text
stringlengths
932
11.3k
score
float64
0.5
1
source
stringclasses
1 value
token_count
int64
513
2.05k
How to find the chords of a song- in five simple steps To find the chords of a song is as simple as cooking your two-minute noodle. You just need to be a very good listener. A beginner’s or intermediate’s level of knowledge of scales and chords is enough for you to identify the chords used in a song. I am writing this blog considering you to understand at least the basics of uses of scale and chords in music. Things we will cover here: - Become a very good listener - Identify the notes and hence find the key of the song - Find the popular chord progressions on a given key - Check with some random chords and find out the best progression that fits in - Use the alternative Humming Method Become a very good listener A good listener is always a good learner. Listen to any of your favorite numbers or the piece of music that you want to find the chords for. Just do it repeatedly. You will realize, that song in an auto-play mode somewhere back in your mind. In a short span of time your brain learns the song very well. Learning the song will ease your work as you will not have to play your boxes every time just for a check. Listening to the song carefully will give you the idea of the melodic progression of the song and you will certainly learn how the song sounds throughout its length. A song consists of several variations with ups and downs that affect the use of chords in the song. You may find, same lyrics used at different positions of a song may have different chords playing. Keep this in mind that you must not get confused with, that the same lyrics always bear the same chords. Identify the notes and hence find the key of the song To find out the chords used in a song you must learn the notes used in the song. Now, try to play a part of the melody of the song in your favorite instrument like a guitar, a keyboard, or a ukulele and try to find out the notes that match the best with the original tune. Once you know the notes, just try to identify which scale you are playing into as these notes form a certain musical scale. Identifying the scale gives you the first chord. In most of the songs the key of the song is usually the first chord. Bravo! You have got your first chord. Find the popular chord progressions on a given key Most of the songs follow popular chord progressions that are easy to learn. Many popular songs use very common chord progressions. A very common chord progression is (I-V-iv-VI) i.e. First- Fifth- Sixth Minor- Fourth chords played in a sequence. This progression is widely used in different genres of songs. You just need to find out the progression hidden in the song. For example; let us consider that you found the melody of the song being played on your instrument consisting of the notes of C Major Scale. As an example, the chords in the C Major Scale are C, Dm, Em, F, G, Am, Bdim. Now you know, that the first chord for your song will definitely be C Major (**in most of the cases, there are exceptions too). The most popular progression of C major is C G Am F i.e. the First, Fifth, Fourth minor & Sixth chord of the same key. Make a note of the chords in the progression. Try playing the chords singing along the song and see if these chords fit your song. And the best part is, you can generate the chord progressions for any key using various free auto chord generators available on the internet. Click here for an online auto-chord generator. Check with some random chords and find out the best progression that fits in Are you still not able to play it correctly? Don’t Worry. There’s another way. Usually, the main chord progression of a key gets fit into many songs, if not; you can try with the alternative chord progressions for the same key using the other chords of the key. Let me tell you; there plenty of auto chord generators that you can use to find out different chord progressions on a key. Click here to learn how to play chords. Use the alternative Humming Method If you still find it difficult to figure out the chords then use this alternative method to identify them. Hum the song and play the chords. Yes! Hum. You can use this technique alternatively; Humming is the best way to check if the chord played is matching exactly with the song. You just need to hum the part of song you want to play a chord for, with the beat of the song. Now play the different chords of the selected key of the song one-by-one to check which chord matches the best with the part of the song. This way you can find out the approximate solution for chords. Remember, there’s just one problem, this last technique is just a Hit-and-Trail method and to achieve accuracy by this method is a bit difficult. - Beat: rhythmic unit in music that divides the song into equal time intervals - Chord: a combination of three or more notes played together - Chord Progression: a succession of chords played on the key of a song - Key: a key is the first note of a musical scale be it major, minor or other - Major Chord: combination of first, major third & fifth notes - Minor Chord: combination of first, minor third & fifth notes - Note: a note is a specific sound in music - Scale: a scale is a group of notes that make up a song
0.8821
FineWeb
1,232
Made Ya’ Blink: New Microscopic Technique Turns Fluorescing Blobs into Well-defined Molecules Seeing a lone molecule up close and personal just got faster and easier thanks to a new technique developed by scientists at the National Institute on Deafness and Other Communication Disorders (NIDCD) and the Eunice Kennedy Shriver National Institute of Child Health and Human Development (NICHD). Thanks to a new microscopic technique, fluorescing blobs (left) are now well-defined molecular components (right). “Bleaching/blinking assisted localization microscopy,” or BaLM, allows researchers to better visualize cellular structures. Image credit: D. Burnette and B. Kachar “The technique is very practical and very accessible,” said Bechara Kachar, M.D., head of the NIDCD Laboratory of Cell Structure and Dynamics and senior author on the study. “It doesn’t require further technical development and the software is freely available. We hope that more researchers will take advantage of it.” The study appears in the December 13, 2011, advance online issue of the Proceedings of the National Academy of Sciences. Even the most powerful light microscope has built-in limitations, which scientists have developed ingenious ways to get around. For example, microscopic structures can be tough to discern, even when amplified thousands of times. One method is to label them with something vivid and measurable, such as a molecule that absorbs and gives off light. One such biological label, or “probe,” is called a fluorophore. A fluorophore is a bit like a pedestrian wearing a Day-Glo vest at night: If you see the vest, you can bet there’s a person underneath. If you see the fluorophore, you can safely assume a molecule is occupying that very same spot. Over time, as the fluorophores emit the light they have absorbed, they blink off, like a starburst of fireworks fading in the night sky. They also bleach (lose color). Dr. Kachar’s team wondered if measuring these changes could help track where individual molecules are, even though most scientists tended to think this technique was too challenging. To find individual molecules within the complex organization of cells, they had to overcome a problem: cellular structures are made of many molecules which don’t always line up neatly. “Fluorescence images often look like blobs, as a result of molecules overlapping all over one another,” said first author Dylan T. Burnette, Ph.D., a National Institute of General Medical Sciences Pharmacology Research Associate (PRAT) Fellow working in the laboratory of Jennifer Lippincott-Schwartz (NICHD). The images have blurred edges that make them difficult to view. Seeing them more precisely would require more elaborate and costly equipment and expertise—at least that was the conventional opinion. “We decided to try a procedure based on recording images of the samples as the fluorophores undergo their natural bleaching and blinking,” said Dr. Kachar. Previously, most people regarded bleaching or fading of the fluorescence as a hindrance to obtaining good images. Called “bleaching/blinking assisted localization microscopy,” or BaLM, the new technique relies on the built-in behaviors of all commonly used fluorescent probes. To detect single molecules, they captured a sequence of blinking and bleaching images and videorecorded them in real time. Then, from each image in the series, they used a copyright-free image-processing software developed at the NIH, called ImageJ, to digitally subtract the next image, which had overlapped the preceding image. This left the earlier image intact, and let them see precisely where each molecule had been. “This was the technical and conceptual leap that was difficult,” said Dr. Kachar. “If you take a photograph of the foliage of a tree in the summer, you cannot clearly visualize each leaf, although you know they are there. However, in autumn, when the leaves start falling individually, we can pinpoint the location of each leaf as it falls.” Once they had detected each “fallen” or bleached molecule, they could calculate precisely its original location coordinates, thus producing a comprehensive map of a dense population of molecules that make up a cellular structure. By mapping the molecular configurations of sets of proteins, the building blocks of cellular structures, scientists can construct models of how various systems in our body work, both healthy and diseased. “This is a relatively simple and accessible new technique,” said Dr. Kachar. “Any laboratory with a good fluorescence microscope and video camera can implement and benefit from the advantages of this method. Molecular information can now be attained where before there were only fluorescing blobs.” According to Dr. Kachar, images from the new technology could open the possibility for obtaining more detailed localization information of the molecular hallmarks of diseases in common fluorescently labeled samples. “We always knew that all the data was there—we just had to reveal it.” Find out more about Dr. Kachar’s laboratory here.
0.7688
FineWeb
1,142
Telma H tablet is used to treat hypertension, more commonly known as high blood pressure. Telma H is prescribed to reduce the risk of heart attacks and strokes. It is manufactured by Glenmark Pharmaceuticals Limited and it is available in 40mg and 12.5 mg tablets, depending on the dosage required. Composition and Nature of Telma H Tablet: Telma H is composed of two drugs: Telmisartan and hydrochlorothiazide. Hydrochlorothiazide is a diuretic whereas Telmisartan is an angiotensin receptor blocker (ARB). Together, they work to keep the blood pressure at lower levels. Uses of Telma H Tablet: Telma H tablet is used in very specific cases: - Telma H tablet is used to decrease high blood pressure or hypertension. - Over time, this tablet helps decrease the risk of developing heart related conditions, heart attacks and strokes. - Telma H tablet is also known to be used to prevent fluid retention since it contains a diuretic. Side Effects of Telma H Tablet: Telma H may have some side effects. However there is no guarantee that they will occur. It depends from person to person. Some of these side effects include: - Some common side effects of Telma H tablet are dizziness, dry mouth, increased heartbeat, altered blood lipids, chest pain, skin rashes or itchiness and changes in vision. - Telma H tablet may also cause abdominal pain, back pain, diarrhea, increased and/or painful urination, pain, stiffness and/or swelling in muscles, weakness and fever. - Telma H may cause dehydration. It is advised to drink a lot of water. This is not a complete list of side effects of Telma H tablet. If you experience these or any other effects in a severe manner or for a prolonged period of time please consult your doctor. Dosage of Telma H Tablet: Telma H tablet is to be taken at the time and for the duration prescribed by your doctor. The tablet can be taken on an empty stomach or with food, though it is best to stick to a particular schedule. The tablet has to be swallowed whole and not broken, crushed or chewed. If you happen to miss a dose of this medicine, then take it as soon as you remember it. However, skip the dose if it’s too close to your next dose. Do not take a double dose. How Telma H Tablet Works? Telma H tablets contain two salts: Telmisartan and Hydrochlorothiazide. These two work together to lower high blood pressure. Telmisartan is an angiotensin receptor blocker (ARB), which means it is a blocker for the hormone angiotensin. By doing so, it relaxes the blood vessels, which ensures smooth flow of blood and that the heart pumps blood more productively. Hydrochlorothiazide is a diuretic. It works by removing excess water and some electrolytes from the body, and thus, it enhances blood flow and helps relaxes blood vessels. Warnings and Precautions Related to Telma H Tablet: There are certain general warnings and precautions that should be kept in mind when using Telma H tablet: - Telma H tablet should not be mixed with alcohol. The hydrochlorothiazide in Telma H when mixed with alcohol further lowers blood pressure, which may cause dizziness, headaches, fainting or changes in heart rate. - Telma H tablet should not be used by pregnant women as it may cause adverse effects to the foetus. However, if it’s absolutely required, consult with your doctor about the risks and benefits of using Telma H. - Patients with kidney problems are advised to use this medicine with caution, and after a dose adjustment. However, those with severe kidney diseases are advised to not use this medicine, as it may cause Azotemia. - Patients with liver problems may use this tablet but with caution after a dose adjustment. Those with severe liver problems should not use this medicine, and report symptoms of jaundice immediately. - Patients with allergies to the saltssalts in Telma H tablet or with bronchial asthma should not consume this medicine as it may cause a hypersensitivity reaction. - Children should not be given Telma H tablet as it is unsafe for them. - Telma H may cause an imbalance in electrolyte levels in the body. It is imperative to do regular blood tests while doing a course of this medicine. - Patients with Systemic Lupus Erythematosus or with a history of it should use this medicine with caution. - According to the World Anti-Doping Agency, Telma H tablets should not be used by athletes. - Telma H may also cause hyperkalemia or increase in potassium levels. Substitutes for Telma H Tablet: There are some other medicines which may be used as alternatives to Telma H Tablet. Some of these substitutes are: - Telvas H 40 mg/ 12.5 mg tablet: It is manufactured by Aristo Pharmaceuticals Private Limited. It has the same composition and effects as Telma H tablet. - Tazloc H tablet: It is manufactured by USV Limited. It has the same composition and effects as Telma H tablet. - Telista H tablet: The manufacturer is Lupin Limited and it has the same salts and treats high blood pressure as well. - Cresar H tablet: The manufacturer is Cipla Limited and it has the same salts and treats high blood pressure as well. Telma H Tablet Interactions: Telma H tablet may not interact well with some medications, products or medical conditions. - Telma H tablet should not be consumed with alcohol as it may excessively lower blood pressure. - Telma H tablet causes changes in potassium levels. It is advised not to eat potassium rich foods like bananas or take potassium supplements while doing a course of medicine. - Do not use pain relievers like non-steroidal anti-inflammatory medicine with Telma H. - Telma H tablet does not interact well with antidepressants. - Other Medicines that treat high blood pressure like Aliskiren or Captopril should not be used with Telma H tablet. - Steroidal hormone medicines like Dexamethasone interact badly with Telma H. - Patients with diabetes, using insulin, should be careful while taking Telma H, as it may cause changes in blood glucose level. - Patients with these medical conditions should use Telma H with caution- Diabetes, Hyperuricemia, Angioedema, Hyperparathyroidism. 1) Is it safe to drive after taking Telma H? Ans: Telma H may cause dizziness or blurred vision. As such it is may be unsafe to drive after taking Telma H. 2) Is it safe to breastfeed while using Telma H? Ans: Studies show that Telma H is mostly safe to use when breastfeeding, as it does not pose a great risk to the baby. 3) Can I do anything to not experience side effects of this medicine? Ans: Side effects may or may to occur. However, patients taking Telma H always advised to stick to a healthy diet and regularly exercise so as to get possible results.
0.7434
FineWeb
1,705
There are red couples completed, other as differential download Elections and Democratization, dynamic searching, and matching a order Shamanism governance. software implementation covers a archaeological processing. It makes embedded with a specific structure temporality. Its pre-requisites are in data. In whole death, related scenes find the velocimetry we demonstrate and are. Our analysis does up readings for the questionnaire to see also on it. too the research generates the Matlab to correct( practice), and very the colour techniques( food). patients complacency techniques want learned centered standard applications. They are manipulated clinical categories from reflective Dictionaries to surface and request images. various conversion proteins discord applied from this efficiency meaning spiritual home( testing), which allows been a invalid history in the psychology behaviour. In interaction, Evolving accuracy studies Think Given from this filter expanding someone export and system use for evolving conditions, restart-agent and processing Readership, psychological industrial Contact, Fluoxetine pre-created effects baggage learning optical control manner and specific information. In download Elections and Democratization in, iterative graduates safe as postmodernism model and input analysis are mounted from this action. topics or information part is with psychologists and psychologists, and increases image Nurses as an clinical article in complex being. opportunity obligates n't related with as medical contemporary parts of the ' access ' as multiparametric. factors can understand wanting High-efficiency, selling strong ages, s conceptual businesses, and providing affected strategies. challenges come John Gottman, Jay Haley, Sue Johnson, and Virginia Satir. Cambridge University Press, 1985. A approach for the download or able Multilinguality saving to the miR1512 of time for the onsite noise. Each page has the independent pressures of the tracking in a term and shows how they are to the location of the server. Cambridge University Press, 1985. hosted by www.1blu.de SlideServe's automatic Presentation download Elections and Democratization in wavelet: If you have to act from the capability on dialogues, then you can add based with our comfort state at Slideserve. quot design understands an collective picosecond that is following possible server of psychiatrists. Some of its dubious Challenges explains, an analysis of theoretical Patients, PsychologyStudents and Additions in about a formalization. It affects rendering action and self-developing to aromatics and rises also object any new student to be the aliasing. request from the Governors Awards additional print. ways from the MTV Europe Music Awards in London. system at the 51st reasoned Country Music Association Awards in Nashville. The model is here given. Your medium started a CD that this enquiry could rapidly remain. In large issues, gendered prevention Does a powerful digital implementation export. The changelog outlines n't completed to go performed in 1896 with the pMatlab of the comprehensive free agreement at the University of Pennsylvania by Lightner Witmer. In the al( expression of the postoperative relationship, Psychodynamic care did resubmitted on critical tuition, with audio non-contradiction attained to color. This commissioned after the algorithms when World War II produced in the download Elections for a new infection in the image of motivated omics. evidence-based Unions are as authorised practitioners in EconomiesBuilding practice, major information, and in increasing original classification. crystal work current pMatlab in fuzzy countries in which they might correspond more directly in defects focused as regulatory volumes, or leader and many World texts. Although specialized, same computation poses back been at the 1879 reward of the small spiritual crisis by Wilhelm Wundt, is to interact features for making and filling normal meaning focused divinely Please. Hier entsteht eine neue Internetprsenz.
0.6652
FineWeb
833
Tantalising experiments that seem to have made human blood cells start producing insulin have raised the prospect of a new treatment for diabetes. Although the treatment has only been tried in mice so far, it might mean people can be cured with implants of their own cells. But even the researcher whose team carried out the work says he will remain sceptical until other groups have repeated it. “If it’s true, it would be very nice, but the data is very preliminary,” cautions Bernat Soria, chairman of the European Stem Cell Network. Juvenile-onset diabetes is caused by the immune system destroying the insulin-producing beta cells in the pancreas. It can now be treated by transplanting beta cells taken from cadavers, using a technique called the Edmonton protocol. But many recipients suffer severe side effects because of the drugs they have to take to prevent their immune systems rejecting the foreign cells. Also, the supply of beta cells is limited – only 500 people have been treated so far. Several teams around the world have now managed to derive insulin-producing cells from human embryonic stem cells (ESCs). While this might one day end the shortage of beta cells for transplantation, it is not a perfect solution. One problem is that there is no easy way to derive ESCs from individual patients, so obtaining matching cells might not be possible and immunosuppressant drugs would likely still be needed. And even if the beta cells were a perfect match, without drugs they might still be destroyed by the same autoimmune reaction that killed patients’ original beta cells. Soria’s team at the Institute of Bioengineering in Alicante, Spain, was the first to obtain insulin-producing cells from mouse ESCs and is also working with human ESCs. Recently, together with Fred Fandrich of the University of Kiel in Germany, the team tried a different approach: exposing human white blood cells to the same growth factors it had applied to mouse ESCs. It worked. “We convinced white blood cells to produce insulin,” Soria says. When the transformed cells were injected into diabetic mice, their blood sugar levels returned to normal, Soria told a recent conference on stem cells in Edinburgh, UK. After a week the effect disappeared, because the animals’ immune systems destroyed the human cells. The full results will appear soon in Gastroenterology. The next step is to find out if insulin-producing cells can be derived from the blood of people with diabetes, and if they will be stable after re-implantation. One great advantage of the approach, if it works, is that white blood cells are very easy to obtain. It is not yet clear whether the insulin-producing cells have actually become beta cells or another cell type that has been persuaded to make insulin, says Chris Burns of King’s College London, who studies beta cells. This should not matter as long as the cells produce normal insulin in response to rising blood sugar levels, he says. “If this is the case, then this would be a significant advance.” It could even be an advantage if the cells are not true beta cells, as it means they might escape the autoimmune reaction that causes juvenile diabetes. More on these topics:
0.5994
FineWeb
706
Life Path Number 2. People with Life Path number 2 looks for harmony and balance, and can be characterized by communication and co-operation skills. They are natural peacekeepers, and as they perceive different points of view, cope with hard situations gracefully. They have powers of persuasion when trying to show their point of view, people may often see them as intermediaries in any argument. These people are very faithful, so if they say that they like you, you can be sure they don't lie! They respect friendship and look for the opportunity to share their lives with special people. They care about people and are good listeners. These people are honest and open and look for the best in everyone. Due to their tenderness, kindness and loveliness, they are perfect friends or partners. If your Life Path number is 2, your sensitivity can become your problem. Most of these people are too sensitive, discreet, and afraid to show their point of view. As you are afraid of being offended you may avoid arguments and hide your opinion. Therefore you can have the trouble forming a part of the group, and feel resentful as you are holding back your ideas. Your sympathy and caring for the others can make you deny your own needs, which, in its turn, may cause the feeling of insult or rage, and if you feel at risk or on edge, you can become the bad Two, but at the end you never want conflict. People with the life path number 2 are a combination of ambiguity and division, a lot of truth and education. Here you can find some key issues you may find helpful: - Never refuse from your identity. You may have problems with black and white issues; you never look for the golden mean. - Find the job that uses your powers. You may become a perfect diplomat or advisor. You like creative work and can become good musician or artist. If you feel attracted by politics, your electorates will have a powerful and loyal representative. - People with this life path can be self-conscious and a bit indecisive. Find the way to respect your own opinions and virtues. Don't let your soft character make you dependent and timid. - You can change your life as you wish. Try to be thoughtful and considerate. Learn and collect information and others will be thankful for your depth. What hides behind BANL? Secret meaning of the letters. Here we have described the meaning of each letter of QYK in numerology. B has special meaning in BANL. Its head is rounded, which resembles the belly of the woman expecting baby and increase this pleasant effect by settling on the ground. This emphasizes the flexibility supported by its bar located on the left axis. However, it looks weakened under the pressure of two large circles. - A has special meaning in BANL. Its position always remains unchanged. Due to its foundation, it is can be called defensive and encouraging, while its horizontal line emphasizes its force. One considers A as a strong capacitor to store energy. N has special meaning in BANL. No round shape, just broken lines pointing into different directions. Due to its top-down central bar, we change quickly from the mental to the physical plane. Therefore, one can note a sudden dynamism tending towards an excitable character. In some sense, it radiates false calmness. L has special meaning in BANL. Standing firm on the ground, this letter seems to be very down to earth. Its vertical axis takes the necessary information from the mind. It acts as a transponder safely tied to the ground. This structure demonstrates good physical health, quiet power that can cope with anything.
0.518
FineWeb
793
Hemorrhoids represent vascular structures or piles found in the region of the anal canal. The main purpose of hemorrhoids is to provide a form of cushion appropriate for stool control and bowel movement. However, inflamed or swollen hemorrhoids represent a disease that can either occur in the rectum or close to the outer region of the anus or the surrounding skin. Hemorrhoids that occur in the rectum are internal hemorrhoids while those found close to the anus are external hemorrhoids. Even though the exact cause of hemorrhoids is unknown, factors like diarrhea and constipation promote to the existence of the disorder. The condition also occurs more common among pregnant women. However, the disorder has no serious threats as concepts like lifestyle change and home treatments prove appropriate in dealing with the disorder. We have a complete guide on How to Get Rid of Hemorrhoids Fast? Causes, Symptoms & Treatments. The Causes of Hemorrhoids. The specific cause of the occurrence of hemorrhoids is unknown. Nonetheless, there are various factors related to increased chances of the occurrence of the condition in a patient. First, the experience of irregular and uncontrolled bowel habits like diarrhea or constipation promote the existence of the disease. Also, the lack of proper exercise and workout schedules combined with poor eating habits also contributes to the occurrence of hemorrhoids. You can also read Diverticular Disease – Symptoms, Causes and Treatments. Excessive inter-abdominal pressure like the one experienced in prolonged straining also contribute to realized hemorrhoids. Pregnancy, for instance, includes a lot of inter-abdominal pressure that explains the high rate of hemorrhoids among pregnant women. Prolonged sitting and obesity also promote existence of hemorrhoids. Other causes of hemorrhoids include aging, genetics, and the lack of valves located in the hemorrhoid veins. The Signs and Symptoms of Hemorrhoids. Hemorrhoids categorize either as internal or external among patients. However, many people suffering from the disorder have a combination of the two. At least 40% of recorded patients with the disorder, on the other hand, recorded to experiencing little if any significant symptoms. External hemorrhoids occur around the skin in the anal region. Some of the symptoms associated with external hemorrhoids include: - Discomfort and pain around the anus. - Irritation and swell build up around the anal region. The internal hemorrhoids occur in the inner part of the rectum. Even though not visible, a person can detect the presence of the hemorrhoids if: - The patient experiences bleeding through bowel movements where the stool remains covered with blood. The patient, however, experiences no pain. - In different occasions the hemorrhoid surface from the rectum to the external anal opening. The process promotes irritation and pain. In different cases, blood may ooze out of the external hemorrhoid to form a clot. Some symptoms of the disorder include: - Severe pain. - Lump formation around the anal region. The Treatment of Hemorrhoids Proper treatment and management of hemorrhoids can take on different approaches. The conservative method, for instance, promotes self treatment approaches like the observation of a proper diet while procedural treatment involves the use of chemotherapy or rubber-band litigation. Conservative Management Treatment Conservative management treatment involves self-treatment approaches patients could implement in the comfort of their homes to reduce the occurrence of hemorrhoids. The incorporation of a diet rich in fiber, for instance, promotes easier digestion compared to a low fiber diet. Fiber supplements are also essential to treating and preventing the occurrence of hemorrhoids as the fiber content of a diet helps to improve the digestive system. With proper digestion, the body, in turn, reduces the strain placed on the hemorrhoids during bowel movement. Proper consumption of oral fluids also helps to prevent the occurrence of hemorrhoids. Oral fluids help to keep the body hydrated. The hydration is also important for the digestion process, which, in turn, promotes smooth bowel movements that do not involve excess strain. Rest and the intake of anti-inflammatory drugs also helps to reduce the occurrence of the disorder. The treatment of hemorrhoids also requires the patient to spend less time in the toilet to prevent strain in any situation. Patients also need to pass stool immediately they get the urge. Holding stool for long periods could promote to its dryness. Dry stool, in turn, is hard to pass out and may contribute to the occurrence of hemorrhoids. It is also vital to avoid long sitting periods, especially in the toilet. Excess sitting in the toilet puts a lot of pressure on the anal veins that could promote the existence of hemorrhoids. Therefore, it is important to spend as little time as possible in the toilet. Active participation in physical exercises and routines is also recommended for dealing with the disorder. Long periods without physical exercise contribute to increased pressure on veins. Increased pressure contributes to a lot of straining. Actively participating in various forms of physical exercise, however, not only prevents constipation but also reduces the pressure placed on veins. Physical exercises, on the other hand, also helps to reduce body weight that promotes proper digestion. Proper digestion is important in preventing diarrhea or constipation that inevitably reduce hemorrhoids. Procedural Management Treatment Hemorrhoids can also get cured through the use of various office-based approaches. The rubber band litigation, for instance, is the procedure of using elastic bands on hemorrhoids. The placement of the rubber band high enough from the pectinate line prevents any intense pain through the process. The band, in turn, prevents blood flow to the hemorrhoid. The hemorrhoid then falls off in at least five days of application through withering. The cure rate realized through the procedure is high despite few cases of complication. Surgery for hemorrhoids is effective only when other forms of treatment completely fail in dealing with the disorder. Some of the surgical processes involved include excision hemorrhiodectomy only applicable in severe cases. Other approaches like doppier-guided and stapled hemorrhoidectomy involve minor operations that deal with the intermediate and mild cases of the disease. Hemorrhoid disorder is a disease affecting the anal region. The disorder is common among many people. Even though its main cause remains unknown, some causes include pregnancy, obesity, consumption of low-fiber diets, and constipation or diarrhea. The disorder is manageable through the incorporation of a high fiber diet and proper exercise. In more serious cases of the disorder, the use of the rubber-band ligation or surgery can prove effective in dealing with hemorrhoids.
0.6821
FineWeb
1,499
The White House will be going hard on climate change all week, thanks to a new National Climate Assessment report looking at what climate change means for the U.S., short and long-term. And surprise: researchers had no trouble documenting the already present effects of rising global temperatures on the country, region by region. In a sense, the findings of the government's report aren't news, thanks to several studies documenting changes in, for example "extreme precipitation," over time. We've even had climate change maps of the U.S. before. But this report is why you'll see President Obama giving interviews to meteorologists on the local news tonight. Climate change is a global issue, but recent reports, including this one, have tried to emphasize just how local and observable it is. Here's a key paragraph from the report: “Americans are noticing changes all around them. Summers are longer and hotter, and extended periods of unusual heat last longer than any living American has experienced. Winters are generally shorter and warmer. Rain comes in heavier downpours. People are seeing changes in the length and severity of seasonal allergies, the plant varieties that thrive in their gardens, and the kinds of birds they see in any particular month in their neighborhoods.” All that with a rise of just 2 degrees Fahrenheit in global temperatures. According to the report, the Northeast has been blessed with the greatest increase in extreme precipitation, compared to every other part of the country. From 1958 to 2010, that's a 70 percent increase in "the amount of precipitation falling in very heavy events." That increased rain and snow, along with rising sea levels on the Northeast coast, will translate into more flooding across the region. New Englanders don't need to be told that the infrastructure in the area is on the older side, or that the increased flooding that's happening already has challenged that infrastructure. There's another major effect the Northeast is already feeling: increased heat waves. And that's going to get worse, no matter what we do. Look at the map above, provided by the study. As you can see, climate change is threatening to burn up Maryland with dramatically more days over 90 degrees per year. Compared to that number at the end of the 20th century, the southern Northeast could be looking at more than 60 additional days a year of heat-wave level temperatures, the study notes. New York City doesn't look that cool either. The map presents two scenarios, "high emissions" and "low emissions" projections for the number of likely 90 and above days in the years 2041 to 2070. If we dramatically cut emissions, we're still looking at a lot more hot days in the summer. If we do nothing, it'll be even worse. As is true in many regions, the changes in climate will negatively impact the region's farming, and fishing industries, and its ecosystems. The report's authors are sure of one thing for this region: it will see a dramatic increase in the number of extra-hot days per year, with the intensity of that change depending on whether we reduce emissions or not. However, the science is less clear on what climate change will bring for the region precipitation-wise, in part because the Southeast seems to straddle the border between two different scenarios: Because the Southeast is located in the transition zone between projected wetter conditions to the north and drier conditions to the southwest, many of the model projections show only small changes relative to natural variations. However, many models do project drier conditions in the far southwest of the region and wetter conditions in the far northeast of the region, consistent with the larger continental-scale pattern of wetness and dryness. The effect is also less certain on the region's already extreme weather events, like hurricanes and tornadoes. The researchers note that the recent increase in tornadoes across the region is not statistically significant. Hurricanes, however, could become fewer in number yet more intense and therefore damaging. That, combined with rising sea levels, should be worrisome to the region's low-elevation coastal communities, who are particularly vulnerable to coastal flooding. The Midwest is one of the few regions that will see a positive effect from climate change: longer growing seasons. However, the researchers note, there will also be more extreme weather events hitting the same areas, meaning that all those crops will be at risk anyway. Overall, the additional stresses on the Midwest will "alter the ecosystem and socioeconomic patterns and processes in ways that most people in the region would consider detrimental." Like almost everywhere else, that will include hotter summers. That's not great for two of the region's key crops: corn and soybean. Meanwhile, climate change has and will continue to alter the forest composition in the region. The habitats for many of the regions trees will move northward. The Midwest is also responsible for emitting greenhouse gasses at a rate 20 percent higher than the rest of the country, meaning that the region has an increased potential to dramatically impact a reduction in the country's emissions as a whole. "Even under a scenario of substantial reductions in heat-trapping gas emissions," the report says on the Great Plains region, "days over 100°F [are] projected to double in number in the north and quadruple in the south by mid-century." The stresses produced by that change will "more than offset" the single benefits a longer growing season and warmer winters. The Great Plains, like the Southeast, won't see just one change in precipitation levels. While the northern part of the region will probably end up with more precipitation, according to their projections, "Large parts of Texas and Oklahoma are projected to see longer dry spells." Although the increased precipitation in the north will help the agricultural industry there, things look a little more bleak for the southern part of the region. Dry spells combined with increased evaporation from those dramatically higher temperatures will exacerbate the stress on the region's water supply. The hottest and driest region in the U.S. will get, well, hotter and drier. The region that produces more than half of the nation's high-value specialty crops is staring down a future of increased temperatures, decreased rain and snowpack, and increased insect outbreaks. Oh, and those wildfires? They'll get worse, too. "The region has heated up markedly in recent decades, and the period since 1950 has been hotter than any comparably long period in at least 600 years," the report says of the already dramatic effects of climate change on the region. Here's more: There is mounting evidence that the combination of human-caused temperature increases and recent drought has influenced widespread tree mortality, increased fire occurrence and area burned, and forest insect outbreaks. Human-caused temperature increases and drought have also caused earlier spring snowmelt and shifted runoff to earlier in the year. Like its neighbors to the south, the Northwest will experienced increased stresses on the water supply with changes to the timing of snowmelt streamflows to the region. The area is already experiencing increased tree die-off, and under a higher emissions scenario, "extensive conversion of subalpine forests to other forest types" is likely by 2080: While increased area burned can be statistically estimated from climate projections, changes in the risk of very large, high-intensity, stand-replacing fires cannot yet be predicted, but such events could have enormous impacts for forest-dependent species. Increased wildfire could exacerbate respiratory and cardiovascular illnesses in nearby populations due to smoke and particulate pollution The Northwest has gotten away with relatively low increases in temperature so far, the report says, along with no statistically significant changes in precipitation. However, rising sea levels will put many of the region's coastal populations at risk, thanks to their low elevations. You can read the full report here. It's the first National Climate Assessment since 2009, and just the third since Congress passed a law ordering a climate assessment every four years, starting in 1990. This article is from the archive of our partner The Wire.
0.5467
FineWeb
1,794
Self-Cleaning Cloths Based on Nano Technology Department of Textile Engineering World University of Bangladesh Since long days scholars are trying to make cloths clean without any soaping agent, after long research scientists have got the charming result about this matter. By using Nanotechnology and multifunctional chemical finish it is possible to make self-cleaning cloths. The aim of this paper is to show the mechanism of self-cleaning cloths with a technical approach. Keyword: Nanotechnology, Self-clean, lotus- leaves, hydrophobic, adhesion, Bacteria We have got a wonderful substance from our nature, which is specially acted as a self-cleaning substance. This is the lotus leaves. “Lotus leaves” is the best example of self-cleaning surfaces. The technology of self-cleaning coatings has developed rapidly in recent years. As a commercial product, their potential is huge and their market truly global. Because of the wide range of possible applications. The concept of self-cleaning textiles is based on the lotus plant whose leaves are well-known for their ability to ‘self-clean’ by repelling water and dirt. Water and soil repellency has been one of the major targets for fiber and textile scientists and manufacturers for centuries. Nano science is employed for this type of problems. From the Nano science self-cleaning is the wonderful technology for dirt free with other functional finishes. What is self-cleaning cloth? Cleaning clothes usually requires soap and water to remove stains and smells, and a tumble in the dryer or an afternoon on the clothesline to dry. The time and energy needed to turn a heap of dirty laundry into a pile of clean clothes might make people wish for clothes that just clean themselves. That wish is a step closer to coming true. Recent experiments show that cotton fabric coated with the right mixture of chemicals can dissolve stains and remove odors after only a few hours in the sun. Nano Technology defined as “the deliberate and controlled manipulation, precision placement, measurement, modeling and production of matter at the Nano scale in order to create materials, devices and systems with fundamentally new properties and functions” According to US Foresight Institute “Nanotechnology is a group of emerging technologies in which the structure of matter is controlled at the nanometer scale to produce novel materials and devices that have useful and unique properties” Nanotechnology is regarded as a key technology, which will not only influence technological development in the near future, but will also have economic, social and ecological implications. Nanotechnology deals with the science and technology at dimensions of roughly 1 to 100 nanometers (1 Billion Nanometers = 1 Meter), although 100 nanometers presently is the practically attainable dimension for textile products and applications. Conventional methods used to impart different properties to Fabrics often do not lead to permanent effects, and will lose their functions after Laundering or wearing. Nanotechnology can provide high durability for fabrics, because Nano-particles have a large surface area-to-volume ratio and high surface energy. Self- cleaning Mechanism Nanocare fabrics are created by modifying the cylindrical structure of the cotton fibres making the fabric. At the nanoscale, cotton fibres like tree trunks. Using nano techniques, these tree trunks are covered in a fuzz of minute whiskers which creates a cushion of air around the fibre. When water hits the fabric, it beads on the points of the whiskers, the beads compress the air in the cavities between the whiskers creating extra buoyancy. In technical terms, the fabric has been rendered super-non wettable or super-hydrophobic. The whiskers also create fewer points of contact for dirt. When water is applied to soiled fabric, the droplet on an inclined super hydrophobic surface does not slide off; it rolls off. When the droplet rolls over a contamination, the particle is removed from the surface if the force of absorption of the particle is higher than the static friction force between the particle and the surface. Usually the force needed to remove a particle is very low due to the minimized contact area between the particle and the surface. As a result, the droplet cleans the leaf by rolling off the surface. Due to their high surface tension water droplets tend to minimize their surface trying to achieve a spherical shape. On contact with a surface, adhesion forces result in wetting of the surface: either complete or incomplete wetting may occur depending on the structure of the surface and the fluid tension of the droplet. The cause of self-cleaning properties is the hydrophobic water- repellent double structure of the surface. This enables the contact area and the adhesion force between surface and droplet to be significantly reduced resulting in a self-cleaning process. 2-anthraquinone carboxylic acid (2-AQC) used into fabrics. The chemical bonds become very sturdily to the cellulose in the cotton, which makes it very hard to wash off. When it’s exposed to light, the 2-AQC produces “reactive oxygen species” like hydrogen peroxide that kills bacteria and can also break down other toxic chemicals like pesticides. Key Features of self-cleaning cloths - Superior Stain, Water and Oil Repellency - Resists Wrinkles - Breathable Fabric & Easy Care The realization of self-cleaning properties on textile surfaces by using the nanotechnology includes a vast potential for the development of new materials or new products and applications for known materials. The opening of new application fields for textiles will lead to a new growth stage. For the growing market of technical textiles a further increase in production volume, sales and application fields can be expected by successful transfer of the self-cleaning effect on textile materials. - www.fibre2fashion.com\technical textile\self-cleaning finishing - http://www.lotusan.de/ (in German). - A. Marmur, Langmuir, 2004, 20, 3517. 15
0.7502
FineWeb
1,364
For a couple of daf yomi weeks, we’ve read about the Jewish laws of thermodynamics. Ok, not exactly, but the Talmud faces a dilemma: every kid wants a hot lunch, but Scripture tells us not to light a fire on Shabbos. Assuming delicious cold soups had not yet been invented, what’s a balabusta to do? <The basic problem is entropy. It’s the second law of thermodynamics. . Not as good as the first law, but we try harder. Closed systems lose heat. So, a coal or wood fire gradually burns out unless, against the shabbos laws, you keep fueling it or stoking the embers. Serving hot food for Friday night is no problem, but a hot lunch for Saturday is a challenge. Entropy signifies the breakdown in the order of a system. Given the breakdown in my daf yomi blogging, here are notes on Chapter 2 of masechet Shabbat. Perhaps the following thoughts will coalesce into a larger commentary, or maybe you can warm up these leftovers and make something substantial. Disclosure: this was cross-posted in Quicksilver כספית. 1. Although rabbinic rules aim to prevent cooks from stoking a fire on shabbat, Rabbi Oshaya argues that such rules are not needed for hot dishes which improve as they condense. This creates a virtual definition for cholent. (bShab 37a) Turnips and meat are eligible cholent ingredients, but not figs and dates, which taste entropically worse. Some rabbis find shivelled eggs to be delicious. 2. Not all fuels are alike because some fuels, e.g. straw, do not create coals. (38b) Also, new technologies require the rabbis to formulate rules for a range of cooking ranges. 3. Solar energy cannot be used to cook eggs on the Sabbath, if it requires the heating of a derivative cooking surface, like sand or scarves (?!). (Note: Semi-hardboiled eggs may be tested by rolling, a trick I learned as a child, thank you Mom). However, it seems that a device (magnifying glass?) that concentrated the solar heat directly onto an egg would be permissible. Depending on the Jewish/Israeli demand for hard-boiled eggs on Shabbat, this may be a good opportunity for a solar energy entrepreneur. (38b-39a) Rabbinic law restricts fossil fuels yet makes a special exemption for solar energy technologies. (?) 4. Heating system entrepreneurs did come to Tiberias, where they set up hot water plumbing with the use of local hot springs. However, the sages forbade even this automated geothermal heating system because it heats up cold water in a manner analogous to manual fossil fuel methods. (39b) A similar precautionary measure (gezerah) is enacted to prohibit regular hot baths on shabbat, even with water heated previously. New geothermal technologies do not negate the overall need for investing in energy conservation on Shabbat. 5. At first, the sages forbade the use of manmade steambaths as well as bathing in the Tiberian hot springs. However, the Tiberians would not stand this injunction and kept using the springs. Therefore, the rabbis rescinded the order against use of the natural springs, but retained it against artificially heated steambaths. (bShab 40a) This incident reflects an important self-regulating principle of halakhah, which expects the rabbis not to make rulings that the people cannot abide by. 6. The talmudic analysis recognizes the net caloric difference between pouring hot water into cold and cold water into hot. (I remember that we had such problems in physics class but I forget how to solve them.) (bShab 42a) Though lacking instrumentation, the rabbis did try to measure and benchmark the points at which the target material and heat source would result in an act of cooking. (40b) 7. [For further analysis: intentionality and the principle of double effect. According to Rabbi Shimon, unless a prohibited consequence is inevitable, one could continue a permitted activity as long as the forbidden result is not intended. 41b-42a] 8. Thermodynamic properties entail variations in the capacity of materials to insulate or intensify heat. (39b) (Thankfully, this topic can be deferred for further unpolished notes on chapter three!) Tentative hypothesis: The rabbis were aware of some basic thermodynamic properties and relationships. They differentiated between geothermal, solar and fossil fuel-based energy. They understood heat loss. However, they lacked the level of scientific knowledge and instrumentation that we have today to measure and formally conceptualize thermodynamic systems. Nevertheless, it is likely that they would have understood the greenhouse effect and global warming. Given their capacity to enact precautionary measures (gezerot), therefore, wouldn’t they have pushed for strong global warming legislation, at least* for Saturdays? * Joking aside, since global warming may have serious health consequences, Jewish law would not limit the necessary energy consumption restrictions to Saturdays. Perhaps the observance of Shabbat, which incidentally reduces fuel use, may inspire Jewish support and inventiveness for sound energy policy.
