content
string | pred_label
string | pred_score
float64 |
---|---|---|
Take the 2-minute tour ×
Let's say that I ask a user for raw input and they said, "This is a message." If that raw input contained the word "message" it would perform an action after that. Could I see how this can be done?
share|improve this question
If you try to build a content filter, consider this: the word "classic" has "ass" in it (which, btw. is another term for donkey). This is of course only a sample- – knitti Oct 9 '10 at 21:36
add comment
3 Answers
up vote 2 down vote accepted
Going based on the comment by @knitti, the problem is that you need to split up the sentence into words first, then check:
term = "message" #term we want to search for
input = raw_input() #read input from user
words = input.split() #split the sentence into individual words
if term in words: #see if one of the words in the sentence is the word we want
Otherwise if you had the sentence "That one is a classic" and you tried to check if it contained the word "ass", it would return True incorrectly.
Of course, this still isn't perfect because then you might have to worry about things like stripping out punctuation and what not (like , . etc.) because otherwise the sentence "That one is a classic." would still return False for a search for "classic" (because of the period at the end). Rather than reinvent the wheel, here's a good post on stripping punctuation from a sentence in Python:
There's case-sensitivity to consider too, so you might want to change the raw_input result and your search term to lowercase before doing a search. You could easily do that by just using the lower() function on the str class.
These problems always seem to simple...
share|improve this answer
add comment
if "message" in sentence:
share|improve this answer
Thank you amte! I kinda feel stupid after giving me this answer. – Noah R Oct 9 '10 at 21:37
add comment
This is of course a very simple example:
if "message" in raw_input():
If you are required to map different words to different actions, then you could do something like this:
# actions
def action():
print "action"
def other_action():
print "other action"
def default_action():
print "default action"
# word to action translation function
def word_to_action(word):
return {
"message": action,
"sentence": other_action
}.get(word, default_action)()
# get input, split into single words
w = raw_input("Input: ").split()
# apply the word to action translation to every word and act accordingly
map(word_to_action, w)
Note, that this also defines a default action for the case when the input does not contain any of the trigger words.
See here for more details on the above mapping idiom, which is actually Python's way of achieving 'switch statement'.
share|improve this answer
add comment
Your Answer
|
__label__pos
| 0.795175 |
0141 area code
Glasgow phone numbers
Google Map of area
UK area code 0141 is for the city of Glasgow and the surrounding area.
Areas using 0141 numbers include Baillieston, Barrhead, Bearsden, Bishopbriggs, Bridgeton, Busby, Cambuslang, Clydebank, Cranhill, Croftfoot, Drumchapel, Erskine, Giffnock, Govan, Halfway, Ibrox, Kirkintilloch, Langside, Maryhill, Merrylee, Milngavie, Newton Mearns, Paisley, Pollok, Possil, Provanmill, Renfrew, Rutherglen, Scotstoun, Shettleston, Springburn, Stepps and Thornly Park.
0141 number call costs
0141 numbers are normal, landline numbers charged at standard rates.
Formatting an 0141 number
Local telephone numbers in Glasgow are seven digits long. An 0141 number should be displayed in the format:
0141 xxx xxxx or (0141) xxx xxxx
For international callers, use: +44 141 xxx xxxx
Displaying 0141 numbers in the correct format makes them easier to remember and dial correctly. [How...]
History and Notes
The 0141 area code has existed since 16th April 1995. Prior to this date the code was 041.
See misquoted versions...
|
__label__pos
| 0.972128 |
Skip the navigation
QuickStudy: Computer forensics
April 17, 2006 12:00 PM ET
Computerworld -
Listen to the Computerworld TechCast: Computer Forensics.
IT managers aren't likely to confront dead bodies on the job, but a rudimentary knowledge of evidence, as it relates to computer data, can help protect your organization's operations, data and processes. In today's computer-driven world, where networked e-mail and instant messaging are the communication norms, knowing how to collect, handle and analyze information on a miscreant's computers can be critical to a successful civil or criminal prosecution.
There are two categories of computer crime: criminal activity that involves using a computer to commit a crime, and criminal activity that has a computer as a target, such as a network intrusion or a denial-of-service attack. The same means of gathering evidence are used to solve both types of crimes. And the same kinds of skills used by the lawbreakers are needed to track them down.
It Takes an Expert
Computer forensics is not a task to be undertaken lightly by just any IT worker. Instead, it calls for specialized skills and careful, documented procedures. A forensics expert knows what signs to look for and can identify additional information sources for relevant evidence, including earlier versions of data files or differently formatted versions of data used by other applications.
Special Report: Security
Our Commenting Policies
|
__label__pos
| 0.994422 |
Bookmark Email Print page
Augmented Government
Transforming government services through augmented reality
Now widely available through smartphones and headwear, augmented reality (AR) is helping us make more complex decisions faster and more effectively. This paper explores how the existing and emerging capabilities of AR could be used to revolutionise government agencies and improve real-time and mobile government services.
For example, AR could play a substantial role in reducing the risk and errors associated with security screening. contextual checklists overlaid over security officers’ vision could standardise operations, while facial and behavioural recognition algorithms could be used to decrease the number of false positives in screening, confirm travellers’ identities in real time and help identify travellers exhibiting potentially threatening behaviours.
AR is also poised to drastically transform how training is conducted – particularly in high-risk environments. AR-enabled interactive training makes it possible to simulate scenarios where trainees can see and interact with virtual environments as if they were real. Diminished reality capabilities, on the other hand, can “remove” data from the trainees’ line of site, allowing the variables present in a scenario to change with each iteration so that learners are forced to adapt.
Finally, AR could allow agencies to use 3D mapping and wayfinding capabilities to enhance search and rescue efforts. Examples of this include virtual compasses that show the direction of a target location, displays that direct the user to an objective and three-dimensional mapping of the surrounding environment.
Download the attachment to read more.
|
__label__pos
| 0.995509 |
Return to the Purplemath home page The Purplemath Forums
Helping students gain understanding
and self-confidence in algebra
powered by FreeFind
Find a Staten Island Trigonometry Tutor
Subject: Zip:
55 Subjects: including trigonometry, reading, writing, English
New York, NY
George Q. ...Once you understand a concept, you don’t need to do a lot of routine exercises. Students who are forced to do hundreds of “plug and chug” exercises often wind up hating and fearing math. Who can blame them?
27 Subjects: including trigonometry, calculus, GRE, algebra 1
Morristown, NJ
20 Subjects: including trigonometry, calculus, statistics, geometry
Brooklyn, NY
28 Subjects: including trigonometry, reading, biology, ASVAB
Forest Hills, NY
Yara E. ...I have tutored throughout high school, both high school students and a couple of middle school kids. Two summers, I tutored a class of ten high school students in SAT Math for five weeks. On average, the students increased their math score by at least 120 points by the end of the summer.
9 Subjects: including trigonometry, algebra 1, prealgebra, precalculus
New York, NY
Feedback | Error?
|
__label__pos
| 0.986265 |
Game To Nominate: Can you name the Stations on the Amtrak Northeast Corridor line between Washington DC and Boston?
Why? (optional):
You must be logged in to nominate a quiz.
|
__label__pos
| 0.993678 |
Subscribe English
look up any word, like oscar:
A term used to describe a person giving anal sex. Usually used as a term towards gay men, but can also be used as a term used towards someone that loves anal sex.
"Paul over there is an Anal Attacker because he loves giving it to men in the bum. "
by Sweet330 August 13, 2009
9 2
|
__label__pos
| 0.985843 |
Scientific Essay
Job Description
Ours is a growing world that faces new challenges each day, and we want YOU to share your ideas for how science can help keep our global population supplied with food, safety, and clean energy.
Essays must be between 700 to 1,000 words in length, include a list of research sources, and fall under one of these four categories:
Together, we can feed the world.
Together, we can build a secure energy future.
Together, we can protect people and the environment.
Together, we can be innovative anywhere.
An essay not only gives facts about its subject but shows its writer’s enthusiasm for and intellectual involvement with that subject. In an essay, unlike a report, the writer lets his or her personality come through.
Looking forward to talented writers who can write about one of the 4 topics above.
Skills: science, research
Other open jobs by this client
|
__label__pos
| 0.995319 |
Two different fabrics, 1 yard each 1 clasp Fabric scrap to match the yardage Rotary cutter and mat Sewing machine Scissors Straight pins Needle and thread Thimble
craftzine_poncho_process_03.jpg Step 1: Cut 2 squares from each of your chosen fabrics, for a total of 4 identical squares. Mine are 2′x2′, but if you want a longer or shorter poncho, you can alter the dimensions. craftzine_poncho_process_06.jpg craftzine_poncho_process_08.jpg Step 2: Pin the edges of 2 squares together- one of each fabric- right sides facing in. Give yourself about 1/4″ seam allowance, and then sew them together using the straight stitch on your sewing machine. Then add the next square in the same way, and finally add the fourth square. If you need to, at this point you can hem the edge of the entire poncho. craftzine_poncho_process_09.jpg Step 3: Choose a square for the front of the poncho, and then cut a neckline into it. Insert the point of your scissors right into the place where all the seams meet. Then cut diagonally toward the outer corner of the square. I cut my neckline 12″ long, but you can make yours as long or as short as you like. craftzine_poncho_process_14.jpg Step 4: Cut two matching “petals” from the scrap fabric, and pin one on each side of the neckline. Sew them into place with your machine. craftzine_poncho_process_20.jpg craftzine_poncho_process_21.jpg Step 5: Use the thimble, needle, and thread to sew the clasp onto the petals. Voila! poncho_final_01.jpg
|
__label__pos
| 0.853576 |
NAME: ________________________
Ch. 3 Cells Structure and Function Test
Question Types
Start With
Question Limit
of 35 available terms
Remove ads
5 Written Questions
5 Matching Questions
1. chromosomes
2. ribosomes
3. organells
4. nucleoulus
5. egestion
1. a small particles in RNA and protein found throughtout the cytoplasm
2. b little organs
3. c where assembly of ribosomes begins
4. d eliminating undissolved materials from cells
5. e threadlike structure withing the nucleus containing the genetic information that is passedfrom one generation to the next
5 Multiple Choice Questions
1. tiny pockets form along the cell membrane, fill with liquid, and pinch off to form vaculoes within the cell
2. "locomotion" or "internal" are the two types
3. breaking down food to get only energy
4. formation of new cells
5. barrier of cell only in plant cells
5 True/False Questions
1. cytoskeletonportion of the cell outside the nucleus
2. lyososomessmall organelles filled with enzymes
3. cell membranebarrier of cell only in plant cells
4. excretionremoving desolved waste materials from cells
5. organmany tissues that work together
Create Set
|
__label__pos
| 0.998568 |
A user interface control GUI element, similar to a list box, which allows the user to choose one value from a list. When a drop-down list is inactive, it displays a single value. When activated, it displays (drops down) a list of values, from which the user may select one.
Drop-down list on Wikipedia
Drop-down list image from Wikipedia
history | show excerpt | excerpt history
|
__label__pos
| 0.981495 |
Seaweed is actually a general term used to define what is known as multi-cellular algae that can be found growing in coastlines along the seas, as well as in shallow oceanic areas. Most often, it is used to describe members of the brown, green, and red algae specimens. Later on, as people began to learn and make use of the benefits of seaweed, the term also started to be attached to products that are categorized by usage, such as medicinal, industrial, and food.
At least two critical factors are required by seaweed in order to grow and flourish in an environment. One is that seawater must be present in an area that can also be reached by enough sunlight to induce the chemical reaction known as photosynthesis. Therefore, seaweed is not expected to grow in the deeper regions of the oceans which cannot be reached by sunlight. The other requirement is that seaweed needs to secure itself to a solid foundation or attachment point. For this reason, seaweed is more commonly found along the rocky coastlines rather than along sandy areas.
Contrary to some misconceptions, seaweed is not solely indigenous to Asian waters, but can also thrive in European and American waters as well. East Asian countries such as Japan, China, Korea, Thailand, Vietnam, and Cambodia are known for their consumption of seaweed, but the marine algae is also very popular in countries such as Ireland, France, Scandinavia, and Wales, all the way up to Peru and Chile.
While seaweed in Asian countries are commonly consumed both either fresh or dried, it is more common to see these marine algae being sold Europe in packets, after they have been dried and powdered. However, there are several recipes for seaweed which call for them to be pickled, and some are even made into flour to be baked as seaweed bread.
Seaweed’s popularity not only as food but also as medicine stems from its rich alkali content. Scientists have long discovered the alkalinity of seaweed and the numerous health benefits it can provide, such as improving thyroid function and lowering the acidity levels in the body, thus preventing the development of degenerative illnesses like cancer and heart disease.
Aside from its alkaline content, seaweed is also rich in calcium, iron, potassium, magnesium, iodine, and zinc. As a matter of fact, seaweed has been praised by nutritionists as one of the rare plants containing sufficient amounts of all the minerals needed by the human body. It is also a rich source of dietary fiber, although it is wholly different in physical as well as chemical composition from the dietary fiber found in land-based plants.
Various specimens of seaweed have been shown to be effective detoxifying agents. They can bind with toxic metals inside the digestive system and cause them to be eliminated from the body. Other varieties have been found to provide nutrients to the scalp, thus improving the health and growth of thick, lustrous hair. Moreover, recent studies have found seaweed to be effective in reducing cholesterol levels and blood pressure, as well as improving the functions of the digestive system. The dietary fiber found in seaweed have also been shown to have anti-mutagen and antioxidant properties.
Leave a Reply
Facebook like plugin provided by
|
__label__pos
| 0.711915 |
Skip to content
Idle Ido the Japanese Mascot
written by Edward Harrison, John Harrison
Mark Batty Publisher | ISBN 9780984190614
Hardback – 144 pages
Member’s price: $22.46
Usually ships within 2–11 business days.
The Japanese have long been infatuated with the three-dimensional characters used to represent products, companies, civic organizations, towns and just about anything else you can imagine. Idle Idol: The Japanese Mascot examines this fascinating cultural history, documenting the evolution of the character statues that are ubiquitous throughout the country today.
The mascot trend began during the Edo period with the pot-bellied raccoon-dog Tanuki. These ceramic statues were first used as good luck charms (and they are still used as such today) but starting in the 19th century a noodle shop appropriated the character in an effort to create a link between Tanuki's fortuitous status and bowls of soup. It worked, and since then confectioners, pharmaceutical companies, television networks, food companies, police forces and fire departments have all created mascots.
The mascots represent a brand or a certain shop but they also exist as stand-alone characters that people adore. Idle Idol's photographs and written explanations vivify these unique mascots that are artful, audacious and wholly Japanese!
Similar items
|
__label__pos
| 0.749689 |
War WeaponsIn deciding to secede from the Union in 1861, did the South violate its own self-interest and thus disprove the economic principle that people seek to further their self-interest in the decisions they make? The South was quite aware of the North's economic superiority at the start of the war. Still, 11 Southern states made the momentous decision to sever ties with the United States, form a separate government, and pit brother against brother in the bloodiest war ever fought by our country.
Learn to use the tools of economic reasoning to explore, examine, and to reach some surprising conclusions regarding this tricky question.
You will assume the role of a Southern Secessionist in 1861. In this role you will compare and contrast the North and the South, taking note of strengths and weaknesses on both sides as civil war approached. Using the PACED method of economic reasoning, you will create a decision grid to decide whether it is in your own best interests,as a Southerner, to leave the Union. Finally, you will analyze the opportunity costs involved in the Southern decision to form the Confederate States of America.
Nation Divided1. There is a great deal of controversy among historians about why the South decided to go to war against the North in 1861. Economically, the North was much stronger than the South. Given the superior economic power of the North, it might seem surprising that the South would choose to fight a war of secession, one that it seemed likely to lose. Did the South's decision fly in the face of a basic principle of economic reasoning? In deciding to go to war, did the South act against its own self-interest?
2. Look at Visual 1 and Visual 2. Compare and contrast the North and South, noting the advantages and disadvantages of each as the South as it made its momentous decision to secede.
3. Civil War historians disagree over the causes of the American Civil War. Visit the following web sites to learn more about these complex and diverse causes.
4. Access Handout 1, 'Alternatives to Eliminate Slavery and Avoid Civil War.' Using what you have learned about the Civil War, answer the questions.
5. Economists use economic reasoning to weigh costs and benefits of choices and to help them reach logical conclusions. You will apply economic reasoning here to analyze the South's decision to secede; in your analysis you will use a five-step decision model known as the PACED method, along with a benefits/cost analysis decision grid.
6. Access Handout 2, 'Creating a Costs/Benefits Analysis: Why did the South Secede?' and the Decision Grid. Remember that Southerners believed that following as the South made its bid for independence:
a. Any war caused by secession would be a short war.
b. Most Northerners would not fight to abolish the institution of slavery. Flags
c. The war would cost no more than $12 billion dollars-far less than the overall value of the entire Southern economy.
d. Slaves were not people but property. They were considered capital resources: "machines" that were necessary to maintain the South's plantation economy.
7. Use Handout 2 and the Decision Grid to determine whether the South was acting in its own best interests when it made the decision to secede from the Union.
8. Although the South did act on what it considered its own best interests in 1861, it seriously underestimated the actual costs of the war. This fact illustrates the economic principle that the consequences of our decisions lie in the future, and the validity of a theory is substantiated only by its proof.
1. Look at Visual 3. Economic consequences may be negative (harmful) or positive (beneficial).
2. Search the Web for sites related to the effects of the American Civil War or the aftermath of the American Civil War. These sites might be a good place to start:
3. In teams, discuss the economic consequences from the perspective assigned by your teacher. Present your findings to the class.
Now take a quick quiz to see how much economics you have learned from this lesson.
1. Create a decision grid from the perspective of a Northerner who will have to fight to defend the Union or to abolish slavery.
2. Using Handout 2 and the Decision Grid, create a decision grid from the perspective of a Southern slave newly freed by Abraham Lincoln's Emancipation Proclamation. As a newly freed African American, you have an opportunity to fight as a Union soldier. Is it in your best interests to do so?
|
__label__pos
| 0.987476 |
Office of External Affairs
Mountain-Prairie Region
U.S. Fish and Wildlife Service
Mountain-Prairie Region
134 Union Boulevard
Lakewood, Colorado 80228
February 21, 2008
Contact: Ed Bangs (406) 449-5225, x 204
Joan Jewett (503) 231-6211
Sharon Rose (303) 236-4580
Joshua Winchell (703) 358-2279
The gray wolf population in the Northern Rocky Mountains is thriving and no longer requires the protection of the Endangered Species Act, Deputy Secretary of the Interior Lynn Scarlett announced today. As a result, the U.S. Fish and Wildlife Service will remove the species from the federal list of threatened and endangered species.
“The wolf population in the Northern Rockies has far exceeded its recovery goal and continues to expand its size and range. States, tribes, conservation groups, federal agencies and citizens of both regions can be proud of their roles in this remarkable conservation success story,” said Scarlett, noting that there are currently more than 1,500 wolves and at least 100 breeding pairs in Montana, Idaho, and Wyoming.
Service-approved state management plans will provide a secure future for the wolf population once Endangered Species Act protections are removed and the states assume full management of wolf populations within their borders. The northern Rocky Mountain DPS includes all of Montana, Idaho and Wyoming, as well as the eastern one-third of Washington and Oregon, and a small part of north-central Utah.
With hundreds of trained professional managers, educators, wardens and biologists, state wildlife agencies have strong working relationships with local landowners and the ability to manage wolves for the long-term,” said Lyle Laverty, Assistant Secretary for Fish and Wildlife and Parks. “We’re confident the wolf has a secure future in the northern Rocky Mountains and look forward to continuing to work closely with the states as we monitor the wolf population for the next five years.”
The minimum recovery goal for wolves in the northern Rocky Mountains was set at a minimum of 30 breeding pairs (a breeding pair represents a successfully reproducing wolf pack) and a minimum of 300 individual wolves for at least three consecutive years. This goal was achieved in 2002, and the wolf population has expanded in size and range every year since.
“These wolves have shown an impressive ability to breed and expand – they just needed an opportunity to establish themselves in the Rockies. The Service and its partners provided that opportunity, and now it’s time to integrate wolves into the states’ overall wildlife management efforts,” said Service Director H. Dale Hall.
Gray wolves were previously listed as endangered in the lower 48 states, except in Minnesota, where they were listed as threatened. The wolf population in the Midwest was delisted in early 2007. When the delisting of the Rocky Mountain population takes effect 30 days from its publication in the Federal Register, the Service will oversee the only remaining gray wolf recovery program, for the southwestern U.S. wolf population. The delisting announced today affects only the northern Rocky Mountain population of gray wolves. Gray wolves found outside of the Rocky Mountain and Midwest recovery areas, including the southwest wolf population, remain protected under the Endangered Species Act and are not affected by actions taken today.
For more information on northern Rocky Mountain gray wolves, visit www.fws.gov/mountain-prairie/species/mammals/wolf/
- FWS-
Final Rule to Establish a
Gray Wolf – Northern Rocky Mountain Distinct Population Segment and Remove from the Federal List of Threatened and Endangered Species
IMPORTANT NOTE: the delisting of the northern Rocky Mountain gray wolf population becomes effective 30 days after the publication of the final rule in the Federal Register
February 21, 2008
The wolf population in the northern Rocky Mountains (NRM) has exceeded its numerical, distributional, and temporal recovery goals every year since 2002. The states of Montana, Idaho and Wyoming have made strong commitments to maintain wolf populations well above minimum recovery levels, likely managing the population between 900-1250 wolves. Therefore, the U.S. Fish and Wildlife Service is designating a northern Rocky Mountain wolf Distinct Population Segment (DPS) that will include all of Montana Idaho, and Wyoming, the eastern third of Washington and Oregon, and a small corner of north-central Utah. This wolf population will be removed from the protection of the Endangered Species Act.
Threats to the wolf population in the northern Rocky Mountain DPS have been eliminated, as evidenced by the population’s healthy annual growth and the written commitments for future wolf conservation made by Montana, Idaho, and Wyoming. The Service will remove the entire DPS from the federal list of threatened and endangered species. This final delisting action for the northern Rocky Mountain population will not affect the status of wolves in any other part of the United States.
Why is Endangered Species Act protection no longer needed?
The NRM wolf population no longer meets the legal requirements to remain listed under the Endangered Species Act (Act). In late 2002, the wolf population achieved its recovery goal of at least 30 breeding pairs and more than 300 wolves well distributed among Montana, Idaho, and Wyoming for at least three consecutive years. At that time there were an estimated 663 wolves in 49 breeding pairs. The recovery goal has been exceeded every year since, and threats to the species have been addressed. Currently, the wolf population in Montana, Idaho, and Wyoming exceeds 100 breeding pairs and 1,500 wolves.
Does Wyoming now have an approved state law and wolf management plan?
Yes, Wyoming state law was changed to give Wyoming Game and Fish Department the legal authority to maintain the wolf population of at least 15 breeding pairs and at least 150 wolves in mid-winter, including maintaining at least 7 wolf breeding pairs in suitable habitat in northwestern Wyoming outside the national parks – consistent with the requirements of the Act. Service Director H. Dale Hall approved Wyoming’s plan on December 15, 2007, conditional on it becoming fully effective under Wyoming State law, which should happen in March 2008. The plan must be in effect before the delisting rule becomes effective 30 days after its publication.
