text
stringlengths 187
626k
|
|---|
Breakfast is the first meal of a day, most often eaten in the early morning before undertaking the day’s work. Some believe it to be the most important meal of the day. Among English speakers, “breakfast” can be used to refer to this meal or to refer to a meal composed of traditional breakfast foods (such as eggs, porridge and sausage) served at any time of day. The word literally refers to breaking the fasting period of the prior night.
Breakfast foods vary widely from place to place, but often include a carbohydrate such as grains or cereals, fruit, vegetables, a protein food such as eggs, meat or fish, and a beverage such as tea, coffee, milk, or fruit juice. Coffee, milk, tea, juice, breakfast cereals, pancakes, waffles, sausages, French toast, bacon, sweetened breads, fresh fruit, vegetables, eggs, baked beans, muffins, crumpets and toast with butter, margarine, jam or marmalade are common examples of Western breakfast foods, though a large range of preparations and ingredients are associated with breakfast globally.
Breakfast is commonly referred to as “the most important meal of the day.” Indeed, current research has shown that people who skip breakfast are disproportionately likely to have problems with metabolism, weight, and cardiac health.
In Burma the traditional breakfast is htamin jaw, fried rice with boiled peas (pè byouk), and yei nway jan (green tea), especially among the poor.
Glutinous rice or kao hnyin is steamed and wrapped in banana leaf often served with peas as kao hnyin baung with a sprinkle of crushed and salted toasted sesame. Equally popular is the purple variety of rice known as nga cheik which is cooked the same way and called nga cheik paung. Si damin is sticky rice cooked with turmeric and onions in peanut oil which is served with crushed and salted toasted sesame and crisp fried onions. Assorted fritters such as baya jaw (urad dal) are often served as a complement.
Nan bya or naan (Indian-style flatbreads) again with pè byouk or simply buttered, is served with Indian tea or coffee. It goes well with hseiksoup (mutton soup).
Fried chapati, blistered like nan bya but crispy, with pè byouk and crispy fried onions is a popular alternative.
Htat ta ya, lit. “a hundred layers”, is flaky multi-layered fried paratha served with either pè byouk or a sprinkle of sugar.
Eeja gway (Chinese-style fried breadsticks or youtiao) with Indian tea or coffee is another favourite.
|
Vcruntime140.dll is a part of the Microsoft Visual Studio 2015 RC, a program that was developed by the Microsoft Corporation. It is a description of the Microsoft C Runtime Library and most applications depend on this dll file to run efficiently.
If you are launching a program that uses the Vcruntime140.dll, Windows will scan your system folders for this dll file as it is necessary for the corresponding application to open successfully. If the Vcruntime140.dll is not located in the map, you receive an error message indicating that the program was unsuccessful because the particular dll file is missing.
There are various ways in which these error messages appear on your screen. Some of them are;
- “The file Vcruntime140.dll is missing”
- “Cannot find Vcruntime140.dll”
- “This program can’t continue because Vcruntime140.dll is missing from your computer”
- “This application failed to start because physxloader.dll was not found. Re-installing the application may fix this problem.”
- “Vcruntime140.dll not found”
What causes the Vcruntime140.dll error messages?
There are various reasons why these errors often appear. It is necessary to determine the possible solutions to fixing the problem to allow the application to run efficiently.
Some of the causes include;
- If the Vcruntime140.dll file was damaged or corrupted by a malicious program.
- The Vcruntime140.dll might have been placed in a wrong map
- It can occur as a result of faulty registry entries or configurations.
- A different application might have installed a varied version of the file which is incompatible with the program you are using
- If you uninstalled a program that uses the same physxloader.dll, it might have deleted the dll file in the process leading to the error messages.
How can I fix the Vcruntime140.dll is missing errors?
Run a full virus / malware scan
Most problems associated with the Vcruntime140.dll arise from being damaged or corrupted by a malicious program. One of the ways in which you can detect and solve the problem is by performing a comprehensive virus/ malware scan.
Reinstall the problematic software
If you were launching an application and you received the error message, uninstall and reinstall it again. It can be useful in fixing the Vcruntime140.dll that might have been affected or displaced after the first installation.
Use System Restore
It will be useful in restoring your computer settings to an earlier point in time. It is useful when you suspect that the recent system changes are what caused the problem.
Register the Vcruntime140.dll manually
The errors may be resulting from issues with the Windows registry. The program that depends on the Vcruntime140.dll might have failed to register the file during the first installation. Microsoft Register Server will be useful in re-registering the Vcruntime140.dll file.
- Msvcp110.dll missing
- Msvcp120.dll missing
- Msvcr100.dll is missing
- Api-ms-win-crt-runtime-l1-1-0.dll missing and download
- Msvcp100.dll missing
- Msvcp140.dll download
- Vcruntime140.dll is missing
|
Ah, my sweet summer child. What do you know of inflammation? Inflammation is for the winter, when genes uncoil in your blood and messengers send codes containing the blueprints for proteins to protect you from the harsh diseases of the cold. Inflammation is for those long nights, when the sun hides its face, or rain clouds block the sky, and trillions of little T-cells are born to fight the diseases of cold and flu season.
At least, that's the news from a new study showing that DNA reacts to the seasons, changing your body's chemistry depending on the time of year.
The findings, published today in Nature Communications1, show that as many as one-fifth of all genes in blood cells undergo seasonal changes in expression. Genes often are seen as immutable, but a lot of our body's workings depend upon which genes are translated when. In the winter, the study found, your blood contains a denser blend of immune responders, while summer veins swim with fat-burning, body-building, water-retaining hormones. These seasonal changes could provide insight into inflammatory diseases like hypertension, and autoimmune diseases like type 1 diabetes.
The question is slap-your-forehead simple: How do genes respond to seasonal changes? Surprisingly, nobody had yet looked. "We knew that there are some genes that change their expression throughout the day, and then it hit us—like BLAM!—what is the effect on genes of the length of day throughout the year?" says Chris Wallace, an immunogeneticist at Cambridge University.
Every cell in your body has the same genetic code, but each specializes in certain bits of that code—specialization controlled by how tightly your DNA is spooled around structures called histones. This is different from the twist of the double helix, and is instead like the curling of an old-school phone cord. The outside of the spools are coated in molecules called methyl markers. Under certain conditions, the methyl markers flag a gene, and the section will uncoil. That gene is now exposed to messenger RNA, which picks up the code and begins the process of making proteins.
To get their results, Wallace and her co-author combined data from four studies, giving them access to DNA from more than 1,000 individuals in six countries. "We needed studies that looked at lots of genes where they’d measured the same people throughout the year," Wallace says. This let them compare changes on a temporal scale. And because the subjects in those studies came from Germany, Australia, the US, the UK, Iceland, and the Gambia, the researchers also could identify striking differences depending on latitude.
In the blood cells, about 5,000 genes showed some changes depending on the season. And because the study was looking specifically at white blood cells, it makes sense that most of the genetic changes had to do with immune system responses. "Inflammation is the body’s response to harm, and in the winter we are more susceptible to harm," says Wallace. (In the winterless Gambia, the inflammatory bump came during the rainy season, when danger from malaria is highest.) "In evolutionary terms it's a good thing, as until the 20th century the biggest cause of death in humans was disease." But in the summer—and sedentary, climate controlled modern winter—an aggressive inflammatory system can be a liability, as it puts you more at risk for cardiovascular and autoimmune disorders.
Wallace says there's no telling which cues trigger the seasonal changes. Behavioral changes—like staying indoors, or eating different types of food—could be to blame, but that's unlikely as the studies the researchers used spanned so many different people in so many different cultures. The culprit is probably something environmental. For instance, the length of the day could be a contender—light triggers genes controlling your body's clock—but daylight hours don't change much in places like the Gambia. Temperature also could be a factor. "We can’t be sure what’s causing this, all we can say is humans who have adapted to their environments, humans have adapted their gene expression to match that variation," she says. What would be really interesting, she says, would be to compare the genetic changes between locals and immigrants in a city with an even mix of the two groups. London, for instance.
Or in an even more exciting thought-experiment: As winter descends on Westeros, perhaps some enterprising maester could record gene expression across the Five Kingdoms.
1 Correction 05/12 11:52 AM ET. Originally, this said the paper was published in Nature. Nature Communications is a separate, online only, open-access journal.
|
Palio di Siena
The Palio di Siena (known locally simply as Il Palio) is a horse race held twice each year on July 2 and August 16 in Siena, Italy, in which ten horses and riders, bareback and dressed in the appropriate colours, represent ten of the seventeen Contrade, or city wards. The Palio held on July 2 is named Palio di Provenzano, in honour of Madonna di Provenzano, who has a church in Siena. The Palio held on August 16 is named Palio dell'Assunta, in honour of Assumption of Mary.
A magnificent pageant, the Corteo Storico, precedes the race, which attracts visitors and spectators from around the world.
The race itself, in which the jockeys ride bareback, involves circling the Piazza del Campo, on which a thick layer of dirt has been laid, three times and usually lasts no more than 90 seconds. It is not uncommon for a few of the jockeys to be thrown off their horses while making the treacherous turns in the piazza and indeed it is not unusual to see unmounted horses finishing the race without their jockeys. The Palio in fact is won by the horse who represents his contrada, and not by the jockeys. A horse who wins without a jockey is known locally as winning "scosso."
The earliest known antecedents of the race are medieval. The town's central piazza was the site of public games, largely combative: pugna, a sort of many-sided boxing match or brawl; jousting; and in the 16th century, bullfights. Public races organized by the Contrade were popular from the 14th century on; called palii alla lunga, they were run across the whole city.
When the Grand Duke of Tuscany outlawed bullfighting in 1590, the Contrade took to organizing races in the Piazza del Campo. The first such races were on buffalo-back and called bufalate; asinate, races on donkey-back, later took their place, while horse-racing continued elsewhere. The first modern Palio (called palio alla tonda to distinguish it from the earlier palii alla lunga) took place in 1656. At first, one race was held each year, on July 2; a second, on August 16, was added later.
The seventeen Contrade are: Aquila (Eagle), Bruco (Caterpillar), Chiocciola (Snail), Civetta (Little Owl), Drago (Dragon), Giraffa (Giraffe), Istrice (Crested porcupine), Leocorno (Unicorn), Lupa (Female Wolf), Nicchio (Seashell), Oca (Goose), Onda (Wave), Pantera (Black Panther), Selva (Forest), Tartuca (Tortoise), Torre (Tower) and Valdimontone (literally, "Valley of the Ram" - often shortened to Montone).
Ritual and Rivalry
The Palio di Siena is more than a simple horse race. It is the culmination of ongoing rivalry and competition between the contrade. The lead-up and the day of the race are invested with passion and pride. Formal and informal rituals take place as the day proceeds, with each contrada navigating a strategy of horsemanship, alliances and animosities. There are the final clandestine meetings among the heads of the Contrade and then between them and the jockeys. There is the two hour pageant of the Corteo Storico, then all this is crowned by the race, which takes about 75 seconds to complete. Although there is great public spectacle, the passions displayed are still very real.
Years since last Victory
- Brown, Margaret Mcdonough and Titus Buckhardt (1960). Siena, the City of the Virgin. Oxford: Oxford University Press.
- Drechsler, Wolfgang (2006). "The Contrade , the Palio and the Ben Comune: Lessons from Siena", Trames 10(2), 99-125.
- Dundes, Alan and Alessandro Falassi (2005). La Terra in Piazza. An Interpretation of the Palio of Siena. 2nd of the new edn. (Orig. 1972). Siena: Nuova Immagine. (Standard work, but meanwhile very controversial because of its Freudian interpretation.)
- Falassi, Alessandro (1985). "Palio Pageant: Siena's Everlasting Republic", The Drama Review 29(3), 82-92.
- Handelman, Don (1998), Models and Mirrors: Towards an Anthropology of Public Events, Cambridge: Cambridge University Press.
- Silverman, Sydel (1979). "On the Use of History in Anthropology: The Palio of Siena", American Ethnologist 6(3), 413-436. (Most important counter-model to Dundes & Falassi.)
- Pascal, C. Bennett (1981). "October Horse", Harvard Studies in Classical Philology 85, 261-291.
- Spicer, Dorothy Gladys (1958). Festivals of Western Europe. Wilson.
- 1911 Encyclopædia Britannica, Siena
- ↑ "75 seconds to Victory". http://www.ilpaliodisiena.com/ITALIA/SIENA/contrade/75victor.htm. Retrieved 21 Sept 2009.
|
Murder in the Cathedral
The play as written for the Canterbury Festival of June 1935, for which Eliot had been invited by the bishop of Winchester to write something on some episodes of local history. Eliot chose the murder, by four Knights, of Thomas a Beckett in Canterbury Cathedral. The murder was the result of his opposition to Henry II (1170).
Yet, instead of representing Beckett's personal struggle with his outer enemies, Eliot focused on his inner conflict , on his temptations and even on his doubts about the nature of his martyrdom: did he really seek it for God's greater glory or, ambitiously, for his own? The answer to this question comes at the end of the play when, offering his blood for Christ's blood, Beckett accepts death in His name. The scene opens with the priests' hysterical attempts to bar the door and save the Archbishop. But Beckett, with a violence reminiscent of Christ in the Temple among the merchants, orders them to open the church and let the enemy in, since it is out of time that his decision is taken and because it is through suffering that will now conquer. There is here the same conception of the Negative Way of St, John of the Cross: it is "by fighting , by stratagem or by resistance" that he will triumph, but by giving himself up, annulling himself in God's will. He has already conquered the "beast", for example the temptation to die for his own personal glory, a "BEAST" that is even worse than the four beasts named by the priests (lion, leopard, wold and boar), and is now ready to face the other "beast" embodied by the knights . So he does not oppose them and is killed.
rhythm and rhyme pattern, an irreverent parody of hymns. Taking up the same rhythm and their last word "traitor", the Archbishop answers the knights' accusations and reveals their treachery . Then , with a last prayer in prose ,
which sounds like one leg verse, he dies , commending his soul and the Catholic Church to God Almighty.
|
5. Insignia of the Bishop
Antiquities of the Christian Church
CHAPTER III. Of the Ministers of the Church
5. Insignia of the Bishop
No badge of office or clerical dress was worn by the clergy until the fourth century. The various insignia or emblems of office which have from time to time been appropriated to the bishop are as follows:
- A ring, emblematical of his espousals to the church in imitation of the ancient ceremony of presenting a ring on the espousal of the parties in marriage. It was called the ring of his espousals, annulus sponsalitius, annulus pronuhus, and sometimes, annulus palata.
- A shepherd's staff or crook*. Sometimes a straight staff was presented instead of the crook. That of the archbishop had usually a single, and that of the patriarch a double cross piece. According to Montfaucon the staff of the Greek archbishop had a head-piece resembling the letter T. According to Goari, it was curved upward, thus, Y, for which he offers the following whimsical reason: Ansas retortas habet baculus hamorum instai, ut efferatos fuget et perniciosos et ultimo Christi crucem manifestet.
- A mitre or fillet. It is usually stated that only bishops and abbots of the Western church have worn the mitre since the tenth century. But the usage was not unknown in the Eastern church also.
- A pair of gloves, chirothecae. These the bishop always wore when engaged in any religious offices.
- Sandals. Without these, no priest was permitted to celebrate mass. They consisted of a sole so attached to the foot as to leave the upper part bare. They were called sandals from the vegetable color in which they were dyed. From the seventh and eighth centuries they are mentioned as one of the badges of the episcopal office, in distinction from that of the priests.
- Caligae or boots. These, in ancient warfare, were a part of the military equipments of the soldier. To the bishop they were emblematical of that spiritual warfare upon which he entered.
- The robe* pallium superhumerale, pectorale; ephod. This badge was so essential, that writers often use the robe to denote both the person and the office of the bishop. It was at first worn by all bishops, but afterwards became the distinctive badge of archbishops, metropolitans, and patriarchs. Gregory Nazianzen affirms, that it was the insignia of the Roman emperor as pontifex maximus; and that Constantine the great, first granted it to the bishop of Jerusalem. But this is in direct opposition to tradition, which reports that Mark the Evangelist as bishop of Alexandria first assumed the robe, and left it for his followers.
Nothing is known of the form and quality of the robe in the first centuries, save that it was a seamless garment, nullis acubus perforata, made of white linen, and hung loosely from the shoulders. It was afterwards made of woollen. In the twelfth century, it was made of white woollen, having a circular gathering on the shoulders, and two scarfs hanging over it behind and before. On the left side it was double, and single on the right. Previous to the eighth century, it had also four purple crosses upon it, – before and behind, one; and one on either side. It was fastened by three golden pins. The Greek bishops, according to the patriarch Germanus, assumed the purple crosses as early as the eighth century. The robe itself was styled*.
The rationale*, of the robe has been the subject of dispute among the learned. It appears, however, to relate to the proper form of it when the bishops of Rome assumed it as they did the name of pontijices maximi, high priests, and all the prerogatives of the Jewish high priest.
- The cross. This was both worn on the neck or breast, and carried in public processions, and thus became a twofold badge of the bishop's office. He was accustomed to wear upon the neck or breast, a cross made of wood, or gold, or some sacred relic, which by the Greeks was called τό πεo̧ιαμμα, and was regarded as an amulet, or phylactery. It was also sometimes called *, from *, the bosom. The cross was used in like manner, in the Latin church. Binterim is of opinion that it was at first worn by Christians indiscriminately, and not as an official badge.
The cross which was carried before the bishops in processions and festive parades, was called crux gestatoria. For a long time the bishops of Rome claimed the right of carrying the cross as exclusively their own. In the twelfth century it was granted to metropolitans and patriarchs, and to archbishops in the time of Gregory IX. The patriarchs of the Greek church did not so frequently carry the cross, but in the place of it, they carried lamps and burning candles.
Binterim's Denkwürdigk. der Kathol. Kirche. I. b. 2. Th. S. 349 seq; Pellicia. lorn. i. p. 74, 75.
Honor. Augustodon. lib. i. c. 215; Durandi ration, div. offic. lib. iii. c. 12.
Binterim. I. 1, S, 359–61.
Isidor. Hispal. de offic. eccl. lib. i. c. 4.
Orat. 47; Theodoret. hist. eccl. lib. 2, c. 27.
Joan. Diacon. Vit. Gregor. M. lib. iv. c. 8.
Durandus ration, lib. 3. c. 17.
Anastasius. Biblioth. not. ad. Synod. Constantin. IV. Sess. 6.
(* denotes Greek text in Rev. Lyman Coleman's translation.)
|
WHAT DO DATA ANALYSTS DO?
Data analysts translate numbers into plain English Every business collects data, whether it's sales figures, market research, logistics, or transportation costs. A data analyst's job is to take that data and use it to help companies make better business decisions. This could mean figuring out how to price new materials for the market, how to reduce transportation costs, solve issues that cost the company money, or determine how many people should be working on Saturdays.
HOW MUCH DO DATA ANALYSTS MAKE?
This depends on experience and what type of data analyst you are. According to the Bureau of Labor Statistics (BLS) financial analysts made a median hourly rate of $35.75, or $74,350 annually in 2010. Market research analysts made $29.12 an hour, or $60,570 annually, and operations research analysts made $34.12 per hour, or $$70,960 annually.
WHAT ARE THE EDUCATION REQUIREMENTS?
A bachelor's degree is needed for most entry-level jobs, and a master's degree will be needed for many upper-level jobs. Most analysts will have degrees in fields like math, statistics, computer science, or something closely related to their field. Strong math and analysis skills are needed.
Depending on the field you go into, certification is available.
JOB SKILLS AND REQUIREMENTS
- Analytical Skills: Data analysts work with large amounts of data: facts, figures, and number crunching. You will need to see through the data and analyze it to find conclusions.
- Communication Skills: Data analysts are often called to present their findings, or translate the data into an understandable document. You will need to write and speak clearly, easily communicating complex ideas.
- Critical Thinking: Data analysts must look at the numbers, trends, and data and come to new conclusions based on the findings.
- Attention to Detail: Data is precise. Data analysts have to make sure they are vigilant in their analysis to come to correct conclusions.
- Math Skills: Data analysts need math skills to estimate numerical data.
|
If only humans could benefit from new research like mice do.
Another groundbreaking finding while studying mice – this one out of Northwestern University Feinberg School of Medicine, and published in the journal Nature Neuroscience – “has completely eliminated chronic pain behavior.”
The new findings represent a significant breakthrough in understanding that a region of the brain, which regulates feelings of happiness, sadness and addiction, is remodeled by chronic pain. More importantly, the researchers have created a two-drug combination that restores this region, resulting in dramatically reduced pain symptoms.
The two-drug combination includes a Parkinson’s drug, L-dopa, and a non-steroidal anti-inflammatory drug. When combined, the drugs target the brain’s circuits in the nucleus accumbens, and eliminate chronic pain behavior. The study authors noted “the key is administering the drugs together and shortly after injury,” which leaves open the question of whether such treatments could benefit people suffering in pain for long periods of time.
“It was surprising to us that chronic pain actually rewires the part of the brain controlling whether you feel happy or sad,” said corresponding author D. James Surmeier, chair of physiology at Northwestern University Feinberg School of Medicine in a press release. “By understanding what was causing these changes, we were able to design a corrective therapy that worked remarkably well in the models. The question now is whether it will work in humans.”
“The study shows you can think of chronic pain as the brain getting addicted to pain,” said A. Vania Apkarian, professor of physiology at Feinberg, and co-author of the study. “The brain circuit that has to do with addiction has gotten involved in the pain process itself.”
“It is remarkable that by changing the activity of a single cell type in an emotional area of the brain, we can prevent the pain behavior,” said Marco Martina, associate professor of physiology at Feinberg and also a co-author of the study.
Well, the mice in Evanston, Illinois, are surely feeling better, just as the mice in London are enjoying their “recipe for painlessness.” But will humans ever get a crack at experiencing this new drug combination?
The good news is, yes. The new research has scientists excited enough to begin pursuing a clinical trial in humans. Information regarding when such a clinical trial will begin is currently unavailable.
|
Article 1 Establishment
Article 2 Definitions
Article 3 Objectives
Article 4 Functions
Article 5 Seat
Article 6 Membership
Article 7 Rights And Obligations Of Members
Article 8 The Governing Council
Article 9 Functions Of The Governing Council
Article 10 Observers
Article 11 Technical Advisory Committee
Article 12 Co-Ordinator And Staff
Article 13 Finances
Article 14 Legal Status, Privileges And Immunities
Article 15 Co-Operation With Donor Governments And With Other Organizations And Institutions
Article 16 Signature, Ratification, Accession, Entry Into Force And Admission
Article 17 Amendment
Article 18 Withdrawal And Dissolution
Article 19 Interpretation And Settlement Of Disputes
Article 20 Depositary
Article 21 Annex
Agreement On The Network Of
Aquaculture Centers In Asia And The Pacific
8th January 1988
The Contracting Parties,
Conscious of the paramount importance of fisheries as an essential sector of development in the Asia-Pacific region;
Recognizing that aquaculture plays a vital role in the promotion and better use of fishery resources;
Recognizing that the establishment and maintenance of a network of aquaculture centres in the region can make a significant contribution to the development of aquaculture;
Considering that the success of such a network will depend largely on close regional co-operation;
Considering that co-operation in this field can best be achieved through the establishment of an intergovernmental organization carrying out its activities in collaboration with other governments as well as organizations and institutions that may be able to provide financial and technical support;
Have agreed as follows:
Article 1 ESTABLISHMENT
The Contracting Parties hereby establish the Organization for the Network of Aquaculture Centres in Asia and the Pacific (NACA) with the objectives and functions set out hereinafter.
For the purpose of this Agreement:
‘Aquaculture’ means the farming of aquatic organisms.
‘Donor Government’ means a government, other than a Member Government, which makes a substantial contribution to the activities of the Organization and has concluded an agreement pursuant to Article 15 of this Agreement.
‘Member’ means a government which is a contracting party to this Agreement.
‘National centre’ means an aquaculture institution designated by a Member to serve as national focal point for linkage with NACA.
‘Organization’ means the Organization for the Network of Aquaculture Centres in Asia and the Pacific (NACA).
‘Regional centre’ means an aquaculture institution in the Asia-Pacific region selected by the Members to serve as a lead centre to share in the regional activities and responsibilities of NACA.
Article 3 OBJECTIVES
1. The objectives of the Organization shall be to assist the Members in their efforts to expand aquaculture development mainly for the purpose of:
(a) increasing production;
(b) improving rural income and employment;
(c) diversifying farm production; and
(d) increasing foreign exchange earnings and savings.
2. In order to facilitate the achievement of the foregoing objectives, the Organization shall:
(a) consolidate the establishment of an expanded network of aquaculture centres to share the responsibility of research, training and information exchange essential to aquaculture development in the region;
(b) strengthen institutional and personal links among national and regional centres through the exchange of technical personnel, technical know-how and information;
(c) promote regional self-reliance in aquaculture development through Technical Co-operation among Developing Countries (TCDC); and
(d) promote the role of women in aquaculture development.
In order to achieve its objectives, the Organization shall:
(a) conduct disciplinary and interdisciplinary research on selected aqua farming systems for adaptation or improvement of technologies, and for the development of new technologies;
(b) train and upgrade core personnel needed for national aquaculture planning, research, training, extension and development;
(c) establish a regional information system to provide appropriate information for development planning, research and training;
(d) assist Members in strengthening their national centres linked to the regional centres;
(e) assist the national centres of Members in testing and adapting existing technology to local requirements and in the training of technicians, extension workers and farmers at the national level;
(f) transfer to the Members appropriate aquaculture technologies and techniques developed at regional centres;
(g) facilitate the exchange of national experts, technical know-how and information within the framework of TCDC;
(h) develop programmes for the promotion of women’s participation in aquaculture development at all levels;
(i) assist Members in feasibility studies and project formulation; and
(j) undertake such other activities related to the objectives of the Organization as may be approved by the Governing Council.
1. The Seat of the Organization shall be determined by the Governing Council, subject to the consent of the Member concerned.
2. The Host Government shall provide free of charge or at a nominal rent, such accommodation and facilities as are necessary for the efficient conduct of work at the Seat of the Organization.
3. If necessary, the Governing Council may establish subsidiary offices, subject to the consent of the Members concerned; in so doing account should be taken of the possibility of utilizing accommodation in existing centres.
1. The Members of the Organization shall be the Contracting Parties to this Agreement.
2. The original Members of the Organization shall be the Governments in Asia and the Pacific invited to the Conference of Plenipotentiaries at which this Agreement was adopted, which have ratified the Agreement or have acceded thereto. A list of invited Governments is given in the Annex to this Agreement.
3. The Governing Council of the Organization may, by a majority of not less than two-thirds of the Members, authorize any Government not referred to in paragraph 2 above, which has submitted an application for membership, to accede to this Agreement as in force at the time of accession, in accordance with Article 16, paragraph 3.
RIGHTS AND OBLIGATIONS OF MEMBERS
1. Members shall, in accordance with this Agreement, have the right:
(a) to attend the meetings of the Governing Council and other appropriate meetings that may be called by the Organization;
(b) to obtain on request, free of charge within reasonable limits, information available within the Organization, on matters of their concern, including guidelines for obtaining technical assistance, and collaboration in the study of their problems; and
(c) to receive free of charge publications and other information that may be distributed by the Organization.
2. Members shall, in accordance with this Agreement, have the following obligations:
(a) to settle their financial obligations towards the Organization;
(b) to collaborate in determining the technical activities of the Organization;
(c) to provide, promptly, information reasonably requested by the Organization, to the extent that this is not contrary to any laws or regulations of the Members;
(d) to undertake assignments that may be mutually agreed between individual Members or groups of Members and the Organization;
(e) to accord to the Organization and its Members, in so far as it may be possible under the constitutional procedures of the respective Members, facilities which are deemed essential for the successful functioning of the Organization; and
(f) to collaborate, in general, in the fulfilment of the objectives and functions of the Organization.
THE GOVERNING COUNCIL
1. The Organization shall have a Governing Council on which each Member shall be represented. The Governing Council shall be the supreme body of the Organization.
2. The Governing Council shall adopt its own Rules of Procedure.
3. The Governing Council shall hold an annual session at such time and place as it shall determine.
4. Special sessions of the Governing Council may be convened by the Co-ordinator at the request of not less than two-thirds of the Members.
5. The Governing Council may, in its Rules of Procedure, establish a procedure whereby the Chairman of the Governing Council may obtain a vote of the Members on a specific question without convening a meeting of the Council.
6. The Governing Council shall elect its Chairman and other officers.
7. Each Member shall have one vote. Unless otherwise provided in this Agreement, decisions of the Governing Council shall be taken by a majority of the votes cast. A majority of the Members shall constitute a quorum.
8. The Food and Agriculture Organization of the United Nations (FAO) shall be invited to be represented at meetings of the Governing Council in an advisory capacity.
9. Donor Governments may be represented at meetings of the Governing Council in accordance with an agreement concluded with the Organization under Article 15 of this Agreement.
FUNCTIONS OF THE GOVERNING COUNCIL
The functions of the Governing Council shall be:
(a) to determine the policy of the Organization and to approve by a majority of not less than two-thirds of the Members its programme of work and its budget, giving due consideration to the conclusions and recommendations of the Technical Advisory Committee referred to in Article 11;
(b) to assess, by a majority of not less than two-thirds of the Members, the contribution of Members as provided in Article 13;
(c) to establish special funds to enable the acceptance of additional resources for the development of programmes and projects;
(d) to lay down general standards and guidelines for the management of the Organization;
(e) to evaluate the progress of work and activities of the Organization including the auditing of accounts, in accordance with policies and procedures established for the purpose by the Governing Council, and to give guidance to the Co-ordinator on the implementation of its decisions;
(f) to formulate and adopt the Financial Regulations and the Administrative Regulations, and to appoint auditors;
(g) to appoint the Co-ordinator of the Organization and to determine his conditions of service;
(h) to adopt rules governing the settlement of disputes, referred to in Article 19;
(i) to approve formal arrangements with governments as well as other organizations or institutions, including any headquarters agreement concluded between the Organization and the Host Government;
(j) to adopt the Staff Regulations which determine the general terms and conditions of employment of the staff;
(k) to approve agreements for co-operation to be concluded pursuant to Article 15; and
(l) to perform all other functions that have been entrusted to it by this Agreement or that are ancillary to the accomplishment of the approved activities of the Organization.
Non-member Governments, organizations and institutions that are able to make a significant contribution to the activities of the Organization may, in accordance with the Rules of Procedure adopted under Article 8, paragraph 2, be invited to be represented at sessions of the Governing Council as observers.
TECHNICAL ADVISORY COMMITTEE
1. The Governing Council shall establish a Technical Advisory Committee composed of one representative designated by each Member of the Organization.
2. The representatives designated on the Technical Advisory Committee shall be persons with special competence and expertise in the field of aquaculture.
3. The Technical Advisory Committee shall meet at least once a year and at any time at the request of the Governing Council.
4. At its annual meeting the Committee shall designate one of the Committee members as Chairman who shall convene the next annual meeting of the Technical Advisory Committee.
5. The Technical Advisory Committee shall advise the Governing Council on all technical aspects of the activities of the Organization.
6. At each session, the Technical Advisory Committee shall adopt a report, which shall be submitted to the Governing Council.
7. FAO shall be invited to be represented at Sessions of the Technical Advisory Committee. Where appropriate, representatives of Donor Governments and of other organizations or institutions shall also be invited to be represented at such sessions.
CO-ORDINATOR AND STAFF
1. The Organization shall have a Co-ordinator appointed by the Governing Council.
2. The Co-ordinator shall be the legal representative of the Organization. He shall direct the work of the Organization under the guidance of the Governing Council in accordance with its policies and decisions.
3. The Co-ordinator shall submit to the Governing Council at each regular session:
(a) a report on the work of the Organization, as well as the audited accounts; and
(b) a draft programme of work and a draft budget for the following year.
4. The Co-ordinator shall:
(a) prepare and organize the sessions of the Governing Council and all other meetings of the Organization and shall provide the secretariat therefor;
(b) ensure co-ordination among Members of the Organization;
(c) organize conferences, symposia, regional training programmes and other meetings in accordance with the approved programme of work;
(d) initiate proposals for joint action programmes with regional and other international bodies;
(e) be responsible for the management of the Organization;
(f) ensure the publication of research findings, training manuals, information print-outs and other materials as required;
(g) take action on other matters consistent with the objectives of the Organization; and
(h) perform any other function as may be specified by the Governing Council.
5. Staff members and consultants shall be appointed by the Co-ordinator in accordance with the policy, general standards and guidelines laid down by the Governing Council and in accordance with the Staff Regulations. The Co-ordinator shall promulgate Staff Rules, as required, to implement the foregoing.
1. The financial resources of the Organization shall be:
(a) the contributions of the Members to the budget of the Organization;
(b) the revenue obtained from the provision of services against payment;
(c) donations, provided that acceptance of such donations is compatible with the objectives of the Organization; and
(d) such other resources as are approved by the Governing Council and compatible with the objectives of the Organization.
2. Members undertake to pay annual contributions in freely convertible currencies to the regular budget of the Organization.
3. A Member which is in arrears in the payment of its financial contributions to the Organization shall have no vote in the Governing Council if the amount of its arrears equals or exceeds the amount of the contributions due from it for the two preceding calendar years. The Governing Council may, nevertheless, permit such a Member to vote if it is satisfied that the failure to pay was due to conditions beyond the control of the Member.
4. Unless otherwise agreed by the consensus of the Members of the Organization, each Member’s financial liability to the Governing Council and to other Members and for the acts of omission and commission of the Governing Council shall be limited to the extent of its obligation to make contributions to the budget of the Organization.
LEGAL STATUS, PRIVILEGES AND IMMUNITIES
1. The Organization shall have juridical personality and such legal capacity as may be necessary for the fulfilment of the Organization’s objectives and for the exercise of its functions.
2. The Organization shall be accorded the privileges and immunities necessary to perform its functions provided for in this Agreement. In addition, the representatives of Members and the Co-ordinator and staff of the Organization shall be accorded the privileges and immunities necessary for the independent exercise of their functions with the Organization as generally accorded to international organizations in each country.
3. Each Member shall accord the status, privileges and immunities referred to above by applying, mutatis mutandis, to the Organization, the representatives of Members, and to the Co-ordinator and staff of the Organization the privileges and immunities provided for in the Convention on the Privileges and Immunities of the Specialized Agencies adopted by the General Assembly of the United Nations on 21 November 1947.
4. Privileges and immunities are accorded to the representatives of Members and to the Co-ordinator and staff of the Organization not for the personal benefit of the individuals themselves, but in order to safeguard the independent exercise of their functions in connection with the Organization. Consequently, a Member not only has the right but is under a duty to waive the immunity of its representatives in any case where, in the opinion of the Member, the immunity would impede the course of justice, and where it can be waived without prejudice to the purpose for which the immunity is accorded. If the Member does not waive the immunity of the representative, the Member shall make the strongest efforts to achieve an equitable solution of the matter. Similarly, the Co-ordinator not only has the right, but is under a duty to waive the immunity of a staff member where, in the opinion of the Co-ordinator, the immunity would impede the course of justice, and where it can be waived without prejudice to the purpose for which the immunity is accorded. If the Co-ordinator does not waive the immunity of the staff member, he shall make the strongest efforts to achieve an equitable solution of the matter. The immunity of the Co-ordinator may only be waived by the Governing Council.
5. The Organization shall conclude a headquarters agreement with the Host Government, and may conclude agreements with other States in which offices of the Organization may be located, specifying the privileges and immunities and facilities to be enjoyed by the Organization to enable it to fulfill its objectives and to perform its functions.
CO-OPERATION WITH DONOR GOVERNMENTS AND WITH OTHER ORGANIZATIONS AND INSTITUTIONS
1. The Contracting Parties agree that there should be a close working relationship between the Organization and the Food and Agriculture Organization of the United Nations (FAO). To this end the Organization shall enter into negotiations with FAO with a view to concluding an agreement pursuant to Article XIII of the FAO Constitution. Such agreement should provide, inter alia, that the Director-General of FAO may appoint a Representative who shall be entitled to participate in all meetings of the Organization in an advisory capacity, without the right to vote.
2. The Contracting Parties agree that there should be co-operation between the Organization and Donor Governments whose contribution would further the activities of the Organization. To this end, the Organization may enter into agreements with such Donor Governments wherein provision may be made for their participation in certain activities of the Organization.
3. The Contracting Parties agree that there should be co-operation between the Organization and other international organizations and institutions, especially those active in the fisheries sector, which might contribute to the work and further the objectives of the Organization. The Organization may enter into agreements with such organizations and institutions. Such agreements may include, if appropriate, provision for participation by such organizations and institutions in activities of the Organization.
SIGNATURE, RATIFICATION, ACCESSION, ENTRY INTO FORCE AND ADMISSION
1. This Agreement shall be open for signature by the Governments in Asia and the Pacific listed in the Annex hereto, in Bangkok on 8th January 1988 and, thereafter, at the Headquarters of the Food and Agriculture Organization of the United Nations (FAO) in Rome until 7th January 1989. Governments which have signed the Agreement may become a party thereto by depositing an instrument of ratification. Governments which have not signed the Agreement may become a party thereto by depositing an instrument of accession.
2. Instruments of ratification or accession shall be deposited with the Director-General of FAO, who shall be the Depositary of this Agreement.
3. Subject to Article 6, paragraph 3 of this Agreement, and at any time after the entry into force thereof, any Government not referred to in paragraph 1 above may apply to the Director-General of FAO to become a member of the Organization. The Director-General of FAO shall inform Members of such application. The Governing Council shall then decide on the application in accordance with Article 6 and if a favourable decision is taken, invite the Government concerned to accede to this Agreement. The Government shall lodge its instrument of accession, whereby it consents to be bound by the provisions of this Agreement as from the date of its admission, with the Director-General of FAO within ninety days of the date of the invitation by the Governing Council.
4. This Agreement shall enter into force, with respect to all Governments which have ratified it or acceded thereto, on the date when instruments of ratification or accession have been deposited by at least five Governments listed in the Annex.
1. The Governing Council may amend this agreement by a three-quarters majority of the Members. Amendments shall take effect, with respect to all Contracting Parties, on the thirtieth day after their adoption by the Governing Council, except for any Contracting Party which gives notice of withdrawal within thirty days of receipt of notification of the adoption of such amendments, subject to the condition that any obligation incurred by the Member vis-a-vis the Organization shall remain valid and enforceable. Amendments adopted shall be notified to the Depositary forthwith.
2. Proposals for the amendment of this Agreement may be made by a Member in a communication to the Depositary, who shall promptly notify the proposal to all Members and to the Co-ordinator of the Organization.
3. No proposal for amendment shall be considered by the Governing Council unless it was received by the Depositary at least one hundred and twenty days before the opening day of the session at which it is to be considered.
WITHDRAWAL AND DISSOLUTION
1. At any time after the expiration of three years from the date when it became a party to this Agreement, any Member may give notice of its withdrawal from the Organization to the Depositary. Such withdrawal shall take effect twelve months after the notice thereof was received by the Depositary or at any later date specified in the notice, provided, however, that any obligation incurred by the Member vis-a-vis the organization shall remain valid and enforceable.
2. The Organization shall cease to exist at any time decided by the Governing Council by a three-quarters majority of the Members. The disposal of any real property belonging to the Organization shall be subject to the prior approval of the Governing Council. Any assets remaining after the land, buildings and fixtures have been disposed of, after the balance of any donated funds that have not been used has been returned to the respective donors, and after all obligations have been met, shall be distributed among the Governments which were Members of the Organization at the time of the dissolution, in proportion to the contributions that they made in accordance with Article 13, paragraph 2, for the year preceding the year of the dissolution.
INTERPRETATION AND SETTLEMENT OF DISPUTES
1. Any dispute concerning the interpretation or application of this Agreement which cannot be settled by negotiation, conciliation or similar means may be referred by any party to the dispute to the Governing Council for its recommendation. Failing settlement of the dispute, the matter shall be submitted to an arbitral tribunal consisting of three arbitrators. The parties to the dispute shall appoint one arbitrator each; the two arbitrators so appointed shall designate by mutual consent the third arbitrator, who shall be the President of the tribunal. If one of the parties does not appoint an arbitrator within two months of the appointment of the first arbitrator, or if the President of the arbitral tribunal has not been designated within two months of the appointment of the second arbitrator, the Chairman of the Governing Council shall designate the arbitrator or the President, as the case may be, within a further two-month period.
2. The proceedings of the arbitral tribunal shall be carried out in accordance with the rules of the United Nations Commission on International Trade Law (UNCITRAL).
3. A Member which fails to abide by an arbitral award rendered in accordance with paragraph 1 of this Article may be suspended from the exercise of the rights and privileges of membership by a two-thirds majority of the Members.
The Director-General of FAO shall be the Depositary of this Agreement. The Depositary shall:
(a) send certified copies of this Agreement to the Governments invited as participants to the Conference of Plenipotentiaries, and to any other Government which so requests;
(b) arrange for the registration of this Agreement, upon its entry into force, with the Secretariat of the United Nations in accordance with Article 102 of the Charter of the United Nations;
(c) inform the Governments invited as participants to the Conference of Plenipotentiaries and any Government that has been admitted to membership in the Organization of:
(i) the signature of this Agreement and the deposit of instruments of ratification or accession in accordance with Article 16;
(ii) the date of entry into force of this Agreement in accordance with Article 16, paragraph 4;
(iii) notification of the desire of a Government to be admitted to membership in the Organization; and admissions, in accordance with Article 6;
(iv) proposals for the amendment of this Agreement and of the adoption of amendments, in accordance with Article 17; and
(d) convene the first session of the Governing Council of the Organization within six months after the entry into force of this Agreement, in accordance with Article 16, paragraph 4.
The Annex shall constitute an integral part of this Agreement.
Done at Bangkok this eighth day of January 1988 in a single copy in the English language. The original text shall be deposited in the archives of the Food and Agriculture Organization of the United Nations in Rome.
LIST OF GOVERNMENTS INVITED TO THE CONFERENCE OF PLENIPOTENTIARIES
(Article 6, paragraph 2)
People’s Republic of China
Democratic People’s Republic of Korea
Republic of Korea
Papua New Guinea
United States of America
|
October 21, 2012
Experts Predict Wet Winter, but Wary of Melting Ice
. Forecasters are predicting a wetter and colder winter than normal due to an oncoming El Niño period in the Pacific Ocean, but record low ice cover this summer in the Arctic Ocean is causing a large degree of uncertainty. Although many climate scientists argue there is a link between shrinking Arctic ice and unusual weather patterns, they cannot say where or exactly how it will have the greatest effect. According to research by Rutgers climate scientist and CECI affiliate Jennifer Francis
the shrinking Arctic sea ice means weather patterns will move more slowly as a result of a less powerful jet stream. The jet stream draws its strength from the temperature difference between the North Pole and the equator, but with less ice cover the Arctic Ocean absorbs more energy from the sun and its temperature rises, thus decreasing the difference.
|
Why is it that we sometimes get a tune or chorus stuck in our heads and play it over and over again even though it’s driving us crazy?
This is one of those questions that one wonders if there really could be an answer or is it ‘just one of those things’. Well some neuroscientists, pyschologists and evene marketers have something to say on this subject.
Why do men have nipples? – In a Nutshell : Men have nipples because women do.
Eponyms are one of the most fascinating examples of how the English language gains new words. In this article we take a colourful look at the phenomenon some eponyms like : Uncle Sam, Masochism, Martinet & Jezebel.
It would be handy wouldn’t it – photosynthesising all our food rather than having to stop to eat three times a day – so why can’t we do it ?
Identical twins come from the same sperm and egg – and thus have the same DNA – ie EXACT identical genetic makeup. So do they therefore have the same fingerprints? Or to put it another way would twins force Hercule Poirot’s “little grey cells” into overdrive in a murder investigation ?
Eponyms are one of the most fascinating examples of how the English language gains new words. In this article we take a colourful look at the phenomenon some eponyms like : Juggernaut, Lynching, Malapropism, Maverick & Tantalise.
Blushing is rather an odd physiological and psychological response to embarrassment or awkward social situations. Could there be any rational or logical explanation for this? What possible evolutionary reason could there be for such a strange phenomenon.
Pit yourself against some mind bending riddles and see if you can work out what each one is referring to.
If you had to name some of history’s best all time hoaxes what would you come up with ? In this article we look at what , we consider, the top 3 hoaxes of all time (so far).
English is one of the richest languages in the world. At the last count there were estimated to be over 1 million words in the English lexicon. In this article we’ve gathered together just a few of the more unusual ones to see if you know (or can guess) what they mean.
Urban legend has it that if you want to calculate a dog’s age in equivalent human years you should multiply the dogs age by seven. But is this really true ?
Some hilarious text bloopers … courtesy of the iPhone’s auto correct feature ! (plus some parental misunderstandings)
Having a wide vocabulary is always a good thing. In this article we’ve pulled together some of the more unusual words that the English language has to offer us that relate to wintertime.
In wartime nations are often galvanised into frenzied action to innovate and invent in order to try to gain the upper hand in their struggle for survival. In this article we look at some of the seemingly more trivial and rather inexpected things that were invented or developed as a result of the WWI.
Christmas is probably the time of year when there is an overwhelming plethora of traditions and practices that we all enthusiastically embrace. In this article we look at one of the most enduring of British traditions … the Christmas Turkey.
|
Is this a good idea?
"Mammoth Telescope to Be Built in Hawaii"
July 21st, 2009
July 21st, 2009
Hawaii beat out Chile to become the site of the Thirty-Meter Telescope, which is scheduled to be completed in 2018.
The giant telescope will have a single primary mirror that measures 30 meters across and is made up of 492 segments, giving it nine times more collecting surface than the the biggest telescopes on Earth today.
The Thirty-Meter Telescope will surpass even the Hubble Space Telescope in some ways, giving scientists a new view of some of the oldest stars and galaxies in the universe, as well as planets orbiting nearby stars.
Mauna Kea in Hawaii, the site of the Keck and Subaru telescopes, was among five candidate sites selected based on a global satellite assessment of atmosphere and climate variables. After further studies, Hawaii and Cerro Amazones in Chile rose to the top of the list.
"In the final analysis, the board selected Mauna Kea as the site for TMT," Edward Stone, Caltech physicist and vice chairman of the TMT board, said in a press release Tuesday. "The atmospheric conditions, low average temperatures, and very low humidity will open an exciting new discovery space using adaptive optics and infrared observations."
The project still needs to be approved by the the state and $100 million still needs to be raised for construction. The rest of the $300 million estimated cost will come from the Gordon and Betty Moore Foundation. The telescope project is the joint venture of Caltech, the University of California and a group of Canadian Universities called ACURA.
"We are excited about the prospect of being the first of the next generation of extremely large telescopes," said Professor Ray Carlberg, the Canadian Large Optical Telescope project director and a TMT board member.
|
Here are some tips in choosing cutting boards:
- When selecting a cutting board, choose something that is easily cleaned. It’s highly recommended to use a material that is dishwasher-safe or made of hard maple.
- As much as possible, buy two cutting boards and designate one for raw fish, meats, and poultry.
- Clean the cutting board right after use to prevent food poisoning.
- When using the board, create a safe surface for cutting by placing a damp dishcloth under it to keep it from sliding around.
- While a good set of knives can be costly, the well-made ones can last for years with proper care. Here are some tips on choosing knives and caring for them.
- It isn’t necessary to buy a huge selection of knives. Get an 8-inch, straight-edged knife (to cut most foods) and a 10-inch serrated knife (to cut roasts and thick bread).
- Although you can wash knives using the dishwasher, they last longer if you wash them manually (by hand) using hot water and detergent, and towel dry them immediately. Keep in mind that when you wash sharp tools in the sink, make sure that you place the tip down to avoid handling the blade.
- Avoid using kitchen knives for things other than cooking. It can damage the blade, and it is not safe for you.
- Store the knives out of children’s reach by storing them on a magnet bar or a knife block.
- Knives become dull in the long run. But even if they are dull, they are more likely to cause accidents. Keep them sharp by using sharpening steel.
Safe Cutting Techniques:
- Firmly hold the knife close to the blade for better control. The fingers of the opposite hand (used for holding the food) should be curled under and parallel to the blade to act as a guide. As you make each slice, inch your hand back to avoid cutting yourself.
