately carved than the larger one. Some of the clusters of grapes are less than two inches in length but exquisitely wrought. This temple is in a much better state of preservation than the great temple and is therefore in some respects even more interesting.
Emperor William of Germany visited Baalbek in 1898 and was so impressed by the ruins that he obtained permission from the sultan to clear away the debris, and the traveling world is under obligations to him for having made it possible to inspect the foundations and the ground plan. In this connection it may be added that Emperor William seems to take a deep interest in this part of Asia.. He visited Jerusalem to lay the corner stone of the German church; he sent to Damascus a beautiful bronze wreath to adorn the tomb of the great Mohammedan general, Saladin, and he has encouraged the establishment of German colonies in Palestine. There are German settlements of considerable size at Jerusalem, Joppa, and Haifa. At four places we found German hotels, and it is needless to say that they are kept with the excellence characteristic of the race.
The friendship which the. emperor has shown for the sultan seems to be reciprocated, for roads were built, harbors improved and many other things done in honor of his visit. We have heard all sorts of rumors as to the kaiser's intentions, but the only thing that seems certain is that German influence in this part of Asia is increasing.
'While Baalbek contains the largest and most famous ruins, it is not the only place that attracts the archæologist. There are hundreds of sites of ancient cities which abundantly repay the excavator. Specimens of Greek and Roman art have been found on both sides of the Jordan as well as along the Mediterranean coast. The tombs also have yielded up their treasures and the museums of the world have been sup-plied with tear bottles, perfumery jars, vases, bowls, scarabs, ancient coins, etc.
The Phoenicians are credited with having invented the making of glass in the days when Tyre and Sidon were their chief cities. It is said that the art owes its discovery to the use of saltpeter in the place of stones by some sailors who landed at the mouth of the river Belos, near Akka. Finding no stones upon which to put their kettles, they used blocks of saltpeter and were surprised to find that the fire had fused the sand and saltpeter into a transparent substance. The industry was in augurated at Tyre and Sidon, and for some time the Phoenicians supplied the world with glass. The bottles and vases found from time to time in the tombs of Syria and Egypt are more beautiful than when they left the hand of the manufacturer; the outer surface has decayed, and beneath are revealed all the colors of the rainbow. It was the custom to fill the ter bottles with tears of the mourners and to bury them with the dead.
The scarab, which is found so often in the ancient tombs in Syria and in Egypt, is the old fashioned tumble-bug or dung beetle with which every boy, or at least every country or village boy, is familiar. I little thought, when I used to see the tumble-bug rolling his little globe of manure along the dusty road, that he was considered a sacred insect several thousand years ago or that he was ever used as a symbol of the Creator; and yet his likeness adorns temples and tombs while his image, cut in stone and bearing the seal of rulers, has been found by the thousands. Often the heart of a dead person was removed and a scarab inserted in its place. The scarab, rolling its ball, typified to the ancient an unseen power guiding the sun while the bursting of the young bug from its egg in the ball symbolized the resurrection—to what classical uses this commonplace little insect was put !
Among those who have been instrumental in bringing the hidden treasures of Syria to the attention of the world, Mr. Azeez Khayat, a native of Tyre, but now an American citizen, deserves special mention.
Many American museums are indebted to him for their collections.
Speaking of Tyre and Sidon reminds me that in the study of Syria and Palestine, I ran across an early instance of monopoly. Josephus accuses John of Gischala of monopolizing the oil business on the Mediterranean coast. It was early in the Christian era that the aforesaid John, according to Josephus, convinced the Jews who dwelt in Syria that they were obliged to use oil made by others, and the historian adds : "So he (John) bought four amphoræ with such Syrian money as was of the value of four Attic drachmae and sold every half amphor at the same price; and as Galilee was very fruitful in oil and was peculiarly . so at this time, by sending away great quantities and having the sole - privilege so to do, he gathered an immense sum of money together."
This is interesting and instructive. It shows, first, that monopoly is an ancient evil and, second, that the monopolist in his inclination to take advantage of the consumer by raising the price was much the same then as now—but I have been afraid, ever since I read of John of Gischala, that some American named John might try to imitate him and establish a monopoly in our country—possibly in oil.
But on to Damascus—and we reached it all too soon, for the ride across the Anti-Lebanon range is also picturesque. The route down the east side of the mountain follows the valley of the Abana, a splendid stream, worthy of the compliment paid it by Naaman. It leaps from the mountain side a full grown river and plunges down into the plain only to be lost in the sands, but not until it has brought verdure to many square miles that would otherwise be barren. It is easy to understand why Damascus is among the oldest, if not actually the oldest, of all the cities still standing. It occupies the one green spot in all that section and is the outpost of the Mediterranean coast. The Arabian desert stretches to the east and southeast for hundreds of miles, and the caravans from Persia and Arabia pass through Damascus on their way to Egypt even now, as they did when Babylon and Ninevah were young; it is also on the road between the great East and Tyre and Sidon.
Damascus is an Oriental city and is still innocent of the ways of the western world. Its bazaars give one a glimpse of life as it was before Europe and America were known to history. The government is erecting public buildings according to modern plans ; but the covered streets, lined with little booths, the homes of the people, the dress, the customs and the habits are the same that they were when Saul of Tarsus wandered down the street "called Straight" in search of the one who was to restore his sight. (This street though straight as compared with the other streets, is hardly deserving of the name which it still bears.)
As in Cairo, the different trades have different sections. The dealers in sugar occupy one quarter; the silversmiths, the candy manufacturers, the blacksmiths, the carpenters—each class has its cluster of shops. The Arabian horse being the pride of the Bedouin, we were not surprised to find much attention paid to the manufacture of saddles, saddle bags, bridles and trappings, only they were for the most part made of wool and cotton rather than of leather. Bright colors, tassels, fringes, shells and ostrich feathers are employed in the ornamentation of the horse, the donkey and the camel.
The candies of Damascus are good and very cheap, and nuts of all kinds are to be found in abundance, an excellent variety of walnut being grown within the city limits. Naturally this city is a market for Persian rugs and large stocks are kept on hand. While the people make everything which enters into the daily life of the country, they are especially skilled in brass, damascene ware and the inlaying of wood with mother-of-pearl.
Damascus is not especially noted for places of historical interest. The tourist is shown the house of Ananias and the window through which Paul was let down from the wall, but it is doubtful whether the identity of these places has been really established. A house, known as the house of Naaman the Leper, is now very appropriately used for a leper's home. There is no uncertainty about the river Abana, and another river near Damascus known as Pharpar. An ancient wall surrounds the city, and one of the largest mosques in the world occupies ground first dedicated to a heathen temple and afterward to the church of St. John the Baptist, erected by Arcadius, the son of Theodosius.
The big-tailed sheep described by Herodotus is to be found on the streets of Damascus. It is a peculiar breed, and the tail, which is considered a great delicacy, is often so heavy as to seem a burden to the sheep. It is broad, covered with wool, and sometimes ends in a curl. We also saw here the long-eared goats, as curious looking in their way as the sheep.
And what shall we say of the Damascus dog? He is to be found every-where and has no owner. We counted eighteen in one group and two hundred and thirty-eight in one forenoon's ride. They live on charity and fight whenever an opportunity offers. It seems to be against the law of the sultan to kill dogs, as one learns to his regret after he has heard them barking at all hours of the night. It is superfluous to add that the flea is as common as the dog, and as indifferent also to the peace of the stranger.
A new railroad which is now building from Damascus to the south will soon make it possible to go to Galilee in a few hours, but now it is more convenient to return to Beyrout and go to Haifa by boat. This we did, and having a couple of days at Beyrout we learned something of the religious work done there.
In the division of territory the Presbyterians of America were, in 1870, assigned the country around Beyrout. The district is divided into the Beyrout, Lebanon, Sidon and Tripoli stations, and at all of these stations schools, as well as churches, are being established. So successful has the work been that the native communities now contribute half a dollar for every dollar sent from America. There is also an American press at Beyrout which publishes the Bible in Arabic, some eighty thou-sand copies being issued last year in addition to religious tracts of various kinds. One of the leaders in the missionary movement, Rev. H. H. Jessup, has completed his fiftieth year of service among the Syrians.
The Syrian Protestant college is also located in Beyrout ; it occupies a beautiful site overlooking the sea and is in sight of the highest peak of the Lebanons. While Christian in management, this college is not denominational but is under the control of an American board representing a number of churches. Between six and seven hundred young men are in attendance, and its graduates are scattered throughout the world. Within its halls are to be found Protestants, Catholics (both Greek and Roman), Armenians, Jews and Mohammedans, and its influences in these parts can scarcely be overestimated.
The present president of the college, Dr. Howard S. Bliss, is the worthy son of the college's first president, Dr. Daniel Bliss, whose religious and educational work in this territory covers more than half a century. The elder Bliss, now past eighty-three, and his wife are enjoying an enviable experience. Their active labors over, with minds still alert and with hearts still young, they are spending the evening of their lives near the scenes of their labors and among the children and grandchildren who have blessed their home. Their rest has been earned, and the peace of their latter years is a merited reward. Surely they illustrate the blessedness of lives consecrated to a high purpose and rich in noble service.
( Originally Published 1907 )
The Old World And Its Way:
Burma And Buddhism
British Rule In India
Among The Lebanons
The Christian's Mecca
Read More Articles About: The Old World And Its Way | <urn:uuid:8ca250fa-1a87-4757-99d6-1c287e2027cc> | CC-MAIN-2013-20 | http://www.oldandsold.com/articles34/world-cultures-29.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.976515 | 3,951 | 2.9375 | 3 |
Once climate change begins, simultaneous action must be taken on two levels:
First, only an immediate and drastic reduction of greenhouse gas emissions (GHGs) will slow the serious repercussions associated with climate change: this action is to mitigate climate change.
Second, societies around the world must accept the challenge of adapting to climate change by reducing vulnerability and adapting stakeholders and territories to the change: this action is to adapt to climate change. Indeed, adaptation measures have become an inevitable and indispensable complement to measures that reduce GHG emissions.
Strategies to mitigate climate change have made great progress over the last twenty years. Today, we have a much better understanding of which measures help control greenhouse gas emissions. Furthermore, tools have been created to limit these emissions, at the European and local level. However, efforts undertaken in this area must continue to be strengthened.
In contrast, adaptation strategies to climate change have emerged relatively recently. Held up by the lack of knowledge, initial efforts were focused primarily on implementing research programmes.
Within this context, the CTP and its members have made a commitment to climate adaption, under the framework of the Pyrenees Climate Change Observatory, to track the transformation of the particularly vulnerable Pyrenees mountain region and urgently support a adaptation strategy for the territory.
What is adaptation?
Adaptation is defined as “the adjustment of natural or human systems in response to actual or expected climate stimuli or their effects, in order to reduce damage and take advantage of positive aspecta”.
The term “adaptation”, therefore, indicates measures taken in response to climate change. It is a question of taking current changes into account, but also being able to anticipate the changes ahead. Adaptation aims to reduce the risks and damage associated with current and future negative impacts in an economically efficient manner and, when possible, take advantage of potential benefits.
It is about proactive measures that reduce the vulnerability of stakeholders and territories to climate change. Vulnerability is the degree to which a system is able to cope with the adverse effects of climate change (including increased climate variability and extreme conditions). Vulnerability depends on the nature, extent, and rate of climate change, but also the variations to which the system is exposed, its sensitivity, and adaptive capacity. .
One of the main challenges of climate change adaption is making decisions in a context of uncertainty. Indeed, it is impossibe to exactly predict the climate’s future, especially because of the difficulty of reproducing the long-term behavior of climate systems and the uncertainty of the international community’s ability to reduce greenhouse gas emissions.
Therefore, European authorities advise giving particular priority, where possible, to “useful in any case” measures, i.e. those that are economically and ecologically justifed regardless of climate trends.
Figure 1 : Example of a no regret measure
Furthermore, the impacts of climate change vary, and vary widely, from one area to another depending on geographical, socioeconomic, and cultural contexts.
Therefore, adaptation to climate change should be designed primarily at the local and regional level, and solutions must be tailored to each region and each sector relative to those involved.
Monitor climate change adaptation in the Pyrenees
Taking into account the anticipation and management of current problems, decision makers (and in a more general sense, stakeholders in economic development), should be equipped with the means, knowledge, and tools to make the best possible decisions for the territory regarding adaptation strategies.
Therefore, in addition to monitoring and understanding climate trends in the Pyrenees, the Observatory aims to anticipate climate change impacts on socioeconomic sectors and identify the most vulnerable areas of the mountain range, to help them adapt to this phenomenon. Therefore, in August 2011, the OPCC initiated a study to:
• identify and analyse the field’s most relevant adaptation measures, in the Pyrenees and Europe;
• assess practices that might be transferable to the Pyrenees, to be circulated and applied specifically in the region.
Certain territories and stakeholders, both in Europe and the Pyrenees, have committed to implementing concrete adaptation measures to limit the effects of climate change on their respective territories, and help adapt to them.
While certain measures are evident and recognised, others contribute to reducing the vulnerability of certain sectors to climate change, and are therefore still considered “adaptation” strategies.
The CTP and members of the Pyrenees Climate Change Observatories are committed to raising awareness among stakeholders in the Pyrenees about climate change and its effects, as well as supporting them on the road to adaptation by providing assessements of adaptation measures being carried out in the field.
This downloadable brochure is the continuation of the Observatory’s first publication in September 2010 on the vulnerability of the Pyrenees mountain region to climate change. It anticipates the publication of a series of tools to show regional support for the implementation of concrete adaptation measures, due out in late 2012.
Actions carried out by the Observatory are intended to eventually support the development of an adaptation strategy for climate change in the Pyrenees.
Download brochure in French, Spanish and English
- GIEC (2007) - Bilan 2007 des changements climatiques, Contribution des groupes de travail I, II, III au quatrième Rapport d’évaluation du Groupe d’experts intergouvernemental sur l’évolution du climat. GIEC, 103 p.
– OPCC (2010) – Mutualisation de la connaissance sur l’impact du changement climatique en montagne, 11p.
* Study on Adaptation to climate change in the Pyrenees. Project CTP – Région Midi-Pyrénées. Realisation by ACTeon (France), BC3 (Spain), Fresh’Thoughts (Austria). | <urn:uuid:84ec03b0-7aed-4f31-92cb-923e233cbbe8> | CC-MAIN-2013-20 | http://www.opcc-ctp.org/index.php?option=com_content&view=article&id=39&Itemid=79&lang=en | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.911176 | 1,215 | 4.03125 | 4 |
Alcohol, tobacco, and a president
The patient was an overweight cigar smoker with a penchant for alcohol who one day noticed a swelling on the roof of his mouth but chose not to tell anyone about it for several weeks. When doctors were called in and pressed for a diagnosis, the verdict was cancer.
The year was 1893, a time of serious political and economic turmoil. The patient was Grover Cleveland, formerly 22nd and then 24th president of the United States. Cleveland, who had been haunted by fear of cancer and panicked at the diagnosis, set upon an elaborate scheme to keep the truth from virtually everyone, including some of the physicians who would treat him.
He contrived to spend the Fourth of July holiday aboard the yacht Oneida, setting sail from New York City and leisurely traveling to his summer home in Massachusetts. En route, doctors would remove his cancer. Preparations were as meticulous as possible under the circumstances. Physicians, dentists, surgeons, and anesthesiologists were sworn to secrecy; some didn't know the identity of the patient until the Oneida was en route. On July 1, 1893, as the yacht steamed at half speed, the salon was converted into a crude operating room. The setup included oxygen, nitrous oxide, ether, two storage batteries to power cautery instruments and lights, strychnine in case of shock, digitalis, and morphine. Shortly after noon, the president, who had had toast and coffee for breakfast, walked to the makeshift operating room and sat in a chair lashed to the interior mast. Some accounts say the ship's steward served as the surgical nurse.
The operation itself was a masterpiece for its time, although details were not reported until years later. Using far more anesthesia than surgeons anticipated, the team removed a major part of Cleveland's left upper jaw, leaving a defect 2 1/2 inches long from front to back and almost 1 inch wide. The procedure was a nightmare for the medical team, but the recovery was remarkably uneventful, and the president was up and about in a few days. He couldn't eat normally or talk until some weeks later when a specialist fashioned a rubber prosthesis to fill the hole in his mouth.
The press did get wind of the operation, possibly through a naive dentist who was brought on board to help with the anesthesia and later told his associates why he was late for work. Within a week, several newspapers reported that the president had had a malignant growth removed. At that time, cancer was greatly misunderstood; it was still considered by some to be a "social disease" - not what the President of the United States wanted to be remembered for. The spin doctors of that era were up to the task, however. What followed was a masterful medical disinformation ploy designed to move the press away from the truth. "The president had some dental work done and also is suffering from rheumatism," his doctors reported.
Grover Cleveland lived another 16 years, suggesting that the cancer was not nearly as lethal as his doctors suspected. Nonetheless, the secret surgery set a precedent that held for many decades thereafter.
Following this man through his life, you would have never thought he would one day be the Eighteenth President of the United States. Hiram Ulysses Grant, or Ulysses S. Grant as he is more commonly known, led a life full of successes and failures. Far from remarkable in his early life, Grant made it through early hardship and lackluster performance to lead the entire Northern Army in the Civil War, and found success in politics. But after he achieved the most powerful position in the America, Grant was stricken with oral cancer, and suffered terribly before he finally fell victim to the disease. He remains the only President of the United States to die of cancer. Years of cigar smoking and periods of heavy drinking were probably to blame.
Grant was born in Point Pleasant, Ohio on April 27, 1822 to parents Jesse and Hannah. His father owned a tanning business and Grant had many advantages as a child. He went to grammar school at Marysville Seminary and then attended the Presbyterian Academy in Ripley, Ohio. In neither of these institutions did Grant show any scholarly aptitude or desire. But to his credit he was an excellent horseman and was able to ride even the wildest horses. Despite his lackluster scholasticism, Grant's father was able to get him an appointment to the U.S. Military Academy at West Point.
Grant's career at the academy seemed destined for mediocrity right from the outset. The congressman who nominated Grant for the academy had spelled his name as Ulysses S. Grant and this name was officially listed in the registry. Grant tried many times to have his proper name listed but was unsuccessful. He eventually gave up and adopted the new name as his own. Grant, wholly uninterested in education, was not very enthusiastic about going to West Point. "A military life had no charms for me," he later wrote in his journal. He merely wanted to "to get through the course, secure a detail for a few years as assistant professor of mathematics at the Academy, and afterwards obtain a permanent position as professor at some respectable college."
His lack of enthusiasm for the academy was apparent in his performance. He graduated in 1843, ranked 21st out of 39 students, and again, only excelled in horsemanship. Upon graduation he was assigned to the 4th Infantry in St. Louis as regimental quartermaster during the Mexican War. Under the command of Zachary Taylor, he frequently led companies into battle. The Mexican War was the first time Grant distinguished himself in battle, and he received brevets for his bravery. Once the Mexican War was over, Grant was transferred to the West Coast and had to leave new wife Julia Dent, whom he met while serving in the infantry, at home.
These years were to be hard on Grant. He did not get along with his superior officers, and his business ventures, through which he attempted to raise money to bring Julia out to the coast with him, failed. Grant was miserable. The more leisurely pace of peacetime allowed Grant to drink and smoke much more often than any time during the Mexican War. He later admitted that during this time he smoked up to 12 cigars a day. In July of 1854, Grant, amid rumors of disciplinary action for his drinking and behavior, resigned his commission to move home to his wife. He settled on 80 acres of family farmland with Julia.
But civilian life treated him no better than military life. Although he had his wife, he was unsuccessful at maintaining the farm. Grant then failed at attempts to secure jobs as an engineer and a clerk in St. Louis. He also tried to set up a real estate business, but that failed also. He ended up working as a clerk in his family's leather goods store in Galena, Ohio. He was working there when the Civil War broke out, and he was off to war again.
Once the war was official, Grant was quick to offer his services to the US Government. He was unable to attain an appointment, so he organized a volunteer company in his home of Galena. Grant quickly ascended the ranks and made a name for himself in the Battle of Fort Henry. Union troops under Grant attacked the fort and forced Confederate General Simon Buckner to surrender. When Buckner asked for the terms of surrender, Grant told him there were no terms but an unconditional and immediate surrender. This earned him the nickname of "Unconditional Surrender" Grant. Grant eventually became commander of the Northern Army and helped the Union defeat the South. These times during the war saw his drinking and smoking habits continue with the victories and defeats of the many battles he oversaw.
After the war Grant was appointed to full general and was to oversee the rebuilding of the South. In 1867 President Johnson suspended Secretary of War Edwin Stanton and assigned Grant as interim secretary. But when the Senate refused to agree with the suspension, Grant resigned from the position, against President Johnson's wishes. President Johnson's unkind comments about Grant led him to join the Republican Party, which made him their nominee for President. He easily defeated Horatio Seymour in the presidential election and took office in 1868.
Grant's Presidency was marred with scandals and problems. With regard to the South, Grant tried to assert the rights of African Americans, but the power of the Klu Klux Klan was too much for Grant to deal with. His efforts to enforce the 14th and 15th amendments failed miserably. Relations with American Indians proved no better, and despite his attempts to make peace with the Indians, Custer's actions destroyed Grant's efforts. There were also both railroad and Senate pay scandals that marred his administration. But despite all these problems, Grant served as President for two terms and none of problems were ever directly linked to or blamed on him. He left office with a good reputation, even though his two terms were not that wonderful.
His years after office proved to be toughest on him. Financially, a number of unsuccessful business ventures left him with little money. He then became a partner in the Grant & Ward brokerage firm, which went bankrupt and left Grant penniless. He was so destitute that had to sell wartime souvenirs and swords to keep afloat. The government later voted to reassign him the title of general so he could again have a salary, but he would have little time to enjoy the money because of his failing health. He began his autobiography, in which he was aided by, and finally published, with the help of Samuel Clemens (Mark Twain).
The first sign of cancer came in 1884 when Grant's wife recalled, "there was a plate of delicious peaches on the table, of which the General was very fond. Helping himself, he proceeded to eat the dainty morsel; then he started up as if in great pain and exclaimed, 'Oh my. I think something has stung me from that peach.'" Grant did not think anything was wrong, and did not report the pain to a doctor. Soon, the "sting" had grown into carcinoma of the right tonsular pillar, and Grant began to suffer. By the time Grant consulted his doctor the oral cancer was untreatable. The only treatment available at the time was an application of cocaine hydrochlorate solution to the cancerous area, which only helped suppress the pain. Grant suffered a slow, painful death, but he endured it with great courage. Once news of his oral cancer got out, reporters lined the streets outside his house and wrote daily reports about the beloved ex-President.
Here is an excerpt from one such article taken from the New York Times on March 29, 1885:
After Dr. Douglas left General Grant last evening the patient sufferer did not fall asleep. He lay quietly for an hour or two, when his breathing suddenly became difficult. His servants gave him a glass of water in the hope of affording him some relief, but the effort at swallowing was unsuccessful, and resulted in choking the patient, whose coughing fit became so violent as to alarm Colonel Grant. A carriage was dispatched in haste for Dr. Douglas and Dr. Shrady. The members of the family were also summoned to the General's room. The throat trouble had become painful and alarming. The physicians reached the house shortly after two o'clock. They stayed with the General until the early dawn hours. The General's throat was cleared and the fit of coughing checked."
Grant finally died on July 23, 1885. | <urn:uuid:f4087ec5-e3a5-4556-b839-dcdb57719ba8> | CC-MAIN-2013-20 | http://www.oralcancer.org/people/political_figures.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.991638 | 2,357 | 2.90625 | 3 |
$50,000 AWARD FOR BEST PROPOSAL
$2,000,000 in Potential Research Funding
June 6, 2012
WINNERS OF ORIGIN OF LIFE CHALLENGE ANNOUNCED
Competition seeks novel approaches to determining the origin of life on Earth
La Quinta, Calif., and Tempe, Ariz. -- In mid-2011, retired California chemist and entrepreneur Harry Lonsdale issued a challenge to the origin of life scientific community to come up with novel ideas for explaining the mechanism of life’s origin, through the Origin of Life Challenge (http://originlife.org).
Dozens of proposals were received and evaluated by an international panel of experts. The winners were announced today by Lonsdale in collaboration with the Origins Project at Arizona State University and its director Lawrence Krauss (http://origins.asu.edu). Lonsdale is co-founder of the high tech company, Bend Research Inc., Bend, Ore., (http://www.bendresearch.com) and Krauss is an ASU Foundation Professor.
Unraveling life’s origin won't be easy. Earth was a hellish place when life started some 3 to 4 billion years ago. It was a rocky planet with oceans and a primitive, oxygen-free atmosphere, subject to rampant volcanism and intense solar radiation, with frequent impacts from asteroids and comets. Yet, that was the cradle of life, and as far as we know the only life in the universe. Somehow life started and, through replication of its blueprint and the extraction of energy from its environment, life gained a toehold here on Earth, so that Darwinian evolution could begin its inexorable march — toward us.
Co-winners of the $50,000 prize in response to the Origin of Life Challenge were two British chemists, John Sutherland at the Medical Research Council Laboratory in Molecular Biology, Cambridge, and Matthew Powner at University College, London. They also received a $150,000 one-year grant to pursue their research in the field.
The Sutherland-Powner team is focused on understanding the chemistry of the replication mechanism of first life. All biological replication is based on the nucleic acid polymers RNA and DNA, which carry the genetic code. The team seeks to demonstrate the selective generation of the RNA building blocks and other key biological molecules from simple feedstock molecules under the presumed environmental conditions of pre-biotic Earth. If successful, the Sutherland-Powner team will have demonstrated how RNA could have emerged from plausible chemical reactions on the early Earth.
A $90,000 one-year grant was also made to a joint Canadian-U.S. team consisting of Niles Lehman of Portland State University, Portland, Ore.; Peter Unrau of Simon Fraser University, Burnaby, British Columbia, Canada; and Paul Higgs of McMaster University, Hamilton, Ontario, Canada. That team will explore the ways in which potential information stored within random pieces of RNA can spontaneously assemble into sets of self-replicating molecules.
The Lehman-Unrau-Higgs team will mix large pools containing small fragments of non-functional RNA under a range of plausible pre-biotic conditions, looking for RNAs that have the ability to make copies of themselves, as well as catalyze other important biochemical reactions. If successful, they will have demonstrated the transition from “dead” chemicals to a living state of autonomous replication.
A third, $60,000 grant was made to the team of Wenonah Vercoutere of NASA Ames Research Center, Moffett Field, Calif., and David Deamer at the University of California, Santa Cruz. That team will attempt to demonstrate how simple molecules called nucleotides can polymerize to form RNA when they are organized within membranous structures and exposed to conditions simulating volcanic hot springs. If successful, they will have shown how proto-cells containing RNA could have been produced in the pre-biotic environment.
“These researchers are among the best in the world, and I am excited to see the results of their work,” Lonsdale said. “Ultimately, it is my hope that within a decade or two the fruits of this research will help provide answers to the origin of life question, and that a rational model for life’s origin will be taught in every biology classroom in the world.”
Krauss said the Origin of Life Challenge grants fit perfectly into the mission of the Origins Project at ASU – which is to ask the big questions. “The Origins Project is thrilled to partner with Harry Lonsdale to further his remarkable vision of pushing forward the frontiers of our understanding of life’s origin,” Krauss explained. “It is my hope that these awards will motivate others to contribute support for investigating the important foundational questions that drive the Origins Project and, more broadly, fundamental science everywhere.”
Harry Lonsdale, (541) 389-5900, ext. 118; [email protected]
Lawrence Krauss, (480) 965-6378
The open period for the submission of proposals in response to the Origin of Life Challenge ended on Dec. 31, 2011. We received more than 70 submissions. If you submitted a proposal, we appreciate your interest in our Challenge and thank you for your effort. We will announce the winner or winners on this website some time around the end of April 2012, after our peer review panel has evaluated the proposals.
The sponsor named below is offering an award of $50,000 for the best original proposal pertaining to the study of the origin of life on Earth, including an outline of work to be performed in support of the proposal. Multiple awards may be made. "Life" is defined here as a self-sustained chemical system capable of undergoing Darwinian evolution. The proposal should take into account the conditions, materials, and energy sources believed to have existed on the prebiotic Earth. Submissions should provide a cogent hypothesis for how life first arose, including its plausible chemistry, and for how primitive life could have evolved to modern biological cells, including the present genetic material and metabolism. Submitters are encouraged to offer unconventional hypotheses that nonetheless can be subject to experimental validation. Specific questions to be addressed include:
- What were the nature and genesis of the first macromolecules on the prebiotic earth? How did the building blocks that comprise these macromolecules become available and how were they assembled?
- How did prebiotic molecules first acquire the capacity for storing genetic information and how did the genetic machinery evolve?
- At what stage in the origin of life did cells originate, and what did they contain? How did those primitive cells evolve to
modern biological cells?
- What was the chemistry of the first metabolic pathway(s) and how did that metabolism evolve to modern cellular metabolism?
- At what stage did proteins become involved in metabolic processes and how did the link first arise between genetic molecules and other functional molecules, such as enzymes?
All submissions will be reviewed by a panel of scientific experts. Submissions should contain a statement of work to be performed and a letter of institutional support where appropriate. Submissions that suggest a multidisciplinary approach should describe how the necessary research capabilities will be provided. Submissions that rely on extraterrestrial sources of key materials must describe in detail how those materials would have been generated. Submissions involving the supernatural or that violate physical laws will not be considered.
Submissions that are deemed highly meritorious by the reviewing panel will be eligible for additional research funding of up to $2,000,000 over a multi-year period, at the discretion of the sponsor.
Electronic submissions are requested. All submissions shall be in English (minimum 10 point type) and limited to 10 single-spaced pages, including figures, but excluding citations. Submissions will be accepted beginning July 1, 2011, with a final deadline of December 31, 2011. The confidentiality of all proposals will be protected using guidelines established by the U.S. National Science Foundation. The winner(s) will be announced and the award(s) will be made early in 2012. Until that time, the funds for the award are being held in a trust account by the law firm of Hurley Re, PC. Confirmation may be obtained by email to: [email protected].
To make a submission, please follow the Instructions for Submissions. | <urn:uuid:6844e4a9-1419-40a4-9564-270c3dff67d2> | CC-MAIN-2013-20 | http://www.originlife.org/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947226 | 1,747 | 2.578125 | 3 |
2006 & 2007 Mathematics:
Percentages of Students with Disabilities at Level 1
In every grade, fewer students with disabilities showed serious academic problems.
Gap: Compare the average across grades 3-8 for students with disabilities at 28.2% with that for all students in grades 3-8 at 7.5%
|Grade 3||Grade 4||Grade 5||Grade 6||Grade 7||Grade 8||Grades 3-8|
Keynote by R. Cort, 10/3/07 | <urn:uuid:36cc6e09-f39a-4588-b2ff-a685505a29d3> | CC-MAIN-2013-20 | http://www.p12.nysed.gov/specialed/techassist/P16framework_files/textonly/slide16.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.807469 | 106 | 2.625 | 3 |
I needed a way to weather wood to match my weathered styrene. I have been a user of styrene since the Alan Armitage articles in the late 1950's. . I developed this idea with styrene in the 1970's. I was trying to build early Pennsylvania logging structures. Unfortunately I have no examples of my earlier work.
Now I am mixing styrene and wood and this makes a match. This technique eliminates the color in the wood while retaining the wood's grain patterns. Styrene can be roughed and scratched to duplicate those grain patterns.
(Click Images to Enlarge)
I am trying to make model wood look like these examples.
Modeling in larger scales requires the of use wood more. It is more readily available in the larger sizes I need than styrene. I cut it on a Dremel saw and full-sized table saw. My initial ventures into wood involved staining the wood with an India Ink/alcohol solution. It did not look like weathered and bleached wood. I tried a wash of acrylic and restaining the wood with the I/A solution. It just looked grey. It did not have the underlying white of weathered wood.
I wanted a method that allowed all the materials to have the same appearance. Mixing different normally stained woods causes a mixed appearance. My method uses the grain and texture but controls the color of the wood. The white paint is basically being stained.
Weathering Wood Using I/A and White Acrylic
Paint the wood with a thinned mixture of white acrylic. It should be about the consistancy of heavy cream. The paint should make the wood white but not fill in the grain. It works with tube and craft paints. Let the paint thoroughly dry. If it is not dry the paint will leach into the stain and it will be essentially grey paint.
Mix waterproof India Ink with Isopropyl Rubbing alcohol until it produces this stain on a paper towel. Apply the stain until the wood is the right color
Weathering Wood After Assembly
I was building this bridge for my layout and was using wood originally stained with an I/A wash.
I applied a coat of Kilz2 Acrylic primer to the finished bridge. The old finish was completely covered.
I stained the bridge with a wash of Black Rit Liquid Dye straight from the bottle. Put a small amount of the dye on the surface and add water to make a wash. Spread the dye around to make a mottled effect. Add more water to lighten and more dye to darken. The finish will dry lighter. The Kilz primer works better with this than an India Ink/alcohol stain.
My other stage coach bridge done the same way.
There is also Zap Latex primer. It is cheaper and has a smoother, more plastic finish. It stains best with an India Ink/Alcohol mixture.
This is pine from a 1x4. I cut my boards with a table saw. Boards 1,2 and 5 have the rough saw surface. Boards 3 and 4 have the original planed surface.
Zap Latex Primer and Kilz2 Latex Primer
Kilz2 Latex has a rougher, flatter finish and takes the Rit Liquid dye and Dye-na-flow better.
Originally I used Rit dyes but found Dye-na-flow fabric paint worked better. Dye-na-flow is "black". That sounds strange but most "blacks" are blue and purple.
In the smaller scales I find that styrene represents wood better than wood. The "grain" is more controllable and it has no color. More effects can be applied because of the blank palette of styrene.
Above is styrene as weathered wood. At left is a HO Atlas Trackside Shanty. The styrene has been weathered to represent aging wood.
Styrene makes excellent rough weathered wood.
Styrene Combined with Wood
Our styrene and wood combo, the outside panels are sheet styrene and the timbers are wood. Painted with flat Kilz2 primer and stained with Dye-na-flow fabric paint.
Staining white primer will also work on plaster castings. A modified HO Woodland Scenics timber portal.
Flatcar Decks on Plastic Cars
A Bachmann On30 plastic flatcar painted with flat white acrylic craft paint and stained with black Dye-na-flow fabric paint.
Scribed basswood primed white and mottled with Black Rit Dye. Note the grain problem in scribed wood sheeting.
Darryl Huffman's use of our Technique
Darryl Huffman displayed a model using the Kilz and rit dye on the Yahoo weathering forum:
À : [email protected]
Objet : [weathering] New picture in FILES : Re: Harold's Rit Dye staining
I have been playing with Harold's Rit Dye method of getting the look of old
silver grey wood. My cabin using this method is about half way completed so
I decided to upload a picture of it into the FILES section.
12020 Old Seward Highway
Anchorage, Alaska 99515
Learning about DCC? New DVD now available:
Below is his cabin (Click Images to Enlarge)
The time honored India Ink/Alcohol solution above and the staining of white primer on the right. The tunnel portal is wood timbers and styrene sheet primered with Kilz2 acrylic primer and stained with Dye-na-flow fabric paint.
Styrene and wood weathered with India Ink/Alcohol over white acrylic paint. The styrene was textured to match the swizzle sticks using coarse sandpaper.
An HO flatcar deck weathered with the same technique.
Swizzle sticks and dowels, all match when primed white gesso and stained with Dyn-a-flow after assembly. | <urn:uuid:e72a0dc8-f10d-496a-b25d-0e42eb0e1973> | CC-MAIN-2013-20 | http://www.pacificcoastairlinerr.com/weathered_wood/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.927028 | 1,245 | 2.5625 | 3 |
People suffering from food allergies aren’t always aware that their symptoms are caused by the food they are eating. It often can be more difficult to discover that a person is allergic to a certain type of food, as opposed to discovering that a person is allergic to a bee sting, for example. Some people suffering from food allergies continue their day-to-day life with symptoms such as headaches or fatigue and have no idea that their symptoms could be from food allergies.
Symptoms of food allergies include: fatigue, hives, eczema, abdominal pain, diarrhea, nausea, vomiting, nasal congestion, cough and asthma. Even more serious conditions include: difficulty breathing, decreased blood pressure, increased heart rate, dizziness, mental confusion, slurred speech, anxiety attack and cardiovascular collapse, according to the American Academy of Acupuncture and Oriental Medicine (AAAOM).
Many herbalists consider two major systems when dealing with allergies – the immune system and adrenal-stress handling system. These two systems are under great pressure due to environmental changes. The fast pace of modern living and working may have an adverse effect on these systems, as well. | <urn:uuid:816f1d5e-b018-465a-b795-382abf7c47f0> | CC-MAIN-2013-20 | http://www.pacificcollege.edu/acupuncture-massage-news/acupuncture-massage-publications.html?start=600 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.960716 | 231 | 3.046875 | 3 |
Alarm is a facility that allows external alarms like PIR's, reed switches, vibration sensors etc. to be connected to the CCTV switcher so that a nominated camera is switched on when an alarm signal is received.
Complex mathematical formulae or rules used to solve problems. In video, they are used to achieve digital compression of a video picture.
Representation of data by continuously varying quantities.
Electronic circuits made up of components that can handle analog signals. Examples: Resistors, capacitors etc.
It is a type of ISDN technology using constant size 53 byte cells instead of variable size packets. Because cells do not change size, they switch much faster and more efficiently.
Backbone is the infrastructure that is used to inter-connect the various local area networks to build a wide area network.
Bandwidth is the range of frequencies or data that pass through an electrical/electronic amplifying, processing or transmission unit without attenuation or loss
A base 2 numbering system using two digits 0 and 1.
It is the short form for binary digit
A network device that logically separates a single network into segments.
Brightness represents the intensity of illumination of the reproduced picture.
Group or word of bits. Usually has 8 bits.
Camera is an electronic device that converts light into an electrical signal.
Charge Coupled Device is a solid-state device in a camera that converts light falling on it into an electrical signal.