Does this mean the U.S. Fish & Wildlife Service will require wolf packs to be maintained throughout Montana, Idaho, and Wyoming?
No, the recovery goals only mandate that each state maintain a wolf population that never goes below 10 breeding pairs and 100 wolves per state, within the general area currently occupied by wolf packs (western and south-central Montana, central and northern Idaho, and northwestern Wyoming). However, those three states have each committed to maintain their wolf populations in excess of 15 breeding pairs and 150 wolves, and indicate they will likely maintain an overall NRM wolf population between 900-1250 wolves. The states have also committed to maintain the current overall distribution of wolves in the NRM. There are many parts of eastern Montana, southern Idaho and eastern Wyoming where once-historic wolf habitat has been so modified by human use that it can no longer support wolf packs. The Service fully recognizes that wolves cannot occupy their entire historic range and supports limiting wolf distribution to suitable habitat to reduce conflicts with people, as long as its recovered status is not threatened.
After the wolves in the northern Rocky Mountains are delisted, how many wolves must the States manage?
Montana, Idaho, and Wyoming have each committed to manage at least 15 breeding pairs and at least 150 wolves in mid-winter to provide a buffer to ensure that the NRM wolf population never falls below the mandated minimum level of 30 breeding pairs and 300 wolves (10 breeding pairs and 100 wolves per state). If the wolf population ever dropped below that level, the Service could take actions to protect wolves through the Service’s emergency listing authority under the Endangered Species Act. Wyoming has committed to manage for at least 7 breeding pairs outside the national parks in Wyoming, regardless of how many wolves are in the national parks.
After delisting, what happens to wolves outside the NRM wolf DPS?
This action will not affect the status of any wolves outside of the northern Rocky Mountain wolf DPS. The status of wolves under the ESA is determined by their location. Therefore, any wolf outside the boundary of the northern Rocky Mountain wolf DPS would retain its current status. For example, if a wolf dispersed to Colorado, it would be listed as endangered. Should one wander into the western Great Lakes, it would continue to be managed by the states, because that population of gray wolves was delisted in 2007.
Who made the final decision to delist wolves?
Service Director H. Dale Hall made the decision, consistent with the Act’s requirements.
After wolves are delisted, will there be any federal oversight?
Once a species is delisted a State or Tribe has sole management responsibility. The Act includes many safeguards to ensure that the wolf population will remain recovered for the foreseeable future. For example, the Act mandates the Service to monitor the wolf population for at least 5 years after delisting. This helps to ensure the population remains above recovery levels and emerging threats do not jeopardize the wolf population. Annual reports and the Service’s analysis of these reports will be posted on the Service website during that period. Should the wolf population again become threatened or endangered, it could be protected under the ESA again.
After delisting, what are the roles and responsibilities of tribes?
Tribes manage all resident wildlife on tribal lands, so once wolves are delisted each tribe will manage all wolves on their tribal lands. Some tribes have also taken a management role on other lands. For example, the Nez Perce Tribe led a highly successful wolf management effort in Idaho administered under a cooperative agreement with the Service from 1995 to 2005. The Tribe and State of Idaho signed a cooperative agreement in 2005 to maintain the Tribe’s involvement in wolf management. The states and Tribes will address any tribal treaty right issues on public lands, such as harvest, just as they currently do for other resident wildlife species.
How will livestock and wolf conflicts be handled after wolves are delisted?
The Service, tribes, state fish and wildlife agencies in Montana, Idaho and Wyoming and USDA Wildlife Services currently work together to investigate and respond to reports of suspected wolf damage to livestock. The States and Tribes have signed cooperative management agreements with USDA Wildlife Services to assist them with wolf management. Once wolves are delisted, the States and Tribes will continue working with USDA to investigate and manage wolf/livestock conflict. The states have laws to protect private property from damage caused by wildlife. The State laws are similar to the federal experimental population regulations that were in effect while wolves were listed. Under those laws, landowners and grazing permittees will be able to shoot wolves attacking or molesting their domestic animals, just as they now can shoot resident black bears or mountain lions that are seen attacking or harassing their livestock.
Does delisting of the northern Rocky Mountain wolf DPS mean that wolves can be hunted?
Wolves can be hunted once the delisting takes effect, if states establish hunting seasons and related regulations designed to maintain the wolf population at agreed upon levels. The number of wolves killed by hunters would be tightly regulated to ensure the wolf population is never threatened. These states already have hunting seasons for many species of resident wildlife, including black bear, elk, deer, and moose. State-regulated sport hunting programs have a strong record of enhancing wildlife populations. When wolf populations are well above 15 breeding pairs per state, the State fish and wildlife agencies can propose public hunting seasons to help maintain wolf numbers and wolf pack distribution. The Service supports regulated public hunting programs as important tools to help manage and conserve recovered wildlife populations. Federal authority for maintaining wolf populations in national parks, such as Yellowstone and Glacier will remain.
Can the States manage wolves?
Yes. It is important to remember that state fish and wildlife agencies and sportsmen made wolf recovery possible by restoring wolf prey, including elk, deer and moose. The states also already manage healthy populations of other large predators such as mountain lions, black bears, and coyotes. They have professional fish and wildlife organizations with hundreds of employees, including biologists, wardens, researchers, educators, and managers who have done an incredible job of restoring and managing wildlife in their states. The states of Montana and Idaho have been managing wolves in their states since 2004 under cooperative agreements with the Service and they have done an outstanding job. The written commitments they have made in their state wolf management plans ensure that they will do the same for wolves once they are delisted. In the unlikely event that the states do not meet the terms of their management plans, the U.S. Fish and Wildlife Service can take action to again protect wolves under the Act.
Who is paying for all of this?
While listed under the Act, the federal government has paid most of the costs for wolf restoration and management through annual appropriations from Congress for endangered species recovery. In 2007, about $3 million was spent on wolf management in the northern Rockies, mostly for cooperative agreements with the states of Idaho and Montana and Nez Perce Tribe. Once wolves are delisted, States will begin to fund some of the cost of wolf management through other funding sources, including other types of federal funding.
Who will pay livestock compensation after delisting?
Since 1987, a private group, the Defenders of Wildlife, has paid nearly $900,000 for livestock and herding and guarding animals killed by wolves in the northern Rocky Mountains. However, it is uncertain if that private compensation program will continue when wolves are delisted. Therefore, the states of Montana, Idaho, and Wyoming, as well as adjacent states, anticipate that State-administered compensation programs for wolf damage will complement or take the place of the Defenders program after delisting.
How will the States that have portions of their States outside the proposed DPS boundary be affected?
Wolves outside the DPS boundaries of the Rocky Mountain and Western Great Lakes populations will remain listed as endangered. If control actions are needed, the Service has a number of options, including removing the problem wolf. Additionally, State management could involve nonlethal control of problem wolves and relocation.
Will other States in the West need to have Service-approved wolf management plans?
No. The significant portion of the range for the northern Rocky Mountain population of gray wolves is Montana, Idaho and Wyoming. Service-approved wolf management plans are needed only for those states to ensure the wolf population will remain recovered.
How many wolves will states be allowed to shoot?
The Service has no legal authority over a delisted wolf population. The Service's responsibility is to recover a species and then ensure it will not become threatened again. Just as states manage other resident wildlife—such as black bears or elk—they will decide how many wolves above the minimum recovery levels they will manage for through regulated public hunting programs which often include mandatory hunting licenses, permits, reporting, and seasons and bag limits. In the event that wolf populations ever fell below those levels, they could be protected again under the ESA.
Who should be the point of contact regarding wolf issues after they are delisted?
Wolves in national parks will remain under the management authority of the National Park Service. On national wildlife refuges, the individual refuge should be contacted, unless a prior arrangement has been made with the state fish and wildlife agency to allow wolf hunting on that refuge. On tribal lands the Tribes have management authority, and they should be contacted. On other lands, where wildlife is typically managed by the respective State fish and wildlife agency, (including federal lands such as those administered by the U.S. Forest Service or BLM) the states should be contacted. There will be no federal regulations and no specific federal authority for wolf management within the boundaries of the DPS.
|
__label__pos
| 0.745084 |
July 1, 2004
Bernie is dusty and desperate for a shower after collecting samples of diatoms from several portions of the Olorgesailie Formation. His goal is to figure out the conditions of the ancient lake and how the lake changed through time. The diatoms are a terrific clue about this. They are single-celled algae that have a silica skeleton easily preserved in sediments. They are very small, many being <0.01 mm. When viewed under a microscope, diatoms fossils are incredibly beautiful, since their skeletons show diverse patterns of slits and holes arranged in intricate ways. It turns out that patterns help distinguish between the several thousands of species of diatoms. Bernie drew pictures of several species of diatoms common to the Olorgesailie Formation - see the photos at the bottom of the page.
Bernie Owen at work
Diatoms first appeared in ocean deposits during the Cretaceous Period (see our web site page on Geologic Time). Lacustrine (or lake-living) diatoms, such as those at Olorgesailie, first appeared during the Miocene, about 15 million years ago. Their value to Bernie's work lies in the fact that different species of diatoms live under different environmental conditions. Some diatoms are found only in deep water, while others live in shallow water. Several species live as epiphytes on reeds and other aquatic plants. When these occur in large numbers in the fossil record they suggest swampy settings. Diatoms are also valuable indicators of water chemistry and are able to provide information on water pH, conductivity, and silica levels, and can also provide useful information about the water nutrients such as phosphorus.
At Olorgesailie, Bernie uses the fossil diatoms preserved in layers of white sediment to provide a detailed record of environmental change in the ancient lake, particularly water pH, conductivity, water depth, and the presence of reeds and other aquatic plants. He already has some data from earlier work that suggest a variable fresh to alkaline lake (Member 1) that gave way to a relatively deep, freshwater, environment (M2). Data from parts of the middle Members indicate that the lake sometimes became very alkaline, before returning to fresher conditions in the younger layers. But there are gaps in the earlier work, which was done before our team found out that the Olorgesailie record spans many hundreds of thousands of years. The aim of Bernie's work is to fill these missing parts of the lake story at Olorgesailie.
A sketch of the fossil diatom Aulacoseira granulata v. valida A sketch of the fossil diatom Aulacoseira granulata v. valida
A sketch of the fossil diatom Nitzschia amphibia. A sketch of the fossil diatom Nitzschia amphibia.
A sketch of the fossil diatom Cocconeis placentula. A sketch of the fossil diatom Cocconeis placentula.
|
__label__pos
| 0.994975 |
Forgot your password?
The Hound of the Baskervilles Test | Mid-Book Test - Hard
Purchase our The Hound of the Baskervilles Lesson Plans
Mid-Book Test - Hard
Name: _____________________________ Period: ___________________________
Short Answer Questions
1. Why does Holmes change his mind about Sir Henry going to Baskerville Hall?
2. What is the object left behind on which Watson tries to deduce a reconstruction of the mysterious owner?
3. What does Watson observe that Sir Henry has inherited from his ancestors?
4. What is the address of the rooms that Watson and Holmes share?
5. What is Stapleton's profession?
Short Essay Questions
1. Why is Sir Henry upset with Watson and Holmes?
2. Why can Holmes not arrest Stapleton?
3. What is significant about Stapleton returning the brown boot, only to steal the black boot?
4. How did Stapleton deceive Mrs. Lyons?
5. What is significant about the letter being made up of words from the London Times?
6. What is Stapleton's theory about how Sir Charles died?
7. How did Holmes survive all those weeks on the moor?
8. Why did Dr. Mortimer advise Sir Charles to go to London?
9. Why does Watson now suspect Barrymore is the murderer?
10. What are Watson's impressions of the stone hut?
Essay Topics
Choose one of the three options to write about.
1) Holmes's recognition of Stapleton in the portrait.
2) The lineage of the Baskervilles.
3) The odd habits of the people on the moor.
The hound of legend is wholly a creature from the moors. In fact, throughout the novel, it seems as if the characters (as depicted by Watson) are constantly battling the elements of the moor and how it makes them feel, from the weather to the landmarks to the hound itself. Discuss in detail how the characters are set against the moor and what it means to the story. Be sure to give strong examples and explain them thoroughly.
Consider Holmes as a person. What about him is similar to the criminals he chases? What is different? With these elements in mind, argue that the only thing separating Holmes from being a criminal himself is his morals. Be sure to cite specific examples from the novel.
(see the answer keys)
This section contains 928 words
(approx. 4 pages at 300 words per page)
Purchase our The Hound of the Baskervilles Lesson Plans
The Hound of the Baskervilles from BookRags. ©2009 BookRags, Inc. All rights reserved.
Follow Us on Facebook
|
__label__pos
| 0.9767 |
Met Office
Thunder and lightning
Thunder and lighting are some of the most dramatic weather phenomena in the UK. They are caused through the formation of cumulonimbus clouds and usually last no more than half an hour.
Thunderstorms are associated with convective clouds and are often accompanied by precipitation.
How do thunderstorms form?
Thunderstorms develop when the atmosphere is unstable - this is when warm air exists underneath much colder air. As the warm air rises it cools and condenses forming small droplets of water vapour. If there is enough instability in the air, the updraft of warm air is rapid and the water vapour will quickly form a cumulonimbus clouds. Typically, these cumulonimbus clouds can form in under an hour.
As the warm air continues to rise, the water droplets combine to create larger droplets which freeze to form ice crystals. As result of circulating air in the clouds, water freezes on the surface of the droplet or crystal. Eventually the droplets become too heavy to be supported by the updraughts of air and they fall as hail.
Transcript - How does lightning form and how do we detect it Transcript - How does lightning form and how do we detect it (PDF, 81 kB)
To view PDF documents you will need Adobe Reader.
Adobe Acrobat Reader
Where do thunderstorms form?
Lightning map Optical Transient Detector (OTD) and Lightning Imaging Sensor (LIS) image of global lightning (Source: NASA MSFC)
Facts about thunderstorms
• A bolt of lightning lasts on average for about one 10,000th of a second but could light a 100 Watt light bulb for three months
• Lightning travels through the air at around 270,000 mph - that's around 75 miles every second
• Lightning is hotter than the surface of the sun reaching temperatures of around 30,000 °C
• Thunderstorms can trigger asthma - find out more in Thunderstorm-related asthma Thunderstorm-related asthma (PDF, 257 kB)
• The island of Java is the most thundery place on earth with 220 days of thunderstorms every year.
Last updated: 4 December 2013
Share this page
• Explore the Met Office
|
__label__pos
| 0.973609 |
Go4Expert (http://www.go4expert.com/)
- - Hello (http://www.go4expert.com/forums/hello-t7619/)
adroit89 29Nov2007 11:25
can u tell me how to read/write data into a excel sheet using C++.
I think we cant do it directly as we do with a text file.
can u also tell me about
1.what is open source?
2.what is ODBC?
3.Is ODBC a programming language??
shabbir 30Nov2007 09:15
Re: Hello
When you create a new thread you get the following message.
Use descriptive thread titles for better results.
Try reading and following that.
|
__label__pos
| 0.984432 |
Warmer world may mean smaller animals
Sept. 27, 2011 at 8:47 PM | 0 comments
1 of 2
| License Photo
LONDON, Sept. 27 (UPI) -- Many animal species could shrink in physical size as an unanticipated consequence of global warming, British researchers say.
Cold-blooded species have long been known to react to a phenomenon known as the "temperature-size rule," in which individuals of the same species reach a smaller adult size when reared at warmer temperatures. Researchers at Queen Mary, University of London say they've discovered how and why that occurs.
The scientists say in many cold-blooded species, the growth rate, or how fast mass is accumulated, and the development rate, how fast an individual passes through its life stages, are consistently "decoupled," with development being more sensitive to temperature than growth.
"We've shown that growth and development increase at different rates as temperatures warm," researchers Andrew Hirst said. "The consequences are that at warmer temperatures a species grows faster but matures even faster still, resulting in them achieving a smaller adult size."
The researchers say their findings suggest rates fundamental to all organisms -- such as mortality, reproduction and feeding -- may not change in synch with one another in a warming world.
Topics: Queen Mary
Trending News
Join the conversation
Most Popular
|
__label__pos
| 0.996148 |
How do I?
The “How do I?” section is a quick way to find answers to common questions about the library. If you have any further questions you can contact us at 315.841.4651 or email
How Do I?
Get a library card?
Renew a book?
Request a book?
Pay my fines?
Download an audio or ebook?
Reserve the program room?
Research my family history?
Connect with Wi-Fi?
Use the library computers?
|
__label__pos
| 0.898944 |
The jumping gait of the kangaroo is efficient because energy is stored in the stretch of stout tendons in the legs; the kangaroo literally bounces with each stride. We can model the bouncing of a kangaroo as the bouncing of a mass on a spring. A 82kg kangaroo hits the ground, the tendons stretch to a maximum length, and the rebound causes the kangaroo to leave the ground approximately 0.15s after its feet first touch.
The period calculated is 0.3s
Given the kangaroo mass and the period you've calculated, what is the spring constant?
Get this answer with Chegg Study
|
__label__pos
| 0.998046 |
Science notes: The Americas weren't farming laggards, after all
Botanists distinguish between cultivating wild plants and domesticating them. You can cultivate wildflowers in your garden. But they won't be domesticated until breeders change their physical characteristics. Ancient farmers cultivated wild wheat.
Then they began selecting plants for characteristics they valued. Stronger stalks made harvesting easier. An ability to hold on to seeds so the wind did not disperse them made for higher yields.
Jorge Dubcovsky and Jan Dvorak at the University of California in Davis reviewed this long domestication of wheat as it is reflected in the DNA of wheat samples from various ages. They pointed out earlier this month in Science that one central fact stands out: Wheat has what these botanists call a "dynamic genome" that makes it ideal for domestication.
It's all too easy to breed the original genetic diversity out of a wild plant to the point where it's hard for breeders to adapt their favorite crop variety to a changing environment. A new insect pest or a shift from a wet to a dry climate can make a particular variety useless. The DNA record shows that wheat has overcome such so-called genetic bottlenecks by easily reincorporating some of the genetic diversity of its wild ancestors by interbreeding. It also can quickly rewrite its own genome.
The story of humanity's shift from hunter/gatherer to farmer is a tapestry of interwoven threads representing environmental, social, and botanical changes. Scientists are beginning to trace the botanical thread in unprecedented detail.
Share this story:
|
__label__pos
| 0.872498 |
Jump to main content.
Chromated Copper Arsenate (CCA):
ACQ - An Alternative to CCA
CCA Table of Contents
Description and Formulations of ACQ
ACQ is a water-based wood preservative that prevents decay from fungi and insects (i.e., it is a fungicide and insecticide). There are currently four AWPA standardized ACQ formulations, ACQ Types A, B, C, and D. The different formulations allow flexibility in achieving compatibility with different wood species and end use applications. All ACQ types contain 2 active ingredients which may vary within the following limits: copper oxide (62%-71%), which is the primary fungicide and insecticide, and a quaternary ammonium compound (29%-38%), which provides additional fungicide and insect resistance properties.
Applications of ACQ
Water-based preservatives like ACQ leave a dry, paintable surface. ACQ is registered for use on: lumber, timbers, landscape ties, fence posts, building and utility poles, land, freshwater and marine pilings, sea walls, decking, wood shingles, and other wood structures.
1 The American Wood-Preservers' Association (AWPA) is the primary standard-setting body for pressure-treated wood. To become standardized by the AWPA, preservative-treated wood must undergo a series of rigorous tests to ensure its durability.
Publications | Glossary | A-Z Index | Jobs
Local Navigation
Jump to main content.
|
__label__pos
| 0.930578 |
Immediate Beneficiary
DEFINITION of 'Immediate Beneficiary'
A beneficiary designation most commonly used in charitable gift planning to describe which parties get an immediate benefit from a transaction. The most basic type of immediate beneficiary would be a charity that receives an outright gift from a donor. More generally, the term "immediate beneficiary" can also refer to any individual or organization that receives immediate benefits from a trust's assets.
INVESTOPEDIA EXPLAINS 'Immediate Beneficiary'
Charitable giving strategies have come a long way in recent decades from simply donating property now or at the time of your death. Many philanthropic individuals now use charitable trusts that name the charity as the immediate beneficiary of either the original property or the income from that property. At the grantor's death, the property then may permanently transfer to the charity or back to the individual's heirs.
1. Absolute Beneficiary
2. Discretionary Beneficiary
3. Named Beneficiary
4. Charitable Lead Trust
5. Charitable Remainder Trust
6. Beneficiary
1. How are contingent beneficiaries informed of a payout?
2. How does life insurance help high net worth individuals protect their businesses ...
3. Which states are the most expensive for high-income earners?
4. What are the restrictions for naming a given individual as my contingent beneficiary?
5. What are the risks involved in a banker's acceptance?
6. How do you mediate a dispute between primary and contingent beneficiaries of a trust?
Related Articles
1. Retirement
Designating A Trust As Retirement Beneficiary
2. Retirement
Gifting Your Retirement Assets To Charity
3. Retirement
Establishing A Revocable Living Trust
4. Retirement
Mistakes In Designating A Retirement Beneficiary
5. Taxes
Top Tax Issues For High-Net-Worth Individuals
6. Professionals
5 Estate Planning Must-Dos Before Saying "I Do"
7. Personal Finance
Which Estate Transfer Technique is Right for You?
8. Professionals
Estate Planning and Elderly and Passed Clients
9. Taxes
Top 4 Ways to Invest Tax Free
10. Taxes
Are Taxes the Solution for Income Inequality?
You May Also Like
Hot Definitions
1. Fracking
2. Mixed Economic System
An economic system that features characteristics of both capitalism and socialism.
3. Net Worth
4. Stop-Loss Order
5. Covered Call
6. Butterfly Spread
Trading Center
|
__label__pos
| 0.793869 |
Return to the Purplemath home page The Purplemath Forums
Helping students gain understanding
and self-confidence in algebra
powered by FreeFind
Find a Pantego, TX Accounting Tutor
Subject: Zip:
Melynda O. ...However, most people are not taught math in a way they can understand. Teachers do their best to reach everyone but do not have the time to teach every lesson in 30 different ways. That's where tutors come in.
19 Subjects: including accounting, calculus, geometry, statistics
Hurst, TX
Robert D. ...It also encompasses about 6–11% of all seed plants.[3] The largest genera are Bulbophyllum (2,000 species), Epidendrum (1,500 species), Dendrobium (1,400 species) and Pleurothallis (1,000 species). The family also includes Vanilla (the genus of the vanilla plant), Orchis (type genus) and many co...
92 Subjects: including accounting, chemistry, reading, writing
Fort Worth, TX
1 Subject: accounting
Plano, TX
24 Subjects: including accounting, reading, English, writing
Dallas, TX
2 Subjects: including accounting, French
Fort Worth, TX
Feedback | Error?
|
__label__pos
| 0.972605 |
Aim higher, reach further.