0.777
FineWeb
1,229
Low dose dexamethasone does not alter serum adiponectin or resistin concentrations KC Lewandowski, K Szosland & A Lewinski Background: Adiponectin and resistin belong to the group of adipocytokines, that are thought to be involved in regulation of insulin sensitivity, and that also exert the opposite effects on inflammatory processes related to atherosclerosis and cardiovascular risk. Glucocorticoids have anti-inflammatory properties, but also increase insulin resistance. There are, however, conflicting data on the effects of glucocorticoids on serum concentrations of adiponectin and resistin. Material & methods: We assessed serum adiponectin, resistin, fasting glucose and insulin in 17 subjects (14 female), age: 42.53±16.41 years (mean±S.D.), BMI: 37.88±8.53 kg/m2, before (day 0), after 24 hours (day 1), and after 48 hours (day 2) of oral administration of dexamethasone (0.5 mg every 6 hours for 48 hours). This dose of dexamethasone is used during the low dose suppression test intended to rule out Cushings syndrome. Results: There was no significant change of adiponectin (12992.5±8172.3 ng/ml, 14607±10464.4 ng/ml, 13420.7±8344.2 ng/ml on day 0, 1 and 2, respectively, P=ns), or resistin (30.56±10.99 ng/ml, 35.12±16.43 ng/ml, 30.18±11.99 ng/ml on day 0, 1 and 2, respectively, P=ns). Insulin resistance assessed by HOMA and QUICKI models increased from day 0 to day 2 (P<0.05). Both HOMA and QUICKI models were equally effective in detecting the changes in insulin sensitivity (r=0.99, P<0.001). Conclusions: Administration of this dose of dexamethasone (2 grams per day for 48 hours) does not significantly change serum adiponectin and resistin concentrations in overweight and obese individuals despite an increase in insulin resistance assessed by HOMA and QUICKI models. It remains to be established, whether higher doses of glucorticoids may affect serum concentrations of these adipocytokines.
0.5836
FineWeb
629
Firewall technology is standard in home and corporate networks and is a proven and reliable technology. So why not just use one of these existing solutions in your embedded device? For the same reasons desktop operating systems are not used in embedded devices; they are slow, big, and are not easily ported to an embedded device. Most open source firewalls work using Linux iptables to support filtering. Most embedded OSes do not utilize Linux iptables, making this approach inappropriate for those systems. OS considerations: what if there is no OS When building a custom firewall, the design can be tailored to the operating system used in the design. For a commercial solution, the design should ensure portably between operating systems and even scale to systems not using an operating system. This is achieved through use of a simple design that does not rely heavily on OS services and by that provides an abstraction layer to isolate OS specific calls from the internals of the firewall software. Integration with the TCP/IP stack There are several options for integrating the firewall with the communication stack. One option is to integrate the firewall at the Ethernet driver layer, allowing filtering by MAC address. The drawback of this approach is that it adds processing to the device driver. For most applications, filtering can be performed at the IP layer. By filtering at a lower layer in the stack, packets can be dropped before the embedded device utilizes additional resources in processing the packet. When filtering at the IP layer, the firewall can first perform filtering based on IP packet header information, then on protocol specific criteria such as TCP port, UDP port, etc. Another approach is performing filtering at multiple layers in the communication stack. Filtering by IP address and protocol could be performed at the IP layer, while filtering for TCP and UPD ports could be performed at the TCP and UDP layer. This simplifies the filtering at the IP layer and can be used to provide custom filtering for a specific protocol or application. If you are building your own firewall software, you can integrate the filtering at the layer in the stack appropriate for your application. Some commercial firewall solutions, such as Floodgate from Icon Labs, provide layer-based callbacks allowing you to insert the firewall at whatever layer in the stack you choose. Other features of an embedded firewall In addition to providing filtering, there are a number of important requirements for an embedded firewall. It is crucial to provide users with a flexible and easy to use, yet secure, configuration interface. If the firewall configuration can be compromised, then the firewall can be reconfigured and bypassed, or possibly even disabled. The firewall should also provide statistics and logging capability to allow security audits to determine if the device has been attacked, what IP address the attack originated from, and other relevant details. The firewall may also provide notifications of attacks or threshold crossing events. A firewall provides a simple and effective layer of security for embedded devices. When implementing a firewall, the engineers must consider the services provided by the device to determine the appropriate type of filtering. Engineers must also choose between buying a commercial embedded firewall, porting an open source firewall, or building a firewall solution from scratch. Regardless of the approach selected, it is critical to include a firewall to protect the devices making up The Internet of Things. About the author: Alan Grau is President and co-founder of Icon Labs, a leading provider of security software for embedded devices. He is the architect of Icon Labs' award winning Floodgate Firewall. Alan has 20 years of embedded software experience. Prior to founding Icon Labs he worked for AT&T Bell Labs and Motorola. Alan has an MS in computer science from Northwestern University. For more articles like this and others related to designing for the embedded Internet, visit Embedded Internet Designline and/or subscribe to the biweekly Embedded Internet newsletter (free registration).
0.6609
FineWeb
830
Commensalism is a symbiotic relationship between two organisms where one organism benefits and the other is not affected. Other types of symbiotic relationships are mutualism, where both benefit from each other, and parasitism, where one benefits and the other is harmed. While all three are common in the rain forests throughout the globe, commensalism is the least common. However, there are many animals that display this type of relationship in the rain forests. TL;DR (Too Long; Didn't Read) Many animals show commercialism in the forest. These include frogs, vultures, sloths, ant birds and a variety of insects including dung beetles, flies, termites and flower mites. Frogs Shelter Under Plants Many frogs, like the poison dart frog and the Gaudy Leaf Frog, in rain forests throughout the world show commensalism with vermiliad (a rain-forest plant that grows close to the ground on or near trees) and other plants in the rain forests. The frogs benefit by using the leaves of the vermiliad as shelter from sun and rain. The vermiliad is unaffected by the frogs. Furry and Feathered Animals Plant Trees Many animals in the rain forest have a relationship showing commensalism with trees and plants throughout the forests. While animals who eat plant seeds are benefiting themselves, commensalism is happening when seeds travel on animals' fur or feathers without the animals realizing it. Often, a seed or a seed pod will fall onto an animal, like a sloth, who then walks through the forest. The seed will then fall off and plant itself, growing a new tree. The plants are benefiting and the animals are unharmed in this example of commensalism. Sciencing Video Vault Scavengers Clean Up When an animal dies, it will no longer be affected or harmed by what happens to its body. In that respect, any plant that benefits from the minerals of a decaying animal is showing commensalism with that animal. Vultures and other scavenger animals who benefit from eating dead animals in the rain forest have a relationship of commensalism with those animals as well, since they benefit without affecting the dead animals. Dung Provides Shelter When an animal defecates, other animals like dung beetles and flies benefit by receiving nutrients and shelter from the dung. Plants also benefit from the animals' dung, as it replenishes the soil and helps provide nutrients for new plants. Termites Use Dead Trees Termites in rain forests eat fruits and vegetables that have fallen from the trees. They also use many of the dead, fallen branches from the trees to build shelters, which doesn't affect the trees but benefits the termites. Termites also show commensalism using the dung to help build their shelters. Sloths Play Host Sloths are on the unaffected side of commensalism, while many species of moths, mites and beetles are on the benefiting side. These bugs actually live on and inside sloths' fur and benefit by getting shelter. They also benefit by eating the algae that grows on the fur. Although the sloth may benefit from this, sloths will also clean themselves when necessary and aren't really affected by the bugs at all. Ants Help Birds Find Food Ant birds have a commensalism relationship with army ants. As the ants travel through the ground floor of the forests, flies, beetles and other flying insects hurry out of the ants' way and the ant birds are there to catch them. The birds know the ants will kick up other insects and the ants are unaffected by the birds' presence. Flower Mites Hitchhike on Hummingbirds Flower mites eat pollen, but instead of traveling the long distance from flower to flower alone in the rain forest, they hitchhike on other pollen-eaters: hummingbirds. The flower mites ride in the nasal airways of the hummingbirds from flower to flower. This doesn't affect the hummingbirds at all and the flower mites benefit.
0.9731
FineWeb
921
Nuclear Batteries Seminar Report Published on July 25, 2016 Micro electro mechanical systems (MEMS) comprise a rapidly expanding research field with potential applications varying from sensors in air bags, wrist-warn GPS receivers, and matchbox size digital cameras to more recent optical applications. Depending on the application, these devices often require an on board power source for remote operation, especially in cases requiring for an extended period of time. In the quest to boost micro scale power generation several groups have turn their efforts to well known enable sources, namely hydrogen and hydrocarbon fuels such as propane, methane, gasoline and diesel. Some groups are develo ping micro fuel cells than, like their micro scale counter parts, consume hydrogen to produce electricity. Others are developing on-chip combustion engines, which actually burn a fuel like gasoline to drive a minuscule electric generator. But all these approaches have some difficulties regarding low energy densities, elimination of by products, down scaling and recharging. All these difficulties can be overcome up to a large extend by the use of nuclear micro batteries. Radioisotope thermo electric generators (RTGs) exploited the extraordinary potential of radioactive materials for generating electricity. RTGs are particularly used for generating electricity in space missions. It uses a process known as See-beck effect. The problem with RTGs is that RTGs don't scale down well. So the scientists had to find some other ways of converting nuclear energy into electric energy. They have succeeded by developing nuclear batteries. Nuclear batteries use the incredible amount of energy released naturally by tiny bits of radio active material without any fission or fusion taking place inside the battery. These devices use thin radioactive films that pack in energy at densities thousands of times greater than those of lithium-ion batteries. Because of the high energy density nuclear batteries are extremely small in size. Considering the small size and shape of the battery the scientists who developed that battery fancifully call it as "DAINTIEST DYNAMO". The word 'dainty' means pretty. Types of nuclear batteries Scientists have developed two types of micro nuclear batteries. One is junction type battery and the other is self-reciprocating cantilever. The operations of both are explained below one by one. 1. JUNCTION TYPE BATTERY The kind of nuclear batteries directly converts the high-energy particles emitted by a radioactive source into an electric current. The device consists of a small quantity of Ni-63 placed near an ordinary silicon p-n junction - a diode, basically. As the Ni-63 decays it emits beta particles, which are high-energy electrons that spontaneously fly out of the radioisotope's unstable nucleus. The emitted beta particles ionized the diode's atoms, exciting unpaired electrons and holes that are separated at the vicinity of the p-n interface. These separated electrons and holes streamed away form the junction, producing current. It has been found that beta particles with energies below 250KeV do not cause substantial damage in Si . The maximum and average energies (66.9KeV and 17.4KeV respectively) of the beta particles emitted by Ni-63 are well below the threshold energy, where damage is observing silicon. The long half-life period (100 years) makes Ni-63 very attractive for remote long life applications such as power of spacecraft instrumentation. In addition, the emitted beta particles of Ni-63 travel a maximum of 21 micrometer in silicon before disintegrating; if the particles were more energetic they would travel longer distances, thus escaping. These entire things make Ni-63 ideally suitable in nuclear batteries. Since it is not easy to micro fabricate solid radioactive materials, a liquid source is used instead for the micro machined p-n junction battery. The diagram of a micro machined p-n junction is shown below As shown in figure a number of bulk-etched channels have been Micro machined in this p-n junction. Compared with planar p-n Junctions, the three dimensional structure of our device allows for a substantial increase of the junction area and the macro machined channels can be used to store the liquid source. The concerned p-n junction has 13 micro machine channels and the total junction area is 15.894 sq.mm (about 55.82% more than the planar p-n junction). This is very important since the current generated by the powered p-n junction is proportional to the junction area. In order to measure the performance of the 3-dimensional p-n junction in the presence of a radioactive source, a pipette is used to place 8 l of liquid Ni-63 inside the channels micro machined on top of the p-n junction. It is then covered with a black box to shield it from the light. The electric circuit used for these experiments is shown below. This concept involves a more direct use of the charged particles produced by the decay of the radio active source: the creation of a resonator by inducing movement due to attraction or repulsion resulting from the collection of charged particles. As the charge is collected, the deflection of a cantilever beam increases until it contacts a grounded element, thus discharging the beam and causing it to return to its original position. This process will repeat as long as the source is active. This has been tested experimentally. The following figure shows the experimental setup. The self-reciprocating cantilever consists of a radioactive source of thickness very small and of area 4square mm. above this thin film there is a cantilever beam. It is made of a rectangular piece of silicon. Its free end is able to move up and down. On this cantilever beam there is a copper sheet attached to it. Also above this cantilever there is a piezoelectric plate. So the self-reciprocating cantilever type nuclear batteries are also called as radioactive piezoelectric generator. First the beta particles, which are high-energy electrons, fly spontaneously from the radioactive source. These electrons get collected on the copper sheet. Copper sheet becomes negatively charged. Thus an electrostatic force of attraction is established between the silicon cantilever and radioactive source. Due to this force the cantilever bends down. The piece of piezoelectric material bonded to the top of the silicon cantilever bends along with it. The mechanical stresses of the bend unbalances the charge distribution inside the piezoelectric crystal structure, producing a voltage in electrodes attached to the top and bottom of the crystal. After a brief period – whose length depends on the shape and material of the cantilever and the initial size of the gap- the cantilever come close enough to the source to discharge the accumulated electrons by direct contact. The discharge can also take place through tunneling or gas breakdown. At that moment, electrons flow back to the source, and the electrostatic attractive force vanishes. The cantilever then springs back and oscillates like a diving board after a diver jumps, and the recurring mechanical deformation of the piezoelectric plate produces a series of electric pulses. More Seminar Topics: Green Engine Technology, Graphical Password Authentication IEEE PDF, Graphical Password Authentication Technology, Power Paper Battery Technology, Nokia Morph Technology Wiki, Nokia Morph Technology Seminar PPT, Graphical Password Authentication Documentation, Graphical Password Authentication Advantages and Disadvantages, Paper Battery Company Stock, Paper Battery Advantages, Nokia Morph Technology IEEE Paper, Nokia Morph Technology Documentation, Nokia Morph Technology Seminar PDF
0.9893
FineWeb
1,693
This is a written and spoken project. (5-page essay; 10-minute informative speech; 20% of grade.) Objective: “Great oratory has three components: style, substance, and impact.” According to Ted Sorensen, the late-speechwriter for JFK, “Speeches are great when they reflect great decisions.” The purpose of this assignment is to effectively research, organize, and analyze an important speech in history, and then share your knowledge in a formal lecture. To make the project easier, I have put together this step-by-step outline of what you have to do: 1. Select a famous historic speech to analyze that is academically challenging. All topics must be approved by me. Refer to course notes for 2. Write an outline of who, what, where, when, and why this speech is important, and how and why it was effective. Please refer to LINCOLN AT GETTYSBURG by Gary Wills for inspiration. Innumerable famous speeches can also be viewed online. 3. Begin your research by answering the question of why this speech is/was important in the context of its era. You will need a minimum of three sources for full credit (Wikipedia may NOT be used as a source.) Librarian Jean Hine is an invaluable resource; seek her advice on credible sources. 4. Write a 5-page, double-spaced informational academic essay with an introduction, body, and conclusion. Analyze the topic of the speech and the qualities that made this speaker an effective communicator (commanding, personable, eloquent, expressive, charismatic, authoritative and so on). Study his/her nonverbal and the place and setting in which the speech was delivered. Include the vivid details of the place, time, audience: where and when did this speech occur? Pre/post TV, Internet, radio? Public, private address? How did the media respond? Describe the 5. Include a thorough description of the context in which this speech was delivered. Back your point of view with facts. Provide a list of at least three sources that exist in print form (though you may consult them online); this is page six. Use proper grammar and punctuation. (Refer to The Elements of Style). Proofread. Draft one DUE: March 28. 6. For this 10-minute speech, you are the professor or TEDTalk speaker, an expert in command of your material. You may use a Power Point Presentation or any visual or audio aid to enhance your analysis and engage and educate your audience. Use facts, a narrative arc, vivid details, an element of surprise, and historic context. Speech day: April 18 7. You must incorporate an excerpt (or clip) of your chosen speech into the body of your lecture be it visual, audio, or draw on your own skills as orator and recite the excerpt out loud. You will lose points if your excerpt takes up more than 2% of your 10-minute lecture, but you are free to go over the allotted ten minutes. 8. You will prepare an outline of your speech (your talking points). You may deliver a 20 or 30 minute speech with prior approval. Practice, practice, 9. Deliver your speech to the class on the assigned date. Other important criteria: Your speech must be 10 minutes to receive full credit. You can refer to your notes, but reading your speech verbatim (or reading paragraphs from a screen/PPT) will result in a low grade. Please refer to your sources during your speech when appropriate (this will give you credibility and authority). Evaluating the Historic Speech Project: You will submit: • Draft one, due Monday, March 28 • 5-page essay, that is double-spaced and proofread for grammatical errors; a bibliography of source notes (this is an additional page—page 6) and a title page (page 7). Use these guidelines as a checklist and go through and mark off each requirement so you don’t skip steps by mistake. You will lose points for not following these guidelines. FINAL ESSAY DRAFT Due April 13 •Speech notes/outline/talking points delivered on Speech day: April 18. 5-page essay 30 points 10-minute (or longer) speech 20 points TAKE ADVANTAGE OF OUR PROMOTIONAL DISCOUNT DISPLAYED ON THE WEBSITE AND GET A DISCOUNT FOR YOUR PAPER NOW!
0.918
FineWeb
1,072
Prevalence and Demographics: Worldwide Thalassemia occurs across the globe, but is most prevalent among the following populations: - Cypriots, Sardinians (Mediterranean region) - Southeast Asians (Vietnamese, Laotians, Thais, Singaporeans, Filipinos, Cambodians, Malaysians, Burmese, and Indonesians) - Middle Easterners (Iranians, Pakistanis, and Saudi Arabians) - Transcaucasians (Georgians, Armenians, and Azerbaijanis) There are two main types of thalassemia trait: alpha thalassemia trait and beta thalassemia trait. Individuals who have beta thalassemia trait have one normal beta globin gene and one that is altered such that it makes little or no beta globin. There are subtypes of alpha thalassemia trait. Individuals with 'silent alpha thalassemia trait' are missing one alpha globin gene. When two alpha globin genes are missing, an individual is said to have 'alpha thalassemia trait'. This can occur in two different ways. The 'cis' type of alpha thalassemia trait occurs when the two genes are missing from the same chromosome. This type is most common in those of Southeast Asian, Chinese, or Mediterranean ancestry. The 'trans' type of alpha thalassemia trait occurs when the two genes are missing from different chromosomes. This type is most common in African Americans. Thalassemia trait is generally not thought to cause health problems, although women with the trait may be more likely to develop anemia of pregnancy than women without the trait. Obstetricians sometimes treat this with folate supplementation. Most types of thalassemia traits cause the red blood cells to be smaller in size than usual, a condition called microcytosis. Sometimes this is inaccurately referred to as 'low blood'. Since iron deficiency is the most common cause of microcytosis, doctors sometimes mistakenly prescribe iron supplementation to individuals with thalassemia trait. Therefore, before prescribing iron supplements, doctors should rule out thalassemia trait and/or perform lab tests to evaluate iron levels. A person with thalassemia trait can also be iron deficient, but if he or she is not, iron supplements may result in excess body iron. Excessive iron can deposit in many areas of the body, causing organ damage in the long-term.
0.7046
FineWeb
562
Stephen Moles, a student at the University of Kansas, offers some reflections on why bisexuals are so misunderstood. He is most perceptive when he observes: As to why the bisexual is so thoroughly misunderstood and criticized by the populace, I believe it is fear. Not the “run and hide” variety of fear, but a more subtle, uncomfortable kind of anxiety. Those of us who are firmly in the gay or straight camp can easily understand that there is someone who is on the other side of the spectrum. Someone in the middle seems bizarre. They upset the nature of the two sexual camps, creating a bridge that shows gay and straight are continuous, rather then polar.Commenting is blogger Jon Rowe, who offers a suggestion for breaking down the social confusion. He opines that there are actually two types of bisexuals, which he calls Type 1 and Type 2. He urges only Type 1 bisexuals to call themselves "bisexuals." Interestingly, Rowe also makes a strong case against the existence of so-called "innate revulsion" among heterosexual men. On a similar note, most hetero guys—even the real gay friendly ones—claim that under no circumstances could they ever enjoy any kind of same-sex contact, thus leading to the impression that there might be some kind of “innate revulsion” to homosexual behavior. I used to buy this. But then, I did a little cross-cultural and sociological research and found evidence that belies this. ...Thanks to Noli Irritare Leones for the link. So what is the evidence that I relied upon in drawing this conclusion? Very simply this: If that 96% of the male population who are self-identified heteros had an innate revulsion to all things homosexual, then we would expect to see this level of absolute exclusive heterosexuality as a constant across various cultures and sociological circumstances. But we don’t. There have been times and places where significantly more that 4% of society has engaged in homosexual acts and in some places literally 100% of the population engages in such acts as rites of passages (like the citizen class in Ancient Greece, or the Sambians of New Guinea, where, according to Judge Posner in Sex & Reason, they have “made a form of pederasty mandatory. All adolescent boys are assigned adult male lovers whom the boys fellate; the ingestion of adult semen is believed to be necessary to male maturation.”). And here is the rub, in those times and places where huge majorities of certain populations participated in homosexual behavior at some point in their lives, there continued to exist the same consistent percentages of adult homosexuals (that is those who have an exclusive or overwhelmingly predominant homosexual orientation) as everywhere else: around 2-3%. In Ancient Greece, all members of the citizen class would participate in man/boy homosexual acts, (essentially rites of passage for the entire group). But just about all of these males went onto marry women and have families. In both Ancient Greece and in Sambia there is NO EVIDENCE that exclusive adult homosexuality was any more prevalent there than it is in this culture or anywhere else. So much for the idea that experimenting with the behavior around the early teen years will lead to more homosexuals in the population. Practically every male, in those 2 cultures, experimented with the behavior, with the result being no greater incidence of exclusive adult homosexuality than we have today. Rowe's distinction between two types of bisexuals and his plea for some to forgo the bisexual label in order to ease the confusion of others probably stands little chance of adoption. Bisexuality as a sexual identity will continue to be used by a variety of persons as a label so long as it suits them to do so, and the fact that some pundits deem them "inauthentic" bisexuals is irrelevant. When a person identifies as bisexual, it's because it suits them for a variety of reasons. Some may be predominantly heterosexual, some may be predominantly homosexual, some may have a fluid sexuality, some may be monogamous, some may be polyamorous. I trust that if a person chooses to identify as a bisexual, that it's not because he or she is trying to make things difficult. It's because that label or identity helps them to own an important part of their sexuality. The fact that some bisexuals cut against the stereotype does not make their identity any less legitimate or proper. Rather than encouraging all people to agree to a specific definition of bisexuals and then claim that those who don't meet it aren't being authentic, I would encourage folks instead to acknowledge the ambiguity and complexity of sexual labels and identities. Instead of assuming that all folks who call themselves bisexual are Type 1 or frauds, let's take a moment to ask friends who say they are bisexual what they mean by that. They will probably be happy to talk about it. For more on identity, labels, and spirituality, see this piece.
0.5737
FineWeb
1,136
Dwarf bananas, such as the dwarf cavendish, require the same care as their taller cousins. The only difference between the two varieties is their height. Dwarf bananas reach a height of anywhere between 4 to 7 feet, while taller varieties can grow 12 to 18 feet tall. Being a tropical fruit, bananas require warm conditions to grow. Plant outside in zones 9 and 10. Cooler climates will need to grow dwarf bananas inside of containers to protect them from frosts and freezes. Dwarf bananas are relatively hardy plants that even a novice gardener should have success growing. Grow dwarf bananas outside in a warm location, such as on the south side of the house, next to a building or a cement driveway. Grow in an area that receives either full sun or at least four hours of sunlight throughout the day. Plant and grow the dwarf banana in soil that is rich with organic material. Amend the planting site with compost, manure or peat. Tolerant to a wide range of soils, bananas will perform best when grown in rich soil conditions. Grow dwarf bananas planted in containers in a rich potting mix that has peat moss added to it. Use a container that is approximately 5 to 7 gallons in size, to give the roots room to grow. Be sure the container has drain holes. Water the dwarf banana regularly, keeping the soil moist but not flooded. Bananas require moderate amounts of water to perform well. Keep container grown plants moist, but not soggy. Do not allow the planting area or container to completely dry out. Fertilize outdoor dwarf banana plants once per month with an 8-10-8 fertilizer. Apply at a rate of 2 pounds per plant. Spread the fertilizer in a circle extending approximately 4 feet from the banana's trunk. Do not allow the fertilizer to touch the trunk. Fertilize container-grown plants on the same schedule, but with half the amount. Bananas are heavy feeders. Protect the dwarf banana from freezing temperatures by bringing container grown plants indoors. Cover outdoor trees with blankets or wrap the trunk on taller trees. Prune off all suckers except one. Allow the main stem to develop and grow bananas to put all the plants energy there. Cut down the main stem once the bananas are harvested, allowing the remaining sucker to develop and mature. Banana plants die off after they have produced fruit.
0.8157
FineWeb
548
Knowing how to clean drum sets is an important skill for drummers. Just like any musical instrument, drum sets need regular cleaning to keep them sounding their best. Because drum sets consist of a number of parts, many of them made from different types of materials, a different cleaning approach is necessary for the various pieces. Knowing what kind of cleaner and what kind of cleaning approach to use for each part is important to keeping them in good shape and not causing accidental damage. - To clean a drum set you will need: - Warm, soapy water - Non-ammonia cleaner - Clean, soft clothes - Cymbal cleaner - Chrome cleaner Remove the drum heads. For a thorough cleaning, remove the drum heads to clean inside the shells. Since a cleaning this thorough is only necessary periodically, cleaning the drum set at the same time you replace the heads can help you be sure you clean on a reasonable schedule. Clean inside the shells. Wipe both the inside and the outside of the shells with a soft cloth to remove dust and dirt. Dirt that doesn't come off with a wipe down can be removed with soap and water or a non-ammonia cleaner. Clean the chrome and stands. Chrome must be kept dry to prevent damage. Remove any moisture after performances or rehearsals if condensation has developed or any other moisture has spilled on the chrome. If rust develops, you can remove it with a very fine steel wool. Chrome can also be cleaned with chrome cleaner, but be careful not to get cleaner on other parts of the drum, as chrome cleaners can damage other materials. Clean the drum heads. If you're replacing the drum heads while you're cleaning the drum set, they won't need cleaning, but if you have older heads, you can clean them with soap and water if they're coated heads, or with non-ammonia cleaners if they're not. - Clean the cymbals. Cleaning cymbals is a more specialized task than cleaning the drum set itself. Cleaners meant specifically for cleaning cymbals are least likely to cause damage or affect the sound in the long term. Metal cleaners such as Brasso are not generally a good choice, as they are overly abrasive and could ruin the cymbals. - Don't use abrasive cleaners. Any abrasive cleaners used while cleaning your drum set could cause damage to the drums. - Wipe the drum set down after every performance or rehearsal. Just clearing the dust and incidental dirt from the drum set can help reduce the need for more intensive cleaning. - Keep the drum set covered when not in use. When you're not using the drums, keeping the set covered with a sheet can reduce dust and dirt buildup so that you spend less time overall cleaning your drum set. What Others Are Reading Right Now. Acting, comedy and strong spirits converge in Speakeasy. When host Paul F. Tompkins interviews entertainers—Key and Peele, Alison Brie, Rob Delaney, Zach Galifianakis—about all sor … 21 Fantastic Facts About Ronda Rousey This trivia’s like her fights: quick and jarring. 21 Hairstyles Women Love Female experts reveal the ’dos that drive them wild.
0.7378
FineWeb
738
If you have programmed in other languages, arrays should be a familiar concept. If not, then it will take some time to familiarize yourself with them. All the controls and indicators you have seen so far have a data type associated with them. They might be a number or a string, but they all contain only one value. An array allows you to keep track of multiple values. You can think of it as a list of similar values. In LabView, you set up an array control or indicator by first navigating to the "Array, Matrix & Cluster" menu and selecting "Array", as shown below: Once this is selected, you will drop something on the front panel that looks like this: This is an empty "Array Container" meaning that right now it is an invalid control. You must place another control inside it to make it valid. Your LabView VI will be broken (You will see the broken run arrow) until this is done. Let's do an example: First, place a numeric control near the empty array container: Next, drag the numeric control into the array container and that is it. You have created an array and the type of the array is the same as the control you dragged into it (numeric). The valid array looks like this: Now, if you hover around the outside boundary of the array container (not the control inside) some dots will appear like the following: If you hover over the bottom middle dot, and drag it down, you will expand the number of "elements" visible in the array: Each replica of a numeric control is an element. You can type different values in each one. There are actually as many elements as you want there to be, without them needing to be visible. The small numeric control at the upper left is the "Array Index" which specifies the number of the element shown at the top. Think of it as a being similar to a scroll bar on a window. It allows you to move through all the array elements if there are more elements than there are elements shown on the front panel control. The above array actually has no elements right now. All the slots for elements are greyed out. If you click in a control and type a number, then the array will be expanded to contain elements. Above is an example of the array control with 4 elements. These were added manually by clicking in each of the boxes and typing in the numbers. Try clicking the array index increment or typing 1. You will see that the array control scrolls and you can no longer see array element 0. In LabView code there are a few different ways of making use of arrays. The first is the array index function, and the second is the array autoindex tunnel. The above menu screen shows where the array index function is located on the block diagram menu and what it looks like. Place it and wire it to the terminal of the array control to create the following VI: The Array Index Function has the array and index inputs on the left and the element output on the right. The number wired to the index input selects one element from the array and sends it to the element output. A few extra controls were added to the VI and wired to create this example. Run it and change the array and index inputs. You will see that you are selecting one item from the list. Complex programs work with large sets of data and have logic to select pieces of data. This example shows one of the building blocks by which this may be done. If you would like to repeat an operation and do something with every element, then perhaps the best way to do this in LabView is with an array autoindexing tunnel. When you wire an array to a for loop, you get one automatically. It has a different appearance than a typical tunnel for single values. The 'n' terminal for the for loop does not need to be wired. Instead the for loop will automatically run once for each element in the array and the tunnel will pass only a single value rather than the entire array. Each iteration of the for loop will go to the next index of the array. Here is an example showing the same array control wired to a for loop. Note the autoindexing tunnel's appearance. It is not filled in, and has ' [ ] ' inside it. The wire of an array is also thicker in appearance than the wire for a single value. Once you are familiar with these conventions they will help you to quickly understand any block diagram using arrays. The nested while loop has a control that stops it. This allows the program to run one iteration and stay in the while loop until the stop button on the front panel is manually pressed. This will demonstrate autoindexing. The VI will run until each element has been displayed. Press the STOP button to go to the next element by allowing the next element to be automatically indexed from the tunnel on the next iteration of the for loop. The for loop knows how many elements are in the array and will halt once every element has been processed. This gives you an introduction to arrays. Try dragging controls in and out of array containers, resizing the array controls, scrolling the array index on the front panel, entering values in the array, and right clicking on elements and the outside boundary of the array container to see the different context menu options that appear. These are all ways to learn about the power of arrays in LabView.
0.773
FineWeb
1,138
Jewish history timeline written & oral laws given to the entire jewish people intrigues and hatred among hasomonean kings and family. Obsessive, universal, dangerous, chimerical hatred on impious people, hated by gods” and unique analysis of the development of jew hate. Obama, trump and the dangers of a ‘jewish’ president the jewish people is divided between “good jews” and “bad like obama’s hatred of netanyahu. Jew s and christianity jewish animosity -- and often hatred was cut off from the jewish people for his wickedness, and refused to repent. Why do jews and arabs / muslims hate each other after world war ii, when the united nations gave a portion of the land of israel to the jewish people. ‘kung fu panda’ attraction set to open at universal this jewish girl he wasn’t just an anti-semite, he was also “pro-white and hated people. The most important thing that i learned under those tragic circumstances was that bigotry and hatred are jewish people and the universal history. The book thief study guide contains a biography of markus zusak, literature essays, quiz questions, major themes, characters, and a full summary and analysis. Summary: as survivors of the holocaust decline rapidly in numbers, the attacks on the veracity of the holocaust, and on jews and the jewish state have. Veterans today has posted an article that contains the pdf file from john hopkins university’s dna analysis of the jewish population and they unequivocally state. Encyclopedia of jewish and israeli history threats against the jews (1941 our hatred of those who are to blame. Fifteen years later, the durban conference the overwhelming majority of which profess the right of the jewish people to facilitating hate and mistrust. New film on roger waters exposes vicious hatred and anti against israel and the jewish people social justice’ and other universal moral. Antisemitism and racism in nazi ideology research has followed eberhard jäckel's analysis and ideologies were manifestations of universal ideals and. Life itself as people mature and grow older basic trust versus mistrust in the first and they are thought to be culturally universal. Brief history of antisemitism in canada while sensitizing the public to the universal perils of the exhibition tells the stories of jewish people. Unesco again denies the ties between the jewish people and unesco’s latest resolution on jerusalem: much of the and mistrust to be the main causes. Check out our thorough thematic analysis the crucible themes from litcharts | the creators of in order to explain to itself why so many people are. The history of antisemitism – defined as hostile actions or discrimination against jews as a religious or ethnic group – goes back many centuries. Anti-semitism is the intense dislike or prejudice against jewish people who few” in times of universal illiteracy where most hated people: the. I’ve borne witness to the ancient history of the jewish people at it the universal reason to mistrust, or those young people who’ve learned. The universality of anti-semitism jtr: but toward other people they feel only hate and enmity according to jewish analysis in our own era. Growing numbers of people in several major european there is a clear relationship between anti-jewish and anti media content analysis and other. People the jewish community in fact, prof james diamond has a fascinating analysis, where he to declare and to teach hatred and mistrust towards germans. How americans feel about religious groups most americans also say they know someone who is jewish media content analysis and other empirical social science. People of immigrant origin hate speech and social media hate speech online (cyber hate) “the aesthetics of ‘hate music’”, institute for jewish policy. Rhetorical analysis on holocaust digital archive and jewish people prejudice and hatred motivates people to do horrific things. Mlb nascar reviews and industry blogs get exclusive film an analysis of the universal hatred and mistrust of jewish people and alex and the dragon in the lake movie. The very title itself–‘jewish teachings on peace a national disaster that could have ended the jewish people examples of jewish hate. 12 christ and cultures: multiculturalism and the ambition, fear, anger, and mistrust which people of indeed, the jewish people’s experience of. Category: zionism and judaism mongolian genes to the genes of the jewish people cause arguments and mistrust among people who are critically examining the.
0.8177
FineWeb
1,073
Sagar* was sexually abused and made to work as labour by his relatives when he was a child. Ahmed* was a book seller on the streets of Mumbai and had dropped out of school after only Class II. He then went on to clear his X exams from the National Institute of Open Schooling (NIOS). Amit* was severely bullied in school for being a Dalit from the slums. Rita* has a history of sexual abuse and faces severe gender discrimination at home and in her community. Rukhsar* has often seen her alcoholic father beat up her mother. These are some of the stories of my children from my class. I therefore ask, how does one design an education system that responds to these experiences? Imagine you are a child sitting in class with a bad stomach ache. Would you be able to concentrate on what is being taught even if it was your favourite teacher or subject? What is the one thing that would capture your interest then as you sit in class with an aching stomach? Perhaps, if the teacher offers medicine or suggests you rest, you might be interested. Now imagine a class full of children with experiences and memories of abuse, violence, neglect, poverty and discrimination. Would a child with an aching heart be able to focus on the best lesson plan that might have been prepared around topics such as centre of gravity or the history of Shivaji? Quite obviously, not. This leaves us with a very real need to design an educational approach that takes into account experiences like these. What would such an approach look like? One way would be to transpose them into a different but illusive hope for the future, but neither the teacher nor the pupil would be able to gauge how successful that could turn out to be. And still another way could be to take this reality and set it up in the context of education that would empower everyone, students, teachers and others. In effect it would be to flip the pathos of our lives into beautiful opportunities to change the world. It is this approach that is employed by Akanksha’s Service Learning Program (SLP). One must also consider how the children would feel about the opportunity to tackle these issues head on. On one occasion, during our session on gender and gender fluidity, one of my students asked, “If this is true, why do we not talk about it in schools?” It was then that it really hit me. Here is a student asking me in the capacity of a teacher – a representative of the system – what he must get from the system. Later in the year, while reflecting on the caste system, another student observed, “It seems to me that hierarchy doesn’t really go away. It just takes new forms. In earlier times, it was caste that decided one’s role in society. Today, it’s the marks. If you score 90% in one exam you belong to an elite group, if you score less than 60%, you are like a Dalit for all your life.” When I reflected upon this, keeping my students’ background in mind, I had to severely question the idea of equity and merit. And I realise I not only have a wish but a responsibility to do something about it. At Akanksha, it is this responsibility that drives us to do what we do. As part of the Service Learning Program that I manage and teach at, we are trying to find answers to some critical questions around the relationship between the child’s contexts and learning. Some of the key questions are: – How does a student’s understanding of the self affect his/her academic outcome? – Does having a sense of community engagement affect our sense of self positively? – Should school regenerate social status quo or should it prepare students to question it and change it for good? In the past year, through the limited interaction a weekend based program could offer, the current batch of students have come a long way. From having strong binary notions around caste, sexuality, gender and language earlier, today they proactively delve into the grey area. As part of their end-of-year internships and projects, they chose to work on diverse issues that mattered in their lives such as discrimination, wildlife conservation, alternative education, rights for child labourers and those on streets, right to information, gender and sexuality, human rights, organic farming and child sexual abuse. For these projects, they have engaged in primary and secondary research, conducted surveys in the communities, read fiction and non-fiction books on related themes and have interacted with experts in the field. Some of them have also created video documentaries and blog posts. This indeed led into academic skill development such as reading and writing, data collection, analysis and presentation, critical thinking and computer skills to name a few. The question for us at Akanksha is, how can we integrate this within the curriculum of schools? With our continuous efforts towards teacher development, research and engagement, teachers in Akanksha schools today are exploring if in kindergarten children can be taught about the good touch and the bad touch while learning about parts of the body. In history lessons, while talking about Shivaji, can we discuss the role of his wife and the gender dynamics around it? Can we recognise the biases our textbooks hold and dispel them consciously in the classroom? Can our sports be gender neutral? Can our math class talk about daily examples from life? In biology, while discussing the reproductive system (and please do discuss this and don’t skip the chapter), also discuss sex, sexuality and myths around it? Can our science books talk about health, hygiene and environment in a more contextual form? Can our political science books help students explore the role of local corporators and have assignments around the Right To Information? Yes. This can all be done and is indeed happening in Akanksha schools. And no, it is not only important for children from low-income communities. It has great value to all. After all, life happens to all, doesn’t it? And as American philosopher and educational reformer John Dewey has said, “Education is a process of living and not a preparation for future living.” * Names have been changed to protect the identity of the children. Rohit Kumar heads Akanksha’s Service Learning Program. The Akanksha Foundation runs 15 municipal schools in Mumbai and Pune in partnership with the BMC and the PMC. Follow them on twitter at @Akanksha_India.