The Common Gateway Interface (CGI) is a standard for interfacing external applications with information servers, such as HTTP or Web servers. A CGI program can be written in any language that allows it to be executed on the system, such as: C/C++, PERL, Visual Basic etc.
It is a process of reducing the size of digital signal.
It is the ratio between the size of data before compression and after compression.
It is a process of reducing the size of digital signal.
Central Processor Unit. It is the brain of a digital system like the computer, where all the manipulation or processing of digital data is done. Its speed is measured in Hertz. It also tells the number of instructions it undertakes per sec.
It is amount of data being handled by a device every second.
DDNS stands for Dynamic Domain Name Server: This is a service provided by different service providers, and is suitable for situations where the IP address is dynamic and keeps changing. The user registers a host name with a service provider and whenever the dynamic IP address changes, the DDNS service provider automatically updates the DNS servers all over the world
A base 10 numbering system using ten digits 0, 1,2,3,4,5,6,7,8,9.
Dynamic Host Configuration Protocol is used in a TCP/IP protocol network to send client configuration data including TCP/IP address, subnet mask to the clients.
Domain Name Server (DNS): When the user types in 'www.panasonic.com ', the DNS server in the network converts it into an IP address, which is then used in all communications.
Digital Subscriber Line is a high-speed network connection using standard POTS or PSTN telephone cable
Digital Signal Processing chip is like a mini computer with its own RAM, CPU and different application software. As required the software is activated to manipulate the digital signal.
This is not a permanent address and is a good solution to overcome the shortage of IP addresses. The Dynamic Host Configuration (DHCP) server allocates temporary IP addresses to the devices connected to the network. If a device logs on to the network, it is given a temporary IP address for a fixed time period or the same IP address is given to another device when the original user logs off.
A combination of hardware and software that protects the network from attack by hackers who could gain access through the public networks.
A lens with fixed focal length.
Frame is the basic unit of a moving picture. At least 24 frames per sec are required for a moving picture to look continuous.
The number of completed cycles of a waveform that occurs in a given length of time. Usually specified in cycles per second (Hertz)
Frequency Range is the number of different frequencies that are included in the analog signal Usually specified in cycles per second (Hertz)
File Transfer Protocol (FTP) is a type of TCP, which is specifically used to transfer files between computers and uses the Port 20 or 21.
The hardware and software needed to connect two disparate network environments
Graphical User Interface interfaces the PC to any external device. Hot areas on the computer screen can be programmed to activate a function or activity in the device.
A magnetic medium for storing digital information on most computers and electronic equipment that process digital signal.
A base 16 numbering system using ten digits and 6 alphabets -0,1,2,3,4,5,6,7,8,9,A, B, C, D, E, F
Hyper Text Markup Language is a set of codes to format text and graphics that will be displayed in a browser. The code defines how the data will be displayed.
Hyper Text Transfer Protocol: The protocol used for communication between a Web server and Web browser and usually uses the port 80
A network device that serves as a central connection point for several devices. A hub repeats the signal it receives on one port to all other ports.
Institute of Electric and Electronics Engineers Inc. is an international organization that sets standards for various electrical and electronic issues
Impedance is the input and output characteristic of any electrical system and is measured in ohms. For maximum signal transfer, the input and output impedance should be the same
It is part of the TCP/IP protocol suite and is responsible for network addressing and routing.
Iris is a diaphragm which is inbuilt in a lens that can be adjusted either manually or automatically to vary the amount of light passing through the lens and falling on the CCD chip.
Integrated Services Digital Network is a telecommunication standard that is used to digitally send voice, data, and video signals over the same lines.
Internet Service Provider is a company that provides direct access to the Internet for home or business users.
A programming language developed by Sun Microsystems which can run on any platform which has a Java Virtual Machine installed.
Joint Photographic Expert Group is an ISO standard for still or single frame compression.
Layer 2 Tunneling Protocol is a non-proprietary protocol created by the Internet Task Force for encrypting IP packets for transmission through the Internet. The host and destination routers must have the L2TP protocol installed to create a Virtual Private Network.
Local Area Network is a small network usually restricted to single or close by buildings.
Light amplification by stimulated emission of radiation. A laser produces a very strong and coherent light of a single frequency.
It is the measurement of resolution for an analog video signal. Higher the bandwidth of the signal means a higher number of picture lines.
A version of Unix developed by Linus Torvalds. Runs on Intel based PC's and is generally free.
Luminance is that part of the video signal which contains the information on the brightness of the picture
Media Access Control is a part of the network interface card NIC) that controls the way multiple devices use the same media channel.
Mega (106) bits per sec. It is an indication of data rate
Moving Picture Expert Group is an ISO standard for moving image compression.
A MPEG standard for compressing scanned images with audio. Bit rate is from 1.5Mbps to 3.5 Mbps.
A popular MPEG standard for interlaced video signal with high quality audio with a scalable bit rate from 1.5 Mbps to 100 Mbps. Accepted as a HDTV and DVD standard
Network Interface Card connects any network device to the transmission medium.
It is an unwanted signal generated by electronic components. The noise in a video signal causes a grainy or snowy effect on the image.
National Television System Committee is a color television system and the standard used in the USA and Japan. NTSC has 525 horizontal scanning lines and 60 fields per sec.
Ohms is a unit for measuring resistance or impedance of any electrical device
It is a software program installed in a microprocessor-based device that controls the functionality of the device.
A unit of data sent over a network and includes a header with addressing information and the data itself.
The process of breaking messages into packets at the router for easier transmission over a WAN.
Phase Alternating Line is a color television system and the Standard used in Western Europe, Australia, parts of Africa and Asia. PAL has 625 horizontal scanning lines and 50 fields per sec
A TCP/IP utility used to test whether another host is reachable.
Picture element or cell, is the basic unit of a digital image.
Post Office Protocol is used to download email from a SMTP email server
Plain Old Telephone System is acronym for Public Switched Telephone Network (PSTN), the traditional analog telephone network.
A pre-defined set of rules that dictate how computers or devices communicate and exchange data on the network.
A camera with a Pan Tilt head and Zoom lens.
Frequencies that is used in the wireless transmission of data, audio and video signals.
Redundant array of independent disks is a configuration of multiple hard disks which provide fault tolerance incase one of them fail.
Random Access Memory. Electronic chips known as memory that can store digital information when power is applied to it. Its capacity is measured in kilobytes (KB).
Resolution is a measure of picture definition and clarity and is represented by number of pixels. Higher number of pixels = Higher resolution.
It is a connection mechanism that allows up to eight wires (or four pairs) to be connected to the network
Connects two networks and allows packets to be transmitted and received between them. A router determines the best path for data packets from source to destination
It is a communication protocol used for communication between microprocessor-based devices
A process where the output changes up or down depending upon the input level.
A powerful computer that provides resources to the clients on the network.
Signal to Noise
It is the ratio between the signal voltage and the noise voltage generated by an electronic circuit. It is measured in decibels (db)
Society of Motion Picture and Television Engineers
SMTP stands for Simple Mail Transfer Protocol. This is the protocol used to send emails. The email first goes to the SMTP server in the host network and from there it goes to the SMTP server in the destination network.
Simple Network Management Protocol (SNMP) is the management protocol created for sending information about the health of the network to network management devices.
The device is given a fixed and permanent IP address. This address must be obtained from the network administrator or ISP.
A group of selected bits that identify a sub network within a TCP/IP protocol.
It is a digital connection leased from the telephone company. The bandwidth of this connection is 1.544 Mbps
It is a digital connection leased from the telephone company. The bandwidth of this connection is 44.736 Mbps
Transmission Control Protocol /Internet Protocol was developed by the Department of Defense as a internetworking protocol that breaks data packets in segments, numbering them and send them in random order. The receiving device reassembles the data. It is the de facto standard for communication on the Internet
The physical and logical layout of the devices in a network.
Transceiver: A device that transmits and receives network signals.
Twisted pair is a type of balanced cable in which a pair of cables is twisted and the signal is divided between them.
UDP stands for User Datagram Protocol. This is similar to TCP, except that in UDP there is no acknowledgment that the packet has been received at the destination. This is known as 'connection less'
It is card in a PC or any other device which grabs each frame of a moving image then digitizes it and even compresses it if required.
Video Motion Detection
Video Motion Detection is a device that can detect unwanted movement in the picture and then generate an alarm
Video Motion Detector is a device that can detect unwanted movement in the picture and then generate an alarm.
Virtual Private Networks can be set up in the Internet by encrypting the packets at the host server and than sending it to the destination server, where it is decoded. This allows secure communication between two locations.
Wide Area Network is a network that crosses local, regional and international boundaries.
It is a new standard for still or single frame compression that uses the frequency domain.
A computer program that uses the Hypertext Transfer Protocol (http) and is used on a workstation to communicate with other devices on the Web.
Zoom Ratio is the ratio between the maximum and minimum focal length of a zoom lens | <urn:uuid:f8d09de3-1225-4c6a-b320-c40457e7f036> | CC-MAIN-2013-20 | http://www.panasonic.com/business/products-surveillance-monitoring/video-surveillance-glossary.asp | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.889144 | 2,665 | 3.171875 | 3 |
Kids With Special Needs: Identifying ADD & ADHD Behavior
Sometimes it really is tough to tell the difference between "normal" active childhood behavior and true hyperactivity and attention problems. Other times, the issues are so significant that the child really stands out in the crowd.
However, ADHD is a neurologically based disorder that really needs to be diagnosed by a specialist, or preferably a team of child specialists. Often this includes a combination of psychologists, psychiatrists, neurologists and various educational practitioners.
Unfortunately, in more subtle cases of ADHD, assessment isn't always a clear process. It can be time-consuming and frustrating for the child and the parents.
If your child has six symptoms of ADHD, and has had them for at least six months, he probably has ADHD. Usually you'll notice the symptoms before your child is 7 years old.
The symptoms aren't always simple, but they often break down into two types: an "inattentive" child or a more "impulsive" and "hyperactive" child.For the inattentive type, some of the symptoms include:
— Lack of awareness of detail
— A tendency to make careless errors in school
— Difficulty with tasks that require sustained concentration and easily distracted
— Poor organizational skills
On the hyperactive side, symptoms include:
— Constantly on the move as if they are driven by a motor
— Great difficulty settling down for quiet activities
— Continually fidgety
— May talk a lot
— Has trouble taking turns
— May be intrusive and interrupt others
If you suspect that your child has ADHD, start by talking to his teacher and pediatrician. If an evaluation is warranted, they should be able to guide you in the right direction for dealing with kids with special needs. | <urn:uuid:5cca43d5-9d83-4af3-b7e5-769e8ef47276> | CC-MAIN-2013-20 | http://www.parentsconnect.com/parenting-your-kids/kids-with-special-needs/adhd_vs_normal_boy_behavior.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.964991 | 364 | 3.40625 | 3 |
The name khaen (or kaen, khen, khene, etc.) is often applied to many different Southeast Asian mouth organs, but it is most associated with the raft-shaped instruments of Laos and Northeast Thailand.
The instrument consists of a carved wooden windchest, through which are inserted a number of bamboo pipes packed closely together in two rows. The khaen hok has six pipes, the khaen jet has fourteen pipes, the khaen baet has sixteen pipes and the khaen gao has eighteen pipes. Of these, the khaen baet (an example of which is pictured above) is the most common. The pipes are sealed into place with a black insect wax called kissoot (or khisut) and bound together with a tough fibrous grass called yah nang. Each pipe contains a small free reed made from old coins that have been hammered into very thin sheets.
The reeds are very carefully placed at the one-quarter point of the effective length of the pipe, which gives a particular timbre to the note produced, strongly reinforcing the second harmonic. There are tuning slots cuts into the side of the pipe that faces inwards. The scale of this particular instrument corresponds with a two octave A minor scale and traditionally there are five pentatonic modes that are used: G A C D E G, A C D E G A, C D F G A C, D E G A B D and D F G A F D. There is also theoretically a sixth mode, E G A B D E, but this is not traditionally used as it causes some fingering complications. Here is a short (non-traditional) piece in this mode:
The six pipe khaen hok is often considered a children's toy, having a range of one pentatonic octave:
The khaen is often used in small ensembles and as an accompaniment to vocal music, but there is also an established solo repertoire for the instrument. It is one of the few Asian free reed instruments to have had an English language tuition book written for it (Introduction to Playing the Kaen, by Terry E. Miller).
Traditional Music and Songs in Laos: The Voice of the Lao Khen - audio files
Acoustics of the Khaen, by James Cottingham and Casey Fetzer
The Khene - Lao National Musical Instrument and its Role in Lao Culture, by Viliam Phraxayavong
A Brief History of Mouth Blown Free Reed Instruments
What Is A Free Reed?
Origins Of The Free Reed
Eastern Free Reed Instruments
A Selective Discography Of Asian Free Reed Instruments
Western Free Reed Instruments
Return to Main Index | <urn:uuid:cc28769b-9a4e-48da-abf4-840b3e74f7db> | CC-MAIN-2013-20 | http://www.patmissin.com/history/khaen.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.943001 | 567 | 3.421875 | 3 |
“We’ve given the matter some thought,” the elders, said …”Collect some snakeweed. From the pine get some bark ... and the sap that runs from the wood. Then dig a hole on top of this mound to the east of us and place everything you collected into it. Lastly, take your flint and strike it until sparks fly.”
— from Earth Fire: A Hopi Legend of the Sunset Crater Eruption
The Hopi believe their kachinas created the Sunset Crater eruption to punish the Sinagua Indians in retaliation for a prank played out of jealousy.
In real life, the eruption ushered in an era of prosperity — demonstrating the complex relationship between climate, culture and geography.
Both Sunset Crater and the Wupatki ruins rise out of the landscape around the area of the San Francisco Peaks, out of place but curiously perfect.
A two-hour drive from the Rim Country, the national monuments offer day-trippers a chance to escape to an ancient world.
Sunset Crater formed about a thousand years ago while the ancestors of the Hopi, the Sinagua, lived in its shadow. The cinder cone rises out of the woods at the eastern edge of the San Francisco Peaks, its edge rimmed red, its base a deep black.
The Wupatki pueblo ruins lie about 15 miles toward the Painted Desert in a deep red plane cut with washes.
Immediately surrounding the crater, fields of jumbled black lava spill down gullies. In Hawaii, such a flow is called “Ah-ah” because of the noise people make when they step on the razor-sharp edges of lava.
Sunset Crater National Park offers the visitor a chance to walk amongst the remains of this natural disaster, to take in the destruction that forever changed the lives of the nearby inhabitants and to visit Wupatki, ruins left by a civilization that rose from the ashes.
“The Ka’nas youth escorted the wind back to the mound. ‘Well then, here it is,” he said to the wind when they reached their destination. By this time, the fire was about to die. The wind blew on it. Immediately it came back to life and turned into a huge blaze. Before long the fire raged so intensely that flames licked the clouds.”
— Earth Fire: A Hopi Legend of the Sunset Crater Eruption (Northland Press)
Prior to the eruption, the Sinagua came to the Flagstaff area around A.D. 600. They lived in the transitional areas between the ponderosa pine and juniper-pinyon woodlands. Alluvium deposited in large open areas offered these early farmers fertile soil to grow crops. Their houses were simple pit dwellings with a dugout floor surrounded by rocks and covered in brush, according to archaeological studies published by Northern Arizona University and published at cpluhna.nau.edu/places/wupatki2.
Sunset Crater’s first eruption occurred in A.D. 1064. Archaeologists believe the Sinagua had warning of the impending eruption from earthquakes and smoke coming up from the ground, which enabled them to avoid the short-term consequences of the disaster. However, just as the devastation from Mount St. Helen’s in Washington State took years to heal after the eruption, so too did the land surrounding Sunset Crater.
“Meanwhile, several years had gone by since the outbreak of this catastrophic famine in the land of the Hopi. Thus had the Ka’nas kachina wreaked his revenge on the Hopis and made them suffer. Once, however, when he mulled the matter over again, he commiserated with the Hopi. Evidently his anger had abated … ”Well, maybe it’s about time we ended their suffering.”
— Earth Fire. A Hopi Legend of the Sunset Crater Eruption
Many attribute the burst of Sinaguan growth after the eruption to the volcanic ash that insulated the soil and held in moisture, extending growing seasons. Others say the ash may have helped a little, but point to decades of increased rainfall. Rains increased and temperatures rose creating longer, warmer seasons, allowing for a rise in both crop production and population.
During the years from 1150 to 1250, the Sinaguan culture thrived. The Wupatki pueblo and numerous other civilization centers grew up in the pinion-juniper plains a few miles from the crater.
A vast trading route that connected the Sinagua to Central America, the pueblos of New Mexico and the coast of California, brought parrots, shells and pottery to the Wupatki center.
A ball court and large rooms indicate Wupatki could have been a religious and cultural Mecca. With increased rainfall, nearby springs and the Little Colorado River, the Wupatki inhabitants had plenty of water allowing them to happily inhabit the pueblo for years.
Numerous archaeological studies started in 1900 with Jesse Walter Fewkes, who excavated Wupatki and discovered the burial practices, food preparation, and sanitary habits of the inhabitants.
Yet by 1300, changing weather patterns caused disruptions in food production and the Sinagua left for greener pastures abandoning the Wupatki settlement.
So well had they built that the roofs remained until the 1930s, according to the NAU researchers.
By 1924, conservationists had lobbied the federal government to establish the Wupatki ruins as a national monument, but not after looters had destroyed many walls and removed most of the artifacts.
In 1930, Sunset Crater joined Wupatki as a national monument just in time to save it from being blown up for a movie entitled, “Avalanche.”
Now, the ruins blend into an empty, wind-swept landscape. The memories of a vanished people persist in Hopi myths and in this ancient work of their careful hands — which prove that sometimes beauty can rise from the ashes of catastrophe. | <urn:uuid:2d1ead53-e9ad-4db4-a1fa-2ced521f46b3> | CC-MAIN-2013-20 | http://www.paysonroundup.com/news/2012/apr/13/useful-disaster/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.946639 | 1,269 | 3.375 | 3 |
KNU'S STRUGGLE FOR DEMOCRACY & EQUALITY OF ALL NATIONALITIES
(Aug. 24, 2005)( S.H.A.N. & Burma's News Published by Burma's Chinese 貌强 )
Hand-Tying Ceremony of the Year 2744 Karen Era The 19th of August 2005 is the auspicious day of traditional Hand-Tying Ceremony of the Karen people. The Karen people, starting from about 2744 years ago, had entered into and settled down in the land now known as Burma and they are a people with their own traditions, literature and culture. The Hand-Tying Ceremony is one of the traditions and culture of the Karen people. Since it is a good custom and practice for the Karen people to maintain and observe this cultural tradition, the KNU, highly appreciate and praise the observation of it. At the present, the Karen people do not still have the right to decide their own political destiny and have to exist under the rule of the ultra-nationalist military dictatorship, they have no freedom in the fields of political, economic, social and cultural development. It has become a matter of concern for Karen people, because the language, literature and cultural activities of the Karen people are taking a turn to fade and vanish, in the repressive environment. For that reason, with the realization of this true situation, all the Karens participate unanimously in the struggle for the right of the Karen people to decide their own destiny. History of the Karens and KNU
The Karens of Burma, have been cornered into fighting against the ruling Burmese Governments for the past forty-three years. Holding the reins of all organs of the state, and in full control of the press, radio, and television, the successive ruling Burmese Governments from U Nu AFPFL (Anti-fascist People Freedom League) to the present Military Junta headed by General Than Shwe , have always painted KNU as black as they can. They have branded KNU insurgents, war mongers, a handful of border smugglers, black-marketeers and stooges of both the communists and the imperialists. Even so, to the extent of his ability KNU has always tried to refute the nefarious one-sided Burman propaganda of false accusations and make the true facts of his cause known to he world. In fighting against the ruling Burmese Government, KNU is not being motivated by narrow nationalism, nor by ill-will towards the Burmese Government or the Burman people. KNU' s struggle was instigated neither by the capitalist world nor by the communists, as some have falsely accused him. It has an originality completely of its own. Throughout history, the Burman Chaovinists have been practicing annihilation, absorption and assimilation(3 A) against the Karens and they are still doing so today. In short, they are waging a genocidal war against KNU. Thus KNU has been forced to fight for his very existence and survival. (boxun.com)
Karen National Union(KNU) Kawthoolei
The Karens, A Nation, Their Nature and History
The Karens are much more than a national minority. The Karens are a nation with a population of 7 million, having all the essential qualities of a nation. The Karens have their own history, own language, own culture, own land of settlement and own economic system of life. By nature the Karens are simple, quiet, unassuming and peace loving people, who uphold the high moral qualities of honesty, purity, brotherly love, co-operative living and loyalty, and are devout in their religious beliefs. Historically, the Karens descend from the same ancestors as the Mongolian people. The earliest Karens (or Yangs as called by the Thais), settled in Htee-Hset Met Ywa (Land of Flowing Sands), a land bordering the source of the Yang-tse-Kiang river in the Gobi Desert. From there, the Karens migrated southwards and gradually entered the land now known as Burma about 739 B.C.. The Karens were, according to most historians, the first settlers in this new land. The Karens named this land Kaw-Lah, meaning the Green Land. They began to peacefully clear and till this Green Land from all hindrances. Their labors were fruitful and they were very happy with their lot. So the Karens changed the name of the land to Kawthoolei, a pleasant, plentiful and peaceful country. Here they lived characteristically simple, uneventful and peaceful lives, until the advent of the Burman.
Pre World War II Eras: Burman Feudalism, British Imperialism and Japanese Fascism
The Karens could not enjoy their peaceful lives for long. The Mons were the next to enter this area, followed at their heels by the Burman. Both the Mons and Burman brought with them feudalism, which they practised to the full. The Burman later won the feudal war, and they subdued and subjugated all other nationalities in the land. The Karens suffered untold miseries at the hands of their Burman lords. Persecution, torture and killings, spppression, oppression and exploitation were othe order of the day. To mention a few historical facts as evidence, people may refer to the Burman subjugation of the Mons and the Arakanese, and especially their past atrocities against the Thais at Ayudhaya. These events stand as firm evidence of the Burman feudalism, so severe that those victimized peoples continue to harbour a deep -seated resentment of the Burman today. At the time, many Karens had to flee for their lives to the high mountains and thick jungles, where communications and means of livelihood were extremely difficult and diseases common. The Karens were thus cut off from all progress, civilization and the rest of the world, and were gradually reduced to backward hill tribes. The rest of the Karens were made slaves. They all were forced to do hard labour and were cruelly treated.
When the Brithish occupied Burma, the conditions of the Karens gradually improved. With the introduction of law and order by the Colonial Central Authority, the Karens began to earn their living without being hindered, they could go to school and be educated. This infuriated the Burman, to see the despised Karens being treated equally by the British. Progress of the Karens in almost all fields was fast, and by the beginning of the 20th Century, the Karens were ahead of other peoples in many respects, expecially in education, athletics and music. It could be said that the Karens had a breathing spell during the period of the British Regime. But during the Second World War, in 1942, the Japanese invaded Burma with the help of the Burma Independence Army(BIA), who led them into the country. These BIA troops took full advantage of the situation by insinuating that the Karens were spies and puppets of the British, and therefore were enemies of the Japanese and the Burman. With the help of the Japanese, they began to attack the Karen villages, using a scheme to wipe out the entire Karen populace which closely resembled the genocidal scheme Hitler was enacting against the Jews in Germany. The Karens in many parts of the country were arrested, tortured and killed. their properties were looted, their womenfolk raped and killed, and their hearths and homes burned. Conditions were so unbearable that in some areas the Karens retaliated fiercely enough to attract the attention of the Japanese Government, which mediated and somewhat controlled the situation. Post-World War II Eras: Demand for the Karen State, Tensions and Armed Conflicts
The Bitter experiences of the Karens throughout the history of Burma, especially during the second World War , taught the Karens one lesson: as a nation, unless they control a state of their own, they will never experience a life of peace and decency, free from persecution and oppression. they will never be allowed to work hard, to grow and prosper. Soon after the Second World War, all the nations under colonial rule were willed with national aspirations for independence. The Karen sent a Goodwill Mission to England in August 1946, to make the Karen case know to the British Government and the British people, and to ask for a true Karen State. But the reply of the British Labor Government was to throw their lot with the Burman.The Karens deeply regretted this, for as it predictably has turned out today, it was a gesture grossly detrimental to their right of self-determination, only condemning them to further oppression. It is extremely difficult for the Karens and the Burmans, two peoples with diametrically opposite views, outlooks, attitudes and mentalities, to yoke together.
However, differences in nature and mentality are not the main reason for the Karens’ refusal to throw in their lot with the Burman. There are other more important reasons for sticking to the Karens’ demand for their own State within a genuine Federal Union.
1. The Karens are concerned that the tactics of annihilation, absorption and assimilation, which have be practiced in the past upon all other nationalities by the Burman rulers, will be continued by the Burman of the future as long as they are in power.
2. The Karens are concerned about the postwar independence Aung Sun-Atlee and Nu-Atlee Agreements, as there was no Karen representative in either delegation and no Karen opinion was sought. The most that the Burman would allow the Karens to have was a pseudo Karen State, which falls totally under Burman authority. In that type of Karen State, the Karens must always live in fear of their cruel abuse of that authority over them.
On January 4, 1948, Burma got its independence from the British. The Karens continued to ask for self-determination democratically and peacefully from the Burmese Government The Karen State requested by the Karens was comprised of the Irrawaddy Division, the Tenasserim Division, the Hanthawaddy District, Insein District and the Nyauglebin Sub-Division, the areas where the bulk of the Karen populace could be found. But instead of compromising with the Karens by peaceful negotiations concerning the Karen case, the Burmese Government and the Burmese Press said many negative things about the Karens, especially by frequently repeating their accusations that the Karens are puppets of the British and enemies of the Burman. The Burmese Government agitated the Burman people toward communal clashes between the Karens and the Burman. Another accusation against the Karens demand was that it not the entire Karen people who desired a Karen state, but a handful of British lackeys who wanted the ruin of the Union of Burma.
To counter the accusations and show the world that it was the whole Karen people desire for a Karen state, a peaceful demonstration by the Karens all over the country was staged on February 11, 1948, in which over 400,000 Karen took part. The banners carried in the procession contained four slogans, namely: 1.Give the Karen State at once 2. Show Burman one Kyat and Karen one Kyat 3. Wedo not want communal strife. 4. We do not want civil war.
The slogans of the Karen in this mass demonstration voiced the same desire as the three slogans of the British Colonies after the Second World War: Liberty, Equality, and Peace. The Karens followed the established democratic procedures in our request for a Karen state. A few months after Burma got its independence, successive desertions in the AFPFL put U Nu, the then Premier, in grave trouble. The revolts of the Red Flag Communist Party in 1947, the Communist Party of Burma in March 1948, the People Volunteer Organization in June 1948, and the mutinies of the 1St... Burma Rifles stationed at Thayetmyo and the 3rd Burma Rifles stationed at Mingladon, Rangoon(August 15, 1948), prompted U Nu to approach the Karen leaders to help the Government by taking up the security of Rangoon, and save it from peril. The Karens did not take advantage of the situation, but readily complied to U Nu’s request and helped him out of his predicament. The KNDO(Karen National Defence Organization), officially recognized by the Burmese Government, was posted at all the strategic positions and all the roads and routes leading to Rangoon. For months the KNDO faithfully took charge of the security of Rangoon. The KNDO was given several tasks in forming an outer ring of defence, particularly at Hlegu an Twante. Most important of all was the reoccupation of Twante town, Rangoon’s key riverain gateway to the Delta towns and upper Burma. This little town had fallen several times to the communists. Each time it was retaken by regular troops, only to fall back into the hands of the rebels as soon as conditions returned to normal and control was handed back to the civil authorities and the police. This time, a KNDO unit under the leadership of Bo Toe and Bo Aung Min was ordered to retake Twante, which was once more in the hands of the Red Flag Communists. They succeeded with their own resources and without any support from the regular army other than river transport. After wresting the town from the Red Flag Communists hands, they garrisoned it in accordance with their given orders.
The two Burma Rifles that had mutinied marched down south, unopposed along the way until they reached Kyungale bridge, near the town of Let pa-dan, where they were stopped by a company of Karen UMP(Union Military police). Their truck carrying arms and ammunition received a direct hit from mortar five of the Karen UMP and was destroyed. So, they retreated after suffering heavy casualties.
But even while all this was happening, the ungrateful Burmese Government was hastily organizing a strong force of levies to make an all-out effort to smash the Karens. By December 1948, they arrested the Karen leaders in many parts of the country. Karen personnel in the armed services were disarmed and put into jail. General Smith Dun, General Officer Commanding(GOC) of the Burma Army, was forced to resign.. Many Karen villages were attacked and many Karen hearths and homes burnt and destroyed. On the 30th of January 1949, the Burmese Government declared the KNDO unlawful. Early the nest morning on the 31st of January, the Burmese troops attacked the KNDO Headquarters at Insein, a town about 10 mile north of Rangoon, where most of the top Karen leaders lived. There was no alternative left for the Karens but to fight back. An order was issued to all the Karens throughout the country to take up whatever armsthey could find and fight for their lives, their honor, and their long cherished Karen state: Kawthoolie. When the Karens took up arms, they attained great successes and occupied many towns and cities. They soon suffered military reverses, however, as they had not prepared for revolution and therefore, had now stockpile of arms and ammunition. The Karens had to withdraw from many fronts, this allowing Burmese troops to reoccupy these areas. Compounding this, the Burmese Government called for unity with all the other uprising Burman rebel groups. These Burman rebel groups saw the Karens as the greatest obstacle to their seizing exclusive power and they joined hands with the Burmese Government and fought against the Karens. As a result, the Karens found themselves fighting against all the armed elements in the country. Another reason for Karens’ setbacks was that all along, they had to stand on theirr own feet and fight alone without aid of any kind from any other country. In contrast, the Burmese Government received large amounts of foreign aid, including military aid from both capitalist and socialist countries and even from some so-called non-aligned nations. Many times then and since the situation of the Burmese Government has been precarious, but it has managed to continue mainly through aid from abroad. Many times it has been in dire straits, but it has not been ashamed to go begging. And as hard as it is for people to believe, its begging bowls have always come back filled. Present Day Situation:
Under the rule of the Burman, the Karens have been oppressed politically, economically, and culturally. In education, the Karen schools and institutions were taken by force and many were destroyed. The Karens are no longer allowed to study their own language in Burmese schools. Many of the Karen newspapers and literary books were banned. Economically, their fields and plots of land were nationalized and confiscated. The Karens have to toil hard all year round and have to take all their products to the Burmese Government for sale at its controlled prices, leaving little for themselves. Culturally, the Burmese Chaovinists have attempted to absorb and dissolve the Karens’ language, literature, traditions, and customs. The Karens have been denied all political rights and militarily, Karen people have all along been systematically exterminated as part of the annihilation, absorption, and assimilation program of the Burman. The Karens’ educational quality and living standards have dropped considerably, falling far behind the Burman in all respects. There efforts and actions against the Karens are as strong, or stronger, today as ever before in the past.
Since 1960, the successive Burmese Governments have been attacking the Karens with the four Cuts Operations: cutting the lines for supplying provisions, cutting the line of contact between the masses and the revolutionaries, cutting all revolutionary financial income and resources, and cutting off the heads of all revolutionaries. To make the four cuts operation successful, the Burmese troops are using strong suppressive measures. They destroy the fields of crops planted by the villagers and eat their grains and livestock. They take away whatever they like and destroy the things they cannot carry away. Captured villagers, men as well as women and adolescents, are made to carry heavy loads as porters for the Burmese soldiers. Many of the villagers have been forced to work a porters for several months; they are deliberately starved, and regularly beaten, raped, or murdered. When the Burmese soldiers enter a village, they shoot the villagers who try to escape. Some of the villagers have been accused of helping the revolutionaries and then have been killed. In certain areas, the villagers have been forced to leave their villages and have been moved to camps some distance away. They are not permitted to leave the camps without permission from the Burmese guards. Some of the villagers, who have been found in their villages after being ordered to move to the camps, have been shot and killed by the Burmese soldiers with no questions asked.
Situations such as these and sometimes worse are happening constantly throughout Kawthoolei and are causing a large number of Karens and Shans in Kawthoolei to leave their villages and take refuge along the Thai border.
NDF and DAB: Fight for Democracy , Equality and Federal Union
Burma is a multi-national country, inhabited also by the Kachin, Arkanese, Karenni, Lahu, Mon, Pa-O, Palaung, Shan, and Wa, etc. After independence, these ethnic races were also denied the basic rights of freedom, self-determination, and democracy. Hence, almost all the other nationalities in Burma have also taken up arms to fight against the Burmese Government for their own self-determination, and are now united in the National Democratic Front(NDF). There are now altogether nine members in the National Democratic Front, namely: 1.Arakan Liberation Party(ALP) 2.Chin National Front(CNF) 3.Kachin Independence Organization 4.Karen National Union(KNU) 4. Karennie National Progressive Party(KNPP) 6. Kayan New Land Party(KNLP) 7. Lahu National Organization(LNO) 8. New Mon State Party(NMSP) 9. Wa National Organization(WNO).
The consolidated National Democratic Front (NDF has resolved to form a genuine Federal Union, comprised of all the states of the nationalities in Burma, including a Burman state, on the basis of liberty, equality and social progress. The NDF is determined to fight on until victory is achieved, and requests the people of all classes and all walks of life to join hands and fight the Than Shwe military dictatorship.
By 1988, the oppression of Ne Win’s military regime had become so severe that even the Burman masses rose up against it. The regime’s response was to gun down thousands of peaceful demonstrators, mainly young students and monks. Even so Ne Win could not subdue them, and he was forced to resign, seemingly handing over power to his chosen successors in the State Law and Order Restoration Council(SLORC), but continuing to pull the strings of power from behind the scenes. The SLORC promised a multi-party election and held it in 1990, only to persecute and imprison the winners rather than hand over state power to them. Thousands of Burmese students, monks, and other dissidents fled to the areas governed by NDF member organizations. There they were accepted and sheltered by the ethnic peoples, particularly in the Karen areas, where no less than 6,000 students arrived along with other dissidents, all wanting to organize and struggle against the Burmese Junta. In late 1988, the KNU took the initiative in proposing that the NDF form a broader political front along with the newly formed Burman groups to meet the developing political situation. The other NDF members agreed, and the Democratic Alliance of Burma (DAB) was formed, including all the members of the NDF as well as groups such as the All Burma Students?Front (ABSDF) and the All Burma Young Monks Union(ABYMU).
The DAB unitedly committed itself to the following four principles: 1. The removal of the military dictators. 2. The establishment of democratic government. 3. The cessation of civil war and the establishment of internal peace. 4. The establishment of National Unity and a genuine federal union. This marks the firstime that the people of all races, even the Burmans, have been united in trying to throw off the yoke of an oppressive Burmese regime.
====== The facts on the split of Karen people ideologically, religion or ethnic groupby Mahn Kyaw Shwe
First Karen Split
1948- KNU leader Saw Ba Oo Gyi demand Karen State under the terms of 1947 Constitution. KNU asked Karen territory in Irrawaddy Delta within one month of deadline for the government to agree. Over 400,000 KNU Supporters took to the streets and in over dozens of towns and villages across the country. U Nu the prime minister of AFPFL government held a series of meeting with Minister of Karen Affair, Saw Sann Po Thin, with the leaders of Karen Youth Organization. Then, he met Saw Ba U Gyi and KNU leaders later.
About 500 Karen delegates from lower Burma gathered in Rangoon on March 3, 1948 for KNU 3rd Congress. U Nu argued that Kino's demand of the right of establishing independent State in the east and separate political privileges for the Delta Karens are too much, and Karen were getting "a half dollar more", in his word. However SawBa U Gyi replied that we had not received even a quarter yet. Most of the KNU leaders did not understand that the hiding card of U Nu was he already received favour from Saw Sann Po Thin, and the leaders of KYO for the question of separate Karen State. KYO leaders considered that KNU was demanding a little too much. U Nu exploited the disagreement between KYO leaders and KNU. (Burma insurgency and the politics of ethnicity)
Second Karen Split
1963 - KNU and CPB (Communist Party of Burma) reached as joint military alliance and found (NDUF) National Democratic United Front) in 1959 with the members of CPB, the NMSP and KNUP (Karen National United Party), but not the KNU. There was an ideological split between, Mahn Ba Zan and Saw Hanta Tha Hmwe who rejected any formal relationship with CPB. Then the 3rd Kawthoolei National Congress was held in April, 1963 near Papun. A major split occurred between KNUP and KRC factions. Local Burmese Army commanders immediately urged Ne Win to exploit the Karen split. Since 1960 KNU had steadily expanded its territory and backing the NDUP and NLA united fronts. Ne Win made a right move to offer peace talk to win over top rebel leaders. First he personally wrote to Mahn Ba Zan, the leader of socialist KNUP. He described 14-year civil war as a disaster. Ne Win mentioned that, "real peace which is demanded by the people can not be established alone, but only through mutual cooperation and personal relationship. I've taken hold of the tiger's tail and I can't let go. Please help me. He told to Mahn Ba Zan later in Rangoon. It is pretty similar attempt of lat prime minister Khin Nyunt's approach to Gen. Saw Bo Mya by calling Parti and phodohkwa. After this peace talk smaller number of Kawthoolei RC faction led by rightist Saw Hunter Tha Hmwe laid down their arm to the Revolution Council government. (Burma insurgency and the politics of ethnicity)
Third Karen Split
1994 Religion was used as a Weapon by junta. It was not the first time for Burmese army using religion as a weapon against its Enemies. After Ne Win took over power of the country in 1958-1960. Army's psychological warfare department printed over a million copy of booklets (Dahamma in Danger). The main objective of its offensive was to attack of the `godless" communists and tried to mobilize the country's monks against the CPB. (Burma insurgency and the politics of ethnicity)
SPDC regime frequently abused Buddhist religion against its political oppositions whenever, or wherever they have a chance. Since 1991, Burma army started its offensive against Manawplaw, the headquarter of NDF, DAB, NCGUB, and ABSDF using over 10 battalions with support artillery units. SPDC's original plan of to control Htwee pha kwee kyo was failed with thousands of dead and injured. The commanders of operation were Maung Hla and Tin Oo who was killed in helicopter crashed in Paan. Their second plan was to divide KNU by all means. One of the Burmese soldier captured by KNLA revealed the plan B of SPDC army to split KNU between, the young and the old, between Christians and the Buddhists and between the Pwo and the Sgaw. For the democratic opposition groups, Manalplaw is so important in politically and strategically because KNU has been hosting all other oppositions, armed or unarmed organization including NCGUB. Manalplaw was not fall by military attack of SPDC regime. It was fall by attack of political warfare using psychology, religion, espionage, drug, rumors as propaganda, and misinformation. SPDC's attempt to divide between Buddhist Karens from their Christian brothers is as follow:
One Chinese Buddhist KNU senior member played important role Karen Buddhists started to rose up against KNU leadership, by initiating to build pagodas on the strategic hills around Manalplaw. SPDC sent its under cover intelligent officers to Mae-lea-hta, where Myaing Gee Ngu Sayadaw in order to influence and control peaceful monk who have been practicing Buddhism peacefully. SPDC's under cover agents, who had been pretending as monks exploited all Buddhist religion events between Maethawar and Mae-lae-hta area as meeting point to exchange secret information. All Karen Buddhists who were the followers of Myaingyi Ngu Sayadaw were exempted from the forced labouring and other charges from SPDC army.