Culture City: A Song Is Worth 1,000 Words
In the aftermath of both events, artists and institutions have found creative, meaningful ways to respond. One common element has been music, to help raise money, offer solace and express what cannot be...
Popular on WSJ
Editors’ Picks
|
__label__pos
| 0.89428 |
Cat Fish
Cat Fish
There are armour-plated types and also naked types, however, they do not have scales. Not all catfish families have prominent barbells; what defines a fish as being in the order Siluriformes are certain features of the skull and swimbladder.
Cat Fish Characteristics
Catfish have a sweet, mild flesh which makes them important as food fish throughout the world. Blue Catfish and Bullheads (Ictalurids) are cultivated in North America (especially in the Deep South, with Mississippi being the largest domestic catfish producer. Airbreathing Catfish (Clariids) and Shark Catfish (Pangasiidae) are heavily cultured in Africa and Asia.
Catfish range in size and behaviour from the heaviest, the giant Mekong Catfish in Southeast Asia and the longest, the Wels Catfish of Eurasia. The average size of the species is about 1.2 metres to 1.6 metres, and fish more than 2 metres are very rare. The largest specimens on record measure more than 2.5 metres in length and sometimes exceed 100 kilograms in weight.
Catfish Habitats
The Wels Catfish was introduced to Britain, Italy, Spain, Greece and some other countries during the last century. The species has flourished in the warm lakes and rivers of Southern Europe. The River Danube, River Po in Italy and the River Ebro in Spain are famous for huge Wels Catfish, which grow up to 2 metres. These habitats contain plenty of food and lack natural predators.
Catfish Spawning Habits
Spawning habits vary between Catfish species. Catfish such as the Channel Catfish, the Blue Catfish and the White Catfish are nest builders. Spawning occurs mostly in rivers and streams in the spring and early summer when waters warm to 70 to 85 degrees Fahrenheit. Catfish also will spawn in larger lakes where suitable habitat is available. Eggs are deposited in nests secluded under banks or logs or over open bottom. The male chooses the nesting site, often a natural cavern or hole, clears the nest and guards the eggs and young. A female may lay 2,000 to 21,000 eggs that hatch in 6 to 10 days depending on water temperature. Males protect the fry until they leave the nest in about a week.
The Yellow Bullhead and Brown Bullhead spawn in May and June as a rule, with eggs deposited in a nest usually adjacent to a submerged object. One or both parents take part in building the nest, and take turns caring for the eggs, which may number 2,000 to 4,000 and hatch in 5 to 10 days. The male guards the eggs and fry.
Catfish Diet and Feeding Habits
|
__label__pos
| 0.781491 |
This Trippy Video Shows Exactly What It Feels Like To Rely On Sleeping Pills
Posted: Updated:
More Americans have trouble sleeping every year. For visual artist Emanuele Kabu, a string of sleepless nights led him to pop a strong brand of melatonin -- the natural sleep aid du jour -- called Moon. The drug didn't exactly solve Kabu's problem, but the limbo state it plunged him into did inspire him to try to animate his condition. The resulting video, titled It's Called 'Moon,' has been making the rounds online. Presumably it strikes a nerve with all those insomniacs out there:
It's Called "Moon" from Emanuele Kabu on Vimeo.
Those spidery lines are meant to represent the phenomenon known as pressure phosphenes (the effect that happens when you press your closed eye and see patterns). At the very least, it's an appropriate visual to remember the next time you can't fall asleep.
Suggest a correction
Around the Web
How does melatonin help you sleep? - Visible Productions
Artist Animates What It Feels Like to Take Melatonin
From Our Partners
|
__label__pos
| 0.988284 |
Take the 2-minute tour ×
I need to read the response from an HTTP GET in situations where the Response Status code is not 200 OK. Sometimes it is 401, other 403, however there will be a Response content. If I try to use the HttpWebResponse and HttpWebRequest classes, it throws an exception when the response status is not 200 OK. Any suggestions?
share|improve this question
1 Answer 1
up vote 29 down vote accepted
var request = (HttpWebRequest)WebRequest.Create("http://stackoverflow.com/1");
using (WebResponse response = request.GetResponse())
// Success
catch (WebException e)
using (WebResponse response = e.Response)
HttpWebResponse httpResponse = (HttpWebResponse)response;
Console.WriteLine("Error code: {0}", httpResponse.StatusCode);
share|improve this answer
Your Answer
|
__label__pos
| 0.724316 |
Dhzokhar Tsarnaev
Obama: ‘It’s Not Like The FBI Did Nothing’
President Barack Obama is defending the FBI’s handling of Boston Marathon bombing suspect Tamerlan Tsarnaev.
|
__label__pos
| 0.919789 |
Table of Contents
Rocket Propulsion
Thrust and Specific Impulse
VASIMR® Engine
Principles of Operation
VASIMR® Engine Vs Other Electric Thrusters
Power Sources
Further Reading
Rocket Propulsion [top]
Rocket propulsion is different from other forms of accelerating an object because the entire acceleration system is contained within the object. A runner makes use of the ground to accelerate; by pushing off of it with her foot. A car uses the road to accelerate; by the friction of wheels against the asphalt. A jet uses the air to accelerate; by pulling air through a turbine. A rocket makes itself go entirely by expelling its own mass backwards. A rocket does not need anything to push against or pull on. A sailor throwing cannonballs off the back of a ship is using the same principle; his craft will accelerate forward with each throw.
There are several types of rocket propulsion. The most common and well-known is called chemical or conventional rocket propulsion. A chemical rocket relies on a highly explosive chemical reaction inside a tube to force fuel mass downward and the rocket up. NASA's Space Shuttle and the Saturn rockets used in the Apollo missions are all entirely chemical systems. The liftoff of Apollo 15 is shown above right.
Another type is electric propulsion. An electric rocket uses electrical power to accelerate non-volatile propellant out the back of the engine.
Thrust and Specific Impulse [top]
The two most important characteristics of a rocket engine are its thrust and its specific impulse. Thrust is a measure of how much force the rocket can exert. In order to take off from Earth's surface, a rocket's thrust must be greater than the force of gravity upon it. In engineering terms, the thrust-to-weight ratio must be greater than one.
Specific impulse can be thought of as a rocket's "gas mileage". It measures the amount of speed obtainable from a unit mass of propellant. It is related to the speed of the rocket's exhaust.
Chemical rockets are useful for their extremely high thrust. For example, a single engine of the Saturn-V rocket has 6,800,000 N of thrust at 300 s specific impulse. Currently, chemical rockets are the only propulsion technology that has been used to reach Earth orbit. No, as yet conceived of, electric thruster has a thrust-to-weight ratio greater than one. However, electric thrusters have much greater specific impulse than conventional rockets, and can therefore ultimately propel a spacecraft to much greater speeds using much less propellant mass once the craft has reached Earth orbit.
The table below compares the thrust and specific impulse of several different propulsion systems.
Engine Power (kW)
Thrust (N)
Specific Impulse (s) Propellant
PPS-1350 Hall Thruster
1.2 0.068 1640 Xe
NSTAR Ion Engine
(Deep Space 1)
2.3 0.092 3300 Xe
NEXT Ion Engine
7.7 0.327 4300 Xe
VASIMR® VX-200 200 5 5000 Ar (Optional:
D, N, Xe)
VASIMR® Engine [top]
The VAriable Specific Impulse Magnetoplasma Rocket (VASIMR®) engine is a new type of electric thruster with many unique advantages. In a VASIMR® engine, gas such as argon, xenon, or hydrogen is injected into a tube surrounded by a magnet and a series of two radio wave (RF) antennas (called "couplers" in this context). The couplers turn cold gas into superheated plasma and the expanding magnetic field at the end of the rocket (the magnetic nozzle) converts the plasma particles' thermal motion into directed flow.
Principles of Operation [top]
Thermal motion of ions around field lines is mostly perpendicular to the rocket's direction of travel, however, and can't help its propulsion. The rocket is dependent on its magnetic nozzle to convert the ions orbital momentum into useful linear momentum. As the magnetic field lines expand, the spiral paths of the ions around their field lines elongate, resulting in ion speeds on the order of 100,000 mph (50,000 m/s).
VASIMR® Engine Compared to Other Electric Thrusters [top]
The VASIMR® engine has three important features that distinguish it from other plasma propulsion systems:
VASIMR® engine has the ability to vary its exhaust parameters (thrust and specific impulse) in order to optimally match mission requirements, which results in the lowest trip time with the highest delivered payload for a given fuel load.
VASIMR® thruster uses electromagnetic (RF) waves to create and energize the plasma within its core. In this way, VASIMR® engine has no physical material electrodes in contact with the hot plasma. This results in greater reliability and longer life and enables a much higher power density than competing ion thruster and plasma rocket designs.
VASIMR® thruster is able to process a large amount of power, meaning that it can then generate a larger amount of thrust. This larger thrust capability promises to make VASIMR® engine useful for moving large payloads around in low Earth orbit, transferring payloads from the Earth to the Moon, and transferring payloads from the Earth to the outer solar system. VASIMR® technology is also highly scalable, meaning that higher power versions can be easily designed, making human missions using electric propulsion a reality.
Power Sources [top]
One of the key challenges in developing VASIMR® engine is supplying power to it. A high-power electric thruster requires a lot of electricity, and generating that in space may require some engineering innovations. Below is a discussion of two options.
Solar Power
Solar power can be efficiently used for near-Earth VASIMR® missions, such as drag compensation for space stations, lunar cargo transport and in-space refueling. Recent advances in solar array technology promises increases in solar power utilization by an order of magnitude.
To Moon
A 2MW solar powered lunar tug concept using 4 VASIMR® engines.
Nuclear power
A nuclear reactor has a very large amount of energy per unit mass, in fact a reactor core has the highest energy density of any useful energy source on earth. This high energy density and scalability make nuclear reactors an ideal power source in space. A nuclear electric powered spacecraft could dramatically shorten human transit times between planets (less than 3 months to Mars) and propel robotic cargo missions with a very large payload mass fraction. Trip times and payload mass are major limitations of conventional and nuclear thermal rockets because of their inherently low specific impulse (less than 1000 seconds). A VASIMR® propelled, nuclear powered spacecraft promises to make fast human missions a reality.
Further Reading [top]
Wikipedia overview of plasma sources
Technical reading about helicon physics
|
__label__pos
| 0.980812 |
It is quite astounding how the role of government in the economy is vastly underrated. This is especially true of many conservatives who cling to a free market fantasy, but it is often overlooked by liberals as well. Here are a few snippets of the government role in the US economy:
1. The Internet was the result of a Defense Department project that began in 1962.
2. The interstate highway system was the result of the Federal Aid Highway Act of 1956 under President Eisenhower
3. Satellites, which form a crucial basis for modern communications, emerged from government programs through NASA and other agencies. (Without satellites we wouldn't have cell phones, worldwide Internet, GPS or any other global communication networks)
These are only three examples, but they provide the infrastructure for today's economy. Government involvement in their creation was not just incidental, but absolutely fundamental.
Adam Weiss blogs at politicalcreativity.net
Your Email has been sent.
|
__label__pos
| 0.73081 |
HIST 369
History of the West and the Pacific Northwest
This course examines major themes in the history of the American West during the last two centuries, with particular emphasis on the Pacific Northwest. Themes include Indian-white encounters, the formation of frontier communities, land policy and resource use, the impact of federalism, urbanization, and the West in the American imagination.
|
__label__pos
| 0.984692 |
Dont Have One
Silas Marner, Novelist
Mary Anne Evans, known as George Elliot, was a novelist in the Victorian era. Raised by parents, Robert Evans and Christina Evans she was born November 22,1819 into a family of three children. Because she was not considered physically beautiful, which led to a low chance of marriage, her father invested in an education that most women wouldn’t get. Since she was always an intelligent and voracious reader, her father felt an education would give her a chance at life. While in school she was taught in a religious atmosphere that was opposed to evangelicalism. Her father having access to a library allowed her to be self taught. The tragedies she read on greek mythology later influenced her novels. Fortuitously, Evans was head of a literary enterprise, which gave her the opportunity to work on her writing skills and also to study the novels and literature of others. Evans refused to be categorized with other female writers, so she gave herself the name George Elliot. That, then, became her pen name, which opened the doors to a wider audience.
The Victorian era was the beginning of people questioning political and and religious belief. There was a lot of controversy over Silas Marner due to Elliot making religion such a big factor. Culturally, there was a transition away from rationalism and toward romanticism and mysticism with regard to religion, social values, and the arts. This transition played a big part in Elliot's view on religion and politics. This lead her to write one of her most controversial books, Silas Marner.
An outwardly simple tale of a linen weaver, expresses Elliot's view on her attitude towards religion. The novel was set in the early years of the nineteenth century. George Elliot was one of the leading novelists of the Victorian era. Wanting to escape the stereotype of women writing lighthearted romances, Elliot used a male pen name to ensure that her work would be taken seriously. In writing Silas Marner, Elliot was at a...
tracking img
|
__label__pos
| 0.809587 |
PRINCIPLES OF COMPILER DESIGN (POCD)–April / May 2011 Question Paper
Sixth Semester
Computer Science and Engineering
(Regulation 2008)
Time : Three hours
Maximum : 100 marks
Answer ALL questions
PART A — (10 × 2 = 20 marks)
1. What is an interpreter?
2. Define token and lexeme.
3. What is handle pruning?
4. What are the limitations of static allocation?
5. List out the benefits of using machine-independent intermediate forms.
6. What is a syntax tree? Draw the syntax tree for the following statement:
. : c b c b a − ∗ + − ∗ =
7. List out the primary structure preserving transformations on basic block.
8. What is the purpose of next-use information?
9. Define dead-code elimination.
10. What is loop optimization?
PART B — (5 × 16 = 80 marks)
11. (a) (i) Describe the various phases of complier and trace the program
segment 4 : ∗ + = c b a for all phases. (10)
(ii) Explain in detail about compiler construction tools. (6)
(b) (i) Discuss the role of lexical analyzer in detail. (8)
(ii) Draw the transition diagram for relational operators and unsigned
numbers in Pascal. (8)
12. (a) (i) Explain the error recovery strategies in syntax analysis. (6)
(ii) Construct a SLR construction table for the following grammar.
T E E + →
T E →
F T T ∗ →
F T →
( ) E F →
id F → (10)
(b) (i) Distinguish between the source text of a procedure and its
activation at run time. (8)
(ii) Discuss the various storage allocation strategies in detail. (8)
13. (a) (i) Define three-address code. Describe the various methods of implementing three-address statements with an example. (8)
(ii) Give the translation scheme for converting the assignments into
three address code. (8)
(b) (i) Discuss the various methods for translating Boolean expression. (8)
(ii) Explain the process of generating the code for a Boolean expression in a single pass using back patching. (8)
132 132 132
11267 3
14. (a) (i) Write in detail about the issues in the design of a code generator. (10)
(ii) Define basic block. Write an algorithm to partition a sequence of
three-address statements into basic blocks. (6)
(b) (i) How to generate a code for a basic block from its dag
representation? Explain. (6)
(ii) Briefly explain about simple code generator. (10)
15. (a) (i) Write in detail about function-preserving tran
sformations. (8)
(ii) Discuss briefly about Peephole Optimization. (8)
(b) (i) Write an algorithm to construct the natural loop of a back edge. (6)
(ii) Explain in detail about code-improving transformations. (10)
Post a Comment
|
__label__pos
| 0.990794 |
Checked content
Related subjects: Mineralogy
Background to the schools Wikipedia
Unprocessed sample of ammolite, a "dragon skin" pattern is apparent
Category fossilized, mineralized Ammonite shell
(repeating unit)
Colour Gray to brown, with primarily red to green iridescence.
Cleavage no true cleavage
Fracture uneven to granular
Mohs scale hardness 4.5 - 5.5
Luster greasy to dull
Specific gravity usually about 2.70 (varies with mineral content)
Polish luster vitreous
Optical properties anomalous aggregate reaction
Refractive index usually 1.52 - 1.68 (varies with mineral content)
Birefringence usually 1.55 (varies with mineral content)
Pleochroism none
Ultraviolet fluorescence variable
Ammolite is a rare and valuable opal-like organic gemstone found primarily along the eastern slopes of the Rocky Mountains of the United States and Canada. It is made of the fossilized shells of ammonites, which in turn are composed primarily of aragonite, the same mineral that makes up nacreous pearls. It is one of several biogenic gemstones; others include amber and pearl.1 In 1981, ammolite was given official gemstone status by the World Jewellery Confederation, the same year commercial mining of ammolite began. It was designated the official gemstone of the Province of Alberta in 2004 and the official gemstone of the City of Lethbridge in 2007.
Ammolite is also known as aapoak ( Kainah for "small, crawling stone"), gem ammonite, calcentine, and korite. The latter is a trade name given to the gemstone by the Alberta-based mining company Korite International, the first and largest commercial producer of ammolite.
Formation, occurrence, and extraction
An iridescent ammonite from Madagascar
Ammolite comes from the fossil shells of the Upper Cretaceous disk-shaped ammonites Placenticeras meeki and Placenticeras intercalare, and (to a lesser degree) the cylindrical baculite, Baculites compressus. Ammonites were cephalopods, or squid-like creatures, that thrived in tropical seas until becoming extinct along with the dinosaurs at the end of the Mesozoic era.
The ammonites that form ammolite inhabited a prehistoric, inland subtropical sea that bordered the Rocky Mountains—this area is known today as the Cretaceous or Western Interior Seaway. As the seas receded, the ammonites were buried by layers of bentonite sediment. This sediment preserved the aragonite of their shelled remains, preventing it from converting to calcite.
Korite International's mechanized mining operations are fairly basic, involving the excavation of shallow pits with backhoes.
Significant deposits of gem-quality ammolite are only found in the Bearpaw formation that extends from Alberta to Saskatchewan in Canada and south to Montana in the USA. The best grade of gem quality ammolite is along high energy river systems on the eastern slopes of the Rockies in southern Alberta. Most commercial mining operations have been conducted along the banks of the St. Mary River, in an area south of and between the town of Magrath and the city of Lethbridge. Roughly half of all ammolite deposits are contained within the Kainah (Kainaiwa) reserve, and its inhabitants play a major role in ammolite mining. Since its founding in 1979, Korite International has operated primarily within the reservation. The company maintains an agreement with the Kainah (Blood) tribe, with Korite International paying the tribe royalties based on how much land the company has mined.
Another view of Korite International's open-pit mining operations in Alberta, Canada.
Commercial extraction is mechanized but fairly basic: shallow open pits are dug with a backhoe and the excavated material is screened for its potential gem contents. The pits are further examined by hand, and commercial production is supplemented by independent persons who sell their surface-picked findings to Korite International and several other producers. Approximately 50% of the ammolite mined is suitable for jewelry.
As of 2003, Korite International had only mined 30 acres (120,000 m²) of the Kainah deposit. As part of their agreement with the tribe, the company must refill areas once exhausted, and ensure the environment is not adversely affected. Korite International's operations net the Kainah tribe approximately CAD $150,000–200,000 per year. The company employs over 60 people (many of them Kainah), and accounts for approximately 90% of world gem ammolite production. Prospectors who wish to mine ammolite deposits on Crown land must apply to the Alberta Department of Energy for a lease. These leases are not regularly offered; as of 2004, there was a CAD $625 application fee, with an annual rental fee of CAD $3.50 per hectare .
Gemstone quality
The quality of gem ammolite is communicated via a letter grade system, from best to least best: AA; A+; A; and A-. However, this system is not yet standardized and some vendors may use their own systems. The grade and therefore the value of an ammolite gemstone is determined by the following criteria:
The number of primary colors
A large array of colour is displayed in ammolite, including all the spectral colors found in nature. Red and green are far more common than blue or purple due to the latter's fragility (see properties). There are also certain hues, like crimson or violet or gold, which are derived from a combination of the primary colors, that are the rarest and in highest demand. The most valuable grades have roughly equal portions of three or more primary colors or 1–2 bright and even colors, with the lowest grades having one comparatively dull colour predominant.
The way the colors play (chromatic shift and rotational range
Chromatic shift is how the colors vary with the angle of viewing and the angle of light striking the gemstone; in higher grades this variation is almost prismatic in its scope, while lower grades show very little variation. Rotational range is how far the specimen can be turned while maintaining its play of colour; the best rotate 360 degrees uncompromised, while lesser stones may exhibit highly directional colors that are only visible within a narrow rotational range, down to 90° or less. Intermediate grades have ranges of 240–180°.
Brightness of colors (iridescence)
The brightness of colors and their iridescence is essentially dependent on how well-preserved the nacreous shell is, and how fine and orderly the layers of aragonite are. The quality of the polish is also a factor. The "dragon skin" cracking usually hinders its value; the most prized ammolite is the sheet type (see formation) and has broad, uninterrupted swathes of colour similar to the "broad flash" category of opal. The matrix is not visible in finer grades, and there should be no foreign minerals breaking up or diminishing the iridescence.
Ammolite is considered the rarest organic gem material. It is soft and delicate, most often requiring special processing techniques known only to a few experts specializing in this commercial industry. In its rough state, ammolite is sold for USD $30 to 65 per carat (150 to 325 $/g).
Use in jewelry
Fine ammolite jewelry by Korite International. The ammolite gems are triplets, as evidenced by their convex profiles, and are set in 14 karat (58%) gold with diamond accents. Ammolite is best used in pendants, earrings, and brooches due to its fragility.
In the late 1990s, practitioners of Feng Shui began to promote ammolite as an "influential" stone with what they believe is the power to enhance well-being and detoxify the body by improving its flow of energy or " chi". Named the "Seven Color Prosperity Stone", each colour is believed by Feng Shui practitioners to influence the wearer in different and positive ways; a combination of ruby red, emerald green, and amber yellow is most sought after for this purpose, the colors being said to enhance growth, wisdom, and wealth, respectively.
Japan is the largest market for ammolite; this may be due to its use as an imitation of increasingly scarce black opal, or its aforementioned use in Feng Shui. Secondary markets include Canada, where it is used both by artisans who sell their creations to tourists of Banff National Park and in fine jewelry production; and the Southwest United States, where it is used by Zuni and other Native American craftspeople.
Retrieved from ""
|
__label__pos
| 0.738341 |
The Declaration of Independence and the Moral Economy
“No Property! No Property!”
Let’s remember Thomas Lewis of Ghana. He was sold as a slave to a Danish trader, and then worked in N.Y., Carolina, Jamaica, and Florida before going to London in 1770. Slave catchers caught him riverside and trepanned him down river to sea but not before Granville Sharp, the Greek scholar, musician, and abolitionist could obtain a writ of habeas corpus.
Thomas Lewis’s allies were the common people of the neighborhood where he was apprehended, they heard his shouts and summoned Granville Sharp who was able to obtain the writ. That was on the Fourth of July 1770. The wind died down and the writ was served upon the ship captain taking Lewis. Lewis was released and then freed. On hearing the jury’s verdict on behalf of Lewis the assembled onlookers triumphantly shouted, “No Property! No Property!”