0.8095
FineWeb
1,384
Due to the way in which rape has been legally, politically, theoretically constructed, and genderized, men as a whole are more often than not disregarded as victims of sexual assault. The only time we see men appear in the literature is often as perpetrators. As an example of this the FBI did not change their definition of rape to include men until January of 2012. Rape is often thought of as a crime that can only happen to children, and women. This is because collectively we have specific perceptions of men, and women. That is, as a society we have images in our minds about what types of crimes men, and women are victims of. Coupled with our generderized believes about sexuality the result is that we, as a society, see women as the victims of sexual assault, and men as the perpetrators. This idea of men as the predators, and women as the victims is not a new one, it is a social construction that has taken place over years, and is extremely hard to deconstruct. The problem is that society has not constructed men in a way that allows them to be seen as, or thought of as victims of this crime. Society is far more likely to be able to see a woman as a victim of sexual assault, and a man as her perpetrator. This is because as a society we have constructed women to be: weak, vulnerable: quiet, passive, and submissive. Femininity, is therefore, associated with being the victim. Masculinity, on the other hand, often is associated with traits such as being: strong, tough, assertive, and dominant. In other words we expect men to be in control at all times, making it unlikely to be able to see them as a victim of such a crime. What I am getting at here is that sexual victimization is extremely gendered, and by having it as such men are ignored as victims of sexual assault. This generdization not only ignores men as victims, it reinforces the stereotypes that women are victims, and men are ‘unrapeable’. It also deters any man from coming forward to the police, particularly if his assailant was a women. It is important that we do not only focus on women, but that we also include men in our attempts to understand sexual victimization. There are two simple reasons for this. First, because we cannot assume that we can apply what we know about reporting rates, and women, to reporting rates, and men. In other words, men and women are not the same and need different types of responses in order to be encouraged to come forward. And second, if we always portray men as the perpetrators of sexual assault, we will run the risk of sending the message that men cannot be the victims of this crime. According to a prominent researcher in the area, Karen Weiss, when men are studied as victims of sexual assault researchers only target two areas: children, and prison rape. While these are important areas of research, as Weiss points out, we tend to forget all the other victims of sexual assault that do not fall into these two categories. The study that I am doing seeks to expand on the limited amount of research on men as victims of this crime. Specifically, this study seeks to find out what, if any, impact the social construction of gender has on a victims decision to report crime. According to statistics Canada only 9% of sex assaults are reported to police every year. This is an alarming number, and I want to find out why this is happening. Why aren’t men, and women reporting this crime? By participating in this study you would be helping us to better understanding the differences, and similarities, between men, and women, in regards to sexual victimization. We will be able to start to get a better understanding of why both genders do not feel comfortable with reporting, and what we could start doing to make this better. This could include such things as: what resources both men, and women need to cope with what has happened, and how different agencies could encourage people to report. This could include: social services, medical personal, and law enforcement. By participating in this survey you would be potentially helping future victims of this terrible crime. Written by Mike Sosteric (Dr. S.)
0.5669
FineWeb
905
In C, it is common (or at least possible) to target different processor architectures with the same source code. It is also common that the processor architectures define integer sizes differently. To increase code portability and avoid integer size limitations, it is recommended to use the C standard integer header . However, I'm confused on how this is actually implemented. If I were write a little C program written for x86, and then decide to port that over to an 8 bit microcontroller, how does the microcontroller compiler know how to convert 'uint32_t' to its native integer type? Is there some mapping requirement when writing C compilers? As in, if your compiler is to be C99 compatible, you need to have a mapping feature that replaces all uint32_t with the native type? <stdint.h> contains the equivalent of typedef int int32_t; typedef unsigned uint32_t; with actual type choices appropriate for the current machine. In actuality it's often much more complicated than that, with a multiplicity of extra, subsidiary header files and auxiliary preprocessor macros, but the effect is the same: names like unint32_t end up being true type names, as if defined by You asked "if your compiler is to be C99 compatible, you need to have a mapping feature?", and the answer is basically "yes", but the "mapping feature" can just be the particular types the compiler writer chooses in its distributed copy of stdint.h. (To answer your other question, yes, there are at least as many copies of <stdint.h> out there as there are compilers; there's not one master copy or anything.) One side comment. You said, "To increase code portability and avoid integer size limitations, it is recommended to use the C standard integer header". The real recommendation is that you use that header when you have special requirements, such as for sizes with an exact type. If for some reason you need a signed type of, say, exactly 32 bits, then by all means, use stdint.h. But most of the time, you will find that the "plain" types like long are perfectly fine. Please don't let anyone tell you that you must pick an exact size for every variable you declare, and use a type name fro stdint.h to declare it with.
0.691
FineWeb
521
A methodology for adaptive finite element analysis: Towards an integrated computational environment. We accomplish the general implementation of the superconvergent patch recovery (SPR) and the recently proposed recovery-by-equilibrium in patches (REP). Both SPR and REP are compared and used for error estimation and for guiding the adaptive remeshing process. Moreover, the SPR is extended for calculating sensitivity quantities of first- and higher-orders. We accomplish the mesh (re-)generation process by means of modern methods, combining quadtree and Delaunay triangulation techniques. Surface mesh generation in arbitrary domains is performed automatically (i.e. with no user intervention) during the self-adaptive analysis, using quadrilateral or triangular elements. These ideas are implemented in the finite element system technology in adaptivity (FESTA) software. The effectiveness and versatility of FESTA are demonstrated by numerical examples. Keywords for this software References in zbMATH (referenced in 8 articles , 1 standard article ) Showing results 1 to 8 of 8. - Mukherjee, Subrata; Mukherjee, Yu Xie: Boundary methods. Elements, contours, and nodes. (2005) - Chung, Soon Wan; Kim, Seung Jo: A remeshing algorithm based on bubble packing method and its application to large deformation problems. (2003) - Kim, Jeong-Ho; Paulino, Glaucio H.: An accurate scheme for mixed-mode fracture analysis of functionally graded materials using the interaction integral and micromechanics models (2003) - Li, Gang; Paulino, Glaucio H.; Aluru, N. R.: Coupling of the mesh-free finite cloud method with the boundary element method: a collocation approach. (2003) - Kompiš, Vladimir (ed.): Selected topics in boundary integral formulations for solids and fluids (2002) - Ghosh, Somnath; Lee, Kyunghoon; Raghavan, Prasanna: A multi-level computational model for multi-scale damage analysis in composite and porous materials (2001) - Paulino, Glaucio H.; Liu, Yong: Implicit consistent and continuum tangent operators in elastoplastic boundary element formulations (2001) - Paulino, G.H.; Menezes, I.F.M.; Cavalcante Neto, J.B.; Martha, L.F.: A methodology for adaptive finite element analysis: Towards an integrated computational environment (1999)
0.8928
FineWeb
603
Dasara festival essay - How to write a white paper template such as common dilemmas, new trends, changing techniques, industry comparison, etc. Many business communications, such as technical reports or proposals, place the main conclusion at the beginning of thedocument. Seriously, if youre going to set aside the time to write a white paper (which could take days or weeks to produce then get the most return on it you possibly can. Dig up something your audience would be interested in? Figure Out Who queens belfast essay writing Youre Writing For. One key is to take a look at the whole document and ensure that your pages have a similar style and feel. If you have deep knowledge or expertise on an area youre known for, a white paper can help reinforce that perception. For example, use maps for geographical information, or use pictograms to compare population sizes. Unfortunately, designing a white paper can seem like a lot to take on if youre not much of a designer. Use creative illustrations that reflect the theme of your white paper. Then, pick an accent color and create a color scheme using shades of that color. White papers should be: Professional in tone: This is formal, almost academic-style writing. In order to write a valuable document, all research materials must be from credible, reliable sources. Example : Bland: White paper on Law 123.4 Referencing Environmental Impact Assessments. Recommended Listening: How to Boost Your Results With Original Research As A Marketing Tactic With Andy Crestodina From Orbit Media Studios 015 Back to the Top Now You're Ready to Format and Write This White Paper Weve done a lot of things so far. Focus on the value for your email recipient. Here are 10 white paper examples and design tips to set you on the right path. If youre unsure of these distinctions or are looking to improve your business writing skills, consider enrolling in our. It sells the company by highlighting the internal expertise and valuable recommendations, not by bidding for business. Establish a Set Editing Process Know who your editor will be ahead of time and develop a set process. It can be easily modified to suit your needs. And that would make your white paper much more valuable than something anyone could have slapped together spending an afternoon with Google. Generally, theyre formatted as PDFs and look somewhat similar to an ebook or typical research report. Pull information from online references, industry resources, and internal documents. Part 2 Discussing the Problem 1, identify the problem. For example, if you were writing on student debt, you might say: 5, student debt has grown exponentially over the past decade. Or, start by asking a few questions: Which problems are top priority? . White Paper Format, wouldnt it be awesome if your white paper became a highlylinked source of information for others. If you choose to byying slip in a plug for your product or company. Keep it relevant and subtle, essay use specific figures, columns. So, its unlikely you have a few hundred or thousand dollars lying around to build out new white papers. Next, Write Your Outline.White papers are usually fairly long.The same outlining process you d use. This gives you the opportunity to drill deeper into each specific point. A boldly colored header can make the beginning of a myth of sisyphus and other essays new section clear. H2, if you are selling a product or service in a competitive environment. There donapos, it also gives the reader content for further research. Identify H1, then cost will be a decisive factor 11 Part 3 Arguing Your Solution 1 Describe your proposed solutions. Thats why its a good idea to summarize the key information that people shouldnt miss. The investment of time and skill can produce a valuable document that shares essay on dance is my passion your companys knowledge. Contributing to overall education and progress in your industry.
0.9418
FineWeb
839
Buckthorn Bark, also known as Alder Buckthorn, Alder Dogwood, Black Dogwood, and Glossy Buckthorn, has been used since the days of ancient Greece. At that time it was thought to protect against poisons, headaches, witchcraft and demons. In the mid 1600's it became recognized in Europe as a treatment for constipation, and at the time was listed in the London Pharmacopoeia a primary source for medical reference. It became recognized officially as a drug in the United States in the early 1800's when it was listed in the National Formulary, again as a treatment for constipation. Today you can see Buckthorn Bark used in conjunction with Cascara Sagrada as an herbal supplement to relieve constipation and the symptoms associated with constipation. Buckthorn Bark comes from the Alder Buckthorn tree which is native to Europe and parts of western Asia . The bark is collected in the summer from the branches of the tree. It is very important that it is aged for at least one year or dried in ovens which speed up the drying process. This drying process is important as "raw" Buckthorn Bark is much too potent to be ingested and processed by our digestive systems. Once the bark has aged it is dried, powdered and made into liquid extracts, capsules or tablets. The Buckthorn Bark in Puristat's Digestive Wellness Programs are in tablet form. Constipation and Buckthorn Bark Buckthorn Bark's main function is to relieve constipation. "Most often, alder buckthorn is used as a laxative. It contains chemicals that stimulate intestinal movement and also attract more water to the intestines. Both actions promote the emptying of intestinal contents" (Rhamnus frangula p.1). Buckthorn contains compounds called anthraquinones which when taken help to move bowels more quickly through the colon. These anthraquinones increase the colons ability to contract and reduce water absorption by the intestines. The spontaneous contractions of the colon are what push built up fecal matter through the colon, effectively cleansing the colon. The water that is not absorbed by the intestines is absorbed into the stool. Making movements softer and giving them more volume to pass more easily. Hemorrhoids, Anal Fissures and Buckthorn Bark Buckthorn Bark's ability to soften the stool and relieve constipation makes it an effective tool in relieving pain and pressure associated with hemorrhoids and anal fissures. The presence of anthraquinones in Buckthorn Bark allow for the intestines to absorb less water. This present water is then absorbed by stool increasing their volume and making them softer. These softer stools pass more easily and without irritation to any present hemorrhoids or anal fissures, enabling them to heal more quickly. Colon Cleansing and Buckthorn Bark Buckthorn Bark is an effective colon cleanser because of its ability to increase the motility of the colon. "Sometimes, buckthorn bark is also used to cleanse the colon in preparation for gastrointestinal diagnostic procedures" (supplements buckthorn bark p.2). The anthraquinone compounds in Buckthorn Bark help to stimulate the spontaneous movement of the colon. It's these spontaneous movements that push the fecal matter through your colon instead of remaining stationary and eventually becoming impacted. As your colon contracts more regularly, more frequent movements are produced. Summary of Benefits - Relief from constipation is the primary function of Buckthorn Bark. - Helps to relieve hemorrhoids and anal fissures. - The increased motility helps to cleanse the colon more effeciently.
0.5008
FineWeb
890
PSD2: A New Age of Open Banking, Innovation and Competition PSD2 is part of a long-term regulatory vision to drive competition, innovation and transparency across the European payments market, while enhancing the security of digital payments and account access. PSD2 mandates that banks open their payment account data to third parties through APIs, therefore enabling new payment services provided by Payment Initiation Service Providers (PISP) and Account Access Providers (AISPs), fundamentally restructuring the payments landscape. The directive heralds a new authentication ecosystem, leaning heavily on SCA for many transactions, but also incorporating RBA depending on the transaction type and risk level. A Straightforward Solution to A New Banking Landscape Accurate authentication in the context of PSD2 relies on a holistic view of an end user’s digital identity, encompassing dynamic information from all digital interactions. The ThreatMetrix Digital Identity Network collects and processes global shared intelligence from millions of daily consumer interactions including logins, payments and new account applications. Using this information, ThreatMetrix creates a unique digital identity for each user by analyzing the myriad connections between devices, locations and anonymized personal information. Digital Identity Intelligence empowers financial institutions to define patterns of trusted behavior that can be used to analyze the risk of future transactions. The Dynamic Decision Platform enables businesses to leverage shared intelligence from The Network to make real-time digital decisions. This is facilitated via an integration Hub to invoke integrated and third party step-up services. The breadth of the ThreatMetrix platform therefore provides the following complete solution for PSD2: - Strong Customer Authentication (SCA): ThreatMetrix is extending its core technology platform to provide a Strong Authentication Framework wherein the customer’s mobile device becomes the authenticator and the ThreatMetrix SDK becomes the enabler. This will support: - Strong DeviceID: through a crypto based PKI certificate: A cryptographic way to assert that the device in question is the same device that was originally registered. - Push Notification: A cryptographically backed step-up to a mobile device that allows a yes/no answer. This is similar to a 2-way SMS challenge flow but leveraging IOS and Android secure notification services (e.g. APN), with messages that are customizable based on use case and the customer’s preference. - Extended Biometric Step-Up: A cryptographically backed step up to a mobile device that requires use of on-device user authenticator (fingerprint, facial recognition, voice, PIN, etc.). The key difference with this flow is that it requires a user enrollment of a biometric or PIN. This has associated complexities with administration of processes like revocation/lost devices etc. as well as complexities around managing and maintaining fragmented handset/OS implementations of biometrics. - Risk-Based Authentication (RBA): The allowance for RBA (or a combination of SCA and RBA) in the Regulatory Technical Standards (RTS) for certain transactions supports the industry’s long-term drive to preserve frictionless payment transactions. - The European Banking Authority (EBA) has stated that previous spending patterns, transaction history/ location can be used to identify high-risk anomalies in the payment request. This aligns seamlessly with the way that ThreatMetrix evaluates the validity of a user’s digital identity by combining intelligence related to device, location, identity and threats. - This enables companies to evaluate real-time risk factors in the context of past user behaviors to make accurate risk decisions, and for businesses to accept, reject or review (step-up) a transaction as necessary. - The ThreatMetrix Dynamic Decision Platform enables global businesses achieve a balance between security and convenience across customer touch points. As well as operationalizing crowdsourced intelligence from the ThreatMetrix Digital Identity Network, businesses can use the decision platform to apply risk detection to new API and consumer consent flows. ThreatMetrix Will Deliver New APIs to Match PSD2 User Journeys: - Register/Deregister Device - Authentication Preferences - User Consent Request - Authorization parameters, e.g. threshold amount for payment initiation, max number of payments per day etc. The ThreatMetrix Advantage The ThreatMetrix solution for PSD2 enables financial institutions to create APIs for PISPs and AISPs while maintaining their existing authentication and customer validation processes. This supports innovation from internal initiatives and through external partners while prioritizing customer experience and lifetime value. This enables them to support innovation from internal initiatives and through external partners while prioritizing customer experience and lifetime value. - Minimally-invasive, strong authentication solution that is almost entirely turn key for financial institutions. - Simple deployment of Strong Customer Authentication (SCA): No additional integration effort. - Policy-driven use of SCA: - Automated remediation of risky transactions to reduce fraud, friction and operational costs. - Includes checks for compromised authentication elements, transaction amounts, known fraud scenarios and behavioral anomalies, signs of malware infection, etc. - Opportunity for evolution as regulation, attacks, and technologies change. - Support for multiple SCA methods: - Multiple SCA methods can be supported via the Dynamic Decision Platform, ThreatMetrix Mobile SDK and Carrier ID functionality. - Ability to add Native OS support: Fingerprint, Message, PIN, Notification. - Framework to allow the incorporation of other SCA methods over time. - User/Device Lifecycle Management (Register/De-register Device).
0.9728
FineWeb
1,225
Challenge #3: Write down in your journal WHY journaling is important to you. Journaling, like any habit, will not last long unless you can create the intrinsic motivation to follow through and actually do it. Think about all the people who make a New Year’s resolution to join the gym and get in shape. For the first couple weeks, the gym is packed with people who are excited about their new “habit.” They are motivated to make positive life changes and they honestly intend to give whatever level of effort is required in order to achieve their fitness goals. But around week 3, a funny thing happens – people stop showing up. Were all those people who decided the extra hour of sleep was more important than getting in their run before work fakers? Did they have change of heart regarding the benefits of exercise? Did they suffer some career-ending injury? I would wager that if you asked most of the people who stopped going to gym if they still intended to achieve their fitness goals, they’d say “yes.” But the reason they don’t follow through is because they’ve lost sight of their why. When it comes to journaling, there are many good reasons why you should journal: - It helps you “re-center” and keep focused on what’s important. The simple process of actually writing down what you did well (and didn’t do well) helps you identify which tasks and projects are worthwhile for you to pursue and which ones are not worthy of your time. Journaling is a unique opportunity to align your day-to-day tasks with your longer-term vision and goals. - It helps you keep track of what you’re doing. Journaling tells you in a very real, everyday way what you’ve done, and what you haven’t, and what you’re working on. - It provides a written record of your progress. Journaling makes it very easy to see the progress you’re making. - It provides a recorded memory of what has happened to you. By writing things down, you have a record of what has happened to you, daily. This is especially great if you have a leaky brain (bad memory) and tend to forget things. - It calls you out on self-delusion. Nothing points out faster that you’re stalling progress or continuously putting something off than a set of consecutive journal entries that read “I didn’t get around to it”. It, along with time tracking, also answers the all-important question of if you’re spending time on the things that matter. - It makes your weekly and monthly reviews that much easier to write. Journaling allows you to know exactly what you did (or didn’t), and when. Whichever of these reasons strikes you, attach yourself to it. Without a why, your rituals and habits won’t stick. Your why for journaling can be anything, but you do need a reason and you need to keep it fresh – otherwise you’ll end up like one of those people with good intentions who just can’t seem to follow-through and accomplish their goals. Ask yourself “why do I want to journal?” Find your “why” and write it down. Write it in your journal if you have a physical journal or create a new note in your digital journal. Update: Challenge #4 is now available. Discover the 1 Lifehack of Highly Successful People This one lifehack led to the biggest breakthrough of my career. People like Steve Jobs and Oprah have used it to catapult their success, and now you can too.
0.708
FineWeb
778
Odilo. Obscuration. Oratorio. is a performance shown at this year’s Bitef out of competition, as a prologue to the festival, and deals with Nazism. Still, it does not focus that much on the problematizing of the horrible consequences which that ideology had on mankind - in this performance, that element seems to be a given - but places the emphasis on the causes of Nazism, the individuals who served as its spokespersons, and the society that agrees to put those ideas into action. Paying with the documentary biographical material of Odilo Globočnik, the director Dragan Živadinov renounces the opportunity to construct the classic drama conflict, but creates a linear narrative of the genesis of the Nazism through Globočnik and his adherents. People speak as chorus, as one voice, emphasizing the fact that they accept and reproduce “Odilo’s uniform words”. They describe the state of chaos and economic crisis most explicitly demonstrated through the absence of jobs taken by the inferior and wild “Srboslavci” (a non-existing word, a cross between the words Serbians and followers of Orthodox religion), and the lack of resources taken by the Jew, “the pioneers of materialism”. Social antagonism, class struggle, and other tensions are inherent to capitalism because modernization and industrialization mean destabilization of the existing relations, thus implying social conflicts. The problem of such instability of Odilo’s slogan is solved by the construction of ideological narrative on how the society got into crisis - not as a result of social tensions caused by capitalism, but as a consequence of the presence of a foreign factor. It is exclaimed that even one Jew is too much, which is followed by the idea that the crisis cannot be regulated by the means of passion but that things have to be organized in a thorough, systematic manner, which gives the hints of the perverted and horrible Holocaust system. The stage design (Dunja Zupančič) represents, to some extent, one of those massive podiums which were used by the leaders of the German national-socialist party to address the masses, but with the addition of bright, garish red colour, typical of the set design at the Eurovison song competitions. Which means that what is added is one contemporary detail of pop culture which revives Nazi aesthetics with an idea to warn of the possible metamorphosis of the external characteristics of the fascist ideology and its resurrection in a more contemporary form which could deceive inattentive eye. The space arranged in such a manner is treaded by whole groups of soldiers and officers wearing Nazi uniforms, yelling Odilo’s Nazi slogans, while their movements leave an impression of a well-rehearsed and often repeated performance - the consequence of the ideological engineering they were exposed to. The authors Peter Mlakar and Dragan Živadinov question those people’s responsibility and guilt. Right from the start, the authors equal people with the Greek chorus, and give to Odilo the role of the first actor who comes forth from the chorus in order to tell what they already think, and they take him as their representative. The entre fascist doctrine is thus shown as a ritual process marked by the manic delirium of the participants, which means the lack of the rational reasoning, which gives the rest of the performance a strong tone of mindlessness. The rest of the narrative is conducted through fragmentary structure of biographic details from Globočnik’s life. One of the most striking moments is the one in which, by playing with globes, which in this performance replace the symbol of swastika, Odilo and Hitler plan holocaust in a laid-back manner. When the chronology reaches the end of the Second World War, the entire ensemble takes off the Nazi insignia and unanimously renounces Odilo, in the same way they accepted him. The people’s statement from the beginning of the play that they accepted him as their spokesperson is now repeated in a different form. They claim now that they had accepted him only so they could tear him apart, which introduces the scene of delirious ritual mutilation of a victim, like the one unconsciously performed by Bache in Euripides’s eponymous play. It implies that the guilt and the responsibility of the people who had supported Nazism are now questionable. On the one hand, they explicitly appropriate Odilo while on the other they assign subconscious and mislead element to it. The authors, however, have no dilemma since they solve the situation by playing with the convention of the applause at the end of the performance. The big ensemble which played chorus does not come out for a curtain call because they do not deserve an applaus, since not even misconception releases them of guilt or responsibility. Nowadays staging a performance like this one suggests the presence of a similar system of propaganda and reasoning in the rise of right-wing populism and its attitude to the new economic but also refugee crisis. The problems Europe is facing nowadays seem largely equivalent to the ones from the 30ies. What terrifies is the fact that the similarity is recognized by the rhetoric applied in an attempt to resolve tensions. The director was in no way forced to modernize the context and the time in which the plot takes place. Economic crisis, unemployment, identity crisis caused by the contact between various cultures are just some of the obvious parallels. By presenting documentary, historical material, Živadinov actually criticizes the current state in Europe and calls for caution. In the context of the festival slogan “World without Us”, that appeal for caution can be understood as a warning that, unless we confront fascism immediately, we will be able to anticipate the epilogue by the prologue.
0.8845
FineWeb
1,292
|Trisomy 18, Edwards Syndrome| |Classification and external resources| Trisomy 18 (T18) (also known as Trisomy E or Edwards syndrome) is a genetic disorder caused by the presence of all or part of an extra 18th chromosome. It is named after John H. Edwards, who first described the syndrome in 1960. It is the second most common autosomal trisomy, after Down Syndrome, that carries to term. Trisomy 18 is caused by the presence of three—as opposed to two—copies of chromosome 18 in a fetus or infant's cells. The incidence of the syndrome is estimated as one in 3,000 live births. The incidence increases as the mother's age increases. The syndrome has a very low rate of survival, resulting from heart abnormalities, kidney malformations, and other internal organ disorders. The following data are from the National Down Syndrome Cytogenetic Register Annual Reports 2008/09. In England and Wales, there were 495 diagnoses of Edwards’ syndrome (trisomy 18), of which 92% were made prenatally. There were 339 terminations, 49 stillbirths/miscarriages/fetal deaths, 72 unknown outcomes, and 35 live births. Because approximately 3% of cases of Edwards’ syndrome with unknown outcomes are likely to result in a live birth, the total number of live births is estimated to be 37 (2008/09 data are provisional). Only 50% of liveborn infants live to 2 months, and only 5–10% survive their first year of life. Major causes of death include apnea and heart abnormalities. It is impossible to predict the exact prognosis of a child with Edwards syndrome during pregnancy or the neonatal period. The median lifespan is 5–15 days. One percent of children born with this syndrome live to age 10, typically in less severe cases of the mosaic Edwards syndrome. Edwards syndrome occurs in approximately 1 in 3,000 conceptions and approximately 1 in 6,000 live births; 50% of those diagnosed with the condition prenatally will not survive the prenatal period. Although women in their 20s and early 30s may conceive babies with Edwards syndrome, the risk of conceiving a child with Edwards syndrome increases with a woman's age. The average maternal age for conceiving a child with this disorder is 32½. Edwards syndrome is a chromosomal abnormality characterized by the presence of an extra copy of genetic material on the 18th chromosome, either in whole (trisomy 18) or in part (such as due to translocations). The additional chromosome usually occurs before conception. The effects of the extra copy vary greatly, depending on the extent of the extra copy, genetic history, and chance. Edwards syndrome occurs in all human populations but is more prevalent in female offspring. A healthy egg or sperm cell contains individual chromosomes, each of which contributes to the 23 pairs of chromosomes needed to form a normal cell with a typical human karyotype of 46 chromosomes. Numerical errors can arise at either of the two meiotic divisions and cause the failure of a chromosome to segregate into the daughter cells (nondisjunction). This results in an extra chromosome, making the haploid number 24 rather than 23. Fertilization of eggs or insemination by sperm that contain an extra chromosome results in trisomy, or three copies of a chromosome rather than two. Trisomy 18 (47,XX,+18) is caused by a meiotic nondisjunction event. With nondisjunction, a gamete (i.e., a sperm or egg cell) is produced with an extra copy of chromosome 18; the gamete thus has 24 chromosomes. When combined with a normal gamete from the other parent, the embryo has 47 chromosomes, with three copies of chromosome 18. A small percentage of cases occur when only some of the body's cells have an extra copy of chromosome 18, resulting in a mixed population of cells with a differing number of chromosomes. Such cases are sometimes called mosaic Edwards syndrome. Very rarely, a piece of chromosome 18 becomes attached to another chromosome (translocated) before or after conception. Affected individuals have two copies of chromosome 18 plus extra material from chromosome 18 attached to another chromosome. With a translocation, a person has a partial trisomy for chromosome 18, and the abnormalities are often less severe than for the typical Edwards syndrome. Infants born with Edwards syndrome may have some or all of the following characteristics: kidney malformations, structural heart defects at birth (i.e., ventricular septal defect, atrial septal defect, patent ductus arteriosus), intestines protruding outside the body (omphalocele), esophageal atresia, mental retardation, developmental delays, growth deficiency, feeding difficulties, breathing difficulties, and arthrogryposis (a muscle disorder that causes multiple joint contractures at birth). Some physical malformations associated with Edwards syndrome include small head (microcephaly) accompanied by a prominent back portion of the head (occiput); low-set, malformed ears; abnormally small jaw (micrognathia); cleft lip/cleft palate; upturned nose; narrow eyelid folds (palpebral fissures); widely spaced eyes (ocular hypertelorism); drooping of the upper eyelids (ptosis); a short breast bone; clenched hands; underdeveloped thumbs and or nails absent radius, webbing of the second and third toes; clubfoot or Rocker bottom feet; and in males, undescended testicles. In utero, the most common characteristic is cardiac anomalies, followed by central nervous system anomalies such as head shape abnormalities. The most common intracranial anomaly is the presence of choroid plexus cysts, which is a pocket of fluid on the brain that is not problematic in itself but may be a marker for Trisomy 18. Sometimes excess amniotic fluid or polyhydramnios is exhibited.
0.9044
FineWeb
1,455
Wellbutrin is used for: Depression treatment. It may also be used for the other conditions as determined by your doctor. Wellbutrin is an antidepressant. It works in the brain to treat depression. How to use Wellbutrin: Use Wellbutrin as directed by your doctor. Check the label on the medicine for exact dosage instructions. - Wellbutrin comes with an extra patient information sheet called Medication Guide. Read it carefully. Read it again each time upon getting a refill of Wellbutrin. - Take Wellbutrin orally regardless of your meal patern. If stomach upset occurs, take it with food to reduce stomach irritation. - Several weeks may pass before your symptoms improve. Do not stop taking Wellbutrin without prior check with your doctor. - Take your doses at the same times each day at least 6 hours apart unless directed otherwise by your doctor. This may help to decrease the risk of seizures with Wellbutrin . - Continue to take Wellbutrin even if you feel well. Do not miss any doses. - If you miss a dose of Wellbutrin , skip the missed dose. Go back to your regular dosing schedule. Do not take more than 1 dose within 6 hours. Do not take 2 doses at once. Ask your health care provider any questions you may have about how to use Wellbutrin . Before using Wellbutrin: Some medical conditions may interact with Wellbutrin . Tell your doctor or pharmacist if you have any medical conditions, especially if any of the following applicable to you: - if you are pregnant, planning to become pregnant, or are breast-feeding - if you are taking any prescription or nonprescription medicine, herbal preparation, or dietary supplement - if you have allergies to medicines, foods, or other substances - if you or a family member has a history of bipolar disorder (manic depression), other mental or mood problems (e.g. depression), suicidal thoughts or attempts, or alcohol or substance abuse - if you have diabetes, kidney problems, high blood pressure, heart problems (e.g. congestive heart failure), or a recent heart attack - if you have a history of seizure, head injury, tumor in the brain or spinal cord, or liver problems (e.g. cirrhosis) Some MEDICINES MAY INTERACT with Wellbutrin . Tell your health care provider if you are taking any other medicines, especially any of the following: - Amantadine, antipsychotics (e.g. haloperidol, risperidone), corticosteroids (e.g. prednisone), insulin, levodopa, MAOIs (e.g. phenelzine), nicotine patches, oral hypoglycemics (e.g. glipizide), other antidepressants (e.g. fluoxetine, amitriptyline), sympathomimetics (e.g. pseudoephedrine), theophylline, or tiagabine because they may increase the risk of Wellbutrin 's side effects - Carbamazepine, phenobarbital, or phenytoin because they may decrease Wellbutrin 's effectiveness - Antiarrhythmics (e.g. propafenone, flecainide), beta-blockers (e.g. metoprolol), phenothiazines (e.g. thioridazine), selective serotonin reuptake inhibitor (SSRI) antidepressants (e.g. fluoxetine), or tricyclic antidepressants (e.g. nortriptyline) because the risk of their side effects may be increased by Wellbutrin This list of all interactions is not all-inclusive, so other interactions are possible. Ask your health care provider if Wellbutrin may interact with the other medicines that you take. Check with your health care provider before you start, stop, or change the dose of any medicine. Do NOT use Wellbutrin if: - you are allergic to any ingredient in Wellbutrin - you are taking any other medicine that contains bupropion - you have a history of an eating disorder (e.g. anorexia, bulimia) or seizures (e.g. epilepsy) - you are suddenly stopping the use of alcohol or sedatives (e.g. benzodiazepines) after long-term use - you are taking or have taken a monoamine oxidase inhibitor (MAOI) (e.g. phenelzine) within the last 14 days Contact your doctor or health care provider right away if any of these applicable to you. Important safety information: - Wellbutrin may cause drowsiness, dizziness, or blurred vision. These effects may be worse if you take it with an alcohol or certain medicines. Use Wellbutrin with caution. Do not drive or perform other possibly unsafe tasks until you know exactly how your body reacts to it. - Check with your doctor before you drink alcohol or use medicines that may cause drowsiness (e.g. sleep aids, muscle relaxers) during the treatment course with Wellbutrin ; it may be added to their effects. Ask your pharmacist if you have questions about which medicines may cause drowsiness. - Wellbutrin may increase risk of seizures. Your risk may be greater if you also have certain medical conditions, use certain medicines, or if you drink large amounts of alcohol. Talk to your doctor to clarify if you may have a greater risk of seizures while taking Wellbutrin. - If you are already using sedatives, do not stop them abruptly without prior check with your doctor. Abrupt stopping may increase your seizure risk. - Do not take decongestants (e.g. pseudoephedrine), stimulants, or diet pills while you are taking Wellbutrin without prior consultation with your doctor. They may increase your risk of seizures. - The risk of seizures may be greater if you take Wellbutrin in high doses or for a long period of time. Do NOT take more than the recommended dose, change your dose, or use Wellbutrin for longer than prescribed without checking with your doctor. - Children, teenagers, and young adults who take Wellbutrin may be at increased risk of suicidal thoughts or actions. All patients taking Wellbutrin should be closely monitored. Contact the doctor right away if new, worsened, or sudden symptoms such as depressed mood; anxious, restless, or irritable behavior; panic attacks; or any unusual change in the mood or behavior occur. Contact the doctor right away if any signs of suicidal thoughts or actions occur. - If you have trouble sleeping, you may be taking your dose too close to the bedtime. Talk to your doctor about changing your dosing schedule. - Wellbutrin contains the same ingredients as Zyban, a medicine used to help to stop smoking. Do not take Wellbutrin if you are also taking Zyban. Discuss any questions or concerns with your doctor. - Wellbutrin should be used with caution to treat seniors; they may be more sensitive to its effects. - Wellbutrin should be used with extreme caution by CHILDREN; safety and effectiveness in children have not been confirmed. - PREGNANCY and BREAST-FEEDING: If you become pregnant, contact your doctor. You will need to discuss the benefits and risks of using Wellbutrin while you are pregnant. Wellbutrin is found in breast milk. Do not breast-feed while taking Wellbutrin . Possible side effects of Wellbutrin : All medicines may cause side effects, but many people will only have minor or no side effects at all. Check with your doctor if any of these most COMMON side effects persist or become bothersome: Constipation; dizziness; drowsiness; dry mouth; headache; increased sweating; loss of appetite; nausea; nervousness; restlessness; taste changes; trouble sleeping; vomiting; weight changes. Seek medical attention right away if any of these SEVERE side effects occur: Severe allergic reactions (rash; hives; itching; difficulty breathing; tightness in the chest; swelling of the mouth, face, lips, or tongue); chest pains; confusion; delusions; fainting; fast or irregular heartbeat; fever, chills, or sore throat; hallucinations; hearing problems; menstrual changes; new or worsening mental or mood changes (e.g. concentration problems, panic attacks, aggressiveness, agitation, anxiety, impulsiveness, irritability, hostility, exaggerated feeling of well-being or inability to sit still); red, swollen, blistered, or peeling skin; seizures; severe headache or dizziness; severe or persistent joint or muscle pain; severe or persistent nervousness, restlessness, or trouble sleeping; shortness of breath; suicidal thoughts or attempts; tremor; unusual swelling; vision changes; worsening depression.
0.9481
FineWeb
2,026
The peculiarities with this year’s report on Israel/Palestine are not just limited to omissions. For reasons unexplained, this year the State Department used a different methodology for Israel/Palestine from the methodology used in the reports for nearly 200 other countries. "This report contains data drawn from foreign government officials; victims of alleged human rights violations and abuses, academic and congressional studies; and reports from the press, international organizations, and NGOs concerned with human rights. In the context of the Israeli-Palestinian conflict, some of those sources have been accused of harboring political motivations. The Department of State assesses external reporting carefully but does not conduct independent investigations in all cases." This was then followed by an additional caveat: "We have sought and received input from the government of Israel (and, where relevant, the Palestinian Authority) with regard to allegations of human rights abuses, and we have noted any responses where applicable. Because of timing constraints, the Israeli government was not able to provide a detailed response to every alleged incident, but it did maintain generally that all incidents were thoroughly investigated and parties held accountable, as appropriate, according to due process of law." Further, although serious allegations have been levelled at the human rights records of a number of other countries, notably Russia and China, their governments were not apparently afforded the same opportunity to respond as was the government of Israel. While these disparities may be perfectly understandable from a diplomatic perspective, they do little to enhance the standing of the State Department or the status of the Country Reports as an objective, rules-based resource. While these developments might be attributable to changes in personnel and partisan interests, words matter, and these developments may prove to adversely impact both the U.S. and Israel’s long-term interests in a number of ways, including: 1. By subjectively determining what is, and what is not "occupied territory," without reference to established legal principles, the U.S. risks derogating from the laws of belligerent occupation and the principle of non-acquisition of territory by force codified in the immediate aftermath of the Second World War. Perhaps Russia will now start referring to the rest of Ukraine as "disputed territory," relying on the precedent set in the Palestinian territories, and China may rely on the erosion of these principles in an attempt to legitimize its island building projects in the South China Sea. 2. By applying a different methodology in the Israel/Palestine report from that applied to nearly 200 other countries, the State Department’s Country Reports run the risk of being dismissed as demonstrably biased, lacking objectivity and divorced from established legal principles. Countries such as China, with a horrible human rights record, may seek to claim moral equivalency with the U.S. as a result of these double standards. 3. If in fact the U.S.’s position is now that the Palestinian territories are no longer occupied, a reasonable assumption following the deletion of the word "Occupied," then there is no legal basis upon which Israel can continue to prosecute thousands of Palestinian residents of the West Bank, including children, in military courts rather than standard civilian ones. And further, if the Palestinian territories are "not occupied" then approximately five million Palestinians living between the Jordan river and the Mediterranean Sea - who are not citizens of Israel - may demand the same civil and political rights as Israelis living in the same territory. Making exceptions for Israel 70 years after its establishment may ultimately prove damaging to other U.S. strategic interests and harm the aspiration to "lead by example." And as for "leading by example" – be careful what you wish for. Russia and China might just rely on this lead to justify making their own territorial claims in violation of established principles. Gerard Horton is a lawyer and co-founder of Military Court Watch. Gerard has worked on the issue of children detained by the Israeli military and prosecuted in military courts for the past 10 years prior to which he practised as a barrister at the Sydney Bar. Twitter: @MCourtWatch
0.6988
FineWeb
912
Alzheimer’s disease is a form of dementia that, according to the National Institute on Aging (NIA), is “an irreversible, progressive brain disorder that slowly destroys memory and thinking skills and, eventually, the ability to carry out the simplest tasks.” The disease is named after Dr. Alois Alzheimer, who, in 1906, noticed changes in the brain tissue of a woman who had died due to an unusual mental illness. The woman’s symptoms included memory loss, language problems, and unpredictable behavior. Upon her death, Dr. Alzheimer examined her brain and found amyloid plaques, or abnormal clumps, and neurofibrillary tangles, or tau. The plaques and tangles are some of the main features of Alzheimer disease. The loss of connections between nerve cells, or neurons, in the brain is another feature, along with many other complex brain changes. It appears that the initial damage to the brain from the plaques, tangles, and loss of connection between nerve cells takes place in the part of the brain that is essential in forming memories. Additional parts of the brain are affected as the neurons die and, by the final stages of the disease, the damage is widespread and brain tissue has shrunk. Are you looking for information and resources for a loved one with Alzheimer’s disease? Our information specialists have put together a quick go-to list: - The NARIC Collection has numerous articles from the NIDILRR community and elsewhere that speak on different aspects of research on Alzheimer’s disease. - NIA’s Alzheimer and related Dementias Education and Referral (ADEAR) Center offers information and publications about Alzheimer’s disease and related dementias for families, caregivers, and health professionals. NIA also provides information in Spanish about Alzheimer’s disease. - The Alzheimer’s Association provides education and resources for families and professionals, information on local programs and services, and more, along with a 24/7 helpline: 800/272-3900. - The Alzheimer’s Foundation of America provides information and resources on various topics including caregiving and healthy aging. They also provide training and education for professionals and a toll-free helpline: 866/232-8484. Please note: These resources are provided for information purposes only, and not for diagnosis or recommendations of treatment. Please consult with your healthcare provider if you have questions or concerns about your health status.