Rumours were systematically released saying all Karen Buddhist who wear the armed bands made of the Buddhist robe and provided by Myaingyi Ngu Sayadaw would be bullet proof. Yabaa or speed pills were provided by SPDC army to the Karen Buddhist soldiers to become rebellious and confused. SPDC's military radio transmitted misinformation like the cdr of No. 4 brigade, a Karen Buddhist was persecuted by Karen Christian leaders. Rumours were spread to persuade all Karen Buddhists by s saying those Karen Buddhists who did not come over Mae-tha-war would be persecuted by Christians leaders of KNU.
Click here to leave your comments on BBS | <urn:uuid:b6f29577-88ee-4daf-bb10-4ceffb296a26> | CC-MAIN-2013-20 | http://www.peacehall.com/news/gb/english/2005/08/200508240029.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.974026 | 5,989 | 2.578125 | 3 |
In wireless telecommunications , multipath is the propagation phenomenon that results in radio signals reaching the receiving antenna by two or more paths. Causes of multipath include atmospheric ducting , ionospheric reflection and refraction , and reflection from water bodies and terrestrial objects such as mountains and buildings. The effects of multipath include constructive and destructive interference , and phase shifting of the signal.
The Voyager Golden Record Cover of the Voyager Golden Record The Voyager Golden Records are phonograph records which were included aboard both Voyager spacecraft , which were launched in 1977. They contain sounds and images selected to portray the diversity of life and culture on Earth, and are intended for any intelligent extraterrestrial life form, or for future humans, who may find them. The Voyager spacecrafts are not heading towards any particular star, but Voyager 1 will be within 1.6 light years of the star Gliese 445 , currently in the constellation Camelopardalis , in about 40,000 years . [ 1 ]
Newcomb's paradox , also referred to as Newcomb's problem , is a thought experiment involving a game between two players, one of whom purports to be able to predict the future. Whether the problem is actually a paradox is disputed. Newcomb's paradox was created by William Newcomb of the University of California 's Lawrence Livermore Laboratory .
Eggs and Their Evolution F emales of all vertebrates produce eggs, but the reptiles "invented" the eggshell -- a device that could keep the egg from drying out and allow reproduction away from water (or, at least, from extremely moist environments). With the exception of the platypus and echidna, mammals provide the developing embryo with a suitable environment within the mother's womb.
Transhumanism , abbreviated as H+ or h+ , is an international intellectual and cultural movement that affirms the possibility and desirability of fundamentally transforming the human condition by developing and making widely available technologies to greatly enhance human intellectual, physical, and psychological capacities. [ 1 ] Transhumanist thinkers study the potential benefits and dangers of emerging technologies that could overcome fundamental human limitations, as well as study the ethical matters involved in developing and using such technologies. They predict that human beings may eventually be able to transform themselves into beings with such greatly expanded abilities as to merit the label " posthuman ". [ 1 ]
Cloud iridescence Cloud iridescence is the occurrence of colors in a cloud similar to those seen in oil films on puddles, and is similar to irisation . It is a fairly uncommon phenomenon, most often observed in altocumulus , [ 1 ] cirrocumulus and lenticular clouds , and very rarely in cirrus clouds . [ 2 ] [ 3 ] [ 4 ] The colors are usually pastel, but can be very vivid.
Moravec's paradox is the discovery by artificial intelligence and robotics researchers that, contrary to traditional assumptions, high-level reasoning requires very little computation, but low-level sensorimotor skills require enormous computational resources. The principle was articulated by Hans Moravec , Rodney Brooks , Marvin Minsky and others in the 1980s. As Moravec writes, "it is comparatively easy to make computers exhibit adult level performance on intelligence tests or playing checkers, and difficult or impossible to give them the skills of a one-year-old when it comes to perception and mobility." Linguist and cognitive scientist Steven Pinker considers this the most significant discovery uncovered by AI researchers.
This video illustrates changes in the shape and intensity of the Van Allen belts. Van Allen radiation belts A Van Allen radiation belt is one of three [ 1 ] layers of energetic charged particles ( plasma ) around the planet Earth, held in place by its magnetic field . The belts extend from an altitude of about 1,000 to 60,000 kilometres above the surface, in which region radiation levels vary. It is thought that most of the particles that form the belts come from solar wind , and other particles by cosmic rays . [ 2 ] It is named after its discoverer, James Van Allen , and is located in the inner region of the Earth's magnetosphere .
Animation of Schumann resonance in Earth's atmosphere. The Schumann resonances (SR) are a set of spectrum peaks in the extremely low frequency (ELF) portion of the Earth 's electromagnetic field spectrum. Schumann resonances are global electromagnetic resonances , excited by lightning discharges in the cavity formed by the Earth's surface and the ionosphere . [ edit ] Description This global electromagnetic resonance phenomenon is named after physicist Winfried Otto Schumann who predicted it mathematically in 1952. Schumann resonances occur because the space between the surface of the Earth and the conductive ionosphere acts as a closed waveguide .
Locations of South Magnetic Pole from direct observation and model prediction. [ 1 ] The South Magnetic Pole is the wandering point on the Earth 's Southern Hemisphere where the geomagnetic field lines are directed vertically upwards. It should not be confused with the lesser known South Geomagnetic Pole described later. For historical reasons, the "end" of a magnet that points (roughly) north is itself called the "north pole" of the magnet, and the other end, pointing south, is called magnet's "south pole". Because opposite poles attract, the Earth's South Magnetic Pole is physically actually a magnetic north pole (see also North Magnetic Pole – Polarity ).
The Naga fireballs ( Thai : บั้งไฟพญานาค ; RTGS : bang fai phaya nak), also known to as Mekong lights , and “bung fai paya nak” by the locals, is a unconfirmed phenomenon often seen in Thailand ’s Mekong river, which is also seen in ( Nong Khai province in Isan ) and in Laos ( Vientiane Province )—in which glowing balls are said to naturally rise from the water high into the air. [ 1 ] The balls are reddish and have diverse size from smaller sparkles up to the size of basketballs; [ 2 ] they quickly rise up to a couple of hundred metres before disappearing. The number of fireballs reported varies between tens and thousands per night. [ 3 ] Objective observers who have witnessed this phenomenon report tracer bullets as probable cause. [ edit ] Timing
By Howard Gardner 1. Naturalist Intelligence (“Nature Smart”) Designates the human ability to discriminate among living things (plants, animals) as well as sensitivity to other features of the natural world (clouds, rock configurations). This ability was clearly of value in our evolutionary past as hunters, gatherers, and farmers; it continues to be central in such roles as botanist or chef.
Genie is the pseudonym of a feral child who was the victim of one of the most severe cases of abuse and neglect ever documented. She spent most of her first thirteen years of life locked inside a bedroom, strapped to a child's toilet or bound inside a crib with her arms and legs immobilized. Genie's abuse came to the attention of Los Angeles child welfare authorities on November 4, 1970. [ 2 ] [ 3 ] In the first several years after Genie's life and circumstances came to light, psychologists , linguists and other scientists focused a great deal of attention on Genie's case, seeing in her near-total social isolation an opportunity to study acquisition of language skills and linguistic development.
Victor of Aveyron (also The Wild Boy of Aveyron ) was a feral child who apparently lived a majority of his childhood naked and alone in the woods before being found wandering the woods near Saint-Sernin-sur-Rance , France, in 1797. He was captured, but soon escaped after being displayed in the town. He was additionally periodically spotted in 1798 and 1799. However, on January 8, 1800, he emerged from the forests on his own. His age was unknown, but citizens of the village estimated he was about twelve years old. His lack of speech, as well as his food preferences and the numerous scars on his body, indicated he had been in the wild for the majority of his life. | <urn:uuid:f8b86d9b-6f25-41bd-a339-3f40b00a07a0> | CC-MAIN-2013-20 | http://www.pearltrees.com/mamc2501/wiki/id3239130 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.952758 | 1,684 | 3.25 | 3 |
Almost two thirds of young South Africans have little idea of what hydraulic fracking is about, consumer insights group Pondering Panda said on Monday (17/09/2012).
It said this emerged in a survey conducted after Cabinet lifted a moratorium on applications to explore for shale gas in the Karoo.
"Of those who claimed they had heard of fracking, only 25 percent thought it referred to a method of extracting natural gas from under the ground,” Pondering Panda said in a statement.
"About 34 percent thought it [fracking] was a way to protect yourself from sunburn, while a further 26 percent believed it was a type of sexual activity.” Among those familiar with the technique, which requires fracturing rock deep below the surface to extract natural gas deposits, 84 percent said they were concerned about its possible impact.
"Young South Africans who are aware of fracking clearly feel very strongly about the issue,” Pondering Panda spokeswoman Shirley Wakefield said.
Close to 3000 young people were surveyed via the Mxit social media platform.
"Both government and business need to do more to educate the public about fracking — both its economic benefits and potential environmental dangers,” Wakefield said.
"Where people do have reservations about fracking, these should be addressed to ensure support for any future project from the people it will affect most.” - Sapa | <urn:uuid:3b560022-fb55-4660-9472-e3c63e5ea34f> | CC-MAIN-2013-20 | http://www.peherald.com/news/article/8522 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96178 | 279 | 2.75 | 3 |
The designs stamped on coins are known as types. These functioned at the
most basic level to identify their issuing authority, which could be an individual
city-state, a ruler or, more rarely, a league or federation. The types also
served a wide range of additional and occasionally overlapping purposes. Some
of the most commonly encountered coin types are those that feature city emblems,
punning images, local deities and heroes, myths and foundation legends, animals,
war commemorations, or ruler portraits.
ca. 394-304 BC
A rose, the Greek word for which is rhodon and thus a punning reference
to Rhodes, the issuing agent.
Dia. 20.0 mm. Photo courtesy Registrar's Office, Univeristy of Pennsylvania
ca. 342-336 BC
Philip II of Macedon
Young naked rider on a walking horse, carrying a long victory palm. This
commemorates Philip's victory in the horse race at Olympia in 356 BC.
Inscribed PHILIPPOU or "coin of Philip."
Dia. 26.0 mm. Photo courtesy D. White. (116k)
ca. 415-387 BC
Head of a lion. Whether because of their perceived characteristics, such
as beauty, wildness, ferocity, swiftness, or wisdom, or because animals
played some part in the issuing city's history or makeup, many different
kinds of animals were used as coin types with frequently beautiful effect.
Dia. 24.0 mm. Photo courtesy Registrar's Office, University of Pennsylvania
ca. 324 BC
Alexander the Great, Babylon mint
Head of Alexander-Heracles in a lionskin helmet. The first coins portraying
Greeks, whether living or dead, developed only after the death of Alexander
the Great in 323 BC His own coin portraits are therefore posthumous; the
coins struck for Alexander during his lifetime in which his features are
merged with those of his ancestral hero Heracles cannot be counted as
Dia. 25.0 mm. Photo courtesy Registrar's Office, University of Pennsylvania
ca. 302-301 BC
Enthroned Zeus holding a Nike or personification of Victory in his outstretched
right hand. The coin type is based, at least in a generalized way, on
the Phidian cult statue of Zeus at Olympia, which by the end of the 4th
century BC was perhaps the most famous statue in the Greek world. Nothing
of these colossal images has survived antiquity intact. Of Phidias's masterpieces
all that has been preserved with certainty are a few sculptor's tools,
molds and bits of ivory excavated from his workshop at Olympia.
Photo courtesy Mediterranean Section, University of Pennsylvania Museum.
ca. 400-375 BC
Racing four-horse chariot with a flying Nike personifying Victory crowning
the driver. The space below is filled with captured Punic arms. This spectacular
coin may commemorate the victory of Dionysius I over the Carthaginian
general Himilcon and the deliverance of Syracuse from its Punic siege
in 396 BC The reverse of the coin is signed by Euaenetus, one of the most
renowned coin designers of antiquity. Commemorative types became especially
popular in the Hellenistic period after Alexander's death in 323 BC
Dia. 34.0 mm. Photo courtesy Registrar's Office, University of Pennsylvania
© Copyright 2002 | <urn:uuid:ce5856e1-959a-453f-8ccb-f17bb7b3b7f3> | CC-MAIN-2013-20 | http://www.penn.museum/sites/greek_world/types.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.903816 | 719 | 3.328125 | 3 |
Endangered owls ready to take flight in B.C.
Sat Apr 22, 10:50 AM EST
About 100 burrowing owls will take wing in the skies over British Columbia's Nicola Valley on Saturday as part of a program aimed at restoring the endangered species to their grassland habitat.
Ottawa classified the owls as endangered under the Species at Risk Act in 1991. Since then, about 440 of the birds of prey have been released to the grasslands between Kamloops and Merritt.
Over the past two decades, the owls have lost 90 per cent of their habitat in southern B.C., mostly due to urban expansion and agriculture.
Every year, the B.C. Wildlife Centre in Kamloops breeds and releases burrowing owls, but most of them either die or migrate elsewhere. This year's release is the largest ever.
"We've been told by biologists if we can get up to 100 owls released to the wild, that's the kind of number we need to establish a sustaining population," said the wildlife centre's manager, Rob Purdy.
"These guys have a tough life, but some of them will come back. Last year 10 of them came back. This year, maybe more will come back," he said.
Wildlife officials will try to keep track of the owls through radio transmitters and ankle bands.
They believe the birds will spend the summer in B.C. before migrating south in September as temperatures drop and food supplies dwindle.
Return to the Bulletin
Click here to go to the main News Page
© Canadian Peregrine Foundation | <urn:uuid:c9ad6913-bf51-458f-ad8c-e1d739948d50> | CC-MAIN-2013-20 | http://www.peregrine-foundation.ca/species/article41.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.960246 | 334 | 2.65625 | 3 |
Harpignies bought a box of oil paints in 1844. Thwarting his father’s ambitions for him, he trained under the landscape artist Jean-Alexis Achard. He travelled to France, Flanders, the Netherlands and along the banks of the Rhine in Germany before reaching Italy in 1850.
In his diary recalls his enthusiasm: “This is indeed the country of which I dreamed […]. I loved form and it exists there par excellence and everywhere else in the Roman Campagna; this is where I really came to understand it and it has been my guide throughout my entire career”. This watercolour is among the artist’s earliest works. “I began to paint seriously in watercolours in 1851. Nobody showed me anything. I started off on my own”. It may represent the banks of the Tiber or Nazons Rock painted a quarter of a century earlier by Corot. Returning to Paris in 1853, he exhibited for the first time at the Salon with a view of Capri and met Troyon and Corot, whom he revered. He cultivated originality, as is demonstrated in his writings: “you painters of pigs in mud and rowers, uncompromising realists, painters of the banks of the Marne and Seine and other such hackneyed subjects, why don’t you go and see Poussin’s Valley, the Egerian Valley or the Farnese island, so little known to foreigners, and there you will see true landscapes”. He made a second trip to Rome between 1863 and 1865. | <urn:uuid:24ffb02f-64d0-42e1-bbc2-f59c4ec1d71d> | CC-MAIN-2013-20 | http://www.petitpalais.paris.fr/en/print/1136 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.966931 | 333 | 2.578125 | 3 |
Digital mammography replaces cumbersome and time-consuming film negatives with a high-resolution image on a computer screen.
One of the newest advances in diagnostics is digital mammography. Digital mammography uses X-rays, just like older systems, but the image is recorded digitally as a computer file instead of using film. In the past, the process involved exposing film negatives, then the film had to be processed ("developed"), reviewed and stored in large envelopes. If a second doctor wished to review the results, the film had to be shipped to the doctor.
Today's digital system now in use at Phoebe requires only seconds to record each image (as opposed to up to a minute with film). The images can be viewed within seconds of exposure and can be sent anywhere in the world instantly. Management, archiving and recall of the images - stored on a computer or on a disk - is greatly simplified.
The benefits to patients and doctors are numerous.
Digital mammography makes life easier for everyone involved in the process. The benefits include:
Shorter exam time - about half that of film systems.
Faster image acquisition.
Image contrast can be manipulated to show detail for more accurate diagnosis.
Improved contrast between dense and non-dense tissue.
Storage and recall is much more efficient.
Images can be transmitted anywhere in the world instantly.
Phoebe was an early adopter of digital mammography.
As with many other medical advances, Phoebe's commitment to world-class medicine brought this technology to citizens in Southwest Georgia much more quickly than hospitals in other similar-size communities.
According to Carlton Breast Center team leader Linda Whitten: "Eventually, all mammograms will be done using a digital machine."
Women in Southwest Georgia don't have to wait.
For more information about radiology services at the main campus, please call
(229) 312-1176. For Meredyth Place, call (229) 312-4800. | <urn:uuid:d552489b-2f95-4aa5-bd4b-6932105283f0> | CC-MAIN-2013-20 | http://www.phoebeputney.com/PhoebeContentPage.aspx?nd=1627 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.939814 | 406 | 2.890625 | 3 |
Gale's not the only Martian crater with an "enigmatic mound"
Posted By Emily Lakdawalla
2011/08/17 07:33 CDT
Much has been made of the "enigmatic mound" within Gale crater, which will be the target of the Curiosity Mars rover's investigations once it safely lands there next year. (Knock on wood.) The mound is 5,000 meters tall; it's so tall, in fact, that it stands higher than most of Gale's rim. This is one reason that geologists think that Gale -- and everything around it -- used to be buried much more deeply, and it's been "exhumed" over time.
The 5,000-meter-thick section rocks in Gale's central mound will be fascinating to study, but the fact that Gale has a central mound that's taller than its rim is not at all unusual on Mars. Here's another crater, an unnamed one about 25 kilometers in diameter, that has a central mound that's much taller than its rim:It's not obvious how tall the mound is from a bird's eye view, but the Context Camera team has taken the two pictures of this crater needed to create 3D views. This one has 3x vertical exaggeration, so keep that in mind, but even if it were not exaggerated, that mound would look quite a bit taller than the rim: I came across this crater in a presentation given by Ken Edgett to the MSL Landing Site Selection meeting in 2008. (Watch out, that presentation is 89 MB.) I asked him about it and he had a lot of interesting things to say, including his usual informative asides:
This mound is indeed illustrative of the concept that some Mars craters have been completely filled and buried and exhumed; in this case, we can tell that the crater was buried to at least a depth equivalent to the height of the mound, which exceeds the height of the crater rims. Of course, one has to ponder the relative resistance to erosion of the crater rims versus the fill material; more often than not on Mars we see that the crater walls, rims, etc., are more resistant than the fill material, but that is not always the case; there are plenty of circular mesas, for example, representing all that remains of what was once a crater... I guess, usually, though, these might be crater floors that are now left standing higher than their surroundings; I'd have to spend some time poking around to refresh my memory as to whether there are good examples of clear and obvious "fill" material that has been left behind while the crater went away.So why go to Gale and not one of these others? Because Gale has exposed, layered bedrock containing chemical signals of clays and sulfates. Look at this unnamed crater at high resolution and you'll see that it is very, very, very dusty, and there's little sign of bedrock under that dust, much less any indication that the bedrock's history had anything to do with liquid water. So it's best to appreciate this crater from above. One thing about Mars dust -- it can be very pretty. Check out this detail view. There's many generations of slope streaks, and there are dust devil tracks crossing the streaks! (Note that this image doesn't enlarge -- it's full Context Camera resolution of 6 meters per pixel.)
Anyway, back to this particular figure, it is true that this mound is covered with dust (and slope streaks formed in that dust) and so you can't see the rocks. But it is also true that there's really no expression of layering here, either... no shelf-bench features, etc. Whether that means this "fill" material is not layered (i.e., it is "massive") or whether it means the layers are much finer than we can resolve (I think there's HiRISE images of this; I haven't checked), and/or that the layers are so uniform in composition that you don't see differences in their erosional expression... who knows.
Other than the fact that this mound suggests the crater was once completely filled and buried, the other thing I like about it is its regional context. Nearby is Henry Crater. Henry is the same size as Gale and it, too, has a mound (or mesa). Henry's mound, though, looks very different from the one in Gale and it looks very different from the one in the small crater in the attached figure. To Henry's immediate southwest there is another crater in which there is a mound. That mound looks different, too, from the one in Henry and the one in this small crater in the above figure. So there are 3 neighboring craters exhibiting mounds of fill material and each one has a different erosional expression and layering or bedding features. This is very exciting; what does it mean? I think it is telling us that, even in these craters very near each other, the environments that existed in each case, and the supply of clastic material (assuming it's *mostly* clastic and not chemically precipitated), were different in each case. | <urn:uuid:ce7e5310-57c6-4a00-a1c0-8f6cef4d5a92> | CC-MAIN-2013-20 | http://www.planetary.org/blogs/emily-lakdawalla/2011/3144.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.977258 | 1,052 | 3.28125 | 3 |
This is a list of some of the terms, abbreviations and organisations that you may come across in relation to scuba diving. Terms marked with an asterisk have a medical meaning and should be used with care.
British Sub-Aqua Club - a worldwide recognised diver training agency.
Also known as DCI or the bends, this is a serious physical problem arising from excessive Nitrogen loads incurred during a dive.
Maximum Operating Depth
The maximum operating depth (MOD) of a breathing gas is the depth at which the partial pressure of oxygen (ppO2) of the gas mix exceeds a safe limit. This safe limit varies depending on the diver training agency, the level of underwater exertion planned and the planned duration of the dive, but is normally in the range of 1.2 to 1.6 bar. BSAC recommends a value of 1.4 bar for normal diving.
In diving terms this refers to a breathing gas mix with an Oxygen content higher than the 21% found in normal air. It is commonly used at Oxygen percentages of 32% and 26%. The reduced percentage of nitrogen is advantageous in reducing nitrogen uptake in the body's tissues and so extending the possible dive time, and/or reducing the risk of decompression illness. As the increased oxygen content becomes poisonous at a shallower depth than air, care must be taken to work within the maximum operating depth of the specific Nitrox mix.
Professional Association of Diving Instructors - a worldwide recognised diver training agency. | <urn:uuid:3b1fcde5-1a87-43cf-b781-0c414d7192b8> | CC-MAIN-2013-20 | http://www.planyourdivetrip.co.uk/Pages/Glossary.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929312 | 305 | 2.8125 | 3 |
Hare-brained schemes for cleaning up space debris have been batted around for some time, but Russia has finally put some money down on a real project. Russia’s space corporation, Energia, is going to invest $2 billion to build a space pod to fly around and knock the junk out of orbit and out of our way. Hopefully it will burn up in the atmosphere, or land in the ocean, and not rain down on Chinese villagers.
This pod could help reopen orbits that are currently inaccessible to future spacecraft due to the amount of shredded metal and empty hulls of dead satellites floating around. Using an ion drive, it will gently nudge these useless scraps out of orbit. Energia plans to have completed testing on the pod, which will have a nuclear power core, by 2020, and have it in service no later than three years after. It will have a lifespan of about 15 years, enough time to make a significant dent in our space debris problem.
Energia is also working on developing an “interceptor” spacecraft using similar technology. This craft would be able to derail any incoming comets or other outer-space projectiles that might be hurtling towards Earth, and change their trajectory just enough that they miss us.
The incredible innovations, like drone swarms and perpetual flight, bringing aviation into the world of tomorrow. Plus: today's greatest sci-fi writers predict the future, the science behind the summer's biggest blockbusters, a Doctor Who-themed DIY 'bot, the organs you can do without, and much more. | <urn:uuid:0d477cc5-1e03-4929-aa10-603c2469e687> | CC-MAIN-2013-20 | http://www.popsci.com/technology/article/2010-11/russia-invests-2-billion-clean-space-debris | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947692 | 321 | 2.578125 | 3 |
Disease prevention and
surveillance must be protected
As governments around the world
seek to reign in spending and reduce
deficits, ministers and civil servants will
be looking to not only save money but
to also not upset the voting public.
What the public views as
“essential” services are usually only
tinkered with, but those that stay
out of the headlines until really
needed tend to be much easier to
cut, and the consequent reduction
in expenditure looks good – at least
in the short term. Animal health and
disease surveillance are, possibly,
areas where the axe can fall easily.
While not what governments
looking to cut expenditure now
want to hear, the FAO is arguing that
billions of dollars could be saved by
stepping up prevention and control
of high impact animal disease.
Spending now, even if an
investment for the future, does not
appeal. But according to the FAO, the
future could be increasingly difficult.
It reiterates that emerging
threats can be related to increased
urbanization and demand for
animal protein. A rapid increase and
intensification in poultry production
in East Asia, for example, translated
into a five-fold increase in duck meat
output between 1985 and 2008.
“We are expecting the costs to
human, animal and plant health of
these pathogens, and their overall
economic costs, to rise substantially
over the next decades” says Juan
Lubroth, FAO’s chief veterinary officer.
The FAO takes the UK as an
example. A 2001 outbreak of foot
and mouth disease was estimated to
have cost US$25-30 billion.
It continues that the 2002-2003
SARS outbreak cost China, Hong Kong,
Singapore and Canada US$30-50 billion.
There is no doubt
that more pathogens
are emerging –
Worryingly, the FAO notes that
the influenza virus pool circulating
in humans, poultry, pigs and other
animals is becoming more diverse with
new strains increasingly common.
“This is not science fiction,” adds
Lubroth. “The threats are very real.
Deadly and economically devastating
livestock epidemics have existed
throughout history but there is no
doubt that more pathogens are
emerging – and spreading.” ◻
World Egg Day
World Egg Day is a unique opportunity to
raise awareness of the benefits of eggs and
is celebrated in countries around the world.
It was established in 1996, at the
International Egg Commission (IEC)
Vienna conference, when it was decided to celebrate World
Egg Day on the second Friday in October each year.
Initiatives to celebrate the event have taken various
forms. In 2005, the Camera Argentina de Productos
Avicolas organized a promotional campaign in response
to research that found that consumers felt that eggs had
no identity. To create a personality that the public could
relate to, an egg-shaped Super Man character called
Super Huevo was developed for a package label, listing
all the health benefits of eggs for different age groups.
The same year, Hungary organized an eggs festival,
while in Australia, the Australian Egg Corporation
launched an Egg Ambassador. Geoff Jansz, a chef
on Australian television, who hosted a special
episode about eggs on his “Fresh” shows.
More recently, World Egg Day was promoted through
various national newspapers in China, while in the
US, the director of the American Egg Board Howard
Helmer participated in a satellite media tour.
Helmer spoke with 15 news stations from cities
across the country, demonstrating omelettes with Asian,
Mexican, Mediterranean and Indian flair, and discussed
eggs’ affordability, versatility and nutritional benefits.
To find out about World Egg Day 2009's initiatives, go to: | <urn:uuid:988651ce-3a44-4754-ad99-9a8e5fec24f0> | CC-MAIN-2013-20 | http://www.poultryinternational-digital.com/poultryinternational/201009?pg=6 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.918085 | 841 | 2.703125 | 3 |
Aug 6, 2012
Cancer-busting chemotherapy can cause damage to healthy cells, which triggers them to secrete a protein that sustains tumor growth and resistance to further treatment, a study said Sunday.
Researchers in the United States made the “completely unexpected” finding while seeking to explain why cancer cells are so resilient inside the human body when they are easy to kill in the lab.
They tested the effects of a type of chemotherapy on tissue collected from men with prostate cancer, and found “evidence of DNA damage” in healthy cells after treatment, the scientists wrote in Nature Medicine. Chemotherapy works by inhibiting reproduction of fast-dividing cells such as those found in tumors.
The scientists found that healthy cells damaged by chemotherapy secreted more of a protein called WNT16B which boosts cancer cell survival.
This article was posted: Monday, August 6, 2012 at 9:12 am | <urn:uuid:1b0f92c1-52b1-4eca-a2ba-d3d6910d5c36> | CC-MAIN-2013-20 | http://www.prisonplanet.com/study-chemotherapy-can-backfire-and-boost-cancer-growth.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.961401 | 188 | 2.953125 | 3 |
FOR IMMEDIATE RELEASE
Contact: Keli Tarp
HIGHLIGHTS IMPORTANCE OF WARNINGS AND
PROVIDES SAFETY LESSONS
A year after violent tornadoes ripped through Oklahoma and Kansas, neighborhoods are being rebuilt, tornado shelters are popular items, and scientists and forecasters are reflecting on the lessons learned from 1999's deadliest outbreak. During the busiest tornado months of April, May and June, those lessons are relevant for many people in the United States.
On May 3, 1999, a total of 66 tornadoes touched down across Oklahoma and Kansas, killing 46 people, injuring 800 and causing $1.5 billion in damage. The most expensive single tornado in U.S. history occurred that day, an F-5 tornado that moved along a 38-mile path from near Chickasha through south Oklahoma City and the suburbs of Bridge Creek, Newcastle, Moore, Midwest City and Del City. With 8,000 buildings damaged, the Oklahoma City tornado caused about a billion dollars in damage.
The event proved the effectiveness of the National Weather Service's watch and warning program. The Storm Prediction Center highlighted the tornado threat in their outlook issued at 1 a.m. Data from the wind profiler network and other information prompted them to upgrade the threat to a moderate risk and highlight the chance of violent tornadoes in their outlook at 11:30 a.m. The first tornado watch was issued at 4:30 p.m. and the first tornado, a very brief, weak tornado, occurred just before 5 p.m.
Over the next 11 hours, with as many as four tornadoes from different storms on the ground at once, the NWS Norman Forecast Office issued 116 county warnings for tornadoes and severe thunderstorms. The average lead time for all the tornado warnings out of Norman was 18 minutes, which is seven minutes more than the national average of 11 minutes. For the significant tornadoes, those that were later rated as F2 or greater based on the damage they caused, the average lead time was 48 minutes. Some areas in the path of the most violent tornado received more than a one-hour notice before being hit.
NOAA storm researchers estimate that more than 600 people would have died in the absence of warnings.
The citizens of Oklahoma received an unprecedented level of severe storm warning services during the May 3 outbreak," said Dennis McCarthy, meteorologist-in-charge of the National Weather Service Norman Forecast Office. "The event clearly demonstrates the effectiveness of a fully integrated warning decision and dissemination system that includes NWS forecasters, live television and radio reports, emergency managers, storm spotters, ham radio operators."
NOAA Research developed the tools used to provide warnings: NEXRAD radar, Warning Decision Support System and Advanced Weather Interactive Processing System. Technology allowed forecasters to examine each and every storm, make their evaluation and issue warnings as necessary across the entire forecast area, not just the area around the Moore tornado, McCarthy said. Also, NOAA Research such as the VORTEX project has added to forecasters' understanding of storm structure and tornado development.
The tornado outbreak provided important safety lessons and reminders, McCarthy said. The very last step in the warning process the actions people take to protect themselves once they hear the warnings can often be the most critical. Many people in Oklahoma and Kansas survived the tornadoes with only minor injuries by seeking shelter underground, in an above ground engineered shelter such as a safe room, or in a permanent building on the lowest floor in an interior room such as a bathroom or closet.
However, some people took shelter in one of the worst places you can be during a tornado under highway overpasses.
"Overpasses are not acceptable storm shelters during a tornado, and we encourage people to avoid this situation by paying attention to weather forecasts and planning ahead," McCarthy said.
Strong winds and flying debris caused three deaths and numerous injuries for people hiding under overpasses in Oklahoma on May 3. In addition, parked cars under one overpass blocked traffic, trapping people in the path of the violent tornado. Once the tornado passed, the blocked road also prevented emergency vehicles from gaining access to the affected areas, endangering more lives.
As homes are being rebuilt, many families are choosing to add a safe room or install an in-ground tornado shelter, McCarthy said. Taking action now may ensure their safety when future tornadoes come roaring through the Plains. | <urn:uuid:6614794d-70d7-4fce-9603-33ae9a76beeb> | CC-MAIN-2013-20 | http://www.publicaffairs.noaa.gov/releases2000/may00/noaa00r236.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.953826 | 899 | 3.265625 | 3 |
Why is it important to make an appointment and what can a woman expect during that first visit?
When to go
Young women should start going to see a women's health care provider (such as a gynecologist, family physician, midwife or certified registered nurse practitioner) at age 21, when they become sexually active, when they are considering becoming sexually active or any time they have concerns or questions.
Women should also be seen if they are having any problems such as heavy periods, bleeding between periods, pain, abnormal discharge or burning.
If a woman is thinking of becoming sexually active, meeting with a provider is an opportunity to ask questions and find out about birth control methods or condom use as well as the risks associated with sexual activity.
What happens at the first visit?
At the first gynecologic visit, young women have their height and weight checked. They will then have a physical exam; the provider will listen to their heart and lungs, do a breast exam and possibly a pelvic exam. Screening will be offered for sexually transmitted diseases.
If she is 21 or older, a woman will also have a pap test to screen for cervical cancer, which is often caused by the human papilloma virus, a sexually transmitted disease.
Going to a women's health care provider before becoming sexually active is important. Young women need to be aware of their reproductive health and how their body works. Many teenagers receive wrong information at an early age from friends or the Internet, which can cause unnecessary stress or alternatively not enough concern. Visiting a provider can help them get answers to any questions they may have and get the correct information.
Privacy is important
Although many young women may want a parent or friend to go with them on their first visit, some young women may prefer to go alone. If privacy is a concern, women may ask for a parent or guardian to step out of the exam room and all information gathered during the visit will be kept private, according to the Health Insurance Portability and Accountability Act (HIPAA).
Cathy McAfee is a certified registered nurse practitioner at Keystone Women's Care, Chambersburg. | <urn:uuid:33a44467-170d-45bf-b25f-38d851937a77> | CC-MAIN-2013-20 | http://www.publicopiniononline.com/living/ci_22638292/take-care-first-visit-gynecologist?source=rss | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.963308 | 434 | 2.578125 | 3 |
There is constant demand for greater autonomy for the states with increased powers in respect of planning, finance, taxation and judiciary. The matter has been hotly debated and kinds of different and opposite views have been expressed. On the one hand, there are people who are opposed to the very concept of federation and who advocate a unitary from of government. They are all out for a strong centre. On the other hand, there are those who would prefer a weak center and autonomous states, independent in every matter except defense and foreign policy. Let us examine the facts of the case and then arrive at a dispassionate conclusion.
India is a vast country, a sub-continent, nearly equal in area to the whole of Europe, excluding Russia and the common wealth of independent states. It has a bewildering multiplicity of religions, languages and cultures. People living in one part of country differ radically from those in other parts. Thus, a Bengali is entirely different from a Punjabi or a Kashmiri in his way ways of living, traditions and customs. India's unity is a unity in diversity, and this unity can be preserved only under a system which allows the people of every region to live in their own way, according to their own culture and traditions, and yet makes them conscious of their common mother-land and enlists their service and cooperation for the task of the new India of our dreams.
It was for this reason that the framers of our constitution preferred federalism to Unitarianism, for it is in a federal set up alone that every reason, every state, can enjoy sufficient autonomy to live in its own way, and at the same time, the unity and integrity of the country can be preserved. The federal structure reflects India's "unity in diversity". It ensures a strong centre, as well as provides for the full growth and development of the culture of each region.
The framers of the constitution were quite conscious of possibility of center-state conflicts, and so the powers and jurisdiction of each have been carefully defined and demarcated in the constitution. There is a detailed list of subjects for the center, and another one for the states. Besides this, there is a concurrent list, including subjects which fall within the jurisdiction of both the center and the states. The centre has been given wide powers to ensure uniformity and co-ordination of administrative standards, to provide positive leadership in the social and economic spheres, and to protect the country from external aggression and internal subversion.
It has been provided for that the state Governments have to comply with the laws enacted by parliament and that the central government is entitled to give such directions to the state governments as it may consider necessary for the purpose. The state governments have been directed not to do anything which may prejudice or impede the exercise by the center of its power in the state. The constitution fully takes into account the needs both of the centre and the states.
The constitution also provides for times of emergency. In times of war or when there is a threat to law and order, a nation must use every possible means to the danger. If the federal character of the constitution is temporarily discarded and the country is ruled as under a unitary system, and if the fundamental rights of citizenship are suspended for the duration of the emergency, no serious objection can be taken to such extra-ordinary measures. For one thing, there is the parliament to see that the emergency powers are not misused and secondly, because," extraordinary situations can only be met with extraordinary means". Similarly, when in a state, the government finds that the government cannot be carried on in accordance with the provisions of the constitution, central intervention becomes inevitable and president's rule is imposed over the state.
The constitution also provides that, when a situation has arisen whereby the financial stability or credibility of the country is threatened, the president may declare a state of financial emergency and may give directions to any state or states in order to ensure that there is no misuse of funds, and financial stability is achieved. The center has also the power to intervene in the internal affairs of a state if; such intervention is justified by the law and order situation, prevailing in that state. The centre can post its armed forced or its Para-Military forces to safeguard its installations in any state, if the situation they makes such a step necessary. Further, in case of inter-state disputes the center can intervene and if considered desirable, can even alter state boundaries. It can send its armed forces to prevent secessation or threat of secessation on the part of any state.