Let’s remember also the prosperous grain dealer (“corn factor”) named John Rusby who during the terrible famine of 1800 was found guilty on the Fourth of July of regrating the market of oats in Mark Lane, London. Regrating is buying in order to sell in the same market. The high court of Britain denounced his “shameless effrontery.” The Lord Chief Justice believed sharp market practices were prohibited by common law, a law going back many, many centuries. Leaflets were produced denouncing that concept of property that food could be sold to profit dealers while consumers were left to beg or steal or starve. The people shouted, “Bread! Bread!”
Adam Smith believed that forestalling, engrossing, and regrating were as imaginary as witchcraft. However, the burning of “witches” and the profiteering upon the starving still existed then, as they do now. Rusby’s house was attacked and he escaped by leaping over a back wall. Street lights were smashed to prevent identification of the rioters. The War Office sent troops, and quiet returned by one o’clock in the morning. It was but one incident in a great transformation of the coming year defeating the ‘moral economy’ and turning England into an armed camp.
In reflecting on these legal cases and the social struggles giving rise to them, what conclusions might be drawn? People are not property is one, and property serves people is another.
The Declaration of Independence surely requires amendment to reflect this. Unamended, it set in motion an expansion of slavery and principles antithetical to the moral economy.
|
__label__pos
| 0.772887 |
There's got to be some way that we can prove that we actually belong in the gang. We've got to do something totally unlike us. You know, Scoob? We could act like real detectives!
Shaggy and Scooby are feeling bad about messing up during the museums opening night and they want to make up for it.
|
__label__pos
| 0.915257 |
Preventing VTE
It's vital that all health care and nursing staff are aware of how to reduce the risk of a patient developing a VTE. By carrying out timely risk assessments, identifying those most at risk and carrying out preventative measures, you will be saving the lives of many of your patients. Patient education is also a very important part of preventing VTE. If a patient understands what VTE is, how it develops, and the possible consequences, they will be much more likely to take preventative measures, both whilst in hospital and after discharge.
What you can do
Whilst it's alarming that there are so many potentially preventable deaths from VTE in UK hospitals every year, it's crucial to focus on the word 'preventable'; this suggests it's possible to prevent unnecessary deaths in the future, provided certain protocols are followed. Following your risk assessment, there are a number of things that will help reduce the risk of patients who are identified at high risk of VTE, from developing VTE whilst in hospital and after discharge.
Pharmacological options
This refers to preventative measures involving medication. Patients with a high-risk of VTE, especially those having orthopaedic surgery, should be offered a form of anti-coagulant medicine (as long as they have a low risk of bleeding) to reduce the risk of developing thrombosis (blood clots). These anti-coagulant medicines may be low molecular weight heparin (LMWH), or an anti-coagulant medicine by another name. Different types of medicine may be given in different ways, including orally (unless the patient is recommended not to take anything orally, such as prior to undergoing a general anaesthetic) and via injection.
Whilst aspirin prevents blood clots in the arteries - it is used to help prevent heart attacks and strokes - it is poor at preventing blood clots in the veins and so is not recommended to prevent DVT or PE.
Mechanical options
This refers to preventative measures that are not related to medication. Anti-embolism stockings can decrease the risk of DVT. They may be used alongside anti-coagulants, intermittent pneumatic compression and/or foot pumps. Anti-embolism stockings help to prevent venous stasis (pooling of blood in the leg veins) and venous distension which can trigger formation of blood clots. Thigh length anti-embolism stockings will be the type used most frequently for surgical in-patients however anti-embolism stockings should not be used in patients with diabetes or peripheral arterial disease as both diseases narrow the blood vessels and stockings will do more harm than good.
Other options for mechanical prophylaxis include intermittent pneumatic compression devices such as compression sleeves and foot pumps. As with anti-embolism stockings, these devices must be fitted correctly for each patient and there is a video later in this section that demonstrates how stockings and intermittent pneumatic compression devices should be fitted.
There are some contra-indications for the use of anti-embolism stockings. These are:
All health care staff must be trained in the use of anti-embolism stockings and intermittent pneumatic compression devices. You need to be able to fit them onto a patient and to show the patient how to wear them correctly. You also need to check regularly that the patient is continuing to wear them, right up until he/she is normally mobile again.
Measuring a patient for anti-embolism stockings
Anti-embolism stockings must be correctly fitted to help prevent VTE. If they are too loose, they will do nothing to help prevent VTE. If they are too tight, they will act as a tourniquet, and completely stop the flow of blood in the patient’s leg. Therefore it’s vital that you measure the patient’s leg properly to ensure that you will be fitting the correct size of stocking onto each patient.
This video, kindly provided by e-Learning for Healthcare, demonstrates how health care staff should measure a patient’s legs to ensure that anti-embolism stockings, and intermittent pneumatic compression sleeves, fit correctly. To view a transcript of this video select: Measuring a patient for anti-embolism stockings (Word 26KB) or Measuring a patient for anti-embolism stockings (PDF 12KB).
Play this video
Important points to remember about measuring patients for anti-embolism stockings
Before deciding to fit anti-embolism stockings, check for any contra-indications (mentioned above), such as massive oedema (excessive swelling caused by a build-up of fluid in the tissues), arteriosclerosis or skin conditions such as dermatitis. If any contra-indications are present, you must not proceed with fitting stockings, and should instead seek advice about alternative methods of preventing VTE with that particular patient.
You will need to take three essential measurements in order to identify which are the correct size stockings to fit on a patient. The measurements may either be taken while the patient is lying down, or standing. These three measurements are:
1. When measuring the patient’s thigh, ensure that the tape measure is positioned around the widest point. Write down the measurement.
2. When measuring the patient’s calf, ensure that the tape measure is positioned around the widest point. Write down the measurement.
3. When measuring the patient’s leg length for thigh-length stockings, measure from the gluteal fold to the heel. When measuring leg length for knee-length stockings, measure from the popliteal fold, behind the knee, to the heel. Write down the measurement.
Some manufacturers of anti-embolism stockings supply a size chart with their stockings. Once you have the patient’s thigh, calf and leg length measurements, you will be able to use the chart to identify which size stocking is required. It may be necessary to measure both legs, particularly where there is a significant difference in leg size.
If the patient’s thigh circumference is greater than the stocking manufacturer’s maximum circumference, it would be better to use knee-length stockings instead. If a patient is unwilling or unable to wear thigh-length stockings, preferring to roll them down to the knee, it would better to fit them for knee-length stockings.
It’s important to record the patient’s measurements, as well as the size of stocking you have fitted, onto the patient’s chart. These measurements will also help you to determine the size of intermittent pneumatic compression sleeve a patient might need, in order to use an anti-embolic pump device.
How to fit anti-embolism stockings, and intermittent pneumatic compression for a patient
This video, kindly provided by e-Learning for Healthcare, demonstrates how health care staff should fit an anti-embolism stocking onto a patient. It also demonstrates how health care staff should fit a compression sleeve onto a patient’s leg in preparation for the use of intermittent pneumatic compression. To view a transcript of this video select: Fitting a patient for anti-embolism stockings (Word 26KB) or Fitting a patient for anti-embolism stockings (PDF 13KB).
Play this video
Important points to remember about fitting anti-embolism stockings
Once you have identified the correct stocking size to use, you will need to fit it onto your patient’s leg. It’s important to follow the correct procedure carefully, to ensure that your patient’s stockings are properly fitted in order to prevent VTE.
1. First, put your hand inside the stocking and move it down towards the ‘foot’ of the fabric (i.e. where the patient’s foot will be).
2. Locate the ‘heel’ of the stocking – they’re often easy to identify as they may be a different colour to the rest of the stocking, or they may be made of denser fabric than the surrounding stocking area.
3. Once you have located the heel of the stocking, take hold of it and pull it out of the stocking, so that it’s inside out.
4. Ask your patient to put their foot into the stocking, ensuring that the ‘heel’ part of the stocking is under their heel.
5. Make sure that the patient’s toes are not poking out of the end of the stocking, in case the elastic surrounding the hole restricts their blood flow.
6. The hole at the end of the stocking should be underneath the foot, so that nursing staff can easily check the foot for any discolouration that might indicate a problem with blood flow.
7. Gently roll the length of the stockings up the patient’s leg, making sure that there are no wrinkles in the fabric.
8. Once the stockings are on properly, check that your patient feels comfortable – the stockings should feel tight and secure, but not unbearably so.
It’s important to explain to patients exactly why they need to wear anti-embolism stockings. If they understand what VTE is, how serious it can be, and how the stockings can help prevent VTE, they will be more likely to follow your instructions carefully. Tell him/her not to roll the stockings down if they can possibly help it. If the patient removes their stockings, it’s important to put them on again as soon as possible. The stockings can be washed in cool or warm water, but should not be washed in very hot water or dried on a radiator as excessive heat will damage the fabric and make them far less effective.
Important points to remember about fitting intermittent pneumatic compression
It is important that these devices are not fitted to patients with confirmed or suspected VTE.
Each of the intermittent pneumatic compression sleeves will have a label indicating which side of the sleeve needs to be placed against the back of the patient’s leg. It will also show you which end of the sleeve is the ankle end, and which end is the thigh end.
1. First, ask the patient if you can slide the sleeve under his/her leg.
2. Next, wrap the sleeve up, fastening the Velcro strips to each other.
3. Once fastened, the sleeve should feel reasonably tight, but you should still be able to slide two fingers under the top of the sleeve.
4. Attach the sleeve to the pneumatic compression machine, making sure that the connection snaps properly into place.
5. Next, unwrap the foot cuff and ask your patient to place their heel into the strap at the back of the cuff. Fasten the foot cuff and attach it to the machine, again making sure it is properly connected.
6. Once you’re happy that everything’s in place, tell your patient that you’re going to switch the intermittent pneumatic compression machine on. The machine will self-regulate to apply the correct pressure to the patient’s foot and leg. The patient should feel a pleasant pressure of waves going up his/her leg, as the machine encourages the flow of blood away from the foot and back to the heart. Patients fitted with a foot pump should feel deep pressure on the ball of his/her foot, similar to what they’d feel if they were walking.
Intermittent pneumatic compression and foot pump devices are useful preventative measures for VTE before surgery, and can be used alongside anti-embolism stockings post-surgery while patients are in hospital. As you did with the anti-embolism stockings, talk to your patient about intermittent pneumatic compression and foot pump devices, and how these will help prevent them from developing VTE by mimicking a walking motion, even when they aren’t able to move around themselves. Whilst the patient will be able to remove the cuff for short periods of time – to shower or have a bath, for example - it’s best if they reattach the connections quickly afterwards. Explain that they need to wear the sleeves and cuffs as much as possible to help prevent VTE.
What patients can do
One of the most important things you can do for your patient is to talk to them and their carers about VTE and what they need to do to prevent it. If a patient knows that it's important to exercise regularly in hospital and after they've been discharged, and why, then he/she will be much more likely to help in the fight against VTE. Even patients who are bed-bound can usually still do regular, gentle exercises such as ankle circling or toe stretching, and can resolve to drink more fluids in order to stay properly-hydrated. The videos in the VTE Risk assessments section provide excellent guidance on discussing VTE risks with surgical and medical patients.
Encourage your patients to drink plenty of water (unless fluid intake is restricted due to other medical conditions) and not become dehydrated during their stay in hospital. If your patients are mobile, encourage them to exercise. Where possible, encourage them to walk around as soon as possible after surgery. If they're bed-bound, encourage them to do gentle leg exercises such as leg lifts and ankle circles in bed, as soon as they're able to, and to elevate the foot of their bed or prop up their feet with a pillow to prevent their circulation from pooling.
If the patient is confined to a chair, encourage them to exercise their lower legs by raise their heels, keeping their toes on the floor, then lowering their heels again, ten times. Then raise and lower their toes ten times, keeping their heels on the floor. They need to do these exercises at least every half hour, and more often if they're able to.
After care
Before your patient goes home, make sure that he/she (and their family, partner or carer, as appropriate) is fully informed about what they can do to continue the good work of preventing VTE. Give them information leaflets on VTE and go through them together. Explain the various preventative measures they can take, such as gentle exercise every day (e.g. walking, swimming, cycling, if possible), wearing anti-embolism stockings and drinking plenty of fluids as appropriate.
Make sure your patient (and their family, partner or carer, as appropriate) understands what to do, why he/she has to do it, and the potential consequences of not doing so. The following leaflets are available online and may be useful to talk through with your patient on discharge. Some documents may be in PDF format - see how to access PDF files.
|
__label__pos
| 0.715195 |
How immigrants are redefining 'American' in Southern California
A short history of the 14th Amendment
A child participates in a parade of flags, October 2010
From the piece:
In clothing with constitutional authority the principle of equality before the law regardless of race, enforced by the national government, this amendment permanently transformed the definition of American citizenship as well as relations between the federal government and the states, and between individual Americans and the nation. We live today in a legal and constitutional system shaped by the Fourteenth Amendment.
A Library of Congress website that catalogues important documents in African American history has more on the amendment's history, including a link to an image of the resolution that called for the constitutional amendment to be made.
The Senate passed the 14th Amendment on June 8, 1866, by a vote of 33 to 11, according to the site; the House of Representatives approved it June 13, 1866, by a vote of 120 to 32. It was ratified July 28, 1868.
More details, from one of the Library of Congress links:
The amendment grants citizenship to "all persons born or naturalized in the United States" which included former slaves who had just been freed after the Civil War. The amendment had been rejected by most Southern states but was ratified by the required three-fourths of the states. Known as the "Reconstruction Amendment," it forbids any state to deny any person "life, liberty or property, without due process of law" or to "deny to any person within its jurisdiction the equal protection of the laws."
And perhaps not surprisingly, as more foreigners began arriving, the law was challenged as it pertained to immigrants. The precedent-setting court case that set the stage for the present legislative challenge brewing in Washington, D.C. and state capitals today took place at a time when the political climate was hostile to Chinese immigrants and their descendants.
The Chinese Exclusion Act, which blocked nearly all immigration from China, had been enacted in 1882. In the summer of 1895, a young man named Wong Kim Ark was returning to his native San Francisco by steamship after a trip to China to visit his parents, who had returned there to live after many years in the United States, where he was born. Upon his arrival, he was denied re-entry on the grounds that he was not a U.S. citizen.
The case made it to the U.S. Supreme Court, which ruled in March 1898 that he was indeed a citizen, citing the first section of the 14th Amendment. From the Supreme Court case:
blog comments powered by Disqus
What's popular now on KPCC
|
__label__pos
| 0.796984 |
Collier's New Encyclopedia (1921)/Abila
From Wikisource
Jump to: navigation, search
ABILA, or ABYLA, a mountain of Africa, opposite that which is called Calpe, on the coast of Spain, only 18 miles distant. These two mountains are named the Pillars of Hercules, and were supposed formerly to have been united, till the hero separated them, and thereby effected a communication between the Mediterranean Sea and the Atlantic Ocean.
|
__label__pos
| 0.982169 |
Possible Treatment for Schizophrenia Targets NMDA ReceptorsNew drugs for schizophrenia could be in the making thanks to a new class of compounds identified by a research team at Emory University School of Medicine.
The compounds improve signaling in brain molecules, called NMDA receptors, which are believed to function at low levels in schizophrenia.
Led by Stephen Traynelis, PhD, professor of pharmacology, the team sifted through thousands of chemicals and came across CIQ, which proved to selectively boost the actions of certain NMDA receptors without disturbing others.
Currently, schizophrenia is treated with a variety of antipsychotic drugs, which can have various long-term side effects. The idea behind treating schizophrenia via NMDA receptors comes from the observation that when healthy people take the drugs ketamine or phencyclidine (PCP or angel dust), they actually experience the symptoms of schizophrenia for a short period of time, including hallucinations, disorganized thoughts and flattened emotions.
“There is room for improvement in therapeutic treatment of schizophrenia,” Traynelis says. “Exploration of alternative targets, such as the NMDA receptor, could potentially lead to expanded treatment options and improved outcomes for patients with schizophrenia.”
Ketamine and phencyclidine both interact with NMDA receptors. Scientists used this knowledge to propose that perhaps a push in the opposite direction chemically — enhancing rather than blocking NMDA receptors.
The hope is that this may help relieve the symptoms of schizophrenia.
NMDA receptors serve as gates that allow electrical charges to surge into neurons when enough glutamate (a neurotransmitter) is present. These receptors are necessary for receiving signals in the brain and are connected with sensory perception, memory and learning.
NMDA receptors are found in different forms. When assembled, they have two parts: one, called NR1, which remains the same throughout the brain, and another that comes in four different variations (NR2A, B, C and D) of differing prominence, depending on the area of the brain under examination.
Currently, only a few drugs can selectively target NMDA receptors that contain different NR2 sub-units. Traynelis and his team were searching for chemicals that would only improve function of the NR2C and NR2D forms. Earlier studies have suggested that enhancement of these sub-units may help in schizophrenia.
“Enhancing NMDA receptor function might compensate for some of the deficits seen in patients with schizophrenia,” he says. “Because NMDA receptors play a number of important roles in the brain, we sought to target only those subunits that have been suggested to potentially improve symptoms in patients with schizophrenia.”
The discovered compound, called CIQ, makes it easier for NMDA receptor gates to open, although it doesn’t act alone; it still needs glutamate and glycine to bind to the NMDA receptor before it can operate. The researchers also discovered that the parts of NR2C and NR2D NMDA receptors that are CIQ-sensitive are unique from the parts of these receptors known to interact with other known drugs.
“CIQ appears to act at a new, physically distinct site on the receptor that could offer an opportunity to manipulate receptor function in a variety of ways,” Traynelis says.
“CIQ is not a drug or clinical candidate,” he adds. “Rather, it marks the beginning of a process that involves fine tuning the structure to build potent, selective, and well-tolerated compounds. Later, these can be evaluated in clinical trials to determine whether the strategy of enhancing NMDA receptor signaling does indeed improve the lives of patients with schizophrenia.”
Source: Emory University
|
__label__pos
| 0.957116 |
Mar. 17, 2014
What's the Cosmic Microwave Background?
by Julie Leibach
Click to enlarge images
*UPDATE: Researchers have since retracted the claim that they found the first direct evidence for cosmic inflation—namely, B-mode polarization in the cosmic microwave background, caused by primordial gravity waves (which cosmologists theorize occurred during inflation). “A joint analysis of data from ESA’s Planck satellite and the ground-based BICEP2 and Keck Array experiments has found no conclusive evidence of primordial gravitational waves,” according to a press release from the European Space Agency, released on January 30, 2015. However, there is another contender in this game that can produce a similar effect: interstellar dust in our Galaxy, the Milky Way. For more details, check out Ron Cowen's article in Nature and Adrien Cho's article in Science.
Today, researchers announced the first direct evidence* for cosmic inflation—the idea that, less than a second after the Big Bang, the universe blew up like a balloon in a process of exponential expansion. The evidence comes from patterns detected by a telescope called BICEP2 in the cosmic microwave background, or CMB.
The CMB is light that was released 300,000-400,000 years after the Big Bang, and it’s the oldest light that we can detect in the universe. “The fact that there is a CMB is one of the great pieces of evidence for the Big Bang,” says Duncan Hanson, a cosmologist at McGill University and the lead author of a study published last year describing patterns found in the CMB.
Here’s how cosmologists think the CMB came to be:
The early universe was a piping hot, opaque “soup” of particles, according to Clarence Chang, a scientist at Argonne National Laboratory who helped build the South Pole Telescope, another telescope that studies the CMB. As it cooled and further expanded over time, the universe coalesced into a plasma consisting of more familiar ingredients, including protons and electrons. These charged particles constantly scattered photons as polarized light, which was trapped in the plasma like sunbeams lost in fog.
As the universe continued cooling, the charged particles found each other, forming neutral atoms less prone to scattering photons. Liberated, that early light—what we now call the CMB—could travel freely through space, and as it did, it stretched to wavelengths associated with very cold temperatures that highly sensitive telescopes can detect. By studying patterns in the CMB polarization, researchers can learn more about the origin and makeup of the big black yonder.
For instance, as the CMB radiation travels toward us, it experiences gravitational tugs from bodies of mass that warp its path. That tugging, called gravitational lensing, creates a pattern in the CMB’s polarization called B-mode.
But B-mode polarization can also result from a different phenomenon—what’s called primordial gravity waves. Cosmologists theorize that these waves formed as a result of quantum mechanical fluctuations during inflation. Detecting the imprint of gravity waves on the CMB polarization amounts to finding “the first tremors” of the Big Bang, according to Hanson—and that’s exactly what researchers using BICEP2 observed.* For more on the discovery, tune in to this SciFri segment from March 21, 2014.
About Julie Leibach
|
__label__pos
| 0.976512 |
Mary Barton Fun Activities
Buy the Mary Barton Lesson Plans
Create a costume
Love poem
Create an acrostic poem using either "Manchester", "Chartists", "Mary and Jem" or "Carson Mill" as the topic of the poem as well as the word which each line/paragraph of the poem will join to spell out.
Compose a letter as Jem writing to his mother from Mary's bedside in Liverpool.
Strike poster
Create a strike poster/placard that a worker may have carried. Make the slogan or complaints on the poster/placard relevant to the plight of factory workers in the Industrial Revolution.
Alternate Ending
(read more Fun Activities)
This section contains 617 words
(approx. 3 pages at 300 words per page)
Buy the Mary Barton Lesson Plans
Mary Barton from BookRags. (c)2015 BookRags, Inc. All rights reserved.
Follow Us on Facebook
|
__label__pos
| 0.850505 |
water pollution
New Evidence That Urban Water Pollution Is Harming Birds
This Dead Whale Is Helping Science in an Incredibly Gross Way
Researchers are studying its earwax to learn about human-made ocean pollution. Yes, there are photos.
What's Worse Than an Oil Spill? A Molasses Spill
There is no way to clean it up.
|
__label__pos
| 0.974023 |
hydroxychloroquine, Plaquenil: Facts and Side Effects
hydroxychloroquine (Plaquenil) (cont.)
Pharmacy Author:
Medical and Pharmacy Editor:
DRUG INTERACTIONS: Administration of hydroxychloroquine with penicillamine (Cuprimine, Depen) may increase penicillamine levels, increasing the risk of penicillamine side effects. The mechanism is unknown. Combining telbivudine (Tyzeka) and hydroxychloroquine may increase the risk of unexplained muscle pain, tenderness, or weakness because both drugs cause such side effects.
PREGNANCY: Hydroxychloroquine should only be used in pregnant women for malaria prophylaxis or treatment.
NURSING MOTHERS: Hydroxychloroquine may be secreted in breast milk and may cause side effects in the infant.
SIDE EFFECTS: Side effects include irritability, headache, weakness, hair lightening or loss, stomach upset, nausea, dizziness, muscle pain, rash and itching. Rarely, hydroxychloroquine can affect the bone marrow leading to reduced white blood cells (leukopenia) or platelets (thrombocytopenia) and abnormal red blood cells (anemia). Rare but potentially serious eye toxicity can occur. This toxicity affects a part of the eye called the retina and can lead to color blindness and even loss of vision. An ophthalmologist (eye specialist) often can detect changes in the retina that suggest toxicity before serious damage occurs. Therefore, regular eye examinations, even when there are no symptoms, are mandatory. Patients who are genetically deficient in a certain enzyme, called G6PD, can develop a severe anemia resulting from the rupture of red blood cells. This enzyme deficiency is more common in persons of African descent and can be evaluated by blood testing. Hydroxychloroquine may worsen psoriasis.