- To keep a fruit or vegetable (e.g. cucumber or potato) steady while cutting it, slice it half lengthwise first. And then position it cut side down and continue cutting.
Pots and Pans
Choose pots and pans that are made of heavier metal as it distributes heat better. However, note that they are harder to lift when full, especially the larger ones. Here are some kitchen tips:
- To avoid straining your back and upper arm when cooking large amounts of dishes, choose lightweight cookware.
- It’s best to choose a pot that has two generous handles on each side for easier handling.
- When using heavy pots, keep them on front burners. Instead of lifting them, slide them using kitchen mitts to avoid burning your hands.
- The kitchen is an area that has a high risk for injuries from hot pots and boiling water. Thus, it’s best to always make sure that you and your household members (especially children) are safe from such hazards.
Accidents can happen even if you make sure you’ve installed safety precautions around the home. But even so, it is best to be protected from the everyday hazards you face. Make sure that you are covered by the right insurance policy at all times.
Sungate Insurance Agency is an independent agency that specializes in meeting your insurance needs. We offer home insurance policies that will provide you with enough coverage for a reasonable price. Talk to one of our agents today. Call us at (407) 878-7979 or visit us at our office. You may also get a free home insurance quote anytime by clicking here.
|
Lead is a white-bluish shiny element. This element is used in a variety of industrial and human products. Lead and its compounds are frequently discharged into the environment as a result of industrial development and the production of consumer products. Lead is very toxic when inhaled or eaten by humans and animals. Although it is absorbed slowly by the body, constant exposure will allow lead to slowly accumulate in your body. Only a tiny amount can poison and cause devastating effects to your liver, blood and nervous system. Many natural remedies are believed to safely and effectively cleanse the body of lead and its compounds.
Eat cilantro. This herb contains potent essential oils that help flush out lead from your body. It also aids in detoxification and restores normal cellular function. Add plenty of cilantro to your main dishes and consume daily.
Take ascorbic acid (vitamin C) tablets. This vitamin enhances your immune system and can speed up the elimination of lead from your body by mobilizing lead from your tissues. The recommended dosage is two 500-mg capsules once a day.
Eat foods rich in fiber. Fiber quickly binds to lead and helps draw lead out of your body. Foods rich in fiber include red beet roots, oat bran, prunes and figs. Consume these kinds of foods on a daily basis.
Consume milk thistle in capsule form. Your liver is your body's primary organ of detoxification. Milk thistle includes the phytochemical silymarin that supports your liver by flushing out lead and its compounds. Take one 380-mg capsule once daily, preferably with food.
Consume turmeric powder. This East Asian spice includes a powerful substance called curcumin which stimulates your liver cells to eliminate lead and other toxins. Add this potent spice to your main dishes and consume every day.
You can consume all the natural supplements mentioned above at the same time. If you are currently taking prescription medications, consult your physician first before taking herbal supplements.
Consult your physician before embarking on lead detoxification.
|
British scientists have gained new insight into Type 2 diabetes by traveling to an unusual location — high atop Mount Everest.
According to a study published Monday in the journal PLOS One, researchers found long-term exposure to hypoxia — or low oxygen levels in the body — is linked to increased indicators of insulin resistance, a risk factor for diabetes.
Insulin resistance occurs when cells in the body don't respond to the hormone responsible for regulating sugar levels. This could lead to too much sugar in the blood, which could lead to Type 2 diabetes. (ViaMedicom Health Interactive)
The data for the study was collected as part of a trek led by researchers, doctors and nurses who wanted to study how decreased oxygen levels affect bodily functions at extreme altitudes. (Via The Guardian)
The team chose to go to Mount Everest because the high-altitude conditions simulated the critical conditions of ill patients who often suffer from hypoxia at normal altitudes. (Via National Geographic)
The researchers say hypoxia is a common problem affecting patients in intensive care units in the United Kingdom and this research could help improve survival rates.
According to HealthDay, such levels of hypoxia observed in healthy people atop the mountain are normally seen in obese people at sea level. But the researchers say it's often impossible to study those patients because they are so ill.
A doctor involved with the study told Science Daily the research "demonstrates the value of using healthy volunteers in studies carried out at high altitude to patients at sea level. [It] is a fantastic way to test hypotheses that would otherwise be very difficult to explore."
According to Medical News Today, the researchers believe the results of the study could lead to the development of treatments for reducing the progression of diabetes indicators and possibly prevent the disease altogether.
According to the U.S. Centers for Disease Control and Prevention, more than 25 million Americans have diabetes, and about 90 percent of them have been diagnosed with Type 2 diabetes.
|
Information pollution, information overload, and infoglut are some of the most common terms used to describe the “almost infinite abundance” and “surging volume” of information that “floods” and “swamps” us daily (Hemp 2009). Popular media articles appear regularly offering tips and strategies to “cope with,” “conquer,” and even “recover” from information overload (e.g., Harness 2015; Shin 2014; Tattersall 2015). Information Fatigue Syndrome, a term coined in 1996, refers to the stress and exhaustion caused by a constant bombardment of data (Vulliamy 1996). In Data Smog: Surviving the Information Glut, David Shenk (1997) argues that the surplus of information doesn’t enhance our lives, but instead undermines and overwhelms us to the point of anxiety and indecision. According to research conducted by Project Information Literacy researchers, “it turns out that students are poorly trained in college to effectively navigate the internet’s indiscriminate glut of information” (Head and Wihbey 2014, para. 7).
The study presented here emerged from “New Information Technologies,” an undergraduate course in the media and communication department at a small, private, liberal arts college in the northeast United States. The course introduced students to key concepts and tools for thinking critically about new information technology and what it means to live in a digital, global society. Course goals underscored the importance of developing students’ capacities as digitally literate learners and citizens of a global network society. We intentionally articulated course learning goals around both the content area and the practices of digital literacy embedded in course assignments. We asked students to reflectively discover, organize, analyze, create, and share information using digital tools. Our aim was to empower students with the tools and abilities to thrive in the information ecosystem as both consumers and producers, rather than flounder in information overload. We wanted students to experience research as active agents driving the process through their choices and attitudes. With these broad framing objectives in mind, we developed a multiphase research assignment called the Internet Censorship Project.
In this article, we detail our collaborative development of the Internet Censorship Project assignment and discuss a qualitative analysis of the resulting student work. In our analysis, we focus in particular on students’ engagement in and reflection on the research process and their agency and identity therein. Our close look at the assignment and student learning offers an opportunity to consider the possibilities of integrating digital tools and pedagogies to deepen students’ digital literacy in the context of liberal arts education.
Collaborating for Digital Literacy
This course provided ideal opportunities for collaboration between an information literacy librarian and a media and communication professor with shared interests in digital literacy. Our respective disciplines have a common concern for digital literacy, although we often describe and approach the concept in distinct ways. The library and information science field typically uses the term “information literacy,” while media and communication studies uses “media literacy.” The Association of College and Research Libraries (2016) defines information literacy as “the set of integrated abilities encompassing the reflective discovery of information, the understanding of how information is produced and valued, and the use of information in creating new knowledge and participating ethically in communities of learning” (3). Media literacy, as defined by the National Association for Media Literacy Education (2017), is “the ability to access, analyze, evaluate, create and act using all forms of communication. In its simplest terms, media literacy builds upon the foundation of traditional literacy and offers new forms of reading and writing. Media literacy empowers people to be critical thinkers and makers, effective communicators and active citizens.” We find common ground in these definitions and the values they convey, especially in the degree to which both disciplines prioritize critical thinking about and active engagement with information. In this paper, we invoke a shared definition of digital literacy, referring to the practices, abilities, and identities around the uses and production of information in digital forms.
Our respective understandings of digital literacy have evolved through extensive and ongoing collaboration with each other and with students. Our disciplines both recognize that definitions of literacies are shifting in the digital environment. One premise of our work is that digital technologies afford new possibilities for collaboration across disciplines and fields. We believe that digital teaching and learning benefit from, if not require, connecting diverse ways of knowing. Digital learning emphasizes connectivity and so we have designed our teaching approach to model the same.
What matters most here is how these definitions come to bear on framing student learning outcomes in this course and assignment. There were no digital literacy learning outcomes explicitly embedded within the course syllabus prior to this collaboration. Discussions about how and where to integrate digital literacy goals within existing course assignments gave rise to our collaboration. These discussions revealed that while the course aimed to promote critical thinking and analysis of the so-called information age, it did little to intentionally link theory to critical practice in ways that highlighted development of students’ digital literacy habits and abilities. The library’s statement on information literacy, inspired at the time of its creation by an earlier iteration of the Association of College and Research Libraries information literacy definition, offered a welcome starting point and with very little modification was introduced as a course goal (Trexler Library, Muhlenberg College 2010). Among course objectives, the syllabus newly included this statement: “students in this course will have opportunities to develop capacities as information literate learners who can discover, organize, analyze, create and share information.”
Assignment Design and Instructional Approaches
The Internet Censorship Project required students working in pairs or small groups to investigate the state of internet censorship and surveillance in different countries. The project extended across four weeks in the latter half of the semester. Students shared their research findings in culminating in-class presentations. The entire process was designed to encourage students to link their critical theoretical understanding with digital literacy practices. We purposefully integrated digital tools and pedagogies throughout the assignment to help students move beyond only amassing and describing sources to higher order research activities and more advanced digital literacy behaviors and attitudes.
Our first implementation of this assignment in fall 2013 revealed some of the general challenges of asking students to critically engage with information. Students tended to gather large amounts of information and dump it into their work without clear purpose or analysis. Ultimately, this resulted in lackluster project presentations in which students’ facility with the mode of digital presentation (Prezi) was often more impressive than the story being shared. These issues are not unique to this assignment, course, or campus. Many educators have likely seen evidence of students’ struggles with “information dump.” Information dump demonstrates students have collected relevant data, but they are unable to present it logically or think about it critically and analytically. This challenge relates to larger issues with helping students develop and strengthen their research habits and abilities. There is often a wide gap between where students begin and where we want them to arrive with respect to information gathering, evaluation, analysis, and synthesis. They often do not successfully make the leap from one ledge to the other (Head 2013; Head and Eisenberg 2010). Frequently what seems to be missing is students’ engagement with research as a process and their critical reflection on that process.
Among the many personal benefits students gain from research, they “learn tolerance for obstacles faced in the research process, how knowledge is constructed, independence, increased self-confidence, and a readiness for more demanding research” (Lopatto 2010). Participating in the research process also promotes students’ cognitive development, supporting their transition from novice to expert learners. Undergraduate research encourages students to exercise critical judgment and to make meaning of what they are learning. Such experiences help students construct a sense of themselves as researchers, gaining a sense of agency and ownership of the research process. If today’s students are “at sea in a deluge of data” (Head and Wihbey 2014), carefully crafted research assignments can help them acquire the skills and awareness that serve as life rafts and anchors.
This kind of work presents opportunities to promote students’ metacognition, or awareness of and reflection on their thinking and learning (Livingston 1997). A metacognitive mindset can help students identify their research as a process in which they are located and over which they have agency. “Successfully developing a research plan, following it, and adapting to the challenges research presents require reflection on the part of the student about his or her own learning” (Carleton College 2010, para. 5). By reflecting on their steps and thinking, students can perhaps more easily recognize their choices and beliefs, enhance their ability to plan for and guide their learning, as well as adapt in the face of future challenges or new situations (Lovett 2008). “Seeing oneself as capable of making the crossing to a better understanding can be empowering and even exhilarating….The ability to manage transitional states might be, then, a transferrable learning experience, one that involves increasing self-knowledge and confidence” (Fister 2015, 6).
Close review of Internet Censorship Project student learning outcomes in 2013 informed our revisions to the assignment in fall 2014. (See Appendix A for the assignment.) We strengthened the assignment by gearing it more toward process and reflection. Our goal was to better support students as they worked to bridge the gap, from start to finish, in their research knowledge and abilities. This time around, we emphasized steps within the research process and prioritized the development of critical and reflective thinking about information. We did this by redesigning the project phases and intentionally using carefully selected digital tools.
In the first phase, student partners collaborated to select and organize research sources about internet censorship and surveillance in their selected countries. They used a collaborative, cloud-based word processing application (Google Docs) to gather and share information with each other as they discovered it, working both synchronously and asynchronously. Documents started as running lists of sources with links to original content, but were to evolve into meaningfully and logically organized and annotated texts that demonstrated critical thinking about sources. In fall 2014, we dedicated more in-class time modeling for students how documents might evolve beyond mere lists into collaborative space for organizing, summarizing, assessing, and interrogating information.
We also integrated a crucial new element, a photo journal created in WordPress, into the assignment as a metacognitive bridge to support students’ development from information gathering to presentation. We selected WordPress for this activity for a number of reasons. On a practical level, we have a campus installation of WordPress and strong technology support for it. WordPress is easily customizable, extendable, and enables students to work with the various media types we sought to promote with the assignment. Just as importantly, using WordPress aligned with one of the underlying goals of the course to deepen students’ critical reflection of their own digital presence. We wanted them to gain experience working in a widely-adopted open source environment—approximately 25% of all websites that use a content management system run on WordPress (Lanaria 2015)—so that they might compare this platform to their experiences within commercial social media platforms. Overall, WordPress enabled us to provide students with hands-on experience as information producers that developed digital literacy practices that could serve them well beyond this assignment and course.
The photo journal transformed the assignment in important ways and is the focus of our case study. We described its purpose to students in the following way:
The journal is your individual representation of the process as you experience and construct it. The Photo Journal is created in WordPress and includes photos, images, drawings, screenshots, and narrative text and captions that take the viewer behind the scenes of your research process. Think of this as “the making of” your project, uncovering the questions and thinking behind your project, and documents the “what, why, where, and how” of the research you are producing.
Students were required to create a minimum of 10 posts, the first of which asked students to reflect on their ideal research environment. The final post invited students to contemplate their presentation and completion of the project. In between, the remaining eight journal entries were designed to document and reflect on students’ research experiences. We provided optional prompts to kickstart their posts, including the following:
- What do you know about the topic? What do you want to know?
- Why does this source matter?
- How did you get started?
- What led you to this source?
- What questions does the source raise for you?
- How does the source contribute to other knowledge?
- What do you know now? What have you learned?
We constructed the photo journal element to activate for students an attitude of critical engagement and a more reflective, metacognitive mindset (Fluk 2015). In documenting their research processes, the photo journal was intended to surface students’ thinking for both themselves and us as instructors. We wanted to promote their reflection on steps in the research process and, therefore, change and deepen that process. By modeling and scaffolding these behaviors and attitudes through the phases of the assignment, we hoped to move students progressively toward stronger engagement and understanding. Rather than drowning in information overload, we hoped to develop students’ sense of agency to be able to comprehend, communicate about, make meaning of, and reflect on their information consumption and production. By asking students to include images as representations of their research, we further hoped to make the research more visible as a process.
Through our qualitative analysis of students’ photo journals in this case study, we attempt to better understand both the connections students make, as well as where they need help to bridge the gaps in their learning. Our case study explores how we can use digital technologies and digital pedagogy to better foster students’ development as digitally literate researchers.
In this research, we look closely at student learning outcomes aligned with the digital literacy goals of the Internet Censorship Project. Collectively, the 17 students in fall 2014 generated 170 photo journal entries. Our data collection, coding, and analysis were conducted using Dedoose, a cloud-based platform for qualitative and mixed methods research with text, photos, and multimedia. The program enabled us to organize and code a large set of records.
Each journal entry included a narrative update or reflection on students’ research and a related image. While designated a “photo journal,” students’ posts included a considerable amount of text that is central to this study. Our qualitative content analysis concentrated on students’ description of, and reflection on, their research sources and their research steps and behaviors. We also constructed a series of identity codes to indicate those instances where students self-consciously located themselves within their research and reflected on their research as practice.
Analysis of Students’ Journals
Students’ journals varied in depth, detail, and critical engagement. Two types of journals emerged clearly: robust and limited. In robust journals, students exhibited a general thoughtfulness and demonstrated a more expansive engagement with content of sources and process. Limited journals were generally more superficial and formulaic, focused primarily on content of sources rather than process. We assign these categories to help improve our pedagogy in order to advance student learning.
In the following sections, we discuss three major areas that emerged from our qualitative analysis of student journal data:
- Students’ engagement as reflected in project pacing
- Students’ attention to process and content
- Students’ identity and agency as digital learners
Students’ Engagement as Reflected in Project Pacing
The journal project required that students submit a minimum of ten posts over four weeks at a suggested rate of two to three times per week. Past experience has shown us that students often tend to squeeze their work into a limited time frame. Student Q, for example, described his usual work tendencies in his journal:
“Typically when I study, do research, or write papers, I end up waiting until the last minute. This isn’t really a voluntary practice, I just can’t find the motivation to prioritize long term assignments until the deadline begins closing in.”
By requiring students to post consistently, we aimed to push them beyond their typical practices. We structured the experience so that students could aggregate and analyze information incrementally over time in order to develop more effective research habits—both attitudes and practices—and to avert information overload. We anticipated that students who worked steadily would have more opportunities for progressive development and reflection and therefore would engage more deeply and critically with the sources and the issues addressed in the assignment. We anticipated that students who worked inconsistently, by comparison, would be more likely to engage superficially and minimally achieve project learning goals. Our interest in “students’ engagement as reflected in project pacing,” then, refers both to the timing of students’ journal posts and the pace of students’ work on the project overall.
We characterized students’ journal pacing quality as excellent, good, fair, or poor. Excellent pacing described journals with posts spread evenly throughout the project. Good pacing described journals with posts occurring every week of the project, but with some posts closely grouped on consecutive days or even on the same day. Fair pacing denoted journals with some posts closely grouped on consecutive days or the same days and some multi-day or week-long stretches with no posts. Poor pacing referred to journals with posts primarily grouped on just a few consecutive days or the same days and no posts for long stretches of time.
Robust journals were distributed evenly across all four pacing quality categories: two each in poor, fair, good, and excellent. Limited journals, though, were predominantly in the poor pacing category: seven poor, zero fair, one good, and one excellent.
Overall, the pattern we saw in the pacing of students’ journals in part supports our intuition. Students who demonstrated lower engagement with content and less reflection on process—that is, students’ whose journals we categorized as limited—appeared to work inconsistently on the project or in a compressed manner. Yet pacing alone is not enough to ensure students’ success, as we saw in the case of robust journals. Their strength was less tied with pacing quality. Perhaps these journals were robust for other reasons such as the students’ developmental levels, their effective integration of our writing prompts, or intrinsic motivation and interest in the assignment. Many factors, then, surely contribute to students’ learning and success, yet students’ reflections suggest that adequate time and project management are among them. Student B, for example, described the positive impact of the assignment’s structure on the pacing of her work:
“The components of the project, the Google Doc, photo journal, and presentation, seemed to work well together to organize our thoughts and pace the research so we did not save it until the last minute. Even though it was a busy week for me, the way the project was set up was very helpful in facilitating the assignment.
This overall experience has taught me a lot about research and organization. It has also given me valuable experience preparing and speaking in front of a class. This project was due during a particularly busy week for me. I had three large assignments due that week, this included, but I learned to cope with that, take things one step at a time, and I am proud of what we were able to accomplish.”
Student C’s comments illustrate how the expectations of a measured pace in the assignments were a challenge for him, but that they contributed to his effectiveness in research and in preparing for his final presentation:
“By the time I finished the research for my journal entries, I had all the information I needed to prepare for my presentation. It was nice to be able to share some of the interesting things I learned about. Meeting with [name redacted] a few times before we had to present was helpful, and gave us a chance to organize and practice. . . . The biggest challenge of this project was staying on top of all my journal entries. Trying to organize how to space them out in a way that made sense, while trying to balance all my other work, was difficult. I had to be extra careful not to forget about them and leave them all to the last minute.”
Articulating and modeling for students effective strategies for doing research over time can contribute to their success with organizing and processing large amounts of information, and help students to develop and sustain deeper engagement in their learning.
Students’ Attention to Process and Content
Our assignment aimed to foster students’ metacognitive awareness of their research process which contributes to students’ learning and is essential to digital literacy. Unprompted, however, students often struggle to engage at this level of critical self-reflection. In our first attempt with this assignment, they tended to focus only on amassing and describing their sources, essentially information dump. We hoped that students’ journals, then, would provide visible evidence of their research processes in order to better understand and reflect on their steps and their thinking. By bringing the process to the surface, we hoped students’ attention would shift beyond just the what of the sources and toward the why and the how of their sources, choices, and processes for richer critical thinking. Therefore, our analysis of student journals naturally aligned into two major categories: content and process. Content codes were used to identify journal excerpts in which students commented on sources in the following ways: summary, assessment, interpretation, connection with other information or personal experience, judgment, and reinforcement/challenge of preconceived notions.
In their journals, all students summarized sources with some frequency. For some, it was the focus of an entire post. For others, an initial summary was a foundation from which they built more diversified or reflective posts. In limited journals, we saw that students often paired the description or summary with their opinions or judgments. The following excerpt from Student I’s journal illustrates this common combination. He began with a summary of a source and then segued to his beliefs on the matter:
“After The London Riots, Prime Minister David Cameron wanted to censor social media, and ban rioters from communicating on these platforms. However, this did not pan out as well as he thought. So, it was back to the drawing board. In another one of Cameron’s plans, he wanted to censor emails, texts, and phone calls. According to the article, internet service providers would have to install hardware that would give law official real-time access to users emails, text messages, and phone calls. . . .
This also relates to the fact that Cameron still wants social media sites to censor their users. I think that this really impedes on a persons’ freedom of speech. If people are posting things on social media, they are public, therefore, they can be seen by whomever. So for instance, if people were planning violent rallies on Facebook, authority members could see this, and stop it before it happened by sending troops to the spot of the rally. Still, this is a major shot at peoples’ freedom of speech, therefore, I do not think it is necessary to take away a persons’ right to post on social media.”
In robust journals, by contrast, students more often paired summary with meaning making—that is, they interpreted the sources and attempted to make connections between different sources or with personal experience, as in this excerpt from Student H’s journal:
“This article focuses on the government trying to control what is posted on social media sites like Twitter, Facebook and YouTube. November of the last year, the Russian government created a law that would allow them to blog any internet consent they deemed illegal or harmful to minors. The only website to resist was YouTube which is owned by Google. They removed one video that promoted suicide, but wouldn’t remove a video that showed how to make a fake wound, because YouTube declared it was for entertainment purposes.
However, when the Federal service for supervision in telecommunications, information technologies and mass communications in Russia went to Facebook and Twitter, they complied with the bans the government gave them. If they didn’t comply the whole site would have been banned from Russia. This source makes me ask was this law only created to protect minors on the internet? Are there other motives with this new law? Will they ban other content that may be appropriate but not agreeable with the Russian’s views? I want to look into what other sites or content this law has been used to ban. This source definitely gave me insight into more issues of censorship occurring in Russia.”
While judgment and meaning making both require students to interact with sources and insert themselves into the conversation, they require rather different levels of critical thinking and self-awareness. With judgment, as illustrated by Student I above, students took a stand or made a claim, often in ways that promoted or reinforced rather than challenged their assumptions. With meaning making, on the other hand, as illustrated by Student H above, students attempted to interpret, clarify, and probe sources. These are different ways of interacting with information. The latter requires a greater degree of critical awareness and self-reflection on the part of the researcher and, therefore, denotes higher order digital literacy.
Process codes were used to identify journal excerpts in which students described their steps, as well as their metacognitive reflection on those steps. They included searching strategies and behaviors, organization, source selection, information availability, use of assigned digital tools (i.e., Google Docs, WordPress, and Prezi), information needs, next steps, and collaboration with their peers.
In limited journals, students frequently described their research steps. In this excerpt, for example, Student O described transitioning from using Google to library databases in order to locate academic sources:
“After finding several newspaper articles on Google, I started to finally look at the academic journals using the library databases. I was shocked to find that there was not that much information about the internet censorship in Iraq considering it is a big controversy. The few articles that I did find did have a lot of useful information to begin sifting through. Looking at the articles from the database is much different from Google because you can read the abstract to find the significance of the article and if it is worth taking a closer look at. I read through some of the abstracts and found some great information from background to actual laws and regulation. Now that I found out so much more information, I need to read through all of the articles diligently and take notes.”
In robust journals, students described their steps, but many also elaborated on why they took those steps and the questions they raised. In the following example, Student F described her use of library databases to locate scholarly sources, but also reflected on her motivation for doing so, her strategy, and the connections between her past experience and her current research:
“For awhile, the only type of research [name redacted] and I had done was through Google. While this was extremely helpful in gathering information and background facts about the censorship in Russia, we thought it was important to ensure we got some information scholarly sources. Using the Trexler Library website, we searched multiple databases searching for information on cyber censorship in Russia. We used information we found in the articles on Google to get more information into our search.
While I know finding scholarly sources is important, I have not always been the biggest fan of database searches. I always get frustrated when I can’t find sources that match what I am looking for. However, after some research, I found some sources with great information. Although the sources we found on Google were from reputable news sources, sometimes using Internet searches does not always produce the most reliable information. We thought it would be a good idea to get started and use scholarly sources to not only gather new information, but to verify the previous information found.”
The student provided insight not only to her awareness of her information needs, but also how her past research experiences were shaping her current work. She also recognized her ability to overcome obstacles and the intellectual rewards of doing so.
Many students described their steps to organize their sources and their work. In robust journals, some also reflected on the ways their organizational practices helped or hindered their effectiveness in managing information and their project. The examples below illustrate this important contrast.
Excerpt of Student O’s journal illustrating organization:
“I printed out most of the article that [name redacted] and I shared in our google doc of research. I have spent the past few hours reading through all of the articles highlighting key points and writing notes for myself in the margins. The notes have different categories to help me organize the research that I have found such as laws, what’s banned, background, etc. I have found this organization to be very useful so far.”
Excerpt of Student M’s journal illustrating organization plus reflection:
“The most difficult part of this project was definitely the research process—I had trouble with the organization of information. I often go overboard in my research process, gathering more information than I need. Sometimes I go so far in depth that I have trouble keeping things straight in my head (even if these things are written down, it’s hard for me to retrieve the information in my brain because I get jumbled and confused due to the abundance of information). So, although organization was the most difficult, this process helped me find ways to organize information in an efficient and helpful manner.
Keeping things in a Google doc. was a great source for me. By compiling all of my research in one place (the Google doc.) I was inspired to work on the research process every day. I’m not sure why the Google doc. provoked me to work on the research process each day, but color coding my sources and breaking things down into categorizes inspired me to do my work (as corny as that sounds). I think part of the reason for this was because the research process felt less daunting when I worked on it a little bit at a time. By creating categories for myself, and working from the question posed in our rubric for the project, I was more able to deconstruct the process. Rather than spending 4 hours research in the library every week, I spent 30-40 minutes researching every day. This was a much better process for me than what I am usually used to doing. Also, I think there may be a chance that since the Google doc. was online, over time I logged onto my e-mail or Facebook I thought of the Google doc. (and it was in my bookmarks bar) which reminded me to work on it.”
Students in robust journals demonstrated more awareness and understanding of their processes. We also saw more evidence of students’ description of and reflection on more inherently metacognitive themes such as identification of their information needs, charting of their next steps, and rationales for the selection of information sources. The excerpts below show the reflection intrinsic in these areas.
Excerpt of Student B’s journal illustrating rationale for selection of information sources:
“I have learned a lot from the research we have done, not only about censorship in Egypt, but also about research in general. It is important to gather information from a variety of sources, and types of sources, to get a full perspective on the issue. We used some informational sources and some current event/popular sources. This allowed us to find out what was happening at the time of the protest and censorship in Egypt as well as the political aspect and how people felt about it.”
Excerpt of Student H’s journal illustrating description of rationale for selection of information sources:
“I’m at the point in my research where I have enough information to satisfy the requirements for this project. I now have to figure out which information is relevant and which is not, what information should go into the presentation? Do we pick information that just covers the surface of all of our research or do we choose to be more specific and go into depth on one topic? I find all the information important and interesting, so how do I pick? I’m going to look at the most reoccurring themes and terms. Organize the content by those subjects and use that in the presentation. My reasoning behind this, is if this the more popular content among different sources than this must be what is more important.”
In limited journals, then, we saw students engaged primarily with specific tools and practices. In robust journals, by contrast, we saw students negotiating the bigger picture of their project. These students reflected on their choices, discussed their place in the project and in the larger information ecosystem, and generally moved toward more analytic thinking. Such awareness and reflection are crucial to digital literacy development.
Students’ Identity and Agency as Digital Learners
When we first implemented this assignment, we noted that students lingered most comfortably in information-seeking mode and struggled with critical analysis and comprehension of the information they were gathering. Recall that our purpose was to integrate and implement digital tools in ways to help students move beyond information-seeking mode to adopt more critical analytic habits and more advanced digital literacy practices. We were especially interested in the possible uses of digital technologies and pedagogies to help demystify research practices for students so that they might identify as researchers. Our goal was to leverage the collaborative, social, and public affordances of digital tools to make research practices more visible. In this iteration, then, we examined journals for instances where students explicitly located themselves within their research and identified themselves as engaged in and driving their research processes. We also included moments where students conveyed their feelings about their research processes—in short, their affective response.
Because we emphasized both the process and product of student research, it was important to pay attention to students’ subjective experiences along the way. We structured the assignment to empower students’ digital literacy practices. As discussed above, students did describe feeling more organized and less overwhelmed with this research project compared to prior experiences. However, we found very little evidence of students overall using their journals to reflect on their identities as researchers. There were little or no differences between robust and limited journals in this category. We did see a difference in students’ remarks concerning their research paths and next steps, though. Students who produced robust journals more often voiced where they were in their research and where they were headed. In this way, they conveyed a sense of self-direction and control over their work.
Students occasionally reflected in their journals about how they were feeling about the research project. This was true in both robust and limited journals. The following excerpts illustrate such instances of affect.
Excerpt of Student M’s journal illustrating description of anxiety:
“I have also included a screenshot of all the tabs I have open on my computer. This is somewhat out of character for me, which is why I thought it would be important to document. Usually, I can’t have more than 4 tabs open at a time or I start to feel disorganized which sometimes makes me anxious. On this particular evening I have so many tabs open they don’t even all show up on the bar itself. These tabs picture the sources I am pulling from while creating my Google doc. The Google doc. is seriously helping me so much—it’s a great organization tool and it’s helping me understand my information in a really efficient way.”
Excerpt of Student A’s journal illustrating description of confidence:
“We were extremely confident and knew that we were talking about.”
Excerpt of Student B’s journal illustrating description of feeling overwhelmed:
“So far, it has been a bit daunting to start finding articles that have good information to use for the project.”
We are wary of conflating students’ affective statements about their research with self-conscious identification as researchers. We do think it is important, though, to note these instances as part of the meaning-making process. The journal provided space for students to give voice to what it feels like to practice research, thereby making public what often remains hidden in undergraduate research.
Research practices are situated in environments, both online and offline. One of the most important choices students make about their research is where it takes place. Our assignment asked students to be attentive to the “spaces” of their research. We asked students to focus on space in the first journal post by reflecting on, describing, and providing photos of their ideal research environments. Our aim was to encourage students to develop awareness that research is situated in contexts and that, to certain degrees, students can make choices that shape where research happens. When students reflect on the place of their research, they locate themselves in place as researchers. There was no difference between robust and limited journals in this category of reflection.
In this excerpt, Student A responds to that initial prompt:
“My ideal place to do research is in my room. It is the only place where I get all of my work done and efficiently at that. I’ll usually play soft music in the background for me to listen to so I don’t get bored while I’m doing my research. I get my work done best when I’m doing it on my own, in my own space, and on my own time. I like to be in control of my environment and if I’m not, I’ll struggle to get my work done. I also like to have a coffee and a water nearby in case I need a drink. When I start my work, I usually have 1 bag of pirates booty or smartpuffs to kickstart my brain and my work. Below is a picture of my desk. Unfortunately, my desk is smaller than it’s been in the past, but it still gets the job done. I’m able to spread out my work as much as I want.”
Beyond the first required prompt about the places where student research happens, we found additional instances where students reflected on the environments of their research. The first post calling students’ attention to place likely helped to train their awareness on this theme later in the project. The following excerpt is from Student M, who paid continuous attention to the contexts of her research throughout the project:
“This has more to do with my working environment right now than my research, but right now as I am doing work my three roommates are in the midst of watching Gilmore Girls (I got their consent to post this picture). I am surprised that I am able to work in this environment, and to be totally honest, I think a lot of the reason is because I do not feel anxious about this information. I know that I still have a lot more research to do and a lot more work on my plate, but rather than finding this overwhelming I am genuinely excited to find a way to put together my information about North Korea so that it makes more sense to me and makes sense to other people.”
Student M’s lack of anxiety stemmed from her ability to control the place and pacing of her research. The excerpt conveys her thoughtfulness about where and when she was doing research. Moreover, it shows her enthusiasm and intention to meaningfully develop her research to benefit her own learning as well as her peers’ learning. Rather than being adrift in a vast sea of information, wading through sources, an awareness of research as situated helps anchor digital literacy practices.
While we understand affect and place as indicators of students’ awareness of themselves as agents within a research activity, there are notably few instances in students’ journals where they explicitly identify themselves as researchers. The following remarks illustrate this infrequent theme.
Excerpt of Student K’s journal illustrating description of feeling like an expert:
“It was also an interesting experience presenting on a topic that no one else in the class had knowledge on besides us, so it made us seem like the experts of subject matter.”
Excerpt of Student P’s journal illustrating description of researcher identity:
“Personally, I try to eliminate all distractions while I’m doing research. Depending upon how pressing the assignment is, I sometimes disable texting and prevent my computer from allowing me to go on Facebook. Ideally, it would be nice to have a private office with a door, but at college, that isn’t really realistic.”
Excerpt of Student Q’s journal illustrating description of connection of research to becoming an informed citizen:
“Researching North Korea’s internet connectivity policies was especially helpful to me in analyzing how our own policies in the USA might parallel. This may help me recognize the consequences of certain laws passed, and ultimately will make me a more informed citizen and voter.”
Beyond research “skills,” our assignment hoped to promote the development of students’ metacognitive awareness of their abilities to effectively engage in research activities using various digital technologies. This includes identifying paths and next steps. When students described their current and future research paths they were locating themselves in the research. Students did not use their journals to explicitly reflect on their development as researchers, but they did frequently identify in detail plans to advance their research. This occurred more frequently in robust than limited journals.
Excerpt of Student H’s journal illustrating description of next steps:
“This time difference has me questioning the relevance of this source and how to related it to my more current sources. Although it is helpful to understanding the background of Russian Internet, I find some of the information contradicting to the current information I have found. From here I think I need to look into more sources about classifications and see if there are more recent publications on this subject.”
Excerpt of Student Q’s journal illustrating description of next steps:
“From here, I think I would like to find out the exact specifics on the restriction imparted on North Koreans in regards to the internet, and look into exactly what the distinctions are between internet users and non-internet users in North Korea (whether it is determined by class, political position, or both). Furthermore, I want to investigate how these restrictions might impact foreigners visiting the country, and how the internet restrictions may also be stemming any information leaks coming from North Korea.”
In these posts, and others like them, students conveyed awareness of where they were in their research processes. They commented on the value and limits of their current searches and sources. They suggested what they needed to do or find next to advance their projects. Often in these posts, they articulated next steps in response to a particular limit or gap in knowledge that they had identified. Such reflection indicates to us an awareness of research as an iterative process, where a student can connect their current information seeking and analysis to their future activities.
Application to Practice
Our analysis guided us to make further assignment revisions for fall 2015. (See Appendix B for the revised assignment.) First, it was clear from our analysis that there was opportunity for us to increase the transparency of the project goals and purposes. We were more intentional in articulating these goals both in the written instructions and in our class discussion of the assignment and its elements. We spoke with students about the value of metacognition and our attempt to direct and focus their awareness in the research process. Second, we recognized that students who used the guiding questions were able to dig deeper and demonstrated stronger learning outcomes. Therefore, not only did we more emphatically urge students to employ the prompts in their journals in fall 2015, we also added new prompts and organized them in two categories (content and process) to better motivate their metacognitive awareness. The table below shows the revised prompts.
|Content (commenting directly on sources)||Process (commenting on your research steps, struggles, goals)|
|Describe the source.||What led you to this source(s)?
How did you get started?
|Why does this source matter?||What questions does the source raise for you about your research process?|
|What questions does the source raise for you about the subject matter?||Where does this source lead you next?|
|How does the source contribute to other knowledge or connect to other information?||How is the environment of your research impacting your work? How are you using digital tools to promote your development as a researcher?|
|What voices or perspectives does the source include? exclude?||Take stock of your progress to date. How does it look to you, from a bird’s eye view?|
Finally, we saw that students who published to their journals inconsistently also demonstrated a lack of engagement with sources and reflection on process. We therefore modified the assignment to make consistent pacing a formal expectation for the project and included it in the evaluation rubric. (See Appendix C for rubrics.) By making this change, we made the benefit of pacing extended research projects more transparent to students. Our future analysis will consider the impact of these changes on student learning outcomes.
The rapid growth of digital technologies and their integration in higher education is spurring conversation about what it means to be literate in the digital age. On a number of liberal arts campuses across the US, educators are asking, what does “the digital” mean for liberal arts education (Thomas 2014)? Some are now speaking of the Digital Liberal Arts (Heil 2014). Our case study contributes to a growing interest in understanding what digital literacies look like and how these abilities and practices can be developed to enhance learning in the liberal arts.
In our work, we saw students grappling with and frustrated by the challenges of information overload online and offline. While information overload may be an issue, it is a well-worn tendency to blame technology for young people’s deficiencies as learners and citizens. As educators, we must design digital pedagogies that create opportunities for students to navigate this complex environment. The digital pedagogies we are developing begin by shifting the locus of agency from technology back to our students, empowering them to manage the multiple contexts of information they traverse in their learning. By integrating digital tools in research projects that foreground pacing, metacognition, and process, we can help students develop their agency and identities as researchers. This agency is central to what it means to practice digital literacy.
|
October 18, 1863 – in Fort Brooke, Tampa, Florida – On October 15th, 2 Union gunboats steamed past Gadsden Point and on the next day moved up to the fort.The 2 gunboats bombarded Fort Brooke with 126 shells on the 16th. That night a landing party under Acting Master T.R. Harris disembarked at Ballast Point with 130 men, adjacent to the head of the bay, and marched 14 miles to the Hillsborough River to capture several steamers. Harris and his men surprised and captured the blockade running steamer Scottish Chief and sloop Kate Dale. The Confederates destroyed the steamer A.B. Noyes to preclude her capture. On its way back to the ship, Harris’s force was surprised by a detachment of the garrison. Despite the naval barrage, the commander of Fort Brooke, Capt. John Wescott, 2nd Florida Battalion, sent out a force that intercepted the Federals as they were about to raid local saltworks and other Confederate manufactories. The federals suffered 50 men killed & wounded and 5 captured.
|
Check out this article about the the Eiffel Tower being turned green. The idea is to paint it green and cover it in plants to promote being environmentally friendly! What do you think about this? Post a comment!
To help us remember some characters we have decided to collage the character to make it look like the word it represents. Here are some of our examples of ‘shui’.
Year 2 have been learning ‘Vive le vent’ the French version of Jingle Bells. We have practiced in various styles, like romantic, country and western, and rock n roll.
They have also been drawing fabulous flashcards for winter words will be scanned in shortly.
|
The Australian Government Interoperability Framework addresses the information, business process and technical dimensions of interoperability. It sets the principles, standards and methodologies that support the delivery of integrated and seamless services.
Interoperability describes the ability to work together to deliver services in a seamless, uniform and efficient manner across multiple organizations and information technology systems. Promoting interoperability between agencies is a key focus to achieving whole-of-government collaboration. Interoperability improves government’s ability to design policies and services to the needs of clients and to derive efficiencies as a result of streamlined interactions both within and across agencies.
To be interoperable, agencies need to actively engage in a process of ensuring that their systems, information and business planning activities are managed to maximize opportunities for exchange with and reuse by others.
To achieve this, agencies need to grapple with diverse issues including:
|
A common misconception is that computers understand code. This is not true. Computers only understand machine code, that is, code that is assembled for the architecture of the computer's processor. Some programs come in both 32-bit and 64-bit versions, and those using a 32-bit operating system cannot run 64-bit programs. Compilers turn the code that the programmer writes into machine code.
|
Most of our actions have costs as well as benefits. Although you know that smoking is bad for your health, do you know all the different types of problems caused by smoking?
Do you know what are your chances of developing various chronic diseases?
Here is a partial list of health problems caused by smoking:
- cancer of the lung, bladder, mouth, voice box, throat, kidney, cervix and bowel; heart attack, circulatory problems, stroke,
- lung disease including chronic obstructive pulmonary disease, emphysema, chronic bronchitis;
- flu, pneumonia, colds,peptic ulcer, Crohn’s disease, tooth loss, gum disease, osteoporosis, sleep problems, cataracts, thyroid disease, and menstrual problems.
- Smoking is also related to infertility, sudden infant death syndrome and infant health problems.
Based on the information you have provided, here are some potential health and budgetary costs to consider about your smoking.
Although it is your choice to smoke, others are affected by these choices. There is a great deal of scientific evidence from all around the world that people exposed to second-hand smoke are more likely to develop and die from heart problems, lung cancer, and breathing problems. Unfortunately, many of the harmful products in smoke are in the form of gas.
Therefore, they cannot be filtered out through ventilation systems or special fans. Because children breathe faster than adults, they are particularly vulnerable. Parents who smoke increase the chances that their children will develop asthma by 200 to 400 per cent. Children exposed to second-hand smoke are also more likely to develop ear infections.
Your decision to smoke may also send a message to your children that it is OK if they start to smoke. Finally, even your pets can be affected by your second-hand smoke. They too are more likely to develop cancer and other health problems. So, if you decide to smoke, please be careful where you smoke.
It is not how many years we live, but what we do with them. Health Service Food and Human Resources: Discount Cigarettes Brands
|
CANINE HIP DYSPLASIA
What is hip dysplasia?
Hip dysplasia is a deformity of the hip joint. This is a ball and socket type of joint in which the head of the femur represents the ball and the pelvis holds the socket. It is a hereditary condition in which the socket does not form properly and is too shallow to hold the ball. The result of this poor fit is a loose joint that is unstable. The instability leads to flattening of the femoral head (the ball) and destruction of the acetabulum (the socket). Eventually the joint begins to degenerate and becomes arthritic.
Can any dog get hip dysplasia?
The condition can occur in any breed. The incidence is higher in the larger breeds. The cause may be a combination of genetic, environmental, and nutritional factors. It may be inherited from either or both parents. It affects males and females equally.
How do I know if my dog has hip dysplasia?
An accurate diagnosis of hip dysplasia can be made by your veterinarian. Signs of hip dysplasia usually occur between 4 and 12 months of age. Some pets do not show signs until they are several years old. Dogs with hip dysplasia display general signs of pain in the hindquarters. They are reluctant to walk or run. They may have difficulty lying down or getting up. Some are reluctant to go up stairs or jump. These dogs are usually lame in one or both hind limbs.
How does a veterinarian know if a dog has hip dysplasia?
Your veterinarian will check for signs of muscle atrophy over the pelvis and hindquarters. The examiner will also check to see if the hip feels loose. The diagnosis is usually confirmed by taking x-rays. To take an x-ray the animal needs to lie perfectly still on its back with the legs extended. This is an uncomfortable and unnatural position and usually is best done with the pet under anesthesia.
Can hip dysplasia be treated?
Yes, based on the results of the examination and x-rays your veterinarian can choose among several treatment options. The goal of treatment is to relieve pain, improve function and reduce the chance of further deterioration of the hip joints. Conservative medical treatment includes; weight reduction; exercise restriction; anti-inflamatories and pain relievers. Sometimes surgery is necessary. In one procedure, called an excision arthroplasty, the head of the femur is removed. This allows a false joint to form. Total hip replacement surgery is also available for dogs. In this procedure the femoral head (ball) and the acetabulum (socket) are replaced with a synthetic joint. There are also surgical procedures that may prevent hip dysplasia from developing in young dogs that are predisposed to the condition. In another procedure the acetabulum (socket) is surgically repositioned to prevent instability. In a third procedure certain muscles are cut to try to prevent future hip problems.
Can hip dysplasia be prevented?
If a dog is genetically destined to have hip dysplasia, there is little that can be done to prevent it. Borderline cases may respond to changes in nutrition. By restricting food intake, and feeding a diet designed for large fast growing dogs you may be able to decrease the chance of your dog developing hip dysplasia. Your veterinarian can help you select a diet that is best for your pet. The most effective method of preventing hip dysplasia is to carefully select which dogs are bred. Both the mother and father should be x-rayed at two years of age and their hips evaluated for signs of dysplasia. Only dogs with a rating of good or excellent should be bred. When choosing a puppy, if you select a breed that is prone to hip dysplasia ask if the mother and father have had this done. If it has not, you may want to reconsider if the puppy will be right for you.
Brightwood Animal Hospital serves Mentor, Concord, Painesville and the surrounding communities.
|
It won’t take long for sea levels to rise by at least six meters. According to a recent study on the matter, governments have to significantly increase their efforts of curbing global warming; otherwise the world’s coasts – from Florida to Bangladesh – will be swamped.
Twenty feet – the approximate equivalent of 6 meters – in sea level rise might not sound like much. However, scientists fear that there’s no going back in this matter, and that whatever the decisions will be in December’s climate summit in Paris, sea levels will continue to rise.
The current study has studied changes in global sea levels and came up with a framework using those changes in order to gain a better understanding of what the future looks like for coastal communities around the world. Analysis showed that the sea has risen with 8 inches since the industrial era has boomed.
Climate Change estimates that, should this rate be sustained, 26 major cities in the U.S. would face flooding crises by 2050. Same projections paint a really dark picture for the costs of the damage caused globally by this situation.
Trillions of dollars are expected to be spent on salvaging the 150 million people who are now occupying land that is predicted to be exposed to frequent flooding or completely submerged by 2100.
Lead study author Andrea Dutton of the University of Florida said that ice sheets seem to disagree with the present climate and the direction it has taken. She also fears that even though governments are developing ways to reduce greenhouse gas emissions, it won’t be enough to stop the thawing and the increased sea levels.
The current goal set by the United Nations for countries who contribute with the most greenhouse gas emissions is lowering temperatures so they are only 2 degrees Celsius warmer than those before the Industrial Age.
But that is still a pipe dream, which might not be enough to keep the massive ice shelves – the doorstops of Antarctica – on land and not contributing to sea levels, which have been gradually intensifying since the 1990s.
Sea-level rise expert Anders Levermann of the Potsdam Institute for Climate Impact Research, who has also authored a study on the matter, said the current research is consistent with what has been recorded in the past.
However, the six-meter rise in sea levels might take another several centuries before happening, in spite of some scientists considering historic evidence pointing to extra speedy shifts. The biggest challenge right now is dealing with the rising levels of carbon dioxide, which is uncharted territory.
Image Source: Ice Shelf
|
The water from the faucet is full of chlorine, and usually with chloramine, a toxic gas that is a popular disinfectant.
The water we drink should not contain more than 4 mg. of chlorine in 1 liter of water, but, unfortunately, it goes over the limit more often than it is under the limit.
It is desirable to examine the water we drink, and you can easily do that with a Tester (test strip) which tests water’s quality and quantity of chlorine.
Chlorinated water consumption increases the risk of cancer of the bladder, increased cholesterol levels, it also causes asthma and allergy. It is also, bad for the skin, eyes and respiratory tract.
Many health organizations advise, to clean your water from chlorine whenever you can.
How to remove the chlorine?
The simplest way is to put at least a few drops of lemon juice every time you drink water in the cup, because vitamin “C” purifies water.
Quite simply, the water can be purified with tablets of vitamin “C”. Usually the advised ratio is 1 mg. of vitamin for 1 liter of water, but you can add more, it depends of the amount of chlorine in the water.
The water can be cleansed also with water filters which are mounted on the faucets. Also, the chlorine can be removed if you leave a water container open, so the chlorine is transformed into a gaseous state and evaporates. However, to evaporate completely it takes about 2 – 3 days.