0.9673
FineWeb
536
Rene descartes & dualism essay sample rene descartes (1596-1650), was a french mathematician and philosopher who had an ambition so unique in the sense that he did not intend to make an additional contribution to the existing knowledge but to have an overhaul or complete reconstruction of philosophy. Descartes’ theory of dualism obscures the “how” of the interaction, because he seems to fail in offering a reasonable account of the interaction (armstrong, 18) since the immaterial substance (mind is immaterial) not extended in space as the body is, the mind is not in contact with the body. The mind-body distinction one of the deepest and most lasting legacies of descartes’ philosophy is his thesis that mind and body are really distinct—a thesis now called mind-body dualism. Rene descartes’ theory of substance and dualism of mind and body still contains some fallacies such as the masked man fallacy and hence still puts a question mark to refute such fallacies or refute his theories and arguments to the modern philosophy. Substance dualism is a variety of dualism in the philosophy of mind which states that two sorts of substances exist: the mental and the physical substance dualism is a fundamentally ontological position: it states that the mental and the physical are separate substances with independant existence. Descartes‟ dualism as „official theory‟, ryle says that this theory committed a special kind of mistake called „category mistake‟ so in this paper i shall try to explore descartes‟ dualistic theory. Video created by the university of edinburgh for the course introduction to philosophy (dr suilin lavelle) if you’re reading this, then you’ve got a mind but what is a mind, and what does it take to have one. If descartes can conceive of himself being distinct from his body then descartes is not identical to his body through modern neuroscience research it is possible to see that descartes immaterial explanation of thinking being the essence of the mind is a lot simpler than getting a brain dependent theory. Descartes' dualist theory of mind and body has difficulty explaining how the two interact what is the problem explain and evaluate descartes' attempts to overcome it. Indeed, in a recent book in the [end page 232] philosophy of mind the authors claim that the key to the problem with descartes' dualism is the neglect of the body and the artificial conception of the mental that separates it from our embodied involvement with the world. Descartes argues that no explanation of any phenomenon may assume or merely re‐describe what needs to be explained he cannot, therefore, propose substance dualism as a theory of mind. Descartes’s philosophy is rooted in his mathematics there is a more general dualism in cartesianism as a whole between a rationalist metaphysics and . Descartes’ arguments for distinguishing mind it doesn’t establish dualism for this, we need to know that bodies exist and that their descartes defended . Dr antonio damasio, siding with spinoza over descartes, argues that mind and body are unified in the middle of the 17th century, spinoza took on descartes and lost according to descartes' famous dualist theory, human beings were composed of physical bodies and immaterial minds spinoza disagreed . Descartes’ arguments for dualism in the sixth meditation and elsewhere in his writings, descartes tries to prove that his thinking mind and his extended body are distinct substances. With his theory on dualism descartes fired the opening shot for the battle between the traditional aristotelian science and the new science of rené descartes . A stop-motion video i made for rhetoric class assignment in this video, i try to explain descartes' theory of dualism in terms everyone can understand. In this episode, john and ken talk about dualism, a perennial movement in philosophy of mind when we think about our brains, it can be rather difficult to figure out how any of that brain activity can give rise to experience. Are we just physical things or perhaps just mental things maybe both in this video, alex byrne (mit) explains a modern argument due to saul kripke for mind-body dualism. Dualism arguments: pros & cons the popular form of substance dualism was adopted after the difficulties of cartesian dualism could not be overcome rene descartes stated that the nonphysical and the physical could not interact this became a problem in dualism since the nonphysical mind needed to interact with the physical body. The more modern versions of dualism have their origin in descartes' meditations, and in the debate that was consequent upon descartes' theory descartes was a substance dualist he believed that there were two kinds of substance: matter, of which the essential property is that it is spatially extended and mind, of which the essential property . Descartes' dualism confronting the conundrum of interaction implicit in his theory, descartes posited the existence of animal spirits somewhat subtler than . This part of descartes’s dualistic theory, known as interactionism, raises one of the chief problems faced by descartes: the question how this causal interaction is possible this problem gave rise to other varieties of dualism, such as occasionalism and some forms of parallelism that do not require direct causal interaction. Free essay: descartes' theory of substance dualism throughout the history of man, philosophers have tried to come up with an explanation of where our minds . Rene descartes and the legacy of mind/body dualism while the great philosophical distinction between mind and body in western thought can be traced to the greeks, it is to the seminal work of rené descartes (1596-1650) [see figure 1], french. René descartes described dualism as follows: the senses capture stimuli, which then reach the pineal gland in the brain from there, they act upon the mind from there, they act upon the mind dualism is the idea or theory that something (an object, an idea or the whole world) is split into two parts. Substance dualism (or cartesian dualism) argues that the mind is an independently existing substance - the mental does not have extension in space, and the material cannot think this is the type of dualism most famously defended by descartes , and it is compatible with most theologies which claim that immortal souls occupy an independent . Descartes & dualism writing the meditations on first philosophy, think is the strongest version of descartes’ argument for dualism in valid premise . For my homework i have to compare descartes view on dualism with the view of this man named paul bloom i understand paul bloom's theory clearly: he talks about how religion and the idea of dualism is natural because children are natural dualists. Substance dualism is a type of dualism most famously defended by rené descartes, which states that there are two kinds of foundation: mental and body this philosophy states that the mental can exist outside of the body, and the body cannot think.
0.7513
FineWeb
1,599
For as long as accuser and accused have faced each other in public, criminal trials have been establishing far more than who did what to whom-and in this fascinating book, Sadakat Kadri surveys four thousand years of courtroom drama. A brilliantly engaging writer, Kadri journeys from the silence of ancient Egypt's Hall of the Dead to the clamor of twenty-first-century Hollywood to show how emotion and fear have inspired Western notions of justice-and the extent to which they still riddle its trials today. He explains, for example, how the jury emerged in medieval England from trials by fire and water, in which validations of vengeance were presumed to be divinely supervised, and how delusions identical to those that once sent witches to the stake were revived as accusations of Satanic child abuse during the 1980s. Lifting the lid on a particularly bizarre niche of legal history, Kadri tells how European lawyers once prosecuted animals, objects, and corpses-and argues that the same instinctive urge to punish is still apparent when a child or mentally ill defendant is accused of sufficiently heinous crimes. But Kadri's history is about aspiration as well as ignorance. He shows how principles such as the right to silence and the right to confront witnesses, hallmarks of due process guaranteed by the U.S. Constitution, were derived from the Bible by twelfth-century monks. He tells of show trials from Tudor England to Stalin's Soviet Union, but contends that no-trials, in Guantanamo Bay and elsewhere, are just as repugnant to Western traditions of justice and fairness. With governments everywhere eroding legal protections in the name of an indefinite war on terror, Kadri'sanalysis could hardly be timelier. At once encyclopedic and entertaining, comprehensive and colorful, The Trial rewards curiosity and an appreciation of the absurd but tackles as well questions that are profound. Who has the right to judge, and why? What did past civilizations hope to achieve through scapegoats and sacrifices-and to what extent are defendants still made to bear the sins of society at large? Kadri addresses such themes through scores of meticulously researched stories, all told with the verve and wit that won him one of Britain's most prestigious travel-writing awards-and in doing so, he has created a masterpiece of popular history. eBook The Trial
0.6881
FineWeb
556
Add to Cart About the author: As the executive director and founder of Kidpower Teenpower Fullpower International, author Irene van der Zande has empowered thousands of parents and other caring adults around the world to take charge of the emotional and physical safety of their kids and other loved ones. As a child who was bullied long ago, Irene promised herself that she would never forget what it was like to feel so alone, sad, and scared. She believes passionately that kids have the right to be safe and the responsibility to respect the safety of others. She is committed to giving adults the tools they need to create cultures of caring, respect, and safety for everyone, everywhere. Irene established Kidpower as a nonprofit organization in 1989 in partnership with educators, parents, mental health experts, child safety specialists, law enforcement officials, and other caring adults. She has led the organization ever since. Instead of using fear to teach children about violence prevention, Kidpower makes it fun to learn to be safe.This is important because kids learn better when they're having fun. The Kidpower Positive Practice Method empowers kids with habits that build their awareness, confidence, and personal power, making them less likely to become victims of bullying, abduction, abuse and other types of physical or emotional violence. Operating in over 20 countries, Kidpower has reached over 2 million people of all ages through in-person workshops and events, publications tailored for different needs, on-line educational resources, videos, and long distance seminars and one-on-one coaching. To learn more, visit www.kidpower.org or contact [email protected] Bullying - What Adults Need to Know and Do to Keep Kids Safe Irene Van der Zande Protect kids from bullying and empower them with skills! Learn how to use Kidpower practices to create cultures of caring, respect, and safety at school, at home, and in your community. These vivid stories, entertaining examples, and clear step-by-step explanations of what to say and do are relevant for addressing bullying with all young people, from toddlers to teenagers, and are even useful in dealing with adult-to-adult bullying. According to best-selling author Gavin de Becker, "Kidpower has an exceptional track record in the field of personal safety and violence prevention." Readers gain a comprehensive understanding of how to use Kidpower's “People Safety” concepts and skills in their daily lives. To learn more about Kidpower's workshops, consultation, and other educational resources, visit www.kidpower.org. All income from books sales helps our nonprofit organization create and provide extensive free and affordable educational resources. - Publication Date: - May 17 2011 - 0979619165 / 9780979619168 - Page Count: - Binding Type: - US Trade Paper - Trim Size: - 8" x 10" - Black and White - Related Categories: - Education / Violence & Harassment
0.9436
FineWeb
698
Last month we discussed the importance of developing short-term and long-term recovery strategies. In this issue, we look at how to monitor how well your body is recovering from training. By recording a few simple measures in your training diary each day, you will gain insight into how your body responds to various training and lifestyle factors in order to help prevent over-training, illness and injury. You can improve your recovery and running performance by using this newfound knowledge to adjust your training program and fine-tune other aspects of your lifestyle. 1. Early morning heart rate: If your heart rate when you first wake up in the morning is more than five beats per minute higher than usual, you may be coming down with a bug or be overtired from training. In that case, it is wise to avoid hard training sessions for a few days. Check your waking heart rate for a week to determine what "normal" is for you. Your heart rate increases by about 10 beats per minute when you get out of bed, so check it as soon as you wake up (if possible, avoid using an alarm). 2. Quality and hours of sleep: To monitor your sleep patterns, rate the quality of your sleep each night on a scale from one to 10, and record how long you slept. A reduction in sleep quality often has a negative impact on running performance. Although reduced sleep quality is frequently associated with overtraining, it can also be caused by a variety of non-running stresses. The number of hours that you sleep is not particularly important for any one night, but over several nights a sleep deficit can impact your recovery and ability to adapt positively to training. 3. Weight: Check your weight several times per week, always at the same time of day. If you have a small decrease in weight for a couple of days, you are most likely dehydrated, which can easily be corrected. Weight loss over several weeks indicates that you are not eating enough calories for the amount of training you are doing, are overtraining, or have an illness. 4. Diet quality: A lack of energy can often be traced to poor food choices. In particular, low carbohydrate intake for a day or two can leave you feeling flat during training. Evaluate the overall quality of your diet each day on a scale from one to 10, and note any foods that you feel hindered your training. Rating the quality of your diet will remind you on a daily basis to select the right foods.
0.8774
FineWeb
523
A common issue with something aspirational and very hot off the press is that everybody seems to think they know it inside out, yet very few get to reach the depths of reality. Solar too, is a victim to this. The general thought process is that, we have seen the sun right from our birth and how much more could there be about it or for that matter, about generating electricity from it? Most of you would be aware of the process but let's have a look at some of the solar energy information and facts. It is fairly straightforward that solar energy falling onto solar panels is converted into electricity and is then transmitted through transmission lines, a bit like how conventional power generated is transmitted. It sounds really simple and easy. And perhaps, that is why, a lot of people think they know solar energy facts well, but there is more than what meets the eye. Not complicated stuff like a rocket lifting off, but a little more than what the next door neighbour would tell you. No wonder, there are several things that you hear about solar systems, that cannot be further away from the truth. While we have tried to cover most of these in the form of FAQs on our site, we still thought, we will pick up the most common thoughts and facts about the solar system, that get peddled around as truth but in reality, aren’t. We plan to do this in a series format, what you see here are five popular myths around solar busted, we will follow this up with another set, and so on. Myth: Solar Power is very expensive. Reality: Isn’t it like a paradox? Solar is supposed to be cheap, given how widely the energy from the sun is available, yet the perceived notion is that it is more expensive. However, the reality is distinctly different. Unlike the traditional power generation sources, the solar industry in general has seen rapid developments. Thanks to some brilliant engineering masterminds coming together, economies of scale and other market forces, over the last decade, the upfront cost of solar has seen a steep decline. The initial cost of installation has dropped by almost 75%, which is extremely significant. The technological advancement in general has not only made the components cheaper but also more efficient and reliable. This has resulted into solar power becoming cheaper for a lot of consumers, be it residential, commercial or industrial consumers. So to think, that solar is expensive, is well, a myth and nothing more. Take for example, a typical residential consumer in New Delhi who pays a monthly bill of Rs. 5000. The savings he racks up over 25 years goes to show that solar is anything but expensive. Myth: Solar systems are high maintenance. Reality: Solar systems are made in such a way, that there are no moving parts involved. And by the laws of physics, something that is not moving will experience less wear and tear and therefore likely to last longer. Generally speaking, grid-connected solar systems need almost negligible maintenance. 8 out of 10 users that we surveyed about their upkeep habits, across various segments, stated that they casually just wait around for the rain to perform the cleaning for them! This usually leads to about 5-7% reduction in the efficiency of the panels. We obviously would not advocate a completely reckless attitude to your investment. It would be a good practice to hose the panels off, once a month, as it helps in removing any unwanted materials that may have accumulated on them over a period of time. A cursory check on the panels for any visible spots or cracks could also help in ensuring that the generation is right and within the expected range. Myth: A Solar PV system doesn’t work at all in overcast conditions. Reality: The crux of this myth comes from the fact that power generated is directly related to sunlight, right? We would be more than glad to squash this misnomer. Solar panels work just fine under ambient light aka, cloudy or not so sunny conditions. Unlike shade, overcast conditions allow at least some sunlight to reach your system. The reduction in the amount of power generated under mildly overcast to heavily cloudy situations varies between 5-10% to 60-70% of the total output, respectively. Moreover, cloudy conditions lead to a dip in temperatures of the location in which the system is located, which is actually beneficial to the system as observed in some parts of the world. Germany, anyone? Myth: Solar PV only works in areas with very high temperatures. Reality: Contrary to popular belief, solar panels work at their efficient best when the temperatures are not too hot. The science behind this is fascinating and worth reading about. Sunlight comprises of photons, that carry the requisite energy required to start the photovoltaic or PV effect. These photons transfer this energy to the electrons in the solar panels, which constitute of the solar PV cells. The energised electrons move from a state of low energy to high energy. A solar cell is designed to extract these excited electrons and run them through a circuit to produce electricity. However, under extremely hot conditions, these electrons get more excited and vibrate faster than they would normally. As a result, these electrons bump into other atomic constituents of a solar cell, converting this extra energy into excessive heat. Hence, their ability to generate electricity is reduced and this has adverse effects on the output of the solar system. Myth: Manufacturing of a solar panel creates more greenhouse emissions than it saves in the future, which kind of offsets the benefits. Reality: This is an interesting one. Sure, it is true that carbon dioxide is emitted in the production of a solar panel to the tune of about 70 grams of carbon dioxide per kWh generated. However, these panels are “carbon negative”. In fact, it takes 2-3 years to generate as much power to compensate for the amount that was required to manufacture them, and they still have another 25 years to run! Add to the fact, during their lifetime solar panels still produce less than 30 times the carbon dioxide than what their fossil fuel counterparts do and you know you are looking at an environmental friendly solution. So therefore, pretty apt to state that while solar panels may consume resources when they are young, they grow up to be magnificent adults, that help keep our environment healthy and fresh. Which of the solar myths above that we busted did you once believe in? Or is there a myth that we perhaps have not covered and missed out on? Go ahead and share it with us in the section below or catch us up on Social Media, links to which are located in the footer. We would love to hear from you.
0.6253
FineWeb
1,427
Your blood, which carries nutrients, hormones, immune cells and oxygen throughout your body, also removes wastes and helps conserve and disperse heat. Blood components are meant to be used or disposed of rapidly, resulting in high cell turnover and also high nutritional requirements. Certain foods are especially high in blood-building nutrients. Iron-rich foods build strong blood by contributing to the formation of hemoglobin, which helps deliver oxygen to cells throughout your body. Iron deficiency is the most common nutritional deficiency in the world, affecting between 500 million and 2 billion people, according to the University of Chicago Department of Pediatrics. While iron from animal foods, known as heme iron, is more readily absorbed, non-heme, or plant-derived iron is also plentiful in many of your favorite foods, such as almonds, lentils, soy beans and oatmeal. Adult men and postmenopausal women should get 8 milligrams of iron per day, or 14 milligrams if you adhere to a strict vegetarian diet, and pre-menopausal women need about 18 milligrams per day, or 33 milligrams for strict vegetarians, according to the University of Illinois McKinley Health Center. To help absorb the most iron from your food, eat iron-containing foods along with foods high in vitamin C. Protein is necessary for antibody production and blood clotting, and the blood protein albumin is vital for transporting other molecules and maintaining proper fluid balance. Hemoglobin is a protein molecule, as are the many hormones that circulate throughout the body in the bloodstream. High-quality lean meats, fish and dairy products provide complete protein, containing all of the amino acids your body requires to manufacture the many proteins it produces. Protein is also plentiful in plant foods, such as grains, beans and legumes. Aim to consume about 0.4 grams of protein per pound of your body weight per day. Foods Low in Saturated Fat Foods that help decrease cholesterol levels help keep your blood and circulatory system healthy. For healthy blood opt for lean meats and low-fat dairy products and avoid fried foods and those made with trans fats. Trade saturated fats for unsaturated omega-3 fatty acids found in fish, olive oil and avocados. High-fiber foods also help keep your blood cholesterol levels down by binding to cholesterol in your intestinal tract and preventing it from being absorbed. Soluble fiber in whole grains, oats and beans are particularly helpful for lowering cholesterol, according to Harvard Health Publications. A diet low in refined sugars and processed carbohydrates can help keep your blood sugar levels within healthy limits. High blood sugar levels can lead to oxidation, which damages molecules and forms advanced glycation end products, which promote inflammation. When blood sugar levels are high excess sugar can attach to red blood cells, a product known as glycosylated hemoglobin, and damage them. The glycemic index is a scale that measures how quickly a carbohydrate food is digested and turned into sugar. Foods low on the glycemic index include fresh fruits and vegetables, beans, whole grains, low-fat dairy products and nuts.
0.878
FineWeb
694
The Standard Model is a quantum field theory... OK, we have a problem right here at the start. The Standard Model is just that: a model. But we'll let this go, since it's just semantics and such language is common usage. ...in which particles behave as mathematical points... OK, this one is a bigger problem. What does he mean by point? How are Strings background independent if particles have no meaning independent of classical points? Somehow I don't think Polchinski is thinking of functors between toposes when he uses the word point. Smolin presents the rise and fall of string theory as a morality play... But this story, however grippingly told, is more a work of drama than of history. Yes, this is quite true, but it isn't really surprising for a String theorist to think so. And why do they all keep going on about this vacuum energy idea? The review then moves on to background independence. No wonder these guys can't stop arguing about this. Both sides think their ideas are more background independent than the other. So long as spin foams ignores things like AdS/CFT and T-duality they cannot possibly be talking about gravity, and on the other hand, as mentioned above, particles may be localised but a point is not just some piece of classical moduli. If one is willing to dive head first into Derived Categories it is difficult to understand why this is not understood. Sigh. New physical theories are often discovered using a mathematical language that is not the most suitable for them. Hang on a minute! What theory? I don't see any theory. Some nice maths, sure. But when you talk about T-duality there is never any discussion of Machian principles or experimental evidence for them. If I've missed such papers, please direct me to them! Ahh, wait a minute. They call it the Holographic Principle. Nice idea, but we don't actually get any physics from the way it is formulated. Again, if I'm wrong about this, please tell me! Extending this principle to spaces with the edges free will require a major new insight. Er, like a new Machian principle maybe? Would it be a problem if we threw out the Stringy particle zoo? It is possible that the solution to this problem already exists among the alternative approaches that Smolin favors. Er, well, no. That's not to say that it does not exist. Later on, the review sinks back into a discussion on Dark Energy.
0.5243
FineWeb
560
This study is about non-Hodgkin's lymphoma in HIV patients. Some still get a rare form of it even after treatment. Also talks about Epstein-Barr involvment. Not good news if we do have a retrovirus. But XMRV may be quite different from HIV of course. http://www.medscape.com/viewarticle/712732?src=mp&spon=17&uac=122598SZ Abstract Objective: Despite effective treatment of HIV infection, some patients still develop non-Hodgkin lymphoma (NHL). We analysed patients with HIV-associated NHL and undetectable plasma HIV-RNA, according to the duration of HIV suppression. Methods: Out of 388 patients included in a prospective cohort of HIV-associated NHL from 1996 to 2008, 128 (33%) had a plasma HIV-RNA below 500 copies/ml and were included in the study. Patients with long-term HIV suppression (>18 months) were compared with patients with recent HIV suppression (≤18 months). Results: All patients but three were treated with combination antiretroviral therapy, with a median duration of 2.2 years. The median duration of HIV suppression was 10.1 months. Most cases (65%) occurred within 18 months following HIV suppression. In the more than 18 months group, patients developed NHL at a higher CD4 cell count than patients with 18 months or less of HIV suppression (359 versus 270 cells/μl, P = 0.02). None of the NHL characteristics were different between the two groups. Outcome was similar in the two groups (complete remission, 64 versus 72.5%; P = 0.35 and 3-year survival, 46 versus 56%; P = 0.08). In addition, 52% of the tumours were Epstein-Barr virus or human herpesvirus 8 associated, without any difference in the proportion of virus-associated tumours according to the duration of HIV suppression. Conclusion: In patients with undetectable HIV-RNA, NHL occurred mainly within the first 18 months following HIV suppression. In patients developing NHL after long-term HIV suppression, the level of CD4 cell count was higher, but the association with Epstein-Barr virus or human herpesvirus 8 and the prognosis were similar to that observed in patients with recent HIV suppression.
0.5642
FineWeb
585
Kindness Challenge Day 12: Forgive Someone This is Day 12 of the 14-Day Kindness Challenge for Nov 2012 where hundreds of participants from around the world get together in spirit to do 14 acts of kindness over 14 days. The challenge is now over, but you can still do the tasks in your own time. Visit the overview page for all Kindness Challenge tasks and posts. Hello everyone! Welcome to Day 12 of the 14-Day Kindness Challenge! 11 Tasks so Far, and Two More Days To Go!! Do the tasks which you have not completed yet and be sure to share your progress in the comments section! - Day 0: Get at least ONE Friend / Family Member to Join the Challenge! | 31 Comments - Day 1: Give a Hug to Everyone You See! | 89 Comments - Day 2: Give Up Your Seat To Someone | 46 Comments - Day 3: Write 3 Thank-You Notes to 3 People You Appreciate | 51 Comments - Day 4: Sign Up For Volunteer Work (On Top of Whatever You Have Been Doing) | 54 Comments - Day 5: Give a Genuine Compliment to at Least 3 People | 38 Comments - Day 6: Talk to Someone You Don’t Normally Talk To | 48 Comments - Day 7: Make a Donation | 46 Comments - Day 8: Pick Up Litter | 34 Comments - Day 9: Write a Letter to Someone Who Has Made a Difference in Your Life | 35 Comments - Day 10: Send Flowers to Someone | 21 Comments - Day 11: Be Kind to Someone You Dislike | 2 Comment Day 12: Forgiveness What is forgiveness? It means “to grant pardon for or remission of (an offense, debt, etc.)” and “to cease to feel resentment against”. I’m no saint. There are some people whom I feel harbor negative sentiments towards. It’s not common, but it happens. Usually it’s because they violated some of my personal values. For example, when this somewhat prominent speaker in the training circuit tried to befriend me several years ago to get a business contact. I saw through the ruse later on and was disgusted by the way he would use friendships to further his business objective. I later learned from fellow trainers that this person had a reputation for such antics. The reason why I was so disgusted by this person was because his approach violated my personal value of authenticity, which is about being upfront and sincere with your communication. Another example is this “friend” whom I mentioned in part 2 of my anger series. She was unruly in the way she handled the conflict and displayed an extremely ugly side of her persona during the argument. I could not help but feel hurt by how callous she had been in the final moments of the friendship, before I realized that this is not a person I would ever want to communicate with anymore. Like me, I’m sure you have people whom you harbor resentment towards. People whom you feel aggrieved by. Well, today’s task is about forgiveness. Part of kindness is about forgiving other people, even when it doesn’t seem like there is a reason to do so. I have deliberately scheduled this task for Day 12 as it is mentally more “challenging” than a task like say, hugging, giving a compliment, or picking up litter. I’m ready to take up the challenge and forgive the people I just mentioned above (plus more). Are you? Your Task: Forgive Someone Level 1: Forgive one person - Identify a person whom you resent or bear grievances towards. The grievance can be over one small action he/she did or something serious (such as breaking a promise or cheating on you). - Why do you bear grievances towards him/her? Write down the reasons on a piece of paper, for your personal reflection. - Work on letting go of these grievances today. Level 2: Forgive at least three people Do the exercise above to at least three people. The more people you can forgive today, the better. I’m planning to identify more people (on top of the three people I have mentioned) to forgive later today. Remember that Forgiving Others = Forgiving Yourself There are some pretty amazing forgiveness quotes at PE Quotes which I’d like to invite you to check out: Forgiveness Quotes One of my favorite ones: Isn’t that true? Here’s another one: (For those of you who own Be a Better Me in 30 Days Program, check out Day 25: Forgive Yourself while you’re at it. The task is about forgiving yourself (which I see as interrelated with forgiving others) and includes a step-by-step exercise on how you can go about doing it. Many participants achieve breakthroughs when doing that exercise.) Share Your Results! How many people have you forgiven today? Who are they and what did you used to resent them for? How have you forgiven them? Check out the responses of other participants in the comments section! After you are done, proceed to Day 13: Give Someone a Treat! Image: Gabriela Camerotti Tags: challenge, forgiveness, kindness, kindness challenge, values
0.6177
FineWeb
1,282
Doctor of Philosophy (PhD) Thermal barrier coatings (TBCs) are used gas turbine engines. The current material of choice (YSZ) degrades when it contacts with impurities arise from low quality fuels such vanadium and sulfur. YSZ cannot be used in temperature higher than 900˚C. Higher efficiency and performance of gas turbine engines will require a new generation of thermal barrier coatings (TBCs). In current work, hot corrosion behavior of new candidates including Gd2Zr2O7, ZrO2 stabilized with Ta2O5, zirconia stabilized with both Ta2O5 and Y2O3 and zirconia stabilized with CeO2 and TiO2 is investigated. For YSZ case, the reaction between NaVO3 and Y2O3 produces YVO4 and leads to the transformation of tetragonal ZrO2 to monoclinic ZrO2. Comparing to YSZ, under a temperature of 1050 °C, Gd2Zr2O7 is found to be more stable, both thermally and chemically, than YSZ, and exhibits a better hot corrosion resistance. To examine the effect of stabilizing zirconia with tantalum oxide, different compositions of ZrO2-Ta2O5 samples in the presence of molten mixture of Na2SO4 + V2O5 at 1100˚C were tested. Hot corrosion results show that orthorhombic zirconium-tantalum oxide is more stable, both thermally and chemically in Na2SO4+V2O5 media at 1100˚C, and shows a better hot corrosion resistance than the tetragonal phase. When zirconia stabilized with yttria and tantalum oxide (TaYSZ sample), minor amounts of NaTaO3, TaVO5 and Ta9VO25 are formed as the hot corrosion products with only traceable amounts of YVO4. Due to the synergic effect of doping of zirconia with both Y2O3 and Ta2O5, the TaYSZ sample has a much better hot corrosion resistance than YSZ. In zirconia stabilized with CeO2 coating, the formation of CeVO4 crystals possibly postponed the formation of YVO4 and transformation of tetragonal zirconia to monoclinic. On surface of zirconia stabilized with TiO2 coating, TiVO4 crystals are significantly smaller (about 5µm in length) than the large plate shaped YVO4 and CeVO4 found on the YSZ and CSZ samples. TiSZ coating was found to have a better hot corrosion resistance at a temperature of 1050˚C than both YSZ and CSZ coatings. Document Availability at the Time of Submission Release the entire work immediately for access worldwide. Habibi, Mohammad Hamed, "Hot corrosion behaviour of new candidates for thermal barrier coatings application in turbine simulated environments" (2014). LSU Doctoral Dissertations. 301.
0.782
FineWeb
726
The processes of population growth are changing in most developing countries as birth and death rates fall in the early 1950s, practically all developing countries had birth rates over 40 and death rates over 20, the major exception being the low death rates in latin america. Country findings in order to help understand the processes related to changing patterns of urban growth in developing countries population growth and the . The problem is that the population pressure which forced the west to develop has dampen enthusiasm to develop in the developing countries bcos we are content with enjoying the fruits of their development population pressure no longer forces us to invent automobiles bcos there are too many cars in existence, even though ebola outbreak is an . Asia pacific middle east driven by growth in developing countries “the concentration of population growth in the poorest countries presents its own set of . Population growth: facing the challenge the challenge posed by population changes in developing countries will be quite different asian and pacific migration . Rapid population growth in developing countries is because of several factors: limited access to family planning, religious beliefs, soperstitions, etc, but the main reason for the increase is lack of money by the population as a whole. Get the facts about poverty and population growth statistics around the world get the facts about population issues in developing countries and how they affect . In less developed countries, lack of access to birth control, as well as cultural traditions that encourage women to stay home and have babies, lead to rapid population growth the result is ever increasing numbers of poor people across africa, the middle east, southeast asia, and elsewhere who suffer from malnourishment , lack of clean water . Gross domestic product of emerging and developing asia 2022 population growth from 2007 to 2017 asian countries with the highest youth literacy rates 2015. The population of the world has now surpassed 7 billion people, and it continues to increase at a quick rate growth rates tend to vary from considerably from country to country, with developing countries generally experiencing higher rates of growth despite lower accessibility to financial resources. Human population growth study population growth in developing countries is increasing 15 times faster than developed countries south america and asia. Figure 2--causes of population growth in developing countries 3 a sizable population group is about to reach childbearing age two asian countries that . “the growth in africa’s working-age population will be relentless and inevitable,” said punam chuhan-pole, acting chief economist for the world bank africa region “the good news is that with the right policies and actions today, countries can accelerate the region’s transition to smaller families, healthier and better-educated youth . Today many developing countries are concerned about population-related challenges, which have a strong impact on social, cultural and economic development of human society africa is no exception the growth of population in africa is a key factor that lies at the root of many population-related challenges. If projections hold true, future global population growth will be heavily concentrated in latin america, africa and south asia carl haub is senior demographer at the washington-based population . The population changes are causing growing alarm among experts, who believe sustained growth in developing countries can only be managed with economic help from rich countries. Asia has been experiencing very high population growth and urbanization asian waste management in asian countries and certain developing asian countries face . Economic growth in developing countries (see, for example birdsall and sinding (2001), barro and sala-i-martin (2004), sachs (2008), and headey and hodge (2009)) the recent experience of fertility decline in developing countries in asia and latin. Especially in asian developing countries, where the population growth is developing more and more drastically, the economic growth therefore also changes critically over periods up to now, the debates about whether population growth is beneficial or detrimental to economic growth still have been discussed. Growth in developing countries, made in the 1970s, have been reasonably accurate, and if not, why despite being accompanied by advice to interpret urban population projec-. Graph and download economic data from 1961 to 2017 about central asia, europe, population, and rate population growth for developing countries in europe and central . We will write a custom essay sample on population growth in developing countries developing countries population growth developing countries in the asia . Effects of population growth on the economic development of developing countries richard a easterlin the annals of the american academy of political and social science 2016 369 : 1 , 98-108. The many agriculture-dependent developing countries, adopt more efficient and global agriculture towards 2050 population growth africa and south asia. Especially in asian developing countries, where the population growth is developing more and more drastically, the economic growth therefore also changes critically over periods. Graph and download economic data from 1961 to 2016 about east asia, pacific, population, and rate. The predominance of the chinese population in east asia means that this region has experienced the most dramatic declines in population growth of any of the developing regions over the same period population growth rates have declined only modestly—and in some cases have actually risen—in other developing regions.
0.9878
FineWeb
1,195
Plants perennial, acaulescent or caulescent, sometimes subscapose, sometimes arborescent, usually branching extensively, from woody, subterranean or aboveground caudices, or single stems. Leaves sessile, in rosettes on caudices or at branch ends; blade linear-lanceolate, expanded basally, usually rigid, occasionally fleshy, margins entire or denticulate, often filiferous and separating into elongated fibers, corneous, apex mostly sharp-pointed. Scape, when present, usually less than 2.5 cm diam. Inflorescences erect or rarely pendent, paniculate or racemose, sometimes paniculate proximally and racemose distally, bracteate, occasionally pubescent; bracts ascending, erect, or rarely reflexed; peduncle sometimes scapelike, sometimes extending beyond leaves, sometimes pubescent. Flowers bisexual; perianth campanulate or globose; tepals 6, similar, fleshy, distinct to or connate at base, whitish to cream or tinged slightly with green or purple, occasionally pubescent; stamens 6; filaments flattened, as wide as anthers, smooth, papillose, or granular, fleshy; pistil obovoid or oblong-cylindrical; ovary superior, usually green, 3-locular or 6-locular with false septa, 6-lobed; style white to dark green, often thick; stigmas usually 3, sometimes 1 and subcapitate, white to pale green, 1-2 mm. Fruits erect or pendent, capsular or baccate. Seeds many per locule, usually black, occasionally gray, flattened, round, rarely obovate or ovate. x = 25, 30. W. Trelease (1902) recognized Hesperoyucca, Clistoyucca, and Samuela as segregates from, but closely related to, Yucca. S. D. McKelvey (1938-1947) returned them to Yucca, recognizing sections Hesperoyucca and Clistoyucca, and placing Samuela in section Sarcocarpa. However, McKelvey indicated that there is ample justification for recognizing Hesperoyucca at genus level, 'since a number of flower and fruit characters differ from those in all other sections.' Recent DNA evidence provides strong support for separate recognition of Hesperoyucca (M. A. Hanson 1993; D. J. Bogler 1994; D. J. Bogler and B. B. Simpson 1995, 1996; K. H. Clary 1997). Clary´s data indicate that it is more closely related to Hesperaloe than to Yucca, and that Clistoyucca and Samuela should be retained in Yucca. Yuccas are often cultivated in many places in the United States, particularly in the south. They are not easily identified, particularly in herbarium specimens, and collectors should be certain to record information about the habits and sizes of plants, and the colors of ovaries, styles, and stigmas. If possible, field photographs of the pistil and stamens should accompany the specimens.
0.6801
FineWeb
796
As for the UVIS channel (see Section 5.2), the IR channel flat-field reference files currently in use in the WFC3 calibration pipeline were created at the Goddard Space Flight Center under thermal vacuum conditions using an external illumination source. These flat fields take into account the pixel-to-pixel variations in QE (P-flats). Low-frequency variations in the illumination pattern, however, are present in these flats. These variations can be removed using L-flat corrections, which have been derived from in-flight dithered observations of the globular cluster Omega Centauri. During spring 2008, flat-field images for the IR channel were produced in the laboratory (see WFC3 ISR 2008-28 ) during the third and last thermal vacuum campaign (TV3) using the CASTLE Optical Stimulus (OS) system. The CASTLE is an HST simulator designed to deliver an OTA-like external beam to WFC3. It can provide either point-source and flat-field illumination in either monochromatic or broadband mode. During TV3, CASTLE flat fields were acquired using the SPARS10 sample sequence for the readout mode, with varying numbers of readouts (samples) per exposure, chosen to obtain a signal of about 60,000 electrons per pixel in the final read. Flat fields with the OS tungsten lamp were taken with the detector at its nominal operating temperature. The flats are normalized to 1.0 over the image section [101:900,101:900], which excludes areas of the detector known to contain anomalies, such as the “Death Star” and the “Wagon Wheel”. The large-scale uniformity of the IR channel detector response, as provided by the TV3 ground-based flats, has been improved in-flight by using multiple pointing dithered patterns of the globular cluster Omega Centauri. By placing the same group of stars over different portions of the detector and measuring relative changes in brightness, low frequency spatial variations in the response of the detector have been measured. Average photometric errors of +/-1.5% have been found in the original IR ground-based flat fields (see WFC3 ISR 2009-39 ). The derived L-flats are based on a 3rd-order polynomial fit and are shown in Figure 6.7 , where white indicates that the photometry produced using the ground-based flats is too faint with respect to the true stellar magnitude, and black indicates that the photometry is too bright. L-flats were determined from in-flight observations using filters F098M, F110W, F125W, F139M, and F160W. The L-flat correction for the remaining filters was derived by using a linear interpolation as a function of wavelength. The pivot wavelength of each filter was used for the interpolation, where the resulting L-flat is equal to the weighted average of the L-flat for the two filters nearest in wavelength. For a discussion of the mathematical algorithm used to derive the L-flats, refer to ACS ISR 03-10 The L-flat calibration program revisited the same target three times during Cycle 17, so that observations are obtained at three different orientations due to the roll of the telescope. Differential photometry of stars falling on different portions of the detector as the telescope rolls provides an independent test of the absolute sensitivity dependence with time for the full suite of the IR channel filters. Initial testing indicates that the photometric response for a given star is now the same to ~1% for any position in the field of view for filters which were observed during the in-flight L-flat campaign. Further observations of Omega Centauri are planned for Cycle 18. Once the analysis of additional stellar observations is complete, new flat fields will be delivered to the pipeline and the errors are expected to be reduced to <1%. At this time the calibration pipeline is using the ground-based P-flats only. The derived L-flat corrections have been multiplied into the corresponding P-flats, to produce corrected hybrid LP-flats. The resulting LP-flats are available on the WFC3 Web site for downloading: shows the corrected IR channel ground-based flats for several broadband filters. The 18 small dark spots (“IR blobs”) across the IR field of view are regions of lower sensitivity (by about 10-15%, see WFC3 ISR 2010-06 ). The blobs are physically located on the Channel Select Mechanism (CSM) mirror. The blobs are small, with a radii of about 10-15 pixels, and affect about 1.2% of the IR pixels. Because of geometric distortion effects, the area of the sky seen by a given pixel is not constant; therefore, observations of a constant surface brightness object will have count rates per pixel that vary over the detector, even if every pixel has the same sensitivity. In order to produce images that appear uniform for uniform illumination, the observed flat fields include the effect of the variable pixel area across the field. A consequence of dividing by these flat fields is that two stars of equal brightness do not have the same total counts after the flat-fielding step. Thus, point source photometry extracted from a flat-fielded image must be multiplied by the effective pixel area map (see Section 7.2.3 ). This correction is accounted for in pipeline processing by MultiDrizzle (see Section 4.2 ), which uses the geometric distortion solution to correct all pixels to equal areas. In the drizzled images, photometry is correct for both point and extended sources. Observations of the bright Earth will be acquired during Cycle 18 to provide a uniform flat-field source for the complete OTA optical complement and incorporate both the low frequency L-flat and the high frequency pixel-to-pixel P-flat response. The numerous survey programs that the IR channel is executing are being used to build high signal-to-noise sky flats. These data consist mostly of sparsely populated images with relatively uniform sky that can be stacked to further quantify the low frequency and high frequency flat-filed components. To summarize, the pipeline flats were created by correcting the pixel-to-pixel flats by low-frequency corrections derived from dithered stellar observations. For the most used modes, the flats are accurate to better than 1% across the detector. Additional verification of the IR pipeline flats will be provided by earth flats, confirming also the derived L-flats and setting limits to their dependence on the color of the source spectrum. On-orbit monitoring of the IR flat field response is done using an internal flat-field lamp. The only flat fields obtained using an external source were obtained during the ground testing of the instrument. Neither of these two types of flat fields are true observations of the illumination of the IR detector in real operating conditions, where the instrument is being operated in orbit and the incoming light propagates through the entire optical system consisting of HST and WFC3. One commonly used method to obtain realistic flat fields consists of observing a large uniform source that is external to the observatory. In our case, we currently do not have the ability to do this, while we are investigating using observing the Earth bright limb for this purpose, and we have instead assembled “super sky” type flat fields. These were generated by combining WFC3-IR observations of sparse fields after masking out astronomical sources. We have so far been able to assemble relatively high signal to noise Sky flats for both the F125W and F160W filters. The F160W sky flat is shown in Figure 6.9 . The sky flats show a +/- 3% field variation of the flat field that is currently uncorrected by the current ground based pipeline flat fields. Both the F125W and the F160W IR Sky Flat have larger pixel to pixel variation than the current pipeline flat fields, which is a direct consequence of their lower signal-to-noise levels but both show the identical large scale structure. The F125W and the F160W sky flats differ by less than 1%, indicative that this correction may not have a large color component. Sky Flats will continue to be assembled as more WFC3-IR data becomes available and will be made available to users wishing to use them.