Reference: FDA Prescribing Information
Medically Reviewed by a Doctor on 10/28/2014
Report Problems to the Food and Drug Administration
Pill Finder Tool
Need help identifying pills and medications?
Use the pill identifier tool on RxList.
Back to Medications Index
|
__label__pos
| 0.938239 |
Charmaine Antonucci in the US
1. #23,925,422 Charmaine Angelo
2. #23,925,423 Charmaine Ankrah
3. #23,925,424 Charmaine Annan
4. #23,925,425 Charmaine Ansari
5. #23,925,426 Charmaine Antonucci
6. #23,925,427 Charmaine Antwine
7. #23,925,428 Charmaine Apa
8. #23,925,429 Charmaine Aplhonso
9. #23,925,430 Charmaine Aponick
people in the U.S. have this name View Charmaine Antonucci on Whitepages Raquote 8eaf5625ec32ed20c5da940ab047b4716c67167dcd9a0f5bb5d4f458b009bf3b
Meaning & Origins
Possibly a variant of Charmian, influenced by names such as Germaine, but more probably an invented name based on the vocabulary word charm + -aine as in Lorraine. It is not found before 1920, but has enjoyed some popularity since the 1960s, when it came to notice as the title of a hit song by The Bachelors.
1,310th in the U.S.
Italian: from a pet form of the personal name Antonio.
9,658th in the U.S.
Nicknames & variations
Top state populations
|
__label__pos
| 0.837645 |
The Ancient Child Quiz | Eight Week Quiz F
Buy The Ancient Child Lesson Plans
Name: _________________________ Period: ___________________
Multiple Choice Questions
1. What does Sitting Bear admire more than modesty?
(a) Humor.
(b) Boasting.
(c) Honesty.
(d) Courage.
2. Who told Set the story of the boy who turns into a bear?
(a) His father, Cate.
(b) Kope'mah.
(c) Grey.
(d) Sister Stella Francesca.
3. What did the wise man advise the Piegan people to do about the disappearing boy?
(a) Forget about him.
(b) Go search for him.
(c) Do not believe in him.
(d) Meditate about him.
4. Who killed Billy the Kid?
(a) Pat Garrett.
(b) A rancher named Wilcox.
(c) Charlie Bowdre.
(d) A Texas ranger.
5. Why is Set so startled when he meets Grey at the encampment?
(a) She is like a boy.
(b) She is hostile.
(c) She is not interested in him.
(d) She is beautiful.
Short Answer Questions
1. What did Set look for in the garden when he was a child?
2. When Grey was being raped, who does she imagine is making love to her?
3. What passion had Perfecto Atole given Grey?
4. When Set returns to his adoptive father Bent's house, who does he see at first in his mind's eye?
5. How does Murphy lose his horse?
(see the answer key)
This section contains 218 words
(approx. 1 page at 300 words per page)
Buy The Ancient Child Lesson Plans
|
__label__pos
| 0.832248 |
The Yearling Quiz | Eight Week Quiz D
Buy The Yearling Lesson Plans
Name: _________________________ Period: ___________________
Multiple Choice Questions
1. When Oliver gets into a fight, how many of the Forrester men does he fight at once?
(a) One.
(b) Three.
(c) Two.
(d) Four.
(a) One month.
(b) One week.
(c) One year.
(d) One day.
3. What baby animal does Jody see while he is running to fetch the doctor?
(a) A baby fox.
(b) A baby badger.
(c) A baby deer.
(d) A baby bear.
4. Which of the following is NOT used as a description of Oliver Hutto?
(a) Red-tinged hair.
(b) Gray eyes.
(c) Tanned skin.
(d) Muscled shoulders.
5. Which of the following words finishes this phrase from the Forrester home: "I'm so hungry, my ______ thinks my throat is cut"?
(a) Insides.
(b) Tummy.
(c) Belly.
(d) Stomach.
Short Answer Questions
1. Which of the following is NOT a watering trough at the Baxter family sinkhole?
2. Which of the following does Jody do to Lem Forrester, attempting to protect Oliver during the fight?
3. Where has Oliver Hutto been living, before he returns to Grandma Hutto's home?
4. Why does Grandma Hutto allow Jody to return home after the fistfight?
5. What does the Baxter family suspect happened to the missing animals?
(see the answer key)
This section contains 295 words
(approx. 1 page at 300 words per page)
Buy The Yearling Lesson Plans
|
__label__pos
| 0.890868 |
We are living at the tipping point of two absolutely opposite systems: A world defined by change vs. repetition
Submitted by: Tsega Belachew on 12/01/13
"We all know that we are at a transition moment. We all sense that. Basically, we are moving from a world that was defined by seeking efficiency and repitition. Now, we are in a world that is not only different but it is the exact opposite game: it is defined by change...We are living at the tipping point of two absolutely opposite systems. And that has huge implications for every aspect of every person's life, for every organization, for every country, city."
Bill Drayton visited Stanford to take part in the Entrepreneurial Thought Leaders Seminar series. During his talk, online at the university's Entrepreneurship Corner (E-Corner), Bill helps us see how we each can understand this new paradigm, what the future is calling for and what that means in every aspect of our lives.
He discusses Ashoka's roots as an example of entrepreneural behavior and what this transitional moment will lead for the change in the strategic environment. A key and powerful approach to dealing with this new environment is 'collaborative entrepreneurship', also a central part of the change that is taking place. Bill shares a vision for how the world can transition to a place where everyone is a contributing changemaker. Later on, Bill sits down in conversation with Stanford Professor Tina Seelig to discuss critical skills for changemakers, the possibilities for collaborative entrepreneurship, and the importance of giving yourself permission to make change.
|
__label__pos
| 0.729935 |
Cipher suite
From Wikipedia, the free encyclopedia
Jump to: navigation, search
The structure and use of the cipher suite concept is defined in the documents that define the protocol.[1] A reference for named cipher suites is provided in the TLS Cipher Suite Registry.[2]
When a TLS connection is established, a handshaking, known as the TLS Handshake Protocol, occurs. Within this handshake, a client hello (ClientHello) and a server hello (ServerHello) message are passed.[3] First, the client sends a cipher suite list, a list of the cipher suites that it supports, in order of preference. Then the server replies with the cipher suite that it has selected from the client cipher suite list.[4] In order to test which TLS ciphers that a server supports an SSL/TLS Scanner may be used.
Detailed description[edit]
Each named cipher suite defines a key exchange algorithm, a bulk encryption algorithm, a message authentication code (MAC) algorithm, and a pseudorandom function (PRF).[5][6][7]
• The key exchange algorithm is used to determine if and how the client and server will authenticate during the handshake.[8]
• The bulk encryption algorithm is used to encrypt the message stream. It also includes the key size and the lengths of explicit and implicit initialization vectors (cryptographic nonces).[9]
• The message authentication code (MAC) algorithm is used to create the message digest, a cryptographic hash of each block of the message stream.[10]
• The pseudorandom function (PRF) is used to create the master secret, a 48-byte secret shared between the two peers in the connection. The master secret is used as a source of entropy when creating session keys, such as the one used to create the MAC.[11]
Examples of algorithms used[edit]
key exchange/agreement
RSA, Diffie-Hellman, ECDH, SRP, PSK
bulk ciphers
RC4, Triple DES, AES, IDEA, DES, or Camellia. In older versions of SSL, RC2 was also used.
message authentication
for TLS, a Hash-based Message Authentication Code using MD5 or one of the SHA hash functions is used. For SSL, SHA, MD5, MD4, and MD2 are used.
Programming references[edit]
Programatically, a cipher suite is referred to as:
CipherSuite cipher_suites
a list of the cryptographic options supported by the client[12]
CipherSuite cipher_suite
the cipher suite selected by the server and revealed in the ServerHello message[13]
1. ^ RFC 5246
2. ^ TLS Cipher Suite Registry
3. ^ RFC 5246, p. 37
4. ^ RFC 5246, p. 40
5. ^ "CipherSuites and CipherSpecs". IBM. Retrieved 20 November 2009.
6. ^ "Cipher Suites in Schannel". Microsoft MSDN. Retrieved 20 November 2009.
7. ^ RFC 5246, p. 40
8. ^ RFC 5246, p. 47
9. ^ RFC 5246, p. 17
10. ^ RFC 5246, p. 17
11. ^ RFC 5246, p. 16-17, 26
12. ^ RFC 5246, p. 41
13. ^ RFC 5246, p. 42-43, 64
|
__label__pos
| 0.873496 |
Fires in Western Iceland
3061 of 4108
Fires in Western Iceland
April 11, 2006
A brush fire burns several farms in this image of western Iceland acquired on March 30, 2004. According to various news reports, the fires began when dry grasses ignited - the cause of which is currently unknown. The fire had consumed at least 50 square kilometers (19 square miles) and at least twelve farms at that time.
Iceland is often called the "land of fire and ice"; however, generally the fire part refers to its high level of volcanic activity, not the frequency or intensity of its "wild" or "wildland" fires. This is due to the fact that Iceland sits atop the Mid-Atlantic ridge, where two tectonic plates (the American and African) are spreading apart at the rate of 2.54 centimeters (about an inch) per year.
Over one-third of the island is active volcano or its direct impacts, such as lava fields. The island is also rife with hot springs; groundwater is heated by subterranean magma and percolates to the surface as steam, where it cools and pools at the surface. Ice, mostly in the form of glaciers, covers about 10% of the land surface currently. However, in the past, ice covered the entire island, and would do so again but for the heat from below.
comments powered by Disqus
|
__label__pos
| 0.998535 |
Dog breeding Reference Libraries
Page 5 of about 90 Articles
2013-06-12 16:26:26
The aidi, also known as the Chien de l'Atlas, is a species of guard dog that originated from Morocco. This species was used as a guard dog for sheep and livestock, but was also used alongside the hunting Sloughi as a tracking dog. This species lived with nomadic tribes and stood guard around the perimeter of camps. In the past, it was not highly regarded, unlike the Sloughi, but a recent...
Grand Bleu de Gascogne
2013-06-11 15:22:04
The Grand Bleu de Gascogne is a breed of scent hound dog that is thought to have originated from France and was used to hunt large game like deer and boar. It is a descendent of an old hunting breed that lived at the time of the St. Hubert hound in the 14th century. The modern breed is an important ancestor of many other scent hounds. Its temperament varies between individuals and it is not...
2013-06-11 15:18:18
Braque du Puy
2013-06-11 14:40:15
The Braque du Puy was a breed of domestic hunting dog that originated in France. It is thought that the breed was developed in the nineteenth century in Poitou, when greyhound like breeds and Braques were crossbred, although one story suggests that two brothers bred their pet Braque Francais with a Sloughi dog from Africa. This breed was white in color with orange or liver colored markings and...
Bouvier des Flandres
2013-06-11 14:27:46
The Bouvier des Flandres, also known as the Toucheur de Boeuf or Vuilbaard, is a domestic breed of herding dog that originated from Flanders and was once used for cattle driving, sheep herding, and other general farm duties. Its French name translates to “Cow Herder of Flanders.” The origin of this breed is credited to monks who resided in Flanders at the Ter Duinen monastery. It is...
Petit Bleu de Gascogne
2013-06-11 14:22:42
The Petit Bleu de Gascogne is a domestic breed of scenthound dog that originated in France. The breed is descended from hunting dogs that were used during the fourteenth century, the same ancestors of the slightly larger Grand Bleu de Gascogne breed. Like its larger counterpart, the term Petit does not refer to its size but to the size of the game it hunts, including hares. The Petit Bleu de...
Toy Bulldog
2013-06-11 11:37:04
Newfoundland Dog
2009-05-12 10:27:02
Shiba Inu
2008-09-09 21:42:47
Shetland Sheepdog
2008-09-09 19:06:25
The Shetland Sheepdog, also called the Sheltie, hails from the Shetland Islands off the north coast of mainland Scotland. The breed is a descendant of the Collie, and its ancestors may have included the Greenland Yakki dog, King Charles Spaniel, Pomeranian, and the Border Collie, although this is uncertain. Up until the mid 20th century the breed was often called the Shetland Collie. The breed...
Word of the Day
|
__label__pos
| 0.788423 |
Export (0) Print
Expand All
PolyDraw function
The PolyDraw function draws a set of line segments and Bézier curves.
BOOL PolyDraw(
_In_ HDC hdc,
_In_ const POINT *lppt,
_In_ const BYTE *lpbTypes,
_In_ int cCount
hdc [in]
A handle to a device context.
lppt [in]
A pointer to an array of POINT structures that contains the endpoints for each line segment and the endpoints and control points for each Bézier curve, in logical units.
lpbTypes [in]
A pointer to an array that specifies how each point in the lppt array is used. This parameter can be one of the following values.
Specifies that this point starts a disjoint figure. This point becomes the new current position.
Specifies that a line is to be drawn from the current position to this point, which then becomes the new current position.
Specifies that this point is a control point or ending point for a Bézier curve.
PT_BEZIERTO types always occur in sets of three. The current position defines the starting point for the Bézier curve. The first two PT_BEZIERTO points are the control points, and the third PT_BEZIERTO point is the ending point. The ending point becomes the new current position. If there are not three consecutive PT_BEZIERTO points, an error results.
A PT_LINETO or PT_BEZIERTO type can be combined with the following value by using the bitwise operator OR to indicate that the corresponding point is the last point in a figure and the figure is closed.
Specifies that the figure is automatically closed after the PT_LINETO or PT_BEZIERTO type for this point is done. A line is drawn from this point to the most recent PT_MOVETO or MoveToEx point.
This value is combined with the PT_LINETO type for a line, or with the PT_BEZIERTO type of the ending point for a Bézier curve, by using the bitwise operator OR.
The current position is set to the ending point of the closing line.
cCount [in]
The total number of points in the lppt array, the same as the number of bytes in the lpbTypes array.
Return value
If the function succeeds, the return value is nonzero.
If the function fails, the return value is zero.
The PolyDraw function can be used in place of consecutive calls to MoveToEx, LineTo, and PolyBezierTo functions to draw disjoint figures. The lines and curves are drawn using the current pen and figures are not filled. If there is an active path started by calling BeginPath, PolyDraw adds to the path.
The points contained in the lppt array and in the lpbTypes array indicate whether each point is part of a MoveTo, LineTo, or PolyBezierTo operation. It is also possible to close figures.
This function updates the current position.
Minimum supported client
Windows 2000 Professional [desktop apps only]
Minimum supported server
Windows 2000 Server [desktop apps only]
Wingdi.h (include Windows.h)
See also
Lines and Curves Overview
Line and Curve Functions
Community Additions
© 2015 Microsoft
|
__label__pos
| 0.957277 |
Subscribe Now to the Digital Almanac Monthly Magazine!
Why would you tell her womenWhy would you tell her women are not allowed at the masjid? That's false information.
|
__label__pos
| 0.99967 |
Note that one should not use these analyses to make statements about individuals. That's called the ecological fallacy, and it can lead you very far astray, very quickly.
Also, please ask questions. Don't look at the graphs and equations and run away.....ask. There are no dumb questions. I will not tell you you are stupid for asking. Statistics is confusing to lots of people, not just you! So ASK!
My suspicion, before looking at the relationship between median income and Cook PVI (Cook PVI is, essentially, a measure of how Republican or Democratic the district was in the last two presidential elections, compared to the national average) was that higher median income districts would be more Republican. I did know that some high income districts were quite Democratic, but I thought these were exceptions. Well, one reason to explore the data is to see whether your suspicions are correct. Here's a graph of median income and Cook PVI across 435 districts:
My favorite professor in grad school used to say "If you're not surprised, you haven't learned anything". I'm surprised, but what can we learn?
Each panel of the graph is congressional districts of a certain level of urban-ness. The lower left is less than 50% urban, lower right is 50-75%, upper left is 75-90% and upper right is over 90% urban. (Note, it is probably better to think of 'urban' as 'urban or suburban' or, perhaps 'rural'). This is interesting!
Graphs are good for exploration, now let's look at a model. In specific, let's look at several regression models, with the dependent variable being Cook PVI and the IVs being different combinations of urban and median income.
The resulting equation is:
CookPVI = 3.69 - .051*MedInc.
What this means is that the predicted PVI for a district with a median income of 0 is D+4, and that it declines by .05 for each thousand dollar increase in median income. This difference wasn't significant, and the R^2 for this model was only 0.0001, meaning that almost none of the variation in CookPVI is accounted for by median income.
Second, Cook PVI as a function of %Urban
This gives:
CookPVI = -29.45 + 0.39*Urban
Finally, a model with both urban and median income:
Cook PVI = - 18.8 - 0.41*Median Income + 0.48*Urban
Originally posted to plf515 on Sun Dec 02, 2007 at 05:22 AM PST.
Your Email has been sent.
|
__label__pos
| 0.737356 |
The Illinois Department of Labor is empowered to investigate violations and impose civil penalties for violations of the Act. Multiple violations and failures to remedy violations can lead to heightened or additional penalties.
All employers operating in Illinois are encouraged to review their application documents and ensure that questions about criminal history are deleted before January 1, 2015. Employers are also encouraged to revisit their background check procedures to make certain that their screens are not pulling up criminal history information before it is allowed under the new law.
|
__label__pos
| 0.877351 |
All-Cause Mortality Risk Among a National Sample of Individuals With Diabetes
1. Thomas Koepsell, MD, MPH3,5
1. 1General Medicine Service, VA Puget Sound Health Care System, Seattle, Washington;
2. 2Department of Medicine, University of Washington, Seattle, Washington;
3. 3Epidemiologic Research and Information Center, VA Puget Sound Health Care System, Seattle, Washington;
4. 4Health Services Research & Development, VA Puget Sound Health Care System, Seattle, Washington;
5. 5Department of Epidemiology and Health Services, University of Washington, Seattle, Washington.
1. Corresponding author: Karin M. Nelson, karin.nelson{at}
OBJECTIVE Little is known about the relative contributions of modifiable risk factors to overall diabetes mortality. The purpose of the current study is to 1) assess the association between modifiable risk factors and all-cause mortality among a nationally representative sample of individuals with diabetes and 2) determine the population-attributable risk percent (PAR%) for these factors.
RESEARCH DESIGN AND METHODS We analyzed data from a nationally representative sample of 1,507 adults over the age of 17 years with a self-reported diagnosis of diabetes from the Third National Health and Nutrition Examination Survey (NHANES III) mortality study. Our main outcome measures were all-cause mortality and PAR%. We used the Cox proportional hazard analysis to determine hazard ratios (HRs) for known diabetes risks and calculated PAR%.
RESULTS Among adults with diabetes, the HRs for all-cause mortality were significant for individuals who had an A1C ≥8% (HR 1.65, 95% CI 1.11–2.45) or reported no regular physical activity (1.58, 1.24–2.02) or current tobacco use (1.77, 1.15–2.73). The population-attributable risk was 15.3% for A1C value ≥8%, 16.4% for no regular physical activity, and 7.5% for current tobacco use.
CONCLUSIONS Health systems may consider prioritizing care to include smoking cessation, increasing physical activity, and moderate glycemic control among patients with diabetes. This study suggests that focusing on these areas may result in significant reductions in mortality in individuals with diabetes.
Optimal disease management for individuals with diabetes often involves significant lifestyle modifications (including diet, physical activity, and smoking cessation) in addition to complex medication regimens to control blood glucose, blood pressure, and serum lipid levels. These treatments have the potential to improve risk factors for morbidity and mortality among individuals with type 2 diabetes (1). Given the complexity of care for individuals with diabetes and the time limitations of health care providers (2), the relative association of each of these factors will be useful to inform policy and planning for appropriate diabetes care.
The purpose of the current study was to determine the association of modifiable risk factors for all-cause mortality among a nationally representative sample of individuals with diabetes and to assess the population-attributable risk percent (PAR%) for death for risk factors including blood pressure, lipid and glycemic control, smoking, and physical activity. Previous studies using data from the National Health and Nutrition Examination Survey (NHANES) have not examined the relative contribution of lifestyle factors such as physical activity (3) or have relied on older data that did not include information on glycemic control (4). In addition, previous studies have presented relative risk estimates for these factors, which do not necessarily give an indication of the public health implications of the exposure of interest or its effect on the population (3,5). In contrast, PAR% calculations are suitable in addressing public health policy questions regarding appropriate interventions, population-based treatment strategies, and quality improvement efforts (6).
We used data from the Third National Health and Nutrition Examination Survey (NHANES III) mortality follow-up file (7). For this database, the National Center for Health Statistics linked NHANES III participants aged ≥17 years by probabilistic matching to the National Death Index to determine mortality status through the year 2000. For a selected sample of NHANES III records, the death certificates were reviewed to verify correct matches (7). Overall, 20,042 adult NHANES III participants were eligible for matching, of whom 3,384 were identified as deceased (7). The mean observation time between the NHANES III survey and ascertainment of mortality status was 7.58 years (95% CI 7.17–7.99). The underlying cause of death was based on ICD-9 codes from 1986 to 1998 and on ICD-10 codes from 1999 to 2000. Death was classified from heart disease for ICD-9 codes 390–398, 402, and 404–429 and ICD-10 codes I00–I09, I11, I13, and I20–I51. Cancer deaths were based on ICD-9 codes 140–208 and ICD-10 codes C00–C097. NHANES III was conducted between 1988 and 1994 and used a stratified multistage sampling design with oversampling of Mexican Americans, African Americans, and individuals over age 60 years. The survey consisted of multiple components including a household interview, a physical examination, and laboratory tests. Information on medical history was obtained during the household interview, and a total of 1,507 adults reported a diagnosis of diabetes. Women who reported only gestational diabetes were excluded from our analysis. This study was approved by the Institutional Review Board at the VA Puget Sound Medical Center.
Exposure variables
Important lifestyle modifications and disease control variables were considered. Physical activity was classified as moderate or vigorous intensity based on MET intensity levels. Physical activity was based on a self-report during the month before the survey. Individuals were classified as inactive if they did not report engaging in any of the following activities during the previous month: walking, jogging, bike riding, swimming, aerobics, dancing, calisthenics, gardening, lifting weights, or other physical activity outside of their occupation. Individuals were considered to fulfill national recommendations for physical activity if they reported five or more episodes per week of moderate-intensity physical activity, or three or more episodes per week of vigorous-intensity physical activity. Individuals reporting some physical activity during the preceding month but not at the recommended levels were classified as obtaining insufficient physical activity (8). Current smokers were defined as people who had smoked >100 cigarettes during their lifetime and were still smoking.