The chlorine can be removed with boiling the water. You should boil the water for 15 minutes.
|
EIRLSBN: Twenty years of achievements in rice breeding
Eastern India is an area with a largely agrarian society and high poverty incidence. Rice is the dominant crop, but yields are low. Most of the rice is grown under rainfed conditions in which rainfall is highly unpredictable, and numerous abiotic and biotic stresses occur in combination during all growing seasons. Farmers have limited access to inputs such as fertilizer and good-quality seed. Despite these challenges, a progressive increase in rice production must be maintained, especially within the vast rainfed areas, if India and other Asian countries are to achieve food security.
Considerable progress has been made in developing new rice varieties for eastern India, although the literature on this topic is limited. Evidence for this is the development and release of many new improved varieties. At least 20 of these varieties have been released within the Eastern India Rainfed Lowland Shuttle Breeding Network (EIRLSBN). In addition to producing new varieties, this network has conducted considerable research on many high-priority traits and has identified new donor parents, key maturity groups for the region, elite lines that can be transplanted at normal or delayed times, and target variety profiles for eastern India. More importantly, the network has been an exemplary model for synergistic rice breeding partnerships. It demonstrates the benefits of regional and international scientific collaboration for working to overcome food insecurity. Indeed, it has influenced the formation and structure of many other breeding networks.
|
here ya go...
If you were to stand directly behind or in front of one of your tires to view its vertical angle, you would be looking at its camber. Actually, camber is most often set between 0 and -2 degrees, so you'd be hard pressed to see any lean at all. Negative camber refers to a wheel that is leaning inward with its top closer to the vehicle than its bottom. Positive camber, surprise-surprise, is the opposite, and means that a wheel leans out with its top further from the vehicle than its bottom. Many of the original Volkswagen Beetles had noticeable negative camber in the rear tires which made them look like they were squatting all of the time. A slight amount of negative camber setting is desirable because as a vehicle turns the outside wheels get pushed into a more positive camber state. This results in a camber of zero, or a straight up-and-down wheel, while cornering, which provides the largest contact patch and the greatest traction for handling.
<img src='http://memimage.cardomain.com/member_images/12/web/288000-288999/288398_40.jpg' border='0' alt='user posted image' />
|
This is the first prototype which achieved vertical take-off on 21st October, 1960. The P 1127 developed into the Harrier Jump Jet, the world's first operational vertical take-off and landing (VTOL) jet fighter. This photograph shows the nozzles used to vector thrust. Seen in downwards (hover) position.
© Science Museum / Science & Society Picture Library
|
It is normal to shed some hair each day as part of this cycle. However, some people may experience excessive hair loss.
A number of things can cause excessive hair loss:
1. After having an illness or a major surgery, you may suddenly lose a large amount of hair, this hair loss is related to the stress of the illness and is temporary.
2. If your thyroid gland is overactive or underactive, your hair may fall out. This hair loss usually can be helped by treatment of thyroid disease.
3. Hair loss may occur if male or female hormones, known as androgens and estrogens, are out of balance, correcting the imbalance may help stop hair loss.
4. You can have increased hair loss during pregnancy. High levels of certain hormones in pregnancy cause the body to keep hair that would normally fall out and when the hormones return to pre-pregnancy levels, that hair falls out and the normal cycle of growth and loss starts again.
5. Medicines that can cause hair loss include blood thinners, medicines used for gout, high blood pressure or heart problems, vitamin A (if too much is taken), birth control pills and antidepressants.
6. Fungal infections of the scalp can cause hair loss, this can be treated with antifungal medications.
7. Hair loss may occur as part of an underlying disease, such as lupus or diabetes. Blood testing can be done to evaluate for these diseases.
8. If you wear pigtails, tight ponytails, braids, or use tight hair rollers, the pull on your hair can cause a type of hair loss called traction alopecia. If the pulling is stopped before scarring of the scalp develops, your hair will grow back normally. However, scarring can cause permanent hair loss.
9. Hot oil hair treatments or chemicals used in perms or hair straightening may cause inflammation of the hair follicle, which can result in scarring and hair loss.
10. "Common baldness" or male-pattern baldness, also called androgenetic alopecia is the most common cause of hair loss in men. Men who have this type of hair loss usually have inherited the trait. This hair loss typically results in a receding hair line and baldness on the top of the head. Women may develop female-pattern baldness, in this form of hair loss, the hair can become thin over the entire scalp. One medicine, minoxidil or Rogaine, is available without a prescription, it is applied to the scalp. Both men and women can use it. Another medicine, finasteride, is available with a prescription. It comes in pills and is only for men.
If you are experiencing symptoms of hair loss, see your physician for an evaluation.
|
New research on residents of two counties in southeastern Kentucky show the area’s attitude about the environment has changed since the recession. Researchers with the Carsey Institute at the University of New Hampshire surveyed residents in Harlan and Letcher counties in 2007, then returned this year to see whether and how beliefs have changed.
Jessica Ulrich is a doctoral student in sociology at the University of New Hampshire and the author of the report. She says one of the most striking differences between the two sets of data is the changing attitude toward the environment—in 2007, only 17 percent thought that laws restricting development were bad for the community. By 2011, that number had nearly doubled to 33 percent.
“What we’re seeing is that people are becoming less supportive of regulations that protect the natural environment,” she said. “I believe this is tied to the fact that people are looking for ways to create new jobs and zoning laws or regulations are seen as preventing new jobs from being created.”
There was also an increase of 15 percentage points—from 37 to 52 percent—among those who thought resources should be used to create jobs, rather than conserved for future generations.
The Carsey Institute is conducting similar research in rural communities across the country, but Harlan and Letcher counties are the only communities in Appalachia to be surveyed.
|
A new report from Public Agenda urges education leaders to engage communities as a way to help transform persistently failing schools. The report is compiled out of the best outreach practices from various education, communications and engagement experts, with differing views on school reform.
40 percent of U.S. students are taught in districts that come under the Department of Education’s remit for needing improvement.
‘What’s Trust Got to Do With It? A Communications and Engagement Guide for School Leaders Tackling the Problem of Persistently Failing Schools’ is a new report by Public Agenda, and offers eight steps to help leaders communicate with and engage communities facing school reform.
These steps are set out to help build community support for school reform, composed in light of interviews and consultations with education practitioners, policy experts, community leaders and communications and engagement professionals across the country.
The steps are:
- Lay the groundwork: Talk with parents, students, teachers and community leaders early and often.
- Have a vision: Help the community envision exactly what it will look like when better school conditions are in place, and why those conditions are necessary.
- Invite the community to help shape the vision: Share with parents and the general public, ensuring that the school turnaround will take root and become sustainable.
- Provide information—not too little and not too much: Give audiences enough information to be able to understand but not too much to overwhelm them.
- Remember to tell stories: Recall anecdotes of other schools, parents, teachers and students who have successfully undergone similar transitions, helping people understand and envision possible courses and what to expect.
- Avoid the “public hearing” format—or at least don’t rely on it as your sole communication vehicle: Smaller, informal discussions with parents, teachers and students in the school on a regular basis are much more effective at building respect and trust.
- Communicate through trusted sources: Recognize that parents and teachers often want to hear from additional voices.
- Don’t surprise people—and don’t mangle the communications basics: Ensure the basics are clear, prominent and establish that they are fully understood in the discussions.
“Leaders facing a decision on what to do with a persistently failing school often see only two choices: back away from reform to mollify the community, or push through reform, leaving alienation and distrust in the communities. Both of these options are undesirable,” said Jean Johnson, Executive Vice President of Public Agenda and Director of its Education Insights.
“There is a third option for leaders: effective public and parent communication and engagement before decisions are made. Leaders should avoid approaching the community with a preordained decision. Rather they should invite the community to help shape a vision for the future.”
|
Violinist Joshua Bell performing in a subway station.
Tags: art/music, class, goffman, methodology/statistics, theory, defining the situation, pierre bourdieu, social experiment, taste, subtitles/CC, 00 to 05 mins
Summary: This video footage depicts a young man playing a violin in a Washington, DC Metro station during the heart of the morning rush hour. Unbeknownst to passersby, the musician is the world renowned Joshua Bell, playing one of the most difficult pieces ever written, on a violin worth $3.5 million dollars. In total, Bell played for about 45 minutes to about 1,100 people moving through the station. During this time, only a handful stopped to listen; he collected $32. Organized by the Washington Post, this social experiment was designed to broach questions around perception, beauty, and priorities; however, it can also be used to teach sociological concepts, such as Erving Goffman's theory of defining the situation and Pierre Bourdieu's theory of taste. Goffman argues that when individuals encounter one another, they (consciously or not) seek out information about the other so as to define the nature of the interaction. Morning commuters use the information around them to define the interaction between themselves and the violinist, including the fact that the musician is playing in a subway station, wearing everyday street clothes, standing beside an open violin case occupied by loose bills and change. Despite Bell's talent and professional status, given this information, the majority of commuters define the situation as an amateur musician playing for money, and they ignore him. Had the situation been defined with a sign that identified the world famous violinist playing an impromptu public concert, presumably more commuters would have stopped to listen. This latter point also speaks to Bourdieu's theory of taste, in which Bourdieu rejects a pure or genuine conception of aesthetics and instead argues that "good taste" is simply a reflection of the taste of the ruling class, demarcated by ruling class signifiers. Given that Bell is in a non-elite space, wearing non-elite clothing, playing for a non-elite audience, commuters are unable to recognize the highly skilled nature of the art. This demonstrates how good taste can be understood as a social (and Bourdieu would say classed) phenomenon, rather than an objective truth. This clip is one of several featured on The Sociological Cinema that illustrates social experiments, including experiments on racial bias, the Milgram experiment, and breaching experiments at Grand Central Station and on a college campus.
Submitted By: Valerie Chepp
Got any videos?
Are you finding useful videos for your classes? Do you have good videos you use in your own classes? Please consider submitting your videos here and helping us build our database!
|
The Patient Protection and Affordable Care Act, commonly known as the Affordable Care Act (ACA), is a law that puts in place comprehensive health insurance reforms that will be implemented in stages over a multi-year period. The purpose of the law is to provide quality, affordable health care for all Americans. It will allow individuals, families, and small businesses to choose insurance coverage in an open, competitive insurance market. The Act also requires insurance companies to provide more coverage, reduce costs, and provide healthcare to those individuals previously disqualified.
2010: A new Patient's Bill of Rights goes into effect. Cost-free preventative services begin for many Americans.
2011: People with Medicare can get key preventive services for free and receive a 50% discount on brand name drugs that fall in the Medicare Part D coverage gap (Donut Hole).
2013: Open enrollment in the Health Insurance Marketplace begins on October 1st.
2014: Insurance plans are prohibited from discriminating due to pre-existing conditions or gender, annual limits on insurance coverage are eliminated , tax credits for middle and lower income people go into effect, Medicaid will be available to a larger population.
2015: Physicians will be paid based on quality of care rather than the number of patients that are treated.
|
A new mobile app developed at the University of Washington does the opposite. The Trace app turns a digital sketch that you draw on your smartphone screen -- a heart, maple leaf, raindrop, sailboat -- into a walking route that you can send to a friend or loved one. The recipient of the "gift" tells the app how long they want the walk to last and receives step-by-step directions that eventually reveal the hidden shape on a map.
The sender can also include audio recordings, images, inside jokes or other messages that pop up at specified locations along the route to give the recipient hints. The free app, available from Google and iTunes, was designed by UW Human Centered Design and Engineering researchers to explore how GIS mapping technology shapes how we experience the simple act of walking. Trace aims to encourage communication and reflection, rather than focusing on competition or efficiency.
"For some people it was a delight to find that slowing down allowed them to meet new people or see familiar sites in their neighborhood in new ways, but at the same time giving up that control was a stress for other folks who had a routine, " said project lead Daniela Rosner, assistant professor of Human Centered Design and Engineering and co-director of the UW's TAT Lab.
Activity tracking apps like FitBit help people reach exercise goals, and routing apps like Google Maps are optimized to send people on the most efficient route to a particular destination. Trace, by contrast, forces walkers to relinquish control, go where the app directs them and in some cases experience traveling through a city quite differently than they're used to.
In a study presented last month in Seoul at the Association for Computing Machinery's CHI conference for computer-human interaction, 16 avid walkers in Seattle, Boston and Chicago who used Trace for a week tested more than 150 shapes. Some participants -- who included a dog walker, an artist, a Massachusetts Bay Transportation Authority employee and a lawyer who works on rights to public space -- sent routes to friends while others simply used the app to draw walks for themselves.
In one instance, a woman who met her boyfriend at a French cultural center in Boston sent him a walk that traced the outline of the United States, the country that brought them together. Along the way, she included hints to the mystery pattern, like "The Star-Spangled Banner." The two walked the route together in downtown Boston on a Sunday afternoon.
Unlike other apps that allow you to share a fixed route that you may have already run or biked, Trace allows a person to begin walking the route from any point in the city. The walker can also make the shape bigger or smaller by specifying how long the walk should last.
Some people found that using Trace introduced a different pace into their daily routines. One found himself in neighborhoods that he usually biked or ran through, but rarely walked. Others discovered new paths to local parks in their neighborhoods, or found time to engage with kids and neighbors as they paused to wait for the next direction. Rediscovering features that they often overlooked in their everyday environments invited unexpected surprises.
On the other hand, participants also found Trace to be deeply disruptive to familiar routines. It forced them to walk without having a clear sense of where they were going, and some shapes forced them to walk up and down the same street more than once, all of which felt disturbingly inefficient.
"We've sort of lost interest in exploring the same path two different ways, even though you can retrace your steps and have a different experience," Rosner said. "That deep-seated need for efficiency says something about what we expect from our tools and what maybe our tools have enabled us to expect."
In other instances, Trace routed people into neighborhoods that they perceived as unsafe or that made them feel uncomfortable. Those were among the times that people abandoned their walks. As some GIS routing apps have begun to experiment with using crime data to steer people away from certain neighborhoods, those algorithms raise questions about what becomes a discriminatory act, Rosner said.
"Our goal for this research wasn't necessarily to produce the next new app for walking, though we hope people will use and enjoy it," Rosner said. "It was to use the tool to start asking questions about what we expect from our GIS routing tools and about the role that technology can play in our walks."
Co-authors are UW master's students Hidekazu Saegusa and Allison Chambliss and recent graduate Jeremy Friedland.
The research was funded by Intel.
Welcome to SUV System Ltd!
SUV System Ltd is ISO 90012008 Certified electronics distributor with 10 years of experiences.
We have built up long term business relationship with about many companies which are stockers and authorized agents. we have a steady and reliable supply to meet customer's demands to the greatest extent .Confidently, we are able to lower your cost and support your business with our years of professional service.
SUV System Ltd is Electronic Components Distributor Supplies,Find Quality Electronic Components Supplies Products IC(Integrated Circuits),Connectors,Capacitor,Resistors,Diodes,Transistors,LED at Suvsystem.com. Sourcing Other Energy, Environment, Excess Inventory Products from Manufacturers and Suppliers at Suvsystem.com
SUV System Ltd insists on the managing faith ofsincereness,speciality,foresight, win-win,so we build up stable-relationship customers located all over the world, including the States, Europe, Argentina, UAE, Malaysia, Australia,and India etc
we are focus on the following fields,and hope we can help you.
Rectifier Diodes SANYO IC VISHAY IC ST Diodes IC(Integrated Circuits) Thin Film Resistors Transistors Freescale Chip Fuses Current Sensors Resistors INTERSIL IC Industrial IC Ligitek LED Schottky Diodes IDT IC ROHM Resistors FAIRCHILD diodes PANASONIC YAGEO Resistors NS IC Xilinx IC Fast Recovery Diodes TOSHIBA Transistors Thick Film Resistors Capacitor Kingbrigt LED Infineon Technologies Transistors Atmel IC Connectors Chip Inductors Military IC ALTERA IC NXP Transistors Civil IC MAXIM IC LITTELFUSE Diodes LED part Renesas parts IC INFLNEON Diodes Diodes LINEAR IC
|
HYDROGEN – The dawn of a heating revolution?
25th Oct 2016
The chemical element Hydrogen is the most common element in the periodic table and sci-entists estimate that it makes up 75% of the mass of the entire universe. The name hydrogen comes from the Greek name for water, because it only produces water when it is burned. Hydrogen may be easily found on other planets but here on earth it is bonded to other elements, such as oxygen, which then forms H20- water. Hydrogen gas is colourless, odourless, tasteless and non-toxic. Hydrogen gas was first produced artificially way back in the 16th century.
That’s the science lesson over. So why am I talking about Hydrogen, how does it relate to the heating industry?
We all know that we need to reduce the UK’s carbon emissions and to do so we must decarbonise heat, it’s tricky but necessary if we are to meet our climate change obligations. In our quest to reduce carbon, alternative fuel sources are being explored. Hydrogen- a ‘green gas’ is one of those alternative sources.
The gas grid currently delivers gas into the homes of over 85% of the UK population and there is little appetite to simply abandon gas and start again with a new system, not to mention the enormous costs involved.
UK Government has recognised the potential contribution of “green gas” in helping the UK meet its renewable energy targets. As a consequence considerable resources are being spent on ensuring better and more efficient delivery of gas, particularly in the Research and Development of biogas. Very recently however hydrogen has come to the fore. The Leeds H21 project is an exciting study where the city of Leeds would be changed over from natural gas to hydrogen, with the hydrogen made on Teesside, and the resulting carbon dioxide buried deep under the North Sea. This hydrogen could provide both heat and transport.
So is hydrogen the future fuel for the heating industry?
The automotive industry now has several hydrogen models on the market but a hydrogen car isn’t powered by an internal combustion engine in the same way that your current car is powered by petrol or diesel. A hydrogen car is basically an electric vehicle but instead of using power stored in batteries to run its electric motors, it generates its own electricity on the move. In effect this is a car that has the engine replaced by a fuel cell (a mini power station) that mixes the stored hydrogen from the fuel tank, with oxygen from the air to generate electricity. This is then used by the electric motors to make the car move.
Advancements in the heating sector may not have been as exciting as those made in the automotive industry but the prospect of replacing traditional combustion of fuel with hydrogen may just start to raise the pulse of the heating engineer. This prospect could become a reality using similar technology as the automotive industry-fuel cells, a device that converts the chemical energy from a fuel into electricity through this chemical reaction with oxygen or another oxidizing agent.
What is a fuel cell?
Fuel cells were first created in 1839 by William Grove. Grove was a British physicist, who discovered that four large cells, each containing hydrogen and oxygen, could produce electricity. NASA used fuel cells in the 1960’s to provide power during its space flights. It was essential for space travel to use a system that did not emit pollution so fuel cells were an ideal solution. As a result of NASA’s successful use of the fuel cell, private industry began to recognise its commercial potential.
A fuel cell is an electrochemical energy conversion device. The other electrochemical device that we are all familiar with is the battery. A battery has all of its chemicals stored inside, and it converts those chemicals into electricity too. This means that a battery eventually "goes dead" and you either throw it away or recharge it.
With a fuel cell, chemicals constantly flow into the cell so it never goes dead -- as long as there is a flow of chemicals into the cell, the electricity flows out of the cell.
There are many fuel cell types, but the principal ones are the proton exchange membrane (PEM) fuel cell, and solid oxide fuel cell (SOFC).
PEM fuel cells operate at relatively low temperatures, have high power density, and can vary output quickly to meet shifts in power demand. PEMs are well-suited to power applications where quick start up is required, such as cars or forklifts. They are ideally suited to using hydrogen. These offer the opportunity of a rapid response power station in every house.
SOFC fuel cells operate at very high temperatures, have high electrical efficiency, and have been used in to large stationary applications such as office buildings and retail stores. Interestingly they can also burn natural gas.
How are they fuelled?
Fuel cells need hydrogen as a feedstock, how can we supply the hydrogen? Well, as said above , in the long term the hydrogen supply to either the heat or automotive sector should be low carbon, but in the meantime some manufacturers are doing this locally as part of a fuel cell generator.
The opportunity for use of fuel cells in the residential market is via high performance micro combined heat and power units (microCHP’s). These produce both heat and electricity.
Fuelling the future
In the longer term we envisage hydrogen being produced on a larger scale either through natural gas reforming, or by renewable processes, and then distributed to our homes in place of natural gas.
The question is how much hydrogen can be used and in what manner? It is possible, within existing gas quality guidelines, to mix up to 2 per cent of hydrogen into the blend that flows through the gas grid. Some studies suggest that up to 20 per cent might be feasible – remember this makes the overall mix of gas “greener”. However, the Northern Gas Networks feasibility study is assessing 100 per cent hydrogen through the gas grid. Their Leeds 21 study is arousing considerable interest within the industry on the basis that it envisages using the existing gas grid, conventional heating systems such as central heating in the home saving about ¾ of the overall carbon emissions. It was launched on the 11th July 2016, and suggests a detailed route map of how to save approaching 1m tonnes per year of CO2 . A recent study for DECC has shown real enthusiasm by UK appliance manufacturers for the potential offered by hydrogen. The next few years should be exciting for the gas industry.
25th Oct 2016
25th Oct 2016
25th Oct 2016
25th Oct 2016
25th Oct 2016
|
THE ANEMOI THUELLAI were the spirits (daimones) of the violent storm-winds, sons of the monstrous hurricane-giant Typhoeus. They were kept locked away inside the floating island of Aiolos (Aeolus) and released at the command of the gods to wreak their havoc.
Their female counterparts were the Harpyiai (Harpies) (also known as the Aellai and Thuellai).
The storm-winds were often conflated with the gentler Anemoi of the four directional winds--Boreas (the North Wind), Notos (the South-Wind) and Zephyros (the West-Wind) and Euros (the East-Wind).
TYPHEOUS (Hesiod Theogony 869)
CLASSICAL LITERATURE QUOTES
BIRTH OF THE STORM-WINDS
Hesiod, Theogony 869 ff (trans. Evelyn-White) (Greek epic C8th or 7th B.C.) :
"Zeus in tumult of anger cast [the storm-giant] Typhoeus into broad Tartaros (Tartarus). And from Typhoeus come boisterous Winds (Anemoi) which blow damply, except Notos (South Wind) and Boreas (North Wind) and clear Zephyros (West Wind). These are a god-sent kind, and a great blessing to men; but the others blow fitfully upon the seas. Some rush upon the misty sea and work great havoc among men with their evil, raging blasts; for varying with the season they blow, scattering ships and destroying sailors. And men who meet these upon the sea have no help against the mischief. Others again over the boundless, flowering earth spoil the fair fields of men who dwell below, filling them with dust and cruel uproar."
AEOLUS MASTER OF THE STORM-WINDS
Homer, Odyssey 10. 1 ff (trans. Shewring) (Greek epic C8th B.C.) :
"We [Odysseus and his men] came to the Nesos Aiolios (Aeolian island); here lived Aiolos (Aeolus), son of Hippotas; the deathless gods counted him their friend. His island is a floating one; all round it there is a wall of bronze, unbreakable, and rock rises sheer above it . . . He gave me a bag made from the hide of a full-grown ox of his, and in the bag he had penned up every Anemos (Wind) that blows whatever its course might be; because Kronion (Cronion) [Zeus] had made him warden of all the Anemoi (Winds), to bid each of them rise or fall at his own pleasure . . .
[On the return voyage.] The men [Odysseus' crew] talked among themselves [about the contents of the bag], and the counsels of folly were what prevailed. They undid the bag, the Anemoi (Winds) rushed out all together, and in a moment a tempest (thuella) had seized my crew and was driving them--now all in tears--back to the open sea and away from home.
I myself [Odysseus] awoke, and wondered if now I should throw myself overboard and be drowned in ocean or if I should bear it all in silence and stay among the living. I did bear it and did remain, but covered my face as I lay on deck. My own ship and the others with it were carried back by raging storm (anemos thuella) to the Nesos Aioloios (Island of Aeolus), amid the groaning of all my company."
Pseudo-Apollodorus, Bibliotheca E7. 10 (trans. Aldrich) (Greek mythographer C2nd A.D.) :
"Odysseus went on to the island of Aiolia (Aeolia), of which Aiolos (Aeolus) was king. Zeus had set him up as coordinator of the Anemoi (Winds), for both stopping them and stirring them up. After playing host to Odysseus, he gave him an ox-skin, in which he had tied up the Anemoi (Winds). He explained which Winds would be needed for sailing, and fastened the skin securely in the ship. So Odysseus, by using the correct Winds, had a good voyage, but as they drew near enough to Ithaka (Ithaca) to see the smoke rising from the polis, he fell asleep. His comrades, in the belief that he carried gold in the skin, opened it and let the winds escape. Back again they went, captured by the Winds."
Apollonius Rhodius, Argonautica 4. 819 ff (trans. Rieu) (Greek epic C3rd B.C.) :
"Aiolos (Aeolus) will hold his gusty winds in check, letting none but soft Zephyros (the West Wind) blow till Argo reaches a Phaiakian (Phaeacian) port."
Quintus Smyrnaeus, Fall of Troy 14. 467 ff (trans. Way) (Greek epic C4th A.D.) :
"To Aiolia (Aeolia) came she [Iris goddess of the rainbow], isle of caves, of echoing dungeons of mad-raging winds with rugged ribs of mountain overarched, whereby the mansion stands of Aiolos (Aeolus) Hippotas' son. Him found she therewithin with wife and twelve children; and she told to him Athena's purpose toward the homeward-bound Akhaians (Achaeans). He denied her not, but passed forth of his halls, and in resistless hands upswung his trident, smiting the mountain-side within whose chasm-cell the wild Anemoi (Winds) dwelt tempestuously shrieking. Ever pealed weird roarings of their voices round its vaults. Cleft by his might was the hill-side; forth they poured. He bade them on their wings bear blackest storm to upheave the sea, and shroud Kaphereus' (Caphereus') heights.
Swiftly upsprang they, ere their king's command was fully spoken. Mightily moaned the sea as they rushed o'er it; waves like mountain-cliffs from all sides were uprolled."
Ovid, Metamorphoses 4. 663 ff (trans. Melville) (Roman epic C1st B.C. to C1st A.D.) :
"Now in their age-old prison Hippotades [Aiolos (Aeolus)] had locked the Venti (Winds) [Anemoi]."
Ovid, Metamorphoses 11. 430 ff :
"Hippotades [Aiolos (Aeolus)] rules the Venti (Winds) [Anemoi] of heaven, holding imprisoned all their stormy strength, soothing at will the anger of the seas. When once the Venti (Winds) are loosed and seize the main, naught is forbidden them; the continents and oceans cower forsaken; in the sky they drive the clouds and with their wild collisions strike fiery lightnings crashing down the world."
Virgil, Aeneid 1. 50 ff (trans. Day-Lewis) (Roman epic C1st B.C.) :
"The goddess [Juno-Hera] came to the storm-cloud country, the womb-land of brawling siroccos, Aeolia. Here in a huge cavern King Aeolus keeps curbed and stalled, chained up in durance to his own will, the heaving Winds and far-reverberating Tempests. Behind the bars they bellow, mightily fretting: the mountain is one immense murmur. Aeolus, aloft on his throne of power, sceptre in hands, gentles and disciplines their fierce spirits. Otherwise, they'd be bolting off with the earth and the ocean and the deep sky - yes, brushing them all away into space. But to guard against this the Father of heaven [Jupiter-Zeus] put the Winds in a dark cavern and laid a heap of mountains upon them, and gave them an overlord who was bound by a firm contract to rein them in or give them their head, as he was ordered. Him Juno [Hera] now petitioned.
Here are the words she used :--‘Aeolus, the king of gods and men has granted you the rule of the winds, to lull the waves or lift them. A breed I have no love for now sails the Tyrrhene sea [Aeneas and his Trojans]. Transporting Troy's defeated gods to Italy. Lash fury into your Winds! Whelm those ships and sink them! Flail the crews apart! Litter the sea with their fragments! Fourteen Nymphae (Nymphs) I have--their charms are quite out of the common--of whom the fairest in form, Deiopea, I'll join to you in lasting marriage and seal her yours for ever, a reward for this great favour I ask, to live out all the years with you, and make you the father of handsome children.’
Aeolus answered thus :--‘O queen, it is for you to be fully aware what you ask: my duty is to obey. Through you I hold this kingdom, for what it's worth, as Jove's viceroy; you grant the right to sit at the gods' table; you are the one who makes me grand master of cloud and storm.’
Thus he spoke, and pointing his spear at the hollow mountain, pushed at its flank: and the Winds, as it were in a solid mass, hurl themselves through the gates and sweep the land with tornadoes. They have fallen upon the sea, they are heaving it up from its deepest abysses, the whole sea--Euros (the East-Wind), Notos (the South-Wind), Sou-wester thick with squalls--and bowling great billows at the shore. There follows a shouting of men, a shrilling of stays and halyards. All of a sudden the Storm-clouds are snatching the heavens, the daylight from the eyes of the Trojans; night, black night is fallen on the sea. The welkin explodes, the firmament flickers with thick-and-fast lightning, and everything is threatening the instant death of men . . .
Even as he cried out thus, a howling gust from Boreas (the North-Wind) hit the front of the sail, and a wave climbed the sky. Oars snapped; then the ship yawed, wallowing broadside on to the seas: and then, piled up there, a precipice of sea hung. One vessel was poised on a wave crest; for another the waters, collapsing, showed sea-bottom in the trough: the tide-race boiled with sand. Three times did Notos (the South-Wind) spin them towards an ambush of rocks (those sea-girt rocks which Italians call by the name of The Altars), rocks like a giant spine on the sea: three times did Euros (the East-Wind) drive them in to the Syrtes shoal, a piteous spectacle--hammering them on the shallows and hemming them round with sandbanks . . .
Meanwhile Neptune [Poseidon] has felt how greatly the sea is in turmoil, felt the unbridled storm disturbing the water even down to the sea-bed, and sorely troubled has broken surface; he gazes forth on the seep with a pacific mien. He sees the fleet of Aeneas all over the main, dismembered, the Trojans crushed by waves and the sky in ribbons about them: Juno's [Hera's] vindictive stratagems do not escape her brother.
He summons the East and the West Winds, and then proceeds to say :--‘Does family pride tempt you to such impertinence? Do you really dare, you Winds, without my divine assent to confound earth and sky, and raise this riot of water? You, whom I--! Well, you have made the storm, I must lay it. Next time, I shall not let you so lightly redeem your sins. Now leave, and quickly leave, and tell your overlord this--not to him but me was allotted the stern trident dominion over the seas. His domain is the mountain of rock, your domicile, O East Wind. Let Aeolus be king of that castle and let him keep the Winds locked up in its dungeon.’
He spoke; and before he had finished, the insurgent sea was calmed."
Suidas s.v. Ges agalma (trans. Suda On Line) (Byzantine Greek lexicon C10th A.D.) :
"Ges agalma (A statue of the earth) : They model Hestia as a woman, like the earth, holding up a kettledrum, since the earth encloses the winds below herself." [N.B. The place beneath the earth is Tartaros.]
- Homer, The Odyssey - Greek Epic C8th B.C.
- Hesiod, Theogony - Greek Epic C8th - 7th B.C.
- Apollodorus, The Library - Greek Mythography C2nd A.D.
- Apollonius Rhodius, The Argonautica - Greek Epic C3rd B.C.
- Quintus Smyrnaeus, Fall of Troy - Greek Epic C4th A.D.
- Ovid, Metamorphoses - Latin Epic C1st B.C. - C1st A.D.
- Virgil, Aeneid - Latin Epic C1st B.C.
- Suidas, The Suda - Byzantine Greek Lexicon C10th A.D.
|
All our day to day life objects have three dimensions. Materials are formed of length width and depth.
Truly the traditional textile arena are also dealing with materials having depth but as those depths are negligible in compared to their length and width, the traditional textile manufacturing engineers are almost considering everything as 2D material. All calculations and research and development approach are almost of 2D, most of us are just ignoring the z-axis! Particularly in Bangladesh, general dealing approach among the textile professionals are still two dimensional only.
To simplify the working process, ‘weight per unit area’ of the material has been used by the textile engineers and professionals to define and communicate their materials. But in an ever compelling reality and developments of technologies coupled with shifts in consumer choice, the importance of z-axis is increasing every day. The textile manufacturer can never ignore this.
Transforming 3D materials into 2D things to simplify communication and research process is not worthy anymore. This is like taking a difficult route and remaining incapable still. In deed the professionals only requires a change in mindset. Perceiving 3D technologies are not difficult at all. The companies and the educational institutes just require understanding the importance of it properly and incorporate it in their priority.
3D textile is not a new thing. Traditional textile making processes i.e weaving, knitting and non-woven technologies are being used in different formats to develop 3D materials. Those technologies are being used to make human organs to aircraft engines. Emergence of 3D printing has lifted it to another level. Today human can make any object he/she want using 3D technologies particularly 3D printing.
When technology has evolved so far, traditional textile materials like fabric, accessories and trimmings are being changed as well. Use of warp knitting technology to make fully fashioned ready to wear clothing and use of non-woven felting for developing mattress are pretty old now. Multi-layer fabric being used in sports and other functional purposes are using the engineering in a different approach. High tech 3D sophisticated manufacturing ideas are being used in making many accessories which are being used in fashion garments. Many weaving, knitting and printing technologies and their produced products which are being used in fashion garments are no more only made of traditional 2D systems.
Basic concepts of composite material development are being applied in making, developing and modifying traditional textile fabric and accessories. When the engineering sector requires lightweight materials but high tensile and other strength materials, the fashion industry requires function, comfort, aesthetics and look. Designers nowadays just can pick anything. And to make it unique and new many manufacturers globally are using sophisticated high-tech 3D approaches in producing materials for fashion products as well. Many dresses in fashion weeks held in fashion capitals (i.e Paris, Milan, London) has used 3D textile materials.
So, if textile professionals be smart enough in taking effort to perceive 3D technologies, they will be able to explore opportunities both in fashion industry and also in all other technical textiles and engineering areas. Companies and educational institutes must move forward building their infrastructure for 3D textiles. Weaving looms, knitting machinery, non-woven technologies and 3D printing technologies should be researched and followed up to find out business opportunities for Bangladeshi manufacturers. And educational institutes must emphasize this as demand for 3D materials are increasing very fast. And certainly there remain huge future for 3D textile materials.
Any unauthorized use or reproduction of Textile Today content for commercial purposes is strictly prohibited and constitutes copyright infringement liable to legal action.
|
"All right, Cheetah, give it here!"―Indiana Jones[src]
Cheetah was a nickname given to a golden furred monkey in Kenya. In 1931, while searching the jungles outside of Mombasa for Ali Bey's Palace, Indiana Jones had his fedora stolen by one of the forest's monkeys. Climbing down from a tree, Jones referred to the monkey as "Cheetah" when trying to get his hat back. The monkey screeched at Jones and bared his teeth, and Jones screeched back louder, scaring away the monkey, and retrieving his beloved hat.
Behind the scenesEdit
The name Cheetah is a reference to a fictional chimpanzee in the Tarzan movie series of the 1930's through 1960's. While sometimes billed as "Cheetah", the usual name for the character was "Cheeta". As a character in the Tarzan franchise, Cheeta was not in the original Edgar Rice Burroughs stories, but was first introduced in the 1932 film "Tarzan the Ape Man", starring Johnny Weismuller, thus making Jones' knowledge of the character in 1931 a potential historical contradiction.
|
The New Great Game is a strife among many powers, regional and global, as well as, big and small. Russia, China and the US are the key players. The Central Asia is a large and resourceful area as compared to barren, mountainous Afghanistan.
By Zahra Zafar Chohan
1. Introduction. The terminology of Great Game was initially coined by Rudyard Kipling. He brought world’s attention towards the rivalry for a region between two superpowers, the Soviet Union and the United Kingdom. The region for which they were competing holds its importance even today. Much has altered since that traditional rivalry and competition has thwarted. The Soviet empire dismembered and the United Kingdom had to abandon its colossal empire following WWII. While both Czars and British feared each other and desired to keep Afghan territory under their influence, the nature of current context is far more complicated.
The New Great Game is a strife among many powers, regional and global, as well as, big and small. Russia, China and the US are the key players. The Central Asia is a large and resourceful area as compared to barren, mountainous Afghanistan. The economic disposition of conflict makes it remarkable. The region comprises the Central Asian Muslim dominant states, bordering the Caspian basin. What makes the Caspian basin and adjoining territories so attractive is the presence of oil. The oil in general has become a source of political tussle among the states.
The West has huge dependency on Middle East. Desperate to wean its dependence on the powerful OPEC Cartel, the United States is pitted in this struggle against Russia, China and Iran, all competing to dominate the Caspian region, its resources and pipeline routes. Complicating the playing field are transnational energy corporations with their own agendas and the brash new Wild West style entrepreneurs who have taken control after the collapse of Soviet Union.
Dossym Satpayev, a political analyst, believes that within next ten years China will dominate the Central Asia’s political, economic and military spheres, mainly through the Shanghai Cooperation Organisation (SCO). Its main rival will be less affluent Russia, whose historic dominance has left it with the habit of trying to boss former Soviet republics. The Chinese leaders have managed to advance far beyond the largely ceremonial co-operation of “friendship treaties”, without resorting to Russian tactics. According to Mr. Satpayev, “China does not only buy loyalty with documents, but with money given at a low percentage”.
Then there comes intense US involvement in the region, which according to some analysts have disturbed the traditional balance of the region. Its global war on terror (GWOT) has come under intense criticism due to fake accusations of WMD in Iraq. Afghanistan on hunt for Al Qaeda is a drab drag.
2. US vs. China. When it is asserted that America and China are rivals and partners simultaneously, it is here argued that this phrase has a paradoxical impact. An emerging power has to establish cordial relations with an established one. They are rivals at various fronts, however they do avoid any direct clash and act as partners on various matters and forums e.g. the United Nations Security Council (UNSC). The Central Asia presents an altogether distinct and multifaceted battleground. China can neither out rightly oppose a hegemonic presence, nor can it ascertain friendly gestures and proclaim policy statements favoring a “sole superpower’s” huge presence in its backyard. This article will focus on United States (US) and China’s individual interests in the region as well as the competition to outdo each other.
China’s surging demand for reserves is now a fact of life. “Welcome to the oil business of the 21st century”, says a senior executive at a major US oil producer, “this is the new world”. But the history of oil industry teaches that money is sometimes the only part of the plot. Power and geopolitical influence are oil’s handmaidens. Daniel Yergin; Chairman of Cambridge Energy Research Associates, says that as Chinese companies “try to get in on new deals, occasionally commercial rivalry will get caught up in larger foreign policy issues”.
3. The New Great Game. The New Great Game seems more like a haunted version of the previous game. It’s much more multifaceted and complex. China’s involvement is due to region’s reserves, nevertheless at the same time there also lies a big concern for kinship ties of its restless Xinjiang. If China’s geographical position is analyzed, China shares borders with turbulent Tajikistan, Kyrgyz and the Kazakhstan states. During the cold war, the Central Asia, being part of Former Soviet Union (FSU), was solely used by the Soviets. However the Chinese stance under went no apparent change during the initial years of the region’s independence in 1990’s. The Chinese apprehensions revolved around the theme that these states were part of Russian sphere of influence. Later subsequent events revealed an altering scenario and the Chinese were compelled to carve out their policy goals regarding the region. Hence China was now ready to establish bilateral ties with the nascent states. Analyzing no apparent danger could emanate from the Central Asian republics (CARs), which could threaten China, the latter embarked on an economic policy, investment and trade, every single feature being an ingredient of its soft power image.
4. China. China could offer major trade opportunities as well as modest amounts of capital and technology to the economically weak Central Asian republics. By doing this, Chinese leaders could justifiably assure themselves that they were strengthening republic’s economies and responding to what Central Asian leaders consider their most basic need. The Chinese clearly agree that economic development offers the region the only possibility of limiting future ethnic and religious conflict.[i] Hence economic prosperity can be used as a tool to fuel not only its rapidly growing economy but also can bring subsequent potential stability to the region. China has its own versions of a “new silk route” These Chinese policies may be cause of concern for its old communist boss, the Russian federation. As these policies may diminish latter’s notable grab over the volatile states. Despite harboring deep suspicions for each other’s motives, China and the Russia, have adopted accommodation, and rapprochement policy visibly culminating in Shanghai cooperation organization. One can infer that China’s slow and consistent ascendancy in world politics will help it in exhibiting tremendous influence over its bordering countries.
Having viewed China’s success, the Central Asian leaders always had economic interests in mind. Official invitations were issued and Central Asia’s presidents and foreign ministers went to the Chinese capital eager to satisfy their curiosity about the nature of economic miracle that the Chinese were experiencing.[ii] The Chinese engagements with the Central Asian states characterize border agreements with Kyrgyz and Kazakh republics. In 1998 there was considerable progress in delineating both the Kazakh and Kyrgyz borders with China. A joint statement by President Akayev and President Zhiang Zemin made during Akayev April 1998 trip to Beijing kicked off a period of intensive negotiation. In June 1998 Kazakhstan and China also signed an agreement dividing 944 square kilometers of disputed border territories with nearly 6O percent of the land remaining in Kazakh hands. The critics of the agreement however see that China got the most valuable bits.[iii] Some of the significant economic maneuvers by Chinese also included in 1997, the Chinese national Petroleum Company (CNPC) won a tender and a 60 pc stake – in the Zhana Zhol and kenkiyak fields in Aktobe, Kazakhstan. The Chinese were committed to build a $9.6 billion pipeline, but then scaled down the project by late 2001, to less than $200 million. The Chinese government is also interested in the development of transit links that would allow the Central Asian states to better use the Chinese highway, railroad system and ports to shift transit trade away from Russia, an interest they share with the Central Asian states.[iv] Nazarbayev paid a visit to Beijing in May 2004, he and Chinese president Hu Jin Tao signed an agreement for joint exploration and development of oil and gas resources in the Caspian sea.
China’s role in Central Asian energy sector has steadily increased. This is so because Middle East has been a precarious region due to its unsettled disputes and warring and aggressive policies of the turbulent parties involved. Also the resources which symbolize the famed region are undergoing depletion. Hence the New Great Game is a diversion from the volatile Middle East and China intends to secure alternative oil and gas supplies.
Besides the economic interests, the long enduring separatist movement in the Xinjiang, the Chinese Muslim dominated province, has been a key factor driving Chinese policies. A lasting peace for her internal security is pivotal. The Xinjiang is inhabited by Muslims, many of Turk origin, who have well-established ties with their kins in CARs. The ties between the populations of Xinjiang and the Central Asian states are strong and there has traditionally not been a clear border between the people in Central Asia and Xingjian, aside from the theoretical border given on maps.[v] The Muslims in Xinjiang desire for an independent state “East-Turkestan”. Although none of the governments in Central Asian republics support such a standpoint of Xinjiang people. There has been constant effort by people, and their aspirations have often culminated into military activity. For this reason China mounted military effort in the province. The neighboring Afghanistan has been a fomenting force behind as the following paragraph better illustrates.
During the year 2000 the Chinese armed forces in Xinjiang claim to have confiscated 4100 kg of dynamite, 2723 kg of other explosives, 604 illegal small arms and 31,000rounds of ammunition in comparison to much lower confiscations in 1990’s.[vi]
5. Pakistan and Afghanistan. The South Asian region comprising Afghanistan and Pakistan’s tribal belt (referred to as Federally Administered Tribal Areas or FATA) had been in war since the late 1970s. The drug trafficking, the weaponry, the recruitment bases, the training centers and other contrabands characterized the region. The atmosphere was productive and a beneficent facilitator to wage a guerrilla war. Then there was a direct spillover effect of the war on the Central Asian region, especially those adjoining directly to chaotic Afghanistan.
6. Following 9/11. The long American presence in the war weary Afghanistan has been distasteful for Russia and China (regional powers) as it is diminishing their role in the region. However the American presence has stipulated inducement to both Russians and Chinese, in their response to Chechens and Uighurs respectively, hence legitimizing their forceful actions. Entering into the tenth year of the bloody struggle in Afghanistan, the North Atlantic Treaty organization (NATO) forces and Taliban scramble for control continues and it gives the impression in 2011 that a stalemate is evolving. The domino effect of the situation is sensed all around the region especially in China’s Muslim dominated province and the Central Asian Muslim republics.
The Chinese expansion in Central Asia slowed down somewhat after Sep 11, 2001. Yet after 2002 the economic interaction, between Central Asia and China has increased immensely. America has a great deal to offer and that most of the states in the region would prefer to cooperate with America rather than Russia or China. Many states, in contrast, are also aware of the fact that Americans will probably leave, while neighbors will stay. This makes China a crucial actor in the region and a long-term counter-balance against Russia.[vii].
7. China and Africa. China has been the world’s largest and rapidly growing economy with its growth rate stable and sustainable for the past few decades. China is also investing heavily in Africa. This Chinese policy comes under criticism from major powers due to poor human rights record of certain African regimes. The Chinese have bought oil fields in neighbors e.g. the Chinese national petroleum company (CNPC), bought in Kazakhstan oil fields for USD 5 billion. Also China has finalized several construction agreements with Kazakhstan to build pipelines to an estimated cost of USD 9 billion. The China petroleum corporation (Sinopec) agreed on March 12, 2003 to pay British gas USD 615 million for a stake in an oil and gas field in Kazakhstan which came four days after China’s third largest oil company (CNOOC) bought 8.33% of the British gas north Caspian Sea project for the same sum. To this a pledge from China Petroleum Corporation to invest USD 4 billion in Kazakhstan’s oil industry should be added.[viii]
8. China and Iran. China is also developing close commercial relations with Iran, an oil rich state of the region and a close neighbor of the Central Asian republics, to gain from its precious reserves. China’s cooperation with the stern Iranian regime has been aching factor in the US policy circles. A Sino Iranian network of oil pipelines, which has already been initiated, would be a substitute to the current Russian and American networks and give the Central Asian states an alternative route for oil trade which would decrease their dependence on Russia. The Chinese engagements with the Central Asian regimes vary from political to military and trade to investment.
9. CARS. The Central Asian regimes are structurally, militarily, and financially disadvantaged. The regimes are autocratic, dictatorial and their political systems not framed according to true liberal democratic norms. The resource-rich and strategically important region of Central Asia has some of the world’s worst dictatorships.
- The Uzbekistan is widely regarded as having one of the most brutal dictatorships on the planet with corruption, religious and political persecution and state-sanctioned torture including boiling alive of prisoners.
- The Turkmenistan is seen as a little better.
- The regimes in Tajikistan and Kazakhstan are less cruel but remain in the complete control of powerful dictator presidencies. Secondly their militaries are neither trained nor equipped appropriately as following lines better illustrate. The three of the Central Asian states (Kyrgyzstan, Turkmenistan, and Tajikistan) have no military forces worth the name. All five states have sufficiently good relations with Russia. The only potential threat to Russia from Central Asia comes from the possibility of a mass radical Islamist uprising in the Ferghana Valley, especially in the event of a NATO failure in Afghanistan that may perhaps result in the Taliban’s return to power there. In that case, Khramchikhin argues for joining forces with Kazakhstan to keep the radicals in the south while leaving the governments of the other Central Asian to survive as best they can on their own.
10. Economic disposition of region. The economic position of Central Asian states presents a status quo situation owing to scramble being played out in its south.
The Central Asia is continuously recognized as
- An important stakeholder in the Caspian energy game
- A conduit to Chinese energy security,
- A playground of Russian power politics,
- A transit area for criminal activity and religious fervor that is played out to its extreme in Afghanistan.
Central Asia is part of several struggles that intermittently see external actors competing for their attention. This competition is often exemplified in bilateral or multilateral economic as well as military agreements which are negotiated with the Central Asian states. However these external actors also dictate the terms of engagement. Access to resources and infrastructure has become prioritized as soft power tools of Russia, China and US through which they increase their regional influence.
On the other hand regional elites are also powerful. They know that they can leverage competing interests to their (often personal) advantage. As a result rule of law, corporate governance and transparency in commercial operations are often considered to be nonessential in the national interest.