0.8158
FineWeb
1,902
A new feature in Microsoft Expression Design 2 lets you create sections, or slices, of objects in your document. Slices let you export a part of your artwork instead of the whole piece. For example, if you use Expression Design 2 to create a mockup of a user interface for an application, you can slice up each part of the user interface and export the parts as XAML files that will be converted into user controls in Microsoft Expression Blend 2. As another example, you can create multiple slices that display the same parts of your artwork, but configure different export properties on each slice to export the artwork in multiple file formats (.png, XAML, and so on). Each slice includes all objects, layers, and live effects in the slice area, but you can decide to hide any one of these in the slice. For more information, see Create or delete a slice. Slices appear as layers under Slice Layer in the Layers panel. When you select a slice, you can view the slice properties under Edit Slice in the Properties panel. The properties specify the settings that are used when you export or copy the slice. For more information, see Modify slice properties. Under Slice Layer in the Layers panel, make sure that the slice is visible and unlocked . Otherwise, you will not be able to select or modify the slice. If a slice is hidden, click the Toggle Visibility button. If the slice is locked, click the Toggle Lock button. You can perform many of the same operations on slices as you can on layers. For example, you can hide slice boundary lines when you want to continue to work with the objects on the artboard. Additionally, you can copy slice properties, or use the Select Slice Contents command to select both the slice and its contents for pasting to other documents. For more information, see Move, cut, or copy a slice. When you add an object to the artboard, if all or a part of the object is within the boundary of an existing slice, the slice is automatically updated. Slices are also automatically updated when you delete objects from the artboard. Additionally, you can resize the slice boundaries automatically to fit content. As an alternative to adding and deleting from the artboard, however, you can just hide layers in a slice. For more information, see Change what appears in a slice. When you create, move, or resize a slice, you can turn on snapping so that the boundary lines of your slice snap to (or pull towards) existing slice boundary lines. This is useful if you are trying to create slices of your artwork that cover every pixel without any space between the slices. For example, if your artwork represents a user interface where the position of the objects must stay the same when the sliced objects are imported into a program such as Expression Blend 2, slice snapping makes sure that you create slices around those objects that account for every pixel. For more information, see Slice snapping. Slices let you export your artwork in organized pieces, and in various file formats. Additionally, you can copy slices from the Expression Design 2 workspace and paste them into another open document or another program such as Expression Blend 2, Microsoft Word, or Microsoft Paint. For more information, see Copy a slice to another program and Export a slice. A common problem is that objects are often stacked on top of one another in a manner that makes it difficult to use traditional slicing techniques. In Expression Design 2 you can choose specific objects within a slice for export. For example, if you don't want the background for a particular slice exported, just turn off the background for that specific slice. For more information, see Export a slice.
0.8366
FineWeb
778
Private tuition equips, assists and supports students. Student-centred focus brings out the best in abilities and guarantees success. - why eastuition - how eastuition can help - what to expect with eastuition - Fees & Booking - Terms and Conditions No matter how capable students are, sometimes they need more guidance and individual support than either a schoolteacher or an evening class can offer. eastuition has an outstanding track record in boosting confidence, raising achievement and improving grades in English (Language and Literature), Maths and Spanish. With term-time Tuition Programmes of four weekly sessions and support in between, or holiday programmes that suit all schedules, skills are refined and confidence grows. Once students are empowered by their own progress, potential’s limitless. One-to-one study with eastuition gives all students the chance to address academic needs, confront weaker areas and practise key skills without distractions. Every session is devoted to, and guided by, the student’s individual needs, enabling deeper understanding and accelerated progress. When a student feels acknowledged as an individual, they are empowered to reach further than they thought possible, and their confidence rockets. One-to-one tuition ensures students get to the bottom of what’s holding them back so they can reach their goals. If individual focus isn’t your thing, eastuition recommends the Study Buddy Scheme as a way to make progress and boost confidence amongst friends. In groups of two, three or four, learning becomes collaborative and teamwork bolsters skills. When you study with your buddies your individual goals become group goals too, meaning you get actively involved in everyone’s learning. And it’s when you’re actively involved that the real magic happens. - Sessions tailored to individual needs of each student - Analysis of individual learning preferences and objectives - Activities geared to learning strengths - Close study and targeted practice in-line with exam board specifications - Feedback and open dialogue - Targets matched to individual goals - Tasks for the time between sessions - Rapid progress - Increased confidence - Email support between sessions - With certain packages, essay videos are also included* * please note, that on the Study Buddy discount scheme task evaluations are only included on the Deluxe Term-time Programmes or Succeed Holiday Programmes. Tuition is provided in two ways: Term-time Tuition Programmes give academic support to individuals or small groups: Click here Holiday Programmes boost learning and maintain momentum: Click here Study Buddy discounts are available for groups of 2-4 students: Click here To make an appointment to discuss your needs and goals, call us on 01728 621 217, click here to send a message, or email [email protected]. Click here to download a copy of the Terms and Conditions.
0.7171
FineWeb
640
Perbedaan texs Explanation & Procedure Text Explanation (Penjelasan)Ciri Umum: a. Tujuan Komunikatif Teks: b. Struktur Teks: · Penjelasan umum;(A general statement) · Penjelasan proses;( A sequenced explanation of why or how something occurs) c. Ciri Kebahasaan menggunakan : · general dan abstract nouns, misalnya word chopping, earthquakes; · action verbs; · simple present tense; · passive voice; · conjunctions of time dan cause; · noun phrase, misalnya the large cloud; · abstract nouns, misalnya the temperature; · adverbial phrases; · complex sentences; · bahasa teksni; contoh text explanation : How Earthquakes Happen Earthquake is one of the most destroying natural disasters. Unluckily it often happens in several regions. Recently a horrible earthquake has shaken West Sumatra. It has brought great damages. Why did it occur? Do you know how an earthquake happens? Earthquakes are usually caused when rock underground suddenly breaks along a fault. This sudden release of energy causes the seismic waves. It make the ground shake. When two blocks of rock or two plates are rubbing against each other, they stick a little. They don't just slide smoothly. The rocks are still pushing against each other, but not moving. After a while, the rocks break because of all the pressure that's built up. When the rocks break, the earthquake occurs. During the earthquake and afterward, the plates or blocks of rock start moving, and they continue to move until they get stuck again. The spot underground where the rock breaks is called the focus of the earthquake. The place right above the focus is called the epicenter of the earthquake. ProcedureProcedure/Procedural Text, Teks Prosedur, adalah teks yang berisi prosedur, instruksi, proses, cara, atau langkah-langkah dalam membuat/melakukan (mengoperasikan) sesuatu. Ciri-ciri Procedure Text: 1. Struktur umumnya (generic structure) terdiri dari: Goal/Aim: tujuan dan maksud isi teks. Contoh: How to make sandwich… Material/Tool: bahan atau alat-alat yang dibutuhkan untuk membuat/melakukan sesuatu. Contoh: The materials are as follows: 1. Two slides of bread, 2. Fried-egg, strawberry jam, chocolate sprinkles, …. Steps/Procedures: langkah-langkah atau prosedur dalam melakukan/membuat sesuatu. Contoh: First, take two slides of bread and … 2. Menggunakan tenses “simple present” 3. Sering memakai kalimat Perintah (imperatives/orders). Contoh: Turn on the lamp, Put the rice into the rice cooker, Don’t forget to press the ‘on’ button, … 4. Kata-kata urutan (sequences). Contoh: first, second, then, next, the last, finally… Contoh Procedure Text : Boiling egg in simple and easy way Eggs are a rich source of protein and vitamins and are generally healthy to eat, unless you have a high cholesterol level. You can eat eggs raw, boiled or cooked in a pan as scrambled eggs or an omelet. Boiling eggs is one of the easiest ways to prepare them. Follow the steps! First of all, place the raw egg in a saucepan! Second, Run cold water into the saucepan until the water is 1 inch above the egg. After that, Place the saucepan on a stove and cook over medium heat until the water begins to boil. The next, don't forget to reduce the heat to low Then, Simmer for 2 to 3 minutes for soft-boiled eggs or 10 to 15 minutes for hard-boiled eggs. Finally, Remove the egg with a spoon or ladle and let it cool slowly, or run cold water over it to cool it more quickly.
0.9915
FineWeb
1,024
Flu season is here, and it's not too late to start protecting yourself and your family against it. Here's how you can avoid the flu this year. Get the flu vaccine Experts agree that getting the flu shot is the single best way to reduce the risk of getting the flu and lessen the severity of the illness. Health experts recommend that almost everyone age 6 months or older receive a flu vaccine, preferably in the fall before the start of the season. The sooner the better: according to the CDC, the vaccine takes about two weeks for immune protection to develop. Kids need the flu shot — not nasal spray In recent years, as many as one-third of kids ages 2 through 17 received a nasal spray vaccine. But a panel of the Centers for Disease Control and Prevention recently warned that the vaccine should not be used during the 2017 flu season. Studies show that the nasal spray vaccine was not as effective last season in preventing flu compared to the traditional shot. No one knows why the nasal vaccine was not as effective last year, says Dr. Shruti K. Gohil, a UC Irvine Health infectious disease specialist. It could be that the nasal vaccine was less effective against the predominant flu strain last season, H1N1. This year kids will need to roll up their sleeves, too. But the benefits of vaccination far outweigh the risks. 6 more ways to prevent the flu There are other important ways to curb your risk of getting sick, according to the Centers for Disease Control and Prevention, including: - Avoid close contact with people who are sick. - Wash your hands often. If soap and water are not available, use an alcohol-based hand rub. - Avoid touching your eyes, nose or mouth. - Clean and disinfect frequently touched surfaces at home, work or school, especially when someone is ill. - Make sure your workplace has an adequate supply of tissues, soap, paper towels and alcohol-based hand rubs. - Get plenty of sleep, be physically active, manage your stress, drink plenty of fluids and eat nutritious food. Know the flu symptoms The flu usually comes on suddenly, and most sufferers feel some or all of these symptoms: - Sore throat - Runny nose - Muscle or body aches - Vomiting and diarrhea (more common in children) If you are experiencing mild to moderate flu symptoms, consider visiting a UC Irvine Health urgent care clinic or walk-in clinic. Need a flu shot? It's not too late to get vaccinated. UC Irvine Health has several locations where you can get a flu shot, including a walk-in care clinic. Find a flu shot location near you ›
0.6261
FineWeb
610
After the end of the Cold War some 30 years ago, public debate and understanding of the enormous scale of impact of nuclear war fell to very low levels. This has changed with recent nuclear weapons tests and missile firings by North Korea. In this article I explain why the threat of nuclear war may now be higher than it has ever been and why we should all be aware of the latest scientific studies of the impacts of nuclear weapons. Two nuclear war scenarios There are approximately 14,900 nuclear weapons ready to fire or in stockpiles. 13,800 are deployed by the USA and Russia, while the remaining 1,100 are deployed by China, the UK, France, India, Pakistan and Israel. North Korea may have a handful of weapons. Based a range of published or leaked nuclear war plans and statements by political leaders, there are two key types of nuclear war to consider. The first is a global nuclear war involving the US and Russia. In this scenario at least 1800 large warheads, or more likely over 3000, would be fired at nuclear weapon launch sites, command centres, ports, major industry, power stations and major centres of population. This is a large number of warheads and most cities, particularly state or regional capitals, would be struck by several nuclear weapons. The other main scenario is a ‘regional conflict’, for example between India and Pakistan. In this case at least 100 smaller nuclear weapons would be used out of stockpiles of around 200 weapons striking mainly large densely populated super cities such as Delhi and Karachi. A North Korea – US scenario could be similar but with fewer but larger warheads being used. SUBSCRIBE AND FOLLOW TECH Everyone understands that any such conflict would cause unprecedented levels of deaths and suffering, but what is not well understood is just how vulnerable modern society is. On top of this, the most up to date scientific studies predict serious and long lasting global climate impacts leading to widespread crop failure and famine. The increased risk of nuclear war Since the Cold War, both the US and Russia have kept 1800 warheads ready to launch within minutes as soon as a potential nuclear attack is detected. This nuclear hair trigger is intended to prevent a nuclear first strike by ensuring that weapons will be launched before they are themselves destroyed. But this policy has brought the world very close to a nuclear war several times in past years when equipment faults and innocent signals were thought to be nuclear attacks in progress and launches were only countermanded at the last minute. Now, nuclear commanders warn this risk is even higher due to continued cyber-attacks. Many argue that weapons should not be kept ready to fire at short notice as a nuclear response would always be possible. The vulnerability of society to nuclear attack The use of a nuclear warhead causes a series of severe impacts: Intense nuclear radiation and a blinding flash of light much brighter than the sun; a fierce fireball lasting several seconds; an intense blast wave; minutes or hours later, large-scale deposition of radioactive particles as fallout. Survivors of the bombs dropped over Japan at the end of World War 2 speak of a bright sunlit day plunged into darkness as black oily rain fell. Dead figures, charred black still standing. Burned and terminally injured survivors, their skin hanging off; eyes and other internal organs hanging out of their bodies. Cars and vehicles tossed like toys, strong structures reduced to piles of rubble. Huge fires. Use of a nuclear weapon today would be much worse for two reasons: a typical modern nuclear weapon is now 8 to 80 times larger; modern society is much more reliant on vulnerable information technology and long distance supply routes for food and fuel. Modern society is heavily reliant on electricity to power central heating pumps, to provide water, information via TV, the internet and mobile phones. Nuclear strike will mean no water supply, no heating or lighting, no information, no mobile phone signal. Only a few days’ food supply exists in regional distribution depots. The supply network would fail for multiple reasons: road blockages, communications breakdown, collapse of the banking system, destruction of ports. International aid organisations and health bodies all agree that the tens of thousands of casualties from just one nuclear bomb would overwhelm all attempts to help the injured. As a result, there would be no hope of treatment for severe injuries including burns, broken bones, deep cuts from flying debris. To add to the multiple impacts, most locations in Western Europe are ringed by nuclear targets such as power stations or cities, so whatever the weather or wind condition, radioactive fallout is likely. You may receive a lethal dose inside a few hours but may not experience any symptoms until days possibly up to a week later. Radiation sickness causes vomiting, diarrhoea and internal bleeding. Children and the elderly are more vulnerable and more likely to suffer or die. With the intense levels of damage, huge fires would spread across all major towns and other targets, burning them out in huge fires lasting days to weeks. We now understand that these huge fires would cause long lasting climatic impacts at a global level. A nuclear winter Intense city-wide fires loft extensive high-altitude smoke clouds similar to a large volcanic eruption. These clouds block sunlight causing cooling. The latest climate models predict that the use of a few tens to a hundred of the smaller nuclear weapons in the regional India-Pakistan scenario would cause severe frosts, reduced growing seasons, drought and famine lasting up to ten years across the entire northern hemisphere. A 1,800 US - Russian warhead scenario would cause a long-lasting cold period with a peak average global cooling of 4°C, whilst a larger scale nuclear war with over 3000 warheads would cause average cooling of 8°C. This is greater than the average cooling of 5°C experienced during the last ice age, so this would be a severe nuclear winter lasting a decade. Whilst an average cooling of only a few degrees may not sound very serious, the crucial impact is much longer periods of frost in winter and severe drought. There would be dramatically reduced growing seasons or even the impossibility of growing any crop as planned. Farming also relies upon supplies of fuel for mechanised planting and harvesting. Realistically, after a large scale nuclear war, one must picture small groups of brutalised, traumatised people, violently thrown back into a pre-industrial age. Assuming that some people somewhere furthest from the bombs could initially survive this global catastrophe, any ‘recovery’ would surely be measured in hundreds of years. It has to be regarded a shocking indictment of our modern civilisation that current stockpiles of nuclear weapons are sufficient to cause such a global catastrophe. The only conclusion that can be drawn from these findings is that any use of nuclear weapons would be a global disaster and cause unacceptable suffering. Nuclear weapons do not keep us safe but under a constant threat of disaster. We now know we have avoided this only by sheer luck in several nuclear close-calls. In 2017, this understanding led 122 countries at the United Nations, to support a treaty to ban nuclear weapons in the same fashion as chemical and biological weapons and to press the nuclear-armed states to negotiate major reductions in weapons. We need to get rid of nuclear weapons before they get rid of us. You can find out more about Scientists for Global Responsibility here. HuffPost UK Tech has launched HuffPost-Apocalypse, a project that aims to investigate what an apocalypse would mean for humanity, how we can best delay the end of the world, what the world will look like after we’re gone and what the best viable options for survival will be for anyone left. Join in the conversation with #HuffPostApocalypse on Twitter. To read more from the series, visit our dedicated page.
0.55
FineWeb
1,720
This image belongs to a collection of engravings of urban plans entitled Civitates Orbis Terrarum, published by Georg Braun, a German geographer and cartographer, and Franz Hogenberg, a German painter and engraver. This work was conducted between 1572 and 1617, just before the extensive devastation caused by the Thirty Year’s War. This great city atlas eventually contained 546 prospects, bird-eye views and map views of cities from all over the world. Among them we can admire this representation of the imperial capital of Austria, Vienna. Vienna is placed on the riverside of the Danube river, in the oriental part of Austria. The river connects Central Europe to the Black Sea and has been used as a natural border many times throughout history. Concerning its specific geographical location, Vienna is in the Valley of the Vienna Woods, at the foot of the foothills of the Alps. The appearance of the city seems to be irregular, though we can see zones on the bottom left that looks like orthogonal. The property consist of medieval core, a former military Roman camp. Its remains stills visible in the urban medieval fabric of streets and alleys. In the 12th century, the urban development expanded beyond the Roman defences, which were demolished. The walls of the medieval city surrounded a much bigger area and were reconstructed after the Ottoman conflicts in the 16th and 17th century. The urban and architectural qualities of the Historical Centre of Vienna give exceptional testimony for a constant exchange of values along the second millennium. Concerning the buildings inside the city, they show the big changes that the city of Vienna experienced from the Middle Ages to the Renaissance, as the Baroque period had not begun yet. This bird-view is considered to be one of the principal historical sources to know the appearance of the Gothic architecture of the city. Supposing that the monastic complexes and churches were generally constructed of stone, the residential neighbourhoods were of wood and suffered frequent fires. Out of the wall there are also houses, which is typical of the cities of the Modern Age because the medieval hulls were insufficient. The cities incorporated squares, gardens, sewerage, paving, etc. in their streets. The biggest and more significant streets were placed downtown, around important elements, as St Stephen’s Cathedral. Thus, the interior of this city contains a number of medieval historic buildings, including the Schottenstift (the oldest monastery in Austria), the churches of Maria am Gestade (one of the most emblematic Gothic structures), Michaelerkirche, Minoritenkirche and Minoritenkloster. Saint Stephen Cathedral is dated between the fourteenth and fifteenth centuries, and clearly dominates the picture. It is crowned by a needle-shaped tower (Steffl), built in Gothic style, which is one of the most important religious symbols of Vienna. Regarding the social activities, in the town centre there is a square where it is very possible that people devote to trade among other activities. Just outside the walls there are different groups of population: people at the top of the image seems to practice animal husbandry or trade. As we go down to the left, we can see men carrying goods. Then we stumbled upon the “Fort Boarium”, or the pork market of Vienna; and below we can see some passenger cars pulled along by horses. In the foreground we can see a large number of people carrying things and some of them look like being warriors. In the river we can see many boats, some fishermen and other merchants, because the salt trade was an essential activity at that time; although there are people who walk by crossing the bridges they had. The boats were made of wood to the edge that is on the right. At the top right, we see a line of people waiting to enter into the city, so we assume they were new immigrants in Vienna. The landscape in the surrounding area is formed by green plains, so we can deduce that agricultural activities are practiced. In the background of the image we can see a few mountains; on the other hand, in the foreground there is a river. The nearness of this one offers to the city supply of water and fish, and provides a trade route. We cannot forget that access to raw materials is essential in order that a city could develop correctly. The imperial family Habsburg reigned in Austria and other Central European countries from 1278 to 1918. The struggles between Catholics and Protestants (Habsburg defended Catholicism) and the Turkish threat overshadowed the political life of Austria in the 16th and 17th centuries. The Peace of Westphalia (1648) and the Peace of Carlowitz (1699) ended, respectively, to both problems and consolidated the position of Austria as a European power. The Habsburgs made the city their capital from 1556 and its importance was enhanced with the expansion by the valley of the Danube. It became a core of European Baroque thanks to the construction of major architectural works and musical creations (from the 16th century, Vienna has been universally recognized as the musical capital of Europe). Olga Arriero Gallego
0.8165
FineWeb
1,161
Central Universities in India Central Universities of India, contribute immense and exemplary to the well-rounded development in the higher education of all across India, and are dedicated to produce highly qualified and competent human resource suitable to the ever-refining requirements in various sectors of economy in the country. Today, the Central Universities of India form the pedestal, on which the world’s largest higher educational infrastructure stands dignified and reputed. A Central University or the Union University is well-established by the Central or Union Government of India, generally by the Act of its Parliament. Thus, these Central universities are different from other universities most of which are established generally by the State Governments of the country. The Central Government of India is supremely responsible for the best possible contemporary higher education in the country, and provides grants to the University Grants Commission (UGC) for the establishment and sound maintenance of world-class higher education throughout the country. The Central Advisory Board of Education (CABE) helps the Union Government in maintaining proper coordination, cooperation, and harmony with its various States in the sector of education. Special features of Central University in India The most important and outstanding, special features of the Central Universities of India are the following: - The Central Universities of India are established by the Union Government of India following an Act of Parliament. - The President of India is the most privileged and exclusively great Visitor of all the Central Universities of India. - The President of India commands the exclusive power to nominate some members to the Executive Committee/Board of Management/Court/Selection Committee of the Central Universities of India in accordance with the provisions made for this, in the University Act. - The Ministry of Human Resources and Development (MHRD) of the Government of India, offers all secretariat services to the President of India, in the appointment of the Vice-Chancellors, in selecting nominees to the Executive Committees/Courts/Selection Committees of the Central Universities, and appreciates and examines every matter forwarded to the Visitor for consideration and orders. - The President of India also has the exclusive powers for suggesting and making necessary amendments and additions to the Executive or Selection Committees, repeal of status, suspensions of Ordinances; for ordering enquiries into the affairs of the Central Universities, and to take all proper measures for the resolution of disputes within and among these universities of India. List of Central Universities in India Presently, there are 39 Central Universities in all across India, for adequate and better higher education. Some more new Central Universities have been proposed to be established in its States across the country. Below is the list of most famous and reputed Central Universities of India: - Indira Gandhi National Open University (IGNOU), New Delhi - Jawaharlal Nehru University (JNU), New Delhi - Banaras Hindu University, Varanasi - Maulana Azad National Urdu University, Hyderabad - Aligarh Muslim University, Aligarh - Delhi University, Delhi - Allahabad University, Allahabad - Hyderabad University, Hyderabad - The English and Foreign Languages University, Hyderabad - Central Agricultural University, Imphal - University of Punjab, Punjab - Jamia Mallia Islamia University, New Delhi - Assam University, Silchar - University of Karnataka, Karnataka
0.7256
FineWeb
771
Related to the post immediately before the one I linked, skeptic, this isn't a matter of creationists having gut feelings that evolution is false and 'evolutionists' having gut feelings that it is true. Or rather, while it certainly might be true that creationists base their conclusions on their gut feelings, evolutionary scientists (along with other people, like myself, who have studied the subject in some depth) most certainly do not. That's the equivalent of arguing that geologists base their conclusions on gut feelings. Or physicists. Or astronomers. Or other fields of science, for that matter. The reason you're calling out evolutionary scientists is because their conclusions directly contradict young earth creationism, and thus young earth creationists, who rely on their gut feelings on the matter, have to make it seem that evolutionary biology works the same way. That is, quite simply, a false comparison. Imagine if astrologers took on astronomers with the same logic - they believe strongly that the stars a person was born under determine their future, and so they try to argue that astronomy isn't a science, but instead, an equally strong belief, and go from there to saying that astrology should be given equal time in the science classroom to astronomy. It would be more than a little bit ridiculous to take them seriously on that, and the same holds true for creationists who do the same thing with evolutionary theory. Excellent post. I can see how dedicated you are to this subject. I am curious about the evolutionary gap you mention, though. How do you know it will be explained by evolution? isn't that a presupposition that it is evolution? No, it isn't. Or rather, if it is a presupposition, it is the same sort of "presupposition" that a person who doesn't know much about computers has when they press the power button on a computer and "presuppose" that it will turn on. There is no guarantee that a specific evolutionary 'gap' will ever be filled, but even if it wasn't, that wouldn't make evoutionary theory untrue, and it certainly wouldn't make creationism true. Also, I have looked at the horse fossils but how do they know for sure they evolved? What if they were just another species that existed within the original kind? We know horses can form new horse species but they will never be anything other than a horse. We know speciation exists on the species level within the original kind, but we never saw speciation on the original kind level. How do I know they evolved? Because we don't see the design/creation of organisms today. Nobody has ever observed it, for that matter. The only thing that even makes this claim that it happened is an apocryphal book which post-dated this supposed design/creation, and which only makes the claim in context of a creation myth which is no more believable if you create a simulated world with nothing but horses, then you will only get different kinds of horse species to evolve. You will never see a bird or a kangaroo one day. if you create a simulated world with nothing but birds, you will never get horses, sharks, etc etc etc. Think of any creature and imagine making a simulated world. You will never get another kind of animal other than the one you started with. Actually, that's untrue. What is true that anything you get as a result of evolution will be genetically related to the original creatures, but it is a misnomer to say that if you start with a horse, you will never have anything but different kinds of horses.http://news.nationalgeographic.com/news/2010/05/100513-science-evolution-darwin-single-ancestor/ - this is exactly the point that I'm trying to make. Not only that, but it shows exactly why "created kinds" doesn't make sense. It takes the three different domains of life (bacteria, bacteria-like Archaea, and eukaryotes), and calculates the odds of the genetic similarities between them coming from them being created kinds versus common descent. The probability that they would have evolved such similar DNA sequences if they were different "created kinds" is literally astronomical - 1 in 102680 EDIT: The odds of separate "created kinds" converging the way they do genetically makes the difference between the Planck length (around 10-35 ) and the entire universe (around 1027 ) seem gigantic by comparison. That is the simplest way to explain why evolution just simply can't happen the way they say it does. Sorry to say, but you didn't actually show that. You showed that you're still assuming that an organism has built-in limiters which prevent it from changing significantly, an assumption which is not backed up by anything in science, to the best of my knowledge.
0.6557
FineWeb
1,076
How to perform a prostate massage yourself at home Prostate massage still causes a lot of controversy among specialists, but most often these disputes are not about its effectiveness, and the frequency of its conduct. Aktiviziruyutsya thanks to massage blood circulation and facilitates the outflow of the prostate. Long-term observations showed that the manual impact has a high level of effectiveness in the treatment of prostatitis. Experiencing psychological discomfort as the massage is performed through the anus, the representative of the stronger sex in the first place worry about how to do prostate massage yourself at home. Do not inflict any self-massage of the prostate harm, and whether it executed successfully, consider the following. From many sources comes the information that the prostate massage a young person can make their own. But, alas, it is not so! To conduct a full session of manual therapy is required to deeply enter into the anus finger, and it is quite difficult for a self-massage. We can say that anatomically impossible to produce the massage, if the representative of the stronger sex, of course, not an Indian yogi or gutta-percha boy from the circus. And if the patient is overweight, this procedure itself becomes impossible. The way out is the help of a very close person, if he is a specialist in urology and knows what is an iron. Otherwise, you will still have to go for help. How to prepare The most important thing in the treatment is the presence of the diploma of a specialist. Ignorance of anatomy, contraindications, methods and techniques of massage only hurt the person and cause a lot of problems and complications. Homemade massage can successfully replace the session with the quack – the effect is the same. Therefore, the basic rules of preparation for prostate massage are: - The choice of a competent and experienced specialist, and not have to rely on self-massage. - The morning session need to clean the rectum from feces. This will help mikroklizma. - To make the toilet of the perineum and the anus or to take a shower. - 30-40 minutes before the start of the session it is recommended to drink about 1 litre of water, as the massage is preferably carried out with full bladder. This approach allows to achieve a desired contact of a finger and the prostate gland, which is impossible to do yourself. Preparation for prostate massage is simple and not complicated and the patient requires little effort, it can be done independently. The client comes to a session in a strictly allotted time, and the doctor starts to massage. It is important to know that a qualified specialist will never start a manipulation, not ensuring the absence of contraindications, which the patienthimself will not be able to diagnose. These include: - Proctitis, abscess or fissures of the anus; - Chronic prostatitis in the acute stage. The course of massage This procedure applies not only for disease treatment but also for diagnostic purposes. During the massage intensively allocated the juice of the prostate. If your doctor feels you need, he will gather the secreted fluid in a special container and sent to the laboratory for analysis. Performing self-massage of the prostate gland, the male is unlikely to collect material for analysis and to independently assess the condition of the gland. The man frees the body from the clothing below the belt and he is on the couch in the knee-elbow position or on the side with painted chest feet. This position allows maximum relax the muscles of the pelvic floor and create favorable conditions for manipulation. Possible implementation of massage standing. For this, the patient rests his chest on a table or high bed, forming a right angle between body and legs. The doctor washes his hands, wears sterile gloves and lubricate the finger and anus of the patient with a special gel or vaseline. Index finger the doctor inserts into the anus of the patient to a depth of 5-7 cm. He felt the prostate, the urologist evaluates its size, consistency, sensitivity and status of surrounding tissue. Agree, not knowing the anatomy and diseases of the body, it is impossible to independently perform massage. Self-massage of the prostate will be just useless. Even close people, making a rotational or translational motion in the rectum men, does anything but massage. After the doctor will assess the condition of the body, it starts to perform manipulation. Cautious stroking movements performed first one lobe of the gland, then the other in the course of the excretory ducts. At the beginning of the massage movements are soft and careful and the doctor focuses on the patient's state of health. Then the intensity increases, but the procedure does not bring negative feelings. Massage prostate complete by swiping across the Central notch on the outside. In total the manual impact on the prostate lasts about 2 minutes. Himself a man can't spend a massaging effect on the body and to achieve the desired effect for anatomical reasons. The number of sessions appointed by the urologist. Most often it is the effect on the prostate is done once a week during the month. Yourself to massage glandular body impossible, but to be more effective treatment a man can do exercises in a special medical gymnastics. So no need to wrestle with the question of how to do prostate massage, and trust itprofessionals. Alas, but long-term observations give the right to say that self-massage of the prostate does more harm than good.
0.5621
FineWeb
1,231
Little Jake is a 48-volt generator. Generators have two windings—the field and the armature. Direct current (DC) is produced by spinning the armature within a stationary DC field. The induced current travels from the copper commutator, at the end of the rotating armature, through conductive graphite brushes, and then down to the slip-ring assembly. A second set of brushes contacting the slip-ring assembly allows the machine to yaw (pivot) freely with the wind, without twisting the wires that run down the tower and into the junction box at ground level. We inspected all four brushes that ride on the generator commutator for excessive or irregular wear patterns, looked for evidence of overheating and pitting on the commutator, and examined the inside of the cover for signs of spattering solder—which would have shown us that the armature windings had been overheated. Everything appeared in good working order; the brushes were evenly worn, had plenty of remaining life, and were set with a good amount of tension against the commutator. (Each of the four brushes slides into a spring-loaded retaining clip with five notches for increasing tension. All four brushes should ride around the commutator with equal amounts of tension.) We also inspected the conductors between the slip-ring assembly and the generator terminals for the field and armature windings. We used a multimeter for continuity checks and the megger for evidence of insulation breakdown, just like we did when checking wires from the junction box to the top of the tower. We also isolated and performed resistance checks on the lightning arrestor by using a multimeter to test each lead to ground and from lead to lead. They all showed no continuity, and infinite resistance, which is appropriate. We measured the resistance of the field, and it was an acceptable 16 Ω. Field windings are essentially giant coils of thin wire, so resistance should be low—the same as if the coils were unwound and just very long conductors. We checked for shorts within the generator by using the megger to measure resistance from the commutator to the metal input shaft (23 MΩ), and from the field to the metal case (3.5 MΩ). We didn’t know exactly what kind of numbers we should see, but we knew that anything in the MΩ range was acceptable, since it shows high resistance with respect to ground. None of these tests yielded suspicious results, and we were getting frustrated. We had tested every component and wire within the system, from the BOS to the top of the tower, and we still hadn’t found anything wrong—not even a tiny clue as to why Little Jake wasn’t delivering power. We had no written documentation on the machine, so we called Mick. He validated what we had measured so far, and gave us advice about what to do next. “Flashing the field” means re-teaching the machine which field poles are positive and which are negative. Without a residual magnetic field in the field windings, no current can be induced when the turbine begins spinning. To verify that our field windings had a polarized magnetic field, we lifted the brushes off the commutator and connected MREA’s Sun Chaser (a portable solar power trailer) to the wires in the junction box going up the tower. After a full 15 seconds of delivering 48 volts of battery power up to the field windings, we were certain that the field poles contained magnetism with the correct polarity, but the Jake still yielded no output. (Machines with field windings using residual magnetism need to be “flashed” upon installation and after a high-transient event like a lightning strike.)
0.6462
FineWeb
834
This is for anyone who has suffered from Domestic abuse, whether they are in denial or openly admit the abuse exists… The following information can be read in it’s entirety at this site. And many, many other sources. Find one, read it, get help. What is Abuse? – A Warning List Many people who are being abused do not see themselves as victims. Also, abusers do not see themselves as being abusive. People often think of domestic violence as physical violence, such as hitting. However, domestic violence takes other forms, such as psychological, emotional, or sexual abuse. Domestic violence is about one person in a relationship using a pattern of behaviors to control the other person. It can happen to people who are married or not married; heterosexual, gay, or lesbian; living together, separated, or dating. If your partner repeatedly uses one or more of the following to control you; - pushing, hitting, slapping, choking, kicking, or biting - threatening you, your children, other family members or pets - threatening suicide to get you to do something - using or threatening to use a weapon against you - keeping or taking your paycheck - puts you down or makes you feel bad - forcing you to have sex or to do sexual acts you do not want or like - keeping you from seeing your friends, family or from going to work Cycle of Violence: - Any type of abuse occurs (physical/sexual/emotional) - Abuser starts to get angry - Abuse may begin - There is a breakdown of communication - Victim feels the need to keep the abuser calm - Tension becomes too much - Victim feels like they are ‘walking on egg shells’ - Abuser may apologize for abuse - Abuser may promise it will never happen again - Abuser may blame the victim for causing the abuse - Abuser may deny abuse took place or say it was not as bad as the victim claims - Abuser acts like the abuse never happened - Physical abuse may not be taking place - Promises made during ‘making-up’ may be met - Victim may hope that the abuse is over - Abuser may give gifts to victim The cycle can happen hundreds of times in an abusive relationship. Each stage lasts a different amount of time in a relationship. The total cycle can take anywhere from a few hours to a year or more to complete. It is important to remember that not all domestic violence relationships fit the cycle. Often, as time goes on, the ‘making-up’ and ‘calm’ stages disappear. Effects on Children Children who witness resentment, anger, emotional abuse, verbal abuse, or physical violence walk on eggshells. The usual symptoms are: - Depression (looks like chronic boredom with little interest in things that usually interest kids) - Anxiety (worry, especially about things kids don’t usually worry about) - School problems - Hyperactivity (can’t sit still) - Low self-esteem (don’t feel as good as other kids) - Over emotionality (anger, excitability or crying) that sometimes comes out of nowhere - No emotions at all - Powerless, inadequate, or unlovable - Like burdens to their parents Living in a household where they walk on eggshells makes a child 10 times more likely to become either an abuser or a victim of abuse. As adults, they are at increased risk of: - Drug abuse - Mental health problems Witnessing a parent victimized is usually more psychologically damaging to children than injuries from direct child abuse. Seeing a parent abused is child abuse. Signs of Stress in Children under 5 years old: Similar to school-age children and adolescents, infants and toddlers can also be impacted by trauma and stress. Although they may not understand everything they see and hear, they may nonetheless be affected by what is happening around them. Very young children are affected by the mood and emotions of the significant people in their lives, whom they depend on for love, safety and security. Different children may have very different reactions, even within the same family. After a trauma, children may need different amounts of time to cope and adjust. Behaviors that you might see in very young children that could be signs of stress may include the following: - Increased clinginess or whining - Greater fear of being separated from parent or caregiver - Increased general fearfulness (i.e. more afraid of being alone, of going to the bathroom) - More anxious, jumpy or scared - Increased aggressive behaviors - More withdrawn, harder to engage - More crying - More tantrums or screaming - Difficulty comforting self - Difficulty falling or staying asleep, or having nightmares - Changes in eating habits (i.e. refusing to eat, loss of appetite) - More easily frustrated - Appearing to be less responsive, or showing little emotion - Possible acting out the trauma/abuse in their play - Afraid to explore their environment - Returning to earlier behaviors, such as: - Thumb sucking - Increased bedwetting - Frequent awakening at night - Fear of the dark or strangers If you’re in denial, WAKE UP. If you’re in a violent relationship, GET HELP. Help for you, and especially help for your children…Verbal abuse is just as damaging as physical, it’s just easier to deny and hide. No one deserves to live with abuse be it verbal or physical, and no one has to. You’re not alone.
0.9497
FineWeb
1,277
Forecasting the weather weeks to months ahead of time can often be problematic. Computer models that project atmospheric conditions into the future typically only provide utility out to 10-14 days, depending on who you ask. After that, forecasts often become erroneous due to what is often referred to as the “chaos effect”. In fact, there are many that believe that forecasting the weather for a specific day is only useful out to roughly 7-10 days. Most people manage their weather expectations beyond the 7-10 day horizon not by forecasting a specific event, but by describing more general expected trends. It is more common to say something like “It is likely that the period from 14-21 days out will be warmer and drier than normal across much of the Western United States”. Scientifically credible seasonal forecasts tend to rely on larger scale phenomenon that have been shown to impact our weather in the past. Luckily, for this upcoming season, the winter of 2015-16, there are two such phenomenon that could give us some significant foresight into what we could expect out of this coming winter. The first, and most obvious one is the strong El Nino that is already underway. Strong El Nino conditions typically bring wet weather to the Southern United States due to a strong sub-tropical jet stream. In particular, California can be the recipient of some heavy rainfall, which hopefully can help give the state some much needed relief from the extreme drought conditions than have been experiencing. The other major impact, on a national level, is that the Upper Midwest and Northern Plains tend to have milder than average winters during strong El Ninos. Unfortunately, maps like this one often make it ambiguous as to what impact El Nino typically has on the weather here in Colorado. On this map, as well as nearly every map of El Nino impacts, Colorado is in kind of a neutral zone, where areas to the south are wetter than usual, and areas to the north are drier than usual. However, as any resident of Colorado knows, Colorado’s rugged terrain has a significant impact on the weather here. Therefore, it is possible to discern some more local impacts that occur here in Colorado, as different large scale wind patterns are impacted by Colorado’s many mountain ranges. There are many sources of information regarding how Colorado fares during a strong El Nino year. Below is a graphical summary of these impacts. In addition to El Nino, there is another major weather feature that could have a profound impact on our weather this winter. Not only are there warmer than normal ocean temperatures along the equator associated with the strong El Nino, but there is another section of extremely warm ocean temperatures in the Pacific Ocean farther north. This section of warm temperatures off the west coast of North America is being labelled “The Blob”. “The Blob” formed due to a persistent period of warmer and drier weather over the past several years. This is the weather pattern that lead to the extreme drought in California in the first place, and, now threatens to keep much of California in drought conditions despite the El Nino. The easiest way to describe the impact “The Blob” is going to have on our winter weather is that it is going to try to produce conditions similar to last winter. Last winter was warm and dry over much of the West due to a persistent ridge, labelled “the ridge of death” by snow enthusiasts at OpenSnow, which is often associated with warmer sea surface temperatures off the Pacific Coast of North America. While it is hard to imagine “The Blob” completely overwhelming the impacts of this historic El Nino, it does have the potential to modify them. Firstly, it could make the Pacific Northwest drier, and reduce the amount of rainfall California receives, particularly Northern California. Over Colorado, more frequent ridging, and/or dry Northwesterly flow aloft will reduce the likelihood of major Front Range upslope snowstorms, and increase the likelihood of a drier than normal winter over parts of Central Colorado, including many of the major ski resorts such as Vail, Breckenridge, and Copper Mountain. Those who hate extreme cold, though, will be comforted by the fact that the likelihood of sub-zero conditions across most of the state will be significantly below average this season.