The powers enjoyed by the centre are, no doubt, very wide, and such wide powers have come in for a good deal of criticism. In this connection, first, it should be remembered that the states have been given sufficient autonomy and enjoy sufficient powers, and are not subservient to the centre in everything. Education, health, local self-government, public order, administration of justice, water supply and trade and transport, are matters of great importance and they have been entrusted to the states. The state legislatures have exclusive jurisdiction over 66 items and concurrent jurisdiction over another 47 items. The division of power between the centre and the states is quite fare.
Some critics have, indeed, criticized the scheme of the scheme of the division of power on the ground that by leaving vital issue, like land reform, food production, and higher education, with the state governments, the farmers of the constitution have added to the difficulties of the administration. In respect of finance, the finance commission may not have satisfied all the states, but there has been a large measure of autonomy in this respect also. Hence complaint of lack of autonomy and freedom is baseless.
Greater freedom would have led to the disintegration of the country. The states should have autonomy but not at the cost of unity and integrity of the country. It should be remembered that India faces danger to its freedom, not only from abroad but also from within. Regionalism, Linguism, communalism, and several other fissiparous trends threaten the unity and integrity of the country. A strong centre with wide powers is needed to combat and put down such disruptive forces.
A weak centre would not only encourage such forces. It will also encourage foreign aggression. China and Pakistan are the two hostile neighbors of India, and only a strong centre and a united country can face the menace posed by them. To weaken the centre would be to weaken the country and endanger its hard won freedom. A strong centre is the urgent need of the hour. Indeed, we need both a strong central government and strong autonomous state government, and both these have been provided for by the flexible frame-work of the Indian constitution.
Moreover, it should be remembered that the modern trend everywhere is towards a strong centralized government. The U.S.A. has a federal set up, and there, too, the centre has grown increasingly more and more powerful. A strong centre has become necessary because the modern concept of the welfare state places unusual administrative burdens and responsibilities upon the government. Besides this, fact means of communication tend to obliterate regional diversities and bring even far flung parts of a nation closer together. This move towards increased homogeny should be fostered and encouraged, and this can be done only by a strong centre.
Therefore, we must conclude that the flexible federal structure, which provides for a strong centre, along with a fair measure of state autonomy, is best suited to the needs of modern India. | <urn:uuid:97bd873e-7ee2-497a-97ef-97661e4da7e9> | CC-MAIN-2013-20 | http://www.publishyourarticles.net/eng/articles/federal-system-vs-unitary-system-essay.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96154 | 1,521 | 3.265625 | 3 |
Mode may be defined as the value that occurs most frequently in a statistical distribution. In French language 'Mode' means 'Fashion'. Around this value, there is high concentration of the value. It is neither the central value nor the total sum of series which makes any effect on it.
According to Croxton and Cowden, "The mode of a distribution is the value at the point around which the items tend to be most heavily concentrated. It may be regarded as the must typical of a series of values."
According to A.M. Tuttle, "Mode is the value which has the greatest frequency density in its immediate neighborhood."
According to Zizek, "The mode is the value occurring most frequently in a series of items and around which the other items are distributed most densely."
What points to remember while calculating mode?
- Classes should be exclusive.
- Length of classes should be equal.
- Series should be in ascending order.
- If series is cumulative, convert it into continuous series. | <urn:uuid:4a2a4819-a3fe-46bb-a4ed-753d34d565d6> | CC-MAIN-2013-20 | http://www.publishyourarticles.net/knowledge-hub/statistics/what-do-you-mean-by-mode.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.947795 | 209 | 3.375 | 3 |
Attention deficit hyperactivity disorder (ADHD) is difficult to diagnose in preschool-aged children because many ADHD symptoms are part of age-appropriate behavior for preschoolers.
Characterized by hyperactivity, impulsivity, and an inability to focus, ADHD frequently accompanies other problems, like learning disabilities and anxiety. The diagnosis guidelines set by the American Academy of Pediatrics are designed for kids aged 6 to 12, precisely because at younger ages so many apparent ADHD symptoms are simply expressions of age-appropriate behavior. What’s more, many symptoms in younger children can be sourced to environmental issues, such as moving, divorce, or a family death.
With this in mind, it’s easy to see why many experts caution against labeling what could very well be normal preschool behavior as a sign of ADHD. According to ADDitudemag.com, diagnoses at this age depend on degree: kids with ADHD are more extreme than average children and will have trouble sitting still and focusing, even when the activity is a pleasurable one.
Here are some tips that can help parents:
View your child’s teacher as a resource. ADDitudemag says experienced teachers (i.e., those with a baseline understanding of normal preschool-age behavior) can help parents tremendously. It’s important to identify whether extreme behaviors occur in all environments, as opposed to just at home or just in the classroom.
Pay attention to early indicators. Initial expulsions or outbursts during the preschool years that predict ADHD involve aggression, poor participation in group activities, and disregard for others’ personal space.
Keep an eye out for peer rejection. One of the consequences of extreme classroom behavior is peer rejection. Children with ADHD will find themselves shunned by their classmates, lonely on the playground or uninvited to playdates. It’s possible parents will notice peer rejection prior to understanding its behavioral cause.
Intervene early. While it’s difficult to diagnose at the preschool age, it’s not a bad idea for parents who suspect ADHD to try some positive behavior management approaches. About.com suggests focusing on structure and predictability, distraction reduction, and even the option of smaller classroom settings. These modifications may help prevent the peer-rejection issues mentioned above.
For more information on ADHD and young children, visit ADDitudemag.com. | <urn:uuid:04ab695b-c799-44e2-8ea7-551ffae95b83> | CC-MAIN-2013-20 | http://www.rd.com/health/conditions/adhd-and-preschool-information-for-parents/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945572 | 482 | 3.515625 | 4 |
Learning and Growing Together
Learning and Growing Together: First Steps for Reading and Writing.
The Ohio Department of Education and eTech Ohio have produced a series of fun and practical online resources for families, titled Learning and Growing Together. The focus of these resources is to provide information and resources in the following ways:
1. Information about your child's development,
2. Scenarios that demonstrate ways to enhance early learning for reading and writing and mathematics, things to try at home, and tips,
3. Guides that provide information about preparing for school and what to expect, and
4. Additional activities and resources. MORE.. | <urn:uuid:015f1116-df28-47a7-a9c3-261263d811bd> | CC-MAIN-2013-20 | http://www.readingfirstohio.org/page/learning-and-growing-together | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929474 | 128 | 3.625 | 4 |
is a municipality in Spain, it is situated in the province of Ávila and is part of the autonomous community of Castilla and León.
The city is the capital of La Moraña. Queen Isabel the Catholic made this city her home for some time of her life. The government of Spain has declared this city a Historic-Artistic site due to its many examples of Mudejar art.
Location and population
It is located at an altitude of 820 meters and is near the junction of the two rivers Adaja and Arevalillo. Its encompassed area is 46.07 km² and its population is 13.122. In medieval times, it was the head of the agricultural sector (Comunidad de Villa y Tierra) of the same name.
It is one of the cities of Castilla with a high amount of monuments of the Romanic-Mudéjar style.
- La Muralla. The city walls, of which only the north part can be appreciated, as the east part is practically destroyed. It is currently being restored. They originally had five doors and formed a triangle with the castle in its superior vertex. The two sides of the triangle are formed by the rivers Arevalillo and Adaja. The base of the triangle was protected by a double wall and a pit.
- The parish church of Santo Domingo de Silos.
- The church of San Juan.
- The church of Santa María whose tower is crossed by the street of the same name.
- The church of San Miguel which possesses a great collection of works of art.
- The church of San Martín or of the Torres Gemelas(twin towers). Formerly a mosque, it conserves a peculiar style.
- The church of El Salvador(the savior) in which the floats for the Easter processions are kept.
In addition to this there are many other brick monuments from different eras. The palace of los Gutierrez de Altamirano, the house of the militia, the palace of Cárdenas, the palace of río Ungria, the palace of real, the palace of Ballesteros Ronquillo, the palace of Sedeño and the palace of general Vicente del Río. There are also diverse convents, the castle in which the museum of cereal resides, plaza del Arrabal plaza Del Real, plaza de San Pedro and plaza de la Villa.
The highway A-6 unites Madrid with La Coruña and some of the population uses this transit system to commute to the main cities of the northwest peninsula.
Also the train line Madrid-Hendaya has stop in this town. From this line, the town is communicated thanks to its numerous Regional Trains with cities such as Madrid, ávila, Medina del Campo, Valladolid, Burgos, Palencia, Vitoria and Santander.
Mainly, this train tickets are very economics ^^
Farming, cattle ranching, lumber industry, a small but powerful industrial sector and other businesses which are fundamentally based upon the processing of agriculture are the main forms of employment.
There are 3 schools, C.P. La Moraña, C.P. Los Arevacos and el Amor de Dios, which operate in this district. Additionally there are 3 centers for secondary education, Los Salesianos, I.E.S Adaja y I.E.S Eulogio Florentino Sanz.
Places of interest
In addition, Arévalo has other places of interest like la formidable Avenida Emilio Romero, a sports facility, a new bridge constructed , the plaza of the villa,, the municipal library, the museum of el cereal, the nature center in la Plaza del Real, and the Tuesday market in the fairground.
Traditions of the town of Arévalo and festivals
Arévalo celebrates the festival of its patrion saint San Victorino on 7 July
, with its traditional parade of cabezudos, the opening of its fairground, and bullfights in the town's streets. The festivals conclude with fireworks from the castle until 11pm. | <urn:uuid:986b8ff1-0fdb-4a70-a02e-8359ff9b070d> | CC-MAIN-2013-20 | http://www.reference.com/browse/Montejo+de+Ar%C3%A9valo%2C+Segovia | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.914424 | 869 | 2.71875 | 3 |
Gardner's syndrome is a genetic disorder characterized by the presence of multiple polyps in the colon together with tumors outside the colon. The extracolonic tumors may include osteomas of the skull, thyroid cancer, epidermoid cysts, fibromas and sebaceous cysts. The countless polyps in the colon predispose to the development of colon cancer.
Gardner's syndrome is inherited in an autosomal dominant manner. Typically, one parent has Gardner's syndrome. Each of their children, male and female alike, are at 50% risk of inheriting the gene for Gardner's syndrome and manifesting it.
New genetic and molecular information has caused some genetic disorders to be split into multiple entities while other genetic disorders merge into one condition. After existing for most of the second half of the 20th century, Gardner's syndrome has vanished as a separate entity. It has been merged into familial adenomatous polyposis (FAP) and is now considered simply a phenotypic variant of FAP. | <urn:uuid:b2b7bc02-643e-4f14-a131-2714b4469221> | CC-MAIN-2013-20 | http://www.reference.com/browse/impacted+tooth?fromAsk=true&o=100074 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.945458 | 212 | 3.03125 | 3 |
The Julian calendar marks December 26, 1530, as the day Babur the Great died. Though the Central Asian monarch didn’t know it at the time, the Moghul Dynasty he founded would survive until 1857.
The current issue of “The Economist” includes a feature
titled “Babur, The First Moghul Emperor, Wine and Tulips in Kabul.” The piece profiles Babur the Great, a Kabuli who founded the Moghul (Mongol) Dynasty in South Asia in the 16th century. At heart, Babur longed for the Afghanistan where he spent much of his adult life.. He chose to be buried there rather than in the Indian lands he also conquered.
Babur became a minor Moghul prince in the Ferghana Valley at the tender age of 11 when his father died suddenly. By age 13, he was already waging war against Samarkand. Eventually, he settled on Kabul as his first capital and fell in love with the city. He consolidated his power there before launching an invasion of northern India -- Hindustan, as it was then known -- which was under the rule of a dynasty of Lodi Pashtun tribesmen.
Between military conquests, parties, and naturalist expeditions, Babur recorded his life in the “Baburnama“ -- or “Book of Babur” -- hailed as the earliest example of an autobiography in the Islamic world. Mysteriously, over a decade of his life is missing. The missing text covers much of Babur’s time in Kabul and is, ironically, the period which is the focus of “The Economist” feature.
Babur’s Kabul, as "The Economist" notes, was a stronghold surrounded by mountains, impassible during winter. Indeed, the ebb and flow of warfare in Afghanistan is almost just as beholden to the seasons today. "The Economist" points out that Kabul was an important stop for goods from India. Herbs, sugar, textiles, and slaves were brought to Kabul for destinations in Central Asia and beyond. Yet “The Economist” leaves out the most valuable Central Asian good traded in Kabul: horses.
Oil is the strategic commodity of our time. Ready access to cheap oil has launched empires, and much blood has been shed to control it. But in Babur’s day, horses were the great resource upon which states were built.Harvard History professor Scott Levi
says, "By the Moghul period, cavalry had become arguably the most important element in the Indian military." Jos Gommans,
a Dutch Historian, maintains that at its peak in the 18th century the number of war horses in India ranged between 400,000 and 800,000.
Today, Afghanistan has yet to realize the full potential of its strategic location vis-a-vis regional petroleum markets. Afghan pipelines -- like the agreed-upon TAPI pipeline
linking Central Asian gas with South Asian outlets -- are just as imaginary as Babur’s dream of controlling Samarkand.
During the Moghul era, Afghanistan capitalized on its location, becoming the hub of a blossoming horse trade. In "Baburnama," Babur explains that 7,000 to 10,000 horses arrived in Kabul annually, while several thousand more arrived in Kandahar and other Afghan locales. While waiting for the snows to melt in the mountain passes, the horses were fattened in pastures surrounding Kandahar and Kabul.
Over the next centuries, the trade grew to such an extent that some records claim
that as many as 100,000 horses could be purchased in a single season by Indian merchants in Afghanistan. The 17th-century French traveler Jean-Baptiste Tavernier estimated
that 60,000 Uzbek horses were brought to Kabul each year.
Babur used the expansive horse trade to provide his army with war horses and to fill his coffers with taxes. In turn, he provided traders with a secure atmosphere in which to conduct business. The Lodi Dynasty that Babur’s invasion displaced in India had also risen to prominence by dominating the horse trade. Only 19th century advances in infantry weapons changed these dynamics and broke the geopolitical significance of Kabul.
As it often does, trade liberalization promoted tolerance. Kabul -- like so many other trading centers -- became a center for religious and cultural tolerance. “The Economist“ notes that Kabul was home to speakers of 11 or 12 different languages during Babur’s rule and was more religiously tolerant when compared to many of its contemporary states in Europe. Babur forged marriage ties to the Sunni Sufi Naqbashandi orders in Kabul while also maintaining close ties with the Shi'a Sufi Qizbilash troops in his army. Babur had a similar approach to ethnic groups as well. Babur’s army was also diverse, containing Pashtuns, Arabs, Tajiks, Uzbeks, and other Central Asian ethnic groups.
“The Economist” article is one of an increasing number of works
over the last decade that have focused on Babur. In Afghanistan, Babur remains popular despite his foreign origin and often irreligious attitudes. Stephen Dale, a historian of the Moghul period, notes that, “Some Afghans think that Babur personified the qualities that they vocally admire in themselves: spontaneous bravery, social informality, and a refined appreciation of natural beauty."
Babur was a talented and brutal military leader. But his legacy should not be that of a great military hero.
Instead, Babur offers more important lessons. Under Babur, Afghanistan flourished. He unlocked growth by encouraging trade, enforcing a simple and clear taxation system, embracing pluralism, and raising an army reflective of the diverse groups he ruled.
Modern state builders in Afghanistan would do well to recall these aspects of Babur’s legacy.
-- Joseph Hammond | <urn:uuid:959d4448-5c13-4905-81de-e5950573d7d8> | CC-MAIN-2013-20 | http://www.rferl.org/content/gandhara_babur_the_great_afghanistan/2260027.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.972139 | 1,236 | 3.28125 | 3 |
Saint Fernando III
King Saint Fernando III was born in the monastery of Valparaiso in Spain in the year 1199 – exactly 100 years to the month after the death of his illustrious ancestor, Rodrigo Diaz, who was known by the honorary title of
He was a true son of the Cid, of noble heart and bearing. In him would be combined the soul of a knight dedicated entirely to God, the irresistible power of the Cid and, due to his royal heritage, the authority to marshal the might of an entire nation against the enemies of Christ.
Saint Fernando’s father was King Alfonso IX of Leon, and his mother the saintly Lady Bereguera. As his parent’s marriage was annulled by Pope Innocent III, St Fernando was actually raised by his grandfather,
King Alfonso VIII
of Castile, and his mother. King Alfonso VIII was a great warrior and knight, to whom Christian chivalry was more than just a code of conduct or a set of rules to which he adhered; it was a pursuit of virtue meant to guide him in all of his thoughts and actions. In striving for the ideal of knighthood, he attained a true nobility of character. Living a life of honor, King Alfonso was a magnificent warrior who courageously defended the Church and his kingdom of Castile. He was also an excellent role model for young Fernando, who wanted nothing more than to be a knight of Christ.
St Fernando was still a young man when he became king of Castile. His kingdom was in tatters, as there had been numerous raids by both Christian and Moor into Castile, as well as internal rebellions. Saint Fernando worked tirelessly to restore his realm to prosperity and administer justice throughout his land, though he continued always to train as a warrior.
On the day Saint Fernando became a knight, he prayed:
“Christ, my Lord, I am in Thy hands, the same way this sword is in mine. Show me, my King, what Thou wantest of this Thy knight.”
In the silence and stillness of the night, St Fernando heard Christ answer him:
“I want to make your whole life like a representation and marvelous parable so that the coming centuries may contemplate the war that I, Eternal King and Universal Lord, wage against the powers of darkness, to conquer the entire earth for my Father. Fernando, you will be the noble and considerate king who leads his vassals in this great enterprise, the courageous and mortified King who, above all others, charges ahead in the midst of danger and endures the strain of hard work and the fatigue of battle. You will be the generous and magnanimous King who in victory does not worry about his treasures, but distributes the spoils among his faithful knights.”
God granted to Saint Fernando to see the stark outline of the life that was to be his, a life full of struggles and hardships and warfare. Yet his soul did not quake at the prospect, for he knew that he would be doing God’s will, and that God would be with him as long as he remained true. He was prepared to do whatever was required of him now, and all the days of his life.
King Saint Fernando became one of history’s most gifted and formidable warriors, while being at the same time one of the greatest monarchs who ever ruled. He, like so many men of his time, did not seek to enjoy a long life so much as he sought to live a good life. Thus, he spent his entire life in the service of God, rather than wasting his time in service to himself.
King St Fernando was a man of clear and deep faith, who realized that everything depends on God and that it is He Who grants the victory. He knew, nonetheless, that the Lord never wants to help those who are lazy but to assist with grace those who do everything that is in their power. This effort becomes a prayer of action, when combined with trust in Him.
As a consequence of his holy intentions, all of Saint Fernando’s ventures met with success. He was absolutely invincible, personally as well as while directing his armies, conquering hearts and minds as completely as he did cities and strongholds. He knew that there is no holier enterprise than to do one’s duty before God, and that his first obligation was to rescue his own country.
This great Catholic monarch truly lived his faith, and by his chivalry, loyalty, and generosity of character was worthy of the high regard and friendship of those who had once fought against him. By the kindness and gratitude he showed toward those who rendered service to him, and by his great generosity, he captured the affection and won the willing obedience of his nobility. He always and everywhere applied himself whole heartedly to his duties as king, zealously seeking after justice and prosperity for his people. He was a model of righteousness and proper conduct for his sons, and by his example earned the respect and love of all his children. He was to them the most tender and caring of fathers, leaving them an incomparable heritage the like of which few Christian monarchs could boast.
The legacy of King Saint Fernando III is far-reaching and eternal. It was he who had permanently combined the Kingdoms of Leon and Castile, and with that might he conquered more Islamic territory than any other Christian, expelled the Muslims from most of Andalusia and turned their remaining kings into his obedient vassals. King Fernando’s achievements clearly outstrip those of King Sancho II and King Jaime I, not to mention those of king’s
Saint Louis IX,
Frederick II and Edward I. At a time when the crusading efforts of all the rest of Christendom hardly sufficed to maintain a foothold on the coast of the Holy Land, Fernando inflicted on medieval Islam its greatest defeat up until that time.
King Saint Fernando had been known as “the Saint” during his lifetime, so it should come as no surprise that immediately after his death his subjects unanimously awarded him a place in celestial glory. St Fernando soon became the object of public veneration, and that same year Pope Innocent IV declared that King Saint Fernando of Castile enjoyed the reputation of “having always followed the path of obedience to the Divine precepts, and that he greatly contributed to the spreading of the worship of the Holy Name of Jesus.”
The body of St Fernando is incorrupt, and he can still be seen in the Cathedral of Seville, for he rests now enclosed in a marvelous gold and crystal casket worthy of the Castilian king. King Saint Fernando is the only king whose earthly crown has never been taken away, for his golden crown still encircles his head as he reclines beneath the statue of the Virgin of the Kings, awaiting the day of resurrection.
St. Fernando III, A Kingdom for Christ
Now available as an e-book for only
"St. Fernando III
A Kingdom for Christ"
"Very little has been written about St. Fernando III. Very few Catholics even know he existed, let alone his origins and the noble Catholic blood that flowed through his veins. From Charlemagne to El Cie to Alfonso VIII, and beyond himself to the beloved Queen Isabella of Spain, some of the greatest Catholic figures in history have shared ni this lineage of warrior-saints. And yet, all throughout the last four centuries, the honor and due reverence to this man among men has lain hidden among the shadows of time, awaiting the day when modern man would take notice of this King among kings; this Warrior among warriors; this Saint among saints.
Now, that day has come! Mr. Fitzhenry has put down on paper the life of a true Catholic hero; one that we can happily place in the hands of our Catholic youth and say, "Read this. This is what is expected of a Catholic man."
St. Fernando III breaks through the apathy, so prevalent in today's society of egotism, diversity and political correctness, and rekindles within the Catholic heart the fight for our one, true Faith...and ultimately, Christ as King. Viva Christo Rey!
Director, Our Lady of Victory School
Gloria Romanorum Review
Did you know that one of the greatest kings in Spanish history, Fernando III, was also a saint? I didn't. But thanks to author James Fitzhenry, I do now. Fitzhenry, who also penned El Cid: God's Own Champion, has written this detailed yet approachable biography of this fascinating and inspiring example of Catholic manhood. St. Fernando III: A Kingdom for Christ is geared toward Catholic homeschooled kids, probably in the twelve and older age range. But the writing is exceptional and as a mature reader of nearly 40, the book easily held my attention.
Replete with family turmoil, civil strife, stunning miracles, romance, and dozens upon dozens of skirmishes, pitched battles, and sieges, the tremendous scope of St. Fernando's worldly accomplishments leave the reader dumbfounded. But the heart of this book is St. Fernando's total devotion to Christ and his Blessed Mother. Everything he did, he offered to God without reservation. In his willingness to suffer personal hardships, unfailing mercy toward his enemies, love for his wife and children, and care for the poor and afflicted, St. Fernando was a model of Christian virtue. In his everyday life, and especially when he faced a crisis, he turned to the Virgin and believed to the depths of his soul that she would intercede for him. And based on the magnificent achievements of his life, who can doubt that she did? For at the same time that the Christian states in the Holy Land were failing despite the best efforts of great crusading armies led by the most important crowned heads of Europe, St. Fernando was able to weld together the small kingdoms of Castile and Leon and use their combined might to reconquer almost all of Andalusia from its Muslim overlords.
So in short, this book is a gem. St. Fernando III is a Catholic hero who deserves to be more widely known. Now thanks to James Fitzhenry and his enjoyable book, he will be.
Amazon Book Reviews
Mr. Fitzhenry, after success with his great work, El Cid: God's Own Champion, in 2007, outdid himself with the story of St. Fernando, or San Fernando Rey. This new book reads like a novel full of suspense, but based on the life of one of the most amazing saints, yet before this great book, little was known about him. This book tells of his strength in battle. He also consulted the Blessed Virgin, to whom he was very devoted, even carrying a statue of her (Virgin of Battles) on the horn of his saddle.
Fernando was brave, fearless because of his strong faith, and always "knew" he was under the direction of God and accomplishing His will.
I received this book as a Christmas present and looked at it as, "Ho hum". That changed quickly, due to Mr. Fitzhenry's captivating writing style, in-depth research utilizing 31 reference books and therefore, what may have seemed to be legend has come to life as accurately as an author could accomplish covering the Thirteenth Century.
It is always so trite to review a book by saying, "This was so exciting, full of surprises and breathless close-calls, that I couldn't put it down." Albeit true with Fernando, I HAD TO SLOW DOWN MY READING! This was because I dreaded completing this great epic--I then paced myself as one might do with a fine wine. After reading a section, there was always much to contemplate, including visions from the Blessed Virgin, and how in Fernando's early life, Fernando's mother the queen, offered great penances and petitions to the Virgin to save her son who had become desperately ill. He was miraculously cured.
In reading this adventure, you will travel through all of the areas of Spain, as Fernando pushes the Moors to the sea, sterilizing virtually all of Spain for Christianity. You will enjoy stories of the miracle of enemy arrows turning around wiping out the enemy who shot them, the appearance St. James several times with a compliment of soldiers from heaven. St Isidore appeared often and even heavenly angels appeared in the middle of battle to bolster Fernando's army. You will treasure stories of faith and more faith, yet Fernando was God's man willing to do anything with the Blessed Mother's prodding, direction and approval and always to please God.
I would suggest this book to adults, but children who are able to read on an adult level will love this book, however a parent could read it to a younger child a bit at a time. In closing, it should be mandatory for high school students and all adults who love their faith. What's next Mr. Fitzhenry? Please hurry!
Del Latham, M.S.
I highly recomend reading this beautiful book and adding it to your libraries - El Cid is a heartwarming and inspiring story giving glorious tribute to the triumph of human faith-and its well detailed events will forever dwell in your mind! El Cid, a book for all ages, will make you forget where you are and take you far into its story. This wonderful little book will strengthen the faith of its readers, no matter how weak or strong it may be. Mr. James Fitzhenry is a very creative and brilliant author. El Cid: God's Own Champion was rated super-high by my husband and two young adult children, and voted the best story book Fitzhenry has put together yet!
I greatly enjoyed reading this book to my children. They were captivated by the fascinating details of this heroes life. The author brought the characters to life with lively energy and beautifully drawn illustrations. This amazing true story is written from a Catholic perspective. El Cid epitomizes the moral virtues that are all but lost in today's society. This is a perfect addition to any home schooling program. I highly recommend this book to anyone with children.
I bought this book for my future children as I want them to read about the heroes of old who once fought to save and defend our culture and our faith. I am myself descendant of Spaniards and have seen with disgust how the science of history these past decades has fallen hostage to ideology, an ideology which loves to hate the Western world and relativitize everything. Spain during the Middle Ages was a society and a nation which fought desperately for its own survival against Islamic aggression. Since Europe in those days was one Christian unity Spain - just like Charles Martel, the Byzantine empire and the sieges of Vienna - fought for the entire Christendom. Latter-day historians driven by progressive ideology have done their best to try to depict Rodrigo Diáz de Bivar as a simple free-booter, however, the sources and general knowledge about medieval Spain reveals a whole different picture. El Cid was and is a true once living example of a man who fought for freedom, faith and family, and as such he presents a true role-model for all Westerners, American and European and christians of all denominations. In this post 9/11 world to read about medieval Spain is sobering reading. Islam was and is the same ever since the days of its violent founder - pure and simple aggression bent on world-domination. Anyone who disputes this should study REAL history.
Return to Incorruptible Saints Page
Return to Traditional Franciscan Calendar Page
Return to Catholic Hero Stories Page
Return to Saints Page
Return to Roman Catholic Saints Homepage | <urn:uuid:d14cd165-3659-4ffd-b1b7-c3e69870aaa7> | CC-MAIN-2013-20 | http://www.roman-catholic-saints.com/saintfernando.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.977899 | 3,244 | 2.75 | 3 |
American Civil War
Just under 200,000 Irishmen took part in the American Civil War, making it one of the most significant conflicts in Irish history. Hundreds of thousands more were affected away from the battlefield, both in the US and in Ireland itself. The Irish contribution, however, is often only viewed through the lens of famous units such as the Irish Brigade, but the real story is much more complex and fascinating.
Despite this huge level of Irish involvement, little is known in their home country about their experiences. A large number of sites in Ireland are either directly connected with individuals who fought in the American Civil War or were centres of activity relating to the conflict.
An American Civil War Trail is planned around the country in sites either directly connected with individuals who fought in the American Civil War or were centres of activity relating to the conflict.
Local historians, James Doherty and Donncha O Ceallachain took Orla Rapple on the American Civil War trail in Waterford.
Archaeologist Damian Shiels joined Myles in studio to talk about the Civil War Trail initiative as well as his new book Irish in the American Civil War (The History Press).
Damian’s book highlights personal stories of those involved - from the Tipperary man who was the first man to die in the war, to the Corkman who was the last General mortally wounded in action; from the flag bearer who saved his regimental colours at the cost of his arms, to the Roscommon man who led the hunt for Abraham Lincolns assassin, what emerges in this book is a catalogue of gallantry, sacrifice and bravery.
Details of Irish sites and people related to the American Civil War are available at Irishcwtrails.com.
The ultimate goal of the group is to erect plaques in places around Ireland associated with the American Civil War. | <urn:uuid:9c1d2db5-78e6-4b49-9102-042a26fae6c6> | CC-MAIN-2013-20 | http://www.rte.ie/radio1/the-history-show/programmes/2013/0303/370301-the-history-show-sunday-3-march-2013/?clipid=1011319 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.975587 | 379 | 3.203125 | 3 |
Taken from www.krugerpark.co.za
History of Orpen
One of the urgent needs of the infant Kruger National Park was the provision of water to the growing number of game. The park represented a cause that was close to many people’s hearts. JH Orpen, a surveyor and member of the National Parks Board helped sponsor boreholes for the park. His wife Eileen bought up seven farms immediately to the west of Rabelais gate during the 1930s and 1940s and donated them to the Park, thereby extending the total area by almost 24 500 hectares.
When the entrance to the Park was moved 10km (6 miles) to the west of Rabelais in 1954, and a new rest camp was established beside the gate, it was named in honour of the Orpen family.
, which was opened in 1984, means 'mountain and dale' and is aptly named for its superb location.
Crocodile Bridge Camp:
During the eighteenth century, European explorers were lured inland by legends of the fabulous gold riches of Monomotapa. They came into conflict with the local inhabitants, whose traditional way of life was threatened by these unknown visitors from across the sea.
Francois de Cuiper of the Dutch East India Company led the first expedition to the area from the Cape in 1725. His party was attacked by local inhabitants in the Gomondwane bush (just north of Crocodile Bridge), and forced to retreat to Delagoa Bay.
When the Sabie Reserve (a forerunner of the Kruger National Park) was proclaimed in the late 19th century, Crocodile Bridge was one of the first four ranger posts. The bridge across the Crocodile River, visible from the rest camp, once formed part of the Selati railway line that wound its way through the Park to Skukuza. Construction of the bridge started in 1894 and was completed just before the end of the 19th century. The bridge continues despite being damaged in severe floods during February 2000.
Letaba Rest Camp:
In prehistoric times, parts of the present-day Kruger National Park were inhabited by successive groups of people. One such example is that of picturesque Masorini Hill which is 39km (24 miles) from Letaba. Human habitation at Masorini has been traced back several centuries to the late Stone Age, while more recently it has been home to the BaPhalaborwa tribespeople who inhabited it in the early 19th century.
They were cattle and crop farmers, as well as ironsmiths of note, who made a living by manufacturing iron artifacts and trading with Arab merchants on the east coast. Archaeological excavations have revealed hut floors, packed stone walls and terraces, grinding stones, pot shards, glass beads, ash and even food remains.
Most impressive, however, are the iron-melting furnaces, smithies and worked artifacts. The village offers an example of a specialized economyand well-developed technology that existed well before the arrival of the white man in South Africa. The origin of a typical Portuguese cross, carved into an old leadwood tree along the S95 road just north of Letaba, remains shrouded in mystery. It may have been carved by the Portuguese explorer, Ferdinandes das Neves, during his expedition to the Soutpansberg in 1860-61.
Between 1836 and 1860, groups of Voortrekkers investigated various possible routes through the Lowveld to the Portuguese harbours in Mozambique in an effort to establish trade. The Voortrekkers were a group of Dutch-speaking colonists that left the Cape Colony during the 1830s in pursuit of their vision of political autonomy in the interior, far from British influence and administration. Pretoriuskop Camp lies near one of these trade routes, and takes its name from the nearby hill where Pretorius is buried.
The Portuguese pioneer, João Albasini was the first European trader and elephant hunter to settle in the Lowveld. Between 1845 and 1860, he established various trading posts along the routes between the harbours in Mozambique and the inland mines and centers of the ivory trade. It was Albasini that buried Willem Pretorius at the base of Pretoriuskop. The ruins of his homestead north of the rest camp have been partly rebuilt. Visitors may leave their vehicles and view the exhibit of old photographs and artifacts documenting daily life of the day.
The most famous character from the days of the transport rider, Jock of the Bushveld, a Staffordshire Bull Terrier cross, was immortalized in a book by his owner, Sir Percy FitzPatrick, who wrote about his exploits with Jock while working as a transport rider in the Lowveld in the late nineteenth century. Jock's birthplace where he was born in 1885 is marked along the Voortrekker Road, which runs south east of Pretoriuskop. Pretoriuskop Camp features prominently in the history of tourism in the Kruger Park as well, since it was the first rest camp to be opened to visitors.
The Wolhuter hut at Pretoriuskop Camp dates from 1930 and is one of the few original huts built in the Park to provide tourist acommodation. Though no longer in use, it is being meticulously restored to its original form.
Shingwedzi Camp is associated first and foremost with Elephant, the world's largest land mammal. Breeding herds of 50 to 60 animals are common in this region. During the 1970s and 1980s some of the Kruger National Park's biggest tuskers roamed the region. They were named the Magnificent Seven, and one, Shingwedzi who died near the rest camp in 1981, carried tusks which weighed in at 47 and 58 Kg respectively. His tusks as well as those of his fellow giants can be viewed at Letaba Rest Camp.
It still remains uncertain from whence the name Shingwedzi is derived, but it is believed that the early Tsonga named the rivers of this area after prominent local people. Shingwedzi is said to be a combination of Shing-xa-goli, the name of a prominent person and 'njwetse', which describes the sound of iron being rubbed together. | <urn:uuid:29781a32-03c5-45e2-8bd9-8d4377d94c35> | CC-MAIN-2013-20 | http://www.sanparks.org/forums/viewtopic.php?style=2&f=131&t=214&view=unread | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.974374 | 1,321 | 3.125 | 3 |
Students will be introduced to the challenges facing Latin American countries as they develop politically, economically and socially. The course considers alternative theoretical explanations for patterns of politics in the region, analyzes the role of different social and state actors and reviews contemporary political trends in a number of Latin American countries. Major contemporary issues that will be examined include the role of the military in politics, the possibilities for democracy in the region, the challenge of bringing human rights abusers to justice, and the causes and consequences of international issues such as the debt crisis and drug trafficking.
- Credits: 3
- Faculty: Dr. Kubal | <urn:uuid:656b8c66-bbdd-4d00-b3cb-aea6581527d1> | CC-MAIN-2013-20 | http://www.sbu.edu/academic_resources.aspx?id=5832 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.935807 | 121 | 2.53125 | 3 |
Devereux Hall, or Dev, as it is commonly known, takes the name of Nicholas Devereux, a land proprietor and one of the University's founders, who came to the United States from Ireland in 1806. He worked in Albany and moved to Utica to work with his brother John. In 1835, he acquired more than 400,000 acres of land at just less than a dollar an acre. The acreage is located in Cattaraugus County and includes the land where St. Bonaventure University is located.
Devereux was a devout Roman Catholic and, in 1854, he traveled to Rome to ask Franciscans to start a mission in Western New York. Four Friars accepted the offer and arrived a year later. In 1856 the cornerstone of the Monastery of St. Bonaventure College was laid and the College opened in 1858. It became the first Franciscan institution of higher learning in the United States.
Devereux Hall is the University’s second oldest building and St. Bonaventure's first residence hall. Construction was begun in 1926. Dev was designed in an “Italian Transitional” style typical of Franciscan monasteries in the 16th century. Dev has Harvard brick for the exterior and a red, Spanish tile on the roof.
Architect Chester Oakley, who designed Dev, believed that “a building should teach.” With that in mind, he added plaques of famous men around the outer walls, including St. Bonaventure, Alexander Hales, and Roger Bacon. This also included a student vote of the eight greatest Americans, including George Washington, Ben Franklin, and Abraham Lincoln. Other plaques include surrounding towns (Allegany, Olean, Bradford, Salamanca, among others) and the seven medieval arts (tonus, numerous, ratio, lingua, tropus, astra, and anglus).
On the east side of the building, there was a chapel, which was converted to Garrett Theater in 1961. Devereux Hall was completed in June of 1928, but the west wing did not exist. It was added in 1930 to house the seminarians who had to relocate after a major fire razed the Monastery and Chapel. Dev was the temporary house until the new Friary was built in Doyle Hall in 1961.
The original interior of Devereux Hall was in a brown and white color scheme, much different than the familiar dozen shades of green that Dev has today. Two parlors in the current west wing corner were there to greet family, friends and visitors. Each floor had a suite for prefects’ offices and living rooms and the east wing included the infirmary. On the second third and fourth floors, students could live in single or double rooms and each room had a large mahogany desk and dresser. From the 1930s to the 1950s, the fifth floor housed the football team.
After the friars moved to Doyle in 1961, the west wing lounges alternated as recreation and storage areas and attempts to convert the fifth floor into a lounge were unsuccessful. Today, Devereux Hall offers students single and double rooms, though without the mahogany furniture. Major renovations were done in the summer of 1999 and the carpeting was removed, and the shades of green were added.
Major renovations were done to Garrett Theater during the 1999-2000 academic year and the theater was rededicated on August 26, 2000.