Also these regimes strive to extract maximum aid and armaments from Russia, China and US.. In nutshell Beijing with its interests primarily secured from Muslim Central Asia, Muslim Middle East and Iranian Muslim regimes cannot alienate them by turning hard on to Uighur in Xinjiang. The Uighurs are Sunni Muslims. Many analysts believe that America and China are probably the only two key players in the region since Russia is embroiled in its domestic problems
11. The Source of Attraction/ the wealth distribution. The natural resource that has attracted the attention of American, Japanese and other foreign investors to Central Asia is energy – oil and natural gas. It is worth mentioning here that cross country differences vis-à-vis the ultimate distribution of immense wealth is striking. Kyrgyzstan and Tajikistan are the unlucky neighbors of energy rich Kazakhstan, Turkmenistan, and Uzbekistan. Kazakhstan’s principal underground wealth is oil. By contrast Turkmenistan, rich in oil deposits, is also proud possessor of the word’s third largest reserves of natural gas. Uzbekistan’s known oil and gas reserves are modest in comparison. Even with greater exploration Uzbekistan, at best, can expect to become a modest net energy exporter. The gold is another resource, Central Asia has plenty of. If oil, gas and gold are what make foreign investors salivate over this region then Central Asia, which most experts write about, excludes Tajikistan and perhaps even Kyrgyzstan.
12. Independent Evaluation and Assessment. Ariel Cohen, in a detailed study of old politics in the Caspian region, has opined that after the Soviet disintegration, the Russian military and security services intended to restore Moscow’s control over the region and its pipeline routes. In his view the US should not allow Russia to play a dominant role in Caspian, otherwise Moscow will have almost monopolistic control over these vital energy resources, thus increasing western dependence upon Russia.
Another analyst Federico Pena also observed the Russian role in the Caspian. He opined that US seems anxious for collaboration in the Caspian region through partnership with Russian companies, asserting that Caspian was strategically important for the US and that the US companies were playing a leading role in the region. This is evident from the multiple pipeline strategy that the US has been promoting in Caspian, which in effect, has reduced the role of Russia’s northern route in exporting oil from this region.
America wants to secure supply not only for itself, but also want western firms to equally invest in Central Asian projects. This would reduce Europe’s acute oil and gas dependence on Moscow. Washington champions two pipelines that would circumvent both Russia and Iran. One would run from Turkmenistan through Afghanistan to the Indian Ocean. The construction has already begun for a $3.8 billion pipeline from Azerbaijan’s capital, Baku, via neighboring Georgia to Turkey’s Mediterranean port of Ceyhan (BTC) project. The BP, its main operator, has invested billions in oil rich Azerbaijan and can count on support from the Bush administration, which stationed about 500 elite troops in war torn Georgia.
Ariel Cohen, in his article titled “The New Great Game: Oil Politics in the Caucasus and Central Asia,” has mentioned certain steps and diplomatic maneuvers to be undertaken by US to ensure unrestricted supply.
- Firstly US should strengthen its ties with Caucasus and Central Asian states, assuring that these states get fair share of revenue in exploration projects and transit fees.
- Secondly US should not adopt policy of ruling out Moscow’s gas companies from exploring rights.
- Thirdly the conflicts arising in the region must be resolved with determination. Also instead of derogating these Muslim republics US must assist to create free market economies, give them access to European market, and support governments that respect democracy and political pluralism. Various international projects especially the US sponsored (BTC) project, decreases the potential dangers associated with former pathways i.e. the Bosporus straits which are also the busiest in world shipping.
- The strategic goal of the West should be the creation of a level playing field, allowing Russian and western corporations to participate in the development of Eurasian energy resources on an equal footing. If cooperation from Russia is not forth coming, the US should oppose attempts by the Russian security establishment to impose a single direction for the pipelines i.e. north via Russian territory. If Russian preponderance and geopolitical diktat continues it would give Moscow an unacceptable level of control over the flow of oil to western markets and could make the west vulnerable to Russia’s political whims.
- Nevertheless the US cooperation in region comes with doubts as various International Non Governmental Organizations (INGOS), NGOs and think tanks that effect US policy makers look down upon these regimes due to their poor human rights record, shameful practices of treating prisoners, poverty and a heavy handed approach of regimes towards their indigenous people. The region, in actual fact, is in dire need of economic development, as many sinister and evil deeds are a result of poverty. The primary source of instability throughout the region is neither religious extremism nor ethnic conflict but lack of economic opportunity.
13. US and China as Rivals. The key rival challenging US supremacy in the region is China. In 2009 for the first time China’s net trade with Central Asia exceeded that of Russia and the trend is likely to persist in future, says Alexander Cooley, a political scientist at Columbia University. He says China is stealing a march on the two cold war era superpowers. In December, a consortium, led by the China national petroleum company won the rights to develop Turkmenistan’s south Yolotan field, one of the world’s most prized gas fields. China is also active in uranium and oil projects in Kazakhstan (the region’s largest economy) and has been building modern roads that will transport Chinese goods to impoverished Kyrgyzstan and Tajikistan and beyond.
China has renewed its traditional vassal relations with the region and the Chinese relations with the people in region have traditionally been the relationship of peace, war, trade, deception and marriages, all the ingredients for a good story. It is only in the last 100 years during the Russian and Soviet occupation that China has been excluded from the region. China has traditionally viewed Central Asia as its personal trading area and a region heavily influenced by Chinese cultures. The trade between China and Central Asia has always been crucial and favored by both sides, as it is today. The only change today is that the traders have replaced jade, tea, silk and rhubarb with oil, weapons and infrastructure. Oil and gas have emerged as the most important financial reasons for China to engage with the Central Asian states to the degree that it has done.
The Chinese leaders have been anti US hegemonic displays and its unilateralist stance. Whether it is China’s alliance with Iran or a platform of SCO, the main policy imperative is to restrain US growing influence in region. The Iranian Shiite regime has not been a threat to the Sunni dominated Central Asian states. Washington may be reluctant to admit it, but in the new Great Game in Eurasia, the Tehran-Beijing axis spells out the future: Multi polarity.
14. Conclusion. One may consider this conception of “new great game” to be bogus or sham, as remonstrated by some thinkers, yet one cannot reckon the very notion of a renounced Realist thought “National self interest”. This is the chief driver behind this game directly or indirectly as the case may be. The illustrious “new great game is a perilous quest. It may be hazardous because the path pursued by some states is treacherous, producing adverse consequences for the people, henceforth oblivious.
A glance at a map and a little knowledge of the region suggests that real reasons for Western military involvement may be largely hidden. Afghanistan is adjacent to Middle East. And though Afghanistan may have little petroleum itself, it borders both Iran and Turkmenistan; the countries with the second and third largest natural gas reserves in the world (Russia being first). Turkmenistan is the country nobody talks about. Its huge reserves of natural gas can only get to market through pipelines. Until 1991, it was part of the Soviet Union and its gas flowed only north through Soviet pipelines. Now Russians are planning a new pipeline, north. Chinese are building a new pipeline, east. The U.S. is pushing for "multiple oil and gas export routes." High-level Russian, Chinese and American delegations visit Turkmenistan frequently to discuss energy. The U.S. even has a special envoy for Eurasian energy diplomacy. Rivalry for pipeline routes and energy resources reflects competition for power and control in the region. Pipelines are important today in the same way that railway building was important in the 19th century.
Ever since the economic reforms, in China, by Deng Xiao ping in late 1970’s the demand for oil has increased. The dependence on the Middle East had reached 50 percent of crude imports in 1996, and the decision was made to diversify away from the Middle East rather than assume that the Gulf region will become peaceful. The Chinese energy security would be better assured by access to Russian and Central Asian sources as well as to new sources of crude oil imports from Angola and Vietnam.
China is operating equally along side Russia in devouring energy deals. This provides an equal clientele to the Muslim Central Asian republics. This Chinese policy is far more attractive than facing Russian monopoly as previously. China offers a useful counterweight to Russia. A network of pipelines between Central Asia and China is gradually taking shape, and Russia appears to be realizing that China is not just a useful partner for keeping west out of Central Asia – it is also a competitor. However, as European energy growth slows, Russia too needs alternative markets for its oil and gas, and China has managed to secure preferential treatment there as well.
Many analysts who write on Central Asian energy wealth, often focus their concentration on plight of Afghanistan solely, which has made CARs vulnerable, due to the insecurity prevailing in Afghanistan more like a domino effect. At the critical juncture of their independence the Central Asians were fearful as they lost Soviet backing, their security provider. These weak and fragile states were the onlooker of Taliban civil strife in the decade of 1990’s dreading the spillover effect and that seems the same today. In 2011, the consequential effect of US war in Afghanistan is haunting the Central Asian regimes. The drug trafficking, smuggling, narcotics, human trafficking and arms trade etc is delaying their economic well being and becoming cause of derailment and frustration for many opportunists.
[i] Michael Mandelbaum, Central Asia and the world. Kazakhstan, Uzbekistan, Tajikistan, Kyrgyzstan, and Turkmenistan. Council on Foreign Relations, USA, 1994, pp.228-229.
[ii] Martha Brill Olcott, Central Asia’s second chance, Carnegie Endowment for International Peace, Washington D.C, 2005, p.62.
[iii] ibid, p.63.
[iv] ibid, p.65.
[v] Niklas Swanstrom, China and Central Asia: a New Great Game or traditional vassal relations/ Journal of Contemporary China (2005), 14(45), November, pp.569-584, p.571, 28/3/2010.
[vi] ibid, pp.571-572.
[vii] ibid, p.576.
[viii] ibid, pp.577-578.
|
The use of habitat mosaics by terrestrial vertebrate fauna: implications for conservation and management
- Cite this article as:
- LAW, B.S. & DICKMAN, C.R. Biodiversity and Conservation (1998) 7: 323. doi:10.1023/A:1008877611726
- 1.1k Downloads
Many species of vertebrates require multiple habitats to obtain different resources at different stages of their life-cycles. Use of habitat mosaics takes place on a variety of spatial and temporal scales, from a daily requirement for adjacent habitats to seasonal use of geographically separated environments. Mosaics of habitats are also required in some species to allow ontogenetic habitat shifts, while in others each sex may have specific requirements that are met by different habitats. The extent and nature of animal movements are key (but generally poorly known) factors affecting the vulnerability of species to landscape change. The requirement by many species for multiple habitats suggests that their conservation will be most effective in a mosaic environment and that protection of certain high profile habitats alone, such as rainforest, will be insufficient to achieve conservation goals. Management regimes that result in homogenization of habitats should be avoided. Priority should be given to research that identifies the extent to which species can locate habitat mosaics, at different spatial scales and arrangements, in modified environments.
|
Presentation on theme: "LUKY TIASARI, 2201403581 THE USE OF LITERACY APPROACH TO TEACH RECOUNT TEXT TO THE FIRST GRADE OF SMA N I BAE KUDUS."— Presentation transcript:
LUKY TIASARI, 2201403581 THE USE OF LITERACY APPROACH TO TEACH RECOUNT TEXT TO THE FIRST GRADE OF SMA N I BAE KUDUS
Identitas Mahasiswa - NAMA : LUKY TIASARI - NIM : 2201403581 - PRODI : Pendidikan Bahasa Inggris - JURUSAN : BAHASA & SASTRA INGGRIS - FAKULTAS : Bahasa dan Seni - EMAIL : lukytia_tulip pada domain yahoo.co.id - PEMBIMBING 1 : Drs. Dwi Rukmini, M.Pd - PEMBIMBING 2 : Dr. Dwi Anggani L.B - TGL UJIAN : 2007-08-15
Judul THE USE OF LITERACY APPROACH TO TEACH RECOUNT TEXT TO THE FIRST GRADE OF SMA N I BAE KUDUS
Abstrak The study is an attempt to know the teachers’ problems in applying literacy approach to teach Recount Text to the first grade of SMA N1 BAE KUDUS. Based on the research problems, this study is aimed at finding how far the English teachers in that school know about literacy approach to teach recount text and the difficulties they face when they teach using English for a Better Life Textbook. The approach used in this study is qualitative. The data sources are the two teachers of English in SMA N 1 BAE KUDUS. The data are the results of observation the researches did when the teachers teach and the results of interview given to them. The results show that the teachers often get difficulties in Building Knowledge of the field (BKOF). They also do not know about how to apply literacy in teaching learning cycles based on Kurikulum Tingkat Satuan Pendidikan (KTSP). The teachers’ method in teaching learning is different. They also have different teacher’s ability to interact their students. The final conclusion is that most of the teachers still do not know about how to apply literacy approach in the classroom. There are three (3) suggestions proposed. First, the English teachers should be given workshop about literacy approach. Second, the users of textbook should check the material before teaching. Third, the teachers should more learn English for a Better Life Textbook before using it.
Kata Kunci literacy, recount text, teaching learning cycles, and the teachers’ skill.
Referensi Bloom, B. S. 1985. Human Characteristics and School Learning. New York: Mc. Graw Hill Book Co. Brown, D. 2001. Teaching by Principles An Interactive Approach to Language Pedagogy. San Francisco State University: Longman. Celce-Murcia, M., Z.Dornyei, S.Thurrell. 1995. Communicative Competence: A Pedagogically Motivated Model with Content Specifications. Celce-Murcia, M., E. Olshtain. 2001. Discourse and Context in Language Teaching: a Guide for Language Teachers. UK: Cambridge University Press. Crooks and Choudron. 1991. Taxonomy of language teaching technique. Derewianka, B. 1990. Exploring How Texts Work. Australia: Sidney: Eggins, S. 1994. An Introduction to Systemic Functional Linguistics. London: Pinter Publishers. Finocchiaro, M. 1974. English as a Second Language from Theory to Practice. New York: Regents Publishing Company. Grand, A. 1986. Defining Literacy: Common Myths and Alternatives Readings. In Australian Review of Applied Linguistics. Halliday, M.A.K. 1985b. Spoken dan Written Language. Geelong: Deakin University Press. Halliday, M.A.K. and R. Hasan. 1985. Language Context and Text: Aspects of language in a Social-Semiotic Perspective. Victoria: Deakin University Press. Hammond et al. 1992. English for Social Purpose: A Handbook for Teachers of Adult Literacy. Sidney: NCELTR Hyland, K. 2004. Genre and Second Language Writing. The University of Michigan Press, Ann Arbor. Keller, E. and S. T. Warner. 1988. Conversation Gambits. England: Language Teaching Publications. Kern, R. 2000. Literacy and language Teaching. UK: Oxford University Press. Kinsella. 1991.Categories of question and typical classroom question. Kompas, February 10, 2006 Maxwell, J.A. 1996. Qualitative Research Design. London: Sage Publications. Pusat Kurikulum, 2003. Kurikulum 2004: Standart Kompetensi Mata Pelajaran Bahasa Inggris. Jakarta: Depdiknas. Siswanto, J, dkk. 2005. Let’s Talk VII. Bandung: Pakar Raya Swales, J. 1990. Genre Analysis. UK: Cambridge University Press. Turney, C. 1983. Sidney Micro Skills Redeveloped. Australia: Sidney University Press. ------------- 1983. Sidney Micro Skills Redeveloped 2. Australia: Sidney University Press. Wells, B. 1987. Apprenticeship in Literacy. In Interchange 18.1/2:109-123. Yuliani, M., G. C. Permaty. 2005. English for A Better Life the Grade X of Senior High School. Bandung; Pakar Raya. www.teaching-learning.com http://www.ehow.com/how write first_letter.html
|
Active Science is an investigation-centered, K-5 science program. It provides activities, experiments, discussions, and challenges that encourage students to develop the problem solving skills that will enable them to participate and interact in the scientific and technological environment of the modern world.
Scientific knowledge is increasing rapidly in all fields. Active Science prepares future citizens of the world to be prepared to ask and answer why, as well as enable them to apply scientific information in order to solve new and complex problems.
Educators and scientists working together created Active Science with a thorough study of science and educational research, standards analysis, and investigation enhancements. The philosophy of the program is that students learn and remember science best when they are involved in hands-on explorations and investigations.
Active Science lessons use a variety of instructional techniques to accommodate differentiation for a range of student learning styles, while students work in cooperative teams to interact, draw conclusions, and share ideas with their peers. Lessons encourage students to express and evaluate their preconceived ideas about how the world of science works. When students are able to test their ideas with real evidence and articulate what they have discovered by recording data into their Science Notebooks, the scientific learning becomes their own.
|
Doctor insights on:
What Does It Mean When Anencephaly
Lost baby in 16 week with termination due to anencephaly.biopsy report has notes "anencephaly,hypo plastic maxilla.what does that mean?
Findings expected in: anencephaly.. We now believe that the cranium does not close, leaving the brain exposed. By 11 to 12 weeks, extension of the legs is sufficient to bash the normal brain against the uterine wall, destroying most of it by 13 to 14 weeks. The markedly reduced brain volume causes deformation of craniofacial structures. Had the cranium closed, your fetus would've had a normal face. ...Read moreSee 2 more doctor answers
Comfort care only!: Nobody can nor should help prolong the "lives" of these poor neonates. Anencephalic newborns are devoid of any chance of meaningful interaction with the environment and never attain consciousness. Comfort care is all that is ethically permissible for these dramatic cases. Take 4-5 mg daily of Folic Acid daily throughout your reproductive life, to prevent this from recurring in future pregnancies. ...Read more
Failure of closure: The fetus is busy around 20-30 days in when the nervous system starts forming along a line like a trench. The trench folds in on itself and begins to form a tube, sealing itself in the middle first and moving toward both ends like two zippers. When the top end fails to close, many brain structures don't form & we have anencephaly.At the bottom, we get spina bifida. ...Read moreSee 1 more doctor answer
3 weeks after con-: ception, an embryo's neural plate develops a midline groove; its edges over-fold & close to form a neural tube. Anencephaly is the most severe of the Neural Tube Defects caused by interaction of one of several genes with environmental factors. Low maternal folate (folic acid) level at conception is a main cause; MTHFR, a main gene iinvolved. Fertile women who take daily Folic Acid have lower risk of NTD's. ...Read more
Anencephaly: Anencephaly is a serious birth defect where the brain does not form and the top of the skull is open. It is an extreme form of a neural tube defect. Tests which can indicate anencephaly are an ultrasound examination. A blood test called msafp can be drawn at 15 weeks also. ...Read moreSee 1 more doctor answer
Sorry for your loss: I've been through about half a dozen of these but never in your shoes. Another 30+ weeks of pregnancy carrying this burden may or may not be something you can bear when the outcome is so predictable & bad. Consult your spouse, spiritual adviser, & pray. Do what fits for your needs & grieve for what might have been. See & hold baby whatever you do to say good bye. Followup with a geneticist later. ...Read moreSee 1 more doctor answer
- Talk to a doctor live online for free
- What does it mean when empyema?
- What does it mean when smallpox?
- What does it mean when dermatosclerosis?
- Ask a doctor a question free online
- What does it mean when bronchopneumonia?
- What does it mean when orchitis?
- What does it mean when neuroblastoma?
- What does it mean when arachnoiditis?
- Talk to a pediatrician online
|
|Scientific Name:||Antechinus stuartii|
|Species Authority:||Macleay, 1841|
|Taxonomic Notes:||According to Van Dyck and Crowther (2000) this taxon represents a species complex, out of which Antechinus adustus and A. subtropicus have already been split.|
|Red List Category & Criteria:||Least Concern ver 3.1|
|Assessor(s):||Burnett, S. & Dickman, C.|
|Reviewer(s):||Johnson, C.N. & Hawkins, C.|
Listed as Least Concern in view of its relatively wide distribution, presumed large population, absence of major threats, and because it is unlikely to be declining.
|Previously published Red List assessments:|
|Range Description:||The Brown Antechinus is endemic to eastern Australia, where it ranges from southern Queensland to southern New South Wales (Crowther and Braithwaite 2008). It occurs from sea level to around 1,500 m.|
|Range Map:||Click here to open the map viewer and explore range.|
|Population:||Van Dyck and Crowther (2000) consider this species to be one of the most common and widespread species of small mammals in eastern Australia.|
|Current Population Trend:||Stable|
|Habitat and Ecology:||The species is found in a wide variety of forest types; seldom found in anthropogenically disturbed habitats.|
|Major Threat(s):||There appear to be no major threats to this species, with the exception of some localized habitat loss.|
|Conservation Actions:||The Brown Antechinus is present in protected areas. This species is not believed to be a conservation concern due to its abundance and widespread range (Van Dyck and Crowther 2000).|
Crowther, M. S. and Braithwaite, R. W. 2008. Brown Antechinus, Antechinus stuartii. In: S. Van Dyck and R. Strahan (eds), The mammals of Australia. Third Edition, pp. 95-96. Reed New Holland, Sydney, Australia.
IUCN. 2016. The IUCN Red List of Threatened Species. Version 2016-2. Available at: www.iucnredlist.org. (Accessed: 04 September 2016).
Van Dyck, S. and Crowther, M. S. 2000. Reassessment of northern representatives of the Antechinus stuartii complex (Marsupialia: Dasyuridae): A. subtropicus sp. nov. and A. adustus new status. Memoirs of the Queensland Museum 45: 451-475.
|Citation:||Burnett, S. & Dickman, C. 2016. Antechinus stuartii. The IUCN Red List of Threatened Species 2016: e.T40526A21946655.Downloaded on 27 June 2017.|
|Feedback:||If you see any errors or have any questions or suggestions on what is shown on this page, please provide us with feedback so that we can correct or extend the information provided|
|
Dinghy sailing tips for gybing a dinghy sailboat jibe and jibing sailing term how to gybe dinghy racing tips. Foil jibing sailing with the words jibe oh and sailing single handed or solo gybing tips and techniques.
Changing direction and sailing away from the wind is termed gybing. In gybing or jibing it is the stern, rather than the bow, that turns through the wind with the mainsail staying full of wind throughout the manoeuvre. It is the swing of the boom across the sailboat which can be sudden and violent so good sail control and centerboard control is essential when gybing a dinghy. Here are some dinghy sailing tips on how to gybe a sailboat that will be of help in improving your dinghy sailing techniques.
The helmsman decides when to gybe or jibe and ensures that the new course is clear and makes sure the crew is ready. A sailing gybe requires a large turning arc to complete the manoeuvre and it is therefore vital to ensure sufficient clear space ahead.
Throughout the sailing gybe, the helmsman changes hands on the mainsheet and tiller, while maintaining control of both while moving across the sailboat during the turn. After gybing, he steers onto the new course and checks sail trim and boat balance.
The crew releases the old jib sheet, picks up the new jib sheet, and then moves across the sailboat sheeting in the jib on the new side as the gybe is completed. He is responsible for balancing the boat throughout the sailing gybe.
When learning, starting from a [ training run ] allows more time to prepare and to adjust your weight to balance the boat. Start on a training run with the wind behind at an angle of about 5-10° off a true run. It is vital to keep to this course before turning.
It can be accomplished by choosing a landmark to bow or stern that helps in steering a straight line while preparing to gybe. After gybing the point of sailing will probably a broad reach.
The helmsman watches the mainsail leech for signs that it is about to gybe, being in the middle of the sailing dinghy as the boom comes across, centring the tiller. The sailing dinghy turns through a wide arc and, if the tiller is not straightened quickly enough as the boom swings across, the boat turns onto a broad reach on the new tack.
The sudden application of power in strong winds, against a centralized tiller causes the sailing dinghy to turn slightly away from the wind on the new course. This can be correct by the skipper by gently easing the tiller to leeward and then centralizing it again.
Gybing begins with bearing away until the jib hangs lifelessly behind the mainsail which indicates the course is a dead run. Luff up slightly with the jib just filling on the same side as the mainsail. The point of sailing is called the training run.
A [ centre-mainsheet system ] requires the helmsman face forwards during the gybe or jibe and change hands on the tiller and mainsheet towards the end of the manoeuvre. This forward-facing position enables the helmsman to watch the course and the mainsail. When competent in gybing, the helmsman initiates the boom's swing by tugging on the mainsheet when a gybe or jibe is pending.
To carry out a gybe or jibe in an [ aft mainsheet ] sailing dinghy differs from gybing with a centre-mainsheet with the helmsman changing hands on the mainsheet and tiller prior to the gybe and facing aft during the gybe. The helmsman cannot see in front of the boat during the manoeuvre, necessitating the gybe to be completed quickly. The crew crosses the sailboat facing forwards.
The common problem with aft mainsheets is that the falls (loops) of the mainsheet catch on the corners of the transom as the boom swings across. If this occurs, incorporate a flick of the mainsheet into the gybing sequence when the boom moves toward the centre. This flick procedure produces an ‘S’ bend in the sheet lifting it above the corner and requires trial and error to perfect it.
It is possible to gybe while sailing on a dead run with no course alteration at all, or only a minor one. On a run, the sails are set to their farthest extent. Gybing requires the sail to be rotated through approximately 160° from one side to the other.
Gybing with negligible course change, requires the crew or helmsman to pull the mainsail across to the new leeward side, rather than causing the wind to move it.
The helmsman positions himself in the middle of the sailboat with the crew balancing the boat where necessary. On the helmsman calling "gybe-oh", the crew clutches the boom vang swinging the boom across.
On a centre-mainsheet sailing dinghy, the helmsman grasps the mainsheet tackle using it to swing the boom. When a spinnaker is being used then the control of the boom by the skipper is required while the crew gybes the spinnaker.
Continuing to bear away from a broad reach to a run, sailing further away from the wind, the sailing dinghy eventually gybes on its own with the wind swinging across the stern. This is termed an 'uncontrolled gybe', which can result in capsize because the boat has not been balanced correctly.
Continually check the wind direction whenever sailing downwind to make certain a gybe does not happen accidentally. A warning sign of an unplanned accidental gybe occurs when the jib attempts to blow across to the windward side of the boat meaning that the sailboat is a dead run, so bearing away causes the boat gybe.
|
- For other uses, see Quinn.
Quinn served as one of Q's mentors in the distant past. (TNG novels: The Q Continuum). Like the other members of the continuum, Quinn spent a great deal of time exploring the universe, and had spent several hundred years visiting Earth. During his visits to Earth, Quinn had influenced human history and directly touched the lives of several people.
During the mid 17th century, Quinn was in England when he sat down next to an apple tree, with Sir Isaac Newton seated opposite him. Quinn got up to leave, and jostled the tree, causing an apple to fall from the tree, striking Newton in the head, and gave Newton the inspiration to begin a new era in human science. If it had not been for Quinn, Q remarked that Newton most likely would've died in a debtors' prison, and would be a suspect in the murder of several prostitutes.
Later, in the 19th century, Quinn had taken the guise of a Union Army soldier during the American Civil War, and was present at the Battle of Pine Mountain, Georgia. Quinn saved the life of a Union Army Colonel named Thaddius Riker - who was a distant ancestor of Kyle Riker and his sons William and Thomas. Without Quinn's help in getting him to safety, Thaddius most likely would've died at Pine Mountain, and not had any children. While Q sarcastically remarked that he would've missed several opportunities to insult William Riker over the years, the absence of Riker may have had far more profound consequences for humanity.
When Thaddius Riker believed himself to be dying, he asked Quinn to deliver a message to his family. In 2371, he delivered the message to William T. Riker that he should pursue his relationship with Deanna and to seek out his own command as to not make the same mistakes that Thaddius made. When Quinn encountered Riker on board the USS Voyager several years later he didn't allow Riker to have any recollection of their previous meeting. (TNG short story: "A Q to Swear By")
Quinn was still on Earth in the 20th century when he offered a ride to a man named Maury Ginsberg to the Woodstock Music Festival of 1969. It was Ginsberg who noticed that a disconnected cable that had the potential to ruin the concert. Quinn also met his future wife, who had been sitting in Quinn's jeep. Thanks to Quinn's influence, Ginsburg became a successful orthodontist who had four children with his wife.
Aftrwards, Quinn became bored with his life, feeling that as an immortal being that he had lived so long that he had seen and done everything possible. Quinn attempted to commit suicide several times, once causing the Romulans and Vulcans to engage in a 100 year war as a result. The Q Continuum responded by imprisoning Quinn in a comet for the next several hundred years.
In the year 2372, the USS Voyager encountered the comet, and accidentally freed Quinn from his prison. The Q Continuum sent Q to place Quinn back in his prison, and Quinn asked Captain Kathryn Janeway for asylum on Voyager. Tuvok once asked him with such physical and mental advancement as the Q, did manners along the way de-evolve with them. In the following hearing, Quinn was able to convince Janeway and Q to grant him asylum, and Q stripped him of his powers. Quinn became a crewman on Voyager, but later committed suicide when provided with some Nogatch hemlock by Q. (VOY episode: "Death Wish")
|
|Henry Gray (18251861). Anatomy of the Human Body. 1918.|
|antero-lateral abdominal wall. The testis thus acquires an indirect connection with the anterior abdominal wall; and at the same time a portion of the peritoneal cavity lateral to these fused folds is marked off as the future saccus vaginalis. In the inguinal crest a peculiar structure, the gubernaculum testis, makes its appearance. This is at first a slender band, extending from that part of the skin of the groin which afterward forms the scrotum through the inguinal canal to the body and epididymis of the testis. As development advances, the peritoneum enclosing the gubernaculum forms two folds, one above the testis and the other below it. The one above the testis is the plica vascularis, and contains ultimately the internal spermatic vessels; the one below, the plica gubernatrix, contains the lower part of the gubernaculum, which has now grown into a thick cord; it ends below at the abdominal inguinal ring in a tube of peritoneum, the saccus vaginalis, which protrudes itself down the inguinal canal. By the fifth month the lower part of the gubernaculum has become a thick cord, while the upper part has disappeared. The lower part now consists of a central core of unstriped muscle fiber, and outside this of a firm layer of striped elements, connected, behind the peritoneum, with the abdominal wall. As the scrotum develops, the main portion of the lower end of the gubernaculum is carried, with the skin to which it is attached, to the bottom of this pouch; other bands are carried to the medial side of the thigh and to the perineum. The tube of peritoneum constituting the saccus vaginalis projects itself downward into the inguinal canal, and emerges at the cutaneous inguinal ring, pushing before it a part of the Obliquus internus and the aponeurosis of the Obliquus externus, which form respectively the Cremaster muscle and the intercrural fascia. It forms a gradually elongating pouch, which eventually reaches the bottom of the scrotum, and behind this pouch the testis is drawn by the growth of the body of the fetus, for the gubernaculum does not grow commensurately with the growth of other parts, and therefore the testis, being attached by the gubernaculum to the bottom of the scrotum, is prevented from rising as the body grows, and is drawn first into the inguinal canal and eventually into the scrotum. It seems certain also that the gubernacular cord becomes shortened as development proceeds, and this assists in causing the testis to reach the bottom of the scrotum. By the end of the eighth month the testis has reached the scrotum, preceded by the saccus vaginalis, which communicates by its upper extremity with the peritoneal cavity. Just before birth the upper part of the saccus vaginalis usually becomes closed, and this obliteration extends gradually downward to within a short distance of the testis. The process of peritoneum surrounding the testis is now entirely cut off from the general peritoneal cavity and constitutes the tunica vaginalis.|
Descent of the Ovaries.In the female there is also a gubernaculum, which effects a considerable change in the position of the ovary, though not so extensive a change as in that of the testis. The gubernaculum in the female lies in contact with the fundus of the uterus and contracts adhesions to this organ, and thus the ovary is prevented from descending below this level. The part of the gubernaculum between the ovary and the uterus becomes ultimately the proper ligament of the ovary, while the part between the uterus and the labium majus forms the round ligament of the uterus. A pouch of peritoneum analogous to the saccus vaginalis in the male accompanies it along the inguinal canal: it is called the canal of Nuck. In rare cases the gubernaculum may fail to contract adhesions to the uterus, and then the ovary descends through the inguinal canal into the labium majus, and under these circumstances its position resembles that of the testis.
The Metanephros and the Permanent Kidney.The rudiments of the permanent kidneys make their appearance about the end of the first or the beginning of the second month. Each kidney has a two-fold origin, part arising from the metanephros, and part as a diverticulum from the hind-end of the Wolffian duct,
|
Another change comes in the Fourth Dynasty, and is to be noted first in the royal tombs, as is always the case. The Egyptians had now learned to cut stone and build with it. The burial chambers hollowed in the solid rock were necessarily smaller than the old chambers dug in the gravel and no longer sufficient to contain the great mass of furniture gathered by a king for his grave. On the other hand, the chapels with the increase in architectural skill could be build of great size. Corresponding to these technical conditions we find a great increase in the importance of the chapel. It becomes a great temple, whose magazines were filled with all those objects which had formerly been placed in the burial chamber and were so necessary to the life of the spirit. The temples of the third pyramid, for example, contained nearly two thousand stone vessels. Great estates were set aside by will, and the income appointed to the support of certain persons who on their side were obliged to keep up the temple, to make the offerings and to recite the magical formulas which would provide the spirit with all its necessities.
Following closely the growth in importance of the royal chapels, the private offering places assumed a greater importance. The custom of periodic offerings and the use of magical texts grew until it reached its highest point in the Fifth Dynasty. At this time there is a burial chamber deep underground where the dead was laid securely in ancient traditional attitude, with his clothing and a few personal ornaments. As a rule, it is only the women, always conservative, that have anything more. Above this grave, there is a solid rectangular structure, with a chapel or offering place on the side towards the valley. The offering place is always there, no matter how poor or small the tomb. But to understand just what the Egyptian thought, we must turn to the better tombs. The walls are of limestone carved with reliefs representing the important processes of daily life,—sowing, reaping, cattle-herding, hunting, pot-making, weaving,—all those actions which furnish the daily supplies. The dead man is represented overseeing all this. Finally, near the offering niche, he is represented seated, usually with his wife at a table bearing loaves of the traditional ta bread. Beside him are represented heaps of provisions—meat, cakes, vegetables, wine and beer. A list of objects is never missing, marked with numbers,—a thousand loaves of bread, a thousand head of cattle, a thousand jars of wine, a thousand garments, and so on. We know from latter inscriptions that these words, properly recited, created for the spirit a store of spirit objects in equal numbers. Below the niche is an altar for receiving actual offerings of food and drink. It is clear that the living, coming to this offering place with or without material offerings, could, by proper recitation, secure to the spirit of the dead all its daily needs.
|
We have been discussing on ways of incorporating the OCW model to deliver educational materials to the North Koreans. Increasingly, universities are using various forms of OCW to share information with the public, where lectures are posted as webcasts and Columbia University even has clips on iTune U for download. While the model provides cost savings through distance learning, there are certain issues, which include the learning culture in DPRK and the specificity of the taught subject that needs to be address in order for it to be relevant to the North Koreans. These various concerns will be addressed using the architectural discipline as an example. Learning Culture
The architectural discipline is largely dependent on the learning culture rather than pure knowledge, which means that even if we have all the information made readily available for the North Koreans, students may find it hard to apply to their context. For example, lectures on digital fabrication in architecture would not be relevant if there are no equipments available to produce these prototypes. Furthermore, even if equipments are available, students may not use it if the university’s learning culture is not in digital fabrication design. This is the case for many Asian universities where advanced fabrication equipments are underutilized because it is not part of the university’s culture to pursue such research.
Specificity of Subject
Furthermore, the architectural discipline is extremely vast and loosely defined, for example, a person's interest can range from the philosophical and political nature of architecture to the cutting edge construction techniques. The various DPRK universities together with the Paektusan Academy of Architecture are already producing architects who can perform the basic tasks of an architect. Therefore, we are hoping to value add to their education through introducing a wide range of subjects while tailoring to suit DPRK’s context.
Joint Research Studio
To ensure the relevancy of the OCW model, perhaps it would be most effective to establish a joint research studio between North Korean architecture students and a partnering university researching on a specific aspect of DPRK architecture. Through this common research topic, theoretical knowledge and technical skills can be transferred in the most relevant way. Examples of such twinning architectural research programs include collaboration between Tsinghua and Penn, or Tongji and Yale, where students spend a couple of weeks at each university to share their research.
|
As regular readers may know, my background is in chemical engineering. Three basic concepts drive almost everything else in the field: the conservation of mass, energy, and momentum. A vast majority of problems in my field can, and are, solved using some variant of these three concepts. Sure, the mass-energy equivalence is what the universe conserves as a whole, but it doesn't affect the typical engineering designs a chemical engineer creates.
So, if a ChemE was asked to give the mass of a neutron based on the knowledge that it is composed of one up quark and two down quarks, the trivial answer would be that a neutron weighs as much as two down quarks and an up quark together. This trivial answer is off by almost 2 orders of magnitude.
Experiments have measured the mass of the up quark at between 1.5 and 3.3 megaelectron volts* (MeV); the down quark's mass is somewhere between 3.5 and 6.0 MeV. The sum of the masses of two down and one up quarks gives something between 8.5 and 15.3 MeV—but the precisely measured mass of a neutron is 939.565 MeV, meaning the quarks make up between one and two percent of its total mass. If physics, and science as a whole, is to explain the workings of our universe, we need to be able to account for this apparent discrepancy.
The nature of the various fundamental particles and three of the four fundamental forces in the universe is described by the standard model of particle physics. It's been refined since it was first proposed in the 1960s, and has now passed nearly every test that it has been put to. The standard model postulates that hadrons—protons and neutrons are the most common examples, accounting for an estimated 99 percent of the mass of the visible universe between them—are composed of three quarks. These quarks are held together by the strong nuclear force in a way that's described by a theory known as quantum chromodynamics (QCD). According to QCD, the mass of the hadrons comes from both the mass of the constituent quarks, as well as the energy holding them together, which we observe as mass.
In a paper published in last week's edition of Science, a team of scientists went back to do what we refer to as a sanity check: they attempted to calculate the masses of various light hadrons using what is known about their constituent quarks and QCD. Thanks to a property known as asymptotic freedom, problems in QCD can be solved more easily at high energies where the interactions decrease—behavior that's opposite that of many classical potential fields. At lower energies, the mathematical techniques used to solve the high energy cases no longer work and expensive computations must be carried out. To solve the low energy/low mass cases, researchers employ lattice QCD simulations.
In this computer simulation methodology, the problem is mathematically transformed into a problem that resembles a solvable statistical physics system. Space is discretized into a lattice with a fixed spacing, and the QCD potential is computed using only a handful of inputs—the masses of the constituents quarks and an external coupling constant. Since space is not actually described by a lattice, a series of simulations were carried out at smaller and smaller lattice spacings; the results show that the answers begin to converge on a continuum value, which is what we should be observing in nature.
It's not quite that simple, though. QCD is incapable of giving an exact value for the mass of a particle, as we can only calculate ratios between various masses. To tie the results back to physically measurable values, the authors of the paper used two different types of particles, the Ω and Ξ baryons. Two separate analyses were carried out, one fixing the base parameters using the Ω mass, and one using the Ξ mass. Both sets were found to predict the masses of various light hadrons to within the errors of both the stimulation and measurements of masses. The authors open their concluding paragraph, "Thus, our study strongly suggests that QCD is the theory of the strong interaction, at low energies as well [...]."
This work illustrated the fact that it's healthy for scientists and engineers to go back and reexamine our basic assumptions from time to time. In this case, one of our foundation theories appears to be correct to the level with which we can measure it. This work also does a nice job illustrating how the use of lattice QCD, and the role of simulation methods in general, can help keep us moving forward. Starting from nothing but the basics of our knowledge, researchers carried out an ab inito computation of the mass of the most important particles in our universe, and showed that theory agrees with measurements.
Science, 2008. DOI: 10.1126/science.1163233
* Weights in particle and high energy physics are often reported as equivalent energy divided by the speed of light squared, using the famous relation E=mc2. This means mass is energy/c2 but in natural units, the speed of light is often set to unity, so in mass being reported as equivalent energies.
|
Maintaining healthy hair is a key part of hair care which involves hygiene and the cosmetology of the human hair. Humans tend to have different hair care methods thus also having different tips on maintaining healthy hair. The ultimate goal of hair health is to reduce skin infections that tend to occur in hair growing parts of the human body. There are various tips and effective ways of maintaining healthy hair by an individual, they include the following:
Washing and drying
Effective washing of human hairs with shampoo along with other washing products, although washing is necessary it shouldn’t be done daily if is to maintain healthy hair. This tip entails
· Scalp massaging or smearing with shampoo for about 40 seconds before starting washing the hair. Massaging in a circulation motion helps in spreading out the shampoo and helps in reducing dandruff effects on the head.
· Using a conditioner. Conditioner is always used after shampoo use by pouring the conditioner to the tip of the hair .It’s meant to provide moisture thus making it softer and easy to manage while combing which lowers chances of damage of the hair. A leave –in conditioner can be used after shower by spraying it well, this make the hair pliable
· Also in the washing and drying an individual should avoid combing when the hair is wet as it becomes easy to break due to its stretching nature.
· Drying hair is a proper way by using a blow dryer is more effective rather wringing hair with a towel after shower. After using a blow dryer to dry, an individual should use a heat protection sprays.
Eat healthy foods and have a good diet
Most individual consider hair as reflection of the overall health of a person. Individual who eat a lot of junk foods and drink a lot of soft drinks have a higher probability of not having healthy hair, this particulars tips provide for the types of food that one should eat in order to have healthy hair
· Omega 3 is a fatty acid that ensures good skin, hair as well as the nails. Some of the foods rich in Omega 3 fatty acids are Flax seed oil, some types of fish, tuna and walnuts.
· Vitamins rich food with the vitamins B-6 and B-12 are also important for maintaining healthy hair. Vitamin B-6 can be found in spinach, white and sweet potatoes and bananas. Vitamin B-12 is largely found in dairy products which include milk, meat and fish.
· Avoid junk foods and drink a lot water and milk.
Using hair products
Products use is also another tip of maintaining healthy hair, these products are important in the way of protecting hair from drying up and protection from harmful UV rays. These products include
· Heat protectors, these products are used before subjecting an individual hair to high temperatures, these mostly are in spray form and moisturizes the hair also reduce breakage levels.one should also avoid daily activity of heat styling .UV protection and shielding products are also used.
· Serum use on wet hair before drying up ,it helps in minimizing frizzing chance and also making hair ore softer and a times more shiny.
· Masks are also used depending on an individual hair types ranging from oily hair to dry hair. Use of masks aids in provision of deep conditioning and also softening and enhancing the shininess of hair. Unmanufactured masks commonly used are avocado, honey, Oliver oil, eggs and almond.
Other basic hair health maintenance tips
· Cutting or trimming regularly or from 6-8 weeks
· Avoiding junk foods, smoking and a lot of caffeine.
· Stress management
The above tips are more many other tips of keeping an individual hair healthy. Well maintained and healthy hair tends to have attracting effects especially if maintained by celebrities and models. Tips of keeping hair healthy have numerous dwpthus providing for an easier understanding of the healthy hair tips.
|
The Bureau of Mines performed laboratory research into the effects of a barium-based fuel additive (the "postflame" type) on diesel particulate matter (dpm) emissions. The 5.6-L, six-cylinder test engine is typical of types certifiable for use in underground mines. Test parameters consisted of additive concentration and engine loads, speed, and air intake restriction. Dpm emissions, including condensed volatiles, were measured gravimetrically. Also measured were gaseous emissions including carbon monoxide, nitrogen oxides, and hydrocarbons. The fuel additive was effective, reducing dpm up to 75 pct, when used at a concentration of 0.09 Wt pct (one-fourth of the concentration recommended by the manufacturer). The additive was most effective at the highest fuel-air ratios, reducing dpm from 400 mg/m3 for untreated fuel to 120 mg/m3. At light loads, 25 pct of full rated, no dpm reductions were measured. Based on these results, the additive is recommended for use in diesel fuel, at a concentration of 0.09 Wt pct, to power underground mining equipment as long as certain conditions are met: that a beneficial dpm reduction is verified, that the minimum required quantity of additive is used, and that potential adverse effects such as increased nitrogen oxides are checked.
|
How to Use Track Selectors in Avid
When you have many tracks in your timeline, it is important to understand how to use track selection. There are many things to know about the track indicators by your timeline. Some are more obvious than others, but all are important.
Step 1: Turning Tracks On or Off
The first thing to understand is that tracks exist so that you can separate different aspects of your project. This is advantageous because it allows you to manipulate parts of your material without altering everything at the same time. For instance, you may want to extend your musical accompaniment without extending the visual image. So, you would turn off all tracks, except the one with your music on it. To do this, click on the names of the tracks as they sit on the left of the timeline. Purple indicates that the track is on, while gray indicates the track is off.
Step 2: Source Material
You may have noticed that sometimes, there are two columns of track labels next to your timeline. To help understand this layout better, switch to Source/Record mode by going to "Toolsets" and selecting "Source/Record Editing". The left window will hold your source material and the right window will correspond to your timeline. Now make sure that you have some source material open. Look back at your timeline where you will now definitely have two columns of track labels. The left-most column represents tracks in your source material, and therefore only appears when you have source material open.
Step 3: Adding Clips to the Timeline
We will assume that your source material has one video track and two audio tracks. You can tell Avid to add all or only some of this material into the timeline. If you want to use all available tracks in your clip, you will need to make sure that not only are all three tracks selected on the timeline, but also in the source material. The track will not transfer over if either side of the exchange is deselected. If you want to add video with no audio, then select the video track on both the source side and the timeline side, but only select audio tracks on the timeline side. This way, the video clip will be added as usual, and the audio tracks will still react as though a clip has been added. If you then deselect that audio tracks on both the source side and the timeline side, the audio tracks will remain stagnant even as the video track changes.
Step 4: Assigning Tracks
If you have a timeline with many tracks, you may want to tell Avid where to send the source material. You could let it always send new clips to the V1 track and move them yourself, but there is a much easier way. Left click and hold on your source material video track. Now, drag your cursor up to a timeline video track other than V1. Notice an arrow is drawn from the source icon to the timeline icon. Release your mouse and the source track will snap up to the timeline track that you have assigned it to.
Though the track system may seem simple, there are many nuances that can greatly improve your editing. As your work gets more complicated, you will find this information increasingly advantageous.Popular P&S Cameras for High Quality Photos:
|
The water and other fluids used to open wells through hydraulic fracturing — also known as fracking — are a somewhat different matter, requiring other kinds of treatment and disposal. But a much bigger issue for the operators of these wells is the ongoing treatment of produced water, which represents a significant expense. This water is typically several times saltier than seawater, which makes it a particularly good candidate for treatment with the HDH process, Narayan says: Unlike membrane-based desalination systems, this system’s efficiency is unaffected by saltier water. In fact, he adds, “The biggest advantage is when you deal with high salinity.”
A leading journal on desalination technology, Water Intelligence Report, gave the system the highest rating awarded to any system for dealing with produced water.
The MIT team built a 12-foot-high test unit that has run continuously for weeks, producing about 700 liters of clean water a day. They have tested it using barrels of water from natural gas wells to demonstrate that it produces water clean enough to drink.
Their next step is to scale up to a plant about two to three times the size of this initial unit, which calculations show should be an optimal size. Narayan says he expects the first commercial plants could be in operation within about two years.
Thursday, February 28, 2013
Fracking Water You Can Drink
Looks like the wonderboys at MIT have developed a cheaper method for water recovery. Implications are pretty huge. This doesn't appear to be a jump in technology as it is a refinement of existing technology.
|
Nearly a quarter of a million people, more than originally thought, have been affected by the devastating floods that ripped through Malawi a month ago, and with rains still falling, many of the 230,000 who were forced to flee their homes have been unable to return and rebuild their lives, the UN said.
The UN children’s agency, Unicef, said new figures from the UN and the government of Malawi showed the number of people displaced stood at 230,000, compared with an original estimate of 174,000. About 64,000 hectares (158,147 acres) of land were damaged, it added.
The scale of the disaster has wreaked havoc on the densely populated country, where most people survive from subsistence farming. Crops of maize have been destroyed, villages obliterated, homes swept away and livestock killed.
In mid-January, President Peter Mutharika declared half the country a disaster zone and estimated it would cost 23.9bn kwacha ($51m) to repair the damage.
Unicef said 276 people had been killed or were missing, while 645 people had been injured.
“With these new numbers, and while prioritising additional severely affected districts, we need to take stock of our response to ensure all children and families have access to emergency services and supplies,” said Mahimbo Mdoe, Unicef’s representative in Malawi.
“We are carefully monitoring how displaced children are faring, as we know, after one month in crowded camps, disease outbreaks and increased malnutrition can occur,” he said.
About 47% of Malawi’s children are already stunted, which is caused by undernutrition, so they are particularly vulnerable.
Unicef has launched a $9.3m appeal to cover its emergency response for three months.
The agency is concerned about possible outbreaks of cholera, dysentery and malaria as well as the risk of malnutrition. About 56,000 women and children have received healthcare in the camps, and at Unicef-supported government clinics. A total of 287 children have been admitted for treatment for severe malnutrition.
“Unicef is working closely with the government and NGO partners to install enough water and sanitation facilities to keep waterborne diseases at bay, critical for the survival of young children,” said Mdoe.