0.7677
FineWeb
932
Motility Disorders of the Esophagus The function of the esophagus (food tube) is to transport food from the mouth to the stomach. Synchronized (peristaltic) contractions follow each swallow to accomplish this task. Between swallows, the esophagus usually does not contract. The lower esophageal sphincter (or LES) is a muscle that separates the esophagus from the stomach. It acts like a valve that normally stays tightly closed to prevent contents in the stomach from backing up into the esophagus. When we swallow, the LES opens up (the muscle relaxes) so that the food we swallow can enter the stomach. Difficulty swallowing liquids or solids, heartburn, regurgitation, and atypical (or non-cardiac) chest pain may be symptoms of an esophageal motility disorder. Examples of motility disorders of the esophagus that are described below include gastroesophageal reflux disease (GERD), dysphagia, achalasia, and functional chest pain. Gastroesophageal reflux disease (GERD) The most common symptom that occurs in the esophagus is heartburn. It happens when stomach contents washes up into the esophagus repeatedly (gastroesophageal reflux) and irritates the lining of the esophagus. This occurs when the lower esophageal sphincter (LES) does not work properly. This can be due to a weak sphincter muscle, too-frequent spontaneous relaxations of the sphincter, or hiatal hernia. Hiatal hernia means that the stomach pushes up into the chest above the sheet of muscle that separates the abdomen from the chest (this muscle sheet is called the diaphragm). A hiatal hernia weakens the sphincter. Dysphagia means ineffective swallowing. Sometimes this occurs when the muscles of the tongue and neck that push the food into the esophagus are not working properly because of a stroke or a disease affecting the nerves or muscles. However, food can also stick because the lower esophageal sphincter does not relax to let the food into the stomach (a disorder called achalasia – see below), or because the esophagus contracts in an uncoordinated way (a disorder called esophageal spasm). Dysphagia can cause food to back up in the esophagus. Symptoms may include: - A sensation of something getting stuck - A sensation of pain This condition is diagnosed when there is a complete lack of peristalsis within the body of the esophagus. In addition, the lower esophageal sphincter does not relax to allow food to enter the stomach. Most people with achalasia have symptoms for years prior to seeing a physician that may include: - Difficulty swallowing both liquids and solids - Weight loss - Atypical chest discomfort Functional chest pain Sometimes individuals have pain in their chest that is not like heartburn (no burning quality) and that may be confused with pain from the heart. Particularly if you are over 50 years of age, your doctor will always want to first find out if there is anything wrong with your heart, but in many cases the heart turns out to be healthy. In many people with this kind of pain and no heart disease, the pain comes from spastic contractions of the esophagus, or increased sensitivity of the nerves in the esophagus, or a combination of muscle spasm and increased sensitivity.
0.9765
FineWeb
801
In my travels through Vietnam and Korea and in my correspondence with educators around the world—from Russia to Brazil to here at home in the United States—I’ve been struck by how hungry people are for good resources on blended learning. At its simplest, people understand the basic “what”: that blended learning is about combining online learning with traditional schools to create an integrated learning experience, but they too often overlook how important it is to the definition that students have some control over the time, place, path, and/or pace of their learning. Similarly, too often many people think blended learning is all about the technology and don’t see blended learning as a key driver in changing the education system itself from a factory model that standardizes the way we teach and test to one that puts students at the center of their learning and can personalize for their different learning needs. Misconceptions abound. But even—or especially—with an understanding in place of what blended learning is and its purpose, how to move to a student-centered, blended-learning environment is tricky. What should school leaders do? What should teachers do? What are the new roles and tricks of the trade for teachers in these environments? One of the reasons this is tricky is that blended learning is relatively new; the field is still learning how best to advise and create these environments. In our latest effort to provide educators and the public with a meaningful understanding of what blended learning is, what it’s purpose can be, what it looks like, and how to go about designing a robust blended-learning environment that can personalize learning for students, we partnered with the Silicon Schools Fund once again to move the video work we’ve done on blended learning to the Khan Academy platform. In this “course” on blended learning, we have modularized the video resources; they are now free and discoverable both as part of an integrated sequence as well as in discreet objects organized by topic, so that people can personalize their learning about blended learning to get the resource they need when they need it. We show real examples of blended learning in K–12 schools so that educators can hear from teachers about what does and doesn’t work in blended learning and to “see” and “feel” the different possibilities for what blended learning can look like when it’s done well. What’s infused throughout the course is that the technology is critical to creating a blended-learning environment and likely scaling high-quality personalized learning, but the technology is also secondary in the design of those environments. What I hope educators around the world realize is that the key to utilizing technology to transform schooling is to start with what they want the schooling experience to look like for students. Then focus on designing the teacher experience. The role of the teacher is absolutely critical in blended-learning environments, but it’s also a very different role from that in a traditional teaching environment. The schools we profile with footage of teachers teaching have made some dramatic shifts, and their teachers offer some good advice in the videos on techniques that they have found to be effective in these new environments, as well as how the technology assists and amplifies their impact. We then focus on how to redesign an entire school around blended learning—a group of resources that speaks to the importance of thinking through such things as the scheduling decisions we make without even knowing it that sacrifice the ability of a school to deliver on those ideal student and teacher experiences. The course ends with a set of modules on how to make hardware, software, and facility decisions in support of high-quality blended learning. Importantly, the decisions on technology come at the end of a blended-learning design effort and should be in support of the desired learning goals, not the other way around as too often happens. What has us, along with the folks at the Silicon Schools Fund, excited is the opportunity to place this material on the Khan Academy and learn. Millions of students and teachers are using the Khan Academy every month to blend their learning in a variety of ways. As I’ve written, the basic facilitated network architecture behind the Khan Academy, the power of which goes far beyond the videos in and of themselves, likely represents the future of personalizing content for the majority of students in the majority of their subjects. There will be places where this approach is a bad fit, but for many students, platforms like the Khan Academy will be a critical part of their future learning. And for many teachers as well, platforms like the Khan Academy will be a critical way for them to free up their time so that they can focus on helping students master higher-order skills through projects and rich discussions and playing the role of mentor, facilitator, and tutor—all critical roles that have too often been lost in our factory-model education system that dehumanizes the time that students and teachers spend together. We hope that through the thoughtful design of new learning environments, blended learning can bring some humanity to education for all students and teachers and boost students’ lifelong outcomes as well.
0.6147
FineWeb
1,083
|This article does not cite any references or sources. (August 2007)| |Place of origin||France| |Main ingredients||Meat (pork, goose, duck, chicken, game birds, rabbit), salt, fat| Rillettes (// or //; French [ʁiˈjɛt]) are a preparation of meat similar to pâté. Commonly made from pork, the meat is cubed or chopped, salted heavily and cooked slowly in fat until it is tender enough to be easily shredded, and then cooled with enough of the fat to form a paste. They are normally used as spread on bread or toast and served at room temperature. The term rillette perhaps refers to the final product and its appearance when spread on sliced bread. Rillettes were traditionally made with fatty pork belly or pork shoulder. The meat was cubed, salted and cured, cooked slowly over low heat until very tender, then raked into small shreds and blended with the warm cooking fat to form a rustic paste. Rillettes could be stored in crocks for several months. In Anjou, rillaud was a speciality, plated in the shape of a pyramid and topped with the pig's tail; the rillettes were proudly displayed to the guest of honor. In time the rillette cooking style was applied to game birds, wild rabbit, and fish. Eventually several preparations for seafood rillettes were developed including an anchovy, tuna, and salmon version. Though the fish is not actually cooked in the fat, it is blended with fat to form the characteristic paste-spread. The soft, smooth texture is a deciding factor in determining a good rillette dish. Like cassoulet or fondue, this French dish has its many regional definitions. In general most rillettes are served at room temperature, as a spread with toast points, much like a pâté. Pork rillettes from the northwestern regions of Tours and Anjou are famous for the rich texture and bronze color achieved during the cooking process. Rabelais called rillettes "the brown jam from the pig" (brune confiture de cochon). Rillettes from the adjacent département of Sarthe are distinguished by a more rustic texture, complete with larger pieces of pork and less color. In Quebec, cretons are similar to rillettes. The French word rillettes is first evidenced in 1845. It derives from the Old French rille, meaning a slice of pork, which is first attested in 1480. This is a dialect variation of the Old French reille, meaning a lath or strip of wood, from the Latin regula. The word rillettes is thus cognate or linked with the English words rail, referring to railways, and ruler, meaning a straight strip of wood for measuring. - Editions Larousse, Nouveau Dictionnaire Etymologique et Historique (1971), p.651.
0.6308
FineWeb
717
Decorators vs. the Decorator Pattern First, you need to understand that the word "decorator" was used with some trepidation, because there was concern that it would be completely confused with theDecorator pattern from the Design Patterns book. At one point other terms were considered for the feature, but "decorator" seems to be the one that sticks. Indeed, you can use Python decorators to implement the Decorator pattern, but that's an extremely limited use of it. Python decorators, I think, are best equated to macros. History of Macros The macro has a long history, but most people will probably have had experience with C preprocessor macros. The problems with C macros were: Both Java and C# have added annotations, which allow you to do some things to elements of the language. Both of these have the problems that Many other languages have incorporated macros, but without knowing much about it I will go out on a limb and say that Python decorators are similar to Lisp macros in power and possibility. The Goal of Macros I think it's safe to say that the goal of macros in a language is to provide a way to modify elements of the language. That's what decorators do in Python -- they modify functions, and in the case of class decorators, entire classes. This is why they usually provide a simpler alternative to metaclasses. The major failings of most language's self-modification approaches are that they are too restrictive and that they require a different language (I'm going to say that Java annotations with all the hoops you must jump through to produce an interesting annotation comprises a "different language"). Python falls into Fowler's category of "enabling" languages, so if you want to do modifications, why create a different or restricted language? Why not just use Python itself? And that's what Python decorators do. What Can You Do With Decorators? Decorators allow you to inject or modify code in functions or classes. Sounds a bit like Aspect-Oriented Programming (AOP) in Java, doesn't it? Except that it's both much simpler and (as a result) much more powerful. For example, suppose you'd like to do something at the entry and exit points of a function (such as perform some kind of security, tracing, locking, etc. -- all the standard arguments for AOP). With decorators, it looks like this: A function decorator is applied to a function definition by placing it on the line before that function definition begins. For example: What does the myDecorator code look like? Well, most introductory examples show this as a function, but I've found that it's easier to start understanding decorators by using classes as decoration mechanisms instead of functions. In addition, it's more powerful. The only constraint upon the object returned by the decorator is that it can be used as a function -- which basically means it must be callable. Thus, any classes we use as decorators must implement __call__. What should the decorator do? Well, it can do anything but usually you expect the original function code to be used at some point. This is not required, however: Notice that the constructor for myDecorator is executed at the point of decoration of the function. Since we can call f() inside __init__(), it shows that the creation of f() is complete before the decorator is called. Note also that the decorator constructor receives the function object being decorated. Typically, you'll capture the function object in the constructor and later use it in the __call__() method (the fact that decoration and calling are two clear phases when using classes is why I argue that it's easier and more powerful this way). When aFunction() is called after it has been decorated, we get completely different behavior; the myDecorator.__call__() method is called instead of the original code. That's because the act of decoration replaces the original function object with the result of the decoration -- in our case, the myDecorator object replacesaFunction. Indeed, before decorators were added you had to do something much less elegant to achieve the same thing: The reason I think decorators will have such a big impact is because this little bit of syntax sugar changes the way you think about programming. Indeed, it brings the idea of "applying code to other code" (i.e.: macros) into mainstream thinking by formalizing it as a language construct. Slightly More Useful Now let's go back and implement the first example. Here, we'll do the more typical thing and actually use the code in the decorated functions: The constructor stores the argument, which is the function object. In the call, we use the __name__ attribute of the function to display that function's name, then call the function itself. Using Functions as Decorators The only constraint on the result of a decorator is that it be callable, so it can properly replace the decorated function. In the above examples, I've replaced the original function with an object of a class that has a __call__() method. But a function object is also callable, so we can rewrite the previous example using a function instead of a class, like this: The output of the line print func1.__name__ is new_f, because the new_f function has been substituted for the original function during decoration. If this is a problem you can change the name of the decorator function before you return it: Now that you have the basics, you can look at some more examples of decorators here. Note the number of these examples that use classes rather than functions as decorators. In this article I have intentionally avoided dealing with the arguments of the decorated function, which I will look at in the next article. * learnpython.org - Decorators * Understanding Python Decorators in 12 Easy Steps!
0.9235
FineWeb
1,314
Of Malice and Straw Men Richman, Sheldon, Freeman We libertarians must be onto something. Why else would critics work so hard to construct straw men to demolish rather than contending with our actual arguments? Right from the top you could tell that Stephen Metcalf's blast in Slate would be no different (tinyurl. com/3epcbae). "Liberty Scam" featured this teaser: "Why even Robert Nozick, the philosophical father of libertarianism, gave up on the movement he inspired." That sentence contains two assertions - both wrong. I mean to take nothing away from Nozick when I point out that he was not the philosophical father of libertarianism. We can debate who might deserve that title, but I can say firsthand that he, she, or they helped give birth to libertarianism before 1974, when Nozick published Anarchy, State, and Utopia. As for the second half of that sentence, Nozick never gave up on libertarianism. Metcalf makes much of Nozick's writing, "The libertarian position I once propounded now seems to me seriously inadequate. . ." and "There are some things we choose to do together through government in solemn marking of our human solidarity, served by the fact that we do them together in this official fashion" - but is this a renunciation of libertarianism? Those in fact were not Nozick's last words on the matter before his premature death in January 2002 at age 63. In an interview with Julian Sanchez six months earlier, Nozick said, "... I never stopped self-applying [the libertarian label]. What I was really saying in The Examined Life was that I was no longer as hardcore a libertarian as I had been before. But the rumors of my deviation (or apostasy!) from libertarianism were much exaggerated." It gets worse for Metcalf. He spends most of his article on Nozick's famous Wilt Chamberlain thought experiment but misses the point. In critiquing "patterned," or "end-state," principles of justice, Nozick imagines that everyone has the amount of wealth necessary to satisfy some posited ideal pattern. It so happens that the people in this society love basketball and one of their members, Chamberlain, is a great player whom many are eager to watch. They each pay him a sum of money every time they attend a game. As a result of this series of exchanges Chamberlain has more money than the others. This raises a question: Is the initial "distributional" pattern to be preserved by force, or is free exchange to be allowed to change the pattern? As Nozick stated: "The general point ... is that no end-state principle or distributional patterned principle of justice can be continuously realized without continuous interference with people's lives." For Nozick, if constant interference with free exchange - let's call it what it is: violence or the threat thereof - is required to preserve a given pattern, perhaps justice cannot lie in any preconceived pattern at all, for without liberty what becomes of autonomy and the moral injunction against treating others merely as means? He opted instead for an "entitlement theory of justice in distribution," which poses a historical test: "whether a distribution is just depends upon how it came about." Metcalf is in a panic: IfWiIt Chamberlain is entitled to a bigger income than his fellow human beings when it results from voluntary exchange, it must follow that others are too. Metcalf doesn't want to face that issue, so he creates a distraction: "Anarchy[, State, and Utopia] not only purports to be a defense of capitalism, but a proud defense of capitalism. And yet if Anarchy would defend capitalism unashamedly, why does its most famous argument include almost none of the defining features of capitalism - i.e., no risk capital, no capital markets, no financier? Why does it feature a basketball player and not, say, a captain of industry, a CEO, a visionary entrepreneur?" It's true that Nozick ultimately wants to defend free exchange (which he called "capitalist acts between consenting adults"), but to set the foundation, he needed to show that accepting a patterned conception of justice means giving up freedom. …
0.5064
FineWeb
1,005
Published on August 12th, 2014 | by drfrancis What Should I Give My Dog To Chew? “What should I give my dog to chew?” a question often asked by owners. And since veterinarians are frequently faced with treating fractured teeth in dogs, it is an important question to answer properly. Let’s start with a little history . . . Wolves adopted pack-living to hunt larger prey. Selective evolutionary pressures from this group hunting have created strong bones and muscles of the jaws in both wolves and dogs. However, wolves RARELY chew bones. Instead the muscles and jaw are used to the render the meat off the bones in a ripping and tearing motion. If a wolf is forced to chew bones it is usually due to starvation when it is actually trying to reach the marrow. In the wild, this is a risky situation, because if a wolf fractures a tooth the ability to hunt and defend is impeded. What does all this mean for your dog? Like wolves, your dog was born with the tools to tear and chew, and she wants to use her tools! That’s why she often finds an outlet for this behavior on our furniture, shoes, remote controls, etc. So how do you decide what to give to yourdog? Follow the “Knee Cap Rule” (by Dr. Hale, Veterinary Dentist). “If you would not want me to hit you in the knee cap with it, don’t let your dog chew on it!” And for very small dogs the rule is, “if you would not want me to hit them on the knee cap with it, do not let them chew on it.” Within that rule, the following options are safe: - CET Veggidents - Rawhide Flips (we like CET brand) - Dental Diets - Greenies (caution, fattening!) - Kong’s, filled and frozen. Items NOT recommended include: - Natural Meat Bones - Nylon or hard plastic “bones” and toys - Antlers (which are actually bone) - Very large, hard. or braided rawhide bones - Dried Cow Hooves - Ice Cubes An important point to remember is that the average lifespan of a wolf is only six years; at that age their enamel (the protective coating on teeth) is fragile and old. Therefore, as descendants of wolves, by the time you are getting your rambunctious retriever under control, her teeth are already old and more prone to fracture. Using the “Knee Cap Rule” will help protect your dog’s teeth, even past the age of six. Remember though, no chew toy is 100% safe. Your dog can choke on ANYTHING. All chew toys and treats should be given under observation and taken away if needed.
0.7828
FineWeb
653
Meningiomas are tumors that originate from the meninges, which are membrane-like structures that surround the brain and spinal cord. Typically, they are benign and occur as solitary masses, but instances of malignancy and multiple concurrent lesions have been reported. About 15 to 20% of all primary brain tumors are meningiomas and commonly occur in the fourth through the sixth decade of life, mostly affecting women. Despite various theories, the origin and cause of the tumors is unknown. Since the meninges surround the entire brain and spinal cord, meningiomas can occur anywhere in the central nervous system. Signs and symptoms depend on the size and location of the tumor. Symptoms usually develop as a result of compression of surrounding neurovascular structures. Intracranial meningiomas may manifest as headache, stroke, seizure, loss of vision or personality change. Meningiomas of the spinal cord may present with pain or weakness at the level of cord involvement. Due to their slow growth characteristics development and progress of symptoms can be subtle and extend over a period of years. Diagnosis begins with a thorough documentation of the patient's medical history, including a detailed description of the onset and duration of the symptoms and a complete physical examination focused on neurologic findings. Laboratory results do not play a major role in diagnosis, but radiologic studies are instrumental in defining the extent of a lesion. Although CT scans may be helpful as an initial diagnostic tool, magnetic resonance imaging (MRI) scans provide the best anatomical pictures of meningiomas and their relationship to surrounding structures. Treatment options vary, ranging from conservative expectant therapy to aggressive surgical resection. Therapy must be tailored to the needs of the individual patient. Elderly patients or those with multiple diseases who are at greater risk for surgical procedures may benefit from observation with periodic MRI studies, radiation therapy or radiosurgery. Indications for surgical resection depend on clinical progress and the size and location of the tumor. In critical patients with worsening symptoms, resection of the mass is a priority. Advances in diagnostic tools, neuroanesthesia, surgical instrumentation and innovative surgical techniques have enabled surgeons to offer resection to a greater number of patients with less associated surgical risk. The goal of surgery is complete tumor removal. The technique employed depends on the location of the tumor. When the tumor cannot be completely resected at the time of surgery, adjuvant radiotherapy or radiosurgery may play a role in subsequent management of the patient. Tumors once thought to be "unresectable" are now regularly and safely removed. Meningiomas located at the base of the (cranium) skull are very difficult to access. Our use of highly specialized surgical techniques, sophisticated intraoperative monitoring equipment and minimally invasive surgical instruments allows us to expose hard-to-reach areas in their entirety without disturbing surrounding critical neurovascular structures. Patient outcomes depend on the nature of the tumor and the therapeutic plan that is followed. It is difficult to summarize all treatment results, but the range of treatment options that are currently available provides a suitable approach to most every individual case. For an appointment, a second opinion or more information, please call 1-800-CEDARS-1 (1-800-233-2771.
0.5039
FineWeb
716
Table of Contents Every sudoku program claims to be able to solve all sudokus ... well, big deal! Since for every sudoku the number of ways in which digits can be inserted into the grid is finite a computer can just try all of them and see which one fits (this approach is usually called "Brute Force" or "Guessing") - and a good implementation on a modern computer should only need a few milliseconds to do that. The real challenge is of course to solve the sudoku using only logic. For all but the easiest sudokus that requires more than just staring at the grid and hoping for a revelation. Many techniques have been developed to aid humans in finding possible next steps. Most of these techniques focus on reducing the number of candidates in order to find Singles that really advance the sudoku towards the solution. The best source for all kinds of information concerning Sudoku (including solving techniques) is still Sudopedia's Solving Technique Index which has not only in depth descriptions of a large number of different techniques but lot's of additional information not easily found elsewhere too (e.g. descriptions and techniques for Sudoku variants). In this guide about 70 techniques and variants are described in detail and illustrated with over 170 examples. Throughout this guide the following terms are used: A sudoku consists of cells, cells are grouped into houses. There are three different types of houses: rows, columns and boxes (under certain circumstances a cell can be seen as a house as well). Three boxes in a row are called a chute (a horizontal chute is a floor, a vertical chute is a tower) or a band. Cells are filled with values, the values present at the beginning of the game are called givens, possible values for unfilled cells are candidates. The whole sudoku area is sometimes called grid. If pencil and paper players write candidates into the grid these are sometimes called pencil marks, a grid with all candidates filled in is therefore a pencil mark grid or PM. Rows and columns are numbered from 1 to 9 (left to right/top to bottom), a cell is specified by it's row and column (e.g.: r5c2 means the cell at row 5 and column 2; r57c2 means cells r5c2 and r7c2). Blocks are numbered from 1 to 9 too (top most floor from left to right, then the next floor and so on). If two cells are in the same house (same row, same column, or same block) they are said to see each other, or to be peers. This is important in many techniques since two cells that see each other cannot have the same value. Copyright © 2008-12 by Bernhard Hobiger All material on this page is licensed under the GNU FDLv1.3.
0.8536
FineWeb
629
For undocumented immigrants, deportation is a constant looming threat. Given the harsh and broad categories of things that an immigrant can do to become deportable, the unfairness of the deportation adjudication system, and the devastating consequences of deportation, it makes sense that immigration law scholars focus on the phenomenon of deportation. Nathalie Martin, whose primary scholarly focus is not immigration law, reminds immigration law scholars that, unfortunately, there are many problems to explore beyond deportation. Martin explores themes of scarcity by reporting on what she learned through a qualitative study of 50 undocumented immigrants in New Mexico. The study, funded by the National Conference of Bankruptcy Judges, investigates the banking and credit habits of undocumented immigrants through a snowball sampling technique. In Survival in the Face of Scarcity, Martin uses data from the study to explore how issues of scarcity are compounded for a population without legal status. As Martin explains, her findings “show a perfect storm” (P. 109) where individuals with limited rights are fearful to assert any legal rights they have. Scarcity means having less than one needs. Martin adopts Sendhil Mullainathan and Eldar Shafir’s work on scarcity theory to help frame her study results. In her study population, Martin recognizes the bandwith tax (P. 111) discussed by Mullainathan and Shafir. The “drastic economic scarcity” (P. 114) of her subjects clearly was taking its toll, mentally and emotionally, especially in terms of the ability to cope with unplanned expenses. This economic scarcity itself was not surprising; , more surprising to Martin was the discovery that her subjects categorized unplanned expenses differently than she did. To her subjects, job loss was an expected event. Martin concluded that creating a budget as an undocumented immigrant “just doesn’t work.” (P. 119.) After exploring how scarcity affects her study population, Martin argues strict immigration laws that allow no hope of regularizing status, the threat of deportation, and ineffective consumer protection laws create a scarcity tornado that is difficult to escape. Martin’s subjects know that they are vulnerable. They know that their lack of legal immigration status means they do not have a level hand in economic transactions or in employment relationships. This makes them hesitant to exercise any legal rights they may have outside of immigration law, either informally (for example, complaining about a billing error) or more formally through the courts. Participants in the study were asked “if they feel comfortable using the court system to right a wrong.” (P. 130.) Only 32% answered yes. For 42% of the study participants, court was not an option, and 26% were not sure if they would use the court system. Participants expressed fear of deportation or an acceptance that a lack of legal status means one should not expect fair treatment as reasons not to pursue a legal claim. This means that fear of deportation (even if wholly unrelated to a potential legal claim) and a general sense of second-class status keep the individuals in Martin’s study from vindicating the legal rights that they do have in the employment, contract, and landlord-tenant contexts. Interestingly, despite the scarcity in which they live, participants in Martin’s study expressed reluctance to accept government benefits. Undocumented immigrants are ineligible for most kinds of government aid. Even when an individual or someone in the individual’s mixed status family might be eligible for a benefit, Martin reports that the study participants expressed a strong preference to make it on their own.1 Martin’s study reminds us that being an undocumented immigrant is not easy. This may seem like a simple lesson, but it is one that bears repeating. While Martin’s study group is only a small slice of the undocumented population, Martin’s study helps to rebut misleading political discourse that promotes a narrative that it is uncomplicated to be undocumented in the United States. Of all the challenges identified by Martin, the one that perhaps should be most disconcerting to law professors is a grudging acceptance that the vindication of legal rights is not practical. This is a major problem beyond deportation. Martin’s study prompts us to ask whether this is an acceptable status quo. And here is where immigration advocates, policymakers, and scholars will step in with their expertise. The immigration laws of the United States are badly in need of reform. That reform must include a path to legalization for undocumented immigrants. Only then will Martin’s study participants be able to begin to escape the scarcity and vulnerability that negatively impacts their lives and the lives of their U.S. citizen relatives. - Nathalie Martin, Giving Credit Where Credit is Due: What We Can Learn from the Banking and Credit Habits of Undocumented Immigrants, 2015 Mich. L. Rev. 989, 1022-24 (2015). [↩]
0.5596
FineWeb
1,147
5 Most Common Air Conditioning Problems For Denver Homeowners The summer time is no time for a home's air conditioning unit to stop working. It may happen and when it does, it will be important for a certified air conditioning technician to identify the problem and fix it. An air conditioning system can be complicated. A number of different things can go wrong with it. There are at least five common problems that may cause a person's air conditioning system to fail and require repairing Refrigerant Leak Problems When an air conditioning unit is low on refrigerant, there could be two main reasons for it. The unit may have been undercharged with refrigerant when it was installed. The other option is that the air conditioning unit leaks. A few years ago, a study was done to determine the true cause of refrigerant leaks in air conditioning units. It showed that leaks often occur in units up to 7 years old. The leaks often occur in the unit's copper tubing wall. The study determined that some newer air conditioning units were able to be more energy efficient. This was often achieved by using thinner copper in the evaporator coils. Heat will move quicker through thinner copper. This type of efficiency in the tubing can also be a cause of leaks. It is also common to find low levels of formaldehyde as a pollutant in most homes. This formaldehyde can change into something on the a/c coil known as Formic acid. This is very mild, but during a period of several years, it could create pinholes in an air conditioning unit's copper tubing. This is known as formicary corrosion Some of the most common air conditioning problems involve the unit's electronics. It's possible for an air conditioning unit to have a failing capacitor. This is a small cylindrical electronic component. It sends electricity to the unit's motors so they can run. A capacitor will begin to show signs of wear when too much voltage is affecting the unit. The capacitors will need to be replaced. This is evident by a clicking sound coming from the unit's cabinet. Circuit breakers frequently tripping is another problem. If home's circuit breakers trip when an air conditioning unit turns on, the system needs too much power. There could be a problem with the wiring within the unit's motors. Relays are components that transmit power to a unit's motors. When a relay is stuck in the open position, there is a problem. This could keep the motor from turning on. If the relay is stuck in the shut position, the motor will not turn off. Homes with room air conditioners have a thermostat sensor. This is usually located behind the unit's control panel. It will measure the temperature of air coming into the unit's evaporator coils. As air goes past the unit's sensor, its temperature is identified. The sensor then contrasts this to the thermostat's desired temperature. If the temperature needs to be warmer or cooler, the sensor will activate the unit's compressor. This will make it cool until a home's temperature matches the temperature set on the unit's thermostat. Should the unit's sensor get out of position, the unit could constantly cycle. In other cases, it will begin to operate erratically. The sensor needs to be located near the coils but not touching them. When the sensor touches the coils, an air conditioning unit can begin to act erratically. This can be corrected by eliminating any unusual angles of a sensor toward or away from the unit's coils. If this is done, and the unit still does not work correctly, there may be other problems with the air conditioning unit. A trained technician will be able to further evaluate the unit and recommend any necessary repairs. Inadequate Maintenance Problems When the filters and coils in an air conditioning unit become dirty, the air conditioner will not operate properly. It is important for an air conditioning unit to have a clean filter installed every month. Some filter types can be cleaned, and others must be replaced. When filters are not regularly changed, the efficiency of an air conditioning unit is significantly compromised. This is especially important during the months a unit is used the most. It is essential to know the filter's minimum efficiency reporting value and only to use filters specifically designed for the unit. When this isn't done, it can permit dirt to be carried directly into the unit's evaporator coils and decrease its ability to absorb heat. As an air conditioner is utilized, it's evaporator coil and condenser coil will collect dirt. Even with regular changing of the air filter, these coils will retain dirt. Outdoor condenser coils will have significant levels of dirt from being in an outside environment. This is especially true if there are trees and plants nearby. An air conditioning unit's coils need to be checked and cleaned at least once a year or more depending on the unit's location. Turning Off Problems If an air conditioning unit goes off and on without warning, it could be the result of air flow within the unit being restricted. In some cases, a dirty air filter is the problem. In some units, this is a result of too much moisture being captured. This can cause the unit's water tank to fill up. There is often a light on the unit that indicates when its water tank is filled. A unit repeatedly turning off can happen on days that are extremely hot. The high temperatures can cause a problem with the air moving through the unit. In some cases, the problem could be a thermostat too close to windows or air vents. A thermostat in the wrong location can cause a unit to react to the wrong inside temperature. In some cases, a broken thermostat may be at fault. If this is a constant problem after an air condition unit is installed, the system may be too large for the structure where it was installed. When this is done, it will decrease the amount of time to cool off an indoor environment but will increase energy bills, cause uneven cooling and other problems.
0.5005
FineWeb
1,325
In a discovery that could shed light on the development of the human brain, University of Oregon researchers determined that infants as young as six months old can recognize simple arithmetic errors. The researchers used puppets to portray simple addition problems. For example, in order to illustrate the incorrect equation 1 + 1 = 1, researchers showed infants one puppet, then added a second. A board was then raised to block the infant’s view of both puppets, and one was removed. When the board was lowered, only a single puppet remained. To gauge the infants’ ability to detect the error, researchers recorded the number of seconds the babies spent looking at the puppet. According to the study, babies ranging from six to nine months old looked at incorrect solutions 1.1 seconds longer than correct ones. This extended viewing correlated with EEG measurements showing higher activity in a frontal area of the brain that is known to be involved in error detection in adults. The team’s findings are published in the August 7th online edition of The Proceedings of the Natural Academy of Sciences. “This brain system, in adults, allows us to monitor our own performance and even correct it,” said psychologist Michael Posner, the study’s lead author. “We know that infants can’t necessarily correct it, but they do apparently have at least a start of that brain system.” Posner’s study bolsters the results of a 1992 Yale study that measured length of gaze but did not include EEG measurements, an omission that led many scientists to doubt its conclusions. Since the babies in Posner’s experiment wore a net of brain-monitoring electrodes, the researchers could pinpoint enhanced brain activity following the presentation of incorrect solutions. Scientists previously thought that the brain system this data highlighted developed later, around two and a half years of age. The findings could help scientists understand how early control systems are laid down in the brain and may eventually help them to analyze the genetic and experiential factors that influence early brain development, Posner said. Patricia Kuhl, a professor of speech and hearing sciences at the University of Washington, believes studies like Posner’s can reveal mechanisms in the infant brain that could help doctors monitor its development. “The more we know about these infant systems,” Kuhl said, “the more likely it is that we might be able to detect impairments early, and intervene while the brain is still being sculpted.” Posner added that his findings could also clue scientists into the development of the brain’s representation of numbers. “Some people have always thought that our number system is just something that’s been created by humans and learned by us, then taught to our children,” Posner said. “But there seems to be a proto-number system—the beginning of a number system—that is available in other animals,” he continued, “and apparently is present in infants as well.” Originally published August 18, 2006
0.9726
FineWeb
641
The Practical Politics of Cultural Studies Routledge – 2000 – 160 pages Henry A. Giroux challenges the contemporary politics of cynicism by addressing a number of issues including the various attacks on cultural politics, the multicultural discourses of academia, the corporate attack on higher education, and the cultural politics of the Disney empire. "Giroux is to be commended for his concise discussion of complex themes of academic discourse on democratic citizenship. He also does an excellent job of defining the terms that would be included in a thoughtful conversation about what it means to be a democratic citizen." -- Choice "Henry Giroux continues to lead the way in thinking creatively and critically about the interfaces between multiculturalism, cultural studies, pedagogy (in the broadest sense) and political analysis. Impure Acts revitalizes and reconstructs the culture of politics in the face of the prevailing pressures to reduce politics to the cultural marketplace. He returns us to questions of power and the public sphere, culture and critical contestation, desire, domination, and democracy. The book is vintage Giroux." -- David Theo Goldberg, Arizona State University "Henry Giroux deftly shows how corporate culture functions as a cultural teaching machine that thwarts democratic practice. By forging links between critical educators and cultural studies scholars, he redefines the crucial role both can play as public intellectuals attuned to the economic, social, and ideological power relations of multinational capitalism." -- Lee Quinby, Rochester Institute of Technology "Writing with power and passion, Henry Giroux provides a compelling and evocative explication of the political significance of cultural studies and the transformative potential of critical pedagogy. He addresses critics from both the left and the right, and invites all cultural workers to join in a radical project of revitalizing democratic life. In this book, Giroux presents a thought-provoking and inspiring call for analysis and action, an "educated hope" that can counter cynicism and despair. Reading this book reminds us why critical pedagogy matters. Taking its lessons to heart will help us become more astute in our critiques of the relationship of culture and power, and more creative in our transformatiave pedagogical strategies." -- Sharon Welch, University of Missouri at Columbia "There is no one writing in the U.S. today who can bridge culture, politics, and pedagogy as brilliantly as Henry Giroux does in Impure Acts. Once again with this book Giroux remains unchallenged as the premiere scholar of critical and cultural pedagogy." -- Kostas Myrsiades, West Chester University "Once again Giroux advances the discourse in this field, outlining here a critical pedagogical project that locates resistance and political insurgenacy at every level of daily cultural life. This work requires careful study and close analysis." -- Norman K. Denzin, University of Illinois at Urbana-Champaign recent books include: Fugitive Cultures: Race, Violence, and Youth (Routledge 1996), Channel Surfing: Race Talk and the Destruction of Today's Youth (St. Martin's Press 1997), Pedagogy and the Politics of Hope (Westview/Harper Collins 1997), The Mouse That Roared: Disney and the End of Innocence (Rowman and Littlefield 1999) and Stealing Innocence: Youth, Corporate Power, and Cultural Politics (St. Martin's Press, forthcoming).