Thank you to Megan O'Neill and Dennis Frank for providing information from the University Archives Web site. | <urn:uuid:e7ae78ee-3911-4a22-a0c5-ba21eb3b08ce> | CC-MAIN-2013-20 | http://www.sbu.edu/campus-life.aspx?id=7084 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.976609 | 741 | 2.609375 | 3 |
Say Aloha to the School Year — A Class Trip to Hawaii
- Grades: PreK–K, 1–2, 3–5
Our students are getting anxious, and they can tell the end of the school year is near. We decided that it was time to have some organized and academic fun. As soon as state testing ended, we packed our bags and took these kiddos to Hawaii.
Preparing for the Trip
We began by reading Junie B., First Grader: Aloha-ha-ha! In this story, Junie B. is taking a trip to Hawaii with her parents. When she leaves for her trip, her teacher gives her a photo journal and assigns her some homework. The first couple of chapters in this book are an excellent way to kick off the unit.
Prior to boarding the plane, students were given a suitcase template and asked to draw and label pictures of the items they would pack if they were going to Hawaii. While some students packed their bags, others visited the Room 13 Travel Agency to purchase their plane tickets with Aloha Airlines.
To board the flight, students were taken to our multipurpose room, where rows of chairs were set up in front of a large video screen. During the flight, the lovely flight attendants served drinks and pretzels from a rolling cart while students watched a video about Hawaii that we found on the Hawaii Tourism Authority site.
We contacted the Hawaii Visitors & Convention Bureau and asked for pamphlets, flyers, or any other information that they could send us. These came in very handy when the children were recording facts about the islands.
Each student was given a travel journal, which they used to record information about each of the islands, the state’s wildlife, and plant life. Each day we visited a different island, where we would learn a few facts about the island and then peek at things you can do for fun on the island.
Each student made their own beautiful lei with straws and paper flowers. The students wore their leis throughout the week. This was a fun, easy activity even our 1st graders could handle.
The Aloha State
Through various resources, we were able to gather information on the state quarter, flower, flag, and bird. We put together a packet with worksheets about each of these. Toward the end of the trip, students made a travel brochure. In this brochure they used the information they had learned about the state to encourage others to want to visit there.
What’s Hawaii Without a Luau?
At the end of our Hawaii studies, students were invited to our class luau. They wore Hawaiian attire, sunglasses, and leis as they gathered on their beach towels to enjoy the festivities.
A few parents helped us to run games at the luau. We could not have done this without the help of our parents.
Our travels to Hawaii were an excellent way for us to keep the kids motivated and focused during these last few days of the school year. What are some creative ways that you have managed to do the same? | <urn:uuid:ceeda4e4-477c-4cc6-a25c-977bc84fbe9a> | CC-MAIN-2013-20 | http://www.scholastic.com/teachers/classroom-solutions/2012/05/say-aloha-school-year-%E2%80%94-class-trip-hawaii | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.979776 | 639 | 3.109375 | 3 |
|Product #: TCR2077_TQ|
Word Family Activities: Long Vowels Grd K-1 (Resource Book Only) eBookKindergarten|Grade 1
Please Note: This ebook is a digital download, NOT a physical product. After purchase, you will be provided a one time link to download ebooks to your computer. Orders paid by PayPal require up to 8 business hours to verify payment and release electronic media. For immediate downloads, payment with credit card is required.
Encourage reading fluency with activities that emphasize word families. Each unit is composed of three parts: Part 1 introduces students to word families; Part 2 challenges their knowledge of word families through independent work; and Part 3 reviews the lessons to ensure students are able to read, write, and identify the word families.
Submit a review | <urn:uuid:c31ef0aa-d16a-421f-8bba-8c00f5c20b63> | CC-MAIN-2013-20 | http://www.schoodoodle.com/page_104267 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.904568 | 170 | 3.078125 | 3 |
“That’s not fair!” Parents and teachers hear this often. What children don’t always understand is that treating students fairly does not mean treating them all alike. Even adults sometimes say that fairness means everyone gets the same thing. Following that reasoning, if one person in the family gets a wheelchair, then everyone should get one. That, of course, is ridiculous! Only the one who needs a wheelchair gets one.
If a child in my classroom cannot read a test for herself, then I provide a way for her to have the test read to her. If another cannot write the answers, then I provide a way to have the answers written for him. The child does the thinking for himself, but a skill deficit or physical problem should not keep him from succeeding in my class. This is treating students fairly—giving them what they need.
On the other hand, if a child can read and write for herself, it would not be fair to read and write for her. She would not be getting to practice her reading and writing skills, nor would she continue to be independent.
I always need to teach about fairness versus equal treatment when it relates to accommodations in the classroom. A blog post by Richard Curwin, “Fair Isn’t Equal: Seven Classroom Tips,” discusses the concept as it relates to behavior management. One thing Dr. Curwin says in that blog is that you should teach the concept of fairness before you implement it, which is an excellent idea.
Next time you hear “That’s not fair!” use the opening to have an important talk about fairness. Ask “What would be fair?” and go from there!
More on this topic from Livia McCoy: Fairness Is Not Always What it Seems. | <urn:uuid:ee367146-df48-4ded-8c0e-c49f7f7a5000> | CC-MAIN-2013-20 | http://www.schoolfamily.com/blog/2012/11/01/fairness-doesnt-mean-treating-all-kids-the-same | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.96768 | 370 | 4.28125 | 4 |
This may just be the easiest, messiest, and most fun science activity I know. It is a classic, and I have gotten several requests recently to post directions. You should know that if you try this activity and you are not smiling and messy with corn starch goo at the end, then you are definitely doing something wrong. Also keep in mind that this is not just about fun, there is some pretty amazing science going on here.
You will need:
- Cornstarch (a 16 oz. box is good for every 2-3 participants – but more is always better)
- Food coloring (we always say it’s optional, but it does make it more fun – don’t use too much or you could end up with colored hands…and clothes…and curtains)
- A large bowl
- A camera – you’re probably going to want to take pictures.
Everyone should roll up their sleeves and prepare for some gooey fun.
- This is easy. Pour the cornstarch into the bowl. Don’t rush to add water – take time to feel the cornstarch. Cornstarch does not feel like any other powder. It has a texture that can be compared to that of whipped cream. The grains of cornstarch are so small that they will fill into grooves of your fingerprints and make the prints stand out.
- After you’ve taken-in the feel of the powder, it is time to add water. (You should add the food coloring to your water before adding it to the powder.) There are no exact formulas regarding how much water to add, but it will end up being about 1/2 cup (120 ml) of water per cup (235 ml) of cornstarch. The secret is to add the water slowly and mix as you add it. Don’t be shy here – dig in with your hands and really mix it up. This is usually when you notice that this is not your average liquid. Add enough water so that the mixture slowly flows on its own when mixed. The best test is to reach in and grab a handful of the mixture and see if you can roll it into a ball between your hands – if you stop rolling it and it “melts” between your fingers – success!
We’ll get the the science soon, for now just dig in and explore. Notice that the goo does not splash (or even move) if you hit it quickly. Squeeze it hard and see what happens. How long can you get the strands of goo to drip? What happens if you let the goo sit on the table for a minute and then try to pick it up? How does it feel? Hows does it move? Try bouncing a ball on the surface of the cornstarch. You get the idea – explore!
30 minutes later…
So now goo is everywhere and you’re thinking you should probably start cleaning. Actual clean up of the goo is a snap. A bucket of warm water will quickly get it off your hands. It will brush off of clothes when it dries, and it is easily cleaned off surfaces with a wet rag. Important: Make sure you do not dump the goo down the drain – it can get caught in the drain trap and take the joy out of your day of science. Dump it in the trash, or even mix it into soil in the garden.
Now for the science…
Our cornstarch goo (sometimes referred to as “oobleck” from the Dr. Suess book) is what scientists call a “Non-Newtonian” liquid. Basically, Sir Issac Newton stated individual liquids flow at consistent, predictable rates. As you likely discovered, cornstarch goo does NOT follow those rules – it can act almost like a solid, and them flow like a liquid. Technically speaking, the goo is a SUSPENSION, meaning that the grains of starch are not dissolved, they are just suspended and spread out in the water. If you let the goo sit for an while, the cornstarch would settle to the bottom of the bowl.
So why does this concoction act the way it does? Most of it has to do with pressure. The size, shape, and makeup of the cornstarch grains causes the cornstarch to “lock-up” and hold its shape when pressure is applied to it. People have filled small pools with oobleck and they are able to walk across the surface of it (as long as they move quickly.) As soon as they stop walking, they begin to sink.
I hope you get to try this out. Let us know how your day with non-newtonian liquids went. Comment here, or, even better, send us pictures to [email protected] . Have fun exploring! | <urn:uuid:71eacf2c-e3be-4f45-8ebc-a5ab625c2d0d> | CC-MAIN-2013-20 | http://www.sciencebob.com/blog/?tag=non-newtonian | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.950295 | 1,017 | 3.21875 | 3 |
Apr. 12, 1999 HOUGHTON, MI--Michigan Tech researchers have found a way to reduce the evolution of toxic gas from ferrosilicon.
Dr. Claudia Nassaralla and Dr. Richard Heckel, professors of metallurgical and materials engineering, spent four years studying the process that controls the development of phosphine gas in ferrosilicon.
"Ferrosilicon alloys are important materials for the steel industry because they are used as de-oxidants and alloying additions in the production of steels used in the manufacturing of transformers and electric motors" says Nassaralla. But when ferrosilicon alloys are exposed to water and water vapor during transportation to steel mills and prior to the steelmaking process, they evolve phosphine gas which smells like garlic and rotten fish and is toxic. Phosphine has been blamed for several accidents in the early 1900's, and at that time many people died from exposure to it. The most recent accident with fatalities was reported in 1997 in Japan. It occurred in a Chinese cargo ship transporting an inferior quality ferrosilicon.
The process that controls phosphine gas evolution in ferrosilicon is directly related to the presence of specific impurity phases in the alloys, Nassaralla says. The MTU team found a relationship between the evolution of phosphine gas and the presence of reactive phosphide forming elements in ferrosilicon---- especially aluminum, calcium, magnesium and phosphorus. They discovered that suppressing the formation of the reactive phosphide phases in ferrosilicon alloys can reduce the evolution of phosphine gas.
The MTU study has shown that "a chemically inactive phosphide phase can be formed by adding the appropriate alloying elements to the ferrosilicon alloy," Nassaralla explains. The MTU research team found that phosphine gas evolution can be dramatically reduced when sufficient amounts (10 percent or more) of magnesium are added.
Nassaralla believes that this technique "could have a significant economic impact for the producers and consumers of ferrosilicon alloys, as well as improve the safety of its handling and transportation."
The project is being funded by a grant from the Norwegian Ferroalloy Producers Research Organization.
Other social bookmarking and sharing tools:
The above story is reprinted from materials provided by Michigan Technological University.
Note: Materials may be edited for content and length. For further information, please contact the source cited above.
Note: If no author is given, the source is cited instead. | <urn:uuid:049f9cea-e5fd-449b-97c0-8d0a8b206bb3> | CC-MAIN-2013-20 | http://www.sciencedaily.com/releases/1999/04/990412074305.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.916076 | 519 | 3.140625 | 3 |
July 22, 2002 By studying gene mutations in patients with the complex set of behavioral and neurological symptoms that accompany Rett syndrome, Howard Hughes Medical Institute investigator Huda Zoghbi and her colleagues at Baylor College of Medicine have designed a mouse model that faithfully recapitulates the disease down to its distinctive hand-wringing behavior.
The development of the mouse, reported in the July 18, 2002 issue of the journal Neuron, provides a springboard into the study of Rett syndrome, the leading cause of mental retardation in girls.
First recognized as a syndrome in the 1980s, the disorder affects one in 10,000-15,000 girls. It is particularly devastating for families with affected children because infants are seemingly normal at birth and achieve the usual developmental milestones for the first few months of life. Then, as the infant reaches toddlerhood, a sudden and dramatic decline in physical and mental capabilities takes hold, accompanied by onset of seizures, irregular breathing, awkward gait, and hand-wringing.
"I know of no other neurological disease that gives this distinctive stereotypic behavior -- this hand-wringing these girls do basically all the time they are awake," said Zoghbi. "With this mouse model we can now ask, 'Why is that?'"
Zoghbi has been studying Rett syndrome since the mid-1980s, when she first encountered patients with the disorder as a neurology fellow and decided to search for the gene responsible for the disorder. She reasoned that the gene must be on the X chromosome, the female sex chromosome, and it must also be essential because there had been no males reported to have the syndrome. (Since males have only one X chromosome, mutations that knock out the gene's function could be lethal at an embryonic stage.) In females, there are two copies of the X chromosome, but in each cell only one of the two X chromosomes is active. The scientists reasoned that if enough cells are "normal," they can compensate for the mutated gene.
After 14 years of searching, a scientist in Zoghbi's lab found that a gene called MECP2 was mutated in the Rett Syndrome patients they studied. Earlier research suggested that the MeCP2 protein was responsible for making sure that genes the cell has marked with a molecular tag, called a methyl group, are silenced. The MeCP2 protein latches on to these methyl groups and prevents them from being translated into protein.
How MeCP2's molecular role translates into a neurological disorder is still not clear. Ever since a diagnostic test for the gene mutation was developed, however, there has been a flood of new information about the prevalence of the disorder. This information reveals that mutations in the MECP2 gene can take a wide variety of forms.
"We now know of cases of classic autism and schizophrenia that are caused by mutations in this gene," said Zoghbi. "The clinical spectrum is so broad that we don't know the true prevalence of this mutation." She estimates that the mutation may be twice as common as is currently thought, with perhaps one in 10,000 children affected.
What is clear so far is that the MECP2 gene, which resides at the end of the long arm of the human and mouse X chromosome, plays a vital role in fine-tuning the developing nervous system during a crucial stage when infants are learning to sit up, walk, and begin language acquisition, said Zoghbi.
To understand the molecular details of what goes wrong, the scientists first needed to create a mouse model of the disorder. The first attempt at a mouse model, in which the MECP2 gene was deleted completely, resulted in severe disease and early death. Zoghbi and her colleagues sought to create a model that would more closely mimic the progression of the human disorder. So, they studied the various mutations that had been found in patients to design a mutant mouse that would produce a partially functional protein. The result was a mouse that mimics many of the aspects of the disease observed in humans.
Using the mouse model, the scientists will probe how the MeCP2 protein affects brain function at a crucial developmental stage. "The second part of the story is really in discovering what this protein is doing in the brain," said Zoghbi. "It may be that at a certain developmental stage, the brain suddenly requires the function of this protein. In humans, by birth a lot of the hardwiring has already happened. Infancy is a critical time as life experiences refine synaptic function and strengthen synapses. Experiences fine tune the brain. Perhaps more complex tasks require the input of this protein and its loss is now instrumental. Things fall apart and people regress. Perhaps key genes that are important at certain times are not put in place. We don't know the mechanism but having this mouse model will allow us to ask these questions."
Zoghbi is hopeful that studying the mouse model will also have implications for treatment of patients diagnosed with Rett Syndrome.
"As development progresses, what we encounter -- our experiences -- may also change how the brain responds. This may account for individual variation in disease severity," she said. "It may be that enrichment of the environment or exposure to certain stimuli may give affected children more milestones. I could envision that with interventional studies in mice, we may identify pathways that could lead to behavioral or pharmacological approaches that may provide at least symptomatic relief."
Other social bookmarking and sharing tools:
Note: Materials may be edited for content and length. For further information, please contact the source cited above.
Note: If no author is given, the source is cited instead. | <urn:uuid:81dd4256-cfbb-4f10-ac10-389f747c2cbe> | CC-MAIN-2013-20 | http://www.sciencedaily.com/releases/2002/07/020722073307.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.964429 | 1,151 | 3.515625 | 4 |
Mar. 25, 2003 A gene associated with red hair and fair skin may also be responsible for how females respond to painkillers, according to a study conducted by lead researcher Jeffrey Mogil, a McGill University psychology professor, and collaborators in the United States. Results of their study are to be released today in Proceedings of the National Academy of Sciences of the USA (article #03-0053).
“While we believe pain is the same in all women of all hair colours,” explained Mogil, “our study shows women with red hair respond better to the pain-killing drug we tested than anyone else -- including men.”
Previous research suggested the existence of a female-specific pain pathway in the brain. Analgesics that target receptors in this pathway, called kappa-opioid receptors, have been reported to work only in women. Using a technique called quantitative trait locus mapping, Mogil and his colleagues identified a candidate gene that may be responsible for this sex difference. Interestingly, the gene, called Mc1r, was first associated, not with neurological function, but with pigmentation. Variants of the gene cause red hair and fair skin in humans.
Redheads and painkillers
The scientists tested the effects of the kappa -specific analgesic on mutant mice with an inactive variation of Mc1r analogous to the "redhead" variation in humans. Although typical sex differences in analgesic effects were seen in normal mice, these differences disappeared in the mutants. The researchers then tested a clinically used kappa analgesic, pentazocine, on male and female humans with several Mc1r variations causing different hair colors and skin types. The Mc1r variations did not affect analgesic response to pentazocine in men, but caused a heightened response in redheaded, fair-skinned women. These results suggest that Mc1r modulates a kappa-specific pain pathway only in females.
Authors: "The Melanocortin-1 Receptor Gene Mediates Female-Specific Mechanisms of Analgesia in Mice and Humans," by Jeffrey S. Mogil, Sonya G. Wilson, Elissa J. Chesler, Andrew L. Rankin, Kumar V. S. Nemmani, William R. Lariviere, M. Kristina Groce, Margaret R. Wallace, Lee Kaplan, Roland Staud, Timothy J. Ness, Toni L. Glover, Magda Stankova, Alexander Mayorov, Victor J. Hruby, Judith E. Grisel and Roger B. Fillingim.
Jeffrey Mogil , the E.P. Taylor Professor of Pain Studies at McGill, is a repatriated Canadian who was recruited from the University of Illinois at Urbana-Champaign, where he first identified sex-specific genetic circuitry that governs the way males and females respond to pain. More generally, Mogil has been examining the genetic and environmental influences that combine to govern reactions to pain. At a minimum, pinpointing relevant genes can help doctors tailor dosages of drugs to each patient’s needs. At best, Mogil’s work may lead to new drugs providing life-saving pain relief.
Other social bookmarking and sharing tools:
The above story is reprinted from materials provided by McGill University.
Note: Materials may be edited for content and length. For further information, please contact the source cited above.
Note: If no author is given, the source is cited instead. | <urn:uuid:3afef8f2-558c-4959-abae-66bd31185a14> | CC-MAIN-2013-20 | http://www.sciencedaily.com/releases/2003/03/030325071528.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.916174 | 716 | 2.59375 | 3 |
Nov. 18, 2004 PITTSBURGH -- While on a geology class trip, an undergraduate student at the University of Pittsburgh came across a previously unknown genus and species of a 300-million-year-old amphibian. Now he is reveling in the international attention he is getting for his discovery.
Adam Striegel, a Pitt senior liberal studies major from White Oak, Pa., found a fossilized skull of an ancient meat-eating amphibian with a vicious set of teeth. The fossil is only the third 300-million-year-old amphibian skull ever found in the world, according to David Berman, curator of vertebrate paleontology at Pittsburgh’s Carnegie Museum of Natural History.
“In all my life, I’ve never found anything nearly as nice, and I’ve never seen anyone else find anything nearly as nice,” said his instructor, Charles Jones, lecturer and undergraduate advisor in Pitt’s Department of Geology and Planetary Science, who last March led his class on a field trip to a newly cut road near the Pittsburgh International Airport. As Jones pointed out the different layers and types of rock that revealed the area’s history, he told his students to look for other clues to the environmental characteristics of the region as well, like plant fossils.
Striegel picked up a rock about the size of a grapefruit on which he thought he saw the imprint of a fern and showed it to Jones. Inspecting the rock, Jones immediately knew that what Striegel had thought were fern fronds was actually a double row of jagged teeth—and the rock was actually a skull. “I knew at that moment that this would be the nicest vertebrate fossil that I would probably ever touch,” said Jones.
In May, Jones and Striegel took the fossil to the Carnegie Museum of Natural History. “The paleontologists were all very enthusiastic, jumping up and down and doing back flips because it’s just such a solid fossil—so well preserved, so uncrushed,” said Jones.
Coincidentally, Berman had discovered one of the only other two such amphibian skulls of that age 20 years ago in New Mexico; the other was found in Kansas.
“I was quite startled, mainly because it’s so nicely preserved—it’s almost perfectly preserved,” said Berman. “It’s missing a few parts, probably only because it was broken off a complete skeleton.”
Scientists from the museum went back and searched the area where Striegel had found the fossil, hoping to find the rest of the amphibian’s body, but they didn’t find it. “We’ll do it again in the spring, when the vegetation’s down,” said Berman. “I hate to think that we left the rest of the animal in the roadside.”
Striegel agreed to donate the fossil to the museum. After the museum’s scientists finish preparing it and publish their findings, either the genus or the species will likely be named “Striegeli.”
Striegel will receive a cast of the fossil. He intends to keep it on his desk when he becomes an elementary school teacher. “I would use it as a way to get the students interested when we get to fossils,” he says. “I think some kids would find it really interesting that there’s a whole species [and genus] named after their teacher.”
Until then, though, he’s still a college student, enjoying his 15 minutes of fame.
“I’m ecstatic,” he says, beaming. “I love it. It’s great. I think it’s the coolest thing that ever happened to me.”
Other social bookmarking and sharing tools:
Note: If no author is given, the source is cited instead. | <urn:uuid:127028a3-7297-4204-8861-dfe5cd3eefd1> | CC-MAIN-2013-20 | http://www.sciencedaily.com/releases/2004/11/041117001144.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.97042 | 833 | 3.25 | 3 |
May 22, 2007 An "electronic nose" may one day be used to diagnose asthma, say researchers who are presenting a preliminary study of the device at the American Thoracic Society 2007 International Conference, on Monday, May 21.
The device contains chemical vapor sensors that react to the presence of volatile organic compounds, or VOCs, in a person's exhaled breath. "A person's breath contains a mixture of thousands of VOCs that may be used as markers of lung disease," says researcher Silvano Dragonieri, M.D., of Leiden University Medical Center in the Netherlands.
The electronic nose is a newer version of a sensor that has been used in the food, wine and perfume industries. It is also being used as an aid against terrorism, to sniff out explosives or toxic chemicals in the air.
An electronic nose responds to a given odor by generating a pattern, or "smell print," which is analyzed and compared with stored patterns. An electronic nose has been developed that can diagnose respiratory infections such as pneumonia by comparing smell prints from the breath of a sick patient with those of patients with standardized readings. It is also being studied as a diagnostic tool for lung cancer.
In the new study, the researchers compared the "smell prints" of 20 people with diagnosed asthma (half with severe asthma and half with mild disease) and 20 people without asthma to see if the electronic nose could classify them as asthmatic or non-asthmatic. The subjects breathed into a face mask attached to a bag connected to the electronic nose.
The nose was able to detect which smell prints came from people with asthma, but was less accurate in classifying how severe a person's asthma was. "The asthmatic patients in this study already had been diagnosed with asthma," Dr. Dragonieri says. "The next step is to see whether the nose can diagnose new patients with asthma. It's still a futuristic device--one day different electronic noses may be built to detect specific diseases."
"An Electronic Nose in the Classification of Asthma" (Session B96; Abstract # 2470)
Other social bookmarking and sharing tools:
Note: If no author is given, the source is cited instead. | <urn:uuid:2446303b-4dfe-45f2-a6e7-1da18bf04cfe> | CC-MAIN-2013-20 | http://www.sciencedaily.com/releases/2007/05/070521171646.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.956799 | 454 | 3.40625 | 3 |
Jan. 27, 2013 Most patients with an inherited heart condition known as arrhythmogenic right ventricular dysplasia/cardiomyopathy (ARVD/C) don't know they have a problem until they're in their early 20s. The lack of symptoms at younger ages makes it very difficult for researchers to study how ARVD/C evolves or to develop treatments. A new stem cell-based technology created by 2012 Nobel Prize winner Shinya Yamanaka, M.D., Ph.D., helps solve this problem. With this technology, researchers can generate heart muscle cells from a patient's own skin cells. However, these newly made heart cells are mostly immature. That raises questions about whether or not they can be used to mimic a disease that occurs in adulthood.
In a paper published January 27 in Nature, researchers at Sanford-Burnham Medical Research Institute and Johns Hopkins University unveil the first maturation-based "disease in a dish" model for ARVD/C. The model was created using Yamanaka's technology and a new method to mimic maturity by making the cells' metabolism more like that in adult hearts. For that reason, this model is likely more relevant to human ARVD/C than other models and therefore better suited for studying the disease and testing new treatments.
"It's tough to demonstrate that a disease-in-a-dish model is clinically relevant for an adult-onset disease. But we made a key finding here -- we can recapitulate the defects in this disease only when we induce adult-like metabolism. This is an important breakthrough considering that ARVD/C symptoms usually don't arise until young adulthood. Yet the stem cells we're working with are embryonic in nature," said Huei-Sheng Vincent Chen, M.D., Ph.D., associate professor at Sanford-Burnham and senior author of the study.
To establish this model, Chen teamed up with expert ARVD/C cardiologists Daniel Judge, M.D., Joseph Marine, M.D., and Hugh Calkins, M.D., at Johns Hopkins University. Johns Hopkins is home to one of the largest ARVD/C patient registries in the world.
"There is currently no treatment to prevent progression of ARVD/C, a rare disorder that preferentially affects athletes. With this new model, we hope we are now on a path to develop better therapies for this life-threatening disease," said Judge, associate professor and medical director of the Center for Inherited Heart Disease at the Johns Hopkins University School of Medicine.
Disease in a dish
To recreate a person's own unique ARVD/C in the lab, the team first obtained skin samples from ARVD/C patients with certain mutations believed to be involved in the disease. Next they performed Yamanaka's technique: adding a few molecules that dial back the developmental clock on these adult skin cells, producing embryonic-like induced pluripotent stem cells (iPSCs). The researchers then coaxed the iPSCs into producing an unlimited supply of patient-specific heart muscle cells. These heart cells were largely embryonic in nature, but carried along the original patient's genetic mutations.
However, for nearly a year, no matter what they tried, the team couldn't get their ARVD/C heart muscle cells to show any signs of the disease. Without actual signs of adult-onset ARVD/C, these young, patient-specific heart muscle cells were no use for studying the disease or testing new therapeutic drugs.
Speeding up time
Eventually, the team experienced the big "aha!" moment they'd been looking for. They discovered that metabolic maturity is the key to inducing signs of ARVD/C, an adult disease, in their embryonic-like cells. Human fetal heart muscle cells use glucose (sugar) as their primary source of energy. In contrast, adult heart muscle cells prefer using fat for energy production. So Chen's team applied several cocktails to trigger this shift to adult metabolism in their model.
After more trial and error, they discovered that metabolic malfunction is at the core of ARVD/C disease. Moreover, Chen's team tracked down the final piece of puzzle to make patient-specific heart muscle cells behave like sick ARVD/C hearts: the abnormal over-activation of a protein called PPAR. Scientists previously attributed ARVD/C to a problem in weakened connections between heart muscle cells, which occur only in half of the ARVD/C patients. With the newly established model, they not only replicated this adult-onset disease in a dish, but also presented new potential drug targets for treating ARVD/C.
Chen's team was recently awarded a new grant from the California Institute for Regenerative Medicine to create additional iPSC-based ARVD/C models. With more ARVD/C models, they will determine whether or not all (or at least most) patients develop the disease via the same metabolic defects discovered in this current study.
Together with the Johns Hopkins team, Chen also hopes to conduct preclinical studies to find a new therapy for this deadly heart condition.
Other social bookmarking and sharing tools:
- Changsung Kim, Johnson Wong, Jianyan Wen, Shirong Wang, Cheng Wang, Sean Spiering, Natalia G. Kan, Sonia Forcales, Pier Lorenzo Puri, Teresa C. Leone, Joseph E. Marine, Hugh Calkins, Daniel P. Kelly, Daniel P. Judge, Huei-Sheng Vincent Chen. Studying arrhythmogenic right ventricular dysplasia with patient-specific iPSCs. Nature, 2013; DOI: 10.1038/nature11799
Note: If no author is given, the source is cited instead. | <urn:uuid:75122ff4-febb-47ec-9715-c5197a7be6d2> | CC-MAIN-2013-20 | http://www.sciencedaily.com/releases/2013/01/130127134201.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.926384 | 1,182 | 2.75 | 3 |
Jan. 30, 2013 A cluster of tapeworm eggs discovered in 270-million-year-old fossilized shark feces suggests that intestinal parasites in vertebrates are much older than previously known, according to research published Jan. 30 in the open access journal PLOS ONE by Paula Dentzien-Dias and colleagues from the Federal University of Rio Grande, Brazil.
Remains of such parasites in vertebrates from this era are rare- of 500 samples examined, only one revealed the tapeworm eggs. This particular discovery helps establish a timeline for the evolution of present-day parasitic tapeworms that occur in foods like pork, fish and beef.
The fossilized eggs were found in a cluster very similar to those laid by modern tapeworms. Some of them are un-hatched and one contains what appears to be a developing larva. According to the study, "This discovery shows that the fossil record of vertebrate intestinal parasites is much older than was previously known and occurred at least 270-300 million years ago."
The fossil described in this study is from Middle-Late Permian times, a period followed by the largest mass extinction known, when nearly 90% of marine species and 70% of terrestrial species died out.
Financial support was provided by the Conselho Nacional de Desenvolvimento Cientıfico e Tecnologico -- Brazil (CNPq) through a study grant (PCD-D, AEQF and BH) and the Project 478914/2006-7 (Edital MCT/CNPq 02/2006 -- Universal). This work was also partially funded by the Conselho Nacional de Desenvolvimento Cientıfico e Tecnologico through scholarships granted to AEQF, BH and CLS.
Other social bookmarking and sharing tools:
The above story is reprinted from materials provided by Public Library of Science.
- Paula C. Dentzien-Dias, George Poinar, Ana Emilia Q. de Figueiredo, Ana Carolina L. Pacheco, Bruno L. D. Horn, Cesar L. Schultz. Tapeworm Eggs in a 270 Million-Year-Old Shark Coprolite. PLoS ONE, 2013; 8 (1): e55007 DOI: 10.1371/journal.pone.0055007
Note: If no author is given, the source is cited instead. | <urn:uuid:c8fbeb56-9b73-4266-975a-0375908bf788> | CC-MAIN-2013-20 | http://www.sciencedaily.com/releases/2013/01/130130184200.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.922423 | 508 | 3.234375 | 3 |
Electrons rule our world, but not so long ago they were only an idea. This month marks the 120th anniversary of a profound and influential creation, the electron theory of Dutch physicist Hendrik Antoon Lorentz. His electron was not merely a hypothesized elementary particle; it was the linchpin of an ambitious theory of nature. Today physicists are accustomed to the notion that a complete description of nature can rise out of simple, beautiful equations, yet prior to Lorentz that was a mystic vision.
For most physicists the memorable peak of 19th-century physics is the theory of electrical and magnetic fields, capped by James Clerk Maxwell’s mathematical synthesis of 1864. Then a haze settles, until the 20th-century massifs of relativity and quantum theory poke through. That foggy folk history obscures the bridge between—itself a brilliant achievement, built through heroic labor.
To set the context, it is important to admit a blasphemy: Maxwell’s own exposition of his equations is a mess. You will not find, in his writings, the clean, compact, elegant structure that students learn as “Maxwell’s equations.” Instead you discover a torrent of symbols and a sprawl of words and equations. Maxwell, a profoundly humble man, did not consider that he was producing poetry for the ages, suitable for engraving. Rather he simply set out to summarize, in mathematical form, everything then known about electricity and magnetism. In his presentation, fundamental equations mingle with makeshift phenomenology.
Lorentz’s achievement was to purify the message of Maxwell’s equations—to separate the signal from the noise. The signal: four equations that govern how electrical and magnetic fields respond to electric charge and its motion, plus one equation that specifies the force those fields exert on charge. The noise: everything else!
Now one had definite equations for the behavior of tiny bodies with specified mass and charge. Could one use those equations to rebuild the description of matter on a new foundation, starting from idealized “atoms” of charge? This was the burden of Lorentz’s electron theory. Starting with his 1892 paper, Lorentz and his followers used the electron theory to explain one property of matter after another—conduction of electricity and of heat, dielectric behavior, reflection and refraction of light, and more. Thus, they laid the groundwork for the subjects we now call electronics and materials science. And in 1897 Joseph John Thomson showed experimentally that electrons really do exist. (One could say that the electron was conceived in 1892 and delivered in 1897.)
Much of Lorentz’s 1892 paper deals with the seductive, though not unproblematic, idea that the mass of electrons could be a consequence of their electric charge. Moving charge generates both electrical and magnetic fields, which resist change and back-react on the electron’s motion. Might that back-reaction account for the electron’s inertia—hence its mass? Such ideas have an ancient history: Aristotle wanted to account for the inertia of matter through the back-reaction of air. Lorentz’s vision of electromagnetic mass was immensely influential. It inspired hard technical work, notably by Lorentz himself and by Henri Poincaré, that anticipated major parts of Einstein’s special theory of relativity.
Quantum mechanics changed the rules of the game, and the idea that electromagnetic back-reaction alone is responsible for the mass of the electron no longer appears viable. Remarkably, however, my colleagues and I have successfully explained the mass of protons, neutrons and other strongly interacting particles using a closely related idea. The inertia of those particles arises from back-reaction of the gluon fields of electromagnetism’s big brother, quantum chromodynamics. Although the Higgs particle is sometimes credited with giving matter mass, its contribution to the mass of ordinary matter is actually quite small. Lorentz’s beautiful idea, in modern form, accounts for most of it. | <urn:uuid:ece97a86-fdfe-422e-a4e0-5e2808f8078b> | CC-MAIN-2013-20 | http://www.scientificamerican.com/article.cfm?id=happy-birthday-electron | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.938928 | 842 | 3.515625 | 4 |
Right to Bear Arms
Azure, a Bend d'Or'
Carminow v. Scrope
The coat of arms suit of Carminow v. Scrope occured some time in the reign of Edward III. This was the first Scrope suit that was heard and decided. The records of this first suit have been lost except for what little was recorded in the depositions from the second Scrope coat of arms lawsuit.
At the time of the coats of arms suit, Richard Le Scrope was an important member of Edward III's court, the Chancellor of the Exchequer, while William Carminow was Sheriff of Cornwall. Scrope and Carminow were both with the king when he went to Paris, and Carminow noticed that Scrope was using nearly the same coat of arms as he was, which was Azure, a Bend Or. He sued Scrope in a tribunal in which the Lord Constable, but not the Earl Marshal, was present.
In this case witnesses were called by both parties to testify that their party, their relatives, and their ancestors had used that coat of arms without let or hindrance. This was done in a fashion similar to the heraldic visitations which were, at that time, decades away: ancient documents were brought forth, and eyewitness accounts of present use and testimonies of use on monuments were recorded. Scrope claimed that the coat of arms had been his family's since the Conquest, while Carminow put forth a claim that the coat of arms had been his family's by a lost grant from King Arthur.
The final outcome of the court's decision is unclear since the records have been lost. One version has Scrope receiving sole rights to the coat of arms, and Carminow was required to difference the coat of arms by adding a label gules to the coat, much like a cadency mark. In a visitation record, Carminow appears to have the label on his coat of arms. However, a problem arises if one examines the rolls of coats of arms made by a herald during the reign of Edward III, before the suit: Carminow is listed as having the label on his coat of arms.
It is possible then that Carminow, and his ancestors, always used the coat of arms with the label. Carminow saw Scrope's coat of arms, which, aside from the label, was identical to his, and sued Scrope. The suit went to court, and the court decided that the label was a sufficient mark of distinction, either in spite of, or perhaps because of, the label's use in cadency.
In 1385, after Carminow v. Scrope had exited the Court of the Constable and the Marshal, Scrope was in the court once more. This time, he decided to sue Robert Grosvenor. Scrope vs. Grosvenor, was heard in the Earl Marshal's Court in the late fourteenth century. The Earl Marshal's Court was (and is) by statute the proper English venue for a dispute over the ownership of a coat of arms.
Scrope had encountered Grosvenor when Richard II called his forces for a campaign into Scotland. Grosvenor seems to have had an earlier run-in with a Carminow relative, too, but all the reports we have of it are even vaguer than those of Carminow v. Scrope.
The Scropes and the Grosvenors were both large and powerful families in fourteenth century England, one in Yorkshire, the other in the Welsh Marches. Of the two, the Scropes were by far the more important, as there is at least one mediaeval Archbishop of York who came from that family. During one of Richard II's campaigns into Scotland, Robert Grosvenor and Richard Scrope were called to arms, and each noticed that the other was bearing the same coat of arms as he: Azure, a bend Or. Each demanded that the other cease and desist from using the coat of arms.
The Grosvenors, though not in the same league as the Scropes, were too important to be ignored. They were stubborn, to boot: the suit in the Earl Marshal's Court stretched on for five years, with dozens of depositions given by adherents of both families. Eventually, however, the Scropes won out, probably because they could muster royal witnesses (John of Gaunt, for example), and the Grosvenors could not. The court, still leery of the Grosvenors' influence, decided to make Robert Grosvenor add a bordure Argent to the coat of arms.
Sir Richard Le Scrope, Chief Justice of The Kings Bench, Chief Justice of The Common Pleas, fought in every major campaign between 1346 and 1384, when he challenged Robert Grosvenor to his right to bear the Arms 'Azure, a Bend d'Or'. In 1385, a General Proclamation was made throughout the host that all who were interested in the dispute should appear on 20th of August at Newcastle on Tyne. The case took four years to be determined and judgement was given in Westminster Hall, in favour of Scrope. Many of the most interesting and powerful persons of the land gave evidence, including John of Gaunt and Owen Glendower.
The same sort of procedure for evidence gathering was initiated, and much the same sort of evidence was gathered. In fact, many of Scrope's witnesses against Grosvenor were the same people who helped him against Carminow. Although Grosvenor was also a prominent man of the realm, he could not muster the quality and quantity of witnesses that Scrope could, and the court decided to Scrope once more, and ordered Grosvenor to place a bordure Argent around the coat of arms which they once shared.