“One month in, we are on target, but with these new numbers we need to look at scaling up services again to cover these additional prioritised districts. We already have a $3.8m funding gap, and that’s likely to increase as we move into recovery phase,” Mdoe added.
With support from Britain’s Department for International Development (DfID), the EU and USAid, Unicef is working to provide sanitation and clean water, as many water sources have been contaminated.
Many of those forced from their homes have taken refuge in schools, disrupting education for around 350,000 pupils. Unicef is providing tents so that the schools can set up temporary learning spaces while still offering accommodation to families at night.
Last week, the UN’s food agency said it was scaling up its food distribution in Malawi, adding that more resources were urgently required to fill a funding gap.
The World Food Programme is delivering maize, beans, vegetable oil and super cereal, a flour fortified with vitamins and minerals. It has also provided 28 tonnes of high-energy biscuits to people in the hard-hit and remote Chikwawa and Nsanje districts. It requires about $19m for its operations in Malawi.
By the end of January, the agency had been able to reach nearly 210,000 people with more than 1,500 tonnes of food assistance in eight districts.
At the UN, member states were urged not to allow other global humanitarian crises to prevent them from supporting a full recovery in Malawi.
“While we may not be able to prevent disasters from taking place, we can do much more to mitigate their impact on people and economies,” Denis Antoine, vice-president of the general assembly, told members last week.
Northern and central regions of neighbouring Mozambique have also been hit by flooding that has affected around 160,000 people and entire communities. Unicef said the flooding had cut off roads, disrupted power supply and destroyed bridges, houses and schools.
The Indian Ocean island of Madagascar has also been affected. The UN Office for the Coordination of Humanitarian Affairs (Ocha) said in an update last week that Madagascar had received double its average rainfall since early January. This, coupled with the effects of tropical storm Chedza on 16 January, had left 74 people dead and displaced 20,000 people.
Ocha said that pre-positioned relief supplies were almost exhausted, and this was a concern as there were reports of drought in the south of the island. The peak of the cyclone season is expected in February and March.
|
Objectives: Examine and evaluate the reaction to the crash. DO Now: What were the primary causes of the crash. FDR’s New Deal. 1929– 3 million unemployed, family income 2300 1932-12.5 million (25%), family income 1400 683,000 vagrants thrown off trains
The Vets wanted their money early, hopped on empty train boxcars and headed for Washington.
20000 veterans and their families staged a protest at a camp at Anacostia Flats just southeast of the capital.
The Senate turned down their request
Troops were sent in led by Douglas MacArthur and George Patton to attack the encampment.
Tents and shack were torched and protesters were expelled. 100 injured and 1 infant killed.
Hoover and the republicans were voted out of office in 1932 in a landslide victory for the Democrats 472-59Bonus Army
Bonus Army– Attempt #1 mature in 45.
1932– Hoover v Roosevelt mature in 45.
Phew– That was a close one!
Born into a wealthy family mature in 45.
Worried about super wealth and rift between rich and poor
Harvard, then Colombia Law
Rode on shirttails of cousin Theodore
Polio at age of 39 changed him into serious determined politician
Empathy for sufferingFDR
FDR was elected in November but was not inaugurated until March (This was normal)
Hoover could not get anything done because he did not have support anymore (Lame Duck)
As a result– “Lame Duck” Amendment (20th) that moved inauguration to January 20th
Nevertheless, FDR needed to wait till MarchLame Duck Amendment
2 March (This was normal)nd Bonus Army march (a different reaction)
Immediate “Fireside Chats” to help restore hope
A “New Deal” – promises of “bold, persistent experimentation”
Federal Securities Act enact legislation that would provide relief, stimulate the economy and provide jobs passed in May of 1933 required to provide financial information if they were traded publicly
Securities and Exchange Commission (SEC)followed which regulated the sale of stock on margin
July of 1933 FDR dropped the gold standard which increased money supply =inflation =lower value of dollar =more exports =higher farm good pricesStill More Legislation
What was the “New Deal” enact legislation that would provide relief, stimulate the economy and provide jobsDo Now
Federal Emergency Relief Administration enact legislation that would provide relief, stimulate the economy and provide jobs (FERA)– support agencies that provide support
Also provided a great deal of money to public works programs– Government funded projects to build bridges, buildings, sidewalks, dams, etc.Still More Relief
Drought and misuse of farmland led to Dust Bowl Administration
Government responded by establishing SCS (Soil Conservation Service) to push more responsible farming methods (crop rotation, terracing and building barriers)More Problems
|
Virtual and augmented reality seem to be on everybody’s lips nowadays, both promising to revamp the tech scene and change the way consumers interact in the digital space. Despite the hype and media attention, the two often get confused as some people use the terms interchangeably. While there are many similarities between virtual reality (VR) and augmented reality (AR), the two are definitely distinguishable. Let’s dive into these differences.
What’s Virtual Reality?
Virtual reality is a computer simulated reality in which a user can interact with replicated real or imaginary environments. The experience is totally immersive by means of visual, auditive and haptic (touch) stimulation so the constructed reality is almost indistinguishable from the real deal. You’re completely inside it.
Marked by clunky beginnings, the idea of an alternate simulated reality took off in the late ’80s and early ’90s, a time when personal computer development exploded and a lot of people became excited about what technology had to offer. These attempts, like the disastrous Nintendo Virtual Boy which shut down after only one year, were marked by failure after failure, so everyone seemed to lose faith in VR.
Then came Palmer Luckey, who is undoubtedly the father of contemporary VR thanks to his Oculus Rift. Luckey built his first prototype in 2011, when he was barely 18, and quickly raised $2 million with Kickstarter. In 2014, Facebook bought Oculus Rift for $2 billion. Other popular VR headsets include Samsung Gear VR or Google Cardboard.
What’s Augmented Reality?
While VR completely immerses the user in a simulated reality, AR blends the virtual and real. Like VR, an AR experience typically involves some sort of goggles through which you can view a physical reality whose elements are augmented (or supplemented) by computer-generated sensory input such as sound, video, graphics or GPS data. In augmented reality, the real and the non-real or virtual can be easily told apart.
Wearing Google Glass — the biggest effort a company ever made to bring AR to mass consumers — you can walk through a conference hall and see things ‘pop to life’ around the booths, such as animated 3D graphics of an architecture model if the technology is supported. The goggles aren’t even necessary since you can do this via mobile apps which use a smartphone’s or tablet’s camera to scan the environment while augmented elements will show on the display. There are other creative means, as well.
Unfortunately, Google Glass didn’t take off and the company discontinued the product in 2015. Instead, AR apps on smartphones are much more popular, possibly because they’re less creepy than a pair of glasses with cameras.
Perhaps the most revealing example of AR is Pokemon Go, a viral phenomenon which amassing more than 100 million downloads in a few week. In Pokemon Go, you use your smartphone to find pokemons lurking in your vicinity with the help of a map that’s build based on your real-life GPS signal. To catch the pokemon you have to throw a pokeball at it by swiping on your mobile’s screen and when you toggle AR on, you can see the pokemon with the real world in the background.
Despite the hype, Pokemon GO has a minimal and basic AR interface. Some more revealing examples include:
- Sky Map — a mobile app that lets you point your phone towards the sky and ‘see’ all the constellations you’re facing in relation to your position.
- Word Lens — A Google app that allows you to point your phone to a sign and have it translated in your target language, instantly.
- Project Tango – another Google project which aims to create a sensor-laden smartphone that can map the real world and project an accurate 3D picture of it.
“I’m excited about Augmented Reality because unlike Virtual Reality which closes the world out, AR allows individuals to be present in the world but hopefully allows an improvement on what’s happening presently… That has resonance.”
Tim Cook, CEO, Apple
Virtual reality vs augmented reality
- enrich the experience of a user by offering deeper layers of interactions;
- have the potential to transform how people engage with technology. Entertainment, engineering or medicine are just a couple of sectors where the two technologies might have a lasting impact;
However, the two stand apart because:
- virtual reality creates a completely new environment which is completely computer generated. Augmented reality, on the other hand, enhances experiences through digital means that offer a new layer of interaction with reality, but does not seek to replace it.
- AR offers a limited field of view, while VR is totally immersive.
- Another way to look at it is once you strap those VR goggles, you’re essentially disconnected from the outside world. Unlike VR, an AR user is constantly aware of the physical surroundings while actively engaged with simulated ones.
- virtual reality typically requires a headed mount such as the Oculus Rift goggles while augmented reality is far less demanding — you just need a smartphone or tablet.
What’s sure is we’re just barely scratching the surface of what AR and VR can do. In a report earlier this year, BCC Research estimated the global market for both virtual reality and AR will reach more than $105 billion by 2020, up from a mere $8 billion last year.
If you’re still confused, you can always use a cinematic analogy. For instance, the world of The Matrix corresponds to virtual reality while augment reality is akin to The Terminator. Another way to look at this is to think about scuba diving versus going to the aquarium. In virtual reality, you can swim with sharks and with augment reality you can have shark pop out of your business card through the lens of a smartphone. Each has its own pros and cons, so you be the judge which of the two is better.
Bonus: What’s Mixed Reality?
We just made things pretty clear on what VR and AR are and where the boundary between the two lies. It’s Following innovation in the two fields, a third distinct medium has surfaced: mixed reality (MR).
What MR does is mix the best of augmented and virtual reality to create a … hybrid reality. I confess it gets confusing, partly because the technology is very new and it might innovate itself into something different, but the best explanation I can offer is that mixed reality overlays synthetic content over the real world. If that sounds familiar, it’s because MR is very similar to AR. The key difference here is that in MR the virtual content and the real-world content are able to react to one another in real time. The interaction is facilitated by tools you’d normally see in VR like special goggles and motion sensors used to control.
For the sake of clarity, perhaps the best way to explain MR is to see it in action — enter Microsoft’s Hololens as demoed with Minecraft.Click here for reuse options!
Copyright 2017 ZME Science
Enjoyed this article? Join 40,000+ subscribers to the ZME Science newsletter. Subscribe now!
|
The well-being of a population cannot only to be achieved by treating illnesses. Other range of factors such as people’s social, cultural and economic environments plays a significant role in their health and it cannot be ignored. On October 19th WHO is convening the World Conference on Social Determinants of Health in Rio de Janerio. The aim of the conference is to foster dialogue among Member States and stakeholders on policies and strategies aimed at reducing health inequalities. The event is also meant to engage Member States on strategizing on how recommendations of the WHO Commission of Social Determinants of Health (2008) could be taken forward. According to the commission, “the marked health inequities between countries are caused by the unequal distribution of power, income, goods, and services, globally and nationally, the consequent unfairness in the immediate, visible circumstances of peoples’ lives – their access to health care, schools, and education, their conditions of work and leisure, their homes, communities, towns, or cities – and their chances of leading a flourishing life.” The Commission’s overarching recommendations are:
- Improve daily living conditions
- Tackle the inequitable distribution of power, money and resources
- Measure and Understand the Problem and Assess the Impact of the Action
The Brazilian government has shown stewardship in beginning to address social detriments in improving its peoples’ lives. Even prior to offering to host this conference, the Brazilian government has endorsed health care practitioners decades ago that understood the correlation between socioeconomic conditions and health such as Vera Corderio. Corderio, a physician at Hospital du Lagoa, a public hospital in Rio founded Associação Saúde Criança Renascer in 1991. She could not bear to see the hospital discharge children into the same conditions that produced their diseases. They were often readmitted to the hospital only few weeks later. As a response to this vicious cycle, Renascer’s objective is to help mothers of vulnerable children learn how to prevent recurrences of illnesses and minimize crises.
Renascer employs doctors, nurses and social workers to identify poor children before they are discharged from the hospital. The families are encouraged to work with Renascer by being offered incentives such as free nutritional supplements and medicine for six months. In exchange for these incentives the families work with Renascer team in designing treatments plans and setting specific, time-bound goals. The goals range from fixing a roof to acquiring the documentation to be eligible for government assistance. By addressing these underlying social detriments, the risk of child’s readmission is reduced and the mothers adopt healthier habits. Due to the success of the program and the financial support of Ashoka and the Brazilian government, this model has been replicated to sixteen public hospitals throughout Brazil. Corderio and the Brazilian government are examples that regardless whether our approach is bottom-up or top-down, addressing social detriments to health are key to ensuring the long-term well-being of our society.
|
SIX CRITICAL PRINCIPLES OF PARENTING
Developed by Dr. Sylvia Rimm, author of See Jane Win
1) Teach healthy competition. This refers to the title, See Jane Win, and how the women in the book mentioned most frequently, as a positive experience, winning in competition to contributing to their high self-esteem. "What we have to teach girls is the excitement, exhilaration, motivation of winning, but the resilience of dealing with failing experiences. You can't win all the time. We have to let them lose and recover from losses."
2) Teach girls how to be smart. Smart doesn't necessarily mean girls have to get all A's. There are all kinds of smarts: common sense, humorous, creative. If we can help kids realize that there are many ways they can feel smart, that frees them up. Reading is also so important. "It opens up the whole world. Even growing up, I knew there was another world beyond my circumstances," admitted Oprah.
3) Encourage math. Dr. Rimm deeply believes, math is an important threshold subject. It opens up opportunities in business, science, medicine, computers and engineering. Math is the opener. Any mom, even if she's not comfortable with math herself, can encourage their daughter to be comfortable with math.
4) De-emphasize appearance and popularity. This is about perspective. If appearance is everything, we forget about the whole child. As Dr. Rimm asserts, "The whole child is smart, is strong." A girl who believes her self-esteem depends on being admired makes her dependent, and we need them to be independent. Being popular means to conform with whatever the popular norm is. In some schools that's okay, but in some schools that means the worst drinking and drug parties.
5) Be a coach, not a judge. Don't punish. Problem solve; even though it can seem so time consuming, as Oprah said. Dr. Rimm suggests that parents not ground their children. Parents don't have to take away social privileges. Instead, set limits. The belief that you'll do the right thing is what will make the difference. Kids will have this inner sense that parents are coaches, that they're on their side in an alliance, which permits them to have that inner motivation that gives them that extra boost. Also, referential speaking helps. In other words, if you can say to someone else that your daughter is doing well, that really builds her confidence.
6) Fulfill your own
dreams. If you haven't fulfilled your own dreams, how can you expect your daughter to
|
Addiction & Treatment
Designer drugs are drugs that are created in a laboratory, using chemistry to alter a plant derived drugs, like cocaine, marijuana and morphine, into a new substance. These new substances may have a new, altered affect on the user.
Designer drugs are especially dangerous because they are primarily produced in illegal, underground, labs, and there are no controls on the ingredients being used. Users often do not know exactly what is in the drugs they are taking, or how potent individual doses may be.
There are many types of designer drugs on the market, but the most commonly abused are:
MDMA (Ecstasy) – synthetic, psychoactive chemically similar to methamphetamine (stimulant) and mescaline (hallucinogen)
Initially considered a “club drug” favored by young adults in the night club and rave scenes, it has now become a popular street drug of choice amongst many types of users. It affects the brain neurons that use serotonin, and causes the release of serotonin, dopamine, and norepinephrine. The psychoactive drug creates a feeling of euphoria, decreasing stress and anxiety and heightening feelings of social connectedness, while altering reality and perception.
MDMA use is quickly rising amongst youth, and very dangerous to the health of young people. It acts as both as a stimulant and a hallucinogen, raising heart rate and blood pressure and altering inhibitions resulting in poor judgment. In high doses, it can interfere with the body’s ability to regulate temperature which can result in hyperthermia, liver, kidney, and cardiovascular shut down, even death.
LSD – an odorless, colorless chemical that comes from the ergot fungus, causing hallucinations
LSD is a potent mood altering drug that profoundly distorts reality. By disrupting nerve cells and the neurotransmitter serotonin, it results in long hallucinogenic “trips” that can last up to 12 hours. The effects can be stressful and create a panicked state, referred to as a “bad trip.” Even after the LSD has worn off, however, users can experience “flashbacks” of the trip weeks or month after the drug was used.
There are many dangers of LSD, not the least of which is that the dose and potency of the drug is unknown at the time of use, increasing panic in users and possibility of a fatal accident in their altered state. The drug can also trigger latent mental issues, resulting in long-term psychosis.
Ketamine – a dissociative anesthetic, initially used as a human anesthetic, still used in animals
Ketamine is powerful anesthetic that separates perception from sensation. This experience is often called “going into a K-hole”, in which the users experience numbness in their extremities, and dream-like sensation of being outside their body. In high doses, it can produce a hallucinogenic effect of being very far away from the body, a near-death type experience. While on ketamine, users have difficulty moving, if able to move at all.
Ketamine is a highly, psychologically addictive substance, dissociating users from their consciousness. Physically, the drug can also depress breathing, which can be lethal, particularly when combined with other depressants such as alcohol and valium.
Rohypnol – a fast-acting benzodiazepine, causing sedation, muscle relaxation, and reduced anxiety
Rohypnol have strong sedative effects, with resulting partial amnesia. Users are unable to remember some experiences while under the influence, giving Rohypnol the nickname of “the date-rape drug.” Although known for its use in sexual assaults, it is highly abused by users for profound intoxicated feeling it produces. It is often used in combination with other drugs to boost highs, or reduce the effects of stimulants.
Rohypnol is addictive and dangerous, particularly since the drug is produced illegally in the US and often with contaminates. Often taken with alcohol, it can depress the respiratory system and easily result in death.
GHB – a synthetic central nervous system depressant with a sedative effect
GHB , Gamma hydroxybutyrate, effects the GABA receptor in the brain. It is a popularly abused club drug. It produces feelings of relaxation, reduced anxiety, and social connectedness. It is also has anabolic effects, and is abused by body-builders to stimulate muscle growth.
In low doses, GHB effects are similar to alcohol and ecstasy, but in higher doses it can cause nausea, amnesia, seizures, coma, even death. It is often combined with other depressent drugs, increasing the danger of respiratory issues and death.
Designer Drug Addiction
If you or someone you love is suffering from an addiction please call the Pasadena Recovery Center at (866) 663-3030. We’re available to talk with you twenty-four hours a day, seven days a week. We promise confidentiality and professionalism. Our comprehensive treatment program will address each client’s issues on an integrated basis, understanding that addiction often has underlying emotional and behavioral issues that need to be resolved.
At Pasadena Recovery Center, our dedicated staff understands the disease of addiction and we’re proud to offer lifesaving treatment at an affordable cost. Our goal is to reintroduce sober individuals into society with the skills necessary to lead meaningful, productive lives, through a compassionate and comprehensive treatment program. There is hope and we’re here to help, so please take the first step towards a better life by contacting us today.
|
(Lekel) S Albania.
Mentioned by Ptolemy (3.14) as an inland city of Chaonia.
The site is defended by cliffs on two long sides and by
strong walls of ashlar masonry, strengthened with towers,
on two short sides; the circumference of the defensible
area was some 1700 m. The masonry and the use of
bonding cross-walls within the circuit wall date the site
to ca. 295-290 B.C., and it is likely that Pyrrhos founded
it and Antigonea at the same time. The site has great
strategic importance: it commanded the entry from the N
into the Drin valley and lay close to the mouth of the
Aous pass (Aoi Stena), leading towards Macedonia. The
two rivers join just N of Lekel.
N.G.L. Hammond in JRS
47ff, and 61 (1971) 114; id., Epirus
(1967) 212f, 699.
|
Not all sugars are bad for your teeth. Xylitol is the form of sugar that is known to replace fluoride as a healthier option for brushing. In fact, Xylitol is a secret weapon to wipe out oral desease-causing bacteria and plaque. It doesn’t contain side effects that are associated with fluoride. Pure Xylitol looks and tastes like sugar and is used in a variety of sugar- free sweeteners as well as toothpaste and mouthwash.
It is a well known fact that regular sugar is made of sucrose which produces bacteria that destroys tooth structure. Xylitol, on the other hand, is derived from natural fruits and vegetables and is also found in the human body. Xylitol prevents bacteria from attaching to the tooth surface which in turn causes decay. With consistent use of Xylitol nasty bacteria are rendered virtually harmless.
Today, gum desease and tooth decay levels have reached epidemic proportions causing more severe problems such as Diabetes and Heart Desease. Luckily, Xylitol has properties that disarm decay-causing bacteria in your mouth. Xylitol is a completely natural substance. Studies have shown that only 10 grams of Xylitol a day reduce acid – causing bacteria in your mouth by 95% over a six- month period.
Dental caries affects the population of every country. By the time an American child turns 17, almost 80 percent have experienced tooth decay. In Finland it is practically the opposite where 80 percent of high school graduates have no caries. The difference is that in Finland schools regularly distribute xylitol to the students.
Hard to imagine most people having teeth without decay, isn’t it? It is, however, possible. Dentists in the American Academy of Oral Systemic Health know and understand the importance of oral health and its contribution to overall wellbeing. They recommend daily xylitol regimen to most of their patients. As changes like this begin to take place in the dental industry, we are on the way to a healthier nation.
If you’d like to receive updates from My Family Dentistry, information and tips about dental care, promotions, and more, subscribe to our email newsletter.
|
Humans used to live longer in ancient times. Is that true? Check out here!
The life expectancy myth, and why many ancient humans lived long healthy lives
It is not uncommon to hear talk about how lucky we are to live in this age of scientific and medical advancement where antibiotics and vaccinations keep us living longer, while our poor ancient ancestors were lucky to live past the age of 35. Well this is not quite true. At best, it oversimplifies a complex issue, and at worst it is a blatant misrepresentation of statistics. Did ancient humans really just drop dead as they were entering their prime, or did some live long enough to see a wrinkle on their face?
According to historical mortality levels from the Encyclopaedia of Population (2003), average life expectancy for prehistoric humans was estimated at just 20 – 35 years; in Sweden in the 1750s it was 36 years; it hit 48 years by the 1900s in the USA; and in 2007 in Japan, average life expectancy was 83 years. It would appear that as time went on, conditions improved and so did the length of people’s lives. But it is not so simple.
What is commonly known as ‘average life expectancy’ is technically ‘life expectancy at birth’. In other words, it is the average number of years that a newborn baby can expect to live in a given society at a given time. But life expectancy at birth is an unhelpful statistic if the goal is to compare the health and longevity of adults. That is because a major determinant of life expectancy at birth is the child mortality rate which, in our ancient past, was extremely high, and this skews the life expectancy rate dramatically downward.
The early years from infancy through to about 15 was perilous, due to risks posed by disease, injuries, and accidents. But those who survived this hazardous period of life could well make it into old age.
Drawing upon archaeological records, we can indeed see evidence of this. The "Old Man of La Chapelle", for example, is the name given to the remains of a Neanderthal who lived 56,000 years ago, found buried in the limestone bedrock of a small cave near La Chapelle-aux-Saints, in France in 1908. Scientists estimate that he had reached old age by the time he died, as bone had re-grown along the gums where he had lost several teeth, perhaps decades before. He lacked so many teeth in fact that scientists suspect he needed his food ground down before he was able to eat it. The old man's skeleton indicates that he also suffered from a number of afflictions, including arthritis.
If we look again at the estimated maximum life expectancy for prehistoric humans, which is 35 years, we can see that this does not mean that the average person living at this time died at the age of 35. Rather, it means that for every child that died in infancy, another person might have lived to be 70. The life expectancy statistic is, therefore, a deeply flawed way to think about the quality of life of our ancient ancestors.
So is modern society more beneficial for health and longevity than, say, the hunter-gatherer lifestyle? To help gain an answer to this question, scientists have compared the life span of adults in contemporary hunter-gatherer tribes (excluding the infant mortality rate). It was found that once infant mortality rates were removed, life span was calculated to between 70 and 80 years, the same rate as that found in contemporary industrialised societies. The difference is that, in the latter, most individuals survive childhood (Kanazawa, 2008).
It is certainly true that improvements in food availability, hygiene, nursing care, medical treatments, and cultural innovations have resulted in far fewer deaths caused by external injuries, infections, and epidemics, but on the other hand, we face a global cancer crisis that our ancient ancestors never had to contend with on such a scale. Are we just replacing one form of death with another?
Archaeologists and anthropologists face a real challenge in trying to unravel reliable information about the age structure of ancient populations, largely due to the lack of a sufficient number ancient samples, as well as the difficulties in determining exact age. Nevertheless, we can safely say that our ancient ancestors were not dropping dead at 35, and some would have even been blessed with long and healthy lives.
|
A World Exhibition (world expo) is an international exhibition of industrial products, handicrafts often with a focus on social and technological development. World Exhibitions are meeting places, where companies have the opportunity to network and make contacts in the country.
World Expo News
Last World Expo: 2012 Yeosu South Korea
12: of May Theme ”Living Ocean and Coast”
- 104 countries participates
- Estimated number of visitors 10 million
Future World Expos
Short presentation of future Expos and bids.
Augmented World Expo – in the digital era
USA Today had an article about the Augmented World Expo 2014. In this event 200 exhibitors of virtual reality-focused tech exhibit, a doubling in size over last year that highlights the growing ubiquity of such gadgets and software. The purpose with the event is to showcase the best solutions that make the world more interactive – featuring Augmented Reality, Wearable Computing, and The Internet of Things.
World Exhibitions are important
Many technological innovations and technological breakthroughs had their début at world exhibitions such as telephone, and water flushed toilet, telegraph, hamburger, first motion picture, etc. There are many buildings and architectural masterpiece that remains after past world exhibitions and fairs. For example Eiffel Tower in 1887 was the grand entrance to the World’s Fair Exposition Universelle, held two years later.
History about World Expos
The world exhibitions have evolved from the early fairs and markets. The phenomenon of international exhibitions started in the late 1800s. At that time it was popular with the arrangements in European and American cities, like Paris, New York, London, Vienna and Philadelphia. Over the years there have been several world exhibitions or world expos.
Facts and landmarks in the history of world expos:
World Expos have been arranged in all continents except Africa. The great world exhibitions are every five years. Some of the most successful international World Expos ever:
- 2010: Shanghai China: Theme Better City, Better Life
- 1992 Sevilla Spain: The expo in Sevilla celebrated 400 anniversary since America was discovered by Columbus.
- 1967 Montreal, Quebec: Canada’s first World’s Fair, the century-old confederation was celebrated at the same time.
- 1958 Brussels: The World’s first Fair after the Second World War with the famous Atomium monument to showcase the atomic age.
- 1939, New York, USA – Futurama: The first major display of the television, as well as the television camera and tape recorder. Read more about Futurama
- 1901 Buffalo, USA: The X-ray machine was displayed. The Buffalo Pan American exhibition was also the scene of the assassination of U.S. President William McKinley. The president was murdered when he participated in an appearance at a reception.
- Chicago 1893: Exhibition in Jackson Park City. The architectural projects had tremendous influence on American architecture. 27 million visitors.
- 1889, Paris, France: Eiffel Tower is being built and the phonograph is shown.
- 1876 Philladelphia: Thomas Edison had a huge success at Philadelphia Expo
- 1851 London, UK: Considered the World’s first Fair and the event was a great success.
Who own the concept of World Expos?
Bureau of International Expositions (BIE) is an international organization that owns the rights to the concept of the World Expos in the same way as the International Olympic Committee takes the concept of the Olympic games. International Exhibitions Bureau was established by a diplomatic international Convention, signed in Paris, in 1928. Today BIE has 156 member states. Official website from BIE
|
The research, published in the Annals of Internal Medicine, is based on an analysis of 50,000 men and women. Researchers used bone-density tests, which show the amount of fat an individual carries.
he academics found those with the lowest BMI had a higher risk of dying early than those with an average BMI, probably because of pre-existing illness or malnutrition.
Those with high body fat scores also had a high risk of dying early, no matter what their BMI.
Dr William Leslie, from the University of Manitoba in Canada, told the Daily Mail: “The simple messaging that we’re all too fat and should be thinner is based on BMI.
|
The Building of the Cathedral
The Norse Cathedral
The Usage of the Cathedral in History
The Usage of the Cathedral Today
The Art of the Cathedral
Behind the Scenes in the Cathedral
Famous Orcadians & Others With Links
Blind arcadings - SMC056
An arcade is a series of connected archways which are carried on either columns or piers. A blind arcade, sometimes called a wall arcade, is a set of connected archways set into a wall.
In St Magnus Cathedral blind arcading can be found on both sides of the nave and in both transepts and is clearly Romanesque in style. As the arcading travels no further than the fifth bay of the nave this can be seen as the extent of the first building campaign.
Wall arcading was used as an ornamental feature to vary plain areas of masonry and also as a method to decrease the weight of a wall.
|
Increasing voter awareness, ensuring protection from voter intimidation, and changing abusive gerrymandering laws are crucial to putting power back into the hands of voters. This list is a work-in-progress, but issues we are concerned about are below.
The 2016 election was the first time since the Voting Rights Act was gutted in 2015. This made a great impact on the election, and was designed specifically to target African-American voters.
— Conjecture on the Future of Voting Rights
— Voting Problems Present in 2016, But Further Study Needed to Determine Impact
– Unlocking the Power of the “Sista” Vote is More Complex Than You Think
– How States Moved Toward Stricter Voter ID Laws
SEE VOTING RESTRICTIONS MAPS VIA:
BRENNAN CENTER OR ACLU
FOCUS ON VOTER-ORIENTED SOLUTIONS
>>> such as: 2017 North Carolina redistricting in the fall = GROUND GAMEEEEEEZZZZ to get voters to vote in the fall election to choose a new legislature
>>> governors of Virginia and New Jersey
(2) research and focus on districts that are particularly flippable;
(3) network with local organizations and collate across-the-board best practices;
(4) use those to combat and/or work around discriminatory laws which are unlikely to change soon;
—–> (eventually) gain progressive footholds;
———-> (even longer-term) overturn crappy voting rights policies;
—————> (forever and ever) repeat!
- VOTER REGISTRATION
— Learn effective ways to conduct voter registration drives
— Work with existing organizations to register: LGBTQ, youth voters, African-Americans, Hispanics, Asian-Americans
— Pledge to take others to the DMV to attain their Voter IDs
- GOOD PRACTICES
— Early voting
— Engage voters to call their constituents, make demands, keep a constant dialogue going
- VOTER INTIMIDATION: Where and who is trying to combat it already?
— Asian-American groups
— Black Panthers
— More groups
— Various civil rights and lawyers groups
- VOTER GUIDES: How to encourage development and promotion?
— Tech-friendly, issue-by-issue simplifications, like ballot.fyi (CA)
— Philosophically-vetted, like The Progressive Voters Guide of Washington State
— Politically transparent, like California League of Conservation Voters’ legislative scorecards
— National Election Protection Coalition (!!! !!! !!!)
— Search more via the term, “Election Protection”
PUSH LEGISLATIVE ACTIONS
- PAST LAWS & PRECEDENTS: What’s negative or positive about them?
— Project Vote v. Blackwell (Ohio)
— Help America Vote Act (HAVA)
- BILLS THAT DIDN’T PASS: Why not?
— Voter Empowerment Act
- LAWS IN POTENTIAL DANGER: How can they be defended?
— National Voter Registration Act or voter registration drives
- DISTRICT-BY-DISTRICT BREAKDOWNS: What’re the demographics of flippable districts?
— Sister District
- GOOD PRACTICES: How likely are they, state-by-state?
— Ranked voting in Maine
— Paper ballots
— Early voting
- GERRYMANDERING: What can combat it?
— California Citizens Redistricting Commission
- VOTER INTIMIDATION: What are the laws against it?
— Snopes re: Breitbart claims about the DoJ
— ACLU breakdown of laws
- LESSER-KNOWN DISCRIMINATORY PRACTICES
— Interstate Crosscheck Program
— “Exact match” voter registration processing systems
— List maintenance tricks like wrongful purges, voter caging, “no match, no vote” programs
SUPPORT ORGANIZATIONS THAT PROMOTE VOTER’S RIGHTS
|National||Black Youth Vote!
Black Youth Vote! identifies youth-focused organizations in communities and on campuses, and engages their youth leaders on the effects of the political and civic process. BYV! develops tactics to increase civic engagement among young adults, including: civic education, issue education, voter registration, message development, voter mobilization, voter protection and accountability. (BLACK VOTERS)
|National||Election Protection Coalition
The national, nonpartisan Election Protection coalition was formed to ensure that all voters have an equal opportunity to participate in the political process. Made up of more than 100 local, state and national partners, Election Protection works year-round to advance and defend the right to vote.
FairVote is a non-partisan, 501(c)(3)h non-profit organization that seeks to make democracy fair, functional, and more representative. Operating since 1992 and with a staff of more than 20 people in 2016, they work with scholars, civic leaders, policymakers, journalists and national, state, and local reform partners to advance fairer elections. In this section, you can read more about our story, our staff, upcoming employment opportunities and opportunities to support our work.
|National||League of Women Voters (Various)
The League of Women Voters is a citizens’ organization that has fought since 1920 to improve our government and engage all citizens in the decisions that impact their lives. We operate at national, state and local levels through more than 800 state and local Leagues, in all 50 states as well in DC, the Virgin Islands and Hong Kong. Find a local league.
|National||Mi Familia Vota (Arizona, California, Colorado, Florida, Nevada, Texas)
Mi Familia Vota has integrated local organizing, leadership development, advocacy and building broad community partnerships with their voter engagement work; focusing on local, state and federal elections. Comprehensive immigration reform, education, healthcare, workers’ rights, climate change and the environment, and voter rights have been the core issues at the heart of their work, locally and nationally. (HISPANIC VOTERS)
|National||National Coalition on Black Civic Participation
The National Coalition on Black Civic Participation (The National Coalition) is a 501©3, non-profit, non-partisan organization dedicated to increasing civic engagement and voter participation in Black and underserved communities. The National Coalition strives to create an enlightened community by engaging people in all aspects of public life through service/volunteerism, advocacy, leadership development and voting. (BLACK VOTERS)
|National||Project Vote (Washington DC)
Project Vote is a national, nonpartisan, nonprofit organization founded on the belief that an organized, diverse electorate is the key to a better America. Project Vote’s mission is to build an electorate that accurately represents the diversity of this nation’s citizenry, and to ensure that every eligible citizen can register, vote, and cast a ballot that counts.
|National||Verified Voting (California)
A non-partisan non-profit organization that advocates for legislation and regulation that promotes accuracy, transparency and verifiability of elections.
VoteRiders is making sure that no eligible citizen is denied his or her right to vote for lack of ID. VoteRiders focuses on states with government-issued voter ID laws or that require documentary proof of citizenship to register to vote. Our current priority state is Wisconsin, and we are also supporting efforts in AL, AZ, FL, GA, IN, KS, MS, NC, ND, NH, RI, SC, TN, TX, and VA.
|National||The Voter Participation Center (Washington DC)
The Voter Participation Center’s mission is to increase civic engagement among the Rising American Electorate: unmarried women, people of color, and millennials. The Rising American Electorate is responsible for over 80% of the growth in the U.S. population since 2000, and now comprises the majority of voting-eligible Americans. But because RAE members are statistically less likely to be registered to vote or engaged in the political process, they’re underrepresented in the voting booth.
|National||Voto Latino (Washington DC)
To date, Voto Latino has registered more than 300,000 young voters, innovated the use of text messaging by launching the first text-to-register voter registration campaign, co-founded National Voter Registration Day and informed our audience of restrictive voting laws in their area via social media. (HISPANIC VOTERS)
ACCE Institute has worked up and down the state door knocking and phone banking voters and connecting the issues that matter most to them with the importance of voting. ACCE Institute’s reach during elections includes 66,000 voters in their geographies from San Diego to Sacramento.
|California||ArtsVote (Los Angeles)
The ArtsVote Campaign is a multi-strategy campaign designed to engage residents, provide opportunities for public discourse, bolster volunteerism, and provide avenues for arts organizations to show their #ArtsVote power.
|California||Building Bridges Not Walls
Building Bridges, Not Walls works to empower Californians to engage in the electoral process and vote for candidates and policies that will move America forward. They encourage Californians to register and turn out to vote, and want to engage them to become activists who will in turn encourage people in swing states to engage in the electoral process.
|California||California League of Conservation Voters
The California League of Conservation Voters (CLCV) is the non-partisan political action arm of California’s environmental movement through voter education and electoral campaigns.
|California||LA Youth Vote (NOT ACTIVE)
Student Leaders registered over 3,000 of their peers across LAUSD for the May 19th, 2015 general election. (YOUTH VOTERS)
|Georgia||New Georgia Project
A nonpartisan effort to register and civically engage Georgia’s population, which is growing and becoming increasingly diverse. In 2014, NGP launched an ambitious voter registration program resulting in roughly 69,000 new voters making the polls. They meet new voters in their communities and advocate for voting rights reforms.
|Georgia||The People’s Agenda
Citizen Education program for students and adults, designed to empower the electorate.
|Kentucky||Kentuckians for the Commonwealth
KFTC members understand the importance of voting, and we also know that a healthy democracy requires so much more. They work to strengthen democracy in Kentucky by empowering voters, making their voices heard in the Kentucky General Assembly and the Congress, working to restore voting rights, and encouraging people to participate in KFTC’s own democratic process and that of other local institutions.
|Minnesota||Citizens for Election Integrity Minnesota
Citizens for Election Integrity Minnesota (CEIMN) is a nonprofit, nonpartisan organization that advocates for verifiable, transparent, and accurate elections in Minnesota and across the country. CEIMN was formed shortly after the 2004 election after learning of reports in Ohio of electronic voting problems, the disenfranchisement of minority voters, discarded ballots, and other voting irregularities.
|North Carolina||Democracy North Carolina
Democracy North Carolina is a nonpartisan organization that uses research, organizing, and advocacy to increase voter participation, reduce the influence of big money in politics and achieve a government that is truly of the people, by the people and for the people. Democracy NC grew out of Democracy South which began as a project of the Institute for Southern Studies.
|Wisconsin||Dane County Voter ID Coalition
The League of Women Voters Dane County has joined with the Dane County NAACP to form the Dane County Voter ID Coalition. The mission of the Coalition is to educate voters about the requirement to show a voter photo ID to receive a ballot on Election Day or when voting absentee. A specific goal is to identify voters who may not have an acceptable voter photo ID, and to arrange for direct assistance to those voters who may need help obtaining one.
|Wisconsin||League of Women Voters of Dane County
The League is a non-profit, non-partisan, national organization whose purpose is to promote informed and active participation of citizens in government at all levels. The League came into being in 1920.
|
Earth Rangers online strategy shows kids they can make a difference
Course: CDPR108, Ryerson University, Toronto
Week 8, October 29, 2012
This blog covers my weekly assignments and learning for Ryerson University’s Social Media in PR course, part of Ryerson’s well-respected public relations certificate program. Follow this blog through the fall 2012 semester as we move from A – Z in social media.
We’re moving on to social web strategies this week – how to develop them and what makes them successful. That got me thinking about how one organization uses a social web strategy to build environmental awareness in young children.
Last year, my daughter became an Earth Ranger and quickly raised $50 to protect the habitat for an endangered animal.
After hearing about it on TV, she went to the website and with little help from me found out about four endangered species, chose an animal to support, set up her fundraising campaign and spread the news by e-mail and on Facebook. She was eight years old.
Fifty dollars doesn’t sound like much, but fundraising is beside the point. The important thing is the strong impression this experience made on her. She loves animals and felt she was making a difference by getting involved. We were proud of her initiative, and we weren’t the only ones who noticed. We expected grandparents and other usual suspects to answer her call. We didn’t expect neighbours and our broader circle of friends to cheer her on, and even donate. But they did. She liked wearing the mantle of environmental protection. She liked being known for standing up for animals and the wild parts of our world. It made her feel good.
Earth Rangers is a charity whose mission is “to educate children about the importance of biodiversity and empower them to protect animals and their habitat,” according to its website. What can we learn from their strategy?
1. Create content your audience enjoys
The key to this strategy is that it uses something kids are naturally attracted to – animals. Earth Rangers tells stories about animals whose homes are threatened to teach children about environmental conservation and the effects of urbanization, industrial development, climate change and other factors on the environment. Children know animals are part of the natural environment and feel that animals are important. Therefore, they can easily understand that protecting the places they live is also important. Using animals to tell stories is interesting for kids and effective in helping the organization live up to its mission statement.
This is not the “social” part of Earth Rangers’ strategy, but the point is relevant when thinking about creating content for a social web strategy.
2. Create ways to get involved
Another important aspect of this strategy is allowing kids to take action by becoming an Earth Ranger (essentially an environmental ambassador) and raising money to protect the habitats of endangered species.
The site makes fundraising easy by leveraging social channels and gives children a sense of ownership and pride in protecting the environment. Crowdsourcing ideas, sharing stories and know-how, or sending pictures of experiences can do the same thing – reinforce membership in the community, build relationships and create ownership of issues.
3. Make it fun and accessible
Because the target audience is young children whose reading skills are still developing, the organization uses video effectively on its website, You Tube and Facebook page to help kids get the message. The content is colourful and takes many forms – from games to contests – keeping it fresh and fun for kids.
4. Don’t forget “un-social” channels
This strategy includes traditional TV and print advertising and media relations, as well as a website and social media channels, primarily Facebook, You Tube and Twitter. The website features animal and conservation information, multi-media content (Wild Wire blog, pictures, fun facts, games, contests, pictures, maps, video) and news about conservation and Super Earth Rangers – kids whose fundraising efforts are featured.
5. Facebook and Twitter keep community engaged between campaigns
In this strategy, most of the action happens on the organization’s website. Facebook and Twitter are used to maintain the audience between activities and campaigns and remind children that being an Earth Ranger doesn’t end with reaching their fundraising goal. The Facebook platform seems to be the most popular. It has generated over 110K likes on stories and pictures, and its posts often generate hundreds of comments from the community.
6. Being too slick can smother community interaction
As a social web strategy, one weakness in Earth Rangers’ effort is that two-way and lateral conversation on their social channels is somewhat meagre. Although the community does comment heavily on the Facebook page, the overall communications effort is pretty slick and does not take advantage of user-generated content. Their blog features real participants from time to time and generates comments, but not that many. Asking actual Earth Rangers to share real success stories in words, video or pictures would reinforce the pride they share in their role as ambassadors for the cause.
Have a look at their website. Maybe a child you know would like to be an Earth Ranger too.
|
Hi! Over the last couple weeks I've shared some of my favorite tricks for planning a story, bubble-mapping and drawing. Both of those are strategies I use for brainstorming and planning a story. This next strategy focuses on organizing your ideas so that you're ready to write.
Equipment required: Colored pens, index cards*, and tape.
It's likely that as you've thought about your story, some of the story's moments have become very clear in your head. Examples: Your hero meets her mentor. Your hero steals a golden apple. Your villain hacks into the NORAD computers, and thinks he's undetected.
Write each of these idea-moments on a separate index card.
Notice that I've used two colors on this card. Each major character has his or her own color. That way, when I organize the cards, I'll be able to follow each of their storylines and see any gaps. (When a major character is offstage, as, for example, the wizard Simon is in parts of the Jinx books, you still need to know where s/he is and what s/he's doing.)
Now look at your bubble-maps. (See last week's post.) Read through them carefully. Identify anything in your maps that looks like it should be a scene or a story-moment.
Make a separate index card for each of these story moments.
Keep making index cards till you run out of scenes and story moments.
(Note: If I have a lot I want to write on a card, I sometimes start out with a Sharpie, but finish with a ballpoint pen.)
Now, it's time to play with your cards.
Sort through them. You'll notice that some of the scenes clearly belong at the beginning of the story, others near the end. Lay them out on a flat surface, in the order in which you think they might occur. The beginning of the story goes at the top, the end of the story at the bottom. If two or more ideas seem like they should happen at the same time, put them side-by-side.
Keep moving them around till you think you've got them where you want them.
You'll probably find some of your cards don't fit in anywhere. That's okay. It may be that those scenes don't actually belong in the story, or it may be that you'll figure out a place for them later.
You may also find gaps. Don't worry about that right now either.
When you think you have all the cards in the right order, tape them to the wall.
Now it's time to fill in those gaps.
Take some more blank index cards. Think about what scenes you might use to fill in the gaps. Jot them on the cards, and add them to the wall.
Read through what you've got.
Now look at the storyline for each of your main characters. (Just follow his or her color-code down the wall.) Do any individual characters have gaps? It's okay, for now, if they do. They may end up having gaps in the story. Just remember that you've always got to know where the major characters are, and, if they leave the story in the middle, you have to know what became of them. If a major character is left hanging, fill in an index card to show what he's doing.
When your wall of cards is finished, you're ready to write.
You can start writing your novel directly from what's on the wall.
Or you can divide your wall into chapters, hanging a slip of paper with the chapter number on it next to each section on the wall. (I've done that in the last picture above.)
Or you can use your wall display as a basis for a traditional written outline.
I've tried all of these, and they all work.
And there you have 'em, as Casey Kasem used to say. My three main strategies for pre-writing a novel. I hope you find them useful for planning your own.
*Some writers use sticky notes instead of index cards. I like the index cards because they're sturdier, easier to rearrange, and cheaper.
|
The three basic types of ladders are straight (extension), step and step/extension. Stepladders include step-stools and platform ladders, generally for home or light commercial use.
Quality classifications of step/extension ladders include consumer (household), commercial (mechanic) and industrial grades.
Metal ladders, usually made of aluminum, require little if any maintenance. Wood ladders should be treated with two coats of clear penetrating sealer or varnish. Opaque sealers should never be used on wood ladders because they hide cracks or other defects.
Hinges and other moving hardware should be lubricated periodically. If the metal is not rustproof, it should be treated periodically with clear varnish or other rust proofing material.
Ladder rungs are either flat, round or "D" shaped. Stepladders use 3" or greater channels for flat steps. "D" rungs are preferred for step/extension and straight ladders. Their flat top surface is more comfortable to stand on.
Rungs must be capable of carrying an 800-LB. load as a household ladder, a 900-LB. load as a commercial ladder, and a 1,000-LB. load as an industrial ladder. The minimum size considered acceptable for round rungs is 1-1/4 and 1-1/2 the minimum for "D" rungs.
Standards established by the American National Standards Institute (ANSI) and required for ladder identification are:
All ladders should bear labels with ratings, sizes and maximum standing heights.
There are four major points to consider when selecting a ladder: the kind of activity involved, the demands of the application, the height of the ladder must reach so the climber may work from a safe position, and the basic material from which the ladder is made.
Activity: In most cases, the activity involved will make the choice fairly obvious. For example, a stepladder would be the choice to paint the outside walls and ceilings; an extension ladder usually is needed to paint outside. If the job involves more effort than usual, or will require more time on the ladder, consider "upgrading" to a ore-efficient or capable design. For example, a platform ladder in place of a stepladder.
Application: Ladders are constructed to safely hold a certain amount of weight, which includes the user, clothing and tools. Therefore, ladders are matched or job rated to the physical demands and abuse of the application. For example, a ladder used daily on a construction site should feature more-sturdy construction (or higher-duty ranking) than the ladder used a few times a year for light chores around the house.
The heavier-duty ladder, while it costs more to build and buy, is better suited for commercial or industrial use, because it will stand up under more frequent and rigorous use. The homeowner may prefer a lighter and more economical "household"-duty ladder for less-frequent use and less-demanding application.
Because the most critical point involved here is the rated-load capacity, or the working weight of the user, his clothing and tools, the duty rating is described in terms of pounds.
Household-rated ladders are economical, lightweight and dependable for around-the-house use. They represent an excellent value. Commercial-rated ladders are engineered for the handyman, painter, mechanic and for general use. Industrial-rated ladders are for the heavy climber, for daily use. Stable, strong and built to take it, industrial ladders are intended for contractors, maintenance and industrial work.
Every ladder's duty rating is prominently displayed by a color-coded label on the ladder side rail. Look for the proper duty ratings to match the highest level of use.
Height: Beyond the actual ladder height, the height of the maximum safe working position on the ladder must be considered. With stepladders the ladder should be high enough so the user does not stand above the second step from the top. The first step from the top carries a label warning the user not to stand on that step. With extension ladders, the user should stand no more than four rungs from the top.
The final consideration is which ladder material is best suited to your needs. The three most common and generally available materials for ladders are wood, aluminum and fiberglass. Each has certain characteristics that make it the preferred material for certain uses.
Because clean and dry wood ladders are nonconductive, they offer a margin of safety when working near electricity. They also offer a natural firm grip for the worker's feet and hands. However, wood ladders are heavy. A pleasing traditional look, wide availability and outstanding economy are among wood ladders' strongest attributes.