Physical examination included measuring height, weight, blood pressure, and a blood draw. A1C levels were classified as <6%, between 6 and 7%, between 7 and 8%, and ≥8% to correspond to recent American Diabetes Association treatment guidelines (1). Individuals were considered to have hypertension if they had a measured blood pressure of ≥140/90 mmHg or reported being told by their physician that they had high blood pressure and were on an antihypertensive medication. BMI was calculated as the weight in kilograms divided by the squared height in meters (9). The National Heart, Lung and Blood Institute's definition for the cutoff points between normal weight (BMI 18.5–24.9 kg/m2), overweight (BMI 25–29.9 kg/m2), and obese (BMI ≥30 kg/m2) were used (9). All lipid and lipoprotein analyses were conducted on venous blood serum samples. HDL level was available on all adults and was used to measure cholesterol control. Demographic information including age (in years), sex, race/ethnicity (white, African American, Hispanic, or other), education (less than high school, high school, or more than high school), and annual income were obtained at baseline during the interview portion of NHANES III.
Statistical analysis
Each observation was weighted to account for the unequal probability of selection that resulted from the survey cluster design, nonresponse, and oversampling of certain populations. Sampling weights were used to calculate population estimates, and sampling strata and clustering within primary sampling units were accounted for to estimate variances and test for significant differences. All analyses thus took into account the complex survey design and weighted sampling probabilities and were performed using Stata Statistical Software (Release 11; Stata Corporation, College Station, TX). We calculated hazard ratios (HRs) using Cox proportional hazards regression with attained age at the time of censoring as the time scale (10,11). We divided data into three age strata (age 17–50, 51–65, and >65 years). Analyses were stratified by age-group, such that stratified estimates (equal coefficients across strata but with a baseline hazard unique to each stratum) were then obtained. Participants were censored at the end of the follow-up period if they were still alive. Cox proportional hazard models were used to estimate the combined effect of risk factors associated with mortality, controlling for sociodemographic factors (annual income, race/ethnicity, sex, and education).
We calculated the PAR% for mortality among individuals with diabetes of known risk factors, including glycemic control, hypertension, hyperlipidemia, smoking, and physical inactivity. PAR% was calculated as prevalence among decedents × [(HR − 1)/HR] × 100%, where prevalence refers to the prevalence of the risk factor among individuals who died, and the hazard ratio (HR) is a multivariable-adjusted hazard ratio for mortality (12). We calculated 95% CIs for PAR% using previously described methods (13). PAR% can be interpreted as the percentage by which mortality rates could be lowered in all individuals with diabetes if the given exposure was abolished, assuming that the observed association is causal.
Overall, 1,507 adults with diabetes were eligible for mortality follow-up. For NHANES III participants with diabetes, 865 were assumed to be alive by virtue of not being identified in the National Death Index, and 642 were deceased during the follow-up period. Overall, 53% of deaths were from cardiovascular disease, 17% were from cancer, and 29% were from other causes of death. The population characteristics of the sample and cumulative mortality by exposure group are displayed on Table 1. Older individuals and individuals with less education were more likely to have died in the follow-up period. Table 2 displays the results of the Cox proportional hazard model for death and the PAR% for each risk factor. Among adults with diabetes, the HRs for all-cause mortality were significant for individuals who had an A1C ≥8% (HR 1.65, 95% CI 1.11–2.45) or reported no regular physical activity (1.58, 1.24–2.02) or current tobacco use (1.77, 1.15–2.73). The population-attributable risk was 15.3% for A1C values ≥8%, 16.4% for no regular physical activity, and 7.5% for current tobacco use.
Table 1
Population characteristics and cumulative mortality of individuals with diabetes in NHANES III
Table 2
Proportional hazards analysis results from all-cause mortality: NHANES III mortality follow-up
In this nationally representative sample of individuals with diabetes, we found three statistically significant risk factors for all-cause mortality. We estimate that mortality rates could be decreased by 15.3, 16.4, and 7.5%, respectively, if the following risk factors were eliminated: having an A1C of ≥8%, physical inactivity, or current smoking. There is evidence from several observational studies that higher levels of physical activity confer protection against premature coronary disease and early mortality. In a study using the NHANES mortality data, Rask et al. (5) also showed a similar effect of smoking and physical inactivity on mortality. This study did not focus specifically on individuals with diabetes or present PAR% (5). In a study of women with diabetes, the age-adjusted relative risk for cardiovascular disease was 0.54 (95% CI 0.39–0.76) for women who performed ≥4 h of moderate or vigorous exercise per week (14). Wei et al. (15) reported that the relative risk of mortality was 1.7 (95% CI 1.2–2.3) in 1,263 men with diabetes with low levels of physical activity followed on average for 12 years. In a national study, U.S. adults with diabetes who walked at least 2 h/week had a 39% lower all-cause mortality (16). Previous studies have shown that cigarette smoking is strongly associated with an increased risk of coronary heart disease among individuals with diabetes, even more so than individuals without diabetes, and quitting smoking decreases this excess risk substantially (17).
Our results are consistent with other studies that have identified a protective effect of moderate glucose control (3,18). Saydah et al. (3) used NHANES III data to examine A1C level and subsequent mortality among adults in the U.S. These authors reported that among individuals with diabetes, having an A1C of ≥8% was associated with higher all-cause mortality risk (HR 1.68, 95% CI 1.03–2.74), compared with adults with an A1C of <6%, which is similar to our findings. However, this study did not examine the effect of physical activity or present population-attributable risks (3).
Despite clinical trial data to support blood pressure and lipid control among individuals with diabetes (19,20), these factors were not significant in our study, although the hazard ratios were in the expected direction. These nonstatistically significant findings may be a result of insufficient power in the current study. In addition, since NHANES III data were collected, the complexity of care for individuals with diabetes has increased, including the use of antihypertensive and antilipemic agents (21). Our results are consistent with older HNANES data from 1982 to 1984 on risk factors for mortality from all causes and from coronary heart disease among individuals with diabetes (4). This study reported that age, male sex, severe overweight (defined as a BMI ≥31.1 kg/m2 for men and ≥32.3 kg/m2 for women), and nonleisure time physical inactivity were associated with coronary heart disease mortality among persons with diabetes. Neither cholesterol nor hypertension were found to be associated with coronary heart disease mortality in this population of individuals with diabetes (4).
Limitations of our study include the potential biases introduced by the self-report of health conditions and level of physical activity. Because we do not know the actual duration of physical activity and do not have information on nonleisure physical activity, total activity levels may be underestimated. In addition, estimates of PAR% from observational data make an implicit assumption of causality: that abolishing exposure would, in fact, reduce risk to the level observed among unexposed individuals. We could also over- or underestimate PAR% because of the assumption that the prevalence of other risk factors would remain the same if one of them were changed (22). In practice, a particular intervention aimed at one risk factor could alter population levels of other risk factors, either favorably or unfavorably. PAR% also assumes that the other risk factors not included in our regression model are uncorrelated with the target exposure; in fact, risk factors may cluster within people. These limitations are balanced by the strengths of our study. Unlike measures of association such as relative risk, PAR% depends on both the strength of the association between the exposure and disease and the prevalence of the exposure in the population (6). In contrast, the relative risk offers a measure of the strength of association between the risk (e.g., degree of hyperglycemia) and mortality for the average individual. PAR% can assess the potential benefit to be gained for a population rather than for individual-level interventions.
In conclusion, we found significant associations between physical inactivity, smoking and poor glycemic control, and all-cause mortality among individuals with diabetes. Previous reports have demonstrated poor adherence to physical activity recommendations by individuals with diabetes (23) and low rates of physical activity and smoking cessation counseling by physicians (21). Clinicians and health systems may consider prioritizing their care to include avoidance of tobacco and increasing physical activity levels among all patients with diabetes (24). Population-based programs (e.g., quality improvement efforts) for individuals with diabetes may consider prioritizing these areas, especially given limited improvements in mortality rates among individuals with diabetes over the past 2 decades (25).
This study was supported by the Epidemiologic Research and Information Center, VA Puget Sound Health Care System, Seattle, Washington.
No potential conflicts of interest relevant to this article were reported.
K.M.N. conceived this study, acquired the data for analysis, and performed the statistical analysis. K.M.N., E.J.B., and T.K. developed the analysis plan, contributed to the discussion, and reviewed and wrote the manuscript.
• The views expressed in this article are those of the author and do not necessarily represent the views of the Department of Veterans Affairs.
• Received May 12, 2010.
• Accepted August 16, 2010.
| Table of Contents
This Article
1. Diabetes Care vol. 33 no. 11 2360-2364
1. All Versions of this Article:
1. dc10-0846v1
2. 33/11/2360 most recent
|
__label__pos
| 0.852954 |
Rice's theorem
From Wikipedia, the free encyclopedia
(Redirected from Rice's Theorem)
Jump to: navigation, search
In computability theory, Rice's theorem states that, for any non-trivial property of partial functions, there is no general and effective method to decide whether an algorithm computes a partial function with that property. Here, a property of partial functions is called trivial if it holds for all partial computable functions or for none, and an effective decision method is called general if it decides correctly for every algorithm. The theorem is named after Henry Gordon Rice, and is also known as the Rice–Myhill–Shapiro theorem after Rice, John Myhill, and Norman Shapiro.
Another way of stating Rice's theorem that is more useful in computability theory follows.
Let S be a set of languages that is nontrivial, meaning
1. there exists a Turing machine that recognizes a language in S
2. there exists a Turing machine that recognizes a language not in S
Then, it is undecidable to determine whether the language recognized by an arbitrary Turing machine lies in S.
In practice, this means that there is no machine that can always decide whether the language of a given Turing machine has a particular nontrivial property. Special cases include the undecidability of whether a Turing machine accepts a particular string, whether a Turing machine recognizes a particular recognizable language, and whether the language recognized by a Turing machine could be recognized by a nontrivial simpler machine, such as a finite automaton.
It is important to note that Rice's theorem does not say anything about those properties of machines or programs that are not also properties of functions and languages. For example, whether a machine runs for more than 100 steps on some input is a decidable property, even though it is non-trivial. Implementing exactly the same language, two different machines might require a different number of steps to recognize the same input. Similarly, whether a machine has more than 5 states is a decidable property of the machine, as the number of states can simply be counted. Where a property is of the kind that either of the two machines may or may not have it, while still implementing exactly the same language, the property is of the machines and not of the language, and Rice's Theorem does not apply.
Using Rogers' characterization of acceptable programming systems, Rice's Theorem may essentially be generalized from Turing machines to most computer programming languages: there exists no automatic method that decides with generality non-trivial questions on the behavior of computer programs.
As an example, consider the following variant of the halting problem. Let P be the following property of partial functions F of one argument: P(F) means that F is defined for the argument '1'. It is obviously non-trivial, since there are partial functions that are defined at 1, and others that are undefined at 1. The 1-halting problem is the problem of deciding of any algorithm whether it defines a function with this property, i.e., whether the algorithm halts on input 1. By Rice's theorem, the 1-halting problem is undecidable. Similarly the question of whether a Turing machine T terminates on an initially empty tape (rather than with an initial word w given as second argument in addition to a description of T, as in the full halting problem) is still undecidable.
Formal statement[edit]
Let \phi\colon \mathbb{N} \to \mathbf{P}^{(1)} be an admissible numbering of the computable functions; a map from the natural numbers to the class \mathbf{P}^{(1)} of unary (partial) computable functions. Denote by \phi_e:=\phi(e) the eth (partial) computable function.
We identify each property that a computable function may have with the subset of \mathbf{P}^{(1)} consisting of the functions with that property. Thus given a set F \subseteq \mathbf{P}^{(1)}, a computable function \phi_e has property F if and only if \phi_e \in F. For each property F \subseteq \mathbf{P}^{(1)} there is an associated decision problem D_F of determining, given e, whether \phi_e \in F.
Rice's theorem states that the decision problem D_F is decidable (also called recursive or computable) if and only if F = \emptyset or F = \mathbf{P}^{(1)}.
According to Rice's theorem, if there is at least one computable function in a particular class C of computable functions and another computable function not in C then the problem of deciding whether a particular program computes a function in C is undecidable. For example, Rice's theorem shows that each of the following sets of computable functions is undecidable:
• The class of computable functions that return 0 for every input, and its complement.
• The class of computable functions that return 0 for at least one input, and its complement.
• The class of computable functions that are constant, and its complement.
• The class of indices for computable functions that are total [1]
• The class of indices for recursively enumerable sets that are cofinite
• The class of indices for recursively enumerable sets that are recursive
Proof by Kleene's recursion theorem[edit]
A corollary to Kleene's recursion theorem states that for every Gödel numbering \phi\colon \mathbb{N} \to \mathbf{P}^{(1)} of the computable functions and every computable function Q(x,y), there is an index e such that \phi_e(y) returns Q(e,y). (In the following, we will say that f(x) "returns" g(x) if either f(x)=g(x), or both f(x) and g(x) are undefined.) Intuitively, \phi_e is a quine, a function that returns its own source code (Gödel number), except that rather than returning it directly, \phi_e passes its Gödel number to Q and returns the result.
Let F be a set of computable functions such that \emptyset \neq F \neq \mathbf{P}^{(1)}. Then there are computable functions f \in F and g \notin F. Suppose that the set of indices x such that \phi_x \in F is decidable; then, there exists a function Q(x,y) that returns g(y) if \phi_x \in F, and f(y) otherwise. By the corollary to the recursion theorem, there is an index e such that \phi_e(y) returns Q(e,y). But then, if \phi_e \in F, then \phi_e is the same function as g, and therefore \phi_e \notin F; and if \phi_e \notin F, then \phi_e is f, and therefore \phi_e \in F. In both cases, we have a contradiction.
Proof by reduction from the halting problem[edit]
Proof sketch[edit]
Suppose, for concreteness, that we have an algorithm for examining a program p and determining infallibly whether p is an implementation of the squaring function, which takes an integer d and returns d2. The proof works just as well if we have an algorithm for deciding any other nontrivial property of programs, and will be given in general below.
The claim is that we can convert our algorithm for identifying squaring programs into one which identifies functions that halt. We will describe an algorithm which takes inputs a and i and determines whether program a halts when given input i.
The algorithm for deciding this is conceptually simple: it constructs (the description of) a new program t taking an argument n which (1) first executes program a on input i (both a and i being hard-coded into the definition of t), and (2) then returns the square of n. If a(i) runs forever, then t will never get to step (2), regardless of n. Then clearly, t is a function for computing squares if and only if step (1) terminates. Since we've assumed that we can infallibly identify programs for computing squares, we can determine whether t, which depends on a and i, is such a program, and that for every a and i; thus we have obtained a program that decides whether program a halts on input i. Note that our halting-decision algorithm never executes t, but only passes its description to the squaring-identification program, which by assumption always terminates; since the construction of the description of t can also be done in a way that always terminates, the halting-decision cannot fail to halt either.
halts (a,i) {
define t(n) {
return n×n
return is_a_squaring_function(t)
This method doesn't depend specifically on being able to recognize functions that compute squares; as long as some program can do what we're trying to recognize, we can add a call to a to obtain our t. We could have had a method for recognizing programs for computing square roots, or programs for computing the monthly payroll, or programs that halt when given the input "Abraxas", or programs that commit array bounds errors; in each case, we would be able to solve the halting problem similarly.
Formal proof[edit]
If we have an algorithm which decides a non-trivial property, we can construct a Turing machine which decides the halting problem.
For the formal proof, algorithms are presumed to define partial functions over strings and are themselves represented by strings. The partial function computed by the algorithm represented by a string a is denoted Fa. This proof proceeds by reductio ad absurdum: we assume that there is a non-trivial property that is decided by an algorithm, and then show that it follows that we can decide the halting problem, which is not possible, and therefore a contradiction.
Let us now assume that P(a) is an algorithm that decides some non-trivial property of Fa. Without loss of generality we may assume that P(no-halt) = "no", with no-halt being the representation of an algorithm that never halts. If this is not true, then this will hold for the negation of the property. Since P decides a non-trivial property, it follows that there is a string b that represents an algorithm and P(b) = "yes". We can then define an algorithm H(a, i) as follows:
1. construct a string t that represents an algorithm T(j) such that
• T first simulates the computation of Fa(i)
• then T simulates the computation of Fb(j) and returns its result.
2. return P(t).
We can now show that H decides the halting problem:
• Assume that the algorithm represented by a halts on input i. In this case Ft = Fb and, because P(b) = "yes" and the output of P(x) depends only on Fx, it follows that P(t) = "yes" and, therefore H(a, i) = "yes".
• Assume that the algorithm represented by a does not halt on input i. In this case Ft = Fno-halt, i.e., the partial function that is never defined. Since P(no-halt) = "no" and the output of P(x) depends only on Fx, it follows that P(t) = "no" and, therefore H(a, i) = "no".
Since the halting problem is known to be undecidable, this is a contradiction and the assumption that there is an algorithm P(a) that decides a non-trivial property for the function represented by a must be false.
Rice's theorem and index sets[edit]
Rice's theorem can be succinctly stated in terms of index sets:
Let \mathcal{C} be a class of partial recursive functions with index set C. Then C is recursive if and only if C = \emptyset or C = \mathbb{N}.
where \mathbb{N} is the set of natural numbers, including zero.
An analogue of Rice's theorem for recursive sets[edit]
One can regard Rice's theorem as asserting the impossibility of effectively deciding for any recursively enumerable set whether it has a certain nontrivial property.[2] In this section, we give an analogue of Rice's theorem for recursive sets, instead of recursively enumerable sets.[3] Roughly speaking, the analogue says that if one can effectively determine for any recursive set whether it has a certain property, then finitely many integers determine whether a recursive set has the property. This result is analogous to the original Rice's theorem because both assert that a property is "decidable" only if one can determine whether a set has that property by examining for at most finitely many i (for no i, for the original theorem), if i belongs to the set.
Let W be a class (called a simple game and thought of as a property) of recursive sets. If S is a recursive set, then for some e, computable function \phi_e is the characteristic function of S. We call e a characteristic index for S. (There are infinitely many such e.) Let's say the class W is computable if there is an algorithm (computable function) that decides for any nonnegative integer e (not necessarily a characteristic index),
• if e is a characteristic index for a recursive set belonging to W, then the algorithm gives "yes";
• if e is a characteristic index for a recursive set not belonging to W, then the algorithm gives "no".
A set S\subseteq \mathbb{N} extends a string \tau of 0's and 1's if for any k< |\tau| (the length of \tau), the kth element of \tau is 1 if k\in S; is 0 otherwise. For example, S=\{1,3,4,7, \ldots \} extends string 01011001. A string \tau is winning determining if any recursive set extending \tau belongs to W. A string \tau is losing determining if no recursive set extending \tau belongs to W.
We can now state the following analogue of Rice's theorem (Kreisel, Lacombe, and Shoenfield, 1959,[4] Kumabe and Mihara, 2008[5]):
A class W of recursive sets is computable if and only if there are a recursively enumerable set T_0 of losing determining strings and a recursively enumerable set T_1 of winning determining strings such that any recursive set extends a string in T_0\cup T_1.
This result has been applied to foundational problems in computational social choice (more broadly, algorithmic game theory). For instance, Kumabe and Mihara (2008,[5] 2008[6]) apply this result to an investigation of the Nakamura numbers for simple games in cooperative game theory and social choice theory.
See also[edit]
1. ^ Soare, Robert I. Recursively Enumerable Sets and Degrees. p. 21.
2. ^ A set S\subseteq \mathbb{N} is recursively enumerable if S=W_e:=\textrm{dom}\, \phi_e:=\{x: \phi_e(x)\downarrow \} for some e, where W_e is the domain \textrm{dom}\, \phi_e (the set of inputs x such that \phi_e(x) is defined) of \phi_e. The result for recursively enumerable sets can be obtained from that for (partial) computable functions by considering the class \{\phi_e: \textrm{dom}\, \phi_e \in C\}, where C is a class of recursively enumerable sets.
3. ^ A recursively enumerable set S\subseteq \mathbb{N} is recursive if its complement is recursively enumerable. Equivalently, S is recursive if its characteristic function is computable.
4. ^ Kreisel, G.; Lacombe, D.; Shoenfield, J. R. (1959). "Partial recursive functionals and effective operations". In Heyting, A. Constructivity in Mathematics. Studies in Logic and the Foundations of Mathematics. Amsterdam: North-Holland. pp. 290–297.
5. ^ a b Kumabe, M.; Mihara, H. R. (2008). "Computability of simple games: A characterization and application to the core". Journal of Mathematical Economics 44: 348. doi:10.1016/j.jmateco.2007.05.012. edit
6. ^ Kumabe, M.; Mihara, H. R. (2008). "The Nakamura numbers for computable simple games". Social Choice and Welfare 31 (4): 621. doi:10.1007/s00355-008-0300-5. edit
External links[edit]
|
__label__pos
| 0.880064 |
jpy12031-sup-0001-AppendixS1.docxWord document55KAppendix S1. List of 183 diatom taxa including details of their biovolume (μm3), size-class (A: <100 μm3; B: 100–250 μm3; C: 250–1,000 μm3; D: >1,000 μm3), and ecological affiliations. These are divided in to two columns: Functional groups (Epipelic [Eplc]; Epipsammic [Epsmc]; Undefined [Other]) and Life-forms (Adnate [Adnt]; Stalked [Stal]; Small motile epipsammic [SMsamm], Small motile epipelic [SMpelon], Large motile [LMpelon]; Tychoplanktonic [Tych]; Planktonic [Plank]; Epiphytic [Epiph]; Undefined [Other]). Taxa used in nonparametric multivariate analysis are signaled with an x. Biometric measurements, geometric shapes used for biovolume calculation, and micrographs of each taxon is provided by Ribeiro (2010), downloadable in (
jpy12031-sup-0002-AppendixS2.pdfapplication/PDF1029KAppendix S2. Dendrogram for hierarchical clustering of diatom abundance samples of the studied stations using group-average linking of Bray–Curtis similarities. Data previously standardized and root-root transformed. Gray dotted indicate nonsignificant clustering (SIMPROF test; significance level: < 1%).
|
__label__pos
| 0.804239 |
Stand behind yer sheriff Circulation: 188,472,088 Issue: 535 | 9th day of Running, Y14
Rainbow Fountain Troubles
by nikipinder
Search the Neopian Times
Great stories!
Misadventures of a Neopian Times Reporter V
I had to do an article and I had to do it now.
by kristykimmy
*blink, blink*
Meepit doesn't blink. Ever. But are you sure?
by rex041085
Kacheek Tails
Why you shouldn't tease the Snowager.
by gelert_123
Time: A Gelert's Tale - Part Three
"Eat up, guys. We're going to need our strength if we're going to go up against the Shadow Draik."
by nova_pulser
|
__label__pos
| 0.736081 |
In an effort to avoid producer confusion and inconvenience, the USDA Farm Service Agency has clarified rules that determine when producers participating in the FSA Farm Loan Program are considered delinquent and how that status affects their ability to participate in various FSA programs.
Prompting the Agency's action was the concern that the term “delinquent” has multiple definitions as it applied to various FSA programs and could inadvertently create problems for producers.Plains Cotton Growers has worked closely with FSA personnel in Texas and Washington and with National Cotton Council to obtain the clarification.
The FSA notice, LP-1979, specifies that producers are not considered delinquent until 90 days after the due date on a loan made to FSA through its loan program.
|
__label__pos
| 0.720258 |
Quicksilver Essay Topics & Writing Assignments
Buy the Quicksilver Lesson Plans
Essay Topic 1
Tess was a minor character in this book who made a huge impact on the plot. How did she accomplish this, and how would the plot have been altered had she not been included in the story line?