Grosvenor appealed the decision, because, like the label, the bordure was a sign of cadency or relatedness. Also, some relatives of Richard le Scrope used coats of arms with bordures, and Grosvenor would naturally have wanted to avoid getting dragged into court again. The appeal to the throne was accepted by Richard IIl. The case appeared before the king on appeal, and the king modified the court's decision in 1390. After hearing still more arguments from both parties, he decided that the bordure was not enough to difference between strangers in blood, since it was in use to difference between cousins. Richard II bade Grosvenor to change his coat of arms to reflect the royal will. Grosvenor chose a completely different coat of arms: Azure, a garb (wheatsheaf) Or. Instead of making Grosvenor adopt the court's coat of arms, he made Grosvenor adopt a new, totally different coat of arms. Grosvenor, a native of Cheshire, adopted a coat of arms similar to that of the old Earls of Cheshire: Azure, a Garb (a wheatsheaf) Or.
This site was last updated
Sunday, May 29, 2005 01:52 PM. | <urn:uuid:41cadc85-ae0a-41c6-8bed-29c030403dd7> | CC-MAIN-2013-20 | http://www.scroope.net/ancestors/coatofarms/azureabendor.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.98368 | 1,501 | 2.6875 | 3 |
The U.S. Flag Code
Flags Of The World
CIA World Factbook
Flag placement can be a particularly sensitive issue. These symbols of respect
warrant detailed attention in order to avoid an embarrassing situation due to an
improperly flown flag. If you are going to fly a foreign flag at a business meeting
or formal gathering, be certain you are flying an up-to-date flag and make sure
you know how it should be flown. Do your homework. Be careful with certain flags,
particularly the Union Jack (the United Kingdom’s flag) and the Panamanian flag.
It is very easy to accidentally fly these flags upside down, which is a sign of
distress at sea and a clear affront to your guests. Refer to the resources listed
at the end of this section for additional guidance.
Did you know?
The positions of honor in displaying flags are:
- U.S. flag either to the observer’s extreme left or the highest point in the grouping
of flags followed by the flag or flags of other nations in alphabetical order.
- Then, the N.C. flag, followed by the flags of any other states in order by ratification
date of the U.S. Constitution or date of admission to the Union.
- Any county or city flags would follow the state flags.
If flags of two or more nations are displayed, they should be flags
of equal size flown from separate staffs at the same height.
The American Legion)
When a number of flags of States and localities are grouped and displayed from separate
staffs grouped around a central point, the flags should be displayed as follows:
The U.S. flag should be at the center and at the highest point of the grouping.
Any foreign country’s flag would then take the next place of honor (observer’s extreme
left). If there is no foreign flag, then the N.C. flag would take the place of honor
to the observer’s extreme left.
On a halyard, the U.S. flag always sits atop those flags of States, cities, or localities.
When placed at or near a speaker’s podium, the U.S. flag should receive the place
of superior prominence to the speaker’s right as he/she faces the audience. Any
other flags should be to the speaker’s left or to the right of the audience.
Exception: When flags are not placed within the section designated
as the chancel or speaker’s area (i.e. in the front of an auditorium, but at the
audience level), the national flag should be placed in the position of honor to
the right of the audience, with any other flag at the left.
Flag Protocol Resources
Web Sites –
The U.S. Flag Code; Title 36, U.S.C., Chapter 10 can be found at
or at http://www.halfstaff.com/flagcode.htm.
Flags of the World includes more than 5800 pages about flags and more than 10,800
images of flags and can be found at http://www.crwflags.com/fotw/flags/
The CIA World Factbook is produced by the CIA's Directorate of Intelligence. The
Factbook is a comprehensive resource of facts and statistics on more than 250 countries
and other entities and includes images of each country’s flag. It can be found at
Protocol – The Complete Handbook of Diplomatic, Official, and Social Usage.
McCaffree, Mary Jane and Innis, Pauline. Devon Publishing Co. 1997. Pp. 351-379.
Practical Protocol for Floridians. Morris, Allen. Revised 5th Edition.
1993. Pp. 104-113 | <urn:uuid:ba1b4ad2-fd40-40de-af5e-b561dbf7a109> | CC-MAIN-2013-20 | http://www.secretary.state.nc.us/international/flagpro.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.82354 | 806 | 2.96875 | 3 |
On May 26, 1913, newly inaugurated President Woodrow Wilson warned the nation of the "extraordinary exertions" that lobbyists were making to kill his tariff reform legislation. Washington, he observed, "has seldom seen so numerous, so industrious, or so insidious a lobby. It is of serious interest to the country that the people at large should have no lobby and be voiceless in these matters, while great bodies of astute men seek to create an artificial opinion and to overcome the interests of the public for their private profit."
For the first time in 18 years, Democrats controlled both houses of Congress and the White House. President Wilson had made tariff reduction his top legislative priority. When the House easily approved the administration's bill, opponents believed they could stop it in the Senate, where Democrats held only a three-vote majority. This triggered the fierce lobbying campaign that so alarmed the president.
Within a week of the president's warning, on June 2, 1913, the Senate launched a formal investigation of the president's charges, instructing the Judiciary Committee "to report within ten days the names of all lobbyists attempting to influence such pending legislation and the methods which they have employed to accomplish their ends."
In its first twentieth-century step toward public financial disclosure, the Senate required all of its members to explain under oath whether they had assets that might benefit from passage of any currently pending legislation. For six days, from morning to late evening, senators in groups of four paraded before a special Judiciary subcommittee to answer 11 prearranged questions. Humor and irony enriched their responses as members denied any dealings with "insidious" lobbyists. While the subcommittee struggled to define a "lobbyist," insidious or otherwise, Republicans joked that they had found one in President Wilson. Why not subpoena him to explain rumors that he planned to deny presidential patronage to Democrats who voted against the administration?
Proving that there is nothing so easy to start, or so difficult to end, as a congressional investigation, the "lobby committee" moved quickly from media frenzy to quiet obscurity, as it shifted its attention from 96 senators to scores of lobbyists in the weeks ahead. Although no "improper influences" were discovered, by temporarily weakening lobbying pressures on senators, this unique investigation gave Woodrow Wilson his first important legislative victory when Congress enacted the lower tariff rates he had championed. | <urn:uuid:c7e36c76-69bf-42fd-9395-caaec8257b30> | CC-MAIN-2013-20 | http://www.senate.gov/artandhistory/history/minute/Senators_Disclose_Finances.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.967777 | 476 | 2.921875 | 3 |
Buffalo, lions, and elands! Oh, my! This story is an all-out zoo, and each animal has its own set of associations, especially in comparison to their human counterparts.
Such remarks as Margot Macomber's back-handed reference to those "big cowy things that jump like hares" (1.91) are actually meant to represent the characteristics of the humans in the story – in this case, her husband, who is downright skittish. Elsewhere, Macomber confesses to Wilson that in facing the lion, "I bolted like a rabbit" (1.66). Yep, still skittish. If nothing else, the reference turns Macomber into the prey half of the prey-predator opposition – and rightly so.
Eventually, though, Macomber earns his manhood, which puts a stop to those unfortunate bunny-comparisons. Nevertheless, his newfound manhood does not last long though, and as he lies there, dead at his wife's hand, we can't help but compare him to the animal that lies dead next to him – the buffalo he killed. Really, Macomber, who came out on top in this scenario?
But Macomber also has his predator qualities, which Hemingway suggests through his associations with the lion. The rage and hatred Macomber felt earlier toward Wilson resembles the lion's hatred, "his big yellow eyes, narrowed with hate, looked straight ahead, only blinking when the pain came as he breathed […]" (3.15). Also, like the lion, Macomber experiences sickness in his stomach. Such parallels may align Macomber with the lion – a fierce animal, no doubt about it – but also with the prey to hunters. They are both shot and killed.
While animals may at first seem like not much more than the object of the hunt, in the end, we realize that there aren't many real differences between these animals and their human hunters, Macomber in particular. | <urn:uuid:2f4466b4-ca77-4c5b-a9e6-896de0cc2589> | CC-MAIN-2013-20 | http://www.shmoop.com/francis-macomber/animals-symbol.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.973463 | 414 | 2.609375 | 3 |
As we've said in "Reading the story allegorically," the penal colony itself is often read as an allegory. If you do that, you'll read the whole story as an allegory. And you can do that in multiple ways. We've already described how Austin Warren read the penal colony as "the world full of sinners."
Another way to read it is a quite different interpretation of the colony as a "totalitarian society" – think the USSR, Nazi Germany, or the world of 1984. As in a totalitarian society, the people inside the penal colony are kept under tight control by brutal methods of torture. As in a totalitarian society, too, there's no real justice, though there's supposed to be – you can be sentenced without trial or defense. There's also that way in which totalitarian societies tend to make their leaders into godlike figures, worthy of reverence: just like the old Commandant. In that reading, the officer himself becomes a victim of brainwashing, and the explorer is right to be horrified.
This reading is a bit less of a definite, or "strict," allegory than Warren's, because it doesn't make everything in the story "represent" something quite different (equating the old Commandant with God, for example). The penal colony could literally be called a totalitarian society, just on a very small scale.
Still another way to read it is kind of a cross between the two. The penal colony isn't a totalitarian society with a false religion, so much as a traditional religious society, held together by a brutal-seeming set of religious practices like ritual sacrifice. We, for ourselves, think this might be the best way to go, though we wouldn't identify the penal colony with any particular society. This way of seeing the story leaves readers (and the explorer) open to deciding for themselves whether there might be certain true or compelling elements in the society's practices, regardless of how ugly they look on the surface.
Or is it just barbarism after all? Maybe, at the end of the day, the penal colony is just what it seems: a gruesome, horrible, inhumane place. | <urn:uuid:c772c786-0f75-480a-a451-6bb93af25dc6> | CC-MAIN-2013-20 | http://www.shmoop.com/penal-colony/penal-colony-symbol.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.960454 | 438 | 2.875 | 3 |
The fire triangle is a simple model, from the science of firefighting, for understanding the ingredients necessary for most fires. It has largely been replaced in the industry by the fire tetrahedron, which provides a more complete model, also described below. ...more on Wikipedia about "Fire triangle"
A fire-retardant material is one that is designed to resist burning and withstand heat. It is used in uniforms of firefighters to protect them from the flames in a burning building. Most auto racing drivers also wear fire-retardant materials in case their car catches fire. Fire-retardant materials are designed to burn slowly, in contrast to fire-resistant materials, which are designed not to burn at all. ...more on Wikipedia about "Fire-retardant material"
A firebreak is a gap in vegetation or other combustible material that is expected to slow or stop the progress of a wildfire. A firebreak may be a road – from a jeep trail to a freeway – or a path of removed vegetation along a ridge that is intended for no other purpose. Forested areas are often riddled with networks of firebreaks. For firebreaks to be effective they have to be backed up with other firefighting efforts. Even then it is sometimes not enough. During the worst of the fire season in southern California, Santa Ana winds will blow carpets of burning embers across eight-lane freeways without a pause. During the 1988 fires in Yellowstone National Park, smoking embers managed to cross the Lewis Canyon, a natural canyon up to a mile wide and 600 feet (180 m) deep. The worlds's most expensive firebreak was created when the whole street of Van Ness was dynamited to stop the spread of fire resulting from the 1906 San Francisco earthquake. ...more on Wikipedia about "Firebreak"
A firefighter or "smoke-eater" is a person who is trained and equipped to put out fires, rescue people, and in some areas provide emergency medical services. The fire service, also known in some countries as the fire brigade or fire department, is one of the emergency services. Firefighters are sometimes referred to as firemen, although women have increasingly joined firefighting units. ...more on Wikipedia about "Firefighter"
A Firefighter Assist and Search Team (FAST), also known as a Rapid Intervention Team (RIT), is a special team that comprises two or more firefighters dedicated solely to search and rescue of other firefighters in distress. FAST shall have no other purpose during an incident. Multiple alarm fires require multiple FAST teams. ...more on Wikipedia about "Firefighter Assist and Search Team"
In construction, a firewall consists of a windowless, fireproof wall (or a wall of substantially heavier construction than other walls in a building) built to prevent fire from spreading beyond one section of a building. Such firewalls form the built-up equivalent of firebreaks in a landscape. A firewall may contain fire doors and windows made of fire-rated wired glass. Their function in containing the undesirable resembles the use of bulkheads in shipbuilding and aircraft construction. ...more on Wikipedia about "Firewall (construction)"
A flash fire is an unexpected, sudden intense fire caused by ignition of flammable solids, liquids or their vapors, gases, or dust. It is characterized by high-temperature, short-duration, considerable shock waves, and a rapidly moving flame front, which can be a combustion explosion, spreading with unusual speed, like the flame racing across the surface of a flammable liquid, or through a cloud of dust or gas. ...more on Wikipedia about "Flash fire"
Forcible entry is the act of entering a house or building with destructive methods. It is typically illegal. Police, firefighters, and EMTs may need to forcibly enter a building in an emergency. If they must do so, means of entry range from the simple breaking of a glass window to the use of specialized tools to defeat security locks or to cut an access hole. ...more on Wikipedia about "Forcible entry"
A fuel ladder is a firefighting term for live or dead vegetation that allows a fire to climb up from the forest floor into the tree canopy. Common fuel ladders include tall grasses, shrubs, and tree branches, both living and dead. ...more on Wikipedia about "Fuel ladder"
Gaseous fire suppression is a term to describe the use of inert and chemical agents or gasses to suppress a fire. These agents include; ...more on Wikipedia about "Gaseous fire suppression"
Note: This list is incomplete. You can help Wikipedia by adding to it . ...more on Wikipedia about "Glossary of firefighting equipment"
Note: This list is incomplete. You can help Wikipedia by adding to it . Please make sure the entry is not already on the other list as well. ...more on Wikipedia about "Glossary of firefighting terms"
*Aerial canopy: Fuel type comprised of trees having few low branches, making it less susceptible to ignition by low-intensity fires. ...more on Wikipedia about "Glossary of wildland fire terms"
The haloalkanes (also known as Halogenoalkanes) are a group of chemical compounds, consisting of alkanes, such as methane or ethane, with one or more halogens linked, such as chlorine or fluorine, making them a type of organic halide. They are known under many chemical and trivial names. As fire extinguishers, propellants, and solvents, they have or had wide use. Some haloalkanes have negative effects on the environment, such as ozone depletion. ...more on Wikipedia about "Haloalkane"
An IDLH, a situation Immediately Dangerous to Life and Health, defined by the NIOSH as follows: "that poses a threat of exposure to airborne contaminants when that exposure is likely to cause death or immediate or delayed permanent adverse health effects or prevent escape from such an environment." Examples include smoke or poisonous gases. ...more on Wikipedia about "IDLH"
The indice forêt météo (IFM) is an estimation of the risk of wildfire computed by Météo France, the French national meteorology institute; it means Forest weather index. It was created in 1992 and is based on a Canadian empirical model developed in 1976. ...more on Wikipedia about "Indice forêt météo"
The International Association of Fire Fighters (IAFF) is a labor union representing fire fighters employed full-time in fire suppression and related activities in the United States and Canada. The IAFF is affiliated with the AFL-CIO in the United States of America, and the CLC in Canada. ...more on Wikipedia about "International Association of Fire Fighters"
This is a list of historic fires. Before the 20th century, fires were a major hazard to urban areas and the cause of massive amounts of damage to cities. It does not include historic wildfires or forest fires. See forest fire for a list of some of the most severe recorded forest fires. ...more on Wikipedia about "List of historic fires"
The London Fire Brigade Museum covers the history of firefighting since 1666 (the date of the Great Fire of London). The museum houses old fire appliances and other equipment. It is also possible to see fire brigade recruits training. ...more on Wikipedia about "London Fire Brigade Museum"
A master stream is a fire service term for a stream of 350 gallons per minute (gmp) or greater. ...more on Wikipedia about "Master stream"
The National Fire Protection Association (NFPA) is a U.S. organization (albeit with some international members) charged with creating and maintaining minimum standards and requirements for fire prevention and suppression activities, training, and equipment, as well as other life-safety codes and standards. This includes everything from building codes to the personal protective equipment utilized by firefighters while extinguishing a blaze. ...more on Wikipedia about "National Fire Protection Association"
From the NFIRS website ...more on Wikipedia about "NFIRS"
NOMEX® is the brand name of a flame retardant meta- aramid material marketed and first discovered by DuPont in the 1970s. It is sold in both fiber and sheet forms and is used as a fabric wherever resistance from heat and flame is required. Both the firefighting and vehicle racing industries use Nomex to create clothing and equipment that can stand up to intense heat. It is the meta variant of the para-aramid Kevlar. ...more on Wikipedia about "Nomex"
The positive pressure ventilation is a method that consists in creating an air flow ("wind") by rising the pressure in a part of a device or building. ...more on Wikipedia about "Positive pressure ventilation"
The Rosenbauer Group is one of the world’s three largest manufacturers of fire-service vehicles, based in Leonding, Austria. ...more on Wikipedia about "Rosenbauer" Go crack a www.shortopedia.com!
Previous page Next page
This article is licensed under the GNU Free Documentation License.
It uses material from the Wikipedia . Direct links to the original articles are in the text.
If you use exact copy or modified of this article you should preserve above paragraph and put also : It uses material from the Shortopedia article about "Firefighting".
|MAIN PAGE||MAIN INDEX||CONTACT US| | <urn:uuid:37b15fa1-16a8-4042-98e7-e5440897dd67> | CC-MAIN-2013-20 | http://www.shortopedia.com/F/I/Firefighting__page1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.934293 | 1,938 | 3.453125 | 3 |
Black Chasm Cavern, National Natural Landmark
Photo © Dave Bunnell
Black Chasm Cavern was designated a National Natural Landmark in 1986 by the National Park Service, due in part to its incredible display of rare helictite formations. It has been open for public tours since 1998.
Cave speleothems are generally formed by dripping or splashing water, but helictites are formed through hydrostatic pressure. Basically, water is pushed through porous walls leaving crystallized minerals on the other side. As the mineral deposits build up they tend to stack horizontally resulting in the incredible spun glass effect that can be seen in the Landmark Room on the walk tour.
Part of the tour takes visitors across a bridge giving small glimpses of the naturally blue lake below.
Guides talk about the early history of the cave and its unique geology. This is a fairly easy tour although there are quite a number of stairs involved and its definitely worth seeing how beautiful the Sierra Nevada are on the underside!
50-minute guided walk tours are available year round. Above ground visitor center, gift shop and gemstone mining and gold panning flumes.
Walk tours are given every day, year round.
Fees: 2011 walk tour fees: Adult $14.25, Child $7.15 | <urn:uuid:01c42e19-5c1a-4182-8e93-a08c7e08fe5a> | CC-MAIN-2013-20 | http://www.sierranevadageotourism.org/content/black-chasm-cavern-national-natural-landmark/sieD7EB7A94D04C2BCEA | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.9335 | 265 | 3.28125 | 3 |
An ASL DictionarySigning Savvy is a sign language dictionary containing several thousand high resolution videos of American Sign Language (ASL) signs, fingerspelled words, and other common signs used within the United States and Canada.
And Much More!Signing Savvy is an ideal resource to use while you learn sign language. It includes the ability to view large sign videos, build your own word lists and share them with others, create virtual flash cards and quizzes, print signs, build sign phrases, ...and more
Sign of the Day - CONNECTICUT
(as in the state)
The Simpsons Learn Sign LanguagePosted by Jillian @ Signing Savvy on Monday, July 13, 2009 as General Interest
Just for fun - In a recent episode of the Simpsons, titled "The Good, The Bad, and the Drugly", the bully Nelson Muntz, used American Sign Language to fingerspell his trademark "Haw Haw!" laugh rather than vocalize it. Like all Simpsons characters, Nelson has just four digits, which makes his fingerspelling a bit unique. Nelson signs about 3 minutes and 30 seconds into the episode. | <urn:uuid:8bbf3c24-5e46-4570-849b-7e127797a53f> | CC-MAIN-2013-20 | http://www.signingsavvy.com/blog/12/The+Simpsons+Learn+Sign+Language | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.906317 | 232 | 2.625 | 3 |
|Some interesting new studies on altruism in the scientific literature:|
Not All Altruism Is Alike, Says New Study
ScienceDaily (Apr. 30, 2012) — Not all acts of altruism are alike, says a new study. From bees and wasps that die defending their nests, to elephants that cooperate to care for young, a new mathematical model pinpoints the environmental conditions that favor one form of altruism over another.
The model predicts that creatures will help each other in different ways depending on whether key resources such as food and habitat are scarce or abundant, say researchers from Indiana University and the National Evolutionary Synthesis Center in Durham, North Carolina.
Examples of creatures caring for others at the expense of themselves are well-known. Ants, bees, and some birds will help their relatives raise kids rather than raise kids of their own. Even the simplest of social creatures, such as single-celled bacteria and slime molds and other microbes, sometimes sacrifice their own well-being for the sake of their group.
Most mathematical models of how cooperation comes to be assume that all forms of altruism provide similar perks. But the benefits of altruism are different for different behaviors, said study author Michael Wade, a professor at Indiana University and a visiting scholar at the National Evolutionary Synthesis Center.
For example, some creatures cooperate for the sake of defense, others to find food, and others to care for young, he explained.
In a new study, Wade and collaborator J. David Van Dyken of Indiana University model the full range of altruistic behaviors to identify the environmental conditions that favor one type of altruism over another.
Their results show that when key local resources such as food or habitat are scarce, altruistic behaviors that provide more of those resources, or that use them more efficiently, will be favored. Think of lions banding together to hunt and take down prey, or honey bees sharing their findings as they forage for food. Many animals guide other members of their group to newly discovered meals, or bring food back to share with their nest mates.
But when resources are abundant, altruistic behaviors that help other individuals live longer, or produce more offspring, will give organisms an edge. Animals such as songbirds, ungulates and chimpanzees, for example, make alarm calls to warn nearby group members of approaching predators, braving danger to protect others.
As local resources wax and wane, one form of altruism may shift to another over time.
"But the bottom line is that the way creatures are likely to help each other when times are tight is different from how they're likely to help each other in times of plenty," Wade said. | <urn:uuid:fcf72164-c1cc-4c4a-bb1d-39461540feeb> | CC-MAIN-2013-20 | http://www.siliconinvestor.com/readmsgs.aspx?subjectid=50771&msgnum=34638&batchsize=10&batchtype=Next | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.920044 | 550 | 3.21875 | 3 |
What is Booch?
Grady Booch's Object-Oriented Design (OOD), also known as Object-Oriented Analysis and Design(OOAD), is a precursor
to the Unified Modeling (UML).
The Booch method includes six types of diagrams: class, object, state transition, interaction, module, and process.
Booch's Static Diagrams
Booch's class and object diagrams differentiate this methodology (at least in notation) from similar object oriented systems.
A Booch class diagram | <urn:uuid:28419582-2860-4efe-a3b9-75c0075be7c7> | CC-MAIN-2013-20 | http://www.smartdraw.com/resources/tutorials/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.891007 | 110 | 3.015625 | 3 |
The differences between a keyword and browse search:
Keyword - The online library catalog contains thousands of records that represent titles in the catalog. Within each title record, separate fields contain specific information such as the title, author, and subject. You can search these fields for keywords (text you specify). A keyword search in any field looks in all the search fields of the library catalog to find the keyword text. Other keyword searches narrow the search for the keyword only in the author, subject, title, or other specific fields.
Browse - When you browse the library catalog, you can type just the first few letters or numbers of your search term, an author's name, a subject, a series name, or a title. The results list shows the portion of the catalog index that begins with the text you have typed. You can scroll through the index to see more headings or listings. You may also find useful links to related headings or listings. When you select a heading or listing in the index, you see information about the titles associated with the heading or listing.
Follow these steps to do a browse search in the catalog.
Select Browse on the menu bar.
In the Search for list, select an index option (Title, Author, Subject, Series, LC or Dewey).
In the "that begins with" box, type the first few letters or numbers of the title, author's last name, the subject word, the series name, the LC number, or the Dewey number.
The results list displays the catalog headings or listings, and the number of titles associated with each heading or listing.
If you want to change the number of headings or listings to display on a page, click the drop-down menu in the upper left corner and select a number.
Navigate the index using one of these methods:
Click 'Previous 10 Listings or Next 10 Listings to browse through the index.
Title listings may show different types of material for the same title, such as Book, DVD, and Music CD. You can click a type of material to see the titles of that type.
Click a heading or listing to display the associated titles. To return to the headings list, click Go Back to Browse Results at the top or bottom of the page.
Follow these steps to do a keyword search. You will find titles that contain your text in any field, or in a selected field, of the library catalog.
Click Search on the menu bar.
Type the text to search for in the Keyword search for box. You may see suggested search terms as you type. You can ignore the suggestions and continue to type your search term, or click a suggestion to launch the search for the suggested term.
If you leave this box blank and just select an option in the "Limit by" box (see step 4), the search is launched and your results include all the materials that fit your "Limit by" selection.
Click the Search by arrow symbol, and select a search field from the list:
Any Field - All the indexed information fields. *Note: you can include both the author and title using Any Field
Title - Title fields
Author - Author fields
Subject - Subject fields
General notes - Notes fields
Publisher - Publisher field
Genre - Forms or types of materials, such as science fiction, romance, biography, bibliography, or large type books
Series - Series fields
ISBN - International Standard Book Number, a 13-digit number that is assigned to a specific book or edition of a book when it is published. Type the wildcard character * at the beginning and end of the number you enter for best results.
ISSN - International Standard Serial Number, an 8-digit number that is assigned to a specific periodical publication. Type the wildcard character * at the beginning and end of the number you enter for best results.
If you want to find only a certain kind of material or only items that are available , click the arrow symbol in the "Limit by" box, and select an option from the list.
[Example: If you want to find only DVDs, select DVD in the "Limit by" list.]
Click More Search Options for additional ways to make your search more specific.
If you want to have the search results sorted by a category other than the one displayed, click the Sort drop down box and select a sorting option.
'Relevance' sorts titles in the search results so that those that seem most likely to meet your needs appear first in the list. Words that appear in both title and subject fields are considered in determining relevance. 'Most Popular' sorts titles in the search results so that the titles most frequently checked out or requested over the past 120 days appear first in the list.
I have always imagined that paradise will be some kind of library. | <urn:uuid:799e952d-3558-4590-a51f-fd0a8200fa97> | CC-MAIN-2013-20 | http://www.sno-isle.org/?ID=5808 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.852538 | 994 | 2.78125 | 3 |
by Staff Writers
Zurich, Switzerland (SPX) Feb 23, 2012
Thawing permafrost will have far-reaching ramifications for populated areas, infrastructure and ecosystems. A geographer from the University of Zurich reveals where it is important to confront the issue based on new permafrost maps - the most precise global maps around. They depict the global distribution of permafrost in high-resolution images and are available on Google Earth.
Unstable cable-car and electricity pylons and rock fall - Alpine countries like Switzerland have already had first-hand experience of thawing permafrost as a result of climate change. If temperatures continue to rise, the problem will intensify in many places.
Permafrost, namely rock or soil with a negative temperature for at least two years, occurs in the subsurface and therefore cannot be mapped directly. The existing maps are thus fraught with major uncertainties that have barely been studied or formulated. Furthermore, due to the different modeling methods used the maps are difficult to compare.
The most precise global permafrost maps
Approximation of permafrost patchwork
This is where Gruber's innovative permafrost maps come in: They are based on high-resolution air temperature and elevation data. Moreover, they reveal an index that indicates the probability of permafrost.
The permafrost areas are depicted in grades - from dark blue for near-continuous permafrost to yellow for areas with little permafrost. In contrast to previous permafrost maps, which show clearly defined zones, Gruber's maps also illustrate the uncertainty of the state of research.
The scientist explains his motivation with the urgency of the matter: "As a result of climate change, areas with permafrost have great potential for unpleasant surprises.
That is why it is all the more important for politics and the public to be aware of the problem of thawing permafrost. My maps visualize the otherwise barely visible phenomenon of permafrost."
University of Zurich
Global Permafrost Zonation Index Map
Earth Observation News - Suppiliers, Technology and Application
Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.
NASA Map Sees Earth's Trees In A New Light
Pasadena CA (JPL) Feb 22, 2012
A NASA-led science team has created an accurate, high-resolution map of the height of Earth's forests. The map will help scientists better understand the role forests play in climate change and how their heights influence wildlife habitats within them, while also helping them quantify the carbon stored in Earth's vegetation. Scientists from NASA's Jet Propulsion Laboratory, Pasadena, Calif ... read more
|The content herein, unless otherwise known to be public domain, are Copyright 1995-2012 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement| | <urn:uuid:c1f3b732-b0b8-461a-84aa-3d43ebee950a> | CC-MAIN-2013-20 | http://www.spacedaily.com/reports/Global_permafrost_zones_in_high_resolution_images_on_Google_Earth_999.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.870482 | 677 | 3.34375 | 3 |
ASSESSING THE 8.1 COMPUTER AND INFORMATION LITERACY STANDARD
Title II-D: Enhancing Education through Technology of the No Child Left Behind (NCLB) Act requires that all students are technologically literate by the end of grade eight. Complimenting the federal law, the NJDOE’s Technological Literacy Standards, specifically the 8.1 Computer and Information Literacy Standards, provide standardized criteria for technological literacy across the state.
It is the responsibility of each LEA and Charter School to assess and then document the technology literacy proficiency level of each eighth grade student at the completion of each school year. Districts and Charter Schools will be expected to report the measures on an annual basis. This documentation will be collected and reviewed beginning each school year. Based on this documentation, every district should be prepared to report the following:
- The number of students in the fourth grade that are being assessed for technological proficiency.
- The number of students in the eighth grade that are technologically proficient.
- The number of students enrolled in the eighth grade.
- The number of students assessed for technology proficiency.
- The number of students not assessed, and why were they not assessed.
- The type or name of the tool used for assessing students.
Literacy versus Proficiency
In an effort to facilitate local choice, the Office of Academic Standards, and the Office of Educational and Information Technology have defined technological proficiency as it relates to the 8.1 Computer and Information Literacy Standards. A rubric has been developed that provides specific expectations for accomplishing proficiency. Each district may use whatever method or tools they wish to assess students, with the understanding that they must cross reference their student scores with the rubric to determine proficiency.
In addition, both offices have identified some tools and strategies that can be used to address student technology proficiency. These tools serve as a guide to assist schools in addressing student technology proficiency as defined by NCLB and the NJDOE standards. The process for using the recommended tools and strategies for assessing 8.1 Computer and Information Literacy is called the New Jersey Technology Assessment for Proficiency and Integration (NJTAP-IN).
- New Jersey Technology Assessment for Proficiency and Integration (NJTAP-IN)
- Academic and Professional Standards – Technology Literacy Standards
- Comparison of 8.1 and 8.2 Technology Literacy Standards
For additional assistance contact the Educational Technology Unit at 609-292-1414. | <urn:uuid:39a18f97-d6e9-4950-a906-bdce032f207e> | CC-MAIN-2013-20 | http://www.state.nj.us/education/techno/techlit/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.903216 | 508 | 3.515625 | 4 |
Pairwise Deletion of Missing Data vs. Mean Substitution. In order to avoid losing data due to casewise deletion of missing data, you can use one of two other methods. These are (1) the so-called mean substitution of missing data (replacing all missing data in a variable by the mean of that variable) and (2) pairwise deletion of missing data. These methods of handling missing data can be requested in many modules; you can also use the mean substitution method to permanently "remove" missing data from your data set. Mean substitution offers some advantages and some disadvantages as compared to pairwise deletion. Its main advantage is that it produces "internally consistent" sets of results ("true" correlation matrices). The main disadvantages are:
- Mean substitution artificially decreases the variation of scores, and this decrease in individual variables is proportional to the number of missing data (i.e., the more missing data, the more "perfectly average scores" will be artificially added to the data set).
- Because it substitutes missing data with artificially created "average" data points, mean substitution may considerably change the values of correlations.
Pairwise MD Deletion. When pairwise deletion of missing data is selected, then cases will be excluded from any calculations involving variables for which they have missing data. In the case of correlations, the correlations between each pair of variables are calculated from all cases having valid data for those two variables.
See also, Pairwise Deletion of Missing Data vs. Mean Substitution and Casewise vs. pairwise deletion of missing data
Parametric Curve. Parametric equations can be used to represent curves whose graphs are not simple functions of the type y = f(x), where y and x are represented along the vertical and horizontal axes, respectively. Instead, the curves in the x-y plane are defined parametrically as two simultaneous functions of a parameter t that ranges over some interval (minimum, maximum). You can specify an equation y = f(t) for the y-component of the curve, and an equation x = g(t) for the x-component of the curve, for a specified range of parameter t.
For example, to plot a spiral, you could specify:
y(t) = t*cos(t)
x(t) = t*sin(t)
For 0 < = t < = 12.
There are a wide variety of curves, from simple circles to complex shapes that can be produced via the parametric curves facilities. Here is another example:
y(t) = (a + b)*sin(t) - b*sin((a/b + 1)*t)
x(t) = (a + b)*cos(t) - b*cos((a/b + 1)* t)
In the plot shown above, a and b were set to 8 and 5, respectively, and parameter t was plotted over the range from 0 to 100. If you change a and b in the parametric equations shown above, very different shapes will emerge.
Pareto Chart Analysis. The Pareto chart analysis is a simple but powerful way of identifying the causes of quality problems or loss. It amounts to constructing a histogram of the number of quality problems or loss by some meaningful units, for example, by type of problem or division within the company.
According to the so-called Pareto principle, the majority of the quality loss is caused by a small number of factors. Put another way, in many cases, few types of problems often cause the majority of quality loss, or a few divisions within the company may produce the majority of loss. Such "maldistribution" (uneven distribution) of quality loss is very common, and can easily be detected via the Pareto chart. The Pareto chart is described in most standard quality control textbooks; see for example, Hart and Hart (1989), Juran (1962), Juran and Gryna (1970), Montgomery (1985, 1991), Pyzdek (1989), or Vaughn (1974).
See also Quality Control.
Pareto Distribution. The standard Pareto distribution has density function (for positive parameter c ):
f(x) = c/xc+1 1 x, c > 0
c is the shape parameter of the distribution.
The animation above shows the Pareto distribution for the shape parameter equal to 1, 2, 3, 4, and 5.
Partial Correlation. A correlation between two variables that remains after controlling for (e.g., partialling out) one or more other variables. For example, the HAIR LENGTH may correlate with HEIGHT (with taller individuals having shorter hair), however, that correlation will likely become smaller or even disappear if the influence of GENDER is removed, since women are generally shorter and are more likely to have long hair than men.
See also Correlation, Spurious Correlations, Basic Statistics, Multiple Regression, Structural Equation Modeling (SEPATH).
Partial Least Squares Regression (PLS). Partial Least Squares is a linear regression method that forms components (factors, or latent variables) as new independent variables (explanatory variables, or predictors) in a regression model. The components in partial least squares are determined by both the response variable(s) and the predictor variables. A regression model from partial least squares can be expected to have a smaller number of components without an appreciably smaller R-square value.
For an overview of partial least squares, see the Partial Least Squares Model overview.
Partial Residuals. In a (linear, nonlinear, or additive) regression model with m predictors, the partial residuals for a predictor k are computed by removing from the dependent variable values the effects of all predictors i = 1, ... , m; i¹k. Scatterplots of partial residuals against predictor variables are particularly useful in generalized additive models, where they may aid in the interpretation of the (non-linear) unique effect of the predictors in the overall model.
Parzen Window. In Time Series, the Parzen window is a weighted moving average transformation used to smooth the periodogram values. In the Parzen window (Parzen, 1961), for each frequency, the weights for the weighted moving average of the periodogram values are computed as:
wj = 1-6*(j/p)2 + 6*(j/p)3 (for j = 0 to p/2)
wj = 2*(1-j/p)3 (for j = p/2 + 1 to p)
w-j = wj (for j 0)
where p = (m-1)/2
This weight function will assign the greatest weight to the observation being smoothed in the center of the window, and increasingly smaller weights to values that are further away from the center.
See also, Basic Notations and Principles.
In Neural Networks, the Parzen window is an alternative name for kernel-based approximation techniques, as used in probabilistic neural networks and generalized regression neural networks (Parzen, 1962).
Pearson Correlation. The most widely-used type of correlation coefficient is Pearson r (Pearson, 1896), also called linear or product-moment correlation (the term correlation was first used by Galton, 1888). Using non technical language, we can say that the correlation coefficient determines the extent to which values of two variables are "proportional" to each other. The value of the correlation (i.e., correlation coefficient) does not depend on the specific measurement units used; for example, the correlation between height and weight will be identical regardless of whether inches and pounds, or centimeters and kilograms are used as measurement units. Proportional means linearly related; that is, the correlation is high if it can be approximated by a straight line (sloped upwards or downwards). This line is called the regression line or least squares line, because it is determined such that the sum of the squared distances of all the data points from the line is the lowest possible. Pearson correlation assumes that the two variables are measured on at least interval scales. The Pearson product moment correlation coefficient is calculated as follows:
r12 = [(Yi1 - Y-bar1)*(Yi2 - Y-bar2)] / [(Yi1 - Y-bar1)2 * (Yi2 - Y-bar2)2]1/2
See also, Correlations - Overview.
Pearson Curves. A system of distributions proposed by Karl Pearson (e.g., see Hahn and Shapiro, 1967, pages 220-224) consists of seven solutions (of 12 originally enumerated by Pearson) to a differential equation which approximate a wide range of distributions of different shapes. Gruska, Mirkhani, and Lamberson (1989) describe in detail how the different Pearson curves can be fit to an empirical distribution. A method for computing specific Pearson percentiles is also described in Davis and Stephens (1983).
See also, Johnson Curves.
Pearson Residuals. After fitting a generalized linear model to the data, to check the adequacy of the respective model, we usually compute various residual statistics. The Pearson residual is computed as the raw residual (y-m), scaled by the estimated standard deviation of y.
For a detailed discussion of residual statistics for generalized linear models, see McCullagh and Nelder (1989); see also the Generalized Linear Models overview.