Aluminum's strongest advantage is its light weight in combination with strength. Aluminum is also corrosion resistant, economical and performance is reliable. However, because aluminum ladders conduct electricity, they should never be used when working near energized electrical lines.
Fiberglass offers a favorable blend of desirable characteristics when compared with wood or aluminum. Being nonconductive (like dry, clean wood), yet made of modern and rugged materials (like aluminum), fiberglass ladders have become a leading choice for applications where they must be used regularly in widely varying circumstances.
|- Alkyd primer needed on new wood. Two- or three-day wait recommended before any oil-base paint is applied after rain. Not recommended for application over masonry. Requires 12 to 48 hours to dry, depending on local conditions. Brushes and tools clean with turpentine.|
|- Need alkyd or good latex primers on new wood. Have chemical binder instead of oil. Resistant to moisture. Dry to touch in 30 minutes (under normal conditions). Brushes and rollers wash in water.|
|- Need latex primer on new surfaces. Should be applied in heavy layers. Takes 4 to 12 hours to dry. Brushes and rollers wash in water.|
|- Latex paints are waterbased; alkyd paint, oil-base. Waterbase paints dry faster than oil, and, as a rule, do not give off "painty" odors common to oil quality alkyd paints form a tough non-porous surface which makes them more washable than latex. Latex is easier to use because clean-up is done with water.|
|- Require undercoat and surface preparation. Go on like paint, but look like porcelain after they dry. Used on ceramic tile, walls, bowls and appliances. Will not stick if applied over ordinary paint. Toughest finish available.|
Check your state and local codes before starting any project. Follow all safety precautions. Information in this document has been furnished by the North American Retail Hardware Association (NRHA) and associated contributors. Every effort has been made to ensure accuracy and safety. Neither NRHA, any contributor nor the retailer can be held responsible for damages or injuries resulting from the use of the information in this document.
Don't forget to select your local Rocky's Ace Hardware for free local pickup
|
Many kids love to look for animal tracks. When it snows, you might say, "Look at those tracks in the snow. What animal was hopping or running here recently?" If you are walking in the woods or the park, you may see animal tracks in the mud. It is easy to learn about animal tracks and how to identify them. This is a fun hobby for many kids, and you may want to research more about the animals or the habitats you were exploring when you are finished identifying animal tracks.
Research the common animals in your community or the environment where you will be exploring. For example, if you are going to look for animal tracks in your backyard, you may want to research footprints of dogs, cats, squirrels, rabbits, coyotes, and raccoons, depending on where you live. When you are doing your research, you can use the Internet or a library book to see what an animal's footprint usually looks like.
Draw sketches, make copies, or print out pictures of the animal tracks that you want to look for in your yard or in the park. You may want to make copies and draw sketches, so you are more familiar with what the tracks look like. Put these copies in a folder or backpack, so you can refer to them when you are outside looking for tracks. It is easier for kids to learn about animal tracks if they have examples to look at when they are outside.
Go to the spot that you want to explore and look for tracks. You may want to bring a camera, pencil and sketch pad, as well as the other items listed in Step 2. It is easiest to look for tracks in freshly fallen snow or in a muddy yard. Animal tracks are harder to find in dirt and grass.
Find a track and try to identify it. Ask yourself questions like, "What is the shape of the print?" "Is it large or small?" "Are the toes separated or together?" "Do I see claw marks or just footprints?" When you have the answers to your questions, try to guess which animal left the track. Then remove your sample animal track printouts from your backpack, and compare your results with the track on the ground. If you guessed the track was left by a squirrel, does the track on the ground match the squirrel's track in the photo?
Take a picture or draw a sketch of any animal track you cannot identify. Then when you get back to your house or to the library, you can research and try to find the name of the animal who left this mystery track. You can also do more research on the animal tracks you found by discovering what the animal likes to eat or places where it usually lives and so on.
|
Keywords: bacteria, biodegradation, filters, groundwater, microorganisms, organic compounds, phenols, pollutants, sand, water treatment, water supply, water quality, water pollution, environmental pollution, chlorophenolic contaminants
Secondary removal of chlorophenolic contaminants in water
In this study, several factors important for the design of a water supply treatment system for the removal of trace amounts of organic contaminants by microorganisms in a fixed-film were assessed. This entailed evaluating the effect of seeding with adapted microorganisms on the acclimation time, determining what depth of support material was required for removal of contaminants and observing the effect of hydraulic loading rate on the contaminant removal efficiency by the microorganisms. The study was conducted in the laboratory using sand columns as fixed-film biological reactors. Pentachlorophenol (PCP), 2,4,6 trichlorophenol and 2,4 dichlorophenol were used as the test contaminants. Dechlorinated Philadelphia tap water, which contained concentrations of dissolved organic matter (DOC) in the range of 1 to 4 mg/l, was used as the source water. The DOC of the source water served as a primary substrate for microbial growth in the sand columns. The total concentration of the contaminants added to the source water ranged between 200 and 800 μg/l, making them available as secondary carbon sources for the attached microorganisms. The columns were operated in a downflow mode and the hydraulic loading rates through the columns were varied from 0.5 gpm/ft² to 3 gpm/ft² (1.2 m/hr to 7.3 m/hr). It was observed that each cycle of operation of the treatment system could be divided into three different stages: acclimation; equilibrium removal; and clogging. Acclimation is the period of time between initial startup and equilibrium removal of the contaminants. Equilibrium removal was defined as the consistent removal of the contaminants for at least four days. Clogging of the sand with biological growth was found to occur after long term operation in shallow depths of sand. The acclimation time and the establishment of an adapted population were not shortened by seeding the sand columns with laboratory acclimated cultures. During the second stage, equilibrium removal, the removal of DOC decreased with depth as a first order relationship. However, the removal of the contaminants was observed to be zero order. Removal of the contaminants decreased with increasing hydraulic loading rate. Reductions of 80% or more of μg/l amounts of the chlorophenolic contaminants was achieved in a one inch depth of sand.
|
Freshwater mussels: western ridged mussel (Gonidea angulata)
(Bivalvia: Unionoida: Unionidae)
Profile and maps prepared by Sarina Jepsen, Caitlin LaBar, and Jennifer Zarnoch, The Xerces Society for Invertebrate Conservation
The western ridged mussel (Gonidea angulata) is widely distributed from southern British Columbia to southern California, and can be found east to Idaho and Nevada. G. angulata inhabits cold creeks and streams from low to mid-elevations. Hardhead, Pit sculpin and Tule perch are documented fish hosts for G. angulata in northern California, although little is known about the fish species that serve as hosts for this mussel throughout other parts of its range.
G. angulata is sedentary as an adult and probably lives for 20-30 years, and thus can be an important indicator of habitat quality. G. angulata is a filter feeder that consumes plankton and other suspended solids, nutrients and contaminants from the water column. The large beds of G. angulata can improve water quality by reducing turbidity and controlling nutrient levels. Some Native American tribes historically harvested this animal and used it for food, tools and adornment.
Populations of G. angulata have likely been extirpated in central and southern California, and it has probably declined in abundance in numerous watersheds, including the Columbia and Snake River watersheds in Washington and Oregon. The western ridged mussel belongs to a monotypic genus and thus should be considered a high priority for conservation. Lack of information on the western ridged mussel’s current and historical abundance and distribution, and a lack of understanding of which host fish species it uses will impede conservation efforts.
Figure 1. Photograph of Gonidea angulata shell exterior (above left) and interior (above right) © Ethan Jay Nedeau, reproduced from the field guide Freshwater Mussels of the Pacific Northwest (Nedeau et al. 2009).
Gonidea angulata belongs to a monotypic genus. This species is obovate to trapezoidal in shape and generally does not exceed five inches in length. It is slightly laterally compressed. The shell has an angular ridge that runs from the beak to the basal part of the posterior margin. The ventral margin is generally straight. The shell is heavier than that of other native freshwater mussels that overlap in range with G. angulata (Margaritifera falcata and Anodonta spp.). The periostracum is yellowish-brown to brown or black. The shell does not have rays or sculpturing. Lateral teeth are absent. The right valve has one pseudocardinal tooth and the left valve has either one small tooth or no teeth. The pseudocardinal teeth are small, compressed, and can be difficult to distinguish. The nacre is generally white, but can be salmon-colored in fresh specimens and pale blue toward the posterior margin and beak cavity. (Burch 1973, Clarke 1981, and Nedeau et al. 2009).
Gonidea angulata (Lea, 1838). The taxonomic status of this species is uncontested (Turgeon et al. 1998).
Type locality: “Lewis’s River” (now interpreted as Snake River, Idaho, no specific locality) (reported in Taylor 1981).
Species: Gonidea angulata
Freshwater mussels, including G. angulata, are filter feeders that consume phytoplankton and zooplankton suspended in the water. Gonidea angulata is a relatively slow growing and long lived species – perhaps living 20 to 30 years (COSEWIC 2003, Vannote and Minshall 1982). Low shear stress (shear stress is caused by fast flowing water over substrate), substrate stability, and flow refuges are important determinants of freshwater mussel survival (Vannote and Minshall 1982). G. angulata occurs on the bottom of streams, rivers and lakes with substrates that vary from gravel to firm mud, and include at least some sand, silt or clay (COSEWIC 2003). This species is more common on the eastern side of Oregon and Washington than the western side (pers. comm. with A. Smith, mussel workgroup meeting, 2008). It is generally associated with constant flow, shallow water (<3 m in depth), and well oxygenated substrates (COSEWIC 2003). This species is often present in areas with seasonally turbid streams, but absent from areas with continuously turbid water (i.e. glacial melt water streams) (Frest and Johannes 1992). In Idaho, G. angulata is abundant in areas with sand and gravel bars, and less abundant in more stable, boulder dominated reaches, suggesting that it can tolerate soft, fine sediments (Vannote and Minshall 1982). G. angulata generally occurs at low to mid elevations (Nedeau et al. 2009) and it may be more common at downstream sites than headwater sites, as seen in an eastern Oregon study (Brim Box et al. 2006). Many sites where this species has been found lack dense macrophyte beds. Typically, individuals of this species are found buried to at least half their length in fine substrate, with the posterior end facing upstream (COSEWIC 2003). G. angulata can occur in dense beds, with densities of ~575/m2 (Brim Box et al. 2006).
Reproduction and Host Fish Associations
Freshwater mussels, including G. angulata, require a host fish to reproduce and disperse. Because freshwater mussels are not able to move far on their own, their association with fish allows them to colonize new areas, or repopulate areas from which mussels have been extirpated. Fertilization occurs when female mussels inhale sperm through their incurrent siphon during the appropriate reproductive period. Eggs incubate and hatch into larvae, or glochidia, which are released into the water, either individually or in packets (called conglutinates). Glochidia will attach to fish and encyst in host fish tissues from 2-36 hours after they attach. Glochidia attach to host fish for a period of weeks to months. Once metamorphosed, juvenile mussels drop from their host fishes to the substrate. (McMahon and Bogan 2001).
Gravid G. angulata females have been found from late March through mid-July, and glochidia have been observed on fish from late March to early August (Spring Rivers 2007, COSEWIC 2003). Gonidea angulata glochidia are released in watery mucous and conglutinates are white, leaflike and joined in small groups at the dorsal end (Barnhart et al. 2008). Once glochidia are released, they attach to a fish host. In northern California, the release of glochidia apparently peaks in June, and the glochidia are probably excysted from fish primarily during the period from late June to late July (Spring Rivers 2007). The presence of glochidial host fish is necessary for the reproduction of mussel species. Although the entire suite of host fishes for G. angulata is not known, three native fish have been documented as hosts for G. angulata in northern California: hardhead (Mylopharodon conocephalus), Pit sculpin (Cottus pitensis), and tule perch (Hysterocarpus traski); these three species have been infested with G. angulata glochidia in the wild, and metamorphosis of the glochidia was observed (Spring Rivers 2007). The native Pit roach (Lavinia symmetricus mitrulus) and the non-native black crappie (Pomoxis nigromaculatus) may also serve as fish hosts for G. angulata in northern California – these fishes have been infested with G. angulata glochidia in the wild, but metamorphosis was not observed (Spring Rivers 2007).
Table 1. Documented fish hosts for Gonidea angulata from a study in the Pit River drainage of northern California (Spring Rivers 2007). In order to determine that a fish is a host for G. angulata, glochidial infestation of the fish must have been observed in the wild and metamorphosis of the glochidia must have been observed.
|Fish species||Is fish species native to western U.S?||Glochidia infestation observed on G. angulata (natural or artificial)||Glochidia metamorphosis observed on G. angulata||Reference|
|hardhead, Mylopharodon conocephalus||
|Spring Rivers 2007|
|Pit sculpin, Cottus pitensis||
|Spring Rivers 2007|
|tule perch, Hysterocarpus traski||
|Spring Rivers 2007|
Table 2. Potential fish hosts for Gonidea angulata. The fish species listed below may be host fishes for G. angulata, but glochidial metamorphosis has not been observed on these fish.
|Fish species||Is fish species native to western U.S?||Glochidia infestation observed on G. angulata (natural or artificial)||Glochidia metamorphosis observed on G. angulata||Reference|
|Pit roach, Lavinia symmetricus mitrulus||
|Spring Rivers 2007|
|black crappie, Pomoxis nigromaculatus||
|Spring Rivers 2007|
Gonidea angulata is broadly distributed in Washington, Oregon, California, Idaho, Nevada, possibly Montana (see Gangloff and Gustafson 2000), and southern British Columbia. The maps in Figures 2 and 3 illustrate watersheds that contain records of Gonidea angulata prior to 1985 (red) and records of G. angulata observed or collected after 1985 (blue). Watersheds that contain records with no date associated are displayed with diagonal hash-marks. One may conclude that G. angulata has been extirpated from watersheds with only historical records (red), but that assumption may be inaccurate if surveys have not been conducted in that watershed since 1985. To address this issue, we created a map of ‘search effort’ (Figure 3). Black dots represent locations where an individual searched for or collected any species of freshwater mussel. Of the thousands of mussel records and ‘search effort’ records that we received, we generally only had the capacity to map records that had geographic coordinates associated with them, which was a fraction of the total number of records. We also manuscripted some ‘search effort’ points in southern California and Arizona from geographic descriptions, since we considered those watersheds to be of high conservation priority for some species of freshwater mussels. The representation of search effort in Figure 3 represents an underestimate of the true search effort that has occurred since 1985.
Caution should be exercised in interpreting the maps below. It is problematic to conclude that a species is absent from an area that may have been searched only once. In addition, the 8-digit HUC watershed scale of the maps in figures 2 and 3 is too coarse to show declines that may have occurred in individual streams or rivers.
The maps below were created from thousands of records from the published literature, museum collections, unpublished reports, and state, tribal, nonprofit, retired and amateur biologists. Please contact [email protected] for more information about the records used to create these maps.
Figure 2. Map of watersheds containing historical (pre-1985, red) records of Gonidea angulata and more recent (post-1985, blue) records of G. angulata.
Figure 3. Map of watersheds containing historical (pre-1985, red) records of Gonidea angulata and more recent (post-1985, blue) records of G. angulata. Black dots indicate areas that have been surveyed for freshwater mussels since 1985.
Threats to G. angulata and other species of freshwater mussels in North America include: impoundments and loss of host fish, channel modification from channelization, dredging and mining, restoration activities, contamination, sedimentation, nutrient enrichment, water withdrawal and diversion, thermal pollution, livestock grazing in riparian areas, and the introduction of non-native fish and invertebrate species. Many of these impacts, especially a reduction in stream flow and thermal pollution in arid areas, are being exacerbated by climate change.
Impoundments and loss of host fish
Numerous freshwater mussel species in eastern North America have gone extinct as a direct result of dams (Vaughn and Taylor 1999, Watters 1996, Williams et al. 1992), which can change a water body’s fish fauna, substrate composition, benthic community, water chemistry, dissolved oxygen levels and temperature (Bogan 1993). The elimination of a host fish species is likely the most harmful effect that dams have on freshwater mussels; Williams et al. (1992) report instances of 30-60 percent of a region’s mussel fauna being extirpated as a result of dam construction. The most fragile part of a mussel’s life cycle is its obligatory association with a host fish; in some cases, damming has extirpated a mussel species’ obligate host fish and that, in conjunction with increased siltation and pollution, has led to a rapid decline in many species of freshwater mussels (Bogan 1993). Since the beginning of the 20th century, 5% of native North American fish fauna have gone extinct, and an additional 364 fish species are considered endangered, threatened, or of special concern (Williams et al. 1989). The host fishes utilized by G. angulata across its range are not well understood; this lack of information will certainly be an impediment to conserving this species.
In addition, the flow regime of a river is frequently altered by dams; researchers in northern California suggest that the unnatural pulses in stream discharge from dams (pulsed flows) have the ability to interfere with the reproductive success of freshwater mussels by reducing contact between glochidia and host fish and preventing settlement of juveniles after excystment, if pulsed flows occur during key periods of G. angulata’s reproductive cycle (Spring Rivers 2007).
Hardhead, which has been identified as a host fish for G. angulata in northern California, is on the ‘watchlist’ for Species of Special Concern within the state of California because it is not as widespread or abundant as it once was (CA DFG 1995, Spring Rivers 2007).
Dredging and channelization
River channels are regularly dredged and modified for navigation, flood control, and drainage, which has led to the local extirpation of freshwater mussel populations in the southeastern U.S. (Bogan 1993). Sedentary mussels are directly displaced by dredging operations, and frequently killed in dredge spoils (Neves et al. 1997). Dredging and channelization increases erosion and sedimentation and destabilizes the substrate, which decreases habitat suitability for freshwater mussels (Neves et al. 1997). Dredging and channelization leads to headcutting, which also causes erosion and sedimentation (Hartfield 1993).
Instream mining of gravel and suction dredge mining for gold and other metals are common practices in the western U.S. Instream gravel mining removes substrate and leads to siltation downstream (Bogan 1993), which can directly and indirectly harm freshwater mussels. In a study investigating the impact of suction dredge mining on freshwater mussels in the Similkameen River in Washington state, Krueger et al. (2007) found that G. angulata died when covered with tailings from a suction dredge. However, another study by Vannote & Minshall (1982) reported that while large mussels of a different species (Margaritifera falcata) were unable to uncover themselves and perished when they were covered with sediment, G. angulata and small M. falcata were able to uncover themselves and migrate vertically.
Activities such as culvert removal, dam removal, and stream reconfiguration to restore aquatic habitat for salmonids have become very common, especially in the Pacific Northwest. Frequently, these activities are undertaken without considering the distribution or conservation needs of freshwater mussels occurring in those streams. These operations can involve temporary stream dewatering, movement of personnel and equipment in streams, and flushing of sediments – all of which could have a negative impact on the survival of mussel populations.
Flourishing populations of freshwater mussels are generally associated with high levels of dissolved oxygen and other conditions that are typical of unpolluted water bodies. Contaminants can destroy populations of freshwater mussels directly (by exerting toxic effects) and indirectly (by harming host fishes and/or food sources). (Havlik and Marking 1987). Many contaminants occur regularly in aquatic environments; for example, a study in the Columbia River documented that freshwater mussels belonging to another genus (Anodonta sp.) had a concentration of DDT (dichlorodiphenyltrichloroethane) from 14.9 ppb in spring to 2 ppb in fall and a concentration of PCBs (polychlorinated biphenyls) of 35-160 µg/kg wet weight (Claeys et al. 1975). Pollution from papermills, chemical factories, steel mills, and tanneries has been implicated in the extirpation of freshwater mussel populations in the eastern U.S. in the first half of the 20th Century (Bogan 1993). A review by Havlik and Marking (1987) reported that the following aquatic contaminants are lethal to freshwater mussels at various concentrations: cadmium, copper sulfate, ammonia, potassium, chromium, arsenic trioxide, copper, and zinc. Cadmium was the most toxic at only 2 ppm (parts per million) and copper sulfate was found to be toxic at levels of 2-18.7 ppm. Long term exposure to copper sulfate was lethal to mussels at concentrations as low as 25 ppb (parts per billion). Ammonia, which is a common pollutant from agricultural fertilizers and municipal sewage, was found to be toxic to mussels at only 5 ppm. (Havlik and Marking 1987). In an Illinois river, no mussels were found in an area with ammonia concentrations that exceeded 6 ppm, and mussels began to appear downstream where ammonia concentrations were progressively lower (Starrett 1971).
Freshwater mussels can be valuable indicators of pollutants, since they are sedentary, occupy a low position on the food chain, frequently bioaccumulate heavy metals, pesticides, and other contaminants, and can be long-lived. Toxins in the shell are indicative of past exposure, whereas toxins in the soft tissues indicate more recent exposure. Because freshwater mussels frequently bioaccumulate contaminants, substances can be detected in their tissues that are too low in concentration to be detected in the surrounding water body.
Sedimentation and nutrient enrichment
Because freshwater mussels are filter feeders, they generally cannot handle high levels of siltation that come from agricultural runoff, silvicultural operations and headcutting (Bogan 1993). The EPA considers fifty percent of U.S. rivers and streams that were assessed to be impaired, primarily due to sedimentation, nutrient enrichment, contamination with pathogens and habitat alterations (U.S. EPA 2010).
Water withdrawal and diversion
Numerous streams in North America have been modified by water flow diversion and groundwater use (Dudley and Larson 1976). A review of the effects of artificially reduced stream flow on invertebrates and instream habitat revealed that these activities lead to increased sedimentation, decreased velocity, wetted width and depth, and can alter water temperature and chemistry (Dewson et al. 2007). These impacts generally reduce habitat diversity and alter invertebrate community composition (Dewson et al. 2007). Climate change is projected to exacerbate the impact of low stream flow on freshwater mussels. For example, stream flows have decreased at a rate of approximately 2% per decade for the past century in the Rocky Mountain region of the western U.S. as a result of climate change (Rood et al. 2005).
Increased water temperatures as a result of decreased streamflow, loss of riparian vegetation, and global climate change are likely to stress, and perhaps eradicate, G. angulata. In a study in Fall River Lake in northern California, Spring Rivers (2007) found that high water temperatures (27.3°C or 81.1°F) and low water levels (<1 meter) may have caused the abortion of egg masses and premature onset of a non-gravid period that they observed in another genus of freshwater mussel (Anodonta), and note that thermal stress has caused abortion in other freshwater mussel species (Aldridge and McIvor 2003).
Livestock grazing in riparian areas
Livestock grazing in and near streams degrades the high water quality that freshwater mussels require for survival. Freshwater mussels generally require high levels of dissolved oxygen (Voshell 2002), yet the presence of livestock has been shown to increase eutrophication in water bodies (Mathews et al. 1994), which in turn can reduce levels of dissolved oxygen in water. Livestock tend to remain near streams because water, shade and forage abound (Strand & Merritt 1999), which exacerbates the impact of cattle on aquatic communities. Cattle grazing in riparian areas frequently leads to headcutting, which can increase sedimentation in the water body – a condition that freshwater mussels generally cannot handle (Bogan 1993). Grazing and trampling of riparian vegetation also increases water temperatures; high water temperatures may impede the ability of freshwater mussels to survive.
Introduction of non-native species
The nonnative asian clam (Corbicula fluminea) is widespread in water bodies in western North America and may compete with native mussels (Clarke 1988), directly consume glochidia and impact nutrient cycling (Leff et al. 1990, Strayer 1999, Vaughn and Spooner 2006).
The zebra mussel (Dreissena polymorpha) and quagga mussel (Dreissena rostriformis bugensis) aggressively compete with native mussels, although they are less widespread in western North America than the asian clam. West of the Continental Divide, zebra and/or quagga mussels currently occur in waterbodies in Nevada, Arizona, California, Colorado and Utah. Zebra and quagga mussels can attach directly to the shells of native freshwater mussels and impede their ability to feed (Mackie 1991, Schloesser et al. 1996, Strayer 1999, Strayer and Malcolm 2007). They have free-swimming larvae that do not require a host fish to reproduce, and thus have a high reproductive advantage over native freshwater mussels.
Many species of non-native fish have been introduced into western North America, primarily for sport fishing, which has led to the reduction or elimination of native fish species (Moyle et al. 1986, Rinne and Turner 1991, Andersen and Deacon 1996). In the Great Basin alone, fifty non-native fish species have been intentionally introduced (Sada & Vinyard 2002). Although the full suite of host fishes used by G. angulata is unknown, it is possible that host fish species that G. angulata relies upon are being displaced by nonnative, less suitable host fish.
Xerces Red List Status: Vulnerable
NatureServe Global Status (2007): G3 – Vulnerable
NatureServe National Status: United States (2004)-N3, Canada (2006)-N1
NatureServe State Status (2009): S1S2 (CA), S2S3 (OR), SNR (ID), SNR (NV), S2 (WA)
NatureServe Provincial Status – Canada (2009): S1 (BC)
IUCN Red List: N/A
USA – Endangered Species Act: N/A
Canada – Canadian Species At Risk Act (2005): SC
Canada – Committee on the Status of Endangered Wildlife in Canada (2010): Endangered
American Fisheries Society Status (1993): Undetermined
NatureServe indicates that G. angulata has both a global short term trend of declining (10-30%) and a global long term trend of declining (25% change to 50% decline) (NatureServe 2009).
Species that are long-lived, such G. angulata, which likely lives for 20-30 years, can appear to have healthy populations, when in reality only the older adults may be withstanding environmental changes and the population may no longer be reproducing. This species has been extirpated from many sites in the Snake and Columbia River basins due to environmental degradation (Brim Box et al. 2006, COSEWIC 2003, Frest and Johannes 1995), although the extent of the decline in those areas is not well understood, as historical abundance data is generally lacking.
California ranks G. angulata as S1S2, or critically imperiled/imperiled within the state. Taylor (1981) suggested that G. angulata has likely been extirpated from southern California and most of the Central Valley. Coney (1993) reports that G. angulata historically occurred in Ballona Creek and the Santa Ana River in the Los Angeles River Basin, but was unable to find any living specimens in surveys. J. Howard conducted extensive field surveys throughout California in 2008 and 2009, including visits to historic sites, and confirmed that G. angulata has been extirpated from southern California (Western Mollusk Sciences 2008, Howard 2010). G. angulata still persists in northern California; J. Howard notes that most sites do not have dense beds with the exception of one site on the upper Pit River in the Modoc National Forest and some sites on the Klamath River (Howard 2010).
The state of Idaho has assigned a conservation status rank of S2, or imperiled, to G. angulata. G. angulata were found in low abundance (1-10/m2) on the Snake River downstream of the Hells Canyon Dam (Richards et al. 2005). Frest and Johannes (2000) note that G. angulata is locally common in the Snake River plain, but decreasing in abundance, and should be monitored carefully in Idaho. The species is known historically (pre-1985) from the Boise, Little Salmon, Malad, Salmon, Snake, Spokane, and Weiser Rivers. Since 1985, it has been found in the Bruneau, Jarbridge, Malad, Snake, and Salmon Rivers. (Xerces freshwater mussel database 2010). Historic sites in Idaho should be revisited to assess the conservation status of G. angulata in the state.
The state of Montana has not assigned a conservation status rank to G. angulata. It is unknown whether G. angulata historically occurred in Montana. There is an historic record from the Columbia River in western Montana, although the Columbia River is not in Montana. Some have suggested that this record may have been from the Clark Fork River or Kootenai River in the Columbia River headwaters, although G. angulata does not currently occur in either of those locations. There are two possibilities: 1) that this record was mistaken and G. angulata never occurred in Montana, or 2) that G. angulata historically occurred in western Montana, but has been extirpated. (Gangloff and Gustafson 2000).
The state of Nevada has not assigned a conservation status rank to G. angulata. This species occurs in the northeastern part of the state, in the Owyhee, Salmon and Humboldt Rivers. Few historic records exist from the state and little is known about this species’ status where it occurs.
The state of Oregon has assigned a conservation status rank of S2S3, or imperiled/vulnerable, to G. angulata. Numerous historic and more recent records exist for this species throughout Oregon, although there has not been a systematic effort to resurvey historic sites for this species across the state. Brim Box et al. (2006) report that freshwater mussels – including G. angulata – have been extirpated from most of the main stem of the Umatilla River, and currently only occur in the lower reaches. J. Brim Box (pers. comm. 2010) reports observing a mussel kill in entire beds of G. angulata in the John Day River, where the mussels occur at a density of ~500/m2 and appear to be dying in place and remaining upright.
The state of Washington has assigned a conservation status rank of S2, or imperiled, to G. angulata. An extensive decline of G. angulata has been observed in the Little Spokane River over four decades; a healthy population existed at one site on the river in 1968 and throughout the 1970s, but by 2000, only a single mussel remained in that location (WDFW database and B. Lang, pers. comm. with S. Jepsen, 8 November 2009). Terry Frest noted that G. angulata was apparently extirpated from the Wenatchee and Yakima Rivers (reported in person by J. Fleckenstein, WA DNR, in Mussel workgroup meeting, 2008). There are numerous historic and more recent records of G. angulata in Washington.
The province of British Columbia has assigned a conservation status rank of S1, or critically imperiled, to G. angulata. The species only occurs in the southernmost part of the province. According to a Canadian national status report for G. angulata, in many locations only large individuals of this species are found, suggesting that it is not reproducing in certain areas (COSEWIC 2003).
Since G. angulata belongs to a monotypic genus and is in serious decline, it is a high priority for conservation action. The glochidial host-fish species, once identified, should be protected. Populations of G. angulata should be protected and threats (listed above) should be addressed in areas where G. angulata beds occur.
Much more information is needed to understand the current distribution of G. angulata. Sites that historically contained G. angulata should be revisited to determine if the species is still extant at those sites (similar to the California study detailed in Howard 2010). Populations of G. angulata should be censused to provide abundance data and enable biologists to monitor population statuses over time. The age class structure of existing G. angulata populations should be examined to determine whether or not populations are reproducing. Biologists should investigate which fish species serve as glochidial hosts for G. angulata.
Aldridge, D.C. and A.L. McIvor. 2003. Gill evacuation and release of glochidia by Unio pictorum and Unio tumidus (Bivalvia: Unionidae) under thermal and hypoxic stress. Journal of Molluscan Studies 69:55-59.
Andersen, M.E. and J.E. Deacon. 1996. Status of Endemic Non-Salmonid Fishes in Eastern Nevada. Journal of the Arizona-Nevada Academy of Science, 29:124-133.
Barnhart, M.C., W. R. Haag, and W.N. Roston. 2008. Adaptations to host infection and larval parasitism in Unionoida. Journal of the North American Benthological Society 27:370-394.
Bogan, A. E. 1993. Freshwater Bilvalve Extinctions (Mollusca: Unionoida): A Search for Causes. American Zoologist 33:599-609.
Brim Box, J., J. Howard, D. Wolf, C. O’Brien, D. Nez, and D. Close. 2006. Freshwater mussels (Bivalvia: Unionoida) of the Umatilla and Middle Fork John Day rivers in eastern Oregon. Northwest Science 80:95-107.
Burch, J.B. 1973. Freshwater Unionacean Clams (Mollusca: Pelecypoda) of North America. Biota of Freshwater Ecosystems Identification Manual No. 11. U.S. Environmental Protection Agency, Washington, D.C. 176 pp.
California Department of Fish and Wildlife (CA DFG). 1995. Fish Species of Special Concern. Available online: http://www.dfg.ca.gov/wildlife/nongame/ssc/fish.html (Accessed 22 October 2010).
Claeys, R.R., R.S. Caldwell, N.H. Cutshall, and R. Holton. 1975. Chlorinated pesticides and polychlorinated biphenyls in marine species, Oregon/Washington coast 1972. Pestic. Monit. J. 9:2-10.
Clarke, A.H. 1981. The Freshwater Molluscs of Canada. National Museum of Natural Sciences, National Museums of Canada, Ottawa. 446 pp.
Clarke, A.H. 1988. Aspects of corbiculid-unionid sympatry in the United States. Malacology Data net 2:57-99.
Coney, C.C. 1993. Freshwater Mollusca of the Los Angeles River: Past and present status and distribution. Pp. C1-C22 in The Biota of the Los Angeles River: an overview of the historical and present plant and animal life of the Los Angeles River drainage (K.L. Garrett, ed.). Natural History Museum of Los Angeles County Foundation. California Department of Fish and Game Contract No. FG 0541.
Committee on the Status of Endangered Wildlife in Canada ( COSEWIC). 2003. COSEWIC Assessment and Status Report on the Rocky Mountain Ridged Mussel (Gonidea angulata) in Canada. Committee on the Status of Endangered Wildlife in Canada. Ottawa. vi + 29 pp. (www.sararegistry.gc.ca/status/status_e.cfm)
Dewson, Z. S., James, A. B. W., and Death, R. G. 2007. A review of the consequences of decreased flow for instream habitat and macroinvertebrates. Journal of the North American Benthological Society 26 (3):401–415.
Dudley, W.W., Jr. and J.D. Larson. 1976. Effect of Irrigation Pumping on Desert Pupfish Habitats in Ash Meadows, Nye County, Nevada. United States Geological Survey Professional Paper, 927:1-52.
Frest, T. J. and E. J. Johannes. 1992. Effects of the March, 1992 drawdown on the freshwater mollusks of the Lower Granite Lake area, Snake River, SE WA and W. ID. Final Report to U.S. Army Corps of Engineers, Walla Walla District. Deixis Consultants, Seattle, Washington. i + 11 pp.
Frest, T. J. and E. J. Johannes. 1995. Interior Columbia Basin mollusk species of special concern. Final report to the Interior Columbia Basin Ecosystem Management Project, Walla Walla, WA. Contract #43-0E00-4-9112. 274 pp. plus appendices.
Frest, T.J. and E.J. Johannes. 2000. An annotated checklist of Idaho land and freshwater mollusks. Journal of the Idaho Academy of Science 36(2):1-51.
Gangloff, M. M. and D. L. Gustafson. 2000. The mussels (Bivalvia: Unionoida) of Montana. Central Plains Archaeology 8(1):121-130.
Hartfield, P. 1993. Headcuts and their effects on freshwater mussels. Pp. 131-141 in K.S. Cummings, A.C. Buchanan, and L.M. Koch (eds.). Conservation and Management of Freshwater Mussels. Proceedings of a UMRCC Symposium, 12-14 October 1992, St. Louis, Missouri. Upper Mississippi River Conservation Committee, Rock Island, Illinois. 189 pp.
Havlik, M.E. and L.L. Marking. 1987. The effects of contaminants on naiad mollusks (Unionidae): A review. Resource Publication 164, United States Department of the Interior, Fish and Wildlife Service, Washington DC.
Howard, J.K. 2010. Sensitive Freshwater Mussel Surveys in the Pacific Southwest Region: Assessment of Conservation Status. Prepared for USDA Forest Service, Pacific Southwest Region. 60 pages.
Krueger, K., P. Chapman, M. Hallock and T. Quinn. 2007. Some effects of suction dredge placer mining on the short-term survival of freshwater mussels in Washington. Northwest Science 81(4):323-332.
Leff, L.G., J.L. Burch, and J.V. McArthur. 1990. Spatial distribution, seston removal, and potential competitive interactions of the bivalves Corbicula fluminea and Elliptio complanata, in a coastal plain stream. Freshwater Biology 24: 409-416.
Luzier, C. and S. Miller. 2009. Freshwater Mussel Relocation Guidelines. A product of the Pacific Northwest Native Freshwater Mussel Workgroup. Available online: http://www.xerces.org/wp-content/uploads/2009/10/mussel-relocation-position-statement.pdf (Accessed 22 October 2010).
Mackie, G.L. 1991. Biology of the exotic zebra mussel, Dreissena polymorpha, in relation to native bivalves and its potential impact in Lake St. Claiar. Hydrobiologia 219: 251-268.
Mathews, B.W., L.E. Sollenberger, V.D. Nair, and C.R. Staples. 1994. Impact of Grazing Management on Soil Nitrogen, Phosphorus, Potassium, and Sulfur Distribution. Journal of Environmental Quality 23: 1006-1013.
McMahon, R.F. and A.E. Bogan. 2001. Mollusca: Bivalvia. In Thorp, J.H. and A.P. Covich (Eds.) Ecology and Classification of North American Freshwater Invertebrates. 2nd Edition. Pp. 331-429. Academic Press.
Moyle, P.B., H.W. Li, and B.A. Barton. 1986. The Frankenstein Effect: Impact of Introduced Fishes on Native Fishes in North America. In R.H. Stroud, editor, Fish Culture in Fisheries Management, pages 415-426. Bethesda, Maryland: American Fisheries Society.
NatureServe. 2009. NatureServe Explorer: An online encyclopedia of life [web application]. Version 7.1. NatureServe, Arlington, Virginia. Available http://www.natureserve.org/explorer. (Accessed: December 17, 2009 ).
Nedeau, E. J., A. K. Smith, J. Stone and S. Jepsen. 2009. Freshwater Mussels of the Pacific Northwest Second Edition. The Xerces Society for Invertebrate Conservation. 51 pp.
Neves, R.J., A.E. Bogan, J.D. Williams, S.A. Ahlstedt, and P.W. Hartfield. 1997. Status of Aquatic Mollusks in the Southeastern United States: A Downward Spiral of Diversity. Chapter 3 In: Aquatic Fauna in Peril: The Southeastern Perspective. Eds: G.W. Benz and D.E. Collins. Special Publication I, Southeast Aquatic Research Institute, Lenz Design and Communications, Decatur, GA. 554 pages.
Richards, D.C., C.M. Falter, G.T. Lester, and R. Myers. 2005. Responses to FERC Additional Information Request AR-2, Listed Mollusks. Hells Canyon Project FERC No. P-1971-079. Idaho Power Company.
Rinne, J.N. and P.R. Turner 1991. Reclamation and Alteration of Management Techniques, and a Review of Methodology in Stream Renovation. In W.L. Minckley and J.E. Deacon, Editors, Battle against Extinction: Native Fish Management in the American West, pages 219-244. Tucson, Arizona: University of Arizona Press.
Rood, S.B., G.M. Samuelson, J.K. Weber, and K.A. Wywrot. 2005. Twentieth-century decline in streamflows from the hydrographic apex of North America. Journal of Hydrology 306:215-233.
Sada, D.W.; Vinyard, G.L. 2002. Anthropogenic changes in historical biogeography of Great Basin aquatic biota. In: Hershler, R.; Madsen, D.B.; Currey, D., eds. Great Basin Aquatic Systems History. Smithsonian Contributions to the Earth Sciences No. 33: 277-295.
Schloesser, D.W., T.F. Nalepa, and G.L. Mackie. 1996. Zebra mussel infestation of unionid bivalves (Unionidae) in North America. American Zoologist 36: 300-310.
Spring Rivers. 2007. Reproductive Timing of Freshwater Mussels and Potential Impacts of Pulsed Flows on Reproductive Success. California Energy Commission. PIER Energy-Related Environmental Research Program. CEC-500-2007-097.
Starrett, W.C. 1971. A survey of the mussels (Unionacea) of the Illinois River: a polluted stream. Illinois Natural History Survey Bulletin 30(5): 267-403.
Strand, M. and R.W. Merritt.1999. Impacts of cattle grazing activities on stream insect communities and the riverine environment. American entomologist 45: 13-29.
Strayer, D.L. 1999. Effects of alien species on freshwater mollusks in North America. Journal of the North American Benthological Society 18:74-98.
Strayer, D.L. and H.M. Malcom. 2007. Effects of zebra mussels (Dreissena polymorpha) on native bivalves: the beginning of the end or the end of the beginning? Journal of the North American Benthological Society 26(1): 111-122.
Taylor, D.W. 1981. Freshwater mollusks of California: a distributional checklist. California Fish and Game 67:140-163.
Turgeon, D.D., J.F. Quinn, Jr., A.E. Bogan, E.V. Coan, F.G. Hochberg, W.G. Lyons, P.M. Mikkelsen, R.J. Neves, C.F.E. Roper, G. Rosenberg, B. Roth, A. Scheltema, F.G. Thompson, M. Vecchione, and J.D. Williams. 1998. Common and scientific names of aquatic invertebrates from the United States and Canada: Mollusks. 2nd Edition. American Fisheries Society Special Publication 26, Bethesda, Maryland: 526 pp.
U.S. EPA (Environmental Protection Agency). 2010. Watershed Assessment, Tracking & Environmental Results. National Summary of State Information. available online at: http://iaspub.epa.gov/waters10/attains_nation_cy.control (accessed 23 April 2010).
Vannote, R.L., and G.W. Minshall. 1982. Fluvial processes and local lithology controlling abundance, structure, and composition of mussel beds. Proceedings of the National Academy of Sciences 79:4103-4107.
Vaughn, C.C. and C.M. Taylor. 1999. Imoundments and the Decline of Freshwater Mussels: a Case Study of an Extinction Gradient. Conservation Biology 13(4): 912-920.
Vaughn, C.C. and D.E. Spooner. 2006. Scale-dependent associations between native freshwater mussels and invasive Corbicula. Hydrobiologia 568:331-339.
Voshell, J.R. 2002. A Guide to Common Freshwater Invertebrates of North America. The McDonald & Woodward Publishing Company, Blacksburg, Virginia. 442pp.
Washington Department of Fish and Wildlife (WDFW) database of freshwater mussel records. 2009. Managed by Molly Hallock.
Watters, G.T. 1996. Small dams as barriers to freshwater mussels (Bivalvia, Unionoida) and their hosts. Biological Conservation 75:79-85.
Western Mollusk Sciences. 2008. Strategic inventory of freshwater mussels in the northern Sierra Nevada province. Report to the USDA Forest Service. Pacific Southwest Region. 65 pp.
Williams, J.E., J.E. Johnson, D.A. Hendrickson, S. Contreras-Balderas, J.D. Williams, M. Navarro-Mendoza, D.E. McAllister, and J.E. Deacon. 1989. Fishes of North America Endangered, Threatened, or of Special Concern: 1989. Fisheries, 14(6):2-20.
Williams, J.D., S.L.H. Fuller, and R. Grace. 1992. Effects of Impoundments on Freshwater Mussels (Mollusca: Bivalvia: Unionidae) in the Main Channel of the Black Warrior and Tombigbee Rivers in Western Alabama. Bulletin of the Alabama Museum of Natural History 13:1-10.
Xerces Society Database of Freshwater Mussel Records. 2010. The Xerces Society for Invertebrate Conservation.
Jayne Brim Box (Confederated Tribes of the Umatilla Indian Reservation Mussel Project), 2010
John Fleckenstein (Washington Department of Natural Resources), 2008
Bruce Lang, 2009
Al Smith (retired), 2008
Pacific Northwest Native Freshwater Mussel Workgroup, accessed February, 2010
NatureServe Explorer, accessed February, 2010
E-Fauna BC, accessed February, 2010
Freshwater Mussel relocation guidelines, Pacific Northwest Native Freshwater Mussel Workgroup, accessed October, 2010
Numerous agencies and organizations generously contributed their records to this project. We would especially like to thank the Pacific Northwest Native Freshwater Workgroup, the Confederated Tribes of the Umatilla Indian Reservation Mussel Project, Oregon Department of Fish and Wildlife, Washington Department of Fish and Wildlife, Utah Division of Wildlife Resources Native Aquatics Program, and the U.S. Forest Service. We would like to thank the following individuals for sharing large amounts of information for this project: Jayne Brim Box (Confederated Tribes of the Umatilla Indian Reservation), Molly Hallock (WDFW), Peter Hovingh (retired), Jeanette Howard (Western Mollusk Sciences), Ed Johannes (Deixis Consultants), Shelly Miller (ODFW), Karen Mock (Utah State University), Al Smith (retired), and Wendy Walsh (retired).
This project would not have been possible without the generous contribution of records or other information from the following individuals: Aaron David, Al Smith, Alan Cvancara, Andra Love, Art Bass, Bob Brenner, Bob Wisseman, Brett Blundon, Brian Lang, Bruce Lang, Carol Evans, Carol Gelvin-Reymiller, Carol Hughes, Christine O’Brien, Chuti Fiedler, Cynthia Tait, Dale Swedberg, Darcy McNamara, David Cowles, David Kennedy, David Plawman, David Wolf, Donna Allard, Donna Nez, Dorene MacCoy, Doug Post, Ed Johannes, Emily Davis, Fred Schueler, Gary Lester, Gordon Edwards, Jason Dunham, Jayne Brim-Box, Jeanette Howard, Jeff Gottfried, Jeff Sorenson, Jennifer Parsons, Jennifer Vanderhoof, Joanne Richter, Joe Furnish, Joe Slusark, Jon Ives, Karen Mock, Kathy Thornburgh, Keith Benson, Kevin Aitkin, Kevin Cummings, Larry Dalton, Larry Scofield, Lea Gelling, Lee Cain, Linda Ward, Lisa Torunski, Lorrie Haley, Maria Ellis, Mark LaRiviere, Mark Mouser, Mary Hanson, Michelle McSwain, Michelle Steg-Geltner, Mike Mulvey, Mindy Allen, Molly Hallock, Nancy Duncan, Paul Pickett, Peter Bahls, Peter Hovingh, Ray Heller, Ray Kinney, Ray Perkins, Ray Temple, Rolland Schmitten, Roy Iwai, Ryan Houston, Ryan Merle, Shanda McGraw, Shelly Miller, Stephen Conroy, Steve Lysne, Steve Sampfli, Steve Smith, Terry Myers, Tom Burke, Tom Watters, Trevor Swanson, Wendy Walsh and Yvonne Colfax.
Funding for the status assessment of western freshwater mussels was provided by the following foundations and individuals:
Whole Systems Foundation
PGE Salmon Habitat Fund
Xerces Society members
|
By Nick Squires in Rome
Published: 6:30AM GMT 18 Feb 2010
Golden Bough from Roman mythology 'found in Italy'
In Roman mythology, the bough was a tree branch with golden leaves
that enabled the Trojan hero Aeneas to travel through the underworld
They discovered the remains while excavating religious sanctuary built
in honour of the goddess Diana near an ancient volcanic lake in the
Alban Hills, 20 miles south of Rome.
They believe the enclosure protected a huge Cypress or oak tree which
was sacred to the Latins, a powerful tribe which ruled the region
before the rise of the Roman Empire.
The tree was central to the myth of Aeneas, who was told by a spirit
to pluck a branch bearing golden leaves to protect himself when he
ventured into Hades to seek counsel from his dead father.
In a second, more historically credible legend, the Latins believed it
symbolised the power of their priest-king.
Anyone who broke off a branch, even a fugitive slave, could then
challenge the king in a fight to the death. If the king was killed in
the battle, the challenger assumed his position as the tribe's leader.
The discovery was made near the town of Nemi by a team led by Filippo
Coarelli, a recently retired professor of archaeology at Perugia
After months of excavations in the volcanic soil, they unearthed the
remains of a stone enclosure.
Shards of pottery surrounding the site date it to the mid to late
Bronze Age, between the 12th and 13th centuries BC.
In Aeneid 6, the Sybil says to Aeneas:
A bough is hidden in a shady tree;
its leaves and pliant stem are golden, set
aside as sacred to Proserpina.
The grove serves as its screen, and shades enclose
the bough in darkened valleys. Only he
may pass beneath earth's secret places who
first plucks the golden-leaved fruit of the tree.
Lovely Proserpina ordained that this
be offered her as gift. And when teh first
bough is torn off, a second grows again--
with leaves of gold, again of that same metal.
|
The Fair Credit Reporting Act (FCRA) is a federal law that governs how a credit reporting agency (CRA) handles your credit information. It is designed to protect the integrity and privacy of your credit information. The FCRA requires credit reporting agencies--and the entities that report your credit information to them and others--to ensure that your information is fair and accurate, and kept private. The FCRA protects your right to access and correct any inaccuracies in your credit report and provides you with remedies if a credit reporting agency or information furnisher violates your rights.
For articles on your credit report, credit score, cleaning up your credit report, and more, see Nolo's Credit Repair topic area.
A CRA is any entity that collects and furnishes credit information about you. A common type of CRA is a credit bureau, such as Transunion, Equifax or Experian. A CRA also includes a company or person who collects and sells your credit information (often in the form of background checks) to landlords, employers, or anyone else who makes a credit decision about you.