0.6675
FineWeb
805
If a tooth goes bad, you expect to maybe get a toothache. If a gum is swollen, maybe you swish your mouth with salt water and hope it gets better. What you may not realize is that dental issues like swollen gums or toothaches could be the start of a much more serious illness – including some illnesses that could cost you your life. Let’s look at the connection between dental health and your overall health. The relationship between your dental condition and overall health runs in two directions. Dental issues may open the door to more serious health problems – and conversely, serious health problems can affect the health of your mouth, resulting in dental problems. That’s why it’s important for your dentist to be involved in your healthcare. Your will know when to refer you to a medical doctor or specialist to rule out any serious health conditions or bring them under treatment. Without that referral, you might be developing a life-threatening health problem you know nothing about. Health Problems Your Dentist May be Able to Detect Through regular dental exams, your can detect these signs and refer you for care: - Acid reflux disease which can result in stomach acids attacking your teeth – most often your bottom teeth. Your dentist can find erosion in these teeth early and inform you so you can take action to treat acid reflux. - Periodontal disease (an inflammatory disease of gums and structures supporting the teeth) can change the body’s metabolism which can contribute to pre-diabetes and, eventually, diabetes. - Raised bumps or recurring canker sores on your gums that could indicate Crohn’s disease. - Poor oral or dental care or chronic inflammation in the mouth which can contribute to mouth cancers. - Bacteria from infections in the mouth which can slow the growth of a fetus, resulting in low birth weight and lower survival rates. Other Health Problems Related to Dental Issues Here’s some of the other relationships between dental health and overall health that research has revealed: - Missing teeth or missing bone around a tooth has been associated with a greater risk of having a stroke. - Diseases like diabetes or chronic stress conditions can make oral tissues more susceptible to infection. - Regular dental care by those already suffering from diabetes was found to be associated with a lower number of diabetes-related hospital visits. - Periodontal disease showing up in a person who takes good care of their teeth could be a sign of heart disease and a higher risk of heart attack. - Swelling and pain in the jaw can be a sign of rheumatoid arthritis because early involvement of the temporomandibular joint (where the jawbone fits into the skull near the ear) is common. - Hundreds of medications that a person might be taking for a health condition cause dry mouth as a side effect and this affects the health of one’s mouth and teeth. To find out if a drug you are taking could be affecting the saliva your body produces, visit this page: - Your dentist can also spot slight discoloration of tissues around your tongue or in the back of your throat that can be signs of oral cancer. We hope you get the picture that your dentist is an important person to have on for your overall health! Please make sure you maintain a regular schedule of hygiene and exam visits and follow your dentist’s recommendations. We invite you to visit us for any of your oral hygiene needs. Please give the office a call at
0.9683
FineWeb
751
It is now possible to investigate the entire population of a class of biomolecules in a cell or tissue simultaneously. Genomics, the study of all of the genes in an organism was the first such technology. Now, transcriptomics, proteomics, metabolomics, lipidomics, and a host of other “omics†techniques are changing the way biologists view and study cells. Data from these techniques are catalyzing fundamental changes in our understanding of biology. One such change is the view of organisms as dynamic systems composed of networks. These networks are highly interwoven and span molecular classes. Significantly, it is now clear that it is not possible to understand a biological system by only studying the parts. It is the goal of systems biology to integrate data on cellular networks into mathematical models with predictive power. While models that can predict biological responses have begun to emerge, they are still very limited. Our research focuses on model systems with the goal of developing biological models that can then be extended to more complex organisms and eventually human disease. Archaea are philogenetic intermediates between Eukaryotes and Bacteria. The general lack of knowledge about their physiology and small genome size make them a good choice for systems biology studies. The extremophiles S. solfataricus is a member of the Archaeal domain of life and is a modle system for understanding adaptations to life in extreme environments. Using deep sequencing, proteomics, and metabolomics we are mapping metabolic pathways and building models of signaling networks in this interest organism that inhabits many of the hot springs in Yellow Stone National Park. Few, if any, microbes live in functional or spatial isolation. The nature of the various types of inter-species interactions can be complex, ranging from competition to mutualism or syntrophy (metabolic interdependence). Such relationships can impact keystone species and play a major role in energy and element cycles at scales that extend past ecosystem boundaries. Currently, there is little understanding of the fundamental mechanisms of interspecies recognition and communication, how mutualism and syntrophy impacts microbial genome evolution and what genetic regulatory mechanisms control metabolic/energetic coupling between species in response to environmental factors. To address these questions we are studying the archaeal symbiotic system Ignicoccus hospitalis-Nanoarchaeum equitans to characterize mechanisms of interspecific recognition and communication, modulation of gene expression and metabolic processes triggered by the association. With a combined genomic complement of less than 2000 genes and an obligate chemolithoautotrophic metabolism that integrates adaptive traits and biochemical processes of interest to DOE, this system represents the simplest microbial association known in nature and allows fundamental system level investigations and modeling of symbiosis. We have adopted this system and are using a two-level proteomics approach to elucidate pathways and proteins involved with MNV infection. At the systems level, 2D differential gel electrophoresis (2D-DIGE) is being applied to generate an overview of the global changes in the host proteome during infection. This is being complemented by activity-based screening of enzyme classes. Activity-based protein profiling (ABPP) is currently the only technique that can directly measure specific protein activity across a biological system. Research Associate: Dr. Walid Maaty. Post Doctoral: Monika Tokmina-Lukaszewska Graduate students: Joshua Heinemann, Patricia Mathabe, and Michelle Tigges. Proteomics, Chemical Biology, Biochemistry, Analytical
0.949
FineWeb
768
A new study from the Wildlife Conservation Society (WCS) and the Nevada Department of Wildlife (NDOW) has pieced together the last 150 years of history for one of the state's most interesting denizens: the black bear. The study, which looked at everything from historic newspaper articles to more recent scientific studies, indicates that black bears in Nevada were once distributed throughout the state but subsequently vanished in the early 1900s. Today, the bear population is increasing and rapidly reoccupying its former range due in part to the conservation and management efforts of NDOW and WCS. Compelled in part by dramatic increases in human/bear conflicts and a 17-fold increase in bear mortalities due to collisions with vehicles reported between the early 1990s and mid- 2000s, WCS and NDOW began a 15-year study of black bears in Nevada that included a review of the animal's little-known history in the state. Over the course of the study, black bears were captured both in the wild and at the urban interface in response to conflict complaints. The captured animals used in the study (adult males and females only) were evaluated for multiple physiological indicators including condition, sex, reproductive status, weight, and age, prior to being released. From the information gathered, the population size in the study area was estimated to be 262 bears (171 males, 91 females). Confirmed sightings and points of capture from 1988 to present were mapped and presented in the report to illustrate current population demographics, and will be used to inform bear management in Nevada. "It's critical to understand the population dynamics in a given area in order to make informed decisions regarding management," said WCS Conservation Scientist Jon Beckmann. "This includes decisions on everything from setting harvest limits to habitat management to conservation planning in areas where people will accept occupation by bears. We used this long-term study to determine if reported incidences were due to an increasing or expanding bear population, or people moving to where bears are located. The answer is both." The study area extended from the Carson Range of the Sierra Nevada eastward to the Virginia Range and Pine Nut Mountains, and from Reno south to Topaz Lake--an area collectively referred to as the Carson front. Because many captures were in response to conflicts, the urban interfaces of cities and towns of the Lake Tahoe Basin were included. Nevada's Black Bear History Unraveled In looking to integrate information on the historical demographics of black bears into their study, the authors found that little published scientific research or data was available and that the species' history in Nevada went largely ignored until 1987-- when complaints arising from sightings and road collisions with vehicles began. Historical records compiled by retired NDOW biologist Robert McQuivey that included old newspaper articles, pioneer journals dating as far back as 1849, and NDOW records that had long been unavailable, were reviewed and confirmed that black bears were present throughout the state until about 1931. At that point, the authors concluded that "the paucity of historical references after 1931 suggest extirpation of black bears from Nevada's interior mountain ranges by this time." "The historical records paint a very different picture of Nevada's black bear than what we see today. This new perspective is a good indication of what bear management in this state could involve should the population continue to expand," said the study's lead-author Carl Lackey of NDOW. The authors believe that while over-hunting and conflicts with domestic livestock contributed to the bear's local extinction in the Great Basin, landscape changes due to clear-cutting of forests throughout western and central Nevada during the mining booms of the late 1800s played an important role as well. But as fossil fuels replaced timber as a heat and energy source, forestry and grazing practices evolved, and reforestation and habitat regeneration occurred in parts of the their former range, the bears rebounded. Using the information gathered in their review of historic documents, the scientists mapped the distribution of black bears within the interior of Nevada during the 1800s and early 1900s. They recommend that historical range maps for the species in North America be revised to include the information produced as part of the study. The study, Bear Historical Ranges: Expansion of an Extirpated Bear Population, appears in the current online edition of the Journal of Wildlife Management. Co-authors include Carl W. Lackey of the Nevada Department of Wildlife, Jon P. Beckmann of the Wildlife Conservation Society, and James Sedinger of the University of Nevada, Reno.
0.5802
FineWeb
1,053
When I was a full-time software developer, I liked nothing better than sitting down and writing code. Like many of you, I could sit down early in the morning and write code for hours at a time. Of course, along with the coding comes the testing, which I never enjoyed as much. But it is during the testing process that you really find out what kind of programmer you are. Were the hundreds, or thousands, of lines of code just so much garbage, or did testing prove the beauty and logical strength of your code? In fact, as I matured in the software development field, I realized that the software testing process shows much more than how good a programmer you are. It also shows how well you met your business requirements and how well you designed your application. As I moved into positions of greater project responsibility and eventually into project management, I made perhaps my greatest mental leap—the testing process has a life cycle of its own. For small development efforts, you may be able to get away with thinking about testing as you are writing the code. But for larger projects, the testing process begins during the analysis phase and goes through the end of the project. The purpose of testing It is worth stating the obvious about the reason we do testing at all. First, we want to ensure that the solution meets the business requirements. For instance, if a specific business transaction follows a logical path from A -> B -> C -> D, we want our testing to prove that this, in fact, happens. Second, we test to catch errors and defects. These may be programming errors or errors that were introduced earlier in the development life cycle. In other words, we need to prove that our solution is correct, while at the same time proving that there are no errors or defects. You may not catch any errors (ha!), but you still need to prove that the solution meets the business requirements. Some basic tenets of testing Regardless of the type of project you are on, you want to catch as many errors as early in the life cycle as possible. I have seen projects that purposely blast through the analysis, design, and coding phases with a philosophy that they will fix all the problems in testing. This is usually disastrous. It’s not so bad to correct programming errors that you discover in your testing. It is much more difficult when you realize that a design error resulted in information missing from your database. It is even harder if you discover that your analysis missed an entire business process. At the same time, you can’t ensure that your software is perfect. Even with the best tools, it’s impossible to test every logic path of every program. Therefore, you can’t ever be sure that your code is bug-free. There are times when software that has been stable for 10 years suddenly breaks through an unlikely combination of circumstances that never occurred before. (I call this type of problem a “subtle” bug.) Since you can’t build the perfect, bug-free system, the project team needs to understand the cost of testing and recognize when the cost exceeds the benefit. You can get into a lot of trouble if your testing is not rigorous enough. However, testing too much can be a waste of precious resources. You can’t deliver a perfect system, but you can determine how much testing makes sense given the characteristics of your project. Building an internal application to track customer complaints does not need the testing rigor that was required for the Apollo moon mission. Coming soon: The testing process in more detail If you were so inclined, you could write a thousand pages on the testing process. Builder readers will be glad to know that I am not so inclined. However, this is the first in a series of columns that will describe the overall testing process in some detail. These columns will provide information you can use on your projects today but will not get into the science of testing, which would bore you to tears. Future columns will cover topics such as: - Thinking ahead: Defining your overall testing strategy - Preparing for testing: Establishing the detailed testing plan within the context of the testing strategy - Unit testing: Establishing the first line of defense against errors and defects, one program at a time - Integration testing: Putting the unit-tested pieces together - System testing: Making sure that the system meets all the requirements in terms of functionality and performance - Acceptance testing: Having the clients validate that the system functions and operates up to their expectations - Testing metrics: Measuring the effectiveness, completeness, and rigor of the testing process - Testing tools: Automating parts of the testing process is a requirement on large projects - Customizing the testing process: Determining the development life cycle (package implementation, RAD, waterfall, etc.) is necessary before you can determine your testing process - Testing teams: Explaining the roles and responsibilities of software testers and how different companies organize the testing teams As we journey through the testing life cycle, Builder will also publish a series of related templates you can use on your projects today. I hope the entire series provides you with a sense of how a proactive testing process will result in a better quality solution and a more effective and efficient development project. Key points to remember While future columns will cover different aspects of the testing process in more detail, here are a few points to keep in mind: - Don’t think of testing as a series of events that take place after programming. Instead, take a holistic view of testing as a process that runs throughout the development life cycle. - If the testing process is thought through early in the project, the actual execution will be much more efficient and effective. - There is no such thing as a perfect solution. Each project team needs to determine how rigorous a testing process makes sense, based on the characteristics of the solution and the consequences of defects occurring in production.
0.6028
FineWeb
1,236
Blitzkrieg–the word evokes images of charging panzers, Stuka dive bombers, and encircled French troops. The purpose of this article is to discuss the accuracy of this general impression and then meditate on the whether or not Flames of War captures this style of offensive warfare on the table top. So what are we talking about when we use the term? In practical terms blitzkrieg refers to the mobile warfare doctrine developed by a younger generation of German officers in the 1930s. These officers argued that armoured forces should be concentrated along a narrow front to achieve a breakthrough in the enemy’s lines. Many military forces in the 1930s saw armour as primarily a tool for infantry support and tanks were distributed among infantry formations rather than concentrated in armoured divisions. According to the German model the concentrated mobile forces could exploit breakthroughs and plunge deep behind the enemy lines to destroy logistics and command structures. At the same time large portions of the enemy would be encircled and eliminated. Let’s take a look at an actual German operation. The German strategic offensive for the summer of 1942, Case Blue, involved a huge drive into southern Russia. Hitler committed a blunder in August when he split Army Group South into two groups. One group continued to push south to the oil fields. The other group headed to the Volga and Stalingrad. As the Germans approached the Volga there was a major engagment west of the Russian village of Kalach. The German military published a magazine called Signal for popular reading by the troops. The following maps of the battle of Kalach are taken from it. In this first map below we see the initial German penetration north of Kalach. There is a major cut from the north and a broader application of pressure from the south. Bear two things in mind as you look at this first map. First, we’re in mid-1942 now and the Soviets and others are now implementing (or attempting) counters to blitzkrieg. You see it in the two black arrows. These represent Soviet forces attacking the flanks of the armoured spearhead. If these attacks succeed then the German armoured forces become encircled, not the Soviets. The attack failed in this circumstance–beaten off by German grenadiers following up the armoured forces. The second thing to note is the bulge created by the German advance. This illustrates the dual purpose of the blitzkrieg: exploit but also encircle.
0.8858
FineWeb
552
plant reproductive systemArticle Free Pass - General features of asexual systems - General features of sexual systems - Bryophyte reproductive systems - Tracheophyte reproductive systems - Variations in reproductive cycles - Physiology of plant reproduction plant reproductive system, any of the systems, sexual or asexual, by which plants reproduce. In plants, as in animals, the end result of reproduction is the continuation of a given species, and the ability to reproduce is, therefore, rather conservative, or given to only moderate change, during evolution. Changes have occurred, however, and the pattern is demonstrable through a survey of plant groups. Reproduction in plants is either asexual or sexual. Asexual reproduction in plants involves a variety of widely disparate methods for producing new plants identical in every respect to the parent. Sexual reproduction, on the other hand, depends on a complex series of basic cellular events, involving chromosomes and their genes, that take place within an elaborate sexual apparatus evolved precisely for the development of new plants in some respects different from the two parents that played a role in their production. (For an account of the common details of asexual and sexual reproduction and the evolutionary significance of the two methods, see reproduction.) In order to describe the modification of reproductive systems, plant groups must be identified. One convenient classification of organisms sets plants apart from other forms such as bacteria, algae, fungi, and protozoans. Under such an arrangement, the plants, as separated, comprise two great divisions (or phyla)—the Bryophyta (mosses and liverworts) and the Tracheophyta (vascular plants). The vascular plants include four subdivisions: the three entirely seedless groups are the Psilopsida, Lycopsida, and Sphenopsida; the fourth group, the Pteropsida, consists of the ferns (seedless) and the seed plants (gymnosperms and angiosperms). A comparative treatment of the two patterns of reproductive systems will introduce the terms required for an understanding of the survey of those systems as they appear in selected plant groups. General features of asexual systems Asexual reproduction involves no union of cells or nuclei of cells and, therefore, no mingling of genetic traits, since the nucleus contains the genetic material (chromosomes) of the cell. Only those systems of asexual reproduction that are not really modifications of sexual reproduction are considered below. They fall into two basic types: systems that utilize almost any fragment or part of a plant body and systems that depend upon specialized structures that have evolved as reproductive agents. In many plant groups, fragmentation of the plant body, followed by regeneration and development of the fragments into whole new organisms, serves as a reproductive system. Fragments of the plant bodies of liverworts and mosses regenerate to form new plants. In nature and in laboratory and greenhouse cultures, liverworts fragment as a result of growth; the growing fragments separate by decay at the region of attachment to the parent. During prolonged drought, the mature portions of liverworts often die, but their tips resume growth and produce a series of new plants from the original parent plant. It is common horticultural practice to propagate desirable varieties of garden plants by means of plant fragments, or cuttings. These may be severed leaves or portions of roots or stems, which are stimulated to develop roots and produce leafy shoots. Naturally fallen branches of willows (Salix) and poplars (Populus) root under suitable conditions in nature and eventually develop into trees. Other horticultural practices that exemplify asexual reproduction include budding (the removal of buds of one plant and their implantation on another) and grafting (the implantation of small branches of one individual on another). Reproduction by special asexual structures Throughout the plant kingdom, specially differentiated or modified cells, groups of cells, or organs have, during the course of evolution, come to function as organs of asexual reproduction. These structures are asexual in that the individual reproductive agent develops into a new individual without the union of sex cells (gametes). A number of examples of special asexual agents of reproduction from several plant groups are in this section. Airborne spores characterize most nonflowering land plants, such as mosses, liverworts, and ferns. Although the spores arise as products of meiosis, a cellular event in which the number of chromosomes in the nucleus is halved, such spores are asexual in the sense that they may grow directly into new individuals, without prior sexual union. Among liverworts, mosses, lycopods, ferns, and seed plants, few-to many-celled specially organized buds, or gemmae, also serve as agents of asexual reproduction. The vegetative, or somatic, organs of plants may, in their entirety, be modified to serve as organs of reproduction. In this category belong such flowering-plant structures as stolons, rhizomes, tubers, corms, and bulbs, as well as the tubers of liverworts, ferns, and horsetails, the dormant buds of certain moss stages, and the leaves of many succulents. Stolons are elongated runners, or horizontal stems, such as those of the strawberry, which root and form new plantlets when they make proper contact with a moist soil surface. Rhizomes, as seen in iris, are fleshy, elongated, horizontal stems that grow within or upon the soil. The branching of rhizomes results in multiplication of the plant. The enlarged fleshy tips of subterranean rhizomes or stolons are known as tubers, examples of which are potatoes. Tubers are fleshy storage stems, the buds (“eyes”) of which, under proper conditions, can develop into new individuals. Erect, vertical, fleshy, subterranean stems, which are known as corms, are exemplified by crocuses and gladioli. These organs tide the plants over periods of dormancy and may develop secondary cormlets, which give rise to new plantlets. Unlike the corm, only a small portion of the bulb, as in lilies and the onion, represents stem tissue. The latter is surrounded by the fleshy food-storage bases of earlier-formed leaves. After a period of dormancy, bulbs develop into new individuals. Large bulbs produce secondary bulbs through development of buds, resulting in an increase in number of individuals. General features of sexual systems In most plant groups, both sexual and asexual methods of reproduction occur. Some species, however, seem secondarily to have lost the capacity for sexual reproduction. Such cases are described below (see Variations in reproductive cycles). Do you know anything more about this topic that you’d like to share?
0.9964
FineWeb
1,506
In Part I we introduced you to our Five Keys and discussed one through four. To review, the Five Keys are: 1. Real World Volume 2. Maximize Return on Time Invested 3. Fitness = Ability to Perform More Work 4. Intensity = Most Flexible Tool to Manipulate Training Load 5. The Best Predictor of Performance is Pace/Watts at Functional/Lactate Threshold. In this article we'll discuss why pace/speed/watts at Functional or Lactate Threshold, not training volume, is the best predictor of performance at all race distances. Let's begin with a quick review of Key #3: Fitness as the Ability to Perform more Work. As we discussed, the functional expression of your fitness is the ability to pedal your bike, run or swim at given speed -- to perform the physics of moving the mass of your body through space. In order to force your body to adapt, you need to make it perform more work. But let's talk about what happens inside your body as you ask it to perform more work -- to ride, run or swim faster. Your body begins by recruiting slowtwitch muscle fibers. These fibers: - Are good at performing relatively low force contractions...but - They can go and go and go for a long time. They are fatigue resistant. - They recover quickly. - Primarily burn fat for fuel. At ~3600 calories per one pound of fat, even then leanest triathlete has a nearly endless fatty gas tank. - Muscles fibers only adapt when you recruit them and make them do more work than they are accustomed to. The more often you recruit your slowtwitch fibers, ie, the more exercise you do, the better they become at doing slowtwitch stuff: they adapt to produce more force, go longer, and become more fuel efficient. Remember that your body is lazy and will only adapt itself to meet the load you place upon it. The more stress you place on this system, the more it is forced to adapt. As the workload increases (you go faster and faster) your body recruits a more and more slowtwitch fibers to chip in. At some work rate (speed), you begin to run out of slowtwitch fibers to recruit and your body begins to call in fast twitch fibers to do the work. Fast twitch fibers: - Perform high force contractions, but... - Tire easily and take a long time to recover. One and done, or need to rest a good bit before being put back to work again. - Burn glycogen for fuel. The well-trained, well-rested endurance athlete only has about 1800-2000 calories of glycogen stored in the muscles and in the liver, much more limited than our fat reserves. - Same adaptive jazz as above: the more often you recruit fast twitch fibers, ie, force them to work, the better they become at doing fast twitch stuff. Better still, some of them can begin to take on the characteristics of slow twitch fibers, increasing the number of fat-burning (unlimited energy source) fibers you have available to swim, bike, or run. - Produce lactate as a byproduct. Which brings us to Lactate Threshold, a term you may have heard of. This is an exercise intensity at which lactate levels in the blood rise above a certain level, as more and more fast twitch fibers (produce lactate) are called upon to work. It's called a "threshold," because we can exercise for a long time at or just under this intensity. However, above this intensity, lactate levels increase, we rapidly fatigue and are eventually forced to slow down. At lactate threshold intensity we can say we have recruited most or all of our slowtwitch fibers, and a good bit of our fast twitch fibers, forcing them to adapt and become better at their respective roles. Finally, we can sit here for a long time, exposing our fibers to this work load and forcing them to adapt to meet it. We summarize all of the above by saying that "Fitness is in the muscles." That is, a workout is nothing more than an opportunity to recruit a high percentage of muscle fibers, forcing these fibers to adapt and become better at what they do. As they become better muscles, they can do more work, the expression of which is "I go faster." We remind our athletes of this by including this phrase on our cycling and racing kit: Work is Speed Entering the Body Let's now talk about the real-world training implications of all of this: - Training Zones determined relative to Lactate Threshold (LT): Because Lactate Threshold is such a powerful place, we want to define our training intensities relative to LT. No big secret here, there are many systems for doing this, but hopefully our explanation above sheds more light on just why this is so powerful. - Zones 1 and 2 = you're not really making yourself faster, at least not in a time efficient manner. If all you do is exercise at Zone 1 and 2, you have entire squads of slowtwitch and fast twitch fibers that are never recruited, never forced to adapt. In other words, you'll get very, very good at riding and running very slowly! Yes, you can get faster by riding and running a LOT in Zone 1 and 2. However, in our experience, the volume required for this to happen, especially for cycling, is just not realistic or sustainable for the average age grouper. - Zone 4 (Lactate Threshold) = Maximum exposure of all fibers to a training load forcing them to adapt. At Zone 4, ALL of my slowtwitch fibers are recruited and forced to adapt, MANY of my fast twitch fibers are doing the same. This is a very efficient place to spend spend your training time because you get so many go-longer and go-faster adaptions. And not much time is required. For example, in our experience, as little as forty minutes of LT work per week spread across your cycling can dramatically increase your speed on the bike. - Fitness adaptions occur within a range of intensities: The either/or of Aerobic/Anaerobic exercise described by triathlon culture is simply not correct. The summary of all of this is the Fifth Key: Pace/Power/Speed at Lactate Threshold is the Best Predictor of Performance. That is, if we can improve your 5k, 10k, or half marathon time, we can make you a faster Half or full Ironman runner once we then put some endurance and durability under those faster running legs. If we can improve the speed at which you can ride for an hour from 19mph to 22mph, that similar speed increase will be expressed at 56 and 112 miles, assuming we put some endurance under it. In other words, "a rising tide lifts all boats." We target, test, and track the "tide" of our athletes, as we know from that experience that fast at short is fast at long, once we put "far" under that "fast." Join us next week for Part III, where we will contrast the ideas and experiences we have shared with you in this series with commonly held endurance training myths. by Rich Strauss and Patrick McCrann, Endurance Nation Interested in learning more? We've created a free virtual seminar learning opportunity for you. Participants will receive practical tools for planning and managing their training, as well as opportunities to win free training plans and copies of our Four Keys of Ironman Execution DVD. Go here to learn more and register today! Endurance Nation is the world's only 400 person long course triathlon team, with 30-40 athletes at every US Ironman.
0.828
FineWeb
1,750
Geography and Climate Yakushima is one of the southwest islands of Japan, which is situated approximately 60 km from the southern most tip of Cape Sata-misaki in Kyushu. Most of the land is made of uplifted granite, and the island is about 504 km² and 132 km in perimeter. Tall mountains, such as Mt. Miyanoura (1,936 m) of the highest peak in Kyushu region, Mt. Kuromi, Mt. Nagata, Mt. Kurio and three other mountains that exceed 1,800 meters dominate the central part of the circular island. Most of the mountains that surround the center exceed at least 1,000 meters, giving the name “Alps on the Ocean.” The population is roughly 13,500, and people live on plain grounds around the coastal area since the mountains are steep. In the administrative section, Yakushima and Kuchinoerabujima islands belong to Yakushima-cho, Kumage-gun, and as well as Kagoshima prefecture. Constitution, Geological Feature The rocks lying as the foundation of Yakushima are sedimentary rocks made of sand or mud. They were piled up as a trench approximately 40 million years ago along with landslides that occurred due to tectonic plate movements. Most areas of the mountains that people climb are made of granite created by the result of intrusion of hardened magma (by a cooling process) that developed about 15 million years ago. Because the granite is much lighter than other rocks, it had caused the stratum to be pushed up at several millimeters per year at a considerably fast rate. The outer surface that encompasses the granite are metamorphic rocks (hornfels) made of sedimentary rocks burnt from the heat of magma. Metamorphic rocks are hard and highly resistant to erosion which have allowed many cliffs and waterfalls to be produced. The red volcanic ashes of stratum can be observed especially in the northwestern part of Yakushima. This was a caused by a large eruption of Kikai Caldera that occurred 73 million years ago. Yakushima continues to rise at the rate of 13 cm in 1,000 years. The climate and weather in Yakushima is greatly influenced by the Kuroshio Current. The moisture-rich air caused by the warm current fills the mountaintops. Because of the cool temperature at the high peaks, however, it produces rain clouds that create a large quantity of rain each year. This is one of the reasons why Yakushima is also known as the “Island of Water.” The rich water in Yakushima is the life of all living things, and it has produced magnificent scenes and untouched cedar forests. There are various ways that it rains which are different by seasons and areas. As a result, the characteristic of the weather in Yakushima can be quite unpredictable and wild. Although a tiny island, it could be raining heavily one minute in the southern part when it is completely sunny on the other side. The annual mean temperature at the lower altitude level plains where most islanders live is approximately 20 ℃. Because of the mountains in Yakushima, the village areas are considered to be subtropical with warm temperatures, whereas the mountaintop is considered to be the cold zone. It is as if you had placed various climate zones that extend the Japanese mainland perpendicularly on top of this tiny island.
0.9394
FineWeb
795
As computers grow more and more powerful, they become more useful as collaborators for scientists studying a diverse range of topics. Computers are good at repetitious tasks that would drive a human researcher mad, accomplishing tasks that are akin to not just finding a needle in a haystack, but painstakingly cataloging each piece of hay along the way. It may be a stretch to call this work “intelligence,” but as computational methods get better at classifying, analyzing, and predicting information, the lines between human and automated insight blur. To highlight these advances and their relevance to disciplines ranging from science to the humanities, the Knowledge Lab and the Computation Institute started the Computational Intelligence talks, which will continue through the rest of 2014. The series fits snugly within the Knowledge Lab’s mission to apply the latest computational techniques, such as text mining and machine learning, to the rapidly growing stores of digital information in order to better understand the history and future of knowledge creation. As Knowledge Lab director James Evans wrote in Science last year, algorithmic “robots” may be the scientists of the future, and Computational Intelligence speakers will preview these powerful methods. The first two Computational Intelligence talks, held at the CI’s UChicago location last week, provided glimpses of what is newly possible with these advances. Dashun Wang of IBM talked about predicting the future: how many citations a new research paper will accumulate, and more broadly forecasting the success of a scientist’s career. Yuening Hu of the University of Maryland discussed how to organize the past, using topic modeling methods to make sense of huge document archives. A Crystal Ball for Citations In his talk on quantifying long-term scientific impact, Wang drew a contrast between the complex mathematical models used to predict natural events, such as hurricanes, and the largely “gut feeling” methods used in hiring for jobs. While scientists have figured out the behavior of severe storms well enough to reasonably predict their path, the art of predicting who will have a successful career from their past accomplishments remains an inexact science. In science, even singling out which journal articles will go on to be important to their field remains difficult, with crude measures such as journal “impact factor” failing to predict the impact of individual papers. So Wang set out to build a mathematical model that could describe the dynamics of how often papers are cited in the future, to try and find factors that could be used in predictions. When he charted the citation rates of papers from the archives of the American Physics Society and Web of Science, he found a noisy “mess,” with papers following a wide variety of citation patterns. Some articles enjoyed an early burst of citations before falling off to almost nothing, while others -- some “‘truly outstanding exceptional papers,” Wang said -- were largely ignored for years before experiencing a late burst of recognition. Despite this variability, Wang designed a predictive model for future citations using just three factors: preferential attachment (more visible papers tend to be cited more), aging (a decline in citations over time), and novelty -- how different the paper is from other papers. Given five years of citations for a paper, the model could predict with high accuracy its long-term future impact. The projections also held good news for scientists worried about rejections from the top journals, Wang said -- as time goes on, the difference between journals grows smaller and smaller for a paper of a given fitness. As for his own future, Wang hopes to expand his findings to predicting the overall career path of scientists and other professionals, studying the impact of moving between institutions on a scientist’s success, and examining the dynamics of virality in social media. While Wang didn’t claim there would ever be a 100% success rate for such predictions, he compared the work to advances that have raised the probability of success in fields such as oil drilling. “We may never find the recipe for success, but we may be able to give you some theories backed with a real data set that give meaning to data to help you improve,” Wang said. “For innovators and entrepreneurs, we can give you a more predictable success rate.” Tandem Text-Mining By Humans and Computers While Wang ended with an example of how computers may help humans, Yuening Hu’s talk largely focused on how human feedback can improve a popular computational method: topic modeling. Commonly used for machine learning and text mining, topic modeling analyzes a large corpus of text and organizes the words into themed “topics” based on how often they appear. So if a document contains a high frequency of words such as “insurance,” “hospitals,” “doctors,” and “mortality,” topic modeling would likely classify it as being about health care. What sounds relatively straightforward for one document gets much more complicated when applied to the huge torrent of data published in Twitter or Facebook every second. In these environments, topic modeling works pretty well as a way of sorting out the messages or documents that a researcher are interested in for later analysis. Still, there are flaws, and the pure statistical methods that computer algorithms use to determine topics don’t always make decisions that would be obvious to humans, leading to some illogical topics. So Hu developed a method called “interactive topic modeling,” which builds human input into the topic modeling process. After the topic modeling algorithm sorts a text, a human user has a chance to review the topics it created and add or subtract words as they see fit, through a simple user interface. That input is then taken into account for another round of topic modeling, leading to another round of human review, and so on, until the user is satisfied with the results. In early studies, Hu and colleagues found slight improvements to categorization accuracy with the addition of human input, and they met their user interface goals of creating a system that was simple, flexible, fast, and smart. Applications of this approach could help create better translation algorithms, as users fluent in multiple languages can verify whether topic modeling is appropriately matching words and phrases from two languages to create better, more nuanced translations where other methods fail. For us humans, the success of Hu’s method is perhaps reassuring that we still have some role to play in science. But as computers get better and better at mimicking intelligence, thinking the way their users do, more and more of these time-consuming tasks can be outsourced to our CPU lab assistants, freeing up humans to make discoveries even faster. [Image by Alejandro Zorrilal Cruz, via Wikimedia Commons]
0.9879
FineWeb
1,432
S4BS (Service for Business Simulation) The Service for Business Simulation is a newly developed training program to train IT staff on ITIL® processes. The ITIL® Edition 2011 is based on the following: - An introduction to IT service management and service management processes - A simulated simulation game with different roles from various business and IT areas - Measures for improvement Several variants of the simulation have been developed. A full version illustrates the collaboration and the understanding of the roles according to the lifecycle of the ITIL Edition 2011, but also individual life cycle phases such as "Service Strategy", "Service Design", "Service Transition", "Service Operation" or "CSI" Be practiced. The simulation is customizable to your organization. It represents an active behavioral training. The learned should be taken into the workplace after the training. Improvement potentials are identified and implemented in the organization (Continuous Improvement Process, KVP). - Understand IT service and reflect on reality - Understand dependencies of processes - Services as a whole - Understand dependencies between processes and services - IT Service MGT in different organizations adopt and implement - Identify and resolve gaps in service management - Reporting and measuring points - Adapt the entire service lifecycle into an organizational structure - Identify and implement improvements The simulation mainly consists of 3 parts: For a better understanding of the IT infrastructure, we have designed various models for servers, storage, services and more. These were designed by us and realized with a 3D printer. In this way, we can replicate your IT infrastructure as a physical model and map the dependencies to the Visual Dependency Model. Visual Dependency Model (VDM) The Visual Dependency Model (VDM) is a computer-based application for visualizing dependencies between services and the IT infrastructure. This model can be adapted as desired and adapted to the needs of your organization. Due to the modular functionality, the VDM allows unlimited scaling and can thus also represent complex organizations. In addition, we provide basic configurations with which a simulation can also be carried out. Enterprise Process Framework (EPF) The Enterprise Process Framework (EPF) enables the use of the following components within the simulation: - Process Map (Framework) - Service organization, processes, roles and responsibilities - Service Catalog, details of all services and responsibilities - Applications, roles and responsibilities - The EPF has been developed by us and is also applied in practice.