Penalty Functions. A constraint specified in a loss function which applies a penalty (a very large value) to the loss function when certain undesirable conditions are met. Using a penalty function allows the user to control what permissible values of the parameters to be estimated may be manipulated by the Non-linear estimation program. For more information, see Penalty Functions, Constraining Parameters.
Percentiles. The percentile (this term was first used by Galton, 1885a) of a distribution of values is a number xp such that a percentage p of the population values are less than or equal to xp. For example, the 25th percentile (also referred to as the .25 quantile or lower quartile) of a variable is a value (xp) such that 25% (p) of the values of the variable fall below that value.
Similarly, the 75th percentile (also referred to as the .75 quantile or upper quartile) is a value such that 75% of the values of the variable fall below that value and is calculated accordingly.
Perceptrons (in Neural Networks). Perceptrons are a simple form of neural networks. They have no hidden layers, and can only perform linear classification tasks. Perceptrons were devised by Rosenblatt (1958), and their limitations were criticized by Minsky and Papert (1969), leading to a loss of interest in the field. Fausett (1994) gives a good history of these early developments.
A perceptron is modeled by creating a two-layer MLP network, and changing the activation function of the output layer to Step.
The perceptron learning algorithm is modeled by using back propagation with Momentum 0.0 and Shuffle turned Off.
Petabyte. 1 petabyte = 1,000 terabytes
Pie Chart. Pie charts (the term first used by Haskell, 1922) are useful for representing proportions. Individual data values of the X variable are represented as the "wedges" of the pie.
Pie Chart - Counts. Unlike the values pie chart, this type of pie (this term was first used by Haskell, 1922) chart (sometimes called frequency pie chart) interprets data like a histogram. It categorizes all values of the selected variable following the selected categorization technique and then displays the relative frequencies as pie slices of proportional sizes.
See also, Pie Charts.
Pie Chart - Multi-Pattern Bar. The multi-pattern bar plot is designed to display the same type of data as the values pie chart (see Pie Chart - Values or 2D Histograms), however, the consecutive values are represented by the height of vertical bars (of different colors and patterns) and not areas of pie slices.
Their advantage over pie charts is that they may allow for more precise comparisons between presented values (e.g., small pie slices may be difficult to compare if they are not adjacent). This type of graph may also have advantages over regular histograms (where one fill pattern and color is used for all columns), in cases when quick identification of specific columns is desired.
See also, Pie Charts.
Pie Chart - Values. The sequence of values from the selected variable will be represented by consecutive slices of the pie (this term was first used by Haskell, 1922); the size of each slice will be proportional to the respective value. The values should be greater than 0 (0's and negative values cannot be represented as slices of the pie). This simple type of pie chart (sometimes called data pie chart) interprets data in the most straightforward manner: one case = one slice.
See also, Pie Charts.
PMML (Predictive Model Markup Language). See Predictive Markup Language (PMML).
PNG (Portable Network Graphics). PNG (Portable Network Graphics) is a graphics file format designed to store bitmap (i.e., raster, as opposed to vector/metafile) graphic images. It was introduced to be a replacement for the patented GIF format (mostly to avoid the legal restrictions associated with the patent). A PNG image may contain a variable number of colors, including a transparent color. The size of the file depends on the number of colors used in the specific image. A compression method is used (to reduce the file size) which is highly effective if a large proportion of the image is built of the pixels with the same color attributes (e.g., it is highly effective for charts and schematic line art, but somewhat less effective than the JPEG format for photographs).
Poisson Distribution. The Poisson distribution (the term first used by Soper, 1914) is defined as:
f(x) = (x * e-)/x!
for x = 0, 1, 2, .., 0 <
(lambda) is the expected value of x (the mean)
e is the base of the natural logarithm, sometimes called Euler's e (2.71...)
Polar Coordinates. Polar coordinates (r,) represent the location of a point (in 2D space) by its distance (r) from a fixed point on a fixed line (polar axis) and the angle (, in radians) from that fixed line.
Polar plots are used to visualize functions. They also offer an intuitive way to present relations involving a variable representing direction.
See also, Cartesian Coordinates.
Polynomial. This fits to the data, a polynomial function of the form:
y = b0 + b1x + b2x2 + b3x3 + ... + bnxn
where n is the order of the polynomial.
Fitting centered polynomial models via Multiple Regression. The fitting of higher-order polynomials of an independent variable with a mean not equal to zero can create difficult numerical problems. Specifically, the polynomials will be highly correlated due to the mean of the primary independent variable. With large numbers (e.g., Julian dates), this problem is very serious, and if proper protections are not put in place, can cause wrong results! The solution is to "center" the independent variable (sometimes, this procedures is referred to as "centered polynomials"), i.e., to subtract the mean, and then to compute the polynomials. See, for example, the classic text by Neter, Wasserman, & Kutner (1985, Chapter 9), for a detailed discussion of this issue (and analyses with polynomial models in general).
Population Stability Report. Population stability reports are used for monitoring trends in credit scoring. Over time, economic factors and changes within a financial institution such as marketing campaigns or credit offers can affect the credit scoring process. The purpose of a population stability report is to detect shifts or trends within the credit applicant pool and factors related to these. With the information from the population stability report, the institution can update credit scorecards as well as make changes to better suite the needs of its customer base. The report may contain items such as the mean score or a comparison of actual and expected distribution of scores from the scorecard, a comparison of actual versus expected distributions of customer characteristics used in for scoring, approval rates, etc.
Positive Correlation. The relationship between two variables is such that as one variable's values tend to increase, the other variable's values also tend to increase. This is represented by a positive correlation coefficient.
See also, Correlations - Introductory Overview.
Post hoc Comparisons. Usually, after obtaining a statistically significant F test from the ANOVA, we want to know which means contributed to the effect; that is, which groups are particularly different from each other. We could of course perform a series of simple t-tests to compare all possible pairs of means. However, such a procedure would capitalize on chance. The reported probability levels would actually overestimate the statistical significance of mean differences. For example, suppose you took 20 samples of 10 random numbers each, and computed 20 means. Then, take the group (sample) with the highest mean and compare it with that of the lowest mean. The t-test for independent samples will test whether or not those two means are significantly different from each other, provided that they were the only two samples taken. Post-hoc comparison techniques on the other hand, specifically take into account the fact that more than two samples were taken. They are used as either hypothesis testing or exploratory methods.
For more information, see ANOVA.
Post Synaptic Potential (PSP) Function. The function applied by a unit to its inputs, weights and thresholds to form the unit's input (or activation) level. The two major PSP functions are linear (weighted sum minus threshold) and radial (scaled squared distance of weight vector from input vector).
See also, Neural Networks.
Posterior Probability. A Bayesian probability measured from the prior probability of an event and its likelihood.
Power (Statistical). See Statistical Power.
Power Goal. The minimum power to be achieved when searching for an acceptable sample size. An acceptable sample size must yield a power greater than or equal to this value.
For more information see Power Analysis; see also Statistical Power.
Ppk, Pp, Pr. See Process Performance Indices, Cpk, Cp, Cr. See also, Process Capability Analysis.
Prediction Interval Ellipse. Often plotted on 2D Scatterplots, this interval describes the area in which a single new observation can be expected to fall with a certain probability (alpha), given that the new observation comes from a bivariate normal distribution with the parameters (means, standard deviations, covariance) as estimated from the observed points shown in the plot.
The coordinates for the ellipse are computed so that:
((n-p)*n)/(p*(n-1)*(n+1))*(X-Xm) 'S-1 (X-Xm)~ F(alpha,p,n-p)
n number of cases
p number of variables; i.e., p=2 in the case of the bivariate scatterplot
X vector of coordinates (pair of coordinates, since p=2)
Xm vector of means for the p dimensions (variables) in the plot
S-1 inverse of the variance covariance matrix for the p variables
F(alpha,p, n-p) the value of F, given alpha, p, and n-p.
Note that if the number of observations in the scatterplot is small, then the prediction interval may be very large. For additional information see, for example, Tracy, Young, and Mason (1992), or Montgomery 1996).
Prediction Profiles. When the results of an experiment are analyzed, the observed responses on the dependent variables can be fit to a separate prediction equation for each dependent variable (containing different coefficients but the same terms). Once these equations are constructed, predicted values for the dependent variables can be computed at any combination of levels of the predictor variables. A prediction profile for a dependent variable consists of a series of graphs, one for each independent variable, of the predicted values for the dependent variable at different levels of one independent variable, holding the levels of the other independent variables constant at specified values. Inspecting the prediction profiles for the dependent variables can show which levels of the predictor variables produce the most desirable predicted responses on the dependent variables.
For a detailed description of prediction profiles and desirability profiles see Profiling Predicted Responses and Response Desirability.
Predictive Data Mining. The term Predictive Data Mining is usually applied to identify data mining projects with the goal to identify a statistical or neural network model or set of models that can be used to predict some response of interest. For example, a credit card company may want to engage in predictive data mining, to derive a (trained) model or set of models (e.g., neural networks, meta-learner) that can quickly identify transactions which have a high probability of being fraudulent. Other types of data mining projects may be more exploratory in nature (e.g., to identify cluster or segments of customers), in which case drill-down descriptive and exploratory methods would be applied. Data reduction is another possible objective for data mining (e.g., to aggregate or amalgamate the information in very large data sets into useful and manageable chunks).
Predictive Mapping. One application of multiple correspondence analysis is to perform the equivalent of a Multiple Regression for categorical variables, by adding supplementary columns to a design matrix (see also Burt tables). For example, suppose you had a design matrix containing various categorical indicators of health related behaviors (e.g., whether or not the individual smoked, exercised, etc.). You could add two columns to indicate whether or not the respective subject had or had not been ill over the past year (i.e., you could add one column Ill and another column Not ill, and enter 0's and 1's to indicate each subject's health status). If in a simple correspondence analysis of the design matrix, you added those columns as supplementary columns to the analysis, then (1) the summary statistics for the quality of representation (see the Correspondence Analysis Overview) for those columns would give you an indication of how well you can "explain" illness as a function of the other variables in the design matrix, and (2) the display of the column points in the final coordinate system would provide an indication of the nature (e.g., direction) of the relationships between the columns in the design matrix and the column points indicating illness. This technique (adding supplementary points to a multiple correspondence analysis) is also called predictive mapping.
Predictive Model Markup Language (PMML). PMML (short for Predictive Model Markup Language) is an XML-based language which allows for the efficient exchange of (trained) predictive models and shared models between different applications. A PMML document usually contains information describing fully trained or parameterized analytic models so that they can be readily deployed (applied to new cases) by another application.
Predictors. Predictors (also called independent or input variables) are variables used to predict or explain the value(s) of one or more dependent variables (also referred to as dependent or outcome variables).
PRESS Statistic. The PRESS statistic is often used in regression analyses, in order to summarize the fit of a particular model in a sample of observations that were not used to estimate the model parameters. It can simply be computed as the sums of squares of the prediction residuals for those observations.
See Draper and Smith (1981); the PRESS statistic is, for example, computed in the Partial Least Squares Model for the cross-validation (verification) samples.
Principal Components Analysis. A linear dimensionality reduction technique, which identifies orthogonal directions of maximum variance in the original data, and projects the data into a lower-dimensionality space formed of a sub-set of the highest-variance components (Bishop, 1995).
See also, Factor Analysis and Neural Networks.
Prior Probabilities. Proportionate distribution of classes in the population (in a classification problem), especially where known to be different than the distribution in the training data set. Used to modify probabilistic neural network training in neural networks.
See also, Neural Networks, Discriminant Function Analysis.
Probability. A probability provides a quantitative description of the likely occurrence of a particular event. Probability is conventionally expressed on a scale from 0 to 1; a rare event has a probability close to 0, a very common event has a probability close to 1.
Probability-Probability Plots. You can visually check for the fit of a theoretical distribution to the observed data by examining the probability-probability plot (also called Probability Plot, see example below). In probability- probability plots (or P-P plots for short) the observed cumulative distribution function is plotted against the theoretical cumulative distribution function. As in the Quantile-Quantile plot, the values of the respective variable are first sorted into ascending order. The ith observation is plotted against one axis as i/n (i.e., the observed cumulative distribution function), and against the other axis as F(x(i)), where F(x(i)) stands for the value of the theoretical cumulative distribution function for the respective observation x(i). If the theoretical cumulative distribution approximates the observed distribution well, then all points in this plot should fall onto the diagonal line.
Probability-Probability Plots - Categorized. In this graph, you can visually check for the fit of a theoretical distribution to the observed data by examining each probability-probability plot (also called Probability Plot, see also Probability-Probability Plots) for the respective level of the grouping variable (or user-defined subset of data). In probability-probability plots (or P-P plots for short) the observed cumulative distribution function is plotted against the theoretical cumulative distribution function. As in the Categorized Quantile-Quantile plot, the values of the respective variable are first sorted into ascending order. The ith observation is plotted against one axis as i/n (i.e., the observed cumulative distribution function), and against the other axis as F(x(i)), where F(x(i)) stands for the value of the theoretical cumulative distribution function for the respective observation x(i). If the theoretical cumulative distribution approximates the observed distribution well, then all points in this plot should fall onto the diagonal line. One component graph is produced for each level of the grouping variable (or user-defined subset of data) and all the component graphs are arranged in one display to allow for comparisons between the subsets of data (categories).
Probability Sampling. In probability sampling, every observation in the population from which the sample is drawn has a known probability of being selected into the sample; when that probability is the same for every observation in the population, the sample is an equal probability sample or EPSEM sample (equal probability of selection method; see Kish, 1965, for details).
EPSEM samples have certain desirable properties; for example, the simple formulas for computing means, standard deviations, and so on can be applied to estimate the respective parameters in the population.
Probit Regression and Transformation. In the probit regression model, the predicted values for the dependent variable will never be less than (or equal to) 0, or greater than (or equal to) 1, regardless of the values of the independent variables; it is, therefore, commonly used to analyze binary dependent or response variables (see also the binomial distribution). This is accomplished by applying the following regression equation (the term probit was first used by Bliss, 1934):
y = NP(b0 + b1*X1 ... )
where NP stands for normal probability (space under the normal distribution; or cumulative distribution function of the normal distribution). We can easily recognize that, regardless of the regression coefficients or the magnitude of the x values, this model will always produce predicted values (predicted y's) in the range of 0 to 1.
For additional details, see also Nonlinear Estimation or Generalized Linear Models; see also Logit Transformation and Regression and Multinomial logit and probit regression for similar transformations.
PROCEED. A turnkey manufacturing software solution that distills fundamental causal relationships between products and the processes that produce them, using data that is already collected and managed. PROCEED implements the patent-pending approach developed and proven at Caterpillar Inc. and powered by the STATISTICA Enterprise Analytics Software Platform.
High tech manufacturing enterprises today collect vast amounts of data.
Data about the production processes.
Data about tests of raw materials, subassemblies, and materials in process.
Data about the critical to quality attributes of finished products.
All of these data collection and storage efforts continue to be fueled by increases in automation, technology advances in the storage capabilities of data repositories, and the advances in sensors and other techniques for measurement. Today's manufacturers are sitting on a gold mine of information . . . only if they are able to translate it into actionable information.
Collecting data is not sufficient to drive enterprise change. To create change, we need to translate these data into knowledge and then communicate that knowledge in a format that enables the people who are empowered to act on it. Now is the time for this Return on Investment from data using PROCEED.
PROCEED combines novel and traditional knowledge extraction methods to:
Derive and validate simple to complex causal relationships between manufacturing processes and product quality outcomes
Deploy actionable information to enable process owners and knowledge workers to compare what-if scenarios and simultaneously optimize multiple competing outcomes
Process Analysis. In industrial settings, Process Analysis refers to a collection of analytic methods which can be used to ensure adherence of a product to quality specifications. These methods include Sampling Plans, Process (Machine) Capability Analysis, fitting measurements to Non-Normal Distributions, analysis of Gage Repeatability and Reproducibility and Weibull and Reliability/Failure Time Analysis.
For more information, see the Process Analysis overview.
Process Capability Indices. In industrial quality control, once a process is in control, indices are often computed to measure the quality of the items produced (and thus the capability of the process); specifically, the extent to which the items that are produced fall within allowable engineering tolerances. Given a sample of a particular size, we can estimate the standard deviation of the respective quality characteristic of interest (e.g., piston ring diameters); we can then draw a histogram of the distribution of the characteristic of interest (piston ring diameters).
If the distribution of the quality characteristic is normal, we can make inferences concerning the proportion of items (piston rings) within specification limits (methods for non-normal distributions are also available; namely the so-called Percentile Method).
Common indices for process capability are Cp, Cr, and Cpk. All of these indices basically reflect the ratio of the engineering tolerances (process range) to the ± 3 sigma limits around the nominal specifications.
For computational details, see Process Capability Indices; see also Process Performance.
Process Performance Indices. When monitoring a process via a quality control chart (e.g., the X-bar and R-chart; Quality Control) it is often useful to compute the process capability indices for the process. Specifically, when the data set consists of multiple samples, such as data collected for the quality control chart, then we can compute two different indices of variability in the data. One is the regular standard deviation for all observations, ignoring the fact that the data consist of multiple samples; the other is to estimate the process's inherent variation from the within-sample variability. For example, when plotting X-bar and R-charts, we can use the common estimator R-bar/d2 for the process sigma (e.g., see Duncan, 1974; Montgomery, 1985, 1991). Note however, that this estimator is only valid if the process is statistically stable. For a detailed discussion of the difference between the total process variation and the inherent variation refer to ASQC/AIAG reference manual (ASQC/AIAG, 1991, page 80).
When the total process variability is used in the standard capability computations, the resulting indices are usually referred to as process performance indices (as they describe the actual performance of the process; common indices are Pp, Pr, and Ppk), while indices computed from the inherent variation (within-sample sigma) are referred to as capability indices (since they describe the inherent capability of the process; common indices are Cp, Cr, and Cpk).
For additional information, see also Process Capability Indices; for computational details, see Process Capability Analysis.
Pruning (in Classification Trees). Pruning a classification tree refers to the use of the automatic "right-sized" tree selection procedures developed by Breiman et. al. (1984). These procedures are designed to find, without relying on subjective judgment, the "right-sized" classification tree, that is, a classification tree with an appropriate number of splits and optimal predictive accuracy. The process of determining the "right-sized" classification tree is described in the Computational Methods section of Classification Trees.
Pseudo-Components. Pseudo-components are transformed values of the components (plotted in Ternary graphs) where:
x'i = (xi-Li)/(Total-L)
Here, x'i stands for the ith pseudo-component, xi stands for the original component value, Li stands for the lower constraint (limit) for the ith component, L stands for the sum of all lower constraints (limits) for all components in the design, and Total stands for the mixture total. This transformation makes the coefficients for different factors comparable in size.
(See Cornell, 1993, Chapter 3).
Pseudo-Inverse Algorithm. An algorithm to efficiently optimize a linear model; also known as singular value decomposition (see Bishop, 1995; Press et. al., 1992; Golub and Kahan, 1965).
Pseudo-Inverse - Singular Value Decomposition (in Neural Networks). This algorithm uses the singular value decomposition technique to calculate the pseudo-inverse of the matrix needed to set the weights in a linear (dot product synaptic function + identity activation function) output layer, so as to find the least mean squared solution. Essentially, it guarantees to find the optimal setting for the weights in a linear layer, to minimize the RMS training set error (Bishop, 1995; Press et. al., 1992; Golub and Kahan, 1965). This is the standard least-squares optimization technique.
Linear techniques are extremely important in optimization, not least because it is possible to find an optimal solution to a linear model - something that is not guaranteed with nonlinear models, such as other types of neural networks, even if training algorithms converge.
The pseudo-inverse procedure, in addition to guaranteeing to find the absolute minimum error, is also relatively quick.
Pseudo-inverse is typically used in a number of circumstances:
Technical Details. The matrix G is calculated, whose i, j'th element is the input of the i'th output unit, when the j'th case is executed.
The least-squares solution is then given by:
w = G+ d
G+ = (GTG)-IGT is the pseudo-inverse matrix.
w is the weight vector into an output unit.
d is the desired response vector (training outputs) for that output.
G+ is calculated using the singular value decomposition algorithm.
Caution. The singular value decomposition algorithm is usually numerically stable; however, occasionally a badly behaved matrix can cause it to generate mathematical errors. If this occurs, follow the steps below:
Check that the training cases and (in the case of a radial basis function network) centers and deviations have been sensibly assigned.
In particular, the algorithm performs badly if radial deviations are very high (i.e., the standard deviations of Gaussians are very small). It may be necessary to increase the number of neighbors if assigning radial deviation using K-nearest neighbors, or to increase the Deviation multiplier if using Isotropic deviation assignment.
If training cases, centers and deviations are all sensible, and the algorithm still fails, use Conjugate Gradient Descent to set the weights in the linear layer. Although typically slower than pseudo-inverse, this algorithm does not generate arithmetic errors and is guaranteed to find the minimum, as there are no local minima in this case.
Pure Error. For certain designs with replicates at the levels of the predictor variables, the residual sum of squares can be further partitioned into meaningful parts which are relevant for testing hypotheses. Specifically, the residual sums of squares can be partitioned into lack-of-fit and pure-error components. This involves determining the part of the residual sum of squares that can be predicted by including additional terms for the predictor variables in the model (for example, higher-order polynomial or interaction terms), and the part of the residual sum of squares that cannot be predicted by any additional terms (i.e., the sum of squares for pure error). A test of lack-of-fit can then be performed, using the mean square pure error as the error term.
See also lack of fit, design matrix; or see General Linear Models, General Regression Models, or Experimental Design. | <urn:uuid:4e177bf5-cf3f-4efa-a92a-ca8e0c250d5c> | CC-MAIN-2013-20 | http://www.statsoft.com/textbook/statistics-glossary/p/button/p/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.892055 | 7,923 | 3.15625 | 3 |
A man has been sentenced to jail in Brazil for racism against indigenous people, having described them as ‘vagrants’ and ‘tramps’ in a newspaper article.
The article says of indigenous people, including the Guarani Indians, ‘They take possession of the land like true vandals’.
The writer, Brazilian lawyer Isaac Duarte de Barros Júnior, continues, ‘The preservation of traditions which contradict modernity is retrograde and must end’.
He has been sentenced to two years imprisonment and could also be forced to pay millions of US dollars in compensation for moral damages, pending further court hearings.
Racism against the Guarani Indians is rife, but this is one of the very few cases in Brazil of a person being jailed for it.
There are over 40,000 Guarani in Brazil. Like many other tribes, they have a deep connection to their land on which they rely for their well-being.
But much of the Guarani’s land has been stolen from them to make way for cattle ranches and soya and sugar cane plantations. This has left many communities living in overcrowded reserves or camped beside main roads with little access to food or clean water.
The Guarani’s demands for their ancestral lands to be returned to them and its occupants’ refusal to give way has created ethnic divisions in the area. Several Guarani have been killed after leading their communities to reoccupy their land.
Read about Survival’s Stamp it Out campaign and help combat racism against tribal peoples. | <urn:uuid:ade974c6-1fe2-41b4-80f0-7ff86ceebc5e> | CC-MAIN-2013-20 | http://www.survivalinternational.org/news/7759 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978586 | 333 | 2.9375 | 3 |
The structure of strings in some language. A language's syntax is described by a grammar. For example, the syntax of a binary number could be expressed as
binary_number = bit [ binary_number ] bit = "0" | "1"meaning that a binary number is a bit optionally followed by a binary number and a bit is a literal zero or one digit.
The meaning of the language is given by its semantics.
See also abstract syntax, concrete syntax.
Try this search on OneLook / Google | <urn:uuid:0258009e-33fb-4c05-a8e0-e8bdd39027f2> | CC-MAIN-2013-20 | http://www.swif.uniba.it/lei/foldop/foldoc.cgi?syntactic | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.920329 | 106 | 3.734375 | 4 |
For Timothy Gowers, it looked as if there was nothing in mathematics he couldn’t achieve. He held a prestigious professorship at Cambridge University; he had been a recipient of the Fields Medal, one of the highest honors in mathematics; he had even acted as a scientific consultant on Hollywood movies, yet there were a few complex mathematical problems that he had struggled to solve.
“In most cases, I just ran out of steam,” he said.
So one day he took one of these — finding a mathematical proof about the properties of multidimensional objects — and put his thoughts on his blog (www.gowers.wordpress.com). How would other people go about solving this conundrum? Would somebody else have any useful insights? Would mathematicians, notoriously competitive, be prepared to collaborate?
“It was an experiment,” he said. “I thought it would be interesting to try.”
He called it the Polymath Project and it rapidly took on a life of its own. Within days, readers, including high-ranking academics, had chipped in vital pieces of information or new ideas. In just a few weeks, the number of contributors had reached more than 40 and a result was on the horizon. Since then, the joint effort has led to several papers published in journals under the collective pseudonym DHJ Polymath. It was an astonishing and unexpected result.
“If you set out to solve a problem, there’s no guarantee you will succeed,” Gowers said. “But different people have different aptitudes and they know different tricks ... it turned out their combined efforts can be much quicker.”
This ability to collaborate quickly and transparently online is just one facet of a growing movement in research known as open science.
There are many interpretations of what open science means, with different motivations across different disciplines. Some are driven by the backlash against corporate-funded science, with its profit-driven research agenda. Others are Internet radicals who take the “information wants to be free” slogan literally. Others want to make important discoveries more likely to happen. However, for all their differences, the ambition remains roughly the same: to try and revolutionize the way research is performed by unlocking it and making it more public.
“What we try to do is get people to organize differently,” said Joseph Jackson, the organizer of the Open Science Summit, a meeting of advocates that was held for the first time last year at the University of California, Berkeley.
Jackson is a young bioscientist who, like many others, has discovered that the technologies used in genetics and molecular biology, once the preserve of only the most well-funded labs, are now cheap enough to allow experimental work to take place in their garages. For many, this means that they can conduct genetic experiments in a new way, adopting the so-called “hacker ethic” — the desire to tinker, deconstruct, rebuild.
The rise of this group is entertainingly documented in a new book by science writer Marcus Wohlsen, Biopunk, which describes the parallels between today’s generation of biological innovators and the rise of computer software pioneers of the 1980s and 1990s. Indeed, Bill Gates has said that if he were a teenager today, he would be working on biotechnology, not computer software.
Spurred on by the new-found ability to work outside the system, these rebel biologists believe that the traditional way of doing science is not the most efficient and could even be holding back important developments. | <urn:uuid:b268d9ad-138d-4ac3-9abb-9685ad0f607c> | CC-MAIN-2013-20 | http://www.taipeitimes.com/News/editorials/archives/2011/05/23/2003503916 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.976295 | 736 | 2.765625 | 3 |
A Study About Data Mining in Terms of Web & Text Mining: Its Trends, Issues Applications and Challenges
In present business scenario, databases have been playing a crucial role in providing useful information for decision making regarding various marketing plans and strategies, from years. DBMS supports query languages which are useful for query triggered data exploration, whereas data mining supports automatic data exploration. Data mining is the discovery of useful patterns in data. Data mining are basically used for prediction analysis and classification-e.g. what is the likelihood that a customer will migrate to a competitor. OLAP or online analytical processing helps one in finding valuable information from the past & present massive databases and data warehouses, to retrieve some effective and beneficial information for effective decision making. | <urn:uuid:b8e21149-7dd3-4b0a-8cef-f04ec18a1a1c> | CC-MAIN-2013-20 | http://www.techrepublic.com/whitepapers/a-study-about-data-mining-in-terms-of-web-text-mining-its-trends-issues-applications-and-challenges/24325956 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.874245 | 146 | 2.609375 | 3 |
Energy-Efficient Routing Protocols in Mobile Ad-Hoc Networks
Source: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
An ad-hoc network is a Local Area Network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. In Latin, "Ad-hoc" is actually a Latin phrase that means "For this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad-hoc network refers to a network connection established for a single session and does not require a router or a wireless base station. In this paper, the three routing protocols are studied i.e., AODV, DSR, DSDV. | <urn:uuid:604607b9-7bb0-4680-8214-4d48055f37f2> | CC-MAIN-2013-20 | http://www.techrepublic.com/whitepapers/energy-efficient-routing-protocols-in-mobile-ad-hoc-networks/4394305 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.916478 | 188 | 3.421875 | 3 |
A pancreatic pseudocyst is a fluid-filled sac in the abdomen, which may also contain tissue from the pancreas, pancreatic enzymes, and blood.
Causes, incidence, and risk factors:
The pancreas is an organ located behind the stomach that produces chemicals (called enzymes) needed to digest food. It also produces the hormones insulin and glucagon.
Pancreatic pseudocysts most often develop after an episode of severe, acute pancreatitis . Acute pancreatitis is sudden swelling (inflammation) of the pancreas.
It may also occur after trauma to the abdomen, more often in children.
The cyst happens when the ducts (tubes) in the pancreas are damaged by the inflammation or swelling that occurs during pancreatitis.
A pancreatic pseudocyst may also occur after trauma to the abdomen, and in someone with chronic pancreatitis .
Symptoms can occur within days to months after an attack of pancreatitis, and include:
Bloating of the abdomen
- Constant pain or deep ache in the abdomen, which may also be felt in the back
- Difficulty eating and digesting food
Signs and tests:
The health care provider may palpate your abdomen to feel for a pseudocyst, which feels like a mass in the middle or left upper abdomen.
Tests that may help diagnose pancreatic pseudocyst include:
Treatment depends on the size of the pseudocyst and whether it is causing symptoms. Many pseudocysts go away on their own. Those that remain for more than 6 weeks and are larger than 5 cm in diameter often need surgery.
Surgical treatments include:
- Drainage through the skin (percutaneous) using a needle, usually guided by a CT scan
Endoscopic -assisted drainage using an endoscope (a tube containing a camera and a light that is passed down into the stomach)
- Surgical drainage of the pseudocyst, which involves making a connection between the cyst and the stomach or small intestine. This may be done using a laparoscope.
The outcome is generally good with treatment.
- A pancreatic abscess can develop if the pseudocyst becomes infected
- The pseudocyst can break open (rupture), which can be a serious complication because shock and excess bleeding (hemorrhage) may develop
- The pseudocyst may press down on (compress) nearby organs
Calling your health care provider:
Rupture of the pseudocyst is an emergency situation. Go to the emergency room or call the local emergency number (such as 911) if you develop symptoms of bleeding or shock, such as:
The way to prevent pancreatic pseudocysts is is by preventing pancreatitis. If pancreatitis is caused by gallstones , it is usually necessary to remove the gallbladder with surgery (cholecystectomy). When pancreatitis occurs due to alcohol abuse, the patient must stop drinking alcohol to prevent future attacks.
References: Owyang C. Pancreatitis. In: Goldman L, Ausiello D, eds. Cecil Medicine. 23rd ed. Philadelphia, Pa: Saunders Elsevier; 2007: chap 147.
|Review Date: 1/20/2010|
Reviewed By: David C. Dugdale, III, MD, Professor of Medicine, Division of General Medicine, Department of Medicine, University of Washington School of Medicine; George F. Longstreth, MD, Department of Gastroenterology, Kaiser Permanente Medical Care Program, San Diego, CA. Also reviewed by David Zieve, MD, MHA, Medical Director, A.D.A.M., Inc.
The information provided herein should not be used during any medical emergency or for the diagnosis or treatment of any medical condition. A licensed medical professional should be consulted for diagnosis and treatment of any and all medical conditions. Call 911 for all medical emergencies. Links to other sites are provided for information only -- they do not constitute endorsements of those other sites. © 1997-
A.D.A.M., Inc. Any duplication or distribution of the information contained herein is strictly prohibited. | <urn:uuid:ed5a2eb0-e8ea-4fab-8fd1-06f651a50d13> | CC-MAIN-2013-20 | http://www.texashealth.org/body.cfm?id=3331&action=detail&AEArticleID=000272&AEProductID=Adam2004_1&AEProjectTypeIDURL=APT_1 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.9111 | 859 | 3.6875 | 4 |
November 30, 2007
In 2003, an estimated 1 million persons in the United States were living with human immunodeficiency virus (HIV) infection.1 Approximately 25% were unaware of their infection;1 however, that percentage might have been greater among persons at high risk for HIV infection, including racial/ethnic minority populations.2,3 To increase the proportion of persons aware of their HIV serostatus, CDC launched the Advancing HIV Prevention initiative in 2003.4 One strategy of the initiative is to implement new models for diagnosing HIV infections outside medical settings. During 2004-2006, CDC funded a demonstration project to provide rapid HIV testing and referral to medical care, targeted to racial/ethnic minority populations and others at high risk in outreach and other community settings. This report summarizes the results of that project, which indicated that, of 23,900 clients who received a rapid HIV test, 39% were non-Hispanic blacks, 31% were Hispanics, 17% reported male-male sex, and 6% were injection-drug users. A total of 267 (1%) persons had confirmed HIV-positive test results; of these, 195 (74%) were either non-Hispanic blacks or Hispanics. The project results demonstrate that rapid HIV testing in outreach and other community settings can identify large numbers of persons in racial/ethnic minority populations and others at high risk who are unaware they are infected with HIV.
Rapid HIV testing was conducted by eight community-based organizations (CBOs) in seven U.S. cities: Boston, Massachusetts; Chicago, Illinois; Detroit, Michigan; Kansas City, Missouri; Los Angeles, California; San Francisco, California; and Washington, D.C. (DC). CBOs identified testing venues where persons at high risk congregated, resided, or sought medical care (e.g., parks, shelters, hotels, clubs, health fairs, syringe-exchange sites, and community clinics). Trained CBO staff members offered counseling and rapid HIV testing to clients either in mobile testing units or inside venues. Persons eligible for testing were those capable of providing written, informed consent who met age of consent criteria for HIV testing in the state in which the CBO was operating; persons not meeting these criteria and persons with a previous diagnosis of HIV infection were excluded. CBO staff members collected information from persons tested regarding their demographic characteristics, risk behaviors, and HIV testing history. HIV testing was performed with rapid tests (Oraquick® Rapid HIV-1 Antibody Test or OraQuick® Advance Rapid HIV-1/2 Antibody Test [OraSure Technologies, Bethlehem, Pennsylvania]) on either oral fluid or whole-blood specimens, and results were provided to clients 20-40 minutes after specimens were collected. For persons with reactive (i.e., preliminary positive) rapid test results, testing staff members collected either oral fluid or whole-blood specimens for confirmatory Western blot testing and scheduled a follow-up appointment to give the client the confirmatory test results. HIV-positive persons who returned for confirmatory test results were referred to clinics affiliated with participating CBOs or to other local health-care providers for medical care.
Of 24,172 persons who agreed to be tested, 44 persons did not meet age of consent criteria, and 84 persons reported a previous diagnosis of HIV infection. Data on the total number of persons offered testing were not collected. Of the 24,044 persons who met eligibility criteria for participation and agreed to be tested, 144 were excluded from the analysis because they either did not receive their rapid HIV test results or had missing test-result information. A total of 23,900 persons were included in the analysis: 5,536 from Los Angeles; 5,162 from Boston; 4,586 from DC; 2,985 from Kansas City; 1,931 from San Francisco; 1,868 from Detroit; and 1,832 from Chicago. Among participants, 39% were non-Hispanic blacks, 31% were Hispanics, and 21% were non-Hispanic whites. Sixty-three percent of participants were male, 50% reported not having any public or private health insurance, 40% reported not visiting a health-care provider during the preceding year, and 9% reported being homeless (Table).
Sixty-six percent of participants reported having multiple sex partners, 17% reported male-male sex, and 6% reported injection-drug use during the preceding year. A total of 7,034 (30%) participants had never been tested for HIV; among the 16,543 (70%) who had been tested, 6,982 (43%) had not been tested during the preceding year. Of 14,096 persons who had seen a health-care provider during the preceding year, 6,257 (44%) had received an HIV test during that period, and 3,299 (24%) had never been tested for HIV, including 19 persons who were confirmed to have HIV infection.
A total of 331 persons (1%) had a preliminary positive rapid HIV test result; of these, 286 (86%) received a confirmatory test (Figure). The most common reason cited by persons with preliminary positive HIV test results for refusing confirmatory testing was that they wanted to have the testing performed elsewhere. Of the 286 persons who received a confirmatory test, 267 (93%) were confirmed to have HIV infection, and 17 had negative confirmatory test results (i.e., false preliminary positive rapid HIV test results). The positive predictive value of a preliminary positive rapid result for a confirmed test was 94% (267 of 284). Of the 267 persons with newly diagnosed HIV infection, 200 (75%) received their confirmatory test results. The most common reason cited by participating sites for why clients with preliminary positive test results did not receive their confirmatory test results was that the clients could not be located. Of the 200 persons who received their confirmatory results, 171 (86%) accepted referrals to medical care for HIV; the reasons that 29 persons (14%) did not accept referrals to medical care are not known. Referral to care encompassed a range of actions, including escorting clients to medical care, scheduling medical appointments, or providing contact information for clients to schedule their own appointments.
Reported by: D Aguirre, Bienestar Human Svcs; A Mares-DelGrasso, AIDS Healthcare Foundation, Los Angeles; C Emerson, Tenderloin Health, San Francisco, California. J Tsang, The Night Ministry, Chicago, Illinois. J Pincus, MD, Dotwell, Dorchester, Massachusetts. C Calhoun, Community Health Awareness Group, Detroit, Michigan. H Buckendahl, Kansas City Free Clinic, Missouri. D Dekker, PhD, Whitman Walker Clinic, Washington, DC. K Jafa-Bhushan, MBBS, K Bowles, MPH, H Clark, MPH, B Song, MS, PS Sullivan, PhD, JD Heffelfinger, MD, Div of HIV/AIDS Prevention; J Cleveland, MS, National Center for HIV, Viral Hepatitis, STD, and TB Prevention; E Tai, MD, EIS Officer, CDC.