Essay Topic 2
Training and education are topics of discussion in this book. Where do these topics appear in this book, and what effects do they have on the characters involved in those scenes?
Essay Topic 3
Friendship is a central theme of this book. What are the main friendships, and how did their inclusion in this book affect the outcome of the plot?
Essay Topic 4
Stephenson presents the idea that there are two sides to every man. Choose three of the characters from the book and write about their dual natures and how this duality affected the characters around them.
Essay Topic 5
Protection is a strong theme in this...
(read more Essay Topics)
This section contains 692 words
(approx. 3 pages at 300 words per page)
Buy the Quicksilver Lesson Plans
|
__label__pos
| 0.999307 |
Saving For College
With rising college tuition and a slow economy, many parents are trying to figure out how they'll pay for college. And if your student wants to go to a private school, it may cost you more than double what you'd pay for a local state college. We talked to ParentMap's Julie Ogata about turning pennies into dollars to pay for college.
Boys + Girls = Math Gender Gap
Is your daughter a math whiz? How about your son? A new study by the University of Washington takes a close look at the math gender gap. UW Researchers found that kids started expressing the stereotype that math is for boys, not girls as early as second grade. The study was done to find out why so few women choose math-based careers.
Read or Share this story:
|
__label__pos
| 0.82964 |
Crastinal tense
From Wikipedia, the free encyclopedia
Jump to: navigation, search
A crastinal tense (abbreviated CRAS) is a future tense applied to a following or subsequent day. (Crāstinum is Latin for morrow.)
Crastinal tense refers to an event which will occur tomorrow (in an absolute tense system) or the following day (in a relative tense system). A post-crastinal tense indicates some time after tomorrow or the following day.
Crastinal future (as opposed to a more generic near future) is uncommon, but is found in several Bantu and related languages, such as Hunde and Bamum.
|
__label__pos
| 0.999765 |
Quotes: A Boy and His X
"I bought a car. Turned out to be an alien robot. Who knew?"
Sam Witwicky, Transformers
Michael Binkley: A boy and his penguin!
Opus: A penguin and his boy!
Tom Binkley: Two dips and a dad.
"Cool, my own Terminator!"
John Connor, Terminator 2: Judgment Day
|
__label__pos
| 0.748051 |
Galileo Quiz | Four Week Quiz A
Buy the Galileo Lesson Plans
Name: _________________________ Period: ___________________
This quiz consists of 5 multiple choice and 5 short answer questions through Scenes III - IV.
Multiple Choice Questions
1. What does Sarti offer to the Grand Duke as his Court is leaving at the end of Scene IV?
(a) A milk.
(b) A biscuit.
(c) An apple.
(d) A flower.
2. According to Galileo, if one believes in humanity, they believe in what?
(a) "Something bigger than himself."
(b) "That mankind is the center of all."
(c) "God."
(d) "Common sense."
3. What is the name of the bailiff?
(a) Signor Franz.
(b) Signor Cambione.
(c) Signor Parente.
(d) Signor Franco.
4. What do the Duke and his Court attend after leaving Galileo's home?
(a) A trial.
(b) An inquisition.
(c) A knighting.
(d) The Court Ball.
5. How old is Galileo when he was arguing with the Curator about salary?
(a) 27 years old.
(b) 35 years old.
(c) 76 years old.
(d) 46 years old.
Short Answer Questions
1. What year is it in the opening of the play?
2. What does Galileo say he bought instead of paying the milkman?
3. How many fixed stars does Galileo tell Sagredo were in the constellation of Orion?
4. What does Galileo tell the Curator would "save millions of scudi in navigation"?
5. After finding out about Ludovico's interests, how much does Galileo say he is going to charge him for private tuition?
(see the answer key)
This section contains 213 words
(approx. 1 page at 300 words per page)
Buy the Galileo Lesson Plans
Follow Us on Facebook
|
__label__pos
| 0.90366 |
Get 6 months of complimentary access to
Ask Tom: What is the Continental Divide?
Dear Tom, What is the Continental Divide? — Jay E., Phoenix Dear Jay, A continental divide is an imaginary line that follows a continuous mountain ridge that divides a watershed into two drainage basins. In North America, the Continental Divide separates drainage between the Pacific and Atlantic oceans and extends from northwest Alaska through the Canadian and U.S. Rockies then south through Mexico's Sierra Madres into Central America. It then continues into South America along the peaks of the Andes. There are also other small divides in North America that divert water between the Atlantic and Hudson Bay and the Arctic Ocean and the Atlantic Ocean and the Gulf of Mexico....
|
__label__pos
| 0.998274 |
High Waves In Milford
Aryn Wadadli and his daughter Sabine, 6, of Milford donned ski goggles to protect their eyes while feeling the impact of Hurricane Sandy as she slammed into Connecticut Monday. John Woike, Hartford Courant
|
__label__pos
| 0.999914 |
Antony Unwin R objects, two interfaces! (R objects to interfaces?) ***************************************************** Interfaces may refer to interfaces between programmes or to the Human Computer Interface. R has a command-line interface and it is thought-provoking to think of what benefits an additional properly interactive Graphical User Interface would bring to R. A fully-fledged GUI might not be possible, too many fundamental changes would be needed to the current system. R, if given a choice, would doubtless object to having superficial interfaces added.
|
__label__pos
| 0.761181 |
Moons of Jupiter Reference Libraries
Page 1 of about 15 Articles
2004-10-19 04:45:44
Galileo Probe
2004-10-19 04:45:44
Galileo Probe -- The Galileo probe was an unmanned probe sent by NASA to study the planet Jupiter and its moons. Named after the astronomer Galileo Galilei, it was launched on October 18 1989 by the Space Shuttle Atlantis and arrived at Jupiter on December 7 1995. Galileo's launch had been significantly delayed by the hiatus in Space Shuttle launches that occurred after the Space Shuttle...
Retrograde Motion
2004-10-19 04:45:44
Retrograde Motion -- Retrograde motion is the orbital motion of a body in a direction opposite that which is normal to spatial bodies within a given system. 'Retrograde' derives from the Latin words retro, backwards, and gradus, step. In the Solar system, mostly everything rotates in the same sense: all major planets orbit the Sun counterclockwise as seen from the pole star (Polaris). Most...
Planetary Ring
2004-10-19 04:45:42
Planetary Ring -- A planetary ring is a ring of dust and other small particles orbiting around a planet in a flat disc-shaped region. The most spectacular and famous planetary rings are those around Saturn, but all four of the solar system's gas giant planets (Jupiter, Saturn, Uranus, Neptune) possess ring systems of their own. The origin of planetary rings is not precisely known, but...
Jupiters Moon Himalia
2004-10-19 04:45:40
Jupiter's Moon Himalia -- Himalia is Jupiter's tenth moon. Himalia is 110 miles (170 km) in diameter and orbits 7,000,000 miles (11,480,000 km) from Jupiter. Himalia has a mass of 9.5 x 1018kg. It orbits Jupiter in 250.5662 (Earth) days. Very little is known about Himalia. Himalia was discovered by C. Perrine in 1904. Orbital eccentricity is 0.15798. Orbital inclination is...
Jupiters Moon Leda
2004-10-19 04:45:40
Jupiter's Moon Leda -- Leda ("LEE duh") is the ninth of Jupiter's known satellites and the smallest. Discovered by C. Kowal Date of discovery 1974 Mass (kg) 5.68e+15 Mass (Earth = 1) 9.5047e-10 Equatorial radius (km) 8 Equatorial radius (Earth = 1) 1.2543e-03 Mean density (gm/cm^3) 2.7 Mean distance from Jupiter (km) 11,094,000 Rotational period (days) ? Orbital period (days)...
Jupiters Moon Callisto
2004-10-19 04:45:40
Jupiter's Moon Callisto -- With a diameter of over 4,800 km (2,985 miles), Callisto is the third largest satellite in the solar system and is almost the size of Mercury. Callisto is the outermost of the Galilean satellites, and orbits beyonds Jupiter's main radiation belts. It has the lowest density of the Galilean satellites (1.86 grams/cubic centimeter). Its interior is probably similar...
Jupiters Moon Ganymede
2004-10-19 04:45:40
Jupiter's Moon Ganymede -- Ganymede is the largest satellite in the solar system with a diameter of 5,268 km (3270 miles). It is larger than Mercury and Pluto, and three-quarters the size of Mars. If Ganymede orbited the Sun instead of orbiting Jupiter, it would easily be classified as a planet. If Ganymede orbited the Sun instead of Jupiter it could be classified as a planet. Like...
Jupiters Moon Europa
2004-10-19 04:45:40
Jupiter's Moon Europa -- Europa is a puzzle. The sixth largest moon in our Solar System, Europa confounds and intrigues scientists. Few bodies in the Solar System have attracted as much scientific attention as this moon of Jupiter because of its possible subsurface ocean of water. The more we learn about this icy moon, the more questions we have. Because the nature of science is to ask...
Jupiters Moon Io
2004-10-19 04:45:40
Jupiter's Moon Io -- Looking like a giant pizza covered with melted cheese and splotches of tomato and ripe olives, Io is the most volcanically active body in the solar system. Volcanic plumes rise 300 kilometers (190 miles) above the surface, with material spewing out at nearly half the required escape velocity. A bit larger than Earth's moon, Io is the third largest of Jupiter's moons,...
Word of the Day
|
__label__pos
| 0.976626 |
Main Page
Jump to: navigation, search
Welcome to Vikidia!
1,538 articles in English and 34 active users
What is Vikidia?
Anybody, whatever age, is welcome to contribute to Vikidia. Interested? Help creating essential articles and more!
Image of the week
Mushrooms are the fruiting parts of some fungi. Many of them bear lamellae (also known as gills), which they use to disperse their spores.
Star article
Belle Starr rode sidesaddle to her criminal ventures wearing a black velvet riding habit and a plumed hat.
Belle Starr was a 19th-century American outlaw. She became friendly with outlaws Jesse James and the Younger Brothers. They were criminals. She was arrested for horse theft, and sent to prison. After release, she was ambushed and killed near her home.
|
__label__pos
| 0.751858 |
public marks
PUBLIC MARKS from parmentierf with tags c & windows
Safe C String Library v1.0.3 (January 30, 2005)
gosu - Google Code
by 1 other
Home -
parmentierf's TAGS related to tag c
algorithme + api + bot + chatterbot + collaboratif + dev + ector + firefox + français + free + gnu/gpl + google + gratuit + ia + image + irc + java + jeu + lemmatisation + levenshtein + licence + linux + logiciel + mac + microsoft + moteur de recherche + mysql + perl + photo + php + python + rpc + ruby + search + sql + standard + string matching + tcl + test + text/processing + unix + wiki + windows + xml +
|
__label__pos
| 0.931113 |
Print | Rate this content
HP Deskjet 6540 Series Printers - Fixing Blinking Lights
The printer lights indicate the printer status. These lights can be on, off, or flashing, depending on the status of the printer. The sections below describe the most common combinations of flashing lights, what they mean, and how to fix the issue.
NOTE: The light patterns described in this document are also described as blinking or flashing lights. Flash means the same as blink in this document. If the printer lights flash or blink, this describes the same symptom.
Buttons and lights on the front panel
Deskjet 6540
1. Power button and light
2. Print Cancel button
3. Resume button and light
4. Print Cartridge Status lights
5. Print Quality Selector button and lights
No lights are on
When the printer is first turned on, there is a period of approximately five seconds where there are no lights lit on the front panel. This is due to the printer initializing memory and preparing to function. If the Power light does not come on after approximately five seconds, the printer might need to be serviced.
Power light is flashing
If the Power light is flashing, the printer is preparing to print. The light stops flashing when the printer has received all data.
Resume light is flashing
If the Resume light is flashing, check the following conditions:
• The printer might be out of paper.
1. Place paper in the In tray.
2. Press the Resume button.
• A paper jam might exist. For instructions on how to clear a paper jam, click here .
Print Cartridge Status light is on or flashing
The HP Deskjet 6540 series printer has two print cartridge status lights. The left light corresponds to the left print cartridge, and the right light corresponds to the right print cartridge.
If printing a borderless document when the light started flashing, follow the borderless printing guidelines . Otherwise, follow these steps:
1. Open the printer cover, remove the print cartridge on the right, and then close the cover.
2. Follow one of these steps:
• If the light is flashing : Open the printer cover, replace the print cartridge, and then remove the other print cartridge. The light should quit flashing. Go to step 3.
• If the light is off: There is a problem with the print cartridge that you removed. Go to step 3.
3. Manually clean the print cartridge. If the printer is used in a dusty environment, a small amount of debris can accumulate on the print cartridge contacts. To manually clean the print cartridge, perform the following procedure:
1. Open the printer cover and wait until the print cartridge cradle moves to the right side of the printer and is idle and quiet.
2. Remove the print cartridges and place them on a piece of paper, with the copper strips facing up.
Figure 1: Print cartridge nozzles
1 - Ink nozzles
Do not leave the print cartridges outside the printer for more than 30 minutes, as this may dry out the print cartridges.
3. Moisten a cotton swab with distilled water and squeeze any excess water from the swab.
4. Wipe the copper contacts on the print cartridge with the cotton swab. Repeat this process until no ink residue or dust appears on the swab.
Figure 2: Copper contacts
1 - Copper contacts
4. After cleaning the print cartridge, reinsert the cartridge into the printer.
5. If the light(s) continue to flash, either both cartridges have problems, or the printer is the problem. Replace the print cartridge(s) or take the printer to an authorized HP repair center.
Print Cartridge Status light is flashing after installing a new print cartridge (print cartridge rejection)
If the Print Cartridge Status light begins to flash after a new print cartridge is installed, this is known as print cartridge rejection. Print cartridge rejection occurs when an unknown or incorrect print cartridge is installed in the printer. If a print job is sent while the Print Cartridge Status light is on, a message stating that the print cartridge has been rejected and must be removed or replaced will open.
Follow the steps below to resolve this issue:
1. Verify that the right print cartridge type and color is installed in the proper place in the print cartridge cradle.
2. Try reinserting the print cartridge into the printer.
3. Remove the most recently installed print cartridge.
4. If the Print Cartridge Status light quits blinking, the print cartridge is defective
5. Replace the print cartridge.
6. If the problem persists, repeat steps 3 and 4 with the other print cartridge.
Print quality icon lights are on or flashing
Use the Print Quality Selector button to set print quality and print speed from the front of the printer. The Print Quality Selector button is located on the lower portion of the printer control panel.
The Print Quality Selector icons light up or flash to indicate the selected print quality.
Status of the icons
One icon is lit.
The illuminated icon is the selected print quality.
One icon is lit and another flashes.
The illuminated icon is the selected print quality for the current print job. The flashing icon is the selected print quality for the next print job.
One icon flashes.
Either FastDraft or Maximum dpi has been selected as the print quality from the printer software.
Power and Resume lights are flashing in unison
If the Power and Resume lights on the printer begin blinking in unison, a carriage stall has occurred. Contact HP at the bottom of this document to find out how to contact a support representative. A support representative will review the steps described above and may service the product.
The printer might need to be restarted.
1. Press the Power button to turn off the printer, and then press the Power button to restart the printer. Proceed to step 2 if the lights continue to flash.
2. Press the Power button to turn off the printer.
3. Disconnect the printer power cord from the electrical outlet.
4. Reconnect the printer power cord to the electrical outlet.
5. Press the Power button to turn on the printer.
If the lights continue to blink, return the printer for repair.
Power-cord light
The light on the power cord illuminates when electricity is flowing through the cord. If the light is off, then the cord is not receiving power.
Provide feedback
|
__label__pos
| 0.978193 |
Take the 2-minute tour ×
I've a little Twitter app that displays a user's tweets if they enter them in a specific format from within my app.
However, even if the Twitter user has protected his/her tweets, those tweets are still being displayed in my app. Is there a flag or some parameter that I could check about the user to see if s/he has protected their tweets, and not display those tweets?
share|improve this question
1 Answer 1
up vote 1 down vote accepted
Returned tweet has a "protected" variable, you can use that one.
json: { "user": { "protected": false } }
xml: <user><protected>false</protected><user>
You can check the examples at the bottom of the page if my answer isn't that clear:
share|improve this answer
Your Answer
|
__label__pos
| 0.930226 |
Parenting your parent.. The good, the bad, the unforgettable
Two years, a void in my life so large the Grand Canyon couldn't fill it, and sits heavy on me even now. Five years, the amount of time I had to watch as our roles reversed and age sat down upon her graying head and the mother became the child. It wasn't always pretty with flowers and roses, memory making and laughter. There were times it was anything but that which we think about in this generation referred to as 'sandwich'. ...more
|
__label__pos
| 0.95889 |
From FamilySearch Wiki
The database did not find the text of a page that it should have found, named "Genealogy of the Guillermo Family in Guatemala" (Diff: 457052, 457054).
|
__label__pos
| 0.972749 |
Print 22 comment(s) - last by delphinus100.. on Jul 30 at 9:06 PM
IRVE-3 (Source:
IRVE-3 embarked on a 20-minute test flight, where it was launched by a three-stage Black Brant rocket at 7:01 a.m. on Monday
NASA recently had a successful test flight for its Inflatable Reentry Vehicle Experiment (IRVE-3) heat shield.
IRVE-3 is a 680-pound cone-shaped, inflatable heat shield that is covered with heat-resistant materials. The idea behind IRVE-3 is to protect space capsules as they enter or return an atmosphere at hypersonic speeds. It is the successor to IRVE-2, which was an inflatable heat shield of the same size, but carried a lighter payload and was subjected to lower re-entry heat than IRVE-3.
IRVE-3 embarked on a 20-minute test flight, where it was launched by a three-stage Black Brant rocket at 7:01 a.m. on Monday. It took off from NASA's Wallops Flight Facility on Wallops Island, Virginia.
Six minutes into the flight, the heat shield and its large payload detached from the rocket's nose cone (kind of like a mushroom) over 200 miles above the Atlantic Ocean. Nitrogen was pumped into the IRVE-3 using an inflation system. This caused IRVE-3 to inflate about 10-feet in diameter.
From there, the heat shield dropped through Earth's atmosphere and managed to hold its shape through the heat and force of re-entry. NASA researchers were able to collect information like pressure and temperature data via tools onboard, which will help with future improvements of the heat shields.
IRVE-3 ended its flight by splashing down into the Atlantic Ocean near North Carolina. It will be retrieved by a U.S. Navy Stiletto boat.
Source: NASA
Comments Threshold
RE: Inflation
By JediJeb on 7/25/2012 10:17:36 PM , Rating: 2
That makes a lot of sense, thanks.
Another question, could you plan a trajectory that would bring you to Mars so that when you arrive you would essentially be pacing the planet at its own relative speed. Say maybe you overshoot the distance slightly ahead of Mars, then as you are pulled back by the Sun's gravity you cross back over Mars' orbit with little relative velocity as it arrives at the same point in space? I guess what I am thinking is a elliptical solar orbit where the apogee point is at Mars' orbit with orbital velocity matching that of Mars and arriving simultaneously at the same point in space as Mars?
This would allow you to arrive at Mars with little delta V relative to Mars which would require no braking thrust, as long as you worked out the proper slingshot trajectory around the Sun.
RE: Inflation
By m51 on 7/25/2012 11:01:47 PM , Rating: 2
yes, but the spacecraft is still going to accelerate toward Mars because of the gravity well and you can't fix that part of the velocity with orbital paths. At the minimum you'll still have to deal with the low mars orbit orbital velocity, which is still pretty high.
RE: Inflation
By Jaybus on 7/26/2012 8:43:48 AM , Rating: 2
It would also require a longer Earth-Mars flight path. "Just falling" in a single direction toward the center of Mars is not really possible, but even if it were, the acceleration is 3.71 m/s^2. Starting from zero Mars relative velocity from say 100 km up, in 60 seconds it would fall just 6.7 km and already be approaching supersonic speed at 222 m/s.
RE: Inflation
By JediJeb on 7/26/2012 10:32:37 AM , Rating: 2
Of course, thinner atmosphere means higher terminal velocity.
If it was the opposite and returning to Earth under the same scenario would the craft still reach hypersonic speeds in the upper atmosphere from acceleration due to gravity, or max out at somewhere around normal supersonic speeds due to air resistance, which would be more manageable in terms of heat generation and parachute braking ability?
RE: Inflation
By m51 on 7/26/2012 10:47:47 AM , Rating: 2
Just falling towards Mars starting from zero relative velocity you are going to reach essentially Mars escape velocity, which is 5 km/sec. or 18000 km/hr. You can reduce that with multiple aerobraking passes through the upper atmosphere, but your entry speed can't be lower than the orbital velocity at say 100km altitude which is about 12000 km/hr.
RE: Inflation
By JediJeb on 7/26/2012 11:44:15 PM , Rating: 2
Another crazy twist. What if you can place your craft into Mars' orbital path ahead of the planet and slow it slightly so that you are moving away from Mars but its gravity is slowing you down as it gets closer. Essentially Mars collides with your craft by catching up to it, could that be done without reaching such high relative speeds in the freefall?
|
__label__pos
| 0.746988 |
What issues should Obama address during his speech before Congress?
Barack Obama is set to deliver his first address before Congress as president tonight. With the stockmarket tanking and speculation about the nationalisation of banks, the president's speech will likely centre on the economy. What other topics should Obama address?
Update: Responses from Twitter users
Obama needs to stay focused on the economy, the wars, healthcare, and energy. That's his first term in a nutshell.
Thank you for contributing.
|
__label__pos
| 0.961655 |
by (@unclegrambo)
7. “A Dream,” Common featuring Will.I.Am
This 2006 song from the Freedom Writers soundtrack samples the most famous King speech of all, “I Have A Dream.” It’s a song that’s rife with struggle and pain but, most importantly, also hope.
8. “Happy Birthday,” Stevie Wonder
Back in 1981, Martin Luther King Jr. Day was not yet a national holiday. It seems almost shocking in retrospect, but back then, there was a significant amount of political pushback to dedicating a national holiday to an African-American. Stevie Wonder used his musical abilities to push his line of thought forward, essentially making an argument that no one could argue with. “I just never understood / How a man who died for good / Could not have a day that would / Be set aside for his recognition,” Wonder sang and, just two years later, President Reagan would ultimately find himself agreeing with this statement.
related stories
you might like
Powered By Zergnet
|
__label__pos
| 0.804363 |
If there's any retailer that knows how uncomfortable the murky middle can be, it's Wal-Mart, which over the past 30 years has plowed scores of its smaller competitors there, frequently contributing to their ultimate demise. But after a year of economic hardship for Wal-Mart shoppers — and changes in consumer behaviors learned during the recession — it's not without some irony to find the world's largest retailer in some danger of slipping into the middle itself these days. Paradoxically, ...
REGISTER TO VIEW THIS ARTICLE - Register for a Free Account
WhyRegisterfor FREE?