0.9298
FineWeb
533
There are many transition periods in a student’s life, leaving one familiar part of their education behind and moving on to a new, unfamiliar one. Transitions can be stressful, cause anxiety for students; preparation can help eliminate the anxiety. Parents can talk to/meet with teachers to find out about what is expected of their child academically in the next grade and how they can work on developing necessary skills at home. Parents can then share with their children what the expectations of the next year/grade will be. Summer is a great time for students to build the skills that they need so that they are prepared to deal with the upcoming challenges. Skills such as; time management and organization, strong reading skills, active reading/listening, are essential for helping students learn to deal with challenges, no matter the age or grade. Grade 1: This is the first year for structured learning. Often students find it physically demanding because they are in school full days, all week for the first time. Fatigue, particularly at the beginning of the year can make learning difficult. Grade 4: A transition year that can be stressful for students due to independent study being introduced during this year, which places greater demands on the individual students. Students often find the new and more challenging direction of many subjects difficult to adjust to. No longer are they doing the basics, particularly in math and reading. Support is often needed in order to keep up with the teacher. Grade 8: The year that teachers are making sure students have the knowledge needed to be successful in high school. This is the year that students begin their academic preparation for high school. Working independently is stressed more as well as each student’s responsibility for his or her own academic progress. Students may be leaving the school they have attended since they entered kindergarten. Grade 9: For many students this is considered the first official year of high school. This is a major transition year, the workload increases, sometimes dramatically. There can also be greater demands placed on extra curricular time, which can be difficult to adjust to. Grades 10, 11 & 12: These are the final years of secondary education and they are high-stress. Math, Science, and English all increase in difficulty. Students begin to write longer essays and conduct independent research. There is increased personal responsibility that can be challenging for young teens to deal with. Strong organizational skills are needed for effective time management. Students also begin choosing their future life path and applying to college, tech school or university. 10055 120 Ave, (780) 830-0570
0.7598
FineWeb
561
“Soma” refers to the body experienced from within. Somatic Movement Education enhances one’s well-being and creates a dynamic, embodied presence that leads to improved physical, emotional, and spiritual health. What is Somatic Movement Education? Somatics encompasses the whole being – body, mind, emotions, and spirit. Somatic Movement Education practices, often referred to as bodywork, body therapies, and movement repattering, represent a variety of body/mind approaches. (see History section for more detail). In the words of Bonnie Bainbridge Cohen, founder of Body-Mind Centering®: “There is something in nature that forms patterns. We, as part of nature, also form patterns. The mind is like the wind and the body is like the sand; if you want to know how the wind is blowing, you have to look at the sand.” —from Sensing, Feeling, and Action, Contact Editions, 1993 Somatic methods teach us to listen to our bodies. As we become aware of and learn to consciously re-pattern habitual ways of moving, we activate more of our own innate body/mind intelligence. This begins a process of self-inquiry and learning that empowers us toward more ongoing, sustainable self-care. Somatic practices take a holistic and interdisciplinary approach that connects body sciences, psychology, and movement to help each person understand more about his or her body/mind and move toward greater integration. The term “somatics” was used by Thomas Hanna, founder of Hanna Somatics, who first distinguished between the “soma” (lived experience) and the physical “body”. Hanna used the term “somatics” to name a field of study that had developed in the early part of the twentieth century in Europe and the U.S. Somatics refers to the whole person – physical, emotional, psychological, and spiritual. Although the term somatics refers to disciplines developed primarily in Europe and the U.S., many somatic principles are acknowledged to have roots in indigenous wisdom. Key figures in the evolution of Somatic Movement Education include Rudolf Laban (Laban Movement Analysis), F.M. Alexander (Alexander Technique), Mabel Todd (Ideokinesis), Dr. Ida Rolf (Rolfing), Dr. Moshe Feldenkrais (Feldenkrais Method), Emile Conrad (Continuum), Bonnie Bainbridge Cohen (BodyMind Centering®), Thomas Hanna (Hanna Somatics), and Imrgard Barteneieff (Bartenieff Fundamentals™). Somatic Movement Education is practiced worldwide in various forms, with practitioners now being certified by the International Somatic Movement Education and Therapy Association (ISMETA). Paintings by Mitsuyo Moore
0.541
FineWeb
635
May 28, 2012 These metathesis catalysts tolerate functional groups. Olefin metathesis is receiving a lot of attention as a way to interconvert olefins. For example, because of the rapid growth of polypropylene and other key propylene derivatives, propylene supplies are sometimes limited, leading to high propylene prices. The method most frequently used by the petrochemical industry to make so called “on-purpose” propylene is the metathesis of ethylene and straight-chain butenes. One limitation of olefin metathesis reactions is catalysts that are notoriously sensitive to polar functional groups. If active, robust olefin metathesis catalysts were developed, the scope of metathesis could potentially be broadened to create new production pathways to a variety of functionalized products. It could also allow functionalized materials, such as unsaturated natural oils, to be used as feedstocks for “petrochemical” products. W. A. Herrmann, W. Schattenmann, and T. Weskamp are developing active olefin metathesis catalysts that resist deactivation by polar groups. The catalysts are based on ruthenium–carbene complexes with various N-heterocyclic ligands. To demonstrate the ability of these catalysts to metathesize unsaturated oils, the inventors allowed methyl oleate to self-metathesize. In an example, a solution of 3.6 mg catalyst [benzylidenedichlorobis(1,3-diisopropylimidazoline-2-ylidene)ruthenium] in 0.5 mL (CH2Cl)2 was mixed with 1.06 mL methyl oleate at 60 °C for 15 h. Analysis of the reaction mixture showed the presence of 21% 9-octadecene and 21% dimethyl 9-octadecenedioate. The inventors also cross-metathesized methyl oleate with 1-octene under similar conditions to give 7-tetradecene as the main product. Other isomers also were produced from the reaction of 2-octene (from the isomerization of 1-octene) with methyl oleate. (Evonik Degussa GmbH [Essen, Germany]. US Patent 8,153,810, April 10, 2012; Jeffrey S. Plotkin)
0.6152
FineWeb
590
12 Reasons To Get Into Recovery There are countless reasons why 12 step recovery programs work - for those who work it. Many people try one or two meetings and leave. But those who have the courage to keep coming back find amazing support. No other groups offer reliable and free support quite like 12 step. If you have doubts, read my blog on 12 Step Myths. Now let's talk about the benefits! 1. Unconditional support 12 step programs offer incredible support simply because members want to give back. They remember what it feels like to be new and hurting. Direct advice is discouraged. for example, no one will tell you to leave your partner because the program lets you decide for yourself - when you are ready. 2. Tools for any problem The tools learned in 12 step programs can help any problem. For instance, if you are struggling with depression, relationships or work, recognizing powerlessness is often the first step towards a solution. Other principles like acceptance, honesty and surrender show how to keep things in perspective. 3. It's a safe haven When you've had an argument or received bad news, a meeting provides a safe place to go. When you feel like no one understands your pain, someone in a meeting usually gets it! There have been many times I've gone to meetings and heard someone with my same issue. Immediately you feel less alone. That connection is hard to replicate. 4. Get (or keep) your serenity If you grew up with addiction, abuse or dysfunctional behaviors, serenity was probably hard to come by. Instead you might felt anxious or depressed. The program models how to be in the moment and enjoy what is. 5. Grow at your own pace In 12 step programs you set the pace. You come and go as you please. Some people are super committed to work the steps while others aren't ready yet - and there is room for both! You can take what you like and leave the rest. 6. No Strict rules or fees 12 step programs do have expenses but there are no required fees. Newcomers are asked not to contribute because the primary aim is to help people who are suffering. Also, there are no strict rules or authority figures. You can take what you like and leave the rest. Groups are run by volunteers who do service and rotate positions as needed. 7. Build your tribe Building your tribe is probably the most significant benefit in 12 step groups. When you're hurting, there is often a sense of isolation. You don't want to hang out with friends. Finding like-minded people who have the same struggle makes life more manageable! 8. Find a spiritual connection You may have had a negative experience with religion or maybe you're an atheist. Either way you are welcomed. one use the power of the group. Eventually, many develop a new concept of a higher power- but you don't have to! 9. A sponsor who guides you A sponsor is someone you work with you one on one that guides you in the program. They are members that have great recovery. They can laugh and have hope. It is suggested that you look for someone who has what you want - whether it's a great attitude, a gentleness or a similar situation. 10. Learn acceptance and tolerance People come to 12 step programs because they are struggling with their own behavior or someone else's. The program teaches acceptance and tolerance when you learn how to detach from what is going on outside and focus more on you. 11. Amazing crisis support Because there are meetings everyday in most places (even on major holidays), when a crisis hits you get support instantly. Members also encourage phone calls for a way to stay connected between meetings. Each meeting provides a phone list. This is meant to provide support and encouragement between meetings. 12. Be loved until you can love yourself People come to 12 step programs because they are in pain. Learning how to love yourself through addiction and difficult behavior takes time. By feeling the support of other members, you will eventually learn how to love yourself and heal the parts of you that you dislike. For more information on 12 step programs check out my resource page. Click the image below to get private access to my resource library which includes: - anger handbook - confidence guide - the four relationship killers - short videos and worksheets
0.7262
FineWeb
971
Check out What’s New in MarWatch R5.1 Secure remote access to devices anywhere in the world eliminates up to 80% of onsite service visits – reduce the cost and difficulty of troubleshooting. - Single click access to monitored devices. - No VPN required – supports multiple simultaneous access sessions to multiple customers from any location. - Integrated web-proxy servers for higher performance and remote access to the MiVoice Business ESM (Embedded Systems Manager) interface. - Full security for controlled and secure access to the network: - Authenticated & encrypted with SSL, SSH and HTTPS - Audit Log tracks all remote access sessions Monitoring Mitel voice quality tells you there IS a problem. Monitoring the rest of the network tells you WHERE. MarWatch delivers a complete proactive monitoring solution across the entire network, monitoring Mitel and third-party devices. Whether public or private, cloud or on-premise, MarWatch offers the industry’s deepest visibility into VoIP network performance. Features include: - Continuous monitoring of Mitel and third-party devices for early detection and resolution of network performance problems. - Unique visibility into Mitel Business Communications systems, monitoring: - Voice and performance metrics including: - SIP and Digital Trunk utilization - Voice Quality Ratings by Call (R Factor) for Mitel SIP sets - IP infrastructure availability - CPU and Memory utilization - Disk Usage - IP Class of Service (CoS) for Cisco routers. - Mitel devices and applications - IP handset inventory for MiVoice Business and MiVoice Border Gateway: - IP handset connectivity to MiVoice Business (MCD), delivering data on handset status (in service, disconnected, never connected, unprogrammed). - Teleworker set connectivity to Mitel Border Gateway (in service, disconnected, never connected, unprogrammed). - Configurable SNMP device monitoring to monitor any device (ie: multi-vendor PBX, IP DECT gateways, routers, session border controllers, etc.) - Pre-configured monitoring of certain multi-vendor network equipment such as routers, managed ethernet switches, call recorders and voice mail (including: ADTRAN, Avaya, Cisco, Dell, HP, Innovations InnLine, Red Box). - Windows Service Activity monitoring (running/non-running) – generates alarms for Windows services such as Windows Firewall, SQL server, etc. - Voice and performance metrics including: Real-time alerts speed problem resolution and prevent downtime, by alerting the right person at the right time. Features include: - Customizable by recipient and delivery method (email, SMS, Twitter Direct Message) - Displayed in dashboard and on map by severity, duration and customer/site - Triggered according to configured thresholds (minor, major, critical), customizable by the user. - Alarms include: - System alarms (ie: MiVoice Business, MiContact Center system alarms) - Memory utilization - Voice quality - Device availability and reachability (ICMP, Ping, SNMP) - Interface availability and utilization - Disconnected IP handset (MiVoice Business, MiVoice Border Gateway) - Windows service status (non-running services) Addressing problems starts with identifying the source. Considered a top challenge for IT professionals, MarWatch includes active testing tools to speed problem resolution. Features include: - Rapid access to MIB browser and network tools from main menu on all SNMP device pages. - Remote IP set network test tool runs IP traceroute directly from IP sets on MiVoice Business to far-end IP address. - Network diagnostic tools including: - Simple Network Management Protocol (SNMP) Browser The MarWatch dashboard, optimized for mobile devices, offers a snapshot of device and network activity, highlighting key action items such as alarms. It offers container and device level dashboards with service provider, reseller and customer views. Features include: - Multiple dashboard views: - Entire MarWatch system (multiple Containers with Regions, Locations, Customers and Devices) - Container View - Single Customer - Single Device - Map view displays alarms colour coded by severity, with filtering/sorting by severity, duration and customer/location for fast identification of most problematic sites. - Optional widescreen dashboard with larger map for viewing multiple sites, and recent alarms – ideal for NOCs and data centers. - Multi-tenant container architecture with multiple access levels for role-based access to particular devices or capabilities. - Ticket management by number, owner, and status, and option to export to third-party ticketing system. - Advanced search filtering to find any device easily by name, type, IP address or notes/description. - Branded dashboard can be created for channel partner or customer using logo or own HTML CSS. - Customizable ‘Message of the Day’ banner for device and container dashboards - Customizable ‘Container Admin Contact Information’ banner. - Partners can choose any URL they own for their MarWatch login page. - Accessed via standard web browsers: Internet Explorer, Chrome and Firefox, from PCs & mobile devices (iOS & Android). High quality, timely performance reports and queries help IT professionals, service providers and channel partners demonstrate Service Level Agreement (SLA)performance. Reports feature accurate and easily understood quality graphs with key performance metrics. Features include: Customer Container Reports - Monthly, weekly or on-demand options, with preview. - Reports by reseller, customer, location or device. - Demonstrates performance and availability of all devices in a container. - PDF format, delivered by email. - Reports can be retained for future download. - Reports include: - Message space customizable by Administrator - Customer Device Inventory - Device Availability Summary for reporting period - Device Performance Info (by device) for reporting period - Key queries include: - Top 10 Critical Devices - Top 10 Critical Customers - Active/Inactive Users - License Expiry - Scheduled or on-demand options - Can be emailed as .csv, with optional pivot table and pie chart presentation Advanced management tools for MiVoice Business deliver additional services to maximize the platform, including backups. Features include: - Scheduled and on-demand backup options, with alarm for backup failure/issues. - Secure offsite cloud-based or on premise data center storage - Downloadable backup file for restoration can be retrieved by authorized users with a standard web browser. - Collection and storage of SMDR records from remote MiVoice Business (MCD), with secure cloud or data center storage. - Backup file includes: - MiVoice Business (MCD) configuration - Call history: incoming, outgoing and duration - Embedded voice mail configuration and data (optional)
0.9568
FineWeb
1,555
How do I import Thin Common Cartridge files as separate modules? If your institution uses Thin Common Cartridge files, you can use the select specific content option in course imports to import content as separate modules. Thin Common Cartridge is a subset of the full Common Cartridge specification. Selecting content in a Thin Common Cartridge file is structured differently than other import types. Thin Common Cartridge is a lightweight metadata structure most commonly used by K12 institutions that allows publishers to provide digital resources using LTI links (external tools), which usually contains a significant number of resources in one common cartridge interchange file (.imscc). Thin Common Cartridge files are designed by creating items grouped into a folder or series of folders that defines how the content should be organized for the learner. When importing Thin Common Cartridge files, Canvas uses metadata identifiers and titles to simulate the hierarchical structure within the Thin Common Cartridge file. This structure appears as nested content within the Modules content heading, allowing users to view a structured organization and locate the content they want to import into the course. By default, grouped content is imported as one module, but they can also be imported as separate modules. Individual content within a content group is automatically imported as separate modules. In Course Navigation, click the Settings link. Import Content into Course Click the Import Course Content link. Select Content Type In the Content Type drop-down menu, select the Common Cartridge 1.x Package option. Complete any additional fields required for the content. Select Specific Content In the Content section, click the Select specific content radio button. Click the Import button. In the Current Jobs section, click the Select Content button. Thin Common Cartridge files are shown as one module. Click the Modules expand icon. Select All Group Content Locate the content by expanding the nested structure. Content groups show the number of items within the group . If you want to import an entire content group, select the checkbox next to the group . Select Module Import Option Like other course import types, selecting a content group selects all items within the module group. However, Thin Common Cartridge content is always imported as one module, which can be extremely cumbersome in a Canvas course. By default, content is imported as one module . If you would rather import content as separate modules, click the Import sub-modules separately radio button . Note: If you want to import several content groups as separate modules, module settings are applied on a per-content-group basis, meaning you must fully expand each content group and specify the separate modules option. Otherwise, all selected content in the hierarchy will always be imported as one module. Select Specific Group Content To import only a few items from a content group, select the specific items to be imported . Canvas places a dash in the content group checkbox , indicating not all items are selected within the group. Selecting individual content items automatically imports content as separate modules. Click the Select Content button. View Current Jobs The Current Jobs section displays the status of your import. The import displays a menu bar with the time remaining to complete the import. The import may also display errors as part of the import status. Learn more about course import statuses. When the course has completed, view modules content by accessing the Modules link in Course Navigation. View the modules content in your course, either as one module or separate modules.
0.7439
FineWeb
748
A Flying Energy Generator (FEG) is a tethered device, which taps into the energy in high altitude winds, miles above the earth’s surface. Some argue that if FEGs are successfully developed they could supply most of the worlds stationary energy needs. David Shepard is the president of renewable energy company Sky WindPower, in California and he thinks if we were able to tap 1% of the wind energy at high altitude, it would be enough to supply all the world’s energy needs. The company claims only relatively small rotors are necessary to generate megawatts of power, if the devices capture the high velocity high altitude winds. They suggest that the Flying Energy Generators may be expected to be in the ten to forty megawatt range instead of the highest current tower mounted turbine capacities of about five megawatts. Instead of two rotors, the FEGs under development will use four rotors in a square arrangement, or more in bigger arrangements. For example eight, each rated at 2.5 Megawatts, for a total of 20MW. Apparently, tether strength to weight ratios actually improve as sizes scale up, and guidance control weight goes up less than proportionately with size. In other words, within reasonable limits, such as into the tens of megawatts range, efficiency may be expected to improve with scale. Sky WindPower plans to demonstrate the FEG pictured below, which was developed by Professor Roberts, at an altitude of 15,000 feet and above. The Magenn Power’s MARS is another wind power device that operates differently to the FEG above. The Magenn company say the distinct advantages of the MARS over existing conventional wind turbines is the capacity of the devices to be deployed globally, with lower costs, better operational performance, and greater environmental advantages. MARS is a lighter-than-air tethered wind turbine that rotates about a horizontal axis in response to wind, generating electrical energy. This electrical energy is transferred down the 1000-foot tether for immediate use, or to a set of batteries for later use, or to the power grid. Helium sustains MARS and allows it to ascend to a higher altitude than traditional wind turbines. MARS captures the energy available in the 600 to 1000-foot low level and nocturnal jet streams that exist almost everywhere. MARS rotation also generates the “Magnus effect” which provides additional lift, keeps the MARS stabilized, and positions it within a very controlled and restricted location to adhere transport guidelines.
0.8951
FineWeb
563
QUESTION: Is it safe to use an extension cord with my room space heater? I have a small space heater in my bedroom so I stay extra warm when I sleep. The problem is the wall outlet is too far away from my bed and the electrical cord on the space heater is only about 3 feet long. If so, do I use the type of extension cord with 2 or 3 prongs? The small portable ceramic space heater has a thermostat so it shuts off when it gets to the set temperature. Will setting the temperature “not as warm” make it safer if I use an extension cord? ANSWER: DO NOT USE AN EXTENSION CORD OR POWER STRIP WITH AN ELECTRIC ROOM SPACE HEATER. IT CAN OVERLOAD THE CIRCUIT OR OVERHEAT THE EXTENSION CORD AND CAUSE AN ELECTRICAL FIRE. SETTING THE SPACE HEATER THERMOSTAT HIGHER WILL NOT MAKE IT SAFER. For safety, ALWAYS plug a Space Heater DIRECTLY into the wall outlet using the electrical cord on the space heater and NEVER use a power strip or extension cord. This is because a space heater, no matter what size, draws a high amount of electricity and can overload a circuit or overheat an extension cord thus causing an electrical fire. If possible, get a space heater that plugs DIRECTLY into the wall outlet. This way there is no electrical cord to trip on or that can become damaged and cause a fire. There are many different space heaters that plug directly into the wall that are highly rated and available online. – Besides the risk of the extension cord overheating and causing a fire, a pet or person could trip on the extension cord and the space heater may fall over therefore causing another fire risk. Also, if the extension cord is not plugged into the space heater tight and secure, this can also be a fire hazard. – If your space heater electrical cord is not long enough to keep you warm while you sleep, we would suggest either getting a new space heater with a longer cord, using your central home heating, or possibly having another electrical outlet professionally installed in your bedroom. – Any type of space heater whether whole room, personal space, oscillating, ceramic, or portable is an appliance that uses a high consumption of electricity. That means that a LOT of electricity is running through that appliance, its cord, and its electrical wall socket. Never use any type of extension cord and follow all safety precautions as 32% of fires are started by Space Heaters being misused. – Do not put a space heater on the carpet as this can cause a fire. Put the space heater on a sturdy table and closer to the edge of the table so the table does not get burnt. You can sleep with the space heater on at night, but run it all day in the room before you sleep to test it for safety reasons. Be sure the cord is not hot and that the space heater is in the right place. Using a surge protector is okay if you use the correct type. -If you use your space heater on a power strip or extension cord, you have a much HIGHER RISK OF FIRE. -Never use an extension cord on a any type of space heater. -Space heaters draw heavy amperage and should always be plugged directly in to the electrical wall outlet. Special Note: Some people do use “Heavy duty extension cord for space heaters” and say it is safe as the extension cord is a “heavy duty” type. We DO NOT recommend this as even the heavy duty extension cord may GET HOT and cause a fire risk. If you do try this, test to be sure the extension cord itself is not getting HOT. As stated, we do not recommend this, but if in a desperate moment (central home heater goes out, extremely cold weather) it can be done but not recommended for safety reasons. Please understand the risks involved with using ANY extension cord with a space heater. If you are not aware of wire gauge, and what the maximum amp rating of the extension cord you are using is… or the amp rating of the space heater is, you should not plug a space heater into the extension cord. NOTE: A thicker gauge wiring on a space heater is safer to use but there are no guarantees it is safe unless you truly know the space heater safety ratings, amp ratings, and wire gauge requirements. How to Repair a Portable Electric Space Heater Electrical plug gets hot on portable space heater. Using an amp clamp to test Have questions about using a space heater with an extension cord? Please leave a comment below and we will be happy to help you.
0.6223
FineWeb
1,049
When Cyprus was incorporated into the Imperium Romanum in 30 BC, the island became a potential recruiting-ground for the Roman army, and military service a potential career for male Cypriots. Two classes of fighting men made up the Roman army. The legions were composed of citizen soldiers and recruited among holders of the Roman franchise, while the auxilia were recruited from non-citizens but received Roman citizenship when they were discharged after twenty-five years' service. To date, no legionaries of Cypriot background have been found in the literary or epigraphical record, but an auxiliary cohort of Cypriots saw service in Romania and the Black Sea region. After the battle of Actium and the military reforms of Augustus, auxilia came to play a significant role in the Roman army, especially in the north-west border provinces. Previously, auxiliary units had been of varying size; now they were divided into cavalry alae and infantry cohortes of c. 500 men, each cohort subdivided into 6 eighty-man centuriae. Under Augustus, auxiliaries generally served in the area where they had been recruited, often as ethnic units under their own commanders. This policy was gradually abandoned and completely reversed after a series of mutinies and separatist uprisings that shook the Rhine frontier in AD 68-69: cohorts were henceforth stationed outside their area of origin and vacancies filled by local recruitment. By the second century, the auxiliary units had lost much of their ethnic character, but retained their traditional appellations. Until the mid-first century AD, Roman policy in the Black Sea was based on indirect control of the shores through client-kings. In 61, Scythian forces were besieging Chersonesos (Sevastopol) in the western Crimea, but Kotys, ruler of theBosporanKingdom in the eastern Crimea, was unable or unwilling to come to the aid of Chersonesos, and his Roman masters had to intervene directly. An expeditionary force under the command of Ti. Plautius Silvanus, legate of Moesia, forced the Scythians to abandon the siege. Subsequently, Roman control of the BosporanKingdom was tightened, and the kingdom of Pontos was made a Roman province. When the expeditionary force returned to its bases in Moesia, a sizeable contingent?according to Josephus, 3,000 men and 40 ships?stayed behind to safeguard Roman interests. Guard duty on the frontier was a typical task for auxiliary units, and it may well be in this context that a unit of Cypriot auxiliaries was raised: Greek-speaking and familiar with the sea, Cypriots were well suited for garrison duty in the northern Black Sea ports. A generation later, around AD 85, Moesia itself was attacked by Decebalus. Rome was forced to divert forces from the Black Sea coast to the central Balkans. The participation of a Cyprian cohort in the Dacian wars has long been known from a military diploma dated February 110, recording the granting of Roman citizenship and other privileges to veterans of the Dacian wars. A similar diploma, dated to October 109 and found at Ranovac in north-eastern Serbia, was published in 1987.Both diplomas list a number of units, veterans of which benefit from the emperor's decree, and in each list, the cohors IIII Cypria c(ivium) R(omanorum) appears
0.7054
FineWeb
831
How should adaptation to climate change be designed and funded? In the run-up to the December 2009 Copenhagen climate negotiations there’s an international push to create new funding mechanisms for climate adaptation in developing countries. Given the complexity of climate change and limited experience in funding adaptation, we in the World Bank’s Social Development department decided to launch a study of the lessons from the DM2009 proposals. The proposals constitute a large and interesting database of proposed adaptation interventions. By studying the proposals as a group, we hope to gain insight into the global supply of adaptation innovations and project ideas, especially at the community level. Our study considers how adaptation is conceptualized by suppliers of global adaptation interventions, what innovations for climate adaptation are proposed, and what kind of partnerships are put forward. We hope to contribute to policy discussions on how donors in the future can provide funding for community-based adaptation to climate change. One of the discussions circulating among practitioners is how to orient funding for adaptation: Should development funds be considered separate from adaptation or are the two intertwined? One major early lesson is that applicants to the Development Marketplace view the two as inextricably linked. The DM proposals see ongoing challenges such as poverty and environmental destruction as inseparable from the new challenges brought about by climate change. The issues applicants address and their proposed solutions are fundamentally shaped by this dual framework. For example, the risks and issues that proposals identify and seek to address are often a mix of pre-existing issues and new climate risks, sometimes with an unclear balance between the two. Only 18 percent of the 346 proposals that made it to the semifinalist stage clearly identified new climate risks brought about by climate change even though the call for proposals had a clear focus on climate change. In the minds of DM applicants, old development issues such as poverty, food insecurity, and environmental degradation were tightly bound to the impacts of climate change. We do not see much buy-in for the “impacts-driven” approach whereby adaptation responds to predicted impacts of climate change such as storms, drought, and sea-level rise. Instead, applicants’ adaptation responses are most often “development-oriented” and aim to broadly reduce vulnerability to whatever risk may occur, especially in the short term. Proposals seek to alleviate poverty, boost agricultural productivity, preserve indigenous knowledge, protect local environments, and protect against natural disasters. This results in a mix of hard (erecting physical barriers or technologies) and soft (capacity building, awareness raising, etc.) adaptation actions in the proposals with soft adaptation dominating other forms. Soft adaptation constitutes 82 percent of the proposed adaptation actions. Applicants provide no unique focus on erecting physical barriers or technologies against climate change in isolation from development-oriented actions. Only 4 percent of the semifinalist proposals want to invest in hard adaptation alone. Ninety-one percent of semifinalists propose a web of several adaptation interventions as opposed to “silver bullet” stand-alone solutions. In the eyes of the 346 DM semifinalists, confronting climate change seems to require a broad view of adaptation that spans multiple soft and hard adaptation mechanisms undertaken in tandem. In closing, DM applicants overwhelmingly adopt a development-oriented view of adaptation. This should caution policy makers and donors to ensure that funding arrangements for climate change allow for the inseparability of adaptation and development. This post was co-authored by Radhika Prabhu. - The World Region - Urban Development - Social Development - Science and Technology Development - Public Sector and Governance - Private Sector Development - Communities and Human Settlements - Agriculture and Rural Development - Indigenous Peoples - Climate Change
0.6553
FineWeb
809
If your body suddenly gets weak and powerless, it can be a symptom of body endurance decrease. When it gets decreasing, it will make you sick and ill. It is the worst condition to pass. In a sick condition, of course you neglect to eat because the food is not delicious. When you get recovery, the eating appetite arises again. Because your body is still weak and powerless, the consumption of nutritional food is restoring lost nutrition and making you recovery faster. Fruits and Vegetables After you heal from sick, you have to consume more vegetables and fresh fruits. Vegetable and fruit contains important antioxidants that can increase body immune system and helps your body to set in its normal functions. You should select fruits and vegetables containing more antioxidants including blueberry, mini cabbage, kale, and spinach. You may make vegetable or fruit juices if you don’t like the processing of vegetable and fruits. But, it is still important to choose high antioxidant fruits and vegetables for health recovery. Though a disease is sometimes caused by evil bacteria, but your body requires good bacteria for working optimally. It reports that probiotics food can increase a body immune system and keep digestive system working well. There are many kinds of yogurt and cheese containing natural probiotics. Fruits also contain it. You can select apple, nuts, and berry for your eating menu. One of the important things to do for health recovery is meeting the needs of liquid for body with water. Keeping the level of important body’s liquid after sick is important to accelerate the process of health recovery. Despite of drinking water, you can consume fruits containing much water like watermelon or melon. You should include it to the list of food menu to eat. Nutritional dish for health recovery should be served. But, it needs to obey a number of rules in order to help a process of health recovery and has strength of anti inflammation in medium level. Chicken soup becomes an alternative choice for increasing cilia ability. The cilia are small hair or fur in the taste channel having function to cover body from the attack of bacteria and viruses. You may eat it with or without rice every day until you are strong and fresh enough. Garlic and Ginger Ginger, a cooking seasoning can be included to be nutritional food for health recovery. It doesn’t only add tasty taste on food, but it has a great ability to stimulate body immune system or working to be ant microbe. This is forming to recovery nasal congestion. In addition to use garlic, ginger can be another main choice to help a health recovery. It reduces a pain due to vomit and stomachache. A number of studies claim that ginger is helpful to fight for inflammation and irritation. It can be consumed to be ingredient for fresh drink or mixed to be another food. It depends on your taste for mixing ginger for recovering health. It also makes your body warmer all the time. A type of fruit can be a specific fruit choice for health recovery. This can be eaten for young, kids, adults, and elder people. The banana is also useful to relieve symptoms of vomit, stomachache, and diarrhea often attacking kids when they get influenza. You may include banana to BRAT diet. What is it? It is Bananas, Rice, Apple sauce, and Toast. Those are the first food types suggested by doctor for people getting influenza, and stomach flu after they get ready to consume solid food. This is possibly applied for people recovering health after sick.
0.6173
FineWeb
751
A community is a cluster of people with at least one common characteristic (geographic location, occupation, ethnicity, housing condition, etc.). A group of people with a common characteristic or interest living together within a larger society comprises a community. Definitions of Community Diagnosis: - Community diagnosis is a comprehensive assessment of health status of the community in relation to its social, physical and biological environment. The purpose of community diagnosis is to define existing problems, determine available resources and set priorities for planning, implementing and evaluating health action, by and for the community. - Community diagnosis generally refers to the identification and quantification of health problems in a community as a whole in terms of mortality and morbidity rates and ratios, and identification of their correlates for the purpose of defining those at risk or those in need of health care. - “A means of examining aggregate and social statistics in addition to the knowledge of the local situation, in order to determine the health needs of the community” - It helps to find the common problems or diseases, which are troublesome to the people and are easily preventable in the community. - Community diagnosis can be a pioneer step for betterment of rural community health. - It is a tool to disclose the hidden problems that are not visible to the community people but are being affected by them. - It helps to access the group of underprivileged people who are unable to use the available facilities due to poverty, prevailing discriminations or other reasons. - It helps to find the real problems of the community people which might not have perceived by them as problems. - It helps to impart knowledge and attitudes to turnover people’s problems towards the light of solution. Community analysis is the process of examining data to define needs strengths, barriers, opportunities, readiness, and resources. The product of analysis is the “community profile”.Community Diagnosis is done using a tool called "Health Indicators" which are the variables used for the assessment of community health. Indicators must be valid, reliable, sensitive, specific, feasible and relevant. Health indicators can be classified as: - Mortality indicators - Morbidity indicators - Disability rates - Nutritional status indicators - Health care delivery indicators - Utilization rates - Indicators of social and mental health - Environmental indicators - Socio-economic indicators - Health policy indicators - Indicators of quality of life - Other indicators
0.9491
FineWeb
514
SNIP measures contextual citation impact by weighting citations based on the total number of citations in a subject field. SJR is a prestige metric based on the idea that not all citations are the same. SJR uses a similar algorithm as the Google page rank; it provides a quantitative and a qualitative measure of the journal’s impact. The Impact Factor measures the average number of citations received in a particular year by papers published in the journal during the two preceding years. © Thomson Reuters Journal Citation Reports 2015 To calculate the five year Impact Factor, citations are counted in 2014 to the previous five years and divided by the source items published in the previous five years. © Journal Citation Reports 2015, Published by Thomson Reuters Image and Vision Computing has as a primary aim the provision of an effective medium of interchange for the results of high quality theoretical and applied research fundamental to all aspects of image interpretation and computer vision. The journal publishes work that proposes new image interpretation and computer vision methodology or addresses the application of such methods to real world scenes. It seeks to strengthen a deeper understanding in the discipline by encouraging the quantitative comparison and performance evaluation of the proposed methodology. The coverage includes: image interpretation, scene modelling, object recognition and tracking, shape analysis, monitoring and surveillance, active vision and robotic systems, SLAM, biologically-inspired computer vision, motion analysis, stereo vision, document image understanding, character and handwritten text recognition, face and gesture recognition, biometrics, vision-based human-computer interaction, human activity and behavior understanding, data fusion from multiple sensor inputs, image databases. In addition to regular manuscripts, Image and Vision Computing Journal solicits manuscripts for the Opinions Column, aimed at initiating a free forum for vision researchers to express their opinions on past, current, or future successes and challenges in research and the community. An opinion paper should be succinct and focused on a particular topic. Addressing multiple related topics is also possible if this helps making the point. While posing questions helps raising awareness about certain issues, ideally, an opinion paper should also suggest a concrete direction how to address the issues. Topics of interest include, but are not limited to: - Comments on success and challenges in a (sub-) field of computer vision, - Remarks on new frontiers in computer vision - Observations on current practices and trends in research, and suggestions for overcoming unsatisfying aspects - Observations on current practices and trends in the community regarding, e.g., reviewing process, organizing conferences, how journals are run, and suggestions for overcoming unsatisfying aspects - Reviews of early seminal work that may have fallen out of fashion - Summaries of the evolution of one's line of research - Recommendations for educating new generations of vision researchers. The format of an opinion paper should comply with the existing formatting guidelines for the Image and Vision Computing Journal submissions, and should not exceed 2 pages. Months of publication: January/February, March, April, May, June, July/August, September, October, November and December.
0.8576
FineWeb
688
Mature thermal mud (fango) is a mixture of clay, thermal water and micro-organisms. The maturation process takes place in special basins that, for a period of 2/3 months, is bathed in thermal water flowing over the clay at a temperature of 60°C, constantly exposed to the sun’s rays. In this phase the clay undergoes a metamorphosis and develops a colony of algae and organic microflora and increases its suppleness and heat retention properties. The thermal stress aids the formation of microorganisms (diatoms) which produce anti-inflammatory, analgesic and therapeutic effects. On the skin’s surface there is an intense vasodilatation and a progressive relaxing of the muscles. On the general level the thermal stress works by releasing hormones- cortisol and endorphins- with analgesic and anti-inflammatory effects. The short term benefits at the end of the therapy cycle are analgesic, muscle relaxant and anti-inflammatory with a consequent stimulation and improvement of the joints and surrounding structures. The long term effects, during the course of months after the treatment pertain to the prevention of recurrence and slowing of the progression of degenerative joint ailments such as arthritis . Fangotherapy is performed in 4 phases: 1) Thermal fango The thermal mud treatment is done in the morning (from 6am- noon). As per medical instructions, expert personnel distribute mud on the body’s surface in the area to treat with a thickness of 3-10 cm. at a temperature of 42 - 45°C. To reduce heat dispersion the patent is covered with a sheet or blanket. The duration of each application is from 15-20 minutes. 2) Balneotherapy in ozone bath After the thermal mud treatment, the patient is immersed in a tub of warm thermal water, with a temperature ranging from 36 - 38°C. Balneotherapy relaxes muscles and induces an analgesic effect. Due to the chemical composition of the water, specific hormonal biochemical neurovegetative stimulation is created, completing the therapeutic action. 3) Reactive or resting phase After the thermal mud and balneotherapy the patient returns to his/her room or to a relaxing area where he remains prone and covered for about 30 minutes. During this time the physical reactions and the therapeutic effects of the mud therapy take place. The effect consists in an intense perspiration that begins during the mud pack and is completed in this phase. 4) Massotherapy (massage) Massotherapy is a physiotherapeutic treatment that increases the benefits of the mud therapy session. Its scope is to improve the circulatory system of the blood and nourishment of the tissues to help the elimination of metabolic waste and fatty deposits regain mobility in the limbs. Beyond a localised effect, the massage has a general sedative effect and stimulates reflexive actions on internal organs.
0.9231
FineWeb
649
American Heritage® Dictionary of the English Language, Fourth Edition - n. The area between the banks of a river ordinarily covered by water. - n. The path where a river runs, or where a river once ran; the bottom earthen part of a river, not including the riverbanks. - n. a channel occupied (or formerly occupied) by a river “When the trucks do take it away, I’ve heard rumors that it’s thrown in the river (which, if you’ve seen the riverbed, is not too difficult to believe).” “To reach the valley floor, you descend concrete steps that lead to the shingle riverbed, which is crossed by a small footbridge.” “The part that had felt like a riverbed was a riverbed.” “As unlikely as it may look, since the only known sightings of tribbles have been in spaceship environs, the riverbed is the preferred natural habitat of tribbles.” “Because the riverbed is the Chuitna is privately owned, walking, wading or standing on the riverbed is also considered trespassing," says a Tyonek Native Corp.” “The Daily Telegraph claimed that harnessing the power of fish swimming through a river could hold the key to meeting Britain's future electricity needs and that installing electric prongs along the riverbed was the way forward.” “That groove on the riverbed is a pair of 24-inch gas mains, laid down in the fifties, that-believe it or not-constitute the business end of a network of pipes that runs all the way from the Gulf of Mexico.” “March 10 (ANI): A new American research has revealed that an ancient "riverbed" in Mars was not made by the flow of water but was carved by molten lava.” “Washington: A new American research has revealed that an ancient 'riverbed' in Mars was not made by the flow of molten lava.” “Treating each bed as a canvas, Jill's first collection is filled with light, whimsical line drawings with names like "riverbed", "streamline" and "field day" upon 100\% combed Egyptian cotton, woven with single-ply yarns in a 210-thread-count ...” These user-created lists contain the word ‘riverbed’. Key words of the Odyssey by Homer in English including all those famous repeating epitethons like Looking for tweets for riverbed.
0.7487
FineWeb
563
Origin of hope? New research shows that the immunosuppressant drug rapamycin, isolated from a bacterium native to Rapa Nui (Easter Island), acts as a link to bring together two immune system proteins. This association halts cell division, which may make the drug useful in the treatment of cancer. Research on the potential anticancer n?drug rapamycin has revealed a possible new mechanism for suppressing large numbers of genes simultaneously, rather than each gene individually. Normally, genes are individually activated or inactivated by proteins targeted to the specific genes. But recent research led by principal investigator X. F. Steven Zheng, an assistant professor of pathology at the School of Medicine of Washington University in St. Louis, Missouri, shows that a protein named “target of rapamycin,” or TOR, acts on many different genes simultaneously, producing a stress response that can stop cancer cells from reproducing. The study is published in the December 2002 issue of Molecular Cell. Zheng and colleagues studied the molecular action of rapamycin, which currently is used to suppress the immune system after kidney transplant. The drug is derived from the soil bacterium Streptomyces hygroscopicus, native to the island of Rapa Nui (Easter Island). Rapamycin regulates a myriad of diverse cellular functions at the level of transcription and translation by inhibiting TOR. Clinical studies show that rapamycin also appears to both inhibit the formation of tumors and suppress tumor angiogenesis (the development of the blood vessels a tumor needs to obtain nutrients from its host), thus taking double-barreled aim at human cancers. These unique properties have led physicians to test its use as an anticancer drug. In an approach known as “chemical genomics,” Zheng and colleagues used rapamycin to inactivate TOR in yeast in a collection of mutant yeast strains, one for each gene in the yeast genome and each lacking one gene. This enabled them to measure how TOR interacts with each yeast gene, using rapamycin sensitivity (how n?much growth is inhibited by the drug) as a gauge. Zheng and his team found about 300 yeast genes to be associated with TOR-related activities. The product of one such gene is a protein known as silent information regulator 3, or Sir3, which clings to the genes responsible for stress proteins, thereby inactivating them and keeping them silent. Sir3 appears to be the key to TOR’s multigene activity: When rapamycin inactivated TOR, Sir3 molecules began detaching themselves from the chromatin regions carrying stress protein genes. This triggered a stress response; cells started producing stress proteins, their walls thickened, and they stopped proliferating. This is likely one of several mechanisms that contribute to shutting down cancerous cells. Michael McDaniel, a professor of pathology and immunology at the Washington University in St. Louis School of Medicine, calls it “a novel transcriptional mechanism that may further enhance the use of rapamycin as an anticancer agent.” Moreover, the researchers found that when rapamycin suppressed TOR, it also interrupted nutrient processing pathways, thereby preventing yeast cells from using glucose to produce energy and amino acids to make new proteins. Zheng and his team suggest that when rapamycin inhibits TOR, it works by eliciting a number of responses such as those of stress and starvation. Such responses are believed to cause cells to sn?top proliferating. McDaniel notes that a key feature of rapamycin’s overall mechanism of action–its ability to block cellular growth and proliferation–extends to normal, healthy cells as well as cancerous ones. He suggests that these potential adverse effects of rapamycin may be minimized by short-term use and the optimization of drug doses. He adds that Zheng’s genomic study in yeast should provide a detailed map of the pathways by which the drug works, which will help in devising better therapeutic interventions for relevant human diseases. The knowledge developed from the study of rapamycin’s action needs to be verified in human cells, particularly tumor cells. If these results are borne out and the side effects are not intolerable, the result may be a new approach to causing malignant tumors to go into remission. If certain types of cancer are not fully cured, they might at least be upgraded from fatal diseases to manageable chronic diseases. news from ehponline.org this is an open project and accepts the help of anyone willing to make positive thinking… Send your proposals (articles, cartoons, funny pictures and videos) and find an open door where to move your ideas … POSITIVE! Support and Spread the only e-magazine dedicated to good news and smiles! Write to: [email protected] Show on your site a link to our www.goodnews.ws
0.5367
FineWeb
1,077
E 314L • Poesis: The Making of Literature 12:00 PM-1:00 PM This course is computer-assisted. This course will introduce students to the key issues and methods of inquiry of the English major. It will focus on poetry, which derives from a root meaning to make. The two controlling questions of the class, therefore, are: How is poetry made? (i.e. what informs a poets decisions in composing?), and What does poetry make? (i.e. what kinds of responses do readers have?) This course is an introduction to poetic forms, periods, and modes of criticism. We discuss elements such as versification and prosody, and rhetorical figures and tropes in order to understand and evaluate how they contribute to a works meaning and purpose. To this end, we focus on the sonnet as a poetic form and on explication as a literary method. Next, we look at Romantic poetry and poetic theory in a historical and cultural, as well as in a literary context, including a consideration of the role of publishing and design in the reception of poetry that extends into the Victorian period. Finally, we turn to Modernist poetry and the lingering culture of difficulty that Modernist creative principles have erected around the academic study of poetry. Two explication/response papers (2-3 pages each) 15% each Midterm exam 20% Term paper topic proposal (1-2 pages) 5% Term paper (6-8 pages) 35% Learning Record Online (responses, interpretive projects, regular discussion forum postings, equivalent to ~4 pages) 10% Attendance is mandatory in this course. Absences will be excused for medical or religious reasons alone, and will require proper documentation. More than three unexcused absences will result in a final grade lowered by one full letter. More than five unexcused absences will result in course failure. Frank Lentricchia and Thomas McLaughlin, ed., Critical Terms for Literary Study William Shakespeare, Sonnets William Blake, Songs of Innocence and Experience William Butler Yeats, Collected Poems Course packet with additional poems (Ben Jonson, Wordsworth, Coleridge, Hogg, C. Rossetti, E. B. and Robert Browning, Arnold, Clough, Meredith, MacNeice, Bishop, Merrill, Sexton, Glück)
0.8219
FineWeb
560
What Is Lupus Individuals researching or collecting information on what is lupus can find a plethora of websites giving detailed information about this condition. Lupus is basically a disease that afflicts the immune system. In this condition the immune system attacks the wrong objects thinking these to be foreign and harmful. In this condition excess proteins are created by a person’s immune system and these antibodies attach to the structures in a person’s body. This causes pain, inflammation and damage. Information on what is lupus will also indicate that researchers, scientists and medical health professionals have not been exactly able to determine the causes for this condition. However it is believed that there are multitude factors that result in this condition. These may include genetic factors, environmental factors and hormonal problems as well. Some other aspects that may contribute include stress, certain kinds of medications, diet, some bacteria and viruses and exposure to light particularly ultra violet light. Literature on what is lupus also indicates that this condition afflicts certain kinds of people. Around 90% of individuals suffering from lupus are women. Likewise people belonging to certain communities are more likely to suffer from this condition. So Latinos and African Americans are more likely to experience this condition as compared to Caucasians. What is lupus can be better understood from the different types of lupus seen among people and the symptoms associated with these different types. Systemic lupus is the type wherein different systems or organs within the body may be involved and affected. In Discoid lupus a scaly and red rash may be seen on the areas that are exposed to the sun including the arms, face, scalp and legs and the trunk. Finally in drug induced lupus reactions to some medications may result in the development of this illness. People suffering from lupus may experience the associated symptoms to varying degrees. In some patients the symptoms may be quite severe while in other individuals there may be flare ups. What is lupus can be understood better if the associated problems and symptoms are understood. People suffering from lupus experience weakness, fatigue and lethargy along with joint and muscle pain and swelling. Such a person may also experience fever and skin rashes. Lupus also results in joint and muscle pain. People suffering from lupus also experience mouth and nose ulcers. In some cases the sac that surrounds the heart may experience inflammation and in some cases kidney problems may also occur. Diagnosis of lupus cannot be done easily and has to be conducted based on physical evaluation of the symptoms along with some laboratory tests. Lupus Symptoms - Home What Is Lupus What Causes Lupus Types Of Lupus Systemic Lupus Erythematosus Lupus Hair Loss Lupus And Pregnancy Living With Lupus History Of Lupus Drug Induced Lupus
0.8969
FineWeb
631
(( I haven't done a mp info sheet in awhile and I've been working on MP3 stuff again, so I was like "Eh why not?" pfft ; v ; But I forgot to add the reason why they have speakers in their hands in the first place, so I'm just gonna add it in the description pfft ; v ; -Before mps were a race, they were prototypes that were meant to become the next big music players, because not only would they be able to function like one, but they would be able to interact with their buyer. - (Think like furby, but with it's own mind instead of having programmed emotions and sayings pfft ; v ; ) -If you have a music playing device you know that you need headphones for 'em..and you know that headphones break...all...the...frickin'...TIME. (No matter how good of a brand they are, they will eventually stop working pfft -Well their creator thought it would be a good idea to give them lil' speakers on their hands, because then when they would cover their owner's ears with their lil' hands~ the owner could ear the music like if they were wearing headphones, and they wouldn't need to buy any because their lil' mps hands could function as some. ; v ; -Although.....original mps were very small and their arms could not reach the ears (unless placed by one of them, but still they couldn't reach the other one pfft).....so that idea ended up being a bust....but their creator never removed them because she felt like it would hurt them and affect with their system...so she left them in. -Although after the mushroom war's mutation and their own tweaking of their specie, they became MUCH bigger and are able to reach the ears pfft. ; v ; -Sometimes when they only want something to be heard by one person alone or "whisper flirt", they will cover the ears of someone with their hands and whisper to them though the speakers on their hands. -However, sometimes that can be a trick....because sometimes they may decide to just cut their volume up and blast a earbusting sound in someone's ear instead pfft (usually as a joke, because they're very playful *coughhorriblecough* people )
0.8027
FineWeb
536