The Advancing HIV Prevention demonstration project described in this report provided rapid HIV testing to 23,900 persons, including 30% who had never been tested previously for HIV, and identified 267 newly diagnosed cases of HIV infection. Seventy percent of those tested were in racial/ethnic minority populations at greater risk for HIV infection, and 66% had multiple sex partners. These results suggest that rapid HIV testing in outreach and other community settings can effectively target substantial numbers of persons at high risk for HIV infection. Overall, approximately 1% of persons tested had newly diagnosed HIV infection. This is comparable to the 1% rate of positive test results at CDC-supported HIV counseling and testing sites, although clients differed in referral status, race/ethnicity, and risk behaviors.5
In this project, the percentage of persons who had been tested previously for HIV (70%) was lower than the percentage (73%-88%) who reported being tested previously in a 2002 survey of populations at high risk for HIV infection.6 Overall, in this project, 75% of persons with confirmed positive HIV tests received their results, a rate similar to those reported previously from six rapid HIV testing studies.7 Nonetheless, improved strategies might increase that proportion and also the proportion of clients who receive their results and accept referral to medical care. One strategy to improve the rate of referral might be to refer persons with preliminary positive HIV test results immediately to medical care rather than waiting until results of confirmatory testing are available. This strategy would eliminate the need for clients to return to the testing site to receive confirmatory results before being referred to medical care. Another way to increase acceptance of referral might be to use a combination of rapid HIV tests rather than a Western blot test to confirm preliminary positive HIV results. This practice would allow clients to receive a preliminary positive HIV test result and a confirmed test result rapidly and be linked to health-care and prevention services the same day.8 CDC currently is evaluating use of a confirmatory algorithm with a combination of rapid tests. However, until this strategy can be validated, preliminary positive tests should always be confirmed with Western blot tests.
In this project, 19 persons with newly diagnosed HIV infection had visited a health-care provider during the preceding year but had never been tested for HIV; these persons appear to represent missed opportunities to test medical patients routinely in populations at high risk for HIV infection. In 2006, CDC published revised recommendations for HIV testing in medical settings, including routine HIV testing for patients aged 13-64 years in all health-care settings.9 Routine testing without risk assessment can identify persons with undiagnosed HIV infection and reduce the reluctance associated with testing protocols that require assessment of risk behavior.10
The findings in this report are subject to at least three limitations. First, the project did not track the number of persons who were offered testing; therefore, the rate of acceptance of rapid HIV testing in outreach and other community settings cannot be calculated. However, rapid HIV testing has been preferred over conventional HIV testing.8 Second, selection of venues for HIV testing by the CBOs was not systematic; therefore, those persons tested might not be representative of all persons served by the CBOs, and other risk factors for HIV infection might exist that were not elicited. Finally, information regarding whether the 171 persons with newly diagnosed HIV infection who accepted referral to medical care were actually linked to HIV care (e.g., made at least one follow-up medical visit) was either incomplete or unavailable for most participating CBOs.
This project demonstrated that rapid HIV testing in a range of settings can effectively target multiple populations at high risk for HIV infection. Offering rapid HIV testing in outreach and other community settings provides opportunities to identify HIV infections and to link persons with positive test results to prevention and medical care. | <urn:uuid:09bdc41d-0943-452e-881f-ab3714e6a52c> | CC-MAIN-2013-20 | http://www.thebody.com/content/art44175.html?ts=pf | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962185 | 2,212 | 2.703125 | 3 |
Are Cats Loners?
By Kim Boatman
The stereotype that cats are aloof loners who care more about their food and warm sleeping spots than they do about their humans has been around for years. If such comforts came without you and your companionship, your cat would be out the door, right? Not quite, believe it or not. Plenty of cat owners -- maybe even you -- with friendly, attention-needy felines serve as proof.
Fortunately, it’s not too late to start playing a vital role in your cat’s life. These simple steps can help create a great relationship with your beloved feline.
Cats Are Social
“Dogs, humans and almost all the other species we come in contact with are pack species,” says Dr. Tony Buffington, DVM, Ph.D., director of Ohio State University College of Veterinary Medicine’s Indoor Cat Initiative. “Cats are solitary hunters,” he adds. “A lot of people misinterpret that to mean they are asocial. That’s not really what it means.”
Feral cats hunt alone, but they live in colonies, notes Ingrid Johnson, a Marietta, Ga., cat behaviorist. Supporting this more family-oriented view is a 2006 Harris Interactive survey that found that eight out of 10 veterinarians believe feral cats are in fact social by nature.
Signs of Cat Loneliness
Cats can’t pipe up and tell us they need more face-to-whisker time, but there are warning signs. Take note of the following behaviors, which can indicate your pet’s unhappiness:
- Excessive grooming
- Excessive meowing
- Overeating or not eating
- Coughing up hairballs because of the over-grooming
- A decrease in activity and interaction
Curing Feline Distress
If you detect any of the indicators for loneliness, you can take steps to make sure your cat is not an unhappy feline. Here are some tips:
- Visit your veterinarian first Since the symptoms of loneliness can mimic illness, it’s best to have your veterinarian examine your kitty. You’ll want to rule out physical causes, such as thyroid issues, infections or other health problems, which could be causing your cat’s distress.
- Think pairs If possible, plan to have a cat “family.” For example, Johnson recommends adopting two cats at a time. “I always, always recommend adopting two cats,” she says. “I do not adopt out single cats unless they were raised as a single cat.” She further advises, “Don’t get one little kitten and make them an only child. I do not adopt out kittens unless they are in pairs.”
- Choose companions wisely If you’re attempting to introduce a new kitty to be a companion for your cat, be cautious, say the experts. “If a cat is having problems, getting another cat is like taking a married couple that is having problems and saying, ‘You just need to have children,’” Dr. Buffington says, explaining that such introductions could even backfire, since you’d be adding yet another source of stress to an already maxed-out cat. She also instructs that you consider your cat’s energy level when bringing another cat into your home. As an example, if your kitty is a sedate 10-year-old, a frisky kitten might not make the best companion. “Don’t get a kitten (in this case). Get a pair of kittens so your 10-year-old doesn’t have to wrestle or rough and tumble,” advises Johnson.
- Enrich your cat’s environment Your cat is certain to live a safer, healthier life as an indoor cat. But, like zoo animals, indoor cats are cut off from the more dangerous, yet stimulating, outside environment, says Dr. Buffington. “They are always at risk for loneliness in that situation.” It’s up to you to provide a rich, stimulating environment that engages your cat and prevents its loneliness. You’ll want to make sure your cat has places to climb and scratch, as well as toys that provide mental challenges and let your kitty act out its instinct to pursue prey. “People sometimes think cats will create their environment for themselves,” Dr. Buffington says, pointing out that’s false.
- Be creative about play Too often, we buy cute cat toys on impulse at the pet store, then toss them in a basket. Instead, rotate toys in circulation so your cat doesn’t get bored. Grab a handful of toy mice, or other small toys, and toss them in a catnip marinade in a plastic bag before turning them over to your cat, says Johnson. Feline foraging toys, such as Play-N-Treat balls and the SlimCat, make your cat work for its dry food, since kitties must roll the balls and bat at the containers to get the pellets to dispense. Johnson feeds her cats dry food solely through such foraging toys. Working for the food is “positive frustration. It’s like a little Mensa toy for cats,” she says.
Always remember that your cat does need your interaction, concludes Johnson. “They have independent features and they don’t have that neediness of a dog, so we tend to forget about them,” she says. “But the idea of the loner cat is just folklore.”
Kim Boatman is a journalist and frequent contributor to The Daily Cat, based in Northern California whose work has appeared in The Miami Herald, the Detroit Free Press and the San Jose Mercury News. She is a lifelong lover of animals and shares her home with three cats. | <urn:uuid:24875c3b-c16d-4044-b89a-106213deb963> | CC-MAIN-2013-20 | http://www.thedailycat.com/worldnowweb/behavior/understanding/are_cats_loners/index.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.94862 | 1,244 | 2.5625 | 3 |
Tableaux procession depicts Madurai’s cultural antiquity, history, tradition, and its modernity too
As part of the Maamadurai Potruvom festival, a tableaux procession depicting Madurai’s cultural antiquity, history, tradition, as well as its modernity, was taken out here on Saturday. Artistes performing folk dances and traditional martial arts trailed each tableau.
The procession was flagged off by Governor K. Rosaiah in the presence of Collector Anshul Mishra, Mayor Rajan Chellappa and Corporation Commissioner K. Nanthagopal. A sizeable crowd turned up at Madura College where the procession started.
The tableaux juxtaposed the archaic and the modern — one depicting the maritime trade the Pandyas had with the western world, and another the barter system, carrying the famous Tamil adage Thirai Kadal Odi Thiraviyam Thedu (Cross the seas in search of treasure). Dams, described by Jawaharlal Nehru as the temples of modern India, were depicted in one tableau. The Mullaperiyar dam, built in 1899 and its architect John Pennycuick, the British engineer, were brought to life in another tableau.
Mahatma Gandhi’s connection to Madurai, which shaped the freedom struggle, was also depicted. It was here on September 22, 1921, after interacting with the peasantry in Madurai, Gandhi gave up his customary attire and switched to the loin cloth, instantly identifying himself with the struggling masses.
It reminded the colonisers of their role in the impoverishment of India.
Other tableaux were a mix of common cultural symbols such as the jallikattu, Meenakshi Sundareswarar Temple tower, and Tirumalai Naick Palace.
Paraiattam, karagattam, thevarattam, silambam, oyillattam, thappattam, jikkattam, kokkili kattai aattam, Vaazh Sandai (sword fight) were performed by professionals and college students.
One of the major attractions was students carrying silambu (anklet) depicting the fury of Kannagi who burnt down Madurai, the capital city of the Pandya Kingdom, to avenge her husband Kovalan’s death.
While the performances essentially represented Madurai’s culture, there were elements from across the border as well. The ‘Chenda Melam’ brought a flavour of Kerala culture into the proceedings.
The procession started at Madura College and passed Periyar Bus Stand, Netaji Road, East Masi Street, South Masi Street, and West Masi Street, Yanaikkal, Goripalayam and reached Tamukkam Grounds. Crowds gathered in huge numbers on both sides of the roads to get a glimpse of the procession.
The first tableau was preceded by followers of Hajha Syed Sultan Alaoudeen Syed Sultan Samsudeen Aouliya Dargah in a van, burning ‘sambrani,’ and distributing sweets, and the last of the tableaux was a model of Lord Kallazhagar seated on a galloping horse — to depict the city’s secular nature, said one of the organisers. | <urn:uuid:ca860822-b656-4c8d-ba02-4d8bd5dcaca2> | CC-MAIN-2013-20 | http://www.thehindu.com/todays-paper/tp-national/tp-tamilnadu/public-flocks-to-witness-madurai-past-and-present/article4399270.ece | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.955419 | 690 | 2.828125 | 3 |
The Apocalypse, or Book of Revelation, is not only the last Book of the New Testament, but its most difficult, puzzling, and terrifying. It provided challenges to medieval illustrators and was the source for a number of popular images, such as Christ in Majesty, the Adoration of the Lamb, and the Madonna of the Apocalypse and contributed to the widespread use of the Evangelists' symbols.
Selected images from Apocalypse Then: Medieval Illuminations from the Morgan, an exhibition held at the Morgan are presented here. The exhibition celebrates the completion of a facsimile of the Morgan's Las Huelgas Apocalypse—the latest dated (1220) and largest surviving manuscript of a Spanish tradition of illuminated commentaries on the Apocalypse by the monk Beatus of Liébana. The series of manuscripts constitutes Spain's most important contribution to medieval manuscript illumination.
The Las Huelgas Apocalypse contains three sections: the prefatory cycle, the Apocalypse, and the Book of Daniel.
In addition to forty-nine images from the Las Huelgas Apocalypse, six images from other manuscripts in the Morgan's collections, including the earliest Beatus painted by Maius and one by the Master of the Berry Apocalypse, are in this presentation.
And I saw, from the mouth of the dragon, and from the mouth of the beast, and from the mouth of the false prophet, three unclean spirits go out in the manner of frogs. For these are the spirits of the demons that were causing the signs. And they advance to the kings of the entire earth, to gather them for battle on the great day of Almighty God. "Behold, I arrive like a thief. Blessed is he who is vigilant and who preserves his vestment, lest he walk naked and they see his disgrace." And he shall gather them together at a place which is called, in Hebrew, Armageddon.(Rev. 16:13–16)
According to Beatus, even though the dragon and the beast represent the devil, and the false prophet symbolizes false priests, they all make up the body of Satan. It has been suggested that the features of the false prophet represent him as a Jew; to his left are two of his followers. | <urn:uuid:a90c5337-a5d1-4653-98ec-b52b05ced067> | CC-MAIN-2013-20 | http://www.themorgan.org/collections/swf/pageEnlarge.asp?id=527 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.948525 | 448 | 3.140625 | 3 |
These words were spoken by Asoka, the third emperor of the Mauryan dynasty of India and the best known ancient ruler of India. Asoka was born in 304 BC and came to the throne in 270 BC, after a power struggle that resulted in the death of one of his brothers. In 260 BC, Asoka attacked Kalinga (present day Orissa) in order to expand his empire, which he ruled as a tyrant at that time. This campaign was successful, but resulted in a horrible loss of life. Overwhelmed by the carnage he had caused, Asoka changed his way of life.
Back to "Mauryan Empire" Chronology
In remorse for his bloody attack on Kalinga, Asoka renounced war forever and became a Buddhist. He sent missionaries to South East Asia, Cyrene (present day Libya), Egypt, Syria, and Macedonia. His son, Mahinda, became a Theraveda monk and was sent to introduce Buddhism to Sri Lanka. In Asoka's empire, all religions were tolerated but Buddhism was preferred. Buddhism became a dominant religious force under Asoka.
Although Asoka was not known as a skillful politician, he was devoted to the well-being of his subjects. He made provisions for public health care for both humans and animals, introduced improvements in agriculture and horticulture, established wildlife reserves, and sponsored cave excavations to create shelter for traveling monks and ascetics. Asoka campaigned for moral, spiritual, and social renewal. He had inspectors of morality, who were appointed to make sure that his policies were carried out. He also reformed the administrative and judicial systems of India.
| Art and architecture in Asoka's empire was scant, but reflected the importance of Buddhism. Some of Asoka's edicts, carved on pillars and rocks, form the earliest known epigraphs in the subcontinent. There are 20 known pillars that Asoka commissioned. These pillars are made out of shafts of sandstone and display Buddhist symbols such as the wheel and the lion. Asoka had a sculpture of four lions placed on top of each of his pillars. These lions remain a national symbol of India today. Asoka's pillars are some of India's earliest major stone sculptures. The artistic and Buddhist advancement under Asoka encouraged the further development of stone architecture.
The impacts of Asoka's reign are chiefly religious. He was the first powerful monarch to practice Buddhism. He united most of the subcontinent and introduced it to Buddhism, and his missionary activity is credited with the firm establishment of Buddhism in Sri Lanka.
The Dictionary of Art, Ed. Jane Turner (New York; Macmillan Publishers Limited)
The Encyclopedia of Ancient Civilization, Ed. Arthur Cotterell (New York; The Rainbird Publishing Group Limited, 1980)
Grove, Noel, Atlas of World History (Washington DC; National Geographic Society, 1997) | <urn:uuid:b0deb57f-ddec-4655-91a7-8602e12c16dd> | CC-MAIN-2013-20 | http://www.thenagain.info/WebChron/India/Asoka.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.978589 | 591 | 4.21875 | 4 |
- The Reliability of the New Testament, by Phil Fernandes
- Background Issues to the Study of the New Testament, by Ben Witherington III
- The Four Gospels and the Other Gospels: Is Our Canon Right?(MP3), by Richard Bauckham
- The Gospel of Matthew-- Matthew, a tax-collector and apostle.
- The Gospel of Mark-- Mark, a follower of Peterand also of Paul.
- The Gospel of Luke-- Luke, a follower of Paul and a physician.
- The Gospel of John-- John, a fisherman and apostle.
- Epistle to the Romans
- First Epistle to the Corinthians
- Second Epistle to the Corinthians
- Epistle to the Galatians
- First Epistle to the Thessalonians
- Second Epistle to the Thessalonians
- First Epistle to Timothy
- Second Epistle to Timothy
- Epistle to Titus
- Epistle to the Hebrews-- Anonymous, traditionally attributed to Paul, but differs greatly from both original Pauline letters and deuteropauline tradition
- Epistle of James-- James, "the brother of the Lord"
- First Epistle of Peter-- Peter the Apostle
- Second Epistle of Peter-- Peter the Apostle
- First Epistle of John-- John the Apostle
- Second Epistle of John-- John the Apostle
- Third Epistle of John-- John the Apostle
- Epistle of Jude-- Jude, brother of James
Historicity of the New Testament
See main article: Historicity of the New Testament
New Testament use of the Old Testament
The New Testament use of the Old Testament is an important issue within the study of the interpretation of the Bible and especially messianic prophecies concerning Jesus. "The fourth edition of the United Bible Societies' Greek Testament (1993) lists 343 Old Testament quotations in the New Testament, as well as no fewer than 2, 309 allusions and verbal parallels. The books most used are Psalms (79 quotations, 333 allusions), and Isaiah (66 quotations, 348 allusions). In the Book of Revelation, there are no formal quotations at all, but no fewer than 620 allusions."
See main article: New Testament use of the Old Testament
New Testament Textual Criticism
New Testament Textual Criticism examines the existing manuscript witnesses to the New Testament in order to produce a text that is as close as possible to the original. The New Testament has been preserved in more manuscripts than any other ancient work, having over 5,300 Greek manuscripts dating from the 3rd century to the 16th century. The task of the textual critic, therefore, is to sort through the variants and establish a "critical text" that is intended to represent the original by best explaining the state of all extant witnesses.
See main article: New Testament Textual Criticism
- Kenneth Berdingand Matthew Williams, What the New Testament Authors Really Cared About: A Survey of Their Writings. Kregel, 2008.
- Gary M. Burge, et al. The New Testament in Antiquity: A Survey of the New Testament within Its Cultural Context. Zondervan, 2009.
- D. A. Carsonand Douglas Moo, An Introduction to the New Testament.2nd edition. Zondervan, 2005.
- Walter A. Elwell and Robert W. Yarbrough, Encountering the New Testament,: A Historical and Theological Survey. 2nd edition. Baker Academic, 2005.
- Scot McKnightand Grant Osborne, eds. The Face of New Testament Studies: A Survey of Recent Research. Baker Academic, 2004.
- David DeSilva, An Introduction to the New Testament: Contexts, Methods and Ministry Formation. IVP, 2004.
- New Testament Reading Room(NT resources, incl. commentaries), by Arnold Neufeldt-Fast, PhD, Tyndale Seminary
- IVP New Testament Commentaries
- Five Foundations for Unity in the NT, by Matt Harmon
- New Testament Worldview(PDF), by Vern Poythress
- The Pastoral Epistles and the Mind of Paul, by Donald Guthrie | <urn:uuid:05f64b9d-bf80-46d2-915a-2a7e85bb12c8> | CC-MAIN-2013-20 | http://www.theopedia.com/New_Testament | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.837909 | 876 | 3.03125 | 3 |
What you need to know about food poisoning.
Every year in North America, there are millions of cases of food poisoning. Food borne illness can be serious particularly in the elderly, those with chronic disease and low immunity, and in children explains Lynn Wilcott of the Food Protection Services at the BC Centre for Disease Control.
“A lot of people think that it’s just 24-hour flu and for most people, that’s true. But in about two to three percent of cases severe complications can occur. With E. coli, especially in young children, it can cause permanent kidney damage or even worse, it can be fatal. Salmonella, both in children and in adults can cause a variety of complications. Some of these include rheumatoid arthritis, which can permanently damage the valves in the heart. Another one is Listeria. It can cause permanent brain injury.”
The Parent Report’s expert guest it Lynn Wilcott of Food Protection Services at the BC Center for Disease Control.
From the nationally syndicated radio show “The Parent Report”, hosted by Joanne Wilson and heard on more than 100 radio stations. Any advice or information contained herein should never be a substitute for professional and/or medical advice, diagnosis and treatment. For more information please review Terms of Service | <urn:uuid:839ff6b5-0020-4c5e-b2f5-c0294d68fa03> | CC-MAIN-2013-20 | http://www.theparentreport.com/2012/06/the-dangers-of-food-poisoning-in-children/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.924531 | 271 | 3.046875 | 3 |
We have earlier seen the difference between SQL and NoSQL. Now in this post I will tell you the basic difference between SQL and MySQL. Most people find it hard to wrap their head around SQL and MySQL, and you might be one of those. There are books about SQL everywhere, and for good reason! Reading these books has helped me in differentiating both the concepts, viz. SQL and MySQL.
To begin with, let us explain you both technologies, and this is how they are defined:
SQL vs MySQL
SQL stands for Structured Query Language. It’s a standard language for accessing and manipulating databases. MySQL is a database management system, like SQL Server, Oracle, Informix, Postgres, etc. MySQL is a RDMS (Relational Database Management System).
When considering a utility for data management the two most popular choices are MySQL and SQL Server. Both are efficient at keeping your data organized and readily available through a user interface. Both technologies have the concept of schema (that is table storage) for data storage.
SQL is a language. Specifically, the “Structured Query Language” Now it would be better if we start differentiating the topic as difference between SQL server and MySQL and take them point by point.
SQL Server and MySQL Vendors:
The MySQL development project has made its source code available under the terms of the GNU General Public License, as well as under a variety of proprietary agreements. MySQL was owned and sponsored by a single for-profit firm, the Swedish company MySQL AB, now owned by Oracle Corporation.
SQL server is owned by Microsoft and is typically referred as Microsoft SQL Server. It has a long history of releases and it is updated often adding all latest trends and technologies to it thus making it one of the trusted data base applications today. At the 2011 PASS summit on October 11, Microsoft announced that the next major version of SQL Server, codenamed Denali, would be SQL Server 2012. The release date is set to the first half of 2012.
Strengths: SQL Server and MySQL
To give a better idea of the differences in MySQL and SQL Server -MySQL is geared more toward selecting data so it can be displayed, updated and saved again. MySQL is weaker in the areas of inserting and deleting data. But it is an excellent choice, for data storage and referencing data.
Here are some specific technical differences in MySQL and SQL Server when it comes down to the ANSI SQL standard: Features like stored procedures, triggers, views, and cursors became a part of the MySQL database server in MySQL version 5.0 and still you won’t find a rich feature set in terms of development functions and capabilities. However MySQL’s stored code-objects are close to ANSI standards, but again, they don’t have the breadth and depth of T-SQL, Microsoft and Sybase’s proprietary extension to SQL.
Security: SQL Server and MySQL
Security is a major concern for data management. Both technologies, that is MySQL and Microsoft SQL Server, are EC2 complaint and make sure that they have adequate security support for building government applications. Going down the line Microsoft’s SQL Server, leads the way in offering all-round security features, as Microsoft’s Baseline Security Analyzer helps administrators ensure that the SQL Server installation is up to date. MySQL has no such tool to do so.
Support: SQL Server and MySQL
Both SQL server and MySQL has the support from their respective vendors both in free and paid form. MySQL as we know is now a subsidiary of Oracle which is a Capability Maturity Model (CMM) level 5 company and offers support via technical representatives and ”Virtual MySQL DBA Assistant”.
On the other hand Microsoft has been pioneering SQL server over years and assures assistance on its SQL database and Cloud storage. Further more a free Microsoft SQL Server Migration Assistant (SSMA) makes it easy to migrate data from Oracle, Microsoft Access, MySQL, and Sybase to SQL Server.
Latest release: MySQL and SQL Server
MySQL has the stable version of MySQL 5.5.19. Microsoft’s SQL Server is currently available as SQL Server 2008 R2. SQL Server 2012, with many new features, was announced in the Pass Summit, October 2011, and is expected to be available in the first half of 2012.
Conclusion: MySQL vs SQL Server
As we have seen the difference between SQL Server and MySQL, the picture is now almost clear. It all comes down to your needs, how much secure, scalable and efficient database you want. From most points it is clear that Microsoft’s SQL Server provides some extra features over MySQL and is more trusted in the development market. | <urn:uuid:e9f247fc-4fee-4b8b-b562-8cda732357ec> | CC-MAIN-2013-20 | http://www.thewindowsclub.com/difference-sql-mysql | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.929967 | 967 | 2.953125 | 3 |
Avodas Perach The Importance of Purpose
The Egyptians started to make the Israelites do labor designated to break their bodies (Shemos 113).
In order to keep Bnei Yisrael occupied so that they would not have time to think about Moshe’s words heralding their freedom, Pharaoh decreed that henceforth the Jewish slaves would have to collect their own straw while maintaining their previous quota of bricks. Why did Pharaoh not just double their quota? In that way, he would have forced Am Yisrael to work harder and would have benefited from a doubling of production.
The Torah describes our labor in Egypt as avodas parech, literally work that breaks the person. Avodas parech is defined as work that has no purpose and is designed just to keep the slave busy (see Rambam, Hilchos Avadim 116). We are specifically forbidden to work a Jewish slave in this fashion (Vayikra 25 43).
Pharaoh understood that nothing so diminishes a person as seeing no purpose to his activity, no result in which he can take pride. Thus he had Jewish slaves build arei miskenos, which can be translated as pitiful cities. These cities, says the Midrash, were built on the foundations of sand, and toppled over immediately after being built, only to be rebuilt again. Thus, doubling the Israelites workload without doubling production fit perfectly into Pharaoh’s plans.
Work can be exhilarating, fulfilling and ennobling, but only when it is melachah-purposeful work, work with a goal. But purposeless work (avodah) only serves to break a person’s spirit. A prisoner in a Soviet labor camp was confined to his cell for ten years and forced to turn a handle that protruded from his cell wall. He was told that the handle turned a flour mill on the other side, but upon being liberated, discovered that the handle was connected to nothing. The realization that he had labored for nothing was more crushing to him than the ten years of imprisonment.
The Talmud (Beitzah 16a) calls the Babylonians foolish for eating their bread with bread. The ba’alei mussar explain that they were caught in a vicious cycle with no purpose other than its own perpetuation. They worked only in order to earn enough bread to have the strength to work another day and earn more bread to sustain themselves for another day. Working to eat so that one can work some more results in a life with no purpose. When the necessity of earning a living is removed from such a life it loses all meaning. That is why so many retirees become depressed, and even suicidal, when they stop working.
Those with Torah are spared this plight, for they realize that everything they do is to secure eternal life in Olam Haba. This recognition gives meaning and value to all of life’s pursuits, for the greater the purpose and goal, the more significant the effort. “Six days shall you labor (ta’avod) and do all your melachah, and the seventh day will be a Sabbath to Your Lord …” (Shemos 20:9-10). What transforms a person’s menial labor (avodah) into purposeful, creative activity (melachah) is Shabbos, the taste of Olam Haba in this world.
The word es bash has the numerical value of thirty-nine, corresponding to the thirty-nine melachos of Shabbos, the creative activities that went into building and maintaining the Mishkan. Thus the opposite of avodas perach-aimless, purposeless work- is meleches hamishkan, meleches Shabbos-purposeful work that leads to eternal results.
Women many times feel that their work is avodas perach, with no lasting results. The clean clothes are soon soiled again, the house messed up as soon as it is straightened. The result of hours of toil in the kitchen are not framed and saved for perpetuity, but quickly devoured. The key to making these chores ennobling and exhilarating is constantly remembering their ultimate goal the creation of an atmosphere enabling each member of the family to function properly and develop his or her ultimate potential.
Moshe was initially instructed to tell Pharaoh that the Jews wanted to leave Egypt for three days of celebration and sacrifice in the desert. Pharaoh was not told of the real intent of their departure so that he could exercise his free will. Had he been told that the Jews wished to leave forever, he could not possibly have granted their request. Klal Yisrael, on the other hand, had to be told the truth about their departure even though the prospect of having to conquer the Land might fill them with dread, for the ultimate goal of Eretz Yisrael gave meaning to the entire Exodus.
In this light, we can understand the following Midrash. Moshe proclaimed, “I sinned with the word az, and I will rectify [my sin] with the word az. I sinned by saying ‘From when (me’az) I approached Pharaoh to speak in Your name, things have gotten worse for the Jewish people’ (Shemos 5 23). And I will rectify [my sin] with the word az-’Then (az) Moshe will sing the song at the Red Sea’ (Shemos 151).”
Moshe sinned by isolating a moment – Pharaoh’s decree of additional labor – and not placing it in the perspective of the ultimate goal. Had Moshe seen the decree as one more stage towards the eventual Redemption, he would have viewed it differently. Moshe rectified his error when he sang at the splitting of the Sea not only for the moment of present salvation, but for all the future redemptions until the resurrection of the dead. Thus he sang in the future tense.
The Mishnah in Pirkei Avos (1:3) says that one should not serve Hashem in order to receive reward. Rambam (Hilchos Teshuvah 10:1) explains the reward referred to includes even the reward of Olam Haba for fulfilling the mitzvos. Rather one should serve Hashem out of pure love and devotion, with no ulterior motive at all. Yet the Torah is full of verses that exhort us to observe its commandments “in order that you live” or “in order that your days be multiplied,” (see e.g., Shemos 20:12, Devarim 4:1, 4:40, et. al.)- which are understood as referring to eternal life.
The resolution of this seeming contradiction is that the knowledge that the mitzvos result in eternal life gives added dimension and significance to the performance of the mitzvah itself-apart from any concern with the reward of Olam Haba – and thereby engenders greater love for the commandments. In this context, does not mean “in order that,” referring to a consequence of the performance of the mitzvos, but rather “because” in the sense of revealing the true significance of the mitzvos. Recognition of that significance enhances the love of the Creator, Who bestowed His creation with eternal meaning.
To truly appreciate the significance of our mundane pursuits and the mitzvos that constitute our service of Hashem, we must be constantly aware of our ultimate goal of bringing the world to perfection by fulfilling God’s will. | <urn:uuid:a35e0935-d75d-4bb4-b74b-f10670a93eef> | CC-MAIN-2013-20 | http://www.theyeshivaworld.com/article.php?p=151129 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.962026 | 1,579 | 3.671875 | 4 |
The U.S. Drought Monitor released Thursday shows drought conditions in Wichita County ranging from exceptional in the northwest to extreme in the center and severe in the southeast. Exceptional is the most intense drought rating issued by the Drought Monitor, a collaborative effort of several federal agencies and academic entities.
Except small portions of East Central and southwest Texas, all of the state is under some category of drought classification ranging from abnormally dry to exceptional.
The exceptional drought areas include portions of the Panhandle and South Plains, a swath in north central Texas, a portion of southeast Texas and a narrow band that runs through Wichita, Wilbarger, Baylor and Knox counties. An exceptional drought is defined as an area having exceptional and widespread crop/pasture losses and shortages in reservoirs, streams and wells creating water emergencies.
Also, the U.S. Seasonal Drought Outlook issued Thursday for the period through Feb. 28, 2013, indicates that most of Texas and much of the western U.S. will see persistent drought. The outlook also predicts those parts of Texas not currently in drought conditions are likely to move into drought stage. | <urn:uuid:e3f34eba-a2b1-474b-997d-05a3dda73ae1> | CC-MAIN-2013-20 | http://www.timesrecordnews.com/news/2012/dec/07/parts-of-county-now-in-most-intense-drought/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.950616 | 228 | 2.734375 | 3 |
Rabbi Shlomo Jarcaig
This Shabbos we begin reading from the Torah's fourth book, Bamidbar.
Bamidbar is also known as Sefer Hapekudim - the book of counting or the book
of numbers. Indeed, this week's Parsha (portion) deals almost exclusively
with the counting of the Jewish people, and it is this Parsha that is read
every year on the Shabbos before Shavuos, the holiday celebrating the
receiving of the Torah at Sinai.
The Shabbos prior to each of the festivals embodies the spirit and theme of
the upcoming holiday. The Shabbos before Yom Kippur is called Shabbos Shuva
(the Shabbos of Return). Even though repentance is not generally a primary
focus of Shabbos, the Shabbos between Rosh Hashana and Yom Kippur, a time
when our concentration is returning to the path of G-d, finds itself shifted
toward the theme of the upcoming holiday. What about the inauguration of
Bamidbar is apropos to the forthcoming celebration of Shavuos? What is the
allusion in the Parsha to this holiday's theme?
Our sages teach that the letters of our national moniker are an acronym for
a fundamental lesson in national identity. The five Hebrew letters that
spell "Yisrael" represent "yesh shishim ribu osiyos latorah" - there are six
hundred thousand letters in the Torah. There is another important "600,000"
in Judaism: the census of Jews who accepted the Torah at Sinai, who are, in
fact, the original Klal YISRAEL. But what is the correlation between the
Jewish population and the letters of the Torah? What are our Sages trying to
When the Children of Israel encamped at Sinai, the Torah uses the singular
"vayichan" - "and HE camped" (Shemos/Exodus 19:2) - not the plural
"vayachanu" - "and they camped". Rashi quotes the famed comment of Mechilta:
they camped as one man with one heart, with a complete unity. The
aforementioned acronym of Yisrael teaches us that just as a Torah scroll
that is missing even one letter is completely invalid, similarly the Jewish
nation could not receive the Torah without this complete unity, as one
cohesive unit. Each individual is crucial for the nation as a whole, and if
even one individual is not included the entire nation is incomplete.
Thus we understand the juxtaposition of our Parsha to the holiday. G-d
instructed Moshe on a number of occasions to count the nation on a tribal
basis. A significant portion of the Torah is dedicated to the details of
these censes. With this the Torah emphasizes the importance of each
individual in the eyes of G-d. Only by appreciating each other, and
overlooking our differences, can we once again come together and truly
deserve to reacquire the Torah. Only then can we genuinely celebrate
Have a good Shabbos!
Copyright © 2002 by Rabbi Pinchas Avruch and Project Genesis, Inc.
Kol HaKollel is a publication of the Milwaukee Kollel Center for Jewish
Studies 5007 West Keefe Avenue; Milwaukee, Wisconsin; 414-447-7999 | <urn:uuid:a64ca316-1105-4cc1-a8b0-5fa12cb6a2c2> | CC-MAIN-2013-20 | http://www.torah.org/learning/kolhakollel/5762/bamidbar.html | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.907627 | 733 | 3.140625 | 3 |
Tetun is used on parts of Timor Island, which is politically divided between Indonesia and Timor-Leste (East Timor).
|Items shown below:
Tetun Prasa dialect
The Prasa dialect of Tetun is used in much of Timor-Leste (East Timor).1) Hau-nia kuartu iha nebé?
Language information at Wikipedia and Ethnologue
Writing system information at Wikipedia and Omniglot
Tetum Mix is used by members of the younger generation who were raised mixing languages at home and with their families.
It is used in and around Dili and draws mostly from Tetun, Portuguese, and Indonesian.
Language information at Ammaved Viver's language project at the University of Hawai'i at Manoa
Alternate names for Tetun include Tetum, Tettum, Teto, Tetu, Tetung, Belu, Belo, Fehan, and Tetun Belu
|The four essential
travel phrases in English:
1) Where is my room?
2) Where is the beach?
3) Where is the bar?
4) Don't touch me there!
|Do you have a language or dialect to add?
Did I get something wrong?
Please let me know... | <urn:uuid:08cc5dcf-939f-495c-a70e-b8eb4a44fcfa> | CC-MAIN-2013-20 | http://www.travelphrases.info/languages/tetum.htm | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.906378 | 272 | 3.140625 | 3 |
An extensive, scant desert landscape surrounds the Petrified Forest National Park, east of Arizona. Two hundred million years ago, this region was a swampland inhabited by various species of dinosaur whose fossilized remains can be found throughout the park.
The sight of the magnificent rock formations of Bryce Canyon, to the southwest of Utah, is a truly breathtaking experience. In their native tongue, the region’s Paiute Indians once named this remarkable place as, “Red rocks that stand like men in a bowl-shaped canyon”. Since the first settlers arrived in Bryce Canyon, many have found it difficult to describe this beautiful and unique world of natural stone. The sheer vastness of the region, along with its seemingly endless variety of rock formations, makes any visit a rewarding and memorable experience.
It is from the steep cliffs of New England’s coast, to the north of the State of Maine, that the power of the sea manifests itself and as soon as the mist begins to clear in the Acadia National Park, the view reveals the magnificent forests that have made it such a popular sightseeing destination. From September to the end of November, the forests of New England shine out in remarkable and truly amazing color.
Surrounded by the grey limestone of the Muddy Mountains, the rocks in the Valley Of Fire, the oldest state park in Nevada, glow with a remarkable intensity. The red rocks do indeed appear to burn in a magical fire that seems to transform them into stone.
Mono lake is the greatest crater lake in the world and although it is one of the oldest lakes in North America, its water is three times as salty as the sea!
Situated in the state of Utah, Arches National Park is one of the most famous national parks in North America and owes its fame to its fantastic sandstone arches. In spite of its comparatively modest size of 300 square kilometres, it boasts one of the most magnificent landscapes in the entire south west of the United States. | <urn:uuid:bf255d65-de6d-408e-ad6f-7ba70943a861> | CC-MAIN-2013-20 | http://www.travelvideostore.com/north-america/united-states-travel-videos/maine-dvds/cosmos-global-documentaries-north-america-wonderland-of-nature-part-2/ | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.958563 | 405 | 2.609375 | 3 |
Auto Racingby Marcello Nizzoli
1925 Citroen Advertisement Poster by Artist Marcello Nizzoli.It was Andre Citroen who introduced mass production to France in 1919. Previous to that time, the assembly process was known only in the United States where Henry Ford had originated the moving assembly line in 1913. The idea was a profitable one when the wealthy Citroen, who had been a munitions manufacturer during World War I and was left with a large factory and few orders after the war, recognized the potential for directing his capability toward the production of automobiles. This Italian advertisement goes hand-in-hand with the automobile's sound economical tradition, stating that Citroen is the basis of all solid business affairs - an industrial giant crunches numbers in the company of his auto. Nizzoli was a most versatile artist, being a painter, decorator, textile designer and posterist. Many of his posters were for automobile companies. In 1938, he joined Olivetti and was responsible for some of their finest images of the 40s and 50s. Rare! | <urn:uuid:079a0ea7-e736-49ec-ac89-72604e317540> | CC-MAIN-2013-20 | http://www.trueartworks.com/poster.php/0000-0517 | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709037764/warc/CC-MAIN-20130516125717-00043-ip-10-60-113-184.ec2.internal.warc.gz | en | 0.980209 | 220 | 2.640625 | 3 |
Subsets and Splits