A CRA is obligated to:
upon your request, provide you with the information it has on file about you (called your “file disclosure”), often for free (to learn how to get your credit report, see Credit Reports & Credit Scores)
provide you with your credit score upon your request (you'll most likely have to pay a fee; see Credit Reports & Credit Scores )
investigate disputed credit information in your file (there are a few exceptions to this rule; see When the CRA Does Not Have to Investigate Your Complaint.)
correct or delete any inaccurate, incomplete, or unverifiable information within 30 days of the receiving notice of your dispute (for more on this, see How to Correct Errors on Your Credit Report)
refrain from reporting old credit information, usually more than seven to ten years old (see How Long Does Negative Information Stay on Your Credit Report)
limit disclosure of your credit file to third parties who have a “valid need” (such as a creditor, landlord, or employer), and
withhold disclosure of your credit information to employers unless you consent.
An “information supplier” is any entity that submits your credit information to a CRA. Usually, that means your creditor. But it could also mean any other third party that you have even a loose credit relationship with, such as a government entity to whom you owe taxes, costs, or fines.
Under the FCRA, your creditor and any other information supplier:
must not report to a CRA any information about you that it knows -- has “reasonable cause” to know -- is inaccurate
has a duty to promptly update and correct any inaccurate information that it previously supplied to the CRA
must tell you about any negative credit information it reports to a CRA within 30 days
must notify the CRA when you voluntarily close an account with it, and
must maintain a “reasonable procedure” to respond to identity theft notices by a CRA, and refrain from reporting information about an account that you previously reported was the result of identity theft.
If you dispute the inaccurate information with your creditor, in writing, it cannot continue to report the wrong information to the CRA until it investigates. It must also notify the CRA of your dispute.
To learn more about information supplier's duties, see How to Dispute Credit Report Items With the Creditor.
In addition to CRAs and your creditors, anyone who uses your credit information for employment, credit, or insurance purposes is covered by the FCRA. They must:
notify you if they turn you down based on what they found in your credit report, and
identify the CRA or information supplier who provided the report.
If any of these three types of entities (CRA, information supplier, or user) violates the rules in the Fair Credit Reporting Act, you may be able to sue them in state or federal court for damages. If you are in the military, you might have additional protections and remedies. Your state's laws may also offer additional relief and remedies. For more information, visit the Federal Trade Commission's section on the FCRA at www.ftc.gov/os/statutes/fcrajump.shtm.
|
Directed evolution as a tool in Synthetic Biology
Detailed and systematic characterisation is the traditional scientific tool used to understand the function and mechanism of biological systems and their components. Although undoubtedly very successful, characterisation alone may not be sufficient to give us a complete understanding of any particular system or component.
Despite biology’s immense diversity, in some cases biology has provided us with a single answer. One such example is the storage and propagation of chemical information, where DNA and RNA are the only genetic materials, and the genetic code is universal. My view is that biology has not (and cannot have) explored all possible solutions to any given problem. Simply put, as an evolutionary process, biology is extensive but not thorough.
Synthetic Biology seeks an alternative approach in which well-characterised parts are assembled to reconstitute biological function. This ‘bottom-up’ approach can yield novel insights at all levels, be it at level of individual parts, of the system as a whole, or of more general principles that emerge in biology.
Nevertheless, the understanding required to re-engineer components for novel function is limiting and generally not available. Directed evolution bridges that gap in our current understanding.
Directed evolution, implemented through sequential rounds of sequence diversification and purifying selection, allows an original biopolymer (be it protein or nucleic acid) to be systematically modified towards the desired function. Crucially, in principle, sequence diversity can be introduced without any knowledge of the underlying component or mechanism of action – although in practice, all available information on the system is used to target diversity, to maximise coverage of the search space.
Methodologies for protein and nucleic acid directed evolution
Selection and screening are central to all directed evolution methodologies. The goal of selection is to create a strong link between phenotype and genotype, such that isolation of functional molecules, or molecules with the desired function, results in the co-isolation of their respective genetic information.
A number of versatile selection platforms have been developed, differing in how selective pressure can be introduced and modulated. Our goal is to adapt existing and develop novel selection platforms, establishing a technological toolbox for the directed evolution of natural and synthetic biopolymers – whether in vitro, ex vivo or in vivo.
Xenobiology and genetic orthogonality
The development of synthetic genetic materials (xenobiotic nucleic acids or XNAs) by systematically engineering DNA polymerases is a clear example of the power of directed evolution for synthetic biology, and the first step towards developing an organism based on a synthetic genetic material.
Directed evolution of DNA polymerases for XNA synthesis was achieved through selection, using compartmentalised self-tagging (CST), and high throughput screening . Together with XNA reverse transcriptases, which were rationally designed, it was possible to demonstrate that a number of synthetic nucleic acids can store information and are viable genetic materials. This approach not only enabled the development of the first synthetic genetic materials, but also identified a novel region in the DNA polymerase involved in substrate recognition and discrimination . In addition, development of synthetic genetic systems allows exploration of the boundary conditions of chemical information storage .
We are currently interested in extending our existing selection platforms to isolate XNA replicases (XNA ->XNA) and to assemble systems that can be used to bring XNA genetic elements to a bacterial cell. That would extend the Central Dogma and alter the topology of information transfer in biology creating a genetic enclave inaccessible to natural organisms but that can co-exist with the natural system – an orthogonal system.
The storage of chemical information is not the only biological process that can be re-engineered to create orthogonality; there are other routes to altering the topology of information transfer in biology. The conversion of information from RNA to protein, via the genetic code is another process accessible to re-engineering. The genetic code, bar minor exceptions, is universal – an RNA message will give rise to the same protein in most living organisms.
A viable alternative genetic code can expand the chemical functionality of life and create organisms unable to exchange information with biology. Even if the informational molecules are unchanged (i.e. DNA and RNA), the content of the information remains inaccessible because of the different code; semantically orthogonal.
Aminoacyl-tRNA synthases (aaRS) are the gatekeepers of the genetic code through charging precise sets of tRNA with specific amino acids. Modification of the genetic code by aaRS engineering has been achieved and is being extensively explored. We are interested in investigating how evolvable tRNA synthetases are and whether the systematic engineering of aminoacyl-tRNA synthetases is a feasible route towards rewriting the genetic code.
For synthetic biology to deliver on its potential as a disruptive technology, revolutionising our chemical, pharmaceutical and material industries, it must incorporate biosafety at its core – to protect the environment and to ensure public acceptance of the technology. Multiple redundant safeguards must be developed to address known, foreseeable and unknown potential risks, ensuring that our environment cannot come to harm – minimising the ecological risk of genetically engineered organisms and the informational risk of the information encoded in the organism.
Both genetic and semantic orthogonality can be routes towards increased biosafety. Genetic information stored in an XNA that cannot be accessed by natural enzymes and that requires synthetic precursors for its maintenance, e.g. hexitol nucleic acids (HNA), would establish a biosafety “dead man’s trigger” – the function encoded in XNA is not accessible to nature and is lost in the absence of a constant supply of precursors. Thus, escaped organisms (or information) would be rapidly removed from the environment.
Similarly, life operating under a different genetic code cannot exchange information with natural organisms: genetic material from natural organisms will not encode functional proteins in a modified organism and vice-versa. A recoded auxotroph, which would depend on the external supply of an essential compound for cell survival, would therefore provide containment for the organism and for the information encoded in it.
Azole-containing microcins can be generated by the post-translational modification of peptides and are widespread in bacteria and archaea. They have been implicated in a diverse range of biological activities, including antimicrobial, anti-tumor and anti-malarial compounds.
We are currently characterising available microcin synthetases with a view towards establishing them as platforms for the directed evolution of novel bioactive compounds.
Pinheiro, V.B., Taylor A.I., Cozens, C., Abramov, M., Renders, M., Zhang, S., Chaput, J., Wengel, J., Peak-Chew, S-Y., McLaughlin, S.H., Herdewijn, P. and Holliger, P., Synthetic genetic polymers capable of heredity and evolution. Science, 336, 341 (2012).
Cozens, C., Pinheiro, V.B., Vaisman, A., Woodgate, R. and Holliger, P., A short adaptive path from DNA to RNA polymerases. PNAS, 109, 8067 (2012).
Pinheiro, V.B.*, Loakes, D. and Holliger, P., Synthetic polymers and their potential as genetic materials. Bioessays, 35, 113 (2013). *corresponding author.
|
“Educating the mind, without educating the heart, is no education at all.” Aristotle
Learning by play is a EAPZ project , bringing to czech schools the idea of healthy living. During the project was achieved relationship with more than 500 primary schools and more than 80 000 pupils participated the project.
Small children can find themselves in a beautiful country, named Healthyland, and meet there breathtaking heroes – Sugar Devil and Vitamin Elf , Mr. Fat and Mr. Candy, Vegetable Nymph , the dangerous Wizard Cholesterol and many others. It is a fairy world of children imagination , full with fun, songs and… knowledge.
For older students is regularly prepared National Champinship in Board Game „ Basket Full with Wisdom “. The goal of the game is to learn how to navigate in the world of food and embrace the principles of healthy eating and living.
The project "Learning by play" is under the auspices of the Minister of Agriculture of Czech Republic, the project partners are the Food Safety Information Centre and Public Health Institute in Prague. The project is financially supported by Albert Foundation.
|
Essays research papers - Understanding Crime. Title Length Color Rating : The Contribution of the Labelling Theory to Our Understanding of Crime and Deviancy . Assignments that teach research skills can help students gain confidence and facility in using research tools, a better understanding of. research papers may. In Search of the Holy Grail. Understanding Research Success All RAND occasional papers undergo rigorous peer review to help ensure that they meet high standards. View Explanation and Understanding Research Papers on Academia.edu for free. How To Read a Scientific Paper: Learn tips on how to read a scientific paper and use scientific articles to create you own research project or science fair project idea. How to Read a Scientific Article. most essential to your understanding of the article Essentials of Writing Biomedical Research Papers. 2nd Ed. St. Louis. Read this article on Psych Central to understand the difference between applied and basic research and read some examples.
Author information: (1)City University, London. In order to understand research papers, readers must understand what research is, and be able to answer questions such. PubMed journal article Understanding the basic aspects of research paper were found in PRIME PubMed. Download Prime PubMed App to iPhone or iPad. Understanding Commercial Real Estate: Just How Different from Housing Is It? Joseph Gyourko NBER Working Paper No. 14708 February 2009 JEL No. R0,R21,R31. It seems to happen almost every day - you hear about the results of a new medical research study. Learn how to evaluate medical findings. Understanding the different types of research papers; Researching the topic; Brainstorming your focus;. Welcome to the course on Writing Research Papers. Find A+ essays, research papers, book notes, course notes and writing tips. Millions of students use StudyMode to jumpstart their assignments. Note Taking Tips for Research Papers. While you’re working on your research paper, develop some savvy note-taking habits that will save you loads of time later.
READING SCIENTIFIC PAPERS Understanding of one part of an article. Some authors will also present the punch line of their research in a way that is. This handout provides detailed information about how to write research papers including discussing research papers as a genre, choosing topics, and finding sources. Understanding Change:. Their keen understanding of change is reflected in the term they use for "crisis" — wei-ji — which is. Research in anthropology. Conceptual Understanding Conceptual Understanding research papers discuss the term frequently employed in education, particularly in reference to a student’s. Understanding Research Trends in Conferences using. papers that the selected author has published in CHI, and papers that have referenced them, using orange.
We would like to show you a description here but the site won’t allow us. Reading and Understanding Academic Research in Accounting 27 2000) to the success of new audit methods (Bamber and Ramsay, 2000). These studies can give. How to Read a Scientific Paper BIOC/MCB 568. Papers are one of the most important ways that we communicate with one another. In understanding how to. Welcome To Researchpapers.net, a collection of more than 50,000 research papers and customized report-writing services designed to assist students. Relation Annotation for Understanding Research Papers Yuka Tateisi y Yo Shidahara z Yusuke Miyao y Akiko Aizawa y yNational Institute of Informatics, Tokyo, Japan. When it comes to research papers, there are three primary types that you may be asked to write. In most cases, you will be assigned a specific type, but some. Understanding Research is the second program in the DISCOVERING PSYCHOLOGY series. This program examines how we know what we know. You'll explore the.
Understanding Clinical Papers is a popular and well established introduction to reading clinical papers. It unravels the process of evidence-based practice, using. Learn how to read the research tables on this website. Understand the formatting of scientific studies so you can get the most out of the data. This article, the second in a three-part series on research, explores quantitative research. Quantitative research aims to focus on objectivity, and therefore. How to do Graduate-level Research: Some Advice1 Dr. Bhaskar Krishnamachari First Draft, September 2002 Autonomous Networks Research Group (ANRG) Working. View Conceptual Understanding Research Papers on Academia.edu for free. Writing a Research Paper The research paper. There will come a time in most students' careers when they are assigned a research paper. Such an assignment often.
Free essays, research papers, term papers, and other writings on literature, science, history, politics, and more. Tools for Understanding Tools for Understanding: Scientific Journal Articles;. Armed with the basics of how to locate research publications and how. Research papers. EA Taxonomy term (Content) - Row by date They have been designed with the aim of developing cooperation and understanding between local. How to Read Scientific Research. when they read research articles the way. nutritional sciences students to a method for reading research papers. Understanding Research Study Designs. Navigation. Help. Database Guides Online Tutorials Research Guides Subject Guides. In order to find the best possible. Understanding and Enjoying Research. IAFC Conference Report: Reading and Interpreting Research. By Len Kravitz, Ph.D. An important goal of the research. Understanding America’s White Working Class: Their Politics, Voting Habits, and Policy Priorities. Research Programs; Find an Expert; For Media; Careers; Contact.
Professional Academic Help. Starting at $7.99 per pageOrder is too expensive? Split your payment apart - Understanding research papers. Research Papers on Essay Concerning Human Understanding by John Locke examines primary and secondary qualities. CEE Statement on Understanding the Relationship between Research and Teaching. Understanding Crude Oil Prices. Digest — Non-technical summaries of 4-8 working papers. James Poterba is President of the National Bureau of Economic Research. Organizing Your Social Sciences Research. Organizing Your Social Sciences Research. Produces more complete knowledge and understanding of the research. Reading and understanding research papers is a skill which every single doctor and scientist has had to learn during graduate school. You can learn it too.
The first article in this series on understanding research (Lee, 2006a) examined the basic terminology used by researchers and identified that qualitative research. View all Understanding essays and research papers. View and download complete sample Understanding essays, instructions, work cited pages, and more. Sample Paper for Research Methods Daren H. Kaiser Indiana University Purdue University Fort Wayne. Running head:. Sample Paper for Experimental Psychology. Understanding and critiquing quantitative research papers. Instrument, 2014 research critique the critique paper mar 05, p. Beliefs in a vitally important role in. What are good ways of increasing efficiency in reading and understanding research papers?. Here are some things that will help you understand research papers. Publishing Research Papers in Academic Journals: Understanding the scholarly publishing world, the pressures to publish in scientific journals and the.
|
Exam Information (AP Biology Exam from spring 2012 and prior) Exam Content The Topic Outline in the Course and Exam Description provides details about the content. 2010 AP Course Requirements Your guide for what is needed for this course and what is expected of you in this course. 2010 AP Biology Curriculum Schedule. Archiving Early America Your Window Into America's Founding Years Resources For Teachers and Students of Early. Website Url Brief Description; New York Times - Termites http://www.nytimes.com/2015/03/03/science/termites-are-guardians-of-the.
Reading Guides. Book PDF. Ch 3: Ecosystems. Chapter 4: Biodiversity and Evolution. Chapter 5: Part One: Biodiversity, Species Interactions, and Population Control. Advanced Placement Biology. EXAM QUESTIONS AND STANDARDS. You can download and preview AP Biology test questions and answers in text format or you.
This site is intended as a resource for university students in the mathematical sciences. Books are recommended on the basis of readability and other pedagogical. Intended Audience/Grade Level; These lessons are intended for use in any high school biology course. However, many can be used in middle school / junior high. Flashcard Machine - create, study and share online flash cards ― ― ― My Flashcards; Flashcard Library; About; Contribute; Search; Help; Sign In; Create Account. Energy and the Human Journey: Where We Have Been; Where We Can Go. By Wade Frazier. Version 1.2, published May 2015. Version 1.0 published September 2014. Pearson Course Content. Pearson is the world leader in publishing, education and learning. Pearson Prentice Hall, along with our other respected imprints, provides.
Engage students with immersive content, tools, and experiences. Part of the world's leading collection of online homework, tutorial, and assessment products, Pearson. Prepare to do fearsome battle in the Regional Championships for HeroClix and Dice Masters as well as many other amazing side events in the Winter 2017 WizKids Open. The following is a comprehensive list of essay questions that have been asked on past AP exams. The questions are organized according to units.
2017 AP Scholarships Applications 2017 AP Scholarships Applications are now open for AP Summer Institute scholarships. Apply to receive professional development funding. In the United States, Advanced Placement Biology (commonly abbreviated to AP Biology or AP Bio), is a course and examination offered by the College Board to high.
How to Ace AP Biology. AP Biology is a notoriously challenging course that students take in order to earn advance placement or credits for college. The class itself. Welcome to the Teachers' Center at Explore Biology. Here you will find resources to help you teach biology at the high school level.
Thousands of Test Prep videos for PSAT, SAT, AP Exams, and more. Organized by test for easy browsing. AP Biology practice tests, notes, and outlines. Our directory is great for AP bio review. Free response questions, multiple choice, study guides, and more. Pearson, as an active contributor to the biology learning community, is pleased to provide free access to the Classic edition of The Biology Place to all educators. MetaPack are the leading provider of delivery management technology to enterprise retailers and retail delivery partners across the world. Our platform integrates to. Teacher Login / Registration : Teachers: If your school or district has purchased print student editions, register now to access the full online version of the book.
|
September 30, 2016 marked the first anniversary of Russia’s direct military involvement in the Syrian conflict. Although many onlookers initially believed that recent attempts to broker peace would succeed due to Russia’s leverage over the Syrian government, this has not turned out to be the case. Instead, Russia has disrupted the peace process by actively contradicting its verbal commitments for peace in Syria and supporting President Bashar al-Assad’s actions militarily as well as politically through the UN Security Council. The following includes a sampling of five actions by Russia that have been obstacles to peace:
1. Russia has encouraged and proliferated attacks on civilians
International humanitarian law (IHL) is the guiding framework for actions taken during warfare, including the treatment of civilians and those no longer participating in hostilities. Prior to direct Russian intervention, the Syrian government was already accused of committing numerous IHL violations, such as the targeting of hospitals and civilian populations, the forced displacement of civilians, and the use of chemical weapons. Instead of holding the Syrian government to a higher standard, Russia has increased the severity of Syria’s violations. Almost immediately after Russia entered the conflict in October 2015, for example, its air strikes targeted six medical facilities, and since then human rights groups have claimed the health crisis has worsened due to the continued destruction of health facilities. Moreover, Russia has been supporting Syria’s tactic of systematic forced displacement, such as advocating for humanitarian corridors to pressure civilians in eastern Aleppo to leave the area or be subject to attacks.
In addition, Human Rights Watch (HRW) documented the use of cluster munitions — banned under international law when used in civilian areas due to their indiscriminate nature — during a Syria-Russia joint offensive that resulted in the deaths of at least 35 civilians. Additionally, a Russian media television broadcast revealed incendiary weapons mounted on Russian military aircraft bound for Syria. These weapons are designed to set fire to objects or cause burn injury to persons and are in direct violation of the Convention on Certain Conventional Weapons, of which Russia is a signatory.
Russia has also defended Syria’s use of prohibited arms. In August, a UN Security Council chemical weapons report concluded that the Syrian government had carried out nine chemical weapons attacks in Syria from April 2014 to March 2015. While the UN and other international powers pressed for sanctions and UN Security Council action, including referring the situation in Syria to the International Criminal Court, such efforts have been met with resistance from Russia.
2. Russia has conflated attacks on civilians with combating terrorism
Like the Syrian government, Russia has justified many of the aforementioned attacks under the rhetoric of combatting terrorism. Using the Syrian government’s broad definition of terrorism which conflates civilians with terrorists, Russia has continued to conduct indiscriminate airstrikes within Syria. It has also used this explanation to justify its support for Assad at the UN and continued supply of weaponry to Syria. These intentions were further reflected in February’s US-Russia brokered ceasefire agreement, which failed to define “terrorist groups” or create maps defining areas where terrorist groups are located. And it was under the second iteration of this framework that Russian planes allegedly bombed a UN convoy set to deliver aid to approximately 78,000 civilians in Aleppo. At least 20 people were killed in the attack which, if found to be deliberate, would constitute a war crime. Russia’s denials and refusal to apologize despite the many witnesses and videos documenting its role in the attack demonstrate its lack of sincerity in alleviating the humanitarian crisis or advancing the peace process. Although it has blocked aid in the past, not even the Syrian government has taken action to this extent upon a humanitarian aid convoy trying to reach besieged civilians.
— Russian Embassy, USA (@RusEmbUSA) October 17, 2016
After comments by US Secretary of State John Kerry and UK Foreign Minister Boris Johnson that Russia sought a Grozny solution in Aleppo, Russia released the above tweet in response. During the Second Chechen War, Russia destroyed the the Chechen capital of Grozny with ballistic missile strikes.
3. Russia has convoluted the peace process
In Syria, hundreds of armed groups have taken part in hostilities, many of which control territory on the ground, exerting military and/or political influence. To further complicated matters, several foreign powers are also involved either directly or indirectly in supporting different factions and sides. The formation of the High Negotiations Committee (HNC) was an attempt to consolidate the opposition and bring international backers and fighting factions to the negotiating table. Instead of accepting this consolidation, Russia convoluted the process by supporting alternative groups, such as the Moscow Group, Cairo Group, and Istana Group — none of which are viewed as representative and many of which are considered pro-Russian. This has fueled internal rivalries within the opposition, allowing Russia to play the different groups off one another on the issue of if, when, and how President Assad should step down from power, claiming that no single group represents the interests of all Syrians.
4. Russia has undercut a Syrian-led political transition framework
Six weeks into its military involvement in Syria, Russia released a document entitled “Approach to the Settlement of the Syrian Crisis” which outlined Russia’s objectives and strategies for solving the conflict. Next, in the spring of 2016, Russia began working with the US to draft a new constitution for Syria. This action was not only premature, but dangerous to the prospect of a Syrian-led institutional reform process, beginning with constitutional reform to address Syria’s legacy of authoritarianism and human rights abuses. A Russian-drafted constitution would lack input from Syrians and would not appropriately respond to the needs of Syrian citizens to establish a solid constitutional framework that can guide post-conflict Syria. By trying to draft its own version of a constitution for Syria, Russia also undercut the text of UNSC Resolution 2254, which “expressed support for a political process under Syrian leadership.”
5. Russia has decreased the likelihood of an international justice mechanism for Syria
Russia’s participation in the war has drastically decreased the possibility of establishing any type of international justice system for Syria. As a member of the UN Security Council with veto power, Russia had already protected its ally by blocking a resolution referring the Syrian situation to the International Criminal Court (ICC). Despite Russian resistance, the international community may still have been able to politically pressure Russia to allow either a referral to the ICC or perhaps the establishment of an international hybrid tribunal. But now that Russia is militarily involved and allegedly responsible for war crimes and crimes against humanity, it is highly unlikely that Russia will ever agree to any form of international criminal accountability that may lead to the indictment of its own leadership or military personnel. With Russia’s unwavering support of Syria and interest in avoiding criminal responsibility, the international community is now at a deadlock. While other components of transitional justice might still be possible, such as reparations to victims and institutional reform, a key component of the holistic transitional justice framework — criminal accountability — is more elusive than ever.
For more information or to provide feedback, please email SJAC at [email protected].
|
Review of Short Phrases and Links|
This Review contains major "Glossary of Mineral Stubs"- related terms, short phrases and links grouped together in the form of Encyclopedia article.
- Esperite is a primary mineral and is moderately widespread at Franklin, but has not been found at Sterling Hill.
- Esperite is a calcium lead zincosilicate mineral, related to beryllonite and trimerite.
- Esperite is a lead-silicate mineral that came from a certain region of the mine.
- Esperite is a rare complex calcium lead zinc silicate (PbCa 3 Zn 4(SiO 4) 4) related to beryllonite and trimerite that used to be called calcium larsenite.
- Esperite is a rare complex lead zinc silicate (PbCa 3 Zn 4(SiO 4) 4) that used to be called calcium larsenite.
- Aragonite is a carbonate mineral.
- Aragonite is a constituent of many species' shell structures.
- Aragonite is a constituent of many sea creatures' shell structures; a curious development since calcite is the more stable form of calcium carbonate.
- Mineralization is a process by which soil microorganisms decompose organic nutrients into a mineral inorganic, or plant available form.
- The mineralization was subjected to retrograde hydrothermal metamorphism and recrystallization during the cooling of the intrusions.
- Significant niobium mineralization is confined to the carbonatite.
- Aegirine is a favorite amongst mineral collectors.
- Aegirine is a rockforming mineral in the ekerites south of Drammen.
- Aegirine is a sodium ferric-iron silicate mineral of the pyroxene group.
- Aegirine is an inosilicate member of the clino pyroxene group.
- Aegirine is the sodium endmenber of the aegirine - augite series.
- Anthophyllite is a common component of some metamorphic and metasomatic rocks.
- Anthophyllite is a fibrous mineral as you can see in these pictures, it has been used asbestos insulation.
- Anthophyllite is a fibrous mineral.
- Anthophyllite is a magnesium iron silicate hydroxide.
- Anthophyllite is a mineral occuring in crystalline schists rich in magnesium.
- Andalusite is a beautiful semi-precious gemstone with a diverse and changeable personality.
- Andalusite is a color shifting stone because the colors are there at the same time.
- Andalusite is a gemstone that has recently been "discovered" by the press.
- Andalusite is a mineral formed by the metamorphism of aluminous shales and slate.
- Andalusite is a mineral, aluminum silicate, usually found in orthorhombic crystals of various colors.
- Armalcolite is a high titanium mineral that forms at high temperatures and pressures such as those that exist when a meteorite impacts the surface.
- Armalcolite is a mineral that was discovered at Tranquility Base by the Apollo 11 crew.
- Armalcolite is a mineral that was discovered at Tranquility Base on the Moon by the Apollo 11 crew in 1969.
- Armalcolite is a mineral that was discovered at Tranquillity Base on the Moon by the Apollo 11 crew in 1969.
- Armalcolite was first described from the Apollo 11 site, and is named after the Apollo 11 crew ( ARMstrong, ALdrin, and COLlins).
- Atacamite is a comparatively rare mineral, formed from primary copper minerals in the oxidation or weathering zone of arid climates.
- Atacamite is a comparatively rare mineral, formed in some cases by the action of sea-water and occurring also as a volcanic product.
- Atacamite is a mineral found originally in the desert of Atacama Desert, Chile, and named by D. de Gallizen in 1801.
- Atacamite is a mineral found originally in the desert of Atacama, and named by D. de Gallizen in 1801.
- Atacamite is a minor source of copper as it is rarely found in amounts large enough to be worth mining.
- Augite is a basic silicate mineral with high content of iron and magnesium, a so-called "ferromagnesian" mineral of the pyroxene grouping.
- Augite is a calcium sodium magnesium silicate mineral of the pyroxene group; samples from Franklin and Sterling Hill contain much Fe, Mn, and Zn.
- Augite is a dark mineral important in the formation of igneous rocks that is most frequently found in basalts, dolerites, and gabbros.
- Augite is a ferro-magnesian mineral belonging to the pyroxene group.
- Augite is a greenish-black mineral that is found in many igneous rocks.
- Aurichalcite is a mineral, usually found as a secondary mineral in copper and zinc deposits.
- Aurichalcite is a carbonate mineral, usually found as a secondary mineral in copper and zinc deposits.
- Aurichalcite is a carbonate-hydroxide of zinc and copper with the formula [(Zn,Cu).sub.5][(C[O.sub.3]).sub.2][(OH).sub.6].
- Aurichalcite is a rare secondary mineral in Mississippi Valley-type lead and zinc deposits.
- Aurichalcite is a secondary mineral formed in oxide zones of deposits containing primary zinc and copper sulfides.
- Baddeleyite is a mineral Minerals are natural compounds formed through geological processes.
- Baddeleyite is a mineral that consists of zirconia ( Zr O 2). Its melting point is 2700 ° C.
- Baddeleyite is a mineral that consists of zirconia ( Zr O 2). Its melting point is 2700 ° C. Elemental zirconium is refined from baddeleyite.
- Baddeleyite is a mineral that consists of zirconia (ZrO2). Its melting point is 2700 --C. Elemental zirconium is refined from baddeleyite.
- Baddeleyite is a natural mineral of the same chemical composition, but it is a monoclinic mineral.
- Boulangerite is a Sulfosalt, a type of Sulfide where Antimony acts like a metal and occupies a position where it is bonded to Sulphur.
- Boulangerite is a lead ore.
- Boulangerite is a mineral, lead antimony sulfide, formula Pb 5 Sb 4 S 11. It forms metallic grey Monoclinic crystals.
- Boulangerite is a mineral, lead antimony sulfide, formula Pb 5 Sb 4 S 11. It was named in 1837 honor of French mining engineer Charles Boulanger.
- Boulangerite is one of a few sulfide minerals that form fine acicular crystals that appear as hair-like fibers.
- Bowenite is a gemstone of extremely rare geological occurrence.
- Bowenite is a hard, compact variety of antigorite serpentine found in Rhode Island, and several other places throughout the world.
- Bowenite is a hard, compact variety of serpentine found in Rhode Island.
- Bowenite is a jade -like stone (green to black) that is sometimes used in jewelry.
- Bowenite is a variety of serpentine that is sometimes misrepresented as jade.
- Brookite is a polymorph with two other minerals.
- Brookite is a simple oxide of titanium and it shares identical chemistry with rutile and anatase - TiO2.
- Brookite is a source of titanium but deposits are usually too small to be of commercial use.
- Brookite is a transparent to opaque mineral that occurs in various shades of red- and yellow-brown through dark brown to black.
- Brookite is a trimorph with rutile and anatase - this thumbnail's from Magnet Cove, Hot Springs County, Arkansas.
- Brucite is a decomposition product of magnesium silicates, especially serpentine.
- Brucite is a decomposition product of silicates, especially serpentine.
- Brucite is a hydroxide of magnesium with the composition Mg(OH)2 . This sample is about 14x7 cm and is from the Ethel Mine, Mtoroshanga, Zimbabwe.
- Brucite is a magnesium hydroxide mineral and the Mg-analogue of pyrochroite.
- Brucite is a magnesium hydroxide with the chemical.
- Chabazite is a Zeolite and occurs in basaltic rocks, but can also be found in limestones and even schists.
- Chabazite is a mineral found in many locations around the world.
- Chabazite is a mineral of secondary origin found lining cavities in volcanic and intrusive igneous rocks.
- Chabazite is a natural zeolite with the approximate formula Ca.sub.6 Al.sub.12 Si.sub.24 O.sub.72.
- Chabazite is the dominant zeolite, occurring most commonly in veins.
- Chlorastrolite was named official state gem in 1972.
- Chlorastrolite is a beautiful green mineral with a chatlyant "turtle-back" pattern.
- Chlorastrolite is a green or bluish green stone, usually with finely radiated or stellate masses.
- Chlorastrolite is a mineral that is formed in association with lava flows.
- Chlorastrolite was first known to be used for jewelry in the late 1890s in New York and later in the Midwest as stickpins.
- Chlorastrolite was named the official state gem of Michigan with Public Act 56 of 1972.
- Colemanite is a borate mineral found in evaporite deposits.
- Colemanite is a hydrous calcium borate.
- Colemanite is a major source of borax and has a relative hardness of 5.
- Colemanite is a mineral containing borate found in Death Valley.
- Colemanite is a powerful flux.
- Dumortierite is a aluminum mineral with traces of borax and silica.
- Dumortierite is a blue to violet silicate mineral that is used as an ornamental stone.
- Dumortierite is a boro-silicate (Quartz) mineral that is used as a popular ornamental stone.
- Dumortierite is a boro-silicate mineral that is used as a popular ornamental stone.
- Dumortierite is a great stone for healers as an aid in diagnosing health problems.
- Dunite is also the principal host of deposits of the mineral chromite.
- Dunite is also used for refractory materials for furnaces.
- Dunite is an intrusive igneous rock that dominantly consists of coarse grains of the pale green mineral olivine.
- Dunite is the olivine rich endmember of the peridotite group of mantle derived rocks.
- Dunite is the olivine-rich end-member of the peridotite group of mantle-derived rocks.
- Enargite is a copper arsenic sulfosalt mineral with formula: .
- Enargite is a copper arsenic sulfosalt mineral with formula: Cu.
- Enargite is a low to medium temperature mineral from hydrothermal veins usually associated with other sulphides and quartz.
- Enargite is a rare mineral from Tsumeb.
- Enargite is a somewhat rare copper mineral.
- Erythrite is a cobalt-arsenic ore (Co 3 [AsO 4 ] 2 -8H 2O) sometimes found in association with copper ores.
- Erythrite is a good example of a arsenate mineral.
- Erythrite is a monoclinic mineral that tends to form elongated prismatic crystals.
- Erythrite is a purple colour and is cobalt arsenate.
- Erythrite is a secondary hydrated arsenate of cobalt Cobalt is a chemical element in the periodic table that has the symbol Co and atomic number 27.
- Ferberite is a black mineral composed of iron(II) tungstate (tungsten oxide), chemical formula ferberite bolivia FeWO 4 . Discovered in 1863.
- Ferberite is a black monoclinic mineral composed of iron(II) tungstate, FeWO 4.
- Ferberite is a black monoclinic mineral composed of iron(II) tungstate, FeWO4. Ferberite occurs as granular masses and as slender prismatic crystals.
- Ferberite is a black, dense (specific gravity 7.3-7.5), brittle mineral that is most familiar as metallic to submetallic tabular crystals.
- Ferberite is the iron endmember of the manganese - iron wolframite solid solution series.
- Euxenite is a brownish black mineral with a metallic luster, found in Norway.
- Euxenite is a complex titanium-niobium tantalic that contains small amounts of thorium and uranium .
- Euxenite is a rare earth titanium-tantalate containing 10 to 13 percent uranium oxide.
- Euxenite is an uncommon mineral found in complex granitic pegmatites.
- Euxenite is used as a minor ore of rare earth elements and Uranium.
- Garnierite is a Nickel rich variety of serpentine associated with nickel-peridoteites.
- Garnierite is a hydrous nickel silicate, with the serpentine group of minerals.
- Garnierite is a major Nickel (Ni) ore.
- Garnierite is a mineral composed of hydrous nickel silicates a member of the serpentine group with formula: (Ni,Mg) 3 Si 2 O 5(OH). N--pouite is a synonym.
- Garnierite is the name for a green nickel ore which is found in pockets and fissures of weathered ultramafic rocks ( serpentinite, dunite, peridotite).
- Glaucochroite is a calcium manganese nesosilicate mineral with formula: CaMnSiO 4. It occurs in metamorphosed limestones.
- Glaucochroite is a calcium manganese orthosilicate, analogous to tephroite, calcium taking the place of half the manganese.
- Glaucochroite is a calcium manganese silicate mineral of the olivine group.
- Glaucochroite is the only calcium olivine here; it is locally common at Franklin, and it is unknown from Sterling Hill.
- Glaucochroite was derived from the Greek words for blue-green and color.
- Greenockite is a cadmium sulfide mineral isostructural with wurtzite.
- Greenockite is a rare cadmium mineral that consists of cadmium sulfide, CdS, in It was first recognized in 1840 in Greenock, Scotland.
- Greenockite is a rare cadmium mineral that consists of cadmium sulfide, CdS, in crystalline form.
- Greenockite is a rare mineral and the only real ore of cadmium.
- Greenockite is a rare yellowish mineral ore of cadmium that consists of cadmium sulphide in crystalline form.
- Hausmannite is a brown to black metallic mineral with Mohs hardness of 5.5 and a specific gravity of 4.8.
- Hausmannite is a complex oxide of manganese containing both di- and tri-valent manganese.
- Hausmannite is a manganese oxide mineral.
- Hausmannite is an interesting, and can be (when well-formed) a first-rate mineral specimen.
- Hausmannite is one of the main ore minerals of the Kalahari manganese field.
- Herderite is a rare form of beryl.
- Herderite is a rather rare mineral.
- Herderite is a very uncommon species in attractive examples.
- Herderite is an attractive and except in some mines in New England, a rather scarce phosphate mineral.
- The herderite is a lavander-grey color.
- Hedenbergite is a common mineral, the iron end member of the diopside- hedenbergite series.
- Hedenbergite is a member of the clinopyroxenes, which crystallize in the monoclinic system and contain calcium, iron, aluminum, sodium, or lithium.
- Hedenbergite is a member of the pyroxene group, which is an important and widely distributed group of rock-forming silicates.
- Hedenbergite is a part of an important solid solution series of the pyroxene group.
- Hedenbergite is a principal rock-forming mineral in the Dalnegorsk polymetallic deposits.
- Humite is a related species to clinohumite as might be expected by their names.
- Humite is a fairly rare mineral.
- Humite is an orthorhombic mineral of a transparent vitreous brown to orange color.
- Humite is the namesake member of the Humite Group of minerals.
- Humite is the naming member of a group of minerals called the humite group.
- Hydroxylapatite is a bone mineral, and has recently been developed as a bone and tooth implant material.
- Hydroxylapatite is a crystalline form of calcium hydroxylphosphate which has the ability to bind proteins according to their basic or acidic character.
- Hydroxylapatite is a hexagonal, calcium-phosphate mineral used to promote bone growth onto orthopaedic implants.
- Hydroxylapatite is a naturally occurring mineral present in phosphate rock.
- Hydroxylapatite is the hydroxyl endmember of the complex apatite group.
- Illite is a Disclaimers or layered silicate.
- Illite is a common syn.
- Illite is a mineral which hardly reacts with lime.
- Illite is a non-expanding, clay -sized, micaceous mineral.
- Illite is a non-expanding, clay ized, micaceous mineral.
- Ilvaite is a member of the Sorosilicate subclass of the silicate minerals.
- Ilvaite is a mineral, which glorified the Dalnegorsk deposits.
- Ilvaite is a mixed-valence calcium and iron silicate known previously as a relatively rare mineral in some Zn(Pb), Fe, and Sn skarns.
- Ilvaite is a much rarer species and good ilvaite samples are scarce.
- Ilvaite is a sorosilicate of iron and calcium with formula: CaFe 2+ 2 Fe 3+ Si 2 O 7 O(OH). Both manganese and magnesium substitute in the structure.
- Kernite is a fairly common ore type that yields the largest amount of mexallon of any ore types in the world.
- Kernite is a light soft mineral consisting of hydrated sodium borate in crystalline form.
- Kernite is an industry leader of maintenance, repair and operating products and services for business and industry.
- Kernite is the preferred ore mineral for borax.
- Kernite is used to make boric acid, which is used to make glass such as, glazes, laboratory glass, fiberglass and Pyrex™.
- Ironstone is a bountiful and widespread source of iron (Fe), although it only contains <50% iron, far less than the other main source of iron, hematite.
- Ironstone is a bountiful and widespread source of iron (Fe), although it only contains hematite .
- Ironstone is a fine-grained sedimentary rock, important as a source of iron.
- Ironstone is a fine-grained, heavy and compact sedimentary rock .
- Ironstone is a heavy, compact rock containing iron minerals.
- Lazulite is a phosphate-based mineral containing magnesium, iron, and aluminum phosphate.
- Lazulite is a rare and beautiful phosphorous-based mineral.
- Lazulite is a relatively rare mineral that gets easily confused with other, more well known, minerals.
- Lazulite is most often used as ornamental stones and rare mineral specimens.
- Lazulite is the official gemstone of the Yukon Territory.
- Laumontite is a common zeolite mineral indicative of low-grade metamorphism of lavas and volcaniclastic sediments.
- Laumontite is a "must-have" for any zeolite collector, and a real prize for all other mineral collectors as well.
- Laumontite is a common zeolite whose equilibrium phase relations and room-temperature frictional behavior are well understood.
- Laumontite is a handsome mineral.
- Laumontite is a mineral, one of the zeolite group.
- Linarite is a basic sulfate of copper and lead with the formula of PbCu(S[O.sub.4])[(OH).sub.2].
- Linarite is a rare but colorful secondary mineral that occurs in association with some lead copper ores.
- Linarite is a rare secondary mineral that forms by oxidation of lead and copper deposits.
- Linarite is a somewhat rare, crystalline mineral that is known among collectors for its unusually intense, pure blue color.
- Linarite is an intense blue mineral.
- Liroconite is a beautiful mineral that is not often available from any new sources.
- Liroconite is a an extremely rare and very beautiful mineral.
- Liroconite is a rare secondary mineral that forms by the oxidation of copper deposits.
- Liroconite is a truly beautiful mineral with a typical bright blue color, a nice glassy luster and an interesting crystal habit.
- Liroconite is a very rare copper aluminum arsenate with some water mixed in for good measure.
- Manganite is a Mineral consisting of Manganese Oxide Hydroxide, MnO(OH), crystallizing in the Orthorhombic system and isomorphous with Diaspore and Goethite.
- Manganite is a mineral MnO(OH) (see below) as well as to the ion MnO 4 4- discussed under Manganate.
- Manganite is a mineral with composition is manganese oxide -hydroxide.
- Manganite is a mineral.
- Manganite is a minor ore of manganese.
- Mellite is a naturally occurring organic mineral species.
- Mellite : A mineral of a honey color, found in brown coal, and partly the result of vegetable decomposition; honeystone.
- Mellite is a naturally ocurring organic mineral species.
- Mellite is known as the “honey stone”.
- Mellite is known as the “honey stone”.
- Riebeckite is a fibrous mineral, one of those which were given the commercial name asbestos.
- Riebeckite is a part of several solid solution series.
- Riebeckite is a sodium-rich member of the amphibole group of minerals.
- Riebeckite is an important mineral for two main reasons: one for when it is there and one for when it isn't.
- Riebeckite is the ferrous iron rich member of the series and as the name implies, magnesioriebeckite is the magnesium rich member.
- Abelsonite is a mineral of nickel, carbon, hydrogen, and nitrogen with formula: Ni[C 32 H 36 N 4]. It forms purple to reddish brown triclinic crystals.
- Location: Abelsonite was first discovered in a core sample from the WOSCO well for the Western Oil Corporation.
- Abernathyite is a uranium arsenate that is part of the metatorbornite group.
- Clear, yellow, crystalline abernathyite crystal group.
- Studies of the torbernite minerals (I): The crystal structure of abernathyite.
- Abhurite is only known as corrosion product of tin artefacts.
* Antimonide Mineral
* Argillaceous Schist
* Arsenate Mineral
* Arsenide Mineral
* Black Tin
* Blue Stone
* Carbonate Rock
* Desert Glass
* Dresden Green Diamond
* Franklin Furnace
* Gold Nugget
* Herkimer Diamond
* Ionic Crystal
* Moss Agate
* Native Copper
* Neelanjali Ruby
* Ornamental Stone
* Pyroclastic Rock
* Quartz Monzonite
* Selenide Mineral
* Smoky Quartz
* Star Sapphire
* Sulfide Mineral
* Telluride Mineral
* Type Metal
* White Tin
Books about "Glossary of Mineral Stubs" in
|
- ca. 1540
- Steel, silver, wood
- L. 43 3/8 in. (110.2 cm); L. of blade 38 1/4 in. (97.2 cm)
- Credit Line:
- Purchase, Arthur Ochs Sulzberger Gift, 2010
- Accession Number:
From the early sixteenth century onward, the practice of wearing a sword or rapier with civilian dress made duels between unarmored opponents more common. Lacking the armor or shield worn in battle, combatants had to block or parry an attack by other means. Methods of defense included the use of a dagger or a buckler held in the left hand and an increased reliance on parries made with the rapier itself.
During the sixteenth and seventeenth centuries, distinct schools of fencing developed rapidly in Italy, France, Germany, and Spain. Instruction in the art and science of fencing became an indispensable part of a nobleman’s education. Consequently, accomplished fencing masters were hired to teach at the principal courts and universities of Europe.
From about 1525 to about 1625, the rapier was regularly worn in tandem with a parrying dagger. They were sometimes made and decorated as a set. By the mid-seventeenth century, however, parrying with the rapier blade alone had become the preferred style as a result of the development of refined fencing techniques and lighter, smaller rapiers. Most forms of left-hand parries were abandoned, except in southern Italy and Spain, where parrying daggers remained popular well into the eighteenth century.
|
The dump backup command
Use the dump Command to back up File Systems.
dump Backup Command for Data Loss Protection
command offers a more extensive set of backup options by allowing fine-grained incremental as well as full dumps to be performed.
System administrators responsible for maintaining backups of large quantities of moderately volatile data will find this extremely useful.
With incremental dumps, time-intensive full backups can be performed less often with shorter incremental dumps used to "fill in the blanks."
Backs up files or directories
Supports backup levels from 0 (full) to 9
Is available as a Red Hat Linux RPM
An acronym for Red Hat Package Manager, an RPM is a group of files stored in a single portable file.
The following SlideShow illustrates several examples:
Redhat Linux Dump Commands
The appropriate dump schedule depends on whether you wish to reduce the size of the dumps or the number of restores necessary to recover.
To decrease the size of the incremental dumps, use a dump schedule in which the level increases every day. If you wish to minimize the number
of restores needed to recover a file system, you should use a dump schedule in which the dump level decreases every day.
For example, a dump schedule of zero on Sunday, six on Tuesday, four on Thursday, and two on Saturday would be an appropriate schedule
for a stable system with little alteration to the files. In this scenario, only two restores would be needed to reinstate the system:
a full restore layered with the incremental restore.
The next lesson examines the
|
Why do certain substances react together in the way that they do? What determines the shape of molecules? And how can we predict whether a particular reaction will happen at all? Such questions lie at the heart of chemistry - the science of understanding the composition of substances, their reactions, and properties. While often fragmented into the strands of inorganic, organic, and physical chemistry, a full understanding of chemistry can only be gained by seeing the subject as a single, unified whole. Chemical Structure and Reactivity rises to the challenge of depicting the reality of chemistry. Offering a fresh approach to undergraduate teaching, it depicts the subject as a seamless discipline, showing how organic, inorganic, and physical concepts can be blended together to achieve the common goal of understanding chemical systems. With a lively and engaging writing style augmented throughout by purpose-drawn illustrations, and custom-developed online support, Chemical Structure and Reactivity alone makes taking an integrated approach in the teaching of chemistry a realistic proposition. Online Resource Centre: For students: * Custom developed multimedia content linked to the book, enabling students to investigate the concepts and phenomena presented in the book in a fully interactive way. * Question sets to help students master concepts and gain confidence through hands-on engagement. For lecturers: * Fully worked solutions to the exercises available through the Online Resource Centre. For registered adopters of the book: * Figures from the book in electronic format.
|
A US start-up has turned to nature to help bring water to arid areas by drawing moisture from the air.NBD Nano aims to mimic the way a beetle survives in an African desert to create a self-filling water bottle capable of storing up to three litres every hour.
The insect harvests moisture from the air by first getting it to condense on its back and then storing the water.
Using nature as an inspiration for technology, known as biomimicry, is increasingly widespread.
NBD Nano, which consists of four recent university graduates and was formed in May, looked at the Namib Desert beetle that lives in a region that gets about half an inch of rainfall per year.
Using a similar approach, the firm wants to cover the surface of a bottle with hydrophilic (water-attracting) and hydrophobic (water-repellent) materials.
The work is still in its early stages, but it is the latest example of researchers looking at nature to find inspiration for sustainable technology.
|
I’ve spent much of the past week traveling through Bretagne (or ‘Breizh’ in the local Breton language) — the peninsula that juts out from northwestern France into the Atlantic Ocean, and I’ve spent some time thinking about regionalism in France and why Bretagne, with its Celtic roots, geographic isolation, historical independence and distinct language, isn’t more like Scotland or Catalonia politically.