Already registered? here.
|
__label__pos
| 0.917728 |
Tolkien Gateway
(Difference between revisions)
Line 36: Line 36:
[[Category:Quenya names]]
[[Category:Quenya names]]
[[Category:Quenya nouns]]
Revision as of 19:58, 12 February 2010
File:Unknown Artist - Ingwe.jpg
Biographical Information
TitlesHigh King of the Elves; King of the Vanyar
Birth1050 YOTT, Cuiviénen
DeathDid not die
Physical Description
GalleryImages of Ingwë
Ingwë (Q, pron. [ˈiŋʷɡʷe]) is the leader of the first Kindred of Elves called the Vanyar and the uncle of Indis, wife of Finwë.
His name was loaned to the Vanyar, who also called themselves Ingwer.
He was reckoned as High King of all the Elves and his proper title was Ingwë Ingweron, "Chief of the chieftains". His tower in Tirion was called Mindon Eldaliéva.
His name means "First One" or "chief" in Quenya < root ING.
Other Versions of the Legendarium
In early versions of Tolkien's legendarium (see The History of Middle-earth) Ingwë's name was Inwë.
In that early writing Inwë (or Ing) was instead the name of a mortal man, the "King of Lúthien" (also spelled "Leithian" or "Luthany"), who was driven east over the sea by Ossë and became ruler of the ancestors of the Angles, Saxons, Jutes, and Frisians. Eventually the Angles, Saxon, and Jutes returned to Lúthien, now long renamed as Britain.
Tolkien was here adapting traditions about a Germanic ancestral figure named Yngvi (also spelled "Ing", "Ingio", and "Ingui"). He is seen as an eponymous ancestor of the Ingaevones, a people mentioned by Tacitus in his Germania as one of the three divisions of the Germanic tribes. In Scandinavian mythology, Yngvi was the mythological ancestor of the Swedish House of Ynglings and a name for the god Freyr. Like Ingwë, Freyr was the lord of the Elves in Álfheim.
|
__label__pos
| 0.722416 |
Sports DaySports Day Cowboys Cowboys Photos
Cowboys Photos
Rick Gosselin's NFL rankings: How many 3-3 teams are higher than the Cowboys?
15. San Diego. Opposing quarterbacks are completing a league-high 68.4 percent of their passes against the Chargers.
|
__label__pos
| 0.783239 |
Eu:CROPIS – Growing tomatoes in space
Tomatoes for lunar and Mars habitats
A symbiotic community of bacteria, tomatoes and single-celled algae, synthetic urine and a satellite that simulates the gravity of the Moon or Mars by rotating around its axis – these elements make up the German Aerospace Center (Deutsches Zentrum für Luft und- Raumfahrt; DLR) Eu:CROPIS (Euglena and Combined Regenerative Organic-Food Production in Space) mission. Two greenhouses are scheduled for launch into space in 2016. In them, a combined life-support system will utilise the waste product recycled urine to manufacture fertiliser and help grow tomatoes for a lunar and Mars habitat, also on long duration missions. This project will run for a year, after which the satellite will burn up in Earth's atmosphere.
The DLR scientists will use the cooperation between bacteria and the single-celled alga euglena gracilis to supply the plants with important nutrients. Synthetic urine will be added to the system at regular intervals and then passed through the lava plates in the trickle filter, integrated within the water circulation mechanism and home to countless microorganisms waiting hungrily for these nutrients. Initially, these bacteria break down ammonia into nitrite, and subsequently into nitrate to remove elements that are toxic for the plants and produce precisely the appropriate fertiliser to allow the tomato plants to bear fruit and produce new seeds. Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU) contributes its euglena to counteract the precipitous rise in ammonia levels: euglena are insensitive to ammonia and assist to its rapid breakdown. "We exploit the properties of these organisms to convert substances into nutrients that are needed to sustain other organisms," explains the mission's Scientific Director Jens Hauslage from the DLR Institute of Aerospace Medicine.
Link to the full article: "Eu:CROPIS – Growing tomatoes in space".
URL for this article
|
__label__pos
| 0.806396 |
Total Time
Prep 15 mins
Cook 30 mins
This recipe comes from the CIA in Hyde Park, NY. It is the most delicious appetizer spread! Obviously you'll need to convert the amount to suit your situation. The prep and cooking time are my estimates.
Ingredients Nutrition
1. 1. Gently heat onions in a saucepan/rondeau stirring and turning until they are translucent. Add garlic and cook.
2. 2. Add stock and beans and simmer until beans are tender.
3. 3.Drain beans, reserving the liquid.
4. 4. Puree beans in a food processor; add oil and herbs. Adjust consistency with reserved liquid if necessary.
5. 5. Cool before serving.
|
__label__pos
| 0.971208 |
Login Register
Review: BalletBoyz, Nottingham Playhouse
By NottmPostEG | Posted: April 01, 2014
Comments (0)
EACH piece of this masterful show called The Talent, from BalletBoyz, who replace tutus with muscle as they push the boundaries of contemporary dance, is introduced on film by the respective choreographer.
In the first half, Liam Scarlett’s Serpent, set to a score by Max Richter, has near-naked dancers lay on the floor. Arms then rise up, like a bevy of snakes awakening.
It was the start of a performance that showed off a more technical side, with intricate lifts and a choreographed fight scene where the dancers spar and tackle.
Some of the partnering work was reminiscent of long-term collaborator Russell Maliphant’s style.
Indeed, the second offering is Maliphant’s Fallen, which was set to a machinery inspired score by Armand Amaar. The performance had a distinctly industrial feel with the ten strong ensemble dressed in work clothes. They moved within two circles, including low spins and spirals influenced by the Brazilian martial art of Capoeira, before forming human towers and presenting their backs like shields, making stepladders of each other.
The dancers moved as a cohesive entity demonstrating raw power and energy, with every move perfectly weighted to give the dance subtlety.
Read more from Nottingham Post
max 4000 characters
|
__label__pos
| 0.834915 |
Astronomers have discovered an exoplanet that orbits its star every 704 days, the longest known year for an exoplanet, according to the Harvard-Smithsonian Center for Astrophysics.
Kepler 421-b orbits a star about 1,000 light years from Earth at the frost line the crucial distance that divides rocky planets from gaseous planets.
At this distance of 110 million miles from its star, the planet is cold enough for little ice grains to form and stick together to form gaseous planets, said David Kipping, an astronomer with the center and lead author on a paper about Kepler 421-b that will be published in The Astrophysical Journal.
Within the frost line, the ice grains boil off, and you get something like Earth, Kipping told USA TODAY Network.
In our solar system, the frost line would be between Mars and Jupiter, he said.
A planet at this special point was expected to exist, but we didn't really have this evidence before Kepler 421-b's discovery, Kipping said.
Finding a planet like Kepler 421-b is rare. NASA's Kepler telescope typically spots planets that are really, really close to their star, Kipping said. To see a planet so far away from its star requires the planet and its star to be in the telescope's field of vision, he said.
The Uranus-sized planet about four times the size of Earth will be one of the exoplanets astronomers will continue to study.
Although it's not a candidate for humans to live on, Kepler 421-b may have an Earth-like moon that is habitable, Kipping said.
Read or Share this story:
|
__label__pos
| 0.990029 |
Voice/Vision Holocaust Survivor Oral History Archive
Eugene Arden - February 21, 1984
Eugene Arden was a corporal during World War II. Arden's military government unit was attached the United States 7th Army as it travelled into Germany. The unit was responsible for closing down Nazi Labor Camps and for establishing DP Camps. The unit eventually helped liberate Landsberg, a sub-camp of Dachau. After the war, Eugene and his unit spent the post-war period in Heidelberg, Germany.
1. Introduction
2. Knowledge of Camps
3. Knowledge of Camps (continued)
4. Landsberg
5. Communicating with Inmates
6. Reaction to Inmates
7. Return to Normal Life
8. German Civilians
9. Helping Civilians
10. Trading for Supplies
11. Trouble Communicating
12. Talking with Fellow Soldiers
13. Talking to Family
14. Thoughts about the Holocaust
15. Thoughts on Germans
© Board of Regents University of Michigan-Dearborn
|
__label__pos
| 0.989612 |
Subscribe English
look up any word, like tittybong:
The term known as "Wello"(wel'low)can be used during casual conversations in order to communicate at maximum efficiency. It allows the user to say two words at the same time. In this case, by saying "Wello/Wello!", it is the same as saying "Well hello/Well hello!".
"Wello Jane how are you!?"
"Well hello Jane how are you!?"
by scotty312 November 02, 2007
39 23
wellington boots (water-tight knee-high boots). also called wellies.
In is raining cats and dogs. You had better wear your wellos while going out.
by uttam maharjan February 16, 2010
0 1
Essentially the opposite of hello. When not interested in conversation with another (usually irritating/annoying) person, a simple "Wello" should get the point accross. Wello = "I hear you, but I just don't care"
At this point you are free to walk away.
When Melissa was in another room screaming my name to get my attention...
by Adunning May 06, 2007
5 24
|
__label__pos
| 0.968591 |
Shown Here:
Introduced in House (04/23/1987)
Amends the Federal Food, Drug, and Cosmetic Act to require foods to include on their labeling the presence and amount of any palm, palm kernel, or coconut oil along with a statement that such oil(s) is a saturated fat.
|
__label__pos
| 0.926391 |
Ohio Company, the name of two companies organized for the purpose of settling the Ohio Valley.
The First Company
was founded by Virginia planters in 1747 and was granted 200,000 acres (81,000 hectares) of land west of the Allegheny Mountains. Fur traders were employed, and Christopher Gist was sent to explore the area and plan for settlement. By the Treaty of Logstown in 1752, the Iroquois and Delaware Indians granted the company permission to make settlements south of the Ohio River and to build two forts on the river. Gist founded a settlement some 35 miles (56 km) southeast of the forks of the Ohio on the Youghiogheny River, and a trade-goods storehouse was built on the Monongahela River.
The French, who held a monopoly on fur trade in the Ohio Valley, quickly built a fort on the Allegheny River, and indicated they would resist English encroachment. When in 1754 the Ohio Company and the governor of Virginia began building a fort at the forks of the Ohio, the French seized the site, an incident that marked the beginning of the French and Indian War. After the war Great Britain closed the area to settlement.
The Second Company,
known as the Ohio Company of Associates, was formed in 1786 by a group of Revolutionary War officers. Leading figures in the enterprise were two New Englanders, General Rufus Putnam and the Reverend Manasseh Cutler. The company arranged to buy from the United States a tract of 1,500,000 acres (600,000 hectares) north of the Ohio River. (The size of the purchase was later reduced due to lack of funds.) Plans for settling the company's land were a major influence in enactment of the Ordinance of 1787, which provided government for the Northwest Territory. Marietta, Ohio, founded in 1788, was the first of many settlements established by the company.
|
__label__pos
| 0.783715 |
How Many Words In Halloween
Happy Halloween Word Mining - Holiday and Seasonal Crafts.
Free online Dictionary of English Pronunciation - How to.
Amazing Bible Facts suggest a supernatural numbering of the Bible... Everything we know about how the Bible was created tells us the Bible's structure (book, chapter.
How many gods? - Atheism
What is Halloween? Where did it come from? Why and how is Halloween celebrated in France?
Halloween Worksheets | Halloween Printables | Halloween.
Click in the text where you want to add the Word Comment, or select the text that you want to comment on.
How to Add Sticky Notes in Word 2007 | eHow
Oct 23, 2009 · Signs for words commonly associated with Halloween.. Q: How do I sign this word for Halloween? A: The answer may be no farther than your browser.
How to Make Scary Halloween Decorations and Props.
Printable Spooky Halloween word jumble answer sheet - answers to the Halloween word jumble puzzle.
How Many Bones Are in Your Body? | Wonderopolis
As autumn approaches in much of the world, we know that many artists are beginning to think about Halloween, especially artists that live in the U.S. In this tutorial.
How many words can you make out of the word Halloween.
Explore This Topic: How many words can you spell from the words Happy Thanksgiving? Answer it by your self since your so smart. What other word can be .
How to Make a Roman Numeral Outline in MS Word | eHow
Happy Halloween Word Mine. DLTK's Crafts for Kids "Happy Halloween" Word Mining. Contributed by Leanne Guenther
Halloween in France. About.com French Language
Make a Dollar Store Halloween Wreath At my house, with small children, we appreciate the whimsical as much as the creepy. It's always a challenge to find Halloween.
How Many Words Puzzles. Activity Village
4. Morgan made up 20 Halloween treat bags for her classmates. Morgan dropped 2 of the treat bags walking into school. How many treat bags does Morgan have for
How many different words can you make out of the words.
Halloween Word Magnets - Practice ABC Order Drag the word magnets to form an alphabetically ordered word list. Students may choose to complete the alphabetical .
How many other words can be made out of the letters in.
How many words puzzles can be used in many ways, as a competion, as a timed challenge or just for fun, they can be used in groups, in pairs or by individuals.
Sign Language. Halloween Words in Sign Language
Halloween Word Problems - Mathwire.com
How many words can you make from Happy Easter? We can make : East,Yeah, Past, Yes, Tease, Rest, Set, Sat, Eat, Ate, Yap, Pay, Rash, rat, Pest, Tap, Pat, Peat, Hat.
How can I download free fonts for use in ms word? - Yahoo.
Try this Halloween Word Scramble Game. Fun and simple party or class game!
halloween legends and myths scary halloween tree halloween auslander halloween suncatchers jack in the box halloween costume kids
Copyright © 2011. All rights reserved.
|
__label__pos
| 0.967333 |
Showing 4 Results
Whole grain rye is closely related to barley and wheat, but has more soluble dietary fiber than both. Rye is typically used to make rye bread, including pumpernickel, a type of German sourdough bread. Rye can also be used to make crisp breads, which are popular in Scandinavian countries. Rye breads and pumpernickels are known for their characteristic dark color, sweet dark chocolate coffee flavor, and earthy aroma.
1. Whole Grain Rye
Whole Grain Rye
Starting at: $8.99
|
__label__pos
| 0.99807 |
Yet he seems like such a humble guy.
Via WaPo:
A sample of the effusive prose used to describe Kerry: “honor, conviction and a sense of civility”… “great skill…” “patience, fair-mindedness and tenacity…” And let’s not forget: “a voice of courage and conscience…” “uncommon passion and commitment…”
|
__label__pos
| 0.995417 |
Enter your Everyday Health log-in here:
E-Mail Address:
Forgot Your Password?
Gonorrhea - Cause
Gonorrhea is caused by the bacteria Neisseria gonorrhoeae.
Gonorrhea is spread during vaginal, anal, or oral sex with an infected partner. A pregnant woman may pass the infection to her newborn during delivery.
Gonorrhea can be transmitted at any time by a person who is infected with the bacteria Neisseria gonorrhoeae, whether or not symptoms are present. A person who is infected with gonorrhea is always contagious until he or she has been treated.
|
__label__pos
| 0.899802 |
Return to the Purplemath home page The Purplemath Forums
Helping students gain understanding
and self-confidence in algebra
powered by FreeFind
Find an Elkton, MD SAT Math Tutor
Subject: Zip:
38 Subjects: including SAT math, English, reading, physics
Downingtown, PA
18 Subjects: including SAT math, calculus, geometry, statistics
Newark, DE
19 Subjects: including SAT math, calculus, econometrics, logic
West Chester, PA
19 Subjects: including SAT math, chemistry, physics, calculus
Lincoln University, PA
James R. ...I take great pride in helping students realize that they can be successful at math, as my strength lies in my ability to explain both the "how" and "why" of math on terms that students can understand. I have had terrific success with SAT Prep tutoring both in a classroom setting and in one-on-on...
Dover, DE
Feedback | Error?
|
__label__pos
| 0.996281 |
Sennheiser is know the world over for it's attention to quality and the Sennheiser Momentum Headphones are yet another magnificent achievement in the earphone industry.
The Sennheiser Momentum Headphones evoke a certain retro feel that's evident from the headband and ear cup shaping. What's more, the barebones aesthetic of keeping wires exposed and focusing on more rustic electronic components gives these an air of established quality.
Coming in two different color schemes the Sennheiser Momentum Headphones feature a built-in remote for operating your smartphone without the need to remove it from your pocket. The durability of the materials used doesn't conflict with the level of comfort, which means the Sennheiser Momentum Headphones can be worn for hours on end.
|
__label__pos
| 0.918463 |
Kirkus Reviews QR Code
THE UNFORGOTTEN COAT by Frank Cottrell Boyce Kirkus Star
By Frank Cottrell Boyce (Author) , Carl Hunter (Photographer) , Clare Heney (Photographer)
Age Range: 8 - 12
Pub Date: Sept. 1st, 2011
ISBN: 978-0-7636-5729-1
Publisher: Candlewick
Treading water in her last term of elementary school, Julie figures she’s learned all there is to learn, when two Mongolian brothers in fur-lined coats (it’s summer) arrive: Chingis and Nergui.
Chingis explains to their teacher that little Nergui’s hat must stay on, like a hunting eagle’s hood. Such casual references to wonders far from their Liverpool suburb, documented in the text with eerie Polaroid snapshots, enthrall the children, especially Julie. She’s elated when Chingis appoints her the brothers’ “good guide.” Despite her title, Julie can’t discover where they live; street-smart Chingis foils her attempts to follow them, taking a different route each day. Thwarted curiosity prompts her to research Mongolia online, succumbing to the mystery and fascination of far-off places and people. As her persistence pays off, she awakens to the fear the brothers carry. Funny, sad, haunting and original, Cottrell Boyce’s story leaves important elements unexpressed. As with lace, these holes are part of the design, echoed in the unadorned photos: a path through a dark forest; wagon tracks across a field that meet the lowering sky; shadows on a yurt wall. To complete the narrative, readers must actively participate. They’ll find myriad paths to follow—immigration, demons, social networking, the mystery of cultural difference and the nature of enchantment.
A tricky, magical delight. (author’s note) (Fiction. 8-12)
|
__label__pos
| 0.815076 |
Main stories
Mark Carney Bank of England - downgrades unemployment threshold
UK growth - GDP up 0.8% in the third quarter of 2013
UK unemployment - down to 7.1% as jobs market improves. More..
The global economy - IMF revises growth forecasts..More
Royal Mail - privatisation comes a step closer with announcement of IPO. More...
UK to launch Islamic Bond ..more
Mortgage approvals - highest since Jan 2009...More
Bank of England launches 'forward guidance' policy. Read the full story.
The UK's top 40 Universities for Economics.
Public spending - £11.5bn cuts announced
UK growth - UK avoids triple-dip recession
Benefit cap - kicks in at £500 per week
UK Budget 2013 - analysis and comment
Student Guide to university Clearing
Quantitative easing - put on hold
Poverty - recession and relative poverty
Welfare reform - the end of universal benefits
Underemployment - over 3 million
CPI inflation - at 2.7%
Energy prices - set to rise
Competition policy - new regulator planned
Greek bailout - Euro problems
Top international universities for Economics
Top UK universities for Economics
OECD - latest forecasts for the OECD countries..More
Updates Get the latest updates on the UK economy, including GDP, inflation...More...
Study guides Latest resources for students from Economics Online. More...
How to answer data response questions. More...
Multiple choice tests Improve knowledge and understanding of Economics. More...
Market structures revision presentations
Economics tuition - from specialist tutors. Find out more..or REGISTER
City of London The financial crisis reveals a fundamental weakness .. More...
Recommended texts
Profit has a number of meanings in economics. At its most basic level, profit is the reward gained by risk taking entrepreneurs when the revenue earned from selling a given amount of output exceeds the total costs of producing that output. This simple statement is often expressed as the profit identity, which states that:
Total profits = total revenue (TR) – total costs (TC)
However, the concept of profit needs clarification because there is no standard definition of what counts as a cost.
Normal profit
In markets which are perfectly competitive, the profit available to a single firm in the long run is called normal profit. This exists when total revenue, TR, equals total cost, TC. Normal profit is defined as the minimum reward that is just sufficient to keep the entrepreneur supplying their enterprise. In other words, the reward is just covering opportunity cost - that is, just better than the next best alternative.
The accounting definition of profits is rather different because the calculation of profits is based on a straightforward numerical calculation of past monetary costs and revenues, and makes no reference to the concept of opportunity cost. Accounting profit occurs when revenues are greater than costs, and not equal, as in the case of normal profit.
To the economist, normal profit is a cost and is included in total costs of production.
Super-normal (economic) profit
If a firm makes more than normal profit it is called super-normal profit. Supernormal profit is also called economic profit, and abnormal profit, and is earned when total revenue is greater than the total costs. Total costs include a reward to all the factors, including normal profit. This means that, when total revenue equals total cost, the entrepreneur is earning normal profit, which is the minimum reward that keeps the entrepreneur providing their skill, and taking risks.
The level of super-normal profits available to a firm is largely determined by the level of competition in a market – the more competition the less chance there is to earn super-normal profits.
Super-normal profit can be derived in three general cases:
1. By firms in perfectly competitive markets in the short run, before new entrants have eroded their profits down to a normal level.
2. By firms in less than competitive markets, like firms operating under monopolistic competition and competitive oligopolies, by innovating or reducing costs, and earning head start profits. These will eventually be eroded away, providing further incentive to innovate and become more cost efficient.
3. By firms in highly uncompetitive markets, like collusive oligopolies and monopolies, who can erect barriers to entry protect themselves from competition in the long run and earn persistent above normal profits.
Marginal profits
Marginal profit is the additional profit from selling one extra unit. A profit per unit will be achieved when marginal revenue (MR) is greater than marginal cost (MC). At profit maximisation, marginal profit is zero because MC = MR.
Profit maximisation
Firms achieve maximum profits when marginal revenue (MR) is equal to marginal cost (MC), that is when the cost of producing one more unit of a good or service is exactly equal to the revenue derived from selling one extra unit.
If marginal profit is greater than zero
If the firm stops short of producing Q, (at Q1 below) then MR is greater than MC, and marginal profit is still greater than zero. Hence, the firm should increase output.
If marginal profit is less than zero
If the firm produces greater than Q, (at Q2 below) MC is greater than MR and marginal profit is negative. Hence, the firm should reduce its output. Only when MR = MC, at Q, will total profits be maximised.
Showing profit maximisation using 'totals'
Profit maximisation occurs at Q, given that the gap between total revenue (TR) and total costs (TC) is at its greatest. At this point, the gradient of the cost and revenue curves will be identical.
Not all firms are profit maximisers. Profit maximisation is the most likely objective for a firm whose owners are involved in day-to-day decision making, such as with small and medium sized enterprises (SMEs).
The number of firms and profits
The fewer the number of firms in a market, the less competitive it is likely to be.
The effect of fewer firms:
Assuming that firms are selling substitute products, the effect of fewer firms is less competition, which will:
1. Reduce elasticity of demand.
2. Create steeper AR and MR curves.
3. Increase the level of supernormal profits for each firm.
Profits and competition
Less competition in a given market is likely to lead to higher prices and the possibility of higher super-normal profits.
Distributed and retained profits
When profits are generated, they can be retained by the firm, or distributed to its owners. A government may provide tax incentives for those firms that retain their profits, and use them for investment. Distributed profits are generally subject to corporation tax.
|
__label__pos
| 0.774046 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.