With just over 3 million residents, the region of Bretagne is home to about 5% of France’s population, though the administrative region of Bretagne doesn’t include all of what was considered Bretagne historically — another 1 million people live in Loire-Atlantique, which is technically part of the Loire region despite its historical inclusion within wider Bretagne. Regardless of the current regional borders, Bretagne is a unique part of France, and its cultural heritage sets it apart as at least as unique as any other region of France, given that it was settled by Celtic migrants from the north who successfully rebuffed Vikings, Normans, Gauls and Franks for centuries in what, during the Middle Ages, was known as Armorica. Despite its independence, Bretagne increasingly became the subject of both English and French designs in the early half of the millennium, and the region was one of the chief prizes of the Hundred Years War between England and France in the 14th and 15th centuries, which finally settled France’s hold on Bretagne.
Moreover, Breton — and not French — was the dominant language spoken in the region through much of the 19th century. Despite the universal use of French today and a declining number of Breton speakers, around 200,000 native speakers remain, and Breton features prominently on many public signs in the region, especially as you go further west in Bretagne. (Another second language, Gallo, is used by around another 30,000 Breton residents).
Bretons, such as Jacques Cartier, dominated the earliest French efforts to explore and colonize the New World and, even in the 19th century, the region’s role in transatlantic shipping and trade meant that its ties with far-flung places like Newfoundland and Labrador were just as influential as the region’s ties to Paris. Cultural ties with other Celtic regions such as Wales, Scotland and Ireland have long overshadowed French cultural influences as well — Breton music has a distinct character and often features bagpipes not dissimilar to those found in other Celtic folk music traditions.
Furthermore, there’s been a resurgence in interest in Breton heritage and cultivation of Breton language in the past 30 years, even as the number of Breton speakers is set to decline over the next decade to just over 50,000. Its distinctive black-and-white flag, the Gwenn-ha-du, developed in the 1920s during a prior wave of Breton nationalism, flies throughout Bretagne much more prolifically than do other regional flags elsewhere in France.
But Bretagne is not a hotbed of separatist agitation like Catalonia or Basque Euskadi in Spain or like Québec in Canada. Nor does it especially have a history of autonomist politics similar to those throughout western Europe — Flanders in Belgium, Galicia in Spain, or northeastern Italy.
Celtic nations, in particular, have long agitated for greater political autonomy throughout western Europe. Scotland will hold a referendum on independence in September 2014, and both Scotland and Wales have routinely supported devolution of power within the United Kingdom. The move for independence in Ireland, another of Bretagne’s Celtic cousins, was perhaps the most successful European nationalist movement in the first half of the 20th century.
The region does have a regionalist party, the Union Démocratique Bretonne (the Breton Democratic Union, or the Unvaniezh Demokratel Breizh in Breton), but the party holds no seats in the Breton regional assembly, and in the most recent 2010 regional elections, it won just 4.29% of the vote. In the June 2012 parliamentary elections to the Assemblée nationale (National Assembly), the UDB’s Paul Molac won election, though technically as a member of France’s Green Party, which contested the elections in alliance with the Parti socialiste (PS, Socialist Party) of French president François Hollande.
If there’s any trend worth marking in Bretagne, it’s that the left has done increasingly well in Bretagne in recent years, to the point that Bretagne could even be considered a Socialist stronghold within France. Hollande defeated former president Nicolas Sarkozy in the region by a margin of 56% to 44% in the second round of the May 2012 presidential election and in 2007, though Ségolène Royal lost the presidency to Sarkozy nationwide, she won Bretagne in the second round by a margin of 53% to 47%. Traditionally, the nationalist, far-right Front national of Jean-Marie and Marine Le Pen have not succeeded to same degree in Bretagne as they have in other parts of France.
But Bretagne simply hasn’t boasted an incredibly strong politics of regionalism, despite several waves of Breton nationalism throughout the 20th century and the current revival of Breton linguistic and cultural heritage.
Why exactly is that the case?
As you might expect, there’s not a single magic answer, but four factors in particular go a long way in explaining why Bretagne hasn’t developed the same level of regionalist politics as, say, Scotland or Catalonia: the five-century duration of French control over Bretagne, the highly centralized nature of the French government, historical reasons rooted in the 20th century and, above all, the lack of an economic basis for asserting Breton independence.
Bretagne became part of France back in 1532 through the Edict of Union that resulted from the marriage of the duchess of Bretagne, Anne, to the French king at a time when the borders of modern-day France were fully coming into relief. The consolidation of the modern French polity predates much of the formation of today’s European nation-states — it precedes the 1831 independence of Belgium from the Netherlands as a nation-state in its own right by over 300 years, to say nothing of the Italian and German unification of the middle of the 19th century. But longevity doesn’t necessarily explain everything — the Act of Union that brought England and Scotland together in 1707 is almost as old, and Scottish residents will vote on independence at the end of 2014.
The longtime centralization of French government also helps explain the paucity of separatism, not only in Bretagne, but throughout the entire country, excepting perhaps the separatist movement on the island of Corsica. As long ago as the 17th century, Louis XIV was already consolidating the power of the French government within the monarchy in Paris and Versailles. Although the French Revolution extinguished the monarchy, and ensuing waves of Napoleonic empire, monarchic restoration and, finally, republicanism transformed the nature of French government, each new form of government culminated in an ever-more centralist government based in Paris. In almost every conceivable vector — economics, culture and art, government and regulation, education, transportation — Paris has long been at the center of French society. While GDP per capita in Bretagne is around €25,000, and per-capita GDP throughout the other regions of France averages between €22,000 and €28,000, per-capita GDP is around €45,000 in Île-de-France, the region where Paris lies.
Though French president François Mitterrand initiated a regional assembly and chief executive for each of France’s 22 mainland regions in 1986, regional assemblies are much weaker than, say, state legislatures in the United States or even the devolved parliaments in Wales, Scotland and Northern Ireland within the United Kingdom. Furthermore, 19th and 20th century French governments worked to eradicate the Breton language, and French administrators routinely found ways to marginalize the distinct Breton identity — until very recently, French law refused to allow parents to use traditional Breton names for their children and, even today, the use of French language is mandated by law in public schools and otherwise throughout the public sector. But that alone can’t necessarily explain it, either. After all, a strong central government in Madrid that at times tried to suppress regional culture and language hasn’t stopped the Catalan and Basque regionalist movements.
A more recent historical explanation is rooted in World War II, when the growing Breton nationalist movement sided actively with Nazi Germany, especially after the German occupation of France and the promulgation of the Vichy government in June 1940. Breton nationalists received financial support from Vichy during the Nazi occupation, which meant that much of the Breton nationalist agenda was discredited in the decades following World War II. The Parti National Breton (National Breton Party), which had formed in the 1930s as a separatist movement based on the model of Ireland’s Sinn Fein, was disbanded in 1944, and many of its leaders were tried and convicted as collaborators, further marginalizing the cause of Breton regionalism.
Perhaps the most salient explanation is economics. Although Bretagne’s economy suffered with the decline of shipping as a source of wealth in post-industrial France, Bretagne’s economy has made huge strides in the past two decades as tourism and other industries have surged. But while Bretagne’s no longer an economic backwater, it doesn’t have the kind of wealth that would make it an incredibly viable independent nation-state. Contrast that to Scotland, where the independence movement has grown in parallel with the development of North Sea oil wealth. Or contrast it to Catalonia, which has traditionally been the wealthy and productive engine of the Spanish economy, or the relatively more prosperous northern Italy, where the Liga Nord (Northern League) has been pushing for greater regional control for two decades. In Flanders, too, the push for ever-greater autonomy has come in parallel to Flemish economic dominance over Wallonia.
All of which means that you shouldn’t hold your breath waiting for a robust Breton nationalist movement anytime soon.
But in a world where the European Union has replaced many of the key elements of national governments and, especially if future EU treaties succeed in transferring further fiscal sovereignty from national capitals to Brussels, the case for Breton autonomy or even Breton independence will grow stronger. So while Bretagne isn’t likely to join Catalonia, Scotland and Flanders in the vanguard of European regionalist movements today, it’s not inconceivable to wonder if Bretagne might consider following suit if those regions ultimately gain independence.
|
If you search the web, read published genealogies or the official biography of President Herbert Hoover, everywhere you’ll find that his ancestor was from Ellerstadt, Palatinate, Germany. But did you know that he was initially identified as the Andreas Huber from Trippstadt, Palatinate, Germany? Or that he might actually be from Ittlingen, landkreis Heilbronn, Baden, Germany? In this article, I’ll examine the past and present thought on this Andreas Huber’s German origins and the impact it has on identifying the origins of my ancestor Andreas Huber.
A list of Huber immigrants to Pennsylvania between 1728 and 1768 taken from the Pennsylvania Archives, Series II, Volume XVII, “Names of Foreigners who took the Oath of Allegiance, 1727-1775.”
|
BIRMINGHAM, Ala. (WIAT) – For the first time everything was, “O.K.”, everything except for Evel Knievel, who broke 93 bones on, “This Day in History”.
On this day in 1839, the initials “O.K.” were first published in The Boston Morning Post. The abbreviation was meant as for the popular phrase “oll korrect,” a slang misspelling of “all correct”. Since then, OK has steadily made its way into the everyday speech of Americans.
On this day in 1919, Benito Mussolini formed Fascist movement in Milan, Italy.
On this day in 1925, Tennessee became the first state to outlaw teaching the theory of evolution.
On this day in 1929, the first telephone was installed in the White House.
On this day in 1972, popular daredevil, Evel Knievel, broke 93 bones after successfully clearing 35 cars.
This year’s NCAA Tournament is still in its early stages, but this day has marked the “one shining moment” for a few teams.
- 1946: Oklahoma State defeated North Carolina (43-40)
- 1956: San Francisco defeated Iowa (83-71)
- 1957: North Carolina defeated Kansas (54-53) after 3 overtimes
- 1963: Loyola defeated Cincinnati (60-58) in overtime
- 1968: UCLA defeated North Carolina (78-55)
Copyright 2014 WIAT-CBS42
|
Cow goes moo: Artificial intelligence-based system associates images with sounds
November 15, 2016
The cow goes "moo." The pig goes "oink." A child can learn from a picture book to associate images with sounds, but building a computer vision system that can train itself isn't as simple. Using artificial intelligence techniques, however, researchers at Disney Research and ETH Zurich have designed a system that can automatically learn the association between images and the sounds they could plausibly make.
Given a picture of a car, for instance, their system can automatically return the sound of a car engine.
A system that knows the sound of a car, a splintering dish, or a slamming door might be used in a number of applications, such as adding sound effects to films, or giving audio feedback to people with visual disabilities, noted Jean-Charles Bazin, associate research scientist at Disney Research.
To solve this challenging task, the research team leveraged data from collections of videos.
"Videos with audio tracks provide us with a natural way to learn correlations between sounds and images," Bazin said. "Video cameras equipped with microphones capture synchronized audio and visual information. In principle, every video frame is a possible training example."
One of the key challenges is that videos often contain many sounds that have nothing to do with the visual content. These uncorrelated sounds can include background music, voice-over narration and off-screen noises and sound effects and can confound the learning scheme.
"Sounds associated with a video image can be highly ambiguous," explained Markus Gross, vice president for Disney Research. "By figuring out a way to filter out these extraneous sounds, our research team has taken a big step toward an array of new applications for computer vision."
"If we have a video collection of cars, the videos that contain actual car engine sounds will have audio features that recur across multiple videos" Bazin said. "On the other hand, the uncorrelated sounds that some videos might contain generally won't share any redundant features with other videos, and thus can be filtered out."
Once the video frames with uncorrelated sounds are filtered out, a computer algorithm can learn which sounds are associated with an image. Subsequent testing showed that when presented an image, the proposed system often was able to suggest a suitable sound. A user study found that the system consistently returned better results than one trained with the unfiltered original video collection.
Combining creativity and innovation, this research continues Disney's rich legacy of inventing new ways to tell great stories and leveraging technology required to build the future of entertainment.
These results were recently presented at a European Conference on Computer Vision (ECCV) workshop in Amsterdam. In addition to Jean-Charles Bazin, the research team included Matthias Solèr and Andreas Krause of ETH Zurich's Computer Science Department, and Oliver Wang and Alexander Sorkine-Hornung of Disney Research.
Explore further: Artificial intelligence produces realistic sounds that fool humans
"Suggesting Sounds for Images from Video Collections-Paper" [PDF, 4.93 MB]
Provided by Disney Research
|
Population explosion of coral-eating starfish, storms and acidification of oceans causing rapid decline, study finds
Alok Jha, science correspondent 1 October 2012
|כוכבן קוצני – התמונה מויקיפדיה|
Crown-of-Thorns starfish near Qamea Island in Fiji.Matt Wright
| עדיין יש אלמוגים בשונית המחסום הגדולה אבל המצב הולך ומתדרדר מקור: וקיפדיה|
A variety of corals form an outcrop on Flynn Reef, part of the Great Barrier Reef near Cairns, Queensland, Australia.
We calculate that 100 months from 1 August 2008, atmospheric concentrations of greenhouse gases
will begin to exceed a point whereby it is no longer likely we will be able to avert potentially irreversible climate change. 'Likely' in this context refers to the definition of risk used by the Intergovernmental Panel on Climate Change (IPCC) to mean that, at that particular level of
greenhouse gas concentration, there is only a 66 - 90 per cent chance of global average surface
temperatures stabilising at 2º Celsius above pre-industrial levels.
Once this concentration is exceeded, it becomes more and more likely that we will overshoot a 2º C level of warming. This is the maximum acceptable level of temperature rise agreed by the European Union and others as necessary to retain reasonable confidence of preventing uncontrollable and ultimately catastrophic warming. We also believe this calculation to be conservative. The reasons why and the assumptions behind our conclusion are detailed below.
|
A good breakfast should provide a third of the total daily energy requirement.
A typical breakfast includes a cereal (rice, bread, oats, and corn-flakes), protein-rich food (cheese, labneh, egg, milk, and yogurt) and vitamin C rich fruit (orange, kiwi ...).
Children who eat a healthy breakfast are less likely to snack on foods that are high in fat and/or sugar later on and tend to have a better nutrient intake across the day
Skipping breakfast has deleterious effects on memory and attention.
Snacks in schools:
Choose snacks that provide a range of essential nutrients as well as energy, such as low-fat yogurts, low-fat milk, fruits, healthy sandwiches of white cheese or labneh and vegetables, unsalted/ unsweetened nuts and seeds
Avoid popular snack foods such as biscuits, ships, crisps and chocolate bars that are high in fat and/ or sugar.
Eat a variety of foods in order to have adequate nutrient intake:
Adequate nutrition will help the child develop maximal intelligence (IQ) and well-being.
Choose a daily diet with plenty of grain products, vegetables and fruits.
Choose a diet low in fat, saturated fat, and cholesterol.
Choose a diet that provides enough calcium and iron to meet the growing body’s requirements.
Choose a diet low in sugars and salt: Remove salt shakers from tables
Take oily fish at least once every three weeks
Restrict provision of meat products
Drink water all the day
Shift to low-calorie and low-fat meals, snacks and deserts, low fat or skimmed milk
Reducing the use of deep frying
Avoid taking sweet deserts, soft drinks, fruit-flavored drinks, sugar-coated cereals, chips or candy, as they have little nutritional value
Balance the food with regular physical activity in order to maintain a healthy body weight
It is recommended that children and young people should engage in 60 minutes of moderate intensity physical activity each day.
Parents should teach children from an early age about nutrition, foods, drinks, healthy eating and drinking
To know what happens to the food they consume.
The child should be guided to make independent food choices and eat a variety of foods.
It is important to teach children about dental hygiene to keep their teeth healthy and strong.
|
Is there anybody better to educate children about the dangers of smoking, than the kids themselves? Healthy Living, Seniors and Consumer Affairs Minister Jim Rondeau revealed a program in which students in Grades 5-12 will have the opportunity to create their own anti-tobacco videos as part of Create and Rate, an anti-tobacco video challenge.
"No one knows how to share important ideas with young people better than another young person. That's why we're giving students the opportunity to create their own videos for making educated decisions about smoking," said Rondeau. "It's a fun, challenging and thought-provoking way of increasing youth awareness about the risks of tobacco use."
The minister said the videos can be serious, funny or somewhere in between, as long as they highlight one of the following three themes:
* quitting smoking or never starting is one of the best decisions a person can ever make,
* tobacco smoke and second-hand smoke contain disgusting and dangerous ingredients, and
* tobacco is damaging the world and it's time to speak out about it.
Applications and information packages for Create and Rate, including a step-by-step guide to creating the videos, will be distributed to all Manitoba schools (Grades 5-12only) starting the week of Jan. 30.
Deadline for entries is March 31. The top 10 videos, as selected by a judging panel, will be posted online at www.mbcreaterate.ca during the third week of April for all young Manitobans to review and rate. Students will have approximately one month to vote once per day per person. Prizes will be awarded to the winning entries.
The new program is an extension of the province's popular Review and Rate program, now in its ninth year, which engages students to rate the effectiveness of anti-tobacco television advertising from around the world, the minister noted. Other youth initiatives include the Students Working Against Tobacco (SWAT) program, which has youth teams established in 22 schools across Manitoba, which are taking a leadership role in preventing youth tobacco use.
"According to the Canadian Tobacco Use Monitoring Survey, smoking rates for youth 15 to 19 have declined to 15 per cent in 2010 from 29 per cent in 1999," said Rondeau. "Manitoba will continue to build on this success by focusing on preventing young people from starting to smoke, while also assisting smokers with quitting, protecting non-smokers from exposure to second-hand smoke and de-normalizing tobacco products through our Provincial Tobacco Control Strategy."
National Non-Smoking Week (NNSW) in Canada is June 15 to 21. Established in 1977 by the Canadian Council for Tobacco Control, the goals of NNSW are to:
* educate Canadians about the dangers of smoking;
* prevent people who do not smoke from beginning to smoke and becoming addicted to tobacco;
* help people quit smoking;
* promote the right of individuals to breathe air unpolluted by tobacco smoke;
* de-normalize the tobacco industry, tobacco industry marketing practices, tobacco products and tobacco use; and
* assist in the attainment of a smoke-free society in Canada.
|
Florida Ducks The Northern Shoveler
Dabbling Ducks of the Marsh Flats
Wednesday June 28, 2017
Description: Perhaps the most visible diagnostic characteristic of the northern shoveler is its large, spoon shaped bill, which widens towards the tip and creates a shape unique among North American waterfowl. Male northern shovelers have an iridescent green head and neck, white chest and breast, and chestnut belly and sides. They have a white stripe extending from the breast along the margin of the gray-brown back, and white flank spots. The wings have a gray-blue shoulder patch, which is separated from a brilliant green speculum by a tapered white stripe. The bill is black in breeding plumage and the legs and feet are orange. During display male will utter a repeated liquid, hollow "g-dunk g-dunk g-dunk" often in flight as well as from water. Female northern shovelers have a light brownish head with a blackish crown, and a brownish speckled body. The upper wing coverts are grayish-blue, the greater secondary coverts are tipped with white, and the secondaries are brown with a slight greenish sheen. The bill is olive-green, with fleshy-orange in the gape area, and speckled with black dots.
Breeding: Northern shovelers breed in the parklands, short- and mixed-grass prairies of Canada, and the grasslands of the north central USA. They prefer shallow marshes that are mud-bottomed and rich in invertebrate life. Nest sites are generally located on the ground in grassy areas lacking woody cover and away from open water. Female northern shovelers lay an average of 9 eggs.
Migrating and Wintering: Northern shovelers fly from the prairie pothole region through the Pacific or Central Flyway, with major stopover areas in the Great Salt Lake, Malheur Basin, and Carson Sink. They winter in California, coastal Louisiana, Texas, and Mexico, and the north and central highlands of Mexico. Wintering habitat includes fresh and brackish coastal marshes, and ponds. Saltwater wetlands are generally avoided. Northern shovelers are common winter visitor to Central America, the Caribbean and northern Colombia, and are found occasionally in Trinidad (Scott and Carbonell, 1986).
Population: Northern shoveler populations have shown a fluctuating but consistent rise since the 1950s. The 2001 breeding population survey was 3.3 million birds, which is well above the North American Waterfowl Management Plan target population of 2 million.
Food habits: Northern shovelers feed by dabbling and sifting in shallow water. Seeds of sedges, bulrushes, saw grass, smartweeds, pondweeds, algae, and duckweeds, also aquatic insects, mollusks, and crustaceans are consumed by filtering water which is taken in at the bill tip and jetted out at the base.
1). Ducks Unlimited "Waterfowl ID Gallery" Northern Shoveler Facts
The Northern Shoveler in the photograph above was taken with my youngest daughter, Mekenzie on the Merritt Island Wildlife Refuge during the Christmas Holiday in 2008. We saw so many ducks and as I'm not a duck hunter or bird authority, I had to rush back home and lookup the duck's identity online", explains Captain Richard Bradley of Lagooner Fishing Guides.
An absolutely beautiful duck that can be found in Florida during the winter months on a regular basis. Bird watchers can find these dabbling ducks on the Black Point Drive area on North Merritt Island frequently.
Last modified: December 14 2015 16:40:23.
Published by: Captain Richard Bradley of Lagooner Fishing Guides©
home » northern shoveler
|
Since the Iran-Contra affair in the 1980s, the President’s power in foreign affairs, while questioned, has been constrained very little. Constitutional questions about executive power in the international arena have largely transformed into statutory ones. While statutes are more adaptable to changing circumstances than the Constitution, the statutory questions continue to address the issues generated by the Framers. Uncertainty regarding the scope of executive power has another cause: courts often dismiss cases about the constitutionality of the President’s actions for standing reasons. For instance, one of the latest cases that could have precipitated a serious discussion of the President’s foreign affairs powers is Bernstein v. Kerry. If the court had not dismissed the case for standing reasons, the plaintiffs would have challenged the Secretary of State’s decision to send military support to Nicaraguan rebels under the Department of State Foreign Operations and Related Programs Appropriations Act (“SFOAA”) and other statutes governing aid to foreign organizations and countries. Congress has developed a complex system for analyzing the Executive Branch’s power in this realm by setting up reporting requirements and adding a multitude of riders to bills. It is questionable how effective these statutes are at curbing Executive power-grabs, especially when the Executive has found evasive techniques for accomplishing its goals. For example, the usual statutory definition for “military support” has always included activities such as arming, training, directing, and sending out troops, but now statutory definitions must cover guerilla support and logistics in order to rein in presidential power in those areas. This definition should also include funding, at least when the United States directs the distribution of funds at a micro-level.
Alexa E. Craig,
Executive Power to Provide Material and Financial Support to Foreign Governments and NGOS Linked to Terrorist Groups,
Notre Dame J.L. Ethics & Pub. Pol'y
Available at: http://scholarship.law.nd.edu/ndjlepp/vol29/iss1/8
|
Books and Records
- defines the two general kinds of records, i.e. governing documents and financial records;
- discusses the four topics relating to books and records, i.e. location of the records, length to retain them, language used and the format.
Information in this section are developed and presented in four formats and context:
- Information Map: shows the interrelationships of the concepts and procedure on the topic. The map provides the framework for how each piece of information fits in the overall picture;
- Modules: information is presented in a sequence that may assist users in incorporating this new information into their knowledge base;
- FAQs: answers common questions raised in this area. This is very helpful if your question is the same as what was presented. If your question is different this requires you to transfer and apply the information presented. It is good as an introduction to the topic but it is not designed to cover all the related information;
- General Resources: comes in the form of Fast Facts, Tipsheets, Guides and Articles. They each present a summary of the topic and are broader in scope than a FAQ.
- Links: additional information on the basic legal requirements relating to the keeping of proper books and records for all Canadian charities that are registered with the Canada Revenue Agency.
|
FACE STABILITY OF TUNNELS
|Location and Year:||,|
Controlling the face stability
During the construction of bored tunnels the face stability is an important issue. An adequately controlled TBM face is of great importance to minimize settlements at the ground surface and to obtain the best results.
The process of TBM tunneling makes that the soil is removed one-sided whereby local soil stresses are changed. As a result of these changes in soil stresses local displacements can occur at surface level. Therefore the objective is to maintain the original stresses as much as possible, this is done by applying a certain support pressure.
This support pressure can be obtained by air, a support fluid or the excavated material itself. The support pressure can be variated between a minimum and a maximum value: the adjustment range.
ProceedingsArthe provides several product considering face stability of tunnels:
- Analytical approaches of the minimum and maximum support pressures for several sizes and types of TBMs
- Analyses of the expected excess pore pressures at the tunnel face
- Numerical calculations of the face stability for the minimum and maximum support pressures
- The design and dimensioning of temporary preloading mounds
- Risk assessments concerning the tunneling process
- Numerical determination of the displacements resulting from the tunneling process
|
Physics is all about probing the most fundamental mysteries in nature, so it’s no surprise that physicists have some very basic questions about the universe on their minds. Recently, Symmetry Magazine (published by two U.S.-government funded physics labs) asked a group of particle physicists to name the open questions in physics they most want answers to. Here’s a sample of the quandaries they shared:
“What will be the fate of our universe?”
The poet Robert Frost famously asked whether the world would end in fire or ice, and physicists still can’t answer the question. The future of the universe—the question named by Steve Wimpenny of the University of California, Riverside—largely depends on dark energy, which at this point is an unknown entity. Dark energy is responsible for the accelerating expansion of the universe, but its origins are entirely mysterious. If dark energy is constant over time, we’re likely looking at a “big freeze” in the future, at which point the universe continues to expand faster and faster, and eventually galaxies are so spread out from each other that space seems like a vast wasteland. If dark energy increases, this expansion could be even more severe, so that not just the space between galaxies but the space within them expands, and galaxies themselves are ripped apart—a fate dubbed the “big rip.” Another option is that dark energy decreases so that it cannot counteract the inward-pulling force of gravity, causing the universe to fall back in on itself in a “big crunch.” So basically, whichever way it goes, we’re doomed. On the bright side, none of these eventualities should come to pass for billions or trillions of years—plenty of time to decide if we’re hoping for fire or ice.
“The Higgs boson makes absolutely no sense. Why does it exist?”
The tone of this question was tongue in cheek, says its asker, Richard Ruiz of the University of Pittsburgh, but it points to a very real lack of understanding about the nature of the particle famously discovered last year at the Large Hadron Collider (LHC) in Europe. The Higgs boson helps explain how all other particles got their mass, yet it raises many other questions. For example, why does the Higgs boson interact with each particle differently—the top quark interacts much more strongly with the Higgs than the electron does, giving the top quark a much greater mass than the electron. “This is the only example of a ‘non-universal’ force in the Standard Model,” Ruiz says. Furthermore, the Higgs boson is the first fundamental particle found in nature with zero spin. “This is an entirely new sector in Standard Model particle physics,” Ruiz says. “How it comes about, we have no idea.”
For the rest of the story: http://blogs.scientificamerican.com/observations/2013/10/25/physics-biggest-unanswered-questions/
|
Now that the abject terror of the US presidential election is over — at least for a while — we have to turn our minds to new forms of pain and horror.
In recent years a growing number of illustrious scientists and technologists has described artificial intelligence (AI) as the greatest existential threat to humanity. They worry, rightfully, that a well-drilled, unfettered AI could eventually out-think and out-smart us at every level. Eventually, a super-intelligent AI would determine that humans were either peripheral or superfluous to its needs and goals, and then either enslave or extinguish us. This is the stuff of real nightmares.
Yet, at a more playful level, AI can also learn to deliver imagined nightmares. This Halloween researchers at MIT used AI techniques to create and optimize horrifying images of human faces and places. They called their AI the Nightmare Machine.
For the first step, researchers fed hundreds of thousands of celebrity photos into their AI algorithm, known as a deep convolutional generative adversarial network. This allowed the AI to learn about faces and how to create new ones. Second, they flavored the results with a second learning algorithm that had been trained on images of zombies. The combination allowed the AI to learn the critical factors that make for scary images and to selectively improve upon upon them. It turns out that blood on the face, empty eyeball sockets, and missing or misshaped teeth tend to illicit the greatest horror and fear.
While the results are not quite as scary as Stephen Hawkins’ warning of AI-led human extinction the images are terrorizing nonetheless.
Learn more about the MIT Media Lab’s Nightmare Machine here.
Image: Horror imagery generated by artificial intelligence. Courtesy: MIT Media Lab.
|
Angela Belli, PhD
St. John’s University, Queens, New York, United States (Summer 2013)
The iconic image of the prizefighter raising his hands above his head in a gesture of victory is given life in Flannery O’Connor’s The Enduring Chill.1 He appears not as a heavyweight champion of the world but as a country doctor. The main character in the story is a 25-year-old Southerner, Asbury Fox, who returns home to his mother’s dairy farm in the deep South after spending some time in New York City in a vain effort to achieve recognition as a writer. In that city he inhabited a freezing flat where he had to sleep under two blankets, one overcoat, and, in between, three layers of the New York Times. One night he experienced a severe chill which, coupled with other disquieting symptoms, convinced him that he was seriously ill—at death’s door in fact.
Having lost his job in a bookstore for excessive absences and with dwindling funds, he has no recourse other than to return to his roots. Physical distress apart, he is also demoralized by his need to abandon the environment that he considers superior for the development of his superior artistic gifts. Picking up her son at the rail stop, his widowed mother, Mrs. Fox, is aghast at his wasted appearance. Nevertheless, as she drives him back to their farm she maintains an optimistic air as she provides Asbury with an instant diagnosis—his illness is due to the cold he has experienced “up there” and she prescribes a cure, a generous dose of warm Southern air. He soon receives a second opinion, this time from his older sister, Mary George, described as the principal of the county elementary school and “an expert in all things” (363). She has concluded that his health issues are purely psychosomatic due to his failure as a writer. Her prescription? Two or three shock treatments to rid his head of the notion of being an artist.
Throughout the tale the “up there” “down here” duality is used to connote the North and the South, contrasting social, philosophical, and spiritual attitudes. A master of the short story form, O’Connor sketches in concise detail the inhabitants and scenery of her native Georgia. Her style is marked by a keen ear for regional dialect and a rich sense of humor, all effective in recreating the milieu in which the tale is set.
Mrs. Fox decides that Asbury should see a local practitioner, Dr. Block. Her son rejects the notion instantly, declaring that if he had wanted to go to a doctor he would have “gone up there where they have some good ones.” He adds, “Don’t you know they have better doctors in New York?” (359). His mother counters that, unlike Block, the doctors “up there” would not take a personal interest in him. She takes a dismal view of the city. On one occasion she had paid her son a visit and found his apartment to be a “terrible” place, five flights up “past open garbage cans on every landing” (362). However, she fails to convince him. As does Mary George, Ashbury regards Block as an “idiot.” Undoubtedly, O’Connor uses the doctor’s name ironically to suggest “blockhead.”
Waking from a troubled sleep, Asbury finds a pink, open-mouthed face, senseless as a baby’s, hanging over him and making faces as a stethoscope extends above his chest. Dr. Block has responded to Mrs. Fox’s summons. As he continues his examination, the doctor questions his patient about what he could have been doing in New York to reduce him to such a sorry state. He shares Mrs. Fox’s views of life in the city, adding to her assessment “I went up there once myself … and came straight on back home” (366). He orders his patient to open his mouth, all the while wiggling his ears as he proceeds. Dr. Block, we are told, is “irresistible” to children. “For miles around they vomited and went into fevers to have a visit from him” (366). Block resembles them, identifies with them and plays with them. By contrast, Asbury is less intrigued and wishes him out of the room. Unperturbed, the doctor continues to examine him murmuring, “You sho do look bad, Azzberry” (366). His patient continues to insult him, declaring “What’s wrong with me is way beyond you.” (367) indicating that the expertise of country doctors is negligible. To Asbury’s charges, Block responds calmly, admitting that many things are beyond him. He admits “I ain’t found anything yet that I thoroughly understand” (367). Nothing about the doctor gives any sign of intelligence—except for his unusual eyes which are “cold clinical nickel-colored” and reveal a curiosity over whatever he looked at (366).
In The Enduring Chill O’Connor invites us to view the ancient and unique encounter of physician and patient. The interaction is essential to the healing process and lies at the foundation of effective treatment. Of a number of models analyzing the relationship, O’Connor represents one, the paternalistic model. Dr. Block assumes a paternalistic role, which explains his popularity with children. Unlike the children, Asbury does not relate to a father figure nor does he consent to Block’s determining what is in his best interests or regulating his participation in his treatment. In a relationship marked by mutual consent, Asbury refuses to cooperate. Upon the death of Asbury’s father, his mother had assumed the role of both parents, thereby frustrating further her son’s longing for independence. In his new circumstances he must submit anew to his mother’s will. Only the thought of his imminent death and release consoles him. Upon leaving Asbury’s room, Mrs. Fox implores Block, “I want you to come back every day until you get him well” (366).
Dimly conscious of his mother’s love for him, Asbury regards her as provincial and naïve. He holds her responsible for shackling him and stifling his creativity; she has kept his imagination imprisoned as one would a caged bird. Her attempts to communicate with him on matters of interest to him all fail. In a further effort to bond with him, she ventures a discussion on writing, suggesting that when he recovers it would be nice if he wrote another book about “down here.” She specifies that what is needed is another Gone With The Wind. She advises him “to put the war in it. … That always makes a long book” (370). Asbury feels the muscles in his stomach tightening.
During his visit the previous year, Asbury had worked on a play about “the Negro.” To gather material for his project he attempted to establish rapport with the two black farm hands who worked in the dairy. Sensitive to the social changes of the moment, he encouraged the workers to assert themselves, even to overtly rebel against his mother’s rules—particularly her prohibition against smoking and drinking the fresh milk. Despite knowing better, they yield to Asbury’s offer to share his cigarettes. The following day the creamery returned the milk for having absorbed the odor of tobacco. The next afternoon the workers remain steadfast in refusing to violate the second rule. “That’s the thing she don’t ‘low” and further “She don’t ‘low noner us to drink noner this here milk” (369). The second rule is violated only by Asbury, who drinks the milk daily in an attempt to break down the men’s reserve. The only result of the second disobedience is the nausea that Asbury experiences from drinking the warm milk.
In the North Asbury had found intellectual stimulation by becoming part of a group of pseudo intellectuals who devoted their time to debating the meaning of existence. In their company he meets a Jesuit priest, Ignatius Vogle, S.J. whom he admires as a rare individual who could well have understood the meaning of his death. However, no further meetings occur between them as Asbury must return home. Before leaving his apartment for the last time, he burns all his manuscripts, destroying all his writing, except for a long letter—in imitation of Kafka—addressed to his mother in which he blames her and forgives her for the unconscious role she played in the tragedy of his life. Not to be opened until after his death, the letter will reveal the pain she has caused him. Once home Asbury seeks the counterpart to Fr. Vogle. The priest who arrives to see him, Fr. Finn, bears no resemblance to Fr. Vogle. He is elderly, infirm, and unable to converse on literary topics. When questioned about James Joyce, Fr. Finn states that he has never met him. Changing the topic, Asbury wants to discuss a favorite subject, “the myth of the dying god,” but he is equally unsuccessful. The priest proceeds to question the younger man on questions of dogma, none of which interests him. On leaving the bedside, Fr. Finn shouts a warning to Asbury to accept the Holy Ghost, who will come to him only when he rids himself of the hubris that fills his being. Anticipating the quick ending of his life, Asbury gives his mother the key to the desk drawer containing the letter. Not understanding, she places the key on the bedside table and leaves him to sleep. Shaken by her son’s rapid deterioration, Mrs. Fox accepts the fact that her son’s illness is real and realizes that Block, too, has a similar opinion.
When Mrs. Fox reappears, it is in the company of Dr. Block. Block comes in making faces while Mrs. Fox beams as she announces, “Guess what you’ve got, Sugar pie!” Block intervenes, “Found theter ol’ bug, did ol’ Block” (381). At that moment he signals victory. The gesture exhausts him and he lets his hands collapse in his lap. He proceeds to wipe his face vigorously with the red bandana he always carries, the face bearing a different expression each time it emerges from behind the rag. With the pride of a conqueror he tells his patient, “You ain’t going to die” (381). “Asbury,” Mrs. Fox explains, “you have undulant fever. It’ll keep coming back but it won’t kill you!” (381). To clarify matters, Dr. Block makes reference to the culture they both share: “Undulant fever ain’t so bad, Azzberry…it’s the same as Bang’s in a cow” (381). It appears that Asbury has been mistaken in assuming that his illness is “way beyond” his doctor’s understanding. Mrs. Fox, in fact, is also quite knowledgeable. She informs Block, “He must have drunk some unpasteurized milk up there” (381). Any New Yorker who shares Mrs. Fox’s joy must grant her license in concluding that cows providing fresh milk can be found in the midst of the city. As the doctor and Mrs. Fox leave the room, Asbury’s hand shoots out and he retrieves the key from the table and places it in his pocket.
At the conclusion of the tale, Asbury experiences a rebirth of spirit. Previously adopting the pose of an intellectual, he had been guilty of hubris, forsaking the Christian God for the God of Art. Having survived a health crisis, he accepts the coming of new life. A water stain on his bedroom ceiling in the form of a fierce bird with spread wings had been in place since his childhood. It had alternately annoyed and frightened him. Now, with eyes shocked clean by self-awareness, he accepts the responsibility for his illness and the forecast of a life frail, racked, but enduring in the face of a purifying terror” (382). Newly discovered self-awareness strips him of all illusions. The water stain on his wall suddenly takes on life, appearing to descend on him. Its movement symbolizes the descent of the Holy Ghost.
In pondering the successful physician-patient interaction, O’Connor sets down the factors that lead to fulfillment. With Dr. Block we find a skilled professional. Very much a part of the rural setting in which he is at ease, he is committed to serving the needs of the local inhabitants. At home in Timberboro, a small town ringed by farms, he has no desire to leave. His patients, of which Mrs. Fox is one, maintain their faith in him. When matters appear bleak for Asbury, his mother suppresses her doubts and declares, “Nowadays doctors don’t let young people die” (372).
Again, we must grant Mrs. Fox license for being illogical, except that this time she trumps the reader. At the end of the story when Block comes in to announce his success she cries out, justifying her unquestioning certitude, “I think you’re just as smart as you can be” (381). His dedication to his patient, despite the latter’s rudeness, has been borne out by his frequent visits and long, hushed conversations with Mrs. Fox and Mary George, all out of Asbury’s hearing. The happiness of the mother upon being reassured that Asbury’s disease is not life-threatening is conveyed in her description. “Her smile was as bright and intense as a lightbulb without a shade” (381), leaving one critic to observe that she “experiences the only smile of unqualified joy in all of O’Connor’s fiction.”2 Another example of mutual trust as a value in the community has been referred to earlier. Involved in the unprecedented social changes occurring about them, Mrs. Fox’s farm workers accept, without question, the taboos she imposes on them. The result? Not one of them drinks the forbidden fresh milk and not one of them falls ill.
Dr. Block’s cure is not confined to Asbury’s body. No small part of the younger man’s dis-ease has been occasioned by his spiritual malaise. In this regard, neither Fr. Vogle nor Fr. Finn has offered any comfort. During a visit from Dr. Block on one occasion when he draws Asbury’s blood, the doctor is described as humming a hymn as he pressed the needle in. “Oh slowly Lord but sure,” he prays (367). Block calls for divine assistance as he goes about his work. With the restoration of his physical health, Asbury achieves the spiritual renewal he sought, the two being linked. And Block succeeds where the clerics have not.
Flannery O’Connor was fully aware that not all readers shared her religious views, though her fiction repeatedly centered on themes calling for religious faith and redemption in a spiritually arid society. Yet, as with all great writers she sought to explore the universal in all human experience. That she succeeded in doing so has been recognized by many. No one paid her greater tribute than Thomas Merton in his prose elegy. Writing shortly after her early death, he said that “she probed our very life—the conflicts, the falsities, the obsessions, the vanities.”3 He celebrated her penetrating appraisal of life in the South and in the North. Thinking of her he thought not of Hemingway, or Porter, or Sartre but of Sophocles. At the beginning and at the end of the essay he tells her that he writes her name with honor.
Sophocles endures. Flannery O’Connor endures. And Dr. Block endures—in art and in life.
- Flannery O’Connor. The Complete Stories (New York: Farrar, Straus and Giroux, 1946)
- Edward Kessler. Flannery O’Connor and the Language of Apocalypse (Princeton: Princeton University Press, 1986)
- Thomas Merton. Flannery O’Connor: A Prose Elegy in The Literary Essays of Thomas Merton (New York: New Directions, 1981) 159-161
Kessler, Edward. Flannery O’Connor and the Language of Apocalypse. Princeton: Princeton University Press, 1986.
Merton, Thomas.The Literary Essays of Thomas Merton. New York: New Directions, 1981: 159-161.
O’Connor, Flannery.The Complete Stories. New York: Farrar, Straus and Giroux, 1972.
ANGELA BELLI, PhD, is professor of English at St. John’s University in New York. She has served as Chair of the English department and as President of the New York College English Association. She is the author of Ancient Greek Myths and Modern Drama: A Study in Continuity, New York University Press and coeditor of Blood and Bone: Poems by Physicians and Primary Care: More Poems by Physicians, University of Iowa Press. She is the editor of Bodies and Barriers: Dramas of Dis-Ease, The Kent State University Press. Her participation in the meetings of professional organizations has been devoted to exploring issues in modern drama and literature and medicine. Her many contributions to literary and medical publications have had a similar focus.
Follow Hektoen International via social media to see more featured content.
|
What’s the issue?
It’s not surprising plastic pollution has been receiving much deserved public attention lately, from ABC’s Craig Reucassel declaring War on Waste, to Channel Ten’s Project ‘Ban the Bag’ petition. The pressure is mounting for business, government and the public to do more in the battle against ‘fast plastic.’
‘Fast plastic’ refers to single use items used for a few minutes but last permanently in our environment. This plastic will outlive us and outswim us. Unfortunately, it’s everywhere you go, and we use it on autopilot without thinking what happens to it. Here are some fast facts:
- Almost 90% of marine debris found on Sydney’s beaches is plastic (e.g. bottles, caps, straws).
- Australians buy 600 million litres of bottled water a year.
- We use 10 million plastic bags a day.
- 1 billion coffee cups are littered and landfilled every year.
So with Plastic Free July happening around the world this month, it’s never been a better time to break our ‘fast plastic’ habits for the greater good of our hood.
Local plastic-free businesses
There are many local businesses helping to turn the tide on this epidemic. Roomie Café for example, offers 50c discount for bringing your own coffee cup and have excluded plastic from their business operations. ‘All of our bags, straws and trays are paper, and the cutlery is bamboo’ says Owner Eva. ‘We don’t have plastic milk bottles, all milk is from the tap that is connected to a 10L bag’.
Scoop’s, an unpackaged wholefoods store in Bondi have a message to businesses and consumers addicted to plastic. ‘Take a daily note of how much single use plastic you use every day, add it all up, then think about it lasting in landfill or the ocean forever’. Now opening their fourth store they are clearly seeing the benefits of their approach. ‘Our customers are finding this approach to shopping refreshing and fun’, says store owner Emily.
What can you do?
1. To start your plastic free journey, we suggest to start with the BIG 4 plastic polluters:
- Plastic bags - Take your reusable bags grocery shopping and say ‘NO’ to plastic bags when offered. Ask your local shop owner to go plastic bag free and add your voice to the #banthebag campaign online.
- Plastic bottles – swap for reusable ones.
- Takeaway coffee cups - BYO a reusable coffee cup. Contrary to popular belief, they are rarely recycled. You may even score a discount from local cafes.
- Straws - Refuse them when offered.
2. Join the great community events happening this month to learn more:
27 JUNE DIY WORKSHOP PLASTIC FREE SKIN CARE
2 JULY FILM SCREENING AND PANEL DISCUSSION
9 JULY BONDI BEACH CLEAN-UP
20 JULY DOCUMENTARY AND CHAT
29 JULY MARKET POP-UP STALL
Brought to you by your Plastic Free July event partners: Blue Bondi Green, Happy Fish, Plastic Free Bronte, Responsible Runners, Seaside Scavenge, Tangaroa Blue, Take3, Transition Bondi, Underwater Research Group and Waverley Council.
Head to secondnature.org.au/plastic_free_july for details and to book.
You can do it. You have got this!
Thanks for making plastic-free living second nature.
|
Join us now for Words and Their Stories, a program from VOA Learning English.
On this show we talk about the origins and meanings of common expressions in American English. Every week we dream up topics you might find interesting. Well, we also do research. But today we have dreamt up a show on “dreams.”
Dreams are the visions we have when we are asleep. But the word “dream” fills the expressions we use when we are awake.
“The stuff dreams are made of” is a romantic expression. It describes a really wonderful experience.
For example, let’s say you really love flight and space travel. So, a friend invites you to see a launch of a space shuttle. She even invites you to meet the astronauts who are going to fly into space.
After this experience you can say to her, “That was the stuff dreams are made of! It’s a dream come true!”
A dream come true is exactly that – a dream that has become reality.
Let’s make it even better.
Let’s say your friend can get you on the space shuttle. You can actually wear a space suit and sit in the flight commander’s seat! That would be beyond your wildest dreams. In other words, even you could not have dreamed up such a wonderful experience.
However, once you enter the space shuttle you feel ill. Your hands shake and you are unable to talk.
The astronauts try to help you. But you freak out, yelling, “Let me out of here! Let me out of here!” When you start throwing the flight manuals around the cockpit, the police come and remove you from the shuttle.
It’s a disaster. A nightmare.
After the police take your statement and your fingerprints, your friend tries to calm you down. She tells that everything will be okay. But all you can say to her is, “I wish it was all just a bad dream.”
But it wasn’t.
You are barred from participating in any NASA-related field trips. And now you have a police record.
However, months later your childhood dream of space travel comes back strong. You decide to become a pilot. Your friend advises against it. She reminds you that you have a severe case of claustrophobia, a fear of being in small spaces.
She calls your goal of becoming a pilot a pipe dream. A pipe dream is a hope or wish that is impossible to achieve. This expression began in the late 19th century. Word experts say it refers to a dream experienced when smoking an opium pipe. Those dreams rarely come true.
But you insist it is possible for you to be the first person to fly around the world with your faithful pet cat -- Galaxy. Your friend, however, says, “Dream on!” She could also say, “In your dreams!”
Both of these informal expressions are ways of saying that someone’s idea is a fantasy. Friends can use them in a funny way with each other. Otherwise, both expressions can sound a little mean.
Then your friend uses another informal expression. She tells you to wake up and smell the coffee! She adds that you are living in a dream world if you think you can become a world-famous pilot who flies with a cat. People who live in a dream world are unrealistic. They refuse to face facts.
Your friend’s remarks are hard for you to hear. But you know she is right. So, you decide to write a children’s book about someone who flies around the world with a beloved pet. As you are already a children’s book author, this is a dream that can definitely come true.
For the next few months, you happily daydream about the story you will write. To daydream is to let your creative mind, your imagination, take over. Luckily for you, you can daydream anywhere – not just in small spaces such as a cockpit.
It turns out you are better dreaming about air travel than doing it. Your book is a spectacular success. With the money you make from your book sales, you are finally able to buy your dream house. And it has a special room just for Galaxy, your cat.
Your proud friend invites you to speak at the school where she teaches. You tell her students to follow their dreams and to dream big. You also tell them that even broken dreams have value. You can always pick up the pieces and make a new one!
That night you call her on the phone to thank her for reminding you to never stop dreaming. She says that is what friends are for.
“Goodnight,” you say.
“Goodnight,” she says. “Sweet dreams.”
And that brings us to the end of Words and Their Stories.
I’m Anna Matteo teaching English for Voice of America. And you know, I wouldn’t dream of doing anything else.
Anna Matteo wrote this story for Learning English. Kelly Jean Kelly edited the story. The songs heard in this program are the Everly Brothers singing "All I Have to Do Is Dream" and Patsy Cline singing "Sweet Dreams."
Words and Their Stories
romantic – adj. not realistic or practical : not based on what is real
freak out – v. a wildly irrational reaction or spell of behavior
cockpit – n. a space or compartment in a usually small vehicle (as a boat, airplane, or automobile) from which it is steered, piloted, or driven
escort – v. to go with (someone or something) to give protection or guidance
claustrophobia – n. abnormal dread of being in closed or narrow spaces
opium – n. a bitter brownish addictive narcotic drug that consists of the dried latex obtained from immature seed capsules of the opium poppy
fantasy – n. the free play of creative imagination
spectacular – adj. causing wonder and admiration : very impressive
proud – adj. having or displaying excessive self-esteem
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.